text
stringlengths
20
1.01M
url
stringlengths
14
1.25k
dump
stringlengths
9
15
lang
stringclasses
4 values
source
stringclasses
4 values
1, Serial port transmission file 1. Serial port connection Cross connect the RXD and TXD pins of the two USB TO TTL serial ports, and connect the two USB interfaces to a laptop respectively to realize the serial port transmission between the two computers. Serial Interface is referred to as serial port for short. Serial Interface refers to the sequential transmission of data bit by bit. To realize two-way communication, a pair of transmission lines, namely TX and RX lines, are required. Circuit connection mode: if the serial port is to realize bidirectional transmission, device 1 and device 2, TX and RX shall be cross connected. Start bit: the data line TX changes from high level to low level. Stop bit: the data line TX changes from low level to high level. Function of start bit and stop bit: if the receiving device detects that the data line changes from high level to low level, it receives the start signal from the transmitting device, indicating the start of data transmission. If the receiving device detects that the data line changes from low level to high level, it receives a stop signal from the transmitting device, indicating the end of one frame of data. Common serial port transmission format: 1bit start bit + 8bit data bit + 1bit stop bit (no parity bit) 2. File transfer 1. The speed is 115200 Sender: Receiving end: Change the saved file to jpg file, and the results are as follows: 2. Set the rate to 2000000 Sender: Receiving end: 3. Conclusion: According to the above experimental results, the relationship among file size, baud rate and transmission time can be summarized as follows Transfer time = file size / baud rate Using serial port to transmit files, the actual transmission time is larger than the expected transmission time, and there is a delay. To some extent, when files of different sizes are transmitted at the same baud rate, the transmission time increases with the increase of file size; The transmission time required to transmit the same file at different baud rates decreases with the increase of baud rate. 2, Font reading and display of dot matrix Chinese characters 1. Principle 1. Location code It is stipulated in the national standard GD2312-80 that all national standard Chinese characters and symbols are allocated in a square matrix with 94 rows and 94 columns. Each row of the square matrix is called an "area", numbered from 01 to 94, and each column is called a "bit", numbered from 01 to 94, The area code and tag number of each Chinese character and symbol in the square array are combined to form four Arabic numerals, which are their "location code". The first two digits of the location code are its area code and the last two digits are its bit code. A Chinese character or symbol can be uniquely determined by location code. Conversely, any Chinese character or symbol also corresponds to a unique location code. 2. Internal code The internal code of Chinese characters refers to the code that represents a Chinese character in the computer. The internal code is slightly different from the location code. As mentioned above, the area code and bit code of Chinese location code are between 1 ~ 94. If the location code is directly used as the internal code, it will be confused with the basic ASCII code. In order to avoid the conflict between the internal code and the basic ASCII code, it is necessary to avoid the control code (00H~1FH) in the basic ASCII code and distinguish it from the characters in the basic ASCII code. In order to achieve these two points, 20H can be added to the area code and bit code respectively, and 80H can be added on this basis (here "H" means that the first two digits are hexadecimal numbers). After these processes, it takes two bytes to represent a Chinese character with internal code, which are called high byte and low byte respectively. The internal code of these two bytes is represented according to the following rules: High byte = area code + 20H + 80H (or area code + A0H) Low byte = bit code + 20H + 80H (or bit code + AOH) Since the hexadecimal number in the value range of area code and bit code of Chinese characters is 01H5EH), the value range of high-order byte and low-order byte of Chinese characters is A1HFEH 3. Chinese character dot matrix acquisition 1) Using location code to obtain Chinese characters The Chinese character dot matrix font is stored according to the sequence of location codes. Therefore, we can obtain the dot matrix of a font according to location.) Acquiring Chinese characters by using Chinese character internal code As we have said earlier, the relationship between the location code of Chinese characters and the internal code is as follows: High byte of internal code = area code + 20h + 8OH (or area code + A0H) Low byte of internal code = bit code + 20h + 8OH (or bit code + AOH) Conversely, we can also obtain the location code according to the internal code: Area code = high byte of internal code - AOH Bit code = low byte of internal code - AOH 2. Implementation steps 1. Put Asci0816.zf, HZKf2424.hz, logo.txt and sanli.jpg under this folder: The contents of the logo.txt file are as follows: 2. Write code The code is as follows: #include<iostream> #include<opencv/cv.h> #include"opencv2/opencv.hpp" #include<opencv/cxcore.h> #include<opencv/highgui.h> #include<math.h> using namespace cv; using namespace std; void paint_chinese(Mat& image,int x_offset,int y_offset,unsigned long offset); void paint_ascii(Mat& image,int x_offset,int y_offset,unsigned long offset); void put_text_to_image(int x_offset,int y_offset,String image_path,char* logo_path); int main() { String image_path="sanli.jpg";//Picture path char* logo_path=(char*)"logo.txt";//Student ID name path put_text_to_image(270,280,image_path,logo_path); return 0; } void paint_ascii(Mat& image,int x_offset,int y_offset,unsigned long offset) { //Coordinates of the starting point of the drawing Point p; p.x=x_offset; p.y=y_offset; char buff[16]; //Store ascii font //Open ascii font file FILE *ASCII; if((ASCII=fopen("Asci0816.zf","rb"))==NULL) { printf("Can't open ascii.zf,Please check the path!"); //getch(); exit(0); } fseek(ASCII,offset,SEEK_SET); fread(buff,16,1,ASCII); int i,j; Point p1=p; for(i=0;i<16;i++) //Sixteen char s { p.x=x_offset; for(j=0;j<8;j++) //One char and eight bit s { p1=p; if(buff[i]&(0x80>>j)) //Test whether the current bit is 1 { //Because the original ascii word film is 8 * 16, which is not large enough, the original pixel is replaced with 4 pixels, and there are 16 * 32 pixels after replacement circle(image,p1,0,Scalar(0,0,255),-1); p1.x++; circle(image,p1,0,Scalar(0,0,255),-1); p1.y++; circle(image,p1,0,Scalar(0,0,255),-1); p1.x--; circle(image,p1,0,Scalar(0,0,255),-1); } p.x+=2; //One pixel becomes four, so x and y should both be + 2 } p.y+=2; } } void paint_chinese(Mat& image,int x_offset,int y_offset,unsigned long offset) { //Coordinates of pixels actually drawn on the picture Point p; p.x=x_offset; p.y=y_offset; //Open hzk24 Chinese character library file FILE *HZK; char buff[72];//Store Chinese font if((HZK=fopen("HZKf2424.hz","rb"))==NULL) { printf("Can't open HZKf2424.hz,Please check the path!"); //getch(); font //Transpose the Chinese font matrix, because the Chinese font stores the data after the device (reverse) font } else { mat[j*8+k][i]=false; } } for(i=0;i<24;i++) { p.x=x_offset; for(j=0;j<24;j++) { if(mat[i][j]) circle(image,p,1,Scalar(255,0,0),-1); //Write (replace) pixels p.x++; //Shift right one pixel } p.y++; //Move down one pixel } } void put_text_to_image(int x_offset,int y_offset,String image_path,char* logo_path) { //Get pictures through picture path Mat image=imread(image_path); int length=18;//Length of characters to print unsigned char qh,wh;//Define area code and tag number unsigned long offset;//Offset unsigned char hexcode[30];//Hexadecimal used to store Notepad reads FILE* file_logo; if ((file_logo=fopen(logo_path,"rb"))==NULL) { printf("Can't open txtfile,Please check the path!"); //getch(); exit(0); } fseek(file_logo,0,SEEK_SET);//Move the file pointer to the offset position fread(hexcode,length,1,file_logo); int x=x_offset,y=y_offset;//x. Y: the starting coordinate of the text drawn on the picture for(int m=0;m<length;) { if(hexcode[m]==0x23) { break;//It ends when the # number is read } //Judge whether the two high-order hexadecimal numbers are greater than or equal to b0 (the first Chinese character is b0a1), and find them from the Chinese character library else if(hexcode[m]>0xaf) { qh=hexcode[m]-0xaf;//Calculation area code wh=hexcode[m+1]-0xa0;//Calculation bit code offset=(94*(qh-1)+(wh-1))*72L;//Calculate the offset of the Chinese character in the font paint_chinese(image,x,y,offset); m=m+2;//One Chinese character takes up two chars, so add 2 x+=24;//A Chinese character occupies 24 pixels in the picture, so the horizontal coordinates are + 24 each time } else { wh=hexcode[m]; offset=wh*16l;//Calculate the offset of English characters paint_ascii(image,x,y,offset); m++;//A char x+=16;//The original 8 * 16 is changed to 16 * 32. The original pixel is now painted with four pixels } } cv::imshow("image",image); cv::waitKey(); } 3. Compile the execution file Enter the following command g++ F.cpp -o F `pkg-cnfig --cflags --libs opencv` The results are as follows: 3, Summary Through this experiment, I learned how to use the serial port for file transmission, how to use C/C + + to call the opencv Library under Ubuntu to superimpose the name and student number in the logo on the lower right of the picture, and also learned the relationship between file size, baud rate and transmission time, as well as the internal code of Chinese characters Location code coding rules and font data storage format. very interesting. 4, Quote How does the serial port transmit data. Principle of Chinese character lattice font. Drawing dot matrix Chinese characters on pictures with Opencv. Experiment report assignment 3.
https://programmer.group/6194fb63bba21.html
CC-MAIN-2022-40
en
refinedweb
PySide2 without drivers QSql - Alexandre E Souza last edited by I`m start with pyside2 and how I run from PySide2.QtSql import QSqlDatabase, QSqlDriver print(QSqlDatabase.drivers()) out is [] I have a dylib in /usr/local/mysql/lib libmysqlclient.18.dylib libmysqlclient_r.18.dylib libmysqlclient.20.dylib libmysqlclient_r.dylib libmysqlclient.dylib libqsqlite.dylib but don`t show drivers in my app - SGaist Lifetime Qt Champion last edited by Hi and welcome to devnet, How did you install PySide2 ? - Alexandre E Souza last edited by I`m install using anaconda conda install -c conda-forge pyside2
https://forum.qt.io/topic/91939/pyside2-without-drivers-qsql
CC-MAIN-2022-40
en
refinedweb
#include <Request.h> #include <Request.h> Collaboration diagram for CORBA::Request: Provides a way to create requests and populate it with parameters for use in the Dynamic Invocation Interface. [private] [static] Pseudo object methods. Set the byte order member. Get the byte order member. Set the lazy evaluation flag. Return the arguments for the request. Return a list of the request's result's contexts. Since TAO does not implement Contexts, this will always be 0. Mutator for the Context member. Accessor for the Context member. Return the exceptions resulting from this request. Callback method for deferred synchronous requests. Perform method resolution and invoke an appropriate method. If the method returns successfully, its result is placed in the result argument specified on create_request. The behavior is undefined if this Request has already been used with a previous call to invoke>, send>, or . create_request Request invoke> send> Return the operation name for the request. Accessor for the input stream containing the exception. Proprietary method to check whether a response has been received. Return the result for the request. Returns reference to Any for extraction using >>=. Send a oneway request. Initialize the return type. Return the target of this request. [friend] Parameter list. Can be reset by a gateway when passing along a request. List of the request's result's contexts. Context associated with this request. List of exceptions raised by the operation. Invocation flags. If not zero then the NVList is not evaluated by default. Protect the refcount_ and response_receieved_. Operation name. Pointer to our ORB. Stores user exception as a CDR stream when this request is used in a TAO gateway. Reference counting. Set to TRUE upon completion of invoke() or handle_response(). Result of the operation. Target object.
https://www.dre.vanderbilt.edu/Doxygen/5.4.6/html/tao/dynamicinterface/classCORBA_1_1Request.html
CC-MAIN-2022-40
en
refinedweb
C# | Search in a SortedList object SortedList class is a collection of (key, value) pairs which are sorted according to keys. Those pairs can be accessible by key and as well as by index(zero-based indexing). This comes under System.Collections namespace. SortedList.ContainsKey(Object) method is used to check whether a SortedList object contains a specificKey (object key); Here, key is the key to locate in the SortedList object. Return Value: This method will return True if the SortedList object contains an element with the specified key otherwise it returns False. Exceptions: - ArgumentNullException : If the key is null. - InvalidOperationException : If the comparer throws an exception. Below given are some examples to understand the implementation in a better way: Example 1: True Example 2: Error: Unhandled Exception: System.ArgumentNullException: Key cannot be null. Parameter name: key Note: This method uses a binary search algorithm, therefore, this method is an O(log n) operation, where n is Count. Reference: -
https://www.geeksforgeeks.org/c-sharp-search-in-a-sortedlist-object/?ref=rp
CC-MAIN-2022-40
en
refinedweb
If I only had an hour to chop down a tree, I would spend the first 45 minutes watching YouTube videos about it SQL injection vulnerabilities arise when you construct database queries unsafely, and untrusted data gets interpreted as a part of the SQL query structure. Let's say we have a Java app that allows Using Java as an example, using an ORM such as hibernate that implements the JPA (Java Persistence API) could look like this. First, define a model. @Entity public class Document { @Id @GeneratedValue(strategy=GenerationType.AUTO) private Long id; private String documentName; private Integer ownerId; } Then, define a repository class. @Repository public interface DocumentRepository extends JpaRepository<Document, Long> { List<Document> findByDocumentNameAndOwnerId(String documentName, Integer ownerId); } Finally, you can use the repository. Now you can fetch the documents like so: List<Document> docs = documentRepository.findByDocumentNameAndOwnerId(request.getParameter("docName"), authContext.getUserId()); The ORM will take care of handling all parameters safely. Now, suppose you want more control over your queries. In that case, many ORMs provide query builders that you can use, such as Hibernate Criteria API. - - If you use Python, Django has a great ORM; if you don't use Django, sqlalchemy is an excellent option. PHP has Doctrine. Just google for an ORM for your technology of choice. Warning ORM frameworks are not a silver bullet in two senses. The first is that they still have functionality for supporting raw SQL queries/query parts. Just don't use those features, and you're golden. The second is that ORM frameworks have vulnerabilities from time to time, just like any other software package. So follow other good practices: validate all input, use a WAF and keep your packages up to date, and you should be fine. Prepared statements Prepared statements are more of a legacy option and should be avoided because compared to ORM it has a significantly higher risk of human error. However,. However, in my experience, as the codebase grows larger, mistakes start to creep in. You only need one slip to completely vulnerable. Edge cases such as arrays (documentId IN ("foo", "bar")) are where the blunders often happen. So if you decide to go with this method, be very careful with it as you scale. Web Depending on your database product and budget, you might want to consider giving database firewalls a try. I haven't tried one personally, but such things do exist. Conclusion. Previously published at
https://hackernoon.com/what-is-an-sql-injection-attack-how-to-prevent-sql-injection-vulnerabilities-xo5r35wz
CC-MAIN-2022-40
en
refinedweb
Counted Body Techniques Kevlin Henney ([email protected]) Reference counting techniques? Nothing new, you might think. Every good C++ text that takes you to an intermediate or advanced level will introduce the concept. It has been explored with such thoroughness in the past that you might be forgiven for thinking that everything that can be said has been said. Well, let's start from first principles and see if we can unearth something new.... And then there were none... The principle behind reference counting is to keep a running usage count of an object so that when it falls to zero we know the object is unused. This is normally used to simplify the memory management for dynamically allocated objects: keep a count of the number of references held to that object and, on zero, delete the object. How to keep a track of the number of users of an object? Well, normal pointers are quite dumb, and so an extra level of indirection is required to manage the count. This is essentially the PROXY pattern described in Design Patterns [Gamma, Helm, Johnson & Vlissides, Addison-Wesley, ISBN 0-201-63361-2]. The intent is given as Provide a surrogate or placeholder for another object to control access to it. Coplien [Advanced C++ Programming Styles and Idioms, Addison-Wesley, ISBN 0-201-56365-7] defines a set of idioms related to this essential separation of a handle and a body part. The Taligent Guide to Designing Programs [Addison-Wesley, ISBN 0-201-40888-0] identifies a number of specific categories for proxies (aka surrogates). Broadly speaking they fall into two general categories: - Hidden: The handle is the object of interest, hiding the body itself. The functionality of the handle is obtained by delegation to the body, and the user of the handle is unaware of the body. Reference counted strings offer a transparent optimisation. The body is shared between copies of a string until such a time as a change is needed, at which point a copy is made. Such a COPY ON WRITE pattern (a specialisation of LAZY EVALUATION) requires the use of a hidden reference counted body. - Explicit: Here the body is of interest and the handle merely provides intelligence for its access and housekeeping. In C++ this is often implemented as the SMART POINTER idiom. One such application is that of reference counted smart pointers that collaborate to keep a count of an object, deleting it when the count falls to zero. Attached vs detached For reference counted smart pointers there are two places the count can exist, resulting in two different patterns, both outlined in Software Patterns [Coplien, SIGS, ISBN 0-884842-50-X]: - COUNTED BODY or ATTACHED COUNTED HANDLE/BODY places the count within the object being counted. The benefits are that countability is a part of the object being counted, and that reference counting does not require an additional object. The drawbacks are clearly that this is intrusive, and that the space for the reference count is wasted when the object is not heap based. Therefore the reference counting ties you to a particular implementation and style of use. - DETACHED COUNTED HANDLE/BODY places the count outside the object being counted, such that they are handled together. The clear benefit of this is that this technique is completely unintrusive, with all of the intelligence and support apparatus in the smart pointer, and therefore can be used on classes created independently of the reference counted pointer. The main disadvantage is that frequent use of this can lead to a proliferation of small objects, i.e. the counter, being created on the heap. Even with this simple analysis, it seems that the DETACHED COUNTED HANDLE/BODY approach is ahead. Indeed, with the increasing use of templates this is often the favourite, and is the principle behind the common - but not standard - counted_ptr. [The Boost name is shared_ptr rather than counted_ptr.] A common implementation of COUNTED BODY is to provide the counting mechanism in a base class that the counted type is derived from. Either that, or the reference counting mechanism is provided anew for each class that needs it. Both of these approaches are unsatisfactory because they are quite closed, coupling a class into a particular framework. Added to this the non-cohesiveness of having the count lying dormant in a non-counted object, and you get the feeling that excepting its use in widespread object models such as COM and CORBA the COUNTED BODY approach is perhaps only of use in specialised situations. A requirements based approach It is the question of openness that convinced me to revisit the problems with the COUNTED BODY idiom. Yes, there is a certain degree of intrusion expected when using this idiom, but is there anyway to minimise this and decouple the choice of counting mechanism from the smart pointer type used? In recent years the most instructive body of code and specification for constructing open general purpose components has been the Stepanov and Lee's STL (Standard Template Library), now part of the C++ standard library. The STL approach makes extensive use of compile time polymorphism based on well defined operational requirements for types. For instance, each container, contained and iterator type is defined by the operations that should be performable on an object of that type, often with annotations describing additional constraints. Compile time polymorphism, as its name suggests, resolves functions at compile time based on function name and argument usage, i.e. overloading. This is less intrusive, although less easily diagnosed if incorrect, than runtime poymorphism that is based on types, names and function signatures. This requirements based approach can be applied to reference counting. The operations we need for a type to be Countable are loosely: - An acquireoperation that registers interest in a Countable object. - A releaseoperation unregisters interest in a Countable object. - An acquiredquery that returns whether or not a Countable object is currently acquired. - A disposeoperation that is responsible for disposing of an object that is no longer acquired. Note that the count is deduced as a part of the abstract state of this type, and is not mentioned or defined in any other way. The openness of this approach derives in part from the use of global functions, meaning that no particular member functions are implied; a perfect way to wrap up an existing counted body class without modifying the class itself. The other aspect to the openness comes from a more precise specification of the operations. For a type to be Countable it must satisfy the following requirements, where ptr is a non-null pointer to a single object (i.e. not an array) of the type, and #function indicates number of calls to function(ptr): Note that the two arguments to dispose are to support selection of the appropriate type safe version of the function to be called. In the general case the intent is that the first argument determines the type to be deleted, and would typically be templated, while the second selects which template to use, e.g. by conforming to a specific base class. In addition the following requirements must also be satisfied, where null is a null pointer to the Countable type: Note that there are no requirements on these functions in terms of exceptions thrown or not thrown, except that if exceptions are thrown the functions themselves should be exception safe. Getting smart Given the Countable requirements for a type, it is possible to define a generic smart pointer type that uses them for reference counting: template<typename countable_type> class countable_ptr { public: // construction and destruction explicit countable_ptr(countable_type *); countable_ptr(const countable_ptr &); ~countable_ptr(); public: // access countable_type *operator->() const; countable_type &operator*() const; countable_type *get() const; public: // modification countable_ptr &clear(); countable_ptr &assign(countable_type *); countable_ptr &assign(const countable_ptr &); countable_ptr &operator=(const countable_ptr &); private: // representation countable_type *body; }; The interface to this class has been kept intentionally simple, e.g. member templates and throw specs have been omitted, for exposition. The majority of the functions are quite simple in implementation, relying very much on the assign member as a keystone function: template<typename countable_type> countable_ptr<countable_type>::countable_ptr(countable_type *initial) : body(initial) { acquire(body); } template<typename countable_type> countable_ptr<countable_type>::countable_ptr(const countable_ptr &other) : body(other.body) { acquire(body); } template<typename countable_type> countable_ptr<countable_type>::~countable_ptr() { clear(); } template<typename countable_type> countable_type *countable_ptr<countable_type>::operator->() const { return body; } template<typename countable_type> countable_type &countable_ptr<countable_type>::operator*() const { return *body; } template<typename countable_type> countable_type *countable_ptr<countable_type>::get() const { return body; } template<typename countable_type> countable_ptr<countable_type> &countable_ptr<countable_type>::clear() { return assign(0); } template<typename countable_type> countable_ptr<countable_type> &countable_ptr<countable_type>::assign(countable_type *rhs) { // set to rhs (uses Copy Before Release idiom which is self assignment safe) acquire(rhs); countable_type *old_body = body; body = rhs; // tidy up release(old_body); if(!acquired(old_body)) { dispose(old_body, old_body); } return *this; } template<typename countable_type> countable_ptr<countable_type> &countable_ptr<countable_type>::assign(const countable_ptr &rhs) { return assign(rhs.body); } template<typename countable_type> countable_ptr<countable_type> &countable_ptr<countable_type>::operator=(const countable_ptr &rhs) { return assign(rhs); } Public accountability Conformance to the requirements means that a type can be used with countable_ptr. Here is an implementation mix-in class (mix-imp) that confers countability on its derived classes through member functions. This class can be used as a class adaptor: class countability { public: // manipulation void acquire() const; void release() const; size_t acquired() const; protected: // construction and destruction countability(); ~countability(); private: // representation mutable size_t count; private: // prevention countability(const countability &); countability &operator=(const countability &); }; Notice that the manipulation functions are const and that the count member itself is mutable. This is because countability is not a part of an object's abstract state: memory management does not depend on the const-ness or otherwise of an object. I won't include the definitions of the member functions here as you can probably guess them: increment, decrement and return the current count, respectively for the manipulation functions. In a multithreaded environment you should ensure that such read and write operations are atomic. So how do we make this class Countable? A simple set of forwarding functions does the job: void acquire(const countability *ptr) { if(ptr) { ptr->acquire(); } } void release(const countability *ptr) { if(ptr) { ptr->release(); } } size_t acquired(const countability *ptr) { return ptr ? ptr->acquired() : 0; } template<class countability_derived> void dispose(const countability_derived *ptr, const countability *) { delete ptr; } Any type that now derives from countability may now be used with countable_ptr: class example : public countability { ... }; void simple() { countable_ptr<example> ptr(new example); countable_ptr<example> qtr(ptr); ptr.clear(); // set ptr to point to null } // allocated object deleted when qtr destructs Runtime mixin The challenge is to apply COUNTED BODY in a non-intrusive fashion, such that there is no overhead when an object is not counted. What we would like to do is confer this capability on a per object rather than on a per class basis. Effectively we are after Countability on any object, i.e. anything pointed to by a void *! It goes without saying that void is perhaps the least committed of any type. The forces to resolve on this are quite interesting, to say the least. Interesting, but not insurmountable. Given that the class of a runtime object cannot change dynamically in any well defined manner, and the layout of the object must be fixed, we have to find a new place and time to add the counting state. The fact that this must be added only on heap creation suggests the following solution: struct countable_new; extern const countable_new countable; void *operator new(size_t, const countable_new &); void operator delete(void *, const countable_new &); We have overloaded operator new with a dummy argument to distinguish it from the regular global operator new. This is comparable to the use of the std::nothrow_t type and std::nothrow object in the standard library. The placement operator delete is there to perform any tidy up in the event of failed construction. Note that this is not yet supported on all that many compilers. The result of a new expression using countable is an object allocated on the heap that has a header block that holds the count, i.e. we have extended the object by prefixing it. We can provide a couple of features in an anonymous namespace (not shown) in the implementation file for for supporting the count and its access from a raw pointer: struct count { size_t value; }; count *header(const void *ptr) { return const_cast<count *>(static_cast<const count *>(ptr) - 1); } An important constraint to observe here is the alignment of count should be such that it is suitably aligned for any type. For the definition shown this will be the case on almost all platforms. However, you may need to add a padding member for those that don't, e.g. using an anonymous union to coalign count and the most aligned type. Unfortunately, there is no portable way of specifying this such that the minimum alignment is also observed - this is a common problem when specifying your own allocators that do not directly use the results of either new or malloc. Again, note that the count is not considered to be a part of the logical state of the object, and hence the conversion from const to non- const - count is in effect a mutable type. The allocator functions themselves are fairly straightforward: void *operator new(size_t size, const countable_new &) { count *allocated = static_cast<count *>(::operator new(sizeof(count) + size)); *allocated = count(); // initialise the header return allocated + 1; // adjust result to point to the body } void operator delete(void *ptr, const countable_new &) { ::operator delete(header(ptr)); } Given a correctly allocated header, we now need the Countable functions to operate on const void * to complete the picture: void acquire(const void *ptr) { if(ptr) { ++header(ptr)->value; } } void release(const void *ptr) { if(ptr) { --header(ptr)->value; } } size_t acquired(const void *ptr) { return ptr ? header(ptr)->value : 0; } template<typename countable_type> void dispose(const countable_type *ptr, const void *) { ptr->~countable_type(); operator delete(const_cast<countable_type *>(ptr), countable); } The most complex of these is the dispose function that must ensure that the correct type is destructed and also that the memory is collected from the correct offset. It uses the value and type of first argument to perform this correctly, and the second argument merely acts as a strategy selector, i.e. the use of const void * distinguishes it from the earlier dispose shown for const countability *. Getting smarter Now that we have a way of adding countability at creation for objects of any type, what extra is needed to make this work with the countable_ptr we defined earlier? Good news: nothing! class example { ... }; void simple() { countable_ptr<example> ptr(new(countable) example); countable_ptr<example> qtr(ptr); ptr.clear(); // set ptr to point to null } // allocated object deleted when qtr destructs The new(countable) expression defines a different policy for allocation and deallocation and, in common with other allocators, any attempt to mix your allocation policies, e.g. call delete on an object allocated with new(countable), results in undefined behaviour. This is similar to what happens when you mix new[] with delete or malloc with delete. The whole point of Countable conformance is that Countable objects are used with countable_ptr, and this ensures the correct use. However, accidents will happen, and inevitably you may forget to allocate using new(countable) and instead use new. This error and others can be detected in most cases by extending the code shown here to add a check member to the count, validating the check on every access. A benefit of ensuring clear separation between header and implementation source files means that you can introduce a checking version of this allocator without having to recompile your code. Conclusion There are two key concepts that this article has introduced: - The use of a generic requirements based approach to simplify and adapt the use of the COUNTED BODY pattern. - The ability, through control of allocation, to dynamically and non-intrusively add capabilities to fixed types using the RUNTIME MIXIN pattern. The application of the two together gives rise to a new variant of the essential COUNTED BODY pattern, UNINTRUSIVE COUNTED BODY. You can take this theme even further and contrive a simple garbage collection system for C++. The complete code for countable_ptr, countability, and the countable new is also available.
http://www.boost.org/community/counted_body.html
crawl-001
en
refinedweb
[UNIX] OpenBSD File Descriptor Vulnerability (Additional Details)From: [email protected] Date: 05/19/02 - Previous message: [email protected]: "[NEWS] SonicWALL SOHO Content Blocking Script Injection and Logfile DoS" - Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ] From: [email protected] To: [email protected] Date: Sun, 19 May 2002 07:05 File Descriptor Vulnerability (Additional Details) ------------------------------------------------------------------------ SUMMARY On current OpenBSD systems, any local user (whether or not they are in the wheel group) can fill the kernel file descriptors table, leading to a denial of service condition. Furthermore, by abusing a flaw in the way the kernel checks closed file descriptors 0-2 (when running a setuid program), it is possible to combine this bug and gain root access (by exploiting a race condition). DETAILS Vulnerable systems: OpenBSD 3.1, 3.0 and 2.9 (Unpatched) Immune systems: OpenBSD 3.1, 3.0 and 2.9 (Patched). Local Root Exploit Three weeks ago, Joost Pol is comments of the code, but not fixed). exploit a race condition with respect to the system file descriptors table: 1) Fill the kernel file descriptors table (see the "local DoS" explanation). 2) Execute a setuid program program execution will fail. However, we found that, by tuning a simple "for" loop, the good timing is quite easy to meet. Solution: The "root exploit" problem was fixed on the CVS a week ago, a few hours after it was reported.. Exploit: We have been able to exploit this vulnerability successfully on OpenBSD 3.0, and become succeeded. /* fd_openbsd.c (c) 2002 FozZy <[email protected]> Local root exploit for OpenBSD up to 3.1. Do not distribute. Research material from Hackademy and Hackerz Voice Newspaper () For educational and security audit purposes only. Try this on your *own* system. No warranty of any kind, this program may damage your system and your brain. Script-kiddies, you will have to modify one or two things to make it work. Usage: gcc -o fd fd_openbsd.c ./fd su -a skey */ #include <unistd.h> #include <stdio.h> #include <sys/types.h> #include <sys/time.h> #include <sys/resource.h> #include <errno.h> #include <fcntl.h> #define SUID_NAME "/usr/bin/skeyaudit" #define SKEY_DATA "\nr00t md5 0099 qwerty 545a54dde8d3ebd3 Apr 30,2002 22:47:00\n"; extern int errno; int main(int argc, char **argv) { char *argvsuid[3]; int i, n; int fildes[2]; struct rlimit *rlp; rlp = (struct rlimit *) malloc((size_t) sizeof(rlp)); if (getrlimit(RLIMIT_NOFILE, rlp)) perror("getrlimit"); rlp->rlim_cur = rlp->rlim_max; /* we want to allocate a maximum number of fd in each process */ if (setrlimit(RLIMIT_NOFILE, rlp)) perror("setrlimit"); n=0; open(SUID_NAME, O_RDONLY, 0);/* is it useful ? allocate this file in the kernel fd table, for execve to succeed later*/ while (n==0) { for (i=4; i<=rlp->rlim_cur; i++) /* we start from 4 to avoid freeing the SUID_NAME buffer, assuming its fd is 3 */ close(i); i=0; while(pipe(fildes)==0) /* pipes are the best way to allocate unique file descriptors quickly */ i++; printf("Error number %d : %s\n", errno, (errno==ENFILE) ? "System file table full":"Too many descriptors active for this process"); if (errno==ENFILE) { /* System file table full */ n = open("/bin/pax", O_RDONLY, 0); /* To be sure we don't miss one fd, since a pipe allocates 2 fds or 0 if failure */ fprintf(stderr, "Let's exec the suid binary...\n"); fflush(stderr); if ((n=fork())==-1) { perror("last fork failed"); exit(1); } if (n==0) { for (i=3; i<=rlp->rlim_cur; i++) close(i); /* close all fd, we don't need to fill the fd table of the process */ argvsuid[0]=SKEY_DATA; /* we put the data to be printed on stderr as the name of the program */ argvsuid[1]="-i"; /* to make skeyaudit fail with an error */ argvsuid[2]=NULL; close(2); /* let the process exec'ed have stderr as the *first* fd free */ execve(SUID_NAME, argvsuid, NULL); perror("execve"); exit(1); } else { for (i=0; i<2000000; i++) /* Timing is crucial : tune this to your own system */ ; for (i=4; i<=100; i++) /* free some fd for the suid file to execute normally (ld.so, etc.) */ close(i); sleep(5); for (i=3; i<=rlp->rlim_cur; i++) close(i); exit(0); } } else { /* process table full, let's fork to allocate more fds */ if ((n=fork()) == -1) { perror("fork failed"); exit(1); } } } printf("Number of pipes opened by parent: %d\n",i); sleep(5); for (i=3; i<=rlp->rlim_cur; i++) close(i); fprintf(stderr,"Exiting...\n"); exit(0); } ADDITIONAL INFORMATION The information has been provided by <mailto:[email protected]> FozZy. ========================================] SonicWALL SOHO Content Blocking Script Injection and Logfile DoS" - Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ] Relevant Pages - 2.4.22-pre7: are security issues solved? ... Red Hat has released a new kernel today, that fixes several security issues. ... > executing a setuid program. ... send the line "unsubscribe linux-kernel" in ... (Linux-Kernel) - OpenBSD local DoS and root exploit ... group) can fill the kernel file descriptors table, ... Because of a flaw in the way the kernel checks closed file ... The "root exploit" problem was fixed on the CVS a week ago, ... exec'ing a setuid program can make this program open files under these fds, ... (Bugtraq) - Re: VFS: file-max limit reached when running on a virtual machine ... running on a qemu virtual machine configured with 512 MB of memory. ... > I understand that changes have been made recently to the way the kernel manages ... > file descriptors in order to improve real-time performance. ... (Linux-Kernel) - Re: [PATCH/RFC 2.6.21 3/5] ehca: completion queue: remove use of do_mmap() ... Owner tracking by pid is really dangerous. ... File descriptors can be ... This has a historic reason as we ... have needed to support fork, systemetc for kernel 2.6.9, ... (Linux-Kernel) - Re: Accessing Terminal Information in the Kernel ... > I'm doing some kernel development and I'd like to be able to instrument ... all file descriptors were closed, and it remains now only as the ... to access your controling tty. ... > Does anyone have any pointers as to how to get that information while ... (comp.os.linux)
http://www.derkeiler.com/Mailing-Lists/Securiteam/2002-05/0080.html
crawl-001
en
refinedweb
Go forward in time to October 2004. There is now a wiki for the Boston Gnome Summit! I started filling in the restaurants page from the stuff I remember. I just realised that I know how to get to those places, but I don't know the actual addresses. Hmmm. For Beagle we need to be able to extend all GtkFileChooser objects automatically with the user interface needed to perform search operations. I've been working on a specification of things we need from the file chooser. There are some additional features as well, and these could be useful to implement lock-down in the file chooser and also to implement the extensions that a metadata system would need. If you are interested in global searching, lock-down, metadata, or anything else that would benefit from extending GtkFileChooser, please read this spec and mail your comments to gtk-devel-list: GtkFileChooser Extension Specification, HTML version. I like my C# code indented like this: public class Foo { int bar; public int X { get { return bar; } set { bar = value; } } public Foo () { bar = 5; } public void Bar (int i) { if (i < 0) { bar -= i; Console.WriteLine ("Eeek!"); } else bar += i; } } This is basically Linux kernel style (K&R indentation and brace placement, 8-space tabs) plus the class stuff. Out of the box, csharp-mode screwed up the indentation for the opening brace of a method, and M-C-a and M-C-e didn't work for beginning-of-defun and end-of-defun, respectively. So I put this in my .emacs: (defun fmq-csharp-mode-hook () (camelCase-mode 1) (c-set-offset 'inline-open 0) (setq defun-prompt-regexp "^[ \t]*\\(get\\|set\\)?[ \t]*")) (add-hook 'csharp-mode-hook 'fmq-csharp-mode-hook) It's not perfect, as I haven't really worked with all the features of C#, but it's a start. Lately I've had to do some gnome-session work. I made a bunch of changes to its code to have better diagnostics. People who have to debug gnome-session may find this useful: gnome-session-instrument.diff. Go backward in time to August 2004.Federico Mena-Quintero <[email protected]> Wed 2004/Sep/01 22:37:58 CDT
http://www.gnome.org/~federico/news-2004-09.html
crawl-001
en
refinedweb
Table of Contents The examples in the last few chapters have duplicated quite a bit of tree walking code. Some of them searched for particular information. Others modified documents in memory. What they all had in common was that they navigated a tree from the root to the deepest leaf element in document order. This is an extremely common pattern in DOM programs. The org.w3c.dom.traversal package is a collection of utility interfaces that implement most of the logic needed to traverse a DOM tree. These include NodeIterator, NodeFilter, TreeWalker and DocumentTraversal. DOM implementations are not required to support these interfaces, but many do including Oracle and Xerces. (Crimson does not. GNU JAXP supports NodeIterator but not TreeWalker.) By reusing these classes you can simplify your programs a great deal and save yourself a significant amount of work. The NodeIterator utility interface extracts a subset of the nodes in a DOM document and presents them as a list arranged in document order. In other words, the nodes appear in the order you’d find them in a depth-first, pre-order traversal of the tree. That is, The document node comes first. Parents come before their children. Ancestors come before their descendants. Sibling nodes appear in the same order as their start-tags appear in the text representation of the document. In other words, this is pretty much the order you’d expect by just reading an XML document from beginning to end. As soon as you see the first character of text from a node, that node is counted. You can iterate through this list without concerning yourself with the tree structure of the XML document. For many operations this flatter view is more convenient than the hierarchical tree view. For example, a spell checker can check all text nodes one at a time. An outline program can extract the headings in an XHTML document while ignoring everything else. You can do all this by iterating though a list without having to write recursive methods. Example 12.1 summarizes the NodeIterator interface. The first four getter methods simply tell you how the iterator is choosing from all the available nodes in the document. The nextNode() and previousNode() methods move forwards and backwards in the list and return the requested node. Finally, the detach() method cleans up after the iterator when you’re done with it. It’s analogous to closing a stream. Example 12.1. The NodeIterator interface package org.w3c.dom.traversal; public interface NodeIterator { public Node getRoot(); public int getWhatToShow(); public NodeFilter getFilter(); public boolean getExpandEntityReferences(); public Node nextNode() throws DOMException; public Node previousNode() throws DOMException; public void detach(); } As you see, the NodeIterator interface provides only the most basic methods for an iterator. Each iterator can be thought of as having a cursor which is initially positioned before the first node in the list. The nextNode() method returns the node immediately following the cursor and advances the cursor one space. The previousNode() method returns the node immediately before the cursor and backs the cursor up one space. If the iterator is positioned at the end of the list, nextNode() returns null. If the iterator is positioned at the beginning of the list, previousNode() returns null. For example, given a NodeIterator variable named iterator positioned at the beginning of its list, this code fragment prints the names of all the nodes: Node node; while ((node = iterator.nextNode()) != null) { System.out.println(node.getNodeName()); } Design pattern aficionados will have recognized this as instance of the iterator pattern (as if the name didn’t already give it away). More precisely, it’s a robust, external iterator. Robust means that the iterator still works even if its backing data structure (the Document object) changes underneath it. External means that client code is responsible for moving the iterator from one node to the next, rather than having the iterator move itself. Not all DOM implementations are guaranteed to support the traversal module, though most do. You can check this with hasFeature("traversal", "2.0") in the DOMImplementation class. For example, if (!impl.hasFeature("traversal", "2.0")) { System.err.println( "A DOM implementation that supports traversal is required."); return; } Assuming the implementation does support traversal, the Document implementation class also implements the DocumentTraversal interface. This factory interface, shown in Example 12.2, allows you to create new NodeIterator and TreeWalker objects which traverse the nodes in that document. Example 12.2. The DocumentTraversal factory interface package org.w3c.dom.traversal; public interface DocumentTraversal { public NodeIterator createNodeIterator(Node root, int whatToShow, NodeFilter filter, boolean entityReferenceExpansion) throws DOMException; public TreeWalker createTreeWalker(Node root, int whatToShow, NodeFilter filter, boolean entityReferenceExpansion) throws DOMException; } Thus, to create a NodeIterator you cast the Document object you want to iterate over to DocumentTraversal, and then invoke its createNodeIterator() method. This method takes four arguments: The Node in the document which the iterator starts from. Only this node and its descendants are traversed by the iterator. This means you can easily design iterators that iterate over a subtree of the entire document. For instance, by passing in the root element, you could skip everything in the document’s prolog and epilog. An int bitfield constant specifying the node types the iterator will include. These constants are: NodeFilter.SHOW_ELEMENT = 1 NodeFilter.SHOW_ATTRIBUTE = 2 NodeFilter.SHOW_TEXT = 4 NodeFilter.SHOW_CDATA_SECTION = 8 NodeFilter.SHOW_ENTITY_REFERENCE = 16 NodeFilter.SHOW_ENTITY = 32 NodeFilter.SHOW_PROCESSING_INSTRUCTION = 64 NodeFilter.SHOW_DOCUMENT = 128 NodeFilter.SHOW_DOCUMENT_TYPE = 256 NodeFilter.SHOW_DOCUMENT_FRAGMENT = 512 NodeFilter.SHOW_NOTATION = 1024 NodeFilter.SHOW_ALL = 0xFFFFFFFF These are all powers of two so that they can be combined with the bitwise operators. For example, if you wanted to iterate over text nodes and CDATA section nodes, you would pass NodeFilter.SHOW_TEXT | NodeFilter.SHOW_CDATA_SECTION as whatToShow. A NodeFilter against which all nodes in the subtree will be compared. Only nodes that pass the filter will be let through. By implementing this interface, you can define more specific filters such as “all elements that have xlink:type="simple" attributes” or “all text nodes that contain the word fnord”. You can pass null to indicate no custom filtering. Pass true if you want the iterator to descend through the children of entity reference nodes, false otherwise. Generally, this should be set to true. For example, the last chapter demonstrated a comment reader program that recursively descended an XML tree, printing out all the comment nodes that were found. A NodeIterator makes it possible to write the program non-recursively. When creating the iterator, the root argument is the document node, whatToShow is NodeFilter.SHOW_COMMENT, the node filter is null, and entityReferenceExpansion is true. Example 12.3 demonstrates. Example 12.3. Using a NodeIterator to extract all the comments from a document import javax.xml.parsers.*; import org.w3c.dom.*; import org.w3c.dom.traversal.*; import org.xml.sax.SAXException; import java.io.IOException; public class CommentIterator { public static void main(String[] args) { if (args.length <= 0) { System.out.println("Usage: java DOMCommentReader URL"); return; } String url = args[0]; try { DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); DocumentBuilder parser = factory.newDocumentBuilder(); // Check for the traversal module DOMImplementation impl = parser.getDOMImplementation(); if (!impl.hasFeature("traversal", "2.0")) { System.out.println( "A DOM implementation that supports traversal is required." ); return; } // Read the document Document doc = parser.parse(url); // Create the NodeIterator DocumentTraversal traversable = (DocumentTraversal) doc; NodeIterator iterator = traversable.createNodeIterator( doc, NodeFilter.SHOW_COMMENT, null, true); // Iterate over the comments Node node; while ((node = iterator.nextNode()) != null) { System.out.println(node.getNodeValue()); } } catch (SAXException e) { System.out.println(e); System.out.println(url + " is not well-formed."); } catch (IOException e) { System.out.println( "Due to an IOException, the parser could not check " + url ); } catch (FactoryConfigurationError e) { System.out.println("Could not locate a factory class"); } catch (ParserConfigurationException e) { System.out.println("Could not locate a JAXP parser"); } } // end main } You can decide for yourself whether or not you prefer the explicit recursion and tree-walking of Example 11.20 in the last chapter or the hidden recursion of CommentIterator here. With a decent implementation, there really shouldn’t be any noticeable performance penalty, so feel free to use whichever feels more natural to you. Node iterators are live. That is, if the document changes while the program is walking the tree, the iterator retains its state. For instance, let’s suppose the program is at node C of a node iterator that’s walking through nodes A, B, C, D, and E in that order. If you delete node D, and then call nextNode(), you’ll get node E. If you add node Z in between B and C and then call previousNode(), you’ll get node Z. The iterator’s current position is always between two nodes (or before the first node or after the last node) but never on a node. Thus it is not invalidated by deleting the current node. For example, this method deletes all the comments in its Document argument. When the method returns all the comments have been removed. public static void deleteComments(Document doc) { // Create the NodeIterator DocumentTraversal traversable = (DocumentTraversal) doc; NodeIterator iterator = traversable.createNodeIterator( doc, NodeFilter.SHOW_COMMENT, null, true); // Iterate over the comments Node comment; while ((comment = iterator.nextNode()) != null) { Node parent = comment.getParentNode(); parent.removeChild(comment); } } This method changes the original Document object. It does not change the XML file from which the Document object was created unless you specifically write the changed document back out into the original file after the comments have been deleted. You can combine the various flags for whatToShow with the bitwise or operator. For example, the previous chapter used a rather convoluted recursive getText() method in the ExampleExtractor program to accumulate all the text from both text and CDATA section nodes within an element. Example 12.4 shows how NodeIterator can be used to accomplish this task in a much more straightforward fashion. Example 12.4. Using a NodeIterator to retrieve the complete text content of an element import org.w3c.dom.*; import org.w3c.dom.traversal.*; public class TextExtractor { public static String getText(Node node) { if (node == null) return ""; // Set up the iterator Document doc = node.getOwnerDocument(); DocumentTraversal traversable = (DocumentTraversal) doc; int whatToShow = NodeFilter.SHOW_TEXT | NodeFilter.SHOW_CDATA_SECTION; NodeIterator iterator = traversable.createNodeIterator(node, whatToShow, null, true); // Extract the text StringBuffer result = new StringBuffer(); Node current; while ((current = iterator.nextNode()) != null) { result.append(current.getNodeValue()); } return result.toString(); } } I’ll be reusing this class a little later on. Something like this should definitely be in your toolbox for whenever you need to extract the text content of an element. DOM Level 3 is going to add an almost equivalent getTextContent() method to the Node interface: public String getTextContent() throws DOMException; The only difference is that this method will not operate on Document objects whereas TextExtractor.getText() will.
http://www.cafeconleche.org/books/xmljava/chapters/ch12.html
crawl-001
en
refinedweb
You have to compile the PHP adapter. The instructions are in the src distro but not on the website. There's a reasonable API. <html xmlns=""> <head> <title>Mokka mit Schlag</title> </head> <body> <?php $mgr = new XmlManager(null); $con = $mgr->openContainer("website.dbxml"); $results = $mgr->query(" declare namespace {(); } ?> >
http://www.cafeconleche.org/slides/nyphp/xquery/28.html
crawl-001
en
refinedweb
The rules of English grammar were laid down, written in stone, and encoded in the DNA of grammar school teachers long before computers were invented. Unfortunately, this means that sometimes I have to decide between syntactically correct code and syntactically correct English. When I’m forced to do so, English normally loses. This means that sometimes a punctuation mark appears outside a quotation mark when you’d normally expect it to appear inside, a sentence begins with a lower case letter, or something similarly unsettling occurs. For the most part, I’ve tried to use various typefaces to make the offending phrase less jarring. In particular, Italicized text is used for emphasis, the titles of books and other cited works, words in languages other than English, words used to refer to the words themselves (for example, Booboisie is a very funny word.), the first occurrence of an important term, Java system properties, host names, resolvable URLs. Monospaced text is used for XML and Java source code, namespace URLs, system prompts, and program output Italicized monospaced text is used for pieces of XML and Java source code that should be replaced by some other text Bold text is used for emphasis Bold monospaced text is normally used for literal text the user types at a command line, as well as for emphasis in code. It’s not just English grammar that gets a little squeezed either. The necessities of fitting code onto a printed page rather than a computer screen have occasionally caused me to deviate from the ideal Java coding conventions. The worst problem is line length. I can only fit 65 characters across the page in a line of code. To try and make maximum use of this space, I indent each block by two spaces and indent line continuations by one space, rather than the customary four spaces and two spaces respectively. Even so, I still have to break lines where I’d otherwise prefer not to. For example, I originally wrote this line of code for Chapter 4: result.append(" <Amount>" + amount + "</Amount>\r\n"); However, to fit it on the page I had to split it into two pieces like this: result.append(" <Amount>"); result.append(amount + "</Amount>\r\n"); This case isn’t too bad, but sometimes even this isn’t enough and I have to remove indents from the front of the line that would otherwise be present. For example, this occasionally forces the indentation not to line up as prettily as it otherwise might, as in this example from Chapter 3 wout.write( "xmlns=''\r\n" ); The silver lining to this cloud is that sometimes the extra attention code gets when I’m trying to cut down its size results in better code. For example, in Chapter 4 I found I needed to remove a few characters from this line:.
http://www.cafeconleche.org/books/xmljava/chapters/pr01s04.html
crawl-001
en
refinedweb
Source distribution for Kehei Wiki, one of the oldest wiki implementations. Targeted at commercial environments, provides adjustable enforcement of author rights, WYSIWYG editing, optional blog by page, multi namespaces, templates for everything.. Project Admins: bobr_, rolandr_ Operating System: All POSIX (Linux/BSD/UNIX-like OSes), OS Independent (Written in an interpreted language) License: GNU General Public License (GPL) Category: Message Boards, Site Management Buy expert services from Sourceforge.net Marketplace. Support from the people who know. (No news at the current time)
http://sourceforge.net/projects/kehei-wiki/
crawl-001
en
refinedweb
Slashdot Log In PHP5: Could PHP Soon Be Owned by Sun? At first glance, the obvious changes to PHP are a result of the success of the Java platform and the weaknesses of PHP revealed in comparison. With the release of PHP 5, it's apparent that the developers of PHP and the Zend Engine (essentially a single group) felt compelled to make PHP much more like Java with respect to object-oriented programming. Zend, the Israeli company backing the development of PHP, promises on their web site that "full integration with Java will be closer than ever before." Hmmm, full integration with Java, huh? On November 4th, 2003, Zend reveals the absolute cloning of the Java object model within PHP 5. From throwing exceptions to static variables, PHP 5's object model mimics Java in concept all the way to the syntactical level. This is great for enterprise developers using Sun products, but with the release of PHP 5, what does this mean for the half-million PHP developers worldwide who have depended on PHP for open-source development,? On the positive side, this edition of PHP does bring improved performance and a new suite of MySQL functions. Backward incompatibility is limited to a list of ten issues. Additionally, there are only minor configuration file changes that need to be made to the web server. Several directives have been introduced for configuring php.ini files, mainly dealing with hashes for encryption., developers "there. PHP overview at K5 (Score:4, Informative) PHP also not an ASF project any longer (Score:5, Informative) () Don't know if this is really relevant, but as is noted in the Section 5.G of Feb 2004 ASF Board meeting minutes [apache.org], the PHP project is terminated and rights for PHP will be tranfserred to the PHP group. Fork it (Score:5, Insightful) (Last Journal: Monday February 23 2004, @04:55PM) See that's why Open Source is different than proprietary software. It's not just another choice, it's fundamentally DIFFERENT. Nobody can take the software and force it down a direction you don't like because you and like-minded individuals can take it in the direction you like. Re:Fork it (Score:4, Insightful) Seriously consider the differences between say, Microsoft forking HTML, and GNU forking ANSI C. I know that the Linux kernel can pretty much only be compiled by gcc since the kernel depends on gcc proprietary extensions, yet feel outraged that a company dare to do the same to a (wildly) popular markup language. Educational. (Score:5, Interesting) () This is the beauty of open source. It defies this kind of corporate grab. Not sure I agree (Score:5, Interesting) ( | Last Journal: Saturday February 19 2005, @07:01PM) "There are private and protected members and methods, abstract classes and interfaces, in practice, identical to Java's object model." A ton of languages treat classes like this. This is really pretty standard. The underpinnings of the way PHP handles classes may be like Java, which makes sense because Java does it pretty well, but as far as the developer is concerned, it's just like a host of other languages. "companies whose coffers are already overflowing" Sun's coffers are not exactly overflowing "Java became successful for a reason: it's intelligently designed and facilitates code reuse." exactly. why shouldn't php do the same? "Instead of passing the actual object itself, PHP's object model passes by reference" This has been deprecated for some time - most PHP developers knew this was coming and had php.ini configured to do this by default already. This has nothing to do with my point, but is an interesting side note. "if PHP is a developer's primary language and he or she hasn't been introduced to the world of static variables, public and private methods" oh come on. This is CS 101 stuff...how many serious PHP developers could there be who don't know that stuff? not quite. (Score:5, Insightful) As for your final comments--all too many PHP developers don't know "CS 101 stuff", serious or no. Also, I know that when I first learned about the OO methodology, it was quite confusing. Now that I know more about it, I'm convinced that there's a lot there to be avoided, and all of it should be carefully considered. Fortunately, (like the crippled "object system" in PHP 4) if you don't want to use it, you still don't have to use it. PHP and MySQL? (Score:4, Interesting) () Maybe you don't realize this, but PHP supports quite a range of database products. The fact that it seemed to favor MySQL over the rest didn't really help anything; it just made more people use a product they wouldn't necessarily have chosen on its own merits alone, and directed more programming/bug-fixing toward that one product. Postgresql or Firebird, SAP or Oracle And as to MySQL, remember it's not as free as the rest. Like Qt and MySQL (Trolltech and MySQL AB) are both using dual-licensing to make their products "free" for some use, but not for others. MySQL's client libraries are GPL rather than LGPL, which makes using them for corporate projects less Re:PHP and MySQL? (Score:4, Informative) () This is complete FUD. It doesn't matter that PHP uses the GPL'd MySQL client library. Code running under the PHP interpreter is not affected by the GPL. Additionally, GPL incompatible applications can use the GPL'd MySQL client. They simply cannot statically link with it or distribute the client library. The user of the application would have to provide the library. Dynamically linking to a library does not cause any (copyrighted) code to be copied into the application. You have never needed a license to use a shared library. Zend vs Rasmus (Score:4, Interesting) ( | Last Journal: Wednesday February 11 2004, @12:21PM) The PHP group is 9 guys across the globe. Zend is a strong force and helpful. I like the syntax changes that make PHP more like Java, but I don't want to see any company own PHP. Luckily, it's not gonna happen. -Jackson [jaxn.org] Yeah, Right! (Score:2, Funny) Besides, you missed the real threat: Given the similarity between PHP 5 & C# object models, it's obvious the evil empire is trying to take over PHP (or maybe Sun is trying to control C# as well). Evil Plot? (Score:4, Interesting)? A - Which of these companies have overflowing coffers? B - It's open source. If someone wants to contribute then they can contribute. If someone wants to profit then they can attempt to profit. I don't see why a company that contributes shouldn't have the opportunity to profit somehow. C - Nothing says that PHP can't be forked back towards the little web scripting engine that was once PHP and PHP/FI before that. Too many futures (Score:4, Interesting) It's nice to know where the OO model comes from, gives it more credence Is talking about Sun, Macromedia and MySQL horning in on the action is like chicken little proclaiming the sky is falling Food for thought p.s. I work for a company that produces commercial tools for PHP development PHP5 from Java? (Score:2, Funny) That and a dash of paranoia. Growing a Language (Score:5, Insightful) I like the approach Python has taken. Everything is kept clean and simple, and the complexity is added through importing modules. Need another function? Import it! I guess that's why Python is said to "fit in your head". I'd better stop before I start a flame-war. The point I wanted to make is PHP and Java will both probably collapse under their own weight, and another simpler language will take their place. If the plan is the grow PHP into Java, then there will be tonnes of books needed to reference everything, which is good if you want to sell books, but bad if you want to write programs without having to constantly look something up. It seems to me that a programming language needs to plan for growth before it starts, otherwise it grows and gobbles up the mental resources of the programmers using it. Once it's too big, people will just fall back on simpler tools. cruft (Score:5, Interesting) () now don't get me wrong, i'm not bashing php. i use php all the time and it is a pretty straightforward tool and quite easy to pick up. the inevitable problem with trying to reform a language is that you need to "break" it in order to fix it Re:cruft (Score:5, Interesting) () Re:cruft (Score:4, Insightful) In the movie "City Slickers" Jack Palance's character quips that the secret to life is just one thing, and once you know what that one thing is, everything else makes sense. I'm beginning to think that programming languages are the same way. The "one thing" about Visual Basic was introducing components. Perl's one best thing is powerful reporting capabilities. Python's contribution is namespace (just type 'import this' into the interpreter for an easter egg's explanation). PHP's "one great thing" seems to be initial ease of use. It's dead simple to install, the php website's documentation is second-to-none, and it's relatively painless to cut-and-paste code inside HTML to make stuff work. My problem, however, is the same complaint I have with the Windows operating system: PHP is impossible to master, because it's becoming too broad with too many functions and too many special cases. According to [tnx.nl] there are 3079 core functions in PHP4 (as of november 2003), compared to 206 in perl. 3079? That's just seems insane to me. duh (Score:5, Insightful) ( | Last Journal: Wednesday January 21 2004, @08:36PM) Go FUD yourself (Score:5, Insightful) ( | Last Journal: Wednesday November 24 2004, @02:50AM) So, Zend was good, and SUN & Co are bad now? (Score:2) () As far as I understand from your review, PHP development was directed not by a non-profit (think Apache Foundation), but by a business (think MySQL and Zope) for a while now, and this was OK from your POV until some bigger businesses offered investment in Zend. Can you reasonably justify (at least to yourself) why Zend was OK and "Sun, MySQL, Borland and Macromedia" are bad-bad-bad corporations? Especially since MySQL could not be MUCH bigger, right? If there were a Microsoft connection, I might don on my tinfoil hat (not just because they are BIG, but because of their monopolistic practices). Paul B. Corporate Shill Indeed... (Score:1) () It seems to me that the situation he's describing here is much like RedHat 'shilling' Linux for profit. Now, of course, I recognize that Linus et al aren't part of RedHat, but the end effect is the same, really, just further down the timeline. PHP is at the state right now where Linux was before people started forking off various distros. I'm not particularly concerned that PHP will become 'commercialized' any more than I am that Perl is 'commercialized' by ActiveState. The language and the community is more than the sum of a few key people, or even companies involved. The community around it is the main strength, and it's that ubiquitiousness that's the core of PHP, not the language itself. No Such Evidence (Score:3, Insightful) ( | Last Journal: Saturday March 15 2003, @01:22PM) For years I have been asking for concrete examples of OO producing code reuse in the business domain, but have yet to see a convincing example. OO does NOT have objectively demonstratable magic properties (except in a few narrow conditions that I don't encounter very often). Some people pick OO because they personally like it, NOT because it is objectively better. Enough with the OO hype. Macromedia? (Score:1) ColdFusion, is a product of Macromedia. Is that the deal hiring advisors from Macromedia, or advisor itself is Macromedia? Amazing similarities (Score:5, Funny) does OSS help corporations or individuals most? (Score:1) (Last Journal: Thursday November 23 2006, @02:30PM) Especially those on the wrong side of the tracks, or the border lines, affected by the "digital divide". I tried installing Linux for internet access on an old P5, just the way it was, without changing any hardware. Winmodems are what the poor have. They don't work on Linux. Ethernet is what corporations have. It works. One more clone? (Score:1) Re:PHP needs to be re-implemented under GPL or BSD (Score:5, Informative) And the PHP license you are quoting is old. Look at. I hope you trust urls to php.net Andi Gutmans
http://developers.slashdot.org/developers/04/08/05/1915255.shtml
crawl-001
en
refinedweb
In the comments on the entry on spring effects under third-party LAFs, Chris has asked if it would be possible to make this functionality available under the platform's system look and feel. My first response mentioned one possible way to do this - download the sources for JDK, create a custom Ant build script to inject this functionality into core LAFs (such as Windows or Ocean), take the resulting jar and use the boot classpath switch to have JVM load this jar before the classes in rt.jar. Now, this approach has a few disadvantages: One big advantage of this approach is that the existing application code (call to UIManager.setLookAndFeel) doesn't need to be changed, since the class name of the main LAF class remains the same. UIManager.setLookAndFeel Well, it so happens that the above approach is not the only way to tackle the request (and no, it's not an April Fools joke). The new laf-widget-windows subproject provides another way to inject widgets, transition layout and image ghosting effects into the core look and feels. First, here are two screenshots of a sample application under a widgetized Windows look and feel, one under Windows Vista and another under Windows XP. Note the menu search widget, tab overview widget, password strength checker widget and lock widget on uneditable text components: Here are two Flash movies showing the widgets and the transition layout in action (under Windows Vista and Windows XP): Here are two Flash movies showing the ghost effects (rollover icon ghosting and button press ghosting) under Windows Vista and Windows XP: Here is the code for the only class in this project: package org.jvnet.lafwidget.windows; public class WindowsLookAndFeel extends com.sun.java.swing.plaf.windows.WindowsLookAndFeel { } All the rest is taken care of by the custom Ant tasks. This way, all the disadvantages of the first approach are addressed - the code is not tied to a particular implementation of the core LAF, the binaries size is kept to the minimum, and you don't need to change the boot classpath. On the other hand, you now have to use the org.jvnet.lafwidget.windows.WindowsLookAndFeel class as the parameter to pass to UIManager.setLookAndFeel. org.jvnet.lafwidget.windows.WindowsLookAndFeel Feel free to download the binaries and leave comments.. What is it with people on Swing forums? Need help with Swings, help required in Swings, i am new to Swings... Searching for the "new to swings" on Google produces 14 results. Searching for the "new to delphis" produces zero. "New to cocoas" - zero. "New to MFCS" produces this, but apparently that's how it's spelled. Even "new to javas" produces this which is just a part of "new to javas cript". Sighs.... So, i'm reading a book and in one of the first chapters the authors try to put some reasoning behind an awkward API: This process means that the last transformation command called in your program is actually the first one applied [...]. Thus, one way of looking at it is to say that you have to specify the matrices in the reverse order. Like many other things, however, once you've gotten used to thinking about this correctly, backward will seem like forward. Here, instead of acknowledging that the API implementation actually dictates the API usage, the authors try to blame the API users for being too dumb to grasp its beauty. It's not API, stupid, it's you not thinking about this correctly :) (all the screenshots and the Excel 2007 spreadsheet are available right here):. This is the third part in series about ghosting image (aka spring) effects on Swing buttons. Since then (last November) the implementation has been improved to provide the following: JButton JToggleButton): main() Ant. augment-*.bat update(). The first Desktop Matters is officially over (although there still may be a few people still talking in the conference room as we speak...) First of all, many thanks and congratulations to Ben and Dion for organizing this (and making it take place 10 minutes away from where i live). In addition, it was great finally seeing all the real people behind the java.net (and jroller) blogs (sometimes you get a weird feeling that perhaps some of them are not real, but maybe it's just me :) Thanks for everybody who came to chat, inquire about Substance and other projects and for listening to my presentation. The slides are available in the following formats: Note that i didn't have enough time for all the slides, so even you listened to me live, there are additional 8-9 slides that go deeper into the implementation of the ghosting effects outside the button borders. And now that it's over, finally some time for a little entertainment....
http://weblogs.java.net/blog/kirillcool/archive/2007/03/index.html
crawl-001
en
refinedweb
The QIMEvent class provides parameters for input method events. More... #include <qevent.h> Inherits QEvent. List of all member functions. cancelled). See also Event Classes. Constructs a new QIMEvent with the accept flag set to FALSE. type can be one of QEvent::IMStartEvent, QEvent::IMComposeEvent or QEvent::IMEndEvent. text contains the current compostion string and cursorPosition the current position of the cursor inside text. Sets the accept flag of the input method event object. Setting the accept parameter indicates that the receiver of the event processed the input method event. The accept flag is not set by default. See also ignore(). Returns the current cursor position inside the composition string. Will return 0 for IMStartEvent and IMEndEvent. Clears the accept flag parameter of the input method event object. Clearing the accept parameter indicates that the event receiver does not want the input method event. The accept flag is cleared by default. See also accept().. This file is part of the Qt toolkit. Copyright © 1995-2003 Trolltech. All Rights Reserved.
http://doc.trolltech.com/3.1/qimevent.html
crawl-001
en
refinedweb
D (The Programming Language)/d2/Intro to Functions Lesson 3: Intro to Functions[edit] In this lesson, you see more of functions, which were used back in Lesson 1. If you are already familiar with another C-like language, you only need to skim this over. Introductory Code[edit] import std.stdio; int watch_tv(int first_watched, int then_watched, string channel = "The PHBOS Channel") { writefln("Finished watching %s.", channel); return first_watched + then_watched; } int commercials(int minutes) { writefln("Watching %s minutes of commercials.", minutes); return minutes; } int cartoons(int minutes) { writefln("Watching %s minutes of cartoons.", minutes); return minutes; } void main() { auto minutesoftv = watch_tv(commercials(10), cartoons(30)); writeln(minutesoftv, " minutes of TV watched!"); } /* Output: Watching 10 minutes of commercials. Watching 30 minutes of cartoons. Finished watching The PHBOS Channel. 40 minutes of TV watched! */ Concepts[edit] Functions[edit] Functions allow you to write more organized code. With functions, you can write some code once, and then call it whenever you need to use that code. Function Syntax[edit] Let's take a look at the syntax: return_type name_of_function(arg1type arg1, arg2type arg2) { // function body code here return something; }
https://en.wikibooks.org/wiki/D_(The_Programming_Language)/d2/Intro_to_Functions
CC-MAIN-2017-39
en
refinedweb
baked 0.2.1 Import order detection guidelines. Example:: [baked] zamboni $ p ~/sandboxes/baked/baked.py lib/video/ffmpeg.py -p lib/video/ffmpeg.py:9: order wrong for check_output, subprocess, VideoBase --- /Users/andy/sandboxes/zamboni/lib/video/ffmpeg.py 2014-05-23 16:11:56.000000000 -0700 +++ /var/folders/15/3crpnr7j4sj75xynpsqkqbr00000gp/T/tmpXvc_Ml.py 2014-05-23 16:12:11.000000000 -0700 @@ -1,14 +1,14 @@ import logging +import logging import re import tempfile from django.conf import settings +from django_statsd.clients import statsd from tower import ugettext as _ -from django_statsd.clients import statsd from .utils import check_output, subprocess, VideoBase -import logging Notice that it detected that `logging` should be up at the top and `django_statsd` with the 3rd party imports. Usage:: baked.py [filename] [filename..] Filename can be a glob. Or multiple filenames. For example:: baked.py apps/*.py mkt/*.py Baked will also accept files being piped to it, for example:: git diff-index HEAD^ --name-only | baked Baked loads a confg file as JSON. It will look in the following places for the file: * in the current and parent directories of the file being checked for ``.baked`` * the current directory for ``.baked`` * the users profile directory for ``.baked`` For an example see: The config file contains: * *order*: the list of orders of import ``blocks``. This allows you to group your imports into categories. * *fallback*: if a category is not found for lib, what should it fall back to, for most this will be ``local``. * *from_order*: a dictionary of sections with a boolean value for each section. If the value is false, then baked will not care that an ``import`` came before ``from``. Default is true for each category. * *modules*: a dictionary of categories and a list of modules. This allows baked to put each module in the category. If you'd like to exclude an import from baked add the comment ``#NOQA``. Guidelines: With one exception, we ignore that imports should be ordered ``CONSTANT``, ``Class``, ``var``. Just sort by alpha, case insensitive. That's easier for everyone to parse. Config params: * ``-i`` change the file in place, but note that it doesn't fix the order of imports on the same line, for example: ``from foo import XX, bar`` is raised as a warning, but the order of ``XX`` and ``bar`` is not fixed. * ``-p``: print the diff that baked has calculated Changes ------- 0.2.1: lower case import names, so ``import StringIO`` comes after ``import os`` for example 0.2: Is a backwards incompatible change, it focuses on generating diffs which is a lot easier to read than some rules. For imports statements on one line which are out of order, it still prints the import order and doesn't try to fix it up. - Author: Andy McKay - License: BSD - Categories - Package Index Owner: andymckay - DOAP record: baked-0.2.1.xml
https://pypi.python.org/pypi/baked/0.2.1
CC-MAIN-2017-39
en
refinedweb
There are several secrets (for example passwords) that sahara uses with respect to deployed frameworks which are currently stored in its database. This blueprint proposes the usage of the castellan package key manager interface for offloading secret storage to the OpenStack Key management service. There are several situations under which sahara stores usernames and passwords to its database. The storage of these credentials represents a security risk for any installation that exposes routes to the controller’s database. To reduce the risk of a breach in user credentials, sahara should move towards using an external key manager to control the storage of user passwords. This specification proposes the integration of the castellan package into sahara. Castellan is a package that provides a single point of entry to the OpenStack Key management service. It also provides a pluggable key manager interface allowing for differing implementations of that service, including implementations that use hardware security modules (HSMs) and devices which support the key management interoperability protocol (KMIP). Using the pluggable interface, a sahara specific key manager will be implemented that will continue to allow storage of secrets in the database. This plugin will be the default key manager to maintain backward compatibility, furthermore it will not require any database modification or migration. For users wishing to take advantage of an external key manager, documentation will be provided on how to enable the barbican key manager plugin for castellan. Enabling the barbican plugin requires a few modifications to the sahara configuration file. In this manner, users will be able to customize the usage of the external key manager to their deployments. Example default configuration: [key_manager] api_class = sahara.utils.key_manager.sahara_key_manager.SaharaKeyManager Example barbican configuration: [key_manager] api_class = castellan.key_manager.barbican_key_manager.BarbicanKeyManager To accomodate the specific needs of sahara, a new class will be created for interacting with castellan; SaharaKeyManager. This class will be based on the abstract base class KeyManager defined in the castellan package. The SaharaKeyManager class will implement a thin layer around the storage of secrets without an external key manager. This class will allow sahara to continue operation as it exists for the Kilo release and thus maintain backward compatibility. This class will be the default plugin implementation to castellan. Example usage: from castellan import key_manager as km from castellan.key_manager.objects import passphrase keymanager = km.API() # create secret new_secret = passphrase.Passphrase('password_text_here') # store secret new_secret_id = keymanager.store_key(context, new_secret) # retrieve secret retrieved_secret = keymanager.get_key(context, new_secret_id) secret_cleartext = retrieved_secret.get_encoded() # revoke secret keymanager.delete_key(context, new_secret_id) This solution will provide the capability, through the barbican plugin, to offload the secrets in such a manner that an attacker would need to penetrate the database and learn the sahara admin credentials to gain access to the stored passwords. In essence we are adding one more block in the path of a would-be attacker. This specification focuses on passwords that are currently stored in the sahara database. The following is a list of the passwords that will be moved to the key manager for this specification: One possible alternative to using an external key manager would be for sahara to encrypt passwords and store them in swift. This would satisfy the goal of removing passwords from the sahara database while providing a level of security from credential theft. The downside to this methodology is that it places sahara in the position of arbitrating security transactions. Namely, the use of cryptography in the creation and retrieval of the stored password data. A new configuration option will be provided by the castellan package to set the key manager implementation. This will be the SaharaKeyManager by default. Deployers wishing to use barbican might need to set a few more options depending on their installation. These options will be discussed in the documentation. Use of an external key manager will depend on having barbican installed in the stack where it will be used. Developers adding new stored passwords to sahara should always be using the key manager interface. Castellan package, available through pypi. Currently this version (0.1.0) does not have a barbican implementation, but it is under review[1]. Unit tests will be created to exercise the SaharaKeyManager class. There will also be unit tests for the integrated implementation. Ideally, functional integration tests will be created to ensure the proper storage and retrieval of secrets. The addition of these tests represents a larger change to the testing infrastructure as barbican will need to be added. Depending on the impact of changing the testing deployment these might best be addressed in a separate change. A new section in the advanced configuration guide will be created to describe the usage of this new feature. Additionally this feature should be described in the OpenStack Security Guide. This will require a separate change request to the documentation project. [1]: castellan repository note, the castellan documentation is still a work in progress barbican documentation barbican wiki Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.
http://specs.openstack.org/openstack/sahara-specs/specs/mitaka/improved-secret-storage.html
CC-MAIN-2017-39
en
refinedweb
This Thanks a lot most comprehensive article I have seen to date Rhoderick , I got quick question from my understanding in hybrid where the on premises is 2010 and the hybrid servers are 2013 the SCP record needs to point to the most updated version of exchange and that is Exchange 2013 correct? Thanks in advance big time fan That would be correct. For a single Autodsicover namespace, that should point to the latest version of Exchange. Cheers, Rhoderick thanks externally I knew it needs to be the hybrid server ofcourse but internally there aren’t any documentation for this… I know theoretically 2010 should be able to answer these requests for internal clients but wasn’t sure what’s the best practice. Thanks Apt and perfect article…. Ran into an issue where this Outlook 2010 SP2 client, build 14.0.7113.5000, was throwing up unexpected Rhoderick, thanks for laying out the process clearly. It’s a great resource to point people to when explaining how things need to be set up. I have an environment I’m working on that has an issue with delays. Internal workstations can configure a profile quickly, but external workstations take about 6 minutes to complete a profile configuration or to run test-email autoconfig. When I use ExRCA, it takes about 63 seconds. A good 40 seconds are waiting for the query to "domain.com/autodiscover/autodiscover.xml" to time out before querying the proper "autodiscover.domain.com" record. My "test email autoconfig" process looks a lot like yours, but has a full page of additional attempts to "domain.com/autodiscover". Do you see a significantly different result when you run your tests from a non-domain-joined system external to the LAN? Hi Dave, To what/where does your domain.com DNS resolve to? Is it a website at a hosting provider, a SharePoint site or something like that? Cheers, Rhoderick Best thing I like about your blogs is the detailed description. This is simply great. Thanks, I now will simply direct my guys to this article when they have an issue with Autodiscover. Hi Rhoderick, I am aware that there is now a feature when using set-hybridconfiguration a single domain name can be nominated for all autodiscovery lookups in an hybrid infrastructure, therefore no need for additional DNS records and expensive cert. However I fail to see the value in this? Wont on-premise users already require autodsiscover records for primary email addresses and these will already be stamped on a public certificate. So where is the savings with this autodiscovery feature? Regards T For an application developer or script writer using the EWS Managed API 2.0, would it be safe to forego some of the discovery and preset the URL to? In testing, there’s a remarkable difference in duration. The work to discover the enpoint involves a lot of timing out due to bad assumptions (like domain.com from a user’s email addres [email protected]). The concern is how durable is "autodiscover-s.outlook.com"? What is the difference between "autodiscover.outlook.com" and "autodiscover-s.outlook.com"? Why does the resolved url have the "-s" in the name? Regards, Eriq I have noticed autodiscover process slow dramatically after enabling modern authentication for Office 2013 for MFA. But strangely it affect only VPN connections – it may take up to 5 mins for Outlook to start It would be fantastic if you could include in this article how a non-domain joined outlook client is processed and how/when/where authentication to AutoD is achieved. Thumping good read Well done! I get an Autodiscover URL redirection from to on our SBS 2011 server. Is this the reason it won’t connect externally? Is there a way to prevent the redirect? More than likely. I don’t do SBS, but you should be able to set this up using the SRV record option. Using the regular autodiscover.contoso.com may be possible — would be best to look at the SBS TechNet forums for that. Cheers, Rhoderick Awesome Article Rhoderick! Thanks, very good article! But how to configure autodiscover if we have exchange hybrid and also migrating data from Zimbra or Google Mail? These AD users don’t have attributes like targetaddress, exchangeguid, legacyexchangedn and so on… Thanks in advance You need to have those attributes in Hybrid Tom. Do you have Exchange deployed on-premises? If not, then that is not Hybrid. Cheers, Rhoderick Hi Rhoderick, yes the attributes are available but still empty for users are migrated from Google Apps to O365. I think I have to Enable-RemoteMailbox for each user, set the msExchRemoteRecipientType “4” and the targetaddress for routing and autodiscover. Thank you! Hi Tom, So in this case the users were migrated straight to 365? I assume that you do have Exchange deployed on-prem. is that the case? Cheers, Rhoderick Hi Rhoderick, I’m migrating from Exchange 2010 to Exchange 2013 running Server 2012 R2. I thought I had everything migrated over to Exchange 2013. As I test, I turned off the Exchange 2010 server and wanted to see what is broken before I uninstall it for good. When the Exchange 2010 server is off, all my Outlook 2007 clients receive popup message asking for the credentials. I made sure the Outlook clients have SP3 and the November cumulative update. When I attempt to enter the credentials it doesn’t work. When I perform a Test Auto Email Configuration in Outlook, I get the following errors. FAILED (0x800C8203), httpStatus=401, FAILED (0x80040413), and FAILED (0x8004010F). I tried created split DNS on my local DNS server to resolve the domain name internally, however that didn’t fix the problem. I also tried creating a local SRV record for _autodiscover but that didn’t work either. I was going to uninstall the CAS server role on Exchange 2010 to see if that fixes it, but wasn’t sure if that would break something else. Once I turn the Exchange 2010 server back on, everything is working again. I really appreciate you taking the time to read this and any advice you can give me to resolve my problem. Thanks, Hi Marc, You have a single Autodiscover namespace internally I assume? The SCP objects were updated, and all point to the Exchange 2013 servers? Cheers, Rhoderick Hi Rhoderick , I got quick question which could be silly or not very relevant. If I have cloud only user in the same tenant with e-mail address matching to that of on prem SMTP address. How does autodiscover works in such scenario ? Thanks, Ravu excellent article. thank you for your time in writing this. I hope you can give me an idea about a situation i have encountered. I manage a hybrid configuration that i did not setup, but i inherited. We have 7 domains, a.com ( a.com is the primary domain) ,b.com, etc. and a.net . I have an issues that i can’t seem to put my finger on it. Sometimes, even joined domains machines give a certificate warning connecting to autodiscover.a.net, but a.net is not the autod domain. i have run the HCW to confirm that autodiscover is only for the autod domain. I have checked the on-prem configs, i have checked the DNS entries i do not find anything related to autodiscover.a.net . SCP entries are correct i doubled checked them. I do not find any reason why DOMAIN joined domains are trying to access autodiscover.a.net. THis issue is fixed by itself. It appears at random times, sometimes multiple times a day, sometimes not at all. we also have a SRV record for a.com domain. Can you give me some pointers on what else to check ? Thank you for your time. Thanks for the very informative article. We have a hybrid enviornment & have recently migrated all users over to Exchange Online, so are now looking to create new users straight into O365 to save having to create an on-prem mailbox & migrate it. We are creating new users, setting the email address fields appropriately, letting them sync via AADC, then adding an O365 licence to the user once synced. This works great in that the user then has a mailbox created in Exchaneg Online which we can then login to via OWA. The issue is Outlook fails to connect as Autodiscover fails. So, if we force our account creation scripts to add the TargetAddress to be the ourdomain.mail.onmicrosoft.com, should that then mean that Autodiscover starts to work? Have you looked at enable-remotemailbox cmdlets ? Cheers, Rhoderick Nailed it, impressive. I am going to use the way you built that table explaining logs vs. comments in my next posts 🙂 Glad you found it useful 🙂 Cheers, Rhoderick Hi Rhoderick, This is a great article. (very clear and easy to follow) . Do you know if there is a similar article for an environment that is just Office 365? (We have an issue that I suspect is firewall related, and I’m trying to figure out what URLs we should meet along the way. If we can’t access one of the URLs that would explain why auto-discover is failing internally but not externally.) Thanks Hi Karen, If there are no Exchange servers on-premises, then this article should apply but ignore the SCP bit since you do not have that If you have split DNS, check that the relevant records were also created in the internal zone. Cheers, Rhoderick Hey nice post. I hope it’s alright that I shared it on my Facebook, if not, no problem just let me know and I’ll remove it. Regardless keep up the good work. Linking and sharing is awesome!. Sharing with a preamble and the content intro is also totally fine. Please do not copy and paste the entire article though. I will ask for that to be changed. Cheers, Rhoderick Thank you for the article Rhoderick. There is one thing that bugs me regarding the HTTP redirect method in multi-tenant scenarios: in my multi-tenant environment, when the HTTP redirect occurs, clients are prompted with a certificate warning. I know I can suppress it, that’s not the issue. However, when a similar HTTP redirect occurs to Office 365, no warning is displayed, it just happens. How is a multi-tenant HTTP redirect infrastructure configured by me different from that of Office 365? Why is it that O365-hosted mailboxes don’t generate a cert warning when autodiscover is HTTP-redirected? Thank you. Hi Zoltan, Are you asking how to suppress the AutoD prompt on the user’s Outlook client? Cheers, Rhoderick Hi Rhoderick, Thanks for the prompt reply. Correct. I know I can suppress it with a Reg hack as per. Just wondering how it is done for O365 that Outlook trusts it out of the box and doesn’t prompt. I want my clients, inclusive mobile, to connect to their tenant mailbox without being prompted, just like they would to an O365 EOL mailbox. Is it hard-coded into Outlook to trust outlook.com FQDNs? Thanks, Zoltan Found half the answer. After installing Office and running Outlook for the first time, Outlook creates the autodiscover.hotmail.com and autodiscover-s.outlook.com Registry values in the RedirectServers key. I still don’t know how mobile devices get around the redirect warning. Yes – that’s correct Zoltan, those entries are written in to suppress the redirect. For the mobile clients, that is up to the device how it will deal with the prompt. Cheers, Rhoderick Hi Rhoderick,, Excellent article. I hope you can give me an idea about a situation i have encountered. We have a hybrid configuration. We have 7 domains, a.com ( a.com is the primary domain) ,b.com, etc. and a.net . I have an issues that i can’t seem to put my finger on it. Sometimes, even joined domains machines give a certificate warning connecting to “autodiscover.a.net” instead of the “autodiscover.a.com”, but a.net is not the autod domain. i have run the HCW to confirm that autodiscover is only for the autod domain “a.com”. I have checked the on-prem configs, i have checked the DNS entries i did not find anything related to autodiscover.a.net . SCP entries are correct i doubled checked them. I do not find any reason why outlook from a DOMAIN joined computer is trying to access autodiscover.a.net. This issue is fixed by itself. It appears at random times, sometimes multiple times a day, sometimes not at all. we also have a SRV record for a.com domain. At the time of this writing, there is one computer that exhibits this behavior every single day. Can you give me some pointers on what else i can check to see where this is coming from ? Thank you for your time. Hi Mihai, What version of Outlook is this please? Do you see differences between different Outlook versions and/or builds? Cheers, Rhoderick Hi. This issue happens on outlook 2013/2016 . But the current issue is on outlook 2016. I haven’t notice any difference on outlook builds, but i will check that as well. Very well explained
https://blogs.technet.microsoft.com/rmilne/2015/04/29/office-365-autodiscover-lookup-process/
CC-MAIN-2017-39
en
refinedweb
Super Smash Bros. Brawl Toon Link by Vamper62 Version: 1.8 | Updated: 08/07/08 | Search Guide | Bookmark Guide ------------------------------------------------------------------------------- TTTTTTTTTTTTT L I K K TT OOOOO 00000 N NN L N NN K K TT 0 0 0 0 NN N L I NN N K K TT 0 0 0 0 N N L I N N KKK TT 0 0 0 0 N N L I N N K K TT 00000 00000 N N LLLLLL I N N K K ------------------------------------------------------------------------------- Super Smash Bros. Brawl Character Guide By Vamper62 [email protected] Version 1.8 Version History: 1.0- March 23, 2008 - Complete guide layout and info filled in. Rejected. 1.1- March 24, 2008 - Added more to the guide and made some edits, Rejected again. 1.2- March 25, 2008 - MAJOR grammer and spelling fixes as well as more edits. Rejected again. 1.3- March 26, 2008 - Added character matchup guide section as well as Pros and Cons section. Started Character matchups Rejected yet again. 1.4- March 27, 2008 - Completed Character Matchup section. Accepted! 1.5- April 2, 2008 - More Q&A added as well as weapon descritions in the Weapon Items section. Ness/Lucas section edit as well as link vs. toon link section. Bomb jump jumping added to Exclusive Tech. Some minor edits here and there as well. 1.6- April 9, 2008 - Some minor fixes and more added to the Midair Hookshot and Hero's Bow sections. Snake's Matchup guide gained a very large edit. 1.7- April 23, 2008 - King Dedede, Pikachu, and Lucario character matchup edits, as well as spiking caution fixes for the Blade Drop (dair). Boomerang gets more credit than bow, yet again (I'm pretty sure I said the Boomerang was better than the Arrows in my past versions...) 1.8- August 7, 2008 - The biggest update. Fan Throwing Combo added, Bomb invincibility added to Bomb Clouding, edge guard breaks added, and Countering a Counter Character specific strategies added, hope you like it people. ----------------- |Table of Contents| ----------------- I. Introduction II. Background III. Pros and Cons IV. Standard Attacks V. Special Attacks VI. Smash Attacks VII. Aerial Attacks VIII. Throws IX. Final Smash X. Toon Link Exclusive Techniques XI. Advanced Techniques XII. Weapon Items XIII. Strategies and Tips XIV. Character Match Up Guide -Counter the Counter Strategies. XV. Q&A XVI. Special Thanks XVII. Legal Stuff ***If you wish to skip to a certain section, hold ctrl+F to pull up a search bar, type in the desired section's number and there you go!*** -------------------- | I. Introduction | -------------------- ***How this Guide Works*** This Guide is explained using the Gamecube Controller and Classic. Nunchuk controls (buttons) are not explained but all strategies can be used on any controller. Hello, by the looks of what your doing right now, it looks like you want to learn how to play Toon Link. Well I'm happy that I can help. Toon Link is a fairly simple character to play, but there is still a lot of things that you should put into mind when playing this character. Toon Link is a fairly rounded character being fast, strong, and versatile in both a projectile game as well as a physical game. He is placed in the lighter group of characters, but that doesn't mean that he's easier to K.O. In fact, Toon Link has some incredible recovery options, and falling speed if you use him right. This guide covers all the basics, every move at his disposal, how much damage potential he has in his attacks, even how much damage he does holding a weapon based item like a beam sword. Below is how this guide is laid out for move guides. ------------------------------------ Name of attack and button controls ------------------------------------ ***At a first look***: <-- this will tell you what this attack looks like, and how it is performed. ***Type of attack***: <-- is it physical, special, or a projectile move. ***Damage***: x% <-- this will tell you how much damage it does, as well as total damage from each part of the attack. If it is a multiple hit potential attack it will describe what each part of the attack does. ***Move Strategy***: <-- This will describe the attack in more depth, based on its start up time, attack speed, reach, direction, K.O. potential, usefulness, and how and when you should use this move. It will basically tell you if this move is good or crap. --------------------- Unlocking Toon Link --------------------- To unlock Toon Link, you must either complete the Sub Space Emissary, then return to the Forest stage and enter the first door that is above the ground. If you find the correct door there should be a small cut scene of Toon Link. You must then defeat him. The other way is to have the SSE cleared and finish Classic mode with Link and beat him. The final way is to play 400 VS. matches then defeat him. ------------------------------------------------------------------------------- ----------------------------------- | II. Background and Pros and Cons | ----------------------------------- ------------ Background ------------ Toon Link is originally from, The Legend of Zelda: The Wind Waker, and can only be sourced to this game and Phantom Hourglass for the DS. The reason is that one of his taunts has the Wind Waker in it, making games with similar art to those games, such as the Minish Cap, and Four Swords, not where the character as a whole comes from. This boy was born on Outset Island in the Great Sea. When it was his 12 birthday, the tradition was to have boys who reached this age to wear the Tunic of the Legendary Hero of Time. Strangely on that same day his sister was captured by a large bird called the Helmeroc King, mistaking her for a pirate by the name of Tetra. Link, in despair, heads off with the mysterious pirates in order to save her sister at the Forsaken Fortress, Link takes a sword from Orca, the village swordsman, and a shield that was the family emblem in his home. The story goes on and eventually he gets the master sword and is then set off to defeat Ganondorf, and save Zelda and the Great Sea. The end of this game is by far the most epic of all the Zelda games combined, (sword in Ganondorfs head anyone?). Toon Link was then put in a spin-off game called the Phantom Hourglass. Since the Windwaker, the artwork for Toon Link was put into many games in the series and has been used to this day, except for in the Twilight Princess. ------------------------------------------------------------------------------- ------------------------------------------- | III. Pros and Cons (Link Vs. Toon Link | ------------------------------------------- --------------- Pros and Cons --------------- Pros -Versatile in both projectile and physical matchups -Long reach -Long Grab reach -Can fight long distance -Quick -Fairly Strong -Good Jumps -Two stage recovery options -Hard to predict moves Cons -Mid-lightweight character -Grabs have slow recovery times if they miss -Few attacks can KO at low percents -Small -Vulnerable when finnishing midair attacks -Throws don't deal much damage or distance ------------- Some of you might be thinking, "what is the difference between Link and Toon Link?" Well there is a huge difference, while most of their attacks may seem the same, they really are different. 1. Toon Link can Run much faster than Link. 2. Links sword reach is slightly longer 3. Links held shield is bigger. 4. Toon links up smash only attacks once, not three times in a row like link. 5. Toon Links Up Special brings in characters and pushes them out in the end rather than pushing all enemies into the air immediately. 6. Toon Links boomerang does not suck in foes with a hurricane like Links, It does damage as well and knock opponents back. 7. Links arrows fly faster 8. Toon Link is smaller and lighter, making him harder to hit but easier to KO 9. Toon Links bombs create a thicker smoke after exploding (the smoke is funny too). 10.Toon Links hookshot is slightly shorter. 11.Toon Links attacks are slightly weaker than links. 12.Toon Link can jump higher. 13.Toon Links Sword Drop (dair) falls faster and bounces up more than Links. 14.Toon Links bombs have a larger blast radius. While many of these may seem very small in difference, in reality they are much bigger factors than one may notice at first. ------------------------------------------------------------------------------- -------------------------- | IV. Standard Attacks | -------------------------- ***NOTE*** *This guide assumes you know all basic techniques such as running, grabbing, and shielding/ dodging. ------------------------------- Standard Sword Thrust (A)(x3) ------------------------------- ***At First Look*** This attack starts with a quick slash, and if followed up with A again, a second slash, and if A is pressed a third time, Toon Link does a stab. The attack does minimal damage. ***Type of Attack*** Slashing Physical ***Damage*** First Slash (3%) Second Slash (2%) Third Slash (5%) Full attack (10%) ***Move Strategy**** This is Toon Links basic attack. Being so, it is very fast but does little damage or push back. This attack is fairly useful due to the fact it is really fast and hard to predict. It also has decent range and can hit multiple enemies at once. The final thrust is the only part of this attack that can send enemies flying back, but even at high percents, the attack will never KO. Use this move often when on the ground to start combos as well as get a few hits in quick. This attack is a good choice when pinned down, as it is able to intercept, however dodging is also a good option. To spam this move, try doing single strikes and then pulling a rolling dodge with a follow up attack and repeat. When facing other sword users, you can use this attack to stop and incoming basic sword thrust. ----------------------------------- Forward Thrust (A) + (<) or (>) ----------------------------------- ***At First Look*** This attack does a single sword slash that comes down like a hammer would do. This attack can knock foes back. ***Type of Attack*** Slashing Physical ***Damage*** Full Attack (9%) ***Move Strategy*** While not quite as useful as the basic thrust, this attack can knock foes back and had KO potential at higher percents. It is a fairly solid move, but does not provide the same effectiveness as other attacks. If your looking to get a good hit to knock back a foe, this is one option, but not the best. ---------------------------- Sword Leg Swipe (A) + (v) ---------------------------- ***At First Look*** This attack strikes the opponents legs in one small swipe. It does little push, but hits foe up. ***Type of Attack*** Slashing Physical ***Damage*** Full Attack (9%) ***Move Strategy*** This move will be rarely used, due to the fact is doesn't have much strength and can very rarely knock foes back far. This also hits only at once direction and has little total hit range. ------------------------ Upward Swipe (A) + (^) ------------------------ ***At First Look*** This attack does a single swipe into the air and has launch potential. ***Type of Attack*** Slashing Physical ***Damage*** Slash (9%) Total (9%) ***Move Strategy*** This move is a little faster than the up-smash, and does a decent upward launch capable of KO's at high percents. This move is good and unpredictable, but all in all the up smash is better. When your looking for a ground up attack that does decent launch at high speed, use this. Also if you are holding (^) and tap (C^), you will do this attack rather than a smash. ---------------------------------------- Dashing Slash (A) + Running (<) or (>) ---------------------------------------- ***At First Look*** This attack is performed while running and thrusts forward to slash the foe. ***Type of Attack*** Slashing Physical ***Damage*** Slash (10%) Total (10%) ***Move Strategy*** This move is good, but also has a slower recovery like all running attacks. It does have some push back and it can hit foes into the air. The reason this is a good option is that a running attack is hard to block. While the attack itself isn't extremely powerful, it is useful when trying to rush an opponent. Use this move fairly often. This has almost no KO potential just to note. ------------------------------------------------------------------------------- ---------------------- | V. Special Attacks | ---------------------- This is where Toon Links projectile arsenal comes from! --------------- Hero’s Bow (B) --------------- ***At First Look*** This attack has Toon Link knocking an arrow and then shooting it. The move can be charged by holding (B), and will fly straighter and farther the longer you hold it. ***Type of Attack*** Projectile ***Damage*** Uncharged (4%) Fully Charged (12%) Total Damage (4-12%) ***Move Strategy*** This is one of the better projectile attacks in the game. It can shoot fast and can also be charged for good damage. When playing your run away game, using this will be one of your main weapons. It can even be charged in midair. Use this when the battle is far off and you are in a safe place. Also use this attack when you know a foe will recover from off the stage to deal some extra damage as they are recovering. The fully charge arrow will deal a lot of damage for a basic projectile and will also fly fairly far and a lot faster then an uncharged one. You can also shoot an arrow midair faster if you make a short hop and shoot when you just about land. The animation should just show Toon Link shooting an arrow withour fully pulling out his bow. It can be used but midair hookshot attacks are better. Use the Bow often if the game becomes too distant. Arrows may be good but the other projetile options are better. But if you can get a fully charged arrow in, please do it, it's good damage. ---------------------------- Boomerang (B) + (<) or (>) ---------------------------- ***At First Look*** This attack has Toon Link throw a boomerang at the foe, and comes back when it makes its full length. It has flinch potential. ***Type of Attack*** Projectile ***Damage*** Hit from the throw (11%) Hit from a return (3%) Total (3-11%) ***Move Strategy*** Yet another good move. The boomerang has good strength when you hit the foe from its initial throw, and makes then flinch. It doesn't KO, but can hit foes back a little. When trying to get away from a foe, use this to hinder them a little. If the boomerang doesn't get caught on its return, you can't use it for a few seconds. When throwing the boomerang, jump and move to change its return direction. The boomerang is your main projectile for most of the matches as it does great damage and has good knock back. When trying to get back on the stage or blocking someones recovery, a boomerang can have good results. Use the boomerang often and use it in any style you like, as it has many uses and tactics. The Boomerang is most likely the best projectile in Toon Links arsenal and should be used much more than any of th other projectiles. It is almost key to use the Boomerang in every match and often to master Toon Link. The Boomerang has some great uses and has almost unregretable results. Use very very often. ----------------------------------------------- Bombs (B) + (v) + direction and (A) to throw) ----------------------------------------------- ***At First Look*** Toon Link pulls out a bomb that can be thrown like an item. The explosion creates a thick cloud of smoke and temporarily stuns foes. It will explode after a couple of seconds if not thrown and damage Toon Link. ***Type of Attack*** Explosive Projectile ***Damage*** Bomb explosion (5-7%) Total Damage (5-7%) ***Move Strategy*** This is probably the most useful projectile Toon Link has as it can be thrown in any direction. The fact it stuns is very useful and it can also hurt foes who attack you if you are still holding it (but it hurts you too). Use this move wisely and strategically, and throwing down from midair can help start a clean down midair. It has little KO potential and the damage is little but it also creates a nice thick cloud for a couple of seconds that makes it hard for foes to see for about 2 seconds. To throw with better accuracy, use the c-stick to throw it in the corresponding direction. Use these in every match and use them smart. Use the bombs everywhere and anywhere, they are pretty damn good if I do say so myself. The Boomerang is still more useful but, bombs are better for setting up combos. --------------------------- Hurricane Blade (B) + (^) --------------------------- ***At First Look*** Toon Link Spins his sword around in a circle pulling in all nearby foes and then pushing them back at the final hit. It also has KO potential on the final hit if used in midair. It can also be charged. ***Type of Attack*** Slashing Physical ***Damage*** Ground no Charge (12%) Ground Charged (19%) Midair Initial (4%) Midair Full Hit (14%) Total Ground (12-19%) Total Midair (4-14%) ***Move Strategy*** Don't let the midair percent deceive you. The end of this attack in midair actually hits the foe far. On the ground, it is a quick move and can stop foes when being ganged up on. Use the fact the final hit of the midair attack to knock the foes out of the sky and KO them. A very Useful move and it also serves as Toon Links 3rd jump. It is one of his recovery moves and the best option in many situations for midair strikes. Charging the attack is a waste of time usually, as when you charge it, foes are able to easily detect the move coming and then dodge. It is only predictable when charged, but if it does hit, it does good damage. This will be one of your main attacks in a match. ------------------------------------------------------------------------------- ----------------------- | VI. Smash Attacks | ----------------------- NOTE**** There is two ways to do a smash attack. One way is to tap the joystick and press (A), and you can also hold (A) to charge up the move. The other way is to use the (C)-Stick in the desired direction. ---------------------------------------------- Double-Strike (C)-Stick/ Tap(A) + (<) or (>) ---------------------------------------------- ***At First Look*** This move has Toon Link attack with a slash and can be followed up by pressing the (A) or (C)-stick again in the same direction to make a second strike that has a powerful launch potential. The move can be used as a Single or Double Strike. ***Type of Attack*** Slashing Physical ***Damage*** Uncharged Initial Strike (10%) Uncharged Second Strike (14%) Charged Initial Strike (13%) Charged Second Strike (18%) Uncharged Total (10-24%) Charged Total (13-31%) ***Move Strategy*** This is by far a trademark Toon Link move. It is great because it is unpredictable; will he strike once or twice? The initial strike is quick to start and hit the foe, but doesn't launch them, the second strike however, is a quick follow up and has large KO potential. Use this move often as it is very effective and can hit many foes at once. This move will be one of your finishers, and will be used primarily to knock the foes off the stage on the side. The move has good start up time, but it also has a delay at the end, which may leave you vulnerable if you don't hits the foe. Try to get in that second hit so you can knock them away. A must use move. ------------------------------------------ Front-Back Swipe (C)-Stick/ Tap(A) + (v) ------------------------------------------ ***At First Look*** This move has link do a quick leg swipe to the front and then behind him. It has good KO potential and sends people flying up. ***Type of Attack*** Slashing Physical ***Damage*** Uncharged Front Strike (6%) Uncharged Back Strike (8%) Charged Front Strike (11%) Charged Back Strike (15%) Uncharged Double Hit (14%) Charged Double Hit (26%) ***Move Strategy*** This move is good in that is hits both in front of you and behind. Use this when you are surrounded and send the foes flying up and follow up with another attack. This move has less power than Toon Links other smashes, but it does hit foes hard. The KO potential is good as well. Use this move when you feel like, as it works well in a lot of situations, but don’t overuse it because it is slightly more predictable than his other smashes. High priority move. ---------------------------------------- Power Up-Slash (C)-Stick/ Tap(A) + (^) ---------------------------------------- ***At First Look*** Similar to the Upward Swipe, however this is performed with a small spin, and more power, sending foes flying upward. High KO potential. ***Type of Attack*** Slashing Physical ***Damage*** Uncharged Strike (15%) Charged Strike (21%) Total (15-21%) ***Move Strategy*** This move is your primary upward striking attack. When a foe is coming straight down from above you, perform this to send them flying. The damage is good and it has a good start up time. Also, since it is more of a counter move, charging is much safer to do with this attack, although not always recommended. This is another one of Toon Links main weapons, and should be used often, as it has the largest KO potential of all his attacks. The best part is that it is a slashing upward strike giving it a high priority in attack, so it is hard to attack you with this move being used, as your attack will strike first and send them flying instead. ------------------------------------------------------------------------------- --------------------------- | VII. Aerial Attacks | --------------------------- Ah, Toon Links greatest moves come from here, all of which are great attacks and powerful tools. Learn to short hop so you can crush your foe with these! --------------------------------- Basic Aerial Backspin (A)midair --------------------------------- ***At First Look*** Toon Link, while airborne, performs a swipe that first attacks forward, then behind him, providing two sided strike. Low KO potential. ***Type of Attack*** Slashing Physical ***Damage*** Front Slash (10%) Back Slash (10%) Total (10%) ***Move Strategy*** A fairly decent midair move, but it does provide both front and back strikes, so if you have a couple of foes jumping around close quarters, this is an option but his hurricane blade is better, but if you plan on making multiple midair attacks, this is for you. This is most definitely one of Toon Links better aerials. Its ability to KO is decent but no matter how hard you try, you will never land both front and back slashes on the same opponent in one attack, making 10% the only viable damage possible with this attack. However this attack has very quick startup and end times making it a quick choice for midair battles. The backslash has more push back then the forward, so use this to your advantage. ------------------------------------------ Air Strike (A)midair + Forward direction ------------------------------------------ ***At First Look*** Toon Link, while airborne, throws out a strong slash forward knocking foes far. Has good KO potential, but slow recovery time. ***Type of Attack*** Slashing Physical ***Damage*** Slash (13%) Total (13%) ***Move Strategy*** This move has power, but not the amount of damage you would have expected. This attack is a fantastic midair attack to short hop with, as it has great KO potential. The only problem is that the end of attack recovery is slow so you have to wait a second before you can use it again. This attack has good range, and is a great anti air attack. Also this will really also serve as your interception attack, as it sends foes a good distance to the right or left, but does not strike down like most interception attacks. This will be one of the more difficult moves to use right and timed perfectly but it can also be one of the better attacks at your disposal, and use it when the opportunity arises. Don't overuse it though, it's not the best midair, the other aerials are much better overall but this one is better at KO's. ------------------------------------------------ Back Air Strike (A)midair + Backward direction ------------------------------------------------ ***At First Look*** Toon Link, while airborne, will slash behind him that ends with the sword tilted at a upward angle giving the push an upward angle direction. Decent KO potential. ***Type of Attack*** Slashing Phsical ***Damage*** Slash (10%) Total (10%) ***Move Strategy*** This move just as good as Toon Links Air Strike, but it has less power, more speed, and less knock back distance. It does however have faster recovery time, thus can be used in succession faster. This attack is a good option if you need to get damage in a much faster attack than the Air Strike and has the main objective to knock foes away from you rather than a interception. This attack will find its use a lot during matches. Using this move is a good idea if you need that midair attack to hit foes behind you. It's also easy to set up good quick hits, and has a great potential to be used in succesion twice. Good move all in all and should be uses as your main midair side move. ---------------------------- Blade Drop (A)midair + (v) ---------------------------- ***At First Look*** Link, while airborne, will quickly turn his sword facing directly down and fall on top of foes at very fast speeds. Does have the chance to score multiple hits as Toon Link, after hitting the foe, will bounce up a little allowing a second strike. Decent KO potential. ***Type of Attack*** Slashing Physical ***Damage*** First Strike (13-16%) Second Hit (8%) Total (13%-24%) ***Move Strategy*** This move will be your new best friend. It is a ridiculously fast attack if you know how to fast fall, and it has massive strength and it bounces for multiple hits. Whenever you are directly above a foe or are trying to stop flying upward , use this to get either a strong hit or get back on the stage. DO NOT USE THIS WHEN THE STAGE IS NOT BELOW YOU, YOU WILL GET A SELF-DESTRUCT!!! However you can spike with it, it is just very impractical as the chance a good player will air dodge it is likely enough to screw you. Spiking with a thrown bomb before ensures you hit as the bomb will stun the foe making him unable to doage midair. Use the spike cautiously and daringly, it may end bad. Also the great thing about this attack is that even if it doesn't hit, anyone near where Toon Link lands will be pushed away from him, clearing the area. Nice huh? This attack is your main weapon for quick, powerful, and hard to avoid damage, as well as a recovery move to stop upward flies you will encounter. This move is fast to start and fast to end if it hits a foe, so spam it at you bounce. However, if you miss, when you land the sword will get stuck in the ground and Toon Link will have to pull it out, creating a bad recovery. Usually the push back will give to time to get up again but some times it wont be enough. The most hard to avoid combo with this attack is to have a bomb set, and while midair, throw it down on the foe to stun them for a short while and quickly move into this move to score are perfect hit. Use this trick a lot, its fun to do, and has great results. The only problem is that this attack can only KO at very high percents, so use this only as a damage building attack. Fast falling is a critical skill to do with this attack to get maximum speed. Edge breaking is also an option to stop edge hoggers, but don't fall on the foes hands but use a drop to strike near the hands that will land on the stage as they can either try getting up and still get hit or just full from the attack. ----------------------------- Blade Spire (A)midair + (^) ----------------------------- ***At First Look*** Toon Link, while airborne, will point his sword directly up, knocking anyone who impacts with it flying upward. Fantastic upward KO potential. ***Type of Attack*** Slashing Physical ***Damage*** Spike (14%) Total (14%) ***Move Strategy*** Yet another extremely useful move. This move can KO at very low percents if used right. Whenever a foe is above you or falling, use this to send them flying up again, and repeat. By repeating this you can KO a foe very fast. Use this move often as an anti air attack, at it is the most effective off all the midair attacks. The amount of time Toon Link holds the position is great, as it makes it easier to time hits. The startup time is fast, and it also ends fast. A must use key attack for quick KO's. A bad player will fall for this almost every time and never get back on the ground. ------------------------ Hookshot Jab (Z)midair ------------------------ ***At First Look*** Toon Link is special in that when he uses his grab attack midair, he can hurt foes with the hookshot. The damage is low and the speed is decent to start, and but there is little to no KO potential at all. ***Type of Attack*** Indirect ***Damage*** Jab (4%) Total (4%) ***Move Strategy*** After more testing with this move, I have found this attack actually more fun than it initialy appears. If you are just not quite at swords length in midair for a slash attack use this to jab the foe. It does decent knockback and best of all, a good flinch for the foe. This attack is hard to block but is also dangerous to Toon Link if he misses, as the end time to this attack is slower than the start up. Use this move to confuse foes as well as have another option in a projectile game, as the Hookshot is classified as a projectile. The damage is low, but the amount of fun you get out of using this attack is worth while. The main thing you need to watch out for is to not overuse this move, as it isnt the best aerial out there. It is good for a mixup game though, so throw one in all of a sudden so the opponent doesn't expect it. This move is not the best option for a very competitive game. It is only used as a mixup move. ------------------------------------------------------------------------------- ------------------ | VIII. Throws | ------------------ Toon Links throws are unique in the fact he uses a hookshot to grab foes. It has farther reach for grabs, but horrendous recovery time when it misses. Time it and measure you grabs perfectly to avoid these issues. Also you can grab foes when their shield is up, providing an anti shield attack. Use this knowledge wisely. --------------------------------------- Forward Throw (Z) + Forward direction --------------------------------------- ***At First Look*** Toon Link grapples his opponent then rams the foe sending him flying a little. Decent KO potential. ***Type of Attack*** Physical ***Damage*** Ram (4%) Hit (3%) Total (7%) ***Move Strategy*** Okay, now we are getting into the throws. None of Toon Links throws are great, but the ability to damage people who are shielding is good so listen up. This throw is decent, but for Toon Links throws, its all based on where you want the opponent to go. In this case forward. Good option but there is better throws. ----------------------------------------- Backward Throw (Z) + Backward direction ----------------------------------------- ***At First Look*** Toon Link grapples his opponent then does a summersault kick, kicking the foe behind him. Decent KO potential. ***Type of Attack*** Kick Physical ***Damage*** Kick (4%) Hit (3%) Total (7%) ***Move Strategy*** Okay, this ones a little better for continuous grabs as the foe is usually only sent flying near the ground giving you a chance to grab again and throw. Still there are better throw options. It rarely KOs but it is still viable. ---------------------- Down Throw (Z) + (v) ---------------------- ***At First Look*** Toon Link grapples the opponent then rams the foe into the ground sending him flying upwards. ***Type of Attack*** Physical ***Damage*** Ram (3%) Throw (4%) Total (7%) ***Move Strategy*** This is the kind of throw you can spam. Its a little harder than most characters down throw to spam, but it gets the job done. -------------------- Up Throw (Z) + (^) -------------------- ***At First Look*** Toon Link grapples the foe then throws him up and slashes him with his sword. Good KO potential. ***Type of Attack*** Slashing Physical ***Damage*** Throw (3%) Slash (4%) Total (7%) ***Move Stratagy*** This is Toon Links best throw as it actually can KO opponents. Its not always the best option to throw, but if a foe is above you, you can throw the guy into him dealing some damage to both. Cool huh? Same with all other throws, players who get thrown are basically like items, but not as powerful. ------------------------------------------------------------------------------- ---------------------- | IX. Final Smash | ---------------------- ----------------------------------------- Triforce Slash (B)with smash ball power ----------------------------------------- ***At First Look*** Toon Link sends a short arrow of light that if it connects with a foe, he is sucked into a Triforce barrier and is hammered with slashes, until finally, Toon Link Hits him and almost always KOs him. Anyone who got stuck in the Triforce barrier is also hit but less likely to be KOed than the one who was hammered. ***Type of Attack*** Special Final Smash Slashing Physical (DAMN!!!) ***Damage*** Initial Hit (5%) 15x Slash (4%)x15 Final Slash (18%) Total Damage (83%) ***Move Strategy*** All I can say is that it is hard to connect but you can activate it midair, so if you do get the smash, you basically won a KO. If you see a smash ball, get it so no one can use it against you. One note to add is it is best to use this after the foe has about 40-50% so the final smash can almost always ensure a clean promising KO. ------------------------------------------------------------------------------- ---------------------------------- | X. Toon Link Exclusive Moves | ---------------------------------- Here are the goodies you all might want to look at. These moves are all exclusive to Toon Link (kinda) and have their own uses! -------------------------- Hookshot Tether Recovery -------------------------- Sometimes it is a better idea to use your hookshot when trying to get back on the stage by pressing (Z) when you are close to the edge of the stage. This recovery grabs on to the edge of the stage and allows you do a ledge attack. Also, edge guarding is viable but not recommended. Also if you want a double check recovery use the hookshot to see if you can grab the stage, and if you miss then do a hurricane blade up. That way may be hard to pull off sometimes, but it could also be very unexpected and fool opponent to thinking you are falling. -------------- Sword Parry -------------- As mentioned earlier, sword users have the ability to block other slashing attacks by using a basic sword swipe. this is another way to block attacks instead of shielding, although it is harder to do and can not always turn in your favor. ------------------- Toon Links Shield ------------------- It may be tiny, but it is able to block some projectile attacks, mostly arrows. The only way to block though is not to move or crouch. It can be nifty in some situations. ------------- Bomb Tricks ------------- Sometimes holding an active bomb is a good idea. If someone hits you it will explode and hurt both you and the foe. Also there is a technique some people use called "Bomb Clouding", where when a foe gets close to press (C) + (V) to have the bomb explode at your feet creating a smokescreen for a second stunning both you and the foe, resetting the attack patterns. In addition to the bomb clouding trick, the throwing of the bomb to the ground hurting yourself will also grant you very short invincibility. So in a ganged up attack always consider a bomb as a way to get out of the problem. Another trick I have recieved numerous emails about is Bomb Jumping. Bomb Jumping is where you pull out a bomb and when your falling off the stage and have used all your recoveries, the bomb may explode in time to allow you to pull off another Hurricane Blade to get back on the stage. It can be very tricky to time and plan so its usefulness is limited, but if you do infact pull' it off at the right time, it may just infact save you. ----------- Wall Jump ----------- When ever Toon Link jumps into a wall, you can follow up by pressing the jump button again to get an extra leap off the wall. You can do this as many times as you want as long as Toon Links jumps into a different wall than the previous one. ------------------------------------------------------------------------------- ----------------------------- | XI. Advanced Techniques | ----------------------------- These techniques are technically called advanced moves for reasons unknown. Only new players should look at these really. ---------------- Throwing Items ---------------- A completely viable strategy is to throw items such as beam swords. Why a beam sword you ask? Well throwing a beam sword is like intercepting from any direction. Beam swords fly far and straight and have power to knock people off the stage. Want to kill the guy who is below the stage and about to recover. Jump over him and throw a beam sword down by using the (C)-stick(V). That should KO him. Try using items like beam swords, home run bats, and other such pole items to get some other ways to use items other than just attacking with them. Intercept. Beam swords in my opinion were made to throw. Try it. ------------ Short Hop ------------ Short hopping is important to use. All you do is tap (^) really lightly and Toon Link will jump a little. While in midair, try a midair attack or throw something. a short hop is a way to basically pull a midair move while not leaving the ground to much. Use this often. --------------- Midair Dodges --------------- While in midair, you can dodge an infinite amount of times by pressing (R) or (L). If someone is throwing something at you or are trying to do a midair attack, make a dodge, it could make all the difference in surviving. ------------------------------------------ Ledge Attack (while on ledge, press (A)) ------------------------------------------ ***At First Look*** Toon Link will get up from the ledge while making a sweep with his sword, hitting all nearby away from him. ***Type of Attack*** Slashing Physical ***Damage*** Slash (8%) Total (8%) ***Move Strategy*** Okay, if you are on a ledge, you can get back on the sage by either jumping up, or you can attack. Attacking is always a good idea, cause it gives a few points of damage to nearby foes for just getting back on the stage. --------------- Running Grab --------------- While running, press (Z) to sling out the hookshot to grab a nearby foe , which will be a very unexpected move. This technique is used basically every time you try to make a grab. Use this a lot, as it is hard to predict. -------------------------------------------- Grab Punches (Z) + (A) any number of times -------------------------------------------- ***At First Look*** Toon Link, while holding on to the opponent, punches him repeatedly. ***Type of Attack*** Physical ***Damage*** Punch (2%) Total Possible damage (2-8%) ***Move Strategy*** Sometimes you have less foes to deal with so instead of a quick throw, throw in one or two punches and then throw them. Any extra damage is always good. But don't hold on too long, or the foe will get free. ---------------------------------------------- Dashing Up Smash (C)-Stick (^) while running ---------------------------------------------- ***At First Look*** Toon Link will be running then transition into an up smash while sliding a little. ***Type of Attack*** Slashing Physical ***Damage*** Slash (15%) Total (15%) ***Move Strategy*** Yes, while running you can quickly turn into a up smash. It's like another option for dash attacking except this one can KO a lot easier! ------------------------------------------------------------------------------- ----------------------- | XII. Weapon Items | ----------------------- This section goes over all the pole weapons, and Toon Links attacks with them. Since all the attacks are all the same, I'm just going to give what type of attack it is and how much damage. ------- Weapons ------- 1. Beam Sword 2. Fan 3. Home-Run Bat 4. Lip's Stick 5. Star Rod ---------------- [[[[Beam Sword]]]] ---------------- Beam Swords are the most physicaly ranged of the weapons. It is also a very good throwing item. For most cases, throwing a Beam Sword to intercept an opponents recovery is the best way to use it. It also gains more reach depending on the attack, so smashes generally make the beam much larger. As for KO potential, it is only decent but thrown it is fantastic. The reason for the Beam Sword being thrown is that it is light and strong, which makes it easier to throw far and accurate while still providing the damage you desire. ----------- Basic (A) ----------- ***Type of Attack*** Energy weapon physical ***Damage*** Swipe (4-5%) Total (4-5%) -------------------------- Forward (A) + (<) or (>) -------------------------- ***Type of Attack*** Energy weapon Physical ***Damage*** Swipe (7-8%) Total (7-8%) ------------- Running (A) ------------- ***Type of Attack*** Slashing Energy Weapon Physical ***Damage*** Beam (7%) Link's sword (8%) Total (7-15%) ----------------------------------------- Smash (C)-Stick + (<) or (>) or Tap (A) ----------------------------------------- ***Type of Attack*** Energy Weapon Physical ***Damage*** Uncharged (11-12%) Charged (15-16%) Total (11-16%) ---------------- Thrown (throw) ---------------- ***Type of Attack*** Energy Projectile Physical ***Damage*** Hit (9-15%) Total (9-15%) --------- [[[[Fan]]]] --------- The Fan is usually only used to rack up damage, not KO. It should also be noted that fan attacks generally send the foe towards you rather than away, so hitting a foe hard can be difficult. It isn't extreamly powerful being thrown like the Beam Sword but it is still an option. However throwing a fan will cause the foe to bounce up a little leaving them open for a combo. ----------- Basic (A) ----------- ***Type of Attack*** Weapon physical ***Damage*** Swipe (2%) Total (2%) -------------------------- Forward (A) + (<) or (>) -------------------------- ***Type of Attack*** Weapon Physical ***Damage*** Swipe (6%) Total (6%) ------------- Running (A) ------------- ***Type of Attack*** Slashing Weapon Physical ***Damage*** Fan (8%) Link's sword (8%) Total (8-16%) ----------------------------------------- Smash (C)-Stick + (<) or (>) or Tap (A) ----------------------------------------- ***Type of Attack*** Weapon Physical ***Damage*** Uncharged (10%) Charged (14%) Total (10-14%) ---------------- Thrown (throw) ---------------- ***Type of Attack*** Projectile Physical ***Damage*** Hit (3-6%) Total (3-6%) ------------------ [[[[Home-Run Bat]]]] ------------------ The Home-Run Bat is slower than the other weapons but it is oh so good at dealing damage. A thrown Bat wont go far but it is very powerful and can potentialy KO foes at high percents. As for the smash, yes it is a 1 Hit KO, but it is so slow and hard to set that it almost never works. But hey, if you use a freezie on a guy making them frozen, then pick up a bat, smash them for a free KO. It isn't likely to happen but it is always possible. The bat is just as fast being attack with but it loses the beams reach which in turn makes it not always better. It does kill though so use them if you see it. ----------- Basic (A) ----------- ***Type of Attack*** Weapon physical ***Damage*** Hit (7%) Total (7%) -------------------------- Forward (A) + (<) or (>) -------------------------- ***Type of Attack*** Weapon Physical ***Damage*** Hit (12%) Total (12%) ------------- Running (A) ------------- ***Type of Attack*** Slashing Weapon Physical ***Damage*** Bat (12-16%) Link's sword (8%) Total (12-24%) ----------------------------------------- Smash (C)-Stick + (<) or (>) or Tap (A) ----------------------------------------- ***Type of Attack*** Weapon Physical ***Damage*** Smash (30%) Total (30%) ---------------- Thrown (throw) ---------------- ***Type of Attack*** Projectile Physical ***Damage*** Hit (12-22%) Total (12-22%) ----------------- [[[[Lip's Stick]]]] ----------------- Lip's Stick doesn't do much except make a kind of "poison" on the foe which does more damage the larger the Flower which can generally be grown by many hits from the flower. Just as weak as a fan, and doesn't provide good damage. The best option here is to throw it at a foe to plant a flower and continue as usual. ----------- Basic (A) ----------- ***Type of Attack*** Weapon physical ***Damage*** Swipe (4%) Total (4%) -------------------------- Forward (A) + (<) or (>) -------------------------- ***Type of Attack*** Weapon Physical ***Damage*** Swipe (7-8%) Total (7-8%) ------------- Running (A) ------------- ***Type of Attack*** Slashing Weapon Physical ***Damage*** Flower (6%) Link's sword (8%) Total (6-14%) ----------------------------------------- Smash (C)-Stick + (<) or (>) or Tap (A) ----------------------------------------- ***Type of Attack*** Weapon Physical ***Damage*** Uncharged (11-12%) Charged (15%) Total (11-15%) ---------------- Thrown (throw) ---------------- ***Type of Attack*** Projectile Physical ***Damage*** Hit (6-7%) Total (6-7%) -------------- [[[[Star Rod]]]] -------------- The Star Rod is just as strong as the bat but it has a special long distance projectile it throws in certain attacks. The rod only can summon a star a handful of times, so use them sparingly. The Stars won't KO, but a hit by the rod can. In every way it is the same as the bat almost but it doesn't have a 1 Hit KO attack but rather a projectile. Throwing these can also work but only do it when the rod is low on "star power". ----------- Basic (A) ----------- ***Type of Attack*** Special Weapon physical ***Damage*** Swipe (10%) Total (10%) -------------------------- Forward (A) + (<) or (>) -------------------------- ***Type of Attack*** Energy Weapon Physical or Projectile ***Damage*** Swipe (13%) Star (8%) Total (8-21%) ------------- Running (A) ------------- ***Type of Attack*** Energy Slashing Weapon Physical or Projectile ***Damage*** Rod (15%) Link's sword (8%) Total (8-23%) ----------------------------------------- Smash (C)-Stick + (<) or (>) or Tap (A) ----------------------------------------- ***Type of Attack*** Energy Weapon Physical or Projectile ***Damage*** Uncharged (18%) Star (8%) Charged (25%) Total (8-33%) ---------------- Thrown (throw) ---------------- ***Type of Attack*** Projectile Physical ***Damage*** Hit (10-16%) Total (10-16%) ------------------------------------------------------------------------------- ----------------------------- | XIII. Strategy and Tips | ----------------------------- ------ Tips ------ -ALWAYS HAVE A BOMB IN HAND WHEN YOU CAN!!! So many options become available with a bomb in hand, for offensive, deffensive, counters, and evasive actions. -Use your shield to block attacks -running is always good -Try to keep enemies guessing -Don't keep using the same moves over and over. It's predictable. -Throwing weapons is sometimes better than using them -If they have their shield up, grab them -Dodge when ever you are in danger or to keep people guessing -Dodge to get away from the battle if being pursued -when being hit, point the joystick in the direction you want to go, you control where you fly -Don't let your shield break -Survival is always top priority in Stock matches, and KO's in timed -Play either a certain strategy in certain situations, the guide bellow will help explain these game strategys. ----------- Strategy ----------- The Genius of Toon Link is his versatile range of attacks. He can play a projectile game, a hit and run game, a physical game, and a defensive game. You can play Toon Link in any fashion you want, but if you want some basic battle structures, here they are. These will also help as different strategys in different match scenarios like stated in the Character Matchup section bellow. ==Projectile== Playing a projectile game, you main range of attacks will be your bow, boomerang, and bombs. Grabbing is also used to get away from the chaos. When playing a projectile game, keep your self distanced and try to sneak small points of damage when you can. When the foe is high percent, play aggressive by bringing him to the edge of the stage and smashing him out. If the player decide to use his shield a lot, switch to grabs when a projectile fails, but make sure hookshot connects, because a miss is an open shot on you. Bombs should be used to get away from foes, and boomerangs to knock them back a bit. Arrows should be your main source of damage as well as basic attacks if someone gets close. Basic attacks are good because you don't want to play slow and you want to get a few points in and then get away and start spamming projectiles. ==Hit and Run== Hit and run games consist of playing slightly aggressive but also evasive by using midair attacks and dodges. Just keep on going back and forth from the battle to out, by using some midair attacks then running back and preparing a next strike. Also bombs are very useful in this tactic to hit foes running at you. When in close quarters, use the shield and dodge technique to roll behind foes, get a hit in, then roll to the other side, hit, and then either run or continue this process. Hit and run games also tend to have players throwing items to get damage in and then using a strong smash to finish. ==Physical== In a physical game, you want to dish out a lot of damage fast and be in the center of the battle. Use smashes, shot hops with midair attacks, Bomb + Blade drop technique a lot, and just keep using those high impact moves that are fast and strong in the flight department. Also use dodges a lot to keep your self from being the punching bag like most inexperienced physical players. Toon Link just wants to dish out damage with strong quick strikes, just keep the foe guessing too. Forward smashes and Blade Drops are you main arsenal of attacks, basic attacks to get small hits followed by various combos. Find what works for you. ==Defensive== A combination of hit and run and physical game tactics. Stay in the center of battle but keep your guard up by shielding often, rather than slowly dishing damage and running, shield, dodge, then hit hard. Be a Tank, defensive but powerful. Play like you would in a physical game but keep yourself more protected and less aggressive. ==Combo== You can play a combination of all of these as well, try different tactics throughout the match and keep the foe guessing. A player who can do it all is one to admire. The most common instance of using this is in a diverse, four way battle where many strategys may need to be used. ------------------------------------------------------------------------------- ----------------------------------- | XIV. Character Match up Guide | ----------------------------------- Here are some character match up strategys, starting from Bowser to Zero Suit Samus. Remember the play styles from above to get a better idea of how to approach some of these characters. In version 1.8 I added the counter the counter section to help players face people using counter character strategies against Toon Link to further improve their gameplay. If the foe is using a counter character strategy, look below the basic counter strategy for a counter a counter strategy. The first strategy is for a player playing a character with skill but not using counter strategies. The counter a counter is for stoping players from using any changed game strategies they may pull off to play Toon Link. -------- Bowser -------- Bowser is a heavyweight character, thus his speed is greatly hindered. On small stages he can be nasty as he is hard to get away from. The best strategy is to use projectiles such as arrows and bombs to stack up damage. The best play style to use against him would be "Hit and Run" as he is slow and can have a hrad time catching up to Toon Links speed. Also, his large size makes him a much easier target to hit so grabs and midair attacks are easy to land. When he gets close to you try to get away from him by either attacking him with a boomerang, jumping over him or on his head, or use dodges. Since his attacks are slow, know his attacks and learn to sidestep them when he uses those slow heavy hitting attacks. Dodging is your best option in a small stage environment. ****Counter the Counter**** Bowser has a touch time countering Toon Link, but one move Bowser has to stop hit and run attacks is his firebreath. If the oppentent decides to counter frontal attacks with firebreath, shield, use aerials more or just use a projectile game. Bowser can really counter Toon Link well, so don't overthink it too much. ---------------- Captain Falcon ---------------- Captain Falcon has both speed and power, but what he lacks is ranged attacks. Abuse those projectiles as much as you can as he has almost no way to stop them. If he gets close run, don't jump, as Captain Falcon has many anti air attacks and is very good at intercepting. If you plan on jumping, spam those air dodges to keep yourself from getting hit hard. Anytime Captain Falcon is recovering from a powered attack like falcon punch, attack the hell out of him and try to knock him out. Just watch out for his fast attacks and running speed. Arrows are your best friend in this matchup. ****Counter the Counter**** Captain Falcon will try to play counters using evasive techniques and high KO potential moves as Toon Link is fairly light, thus easier to KO. If he is being a dodge fiend, bomb him to hell as bombs have good detonation power and are harder to dodge. Play knowing he is going to dodge and fake him out with projectiles followed by a bomb throw during his recovery. If he tries smashing you, you need to keep your distance like you should always do with him. Bombs can intercept charged attacks beautifully so take advantage to this. ------------- Diddy Kong ------------- Diddy is more a hit and run character, so when fighting him, try to stay close. Play a "Physical" game when playing him as he has good jumps and is good at dodging long distanced attacks. His light weight makes him easier to KO at lower percents, so keep hiting him with good launch diatnce attacks like the Forward smash and Sword Spike (Up Midair). Just keep close to him and he is an easy target. Run whenever you move so you can catch up to him. Just beat the hell out of him. Toon Link has superior projectiles so use them againt him if he trys to play a projectile game, you can out damage and out speed his peanuts with arrows, bombs, and boomerangs. ****Counter the Counter**** The only real effective way for Diddy Kong to counter Toon Link is to do rolling dodges behind you and attept a Forward attack or smash. How to counter this? Always keep Hurricane Blade and Toon Links Down Smash at the ready to keep the chimp from hiting you in the back. If he starting rolling prepare a move that hits both sides. Problem solved! ------------- Donkey Kong ------------- Use a "Projectile" game on DK, as he is slow and has no long distance attacks. Just keep your distance like you would with Bowser and use similar strategys against him. "Hit and Run" is also a good strategy to use on smaller stages. Make sure your distance from him is always more than one DK armlength away, because at close range, DK has good reach. Use basic attacks as they are quick and deal good damage. When midair, use the down midair to keep him on the ground. Dodging is also a good idea to keep in mind just like bowser. ****Counter the Counter**** Donkey Kong counters with the Down (B) and his up smash. Those two cover ground and air. So if your "hit and run" strategy fails, switch to a projectile game and keep bombs at the ready to stop any sort of arrow or boomerange counters he may pull. When using Blade Drops make sure he doesn'e use an aerial when he bounces up. So in the case he does try to counter Sword Drops, just cancel the second bounce and move on with the game. ------- Falco ------- Falco is good against projectiles and is an increadible midair fighter, so try to keep the battle on the ground and close. Most of Falco's attacks are good anti airs and projectiles. Grabs will be a good idea for here, as well as using dodges and your shield. If you have a "good" opportunity to land a good strong midair attack that may KO Falco, use it. Falco has a quick drop speed so using fast drops in this match up are improtant if you plan on using any midair attacks. Smashes and sword swipes should be your main attack sources and just play either a "Physical" or "Defensive" game. ****Counter the Counter**** A Falco playing a counter will try to stay above you to keep away from Sword Drops, so if he tries this either Up midair or use a bomb thrown up followed by an up midair or hurricane blade. Falco will try to play interception Short hop attacks at close combat, so play smart and figure a way to counter this, as there is no real fullprood counter I can find, but usually in a close match up, Toon Link prevails as champion of the "physical" and "defensive" games vs. Falco. ----- Fox ----- Unlike Falco, Fox's midair game is much weaker. Fox almost always depends on his ranged attacks, so a close fight is smart. Don't ever let Fox spam the blaster as it can truely be disasterous for you. If he does decide to spam it though, pull up the shield and roll towards him to avoid hits. Always be next to Fox as he is much weaker close combat. Do nice quick and string attacks and keep following him and try to get in as many combos as you can. Avoid using projectiles due to his reflector, even bombs aren't the best idea. Midair attacks work well as well as basic and smash attacks. Just keep the pressure up on Fox and try to keep him cooped up in a hurt corner. Sword Drops are very effective as Fox fall faster than most characters thus making him easier to connect more than one hit with it. Play "Physical" or "Defensive". ****Counter the Counter**** Fox players will try to counter similar to Falco by staying above Toon Link to avoid Sword Drops. As before, keep Up aerials ready or a Bomb thrown up with a followup Up air or Hurricane Blade to keep the Fox from getting above you too much. If he is a above you and uses Fire Fox at a down tilt, dodge, thats all I can say. He is a little more tricky close up when he intercepts than Falco but always remember those quick hitting moves are smart and any slower moves may not be wise. Bomb Clouding is key if he gets smart close up to keep him from continuous interceptions. ----------- Ganondorf ----------- Ganondorf is slow and not very good at long range battles. That means a "Projectile" strategy is the best option. He us fairly big and can't jump high so Arrows are much easier to time and land on him. Bombs do some justice by shortly stunning him (very short time but still viable to use for advantage). A "Hit and Run" strategy is also a good idea but watchout for some of his anti air attacks such as Flame Choke (< / > + B) and Dark Dive (^ + B). He has very slow recovery time, so take advantage of this and hit him with smashes when he is doing so. Try to keep your distance though and since he is very slow, he can easily be out run and avoided. ****Counter the Counter**** Projectiles are key as gannondorf can't counter them. He has many aerial counter options so if you play aerial games and have trouble, stop playing it and stay grounded. Gannondorf isn't touch just play normaly and it shouldn't make him a dangerous counter. -------------- Ice Climbers -------------- The main problem here is that there is two, so any type of grab is basicaly pointless, as the other will just hit you to let go. They are much weaker when they are not together so try to either keep one of them away from the other or try to kill the second one (not the player controlled one). When close to them, their attacks can deal massive damage and double hits, so watch out for their smashes. Try to play more projectiles to keep the distance while also comming in and doing some physical damage. Playing a "comboed" strategy is almost required for this. ****Counter the Counter**** Ice Climbers aren't really given any Toon Link counters really, but in the case they dodge your projectiles enough, switch to Sword Drops and Bomb throws. Bomb throws rule here and try to avoid getting frozen by any Freezie or Blizzard attacks at high percents. They lack aerial counters so if they get to be a pain just play them in the sky. ----- Ike ----- Ike can be a pain in the ass, and the only good way to play against him is to attack with moves with little recovery time. Basic slashes and Hurricane Blade attacks are good choices. Try not to use attacks with slow recovery time because Ike can KO characters at very low percents. Watch out for counter as well. Projectiles, especially bombs are a good option to use, so every chance you get pull out a bomb and throw it at him. Dodges are your main source of victory however because Ike's attacks are slow to start and are easy to predict so dodge often and get any strikes in when ever you can. Play a "Defensive" match against Ike to keep Toon Link on the stage. Watch out for Aether spammers and just shield when ever he does it and try to follow up with a grab to stop him. Also grabbing him before he does Aether is a good idea. ****Counter the Counter**** Ike has a counter move for everyone. It's called counter, his down B. Bombs are always a good choice as they explode anyways so as far as my experience goes, I've never seen Ike able to counter a bomb. Watch out for Aether spam and time your moves to get strikes on his downtimes. Watch out for aerial (>) (B) as it has good reach, but your boomerange knows a thing or two about stopping incoming traffic. Bombs work like a wonder against Ike and should become your best counter the counter friend for Ike and almost any other matchup as well. When midair, Ike can counter with a (B) fire sword spike than can send you flying. This is hard to counter but is slow too so keep Toon Link out of that midair recovery stage and try to work with Back aerials and basic aerials as well. Being a fairly regualar Ike player myself in addition to Toon Link has given me some knowledge of his hits and misses, and one thing to always keep in mind is that he is very good at not flinching so moves that actually stun are always good, thus boomerangs and bombs are mainstream weapons in a counter. Also using the sword parry technique is always something you should remember in a sword vs. sword matchup. ------------ Jigglypuff ------------ Jigglypuff's finess is her midair game, so don't play one with her, she will likely out do you. Try to keep your distance and play an early "Projectile" game then when the damage gets past the 60% play a "Physical" ground game with smashes and basic attacks. Hurricane Blade attacks are a good plan as it can be charged and can also stop a good deal of her attacks. Jiggly is easy to KO because she is light, so always try to give good launch distance attacks on her. ****Counter the Counter**** Strangely I have found Jigglypuff counters playing dodge and grab games. So if the baloon is playing to near ground start playing some aerials to pop this pink puff. Always use a bomb + Sword Drop combo rather than a Sword Drop only move to ensure a clean hit. Spiking a baloon is more fun with explosives right? All I can say is short hops with aerials are fun and effective if jiggly is attempting any sort of counter game out there. Projectiles work wonders always remember this. -------------- King Dedede -------------- Another biggie, and he is also pretty slow. "Hit and run" games work the best here as a good DDD player will spam waddle dee/doo and keep projectiles away from DDD. Bombs are really the only logical projectiles here. Aerials work well in the "Hit and Run" tactic as he really doesn't have much antiair moves. He has multiple recovery jumps making him slightly better at getting back on the stage than most heavy weight characters. Bombs and Sword Drop comboes shine in this match up with great results. His reach is scary so keeping enough distance to make a side dodge is improtant. ****Counter the Counter**** The King can't counter the Toon. Thats all I can say. The only counter move I know of from DDD against Toon Link is to Dodge incloming Sword Drops. What does this mean? Add a bomb to the drop and watch the magic happen. I don't have much else to say. Bombs are king!!! ------- Kirby ------- Kirby is pretty easy personally. He is easy to KO, small, can hardly apply any distance pressure at all. He is good at falling with his Stone attack and you should keep that in mind when directly below him. Roll dodges are smart when he trys to use stone, and it also procides you with good time to dish out some quick damage. Try to play "Projectile" games as he isn't hot at dodging quick projectiles like Toon Links arrows. When he is around 70%, start trying to smash him off the stage. Sword Drops are smart too, as he actually gets a good launch from it unlike most mid weight characters. ****Counter the Counter**** Play as normal, Kirby shouldn't be countering you too much. If you can't stop him, I don't know what to tell you. Bombs are always there, remember this. ------ Link ------ Link is slower than Toon Link, giving you almost every advantage available. Stay close, use midair attacks, and dodge his smashes. Link isn't as good as Toon Link at aerial attacks so use this to your advantage. Arrows are useless because his shield blocks most of them (annoying). Hit him fast and hard as well as playing a very "Physical" game. Projectile games will hard to do with Link so keep to close range at all times. Roll dodges are important and you should learn to dodge his attacks with ease as they are similar to Toon Links. ****Counter the Counter**** Your faster than him, and have similar attacks... I think you can handle it. Just play the faster moves and you will be fine. --------- Lucario --------- Lucario is a ranged and close range fighter, making him hard to play against. For lucario, the thing you need to remember is the higher the damage he has, the more damage he does, so try to KO him asap. His projectile game is fairly weak until he is in his 100% and above so playing a "projectile game" early works decently well. Pull out a bomb whenever you are not attacking so you can throw it at him anytime you might need to. Play close for most the match and use quick strikes with standard attacks and forward smashes. The forward smash is most likely your KO tool for this match up. Boomerang when ever you return to the stage to stop him from intercepting you and sword drop often, as he isn't to fast at blocking attacks from above him. Don't overuse Sword drops as they might rack up to much damage for him, creating a beast of power. Try to KO him every chance you get. Play aggressive. ****Counter the Counter**** Lucario has a counter move, Double Team, which actually counters attacks. Bombs work but Double Team I believe can actually dodge them (OMFG!!!). What to do, what to do? Well, try setting up combos with a projectile then a physical attack so that lucario counters the projectile but not the real strike. Bomb Clouding is always a suprise but make sure to use it sparingly as it hurts you too. If he's using double team a lot, don't attack with physical strikes first, always start with a projectile before running in to hit hard. ------- Lucas ------- Lucas like to use those special and projectile attacks alot. So what this means is that a close range "Physical" game is the best option. Beware of his up smash, it is slow but it is extreamly powerful, so avoid that attack at all costs. Just keep hitting him with side smashes and basic attacks to get him weak and then just try to score a KO. His midair game is good so aerials aren't the best option but Sword Drops still work well for most occasions. You can also use projectiles against Lucas as his PSI-Magnet doesn't absorb physical projectiles, so use boomerangs and bombs as well as your close range moves. ****Counter the Counter**** A Lucas playing a counter game will use the small quick hits on you. Luckily for you, you have bombs and faster fast moves. Use them and BAM! You have a counter counter. ------- Luigi ------- Luigi is a King at aerial games, as his air karate chop (midair side) and down spiral (midair down) are both very, very good aerial moves. So don't play a aerial game. Try to play some projectiles mixed in with ground basic attacks. Whenever Luigi is vulnerable, smash him hard while you can. Play "Deffensive" and shield or block most of his attacks. Watch out for missfires and Super Jump Punches because both basically mean instant KO. So don't get to close to Luigi, just enough to hit him with your sword. Hurricane Blade attacks work well as a anti air move after Luigi does a Super Jump Punch, but remember to do them mid air to get more launch power from it. ****Counter the Counter**** Luigi has a hard time countering any character with a sword and always will. If he is breaking you down close range switch to a "Projectile" game. Watch out for his grabs and stay some distance. This lack of traction is an advantage when hs is shielding so always be observant and try not to follow up attacks if he slids back as that will just give him a chance to hit you under your down time. ------- Mario ------- Mario's Cape can relfect your projectiles so a projectile game is not a good idea. Try for a "Physical" game. Mario is a pretty basic character, and should just be delt with by using any combo of midair, smashes, and basic attacks. Just keep applying pressure and play aggresive. ****Counter the Counter**** Err. I don't know of any counter moves for Mario vs. Toon Link. Mostely because he is the most basic of basic characters. Just watch his game and figue the player not the character out and counter with that. ------- Marth ------- Marth isn't good at blocking explosives, so bombs are essential. Spam these as well as play a aerial game as marth has a bad aerial finess. He is fast so try to keep the battle controlled and keep away from his combos. Watch his moves and don't fall for a counter. Down aerials with bombs combo is golden and will probobly end up helping you knock him down. Smashes are good but look out for his forward smash as it has good range, power, and speed. Whenever Marth trys to counter use a grab to stop him. Be very observative when playing against Marth. ****Counter the Counter**** Like Ike, Marth has a counter move called "counter". Like above, you have two options to stop a counter move. 1. Use a bomb, they explode anyways or 2. Grab him as you can't counter a grab with counter. Sword parrys are available in this matchup, keep this in mind, so if he tries a quick sword hit, use your quick sword attack back to stop it in style. Besides the cool *ching* sound is always fun. If Marth starts to utillize his superior speed, play a more "deffensive" game and try to get him when you can. ------------- Meta Knight ------------- Meta Knight has very fast close range attacks but is poor at long distance fighting. "Projectile" games are the best option and should be your first choice. He has some tricks for midair battles, so try to keep the midair battle limited when fighting him. Use arrows, bombs, and boomerang strikes to weaken him and then when you feel up to it play "Defensive" and try to land a powerful smash to knock him off the stage. He has many recovery options so be ready to knock him again if he recovers back to the stage. Shielding is good to stop some of his quick basic attacks. ****Counter the Counter**** Watch out for Dimmensional Cape, as it is a very tough move to predict and hard to counter. If you see it comming, SHIELD. That is all I can say for that move. He has fast sword action and Toon Link's sword is almost as fast, and parrying is an option as always with sword duels. Metaknight is going to try to utilize his speed to his advantage so Bombs are a good way to stop his comboes and also as a way to slow him down for a bit. Keep projectile moves at your ready and if he starts dodging them, play a mixup game to dissorient the player as to how you are playing then switch back to either a "projectile" or "deffensive" game. ------------------ Mr. Game & Watch ------------------ MG&W is a light character and is therefore easy to KO at low percents. Smashes are the uptmost effective moves you can use on him as he really can't do much to stop them. He is good at combos, so watch patterns of his attacks and learn to counter them. He has a down midair that is similar to your Sword Drop so keep away from being directly below him. Just keep playing "Physical" and use all those strong moves. ****Counter the Counter**** Mr. G&W is stuck with almost no moves to counter Toon Link, and his counter move, the bucket, can't catch any of Toon Links projectiles leaving him almost hopeless. If he tries to get above you in order to keep from being under you, use a bomb thrown up followed by and Up aerial or a Hurricane Blade. Mr. Game & watch has many high priority moves but Toon Links bombs and Sword Drops are also high priority. Use the Bombs + sword Drops if he tries to counter someway on the ground. ------ Ness ------ Ness is a lot like Lucas, but he has many more physical options. Ness is a character that uses a lot of physical and special attacks. Try using basic attacks and quick midair strikes to weaken him. Then when you feel confident, try to smash him off the stage. Just be careful for his Bat and PK Fire, which are both solid attacks. Fire will stop you for a bit, so avoid it. Play "Physical" and hit hard and fast. Projectiles also work as his PSI-Magnet doesnt absorb physical projectiles, so use boomerangs and bombs as you would in any other match. ****Counter the Counter**** Like Lucas, Ness counters Toon Link with quick small hits. Well use your quick small hits and Bomb Clouding to run supreame in a counter matchup. -------- Olimar -------- Olimar is nothing without pikmin, so try to kill his pikmin and hit him in the same attack, so Hurricane Balde attacks are very smart, both on the ground and midair. His only long distance attacks are pikmin throw and his Pikmin Chain, which you should avoid at all costs, as the Chain can have very long reach when he has a lot of pikmin. Play a "Comboed" match by using both projectiles to abuse his lack of long distance attacks and physical attacks to keep him distanced and also pressured to pluck more pikmin. Play smart. ****Counter the Counter**** Well, all Olimars counter moves involve Pikmin. What does this mean? Well of course, kill the little vegetables. Use sword strikes and bombs to kill multiple pikmin at once and when olimar is pikminless he really can't do much to stop you. Avoid a the pikmin chain as its reach is broken when, as I will call it, fully pikminized. If you get pikmin thrown on you, hurricane blade or Bomb Cloud them off, that simple. It's kind of like in the windwaker when those little spiky things latch onto you. Just spin them off. ------- Peach ------- Peach is pretty weak close range, and is much more feirce midair and at a distance with her Vegetable throws. Projectiles can be blocked by her Toad attack so a "Physical" game is the best option. Use throws and basic attacks to weaken her an then finaly use side smashes and up smashes to KO her. Just keep attacking her fast and she should he easy. ****Counter the Counter**** Players who play peach know very well that her turnips are like Toon Links bombs, in that they are hard to dodge. The biggest threat is the vegetables intercepting your bombs as the toad can't do it. Scary she can counter the bombs, but that doesn't render them useless. She will throw turnips on you if she is grounded and you are midair, so thats not going to work. I recommend you get very close and personal and teach that bitch a lesson or two with a very sharp object. She can't counter swords for shit as far as I know, so quick small or strong sword strikes work best to stop the turnip madness. Also bomb clouding is an option if you get stuck. Just don't let vegetables be the end of you. --------- Pikachu --------- Annoying as hell. Pikachu has 3 moves that can be abused the hell out of, Volt Drive (side smash), Discharge (down smash), and Thunder (down special). So the best thing you can do is to keep out of range of these attacks, and discharge can be spammed the hell out of, so almost never stand next to pikachu, as thunder is also viable here. Using Boomerang throws to knock pikachu back as you jump around playing a "hit and run" "projectile" game is key. Throwing bombs is also very important. Sword Drops (down midair) are slightly harder to connect as thunder can interrupt it, but very rarely, this is where “bomb drops” are used. A bomb drop is jumping above the foe with a held bomb throwing it down to stun the opponent and then do a sword drop to get a square hit. This should work well. The tip of volt drive is weaker than the start shock from pikachus face, so staying further back is good. Midair fighting, Toon Link gains the advantage, so an aerial game may work if pikachu doesn't do thunder jumps (jumping forward and casting thunder but the bolt never hits pikachu to stun him for a few seconds). Arrows are good for racking up damage, and sword spins are a good idea if pikachu closes up on you as its startup time is great. ****Counter the Counter**** Thunder counters everything aerial and can be used in a fancy way by jumping then summoning the bolt of lightning down and continuing moving forward in the air to ignore the bolt feedback on the little yellow pokemon which can help it set itself up for another aerial. If that bolt is flying, you better run for cover. If you are playing on a stage with platforms that can stop the bolts, use this to your advantage to stop pikachus thunder madness and then you can work with aerials again. Thunder shock can be blocked with Links tiny shield as far as I remember to if that little spark is comming towards you stop and let the shield take the bolt. Bombs are a great tool to use to stop any sort of combo pikachu may start. Always remember to have a bomb in hand at all times in any battle to open up millions of counters and options. Bomb Clouding can be your best friend... Even though it hurts you a little. ----- Pit ----- Pit is annoying and should never be fought from a distance. Watch out for players spamming his Angel Ring. Aerial attacks are your best bet and fight close to keep him slighly more limited. Just keep bashing away and dodging his attacks and victory should be easy. Also keep clear from a foe who spams his ultra fast Palutuna's Arrows's, as they can also be altered in trajectory by using the joy stick. ****Counter the Counter**** Pit can angle his Angel Arrows, so be cautious of this as the fact they can be fired a high speeds. A pit player will use evasion and smashes to stop Toon Link, so lets use stun items such as the boomerang and the bombs. Every time he tries to run past you throw a bomb in his direction to stop him and then run in for a good hit. (C) stick is good for aiming the bomb throws so use this if you are using the gamecube controller or the classic controller. ----------------- Pokemon Trainer ----------------- Pokemon Trainer has three movesets... ----------- Charizard ----------- Charizard is the heavy weight so fight him like any other slow big character, use "projectiles" and "Hit and Run" strategys. Aerials are good for beating up charizard and bomb comboes work well. Just keep distance, apply projectile pressure and hit hard when the opportunity arises. --------- Ivysaur --------- Ivysaur likes projectiles so a "Physical" strategy is the best option. Keep hitting him with quick basic and smash attacks as well as throwing in some grabs. Just keep close and play grounded and Ivysaur should be a piece of cake. ---------- Squirtle ---------- Squirtle is fast and his up smash is powerful. But that doesn't mean a projectile game is a good idea. He is quick enough to dodge many of those kinds of attacks. So keep close and hit him with your fastest moves and keep a "Physical" game going. ****Counter the Counter(s)**** Most likely you will be seeing Ivysaur the most in this counter matchup. His bullet Seed is an insane aerial counter even for Blade Drops. Well bombs counter this, Bomb + Sword Drops can stop the seeds and allow you to get that nice clean hit in. Razor Leaf is a pain as a projectile so try to keep the game close range to stop the leafs. Squirtle has a little move called withdrawl which can stop most attacks from doing anything. If you don't know which move this one is, its the one where he swirls around in his shell like a red shell and is his (B) + (<) or (>) move. Charizard's Earthquake (Down smash) is a pain as it interputs all grounded foes. Why not shot hop to avoid this pain if the opponent uses it too much. When charging any moves, be aware that squirtle can counter these slow to start moves with a fully charged Water Gun, which will almost always be charged up to be used. So quick hits instead of charaged ones are better to stop the squirtle counter moves. Squirtles down smash has a lot of priority, and is the move that shows two burst of water exploding from the ground one on his right side and another on his left. If you so your oppenent using this too much, start using projectiles instead despite his small size. Bombs can be used to stop squirle from charging a water gun, so use them when he starts charging it. -------- R.O.B. -------- R.O.B. is a projectile player, so a "Physical" game is a good idea. Most of his close range attacks aren't too dangerous so keep hitting him with quick basic and smashes. Boomerang and bombs work too but try to keep them at a minimal. Rob is also not too hot at aerial combat so midair attacks work well as well as antiair ground attacks. Just keep applying physical pressure. ****Counter the Counter**** Watch out for that gyro top thingy. That thing at full charge is hella annoying and works wonders for counters. Also his recovery move has a lot of gas and will help him dodge all sorts of attacks. One thing to notice is that when he uses his midair attacks his character actually stops midair. So this is almost like him being stunned while attacking. Use bombs and boomerangs to stop his run aways maddness and use projectiles to stop the gyro top as that thing can be a pain in the ass. Toon Link doesn't like that gyro top as it is fast and hard to counter. ------- Samus ------- Samus is good with projectiles but very poor at aerial combat, so aerials are really good for this match up. Keep close and play either a "Physical" or "Defensive" game. Watch out for her down basic as it has fantastic power and launch power, and that should be your most feared close range attack from her as well as her side and down smashes. Just keep close and don't let her use missiles or power beam attacks. Sword Drops also work well here and bomb comboes are also viable. ****Counter the Counter**** Guess what, a samus player may find using projectiles a good counter, but for you, standing still and leting the small shield take the missile works. Sadely a fully charged charge beam cant be blocked, so take note on this. Samus was the character that invented the Bomb Clouding and she is good at it. She will use bombs over and over again and when using it she rolls into a small morph ball which makes her harder to see and hit as well. Don't let her bomb cloud you, as she doesn't have anything to lose doing it unlike you who takes damage. Try to keep some distance but also try to stay in close. Watch out for samuses down standard (A) attack which has her aiming her connon to the ground then a big burst of explosion comes out which has extreamely high KO potential and is quite likely one of her best moves, by a longshot. If you face a player using this move a lot, stay aerial to avoid it. ------- Sheik ------- Sheik is fast and being so she is good to stay close to. Her attacks may be faster but if you play a "Defensive" game, you should have the upper hand. Beware of her needle attacks as they can iflict a good deal of damage. Just keep dodging and hiting back. This is a basic stratagy but really there isn't much else to say except that aerials also can work well in this matachup. ****Counter the Counter**** Shieks needles can be countered with a stand still small shield block, so if she plans on using them, don't move let the shield take it. Her chain can be annoying, but if you are holding a bomb, your in luck, it will explode and get you out of the chain frenzy and let you hit her when she tries to recover by pulling the chain in. A player who really plan to counter Toon Link will use a hit and run type of strategy, so lets stop it with some up (A) moves, bombs, boomerangs, and down smashes. problem solved. ------- Snake ------- Snake is hard thing to deal with, as he is both good at ranged and close quarters combat. His up smash is highly spamable and when charged had amazing vertical reach. First he can use the up smash to have the mortar hit you up into the air above it and then the bomb comes out and hits you with a good chance of a KO. Try not to play too close to Snake as this single move combo can be a bitch. His forward smash is very slow but also very very strong and can KO at very low percents. Dodge if you see it comming. His grenades and rockets are annoying if they hit you, so try to stay a decent distance away from him and try to play a "hit and run" game while also using projectiles to dish out damage. Snake is only decent midair, but Toon Link has much better aerials than him, so fighting midair can also be ideal. Just avoid all the explosives and you should be fine. ****Counter the Counter**** His mortar cannon can counter your aerials, so if your foe spams them, don't jump on top of him and try to hit him, he'll just blast you out of the sky. snake can also short throw his grenades so be warry of this and be ready to shield. Really, snakes only counter attack is the mortar so just stop jumping if he spams it. ------- Sonic ------- Sonic is fast, and hard to hit, but he is also very bad at knocking foes off the stage, so stay close and use running grabs, smashes, and running attacks. Do this and he is pretty much hindered to play a speed game. Just keep adding pressure and hit hard and fast. Boomerangs are good choice to stop his running and short hop aerials can work as well. Just use fast attacks. ****Counter the Counter**** A sonic player countering Toon Link will utilize his rolling moves. So learning to side step these are important. Also, his homing spin is annoying and I really don't know much to say about it. Bombs are great to stop the rushing demon and boomerangs do well to stop those rolling attacks as well. ----------- Toon Link ----------- Er, this is tough, just try to hit before him and play a more aerial game. Facing yourself is tough but if you can do everything the opponent can but better, you can win. Projectiles are not the best option, smashes are! Use strong attacks as well as basic and aerials. Play a "Physical" game, and you should be able to hold on and beat him. ****Counter the Counter**** ....Read above....Seriously.... ------- Wario ------- Wario is a heavy weight but is also a very bad at playing against a "Hit and Run" strategy. Aerials and projectiles work amazingly here so just keep spaming them and dodging. Try to avoid and close range fighting unless you are going in for a short hop aerial. Sword Drops work well here and any combos you can think of should work good too. ****Counter the Counter**** Wario's Bike can stop most of Toon Links projectiles. So if you opponent knows about this, your match up will be a bit harder. Try to knock him of his bike with Sword Drops and bombs, I believe can still deal damage to the bike. If his bike is on the ground, go ahead and throw it on him for laughs. His chomp attack (basic (B)) can swallow up thown items, even bombs (eww, sulfur in the system can't be good for you Wario, bad choice...) So if the jaws open dont throw stuff at it. However if the object is large enough, it takes him a while to digest it, giving ample time to smash the hell out of the large jawed freak. ------ Wolf ------ Wolf is slower than Fox and Falco, but he is still quick and strong. His side smash has almost no start up time so watch out for them. His basic attacks are also good, but by appling Hurricane Blade attacks to suck him in and end his attack frenzys will help you dearly in the long run. Playing aerial is also good but watch out for his Wolf Flash as it can be used as an antiair attack. Just keep playing a "Physical" game and avoid using projectiles as he still has the ability to use a Reflector. ****Counter the Counter**** Wolf can counter projectiles, but we already knew this... Use the same stategy for wolf as fox and falco, if he is above you, thow a bomb up and chain it with a up Aerial or a Hurricane Blade. Wolf's > smash is annoying so try to play more hit and run if your opponent is a fan of this move. ------- Yoshi ------- Almost any strategy will work. So try many things out, Yoshi doesn't excel in any one area but he is still a all around decent player. So watch for how your foe plays him and try to play off of that. Yoshi counts as a mid heavy weight so he can be a little hard to KO at some times. Watch out for his Yoshi Bomb attack as it has good power like bowsers Bowser Bomb. ****Counter the Counter**** Yoshi has no counter except he can throw eggs to stop bombs, but that takes extreame skill to do. Other than that he has nothing to threaten Toon Link. ------- Zelda ------- Zelda is a long range fighter and uses projectiles. So a close fight is good, but her smashes also have a lot of power so, playing "Defensive" is the best option for this scenario. Also, Zelda isn't too great in the aerial department so try and hit her with a lot of aerials. Basic and smashes are both your primary options and should be used the most. Projectiles are worthless as Nayru's Love can reflect any projectile. Her Din's Fire can be aimed to hit far or close, high or low, so keep an eye out for that attack as well. ****Counter the Counter**** Nayru's Love counters all of Toon Links projectiles, so only use bombs for sword drops. A smart Zelda player will try to stay very far away from you and use Din's Fire to hit you at extreamely long range, and it can be aimed. My advice to stop the little ball of fire... Jump. Yes, jump is a good idea. If the player is trying to be a projectile Zelda, get in close and give the bitch some of your blade. Aerials work wonders as they make din's fire hard to connect. ----------------- Zero Suit Samus ----------------- She can be tough, and at close range she dominates. Play a "Projectile" game and steer clear from all her plasma attacks especially the Plasma Wire as it pulls you in. Just keep using bombs, arrows, and dash attacks. Stay clear from any of her paralysis attacks as they can equal doom to you. Use your shield often to keep the plasma attacks from hiting you. Hurricane Blade is also a good choice but time it well when using it. Grabs can work but you have to be very careful. When she is at a high percent try using smashes to KO her. This can be a hard match up, but practice makes perfect. ****Counter the Counter**** Again like I stated above, all her paralysis attacks are key to stoping Toon Link and they are by far some of the best attacks in the game. Her whip has some crazy range and never say she doesn't have antiair counters because, if you are above her, she can either hit you with a up midair or a plasma wire that sucks you in to her area where she can follow up with a stun then a nice clean kick or zap. Keep bombs going and use them to stop her from using a plasma wire to counter a Sword Drop. I recommend using bombs to start attacks then rushing in to get the nice hit in. That is a safe way to go. ------------------------------------------------------------------------------- -------------- | XV. Q&A | -------------- Question: What tier is Toon Link in? Is he on top or underused? Answer: There is no official tier and I expect there won't be one for a while. But personally, Toon Link, IMO, would be in the Top 5 characters of Brawl, but I'm sure others would think so otherwise. -- Question: Why do you think Toon Link is better than Link? Link is way better!!! Your retarded!!! Answer: I never said Toon Link was better than Link. Based on statistics and the boards, Toon Link is better, but still, all the characters in Brawl are balanced, and no character is better than the other. It's really based on the player using the character. -- Question: Dude, what’s your friend code? Answer: I don't know you... -- Question: Hey some of the shit you said was sooooo wrong! ~ is way better than you say! And ~ doesn't do ~ thing. Answer: Really! Well if you know something I don't, send me an email via [email protected] and tell me about it, I’ll look into it and possibly add it to my next edit. I will also put full credit on the find to you! Good deal, really... -- Question: This guide SUCKS!!! WTF, ROFLMAO!!! Answer: You suck... -- Question: There are some Techniques that you didn't cover that are all over the boards... Why don't you have them in this guide? Answer: Well if there is a new technique I haven’t heard of, email me, I'll look into it and possibly add it to my next edit. -- Question: I don't agree with your character strategy, there are much better ways to beat __________!!! Answer: Hrm, well email me about it and I'll cheak it out. If it works I'll add it to my next edit and put full credit from you in the guide under that characters section! I'll keep mine up but there will also be yours to think about as well. I'm also looking for experienced players with other characters to give me more tips on fighting their character. -- Question: Is Toon Link like the Young Link for Brawl? Answer: By all means no. They are way different. Young Link was basically the same as Adult Link in Melee, but young link could run in a trade for weight and strength. He also had fire arrows. Toon Link is much more different in that most of his projectiles, namely the bow, fly much straighter and farther. His boomerang does a lot more than young links, and his general attack range (his sword) is much larger. In a way, I guess you could call him a buffed up Young Link. Toon Link runs faster as well. If you were a fan of Young Link in Melee, I would still say that you would probobly like Toon Link more than Link, but if you liked Adult Link in Melee, Link is still for you. ------------------------------------------------------------------------------- ------------------------- | XVI. Special Thanks | ------------------------- -First of I would like to than Nintendo and HAL Lab's for creating this great game! I can't wait for the next Super Smash already!!! -I would like to thank Gamefaq for hosting this guide as well as any other websites that are hosting this guide as well, you guys rock!!! -I would like to thank Eskimomario550 for his email about Ness and Lucases, PSI Magnet only absorbing special projectiles not physical. I fixed this and am glad you pointed out my mistake. Also thanks for giving me more info on the midair hookshot. It's much better than we initialy thought and I am glad you emailed me about this. -I would like to thank Tenks, Paul Choi, and Jordan Lovato for emailing me about the Bomb Jumps. I am glad to add it to my guide and thank you for your contribution. -I would like to thank Ron Baumsteiger for emailing me about the boomerang and Nair's usefulness. I have added more about them in edit 1.5 and am glad that you pointed out the usefulness of these moves more than I intitialy described. -I would like to thank Shreeram for emailing me about me saying Toon Links arrows are faster than Links. I made a typo and fixed it in edit 1.5. Thanks a lot! -I would like to thank James Jelin for emailing me about adding more to the Link vs. Toon Link section. I have added the bomb radius and Dair bounce and speed to the section in edit 1.5. Thanks again. -I would like to thank o0frozen for emailing me about editing my Snake matchup section. I made this a large edit in 1.6 so my thanks are unlimited. -I would like to thank Rundogrun1189 for the Dedede advice. Projetile games arent the best option, thanks for the background DDD experience and telling me about the Waddle Dee/doo's being used as a sheild of sorts. -I would like to thank Gary O'donnel for the fan throwing combos idea. -I would also like to thank Kenneth Li for advising me to add the Bomb invincibility to the bomb clouding technique. -I would like to thank the boards for being so damn fast at retrieving info, so that I could get some of my facts straight. -Thanks to some of my friends at home for helping me get all the statistics for Toon Link. -I would also like to thank all those who have found this guide useful, thanks for being supportive. -I would also like to thank all those Toon Link fans out there. TOON LINK FTW! ------------------------------------------------------------------------------- ------------------------ | XVII. Legal Stuff | ------------------------ Super Smash Bros. Brawl and Toon Link are both official trademarks of Nintendo (C), HAL Laboratory (C), and Sora Ltd (C). This Guide is Copyright 2008 Vamper62. Guide Hosts: ---------------- |Gamefaq.com | |Neoseeker.com | |SuperCheats.com | ---------------- Copyright 2008 Vamper62 Contact at [email protected] View in:
https://www.gamefaqs.com/wii/928518-super-smash-bros-brawl/faqs/52292
CC-MAIN-2017-39
en
refinedweb
[Solved] Why the compiler can't search the sub-dir of the standard include-search-path? Hi, every one! I'm just building Qt 5.4.1 with MinGW 4.9.2 in MSYS2. for the support of glib, I download the glib library of MinGW in MSYS2, and install it in the MinGW's default include-and-library paths with MSYS2(/MinGW64/include and /MinGW64/lib). But after installing library, the header and library files of glib are stored in a sub-dir which is named with 'glib-2.0' of every include and library dirs. While compiling the Qt, I passed the parameters to ./configure like this: -opensource -glib -I ./glib-2.0 -L ./glib-2.0 But when compiling, I got the following error message : In file included from glib.cpp:36:0: C:/Qt/msys64/mingw64/include/glib-2.0/glib.h:31:25: fatal error: glib/garray.h: No such file or directory #include <glib/garray.h> ^ compilation terminated. Makefile:161: recipe for target 'glib.o' failed make: *** [glib.o] Error 1 Glib disabled. Glib support cannot be enabled due to functionality tests! Use of pkg-config is not enabled, maybe you want to pass -force-pkg-config? Turn on verbose messaging (-v) to /d/myprojects/qtc/src/qtbase/configure to see the final report. If you believe this message is in error you may use the continue switch (-continue) to /d/myprojects/qtc/src/qtbase/configure to continue. I have checked the dir /MinGW64/include, and found the file 'garray.h' and many other header files are stored in dir 'glib-2.0/glib/'. So I thought the compiler should be able to find the specified file. But why it can't ? and how to resolve it ? Are you sure './' in your include paths (-I and -L) is the right directory to start in? @sierdzio Thanks for your replying! Actually, I'm not sure './' is correct. But if I doesn't pass parameters to ./configure with '-I ./glib-2.0' like above mentioned, I'll got an error message that says 'can not find glib.h: No such file or directory'. So I think './' should worked, as descripted above , partially. So, what's wrong with it? Can you help me? Thx. './' means "current directory", so the directory where you run configure. This is probably the same directory where your Qt source code is located - it does not contain glib. So I would advise to pass a proper, non-relative path to glib there instead. @sierdzio Thx! I've tested on replacing full path to '-I' option with './' as you memtioned, and it worked well ^-^! Thank you very much! You are welcome. Happy coding
https://forum.qt.io/topic/52441/solved-why-the-compiler-can-t-search-the-sub-dir-of-the-standard-include-search-path
CC-MAIN-2017-39
en
refinedweb
New magic and clock behaviour¶ Clocks¶ The rule for clocks in Brian 1 was that you would either specify a clock explicitly, or it would guess it based on the following rule: if there is no clock defined in the execution frame of the object being defined, use the default clock; if there is a single clock defined in that execution frame, use that clock; if there is more than one clock defined, raise an error. This rule is clearly confusing because, for a start, it relies on the notion of an execution frame which is a fairly hidden part of Python, even if it is something similar to the (relatively clearer) notion of the calling function scope. The proposed new rule is simply: if the user defines a clock use it, otherwise use the default clock. This is not quite as flexible as the old rule, but has the enormous virtue that it makes subtle bugs much more difficult to introduce. Incidentally, you could also change the dt of a clock after it had been defined, which would invalidate any state updaters that were based on a fixed dt. This is no longer a problem in Brian 2, since state updaters are re-built at every run so they work fine with a changed dt. It is important to note that the dt of the respective clock (i.e. in many cases, defaultclock.dt) at the time of the run() call, not the dt during the NeuronGroup creation, for example, is relevant for the simulation. Magic¶ The old rule for MagicNetwork was to gather all instances of each of the various classes defined in the execution frame that called the run() method (similar to clocks). Like in the case of clocks, this rule was very complicated to explain to users and led to some subtle bugs. The most pervasive bug was that if an object was not deleted, it was still attached to the execution frame and would be gathered by MagicNetwork. This combined with the fact that there are, unfortunately, quite a lot of circular references in Brian that cause objects to often not be deleted. So if the user did something like this: def dosim(params): ... run() return something results = [] for param in params: x = dosim(params1) results.append(x) Then they would find that the simulation got slower and slower each time, because the execution frame of the dosim() function is reused for each call, and so the objects created in the previous run were still there. To fix this problem users had to do: def dosim(params): clear(True, True) ... run() return something ... While this was relatively simple to do, you wouldn’t know to do it unless you were told, so it caused many avoidable bugs. Another tricky behaviour was that the user might want to do something like this: def make_neuron_group(params): G = NeuronGroup(...) return G G1 = make_neuron_group(params1) G2 = make_neuron_group(params2) ... run() Now G1 and G2 wouldn’t be picked up by run() because they were created in the execution frame of make_neuron_group, not the one that run() was called from. To fix this, users had to do something like this: @magic_return def make_neuron_group(params): ... or: def make_neuron_group(params): G = NeuronGroup(...) magic_register(G, level=1) return G Again, reasonably simple but you can’t know about them unless you’re told.
http://brian2.readthedocs.io/en/2.0a8/developer/new_magic_and_clocks.html
CC-MAIN-2017-39
en
refinedweb
What is the recommended approach to combine two instances from torch.utils.data.Dataset? torch.utils.data.Dataset I came up with two ideas: class Concat(Dataset): def __init__(self, datasets): self.datasets = datasets self.lengths = [len(d) for d in datasets] self.offsets = np.cumsum(self.lengths) self.length = np.sum(self.lengths) def __getitem__(self, index): for i, offset in enumerate(self.offsets): if index < offset: if i > 0: index -= self.offsets[i-1] return self.datasets[i][index] raise IndexError(f'{index} exceeds {self.length}') def __len__(self): return self.length itertools.chain loader = itertools.chain(*[MyDataset(f'file{i}') for i in range(1, 4)]) Doesn't itertools.chain return an iterator that will go over them only once? I think there's no recommended way, it's all down to a personal taste Ah yes itertools.chain would only do one epoch so we would be better of with something like: x = itertools.repeat(itertools.chain.from_iterable([dataset1, dataset2]), times=epochs) next(next(iter(x)) # or for epoch in x: for (inputs, targets) in epoch: print(inputs) Not sure if that's going to work. It can break if itertools.chain iterator is not immutable (and it's probably not). It would be simpler to do this (or use the wrapper dataset): for epoch in range(num_epochs): dset = itertools.chain(...) dloader = # create DataLoader for ... in dloader: ... I can not pass the itertools.chain instance to torch.utils.data.DataLoader class while the former does not support len(). torch.utils.data.DataLoader len()
https://discuss.pytorch.org/t/combine-concat-dataset-instances/1184
CC-MAIN-2017-39
en
refinedweb
Convert Python's pickled data into XML, or excel format Bütçe €30-250 EUR Hello folks, I have multiple data files, stored in python's .pkl format. I need to create some utility, which would unpickle data, decode them and save in XML or any other readable format (or into MS Excel), so it could be later imported into Oracle database. A test file which needs to be converted is attached. As an output is expected, an utility (script) which will read all files in selected directory and converts them to desired formats (xml) into output directory. Should be an easy task for somebody who is familiar with python. Thanks, Tomas A basic script to start: import pprint, pickle, json pkl_file = open('[url removed, login to view]', 'rb') data1 = [url removed, login to view](pkl_file) [url removed, login to view](data1) >> print unpickled structired data. This output needs to be converted into XML format data_json = [url removed, login to view](data1) >> this fails [url removed, login to view]() Import into Oracle database in not part of this project. Seçilen: Hello, I am a python developer. I will be glad to help. I can use openpyxl package to create excel output file for you. Or using lxml library for xml generation. Regards,
https://www.tr.freelancer.com/projects/excel-python/convert-python-pickled-data-into/
CC-MAIN-2017-39
en
refinedweb
Package testing Overview ▹ Overview ▾ Package testing provides support functions for testing iterators conforming to the standard pattern. See package google.golang.org/api/iterator and. TestIterator ¶ func TestIterator(want interface{}, create func() interface{}, next func(interface{}) (interface{}, error)) (string, bool) TestIterator tests the Next method of a standard iterator. It assumes that the underlying sequence to be iterated over already exists. The want argument should be a slice that contains the elements of this sequence. It may be an empty slice, but it must not be the nil interface value. The elements must be comparable with reflect.DeepEqual. The create function should create and return a new iterator. It will typically look like func() interface{} { return client.Items(ctx) } The next function takes the return value of create and should return the result of calling Next on the iterator. It can usually be defined as func(it interface{}) (interface{}, error) { return it.(*ItemIterator).Next() } TestIterator checks that the iterator returns all the elements of want in order, followed by (zero, done). It also confirms that subsequent calls to next also return (zero, done). If the iterator implements the method PageInfo() *iterator.PageInfo then exact pagination with iterator.Pager is also tested. Pagination testing will be more informative if the want slice contains at least three elements. On success, TestIterator returns ("", true). On failure, it returns a suitable error message and false.
http://docs.activestate.com/activego/1.8/pkg/google.golang.org/api/iterator/testing/
CC-MAIN-2019-18
en
refinedweb
This is the mail archive of the cygwin mailing list for the Cygwin project. I am using R 2.14.2-1 under cygwin 1.7.12-1 in Windows 7 Professional Service Pack 1. In the past I found very desirable to modify the RODBC package to access the Windows ODBC connections in R under cygwin: This enables NTLM authenticated connections to Oracle and sql server databases using the Windows ODBC drivers. I am considering to submit the corresponding patch request (see below) to the RODBC 1.3-5 package maintainers. The patch is pretty much an exact copy of an old patch present in cygwin-ports:;a=summary Before installing the package I also a need to define ac_cv_search_SQLTables as specified below. I am a novice using R and cygwin. Is there a way to patch RODBC_1.3-5.tar so that ac_cv_search_SQLTables is automatically defined when the package is installed under cygwin? Would it be better to leave it undefined, and define it at the command prompt as specified below? Maybe in that way people will still be able to use libiodbc-devel library if they want to do so. Let me know if you have any advice on how to proceed. Thanks, Dario Modify RODBC\src\RODBC.c in RODBC_1.3-5.tar as follows: ---------------------------------------------------------------------- --- RODBC.c_bk 2012-03-08 22:01:02.000000000 -0800 +++ RODBC.c 2012-04-22 09:14:54.353868700 -0700 @@ -41,6 +41,12 @@ #include <string.h> #include <limits.h> /* for INT_MAX */ +#ifdef __CYGWIN__ +#define WIN32_LEAN_AND_MEAN +#include <windows.h> +#undef WIN32 +#endif + #define MAX_CHANNELS 1000 #include <sql.h> #include <sqlext.h> ---------------------------------------------------------------------- Installation procedure under Cygwin to access the windows ODBC DNSs: export ac_cv_search_SQLTables="-lodbc32" R CMD INSTALL RODBC_1.3-5.tar.gz -- Problem reports: FAQ: Documentation: Unsubscribe info:
http://cygwin.com/ml/cygwin/2012-04/msg00473.html
CC-MAIN-2019-18
en
refinedweb
Provided by: libcoin80-doc_3.1.4~abc9f50-4ubuntu2_all NAME SoIndexedNurbsSurface - The SoIndexedNurbsSurface class can be used to render NURBS surfaces. It is very similar to the SoNurbsSurface class, but controlpoints can be specified using indices. SYNOPSIS #include <Inventor/nodes/SoIndexedNurbsSurface.h> Inherits SoShape. Public Member Functions virtual SoType getTypeId (void) const Returns the type identification of an object derived from a class inheriting SoBase. This is used for run-time type checking and 'downward' casting. SoIndexedNurbsSurface (void) virtual void GLRender (SoGLRenderAction *action) virtual void rayPick (SoRayPickAction *action) virtual void getPrimitiveCount (SoGetPrimitiveCountAction *action) void sendPrimitive (SoAction *, SoPrimitiveVertex *) Static Public Member Functions static SoType getClassTypeId (void) static void initClass (void) Public Attributes SoSFInt32 numUControlPoints SoSFInt32 numVControlPoints SoMFInt32 coordIndex SoMFFloat uKnotVector SoMFFloat vKnotVector SoSFInt32 numSControlPoints SoSFInt32 numTControlPoints SoMFInt32 textureCoordIndex SoMFFloat sKnotVector SoMFFloat tKnotVector Protected Member Functions virtual const SoFieldData * getFieldData (void) const virtual ~SoIndexedNurbsSurface () virtual void generatePrimitives (SoAction *action) virtual void computeBBox (SoAction *action, SbBox3f &box, SbVec3f ¢er) SoDetail * createTriangleDetail (SoRayPickAction *action, const SoPrimitiveVertex *v1, const SoPrimitiveVertex *v2, const SoPrimitiveVertex *v3, SoPickedPoint *pp) Static Protected Member Functions static const SoFieldData ** getFieldDataPtr (void) Additional Inherited Members Detailed Description The SoIndexedNurbsSurface class can be used to render NURBS surfaces. It is very similar to the SoNurbsSurface class, but controlpoints can be specified using indices. FILE FORMAT/DEFAULTS: IndexedNurbsSurface { numUControlPoints 0 numVControlPoints 0 coordIndex 0 uKnotVector 0 vKnotVector 0 numSControlPoints 0 numTControlPoints 0 textureCoordIndex -1 sKnotVector 0 tKnotVector 0 } Constructor & Destructor Documentation SoIndexedNurbsSurface::SoIndexedNurbsSurface (void) Constructor. SoIndexedNurbsSurface::~SoIndexedNurbsSurface () [protected], [virtual] Destructor. Member Function Documentation SoType SoIndexedNurbsSurface:IndexedNurbsSurface::getFieldData (void) const [protected], [virtual] Returns a pointer to the class-wide field data storage object for this instance. If no fields are present, returns NULL. Reimplemented from SoShape. void SoIndexedNurbsSurface:IndexedNurbsSurface::rayPick (SoRayPickAction *action) [virtual] Calculates picked point based on primitives generated by subclasses. Reimplemented from SoShape. void SoIndexedNurbsSurface:IndexedNurbsSurface::sendPrimitive (SoAction *, SoPrimitiveVertex *) This method is part of the original SGI Inventor API, but not implemented in Coin, as it looks like a method that should probably have been private in Open Inventor. void SoIndexedNurbsSurface:IndexedNurbsSurface::computeBBox (SoAction *action, SbBox3f &box, SbVec3f ¢er) [protected], [virtual] Calculates the bounding box of all control points and sets the center to the average of these points. Implements SoShape. SoDetail * SoIndexedNurbsSurface:. Member Data Documentation SoSFInt32 SoIndexedNurbsSurface::numUControlPoints Number of control points in the U direction. SoSFInt32 SoIndexedNurbsSurface::numVControlPoints Number of control points in the V direction. SoMFInt32 SoIndexedNurbsSurface::coordIndex The coordinate control point indices. SoMFFloat SoIndexedNurbsSurface::uKnotVector The Bezier knot vector for the U direction. SoMFFloat SoIndexedNurbsSurface::vKnotVector The Bezier knot vector for the V direction. SoSFInt32 SoIndexedNurbsSurface::numSControlPoints Number of control points in the S direction. SoSFInt32 SoIndexedNurbsSurface::numTControlPoints Number of control points in the T direction. SoMFInt32 SoIndexedNurbsSurface::textureCoordIndex The texture coordinate control point indices. SoMFFloat SoIndexedNurbsSurface::sKnotVector The Bezier knot vector for the S direction. SoMFFloat SoIndexedNurbsSurface::tKnotVector The Bezier knot vector for the T direction. Author Generated automatically by Doxygen for Coin from the source code.
http://manpages.ubuntu.com/manpages/trusty/man3/SoIndexedNurbsSurface.3.html
CC-MAIN-2019-18
en
refinedweb
Build an app to learn about the power and flexibility of RxJS in Angular while exploring speech recognition with Web Speech API. TL 2 of our 2-part tutorial. RxJS Advanced Tutorial With Angular & Web Speech: Part 1 covered pick up right where we left off. Angular App Keyboard Component Not all browsers support speech recognition. If we view our app right now in a browser that doesn't, we'll see nothing but a header. An app that doesn't work in most browsers isn't useful. Let's make a Keyboard component to use in place of the Listen component so users with unsupported browsers can still create a fun madlib using the Words Form component. "An app that doesn't work in most browsers isn't useful: implement fallbacks for browsers that don't support features." Create another new component with the Angular CLI like so: $ ng g component keyboard Keyboard Component Class Open the keyboard.component.ts file and implement the following code: // src/app/keyboard/keyboard.component.ts import { Component } from '@angular/core'; import { Words } from './../words'; @Component({ selector: 'app-keyboard', templateUrl: './keyboard.component.html', styleUrls: ['./keyboard.component.scss'] }) export class KeyboardComponent { nouns: string[] = new Words().array; verbs: string[] = new Words().array; adjs: string[] = new Words().array; constructor() { } } This is a very simple component that primarily consists of a template. It is, however, still going to be a parent component (with Words Form as a child), so we'll import the Words class and set up the nouns, verbs, and adjs arrays like we did in the Listen component. We can then pass these as inputs to the Words Form component. Keyboard Component Template Let's open the keyboard.component.html file and add our template: </p> <!-- src/app/keyboard/keyboard.component.html --> <div class="alert alert-info mt-3"> <h2 class="text-center mt-3">Type Words to Play</h2> <p>You may enter your own madlib words in the fields below. Here are some examples:</p> <ul> <li> <strong>Noun:</strong> <em>"cat"</em> (person, place, or thing)</li> <li> <strong>Verb:</strong> <em>"jumping"</em> (action, present tense), <em>"ran"</em> (action, past tense)</li> <li> <strong>Adjective:</strong> <em>"flashy"</em> (describing word)</li> </ul> </div> <p><app-words-form></app-words-form> This simply adds some instructions similar to the Listen component and displays the WordsForm component. Add Keyboard Component to App Component Now let's display the Keyboard component instead of the Listen component if speech is not supported. Open the app.component.html template and make the following addition: </p> <!-- src/app/app.component.html --> <div class="container"> <h1 class="text-center">Madlibs</h1> <app-listen></app-listen> <app-keyboard></app-keyboard> </div> <p> Now if speech recognition is not supported, the user will see the Keyboard component and can still enter words manually with the form. The app should look like this in a browser that doesn't support speech recognition: Generate Words With Madlibs API Now that we can speak and type words to generate a madlib, there's one more method we want to offer to users to create their custom story: automatic word generation using a prebuilt Node API. Set Up Madlibs API Clone the madlibs-api locally to a folder of your choosing. Then open a command prompt or terminal window in that folder and run the following commands: $ npm install $ node server This will install the required dependencies and then run the API on localhost:8084. You should be able to visit the API in the browser at to confirm it's working properly. You can then access its endpoints. Check out the repository's README to see all the available endpoints. You can try them out in the browser to see what they return (for example,). Take a minute to become familiar with the API and its endpoints and give some thought to how we might leverage the API in our application to generate arrays of the different parts of speech. Intended Functionality to Generate Words With API Now that you have the madlibs API set up and running and you've familiarized yourself with how it works, let's consider what our intended functionality is. Recall the specifics of what we're expecting the user to respond with based on our word arrays and the Words Form placeholders. In order to generate the appropriate words automatically, we'll need the following from the API: - An array containing 5 nouns: 1 person, 2 places, and 2 things - An array containing 5 verbs: 2 present tense and 3 past tense - An array containing 5 adjectives The API, however, does not return arrays, it returns single text strings. Also, we have different endpoints for people, places, things, present and past tenses, etc. How can we reconcile the API functionality with our requirements? Luckily, we have RxJS available to us! Let's explore how we can use this powerful library to get exactly what we want from the API. Add HTTP to App Module The first thing we need to do is add Angular HTTP to our App module. Open the app.module.ts file and add: // src/app/app.module.ts ... import { HttpClientModule } from '@angular/common/http'; ... @NgModule({ ..., imports: [ ..., HttpClientModule ], ... We'll import the HttpClientModule and add it to the NgModule's imports array, making the module available to our application. Add HTTP Requests to Madlibs Service Now open the madlibs.service.ts file. We'll add our HTTP requests to this file. // src/app/madlibs.service.ts ... import { HttpClient, HttpErrorResponse } from '@angular/common/http'; import { Observable } from 'rxjs/Observable'; import 'rxjs/add/operator/map'; import 'rxjs/add/operator/catch'; import 'rxjs/add/observable/zip'; import 'rxjs/add/observable/forkJoin'; @Injectable() export class MadlibsService { ... private _API = ''; constructor(private http: HttpClient) { } ... private _stringSuccessHandler(res: string): string { // Remove all double quotes from response // This is a product of receiving text response return res.replace(/"/g, ''); } private _errorHandler(err: HttpErrorResponse | any) { const errorMsg = err.message || 'Error: Unable to complete request.'; return Observable.throw(errorMsg); }$]); } getVerbs$() { const verbPresent$ = this.http .get(`${this._API}verb/present`, {responseType: 'text'}) .map(this._stringSuccessHandler) .catch(this._errorHandler); const verbPast$ = this.http .get(`${this._API}verb/past`, {responseType: 'text'}) .map(this._stringSuccessHandler) .catch(this._errorHandler); return Observable.forkJoin([verbPresent$, verbPresent$, verbPast$, verbPast$, verbPast$]); } getAdjs$() { const adj$ = this.http .get(`${this._API}adjective`, {responseType: 'text'}) .map(this._stringSuccessHandler) .catch(this._errorHandler); return Observable.forkJoin([adj$, adj$, adj$, adj$, adj$]); } getWords$() { return Observable .zip(this.getNouns$(), this.getVerbs$(), this.getAdjs$()) .map((res) => { return { nouns: res[0], verbs: res[1], adjs: res[2] }; }); } } Let's go over these additions step by step. First we'll add some new imports: HttpClient and HttpErrorResponse from Angular common, Observable from RxJS, and the map and catch RxJS operators. Next we'll add some new properties: _API to store the API URI and a words object to store the words retrieved from the API. We'll make HttpClient available to our component in the constructor. Next we have our private _stringSuccessHandler(). This method takes a text HTTP response and strips the double quotes ( ") that are automatically added to it, leaving just the word. We'll use this success handler with all of our API requests that return a text response. The private _errorHandler() method cancels the observable with an error message in case something went wrong with the request. Combining Observables With ForkJoin Next, let's take a closer look at the getNouns$() method (and the two methods that follow it, getVerbs$() and getAdjs$()).$]); } Notice that there are three HTTP requests declared as constants in the getNouns$() function: one each for retrieving a person, place, and thing. Each GET request expects a responseType: 'text'. Each text request is then mapped with our _stringSuccessHandler and has a catch method with our _errorHandler in case something went wrong. Recall that our app expects an array of nouns that includes one person, two places, and two things. Now that we have nounPerson$, nounPlace$, and nounThing$ observables set up, we can use the RxJS combination operator forkJoin to execute all observables at the same time and then emit the last value from each one once they are all complete. We'll return Observable.forkJoin(), passing in the array of observables we'd like to use in the expected order. If all requests are successful, subscribing to this observable will produce an array that looks like this: [person, place, place, thing, thing] We'll use forkJoin again with our getVerbs$() method to return a stream that emits an array of verbs in the following tenses: [present, present, past, past, past] To get adjectives, we'll forkJoin an adjective request five times, since all adjectives are the same, but each one requires its own request. This will result in: [adjective, adjective, adjective, adjective, adjective] Combining Observables With Zip Now we have observables for each of the three parts of speech our app expects: getNouns$(), getVerbs$(), and getAdjs$(). However, these are still separate streams. Ultimately, we don't want to subscribe to three different observables and wait for each to emit independently. Thanks again to RxJS, we can combine all three streams into a single observable: getWords$(). The zip combination operator allows us to pass multiple observables as arguments. After all the observables have emitted, the zipped observable emits the results in an array. getWords$() { return Observable .zip(this.getNouns$(), this.getVerbs$(), this.getAdjs$()) .map((res) => { return { nouns: res[0], verbs: res[1], adjs: res[2] }; }); } Once we receive the resulting array that includes the zipped arrays from the nouns, verbs, and adjectives observables, we'll map the response to an easy-to-read object. We can now subscribe to the getWords$() observable in components and receive an object that looks like this: { nouns: [person, place, place, thing, thing], verbs: [present, present, past, past, past], adjs: [adjective, adjective, adjective, adjective, adjective] } This is exactly what we want from the API when generating words, and it's easy to accomplish, thanks to RxJS. "RxJS operators like forkJoin and zip make it simple to combine HTTP request observables." Generate Words Component Now that we've implemented the necessary methods to get nouns, verbs, and adjectives from the API, it's time to put them to use in our application. Let's create a Generate Words component. This component will use the Madlibs service to set up a subscription to fetch the words from the API when the user clicks a button. It will then emit an event containing the API data so that other components (such as the Words Form component) can use that data. Generate the new component: $ ng g component generate-words Generate Words Component Class Open the generate-words.component.ts file and add the following code: // src/app/generate-words/generate-words.component.ts import { Component, Output, OnDestroy, EventEmitter } from '@angular/core'; import { MadlibsService } from './../madlibs.service'; import { Subscription } from 'rxjs/Subscription'; @Component({ selector: 'app-generate-words', templateUrl: './generate-words.component.html', styleUrls: ['./generate-words.component.scss'] }) export class GenerateWordsComponent implements OnDestroy { @Output() fetchedWords = new EventEmitter; wordsSub: Subscription; loading = false; generated = false; error = false; constructor(private ml: MadlibsService) { } fetchWords() { this.loading = true; this.generated = false; this.error = false; this.wordsSub = this.ml.getWords$() .subscribe( (res) => { this.loading = false; this.generated = true; this.error = false; this.fetchedWords.emit(res); }, (err) => { this.loading = false; this.generated = false; this.error = true; console.warn(err); } ); } ngOnDestroy() { if (this.wordsSub) { this.wordsSub.unsubscribe(); } } } First we'll add some imports. The OnDestroy lifecycle hook is necessary to clean up subscriptions when the component is destroyed. Output and EventEmitter are needed to emit an event from this component to a parent. Then we'll import our MadlibsService to get API data, as well as Subscription from RxJS. We'll implement the OnDestroy lifecycle hook when we export our GenerateWordsComponent class. We'll set up an @Output() fetchedWords = new EventEmitter property for a parent component to listen for a child event. We also need a wordsSub subscription to the getWords$() observable, and three boolean properties so the UI can reflect the appropriate states of the app: generated, and error. We'll make MadlibsService available to the component in the constructor function. The fetchWords() method will be executed when the user clicks a button to generate words via the API. When run, this function should indicate that the app is generated, and there are currently no errors. The wordsSub subscription should be set up as well. This subscribes to the getWords$() observable from the Madlibs service. On successful response, it updates the app states and emits the fetchedWords event with a payload containing the API response. If you recall from our code above, this is an object containing the noun, verb, and adjective arrays. If an error occurs, the app states reflect this and a warning is raised in the console. Finally, in the ngOnDestroy() lifecycle function, we'll check to see if the wordsSub exists and unsubscribe() from it if so. Generate Words Component Template Now open the generate-words.component.html template: </p> <!-- src/app/generate-words/generate-words.component.html --> <h2 class="text-center mt-3">Generate Words</h2> <p>You may choose to generate all the necessary madlib words randomly. Doing so will replace any words you may have previously entered.</p> <p> <button class="btn btn-primary btn-block"> <ng-template>Generate Words</ng-template> <ng-template>Generating...</ng-template> </button> </p> <p class="alert alert-success"> <strong>Success!</strong> Madlib words have been generated. Please scroll down to view or edit your words. </p> <p class="alert alert-danger"> <strong>Oops!</strong> An error occurred while trying to automatically generate words. Please try again or enter your own words! </p> <p> This is a straightforward template that displays some copy informing the user that they can generate words from the API, but doing so will replace any words they may have already entered using speech recognition or the form. It shows a button that executes the fetchWords() method when clicked and changes label depending on the If data is successfully generated using the API, a "Success!" message is shown. Simultaneously (and behind the scenes), an event is emitted with the API data. If an error occurred, an error message is displayed. Update Listen and Keyboard Components We now need to add our Generate Words component to both the Listen and Keyboard Components. We'll also need to add a little bit of functionality to these components so they can listen for the fetchedWords event and react to it by updating their local property data with the words from the API. Update Listen and Keyboard Component Classes Open the listen.component.ts and keyboard.component.ts component classes and add the following method to each file: // src/app/listen/listen.component.ts // src/app/keyboard/keyboard.component.ts ... onFetchedAPIWords(e) { this.nouns = e.nouns; this.verbs = e.verbs; this.adjs = e.adjs; } ... This is the handler for the fetchedWords event. It takes the event payload and uses it to define the values of the local nouns, verbs, and adjs properties, thus updating all of these arrays to the data from the API. Update Listen Component Template Open the listen.component.html template and at the top, add the <app-generate-words> element right inside the opening <div>: </p> <!-- src/app/listen/listen.component.html --> <div class="alert alert-info mt-3"> <app-generate-words></app-generate-words> ... <!-- src/app/keyboard/keyboard.component.html --> ... <app-generate-words></app-generate-words> </div> <p>... Now both the Listen and Keyboard components support word generation with the API. Make sure the API is running locally. If speech recognition is not supported, the app should now look like this in the browser: Playing With the API You (or the user) should now be able to click the "Generate Words" button whether speech recognition is supported or not. The form should populate with words retrieved from the API. If the user clicks the button again, new random words should be fetched and will overwrite any existing words. In browsers that support speech recognition, the user should be able to delete API-generated words and then use the speech commands to fill them back in. In any browser, the user can edit or replace words manually by typing in the form. Progress Bar Component The next component we're going to add is a bit of flair. It's a progress bar that we'll build with RxJS. Although it won't represent the app actually generating the madlib story (because that happens so quickly a progress indicator would be essentially pointless), it does lend a nice visual and helps us explore another feature of RxJS: creating timer observables. We'll also call the API and fetch a pronoun while the progress bar is running, but again, with a server running on localhost, this happens so quickly the UI progress bar won't represent the API request and response speed. Note: If you deploy your Madlibs app to a server, a great exercise would be to modify the progress bar so that it does actually represent the API request in some way. The progress bar will appear after the user clicks the "Go!" button to generate their madlib. When we're finished, it will look like this in the browser: Let's go over the features of our Progress Bar component: submit$subject. - Replace the submit ("Go!") button with a progress bar. - Have a timer observable. - Make an API request for a pronoun which should be stored in the Madlibs service so other components can make use of it. - The timer observable's subscription should increment the UI to show a progress bar filling up. - Once the progress bar reaches completion, the Madlib service should be notified so the app knows the madlib story is ready. As you can see, several of these features rely on the Madlibs service, so let's make some updates there before we tackle the Progress Bar component itself. Add Features to the Madlibs Service Open the madlibs.service.ts file: // src/app/madlibs.service.ts ... export class MadlibsService { ... madlibReady = false; pronoun: any; ... setMadlibReady(val: boolean) { this.madlibReady = val; } setPronoun(obj) { this.pronoun = obj; } ... getPronoun$() { return this.http .get(`${this._API}pronoun/gendered`) .catch(this._errorHandler); } } First we'll add some new properties: madlibReady to indicate when the timer observable has completed, and the pronoun object acquired from the API. We'll need a way for components to set the value of madlibReady, so we'll create a setter method called setMadlibReady() that accepts a boolean argument that updates the value of the madlibReady property. We'll also need a way for components to set the value of pronoun, so we'll create another setter method called setPronoun(). In this fashion, madlibReady and pronoun are data stored in the Madlibs service, but set by other components. This way, they are accessible anywhere in the app. Finally, we'll add a getPronoun$() HTTP request that returns an observable. This request fetches a pronoun object from our API, which can be accessed via subscription in our Progress Bar component. Progress Bar Component Class Now let's generate the new Progress Bar component with the Angular CLI: $ ng g component progress-bar Open the progress-bar.component.ts file: // src/app/progress-bar/progress-bar.component.ts import { Component, OnInit, OnDestroy } from '@angular/core'; import { Subscription } from 'rxjs/Subscription'; import { Observable } from 'rxjs/Observable'; import 'rxjs/add/observable/timer'; import 'rxjs/add/operator/takeUntil'; import { MadlibsService } from './../madlibs.service'; @Component({ selector: 'app-progress-bar', templateUrl: './progress-bar.component.html', styleUrls: ['./progress-bar.component.scss'] }) export class ProgressBarComponent implements OnInit, OnDestroy { progress = 0; progress$: Observable<number>; progressSub: Subscription; width: string; submitSub: Subscription; pronounSub: Subscription; constructor(private ml: MadlibsService) { } ngOnInit() { this._setupProgress(); this._setupSubmit(); } private _setupProgress() { this.progress$ = Observable .timer(0, 50) .takeUntil(Observable.timer(2850)); } private _getPronoun() { this.pronounSub = this.ml.getPronoun$() .subscribe(res => this.ml.setPronoun(res)); } private _setupSubmit() { this.submitSub = this.ml.submit$ .subscribe(words => this._startProgress()); } private _startProgress() { this._getPronoun(); this.progressSub = this.progress$ .subscribe( p => { this.progress = p * 2; this.width = this.progress + '%'; }, err => console.warn('Progress error:', err), () => this.ml.setMadlibReady(true) ); } ngOnDestroy() { if (this.progressSub) { this.progressSub.unsubscribe(); } if (this.pronounSub) { this.pronounSub.unsubscribe(); } this.submitSub.unsubscribe(); } } Let's go over this code step by step. We'll need to import several things. Let's import OnDestroy so we can clean up subscriptions when the component is destroyed. We'll also need Subscription and Observable from RxJS. We'll use methods from MadlibsService so we'll import that as well. Next we'll set up some properties. The progress property will be used to track the number (out of 100) that represents the status of the progress bar. The progress$ property has a type annotation indicating that we'll use it as an observable that emits numbers. We'll then subscribe to this observable with progressSub. We'll also create a width string to store a style we can use to set width with CSS in the template for the progress bar. Finally, we need submitSub and pronounSub subscriptions. We'll make the MadlibsService available to the component in our constructor function. On initialization of the component ( ngOnInit() lifecycle function), we'll _setupProgress() and _setupSubmit(). Create Progress Observable Let's take a closer look at the private _setupProgress() method: private _setupProgress() { this.progress$ = Observable .timer(0, 50) .takeUntil(Observable.timer(2850)); } Here we're creating a custom observable. This observable uses the RxJS timer operator. It emits the first value after 0 seconds, and then emits subsequent values every 50 milliseconds. Note: We want to emit values often to make the animation of our progress bar reasonably smooth in the browser. The RxJS takeUntil operator discards any items emitted by our timer observable after a second observable (passed as a parameter) emits or terminates. This way, we can end our timer observable once a certain amount of time has elapsed. In this case, we'll run our first timer observable until a second one has run for 2850ms. This way, the progress$ observable runs for long enough to emit values from 0 to 49. We'll work with these values when we subscribe to the progress$ observable. Get Pronoun and Set Up Submit Let's review the next two functions. The private _getPronoun() method sets up the pronounSub subscription. It uses the Madlibs service method getPronoun$(), subscribing to the returned observable. On emission of a value, the Madlibs service method setPronoun() is executed, storing the pronoun in the service for access throughout the application. The private _setupSubmit() method sets up the submitSub subscription. It subscribes to the Madlibs service's submit$ subject. On emission of a value (e.g., the words form has been submitted), a _startProgress() function is run. Start Progress Bar The _startProgress() function is executed when the user submits the form with their desired words for the madlib story. The method looks like this: private _startProgress() { this._getPronoun(); this.progressSub = this.progress$ .subscribe( p => { this.progress = p * 2; this.width = this.progress + '%'; }, err => console.warn('Progress error:', err), () => this.ml.setMadlibReady(true) ); } While the progress bar is running, we want to execute _getPronoun() to fetch a pronoun from the API. Then we'll subscribe to our progress$ observable with progressSub. This subscription makes use of the onNext, onError, and onCompleted methods. When a value is successfully emitted, we'll set our progress property to the value multipled by 2. Recall that the values emitted by progress$ range from 0 to 49. Therefore, the progress property will iterate in such a manner: 0, 2, 4, 6, ... 94, 96, 98 We also want to create a string value with a % symbol after it to style the width of the progress bar, so we'll set the width property appropriately. If an error occurs, we'll log it to the console with a warning. When the observable completes, we'll use the Madlibs service's setMadlibReady() setter method with an argument of true. This will update the service's madlibReady property, which is accessible throughout the app. Unsubscribe On Destroy Finally, we have our ngOnDestroy() lifecycle function. We'll check if the progressSub and pronounSub subscriptions exist. If so, we'll unsubscribe from them. They will only exist if the user submitted the words form, thus triggering the progress bar. We'll also unsubscribe from the submitSub subscription. Progress Bar Component Template For markup and styling, we'll use the Bootstrap v4 Progress Bar, so before we go much further, take a moment to familiarize yourself with its markup and customization. Then open the progress-bar.component.html template and add the following markup: </p> <!-- src/app/progress-bar/progress-bar.component.html --> <div class="progress"> <div class="progress-bar progress-bar-striped progress-bar-animated bg-success" role="progressbar" aria- </div> </div> <p> Most of the markup is standard Bootstrap CSS. However, we have a [style.width] attribute which is data bound to our component's width property: a string that consists of a number and percentage symbol. As this member is updated by our progressSub subscription, the width of the progress bar UI element will change dynamically. The attr.aria-valuenow attribute will also be updated with the progress property. Note: In Angular, the declarative data-bound attributes are not HTML attributes. Instead, they're properties of the DOM node. You can read more about this shift in the mental model in the documentation here. Progress Bar Component Styles Now we want to make sure our progress bar is the same height as our "Go!" button so it can fill the same space. Open the progress-bar.component.scss file and add: /* src/app/progress-bar/progress-bar.component.scss */ .progress-bar { font-size: 14px; height: 51px; line-height: 51px; } Add Progress Bar to Words Form Component Now we have our Progress Bar component. It's time to display it in the Words Form component at the right time. Open the words-form.component.html template: </p> <!-- src/app/words-form/words-form.component.html --> <p>... </p><div class="row"> <div class="col mt-3 mb-3"> <button class="btn btn-block btn-lg btn-success">Go!</button> <pre><code> <app-progress-bar [hidden]="!generating"></app-progress-bar> </div> </code></pre> <p> </p> </div> ... First we'll add *ngIf="!generating" to the "Go!" button. This will remove the button after clicking, allowing us to show the progress bar in its place. Next we'll add our <app-progress-bar> element below the "Go!" button near the bottom of our template. We'll use the [hidden] binding to hide the Progress Bar component except when generating is true. Why aren't we using NgIf for the progress bar? NgIf doesn't load the component into the template at all until its expression is truthy. However, using [hidden] means the component initializes (but remains hidden) when the parent template loads. This will ensure the Progress Bar component is ready to go with the appropriate subscriptions already set up as soon as we might need to display it. Because it subscribes to the submit$ subject, if we used NgIf and therefore didn't load the component until after the user clicked the "Go!" button, the progress bar wouldn't initialize properly. Madlib Component Our final component is the Madlib component. This component utilizes the user's words to create a silly, customized story. Create the component with the Angular CLI like so: $ ng g component madlib We can now use the data we've stored in the Madlibs service to generate our story. Madlib Component Class Open the madlib.component.ts file: // src/app/madlib/madlib.component.ts import { Component } from '@angular/core'; import { MadlibsService } from './../madlibs.service'; @Component({ selector: 'app-madlib', templateUrl: './madlib.component.html', styleUrls: ['./madlib.component.scss'] }) export class MadlibComponent { constructor(public ml: MadlibsService) { } aOrAn(word: string, beginSentence: boolean) { const startsWithVowel = ['a', 'e', 'i', 'o', 'u'].indexOf(word.charAt(0).toLowerCase()) !== -1; if (startsWithVowel) { return beginSentence ? 'An' : 'an'; } else { return beginSentence ? 'A' : 'a'; } } } This is a simple component. Most of the meat and potatoes will be in the template, which displays the actual story. We need to import the MadlibsService to gain access to the stored data. We'll make this available to our template publicly in the constructor function. Then we need a simple aOrAn() method that returns different capitalizations of "a" or "an" depending on the word it precedes and whether or not it's at the beginning of a sentence. If the word argument starts with a vowel, we'll return "an". If not, we'll return "a". We'll also implement logic for sentence capitalization. Madlib Component Template Now it's time to display the user's completed madlib. Open the madlib.component.html template file and add: </p> <!-- src/app/madlib/madlib.component.html --> <div class="row"> <div class="col"> <div class="jumbotron lead"> <p>{{aOrAn(ml.words.adjs[0], true)}} {{ml.words.adjs[0]}} {{ml.words.nouns[0]}} {{ml.words.verbs[2]}} to the {{ml.words.nouns[1]}}. There, {{ml.pronoun.normal}} decided that it would be a good idea to test {{ml.pronoun.possessive}} mettle by doing some {{ml.words.verbs[0]}} with {{aOrAn(ml.words.nouns[3], false)}} {{ml.words.nouns[3]}}. To {{ml.pronoun.possessive}} surprise, the results made {{ml.pronoun.third}} {{ml.words.adjs[1]}}.</p> <p>When the initial shock wore off, {{ml.pronoun.normal}} was {{ml.words.adjs[2]}} and {{ml.pronoun.normal}} {{ml.words.verbs[2]}}. It had been {{aOrAn(ml.words.adjs[3], false)}} {{ml.words.adjs[3]}} day, so {{ml.pronoun.normal}} left the {{ml.words.nouns[1]}} and {{ml.words.verbs[3]}} to the {{ml.words.adjs[4]}} {{ml.words.nouns[2]}} {{ml.pronoun.normal}} called home.</p> <p>After {{ml.words.verbs[1]}} for a little while, the {{ml.words.nouns[0]}} {{ml.words.verbs[4]}} and settled down for the night with {{ml.pronoun.possessive}} {{ml.words.nouns[4]}}.</p> </div> </div> </div> <div class="row"> <div class="col mt-3 mb-3"> <button class="btn btn-block btn-lg btn-primary">Play Again</button> </div> </div> <p> This template displays the story text using the data stored in our Madlibs service, including the words and pronoun objects. At the bottom, we'll display a "Play Again" button that executes the setMadlibReady() setter, setting madlibReady to false. This will hide the Madlib component and show the appropriate Listen or Keyboard component again so the user can enter new words to generate another variation of the story. Add Madlib Component to App Component Now we need to add our Madlib component to our App component and conditionally hide it when we're showing the word entry components. First we'll update the app.component.ts class: // src/app/app.component.ts ... import { MadlibsService } from './madlibs.service'; export class AppComponent { constructor( public speech: SpeechService, public ml: MadlibsService) { } } We need to import the MadlibsService and make it available via the constructor so we can use its properties in our template. Now open the app.component.html template and make the following updates: </p> <!-- src/app/app.component.html --> <div class="container"> <h1 class="text-center">Madlibs</h1> <ng-template> <app-listen></app-listen> <app-keyboard></app-keyboard> </ng-template> <app-madlib ml.pronoun></app-madlib> </div> <p> We'll wrap the Listen and Keyboard components in an <ng-template> with an [ngIf] directive and an expression that is true when the Madlibs service's properties madlibReady or pronoun are falsey. Either of these would indicate that the madlib story is not ready. We'll then add the <app-madlib> element and display it if both madlibReady and pronoun are truthy. This ensures we have all the data necessary to display a complete madlib story. Try out your madlib! The Madlib component should look something like this in the browser:, or as a bonus, you can try integrating these features into the Madlibs app that you've just built!` }), audience: AUTH0_AUDIENCE, issuer: `{CLIENT_DOMAIN}/`, algorithm: 'RS256' }); ... //--- GET protected dragons route app.get('/api/dragons', jwtCheck, function (req, res) { res.json(dragonsJson); }); ... Change the CLIENT_DOMAIN variable to your Auth0 client) { const expTime = authResult.expiresIn * 1000 + Date.now(); // Save session data and update login status subject localStorage.setItem('access_token', authResult.accessToken); localStorage.setItem('id_token', authResult.idToken); localStorage.setItem('profile', JSON.stringify(profile)); localStorage.setItem('expires_at', JSON.stringify(expTime)); date is greater than idToken, accessToken, and expires based on access token expiration. We covered a lot while building a fun little app that generates madlibs. We were able to experience a rapidly-approaching future for web interactivity with the Web Speech API, and we learned about RxJS observables and component communication in Angular. Finally, we learned how to authenticate an Angular app and Node API with Auth0, which you can integrate into your Madlibs app if you wish as a little bit of homework. Hopefully you now have a better understanding of Angular, speech recognition, and RxJS and are prepared to build your own more complex apps with these technologies!
https://auth0.com/blog/amp/rxjs-advanced-tutorial-with-angular-web-speech-part-2/
CC-MAIN-2019-18
en
refinedweb
Fixing a bug is a whole lot easier when you know how it occurred, but that may not always be the case. Once the software has been shipped, you are left at the mercy of customers, who may not always report the crash. When the code crashes, you log the errors in the log file, and hence continues the journey of a developer to trace the occurrence of the bug by looking through the log files. Guessing the root cause of the crash from the log file may take a lot of your valuable time. Is there an easier way to troubleshoot the cause of an error in your software application? Raygun offers a set of interesting solutions to keep an eye on errors when they arise in your web and mobile applications. From the official documentation, Raygun offers: Complete visibility into problems your users are experiencing and workflow tools to solve them quickly as a team. Raygun offers four tools to make it easier to deal with errors and crashes in your application: In this tutorial, you'll learn how to integrate Raygun tools with your web application to monitor and trace bugs. For this tutorial, you'll be integrating Raygun tools with an Angular web application. You can use Raygun with a number of programming languages and frameworks. For the sake of this tutorial, let's see how to get started using Raygun with an Angular web application. To get started, you need to create an account on Raygun. Once you have created the account, you will be presented with a screen to select the preferred language or framework. In this tutorial, you'll learn how to get started with using Raygun on an Angular web application. From the list of frameworks, select the Angular framework. You will be presented with a screen to select Angular (v2+) or Angular1.x. Since you are going to learn how to integrate Raygun with Angular 4, focus on the tab Angular (v2+). Before integrating Raygun with Angular, you need to create an Angular application. Let's get started by creating an Angular application. First, you'll need to install the Angular CLI globally. npm install -g @angular/cli Create an Angular app using the Angular CLI. ng new AngularRaygun You will have the Angular application created and installed with the required dependencies. Navigate to the project directory and start the application. cd AngularRaygun npm start You will have the application running on. raygun4jslibrary using the Node Package Manager (npm). npm install raygun4js --save Inside the src/config folder, create a file called app.raygun.setup.ts. Copy the setup code from Step 2 of the Angular (v2+) and paste it into the app.raygun.setup.ts file. Import the RaygunErrorHandler in the app.module.ts file inside the Angular application, and add the custom error handler. Here is how the app.module.ts file looks: import { BrowserModule } from '@angular/platform-browser'; import { NgModule } from '@angular/core'; import { ErrorHandler } from '@angular/core'; import { RaygunErrorHandler } from '../config/app.raygun.setup'; import { AppComponent } from './app.component'; @NgModule({ declarations: [ AppComponent ], imports: [ BrowserModule ], providers: [{ provide: ErrorHandler, useClass: RaygunErrorHandler }], bootstrap: [AppComponent] }) export class AppModule { } Now you have added a custom error handler RaygunErrorHandler, which will handle the errors. Let's add some code to create an error. Import the Router in the app.component.ts file. import { Router } from '@angular/router'; Modify the constructor method as shown: constructor(private router: Router) {} The above code will throw an error when you run the application since it hasn't been imported in the AppModule. Let's see how Raygun captures the errors. Save the above changes and restart the application. Point your browser to. Check the browser console and you will have the errors logged. When you run the application, you will have an error logged in the browser console. NullInjectorError: No provider for Router! From the Raygun application, click on the Dashboard tab on the left side, and you will have detailed information about the requests logged by Raygun. As seen in the Raygun dashboard, it shows the session count, recent request, error instance counts, etc., related to the Angular application which you configured with Raygun. Click on the recent requests displayed on the right side of the dashboard, and you will have detailed information related to the particular request. Application crashes are a common scenario when dealing with software applications. Lots of these crashes occur in real-time scenarios and are hence difficult to track without a proper crash reporting system in place. Raygun provides a tool called Crash Reporting which provides a deeper insight into application crashes. Let's have a look at how Crash Reporting works. You have a bug in your Angular app which is crashing it. Let's see how it gets reported using Raygun Crash Reporting. Click on the Crash Reporting tab from the menu on the left-hand side. You will have the error report listed. In the Raygun crash reporting tab, it shows the errors that occurred in the application. In the tabs shown above, the errors have been categorized into Active, Resolved, Ignored, and Permanently ignored. The error that you encountered while running the application has been logged under the Active tab. On clicking the listed error, you'll be redirected to another page with detailed information related to the error. On this page, you'll have information such as the error summary, HTTP information, environment details in which the error occurred (such as the OS, browser, etc.), raw error information, and the error stack trace. When displaying information related to a particular error, Raygun provides you with the features to change the state of the errors as per your fix. You can change the status to active, resolved, ignored, etc. Raygun's crash reporting tool provides a feature to add comments to the errors, which is really helpful in discussing details about the bug when working in a team. Crash reporting comes with a couple of settings which make it easier for the user to manage the errors that have occurred in the application. It provides you with the option to enable live refresh, first seen date on an error group, and the user count on the dashboard. You have the option to make bulk error status changes and the option to remove all the errors that occurred in the application. Raygun provides an option to filter requests based on the IP address, machine name, etc. If you don't want to track an error from a particular IP address, you can create an inbound filter, and the error from the application running on that IP address won't be tracked further. Let's try to add a filter for your application running on 127.0.0.0.1 and see if it gets tracked. From the left side menu, under the Crash Reporting tab, click on the Inbound Filters link. Add the IP address 127.0.0.0.1 to the filter list. Now, if you try to run the application, on crashing it won't get tracked in the crash reporting screen since it's been filtered out. You can also add filters based on machine names, HTTP, build versions, tag, and user agent. Most of the issues encountered when the user is using the software go unreported. The probability of a frustrated user reporting an issue is quite low. Hence, you tend to lose the user feedback to improve the quality of your software. Raygun provides an affected user tracking report. This report shows the list of users from your application who have encountered errors. It gives a full view of how that particular user encountered that particular error. You can view this report by clicking on the Users tab on the left side of the screen. In your Angular application, you haven't yet used the affected user details feature of Raygun. Hence in the affected user tracking report you will find the user details as anonymous along with the error details. Click on the Anon User link from the user tracking information, and you'll see the detailed information related to that particular anonymous user. Detailed such as the active error info, user experience, sessions, devices used by the user, etc., will all be displayed in the user report. You can add the user info details to the Raygun config file. Add the following code to the config/app.raygun.setup.ts file to send the user info details to Raygun. rg4js('setUser', { identifier: 'roy_agasthyan_unique_id', isAnonymous: false, email: '[email protected]', firstName: 'Roy', fullName: 'Roy Agasthyan' }); Here is how the config/app.raygun.setup.ts file looks: import * as rg4js from 'raygun4js'; import { ErrorHandler } from '@angular/core'; const VERSION_NUMBER = '1.0.0.0'; rg4js('apiKey', 'FehB7YwfCf/F+KrFCZdJSg=='); rg4js('setVersion', VERSION_NUMBER); rg4js('enableCrashReporting', true); rg4js('enablePulse', true); rg4js('setUser', { identifier: 'roy_agasthyan_unique_id', isAnonymous: false, email: '[email protected]', firstName: 'Roy', fullName: 'Roy Agasthyan' }); export class RaygunErrorHandler implements ErrorHandler { handleError(e: any) { rg4js('send', { error: e, }); } } Save the above changes and reload the Angular web application. Go to the Raygun application console and click on the Users tab from the left side menu. You will be able to see the new users displayed in the list of affected users. Click on the user name to view the details associated with the particular user. Raygun's Real User Monitoring tool gives you an insight into the live user sessions. It lets you identify the way the user interacts with your application from the user environment and how it affects your application's performance. Let's run your Angular application and see how it's monitored in the Real User Monitoring tool. Click on the Real User Monitoring tab in the menu on the left-hand side. You will be able to view the live user details and sessions. By clicking on the different tabs, you can monitor the performance of the requested pages. It gives information on the slowest and the most requested pages. Based on a number of metrics, you can monitor the pages with high loading time and fix them to improve the application's performance. There are a number of other tabs in Real User Monitoring which give useful insight into user information based on different parameters like browsers, platforms, and user locations. When you release a new version of your software, it's expected to be a better version with bug fixes and patches for the issues reported in earlier versions. Raygun provides a tool to track the deployment process and to monitor the releases. Click on the Deployments tab from the left side menu and you will be presented with information on how to configure Raygun with your deployment system. Once you have it configured, you'll be able to view the detailed report related to each release. Setting up a deployment tracking system will enable you to get deeper insight into each of the releases. You can monitor the trend and see whether you are improving the build quality or taking it down. With each new release, you can compare the error rate and track any new errors that cropped up in the releases. I recommend reading the official documentation to see how to integrate Raygun deployment tracking with your deployment system. In this tutorial, you saw how to get started using Raygun with an Angular web application. You learnt how to use the Crash Reporting tool to monitor and trace the occurrence of a crash. Using the Real User Monitoring tool, you saw how to understand the user experience details such as the page load time, average load time, etc. The User Tracking tool lets you monitor and categorise errors and crashes based on the application users. The Deployment Tracking tool helps you track each release of your application for crashes and errors and lets you know how it's affecting the overall health of your application. For detailed information on integrating Raygun with other languages and frameworks, I would recommend reading the official Raygun documentation. If you have any questions and comments on today's tutorial, please post them…
https://www.4elements.com/nl/blog/read/error_and_performance_monitoring_for_web_mobile_apps_using_raygun/
CC-MAIN-2019-18
en
refinedweb
Directory Listing netcdf build option is now 3-state no, 3, 4 I haven't bumped the options file version because my changes should be backwards compatible Weipa netcdf update passes unit tests -DNETCDF4 and only directly links: netcdf_c++4 Need to clean up scons options control More netcdf4 work Still need to convert weipa Work on new netcdf Work on new netcdf interface It passes unit tests .... Helper function to open netcdf netcdf4 version of load hiding some variables Removing debug vectors from debug builds since netcdfc++4 doesn\'t seem to like them Forgot to check with MPI Work towards netcdf4 partial workaround of complex testing issue Reader for netcdf classic headers. bug to obtain function space fixed. magnetic intensity added. This version seems to work Added stdlocationisprefix option This option will set the STD_LOCATION to the build prefix Need this for building on magnus new section in inversion guide fix name of macports boostio because Darwin different fix it Attempt to make python detection better fix typo. Another case of allowing complex Some more tests More helpful error message Biting bullet and doing separate generator for matrix More tests Still need to look at the MVp testing Decree: Tensor products are not always real. Test for outer Unbreak ripley Brick. Let ripley's auto decomposition deal with this test. For <=4 ranks this now succeeds, let's see what happens on Savanna... Fixing default decomposition policy in ripley (ouch!). Forgot to reset the grid spacing members so despite reporting the correct values the domain did get expanded! Fix test that was way too strict - obviously something in GDAL changed that caused the failures when comparing data origin. But 7 digits are far too many given the data is in meters. syncing savanna options with actual dev-deps module. We had switched to intel 17 a while back. docstring updated. complex integrals for ripley - part of #398. This is not properly tested. Trying to integrate complex Data on other domains now throws rather than segfaulting. Fix failing unit tests Make tuples acceptable to getRank and getShape Initial tests binary operation Add zeroed copy reductions no longer ignore tags with default values Also fix the tests which depended on broken Lsup But it's better this way anyway Fix unit test failure Now includes tests of all ops in the original test set These tests do not include tests of symbol inputs but those aren't tested by the old set either Fix bug in get_tagged Adding test for eigenvalues - not currently testing the scalar input case More tests Rename data_only to no_scalars [which is more accurate] Fix test failures ensure inf and sup raise for complex ndarray hasNaN does support complex hermitian tests debug output Stop (anit-)hermitian from using numpy.transpose It doesn't default to the same axes swaps as our's does Correct docstring for antihermitian Fix build failure and add test Used a common base type for exception which both py2 and py3 know about. Can now specify that one expects certain ranks to throw and to specify what sort of exceptions one expects. There is currently no way to specify which exceptions should be thrown in which circumstances. I'm hoping that won't be required. More debug and test for transpose More tests Added tests and reordered some. Ensure that all complex possibilities are tested for exceptions not just scalars. Added min and max rank parameters - first use is to limit matrix inversion to 2x2 cases. Tests now check rank-4 cases. Change in whereX semantics The whereX functions now raise exceptions for complex numpy arrays. They did not used to do this but this change brings them into line with what Data does Tests and fix to util.length Added tests for maxval, minval and length. util.length(z) now takes abs(z) of before applying inner product Have unary tests for the trig now More tests using the more general tester. Added type to the Lsup type error message to help with future debugging. The unary tests currently have some duplication because all of the old tests run as well as the new tests but I'll fix that once the new tests cover everything. Adapt to moving openmpi library This fix assumes that the architecture you are linking to is the one which the include headers are symlinked from. Added '--mca io romio314' to guineapig options to get around a regression(?) in OMPIO. Basically it looks like current OpenMPI in Debian blocks when calling MPI_File_write_shared from a subset of ranks only (which we do in a test). My understanding of the spec is that this should not block as it's not a collective operation and it certainly works with ROMIO and IntelMPI which is why I think it may be a regression. This should probably be asked on the OpenMPI mailing list. I have a test case if required. Starting work on the unary ops Removing references to the old util_reduction tests. Note that this does weaken the ability to test domains which do not support tagging because all types are tested together now. However, if that becomes necessary, we can query the functionspace and not add tagged tests if it reports not supporting tagging. At this point, more compact tests are more important. Switch over to new util tests. Fix some bugs Reduction tests Enable NAN_CHECK for all builds. If you don't support std::isnan, then you don't support c++11 Make sure some of the test values are negative More progress Start on test restructure some modifications VGL arguments fixed namespace problem fixed. Remainder of this batch of default removing. Fix compile error introduced last time. Fix more calls in Dudley Throw. fix for #387 in ripley - implementation of complex straightforward interpolations. Final pieces for #386: Complex gradients for Speckley 3D order 2-10. Removed workaround from escript. #386: speckley complex gradients for 2D orders 3-10 #386 - complex gradient for speckley 2D. #386: complex gradients for dudley. Part of #386 - complex gradients for finley. Part of #386 - complex gradient for ripley Brick. workaround for Bug #389 removed Complex interpolation changes for ripley. Needs better tests and removal of work-around once the other domains are done. Initial work on fixing the complex interpolation issue. This is just Ripley::Rectangle others to follow Beginnings of interpolation fixes for complex. I have not undone the python work-around because I still need to look at the domains. Starting with ripley Fixing copyWithMask to work with complex Data (issue #389) prepare for complex gradients. Workaround in util.py still guards against badness. and the accompanying header changes to the last commit... implemented complex gradient for ripley 2D. Code path is still disabled in escript until all other cases are implemented. Fix Scalar with complex #392 Fix segfault in slice assignment with complex. Addresses issue #394 Fix TensorX factories to allow passing a complex scalar. Issue described in #394 (although that wasn't the main point of that bug). Fix setToZero Prevent saveDataCSV from being called with complex values work around for bug #391 (right version now) work around for bug #391 Added untested .phase() to Data. work around for bug #390 work around for bug #386 Very minor fix towards more repeatable builds print statement removed work around for Bug #389 replaced complex argument by isComplex as complex is python keyword. recording badgers trilinos options interpolation from reduced to full for finley Function. needs more work Fixing the openmp options for icpc. make sure to copy python lists rather than adding on or PrependUnique is useless... reverted accidental commit of SConstruct. build_shared from most files. esysUtils is gone and paso now has to be a shared lib to allow python bindings. I haven't bumped the options file version yet as there's more to come before the release (trilinos etc) and the plan is to overhaul the scons stuff once again.. moved file writer to escript and added explicit link to escript in paso. found a few instances of MPI_COMM_WORLD and squashed them. Added member to AbstractDomain that returns a JMPI so we ensure all domains support that. Moved appendRankToFilename into. hmm, this change was necessary on Trusty for some reason, it shouldn't break other builds... Removed dependency on lsb-release Added new entry to debian/changelog debian/rules now does not make any use of custom subst files (always builds for "sid") Updated makesrc.sh to build an "orig" tarball which we can use as our source release. options file for our new slave. Updated version info and remove all applied patches from the quilt series bringing changes over from debian for 4.1 The quilt patch series do not make sense at the moment because most of them will already be encorporated Added non-version specific options file for debian changes to support fixing libraries build on osx - enable with osx_dependency_fix. Also added options file for OSX.11 and homebrew removing dud commmented code MT allows now a background field More lintian fixes Fixing some lintian objections Minor cleanup Produces what looks like correct answers on Jaco's example. Still to do: . Clean up extraneous output . Doco on what the various variables do . Discussion on difference between this mode and the normal downunder. (Should the same changes be made to normal downunder?) . Document more clearly assumptions which have been made. - The only one which comes to mind is the one where only the regularisation term actually matters for one of the calculations. not supposed to do that Added debian/watch file It turns out that uscan --no-download --verbose does not like ~ in upstream version numbers. We may need to do a mini re-release of 4.1 to fix that Provide access to splitworld via the escript package Fix to stop clang complaining. Adding a script to change references in libraries on osx Removing unnescessary .dirs files Removing unnecessary dep - it is picked up by the auto-stuff updating savanna options to use intel 2016 and cuda 7.5 Changes for new interface turns out x should be because sigmaprim - sigma this is because there is a negative in the x template Type fix for parmetis with long indices removed obsolete comment. and another skip without gmsh. skip test without gmsh. fixed failures for MPI builds with single-rank runs fix running unit tests when prefix is set to somewhere else. Working on package testing Allow openmpi to execute when there is no rsh/ssh Fixed a bug in saveDataCSV where mask could be on a different domain and/or function space than the data objects. Adding the mpi binaries for building Running sanity check from build directory DOF and reduced DOF can now be passed to ownSample() in Finley. another fix for _XOPEN_SOURCE warning in tests. The MPI file view resets file pointer offset so explicitly set to EOF when appending. Should fix test failures. fix for non-MPI build DataExpanded: avoid lockups in dump() due to unnecessary MPI comms. Also code cleanup. Cleanup in escript utils and use FileWriter to avoid code duplication. Also added sanity checks to FileWriter. actually *USE* MPI IO in ripley rather than pretending, d'oh. Hopefully addressing some of the packaging issues Trying again to default to sanity. move sanity out of always build until ordering can be resolved Fixing default builds fix for Bug #326 Removed some order 2 tests in dudley and fixed docstring to make clear that dudley only supports order 1. Avoid netCDF warning by calling del on local references to mmap'ed data Fix for bug #328 Commented use of makeZeroRowSums in Transport solver, see bug #326 Fixed typo in datamanager. x!=None -> x is not None fixes wrong order for subtraction. based on ralfs notes. index_t fixes in DataExpanded. switch to impi 5.1 64-bit index fixes in finley. Another case of 'we are setting the wrong params for third-party libs' + we are now setting a flag to use two-level factorization with more than 8 OpenMP threads. --> runtime for a 2000x2000 poisson problem with block size 3 running on 20 threads is down from 168 seconds to 91.5 seconds! (Paso PCG: 466 seconds) Can compile with MKL and long indices now. updated templates to use correct type for domains parameter. another non-finley test failure fixed. added guards for non-finley builds. made finley::Mesh::write long index compatible. makeTranformation deprecated, left as a wrapper of the new makeTransformation fixing UMFPACK numerical issues due to implicit METIS ordering not existin gin newer UMFPACK versions (>5.2) added bessel function of first and second kind pushing release to trunk fixing the python3 fix that was fixed for python2 but broke 3 undoing mistaken commit of types.h fixing python 3 compatibility change where overriding a type in scope destroys the global type referece completely (result is py2 no longer complaining) making long as a type work in python3 replacing xrange for py3 compatibility fixing MT tests for MPI Tests and tweaks for magneto-telluric Fixing a python3 issue with voxet example now with proper namespacing on MT example fixes python3 prints for 2D MT source tab->space replacements again adding detection of missing direct solvers to MT tests python3ifying inequality tests in MT somehow ReadGmsh escaped removed dcresdomgen removal of dcdomaingen from trunk for now making MT examples python3 and MPI safe Remove blanket import of escript into inversions. Modify __all__ to allow "hiding" some members of escript from a blanket import Changing scoping for splitworld internals. Experiments on hiding them to follow later. Added Ralf's examples. Tests for correctness to follow later. updates of test to prepare for removal of dcresdomgen made namespace use consistent between header and cpp to help poor doxygen find the right functions updating doxygen config file version Removing subworlds from the user guide until we tweak the interface. Minor fixes to splitworld doco. fixing some issues in splitworld doco correcting exception message text commiting updates before removal Adding split example to example dir Added text for SubWorlds. adding division to future imports for voxet reader example. index fixes and some code cleanup in finley. Introduced index_size attribute to finley dump (netCDF) files. correcting readGmsh failures with older version meshes We now have an arena where any headers which insist on being first because they do bad things, can battle to the death. esysutils/first.h should only be included in .cpp files. #define the macros for the features you need in that .cpp For this to work, any such claims to primacy must be resolved in first.h, so please don't try to hack pretenders to the throne into the include hierachy. Next, will be removing some older attempts at the same thing. Fix for python compile warnings fixing uninitialised int that really was initialised before use a more improved readGmsh for less awkward MPI silences Passes some tests. Still has bug. Make tests write to the correct directories Fixing some unit test failures on osx Fixing more tests to check for the optional natgrid fixing more cases of indexing empty vectors updating reference meshes fixing non-mpi builds some fixes for the new node tagging from gmshreader fixes to readGmsh off-by-one fixing some indexing into empty vectors, related to #291 updated tags in fly files CPU optimizations for block size 1 symmetric spmv (DIA) which is now also faster than non-symmetric on i7. block size 2 optimizations. Significant speed-up for symmetric spmv on CPU. This is now faster than non-symmetric on i7. python 3 print non exponential mapping adding options to record time and cycle number in silo and VTK files More cache-friendly version of CPU-based symmetric-CDS-SpMV for block sizes >2. block size 3 special case on GPU. -Enabled use of texture memory by default (needs config option). -split symmetric spmv to separate file and added specialized version for block size 2. well, this was embarrassing...]. more type changes/fixes. speckley: more informative functionspace errors for coupled interpolation, removed points from tagsinuse to match ripley Some more long-index work. adding test skip for couplers and multiprocess adding omitted copyright header adding speckley to ripley interpolation (single process only) removing accidentally included and incomplete cross domain work fixing badly behaved dirac points in speckley. fixed non-MPI builds with speckley added MPI support and tests to speckley, cleaned out more ghostzone code fixing missed MPI type merge from ripley fixing a bad index calculation more redundant includes removed fixing last remnants of speckley::SystemMatrix removing troublesome future-predicting #include minor comment fix for ripley Adding speckley (high-order) domain family, doesn't yet support MPI, Reduced functionspaces, or PDEs using A, B and/or C Made more methods pure virtual in AbstractDomain and moved the generic implementation into NullDomain. Made TestDomain derive from NullDomain to inherit the methods. Some code cleanup and int->dim_t replacements in ripley. Separated pattern generation from connector generation in ripley Brick to allow using alternative System Matrices. Separated generation of paso matrix pattern and coupler/DOF Map in Rectangle. This is in preparation for introducing non-Paso matrices. Brick still to do. Further untangled/simplified paso pattern generation in ripley... Fixed another race with file deletion. minor revisions Fix recent mpi test failures by giving ranks>0 some time to check their output before deleting test files. Finally implemented multipliers for readBinaryGrid under MPI and fixed tests accordingly. We can now read data at resolution x into a domain at resolution N*x properly. Fixed undefined behaviour when indexing empty stl containers to pass pointers (i.e. &vec[0]). More readBinaryGrid tests. There are a few 'expectedFailure's for >1 rank. This is a shortcoming of the tests, not of the actual implementation, so they need more work. ends if tests fail again byteswap.h availability does not mean bswapXXX works so check that. (crayc++ does not support inline assembly) "The Queen's commit". Happy birthday, Implemented writing of binary grids for FLOAT64 in non-native byte order. Write tests pass now fully on debian. This depends on uint64_t which is assumed to be available... revamping testrunners, now uses automated discovery and allows running specific tests without modifying files (see escriptcore/py_src/testing.py for more info/examples) removing missing/leftover test files from test list removing run_utilOnFinley3.py as it is a duplicate of run_utilOnFinley.py.
https://svn.geocomp.uq.edu.au/escript/trunk/?pathrev=6509&sortby=log&view=log
CC-MAIN-2019-18
en
refinedweb
Flask and SQLAlchemy without the Flask-SQLAlchemy Extension Nested Software Jun 11 '18 Updated on Mar 21, 2019 ・2 min read When using SQLAlchemy with Flask, the standard approach is to use the Flask-SQLAlchemy extension. However, this extension has some issues. In particular, we have to use a base class for our sqlalchemy models that creates a dependency on flask (via flask_sqlalchemy.SQLAlchemy.db.Model). Also, an application may not require the additional functionality that the extension provides, such as pagination support. Let's see if we can find a way to use plain SQLAlchemy in our Flask applications without relying on this extension. This article focuses specifically on connecting a Flask application to SQLAlchemy directly, without using any plugins or extensions. It doesn't address how to get a Flask application working on its own, or how SQLAlchemy works. It may be a good idea to get these parts working separately first. Below is the code that sets up the SQLAlchemy session (db.py): import os from sqlalchemy import create_engine from sqlalchemy.orm import scoped_session from sqlalchemy.orm import sessionmaker engine = create_engine(os.environ['SQLALCHEMY_URL']) Session = scoped_session(sessionmaker(bind=engine)) The key here is scoped_session: Now when we use Session, SQLAlchemy will check to see if a thread-local session exists. If it already exists, then it will use it, otherwise it will create one first. The following code bootstraps the Flask application (__init__.py): from flask import Flask from .db import Session from .hello import hello_blueprint app = Flask(__name__) app.register_blueprint(hello_blueprint) @app.teardown_appcontext def cleanup(resp_or_exc): Session.remove() The @app.teardown_appcontext decorator will cause the supplied callback, cleanup, to be executed when the current application context is torn down. This happens after each request. That way we make sure to release the resources used by a session after each request. In our Flask application, we can now use Session to interact with our database. For example (hello.py): import json from flask import Blueprint from .db import Session from .models import Message hello_blueprint = Blueprint('hello', __name__) @hello_blueprint.route('/messages') def messages(): values = Session.query(Message).all() results = [{ 'message': value.message } for value in values] return (json.dumps(results), 200, { 'content_type': 'application/json' }) This should be sufficient for integrating SQLAlchemy into a Flask application. For a more detailed overview of the features Flask-SQLAlchemy provides, see Derrick Gilland's article, Demystifying Flask-SQLAlchemy We also get the benefit of not having to create a dependency on Flask for our SQLAlchemy models. Below we're just using the standard sqlalchemy.ext.declarative.declarative_base (models.py): from sqlalchemy.ext.declarative import declarative_base from sqlalchemy import Column, Integer, String Base = declarative_base() class Message(Base): __tablename__ = 'messages' id = Column(Integer, primary_key=True) message = Column(String) def __repr__(self): return "<Message(message='%s')>" % (self.message) I could be wrong, but I would prefer to start a project with this approach initially, and only to incorporate the Flask-SQLAlchemy extension later if it turns out to be demonstrably useful. This code is available on github: From homelessness to making six figures: On learning how to code. A reflection of my life post High School. This is very helpful. I come from a database orientation, & I really have no need to have Flask generate my database for me, & then Alembic migrate every time I need to make a change. Strongly prefer using reflected tables in SQLAlchemy, & making database changes w/software that's dedicated to that purpose! Excellent introduction! I am seeing an error message when trying to invoke Session.query() that method is not defined. Hi @grubertm , my first thought is that maybe the sqlalchemy classes are not being imported properly. How did you install sqlalchemy? I did try to provide instructions in the readme file of the linked github project (the article itself only includes the code that needs to be added for sqlalchemy to work with flask - but it assumes everything else has already been done). Did you follow the readme? In that case maybe the readme has a mistake. It could also be an environment thing. I used ubuntu 18.04 with python 3.6 to set this up. If your environment is different, that could also be a possibility. I do use flask for backend api development. Great article. I also had the same concerns and ditched flask-sqlalchemy extension for sqlalchemy stand alone.
https://dev.to/nestedsoftware/flask-and-sqlalchemy-without-the-flask-sqlalchemy-extension-3cf8
CC-MAIN-2019-18
en
refinedweb
Saving data in the CSV format is fine most of the time. It is easy to exchange CSV files, since most programming languages and applications can handle this format. However, it is not very efficient; CSV and other plaintext formats take up a lot of space. Numerous file formats have been invented, which offer a high level of compression such as zip, bzip, and gzip. The following is the complete code for this storage comparison exercise, which can also be found in the binary_formats.py file of this book's code bundle: import numpy as np import pandas as pd from tempfile import NamedTemporaryFile from os.path import getsize np.random.seed(42) a = np.random.randn(365, 4) tmpf = NamedTemporaryFile() ... No credit card required
https://www.oreilly.com/library/view/python-data-analysis/9781783553358/ch05s02.html
CC-MAIN-2019-18
en
refinedweb
Learn how to implement a notification system using Arduino and PushBullet. Send notification events to your smartphone when an event occurs. Monitor the soil moisture using Arduino and sends alert to your smartphone when it is too dry. This article describes how to implement an IoT notification system. A notification is a way we can use to send alarms or other kinds of information to users. This post describes, step by step, how to build an IoT notification system using a few lines of code and integrating existing cloud platforms. The aim is to send a notification to several devices like Android, iOS or desktop PC. This IoT project uses ESP8266 but you can use other IoT development board to test it as Arduino UNO, MKR1000 other ESP and so on. This is an interesting project because it is possible to further extend it and we can use it in several scenarios where it is necessary to send a notification or an alert: - Flood alert - Temperature monitoring - Air quality alert - Alarm systems and so on. They are just a few examples where it is possible to use this IoT notification project. The idea, that stands at the base of this project, is building a general purpose IoT notification system that you can reuse in other scenarios, without writing too many code lines. We have covered the notification topic in several other tutorials, for example, we have already described how to send notification using Google Firebase. Moreover, it is possible to use other IoT development boards to implement a notification system. IoT notification project overview Before diving into the project details, it is useful to have an overview of this project and the components that we will use in this project. To make things simple, the aim is to monitor the temperature and the air pressure and send these values periodically using a notification message. The project overview is shown below: As the sensor, the project uses BMP280 that is an I2C sensor. There is a library to use in order to exchange data with this sensor. You can download it from Github or import it into your IDE. The cloud notification system has two components: - One that is used by the ESP to trigger the notification (PushingBox) - The second is the system that sends the notification to the connected devices (PushBullet) The PushingBox is an interesting cloud platform that simplifies the process of sending data. It exposes a simple API that our IoT notification system uses to trigger the notification. It is possible to divide this project into these steps: - Configuring the notification system - Developing a simple application to read data from the sensor and trigger the notification Configuring the notification system using PushBullet The first step is configuring the notification system so that the ESP program can invoke an API exposed by PushingBox and trigger the process of sending the notification. I suppose you already know the PushBullet cloud platform and you have already an account. If not you can register for free and activate your account. In order to receive the notification, you have to install the PushBullet app on the device you want to use. You can receive the same notification on different devices at the same time. For example, if you want to receive the notification on your Android smartphone you have to install the Pushbullet app from the Google play store. Once your account is ready you can go to the dashboard and get your API key (Settings menu item): In the first step, let us read the sensor data: #include <ESP8266WiFi.h> #include <Wire.h> #include <Adafruit_Sensor.h> #include <Adafruit_BMP280.h> //BMP280 Adafruit_BMP280 bme; void setup() { Serial.begin(115200); Serial.println("Setup..."); if (!bme.begin()) { Serial.println("Could not find a valid BMP280 sensor, check wiring!"); while (1); } } Now in the loop method, we can read the data: float temp = bme.readTemperature(); float pressure = bme.readPressure(); Finally, we can focus on the last part of this project that is connecting to the Pushingbox API. Add the following lines at the beginning: // Pushingbox API char *api_server = "api.pushingbox.com"; char *deviceId = "v10BAFBDA2376E5E"; and the following method that connects to the pushingbox api: void sendNotification(float temp, float pressure) { Serial.println("Sending notification to " + String(api_server)); if (client.connect(api_server, 80)) { Serial.println("Connected to the server"); String message = "devid=" + String(deviceId) + "&temp=" + String(temp) + "&press=" + String(pressure) + "\r\n\r\n"; client.print("POST /pushingbox HTTP/1.1\n"); client.print("Host: api.pushingbox.com\n"); client.print("Connection: close\n"); client.print("Content-Type: application/x-www-form-urlencoded\n"); client.print("Content-Length: "); client.print(message.length()); client.print("\n\n"); client.print(message); } client.stop(); Serial.println("Notification sent!"); } Notice that, in the code above, the sketch sends three different parameters: - deviceId (as specified in the configuration step) - temperature(temp) - pressure (press) The last two parameters will be used by notification system in the message template to replace the $temp$ and $press$ with the current values measured by the sensor. It is time to test this IoT notification project. Just upload the sketch into your ESP and wait for the notification that should arrive in a few seconds. The final result is shown below in case you use Pushbullet chrome extension: […] monitor the climate inside a warehouse. If anything goes awry, then these systems are capable of raising alarms as well as indicating it to the remote monitoring team. The remote monitoring team can immediately […]
https://www.survivingwithandroid.com/2018/01/implement-iot-notification-system-using-arduino-pushbullet.html
CC-MAIN-2019-18
en
refinedweb
span8 span4 span8 span4 When attempting to write features to a File Geodatabase using the Esri Geodatabase (File Geodb) writer, a runtime error occurs during the process reporting: Runtime Error! Program: <FME HOME>\fme.exe R6034 An application has made an attempt to load the C runtime library incorrectly. Please contact the application's support team for more information. Once the message box has been closed the translation completes successfully. The same error may be posted when attempting to view any dataset in the Data Inspector - not just File Geodatabases. This error is caused by third-party software, and not by FME or the ArcObjects code. iCLS (Intel Capability Licensing Service) Client, installed as part of the Intel graphic card drivers suite, adds itself into the process of the engine executable and links against a different version of the C runtime file. When the engine application is executed, iCLS Client accesses its own copy of the system file, 'msvcr90.dll'. This system file does not match the C++ runtime version in the system location in the WinSXS folder. The file mismatch triggers the runtime error message. Contact the vendor (Intel) to request a fix for the runtime issue. We have found the following workarounds: • Try removing the following directories from the PATH environment variable. Some users have reported that all Intel related directories must be removed. We recommend that you check with the vendor before doing this. C:\Program Files (x86)\Intel\iCLS Client\; C:\Program Files\Intel\iCLS Client\ • Rename the c runtime (msvcr90.dll) in the iCLS client folder fixes (i.e. rename the msvcr90.dll that is located in either of the paths below): C:\Program Files(x86)\Intel\Intel(R) Management Engine Components C:\Program Files\Intel\Intel(R)Management Engine Components • Some users have reported that it is also possible to use a Startup Python script to modify the PATH environment variable for the FME process. See this article for more information on python modules within FME. import os os.environ['PATH'] = '' • If the issue occurs with Data Inspector, try disabling background maps. Viewing and Inspecting Geodatabases Geodatabase Behaviour: Updating a File Geodatabase Performing spatial queries on database tables using the FeatureReader Unsupported Esri Field Type Error (GlobalID) | ArcSDE Geodatabase Using the FeatureReader to Query a Geodatabase Comparison of FME readers and writers for SDE and Geodatabase Converting from Geodatabase Format Converting to Geodatabase Format Working with Geodatabase Domains: Creating A Coded Domain Working with Geodatabase Subtypes: Creating A Subtype
https://knowledge.safe.com/articles/20199/c-runtime-error-6034.html?smartspace=fanouts
CC-MAIN-2019-18
en
refinedweb
Change API The GigaSpace.change and the ChangeSet allows updating existing objects in Space, by specifying only the required change instead of passing the entire updated object. Additional Resources The GigaSpace.change and the ChangeSet allow updating existing objects in the Space, by specifying only the required change instead of passing the entire updated object. This reduces the required network traffic between the client and the Space, and the network traffic generated from replicating changes between Space instances (for example, between the primary Space instance and its backup). Moreover, using this API also can prevent having to read the existing object prior to the change operation, because the change operation can specify how to change the existing property without knowing its current value. For instance, implementing atomic Counters can be done by increasing a counter property of an integer property by some delta. Another example is adding a value to a collection. The change API supports transactions in the same way the other Space operation supports it, using a transactional GigaSpace instance. Example The following example demonstrates how to increment by one the count property of an object of type WordCount, with ID myID. GigaSpace space = // ... obtain a space reference String id = "myID"; IdQuery<WordCount> idQuery = new IdQuery<WordCount>(WordCount.class, id, routing); space.change(idQuery, new ChangeSet().increment("count", 1)); Query Template The change operation can receive any query template for matching a single object or multiple objects that need to be changed by the operation. Change Set The change operation requires a ChangeSet that describes the changes that have to be made after locating the object specified by the query template. The ChangeSet contains a predefined set of operations that can be invoked to alter the object. The set can contain one or more changes that will be applied sequentially to the object. Each specified change can operate on any level of properties of the specified object. This is defined by specifying the path to the property that needs to be changed, where ".')); Specifying the Path Each operation in the change set acts on a specified string path. This path points to the property that needs to be changed, and has the following semantic: - First level property - A path with no ".' character in it points to a first-level property. If the property specified by this path is not part of the Object, it is treated as a dynamic property (see Dynamic Properties). If the object doesn't support dynamic properties, an exception is generated. - Nested property - A path that contains a ".' character is considered a path to a nested property. The location process of the final property that needs to be changed is done recursively by activating the properties, specified by the split of the path using the ".' character, one at a time until reaching the targeted end property. - Nested Map property - A path that contains a ".' character may also point to keys inside a map, meaning the following path - "attributes.color' looks for a key named "color' if the property named "attribute' Change API with the Embedded Model With the embedded model, updating (as well adding or removing) a nested collection with large number of elements must use the Change API because the default behavior is to replicate the entire Space object and its nested collection elements from the primary to the backup (or other replica primary copies when using the sync-replicate or the async-replicated cluster schema). The Change API reduces the CPU utilization on the primary side, the serialization overhead, and the garbage collection activity on both the primary and backup instances. This significantly improves the overall system stability. Change Result The change operations returns a ChangeResult object that provides information regarding the effect of the change operation. were changed by this operation (where 0 means none were changed). The getResults property gives further details about the objects that were actually changed by providing a collection that gives details for each of the objects that were changed, such as their ID and version after the change took effect. By default, in order to reduce network overhead, calling getResults will throw UnsupportedOperationException. In order to get the more detailed result, the ChangeModifiers.RETURN_DETAILED_RESULTS should be passed to the change operation. For more information, see the Advanced Implementations page. ChangeException Upon any error, a ChangeException about objects that were successfully changed, just like the ChangeResult.getResults property. This property can only be used if the change operation was executed using the ChangeModifiers.RETURN_DETAILED_RESULTS modifier. The getFailedChanges property contains details about objects for whom the change operation failed. These details include information about ID, version, and the actual cause for failure. The getErrors property contains the general reasons for failed change operations that do not apply to a specific object, such as not being able to access the Space. Disabling the Path Caching By default, the Change API caches paths that are updated repeatedly in order to improve performance. However, this may increase memory consumption more than usual in certain cases, such as when the path is dynamic. To prevent memory leaks, you can disable the path caching. The following code example shows how to define exactly which paths shouldn't be cached for the entire ChangeSet, which then affects the mutators that are provided. String path1 = "myMapField.myTestKey1"; String path2 = "myMapField.myTestKey2"; ChangeSet changeSet = new ChangeSet().increment(path1, 0.1 ) .decrement(path2, 0.45 ).disablePathCaching(path1,path2); gigaSpace.change(spaceQuery, changeSet); If you are using the custom change operation, use the disable caching method described in the Custom Change topic. Multiple Changes in a Single Operation Multiple changes can be applied in one change operation by setting up multiple operations in the change set. Do this by chaining the are applied to the object sequentially (and atomically), keeping the order applied in the ChangeSet. Changing the Object's Lease By default, the change operation doesn't modify the existing remaining lease of the changed entries. In order to change the lease, a new lease should be specified in the ChangeSet using the lease operation. GigaSpace space = // ... obtain a space reference space.change(idQuery, new ChangeSet().lease(1000)...); The lease can be changed as part of other changes applied to the object, or the ChangeSet can include only the lease modification without any property changes. The lease time specified will override the existing lease with the new value, relative to the current time, while ignoring the current lease. The above example sets the lease of the changed object to one second from the time the change operation takes effect. Change with Timeout A timeout can be passed to the change operation. This timeout will only be used if any of the objects to be changed is locked under a transaction that is not from the current thread context. In this case, all objects that are not locked are changed, and the operation is blocked until one of the following two events happens: - The transaction lock is released - in this case, the change operation is applied on the objects that were previously locked but are now available. - A timeout occurs - in this case, the change operation returns with an exception. Like all other failures, the exception is a ChangeExceptionthat contains the successful changes. All the objects that were still locked when the timeout period elapsed are part of the getFailedChangesproperty of the exception, each with a failure reason of UpdateOperationTimeoutException. If there are no matching objects for the specified template/Query, the operation returns a regular Space update operation regarding Optimistic Locking. It increases an ID query with version, the Space routing property must also be specified. If the object has no Space routing, then its Space ID property is the routing property and it should be used, as shown in the previous example. Notifications Change is delivered as a regular update notification, with the state of the object after the change was applied. Modifiers The following modifiers can be used with the change operation: ChangeModifiers.RETURN_DETAILED_RESULTS- Provides details of the change result, containing more information about the objects that were changed. Requires more network traffic. ChangeModifiers.ONE_WAY- Change is executed in one-way mode, which means the operation doesn't wait for the change operation to reach the server. The result is always null and there is no guarantee that the change operation is successful, as this mode doesn't guarantee any exceptions upon failure. The only guarantee is that the operation is successfully written to the local network buffer. ChangeModifiers.MEMORY_ONLY_SEARCH- Searches for matching entries in cache memory only (doesn't use the underlying external data source). However, any changes done on the matching entries are propagated to the underlying external data source. Asynchronous Change The change operation has also an asynchronous API, in which the operation is dispatched to the server and the result is returned asynchronously via a listener or a future. This operation behaves exactly like can support change operations, and make use of lighter replication between the Space and the mirror. For more information on how to implement this, refer to the Advanced Implementations topic. Replication Filter Change passes through the Replication Filter like other operations, and can be discarded on the replication level, for example. For more information on how to handle change in replication filters, refer to the Advanced Implementations topic. Add and Get Operations A common usage pattern is to increment a numeric property of a specific entry, and then to need the updated value after the increment was applied. Using the addAndGet operation, you can meet this need using a single method call to get atomic add and get operation semantics. The following is an example of incrementing a property called. You can use import static org.openspaces.extensions.ChangeExtension. so that you don't have to prefix the call with `ChangeExtension'. Considerations - If replicated to a gateway and a conflict occurs, the change operation only supports the built-in abortresolution as overridein change case may result with an inconsistent state of the object. - The change operation is converted to a regular update when delegated to a synchronous data source. Limitations rownum is not supported with the Changeset SQLQuery operation.
https://docs.gigaspaces.com/latest/dev-java/change-api-overview.html
CC-MAIN-2019-18
en
refinedweb
Web Services Security for Java October 28, 2003 My new WebServices.XML.com column, which focuses on web services security, will demonstrate practical aspects of using various security standards for web services along with specific server side technologies and programming languages. In the first few articles of the column, I will demonstrate the use of web services security (WSS) in Java applications, and I will outline what is required for their implementation. This first column presents a simplified high-level API that offers Java programmers an easy interface to produce and consume WSS messages. In this column I discuss security tokens, token references, XML encryption (for convenience I use the namespace prefix xenc), and XML digital signatures (prefix ds) that I have already covered in my recent four part series (Part 1, Part 2, Part 3, and Part 4). WSS Use Cases: Client Side A good place to start is a review of various web services security authoring use cases: A client application wants to add a security token to a SOAP message for authentication. I discussed several types of security tokens (certificate, username, SAML assertion, etc.) in the second, third, and fourth parts of my Web Services Security series. The client authors the complete SOAP Body, passes the SOAP Envelope along with a security token to WSS4J, and asks WSS4J to attach the security token to the SOAP message. The client application does not have the capability of generating the WSS structure for the token. So in order to author the token the client application will rely on WSS4J. For example, if the token is an X509 certificate, the client application will simply pass the X509 certificate byte array to WSS4J. WSS4J will author the complete WSS compliant XML structure of the security token, wrap the security token inside a WSS header, and return the completed WSS message back to the client application. A client application wants to sign a portion of a SOAP message using a private cryptographic key associated with an X509 certificate. The client application has already added the certificate to the SOAP message inside a WSS header as a security token. The client application asks WSS4J to sign a particular portion of the WSS message using the private key associated with the certificate. There are two ways of identifying the particular portion that needs to be signed: either a fragment identifier or an XPath expression. If you want to use fragment identifiers, the Web Services Utility ( wsu) namespace can help you. wsuis a general purpose namespace () which defines utility data structures (such as identifiers, timestamps, etc.) for use by other web services specifications. One of the attributes defined by the wsu namespace is wsu:Id, which is used to hold identifiers for different element nodes. WSS clients can use wsu:Idattributes as fragment identifiers by adding a wsu:Idattribute value to the SOAP message element that it wants to sign. For example, in Listing 1 the wsu:Idattribute value of the SOAP message body is "MyMessageBody". So if the client wants to sign the SOAP message body of Listing 1, it will simply ask WSS4J to sign the element with attribute value "MyMessageBody". wsu:Id Instead of using the wsu:Idattribute, WSS clients can also use XPath to identify a particular element node of a WSS message. In this case, the client will author an XPath expression to identify the element to be signed. Refer to Resources to learn how to write an XPath expression to identify a particular XML element. Whether the client uses wsu:Idor an XPath expression to identify the element to be singed, WSS4J will produce the signature and return the signed WSS message to the client application. A client application wants to encrypt a particular portion of a SOAP message. The client application first adds the certificate of the intended recipient of the message as a WSS token. It then provides the fragment identifier or an XPath expression to WSS4J and asks the application to produce XML encrypted version of the message. WSS4J produces the encrypted portion of the message and returns the completed message back to the requesting client application. The client application can use these use cases in any order and any number of times. For example, a client application can first add a security token to a SOAP message, then sign a portion of the message, then encrypt a part of a message, and so on. Listing 1 is an example WSS message that contains two tokens, a signature, and an encrypted data structure. Server Side These three use cases represent the client or producer usage model of WSS4J. Now let's consider the server or consumer usage model. A server application has received a WSS message with a number of security tokens. The XML firewall needs to extract a list of all tokens from the WSS message. So it asks WSS4J to extract the tokens from the WSS message. WSS4J extracts all the tokens and returns them to the requesting server application. The server will need to provide a secret key to WSS4J for decryption of encrypted portions of a WSS message. If the author of the WSS message used a public key to encrypt a portion of the message, the corresponding private key is required to decrypt the encrypted portion. Similarly, if the client signed a portion of the message using a session key inside a Kerberos ticket, the server will need a password to decrypt the ticket and extract the session key, without which the server cannot verify the signature (refer to Resources for more details on Kerberos). Therefore, the server may provide a secret to WSS4J corresponding to each token in a WSS message. Notice that the server may not know all the secrets associated with all the authentication tokens in a WSS message. That's because a WSS message may be targeted for more than one server. The server only knows the secrets associated with tokens targeted for itself. For example, if A receives a WSS message with a Kerberos ticket authentication token targeted for B, A will not be able to extract the session key and use it to verify signatures or decrypt encrypted portions. The server may also ask the WSS4J to provide a list of all XMLDS signatures in the WSS message. After WSS4J has provided a list of all signatures, the server application can ask WSS4J to process any individual signature. Similarly, the server may also ask WSS4J to provide a list of all encrypted elements in a WSS message. After WSS4J has provided a list of all encrypted elements, the server application can ask WSS4J to decrypt any individual encrypted element. The WSS4J API This section describes a programmatic interface (the WSS4J API) that exposes methods to implement the use case scenarios that we discussed in the previous section. In this column, we will provide a high level view of the WSS4J API. Later columns will incrementally implement the low level details of the API. Look at Listing 2, which shows a class named WSSMessage, which is the main class in our WSS4J API. This class represents both the client and server side functionality by implementing the following methods: The WSSMessage() constructor This method takes a string named soapMessage as a parameter. The soapMessage string represents a SOAP message. The constructor will load the soapMessage string into a DOM document object, thus becoming ready for WSS authoring and processing. The SOAP message may or may not already contain a WSS security header. If the SOAP contains a WSS security header, the WSSMessage constructor will parse the WSS message to perform the following functions: Load all WSS tokens, token references, xenc:EncryptedKey, and ds:KeyInfoelements present in the WSS security header into a list of Tokenobjects. Tokenis an interface (shown in Listing 3) which represents abstract functionality of a security token as well as xenc:EncryptedKeyand ds:KeyInfoelements. WSS allows a very flexible and extensible mechanism for defining and using many types of tokens, where each type of token will have its own functionality. That's why we have defined Tokenas an abstract Java interface and not as a Java class. We will later implement the Tokeninterface separately for each type of token and explain the functionality of each Tokenimplementation. For example, the Tokeninterface of Listing 3 contains a method named setSecret(), which takes a byte array and treats the byte array as a secret. In case of an X509 certificate token, the secret will represent the private key associated with the certificate. While in case of a Kerberos service ticket, the recipient's password is the secret that will be used to decrypt the ticket and fetch the session key. Load all the ds:Signatureelements into a list of Signatureobjects. We will provide details of the Signatureclass in later columns of this series. For now just note that a Signatureobject represents a single ds:Signatureelement and exposes methods to verify the signature it represents. Each Signatureobject also needs a Tokeninstance associated with it. So the WSSMessageconstructor will detect which Tokenobject corresponds to each of the Signatureobjects and store a reference of the Tokeninstance in the Signatureobject. Load all the xenc:EncryptedDataelements into a list of xenc:EncryptedDataobjects. We will discuss the details of the EncryptedDataclass in a later column. For now just note that an EncryptedDataobject represents a single xenc:EncryptedDataelement and exposes methods to decrypt the encrypted portion. Each EncryptedDataobject also needs a Tokenassociated with it. So the WSSMessageconstructor will map Tokenobjects corresponding to each of the EncryptedDataobjects and store a reference of the Tokeninstance in the EncryptedDataobject. The addToken() method This method takes a Token object as a parameter and adds the token to the WSS message. Every new token is prepended to the existing header, which means it is added as the first child element of the WSS security header. The addID() method This is a helper method that takes two string type parameters. The first parameter ( XPathExpression) is an XPath filter that specifies an element of the WSS message loaded into the WSSMessage object. The second parameter ( wsuId) specifies an identifier for the element. This method adds a wsu:Id attribute with a value equal to the value of the wsuId parameter to the element that the XPathExpresession parameter specifies. Note if you sign a message first, and then insert any attribute after producing the signature, you will break your signature. Applications should make sure to insert a wsu:Id to an element before signing it. The encryptElement() method This method is used to encrypt a portion of the WSS message already loaded into the WSSMessage object. The encrypt method takes four parameters: - The first parameter ( wsuElementID) is a wsu:Idfor the element to be encrypted. - The second parameter ( token) is the Tokenobject (the interface of Listing 3) to be used for encryption. - The third parameter ( wsuEncryptedElementID) is the identifier that the encrypt()method will insert into the encrypted element for its identification. - The fourth parameter ( encryptionAlgo) identifies the encryption algorithm to be used for encryption. When a client application calls this message, the method will look for an element in the WSS message whose wsu:Id attribute value matches with the wsuElementID string. It will then encrypt the element to produce the encrypted data structure according to XML encryption syntax. The encryptElementWithXPath() method This method is the same as the encryptElement() method described above, except that the element to be encrypted is identified using an XPath expression instead of a wsu:Id. The sign() method This method takes six parameters: - The first parameter ( wsuElementID) is a WSU identifier for the element to be signed. - The second parameter ( token) identifies the Tokeninstance to be used to produce the signature (e.g. the certificate to be used to produce the signature). - The third parameter ( wsuSignatureID) is the identifier that the sign()method will include in the ds:Signatureelement that it is going to produce. - The fourth parameter ( digestAlgo) identifies the algorithm to be used in calculating the digest value of the data to be signed. - The fifth parameter ( signatureAlgo) specifies the signature algorithm to be used. - The sixth parameter ( canonicalizationAlgo) specifies the canonicalization algorithm to be used. This method signs a particular element in the WSS message to generate a ds:Signature element, which is inserted in the WSS security header. The signWithXPath() method This method is the same as the sign() method described above, except that the element to be signed is identified using an XPath expression instead of a wsu:Id. The getAllTokens() method This method returns a list of all tokens (an array of objects implementing the Token interface of Listing 3) associated with this WSS message. The WSS4J API takes all occurrences of keys -- public or encrypted symmetric keys -- certificates, Kerberos tickets, and so on, in a WSS message as tokens, whether or not they are used as a WSS token. For example, in Listing 1, the first token (whose wsu:Id is " myCertificate") is a WSS token. On the other hand, the symmetric key (whose wsu:Id is " mySymmetricKey") is not a WSS token. Both these are taken as Tokens in WSS4J API. As already explained, each type of token will implement the Token interface of Listing 3 to expose its own processing logic. The getAllSignatures() method This method returns a list of all Signature objects associated with the WSS message. As already mentioned, a Signature object represents a ds:Signature element and exposes methods to process and verify the signature. The getAllEncryptedData() method This method is similar to the getAllSignatures() method and returns a list of EncryptedData objects associated with the WSS message. As already mentioned, every EncryptedData object handles the functionality related to a particular occurrence of an xenc:EncryptedData element. WSS4J Components You have seen a high level view of the WSS4J API, which sets the scene for us to look into WSS4J implementation details. You will need the following Java-based components to implement the WSS4J API: - XML Security Suite by Apache or IBM - Java Authentication and Authorization Services (JAAS) - Java API for XML Processing (JAXP) - Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE), which are part of the Java Development Kit (JDK) version 1.4 - Apache Axis SOAP server The next column in this series will explain the role of each of these components in implementing the client and server side features of WSS.
https://www.xml.com/pub/a/ws/2003/10/28/jwss.html
CC-MAIN-2022-05
en
refinedweb
Jun 13 2017 05:41 PM Jun 13 2017 05:41 PM so the ddocumentation for spfx command sets says we should import { Dialog } from '@microsoft/sp-dialog/lib/index'; to display a dialog box. i thought we were supposed to be using fabric for. the ui. what's up with that? Jun 14 2017 05:02 AM Jun 14 2017 05:02 AM @Russell Gove, One right doesn't mean that the other is wrong. For dialogs you have quite a few options the option in this article by @Vesa Juvonen is one way:... Recently for one of my customer I developed a custom form solution within a TypeScript SPFx web part. The nice thing about the SPFx is that you can use any framework you like just add it with npm to your project and off you go. No real limitations just a lot of options. So far I've found it a great way to say to my customers "almost anything is possible". If it doesn't exist yet, then simply start from scratch and with simple TypeScript development you could build the forms , dialogs etc. it all depends on your requirements. In Vesa's article you will find one of these options. Jun 14 2017 05:13 AM Jun 14 2017 05:13 AM
https://techcommunity.microsoft.com/t5/sharepoint-developer/import-dialog-from-microsoft-sp-dialog-lib-index/td-p/77600
CC-MAIN-2022-05
en
refinedweb
Gateway side of RC-MAC. More... #include <introspected-doxygen.h> Gateway side of RC-MAC. ns3::UanMacRcGw is accessible through the following paths with Config::Set and Config::Connect: This MAC protocol assumes a network topology where all traffic is destined for a set of GW nodes which are connected via some out of band (RF?) means. UanMacRcGw is the protocol which runs on the gateway nodes. 60 of file uan-mac-rc-gw.h. Assign a fixed random variable stream number to the random variables used by this model. Return the number of streams (possibly zero) that have been assigned. Implements ns3::UanMac. Definition at line 737 of file uan-mac-rc-gw.cc. References NS_LOG_FUNCTION. Attach PHY layer to this MAC. Some MACs may be designed to work with multiple PHY layers. Others may only work with one. Implements ns3::UanMac. Definition at line 212 of file uan-mac-rc-gw.cc. References ns3::MakeCallback(). Clears all pointer references Implements ns3::UanMac. Definition at line 79 of file uan-mac-rc-gw 103 of file uan-mac-rc-gw.cc. Enqueue packet to be transmitted Implements ns3::UanMac. Definition at line 199 of file uan-mac-rc-gw.cc. References NS_LOG_WARN. Implements ns3::UanMac. Definition at line 187 of file uan-mac-rc-gw.cc. Implements ns3::UanMac. Definition at line 225 of file uan-mac-rc-gw.cc. Implements ns3::UanMac. Definition at line 193 of file uan-mac-rc-gw.cc. Implements ns3::UanMac. Definition at line 206 of file uan-mac-rc-gw.cc.
https://coe.northeastern.edu/research/krclab/crens3-doc/classns3_1_1_uan_mac_rc_gw.html
CC-MAIN-2022-05
en
refinedweb
Rendering the Image Field The Image field allows content writers to upload an image that can be configured with size constraints and responsive image views. Before Reading This page assumes that you have retrieved your content and stored it in a variable named document. The easiest way to render an image is to retrieve and add the image url and alt text to image elements. Here is an example that retrieves the url and alt text from an Image field with the API ID of illustration. // In a React component render() { return <img src={document.data.illustration.url} alt={document.data.illustration.alt} /> } It's easy to get the url for an image and any of its views. The following shows how to retrieve the image url for the main view as well as its tablet and mobile views. In this case, the Image field has an API ID of responsive_image, and it assumes that your have stored your document content in a state variable named "document". // In a React component render() { if (this.state.document) { const document = this.state.document; const mainView = document.data.responsive_image; const tabletView = document.data.responsive_image.tablet; const mobileView = document.data.responsive_image.mobile; return ( <picture> <source media="(max-width: 400px)" srcSet={mobileView.url} /> <source media="(max-width: 900px)" srcSet={tabletView.url} /> <source srcSet={mainView.url} /> <img src={mainView.url} alt={mainView.alt} /> </picture> ); } else { return null; } } If you added an alt text or copyright text value to your image, you retrieve them.
https://prismic.io/docs/technologies/rendering-the-image-field-reactjs
CC-MAIN-2022-05
en
refinedweb
- 🏃 Getting started - 🔌 Plugin options - 🎨 Images - 🚨 Limitations - 🛠 Development - 💾 Migrating from v4 to v5 to your Gatsby site. npm install gatsby-source-shopify Configure Add the plugin to your gatsby-config.js: require("dotenv").config() module.exports = { plugins: [ { resolve: "gatsby-source-shopify", options: { password: process.env.SHOPIFY_SHOP_PASSWORD, storeUrl: process.env.GATSBY_SHOPIFY_STORE_URL, }, }, "gatsby-plugin-image", ], } Retrieving API Information from Shopify In Shopify admin, SHOPIFY_STORE_URL is the Store address you enter when logging into your Shopify account. This typically is in the format of myshop.myshopify.com. Once logged into Shopify admin, navigate to the Apps page and click the link at the bottom to Manage private apps. This will allow you to turn on private apps and create an app that Gatsby will use to access Shopify’s Admin API. For the Private app name enter Gatsby (the name does not really matter). Add the following under the Active Permissions for this App section: Read accessfor Products Read accessfor Product listingsif you want to use Shopify’s Product Collections in your Gatsby site Read accessfor Ordersif you want to use order information in your Gatsby site Read accessfor Inventoryand Locationsif you want to use location information in your Gatsby site. ⠀ ⠀ View GraphiQL, an in-browser IDE, to explore your site's data and schema ⠀ ⠀ Note that the development build is not optimized. To create a production build, use gatsby build Now follow the second link to explore your Shopify data! Plugin options password: string The admin password for the Shopify store + app you’re using storeUrl: string Your Shopify store URL, e.g. some-shop. salesChannel: string Not set by default. If set to a string (example My Sales Channel), only products and collections that are active in that channel will be sourced. If no sales channel is provided, the default behavior is to source products that are available in the online store. Note: If you set up your site with the Gatsby Cloud Public App integration, salesChannel is set for you. Note: If you want to filter products by a Private App instead of Public App or default sales channel, you have to provide App ID instead of sales channel name. Images We offer. In this case, querying for image data from your Gatsby site might look like this: products: allShopifyProduct( sort: { fields: [publishedAt], order: ASC } ) { edges { node { id storefrontId featuredImage { id altText gatsbyImageData(width: 910, height: 910) } } } } You could then display the image in your component like this: import { GatsbyImage } from "gatsby-plugin-image" function ProductListing(product) { return ( <GatsbyImage image={product.featuredImage.gatsbyImageData} alt={product.featuredImage.altText} /> ) } Use runtime images If you get Shopify images at runtime that don’t have the gatsbyImageData resolver, for example from the cart or Storefront API, you can use the getShopifyImage function to create an imagedata object to use with <GatsbyImage>. It expects an image object that contains the properties width, height and originalSrc, such as a Storefront API Image object. import { GatsbyImage } from "gatsby-plugin-image" import { getShopifyImage } from "gatsby-source-shopify" function CartImage(storefrontProduct) { // This is data from Storefront, not from Gatsby const image = storefrontProduct.images.edges[0].node const imageData = getShopifyImage({ image, layout: "fixed", width: 200, height: 200, }) return <GatsbyImage image={imageData} alt={image.altText} /> } Download images up front If you wish to download your images during the build, you can specify downloadImages: true as a plugin option: require("dotenv").config() module.exports = { plugins: [ { resolve: "gatsby-source-shopify", options: { password: process.env.SHOPIFY_SHOP_PASSWORD, storeUrl: process.env.GATSBY_SHOPIFY_STORE_URL, downloadImages: true, }, }, "gatsby-plugin-image", ], } This will make the build take longer but will make images appear on your page faster at runtime. If you use this option, you can query for your image data like this. products: allShopifyProduct( sort: { fields: [publishedAt], order: ASC } ) { edges { node { id storefrontId featuredImage { id localFile { childImageSharp { gatsbyImageData(width: 910, height: 910, placeholder: BLURRED) } } altText } } } } Then you would use gatsby-plugin-image to render the image: import { GatsbyImage, getImage } from "gatsby-plugin-image" function ProductListing(product) { const image = getImage(product.featuredImage.localFile) return <GatsbyImage image={image} alt={product.featuredImage.altText} /> } Limitations The bulk API was chosen for resiliency, but it comes with some limitations. For a given store + app combination, only one bulk operation can be run at a time, so this plugin will wait for in-progress operations to complete. If your store contains a lot of data and there are multiple developers doing a clean build at the same time, they could be waiting on each other for a significant period of time. Development This is a yarn workspace with the plugin code in a plugin/ folder and a test Gatsby site in the test-site/ folder. After cloning the repo, you can run yarn from the project root and all dependencies for both the plugin and the test site will be installed. Then you compile the plugin in watch mode and run the test site. In other words, - From the project root, run yarn cd plugin yarn watch - Open a new terminal window to the test-site/folder yarn start Subsequent builds will be incremental unless you run yarn clean from the test-site/ folder to clear Gatsby’s cache. You can also test an incremental build without restarting the test site by running yarn refresh from the test-site/ folder. Migrating from v4 to v5 We don’t currently have a migration guide but you can find some tips in this issue. Please read through it and add a comment with any additional information you might have.
https://v4.gatsbyjs.com/plugins/gatsby-source-shopify
CC-MAIN-2022-05
en
refinedweb
Introduction What is React.cloneElement()? React.cloneElement() is part of the React Top-Level API used to manipulate elements. It clones and returns a new element using its first argument as the starting point. This argument can be a React element or a component that renders a React element. The new element will have the following characteristics: - The original element’s props with the new props merged in shallowly - New children replace the existing children keyand reffrom the original element are preserved React.cloneElement() is useful when you want to add or modify the props of a parent component’s children while avoiding unnecessary duplicate code. Syntax and use of React.cloneElement() Before we look at some examples, let’s look at the syntax of React.cloneElement(). The syntax is given in the next code block, followed by some term definitions. React.cloneElement(element, [props], [...children]) element: The element to be cloned [props]: Props that will be added to the cloned element in addition to those of the original element [...children]: The children of the cloned object. Note that the children of the existing object are not copied You can use React.cloneElement() within the definition of a parent component to perform the following processes: - Modify children properties - Add to children properties - Extend the functionality of children components This article dives deep into each of these three kinds of manipulations using the following examples: - Modify children properties - Repeated characters - Fancy child button - Modify radio button attributes at a go - Clone another React element as a prop - Add to children properties - Bold text - Pass prop to an element received via React.cloneElement() - Extend the functionality of children components - Alert on click Modify children properties When you modify children properties, that means you change the children’s properties by passing them through the parent component. There is no better way to explain than through real code examples. We’ll use the following examples to illustrate this concept: - Repeated characters - Fancy child button - Modify radio buttons’ attributes at a go - Clone React element as a property Before we move on, please note that in these examples, the modified properties are merged shallowly — the key and ref are maintained. There is no creation of new children yet, though we’ll take a look at that in the last example of this article. 1. Repeated characters In the next code block, RepeatCharacters is a parent component and CreateTextWithProps is a child component. CreateTextWithProps has an attribute called ASCIIChar whose value is any valid ASCII character. RepeatCharacters will use React.cloneElement() to repeat this character in the cloned element the number of times specified in its times property. import React from "react"; const CreateTextWithProps = ({ text, ASCIIChar, ...props }) => { return ( <span {...props}> {text}{ASCIIChar} </span> ) }; const RepeatCharacters = ({ times, children }) => { return React.cloneElement(children, { // This will override the original ASCIIChar in the text. ASCIIChar: children.props.ASCIIChar.repeat(times), }) }; function App() { return ( <div> <RepeatCharacters times={3}> <CreateTextWithProps text="Habdul Hazeez" ASCIIChar='.' /> </RepeatCharacters> </div> ) } export default App Below is the result as seen in a Web browser: 2. Fancy child button Nothing fancy here — this is some code that shows a button with the text “Fancy button” on it. It’s proof that you can customize these components to suit your needs. The ButtonContainer component uses React.cloneElement() to modify the appearance of the element rendered by the Button component. In this case, you provide null as the third argument to React.cloneElement() because, as a reminder, you are not creating any new children. import React from "react"; const ButtonContainer = (props) => { let newProp = { backgroundColor: "#1560bd", textColor: '#ffffff', border: '1px solid #cccccc', padding: '0.2em', } return ( <div> {React.Children.map(props.children, child => { return React.cloneElement(child, {newProp}, null) })} </div> ) }; const Button = (props) => { return <button style={{ color: props.newProp.textColor, border: props.newProp.border, padding: props.newProp.padding, backgroundColor: props.newProp.backgroundColor }}>Fancy Button</button> } function App() { return ( <ButtonContainer> <Button /> </ButtonContainer> ) } export default App When you view the result in a Web browser, you’ll get something similar to the image below. 3. Modify radio buttons’ attributes In HTML, radio buttons are grouped. You can only select one of the provided options, and they always seem to have a name attribute attached to them. With the knowledge that you’ve gained so far, you can dynamically add this name attribute to multiple child components via a single parent component. In this case, the child component should be either radio buttons or a component that renders the radio buttons. import React from "react"; const RadioGroup = (props) => { const RenderChildren = () => ( React.Children.map(props.children, child => { return React.cloneElement(child, { name: props.name, }) }) ) return ( <div> {<RenderChildren />} </div> ) } const RadioButton = (props) => { return ( <label> <input type="radio" value={props.value} name={props.name} /> {props.children} </label> ) } function App() { return ( <RadioGroup name="numbers"> <RadioButton value="first">First</RadioButton> <RadioButton value="second">Second</RadioButton> <RadioButton value="third">Third</RadioButton> </RadioGroup> ) } export default App You can use your browser’s Inspect Element feature to confirm this. 4. Clone another React element as a prop You’ll likely find yourself in a situation where you have to create a website header with different text for different web pages. Multiple options are available in your React arsenal, which likely includes storing the header text in a variable, passing this variable as a prop to a component, and rendering the text. You would probably then do this inside every component that requires this header text. As you might guess, this creates unnecessary code duplication, and as software developers will know, we should always advocate for keeping things simple. Instead, you can use React.cloneElement to achieve this same goal more easily. Create three reusable components, namely: Header DefaultHeader BigHeader The Header component would receive a component as a prop. This component will eventually render the header text. To be on the safe side, DefaultHeader will be the default component passed to Header. DefaultHeader will render the default text. This default text is rendered when Header is called with no props. Meanwhile, the BigHeader component will have a message prop whose value is your chosen header text. Every time you pass BigHeader to Header, you can modify the value of this message prop before it’s rendered by BigHeader. All of this is illustrated in the next code block. import React from "react"; import { BrowserRouter as Router, Route, Link } from 'react-router-dom'; const DefaultHeader = (color) => { return ( <div style={{ color: "#1560bd" }}> <p>Website of Habdul Hazeez</p> </div> ) } const defaultMessage = 'Website of Habdul Hazeez'; const BigHeader = ({ color, message = defaultMessage }) => { return ( <div style={{ color, fontSize: '2em' }}> {message} </div> ) } const Header = ({ hero = <DefaultHeader />}) => { return ( <div> {React.cloneElement(hero, { color: "#1560bd"})} </div> ) } const HomePage = () => { return ( <Header hero={<BigHeader message="This is the home page" />} /> ) } const AboutMe = () => { return ( <Header hero={<BigHeader message="Information about me" />} /> ) } const ContactPage = () => { return ( <Header hero={<BigHeader message="This contains my contact information." />} /> ) } function App() { return ( <React.Fragment> <Router> <nav> <ul> <li> <Link to="/">Home</Link> </li> <li> <Link to="/contact-page">Contact</Link> </li> <li> <Link to="about-me">About</Link> </li> </ul> </nav> <Route exact<HomePage /></Route> <Route path="/contact-page"><ContactPage /></Route> <Route path="/about-me"><AboutMe /></Route> </Router> </React.Fragment> ) } export default App Add to children properties When you add to a child property, that means you’ve inserted something new into the child via the parent component. The following examples discussed in this section will explain how to add props via React.cloneElement(). Note, as I stated in the previous section, the new props are merged in, key and ref are maintained and new children are not created (at least for now). Bold text Don’t get discouraged when you read this section’s title and think: “This is easy.” I know it’s “easy” — on its face. The lesson here is adding a property to the child element(s) using React.cloneElement(). To show you how this works, we’ll revisit the first example in this article, about repeated characters. You will not be repeating any characters, though — instead, you’ll define a custom CSS style that is added to the child using the React.cloneElement() function. This is illustrated in the next code block. import React from "react"; const CreateTextWithProps = ({ text, ...props }) => { return ( <span {...props}> {text} </span> ) }; const BoldText = ({ children }) => { return React.cloneElement(children, { style: { fontWeight: 'bold' }, }) }; function App() { return ( <div> <BoldText> <CreateTextWithProps text="Habdul Hazeez" /> </BoldText> </div> ) } export default App; Pass prop to an element received via React.cloneElement() This is similar to what you did in the above section, titled “Clone another React element as a prop,” but here, you’ll clone a prop using React.cloneElement(). This prop has to be a valid React element, such as <h1> or <button>. When you clone this prop, you can pass additional properties like CSS styling or an event handler. In the next code block, you’ll pass a handleClick function to the prop that gets rendered by AlertOnClick. Therefore, every time the element is clicked, the code within handleClick is executed. import React from "react"; const AlertOnClick = (props) => { function handleClick () { alert("Hello World") } const Trigger = props.trigger; return ( <div> {React.cloneElement(Trigger, { onClick: handleClick })} </div> ) } function App() { return ( <div> { <AlertOnClick trigger={<button>Click me</button>} /> } </div> ) } export default App Extend the functionality of children components So far, you’ve modified and added to children props. This example demonstrates the last characteristics of a cloned element because we are finally creating a new child! This new child is passed as the third argument to React.cloneElement(). Alert on click In this example, we’ll extend the functionality of the children. In the next code block, a new button element created via React.cloneElement() from the Button component has two additional twists: an onClick event handler and new text. import React from "react"; const Button = () => { return ( <button type="button" style={{ padding: "10px" }}> This is a styled button </button> ) } function App() { return ( <section> { React.cloneElement( Button(), // component to overwrite { onClick: () => { // additional props alert("You are making progress!!!") } }, <> Styled button with onClick </> ) } </section> ) } export default App When this code is executed, the button will render with the text added via React.cloneElement() function which will read “Styled button with onClick” as seen in the image below. Conclusion This article explained how to use the React.cloneElement() function using seven different examples. Four of those examples explained how to modify the props of child components; another two examples detailed how to add props to child components; and, finally, our last example showed how to extend the functionality of a child component. Hopefully, what you learn in this article can add some touch of creativity to your.
https://blog.logrocket.com/using-react-cloneelement-function/
CC-MAIN-2022-05
en
refinedweb
Description. API Docs - Okta Authentication SDK for Java alternatives and similar libraries Based on the "Security" category. Alternatively, view Okta Authentication SDK for Java alternatives based on common mentions on social networks and blogs. Keycloak9.4 9.8 L2 Okta Authentication SDK for Java VS KeycloakOpen Source Identity and Access Management For Modern Applications and Services Spring SecuritySpring Security jjwt8.9 6.0 L1 Okta Authentication SDK for Java VS jjwtJava JWT: JSON Web Token for Java and Android Apache ShiroApache Shiro CryptomatorMulti-platform transparent client-side encryption of your files in the cloud Bouncy CastleBouncy Castle Java Distribution (Mirror) pac4j7.5 9.4 L4 Okta Authentication SDK for Java VS pac4jSecurity engine for Java (authentication, authorization, multi frameworks): OAuth, CAS, SAML, OpenID Connect, LDAP, JWT... KeywhizA system for distributing and managing secrets jCasbinAn authorization library that supports access control models like ACL, RBAC, ABAC in Java Themis by Cossack LabsEasy to use cryptographic framework for data protection: secure messaging with forward secrecy and secure data storage. Has unified APIs across 14 platforms. Google KeyczarEasy-to-use crypto toolkit Okta Spring Boot StarterOkta Spring Boot Starter Hdiv3.8 1.9 L2 Okta Authentication SDK for Java VS HdivHdiv CE | Application Self-Protection PicketLinkUmbrella project for security and identity management. Nbvcxz3.5 1.3 L3 Okta Authentication SDK for Java VS NbvcxzPassword strength estimator OACC FrameworkOACC (Object ACcess Control) is an advanced Java Application Security Framework Nimbus JOSE+JWTJSON Web Token (JWT) implementation for Java with support for signatures (JWS), encryption (JWE) and web keys (JWK).. OPS - Build and Run Open Source Unikernels * Code Quality Rankings and insights are calculated and provided by Lumnify. They vary from L1 to L5 with "L5" being the highest. Do you think we are missing an alternative of Okta Authentication SDK for Java or a related project? README Okta Java Authentication SDK - Release status - Need help? - Getting started - Usage guide - Configuration reference - Building the SDK - Contributing The Okta Authentication SDK is a convenience wrapper around Okta's Authentication API. Is This Library Right for Me?. Otherwise, most applications can use the Okta hosted sign-in page or the Sign-in Widget. For these cases, you should use Okta's Spring Boot Starter, Spring Security or other OIDC/OAuth 2.0 library. Authentication State Machine Okta's Authentication API is built around a state machine. In order to use this library you will need to be familiar with the available states. You will need to implement a handler for each state you want to support. We also publish these libraries for Java: You can learn more on the Okta + Java page in our documentation. Release status This library uses semantic versioning and follows Okta's library version policy. The latest release can always be found on the releases page. Need help? If you run into problems using the SDK, you can - Ask questions on the Okta Developer Forums - Post issues here on GitHub (for code errors) Getting started To use this SDK you will need to include the following dependencies: For Apache Maven: <dependency> <groupId>com.okta.authn.sdk</groupId> <artifactId>okta-authn-sdk-api</artifactId> <version>${okta.authn.version}</version> </dependency> <dependency> <groupId>com.okta.authn.sdk</groupId> <artifactId>okta-authn-sdk-impl</artifactId> <version>${okta.authn.version}</version> <scope>runtime</scope> </dependency> <dependency> <groupId>com.okta.sdk</groupId> <artifactId>okta-sdk-httpclient</artifactId> <version>${okta.sdk.version}</version> <scope>runtime</scope> </dependency> For Gradle: compile 'com.okta.authn.sdk:okta-authn-sdk-api:${okta.authn.version}' runtime 'com.okta.authn.sdk:okta-authn-sdk-impl:${okta.authn.version}' runtime 'com.okta.sdk:okta-sdk-httpclient:${okta.sdk.version}' where ${okta.authn.version} is the latest published version in Maven Central and ${okta.sdk.version} is the latest published version in Maven Central. SNAPSHOT Dependencies Snapshots are deployed off of the 'master' branch to OSSRH and can be consumed using the following repository configured for Apache Maven or Gradle: You'll also need: - An Okta account, called an organization (sign up for a free developer organization if you need one) Construct a client instance by passing it your Okta domain name and API token: AuthenticationClient client = AuthenticationClients.builder() .setOrgUrl("https://{yourOktaDomain}") .build(); Hard-coding the Okta domain works for quick tests, but for real projects you should use a more secure way of storing these values (such as environment variables). This library supports a few different configuration sources, covered in the configuration reference section. Usage guide These examples will help you understand how to use this library. You can also browse the full API reference documentation. Once you initialize a AuthenticationClient, you can call methods to make requests to the Okta Authentication API. To call other Okta APIs, see the Management SDK. Authenticate a User An authentication flow usually starts with a call to authenticate: // could be where to redirect when authentication is done, a token, or null String relayState = "/application/specific"; client.authenticate(username, password, relayState, stateHandler); Everything looks pretty standard except for stateHandler. The AuthenticationStateHandler is a mechanism to fire an event for the given authentication state returned. Basically, it prevents you from needing to use something like a switch statement to check state of the AuthenticationResponse. A typical AuthenticationStateHandler may look something like: public class ExampleAuthenticationStateHandler extends AuthenticationStateHandlerAdapter { @Override public void handleUnknown(AuthenticationResponse unknownResponse) { // redirect to "/error" } @Override public void handleSuccess(AuthenticationResponse successResponse) { // a user is ONLY considered authenticated if a sessionToken exists if (Strings.hasLength(successResponse.getSessionToken())) { String relayState = successResponse.getRelayState(); String dest = relayState != null ? relayState : "/"; // redirect to dest } // other state transition successful } @Override public void handlePasswordExpired(AuthenticationResponse passwordExpired) { // redirect to "/login/change-password" } // Other implemented states here } As noted in the above example, a user is ONLY considered authenticated if AuthenticationResponse.getSessionToken() is not null. This sessionToken can be exchanged via the Okta Sessions API to start an SSO session, but that is beyond the scope of this library. NOTE: UNKNOWN is not an actual state in Okta's state model. The method handleUnknown is called when an unimplemented or unrecognized state is reached. This could happen if: - Your handler doesn't have an implementation for the state that was just returned - Your Okta organization configuration changed, and a new state is now possible (for example, an admin turned on multi-factor authentication) - Okta added something new to the state model entirely Configuration reference This library looks for configuration in the following sources: - An okta.yamlat the root of the applications classpath - An okta.yamlfile in a .oktafolder in the current user's home directory ( ~/.okta/okta.yamlor %userprofile\.okta\okta.yaml) - Environment variables - Java System Properties - Configuration explicitly passed to the constructor (see the example in Getting started) Higher numbers win. In other words, configuration passed via the constructor will override configuration found in environment variables, which will override configuration in okta.yaml (if any), and so on. YAML configuration The full YAML configuration looks like: okta: client: connectionTimeout: 30 # seconds orgUrl: "https://{yourOktaDomain}" # i.e. proxy: port: null host: null username: null password: null requestTimeout: 10 # seconds rateLimit: maxRetries: 2 Environment variables Each one of the configuration values above can be turned into an environment variable name with the _ (underscore) character: OKTA_CLIENT_CONNECTIONTIMEOUT OKTA_CLIENT_RATELIMIT_MAXRETRIES - and so on System properties Each one of of the configuration values written in 'dot' notation to be used as a Java system property: okta.client.connectionTimeout okta.client.rateLimt.maxRetries - and so on Connection Retry / Rate Limiting By default this SDK will retry requests that are return with a 503, 504, 429, or socket/connection exceptions. To disable this functionality set the properties okta.client.requestTimeout and okta.client.rateLimit.maxRetries to 0. Setting only one of the values to zero will disable that check. Meaning, by default, four retry attempts will be made. If you set okta.client.requestTimeout to 45 seconds and okta.client.rateLimit.maxRetries to 0. This SDK will continue to retry indefinitely for 45 seconds. If both values are non zero, this SDK will attempt to retry until either of the conditions are met (not both). Setting Request Headers, Parameters, and Device Fingerprinting All of the AuthenticationClient requests allow setting additional HTTP headers and query parameters. This is useful in a variety of situations: - Device Finterprinting - Setting the X-Forwarded-Forheader - Setting additional query paramters that have not been added to the SDK yet Create a RequestContext object, and include it as a method parameter when using the AuthenticationClient. List<Header> headers = new ArrayList<>(); // set any header headers.add(new Header("aHeaderName", "aValue")); // X-Forwarded-For headers.add(Header.xForwardedFor("10.10.0.1")); // X-Device-Fingerprint headers.add(Header.xDeviceFingerprint("your-finger-print")); List<QueryParameter> queryParameters = new ArrayList<>(); // set query param queryParameters.add(new QueryParameter("aQueryParam", "aValue")); RequestContext requestContext = new RequestContext(headers, queryParameters); Building the SDK In most cases, you won't need to build the SDK from source. If you want to build it yourself, take a look at the build instructions wiki (though just cloning the repo and running mvn install should get you going). Contributing We're happy to accept contributions and PRs! Please see the [contribution guide](CONTRIBUTING.md) to understand how to structure a contribution. *Note that all licence references and agreements mentioned in the Okta Authentication SDK for Java README section above are relevant to that project's source code only.
https://java.libhunt.com/okta-auth-java-alternatives
CC-MAIN-2022-05
en
refinedweb
Character Repertoire Validation for XML January 14, 2004 In this article I present a small schema language for XML -- which can be used to restrict the use of character repertoires in XML documents -- called Character Repertoire Validation for XML (CRVX). CRVX restrictions can be based on structural components of an XML document, contexts, or a combination of both. Restricting Character Repertoires is Smart Why would anyone want to use CRVX? Well, in the first place, why have character repertoire restrictions at all? And, second, why not use W3C XML Schema (WXS), which also provides some mechanisms for this through the pattern facet of simple type restrictions. Why Character Repertoire Restrictions? In many application scenarios, XML is only a small part of the overall picture, very useful for integrating components and facilitating communications, but by no means the technology governing the data model of the whole application. Furthermore, many applications are far from supporting the full Unicode character repertoire. I have yet to receive a credit card statement without some character conversion errors. For a very long time to come, it is not realistic to expect IT infrastructures to support full Unicode. Also, in many scenarios it is explicitly required to limit the supported character repertoire, because the business process workflow should only accept characters that make sense (for example, can be rendered and understood) in the specific application scenario. So character repertoire restrictions are useful for two reasons: - Protecting legacy applications: Legacy applications often support only very limited character repertoires (for example ASCII or an ISO 8859 variant), and if they are equipped with an XML interface, like a web service, care should be taken that only data is accepted that can be processed by the application. - Protecting workflows: Newer applications may support Unicode, but won't accept the whole Unicode character repertoire because doing so doesn't make sense in their business case. Consequently, these applications should be protected from unwanted characters in the same way as legacy applications. As a last point it could be asked why there should be a schema-based way to use character repertoire restrictions. Reasons for preferring schema-based approaches over writing program code include lower authoring effort, easier maintainability, no portability issues, and the general rule that declarative definitions are better than procedural code. Why not use W3C XML Schema? So why not use WXS for character repertoire restrictions? It has always been a good design pattern for WXS schemas to use a complete layer of application-specific simple types (i.e., WXS built-in types should never be instantiated), and this layer could be used to restrict all simple types with pattern facets, thus restricting all simple types to the Unicode characters repertoires required by the application. There are several arguments against this: - Mixed Content: Depending on the application, mixed content may not even be used, or it may represent a substantial amount of the XML's character data. Unfortunately, mixed content in W3C XML Schema does not have any type, and consequently it cannot be restricted. - Simple Types Only: Since facets can only be used for simple types, they cannot restrict anything that is not a simple type, such as comments, processing instructions, element and attribute names, and mixed content. - WXS Complexity: While WXS may be the schema language of choice for some application scenarios, it still is considered to be too complex by many XML users. So if the focus of an application designer is to define character repertoire restrictions, WXS is a very complex and cumbersome way to define them. Furthermore, there still is not a single complete WXS implementation. Using WXS exposes application designers to the numerous bugs found in every WXS implementation. - Modularization: WXS was designed to define grammars for XML documents, supported by a type system supporting different ways of type derivation. Some other mechanisms has been added to WXS as an afterthought, such as identity constraints, which do not fit very well into the overall picture (because they completely ignore the types). In the same way, character repertoire restrictions could be added (though only partially, as shown already) to a WXS schema, but it may be better from the modularity point of view to separate them from the grammar defined by the schema. So the conclusion is that it may be possible to specify character repertoire restrictions using WXS, but there are limitations, and the approach might not be the best idea in the first place. The CRVX Schema Language CRVX is a specialized schema language with the single purpose of restricting the character repertoire of XML documents. For a general introduction to why a modular approach to validation is a good idea, the Document Schema Definition Languages (DSDL) home page describes a complete framework for modular XML validation. Note that DSDL does list "character repertoire validation" as one of its goals, but so far there has been no candidate for this task. A CRVX schema has two ways of restricting character repertoires. Restrictions can either be based on structural criteria ("all element names may only use the ASCII character repertoire"), contexts ("all content of description elements may only use ISO-8859-1 characters"), or a combination of both ("all text content inside description elements is limited to the ASCII character repertoire"). Since the structural view of an XML document is determined by the interpretation of the structures, CRVX supports two structural views: pureXML and namespaceXML. Depending on the selected structural view, different structural components may be specified (for example, restrictions on namespace names are only possible for namespaceXML). Since CRVX uses XSLT's concept of patterns, contexts can only be used for namespaceXML. Restrictions in CRVX can restrict the character repertoire and the length of selected structures ("all element names must be ASCII and at most 8 characters long"). Restrictions reuse mechanisms from WXS, which are character class expressions (for example [b-y]) and category escapes (for example \p{Ll} for all lowercase letters). Basically these constructs have been taken from the Unicode Regular Expression Guidelines. The expressiveness of the restrictions is very powerful because the category escapes reference values from the Unicode Character Database (UCD), which defines a very rich characterization of Unicode characters into blocks and categories. The following example shows a small CRVX schema: <crvx structures="namespaceXML" version="1.0" xmlns=""> <context path="figure/caption"> <restrict charrep="\p{IsBasicLatin} \p{IsLatin-1Supplement}"/> <context path="link"> <restrict structure="elementContent" maxlength="10"/> </context> </context> </crvx> This schema selects the namespaceXML structural view of XML documents. Consequently, only namespace-compliant document can be successfully validated with this schema. It defines a context, selecting all caption elements appearing inside figure element. For these contexts, the restriction selects all content to be restricted to the ISO-8859-1 character repertoire. In addition, all link elements appearing in this context must satisfy the condition that the element content contains a maximum of ten characters. Restrictions are logically AND'd, so that link elements inside the figure/caption context are effectively restricted to contain a maximum of ten ISO-8859-1 characters. A second example demonstrates how CRVX deals with namespaces and enables users to declare and use namespaces in CRVX schemas: <crvx structures="namespaceXML" version="1.0" xmlns=""> <namespace prefix="html" name=""/> <context path="html:html/html:head/html:title"> <restrict charrep="\p{IsBasicLatin}"/> </context> </crvx> This is a very small example showing how a CRVX schema could be used to restrict the content of XHTML Web page titles, if for some reason the authors do not trust the ability of browsers to display non-ASCII characters in the title bar (and all the other places where titles show up). Namespaces must be declared using a dedicated element, and declared namespace prefixes may then be used in context elements. These examples have almost shown everything there is to CRVX. It has been designed as a simple schema language, and it is very easy to learn and apply. Of course, for complex document classes, the CRVX schema can get lengthy since complex document classes tend to have many different contexts that need special restrictions. If one restriction should be applied to multiple contexts, it can carry a within attribute, which is used to refer to a named context. This way, CRVX supports reuse and makes it easier to specify maintainable schemas. Validation CRVX can be implemented using XSLT, even though there are some disadvantages to this approach. The advantage is that XSLT-based implementations are very easy to deploy because XSLT processors are becoming a ubiquitous piece of XML software. The disadvantages of the XSLT-based approach include: - XSLT 2.0: Since CRVX needs parts of WXS regular expressions, XSLT 2.0 is required. XSLT 2.0 is still in Working Draft status, and it will take some time to finish the specification and deploy implementations. Early implementations are available, but they are experimental and may change in the future. - Namespace-compliant XML Only: Since XSLT's data model is based on the Infoset, namespace compliance is required. However, since namespace-compliant XML is the rule, this is not a big problem. - No CDATA Sections: Another consequence of XSLT's foundation on the Infoset is the fact that CDATA sections are not part of the data model, so the structural selection of CDATA sections within documents is impossible. For a prototypical implementation, we decided that these drawbacks were acceptable and that the effort required to implement a native solution (based on some XML API) would be too high to be justified. However, for a more efficient and complete implementation, a native solution would be preferable. Further Work During the work on CRVX, it became clear that additional features could be useful in some scenarios. While CRVX 1.0 might still be below the 80/20 cut, some of these features may be too exotic to be included in a future version of CRVX: - Character References: In XML, characters may appear literally or as character references. It may be necessary to control whether characters appear in one form or the other; additional restrictions could enable users to define these two ways in which characters may appear. - XPath 2.0: Along with XSLT 2.0, XPath 2.0 is being standardized. Upgrading CRVX to XSLT 2.0 patterns would make the context patters of CRVX more powerful, allowing type-based patterns and other new features of XPath 2.0. - Character Normalization: XML 1.0 as well as the upcoming XML 1.1 do not require character normalization. If this is an application requirement, CRVX (or some other mechanism dealing with characters and character encodings) probably would be the right place to put it. Currently there are no plans to release a second version of CRVX, and seeing the lack of development in the DSDL activity, the theoretically appealing concept of modular XML validation seems to lack support from actual XML users. However, a more modular approach to XML processing in general would probably benefit many XML software projects, so we hope that at least the modular view on XML processing exemplified by CRVX is useful to give XML users some new ideas. Conclusions CRVX is a rather small schema language designed with a very specific goal in mind. At this point in time, it is the only schema language of its kind, but Diederik A. Gerth van Wijk as lead of the DSDL character repertoire validation activity is working on something that goes beyond CRVX's capabilities (so far there are no publications, though). So whether future character repertoire validation for XML will use CRVX's simple concepts is uncertain, but it certainly would be a good idea for XML users concerned with character repertoire validation to encapsulate their requirements in some declarative way and then process it with some component interpreting the declarations.
https://www.xml.com/pub/a/2004/01/14/crv.html
CC-MAIN-2022-05
en
refinedweb
Easy way to calculate d-prime with Python. In signal detection theory d-prime index is used as sensitivity index, a higher index indicates that the signal can be more readily detected. d-prime=0 is considered as pure guessing. d-prime=1 is considered as good measure of signal sensitivity/detectability. d-prime=2 is considered as awesome. Higher sensitivity rates are possible, but really rare in real life. hit rate H: proportion of YES trials to which subject responded YES = P("yes" | YES) false alarm rate F: proportion of NO trials to which subject responded YES = P("yes" | NO) The formula for d’ is as follows: d’ = z(H) – z(FA) where z(H) is z-score for hits and z(FA) is z-score for false alarms. Simple example of d-prime calculation: import numpy as np import matplotlib.pyplot as plt import scipy.stats as stats # hit rates and false alarm rates hitP = 23/30 faP = 4/30 # z-scores hitZ = stats.norm.ppf(hitP) faZ = stats.norm.ppf(faP) # d-prime dPrime = hitZ-faZ print(dPrime) OUT: 1.8386849075184297 Extreme case with hit rate =0: IMPORTANT: hit rates and false alarm rates equal to 0 or 100 will give misleading values of d-prime and calculation should be adjusted by substructing extremely low values from these rates. This little trick will have almost no effect in normal cases. hitZ = stats.norm.ppf(0/30) faZ = stats.norm.ppf(22/30) print(hitZ-faZ) OUT: -inf
https://bratus.net/knowledgebase/d-prime-with-python/
CC-MAIN-2022-05
en
refinedweb
USB Device CDC ACM Class - USB Device CDC Base Class Overview - USB Device CDC ACM Class Resource Needs from Core - USB Device CDC ACM Subclass Overview - USB Device CDC ACM Class Configuration - USB Device CDC ACM Class Programming Guide This section describes the Communications Device Class (CDC) class and the associated CDC subclass supported by Silicon Labs' USB Device stack. Silicon Labs. USB Device CDC Base Class Overview A CDC device is composed of the following interfaces to implement communication capability: Communications Class Interface (CCI) is responsible for the device management and optionally the call management. The device management enables the general configuration and control of the device and the notification of events to the host. The call management enables calls establishment and termination. Call management might be multiplexed through a DCI. A CCI is mandatory for all CDC devices. It identifies the CDC function by specifying the communication model supported by the CDC device. The interface(s) following the CCI can be any defined USB class interface, such as Audio or a vendor-specific interface. The vendor-specific interface is represented specifically by a DCI. Data Class Interface (DCI) is responsible for data transmission. Data transmitted and/or received do not follow a specific format. Data could be raw data from a communication line, data following a proprietary format, etc. All the DCIs following the CCI can be seen as subordinate interfaces. A CDC device must have at least one CCI and zero or more DCIs. One CCI and any subordinate DCI together provide a feature to the host. This capability is also referred to as a function. In a CDC composite device, you could have several functions. Therefore, the device would be composed of several sets of CCI and DCI(s) as shown in Figure - CDC Composite Device. Figure - CDC Composite Device Figure 4 CDC Composite Device A CDC device is likely to use the following combination of endpoints: A pair of control IN and OUT endpoints called the default endpoint. An optional bulk or interrupt IN endpoint. A pair of bulk or isochronous IN and OUT endpoints. Note that Silicon Labs USB device stack does not currently support isochronous endpoints. The table below shows the usage of the different endpoints and by which interface of the CDC they are used. Table - CDC Endpoint Usage Most communication devices use an interrupt endpoint to notify the host of events. Isochronous endpoints should not be used for data transmission when a proprietary protocol relies on data retransmission in case of USB protocol errors. Isochronous communication can inherently lose data since it has no retry mechanisms. The seven major models of communication encompass several subclasses. A subclass describes the way the device should use the CCI to handle the device management and call management. The table below shows all the possible subclasses and the communication model they belong to. Table - CDC Subclasses USB Device CDC ACM Class Resource Needs from Core Each time you add a CDC ACM class instance to a USB configuration via a call to the function sl_usbd_cdc_acm CDC ACM Subclass Overview The CDC base class is composed of a Communications Class Interface (CCI) and Data Class Interface (DCI), which is discussed in detail in USB Device CDC Base Class Overview . This section discusses a CCI of type ACM. It consists of a default endpoint for the management element and an interrupt endpoint for the notification element. A pair of bulk endpoints is used to carry unspecified data over the DCI. The ACM subclass is used by two types of communication devices: Devices supporting AT commands (for instance, voiceband modems). Serial emulation devices which are also called Virtual COM port devices. There are several subclass-specific requests for the ACM subclass. They allow you to control and configure the device. The complete list and description of all ACM requests can be found in the specification “Universal Serial Bus, Communications, Subclass for PSTN Devices, revision 1.2, February 9, 2007”, section 6.2.2. From this list, Silicon Labs’ ACM subclass supports the following: Table - ACM Requests Supported by Silicon Labs Silicon Labs’ ACM subclass uses the interrupt IN endpoint to notify the host about the current serial line state. The serial line state is a bitmap informing the host about: Data discarded because of overrun Parity error Framing error State of the ring signal detection State of break detection mechanism State of transmission carrier State of receiver carrier detection Silicon Labs’ ACM subclass implementation complies with the following specification: - Universal Serial Bus, Communications, Subclass for PSTN Devices, revision 1.2, February 9, 2007. USB Device CDC ACM Class Configuration This section discusses how to configure the CDC ACM Class (Communication Device Class, Abstract Control Model). There are two groups of configuration parameters: USB Device CDC ACM Class Application Specific Configurations USB Device CDC ACM Class Instance Configurations USB Device CDC ACM Class Application Specific Configurations CDC Base Class First, to use the Silicon Labs USB device CDC class module, you will need to adjust the CDC compile-time configuration #define-s according to your application needs. They are regrouped inside the sl_usbd_core_config.h header file under the CDC section. Their purpose is to inform the USB device module about how many USB CDC objects to allocate. The table below describes each configuration field available in this configuration structure. Table - USB Device CDC Configuration Defines ACM Subclass The ACM subclass has one compile-time configuration shown in the table below. Table - USB Device CDC ACM Configuration Define USB Device CDC ACM Class Instance Configurations This section defines the configurations related to the CDC ACM serial class instances. Class Instance Creation To create a CDC ACM serial class instance, call the function sl_usbd_cdc_acm_create_instance(). This function takes three configuration arguments, as described here. line_state_interval This is the interval (in milliseconds) that your CDC ACM serial class instance will report the line state notifications to the host. This value must be a power of two (1, 2, 4, 8, 16, etc). call_mgmt_capabilities Call Management Capabilities bitmap. Possible values of the bitmap are as follows: p_acm_callbacks p_acm_callbacks is a pointer to a structure of type sl_usbd_cdc_acm_callbacks_t. Its purpose is to give the CDC ACM Class a set of callback functions to be called when a CDC ACM event occurs. Not all callbacks are mandatory and a null pointer ( NULL) can be passed in the callbacks structure variable when the callback is not needed. The table below describes each configuration field available in this configuration structure. Table - sl_usbd_cdc_acm_callbacks_t Configuration Structure See section Registering Event Notification Callbacks for callback functions example. USB Device CDC ACM Class Programming Guide This section explains how to use the CDC Abstract Control Model class. Initializing the USB Device CDC ACM Class Adding a USB Device CDC ACM Class Instance to Your Device Communicating Using the CDC ACM Class Initializing the USB Device CDC ACM Class To add CDC ACM class functionality to your device, you must first initialize the CDC base class and the ACM subclass by calling the functions sl_usbd_cdc_init() and sl_usbd_cdc_acm_init(). The example below shows how to call sl_usbd_cdc_init() and sl_usbd_cdc_acm_init() using default arguments. Example - Initialization of CDC ACM Class sl_status_t status; status = sl_usbd_cdc_init(); if (status != SL_STATUS_OK) { /* An error occurred. Error handling should be added here. */ } status = sl_usbd_cdc_acm_init(); if (status != SL_STATUS_OK) { /* An error occurred. Error handling should be added here. */ } Adding a USB Device CDC ACM Class Instance to Your Device To add CDC ACM class functionality to your device, you must create an instance, then add it to your device's configuration(s). Creating a CDC ACM Class Instance Adding the CDC ACM Class Instance to Your Device's Configuration(s) Registering Event Notification Callbacks Creating a CDC ACM Class Instance Create a CDC ACM class instance by calling the function sl_usbd_cdc_acm_create_instance(). The example below shows how to create a CDC ACM class instance via sl_usbd_cdc_acm_create_instance(). Example - Creating a CDC ACM Function via sl_usbd_cdc_acm_create_instance() uint8_t subclass_nbr; sl_status_t status; status = sl_usbd_cdc_acm_create_instance(64u, SL_USBD_ACM_SERIAL_CALL_MGMT_DATA_CCI_DCI | SL_USBD_ACM_SERIAL_CALL_MGMT_DEV, NULL, &subclass_nbr); if (status != SL_STATUS_OK) { /* An error occurred. Error handling should be added here. */ } Adding the CDC ACM Class Instance to Your Device's Configuration(s) After you have created a CDC ACM class instance, you can add it to a configuration by calling the function sl_usbd_cdc_acm_add_to_configuration(). The example below shows how to call sl_usbd_cdc_acm_add_to_configuration(). Example - Call to USBD ACM sl_usbd_cdc_acm_add_to_configuration() sl_status_t status; status = sl_usbd_cdc_acm_add_to_configuration(subclass_nbr, (1) config_nbr_fs); (2) if (status != SL_STATUS_OK) { /* An error occurred. Error handling should be added here. */ } (1) Class number to add to the configuration returned by sl_usbd_cdc_acm_create_instance(). (2) Configuration number (here adding it to a Full-Speed configuration). Registering Event Notification Callbacks The CDC ACM Serial class can notify your application of any changes in line control or coding via notification callback functions. A callback functions structure can be passed as argument during the ACM instance creation. Note that those callbacks are optional. Example - CDC ACM Callbacks Registration illustrates the use of the callback registration functions. Example - CDC ACM Callbacks Implementation shows an example of implementation of the callback functions. Example - CDC ACM Callbacks Registration uint8_t subclass_nbr; sl_status_t status; sl_usbd_cdc_acm_callbacks_t sli_usbd_cdc_acm_callbacks = { app_usbd_cdc_acm_connect, app_usbd_cdc_acm_disconnect, app_usbd_cdc_acm_line_control_changed, app_usbd_cdc_acm_line_coding_changed, }; status = sl_usbd_cdc_acm_create_instance(64u, SL_USBD_ACM_SERIAL_CALL_MGMT_DATA_CCI_DCI | SL_USBD_ACM_SERIAL_CALL_MGMT_DEV, &sli_usbd_cdc_acm_callbacks, &subclass_nbr); if (status != SL_STATUS_OK) { /* An error occurred. Error handling should be added here. */ } Example - CDC ACM Callbacks Implementation bool app_usbd_cdc_acm_line_coding_changed (uint8_t subclass_nbr, sl_usbd_cdc_acm_line_coding_t *p_line_coding) { uint32_t baudrate_new; uint8_t parity_new; uint8_t stop_bits_new; uint8_t data_bits_new; /* TODO: Apply new line coding.*/ baudrate_new = p_line_coding->BaudRate; parity_new = p_line_coding->Parity; stop_bits_new = p_line_coding->StopBits; data_bits_new = p_line_coding->DataBits; return (true); (1) } void app_usbd_cdc_acm_line_control_changed (uint8_t subclass_nbr, uint8_t event, uint8_t event_changed) { bool rts_state; bool rts_state_changed; bool dtr_state; bool dtr_state_changed; bool brk_state; bool brk_state_changed; /* TODO: Apply new line control. */ rts_state = ((event & SL_USBD_CDC_ACM_CTRL_RTS) != 0) ? true : false; rts_state_changed = ((event_changed & SL_USBD_CDC_ACM_CTRL_RTS) != 0) ? true : false; dtr_state = ((event & SL_USBD_CDC_ACM_CTRL_DTR) != 0) ? true : false; dtr_state_changed = ((event_changed & SL_USBD_CDC_ACM_CTRL_DTR) != 0) ? true : false; brk_state = ((event & SL_USBD_CDC_ACM_CTRL_BREAK) != 0) ? true : false; brk_state_changed = ((event_changed & SL_USBD_CDC_ACM_CTRL_BREAK) != 0) ? true : false; } (1) It is important to return false to this function if the line coding applying failed. Otherwise, return true. Communicating Using the CDC ACM Class Serial Status Line Coding The USB host controls the line coding (baud rate, parity, etc) of the CDC ACM device. When necessary, the application is responsible for setting the line coding. There are two functions provided to retrieve and set the current line coding, as described in the table below. Table - CDC ACM Line Coding Functions Line Control The USB host controls the line control (RTS and DTR pins, break signal, and so on) of the CDC ACM device. When necessary, your application is responsible for applying the line controls. A function is provided to retrieve and set the current line controls, as are described in the table below. Table - CDC ACM Line Control Functions Line State The USB host retrieves the line state at a regular interval. Your application must update the line state each time it changes. When necessary, your application is responsible for setting the line state. Two functions are provided to retrieve and set the current line controls, as described in the table below. Table - CDC ACM Line State Functions Subclass Instance Communication Silicon Labs' ACM subclass offers the following functions to communicate with the host. For more details about the functions’ parameters, see the CDC ACM Subclass Functions reference. Table - CDC ACM Communication API Summary sl_usbd_cdc_acm_read() and sl_usbd_cdc_acm_write() provide synchronous communication, which means that the transfer is blocking. In other words, upon calling the function, the application blocks until the transfer is complete with or without an error. A timeout can be specified to avoid waiting forever. The example below shows a read and write example that receives data from the host using the bulk OUT endpoint and sends data to the host using the bulk IN endpoint. Listing - Serial Read and Write Example __ALIGNED(4) uint8_t rx_buf[2]; __ALIGNED(4) uint8_t tx_buf[2]; uint32_t xfer_len; sl_status_t status; status = sl_usbd_cdc_acm_read(subclass_nbr, (1) rx_buf, (2) 2u, 0u, (3) &xfer_len); if (status != SL_STATUS_OK) { /* An error occurred. Error handling should be added here. */ } status = sl_usbd_cdc_acm_write(subclass_nbr, (1) tx_buf, (4) 2u, 0u, (3) &xfer_len); if (status != SL_STATUS_OK) { /* An error occurred. Error handling should be added here. */ } (1) The class instance number created with sl_usbd_cdc_acm_create_instance() provides an internal reference to the ACM subclass to route the transfer to the proper bulk OUT or IN endpoint. (2) Your application must ensure that the buffer provided to the function is large enough to accommodate all the data. Otherwise, synchronization issues might happen. (3) To avoid an infinite blocking situation, specify a timeout expressed in milliseconds. A value of ‘0’ makes the application task wait forever. (4) The application provides the initialized transmit buffer.
https://docs.silabs.com/usb/1.0/05a-usb-device-class-cdc-acm
CC-MAIN-2022-05
en
refinedweb
XMonad.Hooks.BorderPerWindow Contents Description Want to customize border width, for each window on all layouts? Want specific window have no border on all layouts? Try this. Synopsis - defineBorderWidth :: Dimension -> ManageHook - actionQueue :: XConfig l -> XConfig l Usage To use this module, first import it import XMonad.Hooks.BorderPerWindow (defineBorderWidth, actionQueue) Then specify which window to customize the border of in your manageHook: myManageHook :: ManageHook myManageHook = composeAll [ className =? "firefox" --> defineBorderWidth 0 , className =? "Chromium" --> defineBorderWidth 0 , isDialog --> defineBorderWidth 8 ] Finally, add the actionQueue combinator and myManageHook to your config: main = xmonad $ actionQueue $ def { ... , manageHook = myManageHook , ... } Note that this module is incompatible with other ways of changing borders, like XMonad.Layout.NoBorders. This is because we are changing the border exactly once (when the window first appears) and not every time some condition is satisfied. actionQueue :: XConfig l -> XConfig l Source # Every time the logHook runs, execute all actions in the queue. Design Considerations - Keep it simple. Since the extension does not aim to change border setting when layout changes, only execute the border setting function once to avoid potential window flashingjumpingscaling. - The ManageHookeDSL is a nice language for specifying windows. Let's build on top of it and use it to specify window to define border.
https://xmonad.github.io/xmonad-docs/xmonad-contrib/XMonad-Hooks-BorderPerWindow.html
CC-MAIN-2022-05
en
refinedweb
On 06/20/2017 01:42 AM, Amir Goldstein wrote: On Tue, Jun 20, 2017 at 12:34 AM, Eric W. Biederman <ebiederm@xxxxxxxxxxxx> wrote: "Serge E. Hallyn" <serge@xxxxxxxxxx> writes:Apropos stackable filesystems [cc some overlayfs folks], is there any Quoting Stefan Berger (stefanb@xxxxxxxxxxxxxxxxxx):Agreed. I will take a look. I also want to see how all of this works On 06/14/2017 11:05 PM, Serge E. Hallyn wrote:Thanks! On Wed, Jun 14, 2017 at 08:27:40AM -0400, Stefan Berger wrote:I think I have something now that accomodates userns access to? security.capability: Encoding of uid is in the attribute name now as follows:This looks very close to what we want. One exception - we do want security.foo@uid=<uid> 1) The 'plain' security.capability is only r/w accessible from the host (init_user_ns). 2) When userns reads/writes 'security.capability' it will read/write security.capability@uid=<uid> instead, with uid being the uid of root , e.g. 1000. 3) When listing xattrs for userns the host's security.capability is filtered out to avoid read failures iof 'security.capability' if security.capability@uid=<uid> is read but not there. (see 1) and 2)) 4) security.capability* may all be read from anywhere 5) security.capability@uid=<uid> may be read or written directly from a userns if <uid> matches the uid of root (current_uid()) to support root in a user namespace being able to write security.capability@uid=<x> where <x> is a valid uid mapped in its namespace. In that case the name should be rewritten to be security.capability@uid=<y> where y is the unmapped kuid.val. Eric, so far my patch hasn't yet hit Linus' tree. Given that, would you mind taking a look and seeing what you think of this approach? If we may decide to go this route, we probably should stop my patch from hitting Linus' tree before we have to continue supporting it. in the context of stackable filesystems. As that is the one case that looked like it could be a problem case in your current patchset. way that parts of this work could be generalized towards ns aware trusted@uid.* xattr? I am at least removing all string comparison with xattr names from the core code and move the enabled xattr names into a list. For the security.* extended attribute names we would enumerated the enabled ones in that list, only security.capability for now. I am not sure how the trusted.* space works.
http://lkml.iu.edu/hypermail/linux/kernel/1706.2/03812.html
CC-MAIN-2022-05
en
refinedweb
jsmin 2.2.1 JavaScript minifier. JavaScript minifier. Usage from jsmin import jsmin with open('myfile.js') as js_file: minified = jsmin(js_file.read()) You can run it as a commandline tool also: python -m jsmin myfile.js NB: jsmin makes no attempt to be compatible with ECMAScript 6 / ES.next / Harmony. The current maintainer does not intend to add ES6-compatibility. If you would like to take over maintenance and update jsmin for ES6, please contact Tikitu de Jager. Pull requests are also welcome, of course, but my time to review them is somewhat limited these days. If you’re using jsmin on ES6 code, though, you might find the quote_chars parameter useful: from jsmin import jsmin with open('myfile.js') as js_file: minified = jsmin(js_file.read(), quote_chars="'\"`") Where to get it - install the package from pypi - get the latest release from latest-release on github - get the development version from master on github Contributing Issues and Pull requests will be gratefully received on Github. The project used to be hosted on bitbucket and old issues can still be found there. If possible, please make separate pull requests for tests and for code: tests will be added to the latest-release branch while code will go to master. Unless you request otherwise, your Github identity will be added to the contributor’s list below; if you prefer a different name feel free to add it in your pull request instead. (If you prefer not to be mentioned you’ll have to let the maintainer know somehow.) Build/test status Both branches are tested with Travis: The latest-release branch (the version on PyPI plus any new tests) is tested against CPython 2.6, 2.7, 3.2, and 3.3. Currently: If that branch is failing that means there’s a new test that fails on the latest released version on pypi, with no fix yet released. The master branch (development version, might be ahead of latest released version) is tested against CPython 2.6, 2.7, 3.2, and 3.3. Currently: If master is failing don’t use it, but as long as latest-release is passing the pypi release should be ok. Contributors (chronological commit order) - Dave St.Germain (original author) - Hans weltar - Tikitu de Jager (current maintainer) - - Nick Alexander - Gennady Kovshenin - Matt Molyneaux Changelog v2.2.1 (2016-03-06) Tikitu de Jager - Fix #14: Infinite loop on return x / 1; v2.2.0 (2015-12-19) Tikitu de Jager Merge #13: Preserve “loud comments” starting with /*! These are commonly used for copyright notices, and are preserved by various other minifiers (e.g. YUI Compressor). v2.1.6 (2015-10-14) Tikitu de Jager - Fix #12: Newline following a regex literal should not be elided. v2.1.5 (2015-10-11) Tikitu de Jager - Fix #9: Premature end of statement caused by multi-line comment not adding newline. - Fix #10: Removing multiline comment separating tokens must leave a space. - Refactor comment handling for maintainability. v2.1.4 (2015-08-23) Tikitu de Jager - Fix #6: regex literal matching comment was not correctly matched. - Refactor regex literal handling for robustness. v2.1.3 (2015-08-09) Tikitu de Jager - Reset issue numbering: issues live in github from now on. - Fix #1: regex literal was not recognised when occurring directly after {. v2.1.2 (2015-07-12) Tikitu de Jager - Issue numbers here and below refer to the bitbucket repository. - Fix #17: bug when JS starts with comment then literal regex. v2.1.1 (2015-02-14) Tikitu de Jager - Fix #16: bug returning a literal regex containing escaped forward-slashes. v2.1.0 (2014-12-24) Tikitu de Jager - First changelog entries; see README.rst for prior contributors. - Expose quote_chars parameter to provide just enough unofficial Harmony support to be useful. -.2.1.xml
https://pypi.python.org/pypi/jsmin
CC-MAIN-2016-50
en
refinedweb
Support » Pololu AVR C/C++ Library User’s Guide » 3. Functional Overview and Example programs » 3.e. Orangutan LED Control Functions Overview These functions allow you to easily control the user LED(s) on the 3pi Robot, Orangutan SV, Orangutan SVP, Orangutan LV-168, and Baby Orangutan B. On the Orangutan SV-xx8 and LV-168, there are two user LEDs are on the top side of the PCB with the red LED on the bottom left and the green LED on the top right. On the 3pi, there are two user LEDs on the bottom side of the PCB with the red LED on the right (when looking at the bottom) and the green LED on the left. Additional LEDs included with the 3pi may be soldered in on the top side (in parallel with the surface-mount LEDs on the underside) for easier viewing. The Orangutan SVP has two user LEDs: a red LED on the bottom right and a green LED on the top left. The Baby Orangutan has a single red LED and no green LED. Note that the red LED is on the same pin as the UART0 serial transmitter (PD1), so if you are using UART0 for serial transmission then the red LED commands will not work, and you will see the red LED blink briefly whenever data is transmitted on UART0. Note that the green LED is on the same pin as an LCD control pin; the green LED will blink briefly whenever data is sent to the LCD, but the two functions will otherwise not interfere with each other. C++ users: See Section 5.d of Programming Orangutans and the 3pi Robot from the Arduino Environment for examples of this class in the Arduino environment, which is almost identical to C++. Complete documentation of these functions can be found in Section 10 of the Pololu AVR Library Command Reference. This library comes with an example program in libpololu-avr\examples. 1. led1 A simple example that blinks LEDs. #include <pololu/orangutan.h> /* * led1: for the 3pi robot, Orangutan LV 168, Orangutan SV-xx8, Orangutan SVP, * or Baby Orangutan B * * This program uses the OrangutanLEDs functions to control the red and green * LEDs on the 3pi robot or Orangutan. It will also work to control the red * LED on the Baby Orangutan B (which lacks a second, green LED). * * * * */ int main() { while(1) { red_led(1); // red LED on delay_ms(1000); // waits for a second red_led(0); // red LED off delay_ms(1000); // waits for a second green_led(1); // green LED on (will not work on the Baby Orangutan) delay_ms(500); // waits for 0.5 seconds green_led(0); // green LED off (will not work on the Baby Orangutan) delay_ms(500); // waits for 0.5 seconds } return 0; }
https://www.pololu.com/docs/0J20/3.e
CC-MAIN-2016-50
en
refinedweb
Tirex/Overview The Tirex tile rendering system renders map tiles on the fly and caches them. It is very similar (and mostly backwards compatible) to the mod_tile/renderd system, but improves on it in many respects. Contents Rendering Backends Tirex can work with several different rendering backends at the same time. Normally Mapnik is used for this, but a test backend (to test the system setup) and a WMS backend is also provided. Maps Tirex can handle several maps. Maps can have different styles and potentially use different data. In the most common case different maps are just different map.xml style files for the Mapnik renderer. Tiles As with many other map systems, the map of the world uses a Mercator projection and is available in several zoom levels and divided into tiles. Tiles are always square and 256x256 pixels. At zoom level 0 the map of the whole world fits into one tile, at zoom level 1 there are four (two by two) tiles for the whole world. At zoom level 2 there are 16 tiles and so on. The highest zoom level depends on the detail you want. For OSM its normally about 17 to 19. Tiles are numbered x=0 (-180 degrees) to x=2^zoom-1 (+180 degrees) and from y=0 (about 85 degrees) to y=2^zoom-1 (about -85 degrees). Metatiles The tile size (256x256) is optimized for fast transfer on the web, it is not necessarily the best size for handling tiles on the tile server. Rendering many small tiles takes more time than rendering fewer bigger tiles and storing many small tiles in single files is inefficient because of the block size used by filesystems. Also a directory with many files in it will be slower than with fewer files. This is solved by aggregating several tiles into a metatile. Typically 8x8 tiles make up one metatile, but this is configurable (although sizes other than 8x8 are not well tested) in Tirex. This is the same size as used in mod_tile/renderd systems. The tile server internally always "thinks" in metatiles. Access requests for tiles are converted into requests for metatiles. Metatiles are rendered and stored. Metatiles are numbered just like tiles, a metatile number is always the same as the number of the top-left tile, in other words to get the metatile number you have to round the tile coordinates down to the neirest multiple of the metatile size (8). Tile (x=17 y=4) is metatile (x=16 y=0). In the Tirex system metatiles are represented by Tirex::Metatile objects. In addition to the x- and y-coordinates and the zoom level, a metatile also needs the map name. Jobs If a metatile should be rendered, a job must be created for it. The job contains at least the information about the metatile and the priority. It can also contain additional information such as the expire time, the source of the request and the time it took to render the job (once it is rendered). In the Tirex system jobs are represented by Tirex::Job objects. The master will keep track on where a job came from so that it can notify the source when the job is done. The Queue The master keeps a prioritized queue of jobs. Every job that comes in will be placed on the queue. When there are free renderers, the master will take the first job from the queue and sends it to the renderer backend. There is only one queue for all jobs, but it is prioritized. Priorities are positive integers, 1 is the highest priority. New jobs are added before the first job in the queue with a lower priority. Jobs are always taken from the front of the queue. So jobs will always be worked on based on their priority and age. A job can have an expire time. If it comes up to be rendered and the expire time has passed, the job will not be rendered. This basically allows you to say: I have a metatile I want rendered because I might need it in the next few minutes. But if its not rendered in, say, 10 minutes, you needn't bother rendering it. When a new job comes in for a metatile that already has a job on the queue, those two jobs will be merged. The old job will be taken from the queue and a new job will be added. The new job has the higher priority of both jobs. The expire time of the new job will be the larger of both times. No expire time is the same as "infinite expire time", so if at least one of the jobs has no expire time, the new job will have no expire time. Both sources of the two jobs will be notified when the job is rendered. The queue is implemented in a way that its doesn't matter how many jobs there are in the queue. If you want to stick 1000 or 10000 jobs in the queue, thats ok. It is your job as administrator of the system to decide which priorites to use for which kind of requests. Live requests coming in from a user should probably get a higher priority than batch requests to re-render old tiles. The Tirex system gives you the mechanisms needed, you have to decide which jobs get priority, how long they should stay on the queue etc. Buckets Tirex allows an infinite number of priorities. To make configuration and handling easier, these priorities can be divided up into several buckets. Each bucket has a name and represents all priorities in a certain range. You define the name and range. Configuration and some other operations will use those priority classes instead of the priorities itself. A typical setup will have a bucket for live requests from the web (lets call it 'live') that works on priorities 1 to, say, 9. And then one or more buckets for background requests with lower priorities. The Master The master is the heart of the Tirex system. Its job is to work throught the queue in order and to dispatch jobs to be rendered when its their turn. The manager takes the configuration and the current system load into account when deciding which and how many tiles can be rendered. Messages The Tirex system consists of several processes that work together. Requests for the rendering of metatiles and other messages are passed between those processes through UDP or UNIX domain datagram sockets. Datagram sockets are used to make handling of many data sources easier in a non-blocking environment. Messages always have the same, similar format: Fields are written as "key=value" pairs (no spaces allowed), one per line. A linefeed (LF, "\n") is used as a line ending, the software ignores an additial carriage return (CR, "\r") before the linefeed. Each message must have a "type" (for instance "type=metatile_request"). Requests will normally be answered by a reply with the same type and added "result" field. The result can either be positive ("result=ok") or negative ("result=error"). More descriptive error messages are also allowed, they always begin with "error_" ("type=error_unknown_message"). An additional error message for human consumption can be added in the "errmsg" field. Request handling The following simplified diagram shows how a tile request from a web browser is handled by Tirex: 1. The web browser ask the webserver (in this case Apache with the mod_tile module) for the tile. 2. mod_tile checks the disk for the tile. If it is available, it can be delivered to the browser immediately (9). If it is not available we go on... 3. Send a request to tirex-master for the tile. The master will put the request in the queue. 4. Once its the turn of this tile, the master will send the request on to the rendering backend, typically the one using the Mapnik renderer tirex-renderd-mapnik. There are other backends available, too. 5. The rendering backend generates the tile and stores it on disk. 6. It then sends a reply back to the master to tell it that the tile is done. 7. The master sends this reply on to the original source of the request. 8. mod_tile now gets the tile image from disk... 9. ...and sends it back to the browser.
http://wiki.openstreetmap.org/wiki/Tirex/Overview
CC-MAIN-2016-50
en
refinedweb
Event Tester - Online Code Description This is a code which shows various events working together like mouse clicked, mouse moved or component resized etc. Source Code import java.awt.*; import java.awt.event.*; import java.util.Vector; import javax.swing.JFrame; import javax.swing.JPanel; /** A program that displays all the event that occur in its window */ public class EventTestPane exten... (login or register to view full code) To view full code, you must Login or Register, its FREE. Hey, registering yourself just takes less than a minute and opens up a whole new GetGyan experience.
http://www.getgyan.com/show/347/Event_Tester
CC-MAIN-2016-50
en
refinedweb
Just a noob question, i dont know much about flickr and i would like to know more on flickr monotonizing, i heard about flickr moderator too. Anyway my point is, i am not going to use some else photo but my own photos and upload and i really want to monotonize my flickr traffic, getting perday hits of 4,168 just started 2 months back and all time flickr stats shows 124,452. And 100% sure, going to hit more hits in near future. Anyone willing to help me, i will help you in return (my word to all)
https://www.blackhatworld.com/seo/anyone-knows-how-to-monotonize-flickr-traffic.94455/
CC-MAIN-2016-50
en
refinedweb
Defines standard symbols (and types via its base trait). Defines standard types. A value containing all standard definitions in DefinitionsApi The methods available for each reflection entity, without the implementation. Since the reflection entities are later overridden by runtime reflection and macros, their API counterparts guarantee a minimum set of methods that are implemented. EXPERIMENTAL All Scala standard symbols and types. These standard definitions can accessed to using definitions. They're typically imported with a wildcard import, import definitions._, and are listed in scala.reflect.api.StandardDefinitions#DefinitionsApi.
http://www.scala-lang.org/files/archive/nightly/docs/reflect/scala/reflect/api/StandardDefinitions.html
CC-MAIN-2016-50
en
refinedweb
;24 25 public class AllModelGroup extends ModelGroup {26 private static final String RCSRevision = "$Revision: 1.1 $"; 27 private static final String RCSName = "$Name: $";28 29 public AllModelGroup() { 30 super(ModelGroup.ALL);31 }32 33 public void accept(SchemaVisitor visitor) throws SchemaException {34 visitor.visit(this);35 }36 }37 Java API By Example, From Geeks To Geeks. | Our Blog | Conditions of Use | About Us_ |
http://kickjava.com/src/org/xquark/schema/AllModelGroup.java.htm
CC-MAIN-2016-50
en
refinedweb
I am really new to java and I signed up for an AP class which is being taught very badly, and so I have no idea of how to do this part of the assignment. It prampts you to add code that will do the following Find and print the maximum sale. Print both the id of the salesperson with the max sale and the amount of the sale, e.g., “Salesperson 3 had the highest sale with $4500.” Note that you don’t need another loop for this; you can do it in the same loop where the values are read and the sum is computed. the code we are given is the following import java.util.Scanner; public class Sales { public static void main(String[] args) { final int salesPeople = 5; int[] sales = new int[salesPeople]; int sum; Scanner scan = new Scanner(System.in); for (int i=0; i<sales.length; i++) { System.out.print("Enter sales for salesperson " + i + ":"); sales[i] = scan.nextInt(); } System.out.println("\nSalesperson Sales"); System.out.println("------------------"); sum = 0; for (int i=0; i<sales.length; i++) { System.out.println(" " + " " + sales[i]); sum += sales[i]; } System.out.println("\nTotal sales: " + sum); System.out.println("Average sale " + sum/salesPeople); } Because it's your homework, I won't give you the direct answer, but instead give you some hints. If you add two variables, say, int heighestSale = -1; // assume the sales are not negative or at least one sale is not negative int heighestPerson = -1; then you update the two variables based on the current sale value in one of the loops and print out them at the end.
https://codedump.io/share/t3VdTJENowq8/1/how-to-find-the-max-value-of-an-unsorted-array
CC-MAIN-2016-50
en
refinedweb
0 I am a beginner but my problem with this game is that when i enter east it said it going to north. here my code for my main and parser also when i enter a word then it quit the game so how do i make it stay open to allow me to enter other words Main.CPP #include <iostream> #include <fstream> #ifndef Parse_h #define Parse_h #include "Parser.h" #endif using namespace std; int main() { Parser textparser; char word[20]; cout<<" Welcome To Text Adventure Game! "<<endl; cout <<"To move in the game, You will need to type in north, east, south, west"; cout <<"\nThere another command you can use in the game.\nWhich are : 'pick', 'open', 'read', 'drop', 'eat', 'close', 'look', 'search "; cout <<""<<endl; cout <<""<<endl; cout <<"\nYou Woke up and found yourself in Deep Dark Forest and you need to get out" << endl; cout <<"\nNow what you going to type in > " ; cin >> word; textparser.IsWordinCommands(word); textparser.IsWordinObjects(word); const char cmds[] = "north"; if ("north") { cout <<"\nYou Went North and found yourself in similar postion"; cout <<"\nWhat should you do now? > "; } else if ("east") { cout <<"\nYou went East and saw House"; cout <<"\nWhat should you do now? > "; } else if("south") { cout <<"\nYou cannot go backward beacuse there a wall blocking the path"; cout <<"\nWhat should you do now? > "; } else if("west") { cout <<"\nYou went to west but there are nothing in there."; cout <<"\nWhat should you do now? > "; } system("pause"); return 0; } Parser.h #ifndef parse_h #define parse_h #include <string> //Class definition for Parser Class class Parser { char* commands [50]; char* objects[50]; //how many commands can be used int numcommands; //how many objects can be used int numobjects; public: Parser() { numcommands = 12; numobjects = 12; //a word to do something char* cmds[] = {"north", "east", "south", "west", "pick", "open", "read", "drop", "eat", "close", "look", "search"}; //an object that can be used to intract with object. char* objs[] = {"fork", "knife", "sword", "enemy", "monster", "shield", "armour", "spoon", "table", "door", "room", "key"}; //initialise commands array with these valid command words for(int i=0 ; i<numcommands ; i++) { commands[i] = cmds[i]; } //initialise objects array with these valid object words for(int i=0 ; i<numobjects ; i++) { objects[i] = objs[i]; } } char* LowerCase (char* st); char* RemoveThe(char* sen); char* GetVerb(char* sen); char* GetObject(char* sen); void SortCommands(); void SortObjects(); void PrintCommands(); void PrintObjects(); bool IsWordinCommands(char* target); bool IsWordinObjects(char* target); }; #endif
https://www.daniweb.com/programming/software-development/threads/454398/text-adventure-game
CC-MAIN-2016-50
en
refinedweb
This action might not be possible to undo. Are you sure you want to continue? 1, April 2010 A Collaborative Model for Data Privacy and its Legal Enforcement Manasdeep MSCLIS [email protected] IIIT Allahabad Damneet Singh Jolly MSCLIS [email protected] IIIT Allahabad Amit Kumar Singh MSCLIS [email protected] IIIT Allahabad Kamleshwar Singh MSCLIS [email protected] IIIT Allahabad Mr. Ashish Srivastava Faculty, MSCLIS [email protected] IIIT Allahabad Abstract—This paper suggests a legalized P3P based approach for privacy protection of data for the Information owner. We put forward a model which creates a trust engine between the operating service and user’s data repository. The trust engine now routinely parses the data read/write queries with the privacy policy of the user and releases data or rejects requests as per its decision. Prior to the trust engine establishment, there has to be a agreement between the Information Owner and Service provider called “Legal Handshake” upon which proper e- contract is generated which is legally binding to both the parties. Any breach to the contract will attract the legal penalties as per IT Act 2000. Keywords- Privacy, Privacy Violations, Privacy Norms, Trust Engine, Legal Handshake, P3P Architecture component; employ privacy protection tools unnecessarily but instead smooth transactions can take place even while using our real information. It is the legal system that protects everyone. For service providers, it is beneficial as they now share stronger relationship and confidence level with their clients. Similarly, in [2], we came across the cost effective ways of protecting the privacy by giving the minimum protection as prescribed by law to all clients and charging extra premium for those opting for higher protection. That might be a good business practice, but overall it yields stagnant results. Further, no major confidence is boosted and data protection risks remain the same. In [3], framework was proposed which spoke of defined policy that governed the disclosure of personal the online services at the client side itself. This suffers drawback that in this case, some major services malfunction due to insufficient inputs from client side. a user data to from a might I. INTRODUCTION We propose a legal framework loosely based on P3P architecture. Any information owner (IO) wishing to protect his confidential data will request service provider (SP) to make a data repository in which he wishes to upload data. The IO will first need to establish a “legal handshake” with the SP for generation of contract which completely defines all the terms and conditions related to data protection of IO. IO of course, will pay as per the agreement decided mutually between the two parties. If any breach of contract occurs within the decided scope of the contract agreement on either side, then the guilty proven party will be dealt as per the provisions of the IT Act, 2000. II. LITERATURE SURVEY Papers [4] and [5] throw a good deal of light on current web privacy protection practices and made useful suggestions esp. in technical aspects by usage of artificial intelligence and semantic webs to identify pattern recognition and block the personal information in real time. These techniques have still to be matured a lot before commercialization process. We firmly believe that protection of Data Privacy is based on a strong trust model. If the trust is shaken then it is harmful to both the service provider and the Information Owner as smooth transactions are difficult. Hence, it is important for both the parties to respect each other boundaries. The trust is hence placed on the legal system which ensures that adequate importance is given to everyone. In this paper, our work is two-folded; Firstly, we suggest collaborative legal structure model loosely based on P3P framework to provide data privacy for Information owner from the service provider. Next, we wish to create a legal safe environment so that the either party can be assured of proper legal protection on contract breach. We hope that, in global trade too, having a strong backing of Data privacy framework will enable developing nations to do trade with developed In [1], there has been a healthy discussion regarding the confidence based privacy protection of an individual personal data. The author has described the various degrees of confidence levels to control the degree of disclosure of his personal information to various third parties he makes transactions with. We are extending the same concept by putting the faith on the legal system instead; for handling of all the disputes, confidence breaches whenever the mutual agreement between the two parties is compromised by any side. The advantage of this approach is that we need not 176 ISSN 1947-5500 (IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 1, April 2010 (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 1, 2010 nations like EU countries, UK, US with ease which already have well defined privacy laws for the same. Overall, it is a win-win situation for everyone. • III. PRIVACY VIOLATION FACTORS [5] tampering, since the hash result comparison captures any message identity breach Affirmative act: Creating a digital signature requires the signer to use his private key. It alerts signer that he is making a transaction abiding with the legal consequences. Efficiency: With the help of Electronic Data Interchange, creation and verification processes are capable of complete automation. Digital signatures yield a high degree of assurance without adding greatly to the resources required for processing. Provides Assurance: The likelihood of malfunction is far less than the risk of undetected forgery or alteration on paper or using less secure techniques. A PROPOSED SYSTEM DESIGN – DATA PRIVACY IN P3P ARCHITECTURE Unauthorized information transfer Businesses frequently sell individuals’ private information to other businesses w/o his explicit consent. Weak security Individuals and organizations exploit the vulnerability of Web-based services to access classified information. Often, unauthorized access is the often of weak security. Indirectly collecting information Users can authorize organizations or businesses to collect some of their private information. However, their privacy can be implicitly violated if their information undergoes analysis processes that produce new knowledge about their personality, wealth, behavior, and so on. This draws conclusions and produce new facts about the users’ shopping patterns, hobbies, or preferences. In aggressive marketing practices it can negatively affect customers’ privacy. IV. SIGNATURES • • V. A. Legal Purpose of Signature • Evidence: A signature authenticates by identifying the signer with the signed document. When done in a distinctive manner, the writing becomes attributable to the signer. Commitment: The act of signing a shows signer’s commitment and prevents inconsiderate engagements. Approval: A signature expresses the signer's approval or authorization of the writing, to have a legal effect. Efficiency and logistics: A signature imparts a sense of clarity and finality to the transaction and lessens inquires beyond scope of a document. A. XML P3P Schema Format The following XML P3P schema depicts the elements which play an important role in the traceability of the legal agreement. These element fields in electronic court serve as a vital piece of evidence. Various <element ref=....> tags serve as reference XML templates enabling us to derive their characteristics. a) XML Schema <? xml version =”1.0” encoding =.8” <schema targetNamespace=”” <import namespace="" schemaLocation=""/> b) Proposed Extended Legal P3P XML Abstraction <element ref="p3p: EXTENSION"> <element ref="p3p: REFERENCES"/> e-LEGAL-DICTIONARY • • • B. Advantages of using digital signatures: • Signer authentication: The digital signature cannot be forged, unless the signer’s private key is compromised by some means. If compromised, signer can immediately report to Issuer for revocation and generation of new private & public key pair. Message authentication: The digital signature also identifies the signed message, with better precision than paper signatures. Verification reveals any <element name="REGULATORY POLICIES"> <element name="Legal POLICY-REF"> <element name=”legalp3p: regulations”> <element ref="p3p: LEGALP3P"/> <sequence> <element name="DEFINED JURIDSICATION" LAWS OF STATE • <element name="EXCLUDED CASES" " type="anyURI" <element name="INCLUDED CASES" 177 ISSN 1947-5500 (IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 1, April 2010 (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 1, 2010 <element name="DATA LAW” </sequence> <element name="CONTRACT"> <element ref="legalp3p: P3Ppolicy"/> <complexType> <sequence> PROTECTION <attribute name="creation_date" type="nonNegativeInteger" use="optional" default="86400"/> <attribute name="Validity" type="string" use="optional"/> <attribute name="expiry_date"> <attribute name=”scope”> <attribute name=”purpose”> <attribute name=”terms & conditions”> </sequence> </complexType> <element name=”First Party Signature” > <element name="SIGNATURE”> <element ref="legalp3p: digital signature/"> <complexType> <element name SIGNATURE-value”/> ="KeyInfo” type= “legalp3p: //Information Owner's Name <DATA ref="#io.bdate"/> //Information Owner's Birth Date <DATA ref="#io.gender"/> //Information Owner's Gender (male or female) <DATA ref="#io.business-info"/> //Information Owner's Business Contact Information <DATA ref="#io.business-info.postal"/> //Postal details <DATA ref="#io.business-info.telecom"/> //Telecommunication details d) Third Party Data The third party information needs to be exchanged when ordering a present online that should be sent to another person. It can be stored in repository alongside with user dataset. <DATA ref="#thirdparty.name"/> //Information Owner's Name <DATA ref="#thirdparty.tid"/> //Transaction ID <DATA ref="#thirdparty.ds"/> //Digital Signature <DATA ref="#thirdparty.sid"/> //Service ID <DATA ref="#thirdparty.certificate”/> //X.509 Certificate No. <DATA ref="#thirdparty.business-info"/> //Information Owner's Business Contact Information <DATA ref="#thirdparty.business-info.postal"/> //Postal details <DATA ref="#thirdparty.business-info.telecom"/> //Telecommunication details e) Dynamic Data We sometimes need to specify variable data elements that a user might type in or store in a repository. In P3P all these values are stored in Dynamic data set. XML description <DATA ref="#dynamic.clickstream"/> //Click-stream information structure <DATA ref="#dynamic.clickstream.url.querystring"> <CATEGORIES>category</CATEGORIES></DATA> //Query-string portion of URL <DATA ref="#dynamic.clickstream.timestamp"/> //Request timestamp <DATA ref="#dynamic.clickstream.clientip"/> //Client's IP address or hostname structure <DATA ref="#dynamic.clickstream.clientip.hostname"/> //Complete host and domain name <element name="ISSUER” SIGNATURE-value"/> <element name="EXPIRY” SIGNATURE-value"/> <element name="SIGNATURE </complexType> <element name=”First Party Signature”/ > </element> </element> type="legalp3p: type="legalp3p: ALGORITHM” <element name=”SECOND Party Signature” > <!..... > </element> c) User XML Data The user data includes general information about the user. <DATA ref="#io.name"/> 178 ISSN 1947-5500 (IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 1, April 2010 (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 1, 2010 <DATA ref="#dynamic.clickstream.clientip.fullip"/> //Full IP address <DATA ref="#dynamic.clickstream.other.httpmethod"/> //HTTP request method f) Categories Categories are elements inside data elements providing hints to users and user agents for data usage. They allow users to express more generalized preferences over their data exchange. <Token/> // These are issued by a Web site for purposes of identifying the individual. <purchaseinfo/> // Information generated product purchase or service purchase including its mode of payment. <financialinfo/> // Information about client’s including balance, payment or overdraft history. finances B. Legal P3P Architecture <machineinfo/>// Client’s IP number, domain name, browser type or operating system. <cache/> // Data such as pages visited, and time spent on them <loginfo/> // Queries to a search engine, or activity logs <keyword/> // The words and expressions contained in the body of a communication <state/> // State Management Mechanisms used-- such as HTTP cookies. <pancard/> // Identity proof of client Figure 1 : Legal P3P Architecture The client browser of Information Owner sends a request (for privacy breach) to the Trust Engine. Inside the XML Request Response Trust Engine, the client request is parsed by reading the query and passes to Extended Legal Architecture (ELA). Inside ELA, the query is checked by a reference library of e-Legal Directory which has all the legal clause, actions and remedies mentioned from the point of view of Compliance. According to query nature, its xml form is processed by XSL style template processors and result passed through XML parsing engine to check query for its genuineness. XML Class generator now calls upon the defined XML classes to which query are pertaining with. With help of classes, the required P3P code is generated and subsequently validated by company's database terms and conditions. The entire step is now coalesced into privacy legally enforceable privacy policy of the company and is passed on to Legal validation box. In validation box, the query of client keeping in mind the privacy policy of company is checked through the mandates of the subsequent law protection as mutually agreed by both the parties in X.509 digital certificate. If the all above steps are done successfully, the Legal P3P XML Request of the client now makes a successful entry into the Electronic Court server. From here on, the law as per court directions follows its own course. 179 ISSN 1947-5500 (IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 1, April 2010 (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 1, 2010 C. Classes for Legal Structure Information Owner and the Organization. Various functions which are enforceable through Cyber Appellate Tribunal channel are acceptance, rejection, renewal or revocation of digital certificates. i) Compliance framework: A legal entity which takes reference from a government legislate such as HIPPA, SOX, DPA, IT Act 2000 etc. as per the government mandates specified for data protection. D. Legal P3P workflow on e-Contract Breach Figure 2 : Class diagram for Legal Architecture a) Court: It is an entity where every case and dispute is heard and settled. b) Cyber Appellate Tribunal: A generalized entity of Court which specializes in hearing matters pertaining to disputes regarding e-Contract and Electronic Certificates, c) Organization: An entity which has its own Digital signature and public key for each certificate of e-Contract as its unique identifiers. Functions as an intermediary to provide data protection services to its clients. Uses digital signature agreement for e-Contract with its online clients. d) Information Owner: An entity which seeks to protect its sensitive data in a safe place; or seeks some services provided by the intermediary. It has its own Digital signature and public key for enabling e-Contract agreement with the service provider via digital certificate. e) Data Privacy: A dependent policy document which is mutually agreeable by both the client and the organization. f) Legal XML P3P framework: An independent entity which creates an XML based legally enforceable document (XML digital signature) which is directly admissible in Electronic court as a valid proof of evidence. g) Enhanced Legal P3P: A P3P based policy framework which is specifically tuned to the requirements of a particular mandate derived from compliance such as HIPPA, SOX, and IT Act 2000 etc. Organization's data privacy terms and conditions are also included in it for making it verifiable in case of any breach occurrence during the tenure of an eContract. h) Legal P3P Digital Certificate: A mutually agreeable document by including Digital Certificate signed by both the Figure 3 : Workflow model on breach of e-Contract According to the client data Privacy preferences, P3P structure is generated. Now when client passes a Legal P3P request for complaint, certificate revocation, etc; the Legal P3P structure is generated and validated taking legal P3P Policy as input. Here, if user just wants to view the mandate providing protection to his data then, a reference is made to XML formatted e-Legal dictionary which contains the various legal sections, sub sections, clauses and penalties to the various offences defined by the legislature for data protection. a) Modification of e-Contract Now, we examine the legal e-Contract. If there is proposal for modification, then we directly go for changes taking eLegal Dictionary as a reference. (E.g. in case of e-Contract updating etc.) Changes made can now be accepted or rejected based on mutual agreement between both the parties. All modifications made are subsequently added to the e-Contract. b) Occurrence of e-Contract Breach An e-Contract Breach is said to have happened when either there is a complaint or an anticipatory breach takes place during modification proposal step or any complaint / anticipation breach existing in e-Contract itself. 180 ISSN 1947-5500 (IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 1, April 2010 (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 1, 2010 VI. LEGAL IMPLICATIONS: EXAMPLE SCENARIO According to IT Act 2000, if any clause of the contract mutually agreed upon by both parties is breached during its tenure, the party found guilty of such conduct in court of law shall be dealt as per penalties prescribed under section 43A, 44, 45, 66A, 66C, 67C, 71, 72A, 73. If any individual or organization is proven guilty of charges as mentioned in IT Act 2000, then they will be dealt as follows: [17] Under Section 43A: If the “body corporate” fails, or is negligent in implementing and maintaining reasonable security practices and procedures causing wrongful losses to any party, it shall be liable to pay damages by way of compensation to the victim. [17] Under Section 44: If any individual or corporation fails to: a) furnish any document, return or report to the Controller or the Certifying Authority, shall be liable to a penalty not exceeding one lakh and fifty thousand rupees b) file any return or furnish any information, books or other documents within the time specified in the regulations, shall be liable to a penalty not exceeding five thousand rupees for every day during which such failure continues c) maintain books of account or records, hall be liable to a penalty not exceeding ten thousand rupees for every day during which the failure continues. [17] Under Section 45: Residuary Penalty for any breach, of which no penalty has been separately provided, shall be liable to pay a compensation not exceeding twenty-five thousand rupees to the person affected by such breach [17] Under Section 66A: Any party who sends, by means of a computer resource or a communication device,d) any content information that is grossly offensive or has menacing character; or e) any content information for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will f) any electronic mail or electronic mail message for the purpose to mislead the addressee or recipient about the origin of such messages shall be punishable with imprisonment for a term which may extend to two or three years and with fine. [17] Under Section 66C: Any fraudulent or dishonestly usage of the electronic signature, password or unique identification feature of any other person, shall be punishable with imprisonment upto three years and also be liable to fine upto rupees one lakh. [17]. Under Section 67C: Any intermediary who intentionally contravenes the Preservation and Retention of information provisions shall be punished with an imprisonment for a term which may extend to three years and shall also be liable to fine [17]. Under Section 71: If a party makes any misrepresentation or suppresses any material fact from the Controller or the Certifying Authority for obtaining any license or Electronic Signature Certificate shall be punished with imprisonment for two years, or with fine of one lakh rupees, or both. [17] Under Section 72A: Any person including an intermediary who, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses, without the consent of the person concerned, shall be punished with imprisonment for three years, or with fine of five lakh rupees, or both.[17] Under Section 73: Any party who contravenes the provisions of Section 73 sub-section (1) shall be punished with imprisonment for two years, or with fine upto one lakh rupees, or both. [17] VII. ADVANTAGES OF USING THIS MODEL For the first time, we can trace accountability issues determine the cause of action to be taken in breach of contract cases. Other advantages are: • The electronic contract mutually agreed by parties gives a strong evidence to be provided in the court of law Accountability can be determined on event of lapse Any misrepresentation, abuse of information can be immediately checked against the terms and conditions as mentioned in contract IT Act 2000 can take course if in any case pertains to failure of supplying evidence during contract tenure. Penalties for furnishing data, and compensation to IO on failure to protect sensitive data can be made enforceable by law during contract tenure. If terms and conditions of service provider changes then the previous agreed upon terms will prevail over newer terms and conditions for the concerned IO. Overall the system comes for protection of IO sensitive data stored with service provider Strengthens faith in legal system and provides transactional confidence for both the parties Gives adequate time for both the parties to express their stand Provides a sense of legal security to developed nations which were previously afraid to do business in India due to poorly defined privacy laws. • • • • • • • • • 181 ISSN 1947-5500 (IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 1, April 2010 (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 1, 2010 VIII. CONCLUSION Privacy protection is a reaction on the lack of confidence, not the prerequisite of an interaction.[1]Therefore, for that purpose it is essential to view data privacy protection in terms of relationships of confidence, to determine who and to what extent is accountable. We believe that using a collaborative model for data privacy and its legal enforcement it is possible to achieve privacy protection in a globally consistent manner. The combination of both legislation and technical solution may provide synergy that is more effective than a single solution. ACKNOWLEDGMENTS We have no words to thank our project guide and mentor Mr. Ashish Srivastava, and Ms. Shveta Singh, Faculty, IIIT Allahabad for giving us the opportunity to work on this fabulous research area of Techno-Legal nature to propose a .model for tracing the legal accountability issues related with the e-Contract breach. We extend our thanks to MSCLIS Dept. for providing us the resource materials and books etc. to pursue our desired goal. Last but not the least, we wish to thank our batch mates for their constructive and valuable feedback. REFERENCES [1] [2] P. Cofta, “Confidence-compensating privacy protection” Sixth Annual Conference on Privacy, Security and Trust, 2008 R. J. Kauffman, Y.J.Lee, R. Sougstad, “COST-EFFECTIVE FIRM INVESTMENTS IN CUSTOMER INFORMATION PRIVACY” Proceedings of the 42nd Hawaii International Conference on System Sciences – 2009 [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] M. Jafari-Lafti, C.T. Huang, C. Farkas, “P2F: A User-Centric Privacy Protection Framework” 2009 International Conference on Availability, Reliability and Security. D. J. Weitzner “Beyond Secrecy: New Privacy Protection Strategies for Open Information Spaces” MIT Computer Science and Artificial Intelligence Laboratory, 2007 Rezgui, A. Bouguettaya, M. Eltoweissy, “Privacy on the web”, IEEE Security & Privacy, November/December 2003 PriceWaterhouseCoopers, “E-Privacy: Solving the On-Line Equation, 2002; 83D4E480256A380030E82F. W. Chung, J. Paynter, “Privacy Issues on Internet” Proceedings of the 35th Hawaii International Conference on System Sciences – 2002 James, G. (2000). “The price of privacy”. Upside. 12(4): 182-190. 2000 Apr. Platform for Privacy Preferences. (2001). Slane, B (2000). “Killing the Goose? Information Privacy Issues on the Web.” D. Goldschlag, M. Reed, and P. Syverson, “Onion Routing,” Comm. ACM, vol. 42, no. 2, 1999, pp. 39–41. E. Bertino, E. Ferrari, and A. Squicciarini, “X-TNL: An XML-Based Language for Trust Negotiations,” Proc.IEEE 4th Int’l Workshop Policies for Distributed Systems and Networks, IEEE Press, 2003. T.Cattapan, (2000) “Destroying e-commerce's "cookie monster" image”. Direct Marketing. 62(12): 20-24+. 2000 Apr. F.D. Schoeman, Philosophical Dimensions of Privacy, Cambridge Univ. Press, 1984 S.D. Warren and L.D. Brandeis, “The Right to Privacy,” Harvard Law Review, vol. 4, no. 5, 1890, pp. 193–220. A.F. Westin, The Right to Privacy, Atheneum, 1967 Indian IT Act 2000 (with 2008 amendments.
https://www.scribd.com/document/33728854/A-Collaborative-Model-for-Data-Privacy-and-its-Legal-Enforcement
CC-MAIN-2016-50
en
refinedweb
Oracle's extensions to the JDBC standard include Java packages and interfaces that let you access and manipulate Oracle datatypes and use Oracle performance extensions. Compared to standard JDBC, the extensions offer you greater flexibility in how you can manipulate the data. This chapter presents an overview of the packages and classes included in Oracle's extensions to standard JDBC. It also describes some of the key support features of the extensions. This chapter includes these topics: Introduction. Beyond standard features, Oracle JDBC drivers provide Oracle-specific type extensions and performance extensions. Both implementations include the following Java packages: oracle.sql (classes to support all Oracle type extensions) oracle.jdbc (interfaces to support database access and updates in Oracle type formats) "Oracle JDBC Packages and Classes" further describes the preceding packages and their classes. The: oracle.sql.* datatype support for collections (VARRAYs and nested tables) Oracle JDB: Oracle objects can be mapped either to the weak java.sql.Struct or oracle.sql.STRUCT types or to strongly typed customized classes. These strong types are referred to as custom Java classes, which must implement either the standard java.sql.SQLData interface or the Oracle extension oracle.sql.ORAData interface. (ChapterXXX() methods of the custom Java classes, which retrieve data into your Java application. For more information on the JPublisher utility, see the Oracle Database JPublisher User's Guide. Chapter 13, schema_name and sql_type.. See Chapter 19, "JDBC OCI Extensions" for the following OCI driver-specific information: OCI Driver Connection Pooling OCI Driver Transparent Application Failover This section describes the Java packages that support the Oracle JDBC extensions and the key classes that are included in these packages: You can refer to the Oracle JDBC Javadoc for more information about all the classes mentioned in this section. The oracle.sql package supports direct access to data in SQL format. This package consists primarily of classes that provide Java mappings to SQL datatypes. Essentially, the classes act as Java wrappers for-1 lists the oracle.sql datatype classes and their corresponding Oracle SQL types. You can find more detailed information about each of these classes later in this chapter. Additional details about use of the Oracle extended types ( STRUCT, REF, ARRAY, BLOB, CLOB, BFILE, and ROWID) are described in the following locations: toJdbc() method that converts the data into an object of a corresponding Java class as defined in the JDBC specification The JDBC driver does not convert Oracle-specific datatypes that are not part of the JDBC specification, such as ROWID; the driver returns the object in the corresponding oracle.sql.* format. For example, it returns an Oracle ROWID as an oracle.sql.ROW that get and set object data through the object reference) Refer to the Oracle JDBC Javadoc for additional information about these classes. See "Class oracle.sql.CHAR" to learn how the oracle.sql.CHAR class supports character data. For any given Oracle object type, it is usually desirable to define a custom mapping between SQL and Java. (If you use a SQLData custom Java class,. In the database, Oracle stores the raw bytes of object data in a linearized form. A STRUCT object is a wrapper for the raw bytes of an Oracle object. It contains the SQL type name of the Oracle object and a "values" array of oracle.sql.Datum objects that hold the attribute values in SQL format. You can materialize a STRUCT's attributes as oracle.sql.Datum[] objects if you use the getOracleAttributes() method, or as java.lang.Object[] objects if you use the getAttributes() method. Materializing the attributes as oracle.sql.* objects gives you all the. In some cases, you might want to manually create a STRUCT object and pass it to a prepared statement or callable statement. To do this, you must also create a StructDescriptor object. For more information about working with Oracle objects using the oracle.sql.STRUCT and StructDescriptor classes, see "Using the Default STRUCT Class for Oracle Objects". The oracle.sql.REF class is the generic class that supports Oracle object references. This class, as with all oracle.sql.* datatype classes, is a subclass of the oracle.sql.Datum class. It implements the standard JDBC 2.0 java.sql.Ref interface. The REF class has methods to retrieve and pass object references. Be aware, however, that. For more information about working with Oracle object references using the oracle.sql.REF class, see Chapter 15, "Using Oracle Object References". The oracle.sql.ARRAY class supports Oracle collections—either VARRAYs or nested tables. If you select either a VARRAY or nested table from the database, then the JDBC driver materializes it as an object of the ARRAY class; the structure of the data is equivalent in either case. The oracle.sql.ARRAY class extends oracle.sql.Datum and implements the standard JDBC 2.0 java.sql.Array interface. You can use the setARRAY() method of the OraclePreparedStatement or OracleCallableStatement class to pass an array as an input parameter to a prepared statement. Similarly, you might want to manually create an ARRAY object to pass it to a prepared statement or callable statement, perhaps to insert into the database. This involves the use of ArrayDescriptor objects. For more information about working with Oracle collections using the oracle.sql.ARRAY and ArrayDescriptor classes, see "Overview of Collection (Array) Functionality". BLOBs and CLOBs (referred to collectively as "LOBs"), and BFILEs (for external files) are for data items that are too large to store directly in a database table. Instead, the database table stores a locator that points to the location of the actual data. The oracle.sql package supports these datatypes in several ways:. You can select a BLOB, CLOB, or BFILE locator from the database using a standard SELECT statement, but bear in mind that you are receiving only the locator, not the data itself. Additional steps are necessary to retrieve the data. For information about how to access and manipulate locators and data for LOBs and BFILEs, see Chapter JDBC drivers support the most popular time zone names used in the industry as well as most of the time zone names defined in the JDK from Sun Microsystems. Time zones are specified by using the java.util.Calendar class. Use the following methods from the oracle.jdbc.OraclePreparedStatement interface to set a date/time: setTIMESTAMP(int paramIdx,TIMESTAMP x) setTIMESTAMPTZ(int paramIdx,TIMESTAMPTZ x) setTIMESTAMPLTZ(int paramIdx,TIMESTAMPLTZ x) Use the following methods from the oracle.jdbc.OracleCallableStatement interface to get a date/time: TIMESTAMP getTIMESTAMP (int paramIdx) TIMESTAMPTZ getTIMESTAMPTZ(int paramIdx) TIMESTAMPLTZ getTIMESTAMPLTZ(int paramIdx) Use the following methods from the oracle.jdbc.OracleResultSet interface to get a date/time: TIMESTAMP getTIMESTAMP(int paramIdx) TIMESTAMP getTIMESTAMP(java.lang.String colName) TIMESTAMPTZ getTIMESTAMPTZ(int paramIdx) TIMESTAMPTZ getTIMESTAMPTZ(java.lang.String colName) TIMESTAMPLTZ getTIMESTAMPLTZ(int paramIdx) TIMESTAMPLTZ getTIMESTAMPLTZ(java.lang.String colName) TIMESTAMPLTZ getTIMESTAMPLTZ(int paramIdx) Use the following methods from the oracle.jdbc.OracleResultSet interface to update a date/time: updateTIMESTAMP(int paramIdx) updateTIMESTAMPTZ(int paramIdx) updateTIMESTAMPLTZ(int paramIdx) Before accessing TIMESTAMP WITH LOCAL TIME ZONE data, call the OracleConnection.setSessionTime(). This class supports Oracle ROWIDs, which are unique identifiers for rows in database tables. You can select a ROWID as you would select any column of data from the table. Note, however, that you cannot manually update ROWIDs—the Oracle database updates them automatically as appropriate. The oracle.sql.ROWID class does not implement any noteworthy functionality beyond what is in the oracle.sql.Datum superclass. However, ROWID does provide a stringValue() method that overrides the stringValue() method in the oracle.sql.Datum class and returns the hexadecimal representation of the ROWID bytes. For information about accessing ROWID data, see "Oracle ROWID Type". The oracle.sql.OPAQUE class gives you the name and characteristics of the OPAQUE type and any attributes. OPAQUE types provide access only to the uninterrupted bytes of the instance. The following are the methods of the oracle.sql.OPAQUE class: getBytesValue(): Returns a byte array that represents the value of the OPAQUE object, in the format used in the database. public boolean isConvertibleTo(Class jClass): Determines if a Datum". This interface extends standard JDBC connection functionality to create and return Oracle statement objects, set flags and options for Oracle performance extensions, support type maps for Oracle objects, and support client identifiers. "Additional Oracle Performance Extensions" describes the performance extensions, including row prefetching and update batching. In a connection pooling environment, the client identifier can be used to identify which light-weight user is currently using the database session. A client identifier can also be used to share the Globally Accessed Application Context between different database sessions. The client identifier set in a database session is audited when database auditing is turned on. Move this to end-to-end! Key methods include: createStatement(): Allocates a new OracleStatement object. prepareStatement(): Allocates a new OraclePreparedStatement object. prepareCall(): Allocates a new OracleCallableStatement object. getTypeMap(): Retrieves the type map for this connection (for use in mapping Oracle object types to Java classes). setTypeMap(): Initializes or updates the type map for this connection (for use in mapping Oracle object types to Java classes). getTransactionIsolation(): Gets this connection's current isolation mode. setTransactionIsolation(): Changes the transaction isolation level using one of the TRANSACTION_* values. These oracle.jdbc.OracleConnection methods are Oracle-defined extensions: setClientIdentifier(): Sets the client identifier for this connection. clearClientIdentifier(): Clears the client identifier for this connection. getDefaultExecuteBatch(): Retrieves the default update-batching value for this connection. setDefaultExecuteBatch(): Sets the default update-batching value for this connection. getDefaultRowPrefetch(): Retrieves the default row-prefetch value for this connection. setDefaultRowPrefetch():-wide basis. "Additional Oracle Performance Extensions" describes the performance extensions, including row prefetching and column type definitions. Key methods include: executeQuery(): Executes a database query and returns an OracleResultSet object. getResultSet(): Retrieves an OracleResultSet object. close(): Closes the current statement. These oracle.jdbc.OracleStatement methods are Oracle-defined extensions: defineColumnType(): Defines the type you will use to retrieve data from a particular database table column. getRowPrefetch(): Retrieves the row-prefetch value for this statement. setRowPrefetch():XXX() methods for binding oracle.sql.* types and objects into prepared statements, and methods to support Oracle performance extensions on a statement-by-statement basis. "Additional Oracle Performance Extensions" describes the performance extensions, including database update batching. Key methods include: getExecuteBatch(): Retrieves the update-batching value for this statement. setExecuteBatch(): Sets the update-batching value for this statement. setOracleObject(): This is a generic setXXX() method for binding oracle.sql.* data into a prepared statement as an oracle.sql.Datum is used: pstmt.setFormOfUse (parameter index, oracle.jdbc.OraclePreparedStatement.FORM_NCHAR) close(): Closes the current statement. This interface extends the OraclePreparedStatement interface (which extends the OracleStatement interface ) and incorporates standard JDBC callable statement functionality. Key methods include: getOracleObject(): This is a generic getXXX() method for retrieving data into an oracle.sql.Datum object, which can be cast to the specific oracle.sql.* type as necessary. getXXX(): These methods, such as getCLOB(), are for retrieving data into specific oracle.sql.* objects. setOracleObject(): This is a generic setXXX() method for binding oracle.sql.* data into a callable statement as an oracle.sql.Datum is used: pstmt.setFormOfUse (parameter index, oracle.jdbc.OraclePreparedStatement.FORM_NCHAR) registerOutParameter(): Registers the SQL typecode of the statement's output parameter. JDBC requires this for any callable statement with an OUT parameter. It takes an integer parameter index (the position of the output variable in the statement, relative to the other parameters) and an integer SQL type (the type constant defined in oracle.jdbc.OracleTypes). This is an overloaded method. One version of this method is for named types only—when the SQL typecode is OracleTypes.REF, STRUCT, or ARRAY. In this case, in addition to a parameter index and SQL type, the method also takes a String SQL type name (the name of the Oracle user-defined type in the database, such as EMPLOYEE). close(): Closes the current result set, if any, and the current statement. This interface extends standard JDBC result set functionality, implementing getXXX() methods for retrieving data into oracle.sql.* objects. Key methods include: getOracleObject(): This is a generic getXXX() method for retrieving data into an oracle.sql.Datum object. It can be cast to the specific oracle.sql.* type as necessary. getXXX(): These methods, such as getCLOB(), are for retrieving data into oracle.sql.* objects. This interface extends standard JDBC result set metadata functionality to retrieve information about Oracle result set objects. See "Using Result Set Meta Data Extensions" for information on the functionality of the OracleResultSetMetadata interface. The OracleTypes class defines constants that JDBC uses to identify SQL types. Each variable in this class has a constant integer value. The oracle.jdbc.OracleTypes class duplicates the typecode definitions of the standard Java java.sql.Types class and contains these additional typecodes for Oracle extensions: OracleTypes.BFILE OracleTypes.ROWID OracleTypes.CURSOR (for REF CURSOR types) As in java.sql.Types, all the variable names are in all-caps. JDBC uses the SQL types identified by the elements of the OracleTypes class in two main areas: registering output parameters, and in the setNull() method of the PreparedStatement class. The typecodes in java.sql.Types or oracle.jdbc.OracleTypes identify the SQL types of the output parameters in the registerOutParameter() method of the java.sql.CallableStatement interface and oracle.jdbc.OracleCallableStatement interface. These are the forms that registerOutputParameter() can take for CallableStatement and OracleCallableStatement (assume a standard callable statement object cs): cs.registerOutParameter(int index, int sqlType); cs.registerOutParameter(int index, int sqlType, String sql_name); cs.registerOutParameter(int index, int sqlType, int scale); In these signatures, index represents the parameter index, sqlType is the typecode for the SQL datatype, sql_name is the name given to the datatype (for user-defined types, when sqlType is a STRUCT, REF, or ARRAY typecode), and scale represents the number of digits to the right of the decimal point (when sqlType is a NUMERIC or DECIMAL typecode). The following example uses a CallableStatement to call a procedure named charout, which returns a CHAR datatype. Note the use of the OracleTypes.CHAR typecode in the registerOutParameter() method (although java.sql.Types.CHAR could have been used as well). CallableStatement cs = conn.prepareCall ("BEGIN charout (?); END;"); cs.registerOutParameter (1, OracleTypes.CHAR); cs.execute (); System.out.println ("Out argument is: " + cs.getString (1)); The next example uses a CallableStatement to call structout, which returns a STRUCT datatype. The form of registerOutParameter() requires you to specify the typecode ( Types.STRUCT or OracleTypes.STRUCT), as well as the SQL name ( EMPLOYEE). The example assumes that no type mapping has been declared for the EMPLOYEE type, so it is retrieved into a STRUCT datatype. To retrieve the value of EMPLOYEE as an oracle.sql.STRUCT object, the statement object cs is cast to); The typecodes in Types and OracleTypes identify the SQL type of the data item, which the setNull() method sets to NULL. The setNull() method can be found in the java.sql.PreparedStatement interface and the oracle.jdbc.OraclePreparedStatement interface. These are the forms that setNull() can take for PreparedStatement and OraclePreparedStatement objects (assume a standard prepared statement object ps): ps.setNull(int index, int sqlType); ps.setNull(int index, int sqlType, String sql_name); In these signatures, index represents the parameter index, sqlType is the typecode for the SQL datatype, and sql_name is the name given to the datatype (for user-defined types, when sqlType is a STRUCT, REF, or ARRAY typecode). If you enter an invalid sqlType, a Parameter Type Conflict exception is thrown. The following example uses a PreparedStatement to insert a NULL numeric value into the database. Note the use of OracleTypes.NUMERIC to identify the numeric object set to NULL (although Types.NUMERIC could have been used as while the getConnection() method returns oracle.jdbc.driver.OracleConnection. Because the methods that use the oracle.jdbc.driver package are deprecated, the getConnection() method is also deprecated in favor of the getJavaSqlConnection() method. For the following Oracle datatype classes, the getJavaSqlConnection() method is available: oracle.sql.ARRAY oracle.sql.BFILE oracle.sql.BLOB oracle.sql.CLOB oracle.sql.OPAQUE oracle.sql.REF oracle.sql.STRUCT The following shows the getJavaSqlConnection() and the getConnection() methods in the Array class: public class ARRAY { // New API // java.sql.Connection getJavaSqlConnection() throws SQLException; // Deprecated API. // oracle.jdbc.driver.OracleConnection getConnection() throws SQLException; ... } Oracle character datatypes include the SQL CHAR and SQL NCHAR datatypes. The following sections describe how these datatypes can be accessed using the Oracle JDBC drivers. The SQL CHAR datatypes include CHAR, VARCHAR2, and CLOB. These datatypes allow you to store character data in the database character set encoding scheme. The character set of the database is established when you create the database. SQL NCHAR datatypes were created for Globalization Support (formerly NLS). SQL NCHAR datatypes include NCHAR, NVARCHAR2, and NCLOB. These datatypes allow you to store Unicode data in the database NCHAR character set encoding. The NCHAR character set, which never changes, is established when you create the database. See the Oracle Database Globalization Support Guide for information on SQL NCHAR datatypes. The usage of SQL NCHAR datatypes is similar to that of the SQL CHAR ( CHAR, VARCHAR2, and CLOB) datatypes. JDBC uses the same classes and methods to access SQL NCHAR datatypes that are used for the corresponding SQL CHAR datatypes. Therefore, there are no separate, corresponding classes defined in the oracle.sql package for SQL NCHAR datatypes. Likewise, there is no separate, corresponding constant defined in the oracle.jdbc.OracleTypes class for SQL NCHAR datatypes. The only difference in usage between the two datatypes occur in a data bind situation: a JDBC program must call the setFormOfUse() method to specify if the data is bound for a SQL NCHAR datatype.FormOfUse(2, The CHAR class is used by Oracle JDBC in handling and converting character data. The JDBC driver constructs and populates oracle.sql.CHAR objects once character data has been read from the database. The CHAR objects constructed and returned by the JDBC driver can be in the database character set, UTF-8, or ISO-Latin-1 ( WE8ISO8859P1). The CHAR objects that are Oracle object attributes are returned in the database character set. JDBC application code rarely needs to construct CHAR objects directly, since the JDBC driver automatically creates CHAR objects as character data are obtained from the database. There may be circumstances, however, where constructing CHAR objects directly in application code is useful—for example, to repeatedly pass the same character data to one or more prepared statements without the overhead of converting from Java strings each time. The CHAR class provides Globalization Support functionality to convert character data. This class has two key attributes: (1) Globalization Support character set and (2) the character data. The Globalization Support character set defines the encoding of the character data. It is a parameter that is always passed when a CHAR object is constructed. Without the Globalization Support character set being know, the bytes of data in the CHAR object are meaningless. The oracle.sql.CharacterSet class is instantiated to represent character sets.. You can find a complete list of the character sets that Oracle supports in the Oracle Database Globalization Support Guide.. For more information on character sets and character set IDs, see the Oracle Database Globalization Support Guide. Construct a CHAR object. Pass a string (or the bytes that represent the string) to the constructor along with the CharacterSet object that indicates how to interpret the bytes based on the character set. For example: String mystring = "teststring"; ... CHAR mychar = new CHAR(teststring, mycharset); The CHAR object. See the oracle.sql.CHAR class Javadoc for more information. The CHAR class provides the following methods for translating character data to strings: getString(): Converts the sequence of characters represented by the CHAR object to a string, returning a Java String object. If you enter an invalid OracleID, then the character set will not be recognized and the getString() method throws a SQLException. toString(): Identical to the getString() method. But if you enter an invalid OracleID, then the character set will not be recognized and the toString() method returns a hexadecimal representation of the CHAR data and does not throw a SQLException. getStringWithReplacement(): Identical to getString(), except a default replacement character replaces characters that have no unicode representation in the CHAR object character set. This default character varies from character set to character set, but is often a question mark (" ?"). The server (a database). For more information on how the JDBC drivers convert between character sets, see for information about BFILEs. ROWID is supported as a Java string, and REF CURSOR types are supported as JDBC result sets. A ROWID is an identification tag unique for each row of an Oracle database table. The ROWID can be thought of as a virtual column, containing the ID for each row. The oracle.sql.ROWID class is supplied as a wrapper for type ROWID SQL data. (passing in either the column index or the column name). You can also bind a ROWID to a PreparedStatement parameter with the setString() method. This allows in-place updates, as in the example that follows. (address) of a query work area, rather than the contents of the area. Declaring a cursor variable creates a pointer. In SQL, a pointer has the datatype REF x, where REF is short for REFERENCE and x represents the entity being referenced. A REF CURSOR, then, identifies a reference to a cursor variable. Because many cursor variables might exist to point to many work areas, REF CURSOR can be thought of as a category or "datatype specifier" that identifies many different types of cursor variables. datatypes, rather than a particular datatype. Stored procedures can return cursor variables of the REF CURSOR category. This output is equivalent to a database cursor or a JDBC result set. A REF CURSOR essentially encapsulates the results of a query. In JDBC, REF CURSORs are materialized as ResultSet objectscode.
http://docs.oracle.com/cd/B14117_01/java.101/b10979/oraint.htm
CC-MAIN-2016-50
en
refinedweb
.applications.jmailadmin;20 21 import java.io.Serializable ;22 23 public class Account implements Serializable 24 {25 public String user;26 public String address = "";27 public String type = "imap";28 public String inHost = "";29 public int inPort = 143;30 public String outHost = "";31 public int outPort = 25;32 public String login = "";33 public String password = "";34 public int refreshInterval = 5;35 36 public Account(String user)37 {38 this.user = user;39 }40 41 public Account(String user, String address, String type, String inHost, int inPort, String outHost, int outPort,42 String login, String password, int refreshInterval)43 {44 this.user = user;45 this.address = address;46 this.type = type;47 this.inHost = inHost;48 this.inPort = inPort;49 this.outHost = outHost;50 this.outPort = outPort;51 this.login = login;52 this.password = password;53 this.refreshInterval = refreshInterval;54 }55 } Java API By Example, From Geeks To Geeks. | Our Blog | Conditions of Use | About Us_ |
http://kickjava.com/src/org/lucane/applications/jmailadmin/Account.java.htm
CC-MAIN-2016-50
en
refinedweb
No Sponsor this Week - Pinboard No Sponsor this week. Instead, I'll just share some Pinboard tips. My loss may be your gain. 2. Subscribe to awesome people on Pinboard 3. Subscribe to awesome tags on Pinboard 4. Subscribe to the awesome Pinboard popular feed in your RSS reader. 5. Auto Import Instapaper articles: Get your secret Instapaper feed at the bottom of the web page: Then go to your Pinboard settings and subscribe to it: 5. Get the JS to show bookmarks on a page. I'd recommend getting rid of the description text though. You can do that through CSS: .pin-description { display:none; } 6. Simplify the user interface through custom CSS. For Firefox1 I use the User Style Manager plugin and a custom domain specific CSS rule to hide the descriptions and other meta data. @namespace url(); @-moz-document domain('pinboard.in') { div.description { display: none; } a.url_display { display: none; } a.tag { display: none; } a.url_link { display: none; } a.when { display: none; } } This gives a somewhat streamlined appearance: UPDATE: As noted in the comments, you must enable the option to subscribe to tags.
http://macdrifter.com/2012/10/no-sponsor-this-week-pinboard.html
CC-MAIN-2016-50
en
refinedweb
Document - Online Code Description This is a code which demonstrates a Document with a certain Action involved. Source Code import java.awt.Dimension; import java.awt.GridBagConstraints; import java.awt.GridBagLayout; import java.awt.event.ActionEvent; import java.awt.event.ActionListener; import javax.swing.BorderFactory; import jav... (login or register to view full code) To view full code, you must Login or Register, its FREE. Hey, registering yourself just takes less than a minute and opens up a whole new GetGyan experience.
http://www.getgyan.com/show/1410/Document
CC-MAIN-2016-50
en
refinedweb
WebReference.com - Excerpt from Inside XSLT, Chapter 2, Part 1 (1/4) Inside XSLT Trees and Nodes When you're working with XSLT, you no longer think in terms of documents, but rather in terms of trees. A tree represents the data in a document as a set of nodes-elements, attributes, comments, and so on are all treated as nodes-in a hierarchy, and in XSLT, the tree structure follows the W3C XPath recommendation (). In this chapter, I'll go through what's happening conceptually with trees and nodes, and in Chapters 3 and 4, I'll give a formal introduction to XPath and how it relates to XSLT. You use XPath expressions to locate data in XML documents, and those expressions are written in terms of trees and nodes. In fact, the XSLT recommendation does not require conforming XSLT processors to have anything to do with documents; formally, XSLT transformations accept a source tree as input, and produce a result tree as output. Most XSLT processors do, however, add support so that you can work with documents. From the XSLT point of view, then, documents are trees built of nodes; XSLT recognizes seven types of nodes: - The root node. This is the very start of the document. This node represents the entire document to the XSLT processor. Important: Don't get the root node mixed up with the root element, which is also called the document element (more on this later in this chapter). - Attribute node. Holds the value of an attribute after entity references have been expanded and surrounding whitespace has been trimmed. - Comment node. Holds the text of a comment, not including <!--and -->. - Element node. Consists of the part of the document bounded by a start and matching end tag, or a single empty element tag, such as <br/>. - Namespace node. Represents a namespace declaration-and note that it is added to each element to which it applies. - Processing instruction node. Holds the text of the processing instruction, which does not include <?and ?>. The XML declaration, <?xml version="1.0"?>, by the way, is not a processing instruction, even though it looks like one. XSLT processors strip it out automatically. - Text node. Text nodes hold sequences of characters-that is, PCDATA text. Text nodes are normalized by default in XSLT, which means that adjacent text nodes are merged. As you'll see in Chapter 7, you use XPath expressions to work with trees and nodes. An XPath expression returns a single node that matches the expression; or, if more than one node matches the expression, the expression returns a node set. XPath was designed to enable you to navigate through trees, and understanding XPath is a large part of understanding XSLT. Created: September 12, 2001 Revised: September 12, 2001 URL:
http://www.webreference.com/authoring/languages/xml/insidexslt/chap2/1/index.html
CC-MAIN-2016-50
en
refinedweb
I've been looking for a way to open a text file with a text editor I made with python, and assumed it had something to do with system arguments, so made a simple application which would write the arguments sent by the system to a text window, and used "open with" on the text file and application, but the only argument was the path of the application. Many questions similar to mine have been answered on here but none of the answers have worked for me. How would I do this? Thanks for any responses. (I'm using OS X 10.9.5, with python 2.7) Tried code: from Tkinter import * import sys, time root = Tk() root.geometry('300x200') text = Text(root) text.pack(side=TOP, fill="both", expand=True) text.insert(END, sys.argv) for x in xrange(len(sys.argv)): text.insert(END,sys.argv[x]) root.mainloop() If I understand your question correctly, you are talking about opening a file with the Finder's Open with context menu when clicking on a file. If so, it's probably a duplicate of MacOSX - File extension associate with application - Programatically. The standard way is to create an OS X app bundle (for Python programs, you can use py2app to do that) and then set proper key type in its Info.plist. That's assuming your text editor is a true GUI app (uses Tkinter or Cocoa or whatever) and not just a program that runs in a shell terminal window (in Terminal.app for example). In that case, you might be able to create a simple wrapper app (even using AppleScript or Automator and modifying its Info.plist as above) to launch your Python program in a terminal window and pass in the file name from the open event. To properly handle multiple files opened at different times would require more work. UPDATE: as you have clarified, you are using Python Tkinter and a real GUI app. The native OS X Tk implementation provides an Apple Event handler to allow you to process Apple Events like Open Document. The support is described in tcl terms in the Tcl/Tk documentation so you need to translate it to Python but it's very straightforward. Python's IDLE app has an example of one, see, for instance, addOpenEventSupport in macosxSupport.py. For simple apps using py2app, you could instead use py2app's argv emulation.
https://codedump.io/share/3rmvLWuxuQWZ/1/using-quotopen-withquot-on-a-text-file-with-a-python-application
CC-MAIN-2018-26
en
refinedweb
Name, and click Next. Note that your skill's name must not indicate that it's functionality is limited. For example, you should not use "basic", "reduced" or "simple" in the title of your skill. The skill will default to English (US). Change the language using the drop-down, if you are targeting a different region/language. See Build Smart Home Skills in Multiple Languages to see the device categories that are supported for each language. - On the Choose a model to add to your skill page, Select Smart Home, which is a pre-built model, and click Create skill. - Under Payload Version, select v3. - Click Save and Smart Home service endpoint.: - N.Virginia for English (US) or English (CA) skills - EU (Ireland) region for English (UK), English (IN), German or French (FR) skills - US West (Oregon) for Japanese and English (AU) skills. The region is displayed in the upper right corner. Providing your Lambda function in the correct region prevents latency issues. -, or:", ; var responseHeader = request.directive.header; responseHeader.namespace = "Alexa"; responseHeader.name = "Response"; responseHeader.messageId = responseHeader.messageId + "-R"; // get user token pass in request var requestToken = request.directive.endpoint = { } } ] } ] } } } Configure the Smart Home Service Endpoint You must provide the ARN for your Lambda function in the skill configuration in the developer console. - Navigate back to your skill in the Developer Console. - Under 2. Smart Home service endpoint, in the Default endpoint box, provide the ARN number from the Lambda function you created and click Save. If you are creating multiple language versions of your skill, In the Section 3. Account Linking, click Setup Account Linking Authorization Code Grant. For an overview of account linking in smart home skills, see: Test Your Skill When your implementation is complete, and you've tested your Lambda function, you can functionally test your smart home skill. -. On the Test page, move the test slider to Yes and use the Alexa Simulator to. Note that skill certification is different than Works with Alexa certification for devices. See Certify Your Device, State Reporting State reporting is recommended for all smart home skills because it provides the best customer experience. For more information, see Understand State Reporting in a Smart Home Skill. State reporting is required for smart home skills that target devices that are certified as Works With Amazon Alexa. For more details, see Works with Alexa Requirements for a Smart Home Skill. Complete the following steps to implement state reporting: - Ensure your skill responds to ReportState directives with StateReport events. - Request permission to send events to the Alexa event gateway - Add code to receive the AcceptGrant directive and obtain authentication credentials. - Add code to Send ChangeReport messages to the Alexa event gateway using the stored customer authentication tokens.
https://developer.amazon.com/docs/smarthome/steps-to-build-a-smart-home-skill.html
CC-MAIN-2018-26
en
refinedweb
EDE300 Parallel/ Serial Transceiver IC - Gillian Lambert - 1 years ago - Views: Transcription 1 EDE300 Parallel/ Serial Transceiver IC EDE300 Data Direction, Output Latch 1 Dir/Latch XMIT 18 Serial Transmit 0=2400,1= BAUD RCV 17 Serial Receive 0=Local, 1=Host 3 Mode OSC1 16 Oscillator Connection Connect to +5V DC 4 +5V OSC2 15 Oscillator Connection Digital Ground 5 GND +5V 14 Connect to +5V DC Data I/O Pin 0 6 D0 D7 13 Data I/O Pin 7 Data I/O Pin 1 7 D1 D6 12 Data I/O Pin 6 Data I/O Pin 2 8 D2 D5 11 Data I/O Pin 5 Data I/O Pin 3 9 D3 D4 10 Data I/O Pin 4 The EDE300 Parallel/ Serial Transceiver IC is a 5 volt, 18 pin package designed to conveniently convert 8-bit parallel data into serial format and vice-versa. The EDE300 is ideal for logging data to a PC, controlling hardware via the PC serial port, communicating 8-bit data via a serial connection, and expanding I/O capabilities on microcontrollers and Stamps. The EDE300 is BAUD-selectable, offering both 2400 and 9600 BAUD communication. PC connection requires the use of a voltage level shifter such as the MAX233. The EDE300 can be configured as either a halfduplex transmitter, a half-duplex receiver, or a half-duplex bi-directional transceiver. PIN DEFINITIONS Flow Control Pins: Data Direction, /Latch (PIN 1): In Local Control Mode pin is an INPUT: Input of 0 = Parallel to Serial, 1 = Serial to Parallel. In Host Control Mode, pin is an OUTPUT: EDE300 drives this pin low on receive, high on transmit Baud Rate (PIN 2): 0 = 2400 BAUD, (N 8 1); 1 = 9600 BAUD, (N 8 1) Mode (PIN 3): 0 = Local Control Mode, 1 = Host Control Mode Data Pins: Serial Transmit (PIN 18) : Serial Receive (PIN 17): D0..D7 (PIN 6..PIN 13): Serial data is output from the EDE300 via this pin Serial data is input to the EDE300 via this pin Data I/O Pins (DO is least significant bit) COPYRIGHT 1996 E-Lab Digital Engineering, Inc. All Rights Reserved. Page # 1 2 Clock/ Power Pins: OSC1,OSC2 (PIN 16,PIN 15): Power (PIN 14,PIN 4): Ground (PIN 5): 4 MHz Resonator Connection Connect to +5 VDC Connect to 0 VDC (GND) LOCAL CONTROL MODE In Local Control Mode, enabled by wiring the Mode pin low (Pin 3), directional control is selected by the condition of the Dir/Latch pin (Pin 1). When Local Control Mode is selected and the Dir/Latch pin is low, the EDE300 acts as a Parallel to Serial transmitter, continually reading the 8 data pins (D0..D7) and sending this value out the serial XMIT pin (Pin 18). When Local Control Mode is selected and the Dir/Latch pin is high, the EDE300 acts as a Serial to Parallel receiver, continually monitoring the RCV pin (Pin 17) and latching the received data onto the 8 data pins (D0..D7). NOTE: Switching the Dir/Latch pin causes the data I/O pins (D0..D7) to switch from inputs to outputs and vice-versa. Care should be taken that data is not input into the 8 data pins while the EDE300 is in Serial to Parallel mode (Pin 17 high); otherwise damage may occur to the EDE300 or the external circuitry as both attempt to drive the I/O pins. See the Host Control Mode section's schematics for details on switching the data inputs and outputs with the EDE300. The following schematics depict the EDE300 in a basic, unidirectional hookup, transmitting (Figure One) and receiving (Figure Two) data to and from a PC via the PC serial port COM 1. Figure One: Unidirectional Serial Transmission to PC The following code, written in Turbo C, illustrates the reception of the EDE300 s data stream. It can be used in conjunction with the hardware setup in Figure One. #include <stdio.h> char data; /* 8 BIT VARIABLE TO HOLD INCOMING DATA */ main() COPYRIGHT 1996 E-Lab Digital Engineering, Inc. All Rights Reserved. Page # 2 3 while(1) /* BEGIN INFINITE LOOP */ data = inportb(0x3f8); /* READ COM PORT #1 */ printf( %d,data); /* CAST CHAR TO 'INT' TO VIEW ACTUAL VALUE */ if (data == 0) exit(0); /* IF INPUT IS ZERO, EXIT INFINITE LOOP */ NOTE: If your PC is not sending or receiving data properly in these examples, you may need to enter the following at the command prompt: MODE COM N 8 1 This will set up the COM1 port correctly for use at 9600 BAUD as is used in the hardware examples in this section. Figure Two: Unidirectional Serial Reception from PC The following code, written in Turbo C, illustrates a data write to the EDE300. It can be used in conjunction with the hardware setup in Figure Two. #include <stdio.h> char data; /* 8-BIT VARIABLE TO HOLD OUTGOING DATA */ main() data = 128; /* VALUE TO BE WRITTEN TO EDE300 */ outportb(0x3f8,data); /* WRITE 'DATA' TO COM PORT #1 */ COPYRIGHT 1996 E-Lab Digital Engineering, Inc. All Rights Reserved. Page # 3 4 Notice that the MAX233 (or MAX232) voltage level shifter is needed for connection to a PC to meet the required RS-232 line voltage requirements. A level shifter, as is used in the above two examples, is not needed for connection to a Stamp or microcontroller, as can be seen in the 'BASIC STAMP CONNECTION' section, or between two EDE300's, as illustrated below. Figure Three: Two-Wire/ Wireless Data Transmission This arrangement is useful when 8-bit data needs to be sent in one direction across a twisted pair or coaxial cable. A variation on this schematic is the addition of a RF transmitter/ receiver pair on the data line, providing a wireless 8-bit connection. For example, with the TX-99 and RE-99 transmitter/ receiver pair from Ming Microsystems (available from Digi-Key, DIGI-KEY), an 8- bit wireless bus can be implemented. Serial data from the transmitting EDE300 is fed into the TX-99. The RE-99 receives the serial data and feeds it to the receiving EDE300. Alternately, short range transmission could be accomplished via an infrared transmitter/ receiver pair. HOST CONTROL MODE In Host Control Mode, selected by wiring the Mode (Pin 3) high, the EDE300 takes data-flow instructions from a host device connected to it serially instead of from the Data Direction Pin (Pin 1). The host, typically a PC, STAMP, or microcontroller, sends a one-byte command to the EDE300 instructing it to either receive one data byte and latch it onto the data pins (D0..D7) or to read the data pins and transmit this value serially. The host should transmit a value of either "1" or "2" to the EDE300 in Host Control Mode. If an ASCII '1' is received ( b), the EDE300 will wait for one byte of data to be transmitted serially from the host and will then latch this data onto its data pins. The Dir/ Latch (Pin 1) pin will be held high. If an ASCII '2' is received ( b), the EDE300 will read its data pins and transmit this value serially back to the host. The Dir/ Latch (Pin 1) pin will be held low. This unidirectional Host Control Mode is convenient when too much data would be transmitted using Local Control Mode. Note that the ASCII characters "1" and "2" must be used, instead of the values one and two. This enables the EDE300 to be used with a terminal program as well. Host Control Mode, however, is most useful when implemented as a bi-directional interface. COPYRIGHT 1996 E-Lab Digital Engineering, Inc. All Rights Reserved. Page # 4 5 Making use of the Dir/ Latch pin, the EDE300 can simultaneously latch data from a PC/ Stamp and transmit data to the PC/ Stamp. The host PC/ Stamp would simply send a "1" command followed by an output data byte, and then send a "2" command to tell the EDE300 to transmit data back. This arrangement is shown in Figure Four below. The Dir/ Latch pin causes a data receive request to be latched onto the '373, and a data transmit request to read from the '245. Note: use of the '245 may in some circumstances cause brief glitches on the '373 outputs. We recommend this arrangement only for output devices in which a small (0 to 25 ns) output glitch would be acceptable (eg. LED's, relay control, etc.). Figure Four: Simultaneous Bi-directional Host-Control Mode Arrangement The following code, written in 'Turbo C', illustrates one method for using the EDE300 in bidirectional mode: #include <stdio.h> char value; /* main loop data variable */ send (char x) /* write 'x' to EDE300 */ while ((inportb(0x3fd) & 0x20) == 0); /* hold until transmitter is ready */ outportb(0x3f8,0x31); /* select 'receive byte' on EDE300 */ while ((inportb(0x3fd) & 0x20) == 0); /* hold until transmitter is ready */ outportb(0x3f8,x); /* write 'x' to EDE300 */ COPYRIGHT 1996 E-Lab Digital Engineering, Inc. All Rights Reserved. Page # 5 6 char receive() /* receive one byte from EDE300 */ char value; /* stores incoming byte */ value = inportb(0x3f8); /* flush input buffer */ while ((inportb(0x3fd) & 0x20) == 0); /* hold until transmitter is ready */ outportb(0x3f8,0x32); /* select 'send byte' on EDE300 */ while ((inportb(0x3fd) & 0x01) == 0); /* hold until a byte is received */ value = inportb(0x3f8); /* receive byte from EDE300 */ return (value); main() /* main program loop */ bioscom (0,0xE0 0x03,0); /* set 9600 BAUD, 8 bit data */ do value = receive(); /* read byte from EDE300 into 'value' */ send (value); /* write 'value' back to EDE300 */ while (value!= 0); /* exit if 'value' = 0 */ This program reads one byte from the '245 via the EDE300 and writes the same value back to the '373 via the EDE300. This is a very simple example - it is intended only to illustrate the proper use of the EDE300's Host Control Mode. Notice that the subroutine 'receive()' returns one byte of data from the EDE300, and the subroutine 'send(value)' transmits the byte stored in value to the EDE300. In this example, the BAUD rate does not need to be set from the command prompt; it is set to 9600 BAUD in software. BASIC STAMP CONNECTION The EDE300 can make a very effective I/O expander for the BASIC Stamp or other microcontroller devices capable of transmitting and receiving serial data. In order to keep from overrunning the Stamp with data from the EDE300, it is recommended that the EDE300 be used in Host Control Mode when used with the Stamp, whether you are performing unidirectional input, unidirectional output, or half-duplex bi-directional I/O. This way, the host (Stamp) controls when it will receive a byte and when it will transmit a byte. Bi-Directional Communication with BASIC Stamp I To use the EDE300 with the BASIC Stamp in a bi-directional arrangement, refer to the schematic in Figure Four, above. As the EDE300 can communicate with a Stamp using standard +5V signals, no voltage level converter (MAX233) is needed for the connection. Simply remove it from the schematic shown in Figure Three, and wire in the Stamp as follows: Stamp Pin 7 < > EDE300 Pin 17 (Serial Receive) Stamp Pin 6 < > EDE300 Pin 18 (Serial Transmit) Then connect the EDE300's BAUD Pin (Pin 2) to GND instead of +5V as is shown in the example for connection to a PC in Figure Four. This will tell the EDE300 to communicate at 2400 BAUD instead of Also, you will need to connect the Stamp's ground pin to the EDE300's ground pin. COPYRIGHT 1996 E-Lab Digital Engineering, Inc. All Rights Reserved. Page # 6 7 Once connected, the following example code, running on the Stamp, illustrates the simple example of polling the '245's eight inputs and writing this value back to the '373's latched outputs. pause 200 ' pause Stamp while all circuitry powers up loop: serout 7,T2400, ("2") ' send the character "2" out pin 7 at 2400 BAUD serin 6,T2400,b2 ' read serial byte send back from EDE300, store in b2 serout 7,T2400,("1") ' tell EDE300 to accept next byte of data serout 7,T2400,(b2) ' send value in b2 to EDE300 to be latched onto output of '373 IC if b2 <> 0 then loop ' continue until input byte = 0 If, however, you simply wish to use the EDE300 for unidirectional communication with a Stamp (to expand the I/O capabilities of the Stamp), you would not need the '245 or '373 IC's. The EDE300's eight data pins would serve as the eight input pins in unidirectional input mode, or as the eight output pins in unidirectional output mode. NOTE: In the following two arrangements, the EDE300 is being used in Host Control Mode, which means that its Data Direction/Latch Pin (Pin 1) is made an output rather than an input (as it is in Local Control Mode). In the following two examples leave this pin unconnected; data flow direction is determined by the host. The Data Direction/Latch Pin (Pin 1) should NEVER be driven while the EDE300 is in Host Control Mode. Unidirectional Communication with BASIC Stamp I - Output Only The following schematic will make eight digital outputs from one Stamp I/O pin. COPYRIGHT 1996 E-Lab Digital Engineering, Inc. All Rights Reserved. Page # 7 8 The following code, written for the BASIC Stamp I, when used with the above schematic, will loop from zero to ten, writing the appropriate binary value to the Output Port of the EDE300 each time, stopping with the binary value b latched onto the EDE300's data I/O port. pause 200 for b2 = 0 to 10 serout 7,T2400,("1") serout 7,T2400,(b2) next b2 ' pause Stamp while EDE300 powers up ' tell EDE300 to accept next byte of data ' send value in b2 to EDE300 to be latched ' repeat loop until b2 = ten Unidirectional Communication with BASIC Stamp I - Input Only The following schematic will make eight inputs from two Stamp pins. Notice that in the previous example only one pin was required; in this example, however, we still need to maintain a serial output pin on the stamp to tell the EDE300 to send data, as well as a serial input pin on the Stamp to receive that data. The following code, written for the BASIC Stamp I, when used with the above schematic, will read the value on the EDE300's I/O port and return it to the PC programming the Stamp via a debug window. pause 200 serout 7,T2400,("2") serin 6,T2400,b2 debug b2 ' pause Stamp while EDE300 powers up ' tell EDE300 to read its I/O port and transmit the value ' read transmitted value into b2 ' return value in b2 to Stamp's programming PC via debug window COPYRIGHT 1996 E-Lab Digital Engineering, Inc. All Rights Reserved. Page # 8 9 ABSOLUTE MAXIMUM RATINGS Oscillator frequency... 4 MHz Supply Voltage V Ambient temperature under bias C to +125 C Max. current sinked by output pin... 25mA Max. current sourced by output pin... 25mA Max. current sourced by all 8 data pins mA Max. current sinked by all 8 data pins mA STANDARD OPERATING CONDITIONS Supply voltage V to 5.5V Operating temperature... 0 C to +70 C The EDE300 IC is implemented as firmware on a PIC16C554 microcontroller, manufactured by Microchip Technology, Inc. For a more comprehensive technical summary of this device, please refer to the PIC16C554 datasheet (available from the E- Lab web site). IMPORTANT NOTICE E-LAB Digital Engineering, Inc. (E-LAB), reserves the right to change products or specifications without notice. Customers are advised to obtain the latest versions of product specifications, which should be considered when evaluating a product s appropriateness for a particular use. THIS PRODUCT IS WARRANTED TO COMPLY WITH E-LAB S SPECIFICATION SHEET AT THE TIME OF DELIVERY. BY USING THIS PRODUCT, CUSTOMER AGREES THAT IN NO EVENT SHALL E-LAB BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES AS A RESULT OF THE PERFORMANCE, OR FAILURE TO PERFORM, OF THIS PRODUCT. E-LAB MAKES NO OTHER WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. COPYRIGHT NOTICE E-LAB s LIABILITY IS FOR A PERIOD NO GREATER THAN 90 DAYS FROM DATE OF SHIPMENT BY E-LAB AND IS LIMITED TO REPLACEMENT OF DEFECTIVE PRODUCT. This warranty covers only defects arising under normal use and not malfunctions resulting from misuse, abuse, modification, or repairs by anyone other than E-LAB. E-LAB S PRODUCTS ARE NOT AUTHORIZED FOR USE AS CRITICAL COMPONENTS IN LIFE SUPPORT DEVICES OR SYSTEMS WITHOUT THE EXPRESS WRITTEN APPROVAL OF THE PRESIDENT OF E-LAB. Life support devices or systems are those which are intended to support or sustain life and whose failure to perform can be reasonably expected to result in a significant injury or death to the user. Critical components are those whose failure to perform can be reasonably expected to cause failure of a life support device or system or affect its safety or effectiveness. This product may not be duplicated. E-LAB Digital Engineering, Inc. holds all copyrights on firmware, with all rights reserved. Unauthorized duplication of this device may be subject to penalty under state and/ or federal law. EDE300 and the E-LAB logo are trademarks of E-LAB Digital Engineering, Inc. All other trademarks and registered trademarks are property of their respective owners. CONTACTING US We are continually updating our product line. Please contact us for our latest product information. E-LAB Digital Engineering, Inc N. 291 Hwy. Ste. 330 P.O. Box Independence, MO Telephone: (816) FAX: (816) Internet: COPYRIGHT 1996 E-Lab Digital Engineering, Inc. All Rights Reserved. Page # 9 Distributed by: 1-800-831-4242 The content and copyrights of the attached material are the property of its owner. EDE707 7-Segment Display IC Octal Seven-Segment Display IC Functionality Serial Communications April 2014 7 Serial Communications Objectives - To be familiar with the USART (RS-232) protocol. - To be able to transfer data from PIC-PC, PC-PIC and PIC-PIC. - To test serial communications with virtual Wireless Security Camera Wireless Security Camera Technical Manual 12/14/2001 Table of Contents Page 1.Overview 3 2. Camera Side 4 1.Camera 5 2. Motion Sensor 5 3. PIC 5 4. Transmitter 5 5. Power 6 3. Computer Side 7 1.Receiver Using Xbee 802.15.4 in Serial Communication Using Xbee 802.15.4 in Serial Communication Jason Grimes April 2, 2010 Abstract Instances where wireless serial communication is required to connect devices, Xbee RF modules are effective in linking Universal DC112 MODEM OPERATOR S MANUAL OPERATOR S MANUAL REVISION: 12/91 COPYRIGHT 1987, 1989 CAMPBELL SCIENTIFIC, INC. WARRANTY AND ASSISTANCE The DC112 MODEM is warranted by CAMPBELL SCIENTIFIC, INC. to be free from defects in materials Serial Communications Serial Communications 1 Serial Communication Introduction Serial communication buses Asynchronous and synchronous communication UART block diagram UART clock requirements Programming the UARTs Operation USB / Data-Acquisition Module NOW LEAD-FREE USB / Data-Acquisition Module NOW LEAD-FREE DLP-TEMP-G Features: Digital I/Os, Analog Inputs (0- Volts) or any combination USB. and.0 Compatible Interface th Generation Silicon from FTDI Supports Up To AN2680 Application note Application note Fan speed controller based on STDS75 or STLM75 digital temperature sensor and ST72651AR6 MCU Introduction This application note describes the method of defining the system for regulating RHINO MOTION CONTROLS Installation Manual and Datasheet Page 1 Key Features Smooth and quiet operation at all speeds and extremely low motor heating Industrial grade performance for an alternating current servo motor Field TTL to RS232 Adapter User Guide TTL to RS232 Adapter User Guide Revision D March 28, 2011 Document Part Number GC-800-313d Copyright and Trademark Copyright 2006-2011, Grid Connect, Inc. All rights reserved. No part of this manual may User Manual. AS-Interface Programmer AS-Interface Programmer Notice: RESTRICTIONS THE ZMD AS-INTERFACE PROGRAMMER HARDWARE AND ZMD AS-INTERFACE PROGRAMMER SOFTWARE IS DESIGNED FOR IC EVALUATION, LABORATORY SETUP AND MODULE DEVELOPMENT ONLY. DS1721 2-Wire Digital Thermometer and Thermostat FEATURES Temperature measurements require no external components with ±1 C accuracy Measures temperatures from -55 C to +125 C; Fahrenheit equivalent is -67 F to +257 F Temperature resolution Eliminate Risk of Contention and Data Corruption in RS-485 Communications I. Background and Objective Eliminate Risk of Contention and Data Corruption in RS-485 Communications Earle Foster, Jeff Hunter Sealevel Systems The RS-485 communications standard was introduced in 1983 SP03 Text to Speech Synthesizer SP03 Text to Speech Synthesizer The robotics community has been without a low cost speech synthesizer chip for a long time. The ever popular SP0256-AL2 has long gone out of production, though there Applications. Specifications. Actual Size SERIAL LED MODULE Model: SLED Applications Actual Size Digital Instruments Alarms Machine controls Operator Displays Vending machines Parts counters Test instruments Controllers Features Same size as industry-standard Custom ASCII Protocol Serial Communications Manual Custom ASCII Protocol Serial Communications Manual For Digital Panel Meter, Model SM980-Series TENSION MEASUREMENT Instruments For Test & Industry Tension Sensors available for fibers, optical fibers, UNIVERSAL RS-232/422/485 CONVERTER FA-UNICON UNIVERSAL RS-// CONVERTER FA-UNICON Universal RS-// Converter The FA-UNICON converter may be used to convert RS- signal levels to RS-/ signal levels or RS-/ signal levels to RS- signal levels. The FA-UNICON Figure 1: Typical Setups. RS-232 RS-422 or RS-485 Device or System TX FOSTC. RS-232 RS-422 or RS-485 Device or System FOSTC SW1: = ON SW1: = ON SW1: = ON -01-1/ 00 by B&B Electronics. All rights reserved. Model RS-, or Signals Up To. Miles with Fiber Optic Modem Description Fiber optic cabling has inherent resistance to EMI/RFI, Manual EN 1 Copyrights 2010 Victron Energy B.V. All Rights Reserved This publication or parts thereof may not be reproduced in any form, by any method, for any purpose. For conditions of use and permission DS1621 Digital Thermometer and Thermostat Digital Thermometer and Thermostat FEATURES Temperature measurements require no external components Measures temperatures from 55 C to +125 C in 0.5 C increments. Fahrenheit equivalent GPSGPS-Evaluation Kit GPSGPS-Evaluation Kit GPS Evaluation Platform Data In Standard NMEA Format RS232 & USB Data output Link Selectable And Programmable Baud Rates Satellite Viewer Software Supplied Description This kit provides RS232/RS485 CONVERTER USER'S GUIDE RS/RS CONVERTER USER'S GUIDE DISCLAIMER: RMV ELECTRONICS INC. does not assume any liability arising from the application and/or use of the products described herein, nor does it convey any license under USART and Asynchronous Communication The USART is used for synchronous and asynchronous serial communication. USART = Universal Synchronous/Asynchronous Receiver Transmitter Our focus will be on asynchronous serial communication. Asynchronous MM54240 Asynchronous Receiver Transmitter Remote Controller April 1990 MM54240 Asynchronous Receiver Transmitter Remote Controller General Description The MM54240 is a monolithic MOS integrated circuit utilizing N-channel low-threshold enhancement mode and ionimplanted Obsolete Product(s) - Obsolete Product(s) LED DISPLAY DRIVER FEATURES SUMMARY 3 1/2 DIGIT LED DRIVER (23 segments) CURRENT GENERATOR OUTPUTS (no resistors required) CONTINUOUS BRIGHTNESS CONTROL SERIAL DATA INPUT NO LOAD SIGNAL REQUIRED WIDE SUPPLY DK40 Datasheet & Hardware manual Version 2 DK40 Datasheet & Hardware manual Version 2 IPC@CHIP DK40 Evaluation module Beck IPC GmbH page 1 of 11 Table of contents Table of contents... 2 Basic description... 3 Characteristics... Signal Manager Installation and Operation Manual Signal Manager Installation and Operation Manual Rev.11/28/2008 Part # 26550007 Table of Contents CHAPTER 1: SYSTEM DESCRIPTION... 3 FUNCTION AND THEORY... 3 CHAPTER 2: SYSTEM INSTALLATION... 4 HARDWARE: Chapter 5 Serial Port Operation Chapter 5 Serial Port Operation (I. Scott MacKenzie) 1 Introduction 8051 includes an on-chip serial port that can operate in four modes over a wide range of frequencies. Essential function of serial port The Secrets of Flow Control in Serial Communication in Serial Communication Casper Yang, Senior Product Manager [email protected] Although RS-232/422/485 serial communication is no longer considered to be high speed, flow control is still an important function -. has T3 Series. General Purpose IO for Integrators General Purpose IO for Integrators -1- TABLE OF CONTENTS Table of Contents Technical Data 3 Standard Operation 4 Inputs 4 Outputs 4 Analog Output Calibration 4 Bandrate 4 Master Timer Clock Function for Intro to Microprocessors and Microcomputers Intro to Microprocessors and Microcomputers Content Microprocessor, microcontrollers and microcomputers Communication within microcomputers Registers Process architecture CPU Data and program storage Negative DS1722 Digital Thermometer with SPI/3-Wire Interface PRELIMINARY Digital Thermometer with SPI/3-Wire Interface FEATURES Temperature measurements require no external components Measures temperatures from -55 C to +125 C. Fahrenheit equivalent AN UART to Bluetooth interfacing. Document information Rev. 02 11 August 2004 Application note Document information Info Keywords Abstract Content UART, Bluetooth, wireless This application note shows how a Bluetooth wireless solution can be integrated into DS1621 Digital Thermometer and Thermostat FEATURES Temperature measurements require no external components Measures temperatures from -55 C to +125 C in 0.5 C increments. Fahrenheit equivalent is -67 F to 257 F in 0.9 F increments USER GUIDE EDBG. Description USER GUIDE EDBG Description The Atmel Embedded Debugger (EDBG) is an onboard debugger for integration into development kits with Atmel MCUs. In addition to programming and debugging support through Atmel Introduction to GPS and PICAXE This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this licence, visit here or send a letter to Creative Commons, 171 Second Street, RIGtalk. Revision 5. Owner s Manual 2012. RIGtalk Revision 5 Owner s Manual 2012 1020 Spring City Drive Waukesha, WI 53186 262-522-6503 [email protected] 2012 West Mountain Radio, All rights reserved. All trademarks Hardware Reference Manual: Reference Design Application Note Hardware Reference Manual: Reference Design Application Note AN002 Introduction The Reference Design hardware board demonstrates the hardware s ability to interface between the computer, an 8051 microcontroller, Industrial Ethernet Ethernet to Serial Gateways Ethernet to Serial Converters for Modbus, Red lion and other protocols USER MANUAL Industrial Ethernet Ethernet to Serial Gateways Ethernet to Serial Converters for Modbus, Red lion and other protocols Contents at a Glance: Section 1 General Information RM-PS-024-01F 3 Section Advanced Data Capture and Control Systems Advanced Data Capture and Control Systems Tronisoft Limited Email: [email protected] Web: RS232 To 3.3V TTL User Guide RS232 to 3.3V TTL Signal Converter Modules P/N: 9651 Document Technical Manual for Whozz Calling? POS Series 4 and 8 Line Units Whozz Calling? POS Caller ID Interface Unit WHOZZ CALLING? WHOZZ CALLING? 4 8 POS Caller ID POS Caller ID Technical Manual for Whozz Calling? POS Series 4 and 8 Line Units [Belcore 202 (USA) & DTMF Signaling POS 208 / 808 USER S MANUAL INTELLIGENT CASH DRAWER WEDGES DISTRIBUTED BY MADE IN CANADA POS 208 / 808 DISTRIBUTED BY INTELLIGENT CASH DRAWER WEDGES MADE IN CANADA USER S MANUAL 2 Table of Contents Introduction............................................... 3 POS 208 Installation........................................ CP2102 Serial to USB Converter Campus Component Pvt. Ltd. DISCLAIMER Information furnished is believed to be accurate and reliable at the time of publication. However, Campus Component Pvt. Ltd. assumes no responsibility arising from INSTRUCTION MANUAL 2044-01 T1 TO RS422 INTERFACE INSTRUCTION MANUAL 044-0 T TO RS4 INTERFACE Data, drawings, and other material contained herein are proprietary to Cross Technologies, Inc., and may not be reproduced or duplicated in any form without S6A SEG / 16 COM DRIVER & CONTROLLER FOR DOT MATRIX LCD S6A69 4 SEG / 6 COM DRIVER & CONTROLLER FOR DOT MATRIX LCD June 2 Ver Contents in this document are subject to change without notice No part of this document may be reproduced or transmitted in any form Serial to Ethernet Converter TOP FRONT. Click 301 Serial to Ethernet Converter Click 301 The Click 301 converts half-duplex RS-232 & RS-485 communication to Ethernet and vice versa. This device, tested to work over a 34 C to 74 C temperature range, Communications. Wired Communications Protocols Communications Wired Communications Protocols Wired Communications Goal: Allow discrete devices (processors, controllers, sensors, etc ) to communicate with each other Data transfer or synchronization Dual Channel Analog Data End Device Developer Guide Dual Channel Analog Data End Device Developer Guide Revision E Preface Notice Copyright 2011 Inovonics Inovonics intends this manual for use by Inovonics customers only. All comments concerning the contents Mini Gateway USB for ModFLEX Wireless Networks Mini Gateway USB for ModFLEX Wireless Networks FEATURES Compatible with the ProFLEX01 and SiFLEX02 ModFLEX modules USB device interface & power Small package size: 2.3 x 4.9 External high performance antenna
http://docplayer.net/22585216-Ede300-parallel-serial-transceiver-ic.html
CC-MAIN-2018-26
en
refinedweb
Hi André, this commit of yours breaks the build on meta-java's current master-next branch with following message: ERROR: ca-certificates-java-20170930-r0 do_fetch: Fetcher failure for URL: 'git://anonscm.debian.org/pkg-java/ca-certificates-java.git'. Unable to fetch URL from any source. Therefore it will be removed from master-next. It would be great if you could send an fixed version with the correct SRC_URI, which I think is: Furthermore may you also please update it to the latest version (20180516 if it's possible)? Thank you very much! regards;Richard.L On 04/02/2018 08:43 AM, André Draszik wrote: > From: André Draszik <[email protected]> > > The OpenJDK-8 package currently comes with a trustStore > that was generated at OpenJDK-8-native build time from > *all* certificates available in the system, not just from > those that are marked as trusted. > > This isn't right... > > So this recipe hooks into the ca-certificates package and > (re-) creates the Java trustStore based on the > certificates trusted by the system, whenever they are > updated. This works both at image build time, as well as > during runtime on the target. > > It works by installing a hook into ca-certificates' > $SYSROOT/etc/ca-certificates/update.d/ that is passed the > added/removed certificates as arguments. That hook is then > updating the Java trustStore and storing it in > $SYSROOT/etc/ssl/certs/java/cacerts. > > The whole idea as well as the implementation of the hook > is borrowed from debian's ca-certificate-java package, > version 20170930 (the latest as of this commit). > Looking at the debian package, it appears like the same > binary trustStore ($SYSROOT/etc/ssl/certs/java/cacerts) > can be used by different versions of Java: > * OpenJDK-7, 8, 9 > * Oracle Java 7, 8, 9 > > The Java sources here can be compiled by any compatible > Java compiler, but the resulting jar file should only be > run by one of the compatible Java versions mentioned > above, so as to create a trustStore that can be read by > any of the Java versions mentioned above. We try to ensure > this using PACKAGE_WRITE_DEPS during image build time, > and by trying to find a compatible Java version inside > ${libdir_jvm} at runtime both during image build time and > on the target. > > Given there is nothing that we can RDEPENDS on that would > satisfy any of the above Java versions (either JDK or JRE), > we simply RDEPENDS on java2-runtime, and test > PREFERRED_RPROVIDER_java2-runtime to be satisfactory. > Given I can only test OpenJDK/OpenJRE 8 at the moment, only > those are actually allowed at the moment, though. This can > easily be extended upon confirmation. > > Final note - as per the debian package, there are. > > Signed-off-by: André Draszik <[email protected]> > > --- > v2: > * Works with rm_work enabled. We can't use STAGING_LIBDIR_JVM_NATIVE > in pkg_postinst as that is statically resolved to this recipe's > native sysroot, which is of no use when building an image. > Use the NATIVE_ROOT variable instead > * make the ca-certificates hook script less verbose (remove set -x) > --- > ...ficates-handle-SYSROOT-environment-variab.patch | 43 +++++++++ > .../ca-certificates-java.hook.in | 64 ++++++++++++ > .../ca-certificates-java_20170930.bb | 107 > +++++++++++++++++++++ > 3 files changed, 214 insertions(+) > create mode 100644 > recipes-core/ca-certificates-java/ca-certificates-java/0001-UpdateCertificates-handle-SYSROOT-environment-variab.patch > create mode 100755 > recipes-core/ca-certificates-java/ca-certificates-java/ca-certificates-java.hook.in > create mode 100644 > recipes-core/ca-certificates-java/ca-certificates-java_20170930.bb > > diff --git > a/recipes-core/ca-certificates-java/ca-certificates-java/0001-UpdateCertificates-handle-SYSROOT-environment-variab.patch > > b/recipes-core/ca-certificates-java/ca-certificates-java/0001-UpdateCertificates-handle-SYSROOT-environment-variab.patch > new file mode 100644 > index 0000000..ca052ab > --- /dev/null > +++ > b/recipes-core/ca-certificates-java/ca-certificates-java/0001-UpdateCertificates-handle-SYSROOT-environment-variab.patch > @@ -0,0 +1,43 @@ > +From 70cd9999d3c139230aa05816e98cdc3e50ead713 Mon Sep 17 00:00:00 2001 > +From: =?UTF-8?q?Andr=C3=A9=20Draszik?= <[email protected]> > +Date: Tue, 27 Mar 2018 16:50:39 +0100 > +Subject: [PATCH] UpdateCertificates: handle SYSROOT environment variable for > + cacerts > +MIME-Version: 1.0 > +Content-Type: text/plain; charset=UTF-8 > +Content-Transfer-Encoding: 8bit > + > +We can now pass in the sysroot, so that the trustStore > +is written to /etc/ssl/certs/java/cacerts below $SYSROOT. > + > +Upstream-Status: Inappropriate [OE specific] > +Signed-off-by: André Draszik <[email protected]> > +--- > + src/main/java/org/debian/security/UpdateCertificates.java | 6 +++++- > + 1 file changed, 5 insertions(+), 1 deletion(-) > + > +diff --git a/src/main/java/org/debian/security/UpdateCertificates.java > b/src/main/java/org/debian/security/UpdateCertificates.java > +index e4f8205..dba9a7b 100644 > +--- a/src/main/java/org/debian/security/UpdateCertificates.java > ++++ b/src/main/java/org/debian/security/UpdateCertificates.java > +@@ -40,15 +40,19 @@ public class UpdateCertificates { > + > + public static void main(String[] args) throws IOException, > GeneralSecurityException { > + String + > +if [ -n "${D:-}" ] ; then > + # called from postinst as part of image build on host > + if [ -z "${JVM_LIBDIR:-}" ] ; then > + # should never happen, this is supposed to be passed in > + echo "$0: no JVM_LIBDIR specified" >&2 > + false > + fi > +fi > +if [ -n "${JVM_LIBDIR:-}" ] ; then > + +fi > + > +for JAVA in icedtea7-native/bin/java \ > + openjdk-8-native/bin/java openjdk-8/bin/java openjre-8/bin/java \ > + ; do > + if [ -x "${jvm_libdir}/${JAVA}" ] ; then > + + break > + fi > +done > + > +if [ ! -x "${JAVA}" ] ; then > + # shouldn't really happen, as we RDEPEND on java > + echo "$0: JAVA not found" >&2 > + false > +fi > + > +if [ "${self}" = "ca-certificates-java-hook" ] ; then > + # case 1) from above > + # the list of (changed) files is passed via stdin > + while read input ; do > + echo "${input}" > + done > +elif [ -s $D${sysconfdir}/ssl/certs/java/cacerts ] ; then > + # we were executed explicitly (not via ca-cacertificates hook) > + # case 3) from above > + # do nothing, as the trustStore exists already > + return > +else > + # we were executed explicitly (not via ca-cacertificates hook) > + # case 2) from above > + # the trustStore doesn't exist yet, create it as this is > + # a first time install (e.g. during image build) > + find $D${sysconfdir}/ssl/certs -name '*.pem' | \ > + while read filename ; do > + echo "+${filename}" > + done > +fi | + + + + +# We can't use virtual/javac-native, because that would create a > +# keystore that can't be read on the target (as virtual/javac-native > +# usually is either too old, or plain incompatible with this) > +PACKAGE_WRITE_DEPS += "openjdk-8-native" > + > + + > + + > +inherit java allarch > + > + + + > + + > +python () { > + runtime = d.getVar("PREFERRED_RPROVIDER_java2-runtime") or "" > + if not runtime in ("openjdk-8", "openjre-8"): > + raise bb.parse.SkipRecipe("PREFERRED_RPROVIDER_java2-runtime '%s' > unsupported" % runtime) > +} > + > +do_patch_append () { > + bb.build.exec_func('do_fix_sysconfdir', d) > +} > + > +do_fix_sysconfdir () { > + sed -e 's|/etc/ssl/certs/java|${sysconfdir}/ssl/certs/java|g' \ > + -i ${S}/src/main/java/org/debian/security/UpdateCertificates.java > +} > + > +do_compile () { > + mkdir -p build # simplify in-tree builds (externalsrc) > + javac -g \ > + -source 1.7 -target 1.7 -encoding ISO8859-1 \ > + -d build \ > + -sourcepath ${S}/src/main/java \ > + $(find ${S}/src/main/java -name '*.java' -type f) > + > + # needs to end with two empty lines > + cat << EOF > ${B}/manifest > +Manifest-Version: 1.0 > +Main-Class: org.debian.security.UpdateCertificates > + > +EOF > + fastjar -cfm ${JARFILENAME} ${B}/manifest -C build . > +} > + > +do_install () { > + oe_jarinstall ${JARFILENAME} > + > + mkdir -p ${D}${sysconfdir}/ssl/certs/java > + install -Dm0755 ${WORKDIR}/${BPN}.hook.in > ${D}${sysconfdir}/ca-certificates/update.d/${BPN}-hook > + sed -e 's|@@datadir_java@@|${datadir_java}|' \ > + -e 's|@@libdir_jvm@@|${libdir_jvm}|' \ > + -e 's|@@JARFILENAME@@|${JARFILENAME}|' \ > + -i ${D}${sysconfdir}/ca-certificates/update.d/${BPN}-hook > + > + install -d -m0755 ${D}${sbindir} > + ln -s > ${@os.path.relpath("${sysconfdir}/ca-certificates/update.d/${BPN}-hook", > "${sbindir}")} \ > + ${D}${sbindir}/create-ca-certificates-java > +} > + > +pkg_postinst_${PN} () { > + if [ -n "$D" ] ; then > + # In this case we want to use the Java in the image recipe's > + # native sysroot (native Java, not qemu target Java) to > + # generate the trustStore. > + # None of the supported Java versions are in PATH, though, so > + # we have to find a satisfactory one ourselves below $libdir_jvm. > + # We really need the $NATIVE_ROOT variable for that to work, > + # as STAGING_LIBDIR_JVM_NATIVE resolves to this recipe's native > + # sysroot during recipe build time, so it's of no use during > + # image build time. > + if [ -z $NATIVE_ROOT ] ; then > + echo "$0: NATIVE_ROOT not known" > + false > + fi > + JVM_LIBDIR=$NATIVE_ROOT${libdir_jvm} > + fi > + JVM_LIBDIR=$JVM_LIBDIR $D${sbindir}/create-ca-certificates-java > +} > + > +RDEPENDS_${PN} = "ca-certificates" > +RDEPENDS_${PN} +RDEPENDS_${PN} + > +FILES_${PN} += "${datadir_java}" > + > + -- _______________________________________________ Openembedded-devel mailing list [email protected]
https://www.mail-archive.com/[email protected]/msg59168.html
CC-MAIN-2018-26
en
refinedweb
When React finds an element representing a user-defined component, it passes JSX attributes to this component as a single object, and this object is called “Props”. Props are arguments nothing else that are passed into React components. Let us understand with an example import React from "react"; import ReactDOM from "react-dom"; function Tutorial(props){ return( <div> <h1> Learn Online {props.tutorial_name}</h1> <h1>I am learning it from {props.tutorial_site}.</h1> </div> ); } ReactDOM.render(<Tutorial tutorial_name="ReactJS" tutorial_site="Share Query" />, document.getElementById("root")); In the above example, please look at the last line : So you can consider props will might be similar as below object format: props = {tutorial_name:”ReactJS”, tutorial_site:”Share Query”} Whether you declare a component as a function or a class, it must not modify its own props value. props value remains immutable throughout the function or class returns. All react components must act like pure functions with respect to their props. Pure function means function add(a,b) { return a+b; } Impure function means function withdraw(account, amount) { account.total -= amount; } If you are using constructor function inside component, the props should always be passed to the constructor and also to the React.Component by the super() method.
https://www.sharequery.com/reactjs/reactjs-props/
CC-MAIN-2020-45
en
refinedweb
Working With Property Wrappers Anatomy of a Property Wrapper The Missing Manual for Swift Development The Guide I Wish I Had When I Started Out Join 20,000+ Developers Learning About Swift DevelopmentDownload Your Free Copy Property wrappers were introduced in Swift 5.1 to eliminate boilerplate code, facilitate code reuse, and enable more expressive APIs. You may have noticed that SwiftUI and Combine make heavy use of property wrappers. Property wrappers are completely optional. You can write Swift without property wrappers. But once you become familiar with their benefits and understand how they work, you will understand why the Swift community is so excited about this addition to the language. It took Swift's core team several revisions to come to a proposal everyone was happy with. Property wrappers were originally named property delegates, inspired by Kotlin's delegated properties. The idea is to easily and transparently apply common patterns to properties. Property wrappers eliminate boilerplate code and allow developers to write code that is more readable and more expressive. Writing Boilerplate Code I want to start with a simple example to explore the anatomy of a property wrapper. Fire up Xcode and create a playground by choosing the Blank template from the iOS > Playground section. Remove the contents of the playground and add an import statement for Foundation. We define a struct with name Book. It defines a variable property, title, of type String. import Foundation struct Book { // MARK: - Properties var title: String } We want to make sure the value of title is always capitalized, regardless of the value that is assigned to title. We can enforce this policy by turning title into a computed property and declare a private property, _title, of type String. The computed property acts as a proxy for the private property. The getter of the computed property returns the value of the private property. In the setter of the computed property, the new value is capitalized and assigned to the private property. import Foundation struct Book { // MARK: - Properties private var _title: String var title: String { get { _title } set { _title = newValue.capitalized } } } Notice that access to the private property goes through the computed property. This is a convenient pattern and it is common. The problem is that we need to write boilerplate code every time we need to apply this pattern. This is the problem property wrappers solve. Take a close look at this example before continuing. Anatomy of a Property Wrapper Once you understand the ins and outs of property wrappers, you will understand that property wrappers aren't magical. A property wrapper is nothing more than an object that encapsulates a property. It controls access to the property it wraps. A property wrapper is nothing more than a struct or class annotated with the propertyWrapper attribute and a property with name wrappedValue. These are the only requirements a property wrapper needs to meet. As the name implies, the wrappedValue property stores the value that is wrapped by the property wrapper. Let's put this into practice. We create a property wrapper with name Capitalized. It capitalizes the value it manages. We define a struct with name Capitalized and annotate it with the propertyWrapper attribute. We also define a property, wrappedValue, of type String. import Foundation @propertyWrapper struct Capitalized { // MARK: - Properties var wrappedValue: String } The Capitalized struct is a valid property wrapper, but it doesn't do anything just yet. We fix that in a moment. Let's put the property wrapper to use in the Book struct. Applying the property wrapper to a property is as simple as annotating the property with the Capitalized attribute. Because the property wrapper controls access to the wrapped property, we no longer need to declare _title privately and we can remove the title computed property. Let's clean up the implementation by renaming _title to title. struct Book { // MARK: - Properties @Capitalized var title: String } We can create a Book object using the memberwise initializer that is automatically generated for the Book struct. Even though title is a wrapped property, we can access it as if it were a regular property. var book = Book(title: "the da vinci code") book.title // "The Da Vinci Code" Adding Functionality to a Property Wrapper Let's complete the implementation of the Capitalized property wrapper. We define a private, variable property, value, of type String to store the string the property wrapper manages. import Foundation @propertyWrapper struct Capitalized { // MARK: - Properties private var value: String // MARK: - var wrappedValue: String } We also define a getter and a setter for wrappedValue. The getter returns the value stored in the value property. The setter capitalizes the new value and assigns the result to the value property. Notice that wrappedValue is no longer a stored property. It is a computed property that controls access to the private value property. The wrappedValue computed property acts as a proxy for the private value property. import Foundation @propertyWrapper struct Capitalized { // MARK: - Properties private var value: String // MARK: - var wrappedValue: String { get { value } set { value = newValue.capitalized } } } Before we take a look at the result, we need to implement an initializer to assign an initial value to the value property. The initializer defines one parameter, wrappedValue, of type String. In the initializer, we capitalize the value stored in wrappedValue and assign the result to the value property. import Foundation @propertyWrapper struct Capitalized { // MARK: - Properties private var value: String // MARK: - var wrappedValue: String { get { value } set { value = newValue.capitalized } } // MARK: - Initialization init(wrappedValue: String) { value = wrappedValue.capitalized } } It's time to revisit the Book object we created earlier. Because the Capitalized property wrapper is applied to the title property, the value of title is automatically capitalized. This simple example illustrates the potential of property wrappers. We can apply the Capitalized property wrapper to any property of type String. The property wrapper ensures the property declaration is concise and expressive. The property wrapper provides storage for the property and defines the policy for the property. How Does a Property Wrapper Work? I'm sure you are familiar with Swift's lazy keyword to lazily instantiate objects. Even though the lazy instantiation of objects is built into the compiler, the concept is similar to property wrappers. In fact, you could replicate the functionality of the lazy keyword with a property wrapper. Every time the compiler encounters a property wrapper, it synthesizes code that provides storage for the property wrapper and access to the property through the property wrapper. The struct or class defines the property, but it is the property wrapper that provides storage for the property. As the name suggests, the property is wrapped by the property wrapper. Let's revisit the implementation of the Book struct. This is the code the compiler generates if you apply the Capitalized property wrapper to a property. The example illustrates what happens under the hood if you apply a property wrapper to a property. Notice that the property wrapper provides storage for the property. The property is converted into a computed property and access is controlled by the property wrapper. struct Book { // MARK: - Properties // @Capitalized var title: String = "title" private var _title = Capitalized(wrappedValue: "title") var title: String { get { _title.wrappedValue } set { _title.wrappedValue = newValue } } } Whenever the compiler encounters a property wrapper, it generates code for you. The property wrapper syntax keeps your code clean and readable. Property wrappers allow you to document semantics at the point of definition. The previous example illustrates that the code that drives your application is more verbose and less pretty. What's Next? Property wrappers can be incredibly useful to reduce code duplication, improve readability, and create expressive APIs. I hope this episode has shown you that property wrappers are not magical. The compiler inspects the property wrappers you assign to properties and generates code that you don't need to write. There is no magic involved. In the next episode, we explore a few additional features of property wrappers. The Missing Manual for Swift Development The Guide I Wish I Had When I Started Out Join 20,000+ Developers Learning About Swift DevelopmentDownload Your Free Copy
https://cocoacasts.com/working-with-property-wrappers-in-swift-anatomy-of-a-property-wrapper
CC-MAIN-2020-45
en
refinedweb
On 6 January 2016 at 21:37, Jeffrey Walton wrote: > We have a library that's C++03, and its moving towards full support > for C++11. We are supplementing classes with: > > class Foo > { > public: > Foo(); > Foo(const Foo&); > Foo& operator=(const Foo&); > > #if defined(CXX11_AVAILABLE) > Foo(const Foo&&); > #endif I hope that const is just a typo. > }; > > We have a lot of classes (1500 or so), and its going to take some time > to evaluate all of them. As a starting point, we would like to > identify where the compiler is synthesizing a move and then provide it > (especially for some fundamental/critical base classes). > > How can I determine when a C++11 move is synthesized? By understanding C++ ;-) In most cases you shouldn't need to care. The language rules mean that a move constructor or move assignment operator will only be implicitly defined for types with: - no user-declared copy constructor - no user-declared copy assignment operator - no user-declared move constructor / move assignment operator - no user-declared destructor If you are happy for the compiler to define your copy constructor, copy assignment and destructor, then you should probably be happy for it to define moves too. If you've defined any of those explicitly, because for example the type manages memory explicitly or does something clever in its destructor, then the compiler will not generate any moves. So you should not need to care. If moving might not be safe, it won't happen. If moving would be safe then it might happen, but in those cases you are probably better off letting the compiler generate a correct move rather than interfere.
https://gcc.gnu.org/pipermail/gcc-help/2016-January/125558.html
CC-MAIN-2020-45
en
refinedweb
Wrapper around tarfile with support for more compression formats. Project description Overview Wrapper around tarfile to add support for more compression formats. Usage First, install the library with the tarfile compression formats you wish to support. The example below shows an install for zstandard tarfile support. pip install xtarfile[zstd] You can now use the xtarfile module in the same way as the standard library tarfile module: import xtarfile as tarfile with tarfile.open('some-archive', 'w:zstd') as archive: archive.add('a-file.txt') with tarfile.open('some-archive', 'r:zstd') as archive: archive.extractall() Alternatively, detecting the correct compression module based on the file extensions is also supported: import xtarfile as tarfile with tarfile.open('some-archive.tar.zstd', 'w') as archive: archive.add('a-file.txt') with tarfile.open('some-archive.tar.zstd', 'r') as archive: archive.extractall() Development Install the project’s dependencies with pip install .[zstd]. Run the tests via python3 setup.py test. Project details Download files Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
https://pypi.org/project/xtarfile/
CC-MAIN-2020-45
en
refinedweb
How to access MP3 metadata in Python Here we are going to see how to access MP3 metadata in Python in a simple way. We will use the eyeD3 tool. eyeD3: - It is a Python module that is used to work with audio files. - It is a command-line program to process ID3 tags. - Using this, we can extract the metadata like the title of the song, artist, album, composer, release date, publisher, etc. - Installation: Type the following command in the command prompt. pip install eyed3 Program At first, we have imported the eyed3 library. Then we used eyed3.load() to load the mp3 file. - Syntax: eyed3.load(filename) To access the meta tag information of an MP3 you have to use the tag object. View the content of the tag using the following. - audio.tag.title– used to get the title of the song. - audio.tag.artist– used to get the artist’s name of the song. - audio.tag.album– used to get the album name of the song. - audio.tag.album_artist– used to get the album artist’s name. - audio.tag.composer– used for getting the composer of the song. - audio.tag.publisher– used for getting the publisher of the song. - audio.tag.genre– used for getting the genre of a particular song. - audio.tag.release_date– used for getting the release date of the song. Now, we have a look at the program. import eyed3 audio=eyed3.load("Maacho.mp3") print("Title:",audio.tag.title) print("Artist:",audio.tag.artist) print("Album:",audio.tag.album) print("Album artist:",audio.tag.album_artist) print("Composer:",audio.tag.composer) print("Publisher:",audio.tag.publisher) print("Genre:",audio.tag.genre.name) Output: Title: Maacho - SenSongsMp3.Co Artist: Shweta Mohan, Sid Sriram, A.R. Rahman Album: Mersal (2017) Album artist: Vijay, Kajal Agarwal, Samantha, Nithya Menon Composer: A.R.Rahman Publisher: SenSongsMp3.Co Genre: Tamil I hope that you have learned something new from this post.
https://www.codespeedy.com/access-mp3-metadata-in-python/
CC-MAIN-2020-45
en
refinedweb
I). No changes required. Also note that when you make forks on github (for example); you're making a brand new namespace every time too. It'd be much like if every module on CPAN was JETTERO::Net::IMAP:... though.. PerlMonks, of course - how could you ask? Other tech Porn Shopping News Sports Games & puzzles Social media Arts & music Job hunting Whichever pays my bills Results (208 votes). Check out past polls.
https://www.perlmonks.org/?node_id=764247
CC-MAIN-2020-45
en
refinedweb
Thickness Animation Class Definition public ref class ThicknessAnimation : System::Windows::Media::Animation::ThicknessAnimationBase public class ThicknessAnimation : System.Windows.Media.Animation.ThicknessAnimationBase type ThicknessAnimation = class inherit ThicknessAnimationBase Public Class ThicknessAnimation Inherits ThicknessAnimationBase - Inheritance - ThicknessAnimation Remarks Thickness ThicknessAnimationUsingKeyFrames object. For information about applying multiple animations to a single property, see Key-Frame Animations Overview. Freezable Features Because the ThicknessAnimation class inherits from Freezable, Thickness.
https://docs.microsoft.com/en-us/dotnet/api/system.windows.media.animation.thicknessanimation?view=netframework-4.7.2
CC-MAIN-2020-45
en
refinedweb
binoyp 12-09-2020 Hi All, Is there any way to make use of non english words like "español" as fulltext in Querybuilder API? ChitraMadan Hi @binoyp, Full text search will be able to find español in the content irrespective of language. Please see below OOTB groovy script which is able to find all the references of español in the content def predicates = ["path": "/content","fulltext": "español"] def query = createQuery(predicates) query.hitsPerPage = 10 def result = query.result println "${result.totalMatches} hits, execution time = ${result.executionTime}s\n--" result.hits.each { hit ->println "hit path = ${hit.node.path}"} Please check if UTF-8 is enabled in Apache Sling Request Parameter Handling configuration.
https://experienceleaguecommunities.adobe.com/t5/adobe-experience-manager/query-regarding-full-text-search/qaq-p/378783/comment-id/80189
CC-MAIN-2020-45
en
refinedweb
We are about to switch to a new forum software. Until then we have removed the registration on this forum. Hello! I currently am working on a project using eclipse and have been getting a NullPointerException Error. I was able to mimic this in a small program with the stack provided below. The error in this example is coming from this.textSize = textWidth(name.charAt(0)); where the nullpointer is then saying it is coming from textWidth within PApplet. The stacktrace is provided below as well: TestProjectFile: package testproject; import processing.core.PApplet; import processing.core.PFont; @SuppressWarnings("serial") public class TestProject extends PApplet { PFont p; TestClass1 test; public void setup() { size(500, 500); p = createFont("Times-Roman", 40); textFont(p, 40); testFunction(); } public void draw() { ellipse(100, 100, 100, 100); } public void testFunction(){ test = new TestClass1("testString"); } } TestClass1 File: package testproject; import processing.core.PApplet; @SuppressWarnings("serial") public class TestClass1 extends PApplet{ String name; float textSize; TestClass1(String name){ this.name = name; this.textSize = textWidth(name.charAt(0)); } } and the stacktrace: Exception in thread "Animation Thread" java.lang.NullPointerException at processing.core.PApplet.textWidth(PApplet.java:13097) at testproject.TestClass1.<init>(TestClass1.java:13) at testproject.TestProject.testFunction(TestProject.java:25) at testproject.TestProject.setup(TestProject.java) I found another person with a similar issue: But even setting textSize in setup still showed an error. Any help would be greatly appreciated! Thanks Andrew S Answers Yup this is exactly what I needed! Getting some new errors now but looking more into them since they deal with running out of java heap space in eclipse. Thanks a bunch!
https://forum.processing.org/two/discussion/12993/nullpointerexception-when-calling-textwidth-in-another-class
CC-MAIN-2020-45
en
refinedweb
Learn to convert multi-line string into stream of lines using String.lines() method in Java 11. This method is useful when we want to read content from a file and process each string separately. 1. String.lines() API The lines() method is a static method. It returns a stream of lines extracted from a given multi-line string, separated by line terminators. /** * returns - the stream of lines extracted from given string */ public Stream<String> lines() A line terminator is one of the following – - a line feed character (“\n”) - a carriage return character (“\r”) - a carriage return followed immediately by a line feed (“\r\n”) By definition, a line is zero or more character followed by a line terminator. A line does not include the line terminator. The stream returned by lines() method contains the lines from this string in the same order in which they occur in the multi-line. 2. Java program to get stream of lines Java program to read a file and get the content as stream of lines. import java.io.IOException; import java.util.stream.Stream; public class Main { public static void main(String[] args) { try { String str = "A \n B \n C \n D"; Stream<String> lines = str.lines(); lines.forEach(System.out::println); } catch (IOException e) { e.printStackTrace(); } } } Program output. A B C D Drop me your questions related to reading a string into lines of stream. Happy Learning !!
https://howtodoinjava.com/java11/string-to-stream-of-lines/
CC-MAIN-2020-45
en
refinedweb
A Stream in Java 8 can be defined as a sequence of elements from a source. Streams supports aggregate operations on the elements. The source of elements here refers to a Collection or Array that provides data to the Stream. Stream keeps the ordering of the elements the same as the ordering in the source. The aggregate operations are operations that allow us to express common manipulations on stream elements quickly and clearly. Table of Contents 1. Stream vs Collection return a stream. This helps us to create a chain of stream operations. This is called as pipe-lining. 1. Java Stream vs Collection All of us have watched online videos on Youtube. When we start watching a video, a small portion of the file is first loaded into the computer and starts playing. we don’t need to download the complete video before we start playing it. This is called streaming. At a very high level, we can think of that small portions of the video file as a stream, and the whole video as a Collection. At the granular level, the difference between a Collection and a Stream is to do with when the things are computed. A Collection is an in-memory data structure, which holds all the values that the data structure currently has. Every element in the Collection has to be computed before it can be added to the Collection. While a Stream is a conceptually a pipeline, in which elements are computed on demand. This concept. The terminal operations return a result of a certain type and intermediate operations return the stream itself so we can chain multiple methods in a row to perform the operation in multiple steps. Streams are created on a source, e.g. a java.util.Collection like List or Set. The Map is not supported directly, we can create stream of map keys, values or entries. Stream operations can either be executed sequentially or parallel. when performed parallelly, it is called a parallel stream. Based on the above points, if we list down the various characteristics of Stream, they will be as follows: - Not a data structure - Designed for lambdas - Do not support indexed access - Can easily be aggregated as arrays or lists - Lazy access supported - Parallelizable 2. Creating Streams The given below ways are the most popular different ways to build streams from collections. 2.1. Stream.of() In the given example, we are creating a stream of a fixed number of integers. public class StreamBuilders { public static void main(String[] args) { Stream<Integer> stream = Stream.of(1,2,3,4,5,6,7,8,9); stream.forEach(p -> System.out.println(p)); } } 2.2. Stream.of(array) In the given example, we are creating a stream from the array. The elements in the stream are taken from the array. public class StreamBuilders { public static void main(String[] args) { Stream<Integer> stream = Stream.of( new Integer[]{1,2,3,4,5,6,7,8,9} ); stream.forEach(p -> System.out.println(p)); } } 2.3. List.stream() In the given example, we are creating a stream from the List. The elements in the stream are taken from the List. public class StreamBuilders { public static void main(String[] args) { List<Integer> list = new ArrayList<Integer>(); for(int i = 1; i< 10; i++){ list.add(i); } Stream<Integer> stream = list.stream(); stream.forEach(p -> System.out.println(p)); } } 2.4. Stream.generate() or Stream.iterate() In the given example, we are creating a stream from generated elements. This will produce a stream of 20 random numbers. We have restricted the elements count using limit() function. public class StreamBuilders { public static void main(String[] args) { Stream<Integer> randomNumbers = Stream .generate(() -> (new Random()).nextInt(100)); randomNumbers.limit(20) .forEach(System.out::println); } } 2.5. Stream of String chars or tokens In the given example, first, we are creating a stream from the characters of a given string. In the second part, we are creating the stream of tokens received from splitting from a string. also such as using Stream.Buider or using intermediate operations. We will learn about them in separate posts from time to time. 3. Stream Collectors After performing the intermediate operations on elements in the stream, we can collect the processed elements again into a Collection using the stream Collector methods. 3.1. Collect Stream elements to a List In the given example, first, we are creating a stream on integers 1 to 10. Then we are processing the stream elements to find all even numbers. At last, we are collecting all even numbers into a List.. Collect Stream elements to an Array The given example is similar to the first example shown above. The only difference is that we are collecting the even numbers in an Array. a Set, Map or into multiple ways. Just go through Collectors class and try to keep them in mind. 4. Stream Operations Stream abstraction has a long list of useful functions. Let us look at a few of them. Before moving ahead, let us build a List of strings beforehand. We will build our examples methods calls in a row. Let’s learn important ones. 4.1.1. Stream.filter() The filter() method accepts a Predicate to filter all elements of the stream. This operation is intermediate which enables us to call another stream operation (e.g. forEach()) on the result. memberNames.stream().filter((s) -> s.startsWith("A")) .forEach(System.out::println); Program Output: Amitabh Aman 4.1.2. Stream.map() The map() intermediate operation converts each element in the stream into another object via the given function. The following example converts each string into an UPPERCASE string. But we can use map() to transform an object into another type as well. memberNames.stream().filter((s) -> s.startsWith("A")) .map(String::toUpperCase) .forEach(System.out::println); Program Output: AMITABH AMAN 4.1.2. Stream.sorted() The sorted() method is an intermediate operation that returns a sorted view of the stream. The elements in the stream are sorted in natural order unless we pass a custom Comparator. memberNames.stream().sorted() .map(String::toUpperCase) .forEach(System.out::println); Program Output: AMAN AMITABH LOKESH RAHUL SALMAN SHAHRUKH SHEKHAR YANA Please note that the sorted() method only creates a sorted view of the stream without manipulating the ordering of the source Collection. In this example, the ordering of string in the memberNames is untouched. 4.2. Terminal operations Terminal operations return a result of a certain type after processing all the stream elements. Once the terminal operation is invoked on a Stream, the iteration of the Stream and any of the chained streams will get started. Once the iteration is done, the result of the terminal operation is returned. 4.2.1. Stream.forEach() The forEach() method helps in iterating over all elements of a stream and perform some operation on each of them. The operation to be performed is passed as the lambda expression. memberNames.forEach(System.out::println); 4.2.2. Stream.collect() The collect() method is used to receive elements from a steam and store them in a collection. List<String> memNamesInUppercase = memberNames.stream().sorted() .map(String::toUpperCase) .collect(Collectors.toList()); System.out.print(memNamesInUppercase); Program Output: [AMAN, AMITABH, LOKESH, RAHUL, SALMAN, SHAHRUKH, SHEKHAR, YANA] 4.2.3. Stream.match() Various matching operations can be used to check whether a given predicate matches the stream elements. All of these matching); Program Output: true false false 4.2.4. Stream.count() The count() is a terminal operation returning the number of elements in the stream as a long value. long totalMatched = memberNames.stream() .filter((s) -> s.startsWith("A")) .count(); System.out.println(totalMatched); Program Output: 2 4.2.5. Stream.reduce() The reduce() method performs a reduction on the elements of the stream with the given function. The result is an Optional holding the reduced value. In the given example, we are reducing all the strings by concatenating them using a separator #. Optional<String> reduced = memberNames.stream() .reduce((s1,s2) -> s1 + "#" + s2); reduced.ifPresent(System.out::println); Program, we will do with the if-else block. In the internal iterations such as in streams, there are certain methods we can use for this purpose. 5.1. Stream.anyMatch() The anyMatch() will return true once a condition passed as predicate satisfies. Once a matching value is found, no more elements will be processed in the stream. In the given example, as soon as a String is found starting with the letter 'A', the stream will end and the result will be returned. boolean matched = memberNames.stream() .anyMatch((s) -> s.startsWith("A")); System.out.println(matched); Program Output: true 5.2. Stream.findFirst() The findFirst() method will return the first element from the stream and then it will not process any more elements. String firstMatchedName = memberNames.stream() .filter((s) -> s.startsWith("L")) .findFirst() .get(); System.out.println(firstMatchedName); Program Output: Lokesh 6. Parallelism in Java Steam With the Fork/Join framework added in Java SE 7, we have efficient machinery for implementing parallel operations in our applications. But implementing a fork/join framework is itself a complex task, and if not done right; it is a source of complex multi-threading bugs having the potential to crash the application. With the introduction of internal iterations, we got the possibility of operations to be done in parallel more efficiently. To enable parallelism, all we have to do is to create a parallel stream, instead of a sequential stream. And to surprise, this is really very easy. In any of the above-listed stream examples, anytime we want to do a particular job using multiple threads in parallel cores, all we have to call Stream APIs. Happy Learning !! Read More: Stream Operations Intermediate Operations Terminal Operations - forEach() - forEachOrdered() - toArray() - reduce() - collect() - min() - max() - count() - anyMatch() - allMatch() - noneMatch() - findFirst() - findAny() Java Stream Examples Java 8 – Stream map() vs flatMap() Java 8 – Infinite Stream Java 8 – Stream Max and Min Java 8 – Stream of Random Numbers Java 8 – Stream Count of Elements Java 8 – Get the last element of Stream Java 8 – Find or remove duplicates in Stream Java 8 – IntStream Java 8 – IntStream to Collection Java 8 – IntPredicate – Convert Iterable or Iterator to Stream Java 8 – Sorting numbers and strings Java 8 – Sorting objects on multiple fields Java 8 – Join stream of strings Java 8 – Merge streams Java 9 – Stream API Improvements Feedback, Discussion and Comments Shatakshi Its an informative post. But I have one query here, in terms of performance streams are better or for-loops. As much I have read online, answer is for loops then why should we prefer using streams? Lokesh Gupta The gains are so much for most of the real-world examples. In most applications, we will not iterate over collections having 1 million or more records. If that is ever needed, it is done on the database side. The lambda expressions are amazing in writing complex logic in a single line. Rajanikant Hi, How to breakout from loop from 2.4 I have thought to apply break statement but in consumer we can’t apply as its not a loop statement. or is it stream should have only fixed size.? –
https://howtodoinjava.com/java8/java-streams-by-examples/
CC-MAIN-2020-45
en
refinedweb
Individuals working in the field of Data Science understand the importance of data. Data is the resource to fuel a machine learning model. But raw data in the real world cannot be used without pre-processing them to a usable format. One of the most common problems faced with real-time data is missing values. There are some values in rows and columns that simply do not exist. But, for a good model training, we need the data to be as clean as possible. Missing values are generally represented with NaN which stands for Not a Number. Although Pandas library provides methods to impute values to these missing rows and columns, we need to be able to understand how, where and how many points of NaN are distributed in the dataset. For this, python introduced a new library called Missingno. The purpose of this article is to get a better understanding of missing data by visualizing them using Missingno. What is Missingno? Missingno is a Python library that provides the ability to understand the distribution of missing values through informative visualizations. The visualizations can be in the form of heat maps or bar charts. With this library, it is possible to observe where the missing values have occurred and to check the correlation of the columns containing the missing with the target column. Missing values are better handled once the dataset is fully explored. Let us now implement this and find out how it helps us pre-process the data better. Implementation of Missingno The first step in implementing this is to install the library using the pip command as follows: pip install missingno Once this is installed, let us select a dataset that contains missing values. I have selected a dataset from Kaggle called Life expectancy dataset. This dataset is used to estimate the average human life expectancy based on the geographical location, health expenditure, disease etc. To download this dataset click here. Let us now import some of the libraries and load our dataset. from google.colab import drive drive.mount('/content/gdrive') import numpy as np import pandas as pd life_expentancy = pd.read_csv("/content/gdrive/My Drive/Life Expectancy Data.csv") life_expentancy.head() Now, let us identify the sum of the missing values using the isnull method of pandas. life_expectancy.isna().sum() Now, we can identify that there are values which are missing. It is time to now visualize this using the library. Visualization of missing values - Matrix import missingno as msno msno.matrix(life_expectancy) The dataset is distributed from 1 to 2938 data points. The white lines indicate the missing values in each column. The Hepatitis B, population and GDP columns seem to have the highest number of missing values. Other than this, on closer observation, you can notice that there are few trends in the missing rows and columns. For example, if a row value is missing from the BMI column there is also the same rows missing from the thinness 1-19 years column. Another trend is that if there are values missing from the GDP column, then the income column is also missing those rows. These trends give an idea about how the features are correlated with one another. But to get a better idea about correlations we need to use heatmaps. - Heatmap msno.heatmap(life_expectancy) The heatmap shows a positive correlation with blue. The darker the shade of blue, the more the correlation. The map shows that the total expenditure and alcohol have the highest correlation of 0.9. It also shows that the GDP and income column are positively correlated as per our initial intuition which means these two columns can affect the target. Another way to visualize the data for missing values is by using bar plots. - Bar Plot msno.bar(life_expectancy) These bars show the values that are proportional to the non-missing data in the dataset. Along with that, the number of values missing is also shown. Since the total number of datapoints is 2938, the columns with lesser than these contain missing values. Conclusion In this article, we saw how to visualize the missing data in a graphical format and understand the relationship that exists among the different columns. Missingno helps in understanding the structure of the dataset with very few lines of code. With this information, it becomes easier and more efficient to use pandas either to impute the values or to drop them and can increase the overall accuracy.
https://analyticsindiamag.com/tutorial-on-missingno-python-tool-to-visualize-missing-values/
CC-MAIN-2020-45
en
refinedweb
Implement backend for a read-only "Auditor" user TasksTasks - PoC - Write a PoC - Write a small post describing the implementation strategy - Get strategy vetted - Backend - Auditor should be able to access all projects / groups - Restrictions - Cannot commit - Cannot access admin area - Can read issues / MRs - Cannot create / comment on issues / MRs - Can read all files in the repository - Cannot create/modify files from the Web UI - Cannot merge a merge request - Cannot fork a project - Cannot create a project - Cannot access project settings - Cannot create project snippets - Can read project snippets - Cannot access group settings - Can access projects that are: - Private - Public - Internal - Verify that no accessible pages are breaking - Does the migration need downtime? Auditor's dashboard should display all projects - External users? - Read-only API access - Do we need to add an auditor check anywhere else? Finders? - Tests - Added - Policies - Finders - "user cannot be auditor and admin" - User cannot access admin area - User cannot access project settings - Passing - Refactoring - Meta - CHANGELOG entry created - Documentation created/updated API support added - Branch has no merge conflicts with master - Squashed related commits together - Check for clean merge with EE Added screenshots - Final sanity check - Merge requests - Issues - Project snippets - Snippets - Groups - Milestones (group/project) - Labels (group/project) - Pipelines - Repository - Review - Miniboss (@jameslopez) - Group creation should be blocked - Extract a admin_or_auditormethod create(:admin)instead of create(:user, :admin) - "group each logical step and separate the assigning part from the expectation" (snippets_finder_spec) - add more expectations here to make sure any write operation is excluded (group_policy_spec) - write a description to it (namespace_policy_spec) - make let(:owner_permissions)shorter (namespace_policy_spec) - use %i here, to save some colons and commas (project_policy_spec) - Improve group_projects_finder_spec - Endboss (@DouweM) add_column_with_defaultneeds a downblock - View conditional tweak - Change doc version to 8.17 (typo) - Add auditor specs to spec/features/security - Retest migration - Make sure UI works okay after refactoring - Make sure CE backport branch merges cleanly (or no conflicts are from this feature) with EE MR branch - UI - User cannot be admin and auditor - Cleanup - Group showpage shouldn't show the New Projectbutton - Wait for merge - Closes #1439 (closed)
https://gitlab.com/gitlab-org/gitlab/-/merge_requests/998
CC-MAIN-2020-45
en
refinedweb
This chapter includes the following sections: Overview of POF Serialization Using the POF API to Serialize Objects Using POF Annotations to Serialize Objects Using POF Extractors and POF Updaters Serializing Keys Using POF Serialization is the process of encoding an object into a binary format. It is a critical component to working with Coherence because data must be moved around the network. POF is a language agnostic binary format. POF was designed to be efficient in both space and time and has become a cornerstone element in working with Coherence. For more information on the POF binary stream, see The PIF-POF Binary Format. There are several options available is restricted to only Java objects. POF has the following advantages: It's language independent with current support for Java, .NET, and C++. It's very efficient. In a simple test class with a String, a long, and three ints, (de)serialization was seven times faster, and the binary produced was one sixth the size compared with standard Java serialization. It's versionable. Objects can evolve and have forward and backward compatibility. It supports the ability to externalize your serialization logic. It's indexed to allow for extracting values without deserializing the whole object. See "Using POF Extractors and POF Updaters". The PortableObject interface is an interface made up of two methods: public void readExternal(PofReader reader) public void writeExternal(PofWriter writer) POF elements are indexed by providing a numeric value. The following example demonstrates implementing provides a way to externalize theize(PofReader in) public void serialize(PofWriter out, Object o) As with the PortableObject interface, all elements written to or read from the POF stream must be uniquely indexed. Below is an example in.readRemainder(); writing the object is done. Do. use of the PofNavigator and PofValue API has the following restrictions when using object references: Only read operations are allowed. Write operations result in an UnsupportedOperationException. User objects can be accessed in non-uniform collections but not in uniform collections. For read operations, if an object appears in the data stream multiple times, then the object must be read where it first appears before it can be read in the subsequent part of the data. Otherwise, an IOException: missing identity: <ID> may be thrown. For example, if there are 3 lists that all contain the same person object, p. The p object must be read in the first list before it can be read in the second or third list. This section includes the following topics: Enabling POF Object References Registering POF Object Identities for Circular and Nested Objects-config.xml configuration file. The POF configuration file has a <user-type-list> element that contains a list of classes that implement PortableObject or have a PofSerializer associated with them. The <type-id> for each class must be unique, and must match across all cluster instances (including extend clients). See POF User Type Configuration Elements, for detailed reference of the POF configuration elements. The following is an example of a POF configuration file: <.> ... An entire JVM instance can be configured to use POF using the following system properties: coherence.pof.enabled=true - Enables POF for the entire JVM instance. coherence.pof.config= CONFIG_FILE_PATH - The path to the POF configuration file you want to use. If the files is not in the classpath, then it must be presented as a file resource (for example,).; } POF annotated objects, like all POF objects, must be registered in a pof-config.xml file within a <user-type> element. See argument to specify either the path to an output directory or a path and filename. The default output directory is the working directory. The default filename if only a directory is specified is pof-config.xml. If a directory is specified and a pof-config.xml file already exists, then a new file is created with a count suffix ( pof-config- n .xml). If a path and filename are specified and the file currently exists, then the file is overwritten. -config: Use the -config argument -include argument to specify whether an existing POF configuration file (as specified by the -config argument) -include argument. -packages: Use the -packages argument to constrain the class scan to specific packages. The packages are entered as a comma separated list. -startTypeId: Use the -startTypeId argument and. Due to the fact that indexes. In the simplest form, provide the index of the attribute to be extracted/updated.Consider the following example: public class Contact implements PortableObject { ... // ----- PortableObject interface ---------------------------------------.Date type. POF is designed to serialize to java.sql.Timestamp (which extends java.util.Date). The wire formats for those two classes are identical, and a deserialization of that wire representation always results in a java.sql.Timestamp instance. Unfortunately, the equals method.Date must be avoided. Use a Long representation of the date or the java.sql.Timestamp type to avoid breaking the key symmetry requirement. Keys that are using POF object references cannot be serialized. In addition, POF object references support circular references. Therefore, you must ensure that your key class does not have circular references.
https://docs.oracle.com/middleware/12211/coherence/develop-applications/using-portable-object-format.htm
CC-MAIN-2020-45
en
refinedweb
In this Quick Tip, I'll show you how and why the Bubble Sort algorithm works, and how to implement it in AS3. You'll end up with a class that you can use in any Flash project, for sorting any array. Final Result Preview Here's a simple demo of the result of the bubble sort algorithm: Of course, this SWF doesn't prove much on its own! Grab the source files and you can edit the input array yourself. Step 1: Creating the BubbleSort Class As this algorithm will be used more than once, it's a good idea to create a class for it, so that we can easily use it in any AS3 project: Set up a basic Flash project, and inside the project folder create a file BubbleSort.as. (We will create a tester file here too, so we can test it.) If you dont know how to work with classes please check this tutorial: How to Use a Document Class in Flash. We wont need the constructor, so get rid of it! Your class should look like this: package { public class BubbleSort { } } Step 2: How the Algorithm Works This algorithm is not the fastest or most efficient method of sorting a series of numbers, but it is the easiest one to understand. This image sums it up; at every stage, each pair of numbers are compared, starting from the end, and swapped (by means of a "spare" temp variable) if they are in the wrong order. Once all consecutive pairs have been checked, this guarantees that the number at the start is the largest number in the sequence; we then repeat, checking every pair of numbers apart from the number at the start. Once all consecutive pairs have been checked, we know that the first two numbers in the sequence are in the correct order (they are the largest and second-largest). We keep going until we've put every number in the correct order. It's called the "bubble sort" because, on each pass through the array, the biggest number "floats" to the top of the array, like a bubble in water. Lets start writing the code. We'll call the main function bsort(): package { public class BubbleSort { public function bsort(arr:Array,sortType:String):Array { var temp:String; if(sortType.toLocaleLowerCase() == "descending") { } else if(sortType.toLocaleLowerCase() == "ascending") { } else throw new Error("You have a typo when Calling the bsort() function, please use 'ascending' or 'descending' for sortType!"); return arr; } } } The function gets two parameters. The first parameter, arr, will be the array to be sorted; the second paramter, sortType will be used to decide if the user wants the array to be sorted in ascending or descending order. In the function we declare a temp variable which will hold the elements of the array in case we need to swap the two elements. You may wonder why it is not a Number. It's because our class will be able to handle String arrays too, sorting them alphabetically; we can convert numbers to strings and back again, but we can't convert strings to numbers and back again, so we use a String for this variable, just to be safe. We use an if- else block to split our code into two branches, depending on which direction the user wants to sort in. (If the user does not provide a valid choice, the program will fire an error.) The difference between the code in either branch will be just one character: either < or >. Let's write the algorithm. We start with the descending part: package { public class BubbleSort { public function bsort(arr:Array,sortType:String):Array { var temp:String; if(sortType.toLocaleLowerCase() == "descending") { for(var i:uint=0; i < arr.length; i++) { for(var j:uint=arr.length-1; j > i; j--) { } } } else if(sortType.toLocaleLowerCase() == "ascending") { } else throw new Error("You have a typo when Calling the bsort() function, please use 'ascending' or 'descending' for sortType!"); return arr; } } } As you can see, we're using nested for loops. One goes from the first element to the last element of the array; the other goes backwards. Let's inspect the inner " j" loop first. As the earlier diagram shows, we begin by comparing the last two elements of the array, which are arr[j-1] and arr[j] (in the first iteration). If arr[j-1] is less than arr[j] they need to be swapped. In either case we subtract one from j (through the " j--" call in line 131), which changes which pair of numbers will be compared on the next loop. j starts at a value of arr.length-1, and ends with a value of 1, meaning that the inner for loop checks every consecutive pair, starting with the last pair (where j equals arr.length-1) and ending with the first pair (where j equals 1). Now let's look at the outer " i" loop. Once all the pairs have been checked and swapped as necessary, i is increased (through the " i++" call in line 129). This means that, the next time round, j will start at arr.length-1 again, but end at 2 this time - meaning that the first pair in the sequence will not be checked or swapped. This is exactly what we want, since we know that the first number is in the correct position. As it goes on, eventually there will be only two elements that need to be checked in the inner loop. Once they're done, we know we've sorted the array! Here's what that looks like in code: for(var i:uint=0; i<arr.length;i++) { for(var j:uint=arr.length-1; j > i; j--) { if (arr[j-1] < arr[j]) { temp = arr[j-1]; arr[j-1] = arr[j]; arr[j] = temp; } } } And the algorithm is ready! Now we can use the same logic to create the ascending sort: We need only to change the comparison operator in the if block of the inner loop: package { public class BubbleSort { public function bsort(arr:Array,sortType:String):Array { var temp:String; if(sortType.toLocaleLowerCase() == "descending") { for(var i:uint=0; i<arr.length;i++) { for(var j:uint=arr.length-1; j > i; j--) { if (arr[j-1] < arr[j]) { temp = arr[j-1]; arr[j-1] = arr[j]; arr[j] = temp; } } } } else if(sortType.toLocaleLowerCase() == "ascending") { for(var k:uint=0; k<arr.length;k++) { for(var l:uint=arr.length-1; l > k; l--) { if (arr[l-1] > arr[l]) { temp = arr[l-1]; arr[l-1] = arr[l]; arr[l] = temp; } } } } else { throw new Error("You have a typo when Calling the bsort() function, please use 'ascending' or 'descending' for sortType!"); } return arr; } } } Step 3: Creating the Tester Application Create a new flash file, tester.fla, in the same folder as BubbleSort.as. Create two dynamic text fields, name one input_arr and the other one output_arr. After creating the appearance, we must create and link the document class. Create a file Tester.as and link this to tester.fla Now we can finally use our class in the Tester.as: package { import BubbleSort; import flash.display.MovieClip; public class Tester extends MovieClip { private var bs:BubbleSort = new BubbleSort(); public function Tester() { var ar:Array = [5,7,9,8,1,3,6,2,4,5,0]; input_arr.text = ar.toString(); ar = bs.bsort(ar,"descending"); output_arr.text = ar.toString(); } } } In this line, we call the bsort() function of our variable bs (which is an instance of BubbleSort): ar = bs.bsort(ar,"ascending"); This function returns an array, so we can assign this as the new value of our original input array. Save everything and try your work out. Conclusion In this tutorial we created a function to help us sort an Array. We could improve the efficiency; for more on that, you can read Wikipedia - Bubble Sort If you really wish to see how fast this algorithm is compared to the other options (like quicksort), take a look at sorting-algorithms.com. Envato Tuts+ tutorials are translated into other languages by our community members—you can be involved too!Translate this post
https://code.tutsplus.com/tutorials/quick-tip-implementing-the-bubble-sort-in-as3--active-10728
CC-MAIN-2017-13
en
refinedweb
Type System The types are defined in dotty/tools/dotc/core/Types.scala Class diagram - PDF, generated with a fork of scaladiagrams Proxy types and ground types A type which inherits TypeProxy is a proxy for another type accessible using the underlying method, other types are called ground types and inherit CachedGroundType or UncachedGroundType. Here's a diagram, copied from dotty/tools/dotc/core/Types.scala: Type -+- ProxyType --+- NamedType ----+--- TypeRef | | \ | +- SingletonType-+-+- TermRef | | | | | +--- ThisType | | +--- SuperType | | +--- ConstantType | | +--- MethodParam | | +----RecThis | | +--- SkolemType | +- PolyParam | +- RefinedOrRecType -+-- RefinedType | | -+-- RecType | +- HKApply | +- TypeBounds | +- ExprType | +- AnnotatedType | +- TypeVar | +- PolyType | +- GroundType -+- AndType +- OrType +- MethodType -----+- ImplicitMethodType | +- JavaMethodType +- ClassInfo | +- NoType +- NoPrefix +- ErrorType +- WildcardType Representations of types Representation of methods def f[A, B <: Ord[A]](x: A, y: B): Unit is represented as: val p = PolyType(List("A", "B"))( List(TypeBounds(Nothing, Any), TypeBounds(Nothing, RefinedType(Ordering, scala$math$Ordering$$T, TypeAlias(PolyParam(p, 0))))), m) val m = MethodType(List("x", "y"), List(PolyParam(p, 0), PolyParam(p, 1)))(Unit) (This is a slightly simplified version, e.g. we write Unit instead of TypeRef(TermRef(ThisType(TypeRef(NoPrefix,<root>)),scala),Unit)). Note that a PolyParam refers to a type parameter using its index (here A is 0 and B is 1). Subtyping checks topLevelSubType(tp1, tp2) in dotty/tools/dotc/core/TypeComparer.scala checks if tp1 is a subtype of tp2. Type rebasing FIXME: This section is no longer accurate because changed the handling of refined types. Consider tests/pos/refinedSubtyping.scala class Test { class C { type T; type Coll } type T1 = C { type T = Int } type T11 = T1 { type Coll = Set[Int] } type T2 = C { type Coll = Set[T] } type T22 = T2 { type T = Int } var x: T11 = _ var y: T22 = _ x = y y = x } We want to do the subtyping checks recursively, since it would be nice if we could check if T22 <: T11 by first checking if T2 <: T1. To achieve this recursive subtyping check, we remember that T2#T is really T22#T. This procedure is called rebasing and is done by storing refined names in pendingRefinedBases and looking them up using rebase. Type caching TODO Type inference via constraint solving TODO
http://dotty.epfl.ch/docs/internals/type-system.html
CC-MAIN-2017-13
en
refinedweb
WCTYPE(3) Linux Programmer's Manual WCTYPE(3) NAME wctype - wide-character classification SYNOPSIS #include <<wctype.h>> wctype_t wctype(const char *name); DESCRIPTION The wctype_t type represents a property which a wide character may or may not have. In other words, it represents a class of wide charac- ters. This type's nature is implementation-dependent, but the special value (wctype_t) 0 denotes an invalid property. Non-zero wctype_t val- ues RETURN VALUE The wctype() function returns a property descriptor if the name is valid. Otherwise it returns (wctype_t) 0. CONFORMING TO C99. NOTES The behavior of wctype() depends on the LC_CTYPE category of the cur- rent locale. SEE ALSO iswctype(3) COLOPHON This page is part of release 3.05 of the Linux man-pages project. A description of the project, and information about reporting bugs, can be found at. GNU 1999-07-25 WCTYPE(3)
http://modman.unixdev.net/?sektion=3&page=wctype&manpath=Debian-5.0
CC-MAIN-2017-13
en
refinedweb
Can I connect to a Ubuntu server, that is running MySQL using ADO.NET or do I need a special driver? You'll need the MySQL Connector/NET ADO.NET driver. Once installed, it behaves almost identically to Microsoft's native System.Data.SqlClient. Instead of importing that namespace, use MySQL's: using MySql.Data.MySqlClient; ... MySqlConnection DB = new MySqlConnection("SERVER=..."); Basically, just prepend My where you'd use any of the MS SqlClient classes.
https://codedump.io/share/UIoLUViGPYEm/1/connecting-to-a-linux-server-running-mysql-from-a-windows-net-server-adonet
CC-MAIN-2017-13
en
refinedweb
Notify a thread waiting on a change in the state of monitored data. Syntax #include <prcmon.h> PRStatus PR_CNotify(void *address); Parameter The function has the following parameter: address - The address of the monitored object. The calling thread must be in the monitor defined by the value of the address. Returns PR_SUCCESSindicates that the calling thread is the holder of the mutex for the monitor referred to by the address parameter. PR_FAILUREindicates that the monitor has not been entered by the calling thread. Description Using the value specified in the address parameter to find a monitor in the monitor cache, PR_CNotify notifies single a thread waiting for the monitor's state to change. If a thread is waiting on the monitor (having called PR_CWait), then that thread is made ready. As soon as the thread is scheduled, it attempts to reenter the monitor. Document Tags and Contributors Contributors to this page: teoli, alecananian
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSPR/Reference/PR_CNotify
CC-MAIN-2017-13
en
refinedweb
One of the most powerful features of Ferris is scaffolding. Scaffolding can provide you with common CRUD functionality very quickly, and it may be customized. Developers can use the entire scaffold or use certain parts as needed. Scaffolding provides both actions and templates for the actions list(), add(), view(), edit(), and delete(). Scaffolding is enabled via the use of a special component called Scaffolding. Include it in your controller’s Meta class: from ferris import Controller, scaffold class Widgets(Controller): class Meta: components = (scaffold.Scaffolding,) Note This controller expects a Widget model available in app.models.widget. You can always manually specify a Model. Once included, you can use the scaffold actions to provide functionality for your controller: list = scaffold.list For the full suite of functionality include all actions: from ferris import Controller, scaffold class Widgets(Controller): class Meta: components = (scaffold.Scaffolding,) list = scaffold.list view = scaffold.view add = scaffold.add edit = scaffold.edit delete = scaffold.delete Accessing your controller (in this case at /widgets) will present you with the complete suite of CRUD actions. Notice that you didn’t have to create any templates; there are a set of fallback scaffold templates that are automatically used if no template exists for the action. It’s also useful to use scaffolding to generate an admin interface for your module. Because this is so useful there are special provisions for the admin functionality. See admin scaffolding for more details. The scaffold can provide the action logic for the common CRUD operations view(), list(), add(), edit(), and delete(). There are two ways to use these. You can use them directly: view = scaffold.view admin_list = scaffold.list Or you can delegate to them: def view(self, key): return scaffold.view(self, key) The delegate pattern allows you to configure the scaffold on a per-action basis: def view(self, key): self.scaffold.display_properties = ("name", "content") return scaffold.view(self, key) Actions can also be used with prefixes: def admin_view = view Below are descriptions for each action provided. Loads a given entity. Using the key (a urlsafe representation of an ndb.Key) it will fetch the item from the datastore and put it in the template context. It uses scaffold.singular as the template variable name. For example, if you’re on the controller “BrownBears” it’ll set context['brown_bear']. Presents of list of entities. By default this calls the model’s query method but you can use scaffold.query_factory to change this behavior. It uses scaffold.plural as the template variable name. For example, if you’re on the controller “BrownBears” it’ll set context['brown_bears']. Presents a form to the user to allow the creation of a new entity. It uses scaffold.ModelForm as the form to present to the user. It also provides the logic for processing the form and saving the entity. This is done by checking if the request is a GET (in which case it shows the form) or a POST (in which case it processes the form). If the form does not pass validation then the item is not created and the user is presented with the form again along with any validation errors. In the default operation a new item is created by calling Model() then updating the model with the information. If you wish to specify arguments to the model constructor or do other initialization see scaffold.create_factory. You can tap in to the behavior of this action using events. When processing the form this action will fire the scaffold_before_apply, scaffold_after_apply, scaffold_before_save, and scaffold_after_save events. Redirects to scaffold.redirect upon success. Similar to add with the exception that instead of creating a new object it loads an existing one using the given key. When the form is processed it will update that item in the datastore. The same events are fired. Also redirects to scaffold.redirect upon success. Will simply delete the entity specified by the given key from the datastore. Redirects to scaffold.redirect upon success. There is a full set of templates for the list(), view(), add(), and edit() actions. These templates are used if no template exists for a particular action. For example, if the scaffold templates for add(), and edit() suited your needs but you wanted to use a custom list() then you would just create /app/templates/[controller]/list.html. You can also inherit from the scaffold templates and override blocks and customize as needed: {% extends "scaffolding/form.html" %} {% block submit_text %}Commit{% endblock %} Additionally, you can copy the templates from /ferris/templates/scaffolding into your app for even more control. It’s encouraged to use, extend, copy, and customize these simple templates to suit your needs. Prints out each property and value in the entity at context[scaffolding.singular]. Uses scaffolding.display_properties <ScaffoldMeta.display_properties to determine which properties to print. Loops through context[scaffolding.plural] and prints each item in a table format. Uses scaffolding.display_properties <ScaffoldMeta.display_properties to determine which properties to print. Additionally displays action buttons for each item. These buttons are links to view(), edit(), and delete() if the actions are defined. You can override these buttons using the block item_action_buttons. Uses the form macros to display the model form. Because it uses the form macros it also displays any validation errors. Provides the following blocks: - form_tag - the literal html form tag. - form_actions - contains the cancel and submit buttons. - form_fields - contains all of the fields that make up the form. - cancel_button - contains the button that sends the user back to the list() action. - cancel_text - contains the text that’s inside of the cancel button. - submit_button - contains the button that submits the form. - submit_text - contains the text that’s inside of the submit button. Just inherits from form.html and sets the submit_text block to Create. Just inherits from form.html and sets the submit_text block to Save. Provides sub-navigation. This used in admin scaffolding to display links to list() and add(). It also displays any navigation items listed in scaffold.navigation. You can override and extend this to provide links to other actions. You can generate a basic CRUD administration interface using the admin prefix along with scaffolding. This interface is limited to users who are App Engine administrators. When the scaffold detects that your controller has the admin prefix it will automatically add it to the module navigation available at /admin. It will also use the nav.html template to provide sub-navigation for your controller. This is all provided by the layout at /ferris/templates/layouts/admin.html which you can overload and extend as needed. Here’s a complete example: class Posts(Controller): class Meta: prefixes = ('admin',) components = (scaffold.Scaffolding,) view = scaffold.view list = scaffold.list add = scaffold.add edit = scaffold.edit delete = scaffold.delete Scaffolding plays well with both the pagination and messages component. If pagination is used then the list method will automatically page as expected. Using the messages component enables scaffolding to use Message classes instead of Forms for the add() and edit() classes and also enables JSON-formatted responses for list() and view(). See the messages documentation for more information. The scaffold taps into the controller’s event system to provide callbacks during the add(), edit(), and delete() actions. To listen and respond to these events use self.events inside of the controller: def add(self): def before_save_callback(controller, container, item): logging.info(item) self.events.scaffold_before_save += before_save_callback return scaffold.add(self) Triggered during add() and edit() before the form’s data is applied to the item. Triggered during add() and edit() after the form’s data is applied to the item but before saving. Triggered during add() and edit() after the form’s data has been applied but before the item is saved to the datastore. Triggered during delete() before the item is permanently deleted from the datastore. Triggered during delete() after the item is permanently deleted from the datastore. The scaffold always needs a model in order to operate. In most cases you won’t have to specify one: it can automatically load your Model if it matches the singular inflection naming scheme. For example, if your controller is Bears and you have a model named Bear in app.models.bear then scaffold will automatically find and load the model. To specify the model manually, use Controller.Meta.Model: class Bears(Controller): class Meta: Model = BrownBear For all other configuration the scaffold uses its own inner configuration class similar to the controller’s meta class. This can be used to configure various thing about the scaffold’s behavior. For example: from ferris import Controller, scaffold class Widgets(Controller): class Meta: components = (scaffold.Scaffolding,) class Scaffold: title = "Magical Widgets" display_properties = ("name", "price") Like Meta, this is constructed and made available during requests at self.scaffold (lowercase): def list(self): self.scaffold.display_properties = ("name",) return scaffold.list(self) Default meta configuration for the scaffold. The default query factory for use in the list() action. By default this just calls Model.query(). You can specify any callable. The factory should be in the form of factory(controller). For example: def location_query_factory(controller): location = controller.request.params.get('location') Model = controller.meta.Model return Model.query(Model.location == location) The default factory to create new model instances for the add() action. This is useful if items need to be created with certain data or a ancestor key. You can specify any callable; it should be in the form of factory(controller). For example: def ancestored_create_factory(controller): return controller.meta.Model(parent=ndb.Key("User", controller.user.email())) The proper title of the controller. Used in the <title> html tag as well as for page headers. This is automatically set to inflector.titleize(Controller.__name__). The pluralized, underscored version of the controller’s name, useful for getting list data from the view context. For example scaffold’s list() sets self.context[self.scaffold.plural]. If you wanted to get that data later you would use self.context[self.scaffold.plural]. The singularized, underscore version of the controller’s name. Similar to plural, you typically don’t want to modify it but it’s useful for getting the data set by the view(), add(), and edit() actions which set self.context[self.scaffold.singular]. The default form to use for the add() and edit() actions. By default it calls model_form() with the default options to generate a form class. You can override this to provide your own: WidgetForm = model_form(Widget, exclude=('foo', 'baz')) ... def add(self): self.scaffold.ModelForm = WidgetForm return scaffold.add(self) Determines which of the model’s properties are visible in the list() and view() actions. Example: def list(self): self.scaffold.display_properties = ("created_by", "title", "publish_date") return scaffold.list(self) The URI in which to send the user when they successly complete the add() or edit() actions. By default this is list() but can be changed. If set to False no redirection will occur. For example, to redirect the user to the newly created object: def add(self): def set_redirect(controller, container, item): controller.scaffold.redirect = controller.uri(action='view', key=item.key.urlsafe()) self.events.scaffold_after_save += set_redirect return scaffold.add(self) The default URL to which forms are submitted. By default this is the current action: the add() form submits to add() and the :func:`edit form to edit(). In some cases it’s desirable to submit the form somewhere else (such as upload component) The encoding used by the forms in add() and edit(). By default this is set to 'application/x-www-form-urlencoded' but may be changed if file uploads are needed. Specifies whether or not to use flash messages. Flash messages are messages that appear on the next page after an action. The form actions add() and edit() use flash messages to tell the user if their save was successful or not. The delete() action uses it to confirm deletion. In the case of non-html views flash messages may not be wanted so you can disable them. A dictionary of layouts to use for each prefix. By default no prefix uses the layout default.html and the admin prefix uses the layout admin.html. You can always override those templates or change this attribute to use custom layouts if desired: class Scaffold: layouts = { None: "custom.html", "admin": "custom-admin.html" } Used to specify actions in the sub-navigation. This is used by the nav.html template to display links to actions in your controller. For example: class Scaffold: nav = { "metrics": "Metrics", "logs": "Logs" } Scaffold contains a few useful macros in /ferris/templates/scaffolding/macros.html. If you look at the templates for each method you can see that these macros are used frequently to help simply building templates. To use these macros in your template use import: {% import 'scaffolding/macros.html' as s with context %} {{s.next_page_link()}} Chooses the layout for the current prefix that’s configured via scaffold.layouts. An alias to the pagination macro’s next_page_link(). Inserts a paginator if the pagination component is active. An alias to ferris.format_value(). Tries to find the best way to represent the given object as a string. Creates a bootstrap style button link to a particular action. This is used to generate the action buttons in the list view for view(), edit(), and delete(). Creates the default set of buttons for view(), edit(), and delete() by calling action_button(). Creates a navigation link for nav.html.
http://ferris-framework.appspot.com/docs21/users_guide/scaffolding.html
CC-MAIN-2017-13
en
refinedweb
kmem(7) kmem(7) NAME kmem - perform I/O on kernel memory based on symbol name. SYNOPSIS #include <<<<sys/ksym.h>>>> int ioctl(int kmemfd, int command, void *rks); DESCRIPTION When used with a valid file descriptor for /dev/kmem (kmemfd), ioctl can be used to manipulate kernel memory. The specifics of this manipulation depend on the command given as follows: MIOC_READKSYM Read mirk_buflen bytes of kernel memory starting at the address for mirk_symname into mirk_buf. rks is a pointer to a mioc_rksym structure, defined below. MIOC_IREADKSYM Indirect read. Read sizeof(void *) bytes of kernel memory starting at the address for mirk_symname and use that as the address from which to read mirk_buflen bytes of kernel memory into mirk_buf. rks is a pointer to a mioc_rksym structure. MIOC_WRITEKSYM Write mirk_buflen bytes from mirk_buf into kernel memory starting at the address for mirk_symname. rks is a pointer to a mioc_rksym structure. MIOC_IWRITEKSYM Indirect write. Read sizeof(void *) bytes of kernel memory starting at the address for mirk_symname and use that as the kernel memory address into which mirk_buflen bytes from mirk_buf are written. rks is a pointer to a mioc_rksym structure. MIOC_LOCKSYM Increase the hold count by one for the dynamically loaded module whose name is given by rks, a pointer to a character string, thereby preventing its unloading. MIOC_UNLOCKSYM Decrease the hold count by one for the dynamically loaded module whose name is given by rks, a pointer to a character string. If the count is thereby reduced to 0, the module becomes a candidate for unloading. The struct mioc_rksym definition is: struct mioc_rksym { char * mirk_modname; /* limit search for symname to module modname; if NULL use standard search order */ Hewlett-Packard Company - 1 - HP-UX Release 11i: November 2000 kmem(7) kmem(7) char * mirk_symname; /* name of symbol whose address is the basis for this operation */ void * mirk_buf; /* buffer into/from which read/write takes place */ size_t mirk_buflen; /* length (in bytes) of desired operation */ }; RETURN VALUE ioctl returns 0 upon successful completion. If an error occurs, a value of -1 is returned and errno is set to indicate the error. ERRORS In addition to the errors described in ioctl(2), the kmem ioctl also fails if one or more of the following are true: [EINVAL] modname does not represent a currently loaded module or this is an MIOC_UNLOCKSYM and the hold count is already 0. [ENXIO] kmemfd open on wrong minor device (i.e., not /dev/kmem). [EBADF] kmemfd open for reading and this is an MIOC_WRITEKSYM. [ENOMATCH] symname not found. [ENAMETOOLONG] modname is greater than MODMAXNAMELEN characters long, or symname is greater that MAXSYMNMLEN characters long. SEE ALSO getksym(2), ioctl(2), ioctl(5). Hewlett-Packard Company - 2 - HP-UX Release 11i: November 2000
http://modman.unixdev.net/?sektion=7&page=kmem&manpath=HP-UX-11.11
CC-MAIN-2017-13
en
refinedweb
: August 20,223 This item is only available as the following downloads: ( PDF ) Full Text PAGE 1 Bays: Analyze programs for costMIKEWRIGHT Staff writerBEVERLY HILLS Gerry Ferguson likes to socialize every so often. His spot of choice: Central Citrus Community Center off County Road 491, where Ferguson plays cards, greets friends and catches up on others lives. I enjoy the camaraderie, the Citrus Hills retiree said. There are a lot of nice people here. Citrus Countys three senior centers remain popular with people who count on them for activities, meals and, for some, a feeling of belonging. The seniors are more than just friends here. Theyre each others advocates, assistant county administrator Cathy Pearson said. It gives them a purpose. If they didnt have that, theyd stay home. The centers operate on a $196,436 annual budget. The proposed budget for 2013-14 is down 4 percent. Pat Coles, operations supervisor for Citrus County Support Services, said the centers activities and meals attract seniors throughout the county. All different people come at all different times, she said. Her numbers show about 4,000 monthly visits. Each program, game or meal includes a signup sheet so the county keeps track of the numbers. However, it doesnt track the exact number of individuals who utilize the programs. Coles said 600 to 800 people are signed up, so her best guess is the total doesnt exceed 800 SEPTEMBER 10, 2013Floridas Best Community Newspaper Serving Floridas Best Community50 NEWS BRIEF HIGH92LOW69Partly cloudy, with isolated thunderstorms.PAGE A4TODAY& next morning TUESDAY INDEX Classifieds . . . .C9 Comics . . . . .C8 Crossword . . . .C7 Community . . . .C6 Editorial . . . . .A8 Entertainment . . .A4 Horoscope . . . .A4 Lottery Numbers . .B3 Lottery Payouts . .B3 Movies . . . . . .C8 Obituaries . . . .A6 TV Listings . . . .C7 000FXB6 VOL. 119 ISSUE 34 CITRUS COUNTY MNF: Eagles look to silence fans in Washington /B1 Deputies search for father who fled with kidsThe Citrus County Sheriffs Office is asking for the publics help in locating Edward Peters and his two young daughters, McKala and Madison Peters. The girls were last seen on Sunday, Sept. 8, at a home on Aloha Street in Inverness, when Edward Peters reportedly took custody of them against the wishes of their courtordered guardian. He then fled with the children in an unknown direction. Peters has a warrant issued for his arrest and has violated several court orders, according to the sheriffs office. He was on pre-trial release and also removed his GPS ankle monitor issued to him in August. The monitor was found off the northbound lanes of Interstate 75 in Hernando County. Authorities are concerned for the safety and wellbeing of the two children. Madison Peters, an 11yearold white female, was last seen wearing jean capri pants with a pink T-shirt with Minnesota on it and black flip flops. She has eczema on both forearms. McKala Peters, a 6yearold white female, was last seen wearing white shorts with a blue T-shirt with pink graphics on it and black flip flops. Edward Peters, 45, is a white male who is 5-foot-9 with a medium build and light brown, short hair. Detectives said Peters may have traveled to the Orlando area. He is believed to be driving a 2003 Silver Jeep Liberty with a Florida tag, number 366LEJ. Anyone with information should call 911. Edward Peterswanted for violating court orders. From wire reports Madison Peters11 years old. McKala Peters6 years old. Man charged with sex abuse A.B. SIDIBE Staff writerA Dunnellon area man is in custody after being accused of grabbing a 15-yearold boy off the street, refusing to let him leave, subjecting him to pornographic films and performing sexual acts on him. Steven Duane Shotwell, 47, of Riverbend Road, was arrested Friday and charged with two counts of sexual battery on a person 12 years or older, showing obscene materials to a minor and kidnapping during the commission of a felony. No bond was allowed. Officials deem Shotwell a danger to the community. According to the Citrus County Sheriffs Office, the boy was on a public road when Shotwell grabbed him and pulled him through a partially open gate into his yard. Shotwell then shut the gate, but the teen took off running into the yard because Shotwell was blocking the gate, according to an arrest affidavit. The teenager ended up in a screened inground pool area with Shotwell giving chase around the pool. According to investigators, Shotwell eventually pushed the boy into the pool and jumped in after him. The Steven Shotwelldeemed a danger to the community by the CCSO. Accused of sexual battery and kidnapping 15-year-old boy See ARREST/ Page A5 Centers give seniors a purpose MATTHEW BECK/ChronicleMany adults across Citrus County spend part of their day at one of the county community centers, which offer them social and recreational opportunities during the week. From left, Pat Steere, Genie Holmf and Alice Ekroll play a game of mahjong Friday afternoon at the Central Citrus Community Center near Beverly Hills. Judge withholds rulingMIKEWRIGHT Staff writerINVERNESS Attorneys in the Duke Energy lawsuit on Monday argued the merits of whether a 1967 law protects the company from paying millions of dollars in property taxes. Circuit Court Judge T. Michael Johnson withheld a ruling on Property Appraiser Geoff Greenes motion for a summary judgment that would allow Greene to challenge the law as part of his case. Dukes attorneys said the law allows the company to count pollutioncontrol equipment as salvage, or about 10 percent of market value. A Duke attorney also said Monday that even if the law didnt exist, an expert said the pollution-control equipment, when taken separately from the Crystal River area power plant, isnt worth more than salvage anyway. Duke is suing Greene over the 2012 assessment of the power plant; Greenes attorneys told Johnson they expect Duke to sue again later Attorneys debate law in Duke case Associated PressLAKE MARY early evening and his attorney denied any wrongdoing by his client. Shellie Zimmerman, who has filed for divorce, initially told a 911 dispatcher that her husband had his hand on his gun as he sat in his car Zimmermans wife calls 911; wont press charges See CENTERS/ Page A2 Geoff Greeneproperty appraiser. See LAW / Page A2 See DISPUTE/ Page A5 Police claim domestic dispute Shellie Zimmerman PAGE 2 this year over the 2013 assessment as well. Last year, Duke paid about $19 million in taxes about $15 million less than what Greenes office said it was assessed for. At issue is $1.3 billion worth of pollution-control scrubbers installed in 2009 for Dukes coal plants. Greene said he disallowed Duke to declare the equipment as salvage, based on a 1998 circuit court judges decision in an unrelated case involving Dukes predecessor, Progress Energy. The judge ruled the 1969 state constitution nullified the 1967 law because it didnt include salvage as an allowable classification for property tax breaks. Johnson in March denied Citrus County government and the school board from joining the suit on Greenes behalf. Greene said he wanted their involvement to challenge the constitutionality of the 1967 law because of a state Supreme Court ruling that said property appraisers cannot challenge laws that they are sworn to uphold. However, Johnson left open the possibility of Greene arguing that the law effectively doesnt exist because the state Constitution overrides it. As Greene attorneys Thomas Wilkes and Thomas Cloud argued their points, Johnson asked if the other counties in Florida were assessing pollution-control equipment on energy plants as salvage or not. Both attorneys said they didnt know, but said the issue in Citrus County means millions of dollars in tax revenue for local government agencies. The major difference between Citrus County and the other counties is the size of the stakes, Wilkes said. Cloud later added: The impact of losing taxes is all felt in Citrus County. Duke attorney Doug Mo said Greenes attorneys provided nothing to show Greene has the authority to challenge the 1967 law. He also said the Legislature has passed laws since then that also allow pollution-control equipment be treated as salvage for tax purposes. Assistant Attorney General Joe Mellichamp, representing the state Department of Revenue, said the law clearly stops Greene from challenging the law. This is a value case, he said. That is what the case should be about. Johnson is expected to rule on Greenes motion in the coming weeks. Attorneys also said they expected the lawsuit to go to trial in May. residents who utilize the services multiple times. With Citrus County officials proposing a 30 percent hike in the tax rate, commissioners say the revenue is needed to maintain programs popular to residents. The first budget hearing is 5:30 p.m. Thursday at the county auditorium. Commissioner Rebecca Bays said it isnt enough to say whether programs are supported or not. She said the county should break down the cost per user and then decide whether that cost is too high or not. For example, senior centers in Beverly Hills and Homosassa maintain monthly average visits of more than 1,000. The East Citrus Community Center, however, shows daily numbers below 100 and monthly visits less than 1,000. Coles attributed the lower East Citrus Centers numbers to its location about three miles east of Inverness on State Road 44 near Gospel Island. Without a location change, those numbers are unlikely to improve, Coles said. Still, she doesnt think the centers should close. Theyre not going to drive over here, Coles said. I know those people need to have activities in their lives. Bays said the option should be explored anyway. She wonders if it would be less expensive to close a little-used center and instead provide transportation for seniors to attend the Central Citrus Center. In all our programs we need to really look at the service versus the cost and number of people were serving, and then figure out whats affordable, she said. The challenge, she said, is knowing that each service from 4-H to libraries or senior centers have constituencies that fight for their programs. Whatever their love or passion is, youre going to have that busload of them show up, she said. We have to look at budgets in services in totality. We have to do it in the whole. We have to do it for every taxpayer in the community. Ferguson, a retired radiology administrator, said the senior centers are worth every dime. There is a need in the community for this, he said. Its very important, no doubt about it.Contact Chronicle reporter Mike Wright at 352563-3228 or mwright@ chronicleonline.com. A2TUESDAY, SEPTEMBER10, 2013CITRUSCOUNTY(FL) CHRONICLELOCAL 000FZIX Ear, Nose & Throat Surgery Sinus Surgery Non-surgical Sinus Balloon Procedure. Allergy Testing Shot Free Treatment Hearing & Balance Disorders Facial Cosmetic Surgery & Fillers Denis Grillo, D.O Board Certified In ENT & Facial Plastic Surgery American Academy of Otolaryngology-Head & Neck Surgery American Osteopathic Board of Ophthalmology & Otorhinolaryngology 795-0011 Now participating with the following insurances: Blue Cross/Blue Shield Aetna United Health Care Avmed Medicare 790 SE 5th Terrace Crystal River FL Helping our patients hear the music, smell the roses & taste the good life! 000FSEA Lawn Sprinkler Not Working? Well Fix It $10 Off with ad 746-4451 2013 2013 2013 2013 000FX6B 000FZV0 CENTERSContinued from Page A1 MATTHEW BECK/ChronicleMany seniors who utilize the services at the Central Citrus Community Center take advantage of the recreational opportunities including playing cards, line dancing, billiards and ping-pong. Special to the ChronicleThe inaugural Bass Blasters Fishing Tournament, benefitting the Key Training Center and Rotary Club of Inverness community projects, is Saturday Sept. 21 at Liberty Park in Inverness. Prize money is $ 2500 and includes: $1,000 for the grand prize (total of five fish). $500 for second place (total of five fish). $250 for third place (total of five fish). $125 for fourth place (total of five fish). $75 for fifth place (total of five fish). Prizes for the largest bass (in pounds) worth $ 350 and second prize is $ 150. The entry fee of $100 per boat (two people per boat) includes a captains dinner at 6:30 p.m. Friday, Sept. 20, at the School of Dance Arts, 301 N. Apopka Ave., Inverness, and two customdesigned T-shirts. Pre-registration is at the Crystal Dodge Jeep dealership on State Road 44 in Inverness. Day-of registration begins at 6 a.m. at Liberty Park. The tournament begins at 7 a.m. Weigh-in is at 4 p.m. and winners announced thereafter. Those who are not putting their lines in the water can still join in activities. The Inverness Farmers Market will bring 25 local vendors to Liberty Park in conjunction with the tournament. There will be hourly cooking demonstrations by Chef Michael Kulow, owner of the McLeod House Bistro, and bluegrass music performed by the John French Connection. For more information, call Charlie Wade at 352287-1770. Benefit fishing tourney Sept. 21 WHAT: Bass Blaster s Fishing Tournament. WHEN: Sept. 21. WHERE: Liber ty Park, Inverness. BENEFITS: Ke y Training Center; Rotary Club of Inverness projects. LAWContinued from Page A1 PAGE 3 Around theCOUNTY Nature Coast GOP sets. Call 352-344-8786Purple Heart meeting Sept. 17Aaron A. Weaver Chapter 776 Military Order of the Purple Heart (MOPH) will conduct its bimonthly meeting at 1p.m. Tuesday, Sept.17, at the Citrus County Builders Association, 1196 S. Lecanto Highway (County Road 491), Lecanto, the Chapter 776 website at or call 352-382-3847.Committee to plan Vets WeekThe Veterans Appreciation Week Ad Hoc Coordinating Committee will conduct its monthly coordination meeting for Citrus Countys 21st annual Veterans Appreciation Week at 1:30p.m. Wednesday, Sept.18, in the conference room of the Citrus County Chronicle building,. 20/20 board meeting slated for Sept. 16The Citrus 20/20 Board of Directors will meet at 4:30p.m. Monday, Sept.16, in Room 117, Lecanto Government Building, 3600 W. Sovereign Path, Lecanto. All directors are asked to attend. For information about Citrus 20/20 Inc., visit the website at www. citrus2020.org or call Lace Blue-McLean at 352201-0149. From staff reports STATE& LOCAL Page A3TUESDAY, SEPTEMBER 10, 2013 CITRUSCOUNTYCHRONICLE ChronicleOn Tuesday, Sept. 3, Jamie Lynn Entrekin, 43, of Floral City, was arrested during an interview at the Ocala Police Department and charged with organized fraud, according to an OPD arrest report. Entrekin, a former office manager for Ocala physician Dr. Ravi Chandra at Surgical Specialists of Ocala, is charged with using funds drawn on Chandras business account to pay her personal credit card bills, 60 checks in all, totaling $281,815.43, beginning in December 2012. According to the arrest report, Chandra had been contacted by Capital One Banks fraud department on Aug. 29 and verified that the signature on the checks was not his and that he had not authorized Entrekin to use the business account for her personal use. On Sept. 3, Entrekin was called in to the Ocala Police Department for questioning by OPD Detective Scott Rowe. Entrekin told Rowe that she accidentally used the business account once about a month ago but when she realized the mistake she put a stop payment on the check. Rowe then told her there were several years of records showing she had been using the business checks to pay her credit card bill. Entrekin claimed that shortly after she was hired by Chandra in 2006, he had given his permission to use the business account. Chandra told OPD that he had never given his permission for her to use the business funds for her credit cards. Rowe placed Entrekin under arrest and she was taken to the Marion County Jail where she was released the same day on $10,000 bond. Woman charged with fraud Ocala authorities allege Floral City woman stole from bosss business account First Responders honored ABOVE: Life Care Center hosted its fourth annual First Responders Breakfast on Monday morning in memory of fallen first responders from Sept. 11, 2001. From left are Sgt. Ryan Glaze, School Resource Officer Brian Coleman, and Detectives Mark Dera and Ed Serocki, all from the Community Crimes Unit of the Citrus County Sheriffs Office. RIGHT: Staffing the First Responders Breakfast at Life Care Center of Lecanto are, from left, Activity Assistant Carla Ince, Director of Sales and Business Development Tom Corcoran, Executive Director Amy Derby, Activities Director Melissa Dickinson and Dietary Superintendent Lisa Shields.STEPHEN E. LASKO/For the Chronicle PATFAHERTY Staff writerThe Agricultural Alliance of Citrus County on Monday welcomed the new 4-H agent and an interim director for the Extension Service. The two were introduced at the alliance meeting, partially resolving one of the organizations ongoing concerns adequate staffing the Citrus County Extension Service. Muriel Turner of the Levy County Extension Service will be working in Citrus County part time as interim director. Marnie Ward, who has been a 4-H leader, officially starts Friday and is the new full-time 4-H agent. Its a valuable program, she said, acknowledging that 4-H activities are really ramping up with the new school year. Cara Meeks, 4-H volunteer, announced the 4-H kickoff carnival is 1 to 4 p.m. Saturday at Cornerstone Baptist Church in Inverness. Anyone wanting to be part of 4-H is urged to attend. The following Saturday, Sept. 21, from 9 a.m. to noon, 4-H members will be cleaning up Wallace Brooks Park and Liberty Park in Inverness. The annual Adopta-Shore program is on Sept. 21, in conjunction with Save Our Waters Week. Meeks said a group of 4-H members were hoping to attend todays meeting of the Board of County Commissioners. Alliance leaders Dale McClellan and Larry Rooks are scheduled to appear before the BOCC this afternoon to emphasize the value of fully funding the Extension Service. The 4-H members will attend to show support for their request. They will also attend the county budget hearing on Thursday. Amy Engelken, assistant community services director for Citrus County, said the hiring process is moving forward and they are getting ready to advertise for the director position. The alliance also welcomed County Commissioner Rebecca Bays as liaison to the BOCC. Water issues, another standing concern of the alliance, were discussed in light of todays hearing in Brooksville by the Florida Department of Environmental Protection hosted by the Southwest Florida Water Management District. The hearing is in response to challenges to the proposed minimum flows and levels for the Chassahowitzka and Homosassa River systems. Following the hearing there will be a twoweek opportunity for additional public comments. Contact Chronicle reporter Pat Faherty at 352564-2924 or pfaherty @chronicleonline.com. PATFAHERTY Staff writerA presentation on a scholarship program has the Agricultural Alliance of Citrus County looking into future opportunities for a possible commitment. Monday, the group heard a presentation from Sandy Balfour, who chairs the College of Central Florida Board of Trustees. Balfour, who also serves on the Citrus County School Board, described the STEPS program, which is short for Scholarships Taking Elementary Promising Students. Each year, a donor-adopted school selects a fifth-grade student to receive a STEPS to CF award. Upon graduation from high school with certain stipulations, the recipient receives a scholarship. She said the program started in 2005 at three elementary schools and eight years later there are 82 scholarships in place at 46 schools in Citrus, Levy and Marion counties. The goal for us is to partner with donor organizations and individual donors to try and get two scholarships in every school in these three counties, Balfour said. We want to fund a fifth-grade boy and a fifth-grade girl. To get their scholarship, the recipients have to stay drug free, out of trouble and keep their grades up as part of motivational strategy. Donors may establish an initial scholarship for one student at a selected school for a $10,000 commitment. Donors are kept informed, said Mike Bays, who has supported the program. Most important, teachers and staff choose the student winners. Alliance co-chair Larry Rooks said it would be a good thing for the organization to look into and come up with a suggestion to members. Alliance Chairman Dale McClellan said it might fit into one of their fundraising efforts. He said the board and organization would figure out a way if they could move toward making a commitment in the future. Ag Alliance welcomes new 4-H director Group to consider future support for scholarship Breast cancer survivors comments soughtIn preparation for the Chronicles monthlong series of stories focusing on breast cancer throughout October, beginning with our annual Pink Paper on Tuesday, Oct. 1, we are looking for women (or men) who have had or are currently dealing with breast cancer. For one story in particular, were looking for comments from survivors answering the questions: What are/were some of the keys to your survival, whether physical, mental, emotional, spiritual, etc.? What keeps you/kept you going? If you would like to contribute your comments, contact Nancy Kennedy at nkennedy @chronicleonline.com or call 352-564-2927. PAGE 4 Birthday Backtracking will enable you to make greater accomplishments in the coming months. If you look to some old professional relationships, youll discover new opportunities. Continue to develop your many talents and youll find profitable ways to use them. Virgo (Aug. 23-Sept. 22) Discussions will lead to all sorts of interesting offers. Share your thoughts and look for someone who shares your sentiments. Libra (Sept. 23-Oct. 23) Dont let laziness or lack of insight cost you your reputation or your position. Nows the time for you to stick to the rules and the game plan. Dont make waves. Scorpio (Oct. 24-Nov. 22) You. You need to put more emphasis on fixing up your personal space or finding concrete ways to lower your costs. Capricorn (Dec. 22-Jan. 19) Take initiative and show courage when dealing with responsibilities.. Aries (March 21-April 19) Consistency will be an issue today. Unpredictable situations will put added pressure on you to make a decision. Taurus (April 20-May 20) If youre facing a challenge, seek out people whove been in similar situations. An unusual offer could result if you take the initiative. Gemini (May 21-June 20) Live aggressively and make needed changes in your life. Its time for you to step into the spotlight, and youll want to look your best. Cancer (June 21-July 22) Avoid disagreements. Consider the consequences that will result from the choice you make. Leo (July 23-Aug. 22) Experience will be key when it comes to overcoming a challenge or besting an adversary. Problems due to personal responsibilities can be expected. TodaysHOROSCOPES Today is Tuesday, Sept. 10, the 253rd day of 2013. There are 112 days left in the year. Todays Highlight in History: On Sept. 1962, the U.S. Supreme Court ordered the University of Mississippi to admit James Meredith, a black student. In 1963, twenty black students entered Alabama public schools following a standoff between federal authorities and Gov. George C. Wallace. Ten years ago: The first video image of Osama bin Laden in nearly two years was broadcast on Al-Jazeera TV. Five years ago: The worlds largest particle collider passed its first major tests by firing two beams of protons in opposite directions around a 17-mile ring under the Franco-Swiss border. One year ago: Chicago teachers walked off the job in what would become a seven-day strike, idling nearly 400,000 students in one of the nations third-largest school district. Todays Birthdays: World Golf Hall of Famer Arnold Palmer is 84. Singer Danny Hutton (Three Dog Night) is 71. Singer Jose Feliciano is 68. Political commentator Bill OReilly is 64. Thought for Today: History is the great dust-heap ... a pageant and not a philosophy. Augustine Birrell, English author and statesman (1850-1933).Today inHISTORY CITRUSCOUNTY(FL) CHRONICLE HI LO PR NA NA NA HI LO PR 92 69 0.00 HI LO PR 92 68 0.00 HI LO PR 91 68 0.00 HI LO PR 90 69 9.00 HI LO PR 89 66 0.00 YESTERDAYS WEATHER Partly cloudy with isolated showers and thunderstorms.THREE DAY OUTLOOK Partly cloudy with scattered showers and thunderstorms. Partly sunny with scattered showers and thunderstorms.High: 92 Low: 69 High: 92 Low: 72 High: 90 Low: 69TODAY & TOMORROW MORNING WEDNESDAY & THURSDAY MORNING THURSDAY & FRIDAY MORNING Exclusive daily forecast by: TEMPERATURE* Monday 91/61 Record 101/63 Normal 91/70 Mean temp. 76 Departure from mean -4 PRECIPITATION* Monday 0.00 in. Total for the month 4.00 in. Total for the year 45.01 in. Normal for the year 40.82 in.*As of 7 p.m. at InvernessUV INDEX: 9 0-2 minimal, 3-4 low, 5-6 moderate, 7-9 high, 10+ very high BAROMETRIC PRESSURE Monday at 3 p.m. 30.00 in. DEW POINT Monday at 3 p.m. 69 ............................7:41 P.M. SUNRISE TOMORROW .....................7:13 A.M. MOONRISE TODAY .........................12:09 P.M. MOONSET TODAY ..........................11:12 P.M. SEPT. 12SEPT. 19SEPT. 26OCT. 4. 89 76 pc Ft. Lauderdale 89 80 ts Fort Myers 92 75 ts Gainesville 89 69 s Homestead 87 76 ts Jacksonville 85 71 s Key West 89 80 ts Lakeland 91 73 pc Melbourne 88 78 pc City H L Fcast Miami 89 79 ts Ocala 89 70 s Orlando 92 73 pc Pensacola 90 73 pc Sarasota 92 74 ts Tallahassee 92 70 s Tampa 92 76 ts Vero Beach 89 76 ts W. Palm Bch. 89 79 ts FLORIDA TEMPERATURESEast winds from 10 to 15 knots. Seas 1 to 2 feet. Bay and inland waters will have a light to moderate chop. Mostly sunny skies and warm today. Gulf water temperature87 LAKE LEVELSLocation Sun. Mon. Full Withlacoochee at Holder 0.30 0.31 35.52 Tsala Apopka-Hernando 38.15 38.13 39.25 Tsala Apopka-Inverness 39.47 39.48 40.60 Tsala Apopka-Floral City 40.49 40.50 L L L L L L 97/77 94/71 71/55 82/69 81/66 72/62 71/59 95/75 83/55 83/62 84/73 94/72 88/69 89/79 93/75 90/73 THE NATION Albany 70 41 c 84 70 Albuquerque 86 65 ts 76 62 Asheville 84 61 ts 83 61 Atlanta 90 73 pc 88 69 Atlantic City 75 51 pc 79 73 Austin 90 69 .14 pc 92 73 Baltimore 78 61 pc 90 72 Billings 77 57 s 83 55 Birmingham 92 70 .02 pc 91 71 Boise 85 54 s 82 55 Boston 71 52 pc 80 70 Buffalo 73 48 pc 79 72 Burlington, VT 69 41 ts 82 70 Charleston, SC 89 71 s 88 70 Charleston, WV 89 66 pc 89 70 Charlotte 90 65 pc 89 65 Chicago 94 68 s 94 71 Cincinnati 90 66 pc 92 72 Cleveland 81 54 pc 91 74 Columbia, SC 93 67 s 91 68 Columbus, OH 91 65 pc 92 72 Concord, N.H. 71 35 c 83 65 Dallas 96 73 pc 97 77 Denver 84 61 ts 71 55 Des Moines 101 73 pc 96 69 Detroit 74 56 .11 s 94 72 El Paso 89 70 ts 82 69 Evansville, IN 93 69 pc 94 72 Harrisburg 72 50 pc 88 69 Hartford 72 45 pc 84 67 Houston 92 74 pc 93 75 Indianapolis 93 68 pc 94 73 Jackson 97 69 pc 94 72 Las Vegas 93 74 pc 89 75 Little Rock 100 73 s 98 73 Los Angeles 69 63 s 72 62 Louisville 92 71 pc 94 75 Memphis 94 77 pc 95 75 Milwaukee 83 69 s 92 69 Minneapolis 94 70 pc 81 66 Mobile 92 71 pc 91 71 Montgomery 94 70 pc 92 70 Nashville 94 72 pc 93 71 New Orleans 91 72 pc 91 76 New York City 73 57 pc 84 73 Norfolk 83 72 pc 90 70 Oklahoma City 94 69 s 93 69 Omaha 99 75 pc 90 65 Palm Springs 103 81 pc 99 79 Philadelphia 76 57 pc 87 72 Phoenix 84 73 .50 ts 89 77 Pittsburgh 82 57 .44 pc 89 70 Portland, ME 69 40 ts 77 66 Portland, Ore 83 63 s 91 64 Providence, R.I. 68 48 pc 80 67 Raleigh 87 64 pc 89 67 Rapid City 78 62 .01 pc 78 58 Reno 88 55 s 90 57 Rochester, NY 77 45 ts 92 73 Sacramento 101 59 s 96 63 St. Louis 99 76 s 97 73 St. Ste. Marie 62 52 .05 c 76 58 Salt Lake City 83 63 pc 81 65 San Antonio 97 73 ts 91 74 San Diego 75 68 pc 75 67 San Francisco 76 55 s 74 60 Savannah 90 72 s 88 71 Seattle 79 57 s 83 62 Spokane 82 55 s 88 57 Syracuse 75 44 ts 90 72 Topeka 98 72 s 95 69 Washington 81 65 pc 90 73YESTERDAYS NATIONAL HIGH & LOW HIGH 107 Red Bluff, Calif. LOW 28 Saranac Lake, N.Y. TUESDAY CITY H/L/SKY Acapulco 88/76/ts Amsterdam 65/52/r Athens 86/70/s Beijing 87/68/pc Berlin 61/47/sh Bermuda 83/78/sh Cairo 94/68/s Calgary 75/50/s Havana 88/74/ts Hong Kong 86/77/sh Jerusalem 86/69/s Lisbon 84/61/s London 63/56/pc Madrid 86/62/pc Mexico City 70/56/ts Montreal 73/72/sh Moscow 65/45/pc Paris 66/51/pc Rio 78/65/pc Rome 80/73/r Sydney 82/62/pc Tokyo 79/69/pc Toronto 91/73/pc Warsaw 69/54:53 a/4:53 a 10:10 p/5:38 p 9:36 a/5:34 a 11:21 p/6:37 p Crystal River** 7:14 a/2:15 a 8:31 p/3:00 p 7:57 a/2:56 a 9:42 p/3:59 p Withlacoochee* 5:01 a/12:03 a 6:18 p/12:48 p 5:44 a/12:44 a 7:29 p/1:47 p Homosassa*** 8:03 a/3:52 a 9:20 p/4:37 p 8:46 a/4:33 a 10:31 p/5:36) 9/10 TUESDAY 10:13 3:59 10:41 4:27 9/11 WEDNESDAY 11:13 4:59 11:42 5:27 FORECAST FOR 3:00 P.M. TUESDAY HI LO PR 91 67, chenopods, grasses Todays count: 7.4/12 Wednesdays count: 8.0 Thursdays count: 7.6 ENTERTAINMENT Elton John to perform Liberace LOS ANGELES Elton John is about to do something hes never done: Perform live at the Emmy Awards. The television academy announced Monday that the 66year-old musician will make his Emmy debut with a tribute to Liberace whose life story is told in HBOs Behind the Candelabra. The movie earned 15 Emmy nominations, including leadactor bids for Michael Douglas and Matt Damon, who play Liberace and his lover Scott Thorson. Douglas and Damon are also set to serve as presenters at the Sept. 22 Emmy ceremony. Johns first studio album in seven years, The Diving Board, is set for release on Sept. 24. Neil Patrick Harris is hosting the 65th Primetime Emmy Awards at the Nokia Theatre, broadcast live on CBS.Lovato signs multi-book dealNEW YORK Demi Lovatos next stage will be on the page. The singer and actress has agreed to a multi-book deal with Feiwel and Friends. The publisher, an imprint of Macmillan, announced the deal Monday. The first book features tweets she had written about her life. Its.Miley Cyrus to host, perform on SNLNEW latenight.Stewart tweets news of nupt."Cher among The Voice advisersLOS ANGELES NBC said. From wire reports Associated PressElton John will perform a Liberace tribute at the Emmy Awards. A4TUESDAY, SEPTEMBER10, 000FUY8 in Todays Citrus County Chronicle LEGAL NOTICES Citrus County Hospital Board . . . . . . . . B2 Fictitious Name Notices . . . . . . . . . . . . C12 Meeting Notices . . . . . . . . . . . . . . . . . . C12 Miscellaneous Notices . . . . . . . . . . . . . C12 Notice to Creditors/Administration . . . C12 PAGE 5 teen told investigators that each time he tried to make it to the pool steps, Shotwell would push him back into the water. According to the report, Shotwell then grabbed the boy, pulled him out of the pool toward an adjacent garage where Shotwell was presumably living. Once in the garage, Shotwell reportedly ordered the boy to remove his swim trunks. While still holding the teens hand, Shotwell proceeded to turn on a videotape player, which began showing pornographic images of adult men chasing each other naked and engaging in sexual activity. When the teen refused to take off his shorts, Shotwell reportedly yanked them down and pushed the teen onto a bed where non-consensual sex acts followed. According to the report, Shotwell is said to have then abruptly stopped everything and told the teen to leave and never to tell anyone. The teen, however, immediately ran to a friends house, advised him of the allegations, and was told to go home and contact law enforcement. The teen reportedly go hold of his parents, who were at a basketball game. The parents came home and called authorities. Shotwell was said to be inebriated at the time of the alleged crimes. When he was contacted, Shotwell reportedly admitted to the crimes. The teen reportedly told investigators he never interacted with Shotwell before, and had only seen him while riding his bicycle with friends when Shotwell was reportedly weed-whacking his yard in the buff. Shotwell was arrested and transported to the Citrus County Detention Facility.Contact Chronicle reporter A.B. Sidibe at 352564-2925 or asidibe@ chronicleonline.com. Domestic abuse arrest Erik Karwoski, 28, of Inverness, at 12:42 a.m. Sept. 9 on a misdemeanor charge of domestic battery. No bond. Layne Lacasse 23, of Inverness, at 3:23 a.m. Sept. 8 on a misdemeanor charge of domestic battery. No bond. Danny Suggs, 60, of Lake Panasoffkee, at 5:33 p.m. Sept. 6 on a misdemeanor charge of domestic battery. No bond.Other arrests Frank Grizzelli 46, of South Bob White Drive, Homosassa, at 8:10 p.m. Sept. 8 on two misdemeanor charges of assaulting a law enforcement officer and one charge of resisting arrest without violence. According to his arrest affidavit, Grizzelli is accused of being a physical threat to law enforcement and of spitting on both a registered nurse who was trying to help him and a deputy. After being evaluated at Seven Rivers hospital, he was taken to the Citrus County Detention Facility. Bond $1,000. Brodrick Houston, 25, of Inverness, at 1:47 p.m. Sept. 8 on felony charges of aggravated battery, intentionally causing great bodily harm, and criminal mischief ($1,000 or more). Bond $7,000. Jerome Langlois, 54, of Floral City, at 10:10 p.m. Sept. 7 on a felony charge of battery on a person 65 years of age or older. Bond denied. Shamra Rider, 26, of South Rainbow Point, Homosassa, at 3:18 p.m. Sept. 7 on a misdemeanor charge of retail petit theft. According to her arrest affidavit, Rider is accused of shoplifting underwear and socks, valued at $41.74, from the Lecanto Walmart. Bond $250. Andria Hogue, 28, North Davis Street, Beverly Hills, at 11:58 a.m. Sept. 7 on a misdemeanor charge of battery. According to her arrest affidavit, Hogue is accused of striking a neighbor in the face and back over a personal dispute. Bond $500. Mathew Hoblit 29, Ponce de Leon Boulevard, Brooksville, at 8:56 p.m. Sept. 6 on a felony charge of violation of probation for his Sept. 3 arrest for possession of a controlled substance. Bond was denied. Citrus County Sheriffs OfficeBurglaries A vehicle burglary was reported at 7:39 a.m. Saturday, Sept. 7, in the 700 block of S.E. 8th Ave., Crystal River. A commercial burglary was reported at 10:19 a.m. Sept. 7 in the 1200 block of S. Suncoast Blvd., Homosassa. A vehicle burglary was reported at 4 p.m. Sept. 7 in the 3100 block of Crystal River High Drive, Crystal River. A vehicle burglary was reported at 4:09 p.m. Sept. 7 in the 9300 block of W. Fort Island Trail, Crystal River.Thefts A petit theft was reported at 10:27 a.m. Friday, Sept. 6, in the area of S. Pleasant Grove Road and E. Bow-N-Arrow Loop, Inverness. A petit theft was reported at 11:29 a.m. Saturday, Sept. 7, in the 6100 block of E. Wingate St., Inverness. A grand theft was reported at 1:26 p.m. Sept. 7 in the 2300 block of N. Brentwood Circle, Lecanto. A petit theft was reported at 1:41 p.m. Sept. 7 in the 500 block of W. Highland Blvd., Inverness. A petit theft was reported at 2:35 p.m. Sept. 7 in the 1900 block of N. Lecanto Highway, Lecanto. A grand theft was reported at 4:10 p.m. Sept. 7 in the 900 block of W. Anderson Lane, Dunnellon. A petit theft was reported at 11:50 a.m. Sunday, Sept. 8, in the 5700 block of S. Live Oak Drive, Floral City. A grand theft was reported at 1:10 p.m. Sept. 8 in the 6600 block of N. Bernzott Point, Dunnellon.Vandalisms A vandalism was reported at 1:55 a.m. Friday, Sept. 6, in the 500 block of N. Independence Highway, Inverness. A vandalism was reported at 1:35 a.m. Sunday, Sept. 8, in the 2100 block of N. Ladonia Terrace, Crystal River. LOCAL/STATECITRUSCOUNTY(FL) CHRONICLETUESDAY, SEPTEMBER10, 2013 A5 Includes Set-Up, Hurricane Anchoring, 2 Sets of Steps, Skirting. A/C with Heat Installed. PrestigeHomes.net Offers Good Through Oct. 6th, 2013 2 TO CHOOSE FROM! TRACY 4 $ 82,995 or $ 92,995 64X42 4 F&R, 2 BATH 60G4D(1), 1941 SQ. FT., CATHEDRAL CEILING THROUGHOUT 56X28 4 F&R, 2 BATH 52E4D(1), 1378 SQ. FT. CATHEDRAL CEILING THROUGHOUT SCOTT $ 59,995 4865 Gulf to Lake Hwy., Lecanto 352.746.5483 000FVIH Assisted Living Facility License # 12256 YOU ARE NOT ALONE 22% of seniors over the age of 70 suffer from memory loss. WE ARE HERE TO HELP. Experience the Best . Call On the Expert726-4327 Since 1983 211 S. Apopka Ave. Inverness Hearing Centers 000FYTWDenny DinglerAudioprosthologist M. Div., HAS Our Audioprothologist, Denny Dingler, is known nationally as an expert speaker, teacher, and author on hearing issues. He has been providing expert hearing care for Citrus County now for over 30 years, and has a hearing loss himself, so he understands what you are going through. At Professional Hearing Centers, we are helping you Hear Better Now Guaranteed, to get you back in the race! We exclusively offer Free Batteries 4 Life, as well as a 4 Year warranty, all for a small monthly investment. And your 100% satisfaction is guaranteed, or it wont cost you a dime! So call our expert today at 726-4327, to hear better now, and to experience the very BEST in helping you enjoy life more, through better hearing! Mon-Fri 8:30-6 Sat 8:30-1 PHARMACY 000FZM2 Covered By Medicare FLU SHOTS 8:30 AM 6:00 PM Walk-Ins Welcome! For the RECORD ON THE NET For the Record reports are archived online at www. chronicleonline.com. ARRESTContinued from Page A1 outside the home she was at with her father. She said she was scared because she wasnt sure what Zimmerman was capable of doing. But hours later she changed her story and said she never saw a firearm, said Lake Mary Police Chief Steve Bracknell. For the time being, domestic violence cant be invoked because she has changed her story and said she didnt. Hes threatening all of us with a firearm ... He punched my dad in the nose, Shellie Zimmerman said on the call. I dont know what hes capable of. Im really scared. She also said he grabbed an iPad from her hand and smashed it. Zimmermans attorney, Mark OMara, said his client never threatened his estranged wife and her father with a gun and never punched his fatherin-law. Shellie Zimmerman had collected most of her belongings Saturday from the house where they both had been staying until she moved out. But she had returned unexpectedly Monday to gather the remaining items. Emotions got out of control, but neither side is filing charges against the other, OMara said. I know the 911 tape suggests that Shellie was saying something but I think that was heightened emotions, OMaraondays. Were trying to see if thats true or not. In her divorce petition, Shellie Zimmerman asked that her husband pay for a permanent life insurance policy with her named as the beneficiary, according to a divorce petition made public last week. In an interview with ABCsmans brother Robert Zimmerman Jr., tweeted after the news got out of the dispute at the home that weve learned from GZ case not to jump to conclusions, to wait for facts, & to avoid speculation. News is a business not your friend. Last month, Shellie Zimmerman, 26, pleaded guilty to a misdemeanor perjury charge for lying about the couples finances during a bail hearing following her husbands arrest after Martins years probation and 100 hours of community service. Her husband did not attend the sentencing hearing in the Sanford courtroom. DISPUTEContinued from Page A1 George Zimmerman PAGE 6 Therese Bernard, 89BEVERLY HILLSTherese L. (Carbonneau) Bernard, 89, of Beverly Hills, Fla., passed away Saturday, Sept.7, 2013, under the care of Hospice of Citrus County. She was preceded in death by her loving husband of 64 years, Laureat J. Bernard. Born Monday, March31, 1924, to the late Henri and Anna (Bureau) Carbonneau, she grew up in Lewiston, Maine. She lived with her husband and children in Framingham, Mass., for more than 25 years before moving to Beverly Hills in 1986. Therese was a loving wife, mother and grandmother and a devout Catholic. She was a member of Our Lady of Grace Catholic Church in Beverly Hills. Therese was a proud homemaker, accomplished cook and avid gardener. She enjoyed playing the piano and singing. Therese is survived by her four children, Phyllis Bernard of Homosassa, Carole Kuczmiec and her husband, Anthony of Framingham, Mass., Dr. David Bernard and his partner, David Wood of Cooperstown, N.Y., Richard Bernard of State College, Pa.; her four grandchildren, Amanda and Sarah Kuczmiec, Colt and Alexander BernardWood; two sisters, Lucille Ficaro and husband Sal of Avon, Conn., Sister Carmen Carbonneau of the Daughters of the Holy Spirit in Putnam, Conn.; one brother, H. Paul Carbonneau and his wife Lauretta of Lewiston, Maine; many nieces; and nephews. She was predeceased by five brothers, Lucien, Roland, Marcel, Maurice and Raymond Carbonneau; and three sisters, Lorette and Claudette Carbonneau and Rita Maheu. Visitation will take place 5 to 7p.m. Thursday, Sept.12, 2013, at Fero Funeral Home. Her funeral Mass will be 9a.m. Friday, Sept.13, 2013, at Our Lady of Grace Catholic Church. Burial will follow at Fero Memorial Gardens in Beverly Hills. In lieu of flowers, donations may be made in her memory to Hospice of Citrus County Inc., Hospice of the Nature Coast, P.O. Box 641270, Beverly Hills, FL 34464. Arrangements entrusted to Fero Funeral Home,. com. Alfred Fred Bradley, 64LECANTOAlfred S. Fred Bradley, age 64, of Lecanto passed away on Friday, September 6, 2013 surrounded by his loving family and pastor, while under the care of HPH Hospice. He was born May 26, 1949 in Brooklyn, NY to Alfred and Lorraine Bradley and grew up in Jackson Heights, NY. He later moved to Mastic Beach, LI, NY before moving to Florida 15 years ago. He was an Army Veteran serving in the Vietnam War from 1967 to 1968 with the 101st Airborne Division, A101 Aviation Comanchero Helicopter Unit. Fred was a retired diesel mechanic with the N.Y. Times. He was an active member of St. Timothys Lutheran Church of Crystal River and M.O.S.T. (Men of St. Timothys). Fred also was an avid fisherman and absolutely loved the N.Y. Yankees. He was preceded in death by his beloved wife, Camille, his father, Alfred Bradley, Sr., his step-father, Joseph Lech, Sr. and grandson, Anthony Rippolone. Fred is survived by his daughters, Patricia (Edward) Bradley of NY, Wendy (Jason) Ellen of Ormond Beach and son, Raymond (Patricia) Ducoing of NY, his mother, Lorraine Lech of Lecanto, sisters, Andrea (Larry) Mitchell of Crystal River and Suzanne (Mario) Orsogna of NJ, step-brothers, Joseph Lech of NY and Douglas Lech of CA, grandchildren, Dominick, Daniel, Gina, Raymond, Joseph, Ashley, Michael, Jessica, Jacob, Thomas and Ryan, greatgrandchildren, Isabella, Damon and Nicky, stepmother Joan Bradley of NY and numerous nieces, nephews and cousins. A Memorial Service for Fred will be held 1:00pm, Wednesday, September 11, 2013 at St. Timothys Lutheran Church, 1070 N. Suncoast Blvd. Crystal River with Pastor David Bradford officiating. A Full Military Service will be held later at Calverton National Cemetery, LI, NY. The family requests expressions of sympathy take the form of memorial donations to HPH Hospice, 3545 N. Lecanto Hwy. Beverly Hills, FL 34465 or the American Cancer Society, Osprey Cove Office Park, 21756 SR 54, Ste 101, Lutz, FL 33549. James Peacock, 79HERNANDOJames Kenneth Peacock,79, Hernando, Fla., died Sept. 8, 2013, under the loving care of his daughter, her family and HPH Hospice. Jim was born Nov.24, 1933, in St. Petersburg to the late Ira and Lois (Girard) Peacock. Jim served our country in the U.S. Navy during the Korean conflict. He was employed by Florida Power for more than 37 years as a working foreman. Jim was an avid outdoorsman, and enjoyed hunting and fishing. He was a member of VFW Post 4252 in Hernando. Left to cherish his memory is his daughter and her family, Stacy, Anthony, Victoria Marie and Kaitlyn Ann Venero, Inverness; sisters, Betty (Bernie Sr.) Gumz, St. Petersburg, Maxine (Larry) Gilmore, Frankfurt, Ohio, and Reba (Larry) DeLauder, St. Petersburg; brother-in-law Jess Knight and family; and sister-in-law Pat Peacock and family. He was preceded in death by his wife, Shirley, in 2012; and a brother, John Albert, in 1992. A graveside military committal service will be at 11a.m. Friday, Sept.20, 2013, at the Florida National Cemetery. Chas. E. Davis Funeral Home with Crematory is assisting the family with arrangements. In lieu of flowers, memorial donations may be made in Jims name to HPH Hospice Foundation, Citrus Office, 3545 N. Lecanto Highway, Beverly Hills, FL 34465.Sign the guest book at. Dorothy Kenyon, 92FORT MYERSDorothy Kenyon,92, Fort Myers, Fla., formerly of Inverness, Fla., died Sept.8, 2013. A native of Clifton, N.J., she was born to the late Peter and Jennie (Rozendall) Vander Platt and moved to Florida in 1976 from Hawthorne, N.J. She retired from Citrus Memorial Hospital (Admitting Clerk) and was a member of VFW Ladies Auxillary and Order of Eastern Star. Her husband, Charles Kenyon, preceded her in death Dec 23, 2011. She is survived by two sons, Robert C. Kenyon and wife, Chris, of Ringwood, N.J., and Thomas Kenyon and wife, Sandy, of Lavallette, N.J.; five grandchildren; and five great-grandchildren. Private burial in Florida National Cemetery, Bushnell, Chas. E. Davis Funeral Home With Crematory, Inverness.Sign the guest book at Lehman, 74NEW BERLIN, ILLKenneth E. Lehman, 74, of New Berlin, Ill., died Sunday, Sept. 8, 2013, at St. Johns Hospice. Cremation was accorded by Butler Cremation Tribute Center and private family ceremonies will be held. Lehman is being served by McCullough-Delaney & Butler Funeral Home, 714 E. Gibson St., New Berlin. James Jim Wilson Jr., 86LECANTOJames Jim Wilson Jr., 86, of Lecanto, Fla., passed away at home surrounded by members of his family Sept.2, 2013. He was born Oct.2, 1926, in Youngstown, Ohio. James graduated from Shepherd University in West Virginia. He and his wife, Frances, are members of the Joseph P. McMurran Society Shepherd University Foundation. He served in the U.S. Navy during World War II on a USS LSM. He was a member of the American Legion Post 237 in Lecanto. James worked for Martin Marietta and retired from Capital Cement Corporation. He was a lifelong golf enthusiast and personal friend of Gene Sarazen. He had eight holes in one. He was preceded in death by his loving wife of 64 years, Frances Flagg Wilson. James is survived by his son, J. Tyler Wilson; and daughters, Mary Jane Messick and Dorothy Gregg; eight grandchildren; and six great-grandchildren. Sign the guest book at Crispin, 63AUTHOR NEW YORK A.C. Crispin, a science fiction author who wrote popular tie-in novels to Star Trek and Star Wars and helped run the online watchdog Writer Beware that alerted authors to literary scams, died Friday. Crispin died of cancer at age 63, according to an announcement on the website of the publisher Tor Books, and on the site for Writer Beware. Starting in 1983, she wrote more than 20 novels, many of them based on movies and TV series, including Star Trek, Star Wars and Pirates of the Caribbean.Cal Worthington, 92CAR DEALER LOS, said Worthington died Sunday after watching football with family at his Big W Ranch in Orland, Calif., north of Sacramento. No cause of death was released. The Oklahoma native founded his first dealership in the late 1940s in Southern California. He is survived by six children and nine grandchildren.A6TUESDAY, SEPTEMBER10, 2013CITRUSCOUNTY(FL) CHRONICLE 000FSK2 Allen Ridge Professional Village 525 North Dacie Point, Lecanto, Florida 34461 Participating with: Medicare, BCBS, United Healthcare, Cigna, Humana, Aetna. Total Skin Care SUNCOAST DERMATOLOGY AND SKIN SURGERY CENTER 352-746-2200 352-873-1500 Board Certified American Board of Dermatology; American Society for Dermatology Surgery, Member American Association of Facial Plastic and Reconstructive Surgery, Fellow American Society f or MOHS Surgery Skin Cancer Diagnosis & Treatment Cosmetic/Plastic Surgery Skin Repairs MOHS Micrographic Surgery Age Management Medicine Growth Removal Chemical Peeling Esthetics Laser Surgery Botox Therapy Laser Hair Removal Photofacial Rejuvenation Juvederm Obagi We offer a safe medical approach to cosmetic issues! 000FZSW JUVDERM WITH FREE BOTOX! During the month of September, we are offering a skin-tastic special. Buy 1 syringe of JUVDERM and receive 20 units of Botox (a $200 value) FREE 000FXP4FYSC Funeral Home With Crematory Chas. E. Davis Chas. E. Davis 726-8323 ROBERT HORTON, JR. Memorial Service: Sat. 11:00 AM Cornerstone Baptist Church BERWIN STORER Graveside Service: Thurs. 2:30 PM Florida National Cemetery DOROTHY KENYON Private Burial: Florida National Cemetery JAMES PEACOCK Pending / Closing time for placing ad is 4 business days prior to run date. There are advanced deadlines for holidays. To Place Your In Memory ad, Candy Phillips 563-3206 [email protected] 000FX8G OBITUARIES Non-local funeral homes and those without accounts are required to pay in advance by credit card, and the cost is a $25 base fee, then $10 per column inch. Small photos of the deceaseds face can be included for an additional charge. Larger photos, spanning the entire column will incur a size-based fee. Additional days of publication or reprints due to errors in submitted material are charged at the same rates. FREE OBITUARIES Free obituaries, run one day, can include: full name of deceased; age; hometown/state; date of death; place of death; date, time and place of visitation and funeral services. DEADLINES Deadline is 3 p.m. for obituaries to appear in the next days edition. James Peacock Alfred Bradley Therese Bernard Obituaries Deaths ELSEWHERE SO YOU KNOW The Citrus County Chronicles policy permits free and paid obituaries. Email obits@chronicle online. com or phone 352-563-5660 for details and pricing options. From wire reports PAGE 7 AFL-CIO hopes to expand membership beyond unionsThe AFL-CIO plans to open its membership to more non-union groups in an effort to restore the influence of organized labor as traditional union rolls continue to decline. A resolution approved Monday at the federations quadrennial convention in Los Angeles would expand membership for workers who arent covered by a collective bargaining agreement. AFL-CIO president Richard Trumka said.Facebook, Yahoo want to disclose FISA orders dataW said they want to correct false claims and reports about what they provide to the government.US consumer borrowing rises $10.4 billion in July.TUESDAY, SEPTEMBER10, 2013 A7CITRUSCOUNTY(FL) CHRONICLEBUSINESS Money&MarketsAclick of the wrist gets you more at 1,500 1,550 1,600 1,650 1,700 1,750 MS AMJJA 1,600 1,640 1,680 S&P 500Close: 1,671.71 Change: 16.54 (1.0%) 10 DAYS 14,000 14,400 14,800 15,200 15,600 16,000 MS AMJJA 14,760 14,940 15,120 Dow Jones industrialsClose: 15,063.12 Change: 140.62 (0.9%) 10 DAYSAdvanced2463 Declined617 New Highs148 New Lows25 Vol. (in mil.)3,045 Pvs. Volume3,078 1,611 1,687 1925 618 150 16 NYSE NASD DOW 15088.4114927.1915063.12+140.62+0.94%+14.95% DOW Trans.6463.956380.926460.43+89.32+1.40%+21.74% DOW Util.475.98472.23475.61+2.24+0.47%+4.97% NYSE Comp.9540.339459.369539.93+100.24+1.06%+12.99% NASDAQ3708.423675.123706.18+46.17+1.26%+22.74% S&P5001672.401656.851671.71+16.54+1.00%+17.22% S&P4001217.331200.411217.20+18.51+1.54%+19.28% Wilshire 500017795.9317598.8917794.62+195.73+1.11%+18.67% Russell 20001046.081032.311046.08+16.53+1.61%+23.16% HIGH LOW CLOSE CHG. %CHG. YTD StocksRecap AK Steel Hold AKS2.7636.73 3.68+.22 +6.4sts-20.0-35.6dd... AT&T Inc T32.71239.00 33.63+.22 +0.7stt-0.2-6.0251.80 Ametek Inc AME32.67848.01 43.90-.08 -0.2tts+16.8+25.5220.24 Anheuser-Busch InBev BUD81.607101.86 95.66-.11 -0.1tts+9.4+11.62.21e Bank of America BAC8.53015.03 14.48+.12 +0.8sss+24.7+72.5260.04 Capital City Bank CCBG9.04713.08 11.75-.03 -0.3tts+3.3+19.042... CenturyLink Inc CTL31.85143.08 32.02+.12 +0.4stt-18.1-18.6192.16 Citigroup C31.32953.56 50.09+.87 +1.8sts+26.6+58.3130.04 Commnwlth REIT CWH13.46926.38 23.89+.26 +1.1sts+50.8+67.4851.00 Disney DIS46.53867.89 61.59+.20 +0.3stt+23.7+19.8180.75f Duke Energy DUK59.63475.46 65.57+.12 +0.2stt+2.8+5.4203.12f EPR Properties EPR42.44461.18 49.24+.93 +1.9stt+6.8+9.9213.16 Exxon Mobil Corp XOM84.70495.49 88.04+.79 +0.9stt+1.7+0.792.52 Ford Motor F9.71017.68 17.31+.31 +1.8sss+33.7+75.0120.40 Gen Electric GE19.87724.95 23.39+.23 +1.0sts+11.4+12.2170.76 Home Depot HD56.43781.56 73.58+.88 +1.2stt+19.0+28.6221.56 Intel Corp INTC19.23625.98 22.91+.24 +1.1sst+11.1-6.1120.90 IBM IBM181.102215.90 184.98+1.95 +1.1stt-3.4-6.3133.80 LKQ Corporation LKQ17.16031.07 30.51+.82 +2.8sts+44.6+52.433... Lowes Cos LOW28.09047.51 46.63+1.03 +2.3sss+31.3+63.0240.72 McDonalds Corp MCD83.317103.70 96.45+.19 +0.2stt+9.3+9.6183.08 Microsoft Corp MSFT26.26636.43 31.66+.50 +1.6stt+18.5+2.3120.92 Motorola Solutions MSI48.67664.72 57.59+1.12 +2.0sst+3.4+17.1161.24f NextEra Energy NEE66.05788.39 80.23+.22 +0.3stt+16.0+22.5202.64 Penney JC Co Inc JCP12.12232.55 14.47+.20 +1.4sst-26.6-49.0dd... Piedmont Office RT PDM14.62521.09 17.54+.19 +1.1stt-2.8+5.7360.80 Regions Fncl RF6.19810.52 9.54-.01 -0.1tts+33.8+33.1120.12 Sears Holdings Corp SHLD38.40568.77 53.07+6.02 +12.8sss+28.3-11.7dd... Smucker, JM SJM81.609114.72 108.14+2.15 +2.0sts+25.4+24.8212.32f Texas Instru TXN26.94039.99 39.75+.57 +1.5sss+28.7+35.9241.12 Time Warner TWX42.61966.01 62.24+.79 +1.3sts+30.1+44.8171.15 UniFirst Corp UNF65.219104.38 97.60+1.58 +1.6sts+33.1+46.0180.15 Verizon Comm VZ40.51454.31 45.91-.43 -0.9ttt+6.1+9.6942.12f Vodafone Group VOD24.42033.00 33.34+.45 +1.4sss+32.4+20.81.57e WalMart Strs WMT67.37579.96 73.51+.92 +1.3stt+7.7-0.6141.88 Walgreen Co WAG31.88051.62 50.22+.76 +1.5sss+35.7+43.8. On the eve of an event to introduce new products, shares in the technology giant jumped above $500 once again. Koch Industries plans to buy the electronic components and cables maker for approximately $6.86 billion, $38.50 per share. Jefferies & Co. said the carmaker is well positioned to meet strong demand and expects Chinese production to double. The fertilizer company rose after Russian President Putin said a resolution must be found after the break-up of a potash cartel. Citigroup upgraded the homebuilder after a 30 percent pullback in the sector since shares hit multiyear highs in May. Major stock indexes finished higher on Monday, with the sale of luxury retailer Neiman Marcus and electronics component maker Molex suggesting improving confidence in the economy. Hovnanian Enterprises latest quarterly report helped lift homebuilding stocks. 25 30 35 $40 JS JA MDCMDC Close: $29.37 1.72 or 6.2% $27.00$42.41 Vol.: Mkt. Cap: 1.9m (2.0x avg.) $1.44 b 52-week range PE: Yield: 4.9 13.6% 40 50 $60 JS JA MosaicMOS Close: $44.31 2.15 or 5.1% $39.75$64.65 Vol.: Mkt. Cap: 10.2m (1.5x avg.) $13.17 b 52-week range PE: Yield: 10.0 2.3% 14 16 $18 JS JA FordF Close: $17.31 0.31 or 1.8% $9.71$17.68 Vol.: Mkt. Cap: 38.3m (1.0x avg.) $66.97 b 52-week range PE: Yield: 11.5 2.3% 25 30 35 $40 JS JA MolexMOLX Close: $38.63 9.29 or 31.7% $24.99$38.74 Vol.: Mkt. Cap: 22.0m (23.9x avg.) $3.69 b 52-week range PE: Yield: 28.4 2.5% 300 400 500 $600 JS JA AppleAAPL Close: $506.17 7.95 or 1.6% $ 385.10 $705.07 Vol.: Mkt. Cap: 12.1m (1.0x avg.) $459.85 b 52-week range PE: Yield: 12.7 2.4% The yield on the 10-year Treasury note slipped to 2.91 percent on Monday. Yields affect interest rates on consumer loans.NET 1YR TREASURIES YEST PVS CHG AGO 3.25 3.25 3.25 .13 .13 .13 PRIME RATE FED FUNDS 3-month T-bill 0.01-0.01.10 6-month T-bill.030.05-0.02.13 52-wk T-bill.100.12-0.02.16 2-year T-note.450.46-0.01.25 5-year T-note1.721.76-0.04.65 10-year T-note2.912.94-0.031.67 30-year T-bond3.853.87-0.022.83 NET 1YR BONDS YEST PVS CHG AGO Barclays LongT-BdIdx3.663.69-0.032.51 Bond Buyer Muni Idx5.315.32-0.014.23 Barclays USAggregate2.632.68-0.051.82 Barclays US High Yield6.386.38...6.61 Moodys AAACorp Idx4.724.72...3.46 Barclays CompT-BdIdx1.821.87-0.05.94 Barclays US Corp3.553.59-0.042.96 YEST 6 MO AGO 1 YR AGO Commodities Crude oil fell from a two-year high Monday as the prospects of a U.S. attack against Syria remained unclear. Prices for aluminum and copper rose. Soybeans and wheat also advanced.Crude Oil (bbl)109.52110.53-0.91+19.3 Ethanol (gal)1.881.88-0.11-14.2 Heating Oil (gal)3.123.16-1.44+2.4 Natural Gas (mm btu)3.613.53+2.12+7.6 Unleaded Gas (gal)2.802.85-1.80-0.3 FUELS CLOSEPVS. %CHG%YTD Gold (oz) 1386.801386.70+0.01-17.2 Silver (oz) 23.6723.84-0.73-21.6 Platinum (oz)1483.001495.70-0.85-3.6 Copper (lb) 3.283.26+0.54-10.0 Palladium (oz)681.40695.45-2.02-3.0 METALS CLOSEPVS. %CHG%YTD Cattle (lb) 1.251.26-0.25-3.5 Coffee (lb) 1.141.14-0.09-20.8 Corn (bu) 4.774.92-2.90-31.7 Cotton (lb) 0.840.93+0.50+11.4 Lumber (1,000 bd ft)328.70330.40-0.51-12.1 Orange Juice (lb)1.371.33+2.97+18.1 Soybeans (bu)14.0414.37-2.28-1.0 Wheat (bu) 6.296.35-0.98-19.2 AGRICULTURE CLOSE PVS. %CHG%YTD American Funds BalAm 22.54+.18 +11.4+13.2+13.1+8.3 CapIncBuAm 55.81+.39 +7.6+9.3+9.7+6.2 CpWldGrIAm 41.62+.42 +13.5+18.6+11.2+6.5 EurPacGrAm 44.69+.52 +8.4+15.7+7.6+5.6 FnInvAm 47.51+.48 +17.2+19.9+15.4+8.5 GrthAmAm 41.21+.44 +20.0+23.4+16.4+8.7 IncAmerAm 19.44+.14 +9.5+11.6+11.9+8.1 InvCoAmAm 35.53+.29 +18.8+19.8+15.2+8.1 NewPerspAm 35.57+.40 +13.8+18.4+13.3+8.8 WAMutInvAm 36.54+.29 +18.3+18.8+16.9+8.2 Dodge & Cox Income 13.43+.02 -1.7-0.1+4.1+6.4 IntlStk 39.50+.45 +14.0+23.9+9.7+5.6 Stock 149.96+1.66 +24.1+27.5+18.8+8.5 Fidelity Contra 91.49+.88 +19.0+17.8+16.7+10.1 GrowCo 116.64+1.84 +25.1+21.1+20.7+13.0 LowPriStk d 45.86+.48 +21.9+25.6+18.9+12.4 Fidelity Spartan 500IdxAdvtg 59.47+.59 +18.9+18.8+17.3+8.8 FrankTemp-Franklin IncomeAm 2.31+.01 +7.6+10.3+10.4+8.2 FrankTemp-Templeton GlBondAm 12.92+.10 -1.1+4.1+4.9+9.1 GlBondAdv 12.88+.11 -0.9+4.4+5.2+9.3 Harbor IntlInstl 67.23+.80 +8.2+16.4+10.1+6.0 T Rowe Price EqtyInc 31.10+.29 +18.6+21.3+16.1+8.2 GrowStk 45.67+.56 +20.9+19.7+18.9+11.1 Vanguard 500Adml 154.73+1.54 +18.9+18.8+17.3+8.8 500Inv 154.69+1.53 +18.8+18.7+17.1+8.7 MuIntAdml 13.51+.02 -4.0-2.9+2.5+4.1 STGradeAd 10.64+.01 -0.3+0.7+2.3+3.7 Tgtet2025 14.95+.13 +10.0+12.0+11.4+7.1 TotBdAdml 10.52+.02 -3.4-2.9+2.6+4.5 TotIntl 15.78+.23 +7.0+15.0+6.7+4.1 TotStIAdm 42.39+.46 +20.0+20.3+17.9+9.5 TotStIdx 42.37+.46 +19.9+20.2+17.8+9.3 Welltn 37.19+.20 +11.3+13.1+12.1+8.4 WelltnAdm 64.24+.34 +11.3+13.2+12.2+8.5 WndsIIAdm 61.35+.43 +19.0+20.9+17.4+8.7. Associated PressT & Poors. Itss interest suggests that it sees broad economic improvement. Also, Koch is paying a large premium for Molex. Koch is paying $38.50 per share, 31 percent over Molexs stock price on Friday. Molex soared $9.29, or almost 32 percent, to $38.63 on Monday. Mergers, homebuilder news helps lift stocks BusinessBRIEFS From wire reports PAGE 8 OPINION Page A8TUESDAY, SEPTEMBER 10, 2013 Boycotting movie because of actressAfter reading Mr. Eastmans letter regarding the movie, The Butler, and the GOP, it is important for me to clarify some of his prejudiced accusations. What makes our country great is that citizens have the freedom to make choices. However, it is not acceptable for people to make stereotypical statements about the philosophies of opposing political parties. Yes, Mr. Eastman, there definitely are prejudiced, racist members of the GOP, but they arent limited to that party. It is also illogical to claim that all members of the GOP are racist and are determined to take away the voting rights of black citizens and bind them in chains. However, taking away blacks right to vote is not the issue. It seems logical that members of all political parties would be concerned about cheating at the polls. People are not prejudiced because they see the need to monitor voters. Those who are in favor of voter reform want to prevent votes that have been cast by illegal aliens, deceased people, or people who vote numerous times. A legal citizen of any color should not object to showing his/her photo identification voters card in order to vote. No doubt the movie The Butler, is an outstanding film depicting the life of Cecil Gaines and his family, including how blacks were treated inhumanely by whites not all whites, or not just Republican whites. Prejudice and racism toward blacks are not the reasons some people, myself included, choose not to see this film, but because of their compassion, empathy, and scruples toward our military who fought in Vietnam. Jane Fonda, who opposed the war and chose to turn against our country and side with the enemy, should not portray a patriot like Nancy Reagan in this film. It is wise not to jump to conclusions.Diane J. Kittleson Hernando Its a new sleazeball record, even for South Florida: Three different mayors busted on corruption charges in 22 days. Thats almost a mayor a week in handcuffs. No other county in the nation can match the pace of corruption being set by Miami-Dade. Last Wednesday it was Homestead Mayor Steve Bateman, currently running for reelection, who got pinched on two felony counts of unlawful compensation and assorted violations of the countys ethics code. (Im not joking. There really is an ethics code.) Bateman was in the shower when cops came knocking. Said his attorney: He is shocked by having been arrested with no advance notice. Like what, an engraved invitation? The mayors antics have kept him in the news for years, and his sketchy business dealings have been well chronicled by The Miami Heraldand WFOR-CBS4. Bateman is charged with serving as a secret paid consultant to a company called Community Health of South Florida, which runs nonprofit health clinics. CHI has a longpending project in Homestead, and the mayor allegedly offered to make the wheels turn faster, one employee said. He got himself a tasty one-year contract for $120,000. Prosecutors say he collected less than half the amount before his arrest. Heres the heartwarming part. CHI delivers medical services to the poor, but Bateman allegedly had no qualms about overbilling. He spent one hour with Miami-Dade Mayor Carlos Gimenez and his staff, then he invoiced CHI for eight hours. The confluence of greed and stupidity is a recurring theme in bribery cases, but what distinguishes our wayward politicians is a special brand of blithe and arrogant bumbling. At least Bateman was aiming for a sixfigure payoff, according to the State Attorneys Office. Usually local pols can be bought much cheaper. Last March, Sweetwater Mayor Manuel Marono and lobbyist Jorge Forte allegedly split a $10,000 cash bribe at a restaurant. The money was tucked in a notebook offered by two FBI agents posing as Chicago businessmen.re innocent. Meanwhile, prosecutors await the customary backstage rodent-fest, the deal-cutting and desperate offers to cooperate. Oh well. Perhaps the rsum. Given the number of South Florida politicians that have been locked up for bribery over the years (and weve led the country in public corruption cases), youd think that simple evolution would produce smarter, slicker crooks running for office. But that isnt happening. They?Carl Hiaasen is a columnist for the Miami Herald. Readers may write to him at: 1 Herald Plaza, Miami, FL 33132. If one way be better than another, that you may be sure is natures way.Aristotle, 384-322 B.C. Corruption trifecta for Florida IN TRANSITION Crystal River Mall changing, not closing Folks at the Crystal River Mall must feel sympathy for Mark Twain, whose impending death was reported by some newspapers after they confused the writer with his cousin who was seriously ill in London, leading to Twains famous comment the reports of my death are greatly exaggerated. While there is no doubt the mall has had serious problems, with the loss or impending loss of three of the four anchor tenants, it is still open, and mall management is making efforts to transition the mall into life after the loss of Sears and Penneys and the impending loss of Belk. These stores have been victims of both national and local forces that drove down sales and led to the decision to close the stores. Among the forces are the great recession, the transition to online shopping, and changes in the habits of teenagers, who have often replaced hanging out at the mall (and buying things) to hanging out on social media. The plight of the mall is not unique, as recent reports indicate that across the United States, more than 200 malls have vacancy rates of more than 35 percent, and large retailers are cutting back across the country. In response to the closings, mall management has expanded its efforts to make the mall a center of community activity and to expand the mall from strictly a retail location to a location for mixed uses, including light industrial, retail, entertainment and casual dining. For the mall to be successful over the long term, it will have to change, because there is little chance that stores like Kohls or Macys or Old Navy will be locating in the space vacated by previous anchor stores. These retailers want demographics and population levels that are not present in Citrus County. What can happen is a transition to mixed uses that use the existing infrastructure of the mall and bring in new businesses to complement the ones there now and expand the variety of activities at the mall to include light manufacturing or other types of commercial use. This is the direction mall management and the EDC are pursuing We believe this is the right direction to take for the mall to be successful over the long term, and we encourage continuing efforts to expand the mall beyond its retailing past into a more diversified future. THE ISSUE:Rumors the Crystal River Mall is closing.OUR OPINION:The mall isnt closing, but must change and adapt to survive. Dose of realityI wish there was some way to attach an IQ test to the people writing in letters to the editor and the people calling in to Sound Off I dont know what they are thinking that its so important for a taxpayer to save $50 to make sure that the rest of the county doesnt burn down. And Im not sure if you actually look at the geography of Citrus County, we have, I dont know how many miles of gulf coast line and how many lakes. It was actually important that the sheriffs office has a helicopter and a boat and an airboat and four-wheel drive vehicles because you might be the next one thats stuck out there or your grandchild may be the next one whos missing. Youd be the first one complaining if the sheriffs office didnt come and find you because they couldnt get a helicopter up in the air because some old person from Beverly Hills was (complaining) about the cost of the helicopter. Why dont you people wake up, grow up and get a dose of reality?Embarrassing errorI was angry and embarrassed the day after Labor Day. I had planned a neighborhood outing to go tubing at the Rainbow Springs State Park. I checked the hours of operation and it took 45 minutes to get there, only to find the park was closed. I called and they said that after Labor Day, theyre only open on the weekends. That is not what the website said. It said that they were open until Sept. 30 from 8:30 in the morning. It cost me time, it cost me gas, and, as I said, I was embarrassed to have been the person to organize this outing based upon information that was not correct on the Web.Better down SouthI was so amused by the unhappy person woken up by the power companys restoration update, I had to respond. You have no idea how fortunate you are to be able to receive an update regarding a power outage. In the New England states, all the power companies provide is the same recorded message informing customers there is no estimated time when power will be restored and this goes on for five days, as the operators are too busy to give updates to their customers.Pay for damageI guarantee that the operator of a boat who causes damage that I am aware of will be met in a court of law. I will not tolerate abuse by stupid boaters. PAGE 9 Turn off sprinklersWhy doesnt someone get after Terra Vista on (County Road) 486 for wasting water? Sprinklers are on when its pouring rain out. Why are they allowed to waste water when we are still on water restrictions? It seems they can water whenever they want (with) no regard to water restrictions. Someone with authority should look into this. What about water conservation? It should pertain to all of us.Not so strangeTheres another Sound Off today about the hot meal purchased by food stamps. It said the store manager and the deli manager should be charged with a crime and the customer reported. All the millions lost in fraud in Iraq and Afghanistan, with the millions in Medicare fraud by wheelchair vendors and others, the billions in unpaid taxes by big corporations, dont seem to arouse readers to call Sound Off, but a few bucks in food stamps does. My reaction on the original Sound Off was, why cant someone buy a hot meal on food stamps? Pay for it yourselfIm calling about a Sound Off in the paper today, Sunday, Aug. 25, Dawsy bad for criminals. This is in response. I would like to say (Sheriff Jeff) Dawsy always claims crime is down in Citrus County. If you think that he needs all that he has and more, why dont you pay for it and give the rest of us a break. Try comparing to similar counties not Broward County, which Dawsy wants to be like. Protect yourselfTo the woman who did not want to shake hands in church: Youre all dolled up in your Sunday best clothes. Just wear gloves. No to SocialismRe: Peter Poland Ph.D letter of Aug. 25. His assertion that the radical right has seized control of the Republican Party is pure nonsense. I would assert that Marxists and Socialists have seized control of the Democratic Party and are trying to turn us into a socialist state. There is no room for compromise in trying to prevent the destruction of America. No room whatsoever. I want to share with you some quotations that should make you sit up and take notice. 1. Were going to take things away from you on behalf of the common good. 2. Its time for a new beginning, for an end to government of the few, by the few and for the few. ... And to replace it with shared responsibility for shared prosperity. 3. (We) ....cant its time to send a clear message to what has become the most profitable sector in (the) entire economy that they are being watched. I dont see any possible compromise I could reach with those statements. I object to all of them. They were all made by Hilary Clinton and they are pure Marxism. She thinks the free market has failed. What does that leave? It leaves you with government ownership of the means of production and control of labor. It leaves you the future horror of Agenda 21 and a one world socialist government. Thats not for me. I dont want to live in a hive, ride public transportation to work in a government owned factory all day, and then ride public transportation home each night. Thats the vision the left has for us. The liberal mind is shallow and short-sighted, clinging to ideas that have never worked and are doomed to failure from the outset. In todays paper, those two bastions of liberalism, Douglas Cohn and Eleanor Cliff, in a discussion of the promises of Obamacare, conclude with Whats not to like? How about this? Having medical insurance and having medical care are two entirely different things, and the second does not automatically follow from the first. By adding 40 million patients to an already strained medical system and accelerating the number of doctors retiring or exiting the profession, we will bring our cancer survival rates down to those of Canada and Great Britain, and extend the wait times to see a physician to match theirs of two to three months. Thats whats not to like. One good thing about the Berlin wall was you could point to the east side and say Socialism and Communism are bad. Then you could point to the west side and say Capitalism and free enterprise are good. I want to leave you with that impression in your mind, so please visit this website for a very visual presentation: http:// tinyurl.com/7wg6vjf. Those are scenes from East Germany under communism and later under freedom. You see why I say no to Barack Obama and Hilary Clinton.Harley Lawrence Homosassa Say no to SyriaObamas decision to seek Congress approval for an attack on Syria is another political move. He would love to see Congress refuse to support him and tell the world they dont care about women and children in Syria. I abhor the thought of using gas warfare, no matter who perpetrates its use. But we have to be rational about any retaliation. I ask where was the outrage by the administration over the past two years when thousands women and children included were killed? Why now are Kerry and Hagel so hell bent on sending a message? What would they bomb and why? What is the ultimate objective, a slap on the wrist telling them to not do it again? This is the dumbest military decision and move in our history. By the way, isnt Al Queda involved with a bunch of other bad guys? Who do we support, the rebels? And just who are they, Sunni, Shite? If Assad is killed and the rebels win, what and who is going to replace the dictator? The Egypt support really turned out well. These people have been fighting and killing each other for thousands of years. Why dont we read about them and their desire for Islamic control of all? Lets learn to stay out of these situations, support our allies in the region, Israel, and let them sort out their own differences since our government doesnt even understand the teachings of the Koran. George Pratt HernandoOPINIONCITRUSCOUNTY(FL) CHRONICLETUESDAY, SEPTEMBER10, 2013 A9 Like us on Facebook352.621.8017 STYLEAssistedLiving Assisted Living Facility License #11566Sometimes you just need a little help. Stop in & see why relationships blossom daily.8733 West Yulee Drive, Homosassa000FVGC Vote for your favorite restaurants and you have a chance to WIN a $100 Visa Gift Card! All votes must be submitted by 4pm, September 17, 2013. For complete rules see chronicleonline.com go to features, then select enter a contest. Go to Features Enter a contest Mexican Food? Dessert? Service? 2013 Golden Fork Awards 000FVVCG0HX Experience The Difference Se Habla Espaol Free Second Opinion 2013 2013 2013 2013.E. Hwy. 19 Crystal River, FL PROFESSIONAL CONVENIENT PAIN FREE 000FXH8 New Patients Free Consults Emergency Care Exceptional Dentistry and Your Comfort is Our Number One Priority! 2013 2013 2013 2013 Letters toTHE EDITOR Sound OFF PAGE 10 Manhunt Associated PressWayne County Sheriffs Department personnel rush from the the Frank Murphy Hall of Justice on Monday to look for an escaped prisoner in Detroit. Authorities said Derreck White, 25, sparked a manhunt and prompted a courthouse lockdown after stabbing a sheriffs deputy several times in the neck, stealing his uniform then carjacking a motorist in his escape. Woman, 69, rescued from Arizona canyonTUCSON, Ariz. A 69year-old woman fell about 100 feet into a canyon in southern Arizona, was injured and had to stay there overnight before a man scouting locations to hunt deer spotted her, and a rescue helicopter eventually lifted her out. The Pima County Sheriffs Office said said the Green Valley resident apparently slipped before tumbling down a very steep slope. Brummer was listed in stable condition Monday at a Tucson hospital.$250M gift to Kentucky college withdrawnA small Kentucky liberal arts college said didnt offer further explanation, but said it put considerable time pressure on the college to structure the gift and the proposed scholarship program. The college said the two sides ultimately decided they could not finalize the deal.Batman, Captain America rescue cat from fireMILTON, W.Va. Who says superheroes are, said he crawled into the front room and felt something furry. He grabbed the animal, ran outside and gave it mouth-to-mouth resuscitation. From wire reports Nation BRIEFS NATION& WORLD Page A10TUESDAY, SEPTEMBER 10, 2013 CITRUSCOUNTYCHRONICLE Marching Associated PressNorth Korean troops march Monday during a military parade at Kim Il Sung Square to mark the 65th anniversary of the countrys founding in Pyongyang, North Korea. Navalny defuses Moscow mayors race angerMOSCOW Opposition leader Alexei Navalny on Monday night defused anger over the Moscow mayoral election, telling a vast square of cheering supporters to celebrate his surprisingly strong secondplace finish as a victory that gave rise to real political competition in Russia. Navalny has claimed that Sundays vote was manipulated to give the Kremlinappointed incumbent, Sergei Sobyanin, the slim majority he needed to win in the first round and avoid a runoff. Russias most respected election monitoring group also questioned the accuracy of the vote. But rather than call for angry street protests like those he led after the fraudtainted 2011 national parliamentary election, Navalny urged his supporters to keep up the kind of grassroots political activism that helped him defy all expectations and win 27 percent of the vote. This mayoral election was the first in Moscow since 2003 and included six candidates. Last year, the Kremlin reversed President Vladimir Putins 2004 decree abolishing direct elections for Moscows mayor and other regional leaders.Sabotage caused deadly refinery blast in VenezuelaCARACAS, Venezuela Venezuelas oil minister said sabotage caused an explosion and fire that killed more than 40 people last year at the South American countrys largest petroleum refinery. Rafael Ramirez said the results of a government investigation showed that saboteurs deliberately caused a gas leak at the massive Amuay Refinery that prompted the Aug. 25 explosion. Ramirez said bolts on a pump were intentionally loosened, though he did not identify the alleged saboteurs during a news conference on Monday. He said he does not believe employees from the state-run oil company that operates the refinery were responsible. Forty-two people died as a result of the explosion, according to authorities. Five others were reported missing.Center-right bloc to take power in NorwayOSLO, Norway Prime Minister Jens Stoltenberg, who has led Norway for eight years, has conceded defeat in the Nordic countrys parliamentary elections. Stoltenberg congratulated Conservative Party leader Erna Solberg on Monday. She will become prime minister as head of a centerright coalition that will have a majority in Parliament. He said his Labor Party tried to do what almost no one has done, to win three elections in a row, but it turned out to be tough. World BRIEFS From wire reports Associated PressVan Gogh Museum director Axel Ruger stands next to the newly discovered Sunset at Montmajour painting by Dutch painter Vincent van Gogh during a press conference Monday at the Van Gogh museum in Amsterdam, Netherlands. The Van Gogh Museum said the long-lost painting spent years in a Norwegian attic and is the first full-size canvas by the Dutch master discovered since 1928. Long-lost van Gogh painting discovered in Norwegian attic Associated PressAMSTERDAM A painting that sat for six decades in a Norwegian industrialists attic after he was told it was a fake Van Gogh was pronounced the real thing Monday, making it the first fullsize canvas by the tortured Dutch artist to be discovered since 1928. Experts at the Van Gogh Museum in Amsterdam authenticated the 1888 landscape Sunset at Montmajour with the help of Vincent Van Goghs letters, chemical analysis of the pigments and X-rays of the canvas. Museum director Axel Rueger, at an unveiling ceremony, called the discovery a once-in-alifetime experience. This is a great painting from what many see as the high point of his artistic achievement, his period in Arles, in southern France, Rueger said. In the same period, he painted works such as Sunflowers, The Yellow House and The Bedroom.. Van Gogh struggled with bouts of mental distress throughout his life and died of a self-inflicted gunshot wound in 1890. He sold only one painting during his lifetime. In 1991, the museum declined to authenticate the painting when whoever owned it at the time brought it to them. Among other reasons experts had their doubts: The painting was unsigned. Parts of the foreground were not as wellobserved as usual, the researchers said. And part of the right side of the painting used a different style of brush strokes. The Van Gogh Museum houses 140 Van Gogh paintings and receives more than a million visitors a year. Race to hire, train Obamacare guides Associated Pressve the. If the system works as federal officials hope, more than half of the nations uninsured, which amount to 15 percent of the population, will get coverage. In 17 states, navigators have additional hoops to jump through because of new state laws affecting the federal health care law, such as required background checks for the workers. Will there be enough time for the hiring and training? It has to be enough time, said Laura Goodhue, executive director of Florida CHAIN, a consumer health group involved in the training. We have to do what we have to do. From suggestion to proposal U.S. weighs talk of Syria dumping chemical weapons Associated days developments were doubtless due in part to the credible possibility of that action. He stuck to his plan to address the nation tonight, while the Senate Democratic leader postponed a vote on authorization. The sudden developments broke into the open when Russiasrias stockpiles were successfully secured, though he remained skeptical about Assads willingness to carry out the steps needed. My objective here has always been to deal with a very specific problem, Obama said in an interview with ABC News. If we can do that without a military strike, that is overwhelmingly my preference. He cast Russias proposal as a direct result of the pressure being felt by Syria because of the threat of a U.S. strike and warned that he would not allow the idea to be used as a stalling tactic.. John KerryU.S. Secretary of State. PAGE 11 Baseball/ B2 Scoreboard/B3 Lottery, TV/B3 Football/ B4 What led to New Yorks win over the Bucs? / B4 SPORTSSection BTUESDAY, SEPTEMBER 10, 2013 CITRUSCOUNTYCHRONICLE Lucky 13th Slam for Nadal Ryan Newman in the Chase NASCAR boots Truex as part of penalties Associated PressCONCORD, N Ryan Newman See NEWMAN/ Page B3 Seven Rivers spikes Crystal River in three C.J. RISAK CorrespondentCRYSTAL RIVER It wasnt looking good for Seven Rivers Christians volleyball team as the opening set of its match at Crystal River wound down. The Pirates were out-scrambling the Warriors, but Seven Rivers had managed to stay within striking distance, trailing 23-21 when another service error its sixth of the set put Crystal River at game point. Thats when Alyssa Gage took command for the Warriors. A block kill by the junior co-captain made it 24-22, followed by a Pirates kill attempt error, a service ace by Julia Eckart, and a kill and another block kill by Gage that ended Seven Rivers five-point run and gave them the game, 26-24. The Warriors didnt need anything nearly as dramatic to sweep Crystal River, winning the second and third sets 25-13, 25-20. The victory was Seven Rivers fourth straight, making it 4-1 overall. The Pirates slipped to 2-3 overall. They persevered, said Seven Rivers coach Wanda Grey of her teams performance. Once our passing started improving, we got better opportunities. Gage was particularly outstanding, collecting nine kills four of them off blocks in the first set. She would finish with 13 kills, five blocks, three service aces and seven kill assists. In the first game (of a match), theres always nerves, Gage said of her teams opening-set problems at the service line (the Warriors had just two more service errors in the match). As for her own dominant blocking performance, Gage said, I dont think its luck. I just read their shoulders and react. Gage spent the summer working on my jumping to improve her hitting, and it shows. She gives Seven Rivers a strong second option to middle hitter Alexis Zachar, who had eight kills against Crystal River. In this match, the two of them were more than the Pirates could handle. They had trouble finding the floor on Seven Rivers side of the net on their kill attempts, and once the Warriors serving improved, Crystal River was in trouble. Losing the first set when the Pirates were within a point of victory didnt help. You never have it in hand in volleyball, Crystal River coach Mike Ridley said. They got hot at the right time. Tonight was not our strongest passing night. And when we struggle with our passing, its going to make it hard on Aspen (Phillips, the teams setter). That showed in her numbers. Phillips, who has averaged more than 34 assists per match, was limited to 13 by Seven Rivers. She added 13 digs and three aces. The Pirates leader in kills was freshman Kaylan Simms with six. Delaney Owens contributed 12 digs for Crystal River and Laynee Nadal had seven. Crystal River opens district play in 5A-6 when it hosts Dunnellon Thursday. Seven Rivers travels to 2A-3 rival Gainesville Cornerstone tonight for a key match against the two-time district champs. Citrus Hurricanes sweep Weeki Wachee nettersThe Citrus volleyball team traveled to Weeki Wachee Monday night and came back home with a 25-21, 25-16, 25-19 victory. The Hurricanes were led at the net by Kayla Kings nine kills. Kelly Abramowich passed out 25 assists and Adriana Espinoza had a team-high 25 digs. Citrus (3-1) returns to action tonight at 6 p.m. at South Sumter.From staff reports Takes care of top-seeded Djokovic in four sets Associated Press Martin Truex Jr. Rafael Nadal reacts Monday after a point against Novak Djokovic during the mens singles final of the 2013 U.S. Open in New York. Nadal won the title in four sets.Associated Press See NADAL/ Page B3 Eagles race out to big lead, hold off late rally by Redskins Associated PressPhiladelphia running back LeSean McCoy leaps over Washington cornerback E.J. Biggers as he breaks free Monday night for a touchdown run during the second half in Landover, Md. Associated PressLANDOVER, Md. Just try to keep up with Michael Vick, LeSean McCoy and the Philadelphia Eagles this season. Robert Griffin III and the Washington Redskins sure couldnt. Playing at a frenetic pace that left the Redskins bumbling and stumbling, the Eagles unleashed coach Chip Kellys offense on the NFL and crammed 77 plays into 60 minutes of football. They had their share of miscues, of course, but they held on for a 33-27 upset of the defending NFC East champs. Vick, running the dont-take-a-breath attack that won 87 percent of the time during Kellysyard score, then found the end zone himself on a 3-yard run and that was just the first half. It would have been a bigger rout if Vick hadnt missed three open receivers in the first quarter, or if his sideways lateral on first-and-goal at the 4 had didnt have much of a chance to chant R-G-3! because the Redskins offense could See EAGLES/ Page B3 Chip Kelly Robert Griffin III Michael Vick PAGE 12 0910 TUCRN AMENDED NOTICE/ New Times Meeting of the Citrus County Hospital Board will be held on Wednesday, September 18, 2013 beginning at 8:00pm in the Jury room of the Citrus County Court House, 110 N. Apopka Ave.,. NOTICE OF EXECUTIVE SESSION MEETING DURING MEETING The Citrus County Hospital Board of Trustees will hold an Executive Session meeting during the September 18, 2013, Wednesday, September 18, 2013 at 8:00pm in the Citrus County Court House Room 131, 110 N. Apopka Ave.,23D Associated PressMIAMI Evan Gattis drove in two runs to highlight Atlantantas biggest inning since a fiveruns best record. Chris Coghlan tied a career high with four hits for Miami, which lost for the 24th time in its last 34 games. Ed Lucas added a two-run double in the seventh for the Marlins.American League Orioles 4, Yankees 2BALTIMORE Chris Tillman took a three-hitter into the eighth inning and the Baltimore Orioles beat the New York Yankees 4-2..Indians 4, Royals 3.White Sox 5, Tigers 1CHICAGO Chris Sale outpitched Max Scherzer, denying him 20 wins, and Miguel Cabrera was ejected in the first inning as the Chicago White Sox beat the Detroit Tigers 5-1.roits fifth loss in six games, dropping the Tigers lead in the AL Central to 4 1/2 games over Cleveland. Cabrera was tossed by home plate umpire Brian Gorman after arguing a call. Manager Jim Leyland was promptly ejected while defending his player.Twins 6, Angels 3MINNEAPOLIS Trevor Plouffe went 2 for 3 and drove in the tying and go-ahead runs as the Minnesota Twins snapped a 10-game home losing streak with a 6-3 victory over the Los Angeles Angels. The Twins won at home for the first time since Aug. 15, avoiding the longest home losing streak since the franchise started in Washington in 1901.National League Nationals 9, Mets 0NEW YORK Gio Gonzalez was inches from a no-hitter and the Washington Nationals hit five home runs,orks only hit. Cubs 2, Reds 0CINCINNATI Left-hander Travis Wood beat Cincinnati for the first time in his career, repeatedly pitching out of threats for seven innings, and the Chicago Cubs stalled the Reds weeklong surge with a 2-0 victory..Interleague Pirates 1, Rangers 0. The Pirates (82-61) didnt get a runner to second base against Darvish (12-8) until Marlon Byrds two-out double in the seventh. He came home when Pedro Alvarez followed with a double. AL Associated PressAtlantas Evan Gattis beats the throw to Miami catcher Jeff Mathis to score Monday in the fourth inning in Miami. Braves snap four-game skid Orioles take series opener over Yanks AMERICAN LEAGUEMondays Games Cleveland 4, Kansas City 3 Baltimore 4, N.Y. Yankees 2 Minnesota 6, L.A. Angels 3 Pittsburgh 1, Texas 0 Chicago White Sox 5, Detroit 1 Houston at Seattle, late p.m. p.m. Houston (Lyles 6-7) at Seattle (J.Saunders 11-13), 10:10 p.m.NATIONAL LEAGUEMondays Games Atlanta 5, Miami 2 Chicago Cubs 2, Cincinnati 0 Washington 9, N.Y. Mets 0 Pittsburgh 1, Texas 0 Arizona at L.A. Dodgers, late Colorado at San Francisco, late Today San Diego (Cashner 8-8) at Philadelphia (Cloyd 2-3), 7:05 p.m. p.m. Arizona (Cahill 6-10) at L.A. Dodgers (Volquez 9-11), 10:10 p.m. Colorado (J.De La Rosa 16-6) at San Francisco (Vogelsong 3-5), 10:15 p.m. Orioles 4, Yankees 2New York Baltimore abrhbi abrhbi Gardnr cf4010Markks rf4131 ARdrgz 3b4121Machd 3b3011 Cano 2b4000A.Jones cf3011 ASorin lf4000C.Davis 1b4000 Grndrs dh4000Valenci dh3000 Nunez ss3010BRorts ph-dh1000 Overay 1b3111Hardy ss3110 ISuzuki rf3000Morse lf3000 AuRmn c2000ChDckr lf0000 ZAlmnt ph1000Wieters c1101 JMrphy c0000ACasill 2b3110 Totals322 52Totals28474 New York1000000102 Baltimore10002010x4 ESabathia (2). DPNew York 1. LOBNew York 3, Baltimore 5. 2BMarkakis (22), Machado (49), A.Jones (32), Hardy (22). HR A.Rodriguez (5), Overbay (14). SBA.Casilla (9). SMachado. SFA.Jones, Wieters. IPHRERBBSO New York Sabathia L,13-1271/374326 Warren 2/300000 Baltimore Tillman W,16-5742209 Tom.Hunter H,19100003 Ji.Johnson S,43-52110000Indians 4, Royals 3Kansas CityCleveland abrhbiabrhbi AGordn lf5222Bourn cf4000 Bonifac 2b4000Swisher 1b3000 Hosmer 1b4021Kipnis 2b3000 BButler dh4000CSantn dh3111 S.Perez c4020Brantly lf3000 Getz pr0000AsCarr ss3111 Mostks 3b3000YGoms c3111 Ciriaco pr0000JRmrz 3b3120 L.Cain rf3010Aviles 3b0000 Lough ph0000Stubbs rf3000 JDyson cf3020 C.Pena ph1000 AEscor ss3110 Kottars ph0000 Totals34310 3Totals28453 Kansas City0000010203 Cleveland01101010x4 EHosmer (8), Jo.Ramirez (1). LOBKansas City 7, Cleveland 0. 2BJ.Dyson (9), A.Escobar (18). HRA.Gordon (18), C.Santana (18), As.Cabrera (11), Y.Gomes (10). SBA.Gordon (10). CSL.Cain (6), J.Dyson (6). SLough. IPHRERBBSO Kansas City E.Santana L,8-9744307 W.Davis110001 Cleveland U.Jimenez W,11-97710010 Allen H,91/322201 Rzepczynski H,21/300000 J.Smith H,221/300000 C.Perez S,23-27110021Twins 6, Angels 3Los AngelesMinnesota abrhbiabrhbi Cowgill lf5010Presley cf5000 Aybar ss5010Pinto c4231 Trout cf4110Dozier 2b4120 Trumo 1b4120Arcia lf5100 JHmltn dh4021Thoms lf0000 Iannett c4110Doumit dh4121 Calhon rf4031Bernier pr-dh0000 GGreen 2b4001Plouffe 3b4023 Field 3b4010Colaell 1b3000 Parmel rf2000 Mstrnn ph-rf1000 Flormn ss3121 Totals383123Totals356116 Los Angeles0002100003 Minnesota00102021x6 EG.Green (4). DPMinnesota 1. LOBLos Angeles 9, Minnesota 12. 2BCowgill (3), Aybar (28), J.Hamilton 2 (30), Calhoun (5), Pinto 3 (5), Doumit (24), Plouffe (21). SBDozier (11), Florimon (14). SFPlouffe. IPHRERBBSO Los Angeles Weaver693325 Cor.Rasmus L,0-11/302030 Boshers2/300011 J.Gutierrez121102 Minnesota P.Hernandez42/383313 Pressly11/310001 Fien W,4-2100002 Duensing H,152/310001 Burton H,261/300001 Perkins S,33-37120001 NL Braves 5, Marlins 2Atlanta Miami abrhbi abrhbi JSchafr cf4000Coghln rf4040 J.Upton rf3110DSolan 2b4000 FFrmn 1b4110Yelich lf2000 Gattis lf4112Ruggin cf4010 Ayala p0000Polanc 3b4000 Kimrel p0000Morrsn 1b2000 McCnn c2100B.Hand p0000 CJhnsn 3b4111Pierre ph1110 Janish 3b0000DJnngs p0000 Smmns ss4000Mrsnck ph1000 ElJhns 2b-lf4011Hatchr p0000 Medlen p2000Hchvrr ss4110 Avilan p0000Mathis c2000 Uggla 2b0000Brantly c2000 HAlvrz p1000 Lucas 1b3012 Totals315 54Totals34282 Atlanta0005000005 Miami 0000002002 EEl.Johnson (1). DPAtlanta 1, Miami 1. LOBAtlanta 3, Miami 7. 2BJ.Upton (24), F.Freeman (25), Gattis (16), Pierre (10), Lucas (8). SBEl.Johnson (3). IPHRERBBSO Atlanta Medlen W,13-1261/362226 Avilan H,232/310002 Ayala H,6 110001 Kimbrel S,45-48100002 Miami H.Alvarez L,3-4455532 B.Hand 300012 Da.Jennings100001 Hatcher 100000Nationals 9, Mets 0WashingtonNew York abrhbiabrhbi Span cf5231EYong lf4000 Zmrmn 3b3211DnMrp 2b1000 ZWltrs pr-3b0000Ardsm p0000 Werth rf5123Henn p0000 Dsmnd ss4100Z.Lutz ph-1b1010 AdLRc 1b2100ABrwn rf4000 WRams c5113Duda 1b3000 TMoore lf3121Byrdak p0000 CBrwn lf0000Atchisn p0000 Rendon 2b4000Germn p0000 GGnzlz p4000JuTrnr ss3000 Lagars cf3000 Flores 3b-2b3000 TdArnd c3000 CTorrs p1000 Burke p0000 Satin 3b2000 Totals35999Totals28010 Washington2031300009 New York0000000000 DPNew York 1. LOBWashington 6, New York 3. 2BT.Moore (7). HRSpan (4), Zimmerman (21), Werth (22), W.Ramos (12), T.Moore (4). IPHRERBBSO Washington G.Gonzalez W,10-6910028 New York C.Torres L,3-4456624 Burke123322 Aardsma120001 Henn100020 Byrdak2/300011 Atchison1/300001 Germen100002Cubs 2, Reds 0Chicago Cincinnati abrhbi abrhbi StCastr ss4000Choo cf3010 Valuen 3b4121BPhllps 2b3010 Rizzo 1b4000Votto 1b4020 DNavrr c4010Bruce rf4000 Schrhlt rf3010Frazier 3b4000 Sweeny cf3111Ludwck lf4010 Bogsvc lf4010Cozart ss4020 Barney 2b4010Hanign c4000 TrWood p3000Arroyo p2000 Strop p0000N.Soto ph1000 Gregg p0000Ondrsk p0000 MParr p0000 Simon p0000 Paul ph1000 Totals33272Totals34070 Chicago0110000002 Cincinnati0000000000 LOBChicago 6, Cincinnati 9. 2BValbuena (14), Schierholtz (27), Choo (32), Ludwick (4), Cozart 2 (26). HRValbuena (11), Sweeney (6). IPHRERBBSO Chicago Tr.Wood W,9-11760007 Strop H,11 100011 Gregg S,31-36110000 Cincinnati Arroyo L,13-11772206 Ondrusek 1/300000 M.Parra 11/300022 Simon 1/300000Interleague Pirates 1, Rangers 0PittsburghTexas abrhbi abrhbi Tabata lf4010Kinsler 2b4000 Pie lf0000Andrus ss3000 NWalkr 2b4000Rios rf3010 McCtch cf4020ABeltre 3b4010 Mornea 1b4000Rosales pr0000 SMarte pr0000Przyns dh4010 GSnchz 1b0000Morlnd 1b3000 Byrd rf3110G.Soto c3010 PAlvrz 3b3011Adduci lf2000 RMartn c2000DvMrp lf0000 GJones dh3000Gentry ph-lf1000 Barmes ss3010LMartn cf3000 Totals30161Totals30040 Pittsburgh0000001001 Texas 0000000000 DPTexas 2. LOBPittsburgh 4, Texas 5. 2B Byrd (32), P.Alvarez (19). 3BMcCutchen (5). SBAndrus 2 (39), Rios (35). CSTabata (1). IPHRERBBSO Pittsburgh Cole W,7-7 730029 Watson H,18100000 Melancon S,12-14110000 Texas Darvish L,12-8741116 Scheppers 110000 Cotts 2/310000 Soria 1/300001 HBPby Darvish (Byrd). WPCole. UmpiresHome, Mike Muchlinski; First, Jeff Kellogg; Second, Chad Fairchild; Third, Paul Schrieber. T:24. A,243 (48,114). Rays scheduleSe Sept. 20 vs Baltimore Sept. 21 vs Baltimore Sept. 22 vs Baltimore Sept. 23 vs Baltimore Sept. 24 at N.Y. Yankees West Division WLPctGBWCL10StrHomeAway Oakland8360.5808-2W-347-2736-33 Texas8162.56623-7L-139-3042-32 Los Angeles6776.46916116-4L-235-4032-36 Seattle6578.45518135-5L-133-3932-39 Houston4796.32936313-7L-323-4924-47 East Division WLPctGBWCL10StrHomeAway Boston8758.6008-2L-147-2540-33 Tampa Bay7864.54973-7W-144-2634-38 Baltimore7766.538916-4W-142-3035-36 New York7668.5281035-5L-144-3132-37 Toronto6776.46919118-2W-335-3432-42 East Division WLPctGBWCL10StrHomeAway Atlanta8657.6015-5W-151-2035-37 Washington7469.5171276-4W-340-3134-38 Philadelphia6677.46220155-5W-339-3327-44 New York6478.45121164-6L-128-3936-39 Miami5389.37332274-6L-330-4223-47 Central Division WLPctGBWCL10StrHomeAway St. Louis8360.5805-5W-344-2539-35 Pittsburgh8261.57315-5W-145-2537-36 Cincinnati8263.56627-3L-147-2535-38 Milwaukee6280.43720184-6W-231-4031-40 Chicago6182.42722205-5W-129-4632-36 West Division WLPctGBWCL10StrHomeAway Los Angeles8359.5856-4L-443-2840-31 Arizona7270.5071184-6L-140-3132-39 Colorado6678.45818154-6L-341-3125-47 San Diego6577.45818156-4W-341-3324-44 San Fran.6479.44819175-5W-136-3728-42 Central Division WLPctGBWCL10StrHomeAway Detroit8262.5694-6L-344-2738-35 Cleveland7766.538416-4W-145-2832-38 Kansas City7569.521746-4L-140-3535-34 Minnesota6280.43719165-5W-129-3933-41 Chicago5885.40623202-8W-233-3425-51 AMERICAN LEAGUE NATIONAL LEAGUE CITRUSCOUNTY(FL) CHRONICLEMAJORLEAGUEBASEBALL B2TUESDAY, SEPTEMBER10, 2013 0910 TUCRN N O T I C E There will be a joint meeting on Wednesday, September 18, 2013 at 6:00pm with the Citrus County Hospital Board of Trustees and the Citrus Memorial Health Foundation, Inc. Directors in the Jury Room, located in the Citrus County Court House 110 N. Apopka Ave., Inverness, Florida. This notice informs and notifies the public that member(s) of the Citrus County Hospital Board and Citrus Memorial Health Foundation, Inc. will be in attendance at a joint meeting. The Citrus County Hospital Board of Trustees will not vote or conduct business. The Citrus County Hospital Board of Trustees will be active participants. This notice informs the public that the Citrus County Hospital Board of Trustees shall participate with one or more Citrus Memorial Health Foundation, Inc. Director(s) to discuss: Hospital transaction matter. Resolution of all governance and litigation matters by and between the Citrus County Hospital Board and the Citrus Memorial Health Foundation. Other. Copies of the Agenda are available by calling the Citrus County Hospital Board236 PAGE 13 SCOREBOARDCITRUSCOUNTY(FL) CHRONICLE that lasted 15,, and play such similar hustle-toeveryyear-old Spaniards total of 13 major championships ranks third in the history of mens tennis, behind only Roger Federers 17 and Pete Sampras 14.ovics.. NEWMANContinued from Page B1 NADALContinued from Page B1 On the AIRWAVES TODAYS SPORTS TV BASEBALL 7 p.m. (FSNFL) Atlanta Braves at Miami Marlins 7 p.m. (SUN) Boston Red Sox at Tampa Bay Rays FOOTBALL 10 p.m. (FS1) 41st Fun City Bowl: The Finest vs. The Bravest. Annual football game between the New York City Police and Fire departments (taped) SOCCER 7:40 p.m. (ESPN) FIFA World Cup Qualifying United States vs. Mexico RADIO 6:30 p.m. (WYKE 104.3 FM) Tampa Bay Rays pregame 7:10 TODAYS PREP SPORTS BOYS GOLF 3:30 p.m. Hernando, Dunnellon at Crystal River (Course: Plantation) 4 p.m. Meadowbrook at Seven Rivers (Course: Southern Woods) 4 p.m. Citrus at South Sumter GIRLS GOLF 3 p.m. Lecanto at Citrus (Course: LakeSide) SWIMMING 6 p.m. Weeki Wachee at Crystal River VOLLEYBALL 6 p.m. Citrus at South Sumter 7 p.m. The Villages at Lecanto 7 p.m. Seven Rivers at Cornerstone Academy Eagles 33, Redskins 27Philadelphia 12147033 Washington 7071327 First Quarter WasHall 75 fumble return (Forbath kick), 11:54. PhiFG Henery 48, 9:15. PhiJackson 25 pass from Vick (Henery kick), 8:59. PhiCole safety, 4:50. Second Quarter PhiCelek 28 pass from Vick (Henery kick), 6:10. PhiVick 3 run (Henery kick), :58. Third Quarter PhiMcCoy 34 run (Henery kick), 13:26. WasMorris 5 run (Forbath kick), :06. Fourth Quarter WasHankerson 10 pass from Griffin III (pass failed), 12:24. WasHankerson 24 pass from Griffin III (Forbath kick), 1:14. A,743. PhiWas First downs 2625 Total Net Yards443382 Rushes-yards49-26318-74 Passing 180308 Punt Returns0-02-14 Kickoff Returns2-373-56 Interceptions Ret.2-10-0 Comp-Att-Int15-25-030-49-2 Sacked-Yards Lost3-233-21 Punts 6-42.33-42.0 Fumbles-Lost2-22-1 Penalties-Yards8-6510-75 Time of Possession32:3927:21 INDIVIDUAL STATISTICS RUSHINGPhiladelphia, McCoy 31-184, Vick 9-54, Brown 9-25. Washington, Morris 12-45, Griffin III 5-24, Helu 1-5. PASSINGPhiladelphia, Vick 15-25-0-203. Washington, Griffin III 30-49-2-329. RECEIVINGPhiladelphia, Jackson 7-104, Celek 2-56, Cooper 2-14, Avant 2-13, Ertz 111, McCoy 1-5. Washington, Garcon 7-64, Hankerson 5-80, Moss 5-54, Reed 5-38, Morgan 4-51, Davis 2-22, Helu 1-11, Morris 1-9. MISSED FIELD GOALSWashington, Forbath 40 (WR).StandingsAMERICAN CONFERENCE East WLTPctPFPA New England1001.0002321 Miami 1001.0002310 N.Y. Jets1001.0001817 Buffalo 010.0002123 South WLTPctPFPA Indianapolis1001.0002117 Tennessee1001.000169 Houston000.00000 Jacksonville010.000228 North WLTPctPFPA Cincinnati010.0002124 Pittsburgh010.000916 Baltimore010.0002749 Cleveland010.0001023 West WLTPctPFPA Kansas City1001.000282 Denver1001.0004927 San Diego000.00000 Oakland010.0001721 NATIONAL CONFERENCE East WLTPctPFPA Dallas 1001.0003631 Philadelphia1001.0003327 Washington010.0002733 N.Y. Giants010.0003136 South WLTPctPFPA New Orleans1001.0002317 Tampa Bay010.0001718 Carolina010.000712 Atlanta 010.0001723 North WLTPctPFPA Detroit 1001.0003424 Chicago1001.0002421 Green Bay010.0002834 Minnesota010.0002434 West WLTPctPFPA St. Louis1001.0002724 San Francisco1001.0003428 Seattle 1001.000127 Arizona010.0002427 Thursdays Game Denver 49, Baltimore 27 Sundaysondays Games Philadelphia 33, Washington 27 Houston at San Diego, late.2013 U.S. Open ChampionsMens Singles Rafael Nadal (2), Spain Womens Singles Serena Williams (1), United States Mens Doubles Leander Paes, India, and Radek Stepanek (4), Czech Republic Womens Doubles Andrea Hlavackova and Lucie Hradecka (5), Czech Republic Mixed Doubles Andrea Hlavackova, Czech Republic, and Max Mirnyi (7), Belarus Champions Men John and Patrick McEnroe, United States Champions Women Martina Navratilova, United States, and Rennae Stubbs, Australia Boys Singles Borna Coric (4), Croatia Girls Singles Ana Konjuh (2), Croatia Boys Doubles Kamil Majchrzak, Poland, and Martin Redlicki, United States Girls Doubles Barbora Krejcikova and Katerina Siniakova, Czech Republic Wheelchair Mens Singles Stephane Houdet (2), France Wheelchair Womens Singles Aniek van Koot (2), Netherlands Wheelchair Quad Singles Lucas Sithole, South Africa Wheelchair Mens Doubles Michael Jeremiasz, France, and Maikel Scheffers, Netherlands Wheelchair Womens Doubles Jiske Griffioen and Aniek van Koot (1), Netherlands Wheelchair Quad Doubles Nick Taylor and David Wagner, United States White Sox 5, Tigers 1Detroit Chicago abrhbi abrhbi AJcksn cf4000De Aza cf-lf4110 TrHntr rf3000Bckhm 2b2100 MiCarr 3b0000AlRmrz ss3000 RSantg ph4000A.Dunn dh4000 Fielder 1b4000Konerk 1b4012 VMrtnz dh3121Gillaspi 3b4120 NCstlns lf3010Viciedo lf4121 Infante 2b3000LeGarc cf0000 B.Pena c3000JrDnks rf2110 Iglesias ss3010Phegly c3011 Totals301 41Totals30584 Detroit0000001001 Chicago20030000x5 EScherzer (3). DPDetroit 2, Chicago 1. LOBDetroit 3, Chicago 5. 2BGillaspie 2 (12). HRV.Martinez (12). IPHRERBBSO Detroit Scherzer L,19-3465426 J.Alvarez310024 Benoit 110001 Chicago Sale W,11-12841118 N.Jones 100001 Major League Baseball National League FAVORITELINEUNDERDOGLINE San Diego-110at Philadelphia+100 at Cincinnati-230Chicago+210 Washington-135at New York+125 Atlanta-165at Miami+155 at St. Louis-210Milwaukee+190 at LA-120Arizona+110 at San Fran.-115Colorado+105 American League at Toronto-140Los Angeles+130 at Cleveland-135Kansas City+125 at Baltimore-120New York+110 at Tampa Bay-140 Boston+130 Detroit-155at Chicago+145 Oakland-155at Minnesota+145 at Seattle-160Houston+150 Interleague at Texas-120Pittsburgh+110 NCAA Football Thursday FAVORITE OPEN TODAY O/U UNDERDOG TCU 63(65) at Texas Tech at La. Tech77(52) Tulane at Arkansas St.108(67) Troy Friday at Boise St.2423(52) Air Force Saturday at Rutgers3427(49) E. Michigan Stanford3028(48) at Army at West Virginia3838(56) Georgia St. Louisville712(61) at Kentucky Marshall68(71) at Ohio at Michigan3537(58) Akron at Indiana43(64) Bowling Gr. Virginia Tech77(55) at E. Carolina Maryland77(47) at UConn at Pittsburgh2021(52) New Mexico at Wake Forest33(56) La-Monroe W. Kentucky710(51) at S. Alabama Fresno St.109(70) at Colorado at Florida St.3532(66) Nevada at Nebraska44(69) UCLA Georgia Tech108(56) at Duke at Oregon2026(72) Tennessee at Texas34(62) Mississippi at Southern Cal17 14(43) Boston College Iowa32(45) at Iowa St. Alabama77(63) at Texas A&M N. Illinois2427(61) at Idaho at Auburn76(53) Mississippi St. Washington-x710(60) Illinois at Penn St.35(50) UCF Ball St.23(65) at North Texas at Middle Tenn.36(49) Memphis at Arkansas1922(50) So. Miss. at S. Carolina1113(48) Vanderbilt at Oklahoma2824(47) Tulsa at California OFF OFF (OFF) Ohio St. at Kansas St.3538(52) UMass at S. Florida1012(42) FAU at Rice Pk6(59) Kansas at LSU3837(55) Kent St. Notre Dame2320(52) at Purdue UTEP66(53) at New Mex. St. at Nwestern3531(60) W. Michigan at Arizona2425(64) UTSA at Utah+32(52) Oregon St. at UNLV167(56) C. Michigan at Arizona St.45(55) Wisconsin x-at Chicago Off Key Ohio St. QB questionable NFL Thursday FAVORITE OPEN TODAY O/U UNDERDOG at New England1013(44) N.Y. Jets Sunday at Philadelphia OFF OFF (OFF) San Diego at Baltimore66(43) Cleveland at Houston OFF OFF (OFF) Tennessee at Indianapolis Pk3(42) Miami Carolina23(44) at Buffalo at Atlanta67(47) St. Louis at Green Bay OFF OFF (OFF) Washington at Kansas City22(46) Dallas at Chicago56(41) Minnesota New Orleans33(46) at Tampa Bay DetroitPkPk (47) at Arizona at Oakland35(39) Jacksonville Denver34(55) at N.Y. Giants at Seattle33(44) San Fran. Monday at Cincinnati66(40) Pittsburgh Off Key San Diego played Sept. 9 Philadelphia played Sept. 9 Houston played Sept. 9 Washington played Sept. 9 BASEBALL National League ATLANTA BRAVESRecalled C Christian Bethancourt from Mississippi (SL). FOOTBALL National Football League CHICAGO BEARSSigned OT Jonathan Scott to a one-year contract. Signed QB Jerrod Johnson to the practice squad. Waived TE Kyle Adams. Terminated the practice squad contract of G Derek Dennis. MIAMI DOLPHINSNamed Tom Garfinkel president and CEO. NEW YORK JETSRe-signed QB Brady Quinn. Released LB Danny Lansanah. Signed WR Rahsaan Vaughn to the practice squad. PITTSBURGH STEELERSPlaced LB Larry Foote, C Maurkice Pouncey and RB LaRod Stephens-Howling on the injured reserve list. Signed RB Jonathan Dwyer, C/G Fernando Velasco and K Shayne Graham. HOCKEY National Hockey League CALGARY FLAMESAnnounced the retirement of G Miikka Kiprusoff. MOTOR SPORTS NASCARFined Michael Waltrip Racing $300,000, suspended general manager Ty Norris indefinitely and docked Martin Truex Jr., Clint Bowyer and Brian Vickers 50 points apiece for manipulating the outcome of last weekends race at Richmond. Florida LOTTERY Here are the winning numbers selected Monday in the Florida Lottery: Players should verify winning numbers by calling 850-487-7777 or at winning numbers and payouts: Fantasy 5: 5 10 12 18 31 5-of-5No winners 4-of-5275$555 3-of-58,853$15.50 CASH 3 (early) 4 8 2 CASH 3 (late) 2 1 9 PLAY 4 (early) 7 3 7 0 PLAY 4 (late) 7 1 1 1 FANTASY 5 19 20 23 26 34TUESDAY, SEPTEMBER10, 2013 B3 didntah:209:40. Philadelphias. EAGLESContinued from Page B1 Novak Djokovic Mike Helton PAGE 14 B4TUESDAY, SEPTEMBER10, 2013CITRUSCOUNTY(FL) CHRONICLEFOOTBALL NFL BRIEFSJaguars rule out QB Gabbert against RaidersJACKSONVILLE The Jacksonville Jaguars will be without quarterback Blaine Gabbert against the Oakland Raiders on Sunday. Gabbert sliced open the back of his throwing hand on a defenders facemask in the final minutes of Sundays 28-2 loss to Kansas City. He needed 15 stitches after the game, and coach Gus Bradley said he wont be able to practice this week. Bradley said its pretty severe, adding the threat of infection is the biggest concern. Bradley said some of Gabberts skin is missing from his hand. Chad Henne will start against the Raiders and Ricky Stanzi will serve as the backup. Gabbert completed 16 of 35 passes for 121 yards and two interceptions against the Chiefs, including one Tamba Hali returned for a touchdown in the fourth quarter.NFL falls leave one fan dead, two injuredSAN FRANCISCO. Hayes fell while walking with his brother on a bridge over four lanes of traffic outside the stadium, police said. Off-duty medics and police officers gave him first aid until an ambulance arrived, but authorities said he was declared dead from his injuries. a tunnel leading to Oaklands locker room. One person was taken away on a stretcher, while another left in a wheelchair, witnesses said. One of the people was released after receiving medical attention at the stadium. The other person was treated at the stadium and transported to Methodist Hospital for additional evaluation.Starks, Wallace unhappy despite Miamis winDAVIE The Miami Dolphins are 1-0 for only the second time since 2005, which wasnt the reason for defensive tackle Randy Starks conspicuous finger-waving. Starks, a two-time Pro Bowl player unhappy about stalled contract negotiations, was also miffed he didnt start Miamis season opener at Cleveland. As he celebrated a sack in the closing minutes, the network telecast showed him making an obscene gesture that seemed to be directed at the Dolphins coaches. Starks was.From wire reports COLLEGE FOOTBALL BRIEFSFlorida QB Driskel sprains knee at MiamiGAINESVILLE Florida quarterback Jeff Driskel is recovering from a sprained knee, but team officials said he will be ready for the teams Southeastern Conference opener. Team officials said Driskel suffered a slight sprain in the second quarter of Saturdays 2116 loss at Miami. The junior is keeping weight off his leg during the teams bye week, but should be able to practice before the 18th-ranked Gators (1-1) host Tennessee on Sept. 21. Driskel completed 22 of 33 passes for a careerhigh.SEC honors players of the weekBIRMINGHAM, Ala. Georgia quarterback Aaron Murray, Tennessee defensive back Brian Randolph and LSU return man Odell Beckham Jr. are Southeastern Conference players of the week. Murray was 17 of 23 passing for 309 yards and four touchdowns, including an 85-yarder, in a win over South Carolina. Randolph had two interceptions and eight tackles in Tennessees win over Western Kentucky. Beckham had 331 allpurpose yards in LSUs win over UAB, tied for eighth-most in SEC history. Hes.Okla. St. AD apologizes to Big 12 schoolsSTILLWATER, Okla. With the imminent disclosure by Sports Illustrated of alleged transgressions by Oklahoma States football program, athletic director Mike Holder apologized to his fellow Big 12 schools and vowed to deal with whatever allegations are exposed. Holder said he was apologizing to all of the athletic directors in the conference for whats about to happen, whats about to be said about a member institution. That reflects on everyone. The school said SI told them about the upcoming expose. It has notified the NCAA and launched its own investigation.UCLA copes after death of receiverLOS ANGELES UCLA coach Jim Mora and the 16th-ranked Bruins have returned to football practice for the first time since the death of walk-on receiver Nick Pasquale. The team practiced Monday in preparation for this weekends game at Nebraska. Pasquale was hit by a car and killed while walking in his hometown of San Clemente on Sunday. The 20-year-old receiver played in the final offensive series in UCLAs season-opening victory over Nevada on Aug. 31.From wire reports How the Jets stunned the Bucs Late penalty just one reason for loss Associated PressEAST RUTHERFORD, N.J. Genve got a shot, Jets coach Rex Ryan said. Illyans defense couldnt close it out. Rian Lindell kicked a 37-yard field goal with 34 seconds left, putting Tampa Bay in what appeared to be great position for a last-minute win. Smith and the Jets werent done, though, thanks in large part to Davids boneheaded mistake. I dont. DAVIDS BIG MISTAKE: Trailing 17-15 with no timeouts and the clock ticking away, Smith scrambled for 10 yards to get the ball to the Buccaneers 45 with Folk looking at a risky 63yard attempt. But David inexplicably hit Smith, and the 15-yard penalty put the ball at the 30. I wouldnt have hit him if I didnt think hed. Thats just him playing football, safety Mark Barron said. Im sure in that situation, its hard to stop. Im sure he didnt mean to do it. Were not going to put the game on him. 2. FOLK HERO: After coming out on top in yet another training camp competition, Folk went 3 for 3 on fieldgoal attempts, including the gamewinning 48-yarder. It was his fifth winning field goal since joining the Jets in 2010, but Folk said he was prepared to attempt a 63-yarder if he needed to. Once he saw the penalty flags on David, he knew hedve seen it and I have a feeling were dont: Davids wasnt that one penalty (by David). Freeman blamed some of the offenses early struggles on the helmet audio system failing to work properly. There were a number of times where the microphone went completely dead, Freeman said. I couldnt hear anything. 5. REXS dont score, they dont win. Weve just got to do our job week in and out. Every weeks going to be a challenge. Were going to be up for it, though. Associated PressNew York Jets kicker Nick Folk (2) is congratulated by teammates Sunday on his 48-yard field goal against the Buccaneers in the closing seconds in East Rutherford, N.J. The Jets won 18-17. Alabama ready for A&M rematch Associated PressTUSCALOOSA, Ala. Alabama wide receiver Amari Cooper insists this Texas A&M game is not about revenge. Nick Saban said its, its the only game we lost last year, Cooper said on Monday. To me, its not a revenge thing because if we wanted to get revenge, wed have to play that same team last year with the same team we had last year. Its really not a revenge thing. If you lose a fight with someone, you dont. Its never a part of our game, he said. We tell our players, theres no circumstance where you need to talk to another player, and theres been very little of that with our team. Business-like is the way wed like to approach this game. Its going to be emotional, dont get me wrong. And Im not trying to minimize the importance when I use the term businesslike. People who get emotional sometimes dont make the best decisions. Sabweek after an opening 35 thats not an acceptable excuse for the poor start. You cant be up or down. People talk about emotion all the time, that creates that, he said. That was an emotional win for us against LSU, but that cannot be an excuse not to be ready to play the next one. It cant be acceptable, especially not in our league. McCarron, the Tides quarterback, maintains its just another week except for the fact that Alabama lost the last meeting. Thats last year, he said. Turn the page. I dont really focus on what happened last year no matter if we won or we lost. Im worried about this year and what we need to do to win this year. As for his friendship with Manziel, he doesnt think thats a big deal. The two were roommates at the Manning Passing Academy, where Manziel left early and blamed missing activities on oversleeping. McCarron said the two last spoke around SEC media days in July, but wouldnt say if they had exchanged texts since then. Manziel was suspended for a half against Rice for what Texas A&M called inadvertent violation of NCAA rules involving signing autographs. Were just friends, guys, McCarron said. Yall make this thing a lot bigger than it needs to be. Unlike Manziel, his offthe-field headlines came from his relationship with model and reality TV star Katherine Webb. McCarron said his philosophy is just be myself but said some of the stuff his Texas A&M counterpart gets knocked for is just Johnny being Johnny. Ive never been one to be in the spotlight, he told reporters. Everybody lives their lifestyle different. People criticize him for being himself. Everybodys got their opinion on something. Thats what yall get paid for, opinions. Associated PressTexas A&M quarterback Johnny Manziel (2) celebrates after throwing a touchdown pass Saturday against Sam Houston State in College Station, Texas. The No. 6 Aggies host No. 1 Alabama on Saturday. PAGE 15 he Center for Disease Control announced in 2010 that more than onethird of children and adolescents were overweight or obese, prompting the USDA to create the Healthy Hunger-Free Kids Act. Signed into law Dec. 13, 2010, it sets nutritional standardsfor food served on school campuses to ensure students consume more fruits, vegetables and grains and fewer sugars and fats. Students can choose between four to seven entre options, which Pistone and fellow registered dietician Kelly Niblett have analyzed for nutritional content. Among their requirements: less than 30 percent of calories can come from fat, less than 10 percent can be saturated fat, trans-fats can only occur in trace amounts, and any breads or grains must be at least 51 percent whole grain. Parents can be confident that, when their children come and eat at school, they are provided a nutritious and healthy meal with staying power, Pitrone said, explaining that nutrientdense foods, opposed to those with empty calories, curb hunger. These healthy options also include input from children. Theyre our customers if they wont eat our food, weve done a lousy job, Pistone said. The dieticians host focus groups in school cafeterias, asking groups of about 25 students to sample prospective menu items and then rate them based on color, texture, smell and taste. Foods that earn the kid stamp of approval enter the menu rotation. Through testing, for instance, they learned that students liked a Tyson chicken-based pepperoni as much as the traditional salami-pork-beef variety, which contains twice as much fat. The lean pepperoni is served in a salad with grape tomatoes, low-fat, part-skim mozzarella cheese and cucumber coins. They also discovered that kids love Lunchables, a packaged meal loaded with hidden sodium and sugars. This is a kid favorite, so we decided to create our own healthy version, Niblett said. It includes sliced turkey breast with low-fat American cheese on whole-grain Pepperidge Farm bread, wholegrain Pepperidge Farm goldfish crackers, Motts applesauce and Apple & Eve Fruitables juice. Notice an emphasis on branded items? Thats because children and parents feel more comfortable with products they recognizeHEALTH& LIFE Section CTUESDAY, SEPTEMBER 10, Community:Two Good Soles ends Wednesday/C6 Inside:Wellness Corner/ C2 Ask the Pharmacist/ C3 Ear, Nose & Throat/ C3 Sound Bites/C5 Swing for a Cure High cost of cancer drugs Mark you calendars and join us for the 12th annual Swing for a Cure Golf Tournament on Friday, Nov.15. All money raised during the event will benefit cancer patients and their families here in Citrus County. This years event will be held at Skyview Golf Course at Terra Vista in Citrus Hills. The format will consist of a four-person team scramble, with plans for a shotgun start beginning at 1 p.m. Lunch will be provided during the day, and assorted Citrus County schools fight national epidemic Fare thee well, sloppy Joes on white hamburger buns. Hello, oven-baked chicken with steamed broccoli and strawberry slices. This is not your mamas school food, said Roy Pistone, director of nutrition services for the Citrus County School District. In response to dismal statistics about childhood obesity, the district has overhauled its school menus, removed sugary snacks and drinks from vending machines, and scheduled programs that educate and empower students to make healthier life choices. By Katie Hendrick Chronicle correspondent See OBESITY/ Page C4 In the past few years, there have been a lot of advances in cancer. Every year, the FDA approves more and more new drugs. This helps my patients live not only longer, but also better. These advances are due to many reasons, and one of the important reasons is research by drug companies. The research is costly, and when drug companies research multiple drugs, only a few drugs turn out to be good enough to be See GANDHI/ Page C4 See BENNETT/ Page C4 000FU69 PAGE 16 Developmentally disabled care Judy Brinkley, former area behavior analyst for the Agency for Persons with Disabilities and currently training specialist for the Key Training Center, will speak about behavior issues as experienced by persons with developmental disabilities. Brinkley will speak at 10:30a.m. Wednesday, Sept.11, in the Chet Cole Life Enrichment Center (CCLEC,) at the Key Training Center, 5521 Buster Whitton Way, Lecanto. The presentation is open to the public. Additional meetings may be scheduled for parents with individual concerns or questions. For information, call Stephanie Hopper at 352-344-0288. Foundation makes donation The Debby Hudson Colon Cancer Foundation has made a $3,000 donation to the Colon Cancer Alliances Blue Note Fund. This money will be used to fund grants to needy individuals undergoing treatment to battle colon cancer. Many of the individuals applying to receive these grants have had to give up their jobs to focus on treatment. Whether the grant is used to help pay rent, bills, or even groceries, the flexibility of the Blue Note Fund helps meet those basic needs. Any Florida resident in active treatment for colorectal cancer may apply for a one-time grant of $300. More information may be found at alliance.org/programs.Periphial Arteria Disease month Peripheral Arterial Disease (PAD) narrows leg arteries, reduces blood flow and affects between eight and 12 million people in the U.S.While the majority of people with the condition dont know they have it, they have the same five-year mortality rate as those with breast and colorectal cancer. For information on managing PAD and treating chronic or infected wounds, contact Seven Rivers Rehab & Wound Center at 1669 U.S. 19 S., Crystal River or call 352563-2407.Sunshine Gardens to host bag lunchSunshine Gardens Crystal River will host a brown bag lunch for Alzheimers care and awareness from noon until 2:30p.m. Thursday, Sept.19. There is no admission fee, and the public is invited. Visitors to the Sunshine Gardens memory care community will be given a sack lunch and the opportunity to speak with experts on the topic of Alzheimers and care for loved ones suffering from dementia. Sunshine Gardens Crystal River is at 311 N.E. Fourth Ave. in Crystal River. For information, call 352-563-0235. Partnership helps create jobs The Lighthouse andNAMI Citrus have been successful at providing job opportunities to individuals with mental illnesses.NAMI Citrus has donated funds to help decrease the cost of Citrus County Transit Tickets to Lighthouse participants, who are called members. The partnership has resulted in 10 transportation-disadvantaged members being able to use the Citrus County Transit, which increases their participation in the Lighthouse program and ultimately improves their well-being. In fact, 10 members this year alone have been able to find work in the community. Blood drives scheduled in areaLifeSouth Community Blood Centers: With summer upon us, theres a sharp increase in the need for blood. To find a donor center or a blood drive near you, call 352527-3061. Donors must be at least 17, or 16 with parental permission, weigh a minimum of 110 pounds and be in good health to be eligible to donate. A photo ID is required. Visit..Sunflower Springs to offer eventsIn observance of National Assisted Living Week, Sept.8 to 14, Sunflower Springs will host a series of events developed as a special opportunity to bring together residents, families, employees, volunteers and the surrounding community to celebrate this years theme of Homemade Happiness.Oak Hill clubs slates eventsSPRING HILL Oak Hill Hospital H2U Partners Club events. The hospital is at 11375 Cortez Blvd., Spring Hill, 1.9 miles east of U.S. 19 on State Road 50. Visit OakHillHospital.com. Sept. 11 AARP Driving Class 10 a.m. to 1 p.m. Area hospital offers seminar SPRING YourHealth. Child safety seat inspections 352-563-9939, ext.235.Program offered for caregivers OCALA The USF Health Byrd Alzheimers Institute, Brentwood at Fore Ranch Senior Living Community, and Infinity Home Care are sponsoring a free community program, Alzheimers Disease: What Family Caregivers Need to Know, from 10 a.m. to 3 p.m. Sept. 11, at Brentwood at Fore Ranch Senior Living Community, 4511 S.W. 48th Ave., Ocala. For information, call the office at 352-389-0472 or email substancefree. [email protected] program offeredFirst United Methodist Church of Homosassa is partnering with Gulfcoast North Area Health Education Center to offer a free six-week seminar to help tobacco users quit. First United Church of Homosassa is at 8831 W. Bradshaw St. and the seminar runs from 10 to 11a.m. starting Saturday, Sept.14. To register, call 813-929-1000, ext. 208. Space is limited. Give blood, enjoy free breakfast The next drive of the joint Blood Ministries of Our Lady of Grace Parish and Knights of Columbus Council 6168 is scheduled for 8a.m. to 1p.m. Saturday, Sept.14, at Our Lady of Grace Parish Life Center, 6 Roosevelt Blvd., Beverly Hills.Learn benefits of smoothies Green Smoothie Workshops will be held from 10 a.m. to noon Saturday, Sept. 14, at Whispering Pines Park recreation building. The fee is $20 per workshop. Pre-registration is required and payment is due prior to the class. Registration and payments made be made at the Inverness Government Center, 212 W. Main St., Inverness, FL 34450. Life Care Center to host seminar Life Care Center of Citrus County in Lecanto invites the community to a free seminar by Dr. Walter Choung at noon Monday, Sept.16. Choung, a board-certified orthopedic surgeon affiliated with Nature Coast Orthopaedics, will share Moving Freely, a presentation about advances in orthopedic treatments and joint replacement. RSVP by Thursday, Sept.12, by calling Life Care Center of Citrus County at 352-746-4434. Life Care Center of Citrus County, at 3325 W. Jerwayne Lane, is one of 21 rehabilitation and skilled nursing facilities in Florida operated or managed by Life Care Centers of America.C2TUESDAY, SEPTEMBER10, 2013CITRUSCOUNTY(FL) CHRONICLEHEALTH& LIFE Depression lets deal with the diseaseinsons: Persistent sadness, anxiety, or feelings of emptiness Feelings of hopelessness, guilt, worthlessness or helplessness Irritability and restlessness Loss of interest in activities or hobbies Fatigue and low energy Difficulty concentrating, remembering details, and making decisions Insomnia, early-morning wakefulness, or excessive sleeping Overeating or loss of appetite, accompanied by changes in weight Thoughts of suicide, suicide attempts Aches and pains, headaches, cramps or stomach aches that do not respond to treatment Men and women experience depression differently. Women are more likely to experience feelings of worthlessness, while men are more likely to experience fatigue, insomnia, loss of interest, and anger and irritability, as well as becoming abusive or engaging in reckless behavior.Dr. Carlene Wilson is a boardcertified internist and pediatrician in private practice in Crystal River. Call her at 352563-5070 or visit WellnessCenter.com. Dr. Carlene WilsonWELLNESS CORNER HEALTH NOTES 000FSGG Honoring Survivors and Remembering Loved Ones. Include your loved ones and those touched by cancer in our Chronicle Keepsake Edition on October 1. This special edition will be printed on pink newsprint. *All photos & information must be submitted by Tues., Sept. 24 PER TRIBUTE Will include a photo and short bio, approximately 20 words or less. Call Candy 563-3206 to reserve your space. 000FZDZ PAGE 17 R.I. Discovery (Recovery International) Abraham Low, M.D., self-help systems for mental health depression, obsession, stress, fears, anger. Meetings are 2 to 4p.m. Tuesdays at Crystal River United Methodist Church, 4801 N. Citrus Ave. Call Jackie, 352563-5182. Together We Grow Nar-Anon Family Group 6:45p.m. Wednesdays at Dunnellon Presbyterian Church, 20641 Chestnut St., Room204 in office building, use right-side entrance across from the Memorial Garden; NarAnon is for family and friends of addicts. Find a free local support group in your area: 888-947-8885 or.. Depression and anxiety peer support group meets at 10a.m. Thursdays at Central Ridge Library. 352-212-0632. Al-Anon groups meet regularly in Citrus County. Call 352-697-0497. Inverness AFG: 8p.m. Mondays, Our Lady of Fatima Catholic Church, 550 S. U.S.41. 6 p. Beginners Al-An 352-637-4563. Visit the website:. Citrus Abuse Shelter Association (CASA), 1100 Turner Camp Road, Inverness, hosts a volunteer meeting at 10 a.m. the second Tuesday monthly, September to May. Call 352-344-8111. HIV support group 3 to 4p.m. the second Tuesday monthly at Citrus County Health Department, 3700 Sovereign Path, Lecanto. Open to all affected by HIV. Persons attending remain confidential, testing will be anonymous. Reservation not required. Call 352-5270068, ext.281, if you have any questions.. Look Good ... Feel Better a free twohour Joann Brown at 352-341-7741 Spinal Cord Injury support group, 5p.m. second Thursday monthly in the gym at HealthSouth Rehabilitation Hospital. Call Dee Hardee at 352-5927237. Friends of the Blind 9a.m. to noon the second Friday monthly. Call Butch Shultz at 352-344-2693 for location. Womens Breast Cancer Support Group, 11:30a.m. the second Friday monthly (except July and August), Robert Boissoneault Oncology Institute in the Allen Ridge Medical Center, County Road 491, Lecanto. Light lunch served. Call Judy Bonard at 352-5274389. Mended Hearts of Citrus County, for individuals who have or had cardiovascular disease, as well as caregivers and family members, 10a.m. the second Friday monthly in the Gulf Room in the Historic Citrus High School; parking and transportation available from CMHS parking lot A2. Speaker: Dr. Gustave A. Fonseca, CBC and what it means. Open to the public. Call Millie King, president, at 352-637-5525; or CMHS Cardiovascular Services at 352-344-6416. National Osteoporosis Foundation Citrus County Support Group, 1 p.m. the third Tuesday monthly in the training room at Citrus County Resource Center, 2804 W. Marc Knighton Court, Lecanto. Each month offers a different speaker. This is part of the NOFs Affiliated Support Group Program dedicated to providing accurate, timely information and support to people affected by osteoporosis. Call Janet Croft at 352-249-7874 or email TheBoneZone2010 @yahoo.com. Q:I heard that the FDA issued a safety warning about some types of antibiotics. What can you tell me about this? A: In August 2013, the U.S. Food and Drug Administration (FDA) issued a Drug Safety communication regarding the risk for possible permanent nerve damage from antibacterial fluoroquinolone drugs used to treat some infections. Drug labels and medication guides for all fluoroquinolone antibacterial drugs are now required to better describe this serious side effect called peripheral neuropathy. Peripheral neuropathy is a nerve disorder occurring in the arms or legs. Symptoms include pain, burning, tingling, numbness, weakness, or a change in sensation to light touch, pain or temperature, or the sense of body position. This serious nerve damage potentially caused by fluoroquinolonescan occur at any time during treatment and can last for months to years after the drug is stopped or cause. Patients using fluoroquinolones who develop any of the symptoms of peripheral neuropathy should tell their health care professionals right away. The FDA will continue to evaluate the safety of drugs in the fluoroquinolone class and will communicate with the public again as additional information becomes available. The FDA also provided the following information for patients: If you are taking a fluoroquinolone drug by mouth or by injection, know that it ().Richard P. Hoffmann, Pharm.D., is a retired pharmacist with more than 40 years of experience. He currently serves on the FDA Advisory Committee for Peripheral and Central Nervous System Drugs and is a Research Advocate for the Parkinsons Disease Foundation (PDF).HEALTH& LIFECITRUSCOUNTY(FL) CHRONICLETUESDAY, SEPTEMBER10, 2013 C3 I dont need your help, at least not yet Recently, we have heard a lot of information about the baby boomers and how they are coming of age and retiring. But the reality is, is that many of the baby boomers still have living parents who are probably more in need of help than the baby boomers who are in the early process of retirement. Many of the baby boomers parents are probably living independently now and doing fine. But sooner or later there may be a need for assistance from a family member. Estimates suggest nearly 50 percent of baby boomers who still have a living parent are helping in some way. Help comes in the form of personal help, financial assistance or a combination. Even the baby boomers who are not caring for their parents now realize that day is coming. They also voice some concern about their ability to do that very thing. As in all foreseeable or inevitable problems, planning is the key to addressing that problem successfully. There is a need to prepare. Physically you might not be ready to move into your son or daughters house at this point, but setting up the proper financial preparations are important. Commitment of energy, emotion and time is also very important. A frank discussion of this matter is very important. Here is an example: In most cases, relatives care for an elderly parent. In some instances, baby boomers, whether they are retired or not, will see their daily hours become less free, therefore potentially creating stress and potentially straining the relationship. A recent statistic has suggested that unpaid caregivers such as sons and daughters contribute on an average about $3,000 for their parents care a year. That could be a larger figure and could create some tension between the parent and offspring. Communication is an important issue. Parents, talk to your kids and, kids, talk to your parents and make it easier to approach touchy issues such as money and long-term care and maintaining independence as much as possible. Next is paperwork. Make sure authority to make financial and medical decisions has been established before someone becomes incapacitated. These documents can be done with attorneys and the parent and the child should each have a copy. If you have a situation where you or your loved one is suddenly sick, the last thing you need to do is go to court. It will waste valuable time and money. Look at insurance, as some individuals may be financially able to afford long-term care, which may be a viable option for parents to remain independent, keep their own autonomy and for children to continue their normal lifestyle and not worry about their free time, pay or benefits shrinking and looking ahead to their retirement and worrying even more. Lastly, make sure that if you are assisting your parents or if your parent is taking care of a spouse who is very ill, that you take advantage of all the tax breaks you can. That information is available from the AARP as well as the IRS. Pay attention. Parents, you may not need help now and, children, listen as well. You might not be caring for your elderly parents at this point in time, but this may come sooner than you think. Be prepared.Denis Grillo, D.O., FOCOO, is an ear, nose and throat specialist in Crystal River. Call 352795-0011 or visit Crystal CommunityENT.com. WEEKLY SUPPORT MEETINGS MONTHLY SUPPORT GROUPS Dr. Richard HoffmannASK THE PHARMACIST Dr. Denis GrilloEAR, NOSE & THROAT FDA warns public about antibiotics and nerve damage HEALTH NOTE GUIDELINES. The Chronicle reserves the right to edit submissions. 000G0LF PAGE 18 from the grocery store, Pistone said. In another effort to improve students health, the county has cleaned out school vending machines. Weve pretty much eliminated sugar, said school board chairwoman Ginger Bryant. There are no candy bars or soft drinks, basically just water and some sports drinks. The final strategy includes educating students and parents on why nutrition and exercise matter, so they will practice the same habits at home. Superintendent of Schools Sam Himmel said school newsletters and open houses share tips for maintaining a healthy lifestyle and health department officials regularly give presentations in schools. I feel our food service department has done a phenomenal job making sure our kids eat healthy food on campus, she said. The bottom line, though, is that we cant control what they do when they go home but were doing our best to give them the info to make smart decisions there, too. OBESITYContinued from Page C1 approved by the FDA. The figure often cited by drug manufacturers is about $1.3 billion, which is based on analysis by the Tufts Center for the Study of Drug Development. Is this always true? I do not agree with that. Imatinib was a wonder drug approved by the FDA in 2001. At that time, it revolutionized the way we treat CML or Chronic Myeloid Leukemia. Its cost in 2001 was around $25,000 to $30,000 a year. This included cost for drug development, research and so on. Now in 2013, the same drug costs $92,000. The price is now three to four times the original price. How can you explain that? According to Dr. Hagop Kantarjian, the cost of a typical cancer drug has doubled during the past decade, from around $5,000 per month to more than $10,000 in 2010. He is a professor at MD Anderson Cancer Center in Houston the largest cancer center in the world. In 2012, 12 new cancer drugs were approved by the FDA in the U.S., and that is great, but 11 out of 12 drugs were priced at more than $100,000 a year. This has significantly increased the cost of cancer care in the country. As far as I know, the drug company can price the new drug at whatever cost it decides. There is no regulation that can force the drug company to price it at a certain level based on research or development cost of the drug. Also, all IV drugs that are approved by the FDA have to be covered by Medicare and most of the insurance companies, and so the drug company has to be paid for that. So, free market economy does not play an important role in this. Many drugs cost much less in Canada than in the U.S. this is particularly true for the drugs that are not generic. As far as I know, Obamacare does not address this issue in any meaningful way. ASCOs viewpoint is that all parties medical societies, government agencies, pharmaceutical companies, insurance companies, patient groups and health care policymakers need to make a serious commitment to address this problem together, said Clifford Hudis, M.D., president of ASCO, or American Society of Clinical Oncology4TUESDAY, SEPTEMBER10, 2013CITRUSCOUNTY(FL) CHRONICLE HEALTH& LIFE beverage products will available all over the course. Entry fees are $75 per person, and hole sponsorships will be available for $100. Several fun activities will take place during the round, including a chance to win a Harley-Davidson motorcycle and other prizes with that once-in-alifetime shot. Entry forms are available by calling 352-527-0106, and can also be seen in the Citrus County Chronicle. This years tournament is sponsored by the Robert Boissoneault Oncology Institute, PET/CT Services of Florida, Harley-Davidson of Crystal River, and the Crystal River HOG Chapter 1796. Make plans to join us for a great day of golf and fun, probably more fun than good golf. For details, call 352-527-0106. Why work on Friday, Nov.15, when you could be playing golf, and helping those in your community, by donating your time and money for a Swing for a Cure? This years event will benefit the Citrus Aid Cancer Foundation Inc. Citrus Aid is a nonprofit 501(c)(3) organization, providing quality-of-life help and services to cancer patients, survivors, and their caregivers in Citrus County. Founded in 2013, it is a completely volunteer-based foundation. In 2012, many of the cancer volunteers and members of the Citrus County community recognized that a significant gap existed in quality-of-life services and financial support for a large number of cancer patients undergoing treatment in our area. Lengthy treatment periods often cause many patients to exhaust all available financial help, including their incomes, savings and family support. Meetings with community leaders, cancer survivors, and cancer volunteers helped identify key unmet needs and we launched a range of financial, emotional and referral services to help address them. Most people realize that patients who lack health insurance face tremendous financial problems. However, even those with health insurance can quickly exhaust their financial resources, leading to the possibility of not being able to pursue their cancer therapy as planned. The Citrus Aid Cancer Foundation goes beyond other existing community, regional and national resources to help those in need. We begin by meeting and talking with each patient to gain an understanding of their needs, and then tailor plans to assist them accordingly, if necessary suggestions or questions, contact him at 522 N. Lecanto Highway, Lecanto, FL 34461, or email cjbennett@ rboi.com. GANDHIContinued from Page C1 BENNETTContinued from Page C1 WEEKLY SUPPORT MEETINGS, noon to 1p.m. Sunday, Monday, Wednesday and Friday; 7 to 8p.m. Tuesday, Wednesday and Saturday, YANA Club, 147 N.W. Seventh St., Crystal River. Mens RAW (Recovery at Work) Mens Meeting, 7 to 8p.m. Thursday, Lecanto Church of Christ: 797 S. Rowe Terrace, Lecanto. More Will Be Revealed, 8 to 9p.m. Tuesday,.. Narcotics Anonymous is not affiliated with any of the meeting facilities listed. Call the 24-hour Helpline: 352-508-1604. Information about NA is also available at NatureCoastNA.org. Overeaters Anonymous: 5 p 352-746-501. SO YOU KNOW Find more weekly meetings on Page C3 today. Information relating to professional training or seminars attended by those in the health care industries are considered business briefs, and would appear in the Business Digest listings of Sundays Business section. To submit story ideas for feature sections, call 362-563-5660. Be prepared to leave a message. 000FZ1M Saturday, October 5, 2013 Saturday, October 5, 2013 Saturday, October 5, 2013 Citrus County Parks and Recreation Presents Citrus Springs Community Center 1570 W. Citrus Springs Blvd. Citrus Springs, FL For Advance Ticket Sales & Info 352-465-7007 352-527-7540 Ticket Prices: VIP: $25.00 (includes Up Front, Center Seats plus more) General: $15.00 Limited Seating Cash Bar Doors Open at 6:00pm... Show Starts at 7:00pm 000FO7M. PAGE 19 Knights invite all to installationFor the first time, the Knights of Columbus will open its Fourth Degree Installation to the public. The event will be Saturday at the Knights of Columbus Hall, Norvell Bryant Highway, Lecanto. It will begin with a social hour from 5 to 6 p.m., with the installation to follow. Organizers are planning a gala occasion with its color guard assisting in full regalia. The menu will include supreme salad, roast pork with mashed potatoes and gravy, Italian-style green beans, roll and butter with a hot fudge sundae for dessert. BYOB. Donation is $20. There will be door prizes and dancing to the music of Donna of the Carriers. RSVP by Wednesday. For information, call George Randall at 352341-0135 or Neil Sheehan at 352-637-5395.Reiki group meets in SeptemberReiki Gentle Touch Circle meets from 5:30 to 7:30 p.m. Wednesdays, Sept. 11 and Sept. 25, at the Homosassa Library. Everyone is welcome. For more information, call 352-628-5537.View forgotten flicks ThursdaysThe Forgotten Film Festival will be held at 3 p.m. Thursdays during September at the Unitarian Universalist Fellowship, 7633 N. Florida Ave. (County Road 41), Citrus Springs. Everyone is welcome; a $3 donation is appreciated. Sept. 12: The Kids Are All Right Two children conceived by artificial insemination bring their father into their family life. Cast: Julianne Moore, Annette Bening and Mark Ruffalo. Sept. 19: The Sapphires Its 1968, and four young, talented Australian Aboriginal girls learn about love, friendship and war when their all-girl group, The Sapphires, entertains U.S. troops in Vietnam. Cast: Chris ODowd, Deborah Mailman and Jessica Mauboy.. Cast: Amr Waked, Emily Blunt and Ewan McGregor. For more information, call 352-465-4225 or visit naturecoastuu.org.AARP slates driver coursesFlorida is a mandated state and any insurance company doing business in Florida must give a discount to those completing an AARP Safe Driving Course, open to everyone age 50 and older. Contact your agent for discount amounts. Update yourself to earn a discount and learn about newly enacted motor vehicle and traffic laws. Course fee is $12 for AARP members; $14 for all others. Call the listed instructor to register: Crystal River, Homosassa, Homosassa Springs Monday and Tuesday, Sept. 23 and 24, 9 a.m. to noon at Seventh-day Adventist Church, 5863 W. Cardinal St., Homosassa. Call Arty Appelbaum at 352-382-3272. Tuesday and Wednesday, Sept. 24 and 25, 1 to 4 p.m. at Coastal Region Library, 8619 W. Crystal St., Crystal River. Call Lou Harmin at 352-564-0933. Beverly Hills, Lecanto, Citrus Hills, Citrus Springs Monday and Tuesday, Sept. 23 and 24, 10 a.m. to 1 p.m. at Central Ridge Library, 425 W. Roosevelt Blvd., Beverly Hills. Call Joe Turck at 352-628-6764. Wednesday and Friday, Sept. 11 and 13, 12:30 to 3:30 p.m. at Our Lady Of Grace Catholic Church, 6 Roosevelt Blvd., Beverly Hills. Call Theresa Williams at 352746-9497.FC Garden Club gathers FridayThe first meeting of the season for the Floral City Garden Club will be at 9:30 a.m. Friday at the Community Center, 8370 E. Orange Ave., Floral City. The program for September will be Backyard Habitat by Beverly Overa, Florida master naturalist with the National Wildlife Federation. The program starts at 10 a.m., with a business meeting following at 11 a.m. All meetings are open to the public. For more information, call club president Lona Bassett at 352560-3879.Bonsai club meets in InvernessButtonwood Bonsai Club will meet at 9:30 a.m. Saturday at Key Training Center, 130 Heights St., Inverness. Buttonwood members will bring in their bonsai trees for a workshop in refining design, trimming and/or repotting. The goal is to return the trees at a later meeting to observe the progress. Meetings are open to the public. For more information, call president Bob Eskeitz at 352-5874215. Visit www. buttonwoodbonsai.org.Thinkers to learn about AkashaNew Age Thinkers will meet at 2 p.m. Saturday at Unity Church, 2628 W. Woodview Lane, Lecanto. Rahansia Ben-Mejuri will present Expanding into the Akasha. Rahansia has been practicing and teaching in the healing and yoga arts since the early 1990s and has studied with many masters in mystical, esoteric and Siddhis spiritual powers. Akasha means the basis of everything in the universe or what is, what has been and will be. Everyone is invited. For more information, call Donna at 352-628-3253, or email miss-donna@ tampabay.rr.com, contact Margaret Roddenberry at 352-6973364 or crquin790@ gmail.com. There are only 25 vendor/exhibitor spaces available. Q:I have been wearing dentures since I was a young girl. I am now 78 years old. Over the years, I have had many dentures with the last one being made about seven years ago. Until now it has been fine, but recently, I have developed a sore right in the center of the roof of my mouth that has caused me to change the foods I eat. Despite changing the foods I eat, I still have the sore and the pain related with it. Do you have any suggestions for me? You seem to always have a way to come up with a solution to peoples problems. Thanks for your article every week. I really enjoy reading it. A: What you are describing is very common among denture wearers. Through the years of wearing a denture, bone is lost that results in a looser denture. This can be addressed with denture adhesives, relines or new dentures. Adhesives work effectively to a point; however, there is a point at which the adhesive can no longer be effective due to the amount of space left as a result of the bone loss and tissue shrinkage. I have seen different adhesives be the answer to many denture wearers problems. My suggestion is usually to keep trying different adhesives until you get one that works. If it is beyond the point at which I think an adhesive will work, I usually suggest either a reline or remake of the dentures. Relines are most effective when everything is ideal except for the fit. If other things need to be addressed such as lip support, midlines, the amount of tooth showing with and without smiling, the amount of space between the upper and lower teeth, etc. then a new set of teeth is in order. A new set of teeth can address any issue that presents itself within a certain amount of limits. I usually ask the patient to write down a list of things they would like to see with their new teeth. If I see a solution for each item, I tell them so. If, on the other hand, there are things on the list that cannot be addressed I tell the patient that, as well, and make sure that we both have a good understanding on the expectations of their new set of teeth. I think I know exactly what is happening in your situation. In the very center of the palate running from front to back is an area of bone that stays relatively constant in relation to the surrounding bone. Since it has been seven years since your teeth were made, there is likely a significant amount of bone loss on either side of this line causing the denture to pivot side to side using that center line as the pivot point. In a situation like this, it is unlikely adhesives will work to stabilize your denture. You will either need a reline or a remake of your dentures. As I mentioned before, there is a long list of reasons a new set of teeth will make sense. I suggest you go to your dentist and see what he or she says. You may already have a good feeling for what you need based on what I wrote here. My gut feeling is you would benefit from a new set of teeth, but might get away with a reline as long as the only issue you see as needing to be addressed is the current sores you are experiencing.Dr. Frank Vascimini is a dentist practicing in Homosassa. Send your questions to 4805 S. Suncoast Blvd., Homosassa, FL 34446 or email them to him at info@Masterpiece DentalStudio.com.HEALTH& LIFE/COMMUNITYCITRUSCOUNTY(FL) CHRONICLETUESDAY, SEPTEMBER10, 2013 C5 Denture wearer develops sore spot Dr. Frank VasciminiSOUND BITES COMMUNITY NEWS NOTES-Aide volunteer. Or, call John Clarke at 352-270-8162, or email [email protected]. Tax techs sought for seasonFree annual AARP program needs volunteers 000FX98 4805 S. Suncoast Blvd. Homosassa, FL 34446 352-628-0012 Always Welcoming New Patients FRANK J. VASCMINI, DDS B.K. Patel, M.D Internal Medicine Geriatrics Family & General Medicine Internal Medicine Intensive Care (Hospital) Long-Term Care (Nursing Home) Homosassa 4363 S. Suncoast Blvd. Homosassa Springs (352) 503-2011 Mon.-Fri. 8:30am-4:30pm, Saturday by appt. only 8:00am-11:00am H. Khan, M.D. Board Certified Family Medicine Adrian Saenz, P.A. Stephanie Gomes, P.A. Joseph Starnes, P.A. 000FYM4 000E4ZX Dr. Pablo Figueroa Se Habla Espaol 2222 Highway 44 W., Inverness Caring is my Profession Call for an Appointment 352-860-0633 [email protected] Accepting New Patients Serving Citrus County Since 1993 WE ACCEPT Medicare Aetna Humana United Healthcare Coventry Medicare Blue Cross/ Blue Shield Cigna Universal And Other Major Insurances 000G0I9 PAGE PFLAG to meet in LecantoPFLAG Lecanto (Parents, Family and Friends of Lesbians and Gays) will meets from 7 to 9 p.m. today. This month the group will review and discuss the video, Marc Adams, The Preachers Son, as well as open the floor for conversation about any topics of interest to participants. For more information, call 352-419-2738 or email [email protected] steers now for fairFuture Farmers of America and 4-H members are reminded that steer registrations.Free show set at centerCitrus County Parks and Recreation will present a free concert at 2 p.m. Sunday, Sept. 15, at the Central Ridge Community Center at Beverly Hills. Doors open at 1:30 p.m. Come enjoy Sally Smith and Friends, who will be onstage with the Furman Hiltert Big Band, the vocal stylings of Drema Leonard and Liz Antony, Roy Hobskins on guitar and the Tom Leonard Combo. The Central Ridge Community Center is at 77 Civic Circle and is open to all residents of Citrus County. It has a complete fitness center, billiards room, swimming pool, rental facilities and more. Show information and memberships are available by calling 352-746-4882.County Council to conveneThe Citrus County Council will meet at 9 a.m. Wednesday at the Beverly Hills Lions Club, 72 Civic Circle, Beverly Hills. Doors open at 8:30 a.m. The September guest speaker is Patrick Simon, director of Research & Accountability with the Citrus County School District. The by-laws will be voted on during this meeting, also. The public is welcome and refreshments will be available. For more information, email [email protected] Hills Women to gatherThe Citrus Hills Womens Clubs first fall luncheon will be at 11:30 a.m. Wednesday at the Hampton Room of Citrus Hills Golf & Country Club. Members are welcome to bring a guest. Call 352726-5902. The club is a social and charitable organization for making friends, sharing fun events and providing community service. Membership is open to all women residents of the former and current Villages of Citrus Hills. For membership information and an application, call 352-270-8909. Computer group to meetCrystal River Computer Users Group will meet at 6 p.m. Wednesday, Sept. 11, at 4958 Crystal Oaks Blvd., the Crystal Oaks Club House off State Road 44, Lecanto. The presentation by Sabrina Watson will be about Facebook. Learn more about Facebook connections and how it brings friends and old acquaintances together, and helps businesses build a rapport with customers. Watson will focus on how to navigate Facebook privacy options and settings. Coffee and refreshments will be served at 6 p.m., with a short meeting at 6:30 p.m., followed by the presentation. The meetings are open and free to everyone. For more information, visit. COMMUNITYPage C6TUESDAY, SEPTEMBER 10, 2013 CITRUSCOUNTYCHRONICLE Precious Paws ADOPTABLES Fancy felines Special to the ChronicleCats and kittens in a variety of colors each with a unique personality are waiting to move into their own loving home. A few of the young adults are a little more sedate than our fanciful fun-loving kittens, but all are loving, well socialized and delightful. Most enjoy the company of other animals, but one or two would like to be the whole show. Center at Gretas Touch on U.S. 41 is open 10 a.m. to 2 p.m. Saturdays. View adoptable pets at or call 352-726-4700. In reflection, let me take you back in time to 1960 when Tom Howard and I were arriving in Crystal River from Huntington, W.Va., fresh out of Marshall College in 1958, and married in December of 1959. My first teaching position was at a rural elementary school. I taught a combination class of thirdand fourth-grade students. It was the principals first year, also, and his daughter, Sally, was in my class. Due to frequent layoffs from the International Nickel Plant where Tom was employed, through a buddy of Tom, we learned that Citrus County and Crystal River, in particular, held out promise for Tom. Classrooms were beginning to become overcrowded with students, and additional teachers were needed due to the Florida Power Boom Days. The countywide population was 8,000; there was one traffic light, U.S. 19 was two-laned and Dr. Sam Miller was our lone physician in Crystal River. Kings Bays crystalclear water was so inviting at the Legion Beach (Hunters Spring). Jones Truck Stop (A.J.s) and the Oyster Bar (Charlies Fish House) and the Green Tavern were thriving restaurants. In Crystal River, one policeman was our law enforcement. On Citrus Avenue we shopped at Maudell Hays This N That Store, Kennedys Hardware Store and later Daves Fashions. Mrs. Yeomans Movie Theater offered entertainment. Service organizations included the Lions Club and the Womans Club. The two groups frequent fish fries at the beach saw the Lions frying the fish and the women providing the cakes and pies. I recall that we placed a glass jar on the dessert table for donations for our baked goods. The Coburn and Sparkmans IGA families provided our two grocery stores in Crystal River, and Ralph Rooks had a barbershop on Citrus Avenue. Sara Lyons invited us to join the Methodist Church and I began teaching the third grade at Crystal River Primary School. Ray McCollough was the principal, and his son, a developmentally challenged child, was in my class. Thus began my 40-plus years of volunteer service at the Key Training Center as a member of the Board of Directors with its implementation and ongoing provision of dignity, love and respect to its clients and their families. Sadly, Toms dream of permanent employment never materialized. At Huntington Trade School, he had enrolled after serving his country in the Marine Corps and was a trained electrician. Unable to find work in his field, he accepted whatever he could find, all part-time, temporary positions with Mosquito Control, Paul Hewitts Standard Oil station, the Coburns Kwik Way Grocery Store, he built a hangar for the airport, a seawall in Homosassa, and repaired films for Jack McGowans commercial and public relations films like Ship and Shore and Silver Springs. After three disappointing years, Tom returned to his parents home in Huntington and later was able to find work in Dayton, Ohio, with General Motors through the help of a friend hed met in Crystal River, whod located there. It was difficult to leave me and his 3-year-old daughter, Sue, behind. Im sure, in his mind, he did not want to ask me to leave my teaching position a second time. Tom passed away Aug. 24 in Interlachen at age 76, having relocated there 30 years ago following the passing of his second wife, Linda, to cancer. He had found employment at the former Florida Furniture Industries and was recently retired from Walmart in nearby Palatka. Tom had found peace and contentment in his beloved Florida in Interlachen 30 years ago, where he was a member of the First Congregational Church Choir directed by his loving companion of the past 21 years, Barbara Tull. In addition to his daughter Sue Howard of Crystal River, he is survived by his 96-year-old mother, a sister, three other children and three grandchildren. Services were Aug. 29 in Interlachen, followed by interment with military honors at the Palatka Memorial Gardens Cemetery.Ruth Levins participates in a variety of projects around the community. Let her know about your groups upcoming activities by writing to P.O. Box 803, Crystal River, FL 34423. Remembering past love, past time Ruth LevinsAROUND THE COMMUNITY Special to the ChronicleNature Coast Volunteer Center of Citrus County and Retired and Senior Volunteer Program (RSVP) are sponsoring the Two Good Soles drive, collecting new shoes and socks for children in need through Wednesday. This marks the 12th anniversary of the 9/11 attacks and Sept. 11 has been designated a National Day of Service and Remembrance. Participate in the remembrance of 9/11 by making a donation of new shoes and socks at donation boxes throughout the county. Collection items will benefit Citrus Abuse Shelter, Citrus County District Student Services, Citrus County Family Resource Center, Citrus United Basket, Daystar Life Center, SPOT Family Center, The Path of Citrus County and Mission in Citrus Shelter. For the locations of boxes accepting donations, call 352-249-1275. New shoes needed, too, for children; effort ends Wednesday Special to the ChronicleRecently, the assembly team of St. Timothys Lutheran Church and Suncoast Schools FCU, gathered for a picture to kick off its Citrus County Blessings program for the 2013-14 school year and display the donation made to the Blessings program by Suncoast Schools FCU Foundation of $20,000. Blessings is the program that provides weekend nourishment to children on weekends when they are not in school and able to participate in the federally funded meal program. Suncoast Schools FCU Foundation has been in partnership with Citrus County Harvest since its began its Blessings program in 2009. From left, standing, are: Laurie Lindsey (St. Timothys Lutheran Church), Shirley Ormsbee (St. Timothys Lutheran Church), Tara Garcia (Citrus County Harvest Board member and Suncoast Schools FCU member financial associate), Jennifer Lucena (Suncoast Schools FCU Member financial associate), Tracy Caron (Suncoast Schools FCU employee), David White (manager, Suncoast Schools FCU), Brandy Strickland (Suncoast Schools FCU employee) and Laura Scales (Suncoast Schools FCU employee). Kneeling, from left, are: Marcia Webb (St. Timothys Lutheran Church), Jim Webb (St. Timothys Lutheran Church), Debbie Lattin (director, Citrus County Blessings), Chelsea Burkhart (Suncoast Schools FCU employee) and Katrina Rexin (Suncoast Schools FCU employee). Citrus County Blessings PAGE 21 TUESDAY, SEPTEMBER10, 2013 C7CITRUSCOUNTY(FL) CHRONICLEENTERTAINMENT PHILLIPALDER Newspaper Enterprise Assn.Edwin Percy Whipple, a 19th-century essayist, wrote, Talent jogs to conclusions to which Genius takes giant leaps. That is fine as long as Genius isnt missing the mark, which can happen. Slowly reaching the right answer is much better than jumping to the wrong conclusion. In todays deal, South is in three no-trump. West leads his fourth would.) However, here, if Genius immediately takes his three hearts tricks ending on the board and plays a diamond to his jack, he goes down. The talented player cashes his diamond ace first, just in case West started with a singleton queen. You never know! (NGC) 109 65 109 44 53 D ooms d ay C as tl e D ooms d ay C as tl e D ooms d ay C as tl e S na k e Salvation S na k e Salvation D ooms d ay C as tl e (N)S na k e Salvation S na k e Salvation (NICK) 28 36 28 35 25Sponge.Sponge.HauntedSponge.Full HseFull HseFull HseFull HseNannyNannyFriendsFriends (OWN) 103 62 103 25 Best OprahThe Haves, NotsThe Haves, NotsThe Haves, NotsThe Haves, NotsThe Haves, Nots (OXY) 44 123 BGC: Miami BGC: Miami BGC: Miami My Big Fat RevengeBGC: Miami My Big Fat Revenge (SHOW) 340 241 340 4 Venus and Serena (2012) The Twilight Saga: Breaking Dawn Part 1 (2011) Kristen Stewart. PG-13 Saw (2004, Horror) Cary Elwes, Danny Glover. (In Stereo) R Web Therapy Dexter MA (SPEED) 732 112 732 FOX Football Daily (N) (Live) World Poker Tour: Season 11 Mission October Fox 1 on 1Being (N) Football FOX Sports Live (N) (Live) (SPIKE) 37 43 37 27 36Ink Master Baby BeatDown Ink Master Animal Instinct Ink Master Allies become enemies. PG Ink Master Baby Dont Go Ink Master Skulls and Villains (N) PG Tattoo Night. Tattoo Night. (STARZ) 370 271 370 Rush Hour Austin Powers: International Man of Mystery (1997) The White Queen The Storm MA The White Queen (In Stereo) MA Zero Dark Thirty (2012) Jessica Chastain. (In Stereo) R (SUN) 36 31 36 Bolts Bash Rays Live! (N) MLB Baseball Boston Red Sox at Tampa Bay Rays. From Tropicana Field in St. Petersburg, Fla. (N) (Live) Rays Live! (N) Inside the Rays FOX Sports Live (N) (Live) (SYFY) 31 59 31 26 29 The Bourne Ultimatum (2007, Action) Matt Damon, Julia Stiles. PG-13 Face Off Artists explore tunnels. Face Off Mother Earth Goddess (N) Heroes of Cosplay Planet Comicon (N) Face Off Mother Earth Goddess (TBS) 49 23 49 16 19SeinfeldSeinfeldSeinfeldSeinfeldFam. GuyFam. GuyBig BangBig BangBig BangBig BangConan (N) (TCM) 169 53 169 30 35 The Thomas Crown Affair (1968, Adventure) Steve McQueen. R Nanook of the North (1922) The Thief of Bagdad (1924, Fantasy) Douglas Fairbanks. Silent. A thief must prove himself worthy of a princess. NR (TDC) 53 34 53 24 26Amish Mafia (In Stereo) Amish Mafia (In Stereo) Amish Mafia (In Stereo) Amish Mafia (N) (In Stereo) Tickle (N) Porter Ridge Amish Mafia (In Stereo) (TLC) 50 46 50 29 30CoupleCoupleCoupleCoupleWho Do You Who Do You CoupleCoupleWho Do You (TMC) 350 261 350 Man on a Ledge (2012, Suspense) Sam Worthington. (In Stereo) PG-13 The Darkest Hour (2011) Emile Hirsch. PG-13 Paycheck (2003, Science Fiction) Ben Affleck. (In Stereo) PG-13 Juon (TNT) 48 33 48 31 34Rizzoli & Isles Rizzoli & Isles Built for Speed Rizzoli & Isles Rizzoli & Isles Partners in Crime (N) Cold Justice Mother (N) Rizzoli & Isles Partners in Crime (TOON) 38 58 38 33 Total Dra.Total Dra.TotalGumballUncle AdvenKing/HillKing/HillAmericanAmericanFam. GuyFam. Guy (TRAV) 9 54 9 44Bizarre FoodsFoodFoodBizarre FoodsAirport Airport Extreme HouseboatsExtreme Houseboats (truTV) 25 55 25 98 55PawnPawnPawnPawnPawnPawnPawnPawnPawnPawnHardcoreHardcore (TVL) 32 49 32 34 24M*A*S*HM*A*S*HBoston Legal PGBoston Legal RaymondRaymondRaymondRaymondRaymondKing (USA) 47 32 47 17 18Law & Order: Special Victims Unit Law & Order: Special Victims Unit Law & Order: Special Victims Unit Covert Affairs Annie must stop Teo. Suits Bad Faith (N) (DVS) Graceland Happy Endings (WE) 117 69 117 Roseanne PG Roseanne PG Roseanne PG Roseanne PG Coyote Ugly (2000) Piper Perabo. A struggling songwriter cuts loose in a rowdy New York bar. PG-13 Coyote Ugly (2000) Piper Perabo, Adam Garcia. PG-13 (WGN-A) 18 18 18 18 20Funny Home VideosDumb and Dumberer: When HarryParksParksParksParksMotherRules Dear Annie: I am a 34-year-old wife and mother of four. My husband is 44 and drinks on a daily basis. I dont mind a few cans of beer when he gets home. However, he drinks at least a six-pack, usually more, every day after work. Im tired of arguing with him about his drinking. He always responds, At least I drink at home and not at the bar. My husband also refuses to get an annual physical exam. He never sees a doctor or a dentist, even if he is sick. Im really worried about his health. I want him to live long enough for our children to reach adulthood. I have asked my husband whether he will let me take him for a physical. If the doctor says he is healthy, my heart will be at peace. I think he is being selfish, only thinking of himself. He talks so much of pride. But he doesnt consider what would happen to his family if anything were to happen to him. My youngest child is only 4. How do I get him to cut back on his drinking and see a doctor? Worried Wife D ear Worried: We dont husbands. D ear having their own accommodations would be ideal. How would you suggest we handle this? We dont want to hurt anyones feelings, but we are not very excited about these yearly winter visitors, and I feel used. N. in Arizona D ear N.: Unless you tell these people they cannot stay with you, they will continue to impose. Simply say, It would be wonderful to see you. Unfortunately, we arent up to hosting guests. Here are the names of local hotels. Let us know when you get settled. If anyone ends up at your condo, dont be reluctant to ask them to pitch in with the groceries, cooking and cleaning. You did not, after all, invite them. Perhaps they will decide it isnt quite so appealing as a vacation spot. At the very least, you wont be doing all of the work. D ear Annie: I read the response from Fran, who took exception to your response to Perplexed, saying that kids shouldnt have to call their parents every day, even if it only takes five minutes. I am a 61-year-old male. My grandmother used to live a block away. When I was a child, my mother would go see her every evening even if it was only for five minutes. One evening, I asked my mother why she went every single evening to see Grandma. She simply looked at me and said, Because tomorrow I may never get to talk to her again. I understood exactly what she meant. P.S.: Grandma passed away five years later. Loving D ad in PennsylvaniaAnn. ANNIES MAILBOX Bridge (Answers tomorrow) YUCKYABIDE HUNGRYSCROLL Yesterdays Jumbles: Answer: The shrubs needed trimming because they were too BUSHY Now arrange the circled letters to form the surprise answer, as suggested by the above cartoon.THAT SCRAMBLED WORD GAMEby David L. Hoyt and Jeff Knurek Unscramble these four Jumbles, one letter to each square, to form four ordinary words. NILFT TRUBS SLEIYA PEOOSP Tribune Content Agency, LLC All Rights Reserved. Jumble puzzle magazines available at pennydellpuzzles.com/jumblemags Print your answer here: TUESDAY EVENING SEPTEMBER 10,Million SecondAmericas Got Talent (N) PG NewsJay Leno # (WEDU) PBS 3 3 14 6World News Nightly Business PBS NewsHour (N) (In Stereo) American Masters Tennis champion Billie Jean King. (N) PG Frontline The Suicide Plan Assisted suicide in the U.S. MA 3 Steps to Incredible Health!-Joel % (WUFT) PBS 5 5 5 41JournalBusinessPBS NewsHour (N)American Masters (N) PGFrontline (In Stereo) MA TBAT. Smiley ( (WFLA) NBC 8 8 8 8 8NewsNightly NewsNewsChannel 8 Entertainment Ton.The Million Second Quiz (N) PG Americas Got Talent The top 12 finalists perform. (N) (In Stereo Live) PG NewsJay Leno ) (WFTV) ABC 20 20 20 NewsWorld News Jeopardy! G Wheel of Fortune Shark Tank PG (DVS) The Bachelor (In Stereo) 20/20 Crazy, Stupid Luck (N) Eyewit. News Jimmy Kimmel (WTSP) CBS 10 10 10 10 1010 News, 6pm (N) Evening News Wheel of Fortune Jeopardy! G NCIS Double Blind (DVS) NCIS: Los Angeles Parley Person of Interest Zero Day 10 News, 11pm (N) Letterman ` (WTVT) FOX 13 13 13 13FOX13 6:00 News (N) (In Stereo) TMZ (N) PG omg! Insider (N) So You Think You Can Dance Winner Chosen The winner is chosen. FOX13 10:00 News (N) (In Stereo) NewsAccess Hollywd 4 (WCJB) ABC 11 11 4 NewsABC EntInside Ed.Shark Tank PGThe Bachelor 20/20 (N) Shark Tank PG (DVS) The Bachelor (In Stereo) 20/20 Crazy, Stupid Luck House House Ugly Cops Rel.Cops Rel.SeinfeldPaid H (WACX) TBN 21 21 PresentThe 700 Club (N) GBabersPaidMannaPaidPaidPaidStudioHealingMinistries L (WTOG) CW 4 4 4 12 12King of Queens King of Queens Two and Half Men Two and Half Men Whose Line Is It? Whose Line Is It? Capture Call of the Wild (N) (In Stereo)EngagementEngagementThe Arsenio Hall Show O (WYKE) FAM 16 16 16 15Animal Court Citrus Today County Court CancerEvery Minute Beverly Hillbillies Crook & Chase (In Stereo) G Cold Squad (DVS) Eye for an Eye Fam Team S (WOGX) FOX 13 7 7SimpsonsSimpsonsBig BangBig BangSo You Think You Can Dance Criminal Minds PGCriminal Minds PGCriminal Minds PGCriminal Minds Criminal Minds Flashpoint (A&E) 54 48 54 25 27Storage Wars PG Storage Wars PG Storage Wars PG Storage Wars PG Storage Wars Storage Wars PG StorageTexas StorageTexas Barter Kings (N) PG Barter Kings PG (AMC) 55 64 55 Daylight (1996) PG-13 The Lord of the Rings: The Two Towers (2002, Fantasy) Elijah Wood, Ian McKellen. Members of a fellowship battle evil Sauron and his pawns. PG-13 Lord of the Rings (ANI) 52 35 52 19 21River Monsters: Unhooked PG Saved (In Stereo) PGHero Dogs of 9/11 (N) (In Stereo) PG Glory Hounds Military dogs and their handlers. (In Stereo) PG Hero Dogs of 9/11 (In Stereo) PG (BET) 96 19 96 106 & Park: BETs Top 10 Live Top 10 Countdown (N) PG HusbandsHusbandsThe Game Love & Basketball (2000) Sanaa Lathan. A passion for the game leads to love for two best friends. PG-13 (BRAVO) 254 51 254 Housewives/NJTamra--WeddingInterior TherapyInterior TherapyMillion Dollar LAHappensProperty RV (2006) Robin Williams. A dysfunctional family goes on vacation. PG Fat Cops PG Fat Cops PG Cops Reloaded Cops Reloaded (CNBC) 43 42 43 Mad Money (N)The Kudlow ReportAmerican GreedMoney Talks Austin & Ally G Austin & Ally G Camp Rock 2: The Final Jam (2010) Demi Lovato. (In Stereo) NR Austin & Ally G Shake It Up! G GoodCharlie Dog With a Blog G (ESPN) 33 27 33 21 17SportsCenter (N)U.S. Soccer FIFA World Cup Qualifying SportsCenter (N)SportsCenter (N) (ESPN2) 34 28 34 43 49ESPN FC (N) (Live)NFL Live (N) World Series World Series Baseball Tonight (N)Olbermann (N) (Live) (EWTN) 95 70 95 48FaithM. TeresaDaily Mass Mother Angelica LiveReligiousRosaryThreshold of HopeThoughtWomen (FAM) 29 52 29 20 28The Vineyard (In Stereo) The Vineyard Player Beware The Vineyard Cat Fight The Vineyard Secrets Out The Vineyard For Love or Vineyard The 700 Club (In Stereo) PG (FLIX) 118 170 Earth Girls Are Easy (1989) Geena Davis. (In Stereo) PG Boat Trip (2003) Cuba Gooding Jr. (In Stereo) R Chairman of the Board (1998) Carrot Top. PG-13Monty Pythons The Meaning of Life R (FNC) 44 37 44 32Special ReportFOX Report The OReilly FactorHannity (N) Greta Van SusterenThe OReilly Factor (FOOD) 26 56 26 Chopped G Chopped Chopped G Chopped Chopped (N) GCutthroat Kitchen G (FSNFL) 35 39 35 UFCMarlinsMLB Baseball Atlanta Braves at Miami Marlins. (N) (Live) MarlinsUFCFOX Sports Live (N) (FX) 30 60 30 51Two and Half Men Two and Half Men X-Men: First Class (2011, Action) James McAvoy. The early years of Charles Xavier and Erik Lehnsherr. PG-13 Sons of Anarchy Jax cant escape SAMCROs sins. MA Sons of Anarchy (GOLF) 727 67 727 CentralPGA TourGolfLearningGolfs Greatest Rounds (N) CentralGolf (HALL) 59 68 59 45 54Little House on the Prairie PG Little House on the Prairie PG I Want to Marry Ryan Banks (2004, Romance-Comedy) Jason Priestley. Frasier G Frasier PGFrasier G Frasier G (HBO) 302 201 302 2 2 In Time (2011) PG-13 Game Change (2012, Docudrama) Julianne Moore, Ed Harris. (In Stereo) Argo (2012, Historical Drama) Ben Affleck, Alan Arkin. (In Stereo) R The Newsroom (In Stereo) MA (HBO2) 303 202 303 Cinema Verite (2011) Diane Lane. (In Stereo) NR Beasts of the Southern Wild (2012) PG-13 The Newsroom (In Stereo) MA Anna Karenina (2012, Romance) Keira Knightley. (In Stereo) R (HGTV) 23 57 23 42 52Extreme Homes GHunt IntlHuntersPropertyPropertyPropertyPropertyHuntersHunt IntlIncome Property G (HIST) 51 25 51 32 42Modern Marvels Jet truck. G Pawn Stars PG Pawn Stars PG Pawn Stars PG Pawn Stars PG Top Gear (N) PG Were the Fugawis Were the Fugawis Top Gear PG (LIFE) 24 38 24 31Dance Moms Diva Las Vegas PG Dance Moms PG Dance Moms The Big, Not So, Easy Abbys Ultimate Dance Competition Double Divas Double Divas Double Divas Double Divas (LMN) 50 119 Nora Roberts High Noon (2009) Emilie de Ravin. (In Stereo) NR Caught in the Act (2004, Drama) Lauren Holly, Max Martini. (In Stereo) Special Delivery (2008, Comedy-Drama) Lisa Edelstein. (In Stereo) NR (MAX) 320 221 320 3 3 Cowboys & Aliens (2011) Daniel Craig, Harrison Ford. (In Stereo) NR Dragonfly (2002, Suspense) Kevin Costner, Ron Rifkin. (In Stereo) PG-13 In Their Skin (2012) Selma Blair. NR Strike Back 8TUESDAY, SEPTEMBER10, 2013CITRUSCOUNTY(FL) CHRONICLECOMICS Pickles Crystal River Mall 9; 564-6864 Riddick (R) 1:15 p.m., 4:15 p.m., 7:30 p.m. No passes. One Direction: This Is Us (PG) 1:30 p.m. One Direction: This Is Us In 3D. (PG) 4:30 p.m. Youre Next (R) 1:25 p.m., 4:40 p.m., 7:20 p.m. The Mortal Instruments: City of Bones (PG-13) 4:05 p.m. Jobs (PG-13) 1:05 p.m., 7:05 p.m. Lee Daniels The Butler (PG-13) 1 p.m., 4 p.m., 7 p.m. Planes (PG) 1:45 p.m., 7:10 p.m. Planes In 3D. (PG) 4:45 p.m. Percy Jackson: Sea of Monsters (PG) 1:55 p.m., 7:40 p.m. Percy Jackson: Sea of Monsters In 3D. (PG) 4:55 p.m. Were the Millers (R) 1:40 p.m., 4:20 p.m., 7:45 p.m. This is the End (R) 2 p.m., 4:50 p.m., 7:50 p.m. Citrus Cinemas 6 Inverness; 637-3377 Riddick (R) 12:50 p.m., 1:30 p.m., 3:50 p.m., 7:05 p.m., 7:30 p.m. No passes. One Direction: This Is Us (PG) 4:40 p.m. One Direction: This Is Us In 3D. (PG) 1:40 p.m., 7:40 p.m. No passes. The Mortal Instruments: City of Bones (PG-13) 1 p.m., 4:10 p.m., 7:10 p.m. Lee Daniels The Butler (PG-13) 12:45 p.m., 3:45 p.m., 7 p.m. Elysium (R) 4:30 p.m. Were the Millers (R) 1:20 p.m., 4:20 p.m., 7:20 p HSZ WCYK TZK KFZ VTBO FBVVZS KH HSZ ... KH YZSYZ UBKFZU KFBS ASHG, KH JBKFZU UBKFZU KFBS LWWZXLBKZTO CSXZUYKBSX. ZXGBUX BTIZZPrevious Solution: In America, with all of its evils and faults, you can still reach through the forest and see the sun. Dick Gregory (c) 2013 by NEA, Inc., dist. by Universal Uclick9-10 PAGE 23 HEALTH& LIFECITRUSCOUNTY(FL) CHRONICLETUESDAY, SEPTEMBER10, 2013 C9 SUPPORT ORGANIZATIONS Alzheimers AssociationFlorida Gulf Coast Chapter affiliated support groups are for family members, caregivers and others interested in learning more about Alzheimers disease. Meetings are open to everyone and free of charge. To arrange free respite care so you can attend a group, call the Hernando office at 352-688-4537 or 800-772-8672. Website: Live chat every Wednesday at noon. Message boards open at all times to post questions and leave replies. Join the Alzheimers Association online community at message_boards_lwa.asp. Crystal River Health & Rehabilitation Center, 136 N.E. 12th Ave., Crystal River; 2p.m. third Saturday monthly. Call Christina DiPiazza at 352-795-5044.-683-9009. Free respite care provided, call to reserve. First United Methodist Church of Homosassa has several support groups that run on a monthly basis. All groups are open to the public and free of charge, and meet at 1 p.m. in Room 203 in the Administration Building: First Monday: diabetic support group. Second Monday: Alzheimers/dementia caregivers support group. Fourth Monday: stroke survivors support group. Memory Lane Respite offered weekly for people with Alzheimers/dementia. Anyone bringing a loved one for the first time is encouraged to come early to fill out information forms. Call 352-628-40274 352-5 352-229.FUYE 000FUYL Lost 3 year old male cat.He is orange tabby color. Lives on W. Holiday St in Homosassa. Last seen 9-6 am. 352-601-6202. reward. 2 FREE KITTENS 4 mos old, no shots 1 gray, 1 black & white 352-364-3570 Todays New Ads Honda2001, Goldwing, trike 23k mi. Hot Rod Yellow asking$18,500. (352) 228-2512 JEFFS CLEANUP/HAULING Clean outs/ Dump Runs Brush Removal Lic. 352-584-5374 Lake Pananosoffke Ready for home, septic, pwr, carport, 2 sheds & fenced bk yard $19,900 obo 352-444-2272 Lost 3 year old male cat.He is orange tabby color. Lives on W. Holiday St in Homosassa. Last seen 9-6 am. 352-601-6202. reward. Missing BLACK CAT. Inverness in the area of Arbor and Tom streets. His 5 year old owner is very, very sad and worried. Hunter is about 10 months old with yellow eyes and a small white area on his neck. Please call if you have seen him. REWARD 419-7262 PVC 1/2 WITH FITTINGS Approx. 300of 1/2 PVC with shut offs, sprinklers and fittings. $30 352-563-1519 Singing Forest 46 2 Bed 1 Bath. Mobil Home, fixer upper, $6000. 352-344-1365 Solid Wood Dining Room Table w/6 chairs, 58 long w/2 self storing leaves w/ 12 ea. Antique White $125. (352) 489-5421 Whirlpool Washer & Dryer, matching pair 4 yrs old large capacity, multi-cycle, excellent condition $400. obo Homosssa (352) 503-7821 Todays New Ads BROYHILLSOFAPerfect condition, like new. 3-seat sofa, includes 4 cushions and arm covers. Off-white with floral pattern. Paid $900, sell for $150. 352-503-7125 or 410-227-9152 Found LG cell phone in Sportsmens Haven community on trail 11 A(off E. Haven in Inverness). Please call so I can get it to you. (570) 267-6763 GE GAS RANGE black Andora 5 with selfclean convection oven, power burner, griddle.Less than 1 yr old sell half price $500 Crystal River 228-4648 Home Maintenanc eRepairs & Remodels Quality work at affordable prices 20 yrs exp. Ref avail 573-723-2881 INVERNESS3/2/2 Starting @ $750. 352-403-4646 or 352-403-4648 2012 GIANT 21 SPD BICYCLE Dash 3,Excellent shape,like new. Rides and looks great. Comes with computer, mirror, bike pump, bottle cage, spare tube, and a helmet. $500.00 neg. call 257-2097 I am a fun loving attractive widow who enjoys life and looking for that honey-bunny of a gentleman in his late 70-80s who enjoys the same. I would love to get to know you. If interested please write so we could get together and find out more. Citrus Co. Chronicle Blind box 1847 106 W Main St Inverness, Fl 34450 Your world firstemployment Classifieds ww.chronicleonline.com Need a job or a qualified employee? This areas #1 employment source! Need a JOB? #1 Employment source is Classifieds Your world first.Every Dayvautomotive Classifieds Support group information will list monthly meetings first, as space is available, then weekly meetings.. Information relating to professional training or seminars attended by those in the health care industries are considered business briefs, and would appear in the Business Digest listings of Sundays Business section. To submit story ideas for feature sections, call 362563-5660. Be prepared to leave a detailed message with your name, phone number and the address of the news event. Approval for story ideas must be granted by the Chronicles editors before a reporter is assigned. The Chronicle reserves the right to edit submissions. Publication of submitted information or photos on specific dates or pages cannot be guaranteed.HEALTH NOTE GUIDELINES PAGE 24 C10TUESDAY,SEPTEMBER10,2013 CLASSIFIEDS CITRUSCOUNTY( FL ) CHRONICLEG0V1 000G0ZNLawn Sprinkler Not Working?Well Fix It $10 Off with ad 746-4451 2013 2013 IRRIGATION 000FWNC ROOFINGAAA ROOFINGCall the LeakbustersLic./Ins. CCC057537Free Written Estimate Crystal River563-0411Inverness726-8917 $100 OFFAny Re-RoofMust present coupon at time contract is signed One Day Bath Remodeling In Just One Day,We will Install A Beautiful New Bathtub or Shower Right Over Your Old One!!! Tub to Shower Conversions Too!!!Visit our Ocala Showroom or call1-352-624-8827For a FREE In-Home Estimate!BATHFITTER.COM BATH REMODELINGBATHFITTER000FX26 0 0 0 F X 2 1 TREE SERVICE3 FREE ESTIMA TES Licensed & Insured352-400-3188YOUR INTERLOCKING BRICK PAVER SPECIALIST Often imitated, never duplicated IS IT TIME TO REFINISH YOUR POOL? POOLS AND PA VERSAdd an artistic touch to your existing yard or pool or plan something completely new! QUALITY WORK ATA FAIR PRICE!COPESPOOL AND PAVER LLC000G0IC Copes Pool & Pavers 000FX5T N.E. 5th St. Crystal River, FL 34429(352) 639-1024LICENSED & INSURED ROOFING Excellence in Roofing Quality Honesty Reasonable Prices $100 OFF ANY REROOFNot to be combined with any other offer. Exp. 9/30/13LIC#CC1327656 CLEANING KNOCK OUT CLEANING SERVICELicensed, Insured, Workers Comp. Pressure Washing Too352-942-6876Call Today for a Clean Tomorrow000FUHFRESIDENTIAL, COMMERCIAL, VACATION RENTALS & CONSTRUCTION CLEAN-UP 000FSBI PET/HOUSESITTINGBONDED & INSURED(352)270-4672Kathleen M. [email protected] Training AvailableAll Kritters Big or SmallRelax while youre away knowing your pets are OK at home safe in their own beds 000FGCQ METAL ROOFING Metal RoofingWe Install Seamless GuttersTOLL FREE 866-376-4943 Over 25 Years Experience & Customer SatisfactionLic.#CCC1325497 0 0 0 F X 1V68 Stand Alone Generator 000FX5E WINDOW CLEANING Window Cleaning Window Tinting Pressure Washing Gutter CleaningFREE ESTIMATES352-503-8465Bonded & Insured ATREE SURGEON Lic. & Ins. Lowest Rates Free est. (352)860-1452 Bruce Onoday & Son Free Estimates Trim & Removal 352-637-6641 Lic/Ins Carpentry, Decks, Docks, Remodeling Yard Work, Pressure Wash, Home Repair. CBC 1253431 (352) 464-3748 Floors /walls. Tubs to shower conv. No job too big or small. Ph: 352-613-TILE /lic# 2441 Home Maintenanc eRepairs & Remodels Quality work at affordable prices 20 yrs exp. Ref avail 573-723-2881. *ABC PAINTING* 30 + YRS.EXP.LIC./INS for an EXCELLENT job Call Dale and Sons 352-586-8129 AFaux Line, LLC Paint, pres-wash, stains 20yrs exp, Cust. Satisfaction Lic/Ins 247-5971 CALLSTELLAR BLUE All Int./ Ext. Painting Needs. Lic. & Ins. FREE EST. (352) 586-299 All phases of T ile Handicap Showers, Safety Bars, Flrs. 422-2019 Lic. #2713 AFFORDABLE LAWN CARE Cuts $10 & Up Res./Comm., Lic/Ins. 563-9824, 228-7320 A-1 Carpentry, Decks, Docks, Remodeling Yard Work, Pressure Wash, Home Repair. CBC 1253431 (352) 464-3748 M& W Interiors Inside/Out Home Repair Wall/Ceiling Repair Experts, Popcorn Removal,DockPainting & Repair(352) 537-4144 Home/Office Cleaning catered to your needs, reliable & exper.,lic/ins 796-4645 / 345-9329 ROCKYS FENCINGFREE Est., Lic. & Insured 352 422-7279 A 5 STAR COMPANY GO OWENS FENCING ALL TYPES. Free Est. Comm/Res. 628-4002 Let me help you. hsekeeping, shopping companionship. Call Sylvia (352) 613-3114FUYN LOVE SEAT Taupe, Microfiber Excellent Cond. $150. (352) 746-9247 Leave Message SOFAGenuine Black Leather Sofa. Excellent Condition $100.00 352-746-5421 Solid Wood Dining Room Table w/6 chairs, 58 long w/2 self storing leaves w/ 12 ea. Antique White $125. (352) 489-5421 Twin Beds Two with headboards Matt. & box springs $75; Complete Full Size Bed $125. No calls before 11 a.m (352) 628-4766 LOVE SEAT Broyhill, Green, like new. No pets or smoking. Exc Cond! $250 (352) 746-2329 2 Stunning Dining Room Sets, 1 ) solid wood 54 round, 18 leaf, w/ cream color microfiber chairs $400. 1) Wicker glass top rectangular set 77 long 44 wide, 6 cushioned chairs $500. (970) 402-4280 [email protected] BUNK BEDSwood deluxe w/ built-in desk/book shelves. Staircase-not ladder.PD $1350, asking $675. Will email photos (352) 628-9963 Dinette table w/ leaf $15 obo (352) 873-6142 DRYER Whirlpool Works good, $70.00 Linda 352-342-2271 WASHER $100 In perfect working condition. 30 day warranty call or text 352-364-6504 WASHER OR DRYER $135.00 Each. Reliable, Clean, Like New, Excellent Cond. Free Del. 60 Day Guarantee 352-263-7398 Whirlpool Washer & Dryer, matching pair 4yrs old large capacity, multi-cycle, excellent condition $400. obo Homosssa (352) 503-7821 CARPET INDOOR-OUTDOOR, BROWN, 27 X 96$50 352 527-8993 FORMICACOUNTERTOPLARGE KITCHEN COUNTERTOPS-$50 352 527-8993 Diestler Computer New & Used systems repairs. Visa/ MCard 352-637-5469 HPDESKTOPPC A1430N Dual core 2GHz CPU 1GB RAM 250GB No Ethernet Clean $60 341-0450 PATIO UMBRELLA STAND 19x16high Off white metal. 35 lbs. Good Cond $20.00 352-527-9639 2 RECLINERS one mauve, one seafoam green good condition 25.00 each 628-7449 Personal/ Commercial CSR220 or 440 LIC. INSURANCE AGENT Email Resume to Tracy Fero at: tfer o@fer oinsurance .com or Call 352-422-2160 MEDICALOFFICE TRAINEES NEEDED!Train to become a Medical Office Assistant. NO EXPERIENCE NEEDED! Online training gets you Job readyASAP. HS Diploma/GED & PC/Internet needed! (888)528-5547 FLEAMARKETITEMS 12+ boxes/bags. 100+ videos, kitchen,tools, train items, misc. $80.00 352-795-9819 CAMCORDER Panasonic Camcorder with Case PV-A218 $100.00 352-746-5421 Frigidaire Washer & GE Dryer, Extra Large, capacity, excel. cond. $250. (352) 249-1097 GE GAS RANGE black Andora 5 with selfclean convection oven, power burner, griddle.Less than 1 yr old sell half price $500 Crystal River 228-4648 SMITTYSAPPLIANCE REPAIR.Also W anted Dead or Alive W ashers & Dryers. FREE PICK UP! 352-564-8179 Community/ Sales Manager & MarketerNeeded, Immediate Opening. 382-0770 HELP WANTED RETAIL SALESPeople who want to work to replace the ones that dont. Nights/Weekends 75 CHROME SHOP Wildwood (352) 748-0330 ELECTRICIANSRESIDENTIALNEW CONSTRUCTION Exp. preferred. Rough & Trim. Slab, lintel & service. Full benefits, paid holidays & vacation /EOE APPLY AT: Exceptional Electric 4042 CR 124A Wildwood Hiring for Service PlumberExperienced req. Apply in person: 6970 W. Grover Cleveland Blvd. Homosassa Mon.-Friday 9a-4p QUALIFIED A/C SERV TECHExp Only & current FL DR Lic a must. Apply in person: Daniels Heating & Air 4581 S. Florida Ave. Inverness CITRUS MAIDSCLEANING PERSON Needed. Must have flex. schedule, lic./vehicle. Exp. a plus. Leave message (352) 257-0925 ARNP/PAFull time, for Dr.s Office & Nursing Home Practice, Fax Resume to: 352-795-7898 DENTAL RECEPTIONIST & SURGICAL ASSISTPart time or Full time For High Quality Oral Surgery Office. Springhill/Lecanto Experience a must. Email Resume To: maryamoli@ yahoo.com Exp. Med. Assist.Must have knowledge of Computers. CALL 352-212-2629 NEEDEDExperienced,Caring & DependableCNAs/HHAsHourly & Live-in,flex schedule offeredLOVING CARE(352) 860-0885 career-opportunities I I I I I I I I Tell that special person Happy Birthday with a classified ad under Happy Notes. Only $28.50 includes a photo Call our Classified Dept for details352-563-5966 I I I I I I I I WANTED! (HAM Radio Equip.) Vintage or Modern, tubes, tube audio amps, speakers, test equip. call Ethan 775-313-2823 LEGAL ASSISTANTP/T 16 hrs per wk avg. Exp preferred. Resume & references to: PO Box 2763, Inverness, FL 34451 Tell that special person Happy Birthday with a classified ad under Happy Notes. Only $28.50 includes a photo Call our Classified Dept for details352-563-5966 Lost Cat, male, orange tabby Tropic Terrace Crystal River (352) 422-4180 Missing BLACK CAT. Inverness in the area ofArbor and Tom streets. His 5 year old owner is very, very sad and worried. Hunter is about 10 months old with yellow eyes and a small white area on his neck. Please call if you have seen him. REWARD 419-7262 Pomeranian Male Dog Lost Male, 1 Yr old, Light Creme coat, one eye, Name is gus, lost in Hernando area call 352 445 0239 cash reward He is desperately loved and missed please help our treasured pet come home lost 9/7 Found Chihuahua overnight 9/7/13. Inverness, Croft Road and SR44. Call to describe. 352-601-0981 Found LG cell phone in Sportsmens Haven community on trail 11 A(off E. Haven in Inverness). Please call so I can get it to you. (570) 267-6763 Nintendo DS Found at Homosassa Walmart on 9/1. Caller must describe. (352) 795-1458 DOG GROOMING WORKSHOP BYOD BringYour Own DOG! $50. 9/14, 11am to 4pm offered at the Academy of AnimalArts, Largo, FL Academy ofanimalart s.com 866-517-9546 PAGE 25 TUESDAY,SEPTEMBER10,2013C 11 CITRUS COUNTY (FL) CHRONICLE CLASSIFIEDS 000FUYB 0 0 0 8 X G S For more information on how to reach Citrus County readers call 352-563-5592. TAMI SCOTTExit Realty Leaders 352-257-2276 [email protected] When it comes to Realestate ... Im there for you The fishing is great Call me for your new Waterfront Home LOOKINGTO SELL? CALLMETODAY!121+ Years Experience (352) 212-1446 www. RealtyConnect.me LECANTO (Black Diamond)3/2/2 Gated Golf Comm $119K Cash Deal or Rent $1000 mth 352-804-9729. Sugarmill Woods 3/2/2 Den, Fam Rm, Wood Floors, 1 YR Warranty 31 Pine St, Homosassa $149,000 Realty Connect 212-1446 MEDICAL OFFICE FOR SALE Totally renovated 700 S.E. 5th Ter.Suite #5 Crystal River. $120K 352-422-2293 USED CAR LOT4500 SF Bldg, 417 ft frontage, 1.34 Acres, all fenced ready to go. Located at 7039 W Grover Cleveland Blvd, Homosassa $225,000. (603) 860-6660 Tweet Tweet Tweet Follow the Chronicle on citruschronicle news as it happens right at your finger tips ALEXANDER REALESTATE (352) 795-6633Crystal River Apts,2 BR/ 1 BA $400-$500,ALSO HOMES & MOBILES AVAILABLE 000G1C8 Citrus Hills2/2/1 spacious Citrus Hills Exec. Villa, FL room, furn, pristine. no pets/smoking $875. + dep. (352) 726-8273 Sugarmill Woods2/2/1, like new, long Term, (352) 428-4001 HERNANDOAffordable Rentals Watsons Fish Camp (352) 726-2225 BEVERLYHILLS1 BR, 1 BD, $475 mo., 352-302-3987 BEVERLY HILLSOak Ridge 3/2/2 Pool Home, Clubhse membership included $1,250 Rent or rent to own. 352-489-7674 CITRUS SPRINGSNewer 3/2/1 Large Master Suite $750 3/2/2 $850 mo. 352-697-3133 CRYSTAL RIVER3/2Clean, $800. mo. 352-795-6299 352-364-2073 Crystal RiverLease Option to Own modern 2/2, 1500 sq.ft on 10 acres grass pasture w/horse barn. 5 miles from downtown Crystal River off of Citrus Ave. (Hwy 495 and 488) Lease for 10 yrs & it will be yours! rent $1000. pr mnth. call Larry Hough, Manager 352-795-2240 Homosassa3/2 $775. first, last, sec. pets ok, (352) 434-1235 HOMOSASSA, 3/2w/ Den $650+ $600 sec. No pets (352) 586-1212 INVERNESS3/2/2 Starting @ $750. 352-403-4646 or 352-403-4648 INVERNESS4/2/1, handicap access. CHA, remodeled $750 mo 352-422-1916 INVERNESSBeautiful 2/1, gated comm. 55+pool, clbhs activities, 5405 S. Stoneridge. $650 + dep. (330) 806-9213 INVERNESSHighlands 3/2/2 NearAnna Jo Rd. By appt 786-423-0478 or (352) 637-1142 RENT TO OWN!! No Credit Check! 3BD $750-$850 888-257-9136 JADEMISSION.COM HERNANDOAffordable Rentals Watsons Fish Camp (352) 726-2225 Responsible Couple would like to rent your BOAT DOCK (352) 402-0455 CRYSTALRIVERRooms in house, Full Kichen, Near Publix, furn, one price for elec, W/D, H20, cable,+ WIFI $115wk/ 420mo $120wk/430mo 352-563-6428 1800-927-9275. LECANTO2/2, Doublewide $600. (352) 212-9682 1986 Manufactured Home, Laminate floors, great shape $19,900 352-795-1272 Singing Forest 46 2 Bed 1 Bath. Mobil BEAGLE PUPPIES$100 Crystal River Area 386-344-4218 386-344-4219 COCKER SPANIELS 4 Males, 2 Females w/ papers. 8 weeks old Blonde & white $800 (352) 287-0519 be a wonderful companion dog. Call Joanne @ 352-795-1288. Sallie. Shih Poo Puppies, 3 males, 2 females Yorkshire Puppies 1 Male Miniature Poodles Small Mini 1 females (352) 795-5896 628-6188 evenings SHIH-TZU PUPS,Available RegisteredLots of Colors Males start @ $400. Females start @ $600.YOUR FISHING POLE! INVERNESS, FL55+ park on lake w/5 piers, clubhouse and much more! Rent includes grass cutting and your water 2 bedroom, 1 bath @$500 inc H20. Pets considered and section 8 is accepted. Call 800-747-4283 For Details! HOMOSASSA2/1 $510, & 2/2 $525 mo. 352-464-3159 Homosassa2/1, scrn. prch. $500. mo. $500. sec. 352-613-2333 DJ LIGHTS & STAND very professional. Paid $500, asking $250 352-228-3040 Keilwerth Alto Sax Brand New $600 (352) 533-2223 PIANO LESSONS Study Piano w/ Rick D Beginner to Advanced All styles 352-344-5131 BABYLOCK SEWING MACHINE Model BLDC2. Used gently. Original owner.All accessories and manuals included. $550.00 352-613-4835 Electric Treadmill, Sears, used only a few times, ( Got Lazy) Paid $1,100 Sacrifice Only $200. (352) 628-2844 PRO-FORM XP160 ELLIPTICALEXERCISER 10 Resistance Levels 11 Workout Programs Heart Rate Monitor $200.00 Call 352-382-3224After 5PM 2012 GIANT 21 SPD BICYCLE Dash 3,Excellent shape,like new. Rides and looks great. Comes with computer, mirror, bike pump, bottle cage, spare tube, and a helmet. $500.00 neg. call 257-2097 Looking for FORD WINSTAR Low miles, in good cond. (352) 794-3930 WANT TO BUY HOUSE or MOBILE Any Area, Condition or Situation Fred, 352-726-9369. I wish to adopt a dog, male lab, light choc, or lab golden mix 6 yrs old well behave and trained. The perfect BOY or Tomboy 75 lbs, extremely loving, must be able to get along well with a female dog, should have smooth sleek fur. Please call me and leave message on voice mail (352) 746-3087 2002 Craftsman Riding Mower42 Cut & deck $375. (352) 628-5708 2007 John Deere Riding Mower X324, 4ws, 48 deck 110 hrs only, 22hrps Kawasaki, $1500. (352) 489-7906 AFFORDABLE Top Soil, Mulch, Stone, Hauling & Tractor Work (352) 341-2019 Craftsman Riding Lawn Mower, DYT 4000, 48 cut, V twin, 25 hsp, Kohler engine $600.(352) 419-6210 DIXON ZERO-TURN MOWER. VERYGOOD CONDITION. $750. 352-527-4319 LAWN MOWER Self propelled, Weed wacker & blower.$75. (352) 860-1265 PVC 1/2 WITH FITTINGSApprox. 300of 1/2 PVC with shut offs, sprinklers and fittings. $30 352-563-1519 Scaggs Walk Behind 48 Inch cut great condition $800. obo (352) 634-1213 Sears LT 2000 Riding Mower 5 yrs. old low hrs. 19.5 HP, 42 cut $450. Sears Self Propelled Mulching Mower, w/ bagger 6.5HP, 21 cut $100. 352-507-1490 JEANS Diane Gilman DG2 skinny jeans & jeggings. Brand new, 4 pair Med size. $30 ea (352) 489-8516 WEDDING GOWN Brand new,ivory color,beautiful sz.8,halter style/pearl/seq./Michael Angelo/$190 352-552-7569. 352-552-7569 4 TIRES195 60 R15 Excel. Tread $50 352-201-7125 5 SHAKESPEARE UGLYSTICK FISHING RODS-Casting & Spinning, Ex., $12-$15, 352-628-0033 12 MALLARD DUCK DECOYS-early plastic, glass eyes, made in Italy, will sell individually, Ex. $96, 628-0033 23 PINE WOOD HEARTS/BUNNIES/TEDDY BEARS $25 PAINTFORARTS CRAFTS 419-5981 78 RPM Records 209 count, assorted music, 1920s-1950s must take all $45 Ridgid Tri Stand Pipe cutter & threader #40 1-2 $125. (352) 344-5283 APPLIANCES like new washers/dryers, stoves, fridges 30 day warranty trade-ins, 352-302-3030 BURTON STOVETO GO $20 CAR OR TRUCKS WITH 12 VOLTOUTLETLIKE NEW 419-5981 BURTON STOVETO GO $20 FOR TRUCK OR CAR WORKS ON 12 VOLTOUTLETLIKE NEW 419-5981 CASSETTE PLAYER Double Cassette Deck w/Remote $40.00 352-746-5421 CHEST FREEZER Sears 21 in W, 35 in L like new $80; EDGER Sears, 3.5 hp, Gas $65 (352) 465-2709 COOL SURGE Eco friendly air cooler, rolls from room to room, cent per hr. to use. $150. (352) 344-4374 Entertainment Centers, 1 black & 1 lite color wood. $100 for both; Walker, stroller, swing, car seat, playpen $100 for all (352) 795-7254 FREE UTILITYSINK, BASE, FAUCET Remodeled.If you can use it, come get it.Crystal River 228-4648 GENERATOR Brand New 3500 Industrial $300 Call 352-344-3112 Kenmore Overlock /Sewing Machine 2/3/4D, Model 385.1644 New Cond. Org. Cost $700 Price $120 firm, owners manual & instruct. book (352) 382-5300 LITTLE TYKES TOYS 8 in 1 Playground $150 Other items Available (352) 794-0211 ROCKING DOLL CRADLE SOLID OAK $75 HANDCRAFTED CAN E-MAILPHOTOS 419-5981 SEWING MACHINE Necchi Italian made sewing machine in cabinet with accessories $50.00 6287449 TROLLING MOTOR MINN KOTATURBO 65 36#, 5 fwd/2 rev, tilt tiller, weedless prop, Ex., $90. 352-628-0033 TWO CEILING FANS WITH LIGHTS Great deal at $25 each .Remodeled. Crystal River 228-4648 Western Electric Crank Magneto wall telephone, circa 1910, Excel. Cond. $300. (352) 344-5283 WOMENS RUBBER RIDING BOOTS $15 LIKE NEW SIZE L/43 EUR CAN E-MAIL PHOTO 419-5981 3 wheel Scooter$175. 352-795-3764 CAR LIFT Harmar-Never Used $500; Golden Companion Scooter w/ all accessories. Never Used $800 Will deliver (352) 860-1195 Ramp With Rails 16+ ft. aluminumramp. Never used. $800 Will Deliver (352) 860-1195 PAGE 26 C12TUESDAY,SEPTEMBER10,2013 CLASSIFIEDS CITRUSCOUNTY( FL ) CHRONICLE 576-0910 MCRN PUBLIC NOTICE Fictitious Name Notice under Fictitious Name Law. pursuant to Section 865-09, Florida Statutes. NOTICE IS HEREBY GIVEN that the undersigned, desiring to engage in business under the fictitious name of: Belfry Bat Houses located at 3123 S. Hiawassee Terr., Inverness, FL 34450, in the County of Citrus, intends to register the said name with the Division of Corporations of the Florida Department of State, Tallahassee, FL. Dated at Inverness, FL, this 5th day of Sept., 2013 /s/ Walter Paul Lawrence Owner Published in Citrus County Chronicle, Sept. 10, 2013. 577-0910 TUCRN PUBLIC NOTICE Fictitious Name Notice under Fictitious Name Law, pursuant to Section 865-09, Florida Statutes. NOTICE IS HEREBY GIVEN, that the undersigned, desiring to engage in business under the fictitious name of Top Quality Stall Fronts located at 8200 South Odonnell Terrace, Floral City, Florida 34436, in the County of Citrus, intends to register said name with Florida Department of State, Division of Corporations, Tallahassee, Florida. DATED at Floral City this 5th day of September, 2013. /s/ Terence John Odonnell, Owner. Published one (1) time in the Citrus County Chronicle. September 10, 2013. 578-0910 TUCRN MEETING NOTICE PUBLIC NOTICE NOTICE IS HEREBY GIVEN that the AFFORDABLE HOUSING ADVISORY COMMITTEE will meet at 5:00 PM on the 17th of September, 2013, on September 10, 2013. 581-0910 TUCRN TBARTA 9/26 Meeting Notice PUBLIC NOTICE NOTICE IS HEREBY GIVEN that the Citrus County Transportation Planning Organization (TPO) Board will hold a meeting on Thursday, September 26, 2013 at 5:15 pm in Council Chambers at the Inverness Government Center, 212 W. Main Street, Inverness, Florida 34450, to discuss the business of the Transportation Planning Organization. Any person requiring reasonable accommodation at this meeting because of a disability or physical impairment should contact the Citrus Transportation Planning September 10, 2013. 582-0910 TUCRN 9/16 Board of Directors Special Meeting PUBLIC NOTICE A special meeting of the Board of Directors of the Citrus Memorial Health Foundation, Inc., will be held on Monday, September 16, 2013, at 5:00 P.M ., in the Gulf Room, located on the first floor of the Citrus Memorial Health System Administration Building, 502 Highland Blvd., Inverness, Florida. The purpose of the meeting will be to hear a presentation from Tampa General Hospital and HCA in response to the RFP published by the Citrus County Hospital Board pursuant to Florida Statute 155.40 and such other business as may come before. September 10, 2013., 2013 583-0917 TUCRN PUBLIC NOTICE APPLICATION FOR WATER CERTIFICATE Pinewood Water System of Citrus County, PO Box 4, Inglis, FL 34449 has applied to the Board of County Commissioners of Citrus County, Office of Utility Regulation, for Issuance of a new Water Franchise Certificate for the Pinewood Subdivision. The Water & Wastewater Authority will review the application at the October 7, 2013 meeting at 1:00 PM at the Lecanto Government Building in Room #166, 3600 W. Sovereign Path, Lecanto, FL, 34461. Any concerns may be directed to the Citrus County Office of Utility Regulation at (352) 419-6520. Description of the area serviced by the Pinewood Water System affected by this application: SEC 15 TWP 18 RNG 17, HOLIDAY ACRES UNIT 1 PB 5 PG 66 PINEWOOD UNREC SUB: UNREC LOTS 46, 47 & 48. COM AT THE SE COR OF LOT 48, TH N 0D 30M 04S W AL THE E LN OF SD LOT 48 A DIST OF 25 FT TO A PT ON THE S LN OF LOT 47, TH N 88D 49M 33S E AL THE S LN OF SD LOT 47 A DIST OF 25 FT TO THE SE COR OF SD LOT 47, SD PT BEING SW COR OF LOT 46, TH CONT N 88D 49M 33S E AL THE S LN OF SD LOT 46 A DIST OF 339.83 FT TO THE SE COR OF SD LOT 46, TH N 0D 30M 04S W AL THE E LN OF SD LOT 46 A DIST OF 634.38 FT TO THE NE COR OF SD LOT 46, TH S 81D 51M 45S W AL THE N LN OF SD LOT 46 & 47 A DIST OF 1018.5 FT TO THE NW COR OF SD LOT 47, SD PT BEING NW COR OF LOT 48, TH S 0D 30M 04S E AL THE W LN OF SD LOT 48 A DIST OF 660.05 FT TO THE SW COR OF LOT 48, TH S 88D 49M 33S W AL THE S LN OF SD LOT 48 A DIST OF 654.67 FT, TO THE POB. Published in the CITRUS COUNTY CHRONICLE, September 10 & 17, 2013. 913-0915 MIX-CRN Workforce Connection PUBLIC NOTICE SEEKING OFFICE SPACE IN BETWEEN LECANTO AND INVERNESS Workforce Connection, a governmentally-funded organization is seeking approximately 3,500 sq ft or more of office space in Citrus County. Preferable locations would be in or in-between Lecanto and Inverness. Prefer office space with at least 4 private offices, room for additional cubicles (at least 12), break room, open resource area for customers, at least 4 bathrooms, conference room and computer lab. Must be ADA compliant. Need ample parking and occupancy beginning at end of December, 2013. Interested parties may send responses to: Val Hinson Workforce Connection 3003 SW College Rd, Suite 205 Ocala, FL 34474 352 873-7939, ext 1203 FAX: 352 873-7956 Email: [email protected] Workforce Connection is an EOE Employer/Program. Auxiliary aids and services are available upon request to individuals with disabilities using TTY/TDD equipment via the Florida Relay Service at 711. Published in the CITRUS COUNTY CHRONICLE, September 8-15, 2013. 579-0917 TUCRN Estate of Kelly D. Staley 2013-CP-494 NTC-SA PUBLIC NOTICE IN THE CIRCUIT COURT FOR CITRUS COUNTY FLORIDA, PROBATE DIVISION File No. 2013-CP-494 IN RE: ESTATE of KELLY DAWN STALEY, a/k/a KELLY D. STALEY, Deceased, NOTICE TO CREDITORS (Summary Administration) TO ALL PERSONS HAVING CLAIMS OR DEMANDS AGAINST THE ABOVE ESTATE: You are hereby notified that an Order of Summary Administration has been entered in the Estate of KELLY DAWN STALEY, deceased, File Number 2013-CP-494, by the Circuit Court for Citrus County, Florida, Probate Division, the address of which is 110 North Apopka Avenue, Inverness, Florida 34450; that the decedents date of death was November 1, 2012: that the total value of the estate is $NONE and that the names and address of those to whom it has been assigned by such order are: AARON EUGENE SNELL, 4462 N. TALLAHASSEE ROAD, CRYSTAL RIVER, FL 34428ENT S DATE OF DEATH IS BARRED. The date of first publication of this Notice is September 10, 2013. Person Giving Notice: /S/AARON EUGENE SNELL 4462 North Tallahassee Road Crystal River, FL 34428. 580-0917 TUCRN ESTATE of JASON H. RAASCH 2013-CP-485 NTC-SA PUBLIC NOTICE IN THE CIRCUIT COURT FOR CITRUS COUNTY FLORIDA, PROBATE DIVISION FILE N0.2013-CP-485 IN RE: ESTATE of JASON H. RAASCH, DECEASED, NOTICE TO CREDITORS (Summary Administration) TO ALL PERSONS HAVING CLAIMS OR DEMANDS AGAINST THE ABOVE ESTATE: You are hereby notified that an Order of Summary Administration has been entered in the Estate of Jason H. Raasch, deceased, File Number 2013-CP-485, by the Circuit Court for Citrus County, Florida, Probate Division, the address of which is 110 North Apopka Avenue, Inverness, Florida 34450; that the decedents date of death was May 17, 2013: that the total value of the estate is $2,142.33 and that the names and address of those to whom it has been assigned by such order are: William A. Raasch & Eunice Raasch, husband and wife, 5780 North Calico Drive, Beverly Hills, FL 34465ENTS DATE OF DEATH IS BARRED. The date of first publication of this Notice is September 10 2013. Person Giving Notice: /S/William A. Raasch 5780 North Calico Drive Beverly Hills, FL 34465. 584-0917 TUCRN Estate of EDWARD CHARLES SWEEPER 2013-CP-451 NTC PUBLIC NOTICE IN THE CIRCUIT COURT FOR CITRUS COUNTY, FLORIDA PROBATE DIVISION IN RE: ESTATE OF File No. 2013-CP-451 EDWARD CHARLES SWEEPER Deceased NOTICE TO CREDITORS The administration of the estate of EDWARD CHARLES SWEEPER deceased, whose date of death was April 24, 2013, is pending in the Circuit Court for Citrus County, Florida, Probate Division, the address of which is 110 N. Apopka Ave. Inverness, FL 10, 2013. Person Giving Notice: /s/ SHALAINE SMITH a/k/a SHALAINE MILLER 251 Jackson St. Apt 2F Hempstead, New York 11550 /s/ANITRA SWEEPER 251 Jackson St. Apt 2F Hempstead, New York 115 10 & 17, 2013 DODGE1987 Ram charger 8 lift, auto, 35 Tires, no a/c $2,000 OBO/Trade 352-453-6005 CHEVY2003 Venture Van, 7 pass. and priced to sell. Call 352-628-4600 For appointment MAZDA1998 6 pass. van Select, all wheel, runs well, looks good first $1,475 (352) 637-2588 SUZUKI RM85-L2005 RM85-LRuns great. Basically new, Garage Kept. Started often, kept up. Less than 20 hours of use. Rare, last year/model they made 2 stroke dirtbikes. Comes with custom helmet. Also have gloves. $1,100.00 Contact 352-476-41812001, Goldwing, trike 23k mi. Hot Rod Yellow asking$18,500. (352) 228-2512 HONDA2006 Shadow Spirit 750 C2 (VT750C2) senior owned, a beauty of a bike, lowered, 14600 miles, orange, new tires, $3800. 352-503-2795 352-270-8424 CHEVY, Silverado 114k mi. motor. 4.8L, V8, looks & runs excel. $6500.,352-897-4347, (810) 577-4308 TOYOTA2007Tundra Dual Cab Metallic Blue V6 6bed with liner 86000 miles good condition $15000 352-382-4595 DODGE2005, Durango leather, navi $9,995. 352-341-0018 FORD1999 Exp Eddie Bauer. 214K mi, good cond in /out, good tires $3800 obo(352) 794-3930 HONDA2007, Element, Hard to find, cold A/C, runs great, Must See, Call (352) 628-4600 JEEP, Grand Cherokee low miles, V6, very clean $13,500. (352) 270-8221 NISSAN2010, Murano $4,995. 352-341-0018 MAZDA2005 Mazda 6, 5-speed, 4-door, one owner, great condition, 141,000 miles $3,500. 352-860-2146 TOYOTA, Corolla, low miles, excel. cond. cruise control $8,500. (352) 628-1171 TOYOTA2010, Yaris $8,995 352-341-0018 PONTIAC, Grand LeMans, blue, 2 door, landeau top, 301, V8, AC, 71K mi., 2 owners, $4,800. (352) 341-3323 PORSCHE911, 959, Body Kit mtr, & Tranny good needs paint & inter restoration $12K Gas Monkey? (352) 563-0615 DODGE, 2500, Heavy Duty 4 x 4, quad cab, hemi magnum eng., 46K mi. $14,500, 352-419-6819 **. NUWA, 5TH WHEEL, 36ft Long, pay back storage rent of $1000. & its yours 352-601-7911 PUMA, 30 FT. 5th wheel $8,500 obo (352) 503-6455 WE BUYRVS, TRAVELTRAILERS, 5TH WHEELS, MOTOR HOMES Call US 352-201-6945 5All Terrain Tires 31 x10.5 x 15 for Jeep 87-06 call Jack 352-220-9101 PU Truck Bed Cover for 8ft, Bed, tilt top fiberglass w/ lock, perfect condition Asking $400. (352) 220-9787 $$ AFFORDABLEAutos & Trucks Dodge Ram 1500 $900 Down Chevy Cavalier $650 Down Pontiac Gr Prix $675 Down Dodge Caravan $795 CHEV Dodge 2001 Caravanexcellent condition $3900.(352) 634-5665 HANDYMAN SPECIAL2/1, EZ 3bd 52k Cash 352-503-3245 I Buy Houses Cash ANY CONDITION Over Financed ok! call ** CANOES FOR SALE White water canoes: purple dagger legend 16 ft $150; Yellow water buffalo 16 ft $200; Red Mohawk solo 13ft $100; Light blue dagger caper solo 14 ft $100; Flat Water Canoes: White Mohawk Jensen solo 14 ft $300; Green Mohawk Aluminum 16 ft $100; 2 white water perception paddles $30 each, 4 kayak paddles $20 each. 6 extra sport panelled PFDs $25 each; Six person commercial white water raft $250; commercial electric air pump $40 Cash only. Call Capt. Vince (352) 690-7140 3BD/2BA/2Car garage, By Owner New Roof, Cathedral Ceilings, Fruit Trees, Secluded $135,000. (352) 563-9857
http://ufdc.ufl.edu/UF00028315/03223
CC-MAIN-2017-13
en
refinedweb
The simplest way to add elements to a database is the DB->put interface. The DB->put interface takes five arguments: Here's what the code to call DB->put looks like: #include <sys/types.h> #include <stdio.h> #include <db.h> #define DATABASE "access.db" int main() { DB *dbp; DBT key, data;; } memset(&key, 0, sizeof(key)); memset(&data, 0, sizeof(data)); key.data = "fruit"; key.size = sizeof("fruit"); data.data = "apple"; data.size = sizeof("apple"); if ((ret = dbp->put(dbp, NULL, &key, &data, 0)) == 0) printf("db: %s: key stored.\n", (char *)key.data); else { dbp->err(dbp, ret, "DB->put"); goto err; } The first thing to notice about this new code is that we clear the DBT structures that we're about to pass as arguments to Berkeley DB functions. This is very important, and being careful to do so will result in fewer errors in your programs. All Berkeley DB structures instantiated in the application and handed to Berkeley DB should be cleared before use, without exception. This is necessary so that future versions of Berkeley DB may add additional fields to the structures. If applications clear the structures before use, it will be possible for Berkeley DB to change those structures without requiring that the applications be rewritten to be aware of the changes. Notice also that we're storing the trailing nul byte found in the C strings "fruit" and "apple" in both the key and data items, that is, the trailing nul byte is part of the stored key, and therefore has to be specified in order to access the data item. There is no requirement to store the trailing nul byte, it simply makes it easier for us to display strings that we've stored in programming languages that use nul bytes to terminate strings. In many applications, it is important not to overwrite existing data. For example, we might not want to store the key/data pair fruit/apple if it already existed, for example, if the key/data pair fruit/cherry had been previously stored into the database. This is easily accomplished by adding the DB_NOOVERWRITE flag to the DB->put call: if ((ret = dbp->put(dbp, NULL, &key, &data, DB_NOOVERWRITE)) == 0) printf("db: %s: key stored.\n", (char *)key.data); else { dbp->err(dbp, ret, "DB->put"); goto err; } This flag causes the underlying database functions to not overwrite any previously existing key/data pair. (Note that the value of the previously existing data doesn't matter in this case. The only question is if a key/data pair already exists where the key matches the key that we are trying to store.) Specifying DB_NOOVERWRITE opens up the possibility of a new Berkeley DB return value from the DB->put function, DB_KEYEXIST, which means we were unable to add the key/data pair to the database because the key already existed in the database. While the above sample code simply displays a message in this case: DB->put: DB_KEYEXIST: Key/data pair already exists The following code shows an explicit check for this possibility: switch (ret = dbp->put(dbp, NULL, &key, &data, DB_NOOVERWRITE)) { case 0: printf("db: %s: key stored.\n", (char *)key.data); break; case DB_KEYEXIST: printf("db: %s: key previously stored.\n", (char *)key.data); break; default: dbp->err(dbp, ret, "DB->put"); goto err; }
https://web.stanford.edu/class/cs276a/projects/docs/berkeleydb/ref/simple_tut/put.html
CC-MAIN-2018-39
en
refinedweb
Meshes with Python & Blender: Cubes and Matrices Welcome to the second part in this series. It’s time to get into some math and learn how to control the position, rotation and scale of the mesh. This tutorial builds on the lessons of part one. If you find yourself lost too often, try going back. Today we will quickly look into making cubes, and then jump into controlling the mesh and origin point’s positions. Finally we’ll dive into transformation matrices and learn how to perform transformations nice and fast. Tutorial Series - Part 1: The 2D Grid - Part 2: Cubes and Matrices - Part 3: Icospheres - Part 4: A Rounded Cube - Part 5: Circles and Cylinders The usual setup Let’s start by importing the packages we need. Besides the usual bpy, we are also going to use the radians() function from Python’s math package, as well as the Matrix class from mathutils (this one is from Blender). import bpy import math from mathutils import Matrix As before, I’ll have a section to put variables in, then utility functions and finally the main code sections. The vert() function looks useless now but we’ll need it for the next bit. # ----------------------------------------------------------------------------- # Settings name = 'Cubert' # ----------------------------------------------------------------------------- # Utility Functions def vert(x,y,z): """ Make a vertex """ return (x, y, z) # ----------------------------------------------------------------------------- # Cube Code verts = [] faces = [] # ----------------------------------------------------------------------------- # Add Object to Scene mesh = bpy.data.meshes.new(name) mesh.from_pydata(verts, [], faces) obj = bpy.data.objects.new(name, mesh) bpy.context.scene.objects.link(obj) bpy.context.scene.objects.active = obj obj.select = True Making the cube Making a cube is less glamorous than you would expect since there’s no fancy algorithm to make them. Instead we have to input the vert positions and faces manually. Luckily cubes only have 6 faces and 8 vertices.)] Run the script now and you will be rewarded with a very default cube. Now that was easy! Let’s see what we can do with it. Moving the origin point Every object in Blender has an origin point that determines their position in 3D space. In fact when we talk about an object’s position we actually talk about the position of its origin point. On the other hand when we talk about an origin points’ position we actually talk about the origin points’ position relative to the mesh. Confused? Look at the following diagram. As you can see when the orange dot (the origin point) is on the grid, the object’s position is (0, 0, 0) while when it’s up by 1 on the Z axis the position is position is (0, 0, 1). But the interesting bit is the mesh’s position. In both cases the mesh if offset by 1, but in the second case it is -1. If the mesh’s position was (0, 0, 0) it would be up in the air, right where the origin is. As you can see, the mesh position is relative to the origin but independent from the origin’s position in the scene. Knowing this, there are two things we can do: Change the mesh in relation to the origin point. This is the same as moving the mesh in edit mode. Change the origin point while leaving the mesh in the same place. For this tutorial that would be the center of the scene. We will begin by changing the position of the mesh relative to the origin point I will be calling this offset to keep things short. offset = (0, 0, 1) def vert(x,y,z): """ Make a vertex """ return (x + offset[0], y + offset[1], z + offset[2]) We can use the vert function to move the mesh with a simple addition. An offset of 1 on Z will make the cube rest on the grid with the origin point at its bottom. Now let’s try moving the origin point while keeping the cube at the center of the scene. There’s only one small problem: we can’t move the origin itself. Moving the origin is moving the object, since the origin represents its position in space. What we have to do is to change the origin is move the mesh as before and move the object by the opposite of that offset. obj.location = [i * -1 for i in offset] Remember location is a tuple, so we have to use an expression to set it. Try running the code now. The cube mesh is back at the center of the scene. But the origin point (and the object) is now at (0, 0, -1). Since we are changing the location using the negative of the offset, the resulting position of the object is negative. Likewise using a negative offset results in a positive position for the object. Give it a shot. offset = (0, 0, -5) So what if you want to change the origin and also change the mesh position in any arbitrary way so it’s not always at the center of scene? We can add another offset to represent that. And then we can add this offset in the location expression to move the mesh. Let’s also rename the previous offset to keep things clear. origin_offset = (0, 0, -5) mesh_offset = (1, 0, 0) def vert(x,y,z): """ Make a vertex """ return (x + origin_offset[0], y + origin_offset[1], z + origin_offset[2]) obj.location = [(i * -1) + mesh_offset[j] for j, i in enumerate(origin_offset)] Note that we have to use enumerate() now to get an index for the addition. There are several other things we could do with expressions and the vert() function. But there’s another way of transforming meshes and objects. A way that is both cleaner and faster. Enter the Matrix Matrices In math matrices are rectangular arrays of numbers (and sometimes other things). They can be added, subtracted and multiplied between themselves. You will find matrices in almost every field where math is involved. The only field we care about though, is computer graphics and in this context matrices are used often to represent transformations. This includes things like translation, scaling or rotation. Matrices that represent linear transformations like these are called “Transformation Matrices”. Objects position, rotation and scale are defined as transformation matrices in relation to a coordinate system. Even when you think there’s no transformation! For instance, let’s imagine a “default object”. This object sits at coordinates (0, 0, 0) of the scene, has a scale of 1 and a rotation of 0 (on all axis). We can represent the location, scale or rotation of any object as a transformation matrix of this default object. In Blender this is called a World Matrix, and it is a property available in all objects. By the way, “scene coordinates” are actually called “World Coordinates” in Blender. There are other coordinate spaces, as well as matrices for them but we will look into that in another part of this series (promise!). Note that you don’t need to be a matrix wizard to use them. The blender devs have blessed us with a Matrix class that does almost all the work for us, and you might not even have to see a matrix while you’re working with them. Feel free to jump to “Putting it all together” if you’re not interested in the math. Still here? Alright, let’s play with this matrix concept for a moment. Go ahead and add a new object (using Shift+A). Select it, then paste this script on a text editor and run it. import bpy print('-' * 80) print('World Matrix \n', bpy.context.object.matrix_world) You should see this output in the terminal: -------------------------------------------------------------------------------- World Matrix <Matrix 4x4 (1.0000, 0.0000, 0.0000, 0.0000) (0.0000, 1.0000, 0.0000, 0.0000) (0.0000, 0.0000, 1.0000, 0.0000) (0.0000, 0.0000, 0.0000, 1.0000)> Since we haven’t moved, rotated or done anything to the object, its values are the same as our imaginary “default object”. A matrix like this is called an Identity Matrix in math, and it means there’s no transformation. Now move the cube somewhere and run the script again. -------------------------------------------------------------------------------- World Matrix <Matrix 4x4 (1.0000, 0.0000, 0.0000, -8.8360) (0.0000, 1.0000, 0.0000, -1.1350) (0.0000, 0.0000, 1.0000, 8.9390) (0.0000, 0.0000, 0.0000, 1.0000)> Aha! Now the matrix includes some change. The values will be different depending on where you move the object. As you can see the last column includes the X, Y, Z coordinates in relation to the center of the scene (world space). What if we reset the location ( Alt-G) and try scaling instead? -------------------------------------------------------------------------------- World Matrix <Matrix 4x4 (0.7280, 0.0000, 0.0000, 0.0000) (0.0000, -1.4031, 0.0000, 0.0000) (0.0000, 0.0000, 1.7441, 0.0000) (0.0000, 0.0000, 0.0000, 1.0000)> Now the last column has no change since the object is back at (0, 0, 0) However we can see three values have changed to represent scaling on X, Y and Z. Rotation is more complicated since you can rotate around three axis and each rotation is represented by transformations on the other two axis. This goes a bit out of scope for this tutorial, so I’ll leave several links at the end in case you want to get deeper into the math. -------------------------------------------------------------------------------- World Matrix <Matrix 4x4 (-0.9182, 0.3398, -0.2037, 0.0000) (-0.2168, -0.8612, -0.4597, 0.0000) (-0.3316, -0.3780, 0.8644, 0.0000) ( 0.0000, 0.0000, 0.0000, 1.0000)> You might also be wondering about the last row. Transformation matrices for 3D are actually 4D, the last row is an extra dimension. This is a mathematical “trick” to enable the matrix to perform translations. Again, I won’t get too technical about this. Check the links at the end for more info. In any case, it’s not important for our purposes since it will never change. Here’s a diagram of the different transformations: Using Matrices Transformation matrices can be combined to create a single matrix that includes all the result of all the transformations. This is done by multiplying them. That means we can take an object’s world matrix and multiply it by a transformation matrix to get a new matrix that includes the changes in both matrices. We can then assign it as the object’s world matrix and thus transform the object. Or to put it in code: obj.matrix_world *= some_transformation_matrix It’s time to whip out that Matrix class and see how we can use it to generate matrices. Translation Let’s start with the easiest: moving stuff. All we have to do is call the Translation method of the Matrix class with a vector (or tuple) of values for each axis. translation_matrix = Matrix.Translation((0, 0, 2)) obj.matrix_world *= translation_matrix Scaling Scaling takes three arguments. The first one is the scale factor. The second one is the size of the matrix, it can be either 2 (2×2) or 4(4×4). But since we are working with 3D objects this should always be 4. The final arguments is a vector to specifies the axis to scale. This can be either zero for no scaling, or 1 to scale. scale_matrix = Matrix.Scale(2, 4, (0, 0, 1)) # Scale by 2 on Z obj.matrix_world *= scale_matrix Rotation Rotation takes almost the same arguments as scale. The first is the angle of rotation in radians. The second is the size of the matrix (same as before). And the third is the axis of the rotation. You can pass a string like ‘X’, ‘Y’ or ‘Z’, or a vector like the one in scale. rotation_mat = Matrix.Rotation(math.radians(20), 4, 'X') obj.matrix_world *= rotation_mat Putting it all together We can chain transformations together by multiplying them one after the other. But beware, Matrix multiplication is not commutative. Order does matter. Start by translation, then rotation and scale. If you’re getting strange values that look like rounding errors, look at the order in which you are multiplying. translation = (0, 0, 2) scale_factor = 2 scale_axis = (0, 0, 1) rotation_angle = math.radians(20) rotation_axis = 'X' translation_matrix = Matrix.Translation(translation) scale_matrix = Matrix.Scale(scale_factor, 4, scale_axis) rotation_mat = Matrix.Rotation(rotation_angle, 4, rotation_axis) obj.matrix_world *= translation_matrix * rotation_mat * scale_matrix Matrices can also be used to change the mesh instead of the object. To do this we can use the transform() method of in objects. All it asks for is that you give it a matrix. obj.data.transform(Matrix.Translation(translation)) Don’t forget we can also combine matrices by multiplication so you can do several transformations in one go. obj.data.transform(translation_matrix * scale_matrix) Not only are matrices faster but this method also goes straight to C, so it performs considerably better than calculating the position of each vertex in Python (which is quite slow and expensive). On top of that, we can do this in a single line. Awesome. Final code import bpy import math from mathutils import Matrix # ----------------------------------------------------------------------------- # Settings name = 'Cubert' # Origin point transformation settings mesh_offset = (0, 0, 0) origin_offset = (0, 0, 0) # Matrices settings translation = (0, 0, 0) scale_factor = 1 scale_axis = (1, 1, 1) rotation_angle = math.radians(0) rotation_axis = 'X' # ----------------------------------------------------------------------------- # Utility Functions def vert(x,y,z): """ Make a vertex """ return (x + origin_offset[0], y + origin_offset[1], z + origin_offset[2]) # ----------------------------------------------------------------------------- # Cube Code)] # ----------------------------------------------------------------------------- # Add Object to Scene mesh = bpy.data.meshes.new(name) mesh.from_pydata(verts, [], faces) obj = bpy.data.objects.new(name, mesh) bpy.context.scene.objects.link(obj) bpy.context.scene.objects.active = obj obj.select = True # ----------------------------------------------------------------------------- # Offset mesh to move origin point obj.location = [(i * -1) + mesh_offset[j] for j, i in enumerate(origin_offset)] # ----------------------------------------------------------------------------- # Matrix Magic translation_matrix = Matrix.Translation(translation) scale_matrix = Matrix.Scale(scale_factor, 4, scale_axis) rotation_mat = Matrix.Rotation(rotation_angle, 4, rotation_axis) obj.matrix_world *= translation_matrix * rotation_mat * scale_matrix # ----------------------------------------------------------------------------- # Matrix Magic (in the mesh) # Uncomment this to change the mesh # obj.data.transform(translation_matrix * scale_matrix) Wrap up This covers this part in the series. If Matrices have peaked your interest here’s a few links to learn more. The links are in order of difficulty. - World Matrix Documentation on Blender’s API - Computerphile’s video on Matrices - Matrices (Wikipedia) - Transformation Matrices (Wikipedia) - Matrix Multiplication (Wikipedia) - Scratchapixel’s lesson on matrices - Coding Labs’article on Projection Transformation Matrices A few things you can try to do yourself: - Put this all in a loop and make multiple cubes following a sequencial transformation, like making a wave or rotating around an axis. - Use matrices to move the origin of the cube, using the method in this tutorial - Try scaling the mesh without matrices or changing the object’s coordinates (hint: don’t forget the vert() function) - Try applying the world matrix of one object into another In the next tutorial we’ll be looking at making Icosahedrons and subdividing them to approximate a sphere. Do you have any questions, or suggestions for the next tutorials? Leave a comment below!
http://sinestesia.co/blog/tutorials/python-cube-matrices/
CC-MAIN-2018-39
en
refinedweb
from lightning import Lightning from sklearn import datasets lgn = Lightning(ipython=True, host='') Connected to server at The image-poly visualization let's you draw polygonal regions on images and then query them in the same notebook! Try drawing a region on the image. Hold command to pan, and option to edit the region. Note that we assign the visualization to an output variable, so that we can query it later, but we must print that output to get the image to show. imgs = datasets.load_sample_images().images viz = lgn.imagepoly(imgs[0]) viz Draw some regions on the image above. Then check the value of viz.coords. p = viz.polygons() lgn.imagepoly(imgs[0], polygons=p) In this case we drew four regions, so we get four arrays of coordinates (in original image space). The region overlays themselves do not persist on the image after a refresh, so you'll have to draw your own to see them.
https://nbviewer.jupyter.org/github/lightning-viz/lightning-example-notebooks/blob/master/images/image-poly.ipynb
CC-MAIN-2018-39
en
refinedweb
# create a list of all items to go on the third page page3 = books[20:30] # or, pull ten records into a list, and loop over them for book in books[20:30]: print book def __getitem__(self, item): q = "select * from %s" % (self.name) # isinstance is recommended over direct type(a) == type(b) comparisons, # to accomodate derived classes if isinstance(item, types.SliceType): q = q + " limit %s, %s" % (item.start, item.stop - item.start) self._query(q) return self.dbc.fetchall() elif isinstance(item, types.IntType): q = q + " limit %s, 1" % (item) self._query(q) return self.dbc.fetchone() else: raise IndexError, "unsupported index type" Please enable Javascript in your browser, before you post the comment! Now Javascript is disabled. Your name/nickname Your email WebSite Subject (Maximum characters: 1200). You have 1200 characters left.
http://www.devx.com/dbzone/Article/22093/0/page/3
CC-MAIN-2018-39
en
refinedweb
Next: Version Check, Previous: Header, Up: Preparation [Contents][Index] GSS does not need to be initialized before it can be used. In order to take advantage of the internationalisation features in GSS, e.g. translated error messages, the application must set the current locale using setlocale() before calling, e.g., gss_display_status(). This is typically done in main() as in the following example. #include <gss.h> #include <locale.h> ... setlocale (LC_ALL, "");
http://www.gnu.org/software/gss/manual/html_node/Initialization.html
CC-MAIN-2018-39
en
refinedweb
TabbedViewNavigatorApplication IssueSinetDannyUtah Aug 30, 2011 12:08 PM When clicking on a tab in the application that is currently the selected tab I am returned to what appears to be the first view of that tab. Having dived a little deeper I am finding that it dosent just return me to the first view but rather it creates another instance of that view and pushes it onto the stack everytime the tab is pushed. I am finding that this only happens when the ViewNavigator has multiple states and is not in the default state and the tab is clicked but also when another ViewNavigator is pushed and then the ViewNavigator for which the state was changed previously is returned too. I am finding nothing on the web with others having this problem and would appreciate any feedback anybody may have as to a work around or solution, thanks 1. Re: TabbedViewNavigatorApplication IssueSinetDannyUtah Aug 30, 2011 12:46 PM (in response to SinetDannyUtah) Update: after having started a new test project and attempting to replicate this issue I am finding the problem to be a view being pushed from a ViewNavigator once this has been done and the user attempts to push the tab to return to the original ViewNavigator a new instance of the viewNavigator is created and pushed onto the stack, after just a few of these as you can imagin with heavy views the memory is through the roof. I will report back my finding but does anyone have input? 2. Re: TabbedViewNavigatorApplication IssueShongrunden Aug 30, 2011 7:48 PM (in response to SinetDannyUtah) Can you post the code of your main application file? 3. Re: TabbedViewNavigatorApplication IssueSinetDannyUtah Aug 31, 2011 7:24 AM (in response to Shongrunden) <?xml version="1.0" encoding="utf-8"?> <s:TabbedViewNavigatorApplication xmlns:fx="" xmlns: <fx:Declarations> <!-- Place non-visual elements (e.g., services, value objects) here --> </fx:Declarations> <fx:Script> <![CDATA[ import dao.core.ClientPersonnel; import dao.core.ContentAbbrev; import dao.core.ContentSrch; import dao.core.Licenses; import framework.AppRAMM; import mx.core.IVisualElement; import mx.events.FlexEvent; import spark.events.IndexChangeEvent; import views.BrowseView; import views.HistoryView; import views.SearchView; import views.SettingsView; import views.VideoDetailsView; internal var __typeImport_ContentAbbrev:ContentAbbrev; internal var __typeImport_ClientPersonnel:ClientPersonnel; internal var __typeImport_Licenses:Licenses; internal var __typeImport_ContentSrch:ContentSrch; public var closeTimer:Timer; private function handler_creationComplete():void { removeEventListener(FlexEvent.CREATION_COMPLETE, handler_creationComplete); tabbedNavigator.tabBar.visible = false; NativeApplication.nativeApplication.addEventListener(Event.DEACTIVATE, onDeactivateApp); NativeApplication.nativeApplication.addEventListener(Event.ACTIVATE, onActivate); AppRAMM.ramm.addEventListener("loggedOut",cleanupViewOnLogout_Handler); } protected function onDeactivateApp(event:Event):void { //The user has 1 hrs. or 3600000 millisecs. to come back to the application before the timer is called and the app is shut down completley closeTimer = new Timer(3600000,1); closeTimer.addEventListener(TimerEvent.TIMER_COMPLETE,closeApp); closeTimer.start(); } protected function closeApp(event:Event):void { if(NativeApplication.nativeApplication.timeSinceLastUserInput >= 36000) { NativeApplication.nativeApplication.exit(); } } protected function onActivate(event:Event):void { closeTimer = null; } protected function cleanupViewOnLogout_Handler(event:Event):void { NativeApplication.nativeApplication.addEventListener(Event.TAB_INDEX_CHANGE,eventHandlerFo rTabbar); tabbedNavigator.selectedIndex = 0; /* historyView.popAll(); historyView.firstView = HistoryView; searchView.popAll(); searchView.firstView = SearchView; */ historyView.popToFirstView(); searchView.popToFirstView(); } protected function eventHandlerForTabbar(event:Event):void { tabbedNavigator.tabBar.visible = false; NativeApplication.nativeApplication.removeEventListener(Event.TAB_INDEX_CHANGE,eventHandle rForTabbar); } ]]> </fx:Script> <fx:Style <s:ViewNavigator <s:ViewNavigator <s:ViewNavigator <s:ViewNavigator </s:TabbedViewNavigatorApplication>This is the main file to the application, I also broke this problem out to a small test project to replicate the problem and is happening there as well 4. Re: TabbedViewNavigatorApplication IssueShongrunden Sep 1, 2011 11:39 AM (in response to SinetDannyUtah) Can you please provide that small test application so we can investigate further? 5. Re: TabbedViewNavigatorApplication IssueSinetDannyUtah Sep 2, 2011 7:41 AM (in response to Shongrunden) How can I upload the file? 6. Re: TabbedViewNavigatorApplication IssueShongrunden Sep 2, 2011 8:53 AM (in response to SinetDannyUtah) I believe you can attach files if you send me a private message. Or hopefully your code is as minimal as possible and you could paste it here directly. Something like Main.mxml: CODE View.mxml: CODE 7. Re: TabbedViewNavigatorApplication IssueSinetDannyUtah Sep 2, 2011 11:30 AM (in response to Shongrunden) I have actually discovered that it was a problem with our code and not a problem with the way the flex sdk was handling the objects thanks for trying to help
https://forums.adobe.com/message/3892553
CC-MAIN-2018-39
en
refinedweb
Thumbnails for Django, Flask and other Python projects. Project description Thumbnails for Django, Flask and other Python projects. Install pip install pillow # default image engine, not necessary if another engine is used pip install python-thumbnails Usage from thumbnails import get_thumbnail get_thumbnail('path/to/image.png', '300x300', crop='center') MIT © Rolf Erik Lekang Project details Release history Release notifications Download files Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
https://pypi.org/project/python-thumbnails/
CC-MAIN-2018-39
en
refinedweb
The current RichFaces build structure (RichFaces 4.0 Build & Directory Structure) has served the project well over the initial 4.0 release, and the subsequient 4.1 and 4.2 releases, we want to re-visit the the build struture with RichFaces 4.3, and make sure we are achieving our desired goals with the build structure. This wiki page will capture: User Stories In this section we will capture the use cases that will drive the build requirements, and the build design. - As a RichFaces user I want to - include only a single jar in my applications pom file so that I can easily make use of the RichFaces components and framework without requiring complicated changes to the build - use RichFaces samples/examples as a starting point for my project so that I can easily include the provided sample code in my application. - include only a single namespace for use of RichFaces components so that I can more quickly and easily author new pages, with all components being discoverable with IDE autocompletion. - As a RichFaces dev I want to - rapidly develop new components so that I can achieve a rapid turnaround from the time I edit a component/renderer source/templates, to seeing those changes reflected in a browser window - build against multiple JSF implementations (RI, MyFaces, JBoss) so that I can know that API is compatible and that unit tests pass - run integration tests against multiple containers (using Arquillian) so that I can verify the integration with those containers easily - target examples on Java EE web profile so that I don't need to maintain dependencies for servlet containers - release project using a fully-automated and standard build so that I don't need to use custom scripts - use released version of CDK so that I don't depend on snapshot and can stabilize my build - bring test dependencies in bulks (dependency chains) so that I don't need to list all my dependencies in each submodule - clone project from single repository with clear structure so that I may dive right into code - As a RichFaces productization I want to - manage dependency and plugin versions from one or two points so that I don't have collisions in subprojects - As a RichFaces quality engineer, I want to - quickly create new samples for reported issues with minimal configuration (pom.xml, xml namespaces) so that I can copy & paste code snippets provided by user into my application . Build Requirements Here we will create a set of requirements based off the above user stories - Doing away with the API/IMPL artifact split will greatly simplify the build - the cdk should be in it's own repo with it's own release cycle - We need to introduce a parent, but will have separate parents for the CDK and Framework projects - We'll manage the JSF deps independently between the CDK and framework, and introduce a BOM if required Build Design The design of the project layout and artifacts required to satisfy the above requirements
https://developer.jboss.org/docs/DOC-18767
CC-MAIN-2021-04
en
refinedweb
Html emails can be formatted well and include pictures, unlike plain text emails. However, some email clients (mostly older ones) cannot read html. Therefore It may be useful to send plain text emails a alongside html email because we want all our subscribers receiving their emails. To achieve sending multiple email content, we are going to use Django email library called EmailMultiAlternatives. For a much cleaner code, we will create a function. We will also cover django message framework to display user notifications Instead of printing notification to console see documentation Let's get started! Create a new file on newsletter app and name it def send_multiple_email(name, receiver): subject = 'Welcome to Laughing Blog Tutorial' sender = '[email protected]' text_template = render_to_string( 'newsletter/email-subscribe.txt', {'name': name}) html_template = render_to_string( 'newsletter/email-subscribe.html', {'name': name}) message = EmailMultiAlternatives( subject, text_template, sender, [receiver]) message.attach_alternative(html_template, 'text/html') message.send() In the above code, we created a function send_multiple_email taking two parameters. Define the subject of the email and sender. Use the render_to_string function and pass the templates for the email body. We can now create the email template newsletter/templates/email-subscribe.html <h2>Hello {{name}}</h2> Welcome to Laughing Blog Newsletter and thank you for signing up. You will find the most exciting news about Python, Django, Programming tips and web development tools that will go along way to see you grow your skills newsletter/templates/email-subscribe.txt Hello {{name}} Welcome to Laughing Blog Newsletter and thank you for signing up. You will find the most exciting news about Python, Django,Programming tips and web development tools that will go along way to see you grow your skills Now is a good time to make a few changes in views.py.Change your views to look like this: newsletter/views.py') send_multiple_email(instance.name, instance.email) else: form = NewsUserForm() context = {'form': form} template = 'newsletter/subscribe.html' return render(request, template, context) First ,import the function we just created from .emails import send_multiple_email Then instead of send_mailcall send_multiple_email Run Server and test Django messages Framework Edit your views with the following: First import messages framework and next replace these line of codesand next replace these line of codes from django.contrib import messages print('your email Already exists in our database') print('your email has been submitted to our database') with these lines respectively messages.warning(request, 'your Email Already exists in our database') messages.success(request, 'your Email has been submitted to our database') To display messages edit subscription template to look like this: <ul class="messages"> {% for message in messages %} <li{% if message.tags %} {% csrf_token %} {{ form.as_p }} <button type="submit">Submit</button> </form> {% endif %} Conclusion We are now able to send alternative emails and have a more readable code.The source code for this tutorial is available on Github .Connect with me on Twitter This post was originally posted on achiengcindy.com Discussion
https://practicaldev-herokuapp-com.global.ssl.fastly.net/achiengcindy/laughing-blog-tutorial-part-3-send-alternative-content-type-emails-in-django-4le2
CC-MAIN-2021-04
en
refinedweb
Functional Testing for Synergy Web Services with ASP.NET Core by Jeff Greene, Principal Software Engineer Until recently, web developers had two basic options for backend testing: unit tests and integration tests. Starting with ASP.NET Core 2.1, Microsoft introduced another testing mechanism, functional testing, which we’ll discuss in this article. But first, let’s consider the two basic long-standing options. Unit tests work best for small chunks of isolated functionality. Incorporating unit-test-friendly architecture patterns is a good way to promote the health of your code base. (A mocking library can help with this.) However, some planning is required to get good coverage with unit tests. And even with great coverage, components may interact in unexpected ways, and the behavior of your test harness may vary from the behavior of the real running application. The traditional alternative to unit tests is integration tests. Integration tests run externally, enabling them to test the behavior of a running application. This can take the form of IIS or IIS Express running in a test environment, with Selenium or an HttpClient instance making requests to the web server. Integration tests can capture the exact behavior of a running application, but they generally run slower. Furthermore, environment setup for this type of testing is prone to failure, it takes considerable effort to run these tests, and you’ll need to interact with the networking stack in Windows to get at the code running on your machine. Enter the Microsoft.AspNetCore.Mvc.Testing NuGet package. This package, which is available in ASP.NET Core 2.1 onward, introduces a third testing option: functional testing. Functional testing lies somewhere between the other two testing options we’ve discussed and can replace integration tests. With functional testing, unit tests interact with a web server emulator (a Microsoft.AspNetCore.TestHost.TestServer instance). This enables your application to make requests as though it were hosted. In reality, though, it all runs directly in memory and never touches the network layer. Let’s take a look at a simple example. In the real world, you would already have startup and controller classes (required for AspNetCore applications), but the code below includes simple examples of these for the sake of completeness. The interesting parts of this example are SimpleTestClass.SimpleTestClass and SimpleTestClass.SimpleTest. See the code comments for information on how this all works, and note that the project for this was created for AspNetCore 2.2 running on the .NET Framework using the Synergy/DE Unit Test Project template in Visual Studio. Visual Studio doesn’t currently include a unit test project template for .NET Core, but you can create a .NET Core class library and then add Nuget references to the latest versions of MSTest.TestAdapter, MSTest.TestFramework, and Microsoft.NET.Test.Sdk. With those references, you now have the .NET Core equivalent of a unit test project. To run unit tests in .NET Core, open a command prompt from within Visual Studio, navigate to the folder where your unit test project exists, and type dotnet test That will run your unit tests and report back the results to the command window. namespace UnitTestSample {TestClass} public class SimpleTestClass server, @TestServer public method SimpleTestClass proc ;;The type being passed to UseStartup in the following line of code ;;is your Startup class. By convention the name will always be ;;'Startup', but because Microsoft makes it easy to test multiple ;;applications from a single unit test class library, you may need ;;to fully qualify the type name here. server = new TestServer(new WebHostBuilder().UseStartup<Startup>()) endmethod {TestMethod} public method SimpleTest, void proc ;;Some samples call server.CreateClient in the constructor rather ;;than in each test method, but this can lead to failures at ;;runtime and should be avoided. data client = server.CreateClient() data request = "/api/MyTest/" ;;The client looks like an HttpClient, so all the methods and ;;operations it offers are available to you here. For example, if ;;you need to make a post, use client.PostAsync(request, postData). data response = client.GetAsync(request).Result response.EnsureSuccessStatusCode() ;;Now that we've made the request, we can just grab the string ;;contents of the response and ensure that it has returned what ;;we expected. data result = response.Content.ReadAsStringAsync().Result Assert.AreEqual("Hello world", result) endmethod endclass {Route("api/[controller]")} public class MyTestController extends ControllerBase {HttpGet} public async method Get, @Task<IActionResult> proc mreturn Ok("Hello world") endmethod endclass public class Startup public method ConfigureServices, void services, @IServiceCollection proc services.AddMvcCore() endmethod public method Configure, void app, @IApplicationBuilder env, @IHostingEnvironment proc app.UseMvc() endmethod endclass endnamespace There are two things to keep in mind about this code. The first is that the project needs matching reference versions between Microsoft.AspNetCore.Mvc.Testing and your other AspNetCore packages. Prior to 3.0, this means explicit package references, while on 3.0 and higher, the AspNetCore packages are locked to the version of the .NET Core runtime that you use. We can now write performant functional tests for ASP.NET Core controllers, tests that can run through your systems and use your actual configuration. This can be an excellent replacement for integration testing when used alongside unit tests.
https://www.synergex.com/functional-testing-for-synergy-web-services-with-asp-net-core/
CC-MAIN-2021-04
en
refinedweb
Tom Dringer Joined Activity Hi, I am having to use a different computer whilst mine is in for repair. So i generated the SSH keys to be used for deployment with Hatchbox. Using [email protected] or [email protected] just gives me an error Permission denied (publickey). Does anyone know a fix for this? I am locked out of my server and i desperately need to check the logs for an error which is giving me a white screen of death. Thanks Wow thats awesome! @joshBrody - just check default scope is only going to be in the model or the controller i guess? I've just checked and i don't have default scope anywhere Hi everyone. I am currently trying to order some ActiveRecord records by score. In my controller i have: def index @pagy, @drivers = pagy( Driver.select( 'drivers.*', '(drivers.no_races + drivers.no_poles + drivers.no_podiums + drivers.no_wins) AS score' ).reorder('drivers.score DESC'), page: params[:page], items: 16 ) end I am using Pagy for the pagination. As the code shows, I do a query to select all drivers and then add together 3 columns in the table as 'score'. I then want to order by score going from high to low and show 16 records per page. When the page loads it seems to order by driver id. I can't see anywhere else that i have an order by, but i did add reorder to override anything else. Anyway for whatever reason i'm stuck with the wrong ordering. Any direction is appreciated :-) Mockup - Ok i made a staging enviroment in my app, which i guess could be the issue. I have environment variables on Hatchbox using staging, rather than p[roduction. I'll dig deeper. Thanks Cool can i set this somewhere? My path should be pretty default. Its just app/ Hi, I am deploying to hatchbox and everything appears fine until i load the site up in the browser. Looking at the logs there is no public/index.html. On my development environment there is also no index file in public. I am using Rails 6 which apparently doesn't build a public index.html file? Posted in Postgres issues I now have Postgres running on my local machine nicely. My issue now is i can't run a migration due to the following error: ActiveRecord::StatementInvalid: PG::UndefinedTable: ERROR: relation "drivers" does not exist LINE 8: WHERE a.attrelid = '"drivers"'::regclass There should be a relationship between a user and a driver, where the user has one driver. In my user (Devise) model I have has_one :driver and in my driver migration I have: t.string :user_id t.belongs_to :user So in the driver table the user_id field should hold the user.id. Any direction is appreciated. Posted in Postgres issues Hi, So as i began a project earlier in the year, i decided to go full Docker for deployment. That was all good except debugging and stuff proved difficult so this weekend i decided to make the project native and use something for deployment. Long story short, now i have gone back to a native based project (i.e no Docker), my Postgres installation (which was fine in the beginning) now just does not work. I had issues with port numbers (which i have since managed to fix) and no issues with database not found. To make things worse, i think (i'm on macos and using Rubymine) i have Postgres installed via the OS, multiple versions by Homebrew, and some from standalone Postgres apps. So obviously with these issues, i can;t start my app or run migrations etc. Has anyone had this issue when moving away from Docker? My error at the moment is no database named "xxx". I thought when i did i migration its all taken from the database.yml? I've run commands like rake db:create and similar. I'm not totally sure the db i am connected to is even the right one. Posted in Pretty urls with FriendlyID Discussion Is it possible to to make the url "{id}-{user.fname}-{user.lname}"? It seems to work fine clicking on links, but as soon as i try to create, edit, or delete anything i get route not found. Hi, I want to validate my image upload field by making a user upload only a square image (i.e 200px x 200px). I'm basically wanting square image dimentions so it will resize and nicely and not look disproportional. Can this be done? Thanks Anyone interested in this, in the news controller under def index you can just add the variable @students = Students.all or whatever and it really is as simple as that. I'm thinking i need to look at Nested Resources? Hi, I’m not even sure I’m using the correct terminology here (sharing resources among controllers) but here goes. Imagine I have a page called students with the usual CRUD functionality and another page with another controller called news or something. If the student page had a table called students with first name, second name etc ... how would I use the student table in the news template so I could do a for each student to list names or whatever? This is where things start to fall apart in my understanding of Rails. Thanks! Posted in Liking Posts Discussion I am also having the 404 issue but it's something to do with routes i'm guessing? ActionController::RoutingError (uninitialized constant Developments): and then in the console: POST [HTTP/1.1 404 Not Found 1343ms] When i run rake routes I get the following: new_development_like GET /developments/:development_id/like/new(.:format) developments/likes#new edit_development_like GET /developments/:development_id/like/edit(.:format) developments/likes#edit development_like GET /developments/:development_id/like(.:format) developments/likes#show PATCH /developments/:development_id/like(.:format) developments/likes#update PUT /developments/:development_id/like(.:format) developments/likes#update DELETE /developments/:development_id/like(.:format) developments/likes#destroy POST /developments/:development_id/like(.:format) developments/likes#create Any feedback is appreciated. Thanks! Wow that really is above and beyond! Thank you so much! Thanks for the feedback. I get the same error still, but this time much more detailed. Uncaught ReferenceError: toastr is not defined <anonymous> (index):38 dispatch turbolinks.js:75 notifyApplicationAfterPageLoad turbolinks.js:994 pageLoaded turbolinks.js:948 e turbolinks.js:872 start turbolinks.js:882 start turbolinks.js:1040 <anonymous> application.js:24 <anonymous> application-51d3c38d384dcac9fb08.js:2 Webpack 3 localhost:3000:38:5 <anonymous> (index):38 dispatch turbolinks.js:75 notifyApplicationAfterPageLoad turbolinks.js:994 pageLoaded turbolinks.js:948 e turbolinks.js:872 (Async: EventListener.handleEvent) start turbolinks.js:882 start turbolinks.js:1040 <anonymous> application.js:24 <anonymous> application-51d3c38d384dcac9fb08.js:2 I have cleared my cache and all the usual things. Is there anything i should be looking out for in those errors? I load my js in the head tag on my application layout file <%= javascript_pack_tag 'application', 'data-turbolinks-track': 'reload' %> Thanks Sure, so for example. I am trying to add Toastr. I have installed via Yarn. In my javascript/packs/application.js I have require("toastr") I also have an application_helper.rb which i saw from a tutorial about adding Toastr so i have: def toastr_flash flash.each_with_object([]) do |(type, message), flash_messages| type = 'success' if type == 'notice' type = 'error' if type == 'alert' text = "<script>toastr.#{type}('#{message}', '', { closeButton: true, progressBar: true })</script>" flash_messages << text.html_safe if message end.join("\n").html_safe end Then I call toastr_flash in my views/layouts/application.html.rb. The error i get is Uncaught ReferenceError: toastr is not defined Any direction is appreciated. Hi. I am fairly new to Rails and so far I have been unsucessful at adding any JS to my Rails 6 project. I have seen many videos and tutorials but i seem to run in to the same issue. Basically I get "xxx is undefined" for every script. I'm thinking my scripts are called at the wrong time or in the wrong order. I'm using Webpacker for my JS. Thanks
https://gorails.com/users/35309
CC-MAIN-2021-04
en
refinedweb
Backwards compatibility and TripleO¶ TripleO has run with good but not perfect backwards compatibility since creation. It’s time to formalise this in a documentable and testable fashion. TripleO will follow Semantic Versioning (aka semver) for versioning all releases. We will strive to avoid breaking backwards compatibility at all, and if we have to it will be because of extenuating circumstances such as security fixes with no other way to fix things. Problem Description¶ TripleO has historically run with an unspoken backwards compatibility policy but we now have too many people making changes - we need to build a single clear policy or else our contributors will have to rework things when one reviewer asks for backwards compat when they thought it was not needed (or vice versa do the work to be backwards compatible when it isn’t needed. Secondly, because we haven’t marked any of our projects as 1.0.0 there is no way for users or developers to tell when and where backwards compatibility is needed / appropriate. Proposed Change¶ Adopt the following high level heuristics for identifying backwards incompatible changes: Making changes that break user code that scripts or uses a public interface. Becoming unable to install something we could previously. Being unable to install something because someone else has altered things - e.g. being unable to install F20 if it no longer exists on the internet is not an incompatible change - if it were returned to the net, we’d be able to install it again. If we remove the code to support this thing, then we’re making an incompatible change. The one exception here is unsupported projects - e.g. unsupported releases of OpenStack, or Fedora, or Ubuntu. Because unsupported releases are security issues, and we expect most of our dependencies to do releases, and stop supporting things, we will not treat cleaning up code only needed to support such an unsupported release as backwards compatible. For instance, breaking the ability to deploy a previous still supported OpenStack release where we had previously been able to deploy it is a backwards incompatible change, but breaking the ability to deploy an unsupported OpenStack release is not. Corollaries to these principles: Breaking a public API (network or Python). The public API of a project is any released API (e.g. not explicitly marked alpha/beta/rc) in a version that is >= 1.0.0. For Python projects, a _ prefix marks a namespace as non-public e.g. in foo.\_bar.quux quuxis not public because it’s in a non-public namespace. For our projects that accept environment variables, if the variable is documented (in the README.md/user documentation) then the variable is part of the public interface. Otherwise it is not. Increasing the set of required parameters to Heat templates. This breaks scripts that use TripleO to deploy. Note that adding new parameters which need to be set when deploying new things is fine because the user is doing more than just pulling in updated code. Decreasing the set of accepted parameters to Heat templates. Likewise, this breaks scripts using the Heat templates to do deploys. If the parameters are no longer accepted because they are for no longer supported versions of OpenStack then that is covered by the carve-out above. Increasing the required metadata to use an element except when both Tuskar and tripleo-heat-templates have been updated to use it. There is a bi-directional dependency from t-i-e to t-h-t and back - when we change signals in the templates we have to update t-i-e first, and when we change parameters to elements we have to alter t-h-t first. We could choose to make t-h-t and t-i-e completely independent, but don’t believe that is a sensible use of time - they are closely connected, even though loosely coupled. Instead we’re treating them a single unit: at any point in time t-h-t can only guarantee to deploy images built from some minimum version of t-i-e, and t-i-e can only guarantee to be deployed with some minimum version of t-h-t. The public API here is t-h-t’s parameters, and the link to t-i-e is equivalent to the dependency on a helper library for a Python library/program: requiring new minor versions of the helper library is not generally considered to be an API break of the calling code. Upgrades will still work with this constraint - machines will get a new image at the same time as new metadata, with a rebuild in the middle. Downgrades / rollback may require switching to an older template at the same time, but that was already the case. Decreasing the accepted metadata for an element if that would result in an error or misbehaviour. Other sorts of changes may also be backwards incompatible, and if identified will be treated as such - that is, this list is not comprehensive. We don’t consider the internal structure of Heat templates to be an API, nor any test code within the TripleO codebases (whether it may appear to be public or not). TripleO’s incubator is not released and has no backwards compatibility guarantees - but a point in time incubator snapshot interacts with ongoing releases of other components - and they will be following semver, which means that a user wanting stability can get that as long as they don’t change the incubator. TripleO will promote all its component projects to 1.0 within one OpenStack release cycle of them being created. Projects may not become dependencies of a project with a 1.0 or greater version until they are at 1.0 themselves. This restriction serves to prevent version locking (makes upgrades impossible) by the depending version, or breakage (breaks users) if the pre 1.0 project breaks compatibility. Adding new projects will involve creating test jobs that test the desired interactions before the dependency is added, so that the API can be validated before the new project has reached 1.0. Adopt the following rule on when we are willing to [deliberately] break backwards compatibility: When all known uses of the code are for no longer supported OpenStack releases. - If the PTL signs off on the break. E.g. a high impact security fix for which we cannot figure out a backwards compatible way to deliver it to our users and distributors. We also need to: Set a timeline for new codebases to become mature (one cycle). Existing codebases will have the clock start when this specification is approved. Set rules for allowing anyone to depend on new codebases (codebase must be 1.0.0). Document what backwards compatible means in the context of heat templates and elements. Add an explicit test job for deploying Icehouse from trunk, because that will tell us about our ability to deploy currently supported OpenStack versions which we could previously deploy - that failing would indicate the proposed patch is backwards incompatible. If needed either fix Icehouse, or take a consensus decision to exclude Icehouse support from this policy. Commit to preserving backwards compatibility. When we need alternate codepaths to support backwards compatibility we will mark them clearly to facilitate future cleanup: # Backwards compatibility: <....> if .. # Trunk ... elif # Icehouse ... else # Havana ... Alternatives¶ We could say that we don’t do backwards compatibility and release like the OpenStack API services do, but this makes working with us really difficult and it also forces folk with stable support desires to work from separate branches rather than being able to collaborate on a single codebase. We could treat tripleo-heat-templates and tripleo-image-elements separately to the individual components and run them under different rules - e.g. using stable branches rather than semver. But there have been so few times that backwards compatibility would be hard for us that this doesn’t seem worth doing. Security Impact¶ Keeping code around longer may have security considerations, but this is a well known interaction. Performance Impact¶ None anticipated. Images will be a marginally larger due to carrying backwards compat code around. Other Deployer Impact¶ Deployers will appreciate not having to rework things. Not that they have had to, but still. Developer Impact¶ Developers will have clear expectations set about backwards compatibility which will help them avoid being asked to rework things. They and reviewers will need to look out for backward incompatible changes and special case handling of them to deliver the compatibility we aspire to. Implementation¶ Dependencies¶ None. An argument could be made for doing a quick cleanup of stuff, but the reality is that it’s not such a burden we’ve had to clean it up yet. Testing¶ To ensure we don’t accidentally break backwards compatibility we should look at the oslo cross-project matrix eventually - e.g. run os-refresh-config against older releases of os-apply-config to ensure we’re not breaking compatibility. Our general policy of building releases of things and using those goes a long way to giving us good confidence though - we can be fairly sure of no single-step regressions (but will still have to watch out for N-step regressions unless some mechanism is put in place).
https://specs.openstack.org/openstack/tripleo-specs/specs/juno/backwards-compat-policy.html
CC-MAIN-2021-04
en
refinedweb