text
stringlengths
454
608k
url
stringlengths
17
896
dump
stringclasses
91 values
source
stringclasses
1 value
word_count
int64
101
114k
flesch_reading_ease
float64
50
104
I have a hash here: VALID_CHOICES = { 'r' => 'rock', 'p' => 'paper', 'sc' => 'scissors', 'l' => 'lizard', 'sp' => 'spock' } def win?(first, second) (first == 'sc' && second == 'p') || (first == 'p' && second == 'r') || (first == 'r' && second == 'l') || (first == 'l' && second == 'sp') || (first == 'sp' && second == 'sc') || (first == 'sc' && second == 'l') || (first == 'l' && second == 'p') || (first == 'p' && second == 'sp') || (first == 'sp' && second == 'r') || (first == 'r' && second == 'sc') end You should define clear rules for what each token can win: WINS = { 'r' => %w{l sc}, 'p' => %w{r sp}, 'sc' => %w{p l}, 'l' => %w{p sp}, 'sp' => %w{r sc} } Now you can determine wins using a simple lookup: def win?(first, second) WINS[first].include?(second) end While there may be several 'clever' ways to avoid an explicit structure like WINS, explicit rules are much more understandable - and therefore, more maintainable. Conciseness in code is considered a positive attribute where it improves the readability of the code. Conciseness to the extreme that causes the code to be difficult to understand is not something to strive for.
https://codedump.io/share/GZqgXSEjwzwv/1/ruby---how-do-i-shorten-my-method
CC-MAIN-2018-09
refinedweb
170
61.29
How to Make Static Variables in C Programming In C programming, variables used within a function are local to that function: Their values are used and then discarded when the function is done. Don’t Give Me No Static demonstrates the concept. DON’T GIVE ME NO STATIC #include <stdio.h> void proc(void); int main() { puts("First call"); proc(); puts("Second call"); proc(); return(0); } void proc(void) { int a; printf("The value of variable a is %dn",a); printf("Enter a new value: "); scanf("%d",&a); } In Don’t Give Me No Static, variable a in the proc() function does not retain its value. The variable is initialized only by the scanf() function at Line 20. Otherwise, the variable contains junk information. USING TYPEDEF TO DEFINE A STRUCTURE typedef struct id { char first[20]; char last[20]; } personal; typedef struct date { int month; int day; int year; } calendar; struct human { personal name; calendar birthday; }; Exercise 1: Build and run a new project using the source code from Using typedef to Define a Structure. he output looks like this: First call The value of variable a is 0 Enter a new value: 6 Second call The value of variable a is 0 Enter a new value: 6 Despite all attempts to assign 6 to variable a, the program always forgets. So much for that. Or is it? Exercise 2: Modify the source code from Using typedef to Define a Structure, editing Line 16 to read: static int a; Build and run to test the output. First call The value of variable a is 0 Enter a new value: 6 Second call The value of variable a is 6 Enter a new value: 5 Because the variable was declared as static, its value is retained between function calls. You have no need to declare variables as static unless you need their values retained every time the function is called, and this situation crops up from time to time. But before believing it to be a magic cure, also consider creating global variables. Variables returned from a function do not need to be declared static. When you return a variable, such as return(a); only the variable’s value is returned, not the variable itself.
https://www.dummies.com/programming/c/how-to-make-static-variables-in-c-programming/
CC-MAIN-2019-26
refinedweb
374
65.76
: Objective-C: the More Flexible C++ Some thoughts from a scientist who also dabbles in software creation: my 2 cents Canadian (not much in othe terms, lately) worth... Some years ago, I wrote a pretty large (10^4 lines) open-source code in C. It became apparent that it would help for this code to have parts that were more object-oriented, and so I read a bit and decided to convert those parts. During this work, I learned that objC is quite beautiful. By that, I mean that the code, and the logic it inspired, was elegant to the eye, in the way that some mathematics proofs can be. But one day I realized that none of the folks using this code knew objective-C, whereas many of them knew C++. Since this was a shared program, I wanted my users to be able to contribute to the work. And so I started the process of converting the objective-C into C++. That was not much fun, partly because the syntax is different and partly because C++ seems not to inspire the writing of elegant code (or, better stated, it seems not to inspire the construction of elegant algorithms). Why is this, exactly? I'm not sure. At first I thought my distaste for C++ might be just a love of the old. But, now I've been using C++ for years, and I can read/write it much more easily than objective-C, and I still feel the same way. In summary, the advantage of objective-C seems to be that it inspires an elegance of expression. The disadvantage is that fewer people can read your code. Of course, all of this may be moot, since it's my understanding that many students are learning Java before they learn any of the C dialects. Maybe I'm getting too old to keep up ... I just get used to Perl and Python comes along like a knight in shining armor, and before I learn it, I hear that now Ruby rules! Dan. Re: Objective-C: the More Flexible C++ You're right. Obj-C done right is MUCH more elegant than anything else. Of course, you have to get into the "mood" to do it right. Just applying the "old habits" (C++ etc.) won't work. Where Objective-C shines is that it leads to truly reusable code. Just comparing the number of classes in a typical C++ library and within Objective-C shows that. This is not surprising at all: most C++ or Java windowing libraries (like PowerPlant on Mac, MFC on Windows) are anyway just bad copies of the NextStep classes. Their quality only differs how much thought they put into the classes to reassemble the functionality of Objective-C in the choosen language. so - why not choose the original first? Learning the syntax is something like 2 days for a C programmer. The tough part is getting the own classes right. But once its understood, there is nothing like it anywhere. I've written for 10 years in C and C++ and it was always messy and at the end no fun at all. After switching to Obj-C the only thing I regret is not buying a NextStep Station in the 90ies... Michael Objective-C---more than just games Macromedia FreeHand (v4) started as Altsys Virtuoso on NeXTstep. Improv--Although there was an Improv 2 for Windows, it was never quite as nice as Improv for NeXTstep (which also fell far short of where it ought to've been), but there's still no widely available spreadsheet available now which handles 3D data so elegantly AFAIK. Then, one could compare the programs which are all but without peer, for example TIFFany (PhotoShop on steroids), or PasteUp.app (developed almost single-handedly by Glenn Reid in roughly a year). Or, MCI's Friends and Family database system (they liked it so much, they bought the company!) NeXTstep is also the premiere platform for using PostScript directly and interactively---Alan Hoenig praises it in his book _TeX Unbound_ SoftMagic, is an incredible product. And of course, there's WebObjects.... Lastly, Tim Berners-Lee used NeXTstep (he crafted a thing called worldwideweb.app---guess what it grew into) William Re: Objective-C: the More Flexible C++ Hey, you cannot blame C++ for introducing new keywords and propose a language that overloads every special character on the planet :) I dont want to say that Objective C is bad or something. But don't try to make a thing better by complaining about another thing. Beside that, C++ is not only "C with Objects". It has many other useful features, like templates or references. Maybe it would be a good idea to think about mixing C++ and Objective C, creating a "Objective C++" that combines Objective C's runtime system with all the C++ features (and the more popular syntax of C++). As you can see, I am not a proponent of the 'make a language as simple as possible' school, but I rather prefer the 'add every single feature that can not be implemented in a lib, because every feature helps the programmer who works 100h a week in the damn language' school... Re: Objective-C: the More Flexible C++ Objective-C++ already exists! NeXT extended Objective-C in this way to leverage C++ into NeXTSTEP applications (if the solution already exists in C++ why not use that). It turns out that Objective-C++ is probably only useful for that purpose, the features in C++ have a heavy cost in readability and ease of use, so Objective-C++ isn't used much. Objective-C turns out to prove that K&R were right to keep C a small language. :-) Re: Objective-C: the More Flexible C++ And it is thinking like that to cause C++ compilers to never be able to totally implement the C++ language specifications. The compiler makers have a hard time trying to implement these "features". I always get frustrated to write a program using valid C++ and it compiles and runs fine on one platform and try to compile it on another(VC++) and have either totally rewrite that part of code or do some conditional compilation that makes the code hard to read. I like C++ and wish a few of the very useful features like namespaces would be added to Objective-C. I am totally against templates being added since it is against the philosphy of a dynamic OO language. A simpler language allows you to move on and start writing code to do some work. I was able to learn Objective-C in a few days and I understand the entire language. I been programming in C++ for 5 years and I still do not know the language. Re: Objective-C: the More Flexible C++ > I was able to learn Objective-C in a few days and I understand the entire language. Just Understand the language is not enough, Apply them practical will tell. > I been programming in C++ for 5 years and I still do not know the language. Are you work as a professional programmer for a competitive company or non professional just writing some simple app as hobby or in goverment org that use & waste tax-payer money ? Nowaday, all OOP similar to C++, include JAVA, C#, VB.NET etc. If you cannot understand C++, you cant understand thiese language as well. If you are a professional programmer, esp in competitive company, you are already fired (for failed to know the language). Other comment is, C++ Template (Now C#/VB dot.net also support similar features called "generic") is "good to have", but is NOT "must have", it can improve the reusability and flexibilty very much, esp like map, list, stack etc.(standard template library) Nevertheless, You do NOT need to explicitly write C++ template to qualify as "C++ programmer". Many professional C++ programmer never write their own template. (template is not so easy to read, but very easy to use). Many developer likes to make use of some language features just purely because of "the language have this features - I MUST use it", or to show-case there are the pro. , without considering practically, case by case suitability and portability. (ie, "good to have" vs "must have"). Not using template, does not disqualify you as C++ Programmer, But Not even have a basic understand of it, may disqualify you as C++ programmer). What language to use, and their understanding of the language, depend on the programmer computer-science knowledge also, of-course we cannot expect, for someone study archeology to code in C++. But for those have strong Computer-Science background, C++ is just as easy as A B C. BTW, I self study OOP generally, C++ specifically. (my school deos not not teach us C++ at that time). I can "understnad" it in few days also, cannot imaging there is someone cannot understand it after 5 years ! Re: Objective-C: the More Flexible C++ Objective C++ already "exists"... Re: Objective-C: the More Flexible C++ And this does not look like C. No wonder people adopt C++ instead of Objective-C. Re: Objective-C: the More Flexible C++ In my opinion, part of C++'s problem is that it looks TOO MUCH like C. This, I think, encourages confusion among beginners and the tendency to write C code, not OO code, with C++. IMHO, a method call is inherently different from a function call - especially in a dynamic system like ObjC, and should have its own notation distinct from that of a function call. Likewise, an object is inherently different from a structure, and the notation should be different. Etc. I much prefer ObjC's [foo bar:1 with:me]; syntax, because it is quite clear that this is an OO construct, and different from all the C code that might surround it. Without OOP knowledge, not look too much like. > In my opinion, part of C++'s problem is that it looks TOO MUCH like C. This, I think, encourages confusion among beginners and the tendency to write C code, not OO code, with C++. Programmer without OOP concept and skill, will write in structured manner given whatever OOP language to them. for eg, if the code is written by non OOP/C++ programmer, there actually write in 'C' only, wrapped, or saved in .cpp or .cc files. .cpp or .cc save file does NOT mean it is C++ code. keep in mind. For those programmer, There are not C++ beginners, but OOP beginner or totally have no idea of what is OOP. If you given them Obj-C capable compiler, there will also write their code in C only code, wrapped / saved in .m files - nothing to do with "look too much like". Re: Objective-C is definitely superior to C++ I totally agree with you... Who does not agree with the title either does not know the language or is a moron (no pun intended) On the other hand, I believe Objective-C lacks a couple of important features that C++ has (namespaces and templates among them), but I found that it is still an excellent language even without those... P.S. You can always mix both languages with Objective-C++ Once I read an article by Tim Sweeney (creator of UT) where he analysed programming languages (or something like that)... he stated that in the future, languages will have features to make class hierarchies "extensible" (I can't remember the exact words)... Obj-C is already capable to do that and with trivial effort (and dynamically: you can "override" any class you find with your own version) Re: Objective-C: the More Flexible C++ why don't your use [[List alloc] init] to create an object? You used [List new]. But you said: Usually, you create objects with a call to alloc: Very confusing. Re: Objective-C: the More Flexible C++ new is a short cut. [Object new] is equivalent to [[Object alloc] init] Re: Objective-C: the More Flexible C++ new is just a "shorthand" method used in GNUStep: - (id) new { return [[self alloc] init]; } Method new might not actually be (not sure) the one above but surely it does the same as above (conceptually)
http://www.linuxjournal.com/article/6009?page=1&quicktabs_1=1
CC-MAIN-2014-23
refinedweb
2,053
69.52
DF: some major changes are in the renewed WG charter: o concrete model for attachment feature is now explicitly possible o end-of-charter date is now 31 December 2002 o Change in section 5.1 IPR so that it now references the Current Patent Policy DF: members' IPR statements from theirreponses to the new charter are available on one new IPR page. Members should look at this page to check their IPR statements are reflected correctly deferred to next telecon -- Primer Nilo: nothing to report -- Spec MH: part 2 changed in HTTP binding sec. DF: part 2 will be on the reading list NH: when will a version be available? DF: prefers snapshot at end of this week MG: monday morning will be best DF: can we agree to have a snapshot on friday EOB? Editors: Yes. Anish: the test document should be available shortly after the spec DF: Snapshot of Spec Update should be available EOB Friday (PT). Test Collection Update available after Spec Snapshot (~ Monday). -- Test Collection: status of update based on LC issue resolutions Anish: requests editors for snapshot to refer to (broken links) Editors will help on a solution currently in sync with version from 10/11/2002 -- Attachment Feature: progress of LC review DF: Response from QA group, issues on list -- LC Issue List Carine: nothing to report -- Implementation tracking DF: asks members for for a list of implemented features -- Media type draft, IANA application DF: nothing to report -- Planning Oct f2f DF: mail from Colleen with more f2f details, please look over the agenda and note any omissions NM: everyone should read the docs on the reading list. Should allocate some time at f2f for comments on spec HFN: we should talk about the concrete attachment feature DF: we can talk about the spec and a concrete attachment feature at the f2f -- Discussion of pushback to any issues we have closed -- Potential new issues. For each potential new issue, we will first decide whether or not to accept it as an issue (based on severity, "8-ball" impact, time to resolve, etc). DF: new issues: we pushed back P3P issues(#240) on concrete implementation for P3P but P3P is not satisfied because there is no other group that has the mandate to pick up this issue. XMLP WG passed the issue to the WS coordination group o Jacek points out [] that the new nodeType provides a more consistent and accurate means of distinguishing between value types than the terminal/non-terminal distinction currently used in the Data Model section of Part 2. Therefore he proposes to remove the latter distinction from the spec, and to classify this as an editorial change. MH: some clarification might be enough DF: tune up wording on terminal/non-terminal DF: action item to Jack to produce a list of changes that should be made DF: accepted as new issue with issue# assigned by carine o Noah has posted a potential issue [] based on the observation that it is currently not possible to ensure that a header will travel to all downstream nodes using the obvious role='next' and mU='false' mechanism. The rationale for posting such a potential issue at this late date is that it appears to concern a very common scenario. The posting contains a proposed resolution. YL: it will be ok to have a new role because it doesn't affect the other parts of the spec. JK: don't like the direction of adding a new role, because this will lose the ability to tag a header with a role indicating that no soap node should process this header. MK: don't believe that this use case is important NM: States that this potential issue may be hard to fix later HFN: agrees that this is an issue but does not like the solution in just flipping the exisitng default that requires an intermediary to remove headers DF: postpone the decision to accept this as a new issue. It Will be on the agenda for next week, and in the meantime we should discuss in email. -- 384, are gateways SOAP intermediaries? The issue is listed as editorial, however, the definition of a gateway is an important concept. There appears to be consensus (e.g.) that gateways are not necessarily SOAP intermediaries. This issue was postponed from last week's telcon to allow DavidO (and possibly others) to evaluate a WSA WG discussion thread on the same subject. Does anyone on the WG disagree with the consensus (check minutes on exactly how we left this issue)? DF: We need a definition of a gateway first NM: do we need to say anything about gateways, because they are out of scope? DF: asks the WG if we should say anything about gateways? No one states that we should mention gateways DF: is there any objeciton to closing the issue by not doing anything on the basis that the spec is OK as is, and we see no needs to introduce gateways No objections stated DF: Issue 384 is closed with the status quo. -- 305, SOAP-Response MEP does not need sending+receiving states Per last week's telcon, the editors are working on a solution based on option (iii) in. MH: Spec is fixed DF: any objection against closing the issue with this resolution? No objections raised DF: issue 305 is closed with the resolution provided by the editors MH: will send the comments -- 300, How is version transition handled in the HTTP binding? Issue originator asks whether version transitions work when a SOAP 1.2 node sends a SOAP 1.1 version mismatch error message using HTTP but with an application/xml+soap content-type (SOAP 1.1/HTTP used text/xml content-type)? Email [] suggests (i) keeping status quo, or (ii) adding text to clarify that a SOAP 1.1 binding may be used in sending the version mismatch error message. We are awaiting text from Glen to close this issue. (Note possible tie-in to 395.) DF: postpone because we do not have a solution Changes within the HTTP binding may be helpful for the resolution Waiting for text from Glen or failing such text we will reassign the action at the next telecon. -- 355, CIIs in SOAP infoset The issue originator asks whether a SOAP infoset may contain Comment Info Items. At the last f2f we asked Gudge to create a proposal, which he has done []. This proposal should also clarify editorial issue 262 regarding whitespace significance as written in the Primer. Noah has described [] 3 changes to the proposal (disallow intermediaries to remove HEADERs, include references to addt'l rules, editorial). Does the WG agree with the proposal and the suggested modifications? ..... we are awaiting (i) result of conversation between Henrik & Gudge, and (ii) a reading from Yves on whether the existing proposal would indeed send us back pre-LC. YL: a solution will not bring us back to last call NM: we are still expecting mail containing a proposed resolution from Gudge MG: the resolution addresses some issues raised at the last f2f related to XML-dsig. -- 364, id and ref mutually exclusive Jacek has proposed closing this issue with the status quo and there is some agreement (e.g.). DF: is there any discussion about this proposal? No discussion DF: is there any objeciton to closing this issue with the proposal (maintaining status quo)? No objecitons DF: issue 364 is closed with status quo. -- 277, part 1 general comments Proposal from Herve [] regarding use of QNames. Proposal from Herve [] regarding use of namespaces. DF: we will skip this for a week -- 294, part 2, MEC motivation? Proposal due from Marc DF: we will skip this for a week -- 363, RPC return accessor Asir proposes to close this issue without taking any action [] because the issue is not longer applicable given that we decided to remove the RPC array representation. DF: is there any discussion? No discussion DF: is there any obejction to closing the issue with the proposal (maintaining status quo)? No objections DF: issue is closed without taking any action meeting ended
http://www.w3.org/2000/xp/Group/2/10/16-minutes.html
CC-MAIN-2015-22
refinedweb
1,355
57.2
Download CD Content The first 12 chapters of this book have focused on acquainting you with the language of C++. You have explored the syntax, structure, and techniques of this programming language. However, you should be aware that this is only part of the process of programming. Simply understanding language syntax is not enough. One of the fundamental cornerstones of computer science is the study of data structures and algorithms. In this chapter, you will be introduced to both of these topics. The first order of business is to define exactly what a data structure is. A data structure is an organized way of storing data that also defines how the data will be processed. Structured ways of storing data are quite commonly used—you have already encountered them without knowing it. For example, when you send documents to a networked printer, you are sending them to a queue, a data structure. A queue is, in fact, one of the most commonly encountered data structures. Let’s start with examining queues in more detail. In a queue, data is entered in sequence from the beginning to the end. The queue is usually represented by an array. The pointer that shows where the last element was added is called the head. The pointer that shows where the last element was removed and processed is called the tail. Figure 13.1 illustrates this. Figure 13.1: Structure of a queue. When you use a network printer, each element of the queue array is a document (or, more likely, a fixed amount of memory). The head represents the last place that a document was added to the print queue. After an item is added, the head moves forward one space. The tail represents the processing end of the queue. Once an item is processed (i.e., printed) it is removed from the queue and the tail is advanced. When the head reaches the end of the queue, it starts back over at the beginning, and that is what is referred to as a circular queue. Let’s look at an example using a simple queue of integers. Step 1: Enter the following code into your favorite text editor. #include <iostream> using namespace std; int queue[10]; // both the head and the tail will start // out pointing to the first element in // the array int *phead = &queue[0]; int *ptail = &queue[0]; int main( ) { int i; for( i= 0;i<10;i++) { cout << "Please enter an integer. \n"; cin >> queue[i]; // increment the head pointer so that // it points to the next element of the array phead++; } for(i=0;i<10;i++) { ptail++; cout << queue[i] << endl; } return 0; } Step 2: Compile and execute that code. You should see something much like what is depicted in Figure 13.2. Figure 13.2: Circular queue demonstration. You should notice that, in this example, the pointer’s head and tail are only being used to keep the place of where we are currently. In some cases, programmers will use a plain integer in this case rather than a pointer to an integer. The real problem occurs when your are processing items out, slower than entering them in. You see if the head catches the tail, it will start overwriting things you have not yet processed! Normally, you would check to see if the head is the same value as the tail. If it is, then you tell the user “queue is full” and you don’t take any more input until your processing can catch up. Another popular data structure is the stack. Whereas a queue processes items on a first-in, first-out basis (FIFO), the stack does its processing on a last-in, first-out basis (LIFO). A stack gets its name from the way it processes data, much like a stack of plates. If you stack up 10 plates, you will have to remove the last one you placed on the stack before you remove any others (unless, of course, you are a magician)). Figure 13.3 illustrates the way a stack works. Figure 13.3: The stack. The registers on your computer’s central processing unit (CPU) use stacks. Items are pushed onto the stack and popped off. If you worked with an Assembly programming language, you would become intimately familiar with the stack. However, for our purposes, it is enough that you know what a stack is. The stack and the queue are just two examples of data structures. There are many more to choose from. It is beyond the scope of this book to examine all these data structures. However, you should be at least aware of what some of these data structures are. You can then use some of the resources listed in the back of this book to learn more if you so desire. In addition to stacks and queues, you may wish to acquaint yourself with the linked list, double linked list, and binary tree. One more commonly encountered data structure is the linked list. A linked list consists of a series of nodes (made either with structures or classes) that have linked to the next node in the series. The link to the next node is usually accomplished with a pointer to another node. The following is an example of a node. struct node { int data; // data can be of any type at all. node *nextnode; } Each node can then be included in a class. The class must have at least two methods. The first method is a push method to add new nodes to the linked list. The second method is a pop to remove nodes from the linked list. Because of the push and pop methods, a linked list is capable of dynamic sizing. That means that it can grow larger or smaller. This is in direct contrast to an array, which cannot change its size. The next step is to build a class to house the nodes, as well as the push and pop functions. The following example shows you how to create and use a linked list. Step 1: Place the following code into your favorite text editor and save it as linkedlist.h. struct node { int data; // data can be of any type at all. node *nextnode; node *prevnode; }; class linkedlist { private: node base; // This is the base node // from which other nodes will // spring. node *curnode;// A pointer to the current node. public: void push(int item); int pop(); }; void linkedlist::push(int item) { // This function basically creates a new node and // places it at the top of the linked list. The node // currently at the top is moved down. node *temp=curnode; // Temporary node curnode->nextnode=new node;// Create new node curnode=curnode->nextnode; // Assign current to // new top node curnode->data=item; // Assign the data curnode->prevnode=temp;// Set previous // pointer } int linkedlist::pop() { // This function pulls the data off the current // node,then // moves the node preceding the current node into the // front // of the linked list. int temp; temp=curnode->data; // if the previous node is somehow already gone, then // skip // the rest. if (curnode->prevnode == NULL) return temp; curnode=curnode->prevnode; // delete the node we just popped off delete curnode->nextnode; return temp; } Step 2: Write the following code into your favorite text editor and save it as 13_02.cpp. #include "linkedlist.h" #include <iostream> using namespace std; int main() { linkedlist mylist; int data; cout << "Enter your data, and enter -1 to exit \n"; while(data != -1) { cout << "Enter your next number \n"; cin>> data; mylist.push(data); } return 0; }// end main This data structure undoubtedly appears much more complicated than the queue. There are extensive comments in the source code to aid in your understanding. However, let’s take a moment to review the highlights. To begin with, the core of the linked list is the node structure. It holds the data. Now, in our case, the data is an integer; however, it could be any data type at all, including another structure or class. This structure is encapsulated in a class. We have a pointer that tells us the current node and the next node. We then have two functions that allow us to add new nodes or remove old ones.
https://flylib.com/books/en/2.331.1.106/1/
CC-MAIN-2021-25
refinedweb
1,379
72.97
plzzz help me!! plzzz help me!! . Write a program to display a multiplication table, by entering the start number and the end number. Sample output: Enter start number: 1 Enter end number: 2 {press enter} 1 2 3 4 5 6 7 8 9 10 1 Help Me plzzz Solve this problem plzzz Hibernate code - Hibernate Hibernate code firstExample code that you have given for hibernate to insert the record in contact table,that is not happening neither it is giving... inserted in the database from this file. A small programming task, plz respond at the ealiest.. A small programming task, plz respond at the ealiest.. Hi Guys ,small task to you all... sam seeks your help to know the longest run possible with the given peaks Java - Hibernate , this type of output. ---------------------------- Inserting Record Done Hibernate... FirstExample { public static void main(String[] args) { Session session = null... = null; try{ // This step will read hibernate.cfg.xml and prepare hibernate please do respond to my problem sooooon sir - Java Beginners please do respond to my problem sooooon sir Hello sir, Sir i have executed your code and i got the result but the problem is whenever i click on the link in my browser the link is opened in the internet explorer.i need Problem in running first hibernate program.... - Hibernate /FirstExample Exception in thread "main" " in running first hibernate program.... Hi...I am using... programs.It worked fine.To run a hibernate sample program,I followed the tutorial below Could not read mappings from resource: e1.hbm.xml - Hibernate /*tHIS IS THE HIBERNATE cONFIGURATION*/ /*THIS IS THE HIBERNATE... org.hibernate.cfg.Configuration; import org.hibernate.cfg.*; public class FirstExample Advertisements If you enjoyed this post then why not add us on Google+? Add us to your Circles
http://www.roseindia.net/tutorialhelp/comment/45349
CC-MAIN-2015-32
refinedweb
297
66.94
django-herokuapp 0.9.18 A set of utilities and a project template for running Django sites on heroku. django-herokuapp is a set of utilities and a project template for running Django sites on Heroku. Why not just use Heroku’s Django guide? Heroku provides a guide that describes a reasonable Django project setup. The django-herokuapp project suggests a more advanced approach with the following benefits: - waitress is used as an app server instead of gunicorn. Gunicorn is not recommended for use as a public-facing server, whereas waitress is hardened for production use. - Amazon S3 is used to serve static files instead of django-static. Django does not recommend serving static files using a Python app server. - anvil is used for deployments instead of git. This allows the build to be carried out easily on a headless CI server (such as Travis CI or Drone.io), as well as reducing downtime during by performing slug compilation outside of the normal Heroku deployment cycle. - Various minor security and logging improvements. Starting from scratch If you’re creating a new Django site for hosting on Heroku, then you can give youself a headstart by running the herokuapp_startproject.py script that’s bundled with this package from within a fresh virtual environment. $ mkdir your/project/location $ cd your/project/location $ git init $ virtualenv venv $ source venv/bin/activate $ pip install django-herokuapp $ herokuapp_startproject.py <your_project_name> The rest of this guide describes the process of adapting an existing Django site to run on Heroku. Even if you’ve started from scratch using herokuapp_startproject.py, it’s still worth reading, as it will give you a better understanding of the way your site has been configured. Installing in an existing project - Install django-herokuapp using pip pip install django-herokuapp. - Add 'herokuapp' and 'south' to your INSTALLED_APPS setting. - Read the rest of this README for pointers on setting up your Heroku site. Site hosting - waitress A site hosted on Heroku has to handle traffic without the benefit of a buffering reverse proxy like nginx, which means that the normal approach of using a small pool of worker threads won’t scale in production, particularly if serving clients over a slow connection. The solution is to use a buffering async master thread with sync workers instead, and the waitress project provides an excellent implementation of this approach. Simply create a file called Procfile in the root of your project, and add the following line to it: web: waitress-serve --port=$PORT <your_project_name>.wsgi:application Database hosting - Heroku Postgres Heroku provides an excellent Postgres Add-on that you can use for your site. The recommended settings for using Heroku Postgres are as follows: import dj_database_url DATABASES = { "default": dj_database_url.config(default='postgres://localhost'), } This configuration relies on the dj-database-url package, which is included in the dependencies for django-herokuapp. You can provision a starter package with Heroku Postgres using the following Heroku command: $ heroku addons:add heroku-postgresql:dev Static file hosting - Amazon S3 A pure-python webserver like waitress isn’t best suited to serving high volumes of static files. For this, a cloud-based service like Amazon S3 is ideal. The recommended settings for hosting your static content with Amazon S3 is as follows: # Use Amazon S3 for storage for uploaded media files. DEFAULT_FILE_STORAGE = "storages.backends.s3boto.S3BotoStorage" # Use Amazon S3 for static files storage. STATICFILES_STORAGE = "require_s3.storage.OptimizedCachedStaticFilesStorage" # Amazon S3 settings. AWS_ACCESS_KEY_ID = os.environ.get("AWS_ACCESS_KEY_ID", "") AWS_SECRET_ACCESS_KEY = os.environ.get("AWS_SECRET_ACCESS_KEY", "") AWS_STORAGE_BUCKET_NAME = os.environ.get("AWS_STORAGE_BUCKET_NAME", "") AWS_AUTO_CREATE_BUCKET = True AWS_HEADERS = { "Cache-Control": "public, max-age=86400", } AWS_S3_FILE_OVERWRITE = False AWS_QUERYSTRING_AUTH = False AWS_S3_SECURE_URLS = True AWS_REDUCED_REDUNDANCY = False AWS_IS_GZIPPED = False # Cache settings. CACHES = { # Long cache timeout for staticfiles, since this is used heavily by the optimizing storage. "staticfiles": { "BACKEND": "django.core.cache.backends.locmem.LocMemCache", "TIMEOUT": 60 * 60 * 24 * 365, "LOCATION": "staticfiles", }, } You can set your AWS account details by running the following command: $ heroku config:set AWS_ACCESS_KEY_ID=your_key_id \ AWS_SECRET_ACCESS_KEY=your_secret_access_key \ AWS_STORAGE_BUCKET_NAME=your_bucket_name This configuration relies on the django-require-s3 package, which is included in the dependencies for django-herokuapp. In particular, the use of django-require to compress and serve your assets is recommended, since it allows assets to be precompiled during the project’s build step, rather than on-the-fly as the site is running. Heroku does not provide an SMTP server in it’s default package. Instead, it’s recommended that you use the SendGrid Add-on to send your site’s emails. # Email settings. EMAIL_HOST = "smtp.sendgrid.net" EMAIL_HOST_USER = os.environ.get("SENDGRID_USERNAME", "") EMAIL_HOST_PASSWORD = os.environ.get("SENDGRID_PASSWORD", "") EMAIL_PORT = 25 EMAIL_USE_TLS = False You can provision a starter package with SendGrid using the following Heroku command: $ heroku addons:add sendgrid:starter Optimizing compiled slug size The smaller the size of your compiled project, the faster it can be redeployed on Heroku servers. To this end, django-herokuapp provides a suggested .slugignore file that should be placed in the root of your project. If you’ve used the herokuapp_startproject.py script to set up your project, then this will have already been taken care of for you. Improving site security Ideally, you should not store your site’s SECRET_KEY setting in version control. Instead, it should be read from the Heroku config as follows: from django.utils.crypto import get_random_string SECRET_KEY = os.environ.get("SECRET_KEY", get_random_string(50, "abcdefghijklmnopqrstuvwxyz0123456789!@#$%^&*(-_=+)")) You can then generate a secret key in your Heroku config with the following command: $ heroku config:set SECRET_KEY=`openssl rand -base64 32` It’s also recommended that you configure Python to generate a new random seed every time it boots. $ heroku config:set PYTHONHASHSEED=random Adding support for Heroku SSL Heroku provides a free piggyback SSL service for all of it’s apps, as well as a SSL endpoint addon for custom domains. It order to detect when a request is made via SSL in Django (for use in request.is_secure()), you should add the following setting to your app: SECURE_PROXY_SSL_HEADER = ("HTTP_X_FORWARDED_PROTO", "https") If you intend to serve your entire app over SSL, then it’s a good idea to force all requests to use SSL. The django-sslify app provides a middleware for this. Simply pip install django-sslify, then add "sslify.middleware.SSLifyMiddleware" to the start of your MIDDLEWARE_CLASSES. Outputting logs to Heroku logplex By default, Django does not log errors to STDERR in production, which is the correct behaviour for most WSGI apps. Heroku, however, provides an excellent logging service that expects to receive error messages on STDERR. You can take advantage of this by updating your logging configuration to the following: LOGGING = { "version": 1, "disable_existing_loggers": False, "handlers": { "console": { "level": "INFO", "class": "logging.StreamHandler", }, }, "loggers": { "django": { "handlers": ["console"], } } } Running your site in the Heroku environment Because your site is setup to read some of it’s configuration from environmental variables stored on Heroku, running a development server can be tricky. django-herokuapp provides a configuration utility that should be added to your project to load the heroku config dynamically. Simply add the following lines to your manage.py script, at the top of the run block: if __name__ == "__main__": # << This line will already be present in manage.py # Load the Heroku environment. from herokuapp.env import load_env load_env(__file__, "your-app-name") Django management commands can then be run normally: $ python manage.py runserver Accessing the live Heroku Postgres database is a bad idea. Instead, you should provide a local settings file, exclude it from version control, and connect to a local PostgreSQL server. If you’re on OSX, then the excellent Postgres.app will make this very easy. A suggested settings file layout, including the appropriate local settings, can be found in the django-herokuapp template project settings directory. Validating your Heroku setup Once you’ve completed the above steps, and are confident that your site is suitable to deploy to Heroku, you can validate against common errors by running the heroku_audit management command. $ python manage.py heroku_audit Many of the issues detected by heroku_audit have simple fixes. For a guided walkthrough of solutions, try running: $ python manage.py heroku_audit --fix Deploying (and redeploying) your site to Heroku When your site is configured and ready to roll, you can deploy it to Heroku using the following command. $ DJANGO_SETTINGS_MODULE=your_app.settings.production python manage.py heroku_deploy This will carry out the following actions: - Sync static files to Amazon S3 (disable with the --no-staticfiles switch). - Deploy your app to the Heroku platform using anvil (disable with the --no-app switch). - Run syncdb and migrate for your live database (disable with the --no-db switch). This command can be run whenever you need to redeploy your app. For faster redeploys, and to minimise downtime, django-herokuapp only runs syncdb and migrate when it determines that model changes are missing from the database. To force a database redeploy, run heroku_deploy with the --force-db switch. For a simple one-liner deploy that works in a headless CI environments (such as Travis CI or Drone.io), django-herokuapp provides a useful deploy.sh script that can be copied to the root of your project. Deploying then simply becomes: $ ./deploy.sh Common error messages Things don’t always go right first time. Here are some common error messages you may encounter: “No app specified” when running Heroku commands The Heroku CLI looks up your app’s name from a git remote named heroku. You can either specify the app to manage by adding -a your-app-name every time you call a Heroku command, or update your git repo with a Heroku remote using the following command: $ git remote add heroku git@heroku.com:your-app-name.git “AttributeError: ‘Settings’ object has no attribute ‘BASE_DIR’” Many django-herokuapp commands need to know the root of the project’s file stucture. Django 1.6 provides this setting automatically as settings.BASE_DIR. If this setting is not present in your settings file, it should be added as an absolute path. You can look it up dynamically from the settings file like this: import os.path # Assumes the settings file is located in `your_project.settings` package. BASE_DIR = os.path.abspath(os.path.join(__file__, "..", "..")) Support and announcements Downloads and bug tracking can be found at the main project website. More information The django-herokuapp project was developed by Dave Hall. You can get the code from the django-herokuapp project site. Dave Hall is a freelance web developer, based in Cambridge, UK. You can usually find him on the Internet in a number of different places: - Downloads (All Versions): - 46 downloads in the last day - 479 downloads in the last week - 1843 downloads in the last month - Author: Dave Hall - License: BSD - Categories - Package Index Owner: etianen - DOAP record: django-herokuapp-0.9.18.xml
https://pypi.python.org/pypi/django-herokuapp/0.9.18
CC-MAIN-2015-48
refinedweb
1,790
55.24
GHC.Data.Stream Description Monadic streams Synopsis - newtype Stream m a b = Stream { - runStreamInternal :: forall r' r. (a -> m r') -> (b -> StreamS m r' r) -> StreamS m r' r - data StreamS m a b - runStream :: Applicative m => Stream m r' r -> StreamS m r' r - yield :: Monad m => a -> Stream m a () - liftIO :: MonadIO m => IO a -> m a - collect :: Monad m => Stream m a () -> m [a] - consume :: (Monad m, Monad n) => Stream m a b -> (forall a. m a -> n a) -> (a -> n ()) -> n b - fromList :: Monad m => [a] -> Stream m a () - map :: Monad m => (a -> b) -> Stream m a x -> Stream m b x - mapM :: Monad m => (a -> m b) -> Stream m a x -> Stream m b x - mapAccumL_ :: forall m a b c r. Monad m => (c -> a -> m (c, b)) -> c -> Stream m a r -> Stream m b (c, r) Documentation newtype Stream m a b Source # Stream m a b is a computation in some Monad m that delivers a sequence of elements of type a followed by a result of type b. More concretely, a value of type Stream m a b can be run using runStreamInternal in the Monad m, and it delivers either - the final result: Done b, or Yield a strwhere ais the next element in the stream, and stris the rest of the stream Effect mstrwhere mstris some action running in mwhich generates. Stream is implemented in the "yoneda" style for efficiency. By representing a stream in this manner fmap and >>= operations are accumulated in the function parameters before being applied once when the stream is destroyed. In the old implementation each usage of mapM and >>= would traverse the entire stream in order to apply the substitution at the leaves. The >>= operation for Stream was a hot-spot in the ticky profile for the ManyConstructors test which called the cg function many times in StgToCmm.hs Constructors Instances liftIO :: MonadIO m => IO a -> m a Source # Lift a computation from the IO monad. This allows us to run IO computations in any monadic stack, so long as it supports these kinds of operations (i.e. IO is the base monad for the stack). Example import Control.Monad.Trans.State -- from the "transformers" library printState :: Show s => StateT s IO () printState = do state <- get liftIO $ print state Had we omitted , we would have ended up with this error: liftIO • Couldn't match type ‘IO’ with ‘StateT s IO’ Expected type: StateT s IO () Actual type: IO () The important part here is the mismatch between StateT s IO () and . IO () Luckily, we know of a function that takes an and returns an IO a (m a): , enabling us to run the program and see the expected results: liftIO > evalStateT printState "hello" "hello" > evalStateT printState 3 3 collect :: Monad m => Stream m a () -> m [a] Source # Turn a Stream into an ordinary list, by demanding all the elements. consume :: (Monad m, Monad n) => Stream m a b -> (forall a. m a -> n a) -> (a -> n ()) -> n b Source # fromList :: Monad m => [a] -> Stream m a () Source # map :: Monad m => (a -> b) -> Stream m a x -> Stream m b x Source # mapM :: Monad m => (a -> m b) -> Stream m a x -> Stream m b x Source # mapAccumL_ :: forall m a b c r. Monad m => (c -> a -> m (c, b)) -> c -> Stream m a r -> Stream m b (c, r) Source # Note this is not very efficient because it traverses the whole stream before rebuilding it, avoid using it if you can. mapAccumL used to implemented but it wasn't used anywhere in the compiler and has similar effiency problems.
https://hackage.haskell.org/package/ghc-9.2.1/docs/GHC-Data-Stream.html
CC-MAIN-2022-05
refinedweb
606
56.52
| Join Last post 04-24-2008 7:46 AM by nichola_x_rose. 0 replies. Sort Posts: Oldest to newest Newest to oldest I managed to attach the Custom Events to my website and I have the following errorsNamespace or type specified in the Imports 'System.Web.Management' doesn't contain any public member or cannot be found. Make sure the namespace or the type is defined and contains at least one public member. Make sure the imported element name doesn't use any aliases. It also tell me that httpcontext webbasecodec and webbaseevent are not defined. And could not load type 'MB.urbanEntertainment.WebCustomEvent' from assembly 'MB.urbanEntertainment.CustomEvents'. How do I resolves these problems to get customevents working Advertise on ASP.NET About this Site © 2008 Microsoft Corporation. All Rights Reserved. | Terms of Use | Trademarks | Privacy Statement
http://forums.asp.net/p/1252422/2318604.aspx
crawl-001
refinedweb
137
60.92
:local=“clr-namespace:BindingSample“> <Window.Resources> <!– Instantiates the Person class with the Name value “Joe”–> <!– Giving it an x:Key so it’s available as a resource –> <local:Person x:Key=“myDataSource“ Name=“Joe“/> </Window.Resources> <!– Binding the Text property to the Name property –> <TextBlock Text=“{Binding Source={StaticResource myDataSource}, Path=Name}“/> </Window> So, in this example: - The TextBlock is the target object. - The Text property is the target property. - The Person object is the source object. - The Name property is the source property. . . .> <Window.Resources> <local:Person x:Key=“myDataSource“ Name=“Joe“/> </Window.Resources> <StackPanel> <StackPanel.DataContext> <Binding Source=“{StaticResource myDataSource}“/> </StackPanel.DataContext> <TextBox Text=“{Binding Path=Name}“/> <TextBlock Text=“{Binding Path=Name}“/> <!– … Other controls that are also interested in myDataSource. … –> </StackPanel> </Window> We are the Windows Presentation Foundation SDK writers and editors. I’ve made a WPF demo that uses the Newton Game Dynamics physics engine to roll some things down the screen, all using databinding. You might want to check it out: 🙂 Wow, that’s a really cool demo, Chris! Somehow I really enjoy seeing the car rolling off the screen. 🙂″ xmlns=”“ xmlns:x=”“ xmlns:local=”clr-namespace:ThemeResource” (Change this value to match the namespace in your project} Title=”Window1″ Height=”300″ Width=”300″> > </Window> Hi Very nice post! You're very kind! Thx! This has been driving me nuts for three days. I have read the pertinent parts of the book I have, "Pro WPF in VB2010", I have read the web pages on binding on MSDN and still can't make sense of why this won't work. There is not a single sample I can find on binding to a class such as this. I am working with the sample app from the Win7 SDK…Samples…Samples WPF…Photo App. It was written to show the photos from a folder and when a photo is selected, show EXIF data about the image. I am trying to convert it to use Windows Properties. I have a Class, which works, that will provide the values for the Windows Properties that I am interested in. After instantiation I can display one of the properties in a MsgBox so I am pretty sure the class is working. What I cannot do is bind it to a TextBox in the MainWindow.xaml form. According to what I think I understand about binding, it should work. For the sake of brevity, I have left out a lot of code. I hope I didn't leave out anything important. ********************* MainWindow.xaml <Window x:Class="SDKSamples.ImageSample.MainWindow" xmlns="schemas.microsoft.com/…/presentation" xmlns:x="schemas.microsoft.com/…/xaml" Title="WPF Photo Viewer w/Properties" Loaded="OnLoaded" xmlns:er="clr-namespace:SDKSamples.ImageSample" xmlns: <!– xmlns: –> <– I have tired it with and without this line –> <Dock Panel> <GroupBox> <ScrollViewer> <StackPanel> <Grid> <!– Title –> <Label Grid. <TextBox Grid. </Grid> </StackPanel> </ScrollViewer> </GroupBox> </DockPanel> </Grid> </Window> ************************* MainWindow.xaml.vb Namespace SDKSamples.ImageSample Partial Public NotInheritable Class MainWindow Inherits Window Public Photos As PhotoCollection Public Sub New() InitializeComponent() End Sub Public ppm As SHPropertyMetadata.ShellPropertyMetadata Private Sub OnPhotoSingleClick(ByVal sender As Object, ByVal e As RoutedEventArgs) Dim imgPath = Me.ImagesDir.Text Dim imgName = HttpUtility.UrlDecode(System.IO.Path.GetFileName(PhotosListBox.SelectedValue.ToString)) Dim imgFullPath As String = System.IO.Path.Combine(imgPath, imgName) ppm = New SHPropertyMetadata.ShellPropertyMetadata(imgFullPath) MsgBox(ppm.Title) <– This works, it show the correct information for the image clicked –> End Sub End Namespace hey guys i want to a solution of my problem can u help me. how can i show data in datagrid without using itemsource .When I used itemsource to show the data then a problem occur 'System.IndexOutOfRangeException' occurred in System.Data.dll ,can you guys help me to solve this problem. There are a template column i used in datagrid.pls help me Hi Ashish, Generally, the best place to get your question answered is the MSDN forums at social.msdn.microsoft.com/…/threads. I'm not sure why you are getting an exception, but if you want to data bind your DataGrid, then you do need to use ItemsSource. If you ask your question on the forum and give a few more details (such as what are you trying to bind to), someone there might be able to help you, Thanks. Its x:Name <local:Person x: Good one.
https://blogs.msdn.microsoft.com/wpfsdk/2006/10/19/wpf-basic-data-binding-faq/
CC-MAIN-2016-36
refinedweb
720
50.43
Alex.Krumm-Heller@csiro.au wrote: > Hi, > > > > I am trying to do some file I/O. The scenario I am aiming for is to > create a file if it doesn’t exist, append to it if it exists as well as > allowing for writes to the file from multiple threads. Since you are coding in C++ have you considered using iostreams for this part of the project? The Apache C++ Standard Library provides as an extension thread-safe iostream objects -- see the demo below. Btw., only the least significant 8 bits of the value returned from main() (or passed to exit()) are made available to the invoking process, so values like -1 will end up being sliced or truncated (in the case of -1 to 255). Martin #include <fstream> #include <string> int main () { std::ofstream logfile ("test.txt", std::ios::app | std::ios::out); // STDCXX extension: make logfile thread safe logfile.unsetf (std::ios::nolock | std::ios::nolockbuf); if (!logfile) return 1; std::string output ("String 1"); // output string as a single atomic operation logfile << output; logfile.close (); logfile.open ("test.txt", std::ios::app | std::ios::out); if (!logfile) return 2; output.assign ("String 2"); logfile << output; }
http://mail-archives.apache.org/mod_mbox/apr-dev/200601.mbox/%3C43BD5970.4030703@roguewave.com%3E
CC-MAIN-2015-22
refinedweb
198
65.42
deeplearn.js一个用于Web的硬件加速机器智能JavaScript库deeplearn.js是用于机器智能的开源硬件加速JavaScript库。 deeplearn.js将性能机器学习构建块带入Web,让您可以在浏览器中训练神经网络,或者在推理模式下运行预先训练的模型。 This release brings some big changes to deeplearn.js. Largest of which is moving from a graph centric API to an ‘eager mode' imperative one that mirrors Tensorflow Eager. We believe the eager style programming model is more suited to faster development and rapid prototyping. We have also found eager style code easier to debug in the ways we as web developers typically debug things. Another big change is moving more functionality to the top level of the library. All ops are directly exported at the top level now. These and more changes are detailed below. We'd love to hear your feedback so feel free to make issues on the Github repo if you run into any problems or have other feedback. What’s New Eager API: This release introduces our new eager API and all optimizers support eager mode. This allows you to write imperative code to do inference and training without a deferred graph execution model. Eager mode also makes debugging easier. import * as dl from ‘deeplearn’; // y = a * x^2 + b * x + c. const f = x => a.mul(x.square()).add(b.mul(x)).add(c); const loss = (pred, label) => pred.sub(label).square().mean(); const learningRate = 0.01; const optimizer = dl.train.sgd(learningRate); for (let i = 0; i < 10; i++) { optimizer.minimize(() => loss(f(xs), ys)); } Chain API: Tensors now provide a chaining API for ops. Which means you can write import * as dl from ‘deeplearn’; dl.tensor([[2, 3], [5, 1]]) .mul(dl.scalar(3)) .square(); New Ops: dl.gather, dl.less, dl.logicalAnd, dl.where, dl.range, dl.linspace, dl.logicalXor, dl.logicalNot, dl.stack, dl.squeeze and dl.expandDims. New utility functions: dl.memory, dl.time and dl.nextFrame. Backend selection: Use dl.setBackend(‘webgl’|’cpu’). Also we automatically choose the best backend for you so you will not usually need to call this. New API Docs!: We are super excited about these, we are adding code snippets to our api docs and you can run them inline! Power to the browser! What’s Changing NDArray has been renamed to Tensor: Tensors are now immutable meaning operations on tensors return new tensors rather than modifying the original tensors. The NDArray identifier will still work in 0.5 but will be removed in future releases. Tensor Creation: We now provide helper functions to create tensors. Use dl.tensor and not NDArray.new. We also have dl.scalar, dl.tensor1d, dl.tensor2d, dl.tensor3d and dl.tensor4d for your convenience. Top Level Ops: All ops are now on the top level object of the library. That means you can now do the following import * as dl from ‘deeplearn’; dl.randomNormal([2,2]).print(); dl.clone()now does a shallow copy For typescript users: Tensors no longer have a dtypegeneric. dtypeis now only a property of a tensor. What’s deprecated This version represents a big shift to a new style API, thus a number of things we are deprecating will be removed in 0.6. Please start upgrading your code now, or lock down your dependencies if you aren't yet ready to upgrade. Graph Mode: With the introduction of eager mode we are deprecating graph mode. The entire graph API will be removed in 0.6. NDArrayMath: As mentioned above, all ops are now at the top level. So no longer use code like this dl.ENV.math.square(). ** If you want to use a different backend use dl.setBackend(). We will be removing the NDArrayMathin 0.6.** Acknowledgements Thanks to all our contributors that helped make this happen! Thanks @ManrajGrover for your work on optimizers, gradients, improving tests and more, @reiinakano for work on dl.gather, @jaassoon for work on improving our with unit tests, @skwbc for improving error messages in our checkpoint dump script, @gena for work on gradients for dl.sigmoid, @davidsoergel for work on an upcoming dl.contrib.data package @caisq for work on gradients for dl.clipByValue and dl.batchNormalization, @WeiZhiHuang for fixing a bug in one of demos. We also want to thank the contributors for 0.4.2 for which we didn't do official release notes. Thanks @chaosmail for your work on automatic Caffe model porting, improvements to conv2d, improvements to our testing infrastructure, and for dl.reverse, @Lewuathe for concat backprop, documentation, and better error messaging, @nkreeger for your work on random number generation, array ops, windows tooling support, and the game of life demo, @minsukkahng for fixing graph-mode broadcasting backprop for arithmetic, @shancarter for the awesome fonts demo and for giving us the idea to implement operation chaining, @jameswex for the fonts demo, @experiencor for mobilenet and yolo models, @easadler for conv1d, @LukasDrgon for adding jsdeliver CDN links, @pyu10055 for work on dl.pow and dl.squeeze, @wang2bo2 for work on dl.prelu, @vuoristo for work on softmax gradients, @haasdo95 for fixing a bug in our docs, @jimbojw for helping with docs, @iaroslav-ai for helping with docs Finally, welcome to the team @tafsiri, @nkreeger and @pyu10055! TensorFlow.js Core API Assets This release brings some exciting news: deeplearn.js is joining the TensorFlow family and is being renamed to TensorFlow.js Core. It is just one part of a larger ecosystem of tools surrounding TensorFlow in JavaScript, called TensorFlow.js. TensorFlow.js Core contains the low-level linear algebra ops as well as an eager layer for automatic differentiation. We now also provide a high-level layers API on top of Core called TensorFlow.js Layers. For convenience, we've packaged TensorFlow Layers and TensorFlow Core under a single union package, which you can find here: Since TensorFlow.js is a continuation of deeplearn.js, the first version of the union package and the Core API will be 0.6.0. What does this mean for existing users of deeplearn.js? If you want to just use the core API without any of the layers API, you can import the core library directly: These are both replacements for the old way to import deeplearn.js: What's new? Tensor.toStringhas been added. It returns a numpy-like rendering of the Tensor values as a string. You can also use Tensor.print()which is a convenience function for console.log(tensor.toString()). tf.slice, tf.pad, tf.reverse(), tf.tile(). tf.dispose(...)which disposes multiple tensors. tf.pow(). What's changed? tf.conv2dsignature has changed. This should only affect you if you are using dimRoundingMode. Scalar/ Tensor1D/ Tensor2D/ Tensor3D/ Tensor4Dare now just types in TypeScript. They do not exist in JavaScript. What's removed? We've deleted all of the code we deprecated in the 0.5.0 release NDArrayis deleted from the codebase. NDArrayMathis deleted. This is replaced with top-level functions on tf. If you want a different backend, use tf.setBackend('webgl'|'cpu'); For more information about what TensorFlow.js, check out the TensorFlow.js website. Acknowledgements Thanks again to all our amazing contributors for making this happen. Thanks @ManrajGrover for your continued work on the project, fixing documentation bugs, updating optimizers to use chaining for variables, adding log1p, adding nesterov to the momentum optimizer. Thanks @oveddan for your incredible contributions to conv2d, adding dilation so we can support atrous convolutions. Thanks @meganetaaan for fix to sample code, @OliverLonghi for improving ml_beginners.md, @jbencook for updating squeezenet demo to do image resizing, @rilut for exporting TensorBuffer, @lukebelliveau for fixing a typo in docs, @HanKruiger for fixing a typo in docs, @nbardy for updating the performance.
https://www.ctolib.com/article/releases/57227
CC-MAIN-2019-35
refinedweb
1,254
59.4
UTIMENSAT(2) Linux Programmer's Manual UTIMENSAT(2) utimensat, futimens - change file timestamps with nanosecond preci‐ sion #include <fcntl.h> /* Definition of AT_* constants */ #include (): Since glibc 2.10: _XOPEN_SOURCE >= 700 || _POSIX_C_SOURCE >= 200809L Before glibc 2.10: _ATFILE_SOURCE futimens(): Since glibc 2.10: _XOPEN_SOURCE >= 700 || _POSIX_C_SOURCE >= 200809L Before glibc 2.10: _GNU_SOURCE utimensat() and futimens() update the timestamps of a file with nanosecond precision. This contrasts with the historical utime(2) and utimes(2), which permit only second and microsecond precision, respectively, when setting file timestamps. filesystem. Permissions requirements To set both file timestamps to the current time (i.e., times is NULL, or both tv_nsec fields specify UTIME_NOW), either: 1. the caller must have write access to the file; 2. the caller's effective user ID must match the owner of the file; or 3. the caller must have appropriate privileges. To make any change other than setting both timestamps to the current time (i.e., times is not NULL, and neither tv_nsec field is UTIME_NOW and neither tv_nsec field is UTIME_OMIT), either condition 2 or 3 above must apply. If both tv_nsec fields are specified as UTIME_OMIT, then no file ownership or permission checks are performed, and the file timestamps are not modified, but other error conditions may still be detected. utimensat() specifics If pathname is relative, then by default it is interpreted relative to the directory referred to by the open file descriptor, dirfd (rather than relative to the current working directory of the calling process, as is done by utimes(2) for a relative pathname). See openat(2) for an explanation of why this can be useful.>: AT_SYMLINK_NOFOLLOW If pathname specifies a symbolic link, then update the timestamps of the link, rather than the file to which it refers. On success, utimensat() and futimens() return 0. On error, -1 is returned and errno is set to indicate the error. EACCES times is NULL, or both tv_nsec values are UTIME_NOW, and: * the effective user ID of the caller does not match the owner of the file, the caller does not have write access to the file, and the caller is not privileged (Linux: does not have either the CAP_FOWNER or the CAP_DAC_OVERRIDE capability); or, * the file is marked immutable (see chattr(1)). EBADF (futimens()) fd is not a valid file descriptor. EBADF (utimensat()) pathname is a relative pathname, but dirfd is neither AT_FDCWD nor a valid file descriptor. EFAULT times pointed to an invalid address; or, dirfd was AT_FDCWD, and pathname is NULL or an invalid address. EINVAL Invalid value in flags. EINVAL Invalid value in one of the tv_nsec fields (value outside range AT_FDCWD nor a file descriptor referring to a directory; or, one of the prefix components of pathname is not a directory. EPERM The caller attempted to change one or both timestamps to a value other than the current time, or to change one of the timestamps to the current time while leaving the other timestamp unchanged, (i.e., times is not NULL, neither tv_nsec field is UTIME_NOW, and neither tv_nsec field is UTIME_OMIT) and: * the caller's effective user ID does not match the owner of file, and the caller is not privileged (Linux: does not have the CAP_FOWNER capability); or, * the file is marked append-only or immutable (see chattr(1)). EROFS The file is on a read-only filesystem. ESRCH (utimensat()) Search permission is denied for one of the prefix components of pathname. utimensat() was added to Linux in kernel 2.6.22; glibc support was added with version 2.6. Support for futimens() first appeared in glibc 2.6. futimens() and utimensat() are specified in POSIX.1-2008. utimensat() obsoletes futimesat(2).); Several bugs afflict utimensat() and futimens() on kernels before 2.6.26. These bugs are either nonconformances with the POSIX.1 draft specification or inconsistencies with historical Linux behavior. * POSIX.1 specifies that if one of the tv_nsec fields has the value UTIME_NOW or UTIME_OMIT, then the value of the corresponding tv_sec field should be ignored. Instead, the value of the tv_sec field is required to be 0 (or the error EINVAL results). * Various bugs mean that for the purposes of permission checking, the case where both tv_nsec fields are set to UTIME_NOW isn't always treated the same as specifying times as NULL, and the case where one tv_nsec value is UTIME_NOW and the other is UTIME_OMIT isn't treated the same as specifying times as a pointer to an array of structures containing arbitrary time values. As a result, in some cases: a) file timestamps can be updated by a process that shouldn't have permission to perform updates; b) file timestamps can't be updated by a process that should have permission to perform updates; and c) the wrong errno value is returned in case of an error. * POSIX.1 says that a process that has write access to the file can make a call with times as NULL, or with times pointing to an array of structures in which both tv_nsec fields are UTIME_NOW, in order to update both timestamps to the current time. However, futimens() instead checks whether the access mode of the file descriptor allows writing. chattr(1), futimesat(2), openat(2), stat(2), utimes(2), futimes(3), path_resolution(7), symlink(7) This page is part of release 3.75 of the Linux man-pages project. A description of the project, information about reporting bugs, and the latest version of this page, can be found at. Linux 2014-01-24 UTIMENSAT(2)
http://man7.org/linux/man-pages/man2/utimensat.2.html
CC-MAIN-2014-42
refinedweb
920
61.56
Hello, I am having a bit of trouble while trying to figure out how to use a switch case in my program. In the end I intend to have 7 inputs that can produce a total of around 10 or 11 outputs, depending on combinations or inputs. Right now I am just trying to get a 3 inputs to produce 4 outputs. I had done some searching around and I found some articles that somewhat got me where I want to go, but I am still stumped. I have attached my code below. In a basic sense, When I press the button attributed to the “ACC_Pulse_Pin” I want the serial monitor to only display “ACC Pulse”. I want the serial monitor to only display “ACC Switch” when I press the button associated with the “ACC_Switch_Pin”, and so on. Right now, when I have everything set up and it it going through the loop, the serial monitor is cycling through each of the cases without any input. I may be misunderstanding, but my case 0 should be “When no input is enabled” in the current setup. Why are the cases cycling through when no button is pressed? When I do go and press a button, the code continues to cycle through the cases in a way that does not make sense to me. I know this is a bad attempt at explaining the trouble I am having, but I would appreciate any input anyone has. -Chris #include <Wire.h> #include <LiquidCrystal_I2C.h> // Set the LCD address to 0x27 for a 16 chars and 2 line display LiquidCrystal_I2C lcd(0x27, 16, 2); const int DD_Pin = 2; //Input pin for DD, PLC output OUT6 const int AC_Pin = 3; //Input pin for AC, PLC output OUT7 const int AD_Pin = 4; //Input pin for AD, PLC output OUT8 const int Regen_Pin = 5; //Input pin for Regen, PLC output OUT5 const int Neutral_Pin = 6; //Input pin for Neutral, PLC output OUT9 const int ACC_Switch_Pin = 7; //Input pin for ACC Open by swtich, PLC output is switch attached to IN6 const int ACC_Pulse_Pin = 8; //Input pin for ACC Pulse by button, PLC output is button attached to IN7 void setup() { // initialize the LCD lcd.begin(); // Turn on the blacklight lcd.backlight(); Serial.begin(9600); pinMode(DD_Pin, INPUT); pinMode(AC_Pin, INPUT); pinMode(AD_Pin, INPUT); pinMode(Regen_Pin, INPUT); pinMode(Neutral_Pin, INPUT); pinMode(ACC_Switch_Pin, INPUT); pinMode(ACC_Pulse_Pin, INPUT); } void loop() { int inputs = ((digitalRead(DD_Pin) << 2) | (digitalRead(ACC_Switch_Pin) << 1) | digitalRead(ACC_Pulse_Pin)); switch (inputs) { case 0: // Serial.println("Nuetral"); delay(1000); case 1: Serial.println("DD Pin only"); delay(1000); case 2: Serial.println("ACC Switch only"); delay(1000); case 4: Serial.println("ACC Pulse only"); delay(1000); } }
https://forum.arduino.cc/t/switch-case-with-multiple-inputs/689451
CC-MAIN-2021-25
refinedweb
446
59.74
Red Hat Bugzilla – Bug 461390 Review Request: perl-namespace-clean - Keep your namespace tidy Last modified: 2010-07-26 18:26:01 EDT SRPM URL: SPEC URL: Description:. =====> perl-namespace-clean-0.08-1.fc9.noarch.rpm <===== ====> rpmlint 1 packages and 0 specfiles checked; 0 errors, 0 warnings. ====> provides for perl-namespace-clean-0.08-1.fc9.noarch.rpm perl(namespace::clean) = 0.08 perl-namespace-clean = 0.08-1.fc9 ====> requires for perl-namespace-clean-0.08-1.fc9.noarch.rpm perl(:MODULE_COMPAT_5.10.0) perl(Scope::Guard) perl(Symbol) perl(strict) perl(vars) perl(warnings) Review: + package builds in mock (rawhide i386). koji Build => + rpmlint is silent for SRPM and for RPM. + source files match upstream url 9dc350acfbcffe1434027928f3497925 namespace-clean=35, 1 wallclock secs ( 0.02 usr 0.00 sys + 0.15 cusr 0.02 csys = 0.19 CPU) + Package perl-namespace-clean-0.08-1.fc10 Provides: perl(namespace::clean) = 0.08 Requires: perl(Scope::Guard) perl(Symbol) perl(strict) perl(vars) perl(warnings) APPROVED. New Package CVS Request ======================= Package Name: perl-namespace-clean Short Description: Keep your namespace tidy Owners: cweyl Branches: F-8, F-9, devel InitialCC: perl-sig cvs done. Imported and building. Thanks for the review! :-) *** Bug 508254 has been marked as a duplicate of this bug. *** Package Change Request ====================== Package Name: perl-namespace-clean New Branches: EL-6 Owners: tremble cweyl has previously expressed that he is happy for others to request EPEL branches CVS done (by process-cvs-requests.py).
https://bugzilla.redhat.com/show_bug.cgi?id=461390
CC-MAIN-2017-43
refinedweb
249
54.9
beginnersluke wrote:The BeautifulSoup page mentions installing it using PIP, so I downloaded that and ran the install. This seemed to work, the shell told me it restarted, but when I tried to run "pip install BeautifulSoup" it highlighted "install" and gave an invalid syntax error. C:\> >>> beginnersluke wrote.) os.getcwd() import os execfile ("xml2h.py" /python27/cards/songs/feliznav.xml /python27/cards/songs.feliznav.h) Traceback (most recent call last): File "<pyshell#31>", line 1, in <module> execfile ("xml2h.py" /python27/cards/songs/feliznav.xml /python27/cards/songs.feliznav.h) NameError: name 'python27' is not defined C:\python 27>python Python 2.7.5 (default, May 15 2013, 22:44:16) [MSC v.1500 64 bit (AMD64)] on win 32 Type "help", "copyright", "credits" or "license" for more information. >>> print 'hi Mom!' hi Mom! >>> >>> with open("himom.py", "w") as myfile: ... myfile.write("print 'Hi Mom!'") ... >>> exit() C:\python 27> C:\python 27>dir /b himom.py himom.py C:\python 27> C:\python 27>python himom.py Hi Mom! C:\python 27> Return to General Coding Help Users browsing this forum: Google [Bot], metulburr, stranac and 3 guests
http://www.python-forum.org/viewtopic.php?p=11562
CC-MAIN-2014-15
refinedweb
190
69.89
#include <FXTopWindow.h> Inheritance diagram for FX::FXTopWindow: TopWindows are usually managed by a Window Manager under X11 and therefore borders and window-menus and other decorations like resize- handles are subject to the Window Manager's interpretation of the decoration hints. When a TopWindow is closed, it sends a SEL_CLOSE message to its target. The target should return 0 in response to this message if there is no objection to proceed with the closing of the window, and return 1 otherwise. After the SEL_CLOSE message has been sent and no objection was raised, the window will delete itself. When receiving a SEL_UPDATE, the target can update the title string of the window, so that the title of the window reflects the name of the document, for example. For convenience, TopWindow provides the same layout behavior as the Packer widget, as well as docking and undocking of toolbars. TopWindows can be owned by other windows, or be free-floating. Owned TopWindows will usually remain stacked on top of the owner windows. The lifetime of an owned window should not exceed that of the owner. See also:
http://www.fox-toolkit.org/ref12/classFX_1_1FXTopWindow.html
crawl-003
refinedweb
186
51.07
To follow up my post on webcam streaming, here is an example of HTTP MJPG streaming. This allows you to open the stream in a browser using a URL like. However, Chrome does not let you open this directly – it must be embedded in an HTML document, e.g.: <html> <body> <img src=""/> </body> </html> Here is the EV3 code, which could be improved a lot: package mypackage; import java.awt.image.BufferedImage; import java.io.ByteArrayOutputStream; import java.io.IOException; import java.io.OutputStream; import java.net.ServerSocket; import java.net.Socket; import javax.imageio.ImageIO; import lejos.hardware.BrickFinder; import lejos.hardware.Button; import lejos.hardware.ev3.EV3; import lejos.hardware.video.Video; public class HttpStream { private static int WIDTH = 160; private static int HEIGHT = 120; private static int NUM_PIXELS = WIDTH * HEIGHT; private static int FRAME_SIZE = NUM_PIXELS * 2; public static void main(String[] args) throws IOException { EV3 ev3 = (EV3) BrickFinder.getLocal(); Video video = ev3.getVideo(); video.open(WIDTH, HEIGHT); byte[] frame = video.createFrame(); BufferedImage img = new BufferedImage(WIDTH, HEIGHT,BufferedImage.TYPE_INT_RGB); ServerSocket ss = new ServerSocket(8080); Socket sock = ss.accept(); String boundary = "Thats it folks!"; writeHeader(sock.getOutputStream(), boundary); while (Button.ESCAPE.isUp()) { video.grabFrame(frame); for(int i=0;i<FRAME_SIZE;i+=4) { int y1 = frame[i] & 0xFF; int y2 = frame[i+2] & 0xFF; int u = frame[i+1] & 0xFF; int v = frame[i+3] & 0xFF; int rgb1 = convertYUVtoARGB(y1,u,v); int rgb2 = convertYUVtoARGB(y2,u,v); img.setRGB((i % (WIDTH * 2)) / 2, i / (WIDTH * 2), rgb1); img.setRGB((i % (WIDTH * 2)) / 2 + 1, i / (WIDTH * 2), rgb2); } writeJpg(sock.getOutputStream(), img, boundary); } video.close(); sock.close(); ss.close(); } private static void writeHeader(OutputStream stream, String boundary) throws IOException { stream.write(("HTTP/1.0 200 OK\r\n" + "Connection: close\r\n" + "Max-Age: 0\r\n" + "Expires: 0\r\n" + "Cache-Control: no-store, no-cache, must-revalidate, pre-check=0, post-check=0, max-age=0\r\n" + "Pragma: no-cache\r\n" + "Content-Type: multipart/x-mixed-replace; " + "boundary=" + boundary + "\r\n" + "\r\n" + "--" + boundary + "\r\n").getBytes()); } private static void writeJpg(OutputStream stream, BufferedImage img, String boundary) throws IOException { ByteArrayOutputStream baos = new ByteArrayOutputStream(); ImageIO.write(img, "jpg", baos); byte[] imageBytes = baos.toByteArray(); stream.write(("Content-type: image/jpeg\r\n" + "Content-Length: " + imageBytes.length + "\r\n" + "\r\n").getBytes()); stream.write(imageBytes); stream.write(("\r\n--" + boundary + "\r\n").getBytes()); } private static; } } You won’t get a very good frame rate from this. It would be faster if the camera produced a JPG rather than a YUC format image, as converting to Jpeg in Java is slow. This program uses awt.image and javax.imageio methods, so it won’t work if you are using a Java8 profile that omits these. Advertisements Hello. What about microphone? How to use it? leJOS does not currently support USB microphones. It is possible, but we would have to add the necessary Kernel drivers, etc. to the Linux system. Hi Laurie, I have an application similar to this, in which I want to send a BufferedImage over a socket to be read by a client program on the PC. At the server (EV3) end, the critical bit is, as you have above, e.g. video.grabFrame(frame); image = convertFrameToBuffImage(frame); /* a function to convert YUV to RGB, as above OutputStream stream = videoSock.getOutputStream(); ByteArrayOutputStream baos = new ByteArrayOutputStream(); ImageIO.write(image, “JPEG”, baos); byte[] imageBytes = baos.toByteArray(); stream.write(imageBytes); stream.flush(); At client end I have : private static final int WIDTH = 160; private static final int HEIGHT = 120; private static final int NUM_PIXELS = WIDTH * HEIGHT; private static final int BUFFER_SIZE = NUM_PIXELS * 2; private static byte[] buffer = new byte[BUFFER_SIZE]; … int offset = 0; while (offset < BUFFER_SIZE) { offset += (videoSock.getInputStream()).read(buffer, offset, BUFFER_SIZE – offset); } image = ImageIO.read(new ByteArrayInputStream(buffer)); This does not work (the image does not display when assigned to a JPanel). Previously, I have had working well the code here where the frame is sent as byte array and the conversion from YUV to RGB and assignment to a BufferedImage is done at the PC end. The reason I now want to do the image manipulation at the EV3 end is that opencv has become available for the brick and I don't have to do it on the PC. Also, I was hoping to compress the image data a bit as I am using Bluetooth not TCP/IP and it is quite slow. But if as you say JPEG conversion is also slow, perhaps I won't see much better performance . What I don't understand about the method of sending a BufferedImage above is this. In the old code, I just grabbed a frame from the camera and sent it as a bunch of bytes to the PC. On the PC end, I read the bytes into a buffer and did some manipulations on them (i.e .the YUV to RGB conversion above) and built a BufferedImage. When sending a BufferedImage , however, I have to convert the bytes to an image format (JPEG,PNG, etc) for ImageIO. Surely means data than just the pixel values is sent? In which case, how is it unpicked at the receiving end? Perhaps this is why it doesn't display? Thanks for your help. Rob
https://lejosnews.wordpress.com/2015/02/20/webcam-http-streaming/
CC-MAIN-2017-43
refinedweb
879
59.9
Hello. I'm currently using an Npgsql.dll which I have placed in my Plugins folder. I'm using it in two different projects. Both my projects work fine when built. The dll does its job and allows me to change my PostgreSQL database . The problem lies when I try to run the same scenes in the Editor. For the first project, I get a MissingMethodException : Method not found : 'NpgsqlParameterCollection.AddWithValue . The weird thing is that a few lines before, sever methods from the Npgsql library have been called and they never produced an error. For the second project, I got the same error if I use the same method. The game completely crashes though when I'm trying to read from the database. As you can see, the problem is probably caused by the Editor being unable to access parts of the library. For anyone wondering, the import settings for the dll are at default to all platforms and it's targeting .NET 3.5. If you have any ideas on why this is caused, I'd greatly appreciate it since it's quite nerve-wracking not being able to easily check a debug. Answer by Nicola-Patti · Oct 12, 2017 at 01:48 PM Hello Xontros, I had the same problem as yours. I Tried almost everything to figure out what caused the issue. At the end, I found a solution but I don't know why it works (maybe someone can tell us). To fix the problem let's take the Npgsql.dll and put it into the Asset folder (so you have the file into \Asset\Npgsql.dll). In my case, I've copied even the System.Data.dll for another error (I'm trying to use Postgre DB on the Master Server Framework). Now everything works fine in my case. Let me know if the tip resolved your problem. Answer by Randy-Lee · Apr 16, 2018 at 08:41 PM I've got a similar problem right now: Using npgsdql 2.2.3 and Unity 2017.3... When I build out a project in 32bit it runs (and also on a MAC oddly enough) but when I attempt to do anything with this DLL in the editor it causes the entire IDE to crash. I'm assuming this is a 64bit vs 32bit thing but I don't see how since this is built in C# which should be platform independent. Anyone have any ideas of how to get this to run? just found another thing here: that talks about this as a namespace problem. I haven't built the application to see if it'll work there or not but it does work in the IDE now Answer by kalavinka13 · Jul 16, 2019 at 02:40 AM I currently had a same problem as Nicola-Patti describes that the application requires Npgsql.dll and System.Data.dll in /Asset, and I had to add dlls by drag-and-drop from my working version of UnityEditor. For example I used 2018.2.16 and dlls were from C:\Program Files\Unity\Hub\Editor\2018.2.16f1\Editor\Data\Mono\lib\mono\2.0 . When I added dlls by "Import new Asset", or used Npgsql downloaded from web or System.Data from other similar version of Unity Editor accidentaly, more and more files were required and never worked well. I hope it might help somebody. MonoDevelop - Uncaught Exceptions 2 Answers Unity 2019.03 crashes when launched 0 Answers What is the recommend way to debug an Editor crash? 1 Answer Fixed crash bug in 3.4.2? 0 Answers Login system for editor window HELP 0 Answers
https://answers.unity.com/questions/1417227/npgsql-dll-working-in-standalone-build-but-not-in.html
CC-MAIN-2021-04
refinedweb
611
74.39
I have a pandas df like this below with a Time Block index column and a Payload column that is an int: Payload Time Block 2021-08-20 00:00:00 1 2021-08-20 00:15:00 2 2021-08-20 00:30:00 3 2021-08-20 00:45:00 4 2021-08-20 01:00:00 5 Pandas to json, it seems to automatically convert to epoch time: result = df.to_json(orient="index") Looks like this: '{"1629417600000":{"Payload":1},"1629418500000":{"Payload":2},"1629419400000":{"Payload":3},"1629420300000":{"Payload":4},"1629421200000":{"Payload":5}}` parsing the json data: import json parsed = json.loads(result) Looks like this: {'1629417600000': {'Payload': 1}, '1629418500000': {'Payload': 2}, '1629419400000': {'Payload': 3}, '1629420300000': {'Payload': 4}, '1629421200000': {'Payload': 5}} What I cant figure out is how do I convert the original time block column back into datetime? For example the first date is 1629417600000, if I try: from datetime import datetime epoch_time = 1629417600000 datetime_time = datetime.fromtimestamp(epoch_time) This will throw an error OSError: [Errno 22] Invalid argument Is there anything that should be done to the Pandas time block column after the json data is parsed? If I do: import time time.time() Looks like this below a bit different that how pandas packaged my date time index to json: 1629571434.5085876 The time.time() also parses just fine too as shown below. epoch_time = time.time() datetime_time = datetime.fromtimestamp(epoch_time) Any tips greatly appreciated. Its almost like I need to divide my pandas epoch values by 1000 but I am not entirely sure how epoch time is calculated to know if this would work OK. Answer The function fromtimestamp takes seconds as input and you’re providing milliseconds. Dividing by 1000 is exactly what you need to do (and will work as needed). You may however need to use the utcfromtimestamp function instead: fromtimestampgives you the date and time in local time utcfromtimestampgives you the date and time in UTC. from datetime import datetime >>> [datetime.utcfromtimestamp(int(ts)/1000) for ts in parsed] [datetime.datetime(2021, 8, 20, 0, 0), datetime.datetime(2021, 8, 20, 0, 15), datetime.datetime(2021, 8, 20, 0, 30), datetime.datetime(2021, 8, 20, 0, 45), datetime.datetime(2021, 8, 20, 1, 0)]
https://www.tutorialguruji.com/python/convert-pandas-df-to-json-then-parse-dates/
CC-MAIN-2021-39
refinedweb
371
65.73
In the last couple of weeks I have seen several issues related to memory pressure situations in MOSS or WSS application pools so I think it is a good idea to discuss some aspects of this type of problem in a separate article. What is a memory pressure situation? First of all: what do we understand under memory pressure? To answer this question we need to understand the basic memory management concept of the .NET framework. Managed Objects allocated by the .NET framework are stored on a so called managed heap. When more memory is required than available on the managed heap the .NET framework allocates a new heap segment which by default has 64 MB in size. So in order to extend the heap it is required that a free contiguous 64 MB segment is available in the virtual address space. From time to time the garbage collector will run and compact the memory inside the managed heap to ensure that new 64 MB segments are only allocated if really required. In theory this would mean that the memory can grow up to 2 GB per process on a 32-bit machine – and if you are writing your own windows or console application in C# then you can indeed use nearly this amount of memory! But with ASP.NET it is different. The reason is not ASP.NET itself but the fact that ASP.NET is hosted inside an IIS w3wp.exe worker process. This w3wp.exe process does not only contain the .NET framework but also DLLs from IIS like ISAPI extensions and ISAPI filters. That would also not be a problem if these DLLs would be loaded one after the other as an contiguous block in the virtual address space. In reality this doesn’t happen. Each DLL has it’s own preferred load address inside the 2 GB address space which causes the available virtual memory to be split into multiple different pieces separated by the dlls loaded into memory. Often the distance between two DLLs is smaller than 64 MB – which means that this memory is not available for the managed heap. And even if the memory segment is bigger than 64 MB (e.g. 100 MB) it means that after allocating 64 MB segments the remaining memory will be smaller than 64 MB (e.g. 36 MB if we look at the 100 MB sample from before). See here for details: If there is no additional contiguous memory segment of 64 MB can be found in the virtual address space we are talking about a memory pressure situation. Usually this will occur between 800 and 1000 MB. With other words: whenever an ASP.NET worker processes exceeds 800 MB it can become unstable and out of memory errors are likely to happen. In addition you can usually also see a performance impact on your site as a large amount of CPU time is now used by the garbage collector which has to run much more frequently. Common Reasons for memory pressure There are many different reasons that can lead to memory pressure situations: Reason 1: Running a web application in debug mode. If a web application in debug mode, then every single ASPX page is compiled into a separate DLL. That means that the memory fragementation is heavily increased. => Always configure your web applications to run in release mode Reason 2: Managed objects holding references to COM components are not correctly released. Special care has to be taken for all managed objects which hold references to unmanaged COM components as these unmanaged COM components can hold references to unmanaged resources like file handles but also allocated memory which is not under control of the .NET framework which means that the garbage collector cannot see and free up this memory if it is no longer used. Usually the managed components holding references to unmanaged components implement a Dispose() or Close() method to explicitly release the unmanaged COM components including the resources allocated by these components. In case that these methods are not called the unmanaged resources are not released and increase the overall memory consumption. Usually these managed objects will finally release the COM components in their finalizer method when the garbage collector adds them to the finalizer queue but that can already be to late as the finalizer will not run together with the garbage collector – means it might be that not enough memory for further allocations is available at the time when it is required. In SharePoint we have one object type that holds references to unmanaged COM components: the SPRequest object. Each SPWeb and SPSite hold a reference to one of these SPRequest objects. So in all custom code using SPWeb or SPSite objects it is vital to correctly dispose these objects to free up no longer required memory resources. See here for details: Best Practices: Using Disposable Windows SharePoint Services Objects When using the publishing features there is one additional object that needs to be correctly closed: PublishingWeb. The reason here is that the PublishingWeb object itself holds a reference to the associated SPWeb object. In order to release the resources of the bound COM objects it is required that the PublishingWeb object releases the associated SPWeb object. This can be done using the Close() method of the PublishingWeb object. => Always ensure to correctly dispose all SPWeb, SPSite and PublishingWeb as discussed in the above article. Reason 3: Hosting multiple web applications in the same application pool Each independent web application usually ships with it’s own unique dlls and has a specific usage pattern for allocated objects in memory. Hosting multiple web applicaitons in the same application pool causes all DLLs for all web applications to be loaded into the same worker process and also objects specific to this web application to be created. This increases the memory pressure. => If your application requires a large amount of memory ensure that it is running in a dedicated application pool. Reason 4: memory hungry application code In some situations the application code is written in a way that each single request hitting the server results in a huge memory consumption. E.g. if large arrays or dictionaries are being allocated. But also some of the out-of-the-box components can require huge amount of memory when incorrectly configured. Some components that are often responsible for high memory situation and participate in memory pressure are navigation controls and site map providers. For each item in a navigation control that has to be retrieved through the sharepoint site map provider SPWeb and SPSite objects will have to be created. Although the controls ensure that the SPWeb and SPSite objects are correctly disposed before the request ends there are often several of these objects in parallel in memory while the control is being rendered. You might have seen warnings like the following in the ULS log when this happens: Potentially excessive number of SPRequest objects (53) currently unreleased on thread 13 The number of objects (here 53) and the thread number (here 13) will vary. This warning indicates that there are controls on your pages which require many SPWeb and SPSite objects. To ensure that no memory pressure occurs it is vital that the number of SPWeb and SPSite objects required by such a navigation control and site map provider is as small as possible. So you should ensure that you are configuring the navigation controls with minimum depth rather than having a flyout menue that shows your site structure 5 levels deep. If your site design really requires such a navigation control you should better feed it from a static XML file which is (e.g.) generated once a day rather than from one of the SharePoint site map providers. => Ensure that your site logic releases allocated memory as quick as possible and only allocates as much memory as really required. Also ensure to configure the navigation controls to not enumerate big parts of the SharePoint database. What solutions do we have for memory pressure? In ASP.NET there are more or less 3 approaches for this: 1) Follow all the steps outlined above to ensure that your application only allocates the memory it really requires (this is the approach you always should follow first!) 2) Using the /3GB switch? – sorry this cannot be used with SharePoint! Although this solution would allow ASP.NET to use around 1.8 GB of memory before running into memory pressure situation it cannot be used with SharePoint. The following article explains why using the /3GB switch in SharePoint is not an option: 3) Switching to 64-bit architecture In 64-bit architecture the virtual address space is no longer limited to 2 GB. This also means that memory fragmentation as discussed in the beginning of this article will not have the negative effects as in 32-bit architecture and the 800 MB limitation for ASP.NET does no longer exist. PingBack from I just a found another great post about memory management and performance issues on the SharePoint platform. Excellent article. Required reading for all SharePointies. Dealing with Memory Pressure problems in MOSS We consistently have memory issues with our large SharePoint implementation. These are great tips that I can now pass onto the developers and help bolster our SharePont Dev standards. Overview Windows SharePoint Services (WSS 3.0) and Microsoft Office SharePoint Server (MOSS 2007) have Overview Windows SharePoint Services (WSS 3.0) and Microsoft Office SharePoint Server (MOSS 2007) have A couple of weeks ago I wrote an article which explains how to deal with memory pressure situations in One of the areas covered during the training I do on WSS Development is how to correctly dispose of objects Un post qui vient un poil en doublon de ceux qui relaye 2 nouveaux articles de blog mais ces posts sont In an earlier article I have discussed that all SPSite and SPWeb (and potentially also PublishingWeb) Hi Stefan, This post displayes the information on what can cause a memory leak in the w3wp.exe process, is there anything that can cause a memory leak (under the context of MOSS server) in the SQL Server process: sqlservr.exe? I am performing a lot of imports, one after another, and I suspect that such thing may be the cause. Hi Mor, import operations can lead to high memory usage on SQL server as well. That’s why we recommend 64-bit architecture on SQL server. But it should not lead to a leak. If there would be a leak it would be a bug in SQL server. Cheers, Stefan Stefan Gossner has published a great article on the subject: In an earlier article I have discussed that Might as well dive right in and make the inaugural posting useful… Anyone who's done some development Performance is perspective that all the developers forget during development and it pops up and the end I have discussed problems with missing dispose for SPWeb and SPSite objects earlier on my blog (e.g. from:RogerLamb… Stefan, Would it be possible to get your sharepoint w3wp to use more memory if you had a windows 2003 enterprise server (8 gig ram) with PAE enabled? Hi Matt, just to add: the solutkion for your problem is 64 bit technology. Then the virtual memory in a process becomes bigger. Cheers, Stefan Thanks Stefan! I had a feeling that was going to be the answer. Unless we can get our WFEs replaced with 64 bit servers, all we can do is add some more regular 32 bit WFEs to the farm. Well that and write better code. what are some debugging tools you use to identify such problems I use WinDBG and SOS from Debugging Tools for Windows There are several articles around discussing the dispose of SPWeb and SPSite objects, e.g.: SharePoint Linki, które posłużyły mi przy tworzeniu prezentacji, z których czerpałem wiedzę, nakładałem ją na to SPSite and SPWeb implement the IDisposable interface I’ve been working on supporting and enhancing a client’s custom SharePoint solution for a while now. I have dispose and close all the SP objects and also increase the virtual memory of application pool. but still got "out of memory" error while deleting the list items. Thanks in advance. Hi Ganesh, I would suggest to open a support case with Microsoft if you need assistance to analyze what is going on. Cheers, Stefan When do you add another WFE to the farm? You have to do this when the average request execution time exceeds the frequency of incoming requests. ..and how do you do that? Do you use PerfMon? actually IIS logs are sufficient for this. Take the average time-taken – which is the request execution time – and compare it with the incoming request rate during busiest hours. ok maybe i am missing something but how do i see it. do i have to setup any parameters in the IIS log monitoring service? You need a software which does some statistical analysis on the log files. If you are good in Excel you could use this (e.g.). Or use logparser:…/details.aspx
https://blogs.technet.microsoft.com/stefan_gossner/2007/11/26/dealing-with-memory-pressure-problems-in-mosswss/
CC-MAIN-2016-30
refinedweb
2,198
52.29
The dying old media Here are some excerpts from the Key Findings Summary of the Iraq Survey Group's latest report, also known as the Duelfer Report: Saddam Hussein so dominated the Iraqi Regime that its strategic intent was his alone. He wanted to end sanctions while preserving the capability to reconstitute his weapons of mass destruction (WMD) when sanctions were lifted. [snip]. Here is what the Chronicle told us in an editorial last week: On Wednesday, the top U.S. weapons inspector reported that he did not expect to find any stores of weapons of mass destruction in Iraq. Charles Duelfer, a CIA expert and former U.N. weapons inspector, concluded that Saddam Hussein had destroyed his chemical and biological weapons in 1991 and 1992, and had not resumed production. Duelfer also said there was no evidence that Saddam had tried to import uranium after the first Persian Gulf War. Rather than being a gathering threat, Iraq was less able to develop and produce weapons before the U.S. attack in 2003 than it was in 1998, according to the report. Saddam's Iraq was nearly prostrate, it turns out, but far from benign. According to Duelfer and his report, Saddam was trying to develop illegal long-range ballistic missiles. He intended to resume banned weapons programs whenever United Nations trade sanctions were lifted. But intentions are not facts. Desires, even a tyrant's, are not weapons. There's a reason why people are leaving old media behind and turning to other sources for news, especially the internet. That reason is displayed above. The Chronicle editors have chosen to focus on the fact that there are no stockpiles of WMD's, which has been reported for months now, and to play down the real meat of Duelfer's report: that Saddam corrupted the Oil-for-Food program, bribed Security Council members and planned to restart his WMD program once sanctions were lifted. This is a big story - probably far too big for a newspaper like the Chronicle to handle. That is why so many of the news stories the Chronicle uses are from wire services or other newspapers. And that leads to some coverage problems Chronicle readers have to deal with. If Houstonians wanted to read the N.Y. Times or the L.A. Times, we'd probably subscribe to them. We want to read Chronicle material, and we'd like the Chronicle to take into account the things that make Houston different from New York City or Los Angeles. But instead of the Chronicle responding to its readers, Jeff Cohen seems determined that readers instead embrace his vision of how they should be consuming news. So, readers are fleeing the Chronicle and searching for news elsewhere. Chronicle editors are free to keep their blinders on, but many readers know, just know, that when we read a story in our morning paper about, for example, a new report from the Iraq Survey Group, we should maintain some skepticism. And we should probably go searching for another point of view. Posted by Anne Linehan @ 10/12/04 02:03 AM | Print | Previous Entry | Home | Next Entry
https://www.bloghouston.net/item/137
CC-MAIN-2020-34
refinedweb
526
62.17
In this tutorial we will check how to send data in binary frames from a Python websocket client. Introduction In this tutorial we will check how to send data in binary frames from a Python websocket client. We will only develop the client and we will send the messages to this echo server, which should return back to the client the message in the same format it received. We will use the following endpoint: ws://demos.kaazing.com/echo So, in our Python program, we will analise the received frame echoed by the server and check if it has the expected binary format. We can do this by looking into the opcode of the frame, which is different depending if it is a binary or a textual frame [1]. For comparison, after the binary content, we will also send some textual content and take a look at the opcode of the received frame, to confirm its type. We will use this python module for the websocket related functionality. It can be installed via pip with the following command: pip install websocket-client This tutorial was tested on Python version 2.7.8. The code We will start our code by importing the websocket module, which will expose the functionality we need to connect to the server. import websocket After this, we will instantiate an object of class WebSocket, which we will use to connect to the server, send and receive the websocket messages. We will pass no arguments to the constructor. ws = websocket.WebSocket() Now that we have our WebSocket object, we will take care of establishing a connection to the remote websocket server. To do so, we simply need to call the connect method on the WebSocket object, passing as input the server endpoint as a string. ws.connect("ws://demos.kaazing.com/echo") From this point onward, we should now be able to send data to the server. So, to send data in binary format, we simply need to call the send_binary method of the WebSocket object. Note that although this method also accepts a string as input and converts it to bytes under the hood, we are going to pass as input an array with the actual value of the bytes we want to send. We can pass a simple array of integer values as long as we respect the range of values a byte can represent (it should be between 0 and 255). We will send some arbitrary values. ws.send_binary([100, 220, 130]) Now we can call the recv_frame method on our WebSocket object to receive the frame from the server with the response. Recall that we are reaching an echo server, so it will always return back to us the content we have sent. This method call will return as output an object of class ABNF, which represents the frame returned by the server. Note that in a normal use case we don’t deal with the ABNF frame since we can simply obtain the data of the response frame by calling the recv method rather than the recv_frame method. Nonetheless, in this case, we will check the opcode of the frame to confirm if we are receiving a textual or binary answer, which is why we are using this lower level class. binAnswer = ws.recv_frame() Now that we have the frame, we can check the value of the opcode by accessing the opcode attribute of our ABNF object. Note however that this opcode attribute is an integer representing the value of the opcode for a binary frame, which corresponds to the value 2 [1]. So, the ABNF class has a static dictionary variable called OPCODE_MAP which maps the opcode values to user friendly strings. We will use this dictionary to map our opcode to a readable string and print the result. print websocket.ABNF.OPCODE_MAP[binAnswer.opcode] Now that we have printed the opcode, we will also print the data returned back to us. We can do it by accessing the data attribute of our ABNF object. One important thing to mention is that, even though the response from the server should also be in binary format, this attribute will be of type string. So, we will convert it to a byte array and iterate by all the bytes of the array, printing their value. Note that the comma after the argument of the print function is a trick to avoid inserting a newline at the end of each print, in order for us to get all the bytes printed in the same line. for byte in bytearray(binAnswer.data): print byte, After this, we will perform the same test, but now sending content in textual format to the server. To do it, we use the send method on our WebSocket object, passing as input a string with the content. ws.send("Hello world") After that, we will again obtain the frame by calling the recv_frame method and then prints its opcode, which should now have the value 1 [1]. Nonetheless, we will again leverage the OPCODE_MAP dictionary to obtain a user friendly string. This time, we can directly print the received content from the data attribute since it has textual format. txtAnswer = ws.recv_frame() print websocket.ABNF.OPCODE_MAP[txtAnswer.opcode] print txtAnswer.data To finalize, we need to call the close method on our WebSocket object, so the connection to the server is closed. ws.close() The final code can be seen below. It contains some extra prints for better readability. import websocket ws = websocket.WebSocket() ws.connect("ws://demos.kaazing.com/echo") ws.send_binary([100, 220, 130]) binAnswer = ws.recv_frame() print "----BINARY---" print websocket.ABNF.OPCODE_MAP[binAnswer.opcode] for byte in bytearray(binAnswer.data): print byte, ws.send("Hello world") txtAnswer = ws.recv_frame() print "\n----TEXT---" print websocket.ABNF.OPCODE_MAP[txtAnswer.opcode] print txtAnswer.data ws.close() Testing the code To test the code, simply run it in the tool of your choice. I’ll be using IDLE, a python IDE. You should get an output similar to figure 1. As can be seen, for the first case, the frame that is returned back by the server has a binary format, which makes sense since it echoes back what we have sent and we have used a binary format. In the second case, the opcode is textual, since we have sent textual content to the server and it also echoed the content back. Figure 1 – Output of the program. References [1] 2 Replies to “Python websocket client: sending binary content”
https://techtutorialsx.com/2018/11/08/python-websocket-client-sending-binary-content/
CC-MAIN-2020-16
refinedweb
1,089
62.27
25 January 2008 11:58 [Source: ICIS news] By John Richardson SINGAPORE (ICIS news)- ?xml:namespace> Recent capacity announcements have included 3m tonnes/year by Sinopec in five phases of 600,000 tonnes/year. This all makes perfect sense to Before we get on to the predictions of what’s going to happen in 2027, the immediate prospects for DME itself may not be that rosy. Berggren believes that there is a likelihood of too much capacity being built. Markets for However, the ramp-up of, The environmental impact of the coal-to-liquids (CTL) process to make methanol is a major concern and could limit how much further supply is brought on stream. The process, it is argued, consumes large quantities of water - a scarce resource in western However, major coal producer Shenhua Group argues that after water is recycled in the syngas process, This compares with 6.5 tonnes of water needed to produce and process a tonne of crude oil. Shenhua signed an agreement with Dow Chemical in May last year to study the feasibility of a coal-to-chemicals plant in
http://www.icis.com/Articles/2008/01/25/9095590/insight-methanols-boost-from-the-dme-drive.html
CC-MAIN-2014-41
refinedweb
185
58.01
im trying to create a program that reads a text file and plots the data using matplotlib. however, what i want to do is subdivide the each major y-axis display into 10 smaller segments. ive tried matplotlib.pyplot.yscale but i cant seem to quite get the hang of it. any help is appreciated. below is the code import matplotlib.pyplot as mpl import numpy as npy import os import sys import string def isFloat(string): try: float(string) return True except ValueError: return False fileopen = open ('output.txt' , 'r') filelist = fileopen.readlines() angle = [] timeset = [] for onefile in filelist: if( isFloat(onefile.strip()) == True ): angle.append (eval (onefile)) for dt in range (0,len(angle)): #create time steps equal to the number of input angles timeset.append (dt * 1) mpl.plot (timeset , angle , 'r') mpl.xlabel ('Time (Seconds)') mpl.ylabel ('Angle (Degrees)') mpl.yscale ('linear' , ([range (0,10)])) mpl.show ()
https://www.daniweb.com/programming/software-development/threads/335837/how-to-subdivide-an-axis-using-matplotlib
CC-MAIN-2018-47
refinedweb
151
71.61
Perhaps you've heard of data URIs. It's a really nice way of including a resource that would have otherwise been a separate HTTP request. The format that you use in a data URI can vary. Essentially you just tell it what content type it is (e.g. image/png), semicolon, then the data of that file. Like: <img src='data: ... '> or: .bg { background: url('data: ... '); } For a raster image like a PNG, the data of that image needs to be in base64 format. I'm not a huge expert here, but as far as I understand, base64 is safe for use in something like HTML or CSS because it only uses 64 characters known to be safe in those formats. Probably better Stack Overflow answer by Dave Markle:. Base64 looks like gibberish, and we often associate gibberish with compression on the web. But this gibberish isn't compression, it's actually a bit bigger than the original because, to quote Jon Skeet on the same Stack Overflow thread: It takes 4 characters per 3 bytes of data, plus potentially a bit of padding at the end. I'm not sure how gzip factors into it though. But what I'm getting at here is how SVG factors into this. You can use data URIs for SVG too. <img src='data:image/svg+xml; ... '> .bg { background: url('data:image/svg+xml; ... '); } For SVG, you don't have to convert the data into base64. Again, not an expert here, but I think the SVG syntax just doesn't have any crazy characters in it. It's just XML like HTML is, so it's safe to use in HTML. You can leave the encoding in UTF-8, and drop the <svg> syntax right in there! Like this: <img src='data:image/svg+xml;utf8,<svg ... > ... </svg>'> .bg { background: url('data:image/svg+xml;utf8,<svg ...> ... </svg>'); } So because we can do that, and we know that base64 often increases the size, might as well do that right? Yep. As a side benefit, the <svg> syntax left alone does gzip better, because it's far more repetitive than base64 is. Say you wanted two versions of an icon, one red, one yellow. You can use the same SVG syntax duplicated just change the fill color. Gzip will eat that for breakfast. Credit to Todd Parker for that tip, and that's also the approach of Grunticon, which data URI's SVG in UTF-8 into CSS. A Test To test this out, I downloaded three SVG icons from IcoMoon. cog.svg - 1,026 bytes play.svg - 399 bytes replay.svg - 495 bytes I ran them through SVGO just so they are nicely optimized and kinda ready for use as a data URI (whitespace removed, although I guess not strictly necessary). cog.svg - 685 bytes play.svg - 118 bytes replay.svg - 212 bytes Then I ran those through a base64 converter. cog.svg - 916 bytes - 133% of the original size play.svg - 160 bytes - 136% of the original size replay.svg - 283 bytes - 134% of the original size So that makes sense, right? If it's 4 characters for every 3 bytes, that's 133% bigger, with the variation coming from uneven lengths and thus padding. Anyway, maybe this is all super obvious. But it just seems to me if you're going to use a data URI for SVG there is no reason to ever base64 it. Props to Matt Flaschen for his email a few months ago that highlighted this issue for me. UPDATE: on IE There is a lot of talk in the comments about IE 10/11/Edge not supporting this. It does, it's just finicky. Here's a reduced test case that works in those version of IE. Note the second example, which is URL encoded, works. The trick is not specifying an encoding type at all. UPDATE: "Optimized URL-encoded" Taylor Hunt investigated a bit deeper and found that you can sweak out a bit more optimization by not encoding stuff like spaces and single quotes. Example: data:image/svg+xml,%3Csvg xmlns='' viewBox='0 0 512 512'%3E%3Cpath d='M224%20387.814V512L32 320l192-192v126.912C447.375 260.152 437.794 103.016 380.93 0 521.287 151.707 491.48 394.785 224 387.814z'/%3E%3C/svg%3E Doesn’t work in all browsers. IIRC, Safari 7 and IE11 cannot. I think that URL encoding the svg solves that, and still performs better in size than base64. URL encoding? If you mean literal XML within a data URI, you’re suggested to solve a problem with the problem itself. Such does not work in the browsers I mentioned. I mean If you meant character encoding as Gunnar Bittersmann suggested below, that might be the solution. I never thought to try that when I was working with data URIs containing SVG. Yeah, I meat that and I’ve had this issue with IE and FF (back in that time), both solved with this little trick.. You may notice that the raw size of a uriencoded string may be larger than base64 but when gzipped it is definitely smaller. Yes, the need to URL encode for IE really negates the simplicity. However, I hadn’t thought about the fact that gzip can still make good work of multiple similar SVGs if they are URL encoded but not necessarily if they are base64 encoded. If you’re not yet at production stage, or are working on an app or something where support for IE is not required, I’ve put together a list of tips on how to avoid breaking your data URIs in other browsers. To summarize what others have said and tests that I’ve just completed: Firefox 4+ supports < and >, but # must be url encoded <=IE11 needs to be fully encoded Chrome and Safari 5+ work just fine without encoding You mean 33% bigger, not 133%. Base64 is commonly used in this scenario because it works around the need to URL escape the image, which would be needed otherwise. You really need to get some maths lessons, Chris… ;) 916/685 = 1.33 = 133% = 33% bigger, not 133%. But yeah, base64 is probably not always a good idea but svg can contain unsafe characters (remember, vector image can contain bitmap parts…). Plus, tools like LESS include the SVG as base64 by default when you want a data-uri… 133% of the original size, not 133% bigger than original. Any difference in browser support between base64 and plain UTF8? I actually switched to base64 because I heard somewhere that the other way didn’t work in IE9 (can’t find source now). Would be nice to see this mentioned in the article either way. Keep up the good work Chris — thanks! According to RFC 2397 the parameter in the media type should be an attribut–value pair, i.e. charset=utf-8(with hyphen!) instead of just utf8. With character encoding, the data URI should start with data:image/svg+xml;charset=utf-8,<svg… However, when using UTF-8 it should be safe to omit the encoding declaration: data:image/svg+xml,<svg… In my experience, not all non-base-64-encoded SVGs work in all browsers. I would love to use this, but it’s been buggy for me. I wonder if it was an encoded-vs-non-encoded problem rather than a base64 problem. Another advantage is that you can use variables from CSS preprocessors to build your SVG. Of course, this will bloat the resultant stylesheet, particularly if the same SVG template is rendered multiple different ways. But it does save on an HTTP request, which can be useful for small images such as the navicon. Just be careful with quotes! If your SVG has an attribute with a double-quote (“) and you open/close your url() attribute with double-quotes then straight SVG will explode. Same goes for single quotes obviously. If you’re going to use straight SVG then you’ll probably want to put some preprocess in place to normalize (or escape) the quotes. I have used base64 ( ) because raw content didn’t work in all “commonly used” browsers :-(. So even base64 makes the content larger, it was the only one way for me :-( No, it isn’t. People get this wrong a lot. HTML is not XML, and HTML predates XML by a few years. HTML History Interesting. The point in the case though is: angle brackets, attributes, whatnot, the fact that inline SVG works great in HTML. They are kindred spirits. Would be cool if there was a SASS mixin. Does anybody has seen one? Looks like someone on SO created one:. It would be great it into compass. Less.js has an optional mime typeargument on data-uri: Gunnar’s point above about the media type parameter is pretty important… Using the shorthand data:image/svg+xml;utf8,fails in IE10/11 Using data:image/svg+xml;charset=utf-8,or omitting the media type seems to work I’m not sure if you were saying that data:image/svg+xml;charset=utf-8,works in IE, but it truly does not. … with non-encoded svg. Anyone else seeing something like: in Firefox? Even better, anyone know a fix? Are you URL encoding the SVG before putting it into the data URI? Firefox requires it; take a look at the Codepen I posted just above. You’re right, also the encoding must be set to charset=utf-8. Since I’m assuming we all still want tot support FF, I think this should really be highlighted in the article and probably used as the benchmark instead of plan XML (although I’m sure the encoded XML would still win out). Firefox is actually fine with “, it just doesn’t like #. This was the only character that I needed to encode in my tests. Uhh… my above comment got messed up. “Firefox is actually fine with < and >, it just doesn’t like #.” Yes, one can really just write plain SVG, but it needs some symbols to be encoded, like quotes, ‘#‘ and brackets. Interestingly, there is no need in encoding equal sign ‘=’, comma and svg namespace url ‘’ (consequencently, slash ‘/’ too). IE requires to encode angle brackets. Spaces can be escaped by backslash: ‘\ ’. However, there is a trick, which can save plenty bytes — use the quoted uri: url(“data:image/svg+xml,%3Csvg xmlns=’’…%3C/svg%3E”). Then, one don’t have to encode or escape spaces, and single quotes are ok to use! (But not vice-versa.) This is quite handy, since svg is full of these symbols. I was just playing around with this and noticed the way Grumpicon handles it: background-image: url('data:image/svg+xml;charset=US-ASCII,%3Csvg%20xmlns%3D%22http%3A//'); I don’t know enough about character encoding to know why they are using US-ACII and not UTF-8. I see that they do encode the bracket characters and stuff, though, rather than just dumping straight up XML in there. I do know that I have mad trust for Filament group things in general. You have to encode the SVG syntax for it to be actually safe to use in all browsers. At the very least it’s IE that requires that. I know chrome can handle the angle brackets and stuff right in there, but IE can’t. So they do the safest possible thing (encode it), but still don’t base64. Try changing utf8to charset=utf8. I managed to solve it. The result is the following: The problem was the type of url-encoding I was using… I had picked one online, but you need one that actually uses the encodeURIComponentfunction, like Cheers! Interesting. When I changed utf8to charset=utf8in your original pen it worked fine in IE also. Character encoding is a strange brand of sorcery if you ask me. I had better luck with this tool : I’ve come up against a weird issue with unclosed quotes. I keep getting an error, but have found a totally illogical fix. All on stack overflow if anyone has ideas: not sure if anyone posted this, but @Alexis2004 has created a nice Sass function here to use until it gets baked into the Compass build: works perfectly, avoids having to base64 with the already available Compass inline-image() []
https://css-tricks.com/probably-dont-base64-svg/
CC-MAIN-2020-10
refinedweb
2,072
73.88
Run unit tests on UML extensions The new home for Visual Studio documentation is Visual Studio 2017 Documentation on docs.microsoft.com. The latest version of this topic can be found at Run unit tests on UML extensions. To help keep your code stable through successive changes, we recommend that you write unit tests and perform them as part of a regular build process. For more information, see Unit Test Your Code. To set up tests for Visual Studio modeling extensions, you need some key pieces of information. In summary: Setting up a Unit Test for VSIX Extensions Run tests with the VS IDE host adapter. Prefix each test method with [HostType("VS IDE")]. This host adapter starts Visual Studio when your tests run. Accessing DTE and ModelStore Typically, you will have to open a model and its diagrams and access the IModelStorein the test initialization. You can cast EnvDTE.ProjectItemto and from IDiagramContext. Performing Changes in the UI Thread Tests that make changes to the model store must be performed in the UI thread. You can use Microsoft.VSSDK.Tools.VsIdeTesting.UIThreadInvokerfor. See Requirements. To see which versions of Visual Studio support this feature, see Version support for architecture and modeling tools. project and the unit test project. A UML extension project. Typically you create this by using the command, gesture, or validation project templates. For example, see Define a menu command on a modeling diagram. A unit test project. For more information, see Unit Test Your Code. Create a Visual Studio solution that contains a UML modeling project. You will use this solution as the initial state of your tests. It should be separate from the solution in which you write the UML extension and its unit tests. For more information, see Create UML modeling projects and diagrams. In the UML extension project,. In your UML extension project, add the following line to Properties\AssemblyInfo.cs. This allows the unit tests to access the methods that you want to test: In the unit test project, add the following assembly References: Your UML extension Prefix the attribute [HostType("VS IDE")]to each test method, including initialization methods. This will ensure that the test will run in an experimental instance of Visual Studio. Write a method to open a modeling project in Visual Studio. Typically, you want to open a solution only once in each test run. To run the method only once, prefix the method with the [AssemblyInitialize] attribute. Don’t forget that you also need the [HostType("VS IDE")] attribute on each test method.] [HostType("VS IDE")]: T:Microsoft.VSSDK.Tools.VsIdeTesting. Again, don’t forget that you also need the attribute [HostType("VS IDE")] on each test method: // private IDiagram diagram; // This class contains unit tests: [TestClass] public class MyTestClass { // Map filenames to open diagram files: private static Dictionary<string, IDiagram> diagrams = new Dictionary<string, IDiagram>(); // This method will be called once for this test class: [ClassInitialize] [HostType("VS IDE")]] [HostType("VS IDE")]] [HostType("VS IDE")]((System.Action, HostType("VS IDE")], HostType("VS IDE")] public void Test2() { UIThreadInvoker.Invoke((System.Action)delegate() { // Pass context items to class under test: Class1 item1 = new Class1(this.linkedUndoContext); item1.Method1(); // Can use linkedUndoContext }); } } In this example, the two attributes on each test method are combined for convenience into one line.: Test only by using public and internal items Write your tests so that they use only public (or internal) classes and members. This is the best approach. Your tests will continue to work even if you refactor the internal implementation of the assembly under test. By applying the same tests before and after the changes, you can be sure that your changes have not altered the behavior of the assembly. To make this possible, you might have to restructure your code. For example, you might need to separate some methods into another class. By giving serious consideration to this approach, you will often find that your code is made easier to read and change, and less prone to errors when changes are necessary. You can allow the test assembly to access internal items by adding an attribute in Properties\AssemblyInfo.cs in the project to be tested: Define a test interface Define an interface that includes both the public members of a class to be tested, and additional properties and methods for the private members that you want the tests to be able to use. Add this interface to the project to be tested. For example: Add methods to the class to be tested, to implement the accessor methods explicitly. Keep these additional methods separate from the main class by writing them in a partial class definition in a separate file. For example: Allow the test assembly to use the test interfaces by adding this attribute to the assembly that you are testing: In the unit test methods, use the test interface. For example: Define accessors by using reflection This is the way that we recommend least. Older versions of Visual Studio provided a utility that automatically created an accessor method for each private method. Although this is convenient, our experience suggests that it tends to result in unit tests that are very strongly coupled to the internal structure of the application that they are testing. This results in extra work when the requirements or architecture change, because the tests have to be changed along with the implementation. Also, any erroneous assumptions in the design of the implementation are also built into the tests, so that the tests do not find errors. Anatomy of a Unit Test Define a menu command on a modeling diagram UML – Rapid Entry by using Text
https://msdn.microsoft.com/library/gg985355.aspx
CC-MAIN-2018-05
refinedweb
941
55.13
In this installment, I continue my discussion of common XML pitfalls and, perhaps more importantly, show you how to avoid them. My previous column focused on frequent misunderstandings in the use of the XML syntax itself. Here, I look at how to integrate XML support into an application for efficiency and maintainability. Programming languages and development tools (including databases, IDEs, and modeling tools) offer growing XML support. At the time of this writing, Java technology has no less than five official APIs related to XML: - Java Architecture for XML Binding (JAXB) - Java API for XML Processing (JAXP), probably the largest API, consists of four parts: SAX, DOM, TrAX, and XPath APIs - Java API for XML Registries (JAXR) - Java API for XML-based RPC (JAX-RPC) - SOAP with Attachments API for Java (SAAJ) Furthermore, you'll find countless unofficial Java APIs such as JDOM, PDOM, Castor, and StAX (which will eventually be integrated into JAXP). And last but not least, most projects offer extensions to the standard APIs, such as Axis extensions to JAX-RPC. The choice is overwhelming. Given the short deadlines that are common in this industry, it is not surprising that developers usually reach for the most popular API (typically DOM in my experience) and don't sweat too much over their decision. Likewise, who has the time to design an XML vocabulary? It seems faster to dump the object hierarchy as XML tags. Yet the decision you make in this space will have a significant impact on your ability to deliver on time and on budget, not to mention how easy it will be to maintain your application. A word of warning: Selecting a design can be a trade-off between different qualities. No single design fits all needs, so take the time to validate the trade-offs against the requirements of your application. However, I have found that some designs just seem to be better starting points than others, and I will cover those. From a design point of view, it helps to concentrate on the role of XML documents, rather than on their structure. Structurally, XML documents are repositories of data. More interestingly, XML documents are used as interfaces between applications. In the interface scenario, one application prepares XML documents that another application consumes. You can find many examples of this: An XML editor saves XML files for a content manager; a news reader downloads Atom or RSS feeds from a Web server; a SOAP client sends a SOAP request to a server; the Eclipse platform reads an XML plug-in description; and many more. Even in simpler cases where one application produces XML files for its own consumption, you can still think of the document as an interface between different runs (and occasionally different versions) of the application. By looking at this as an interface design issue, you can apply the same rules that you use with JavaBeans and other APIs to XML design. Among the many methodologies that have been proposed to help design interfaces, one that is particularly relevant is the design-by-contract approach first introduced in the Eiffel language. In a nutshell, when designing by contract you need to spell out the functional requirements of each component in terms of a contract with the other components. Like a legal contract, the contract includes the duties and the rights of each component -- meaning, what the component will deliver and what it expects from other components. In practical terms, you express the functional requirements in terms of a data structure and pre- as well as post-conditions. XML is ideally suited for this approach, thanks to the availability of schema languages (such as W3C XML Schema and RELAX NG) and structural validation languages such as Schematron. The vocabulary you define becomes the contract between the components. It is a given that the functional requirements of the application will change over time. So will the XML vocabulary that supports it. Still, in the mad rush to meet deadlines, few vocabularies are designed to withstand the test of time. Two common problems are the lack of a versioning scheme and reliance on the object data model. A versioning scheme enables backward compatibility, allowing older applications to work with files produced by newer applications and vice-versa. A good versioning scheme enables: - A new application to engage a compatibility mode - An old application to open new files without crashing You can address the first point easily enough by including a version tag or attribute. If the version is lower than the current version, the application must turn on backward compatibility. The second point requires more work. You cannot change the old code (otherwise it becomes a new application), so you must include forward-looking compatibility from the outset. Specifically, the code must: - Know how to treat new tags -- for example, ignore them or report an error (but don't crash) - Detect when the file breaks backward-compatibility and report an error The latter is often overlooked. A new version of a vocabulary may introduce changes such that an old reader should not attempt to process the file. A versioning scheme must provide a mechanism for reporting this -- for example, a tag or attribute called compatibleWith that specifies the minimum version required to proceed with the document. Applications would then refuse to open documents whose compatibleWith number is higher than their own. See Listing 1 for an example. Listing 1. Simple versioning scheme Listing 1, which was written with version 5 of this particular application, can be processed by versions 3, 4, or 5 but not with versions 1 or 2. Alternatively, newer applications can use a different namespace to mark incompatible changes. Data model and vocabulary Typically, a lot of effort has already gone into developing an object model for the application, so it seems logical to make use of that effort and derive the XML model from the object model. In practice, however, this can turn into a maintenance nightmare. The very qualities that make a good object model become liabilities for an XML vocabulary: - The object model often contains redundant information -- for example, to speed searches in hash tables; redundant information means more validation of the XML document. - Conversely, the model might dynamically compute information that is recorded for validation purposes. For example, with an online purchase, you want to store not only the item lines but also the total amount, because the buyer has approved the total amount. In an object model, it is perfectly valid to re-compute the total from the item lines. - Although this is not considered pure object design, the development tools and libraries being used often influence the object model. For example, if you're using a widget library, you might adapt the model to fit nicely with the widgets. - Portions of the object model might be optimized using bit masks or native arrays, sacrificing readability for speed. - Finally, the object model does not need to be stable from one version of the application to the next; properties are often added and removed as the software evolves. If the XML vocabulary is a direct mapping of the object model, it won't be very stable. This may cause some problems during development, since you will need to adapt the XML-related code frequently -- but it will cause even more problems during maintenance. Remember that the document is an interface, so you must isolate it from the implementation details wherever feasible. In contrast, if you take a moment to identify the stable relationship in your object model, then you can derive a more stable vocabulary at minimal cost. Using UML and stereotypes, it might even be possible to generate both the object model and the XML vocabulary from a single diagram (see the "UML, XMI, and code generation" articles in Resources). Alternatively, you can concentrate on a functional view of the data model. The object model is a technical view that implements the nuts and bolts of the application and it changes as the technology evolves. The functional view however is more stable -- even if you migrate the application to a new platform, it will still basically provide the same set of services. From the application side Now that I've covered the XML vocabulary, it's time to look at the application. Again, the rule is to treat the XML processing as an interface and to encapsulate it. The worst case scenario (one that I see frighteningly often) is to design an application around a DOM (or JDOM) tree. With a few exceptions (browsers come to mind), DOM is a horrible object model to work with. DOM appears to be an attractive option because it is easy to use and fairly generic. Many developers figure that it can accommodate anything that's thrown at it, and in most cases it does. Many developers have learned XML programming with DOM, so they assume it's the logical choice. DOM was designed by the W3C for a fairly restricted class of applications: Web browsers. It works very well for related applications, including editors and XML utilities, but it is sub-optimal for general-purpose applications. The main issue with using a DOM model is that it forces you to spread your XML code across the entire application. It's a better idea to concentrate your XML code in one or two packages. I am reminded of a project where I reviewed a fairly sizable product that was built around a DOM tree. Almost every single class in the application would extract data from the DOM tree or insert data into it. This is illustrated in Figure 1, where you can see that almost every package depends on the DOM tree. Figure 1. In this model, every package depends on DOM This proved difficult to debug, difficult to work with, and difficult to maintain for a number of reasons: - Conversions from strings to native types were incoherent. Validation was inconsistent -- different routines would interpret the same DOM tree differently! - Information in the DOM was not in the ideal format, which made for complex algorithms. - It was difficult to track changes. One routine could update the DOM tree in such a way as to break another routine accessing the same data. - Any change in the XML vocabulary required that team members check thousands of lines of code. - Debugging was a nightmare because no one ever knew which routine had produced certain results in the DOM tree. With SQL databases, it's a good idea to separate the data loading from the object model. The same applies with XML. Figure 2 illustrates a more robust alternative that relies on an application-defined object model to isolate the code that deals with XML in a Serialization package. Figure 2. Isolating the XML code The model is brought into memory or serialized to XML through this dedicated package. The benefits include: - It encapsulates (isolates) the code that deals with XML in a well-defined part of the application. This may still run into thousand lines of code, but it can be debugged and tested independently. - It promotes a more coherent use of XML, because the XML code is the responsibility of one developer (I have yet to see an application with so much XML code that it requires a whole team). - While loading, it is possible to reorganize the data to better suit the algorithms -- for example, loading into a hash table or a database may help in working with a large data set. - It is easier to adopt a Model/View/Controller (MVC) paradigm. - The object model is decoupled from the XML model so that they can evolve independently. Obviously the serialization routine may still use DOM for the actual parsing (although I tend to find SAX more efficient). You may also want to explore JAXB or Castor, which essentially generate the serialization package automatically. What is the price to be paid for all the above benefits? The startup costs are higher, but you will quickly find that you save time when you encapsulate the XML code. In the first stages of development, it is normal and expected that both the data model and the XML vocabulary will evolve somewhat rapidly. Even then, you will see the benefits of localizing these changes begin to pay off. The moral of this article is that a little forethought can pay off tremendously. Take the time to design your application and isolate the XML components. In the next installment, I will review the all-important issue of validation. - Participate in the discussion forum. - Read the previous article in this series, "Working XML: Safe coding practices, Part 1" (developerWorks, May 2005). - Check out "UML basics: An introduction to the Unified Modeling Language," which introduces UML as useful tool for capturing the requirements and design of XML documents (developerWorks, November 2003). - Learn how to use SAX to parse XML documents efficiently in Benoît Marchal's article "SAX, the power API" (developerWorks, August 2001). - Take the tutorial, "Screen XML documents efficiently with StAX," which introduces StAX, another API for stream parsing (developerWorks, December 2003). - Check out dozens of XML patterns that are documented at XMLPatterns.com. - Read "Design Pattern in XML Applications," in which Fabio Arciniegas discusses the use of patterns for XML design. - Review the previous installments of Benoît Marchal's Working XML column on developerWorks, including his series on "UML, XMI, and code generation": -.
http://www.ibm.com/developerworks/xml/library/x-wxxm31/index.html
crawl-002
refinedweb
2,237
50.97
Should I Use the Support Library? The support library was originally introduced so that the features available in the latest Android SDK could be available in older Android versions. This fact is still perpetuated in the official web page. The support library was originally introduced so that the features available in the latest Android SDK could be available in older Android versions. This fact is still perpetuated in the official web page. ActionBarDrawerToggle not only takes up the same position as the up button it entirely hijacks the up button. This makes it difficult for an app to show the hamburger menu button initially and then the up button if user navigates into other screens of the app. The softmax function is used to produce better prediction results in a logistic regression or neural network model. On its own the weighted sums are just real numbers. The softmax function converts them into relative probabilities. ReactJS ships a tool called create-react-app that can generate a new project for you. This gets one started very quickly. But I see several problems with a generated project:."} By. In this article we will learn to do basic computations with Tensorflow. We will go beyond basic Hello World. We will learn to do matrix operations and a few other things. We will assume that you have installed Python, Tensorflow and Numpy. All code samples assume that you have imported the packages as follows: import numpy as np import tensorflow as tf Koa uses generator functions for asynchronous operations. Traditional test runners like mocha or jest do not support generators. Here we will use co-mocha to wrap mocha to add support for generators. JSON Web Token (JWT) is used to issue a secure authentication token once the user successfully logs in. In Koa we use the koa-jwt middleware to manage these tokens. npm install koa-jwt --save Import the package from your code. var jwt = require('koa-jwt'); We can use the middleware to guard access to protected URLs. The following will try to decrypt the token sent with the request using the secret key 'pa$$word'. If that does not succeed the processing pipeline will be terminated and the subsequent middlewares will not run. We use the unless escape hatch so that this token validation is skipped for paths starting with "/public". app.use(jwt({ secret: 'pa$$word' }) .unless({ path: [/^\/public/] })); Add the jwt middleware before any routes for it to have any meaningful effect. A new token is issued using jwt.sign(). You can store identifying information like user ID, name etc. as a payload in the token. api.get('/public/login', function *(){ var user = { userId: "bibhas", name: "Bibhas B" } this.body = { token: jwt.sign(user, "pa$$word") } }); A client is responsible for saving the token and sending it back with every request using the Authorization header. In the example below ABCXYZ is a token issued by the server: curl -H "Authorization: Bearer ABCXYZ" localhost:8080/protected-stuff The middleware saves the payload decrypted from the token as the state.user property of the context. So we can easily access that as follows: api.get('/protected-stuff', function *(){ var userId = this.state.user.userId //"bibhas" var fullName = this.state.user.name //"Bibhas B" }); In this article we will explore web service development using Koa. We will also look at some of the really cool things about Koa.
https://mobiarch.wordpress.com/
CC-MAIN-2017-47
refinedweb
567
58.58
Abolade Gbadegesin: Inside Windows Phone "Mango" . Actual format may change based on video formats available and browser capability... def MultiYield: EvensAndOdds xs IE[T] -> { Evens: IE[T] Odds: IE[T] } // The out could be a named Tuple. f(xs){ foreach(x in xs) match (x Mod 2) | 0 : Yield Evens x // Read as Yield onto Evens the value x | 1 : Yield Odds x // Read as Yield onto odds the value x } def MultiYield: LT_EQ_GT xs value IE[T] -> { LT: IE[T] EQ: IE[T] GT: IE[T] } where T is IComparable[T] f(xs){ foreach(x in xs) match x.ComparedTo(value) | < 0 : Yield LT x | = 0 : Yield EQ x | > 0 : Yield GT x } Example of QuickSort using the MultiYield. def fn: QSort xs // Quick Sort using multi yielder [Collection] -> [AscendingCollection] // Note: The are traits. The input must have, and the output has. f(xs){ xs.count | = 0 : [] | = 1 : xs | > 0 : { Pivot := xs[Math.Random[xs.count]] m := LT_EQ_GT xs pivot // use the MultiYield. QSort( m.LT ) + m.EQ + QSort( m.GT ) // Concatenate the results. }): public static IEnumerable<int> Roll(int min, int max, int? seed = null) { Contract.Requires(min < max); Contract.Ensures(Contract.Result<IEnumerable<int>>() != null); Contract.Ensures(Contract.Result<IEnumerable<int>>().All(x => min <= x && x <= max)); var r = seed.HasValue ? new Random(seed.Value) : new Random(); while (true) yield return r.Next(min, max + 1); }). 11 hours ago,CKurt wrote Great video! Exploding mind with knowledge right now. But great to see how it Rx and Ix work together. ' def multiYield: LEG *xs value ' IO<T> -> { L: IO<T> , E: IO<T> , G: IO<T> } ' f(xs,value){ for x in xs ' match x.ComparedTo(value) ' | < 0 : Yield x On L ' | = 0 : Yield x On E ' | > 0 : Yield x On G ' } <Runtime.CompilerServices.Extension()> Public Function LEG(Of T As IComparable(Of T))(ByVal xs As IObservable(Of T), ByVal value As T) _ As Tuple(Of IObservable(Of T), IObservable(Of T), IObservable(Of T)) Dim xs_g = xs.GroupBy(Function(x) Math.Sign(x.CompareTo(value))) Return New Tuple(Of IObservable(Of T), IObservable(Of T), IObservable(Of T))( (From i In xs_g Where i.Key < 0).SelectMany(Function(ii) ii), (From i In xs_g Where i.Key = 0).SelectMany(Function(ii) ii), (From i In xs_g Where i.Key > 0).SelectMany(Function(ii) ii)) End Function ' def fn: QSort *xs ' IO<T> -> IO<T> ' f(xs){ match xs.IsEmpty.FirstOrDefautl ' | True : xs ' | False : { Pivot = Random(xs.Count.FirstOrDefault ' ios = xs.LEG(Pivot) ' ios.L.QSort + ios.E + ios.G.QSort ' } ' } <Runtime.CompilerServices.Extension()> Public Function QSort(Of T As IComparable(Of T))(ByVal xs As IObservable(Of T)) As IObservable(Of T) If xs.IsEmpty.FirstOrDefault() Then Return xs Dim r = New Random() Dim pivot = xs.Skip(r.Next(xs.Count().Single)).FirstOrDefault Dim q = xs.LEG(pivot) Return q.Item1.QSort.Concat(q.Item2).Concat(q.Item3.QSort) End Function @bdesmet: Thanks for the explanation, that's interesting stuff. Comments have been closed since this content was published more than 30 days ago, but if you'd like to send us feedback you can Contact Us.
https://channel9.msdn.com/Shows/Going+Deep/Bart-De-Smet-Interactive-Extensions-Ix?format=smooth
CC-MAIN-2017-17
refinedweb
523
60.11
Ads Hi, Here is the answer. You can define your own package to wrap up group of classes/interfaces etc. Using package provide effective management of application as all the related things to a project or application are bundled together under the same package. Due to new name space created by package, there won't be name conflict between classes. It is also easier to locate the related classes. The package statement should be the first name in the file. Each source file can have only one package statement. If The package is not included, then the class, interface, enumerations, and annotation types will be put into an unnamed package. You can declare package as : package devmanuals; For using another class of different package, first we need to make it available for class using 'import' keyword as : import devmanuals.classname; Thanks. Ads Ads
https://www.roseindia.net/answers/viewqa/Java-Beginners/11240-java-basics.html
CC-MAIN-2017-39
refinedweb
143
55.64
LOTS User Manual Point Of Sale. Last Updated: 3 May 2010 Version: 11.0 - Brendan Boone - 5 years ago - Views: Transcription 1 LOTS User Manual Point Of Sale Last Updated: 3 May 2010 Version: 11.0 2 Contents 1 OPTIONS POS Options Pricing Discounts For Sales Member Options POS Receipts Customer Pole Display Customer Display Lay-By Till Reconciliation Companion Sales Institution Accounts OzBiz Accounting Diary Alerts User Details LOTS Start Menu 25 2 SALES New Sale Unlisted Item Discounts Changes To Quantity, Retail & GST Finishing A Sale Finishing A Sale Cash Out LOTS Integrated EFTPOS/Credit Card Function Keys Within Sales ScriptLink ScriptLink LOTS POS ScriptLink LOTS Complete Placing A Sale On Hold & Abandon Sales Retrieving A Sale On Hold Price Checks Returns Exchanges Agency Payment Add An Agency Rename An Agency Merge An Agency Delete An Agency Paid Out Printing Additional Receipts Account Sales Account Payments Stock Transfers Stock Transfers Charge Options Stock Transfers Reprint invoice GST Free Stock Transfers Lay-By Creating A Lay-By 56 Corum Health Services LOTS POS User Manual 2 of 292 3 Making A Lay-By Payment Removing An Item From A Lay-By Cancelling A Lay-By Add An Item To An Existing Lay-By Lay-By Summary Report End Of Day Setting The End Of Day Options Running Total (X Reading) Closing Off Tills (Z Reading) Re-Print an End of Day Report End Of Day History Till Reconciliation & Cash Lift Till Reconciliation & Cash Lift Settings Cash Lift/Drawer Swap Till Reconciliation POS Options View/Delete Waiting Scripts Set Up Customers for Direct Charging Receipts After Sale Cash Drawer Enabled Touch Screen Enabled POS View Options Display Other Days Sales Display Last Months Sales Display Specific Receipts View Sales On Hold 84 3 STOCK CARDS Accessing Stock Cards Pricing Tab Stock Flags Tab Ordering Tab Labels Tab Promo Tab Supplier/Partcode Window Set Product-Specific Companion Text Stock Card Menu Buttons Creating A Stock Card Copying A Stock Card Producing Shelf Labels For A Stock Card Editing The Shelf Labels Queue Printing Shelf Labels From The Shelf Label Queue Useful Wildcard Searches Within LOTS Using The # Symbol When Searching For Products Using The % Symbol When Searching For Products Using The * Symbol When Searching For Products Using a _ Symbol when searching for missing characters Merging Duplicate Stock Cards Automatically Merge Manually Merge Stock Card Options Modify Departments Move Products Between Sub-Departments 117 Corum Health Services LOTS POS User Manual 3 of 292 4 Add/Edit Department/Sub-Department Add/Edit Department/Sub-Department Modify Department Filters Storage Locations Setting Up Storage Locations & Allocating Products To Them Applying A Stock Locations To A Stock Card Storage Locations Dispensary Benefits Adding The Storage Location Code To Script Labels UTILITIES Group Price Changes Bulk Stock Card Changes Stock Groups Add/Edit Specials Specials Report Goods & Shelf Label Printing Add Creditor Transactions Edit Creditor Transactions Bonus Buys Setting Bonus-Buy Details Adding/Removing Bonus-Buy Products Copy To New Bonus-Buy Report Bonus-Buy Example I Buy 2 & Receive 1 Free Bonus-Buy Example II Buy 1 & Receive 50% Off A Second One Multi Buys Setting Multi-Buy Details Adding/Removing Multi-Buy Products Copy To New Multi-Buy Report Multi-Buy Example I Buy Any 3 Hair Lemon Products & Receive 10% Off STAFF UTILITIES Modify Staff Add New Staff Member Modify Existing Staff Member Delete Staff Member Set Access Rules Edit Security Levels New Security Levels Modify Security Levels Delete Security Levels Diary Function Activating Diary Alerts Creating A Diary Alert PRICE UPDATE Nominate Supplier Price Update Notification Performing The Price Update Update Promotions ORDERS 171 Corum Health Services LOTS POS User Manual 4 of 292 5 7.1 Orders Main Screen The Definition Of Status For Orders Creating An Order Until End Of Billing Period Specify Period In Weeks Liquidity Setting Rounding Threshold Creating A Blank Order Creating A Replace Items Sold Order Modifying An Existing Order Remove Preferred Suppliers Adding Items To An Order Adding Unknown Items To An Order Deleting A Product From An Order Printing A Copy Of An Order Print A Supplier Copy Print An Internal Copy Print A Fax Order Transmitting An Order Collecting an Electronic Invoice Editing an Electronic Invoice Order Delivering An Order View Menu Options Edit Menu Options Change Supplier For Order Add New Supplier Reports Menu Options Tools Menu Options DEBTORS Creating A Customer In The LOTS Database Turning A Customer Into A Debtor/Account Holder Linking Family Members Pay Account Journal Entries Options Statements Tab Options Rollover Tab Options Overdue Tab Perform Rollover Printing Statements View Menu Options Tools Menu Options STOCKTAKE Rolling Stocktake Electronic Stocktake Special Stocktake Scanning Stocktake PharmaScan REPORTS Exporting Reports Month History Report 224 Corum Health Services LOTS POS User Manual 5 of 292 6 10.3 Stock List & Value Report Automatic Monthly Report Overstocked/Dead Items Top/Worst Items Department Sales Report Unusual Stock Cards Item Sales Report Stock Adjustment Report Staff/Time Analysis Bank Reconciliation Report Multi-Buy Report Business Activity Report View Audit Trail Search Audit Trail CLUBS Before Creating A Club Gifts To Be Issued Recording Gifts Issued Create A Loyalty Club Triggers Suppliers Sub-Department Stock Items Scripts Adding Members To Your Club Adding Members On-The-Fly Loyalty Club With Free Gift Trigger Loyalty Club With A Voucher Loyalty Club With A Discount Loyalty Club To Track Purchases Only Loyalty Club Reporting Members Of A Club Member History Club Analysis Best Customer Club Gifts USING THE LOTS VOUCHER FUNCTION Setting Up Receipt Voucher Printing Vouchers BACKUP LOTS LOTS PROGRAM UPDATES Installing LOTS Program Update On Slaves View Installation History 292 Corum Health Services LOTS POS User Manual 6 of 292 7 1 OPTIONS 1.1 POS Options The tab POS Options allows you to define the main POS options (see Figure 1). Figure 1 Option Activate GST Reduce List Cost from Turnover Orders Reason Prompt for SOH adjustments Identify Credit Card Type Integrated EFTPOS Description As GST is legally required, this option is always ticked and cannot be changed. When unticked, this option ensures that the list cost value will never be decreased when an electronic invoice is received. This option only relates to turnover orders as supplier price files will still update list cost where necessary. Note: Some suppliers send back real cost in the list cost fields, so this option was implemented to ignore this. If this option is ticked, when you adjust SOH a reason prompt will appear asking you to specify why the SOH is being changed. This is also important as it can be reported on via the Stock Adjustment Report. If this option is ticked a prompt will appear when a customer purchases items using a credit card asking you to specify the credit card type (Visa, MasterCard etc). This needs to be ticked when using Integrated EFTPOS. Use the drop-down list to select the type of Integrated EFTPOS unit you use. For further information on this option please call you local state office on Corum Health Services LOTS POS User Manual 7 of 292 8 Option EFT Unit on this Till Open Cash Drawer after EFTPOS/CC transactions Automatically start a New Sale after each Finished Sale Disallow creation of new stock cards Description This option is only active if Integrated EFTPOS is ticked. If there is an EFTPOS unit on this till ensure you tick this option and select the appropriate type. If you wish the till to open after an EFTPOS or credit card transaction then tick this option. It is especially useful if you allow customers to request cash out. Tick this option to remain in the New Sales screen after a sale has been finalised. If you would like to return to the initial Sales screen after each finalised sale then do not tick this option. If this option is ticked then new stock cards will not be allowed to be created. This option is often ticked for sites connected to a Head Office. Corum Health Services LOTS POS User Manual 8 of 292 9 1.2 Pricing The tab Pricing will allow you to define all of the POS pricing options (see Figure 2). Figure 2 Option Rounding (POS) Rounding (Dispense) Prices on Goods/Shelf Labels Description This section allows you to set the rounding rules for all of your POS transactions: Up, Down or Nearest (5 cents). Note: The ACCC strongly recommends that POS and Dispense rounding is set to Nearest. This section allows you to set the rounding rules for all of your scripts: None, Up, Down or Nearest. Note: The ACCC strongly recommends that POS and Dispense rounding is set to Nearest. This option allows you to specify how/or if you would like discount prices to appear on your goods/shelf label. Single Price This will just print the single price of product on the label. Retail / Recommended Retail This is a double label, the first half of the label will display the price your pharmacy is selling the product for, while the second half of the label will display the Recommended Retail Price. Retail / Stock card Discount Price This is a double label, the first half of the label will display the retail price, while the second half of the label will display your pharmacy s discounted Stock Card Price (see section Pricing Tab) Retail / Club Member Price This is a double label, the first half of the label will display the retail price, while the second half of the label will display your pharmacy s discounted Club Member Price. You must specify which club the discount applies Corum Health Services LOTS POS User Manual 9 of 292 10 Option Label Type Description to in the Club for member price field. Use the drop-down box to specify your label type. Default setting is: Thermal Roll (31mm x 25mm - 3a x 1d). Corum Health Services LOTS POS User Manual 10 of 292 11 1.3 Discounts For Sales The Discounts for Sales section allows you to define all POS discounts (see Figure 3). Figure 3 Option Discounts for Sales Apply Stock Card Discounts Script Discounting at POS Description Standard Discount (F4) This option allows you to set your own standard discount amount for the F4 Function keyboard key when making a sale. The default is 10%. Special Discount (F5) This option allows you to set your own special discount amount for the F5 Function keyboard key when making a sale. The default is 20%. This option allows you to specify if you would like discounts to apply To All Sales, To Member Sales Only or To No Sales. If Discount NHS Scripts is ticked it will allow you to apply a discount to NHS items when making a sale. If Discount Private Scripts is ticked it will allow you to apply a discount to Private items when making a sale. Corum Health Services LOTS POS User Manual 11 of 292 12 1.4 Member Options The section Member Options allows you to define all member settings at POS (see Figure 4). Figure 4 Option Ask if Member at Beginning of Every Sale Identify Member (ask for ID) Display Member Confirmation Window Description If this option is ticked every time you start a sale, a message will prompt asking you if this customer is a club member. This option can only be ticked (or unticked) if Ask if Member at beginning of Every Sale is ticked, otherwise it is greyed-out. If this option is ticked and you select yes to the prompt asking if the customer is a member then you will be required to enter in the customer name. If this option is ticked then when the customer is selected the customers details (full name, address & message) will appear so you can confirm the customer details are correct. Corum Health Services LOTS POS User Manual 12 of 292 13 1.5 POS Receipts The section POS Receipts allows you to define all the receipt and voucher options (see Figure 5). Figure 5 Option Message On Receipts Enable Receipt Voucher Minimum Sale Value (Trigger Amount) Allow Scripts (Private Scripts Only) Receipt Voucher Message Description This is the message that will appear on the bottom of all POS (Till) receipts. If you wish to apply a voucher or special offer to appear on the bottom of your POS receipts tick this option (see section 12.1 to setup this feature.) This field will allow you to set an amount that the customer must spend in one transaction before the voucher/special offer will be printed on the receipt. If you wish to allow private scripts to be included in the Trigger Amount, tick this option. This is a message that will appear on all receipts that are eligible for the voucher/special offer. It is advised that you specify the pharmacy name, voucher amount/special offer and expiry date (if necessary) on the receipt. Press Alt+Enter to begin a new line. Corum Health Services LOTS POS User Manual 13 of 292 14 1.6 Customer Pole Display The tab Customer Pole Display allows you to enable your customer pole display and set your customer pole display till message (see Figure 6). Figure 6 Option Enable Customer Pole Display No Scroll Left Scroll Right Scroll Oscillate Description To activate your customer pole display you must tick this option. Use the text box to enter in the customer pole display message you wish to be shown. If you do not wish for the customer pole display message to scroll select this option. If you wish for the customer pole display message to scroll to the left select this option. If you wish for the customer pole display message to scroll to the right select this option. If you wish for the customer pole display message to oscillate from left to right select this option. Corum Health Services LOTS POS User Manual 14 of 292 15 1.7 Customer Display The section Customer Display allows you to set your customer display screen (see Figure 7). To make use of the customer display you will require a second monitor. When a sale is taking place this second monitor will display the name and price of the item the customer is purchasing. When no sales are being processed the customer display screen idles and switches between the loaded images every so many seconds as defined in the Show images for <#> seconds each field. Figure 7 Option Idle Images (full screen) New Sale Images (half screen) Add Remove Move Up Description This tab allows you to set the full screen images you want to be displayed when the screen is in idle (not being used). The ratio for idle images is 4:3 (e.g. 800 x 600 pixels). This tab allows you to set the half screen images you want to be displayed. The ratio for idle images is 8:2.35 (e.g. 800 x 235 pixels). This will display the Open window allowing you to add an image to the tab selected. This option will allow you to Remove an image from the tab selected. The images are displayed in order from top to bottom, for example in Figure 7 idle-1.jpg will be shown first, then idle-2.jpg and lastly idle- 3.jpg. Use this option to change the order of the images by moving an image up the list. Corum Health Services LOTS POS User Manual 15 of 292 16 Option Move Down Show images for <#> seconds each Description The images are displayed in order from top to bottom, for example in Figure 7 idle-1.jpg will be shown first, then idle-2.jpg and lastly idle- 3.jpg. Use this option to change the order of the images by moving an image down the list. This field will allow you to select the number of seconds you want to display each image for, before changing to the next image. Corum Health Services LOTS POS User Manual 16 of 292 17 1.8 Lay-By The Lay-By section allows you to set up all your Lay-By Options (see Figure 8). Figure 8 Option Enable Lay-Bys Print Lay-By stock dockets Default Lay-By period Minimum deposit Round payments up to nearest Minimum payment Payment frequency When cancelling Lay-By or removing item from Lay-By Message on Lay- By statement Description Tick this option to turn on the Lay-Bys module. If ticked this will automatically print a lay-by receipt that can be attached to item set aside for lay-by. The receipt will detail how much the item is being sold, how much has been paid and the outstanding amount. Set the default number of months for the Lay-By payment period. You can override this option when performing a Lay-By. This field allows you to set a minimum deposit that must be paid for a Lay-By. Set the value you want payments rounded up to. Set the minimum payment amount. This will affect current Lay-Bys as well as future Lay-Bys. Set the payment frequency to either Weekly, Fortnightly or Monthly. If a customer requests to cancel or remove an item from a Lay-By you can either refund the customer the money or you can set the customer up with an account (if they do not already have one) and then credit the account with the value of the Lay-By. This field allows you to type a message that will appear on the lay-by statement. The default message is shown in Figure 8. Corum Health Services LOTS POS User Manual 17 of 292 18 1.9 Till Reconciliation The section Till Reconciliation allows you to set up all your Till Reconciliation and Cash Lift Options (see Figure 9). For more information refer to section 2.15 Till Reconciliation & Cash Lift. Figure 9 Option Enable Cash Lifts & Till Reconciliation Manual EFT Cheques Default Float Allow Drawer Swap Allow Cash Lift Allow Count Later Require second operator sign off Description To turn on the Cash Lift and Till Reconciliation functionality tick this option. Tick this box if you wish to include a field so you can enter in a value for Manual EFT when performing a Till Reconciliation. Tick this box if you wish to include Cheques when performing a Till Reconciliation. Use the Default Float field to enter in your float amount (specific for each till). A draw swap it when you remove the current cash draw from the register and replace it with another cash draw. Tick this option if you allow drawer swaps to be performed. Tick this option if you want to allow physical cash lifts to be performed. Tick this option if you do not require the cash to be counted as soon as the cash lift is performed. If you require a second operator to watch and sign off on the cash lifts being performed then tick this option. A second operator will need to enter their User ID and password Corum Health Services LOTS POS User Manual 18 of 292 19 Option Enable Cash Lift Reminder Remind when cash in drawer reaches Remind at this time Description Tick this option if you want to be reminded to perform a cash lift. A cash lift will allow you to set an amount that when reached will prompt you that the cash in the till should be removed. If this option is selected then enter in a dollar amount, that when reached will prompt you to perform a cash lift. If this option is selected then enter in a time. When that time comes a prompt will appear asking you to perform a cash lift. This may be particularly useful for pharmacies that close late but perform their till reconciliation earlier (e.g. 5:00pm). Corum Health Services LOTS POS User Manual 19 of 292 20 1.10 Companion Sales The section Companion Sales allows you to set up a default companion text which will be displayed on your customer display unit(s) at the till (see Figure 10). For more information refer to section 3.8 Set Product-Specific Companion Text. Figure 10 Option Companion Text Description Use this field to enter in the default companion text you wish to use for all companion items. Use the tags [companionitem] For the name of the companion item being recommended [saleitem] For the name of the sale item being sold. These tags will automatically input the name of the companion item/sale item being recommended/sold. The Companion text message only appears on the customer display screen if connected. Corum Health Services LOTS POS User Manual 20 of 292 21 1.11 Institution Accounts The section Institution Accounts allows you to set up institution accounts in LOTS Dispense (see Figure 11). Figure 11 Option Always create an account Prompt to create an account (default) Never create an account Charge scripts automatically Prompt to charge to an account Description Select this option if you want an account to be created automatically as soon as you assign a patient to an institution. Select this option if you want a prompt to appear asking you if you want to create an account for this patient as soon as you assign a patient to an institution or not. Select this option if you do not wish for an account to be created for patients who get assigned to an institution. Tick this option to charge all scripts automatically to patients that have institution accounts. Will only be active if either of the first two options are selected. If either of the first two options are selected then this option will be active, tick this option to prompt before charging scripts to the patients accounts. Corum Health Services LOTS POS User Manual 21 of 292 22 1.12 OzBiz Accounting The tab OzBiz Accounting allows you to set up OzBiz Accounting options (see Figure 12). The integration of OzBiz with LOTS will allow LOTS customers to use MYOB automatically as their accounting system. OzBiz is an automated program that will extract daily sales and invoice data from LOTS and import it into the MYOB accounting software. OzBiz exports two files: Sales The sales file contains all of the sales data based on the End Of Day (and Till Reconciliation). Bills The bills file contains all supplier invoices and turnover invoices processed during the End Of Day period. Figure 12 Option Enable OzBiz Accounting Export Folder Open Folder Prompt to Export to OzBiz after End of Day Till Reconciliation and Close Off Description Ticking this option will turn on OzBiz Accounting. You will also need to contact you local state office to obtain the files required to activate OzBiz Accounting. Use the Browse button to navigate to a networked folder accessible on all computers. This is the location of where the data files are saved to. The Open Folder button will allow you to open the folder of where the OzBiz files are being saved to, this ensures the correct folder is being selected. This option may also be quite useful if troubleshooting. If you want a prompt to appear asking you to export the files to OzBiz after you perform an End of day Till Reconciliation, then tick this option. Otherwise you can export the files when you like by selecting the Export to OzBiz button on the End of Day screen. Corum Health Services LOTS POS User Manual 22 of 292 23 1.13 Diary Alerts The tab Dairy Alerts allows you to turn on the diary module (see Figure 13). Figure 13 Option Enable Diary Alerts Description Ticking this option will activate Diary Alerts. Refer to section: 5.4 Diary Function. Corum Health Services LOTS POS User Manual 23 of 292 24 1.14 User Details The section User Details displays all of your business & registration information (see Figure 14). It is very important to check with Corum Support prior to making any changes to this screen. Any unauthorised changes may cause LOTS to become unregistered and stop working. Figure 14 Corum Health Services LOTS POS User Manual 24 of 292 25 1.15 LOTS Start Menu The tab LOTS Start Menu allows you to change the setting in relation to how the LOTS Start Menu is displayed (see Figure 15). Figure 15 Option Menu logo graphic Image preview Pharmacy details Menu Startup State (for this computer) Description If you wish to add a pharmacy logo to your start page, use the Select button to search for either a jpeg of bitmap file. For the image to fit properly, it must be 44 pixels high at 72 dpi. To remove a logo simply select the Remove button. A preview of the image you have selected will appear in the image preview display The pharmacy details refer to the pharmacy s name & address and where it is to be displayed. If do not which to show your pharmacy details select Do not show details. Note: If you have added a logo it is advisable to align your pharmacy detail to the right so it doesn t clash with your image. Maximised window If selected the window will always appear full screen when you begin LOTS. Normal window If selected the window will appear the same size as it was when you last started LOTS. Last-used window state If selected LOTS will remember the last-state the window was before it was last exited. Corum Health Services LOTS POS User Manual 25 of 292 26 2 Sales LOTS Sales gives authorised access to every day transactions including New Sales, Returns, Price Check, Account payments, Stock Transfers and Lay-Bys. 2.1 New Sale 1. Navigate from the LOTS Start Menu Sales. 2. To Start a new sale select the New Sale button (as shown in Figure 16). 3. The LOTS New Sale screen will be displayed (as shown in Figure 17). 4. At this point you may now key in any OTC items using one of the following methods: Scanning a product (if a barcode exists) is the most efficient method. Typing the products PLU number into the Stock Item field. Typing in part of the product description in the Stock Item field, press the [Enter] key and select the appropriate product from the list presented. Press an appropriate Hot Key if set up (refer to Hot Keys in the Stock Card section). Searching via a wildcard search. Figure 16 Figure The stock item description, quantity (defaults to 1), retail unit price, discount (if applicable), subtotal and GST status will then be displayed (as shown in Figure 18). Figure 18 Note: For finishing a sales refer to section Finishing A Sale. Corum Health Services LOTS POS User Manual 26 of 292 27 2.1.1 Unlisted Item In an instance where a product cannot be located with the LOTS Sales and you need to sell it, then by pressing F2 you can sell the item as an Unlisted Item. This allows you to manually enter in a product and its retail unit price. 1. To sell an unlisted item press F2 when performing a new sale. 2. You will be bale to type anything into the stock item field without the Stock Search window appearing. Also the unlisted item icon will appear to the right of the product you have entered (see Figure 19). Figure The Quantity field will default to 1 and you will need to enter in the retail price, as soon as you tab past the Retail price field you will be prompted with the GST Rate window (see Figure 20). 4. The GST Rate drop-down list will default to 10% but this can be changed to 0%. Figure 20 If you select 10% the GST tick box will be ticked, if you select 0% the GST tick box will not be ticked. Note: Once you complete the sale it is recommended that you navigate to LOTS Stock Cards and add the unlisted item. This way the next time that you need to sell the item you can simply scan it in or select it from the Stock Search window. To add a new stock card refer to section: 3.10 Creating A Stock Card. Corum Health Services LOTS POS User Manual 27 of 292 28 2.1.2 Discounts A discount may only be applied to products that have the Allow Discount checkbox ticked in the products stock card. If this is the case a discount may be applied to all by using the function keys (F4 Standard Discount, F5 Special Discount) or simply by typing in the desired discount in the Disc field (as shown in Figure 21). Note: Discounts will not be applied to prescriptions unless turned on in LOTS Options, refer to section: 1.3 Discounts For Sales. 1. A dollar $ discount may be applied instead of a % discount. Simply type in the $ sign and the amount you wish to discount into the Disc field (as shown in Figure 21). Figure F3 Is a Variable Discount that allows you to enter the desired amount you wish to discount the sale by (see Figure 22). This applies to all discountable items on the sale. 3. F4 & F5 Are Standard Discounts that when pressed within a sale will automatically apply to all items that can be discounted. Figure 22 Note: The F4 & F5 automatic discounts are setup via LOTS Start Menu Tools Options Discounts for Sales (as shown in Figure 23). Figure 23 Corum Health Services LOTS POS User Manual 28 of 292 29 2.1.3 Changes To Quantity, Retail & GST Prior to finishing a sale it is possible to change the Quantity to be sold, Retail price or the GST status if necessary. 1. The simplest method is to use the directional arrow keys ( ) to move the cursor to the field you wish to change and make the desired modification (see Figure 24), then press Enter. Figure 24 Note: If you change the retail price in the middle of a sale, it will only be a temporary price change as the retail price will remain unchanged in the product s stock card. 2. To permanently change the retail price of a stock card in the New Sale screen, select the product, modify the price and then select the Price Change drop down menu Change Price On Stock Card (as shown in Figure 25). The shortcut for this option is Ctrl+P. Figure A confirmation message will display asking you to confirm your permanent price change select Yes to apply the change. This price will be changed on the stock card once the sale is finished. 4. GST is automatically added to all POS products (according to the settings on the stock card), though you can remove the GST by unticking the GST tick box. Note: Australian law clearly states that all PBS scripts cannot be charged GST. Corum Health Services LOTS POS User Manual 29 of 292 30 2.1.4 Finishing A Sale 1. Once all products have been scanned into the sale, the transaction may then be completed simply by pressing the + key located on the right hand side of the keyboard.(as shown in Figure 26) Figure At this point the sale will be transferred into the Cash field. 3. Key the amount of cash tendered into the Cash field or arrow down to the payment method(s) you require (see Figure 27). The five different payment fields are: Cash Enter in the cash amount received. Figure 27 EFTPOS Enter in the EFTPOS payment (for LOTS Integrated EFTPOS/Credit Card refer to section: LOTS Integrated EFTPOS/Credit Card). Cheque Enter in the cheque amount received. C/Card Enter in the Credit Card payment (for LOTS Integrated EFTPOS/Credit Card refer to section: LOTS Integrated EFTPOS/Credit Card). Other Use this field for all other payments (e.g. - bank transfer, voucher etc). Note: You can also process a sale using 2 (or more) methods of payment. Select the first method of payment and type in the amount applying to that field, then; simply use the arrow keys to transfer the rest of the payment to another field. Press the plus (+) key to finalise the Sale. 4. After entering the desired amount in the field press the + key a second time to display the change required. 5. LOTS will open the cash draw and print a sales docket, simultaneously. 6. Select the OK button to continue (as shown in Figure 28). Figure Alternately, if the cash tendered is the exact amount, simply press the F12 key to ring off the sale to cash in one step. Corum Health Services LOTS POS User Manual 30 of 292 31 2.1.5 Finishing A Sale Cash Out 1. To apply Cash Out to an EFTPOS sale, manually add the desired amount onto the sales total. For example if the customer wanted $50 cash out and the sales total was $18.30 simply type in the total of the two - $68.30 (as shown in Figure 29). Figure Press the plus (+) key for the second time to display the Cash Out required. Click the Ok button to continue (see Figure 30). Figure 30 Corum Health Services LOTS POS User Manual 31 of 292 32 2.1.6 LOTS Integrated EFTPOS/Credit Card 1. If you have integrated EFTPOS setup (in LOTS Options) the Sales payment section will look slightly different, as both the EFTPOS and C/Card field will be combined (see Figure 31). 2. Process the payment as usually by entering all the payment tender types into the appropriate fields. Note: As there are many different types of integrated Figure 31 EFTPOS/Credit Card systems that can be used in conjunction with LOTS, for finalising the payment using EFTPOS/Credit Card you will need to follow the instructions as set out by your integrated EFTPOS/Credit Card supplier. Corum Health Services LOTS POS User Manual 32 of 292 33 2.1.7 Function Keys Within Sales To improve the time it takes to perform a sale in LOTS, common sales tasks can be carried out by pressing the appropriate function key. F2 In the instance where a product cannot be located (unlisted Item) within the LOTS program and you need to sell it, then F2 may be used at the Point of Sale. This allows you to manually key in a description for the product within the Stock Item field and the retail unit price. Figure 32 You will also be prompted to select the rate of GST applicable to the item (as shown in Figure 32), this will be either 10% or 0% and can be selected from the drop down menu. Note: The description typed in for the product will be printed on the customer s receipt and will also be shown on the End of Day report. F3 Is a Variable Discount that allows you to enter the desired amount you wish to discount the sale by (see Figure 33). This applies to all discountable items on the sale. F4 & F5 Are Standard Discounts that when pressed within a sale will automatically apply to all items that can be discounted. Note: The F4 & F5 automatic discounts are setup via LOTS Start Menu Tools Options Discounts for Sales (as shown in Figure 34) Figure 33 Figure 34 F6 If you want a sale to be charged to a specific customer s account simply press F6 to initially identify the account customer by name. F7 Can be pressed to place the sale straight on the customers account, rather than pressing the plus (+) key to finish the sale. F8 You can process payments using F8 for Credit Card. F9 You can process payments using F9 for Cheque. F11 You can process payments using F11 for EFTPOS F12 You can process payments using F12 for Cash payments, Corum Health Services LOTS POS User Manual 33 of 292 34 2.2 ScriptLink ScriptLink is a facility whereby you can collect prescriptions that have been dispensed on LOTS Dispense (or other dispensing systems) at the till using LOTS POS. The prescriptions will come in the sales screen. Stock usage an re-ordering is handled transparently in the background, and automatic charging to selected debtors is also available. These options may vary depending on whether you are running LOTS POS only or LOTS Complete. LOTS POS LOTS POS means you are connected to different dispensary software via ScriptLink. Use the asterix (*) to search by surname. LOTS Complete LOTS Complete give you a few more options: o Allows you to scan in the dispensary barcode. o Allows you to search by script number. o Allows you to use the asterix (*) to search by surname. Corum Health Services LOTS POS User Manual 34 of 292 35 2.2.1 ScriptLink LOTS POS How to enter a Script at the till: 1. Navigate from the LOTS Start Menu Sales. 2. To start a new sale, select the New Sale button. 3. At this point you may now key in any script items by pressing the * key to display the Scriptlink window. Once open type in the surname (or part of the surname) of the customer whose script you wish to display (as shown in Figure 35). Figure 35 Note: Entering nothing will display all waiting scripts. 4. Once you have entered in the patient name, select OK. This will display the Search for Person (see Figure 36) window, highlight the patient and select OK. Figure The scripts will display within the New Sale screen (as shown in Figure 37). Figure 37 Corum Health Services LOTS POS User Manual 35 of 292 36 2.2.2 ScriptLink LOTS Complete How to enter a Script at the till: 1. Navigate from the LOTS Start Menu Sales. 2. To start a new sale, select the New Sale button. 3. At this point you may now either: Key in any script items by pressing the * key to display the Scriptlink window (Figure 38). Figure 38 Enter in RX followed by the script number into the stock item field (see Figure 39). Scan the dispensary barcode Note: There is 1 barcode allocated for each batch of scripts per customer. If you wish to sell scripts to multiple customers within 1 sale, you must scan the barcodes for each patient. Figure The scripts will display within the New Sale screen (as shown in Figure 40). Figure 40 Corum Health Services LOTS POS User Manual 36 of 292 37 2.3 Placing A Sale On Hold & Abandon Sales 1. When in the LOTS New Sale screen you can place a sale on hold by selecting the Abandon Sale button (as shown in Figure 41). 2. Alternatively, you can press the [Esc] key located at the top left hand corner of the keyboard. Figure You will be prompted to put the sale on hold, select the Yes button to continue (select No to abandon). Note: When a sale is placed on hold it will be displayed in blue in the LOTS Point of Sale screen. A sale placed on hold is available on all LOTS computers. 4. If you select the No button when this question is displayed, the sale will be Abandoned. Abandoned transactions are displayed in red text in the LOTS Point of Sale screen. Corum Health Services LOTS POS User Manual 37 of 292 38 2.3.1 Retrieving A Sale On Hold To retrieve the sale that is on hold, select (double click) the specific transaction that is listed in the LOTS Point of Sale screen (displayed in blue text - Figure 42) and finish the sale as normal. Figure 42 If a sale is On Hold and you do not wish it to be on hold you must bring the sale up and abandon it (refer to section: 2.3 Placing A Sale On Hold & Abandon Sales). Note: You can quickly identify sales on hold by selecting the View drop-down menu Sales On Hold. Corum Health Services LOTS POS User Manual 38 of 292 39 2.4 Price Checks 1. To check a price of a product, simply select the Price Check option from the LOTS Point of Sale screen (as shown in Figure 43). Note: A price check window can also be accessed by pressing Ctrl+C in any Sales window. Figure Simply scan the barcode of the item (or search by the product s name or PLU) when prompted and select the OK. 3. The items Price, Stock on hand and GST status will be displayed (as shown in Figure 44). 4. Click the OK button to clear the price check when finished. Figure 44 Corum Health Services LOTS POS User Manual 39 of 292 40 2.5 Returns 1. To return an item, select the Return option from the LOTS Point of Sale screen (as shown in Figure 45). 2. This will take you to the Return of stock screen. You will be prompted to enter the transaction date or the receipt invoice number that needs to be entered before you can proceed. Figure Key/Scan in the product(s) into the Stock Item field (as you would for a new sale). 4. The Quantity, Retail and Total values will be negative to display a return of stock and a refund of money (as shown in Figure 46). 5. To finish the return press the Plus (+) key, choose the refund tender type then press Enter to open the cash drawer. Figure 46 Corum Health Services LOTS POS User Manual 40 of 292 41 2.6 Exchanges The LOTS Sales module can also easily handle exchanges 1. To exchange an item in LOTS, simply navigate to the New Sale screen. 2. Enter in the product(s) you wish to return (and if necessary) the product(s) you wish to purchase. 3. For each product they wish to return enter in a negative quantity into the Quantity column (see Figure 47). 4. Tender the sale as normal by pressing the Plus (+) key. 5. LOTS will notify you if the customer owes you money or if they are still in credit. Figure 47 Corum Health Services LOTS POS User Manual 41 of 292 42 2.7 Agency Payment The Agency Payment module is used when you need to tale payments on behalf of a third party (Business/Charity). 1. Select the Agency Payment option from the LOTS Point of Sale screen (as shown in Figure 48). 2. The Agency Payment screen will appear (as shown in Figure 49). Figure Enter the following: Salesperson This is your saff ID. Agency Select the agency (from the drop-down list) to add the payment to. Payment Amount Enter in the payment received, followed by the appropriate tender type. Note: All three above fields are required. 4. To complete the transaction, as with a new sale, press the plus (+) key or alternatively select the OK button. Figure 49 Note: The Agency Payment functionality keeps the money separate from the cash takings section on your End Of Day (EOD) report. There is a separate section in your EOD report where you can easily see your agency payment transactions. If you are using the Agency Payment facility ensure this option is enabled in EOD Options so they are displayed on the EOD report. Corum Health Services LOTS POS User Manual 42 of 292 43 2.7.1 Add An Agency 1. To add an Agency, select the Edit button (as shown in Figure 50). Figure From the Agencies screen, select Add (Figure 51). Figure Enter the name for the new agency (as shown in Figure 52). Figure 52 Corum Health Services LOTS POS User Manual 43 of 292 44 2.7.2 Rename An Agency 1. To rename an Agency, select the Edit button (as shown in Figure 53). Figure From the Agencies screen, highlight the agency you wish to rename and select Rename (Figure 54). Figure Enter the new name for the agency (as shown in Figure 55). Figure 55 Corum Health Services LOTS POS User Manual 44 of 292 45 2.7.3 Merge An Agency 1. To merge an Agency, select the Edit button (as shown in Figure 56). 2. From the Agencies screen, highlight the Agency you wish to merge, then while holding down the Ctrl key click on the agency you wish to retain (as shown in Figure 57). Figure Select Merge. Figure 57 Corum Health Services LOTS POS User Manual 45 of 292 46 2.7.4 Delete An Agency 1. To delete an Agency, select the Edit button (as shown in Figure 58). Figure From the Agencies screen, highlight the agency you wish to delete (Figure 59). 3. Select Delete. Figure 59 Corum Health Services LOTS POS User Manual 46 of 292 47 2.8 Paid Out The Paid Out module is to be used for instances where cash is to be taken out of the cash drawer for minor purchases (e.g. to top up petty cash) 1. To record pay-outs select the Paid Out option from the LOTS Point of Sale screen (as shown in Figure 60) 2. The Paid Out screen will appear (Figure 61), enter the: Salesperson This is your saff ID. Description Enter in a description of what the payment is for Amount Enter in the amount. Figure 60 Note: All three above fields are required. 3. To complete the transaction select the OK button to open cash drawer and print a receipt. Figure 61 Corum Health Services LOTS POS User Manual 47 of 292 48 2.9 Printing Additional Receipts 1. If you wish to reprint a receipt for a previous transaction, select the relevant transaction from the list in the LOTS Point of Sale screen. 2. Once you have selected the transaction (by highlighting it), either select the Print Receipt option (as shown in Figure 62) or press the R key. Figure Alternately you can double-click on a sale from the list of today s sales to see a preview of the docket on the screen without printing. You then have the option to print if desired by clicking the printer icon. Note: You can print out a receipt that was processed on a previous day. To do this navigate to the LOTS Point of Sale screen View drop-down menu Display Other Days Sales keying in the appropriate date (dd/mm/yy) of the sales that you wish to view and selecting the OK button. Corum Health Services LOTS POS User Manual 48 of 292 49 2.10 Account Sales The Account Sales option allows you to add a sale to a customer s account by a single key stroke. 1. To place a sale on a customers account simply enter in the sale items then press F6. Pressing F6 will take the cursor to the Customer field located at the top of the screen (see Figure 63). Enter the account customer s name and press Enter. Figure The Search for Person screen will appear, select the correct customer from the search list (as shown in Figure 64), and press the OK button to continue. Note: If the customer is not listed you can add them by selecting New Person. For more information Figure 64 on how to add a new person refer to section 8.1 Creating A Customer In The LOTS Database. Note: Primary account customers are displayed in dark blue text and linked account customers are displayed in light blue text. 3. To finish the sale and charge it to the customers account, select the plus (+) key. Figure A prompt will appear asking you to confirm if you wish to charge the sale to the account (see Figure 65). 5. If you select Yes, the Customer Account screen will appear. This will prompt you to confirm whether the sale should be charged to the allocated customers account. This will also display the customer s current account balance (as shown in Figure 66). Note: Pressing F7 will bypass the Account sale? screen, taking you directly to the Customer Account window (Figure 66). Figure Select the OK button to complete the sale. If you have the option Additional Receipt On Account Transaction ticked, two receipts will be printed, one for the customer and one for your records. Note: To turn the additional receipt on (or off) navigate to the LOTS Point of Sale screen Options drop-down menu Receipts After Sale Additional Receipt On Account Transaction. Corum Health Services LOTS POS User Manual 49 of 292 50 2.11 Account Payments The Account Payment module allows account customers to make a payment to their account, either partly or in full, 1. Select the Account Payment option on the LOTS Point of Sale screen (as shown in Figure 67). 2. The Account Payments screen will be displayed (as shown in Figure 68). Figure Enter the: Salesperson This is your saff ID. Customer Enter the customer whose account you want to make a payment to. Once the account customer s name has been keyed in, LOTS will display their details such as address and current balance. Payment amount Enter in the amount the customer wishes to pay, then fill in the appropriate tender type(s). Figure 68 Note: All three above fields are required. 3. You will notice that after you have entered in the payment amount the customer new balance will be shown in the Balance after payment field (see Figure 69). 4. To complete the transaction, specify what form of payment (i.e. cash, credit, etc) as you would for a normal sale and then select OK. If you have the option Additional Receipt On Account Transaction ticked, two dockets will print out, one for the customer and one for your records. Note: To turn the additional receipt on navigate to the LOTS Figure Point 69 of Sale screen Options drop-down menu Receipts After Sale Additional Receipt On Account Transaction. Note: To find out how to set up an account for a customer refer to the section: 8 Debtors. Corum Health Services LOTS POS User Manual 50 of 292 51 2.12 Stock Transfers To transfer stock between pharmacies, select the Stock Transfer option (as shown in Figure 70). You must create an account for any customer to whom you wish to perform stock transfers, see section 8 Debtors. Figure 70 Corum Health Services LOTS POS User Manual 51 of 292 52 Stock Transfers Charge Options Initially you have to set up the Charge Options for the account class that you are transferring to. This has to be set up only once. To change the settings, in the Stock Transfer screen select the File drop down menu Charge Options (or press Ctrl+O). Choose the particular Account Class that you wish to setup and select the price to use when charging (see Figure 71): Retail List Cost Real Cost Ave Cost Other options in this tab allow you to: Include RETAIL on Invoice This option will add an extra column to the tax invoice displaying the product s retail price. Exclude from sales figures this will not include the stock transfer sales in your sales figures (i.e. End of Day). However the SOH will be reduced. Stock transfers are itemised separately on the EOD Report. Figure 71 Furthermore you can add a surcharge onto the price of the items being charged using the Surcharge on price field. The Ordering Options tab (see Figure 72) will allow you to include (or exclude) expected sales when calculating available stock. This only applies to shop-to-shop transfers via modem where the transfer is performed automatically. Therefore when you process an order from another store via stock transfer if this option is ticked if will take into account your expected sales for the current month. If your: Stock on Hand = 12 Expected Sales = 8 Request from other store = 10 Then because your expected sales is 8 you will only be able to give the store 4. This is calculated by: Stock on Hand Expected Sales (12-8 = 4). In this case you have set the percentage of your available stock to be supplied as 50%. So 50% of 12 (12 is your available stock) is 6. If Include expected sales when calculating available stock is selected then you would subtract your Expected Sales (in this case 8) from your Stock on Hand (12), which would make your available stock 4. 50% of 4 equals 2. Figure Once you have defined your charge options, identify the name of the account customer (this will need to be set up previously in the Debtors module). LOTS will then display details of their address and current balance (see Figure 73). Corum Health Services LOTS POS User Manual 52 of 292 Point of Sale Setting up Point of Sale User Guide (POS) Point of Sale Setting up Point of Sale User Guide (POS) Page 1 of 11 Table of Contents Setting up Point of Sale for the first time... 4 Point of Sale Activation... 4 Point of Sale Security Settings... POS:201. Essential Managers Guide to Menumate Point of Sale POS:201 Essential Managers Guide to Menumate Point of Sale Contents Setting up staff... 3 Time Clock... 5 Setting up Discounts & Surcharges... 6 The Basics... 6 More Options... 7 Auto Times... 8 Happy Point of Sale Setting up Stock Items User Guide Point of Sale Setting up Stock Items User Guide Page 1 of 28 Table of Contents Stock File... 3 Create Stock Categories... 3 Create a New Stock Item... 4 Add Stock to a New Shop Location... 5 Enter Stock FUNCTIONALITY POINT OF SALE (POS) operational excellence operational excellence Point of Sale Included in Ostendo is a comprehensive Point of Sale system that includes: Multi-Site Point of Sale Locations Raising Retail Orders with Pickup or Delivery options CDC Enterprise Inventory Management System. The Basics CDC Enterprise Inventory Management System The Basics Page 2 of 71 Table of Contents 1 User Manager:... 6 1.1 Create New User:... 7 1.2 User Permissions... 7 1.3 Edit Existing User:... 8 1.4 Register User:... [ PRACTICE MANAGEMENT SYSTEMS PRACTICE MANAGEMENT SYSTEMS P.O. Box 102 Ivanhoe, Victoria, 3079 T: 1300 784 908 F: 1300 784 906 PPMP - Page 1 of 87 Table of Contents TABLE OF CONTENTS... 2 PROGRAM SETUP WIZARD... 3 ACTIVATION Getting Started 7. The Customer Ledger 19 Contents Contents 1 Getting Started 7 Introduction 8 Starting Sage 50 9 Sage 50 Desktop Views 10 Settings 11 Company Preferences 1 Currency & the Euro 15 Customer & Supplier Defaults 16 Finance Rates 18 System Overview. ComputerlinkPOS. Software. The Point of Sale specialists exceeding expectations every time.. System Overview ComputerlinkPOS Software The Point of Sale specialists exceeding expectations every time Point of Sale Specialists Computerlink Pty Ltd Contents About the Company Retail User Training. IT Retail, Inc. 2010. Inventory Training Retail 7 Retail User Training IT Retail, Inc. 2010 Inventory Training Retail 7 RETAIL 7 User Training: Inventory Using RETAIL 7 ITRetail, Inc. RETAIL User Training TABLE OF CONTENTS Inventory MANAGE INVENTORY...... BACK OFFICE DATA ENTRY REVISION 1.2 BACK OFFICE DATA ENTRY REVISION 1.2 Contents Contents... 1 BEACON BACK OFFICE SYSTEM... 3 DATA ENTRY... 3 Overview... 3 Receipt Entry... 4 Overview... 4 Debtor Receipt Entry Screen... 4 Debtor Receipt Synergy POS. Straightforward, easy to use business software for New Zealand retailers Synergy POS Straightforward, easy to use business software for New Zealand retailers Most regular functions available from the simple quick menu screen Increase turnover Have the tools to improve profitability Point of Sale Procedures. Quick Reference Point of Sale Procedures Quick Reference Hard Copy Not Controlled Controlled Copy Available On-line Table of Contents How To Charge to Charge Accounts... 1 Closing an Open Check... 2 Creating a Recipe... Infusion Business Software Update 8.200 Infusion Business Software Update 8.200 Administration The re-index process now has an option to complete all the Integrity checks for Customers, Suppliers, Products and Financials along with a History Creditor Manual User Guide Creditor Manual User Guide Page 1 of 20 Table of Contents Introduction... 3 Set Up Control Files :... 4 Entity Codes... 4 Control Account Bank Account... 5 Create the Model Account... 5 Create the Posting, Juris User Guide Version 2.7 2015 LexisNexis. All rights reserved. Copyright and Trademark LexisNexis, Lexis, and the Knowledge Burst logo are registered trademarks of Reed Elsevier Properties Inc., used WINDOWS INVENTORY General Procedures Guide WINDOWS INVENTORY General Procedures Guide All Rights Reserved by Banyon Data Systems, Inc. 101 W Burnsville Parkway Burnsville, Minnesota 55337 (800) 229-1130 README FIRST Software Installation BOOKNET Getting Started with. Direct Invoicing BOOKNET Getting Started with Direct Invoicing Table of Contents Overview... 3 Setup... 3 Setting up a PC to work as a Direct Invoicing Terminal... 3 Adding a INVNO to the Transaction Processor... 3 Setup NEWSTAR Training Guide. Banking, Consolidations and Tax Systems NEWSTAR Training Guide Banking, Consolidations and Tax Systems Document A11 / A12 / A19-0.1 November 2005 NEWSTAR Training Guide: Banking, Consolidations and Tax Systems 2005 Constellation HomeBuilder User Guide Setup, sales, purchase and support information for your Clear Books account User Guide Setup, sales, purchase and support information for your Clear Books account Digital Edition Contents 4 Chapter 1: Customising your Dashboard 7 Chapter 2: Setting up a Bank Account 12 Chapter Omni Getting Started Manual. switched on accounting Omni Getting Started Manual switched on accounting Omni Getting Started Table of Contents Install & Register... 3 Install and Register... 3 Omni Programs... 3 Users... 4 Creating Companies... 5 Create Chapter 8: BankLink Coding Reports, BankLink Notes Chapter 8: BankLink Coding Reports, BankLink Notes You can use the BankLink Coding Report to list transactions and send them to those clients who can assign the codes themselves. You can also produce a How to do the End of Day Summary: How to do the End of Day This article is a guideline to using the End of Day Wizard. The End of Day Wizard is designed to guide you through the steps needed to balance the Register(s) and verify Tutorial Getting Started Tutorial Welcome This tutorial will introduce you to the main functions of your AccountRight software. You can use this tutorial with the current version of MYOB AccountRight Basics. This Florida Trip Ticket. Quick Start Florida Trip Ticket Quick Start Support Number: 225-744-0807 1. Insert setup CD and the Trip Ticket setup will start automatically, then start program with icon named Trip Ticket on Desktop 2. Fill out Inventek Point of Sale 7.0. Manual. Sigma Software Solutions, Inc. Manual Copyright 2008 by Sigma Software Solutions, Inc. Inventek Point of Sale 7.0 Manual Sigma Software Solutions, Inc. Manual Copyright 2008 by Sigma Software Solutions, Inc. Table of Contents Introduction Thank you for purchasing Inventek Point of Sale. AR Part 1: An Introduction to Accounts Receivable AR Part 1: An Introduction to Accounts Receivable Table of Contents 1. Overview... 3 2. Searching for a Customer... 4 3. Transactions... 6 4. Raising a sales invoice... 7 5. Completing a Transaction... How do I set up the Best Practice Management Module? How do I set up the Best Practice Management Module? This FAQ is intended to answer the common questions about setting up and configuring the Management Module of Best Practice Software. Management When 2.1 Entering Transactions April 2.1 Entering Transactions You are now ready to start entering transactions. These can be divided into a variety of categories, as detailed below: (a) Sales Sales involve all sales that the organisation LetMC.com Software Support. Part 2 Accounts LetMC.com Software Support Part 2 Accounts For use in Training only Not to be removed from Training Room (Tantum eruditi sunt liberi) Page 1 Client Manager Login... 5 Client Finance Login... 6 Client Administrator Copyright 2009. Wolf Track Software No part of this publication may be reproduced in any form, by Photostat, Microfilm, xerography, or any other means, which are now known, or to be invented, or incorporated EasyBooks Professional EasyBooks Professional Introduction EasyBooks Professional is a Multi Client Bookkeeping System that provides separate Cashbook, Customer and Supplier systems for different clients or separate business ProStix Smartstore Training Manual - Accounts Payable. 2014 Sterland Computing ProStix Smartstore Training Manual - Accounts Payable Contents 3 Table of Contents Accounts Payable 4 1 Introduction to... Accounts Payable 4 2 Accounts Payable... Terminology 6 3 PreRequisites... 9 4 Cornerstone Practice Explorer User s Guide IDEXX Cornerstone Practice Management System Cornerstone Practice Explorer User s Guide Powered by SmartLink Technology Proprietary Rights Notice Information in this document is subject to change without Optomate has the ability to import a stock file supplied by Optical Suppliers, where that file has been created in the appropriate format. Stock Control Optomate has a comprehensive stock control system, which includes the ability to print barcode or price labels, and fully track and report on GST Input Credits, on a Cash Reporting basis End User Training Guide End User Training Guide October 2013 2005-2013 ExpenseWire LLC. All rights reserved. 1 expensewire.com Use of this user documentation is subject to the terms and conditions of the applicable End- User EdgeLink Accounting Transfer Utility For Simply Accounting EdgeLink Accounting Transfer Utility For Simply Accounting Copyright Edge Management Systems Inc 403.948.0611 The EdgeLink Accounting Transfer Utility is an optional add-on module available within the LETTERS, LABELS & EMAIL 22 LETTERS, LABELS & EMAIL Now that we have explored the Contacts and Contact Lists sections of the program, you have seen how to enter your contacts and group contacts on lists. You are ready to generate Integrated Accounting System for Mac OS X Integrated Accounting System for Mac OS X Program version: 6.3 110401 2011 HansaWorld Ireland Limited, Dublin, Ireland Preface Standard Accounts is a powerful accounting system for Mac OS X. Text in square OFBIZ POS USER MANUAL OFBIZ POS USER MANUAL Version 9.11 Release Date 2009-11-01 Apache OFBiz () is a trademark of The Apache Software Foundation Page 1/24 OFBIZ POS USER MANUAL Version 9.11 Release Date, Socrates GP Tips and Tools. Tips & Tools 1 Tips & Tools 2 Appointments 1. How do I create a new tab for a specific group on the Appointments screen? Navigate to My Control Panel\Admin Console\Appointments. Click on the Appointment Groups tab Pay.It. Run.It! Retail Software Pay.It! 1 Pay.It Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced Studio Designer 80 Guide Table Of Contents Introduction... 1 Installation... 3 Installation... 3 Getting started... 5 Enter your company information... 5 Enter employees... 6 Enter clients... 7 Enter vendors... 8 Customize Payco, Inc. Evolution and Employee Portal. Payco Services, Inc.., 2013. 1 Home Payco, Inc. Evolution and Employee Portal Payco Services, Inc.., 2013 1 Table of Contents Payco Services, Inc.., 2013 Table of Contents Installing Evolution... 4 Commonly Used Buttons... 5 Employee Information... MODULE 2: SMARTLIST, REPORTS AND INQUIRIES MODULE 2: SMARTLIST, REPORTS AND INQUIRIES Module Overview SmartLists are used to access accounting data. Information, such as customer and vendor records can be accessed from key tables. The SmartList Page 1 Revision 20100921 Page 1 Revision 20100921 Contents Idealpos 6.0 New Features 3 Introduction... 3 Major New Features 4 SQL 2008 Express R2 Transactional Database... 4 Microsoft.NET 4.0 Framework... 4 Dashboard... 5 Dashboard Chapter 2: Clients, charts of accounts, and bank accounts Chapter 2: Clients, charts of accounts, and bank accounts Most operations in BankLink Practice are client specific. These include all work on coding transactions, reporting, and maintaining chart of accounts Rewards. Setting Up, Implementing, & Redeeming Rewards Rewards Setting Up, Implementing, & Redeeming Rewards The Rewards system within STX is a system that allows you to reward your clients for their continued loyalty. By setting up simple rules, you can help WHAT YOU OWN HOME INVENTORY SOFTWARE WHAT YOU OWN HOME INVENTORY Version 4.19 Copyright 2013 M- One Studio, LLC Contents Getting Started... 1 About WHAT YOU OWN HOME INVENTORY SOFTWARE... 1 Download and Install the Software... Supply Chain Finance WinFinance Supply Chain Finance WinFinance Customer User Guide Westpac Banking Corporation 2009 This document is copyright protected. Apart from any fair dealing for the purpose of private study, research criticism Table of Contents. Quick Start Guide Table of Contents Equipment Setup and Break-Down 1-2 Processing a Sale 3 Payment Types 3 Tax Change 3 Scanning Items 4 Price Checks 4 Voids 4 Returns 4 Reprints 4 Gift Certificates 5 IDEXX Cornerstone. Practice Management Software. Cornerstone Reports. Powered by SmartLink Technology Practice Management Software Cornerstone Reports Powered by SmartLink Technology Proprietary Rights Notice 2009 IDEXX Laboratories, Inc. All rights reserved. Information in this document is subject Solar Eclipse Accounts Receivable. Release 8.7.2 Solar Eclipse Accounts Receivable Release 8.7.2 Legal Notices 2011 Epicor Software Corporation. All rights reserved. Unauthorized reproduction is a violation of applicable laws. Epicor and the Epicor logo RentMaster Frequently Asked Questions RentMaster Frequently Asked Questions How do I...? How do I do my end of month procedure as a property manager. At the end of the month a property manager normally pays their landlord clients. Prior to Accounting Startup in Mamut Business Software. Content ACCOUNTING STARTUP IN MAMUT BUSINESS SOFTWARE Accounting Startup in Mamut Business Software Content 1 WELCOME... 4 2 THE TOOLBAR EXPLAINED... 5 3 GETTING STARTED... 6 3.1 Navigating... 6 3.2 Accounting RSW RETAIL SALES SYSTEM Back Office User Guide. Version 3.4 RSW RETAIL SALES SYSTEM Back Office User Guide Version 3.4 TABLE OF CONTENT CONVENTIONS USED IN THIS MANUAL...1 ITEM...2 ENTER/MODIFY ITEM...2 Cost/Prices...5 Stock...6 Price Break...7 Barcode...8 Others...9 OxCORT Oxford Colleges On-line Reports for Tutorials OxCORT Oxford Colleges On-line Reports for Tutorials Tutorial Office Role Version 4.3 BSP Training Team Business Services and Projects Contents Table of Contents 1. Introduction To This manual... 5 Pre-requisites...
http://docplayer.net/10322246-Lots-user-manual-point-of-sale-last-updated-3-may-2010-version-11-0.html
CC-MAIN-2021-17
refinedweb
11,031
61.87
pros and cons using reference-counter VS reference-link Discussion in 'C++' started by Axter, Jan 17, 2006.23 - vhdlcohen - Oct 2, 2004 Pros and cons for using https on a logon page?Randall Parker, Dec 4, 2005, in forum: ASP .Net - Replies: - 2 - Views: - 925 - nimd4 - May 17, 2014 Pros and cons "using namespace"BigMan, Apr 7, 2005, in forum: C++ - Replies: - 6 - Views: - 3,592 - Ravi - Apr 7, 2005 threading and multicores, pros and consMaric Michaud, Feb 14, 2007, in forum: Python - Replies: - 24 - Views: - 1,244 - Paul Boddie - Feb 20, 2007 What deployment setup are production Rails sites using? and pros/consvasudevram, Aug 15, 2006, in forum: Ruby - Replies: - 1 - Views: - 177 - A. S. Bradbury - Aug 15, 2006
http://www.thecodingforums.com/threads/pros-and-cons-using-reference-counter-vs-reference-link.451134/
CC-MAIN-2015-18
refinedweb
121
69.31
I've been recently writing an application that will support many different platforms. Basically, this utility will support different flavors of *nix to win32 platforms. I was wondering if anybody sees any problem using preprocessor directives within source code (not just header files). For example: Are there any issues I need to look out for while implementing this project? Thank you.Are there any issues I need to look out for while implementing this project? Thank you.Code:#include <stdio.h> int main (int argc, char *argv[]) { #ifdef WIN32 ... do something here win32 specific #else ...do something *nix specific #endif return 0; }
http://cboard.cprogramming.com/c-programming/52300-multi-platform-support-issues.html
CC-MAIN-2016-07
refinedweb
102
67.65
Details Description Here's a patch that implements simple support of Lucene's MoreLikeThis class. The MoreLikeThisHelper code is heavily based on (hmm..."lifted from" might be more appropriate Erik Hatcher's example mentioned in To use it, add at least the following parameters to a standard or dismax query: mlt=true mlt.fl=list,of,fields,which,define,similarity See the MoreLikeThisHelper source code for more parameters. Here are two URLs that work with the example config, after loading all documents found in exampledocs in the index (just to show that it seems to work - of course you need a larger corpus to make it interesting): Results are added to the output like this: <response> ... <lst name="moreLikeThis"> <result name="UTF8TEST" numFound="1" start="0" maxScore="1.5293242"> <doc> <float name="score">1.5293242</float> <str name="id">SOLR1000</str> </doc> </result> <result name="SOLR1000" numFound="1" start="0" maxScore="1.5293242"> <doc> <float name="score">1.5293242</float> <str name="id">UTF8TEST</str> </doc> </result> </lst> I haven't tested this extensively yet, will do in the next few days. But comments are welcome of course. Activity - All - Work Log - History - Activity - Transitions I love it when features get implemented by others! Thanks Bertrand! I finally got around to checking this out... looks cool! In your example URL, it looks like mindf=1 is repeated... is that right, or should one of them have been mintf=1? Thanks. it works great. The only problem i ran into is a null pointer if you do not specify the fields to return (by default all of them without the score). just add a not null check to line 102 of MoreLikeThisHelper.java <code> protected boolean usesScoreField(SolrQueryRequest req) { String fl = req.getParams().get(SolrParams.FL); if( fl != null ) { for(String field : splitList.split(fl)) } return false; } </code> Yonik, you're right about the mindf parameter duplication, here's the correct example URL Thanks Ryan for spotting the fl param problem, I'll attach a revised patch which fixes it. Before that, the following request caused an NPE, it works now: The method used to compute includeScore in MoreLikeThisHelper was inconsistent with what the XmlWriter does. I have changed it to take this info from SolrQueryResponse.getReturnFields(). The md5 sum of the current SOLR-69 patch is b6178d11d33f19b296b741a67df00d45 With this change, all the following requests should work (standard and dismax handlers, with no fl param, id only and id + score as return fields): Thanks for writing this! Just a shot in the dark: Would it be possible to use this on fields that are not stored? maybe the client has to supply the content of the field? Reason being I'd rather not store the field as that basically duplicates the data already in my (normal non-lucene) database. Intuitively, without having checked exactly how it's implemented, I think MoreLikeThis queries should work irrelevant of whether fields are stored or not, as it's based on what's indexed. Maybe someone who knows Lucene's internals better than I do can comment. Did you find a case where non-stored fields cause problems? Yep, doesn't seem to work with non-stored fields. (if you only use non stored fields in mlt.fl) I believe the stored field values are used to build the query > MoreLikeThis queries should work irrelevant of whether fields are stored or not, as it's based on what's indexed I haven't looked at the lucene-code for more-like-this, but it's just like highlighting... to get the tokens for a specific document, you need to either get it's stored field and re-analyze or store term vectors and use them. Looking up those terms in other documents is then fast (that's where the inverted index comes in) There's a typo in the latest uploaded patch – - map.put(MIN_DOC_FREQ, String.valueOf(MoreLikeThis.DEFALT_MIN_DOC_FREQ)); + map.put(MIN_DOC_FREQ, String.valueOf(MoreLikeThis.DEFAULT_MIN_DOC_FREQ)); Should this be an integrated part of the standard/dismax handlers, or should it be a separate request handler? I guess the answer would depend on how it's used mos of the time: Case 1) The GUI queries the standard request handler and displays a list of documents with a little "more-like-this" button next to each document. When pressed, the GUI queries the more-like-this handler with the specific document id, and then displays the results to the user. Case 2) The GUI queries the standard request handler to display a list of documents, with a sub-list of similar "mlt" documents automatically displayed under each. Or, those lists could be collapsed by default, but instantly displayed since the GUI already has the info. If case (2) were rare, then perhaps mlt should be a separate handler. Case (2) can still be done, it would just require more requests from the GUI to do it. In either case, will highlighting be desired on any of the mlt docs? Other thoughts? Making this a separate handler would probably make the code easier to understand, but the current code makes case 2) easier, while making case 1) easy as well (just query on the document's unique ID, with MoreLikeThis enabled). I'm for keeping it as is, integrated in the handlers as an option. If someone needs it as a separate handler, it wouldn't be hard to factor our the common parts. I have no strong feelings, however, as I built this patch to experiment with this feature but I'm not using it yet. In Collex, we do more-like-this on a single object not within search results. A separate handler would be sufficient for our current needs and avoid the other handlers from becoming overloaded with options. Highlighting is not needed on MLT documents in our case. See Ken Krugler's comments about term vectors at Is there a way to get this patch to listen to start & rows on the moreLikeThis result section? > Is there a way to get this patch to listen to start & rows on the moreLikeThis result section? IIUC you want to use the start & rows request parameters to limit the number of results in the moreLikeThis section? This is not implemented currently, and if we did it we'd have to use different parameter names (mlt.start and mlt.rows maybe) so that they don't interfere with the "main" part of the result set. Yes, paging and size would be helpful in the MLT section. mlt.start and mlt.rows would be great. trivial changes so it applies to trunk without conflicts... Changed the MoreLikeThis implementation to be a standalone request handler rather then tacked on to standard/dismax request handlers How are other people using this patch? I found that i am always looking for things that are similar to a single document. This is still in progress, but posting for feedback. An example command would be: I've personally never understood the "more documents that don't match this query but are like the documents in this query" usage of SOLR-69. MLT results (to me) should be like any other result, except by querying by text you are querying by document ID. I'm confused as to how querying by query would work – if a query for 'apache' returned 10 docs, would MLT work on each one and generate n more docs per doc? And would the original query results get returned? What's the ordering? But I do know that paging and faceting should definitely work on MLT results. (Ryan's patch seems to implement this but I haven't tested it.) MLT results should look and operate like any other results. Ryan & Brian's comments above are (I think) indicative of how most people want to use MLT - you've got a single document, and you want to show other documents that are similar. The way we deal with this is to do a query on the <uniqueKey> field (as defined in the schema). If this was the only use case, then the syntax could be something like: The uid parameter would implicitly be applied against the <uniqueKey> field as specified in the schema. But that's just for my use case - others may want the ability to have mlt results returned for the first hit result of an arbitrary query. looking back at the two main use cases Yonik described in his comment from 06/Feb/07... At the most basic level, A request for MLT results for a single doc by uniqueKey (case#1) is just a simplistic example of asking for MLT results for an arbitrary query (case#2) ... that arbitrary query just happens to be on a uniqueKey field, and only returns one result. Where things get more complicated is when you start returning other "tier 2" type information about the request – which begs the question "what is tier 1 data"? If the MLT results are added as "tier 2" data to StandardRequestHandler response, then all of the other "tier 2" data blocks (highlighting, faceting, debugQuery score explanation, etc..) still refer to the main result from the original query ... this may be what you want in use case #2, but doesn't really make sense for use case #1, where the "tier 1" main result only contains the single document you asked for by id ... the score explanation and facet count numbers aren't very interesting in that case. for case #1, what you really want is for the MLT data to be treated as the primary ("tier 1") result set, and all of hte "tier 2" data is about those results ... highlighting is done on the MLT docs, facet counts are for the MLT docs, debugQuery score explanation tells you why the MLT docs are like your original docs, etc.. Case #1 and case #2 are both useful, to address Brian's 02/May/07 comment.. > I've personally never understood the "more documents > that don't match this query but are like the documents > in this query" ... I'm confused as to how querying by > query would work – if a query for 'apache' returned 10 > docs, would MLT work on each one and generate n more > docs per doc? And would the original query results get > returned? What's the ordering? in your example, yes ... the users main search on "apache" would return 10 results sorted by whatever sort they specified. for each of those 10 results, N similar results might me listed to the side (in a smaller font, or as a pop up widget) sorted most likely by how similar they are. even if you don't want to surface those similar docs right there on the main result page, you still need to execute the MLT logic as part of hte initial request to know if there there are any similar docs (so you can surface the link/button for displaying them to the user. I would even argue there is actually a third use case ... – Case 3) The GUI queries the standard request handler to display a list of documents, with a single subsequent list of similar "mlt" documents that have things in common with all of the docs in the current page of results displayed elsewhere on the page. – ...where case #2 is about having separate MLT lists for each of hte matching reuslts, this case is about having a single "if you are interested in all of these items, you might also be interested in these other items" list. case#1 and case#3 can both easily be satisfied with a single "MoreLikeThisHandler" which takes as it's input a generic query (ie: "q=id:12345" for case#1, and "q=apache" for case#3) and then generates a single "tier 1" result block of MLT results that relate to all of the docs matching that query (simpel case of 1 doc for case#1) ... all other "tier 2" data would be in regards to this main MLT result set. case#2 would still easily be handled by having some new "tier 2" MLT data added to the StandardRequestHandler. Refactored the MoreLikeThisRequestHandler so that it can support case #1, #2, #3 - added faceting to the MoreLikeThisHandler - made it possible to remove the original match from the response. This makes the response look the same as ones that come from /select - Added documentation to: Ryan, it seems the handler doesn't listen to the fl parameter either in the result section or the morelikethis section. It always returns everything. Oof ryan, my apologies, I was running an older version of this patch. fl is listened to. This is an excellent job, btw, I love that you can hide the original response. R, one useful feature would be mlt.fq=query, where query is a filter query, like type:book. Or since we're moving to a solo handler for mlt, just supporting fq would be good. like /mlt?q=id:BOOK01&mlt.fl=contents&fq=type:BOOK (Because in a single solr instance you've got information about books & authors, and you only want the mlt results to be books.) The mlt.exclude is similar to what I'm looking for but an mlt.fq is generally more useful. Also, mlt.exclude does not seem to support more than a single term query, e.g. mlt.exclude=+type:AUTHOR +type:PUBLISHER still lets type:PUBLISHER through. Also (sorry to keep commenting on this!) asking for fl=score doesn't work, I get this: java.lang.NullPointerException at org.apache.solr.search.DocSlice$1.score(DocSlice.java:117) at org.apache.solr.request.XMLWriter.writeDocList(XMLWriter.java:369) at org.apache.solr.request.XMLWriter.writeVal(XMLWriter.java:408) at org.apache.solr.request.XMLWriter.writeResponse(XMLWriter.java:126) at org.apache.solr.request.XMLResponseWriter.write(XMLResponseWriter.java:35) at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:169):619) if I do a query like /mlt?q=id:100&mlt.fl=content&fl=content,score If I take out the score from the fl it doesn't NPE. Updating with a bunch of minor changes... 1. Got rid of the "exclude" parameter and it is now using standard fq filters 2. If only one field is specified, it uses the fields analizyer as Ken suggested in: 3. set termVectors="true" for 'cat' in the example solrconfig.xml and added a comment describing 'termVectors' 4. Added standard debug info 5. Fixed 'score' issue – it was squaking because the original match did not have a score field... A really nice feature would be to allow for boosting for fields, for example: ?q=id:1&mlt=true&mlt.fl=title^5,author^3,topic This would find items that are more similar to the title over the author, etc. Updated patch to: - use searcher.getSchema().getAnalyzer() - be able to find similar documents from posted text - be able to return the "interesting terms" used for the MLT query Andrew: about field boosting... This handler uses the lucene contrib MoreLikeThis implementation – that does not have a way to boost one field above another, If it did, we could easily add it added param: mlt.boost that calls mlt.setBoost() to boost the interesting terms (or not) this field is required if you want a real number returned with mlt.interestingTerms=details MoreLikeThis class comes from the lucene-queries jar, I enclose the version used for my tests
https://issues.apache.org/jira/browse/SOLR-69?focusedCommentId=12497069&page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel
CC-MAIN-2015-35
refinedweb
2,581
62.98
A net device that switches multiple LAN segments via an OpenFlow-compatible flow table. More... #include "openflow-switch-net-device.h" A net device that switches multiple LAN segments via an OpenFlow-compatible flow table. The OpenFlowSwitchNetDevice object aggregates multiple netdevices as ports and acts like a switch. It implements OpenFlow-compatibility, according to the OpenFlow Switch Specification v0.8.9 <>. It implements a flow table that all received packets are run through. It implements a connection to a controller via a subclass of the Controller class, which can send messages to manipulate the flow table, thereby manipulating how the OpenFlow switch behaves. There are two controllers available in the original package. DropController builds a flow for each received packet to drop all packets it matches (this demonstrates the flow table's basic implementation), and the LearningController implements a "learning switch" algorithm (see 802.1D), where incoming unicast frames from one port may occasionally be forwarded throughout all other ports, but usually they are forwarded only to a single correct output port. A net device that switches multiple LAN segments via an OpenFlow-compatible flow table Definition at line 86 of file openflow-switch-net-device.h. Definition at line 497 of file openflow-switch-net-device.h. Definition at line 500 of file openflow-switch-net-device.h. Add a flow. Add a callback invoked whenever the link status changes to UP. This callback is typically used by the IP/ARP layer to flush the ARP cache and by IPv6 stack to flush NDISC cache whenever the link goes up. Implements ns3::NetDevice. Add a 'port' to a switch device. This method adds a new switch port to a OpenFlowSwitchNetDevice, so that the new switch port NetDevice becomes part of the switch and L2 frames start being forwarded to/from this NetDevice. Add a virtual port to a switch device. The Ericsson OFSID has the concept of virtual ports and virtual port tables. These are implemented in the OpenFlowSwitchNetDevice, but don't have an understood use [perhaps it may have to do with MPLS integration].. Fill out a description of the switch port. Called by RunThroughFlowTable on a scheduled delay to account for the flow table lookup overhead. The registered controller calls this method when sending a message to the switch. Implements ns3::NetDevice. Calling this method is invalid if IsBroadcast returns not true. Implements ns3::NetDevice. Implements ns3::NetDevice. Implements ns3::NetDevice. This value is typically used by the IP layer to perform IP fragmentation when needed. Implements ns3::NetDevice. Make and return a MAC multicast address using the provided multicast group. RFC 1112 says that an Ipv4 host group address is mapped to an Ethernet multicast address by placing the low-order 23-bits of the IP address into the low-order 23 bits of the Ethernet multicast address 01-00-5E-00-00-00 (hex). Similar RFCs exist for Ipv6 and Eui64 mappings. This method performs the multicast address creation function appropriate to the underlying MAC address of the device. This MAC address is encapsulated in an abstract Address to avoid dependencies on the exact MAC address format. In the case of net devices that do not support multicast, clients are expected to test NetDevice::IsMulticast and avoid attempting to map multicast packets. Subclasses of NetDevice that do support multicasting are expected to override this method and provide an implementation appropriate to the particular device. Implements ns3::NetDevice. Get the MAC multicast address corresponding to the IPv6 address provided. Implements ns3::NetDevice. When a subclass needs to get access to the underlying node base class to print the nodeid for example, it can invoke this method. Implements ns3::NetDevice. Return true if the net device is acting as a bridge. Implements ns3::NetDevice. Implements ns3::NetDevice. Implements ns3::NetDevice. Implements ns3::NetDevice. Return true if the net device is on a point-to-point link. Implements ns3::NetDevice. Generates an OpenFlow reply message based on the type. Modify a flow. Called by higher-layers to check if this NetDevice requires ARP to be used. Implements ns3::NetDevice. Send packets out all the ports except the originating one. Seeks to send out a Packet over the provided output port. This is called generically when we may or may not know the specific port we're outputting on. There are many pre-set types of port options besides a Port that's hooked to our OpenFlowSwitchNetDevice. For example, it could be outputting as a flood, or seeking to output to the controller. Called when a packet is received on one of the switch's ports. Run the packet through the flow table. Looks up in the flow table for a match. If it doesn't match, it forwards the packet to the registered controller, if the flag is set. Run the packet through the vport table. As with AddVPort, this doesn't have an understood use yet. Called from higher layer to send packet into Network Device to the specified destination Address Implements ns3::NetDevice. If an error message happened during the controller's request, send it to the controller. Send a reply about this OpenFlow switch's features to the controller. List of capabilities and actions to support are found in the specification <>. Supported capabilities and actions are defined in the openflow interface. To recap, flow status, flow table status, port status, virtual port table status can all be requested. It can also transmit over multiple physical interfaces. It supports every action: outputting over a port, and all of the flow table manipulation actions: setting the 802.1q VLAN ID, the 802.1q priority, stripping the 802.1 header, setting the Ethernet source address and destination, setting the IP source address and destination, setting the TCP/UDP source address and destination, and setting the MPLS label and EXP bits. Send a reply to the controller that a specific flow has expired. Called from higher layer to send packet into Network Device with the specified source and destination Addresses. Implements ns3::NetDevice. Send a message to the controller. This method is the key to communicating with the controller, it does the actual sending. The other Send methods call this one when they are ready to send a message. Send a reply about a Port's status to the controller. Send a reply about this OpenFlow switch's virtual port table features to the controller. Set the address of this interface. Implements ns3::NetDevice. Set up the Switch's controller connection. Implements ns3::NetDevice. Override for default MTU defined on a per-type basis. Implements ns3::NetDevice. This method is called from ns3::Node::AddDevice. Implements ns3::NetDevice. Enables netdevice promiscuous mode and sets the callback that will handle promiscuous mode packets. Note, promiscuous mode packets means all packets, including those packets that can be sensed by the netdevice but which are intended to be received by other hosts. Implements ns3::NetDevice. Set the callback to be used to notify higher layers when a packet has been received. Implements ns3::NetDevice. Stats callback is done. Controllers have a callback system for status requests which calls this function. Stats callback is ready for a dump. Controllers have a callback system for status requests which calls this function. Implements ns3::NetDevice. Update the port status field of the switch port. A non-zero return value indicates some field has changed. Definition at line 491 of file openflow-switch-net-device.h. Flow Table; forwarding rules. Definition at line 512 of file openflow-switch-net-device.h. Collection of port channels into the Switch Channel. Definition at line 493 of file openflow-switch-net-device.h. Connection to controller. Definition at line 503 of file openflow-switch-net-device.h. Flags; configurable by the controller. Definition at line 509 of file openflow-switch-net-device.h. Unique identifier for this switch, needed for OpenFlow. Definition at line 505 of file openflow-switch-net-device.h. Interface Index. Definition at line 494 of file openflow-switch-net-device.h. Last time the periodic execution occurred. Definition at line 508 of file openflow-switch-net-device.h. Flow Table Lookup Delay [overhead]. Definition at line 506 of file openflow-switch-net-device.h. Flow Table Miss Send Length; configurable by the controller. Definition at line 510 of file openflow-switch-net-device.h. Maximum Transmission Unit. Definition at line 495 of file openflow-switch-net-device.h. Node this device is installed on. Definition at line 492 of file openflow-switch-net-device.h. Definition at line 498 of file openflow-switch-net-device.h. Switch's ports. Definition at line 501 of file openflow-switch-net-device.h. Definition at line 489 of file openflow-switch-net-device.h. Callbacks. Definition at line 488 of file openflow-switch-net-device.h. Virtual Port Table. Definition at line 513 of file openflow-switch-net-device.h.
https://www.nsnam.org/doxygen/classns3_1_1_open_flow_switch_net_device.html
CC-MAIN-2021-39
refinedweb
1,482
50.63
View Complete Post I get this error when i Debug my web application.... I followed these steps., I also rebooted my system but no use.... Plz help ! am using SMO within c#.NET to build a SMO transfer object and then execute it to transfer data between various SQL instances...Think Import/Export wizard with some error handling ;) using Microsoft.SqlServer.Management.Smo; using Microsoft.SqlServer.Management.Common; If i run in debug mode the application runs fine. As soon as I publish and run it on the same machine, same user I get the following error as soon as the transfer is attempted. Having watched the package it's ouput in DEBUG mode I can see it creating temporary xml files (TransferMetadata491574513.xml) with the various SQL scripts and a temporary DTSX file in "C:\Documents and Settings\MYUSER\Local Settings\Application Data\Microsoft\SQL Server\Smo" , these do not get created using the published version. If i run the exe in the DEBUG or RELEASE folder it also works fine. The only issue is when i Publish the application. Any suggestions? I have checked the two MSDN articles and http: am trying to retrieve the MetaData from the WCF Service using the following method. How do I increase the buffer size? We have several SSIS packages that have been running fine.ÃÂ The last time they changed were on 01/30/2009.ÃÂ We're using package configurations pointing to a SQL server table (sql 2005).ÃÂ The packages run from one clustered computer, which has a default instance of sql server enterprice on 64-bit machine, the connection is to another clustered box, which has a named instance of sql server.ÃÂ All of a sudden we started getting "Error loading dtsx: The connection is not found. This error is thrown by Connections collection when the specific connection element is not found." The server team swears nothing has changed.ÃÂ I'm at a loss.ÃÂ When I open the package on the server in BIDS, still get same error.ÃÂ I keep having to re-add the connection and save.ÃÂ If I re-open it gives the same errors all over again.ÃÂ All our SSIS packages are stored on the file system, protection-level is "don't save sensitive".Table entry for this connection is:ÃÂ ConfiguredValue = "Data Source=HQESQL4\HQESQL4;Initial Catalog=ETL temp rep;Provider=SQLNCLI.1;Integrated Security=SSPI;Auto Translate=False;", PackagePath = "\Package.Connections[ETL temp rep 4 Database].Properties[ConnectionString]"U I have an SSIS job which watches a directory for new files being submitted. On detecting a file(s) it determines the process to perform on it (based on the file name) and then reads in the file, loads it into the database, and deletes the file. All is fine. I want to add error handling though, specifically for the instance where the worksheet name does not correspond to that defined in the Excel Connection manager for this file. At the moment if I change the sheet name to be different to that defined in the connection manager, the job fails and so (in turn) the whole process ceases (i.e. the for loop also goes to status failed). I have tried event handler variables and checkpoints but without success. Could someone give me some advise, or point me to a article that would help? Thanks Hall of Fame Twitter Terms of Service Privacy Policy Contact Us Archives Tell A Friend
http://www.dotnetspark.com/links/11948-error-loading-metadata.aspx
CC-MAIN-2017-43
refinedweb
583
66.23
> And if it detects the speed of a car that is reversing towards the back of the speed radar?No, > And can speed radar detect the speed of the car that is in reverse-mode coming from y-direction going x-direction?yesbut as the answers above will probably trigger more questions, please study the theory how Doppler radar works here - #include <FreqMeasure.h> int count=0; double sum=0; void setup() { Serial.begin(9600); FreqMeasure.begin(); Serial.println("Frequency Read Begin");}void loop() { if (FreqMeasure.available()) { sum = sum + FreqMeasure.read(); count = count + 1; if (count > 30) { // average 30 readings together float frequency = FreqMeasure.countToFrequency(sum / count); float speedValue = frequency / 19.49; // from the formula Fd = 2V(ftarget/c)cosTheta // where V(km/h) = Fd/19.49 and V(mi/h) = Fd/31.36 if (speedValue < 1.00) { Serial.print(frequency); Serial.print(" Hz "); speedValue = 0.00; Serial.print(speedValue); Serial.print(" kph "); } else { Serial.print(frequency); Serial.print(" Hz "); Serial.print(speedValue); Serial.print(" kph "); } } sum = 0; count = 0; }} do you have a link to the datasheet of the GH-100 Microwave Doppler Sensor ? Please enter a valid email to subscribe We need to confirm your email address. To complete the subscription, please click the link in the Thank you for subscribing! Arduino via Egeo 16 Torino, 10131 Italy
http://forum.arduino.cc/index.php?topic=144102.0;prev_next=next
CC-MAIN-2016-26
refinedweb
220
53.17
Designing C# Creating an object interface Exposing object attributes as properties Exposing methods Instantiating objects from classes Binding an object reference to a variable Understanding object lifetime Releasing object references NOTE There is simply no way to become an expert on programming classes in a single hour. However, when you've finished with this hour, you'll have a working knowledge of creating classes and deriving custom objects from those classes; consider this hour a primer on object-oriented programming. I strongly encourage you to seek other texts that focus on object-oriented programming after you feel comfortable with the material presented throughout this book. Understanding Classes Classes enable you to develop applications using object-oriented programming (OOP) techniques (recall that I discussed OOP briefly in Hour 3). Classes are templates that define objects. Although you may not have known it, you have been programming with classes throughout this book. When you create a new form in a C# project, you are actually creating a class that defines a form; forms instantiated at runtime are derived from the class. Using objects derived from predefined classes, such as a C# Form class, is just the start of enjoying the benefits of object-oriented programmingto truly realize the benefits of OOP, you must create your own classes. The philosophy of programming with classes is considerably different from that of "traditional" programming. Proper class-programming techniques can make your programs better, both in structure and in reliability. Class programming forces you to consider the logistics of your code and data more thoroughly, causing you to create more reusable and extensible object-based code. Encapsulating Data and Code Using Classes An object derived from a class is an encapsulation of data and code; that is, the object comprises its code and all the data it uses. For example, suppose that you need to keep track of employees in an organization and that you need to store many of pieces of information for each employee, such as Name, Date Hired, and Title. In addition, suppose you need methods for adding and removing employees, and you want all this information and functionality available to many functions within your application. You could use static methods to manipulate the data. However, this would most likely require many variable arrays, as well as code to manage the arrays. A better approach is to encapsulate all the employee data and functionality (adding and deleting routines and so forth) into a single, reusable object. Encapsulation is the process of integrating data and code into one entityan object. Your application, as well as external applications, could then work with the employee data through a consistent interfacethe Employee object's interface (An interface is a set of exposed functionalityessentially, code routines.) NOTE Creating objects for use outside of your application is beyond the scope of this book. The techniques you'll learn in this hour, however, are directly applicable to creating externally creatable objects. The encapsulation of data and code is the key detail of classes. By encapsulating the data and the routines to manipulate the data into a single object by way of a class, you free application code that needs to manipulate the data from the intricacies of data maintenance. For example, suppose company policy has changed so that when a new employee is added to the system, a special tax record needs to be generated and a form needs to be printed. If the data and code routines weren't encapsulated in a common object but were written in various places throughout your code, you would need to modify each and every module that contained code to create a new employee record. By using a class to create an object, you need to change only the code in one location: within the object. As long as you don't modify the interface of the object (discussed shortly), all the routines that use the object to create a new employee will instantly have the policy change in effect. Comparing Instance Members with Static Members You learned in Hour 11, "Creating and Calling Methods," that C# does not support global methods, but supports only class methods. By creating static methods, you create methods that can be accessed from anywhere in the project through the class. Instance methods are similar to static methods in how they appear in the C# design environment and in the way in which you write code within them. However, the behavior of classes at runtime differs greatly from that of static members. With static members, all static data is shared by all members of the class. In addition, there are never multiple instances of the static class data. With instance member classes, objects are instantiated from a class and each object receives its own set of data. Static methods are accessed through the class, whereas nonstatic methods (also called instance methods) are accessed through instances of the class. Instance methods differ from static methods in more ways than just in how their data behaves. When you define a static method, it is instantly available to other classes within your application. However, instant member classes aren't immediately available in code. Classes are templates for objects. At runtime, your code doesn't interact with the code in the class per se, but it instantiates objects derived from the class. Each object acts as its own class "module" and thus it has its own set of data. When classes are exposed externally to other applications, the application containing the class's code is called the server. Applications that create and use instances of objects are called clients. When you use instances of classes in the application that contains those classes, the application itself acts as both a client and a server. In this hour, I'll refer to the code instantiating an object derived from a class as client code. Begin by creating a new Windows Application titled Class Programming Example. Change the name of the default form to fclsClassExample and set its Text property to Class Example. Next, change the entry point of the project in the method Main() to reference fclsClassExample instead of Form1. Add a new class to the project by choosing Add Class from the Project menu. Save the class with the name clsMyClass.cs (see Figure 17.1). Figure 17.1 Classes are added to a project the same as other object files are added. Constructors and Destructors As you open your new class file, you'll notice that C# added the public class declaration and a method called clsMyClass(). This is known as the class constructor. A constructor has the same name as the class, includes no return type, and has no return value. A class constructor is called whenever a class object is instantiated. Therefore, it's normally used for initialization if some code needs to be executed automatically when a class is instantiated. If a constructor isn't specified in your class definition, the Common Language Runtime (CLR) will provide a default constructor. NOTE Objects consume system resources. The .NET Framework (discussed in Hour 24, "The 10,000-Foot View") has a built-in mechanism to free resources used by objects. This mechanism is called the Garbage Collector (and it is discussed in Hour 24 as well). Essentially, the garbage collector determines when an object is no longer being used and then destroys the object. When the garbage collector destroys an object, it calls the object's destructor method. If you aren't careful about how to implement a destructor method, you can cause problems. I recommend that you seek a book dedicated to object-oriented programming to learn more about constructors and destructors. Creating an Object Interface For an object to be created from a class, the class must expose an interface. As I mentioned earlier, an interface is a set of exposed functionality (essentially, code routines/methods). Interfaces are the means by which client code communicates with the object derived from the class. Some classes expose a limited interface, whereas some expose complex interfaces. The content and quantity of your class's interface is entirely up to you. The interface of a class consists of one or more of the following members: Properties Methods Events For example, assume that you are creating an Employee object (that is, a class used to derive employee objects). You must first decide how you want client code to interact with your object. You'll want to consider both the data contained within the object and the functions the object can perform. You might want client code to be able to retrieve the name of an employee and other information such as sex, age, and the date of hire. For client code to get these values from the object, the object must expose an interface member for each of the items. Recall from Hour 3 that values exposed by an object are called properties. Therefore, each piece of data discussed here would have to be exposed as a property of the Employee object. In addition to properties, you can expose functionssuch as a Delete or AddNew function. These functions may be simple in nature or very complex. The Delete function of the Employee object, for example, might be quite complex. It would need to perform all the actions necessary to delete an employee, including such things as removing the employee from an assigned department, notifying accounting to remove the employee from the payroll, notifying security to revoke the employee's security access, and so on. Publicly exposed functions of an object, as you should remember from Hour 3, are called methods. Properties and methods are the most commonly used interface members. Although designing properties and methods may be new to you, by now using them isn't; you've been using properties and methods in almost every hour so far. Here, you're going to learn the techniques for creating properties and methods for your own objects. For even more interaction between the client and the object, you can expose custom events. Custom object events are similar to the events of a form or a text box. However, with custom events you have complete control over the following: The name of the event The parameters passed to the event When the event occurs NOTE Events in C# are based on delegates. Creating custom events is complicated, and I'll be covering only custom properties and methods in this hour. Properties, methods, and events together make up an object's interface. This interface acts as a contract between the client application and the object. Any and all communication between the client and the object must transpire through this interface (see Figure 17.2). Figure 17.2 Clients interact with an object via the object's interface. The technical details of the interaction between the client and the object by way of the interface are, mercifully, handled by C#. Your responsibility is to define the properties, methods, and events of an object so that its interface is logical, consistent, and exposes all the functionality a client needs to use the object. Exposing Object Attributes as Properties Properties are the attributes of objects. Properties can be read-only, or they can allow both reading and writing of their values. For example, you may want to let a client retrieve the value of a property containing the path of the component, but not let the client change it because you can't change the path of a running component. You can add properties to a class in two ways. The first is to declare public variables. Any variable declared as public instantly becomes a property of the class (technically, it's referred to as a field). For example, suppose you have the following statement in the Declarations section of a class: public long Quantity; Clients could read from and write to the property using code such as the following: objMyObject.Quantity = 139; This works, but significant limitations exist that make this approach less than desirable: You can't execute code when a property value changes. For example, what if you wanted to write the quantity change to a database? Because the client application can access the variable directly, you have no way of knowing when the value of the variable changes. You can't prevent client code from changing a property, because the client code accesses the variable directly. Perhaps the biggest problem is this: How do you control data validation? For instance, how could you ensure that Quantity was never set to a negative value? You simply can't work around these issues using a public variable. Instead of exposing public variables, you should create class properties using property procedures. Property procedures enable you to execute code when a property is changed, to validate property values, and to dictate whether a property is read-only, write-only, or both readable and writable. Declaring a property procedure is similar to declaring a method, but with some important differences. The basic structure of a property looks like this: Private int privatevalue; public int propertyname { get { return privatevalue; // Code to return the property's value . } set { privatevalue = value; // Code that accepts a new value. } } The first word in the property declaration simply designates the scope of the property (public or private). Properties declared with public are available to code outside of the class (they can be accessed by client code). Properties declared as private are available only to code within the class. Immediately following public or private are the data type and property name. Place your cursor after the left bracket following the statement public class clsMyclass and press Enter to create a new line. Type the following statements into your class: private int m_intHeight; public int Height { get { } set { } } You might be wondering why you just created a module-level variable of the same name as your property procedure (with a naming prefix, of course). After all, I just finished preaching about the problems of using a module-level variable as a property. A property has to get its value from somewhere, and a module-level variable is usually the best place to store it. The property procedure will act as a wrapper for this variable. Notice here that the variable is private rather than public. This means that no code outside of the class can view or modify the contents of this variable; as far as client code is concerned, this variable doesn't exist. Between the property declaration statement and its closing brace are two constructs: the get construct and a set construct. Each of these constructs is discussed in its own section. Creating Readable Properties Using the get Accessor The get accessor is used to place code that returns a value for the property when read by the client. If you remove the get accessor and its corresponding brackets, clients won't be able to read the value of the property. It's rare that you'll want to create such a property, but you can. Think of the get accessor as a method; whatever you return as the result of the method becomes the property value. Add the following statement between the get brackets: return m_intHeight; You return the value of the property by using the return keyword followed by the value. Creating Writable Properties Using the set Accessor The set accessor is where you place code that accepts a new property value from client code. If you remove the set accessor (and its corresponding brackets), clients won't be able to change the value of the property. Leaving the get accessor and removing the set accessor creates a read-only property; clients can retrieve the value of the property but they cannot change it. Add the following statement between the set brackets: m_intHeight = value; The set clause uses a special variable called value, which is provided automatically by C# and always contains the value being passed to the property by the client code. The statement you just entered assigns the new value to the module-level variable. As you can see, the property method is a wrapper around the module-level variable. When the client code sets the property, the set accessor stores the new value in the variable. When the client retrieves the value of the property, the get accessor returns the value in the module-level variable. So far, the property code, with its get and set accessor, doesn't do anything different from what it would do if you were to simply declare a public variable (only the property procedure requires much more code). However, look at this variation of the same set accessor: set { if (value >=10) m_intHeight = value; } This set accessor restricts the client to setting the Height property to a value greater than 10. If a value less than 10 is passed to the property, the property procedure is exited without setting m_intHeight. You're not limited to performing only data validation; you can pretty much add whatever code you desire and even call other methods. Go ahead and add the verification statement to your code so that the set accessor looks like this one. Your code should now look like the procedure shown in Figure 17.3. Figure 17.3 This is a property procedure, complete with data validation. Exposing Functions as Methods Unlike a property that acts as an object attribute, methods are functions exposed by an object. A method can return a value, but it doesn't have to. Create the following method in your class now. Enter this code on the line following the closing bracket for the declared public int Height property: public long AddTwoNumbers(int intNumber1, int intNumber2) { return intNumber1 + intNumber2; } Recall that methods defined with a data-type return values, whereas methods defined with void don't. To make a method private to the class and therefore invisible to client code, declare the method as private rather than public.
https://www.informit.com/articles/article.aspx?p=29400&amp;seqNum=3
CC-MAIN-2022-21
refinedweb
2,997
51.89
import "go.chromium.org/luci/common/system/prober" Package prober exports Probe, which implements logic to identify a wrapper's wrapped target. In addition to basic PATH/filename lookup, Prober contains logic to ensure that the wrapper is not the same software as the current running instance, and enables optional hard-coded wrap target paths and runtime checks. type CheckWrapperFunc func(c context.Context, path string, env environ.Env) (isWrapper bool, err error) CheckWrapperFunc is an optional function that can be implemented for a Prober to check if a candidate path is a wrapper. type Probe struct { // Target is the name of the target (as seen by exec.LookPath) that we are // searching for. Target string // RelativePathOverride is a series of forward-slash-delimited paths to // directories relative to the wrapper executable that will be checked // prior to checking PATH. This allows bundles (e.g., CIPD) that include both // the wrapper and a real implementation, to force the wrapper to use // the bundled implementation. RelativePathOverride []string // CheckWrapper, if not nil, is a function called on a candidate wrapper to // determine whether or not that candidate is valid. // // On success, it will return isWrapper, which will be true if path is a // wrapper instance and false if it is not. If an error occurred during // checking, the error should be returned and isWrapper will be ignored. If // a candidate is a wrapper, or if an error occurred during check, the // candidate will be discarded and the probe will continue. // // CheckWrapper should be lightweight and fast, as it may be called multiple // times. CheckWrapper CheckWrapperFunc // Self and Selfstat are resolved contain the path and FileInfo of the // currently running executable, respectively. They can both be resolved via // ResolveSelf, and may be empty if resolution has not been performed, or if // the current executable could not be resolved. They may also be set // explicitly, bypassing the need to perform resolution. Self string SelfStat os.FileInfo // PathDirs, if not zero, contains the list of directories to search. If // zero, the os.PathListSeparator-delimited PATH environment variable will // be used. PathDirs []string } Probe can Locate a Target executable by probing the local system PATH. Target should be an executable name resolvable by exec.LookPath. On Windows systems, this may omit the executable extension (e.g., "bat", "exe") since that is augmented via the PATHEXT environment variable (see "probe_windows.go"). Locate attempts to locate the system's Target by traversing the available PATH. cached is the cached path, passed from wrapper to wrapper through the a State struct in the environment. This may be empty, if there was no cached path or if the cached path was invalid. env is the environment to operate with, and will not be modified during execution. ResolveSelf attempts to identify the current process. If successful, p's Self will be set to an absolute path reference to Self, and its SelfStat field will be set to the os.FileInfo for that path. If this process was invoked via symlink, the path to the symlink will be returned if possible. Package prober imports 8 packages (graph) and is imported by 2 packages. Updated 2018-08-14. Refresh now. Tools for package owners.
https://godoc.org/go.chromium.org/luci/common/system/prober
CC-MAIN-2018-34
refinedweb
531
57.27
Before you can use the NetConnection Debugger, you must add a single line of ActionScript to your application (see Figure 5.12). This single line of code adds the required class files to your Flash application to enable the NetConnection Debugger. To add the class files, follow these steps in the Flash MX authoring environment: Open your Communication application (myFirstApp.fla) in the Flash MX authoring environment. Open the Actions panel by selecting Window, Actions (or press F9). Turn the Actions panel into Expert mode by pressing Ctrl+Shift+E. This allows you to manually add the line of script to your application. Click the First Frame in the first layer of your movie (or a specified Actions layer that you may have set up) and enter the following line of code in the Actions panel: #include "NetDebug.as"; Open the NetConnection Debugger in Flash MX by selecting Window, NetConnectionDebugger. Test your communications movie in Flash MX by selecting Control, Test Movie or pressing Ctrl+Enter. When the movie runs, the NetConnection Debugger begins to display numerous events on the left side of the panel. This is the Flash player communicating with the server. The NetDebug.as file was installed in the \Macromedia\Flash MX\Configuration\Include\folder. Any files placed in this folder can be included into Flash MX without specifying a directory path. When engaged, the NetConnection Debugger monitors any AMF activity on your computer. This is helpful if you need to watch exchanges between two Flash players open outside Flash MX (including applications running within a web browser). Take a moment and scroll through the list of events. The debugger is not interactive, meaning that you cannot affect your movie with anything you do in this panel. To view expanded details, click the Details tab on the right side. Figure 5.13 displays detail of the first Communication Server event, Connect, originating from the Flash player. Warning Tracking problems you might have in your code, or trying to sort out unusual server behaviors, will be easier with this tool. The NetDebug class files are not required and should be commented out when you are ready to deploy your application to a production server. The file will add unnecessary file size to your SWF movie.
http://etutorials.org/Macromedia/Macromedia+Flash+Communication+Server+MX/Part+I+10+Quick+Steps+for+Getting+Started/Chapter+5.+STEP+5+Monitoring+and+Managing+the+Server/Developer+Component+NetConnection+Debugger/
crawl-001
refinedweb
377
55.34
Date: March 1998. Last edited: $Date: 1999/04/14 21:45:49 $ starting to enable some machine understanding and automatic processing of document types which have not been pre-programmed by people. Ça commence. The next level we consider is that when your brower (agent, whatever) dereferences the namespace URI, it finds defining structure allows everyone to have one and only one parser to handle all manner of documents. Any document coming across the threshold can be parsed into a tree. More than that, it allows a document o be validated against allowed strctures. If a memeo contains two subject fields, it is not valid. This is one fo the principal uses of DTDs in SGML. In some cases, there maybe another spin-off. You can imagine that if the schema document lists the allowed structrue of the document, and the types (and maybe names) of each element, then this would allow an agent to construct, on the fly, a graphic user interface for editing such a document. This was the intent with PICS rating systems: at least, a parent coming across a new rating system would be be given a a human-readable description of the various parameters and would be able to select personal preferences The next step in the power of schema languages it so be able to distinguish optional extensions from mandatory extensions. This is the simplest thing one can do to allow the crudest form of partial understanding. It breaks out of the rule that any extension can be ignored. There has been a long series of attempts to add this distinction to HTTP, without a lot of success, as it is nota very exciting feature by itself. However, for many extensions it is essential. There will always be somethings which you really want to be ignorable - little comments which most software can happily throw away, such as assing birthday greetings to a check. There will always be some extensions which are obsolutely not optional - such as extending a check to work in a currency otehr than US dollars. With this small addition, we now reach a major goal for evolvability: the ability for a version 1 program to read a version 2 file. This can be done by making the version 2 language a superset of the version 1 language, but labelling the new vocabulary as optional or not in the schema (or in schema information in the document). The version 1 program can throw away all optional version 2 features, and only give up if the version 2 document really does use a feture which must be understood but isn't understood by version 1 programs. Sometimes software engineers will solve a problem with the most powerful tool available. The top of the list is the large set of all Turing complete langages (basically, programming languages). The great thing about a real prgramming language is that there is nothing you can in theory do with any computer which you can't write a program to do. It is powerful. For example, using a complete programming language allows you to write a complex program to convert from one manufacturer's dtaa format to another - for exaple from "Word" to "Wordperfect" or between two standards such as GIF to PNG. You an imagine that on the web, linked from the schemas of various formats were programs, written in commonly understodd languages such as Java, to do such conversions. This provides another great goal of evolvabilty: to convert data between specs designed quite independently. However, there is a cost in using this level. The conversion program becomes a black box. because a powerful possibly complex language is used, in general the actual operation of the program becomes impossible to trace: the program is regarded as a "black box" with an input and an output. Ideed, software engineering encourages program modules being regarded as black boxes which perform to a specification, but which one does not open up. This means the program has to be run once on the whole document or not at all. There is a huge difference between this and a set of schema information which defines the mapping betwen elements of two languages which are both written in the same framework, and can in fact be converte
http://www.w3.org/DesignIssues/Evolution
CC-MAIN-2017-09
refinedweb
714
57.61
User talk:Mvrban From OpenStreetMap Wiki Problematic contributions Some of your edits are a bit problematic. You copied the content of Relation:route to Rute. Since Rute is not an English word it should not be in the base namespace! If you want to translate a page, you should take the English pagename and prefix it by a countrycode. Ie. HR:Relation:route. It is ok to copy the original English text to a translation page, but only if you start the translation in very near future. We do not need Language namespace full of English text! And please add an email to your Wiki-preferences! Best regards! --phobie m d 17:48, 4 September 2009 (UTC)
http://wiki.openstreetmap.org/wiki/User_talk:Mvrban
CC-MAIN-2017-09
refinedweb
117
74.29
I am following the steps in getting-started-with-csawidexporter.pdf to generate new csaw libs for IDCS5. I have the released build of Adobe Flash Builder 4.0 with ExtensionBuilder-1.0.0 installed. When I try step 1 in section "Generating the libraries", the compile fails on the following line import flash.desktop.NativeProcess; You're going to need to overlay the AIR 2.0 SDK on top of the Flex SDK you're using. By default Flex 3.4 comes with AIR 1.5. Here are some quick instructions that should get you up and running: for_use_with_the_Flex_SDK Can someone plese post a new link on how to overlay/integrate air2 in flex builder 4? I just want to build an air app that communicates with cs5 products. adobe's sites are littered with dead and cyclic links, it is almost maddening. For instance the link above leads to the dead labs page. Why does adobe decide to cut everyone off from information that was once valuable when a product comes out? All of the documention i have found about using the Extension builder with flex builder and air 2 is either useless, outdated or unavailable. FRUSTRATED DEVELOPER!!! Just tested this link: Bob If you follow the instructions at to update to the latest build of Extension Builder, you'll find that the SDK provided with the toolset now automatically includes the AIR 2 APIs. You no longer need to perform an overlay. This is also true of the CS SDK available on DevNet. Please let us know if you have any problems using this, or it doesn't perform as you would expect. Best, James
https://forums.adobe.com/thread/636639
CC-MAIN-2017-30
refinedweb
278
74.59
How to write a plugin¶ Warning Plugins will be phased out in 2.1.0 when we update to Django 1.7. A plugin is basically just a normal Django application. The only thing making it a pugin is that it integrates itself into the Devilry system in some way. Setting up your testsite¶ In this howto we assume you have created a django site, mysite/, and and that your plugin is a application in this site called myplugin. It should look something like this: mysite/ settings.py manage.py urls.py myplugin/ models.py urls.py Autoload plugins¶ There are several ways a plugin can integrate itself, but they all need some place to do the integration. Just like admin.py can be used to integrate your application with the Django admin interface, devilry provides a place where you can put code that you want to autoload. First initialize the plugin system by adding: from devilry.apps.core import pluginloader pluginloader.autodiscover() to your mysite/urls.py, making it look something like this: from django.conf.urls import * # Uncomment the next two lines to enable the admin: #from django.contrib import admin #admin.autodiscover() from devilry.apps.core import pluginloader pluginloader)), ) pluginloader.autodiscover() will autoload any module named devilry_plugin in any application in INSTALLED_APPS. Your first plugin¶ Create a file named mysite/myplugin/devilry_plugin.py, and put the following code into the file: print print "Hello plugin world!" print Start the development server with python manage.py runserver, go to and you should see the message you printed in the terminal/shell running the server.
https://devilry.readthedocs.io/en/master/developer/plugins.html
CC-MAIN-2022-05
refinedweb
266
52.46
PLP::HowTo - Some examples of common web things in PLP. Additional Perl functionality is often available in modules. All of the modules used in this document are available (for free) at CPAN: <: BEGIN { use CGI::Cookie; AddCookie( CGI::Cookie->new( -name => 'ID', -value => 123456, -domain => 'foo.com', -path => '/' )->as_string ); } :> Your user ID is <:= $cookie{ID} :> <: BEGIN { $header{Content_Type} = 'text/plain'; } :> Use DBI, and alternatively, one of the many simplifying modules. Drivers for DBI are in the DBD:: namespace. DBI loads the driver automatically, but it has to be available. If you need a fast full-featured file-base database, use DBD::SQLite, it's the instant database :). <: use DBIx::Simple; # and read its documentation for examples. :> Use CGI.pm, which can be used with CGI::Upload to make things easier <: use CGI; # and don't use %post in your PLP document. use CGI::Upload; # and read its documentation for examples. my $cgi = CGI->new; my $upload = CGI::Upload->new($cgi); ... :> <: use LWP::Simple; my $page = get ''; :> This only works with PLP under mod_perl. For CGI installations, it's useless. <: use MIME::Base64; BEGIN { my $r = Apache->request; my ($type, $login) = split / /, $r->header_in('Authorization'); my ($user, $pass) = split /:/, decode_base64 $login, 2; unless ($user eq 'foo' and $pass eq 'bar') { $header{Status} = '401 Authorization Required'; $header{WWW_Authenticate} = 'Basic realm="Top secret :)"'; print '<h1>Authorization Required</h1>'; exit; } } :> (It is possible to use something similar with CGI, but it's not easy. Headers are communicated to your script via %ENV, and having credentials in there would be insecure, so Apache removes them. To get $ENV{HTTP_AUTHORIZATION}, you need to recompile Apache with -DSECURITY_HOLE_PASS_AUTHORIZATION, or use mod_rewrite to set the environment variable. Short answer: just use mod_perl.) If you have good, simple examples of how to do common things with PLP, please send them! <perl@shiar.org>
http://search.cpan.org/dist/PLP/lib/PLP/HowTo.pod
CC-MAIN-2017-30
refinedweb
304
56.35
Track Window Size Changes February 11, 1998 | Fredrik Lundh To dynamically track changes to the window size, bind to the <Configure> event and inspect the width and height members in the event handler. If you’re using the WCK, you can simply override the ui_handle_resize method instead. Track changes to the window size from Tkinter import * # create a canvas with no internal border canvas = Canvas(bd=0, highlightthickness=0) canvas.pack(fill=BOTH, expand=1) # track changes to the canvas size and draw # a rectangle which fills the visible part of # the canvas def configure(event): canvas.delete("all") w, h = event.width, event.height xy = 0, 0, w-1, h-1 canvas.create_rectangle(xy) canvas.create_line(xy) xy = w-1, 0, 0, h-1 canvas.create_line(xy) canvas.bind("<Configure>", configure) mainloop()
http://effbot.org/zone/tkinter-window-size.htm
CC-MAIN-2016-22
refinedweb
133
57.77
TL 5.0 to 5.0.1 broke his WCF Data Service. Upon investigation it became clear that there was an easy fix for the short-term, and perhaps something we can do in 5.1.0 to make your life easier in the long-term. What’s Bin Deploy? We’ve been blogging about our goals for bin deploying applications for a while now.!) Replicating the Problem: Now update your NuGet package to 5.0.1 or some subsequent version. (In this example I updated to 5.0.2.) Debug again, and look at the difference in the Modules window: ‘Microsoft" %> That 5.0.0.0 string is what is causing the GACed version of Microsoft.Data.Services to be loaded. Resolving the Problem For the short term, you have two options: - Change the version number to the right number. The first three digits (major/minor/patch) are the significant digits; assembly resolution will ignore the final digit. - Remove the version number entirely. (You should remove the entire name/value pair and the trailing comma.) Either of these changes will allow you to successfully bin deploy the service. A Permanent Fix? We’re looking at what we can do to provide a better experience here. We believe that we will be able to leverage the PowerShell script functionality in NuGet to at least advise, if not outright change, that value. So what do you think? Would you feel comfortable with a package update making a change to your .svc file? Would you rather just have a text file pop up with a message that says you need to go update that value manually? Can you think of a better solution? We’d love to hear your thoughts and ideas in the comments below. Join the conversationAdd Comment for me, the "pop up" with a good explanation would be sufficient… why not start from the beginning with the missing version info, like [… Microsoft.Data.Services, Culture=neutral, …] WCF Supoort Oracle Using nuget, I have just installed the 5.1.0-rc2 packages. I am performing a standard install from an msi and getting the exact error you mention above – 'Could not load file or assembly 'Microsoft.Data.Services.Client, Version=5.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35' Although I do have a line in my .svc file that reads 'Factory="System.Data.Services.DataServiceHostFactory, System.Data.Services, Version=5.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089"', unfortunately, your resolutions seem to have no affect. Any ideas? Thanks! Disregard… As it turns out, because I have my EF model in a separate project from my WCF svc, I had to install the OData packages in both places. Which is strange, considering that it ran fine in debug with the packages installed only in the WCF project. On to better things! It might be worth clarifying something that tripped me, which in hindsight is obvious 🙂 I was upgrading V4.0.0.0 In my svc markup I had to remove the assembly version, change the publickeytoken to the latest, and update the assembly name to Microsoft.Data.Services. The last thing tripped me because the namespace remains system.data.services in code.
https://blogs.msdn.microsoft.com/astoriateam/2012/08/29/odata-101-bin-deploying-wcf-data-services/
CC-MAIN-2018-13
refinedweb
531
67.25
{ PREAMBLE Do you want to: ROADMAP the section on Compiling your C program There's one example in each of the five sections: This documentation is UNIX specific. Compiling your C program.) Your C program will-usually-allocate, ``run'', and deallocate a PerlInterpreter object, which is defined in the perl library. If your copy of Perl is recent enough to contain this documentation (5.002 or later), then the perl library (and EXTERN.h and perl.h, which you'll also need) will reside in a directory resembling this: /usr/local/lib/perl5/your_architecture_here/CORE or perhaps just /usr/local/lib/perl5/CORE or maybe something like /usr/opt/perl5/CORE Execute this statement for a hint about where to find CORE: perl -e 'use Config; print $Config{archlib}' Here's how you might compile the example in the next section, the section on Adding a Perl interpreter to your C program, on a DEC Alpha running the OSF operating system: % cc -o interp interp.c -L/usr/local/lib/perl5/alpha-dec_osf/CORE -I/usr/local/lib/perl5/alpha-dec_osf/CORE -lperl -lm You'll have to choose the appropriate compiler (cc, gcc, et al.) and library directory (/usr/local/lib/...) for your machine. If your compiler complains that certain functions are undefined, or that it can't locate -lperl, then you need to change the path following the -L. If it complains that it can't find EXTERN.h or perl.h, you need to change the path following the -I. You may have to add extra libraries as well. Which ones? Perhaps those printed by perl -e 'use Config; print $Config{libs}' Adding a Perl interpreter to your C program In a sense, perl (the C program) is a good example of embedding Perl (the language), so I'll demonstrate embedding with miniperlmain.c, from the source distribution. Here's a bastardized, non-portable version of miniperlmain.c containing the essentials of embedding: #include <stdio.h> , env); perl_run(my_perl); perl_destruct(my_perl); perl_free(my_perl); } Now compile this program (I'll call it interp.c) into an executable: % cc -o interp interp.c -L/usr/local/lib/perl5/alpha-dec_osf/CORE -I/usr/local/lib/perl5/alpha-dec_osf/CORE -lperl -lm(). Calling a Perl subroutine from your C program To call individual Perl subroutines, you'll need to remove the call to perl_run() and replace it with a call to perl_call_argv(). That's shown below, in a program I'll call showtime.c. #include <stdio.h> #include <EXTERN.h> #include <perl.h> static PerlInterpreter *my_perl; int main(int argc, char **argv, char **env) { my_perl = perl_alloc(); perl_construct(my_perl); perl_parse(my_perl, NULL, argc, argv, env); /*** This replaces perl_run() ***/ perl_call_argv("showtime", G_DISCARD | G_NOARGS, argv); -L/usr/local/lib/perl5/alpha-dec_osf/CORE -I/usr/local/lib/perl5/alpha-dec_osf/CORE -lperl -lm % showtime showtime.pl 818284590 yielding the number of seconds that elapsed between January 1, 1970 (the beginning of the UNIX epoch), and the moment I began writing this sentence. If you want to pass some arguments to the Perl subroutine, or you want to access the return value, you'll need to manipulate the Perl stack, demonstrated in the last section of this document: the section on Fiddling with the Perl stack from your C program Evaluating a Perl statement from your C program NOTE: This section, and the next, employ some very brittle techniques for evaluting strings of Perl code. Perl 5.002 contains some nifty features that enable A Better Way (such as with the CWperl_eval_sv entry in the perlguts manpage). Look for updates to this document soon. One way to evaluate a Perl string is to define a function (we'll call ours perl_eval()) that wraps around Perl's the CWeval entry in the perlfunc manpage. Arguably, this is the only routine you'll ever need to execute snippets of Perl code from within your C program. Your string can be as long as you wish; it can contain multiple statements; it can use the CWrequire entry in the perlmod manpage or the CWdo entry in the perlfunc manpage to include external Perl files. Our perl_eval() lets us evaluate individual Perl strings, and then extract variables for coercion into C types. The following program, string.c, executes three Perl strings, extracting an CWint from the first, a CWfloat from the second, and a CWchar * from the third. #include <stdio.h> #include <EXTERN.h> #include <perl.h> static PerlInterpreter *my_perl; int perl_eval(char *string) { char *argv[2]; argv[0] = string; argv[1] = NULL; perl_call_argv("_eval_", 0, argv); } main (int argc, char **argv, char **env) { char *embedding[] = { "", "-e", "sub _eval_ { eval $_[0] }" }; STRLEN length; my_perl = perl_alloc(); perl_construct( my_perl ); perl_parse(my_perl, NULL, 3, embedding, env); /** CWint, SvNV() to create a CWfloat, and SvPV() to create a string: a = 9 a = 9.859600 a = Just Another Perl Hacker Performing Perl pattern matches and substitutions from your C program Our perl_eval() lets us evaluate strings of Perl code, so we can define some functions that use it to ``specialize'' in matches and substitutions: match(), substitute(), and matches(). char match(char *string, char *pattern); Given a string and a pattern (e.g. ``m/clasp/'' or ``/\b\w*\b/'', which in your program might be represented as CW"/\\b\\w*\\b/"), returns 1 if the string matches the pattern and 0 otherwise. int substitute(char *string[], char *pattern); Given a pointer to a string and an ``=~'' operation (e.g. ``s/bob/robert/g'' or ``tr[A-Z][a-z]"), modifies the string according to the operation, returning the number of substitutions made. int matches(char *string, char *pattern, char **matches[]); Given a string, a pattern, and a pointer to an empty array of strings, evaluates CW$string =~ $pattern in an array context, and fills in matches with the array elements (allocating memory as it does so), returning the number of matches found. Here's a sample program, match.c, that uses all three: #include <stdio.h> #include <EXTERN.h> #include <perl.h> static PerlInterpreter *my_perl; int eval(char *string) { char *argv[2]; argv[0] = string; argv[1] = NULL; perl_call_argv("_eval_", 0, argv); } /** **matches[]) { **/ *matches = (char **) malloc(sizeof(char *) * num_matches); for (i = 0; i <= num_matches; i++) { current_match = av_shift(array); (*matches)[i] = SvPV(current_match, length); } return num_matches; } main (int argc, char **argv, char **env) { char *embedding[] = { "", "-e", "sub _eval_ { eval $_[0] }" }; char *text, **matches; int num_matches, i; int j; my_perl = perl_alloc(); perl_construct( my_perl ); perl_parse(my_perl, NULL, 3, embedding, env); (perl_match(text, "m/quarter/")) /** Does text contain 'quarter'? **/ printf("perl_match: Text contains the word 'quarter'.\n\n"); else printf("perl_match: Text doesn't contain the word 'quarter'.\n\n"); if (perl_match(text, "m/eighth/")) /** Does text contain 'eighth'? **/ printf("perl_match: Text contains the word 'eighth'.\n\n"); else printf("perl_match: Text doesn't contain the word 'eighth'.\n\n"); /** Match all occurrences of /wi../ **/ num_matches = perl_matches(text, "m/(wi..)/g", &matches); printf("perl_matches: m/(wi..)/g found %d matches...\n", num_matches); for (i = 0; i < num_matches; i++) printf("match: %s\n", matches[i]); printf("\n"); for (i = 0; i < num_matches; i++) { free(matches[i]); } free(matches); /** Remove all vowels from text **/ num_matches = perl_substitute(&text, "s/[aeiou]//gi"); if (num_matches) { printf("perl_substitute: s/[aeiou]//gi...%d substitutions made.\n", num_matches); printf("Now text is: %s\n\n", text); } /** Attempt a substitution if (!perl_substitute(&text, "s/Perl/C/")) { printf("perl_substitute: s/Perl/C...No substitution made.\n\n"); } free(text); perl_destruct(my_perl); perl_free(my_perl); } which produces the output perl_match: Text contains the word 'quarter'. perl_match: Text doesn't contain the word 'eighth'. perl_matches: m/(wi..)/g found 2 matches... match: will match: with perl perl_substitute: s/Perl/C...No substitution made. =head2 Fiddling with the Perl stack from your C program. Since C has no built-in function for integer exponentiation, let's make Perl's ** operator available to it (this is less useful than it sounds, since <stdio.h> , env); PerlPower(3, 4); /*** Compute 3 ** 4 ***/ perl_destruct(my_perl); perl_free(my_perl); } Compile and run: % cc -o power power.c -L/usr/local/lib/perl5/alpha-dec_osf/CORE -I/usr/local/lib/perl5/alpha-dec_osf/CORE -lperl -lm % power 3 to the 4th power is 81. December 18, 1995 Some of this material is excerpted from my book: Perl 5 Interactive, Waite Group Press, 1996 (ISBN 1-57169-064-6) and appears courtesy of Waite Group Press. Table of Contents
http://www.fiveanddime.net/man-pages/perlembed.1.html
crawl-003
refinedweb
1,392
56.05
To reverse an array, swap the first element with the last element and the second element with second last element and so on if the array is of odd length leave the middle element as it is. In short swap the 1st element with the 1st element from last, second element with the second element from last i.e. ith element with the ith element from the last you need to do this till you reach the midpoint of the array. If i is the first element of the array (length of the array –i-1) will be the last element, therefore, swap array[i] with array[(length of the array –i-1)] from the start to the midpoint of the array: public class ReversingAnArray { public static void main(String[] args) { int[] myArray = { 1, 2, 3, 4, 5, 6, 7, 8, 9, 10 }; int size = myArray.length; for (int i = 0; i < size / 2; i++) { int temp = myArray[i]; myArray[i] = myArray[size - 1 - i]; myArray[size - 1 - i] = temp; } System.out.println("Array after reverse:: "); System.out.println(Arrays.toString(myArray)); } } Array after reverse:: [10, 9, 8, 7, 6, 5, 4, 3, 2, 1]
https://www.tutorialspoint.com/How-I-can-reverse-a-Java-Array
CC-MAIN-2022-05
refinedweb
195
62.92
Installing Pygal I'm trying to install pygal. To do this, I pasted pipista into an empty script and saved it in site-packages. I created another empty script in site-packages with the following code, but receive an ImportError that there is "no module named pipista": import pipista pipista.pypi_install('pygal') Pipista appears to be written for Python 2.7, so I set this as my default interpreter, but I'm still having issues. What am I doing wrong? Will my second line of code even install Pygal? Is there anything else I'll need to do? I'm very new to this so any help is greatly appreciated. Thanks! For me no Import error but I put the little script for importing, in the root, not in the site-packages folder. Even if I put this script in the same site-packages folder, I don't have any import error. Sure of the name pipista.py? Your mistake might be using pipists, which was last updated 4 years ago, and is not supported anymore :) Try stash, pip command, which is mostly bulletproof. Out of curiosity, where did you stumble upon pipista? Thanks to both of you. I'll try stash. I read about pipista on other threads, like this one: Thanks again @JonB -- stash worked great for installing Pygal, but now when I go to import pygal, I receive this error: No module named 'pkg_resources' Any ideas how to fix this? ugh, pkg_resources is a pain... This: may be of some help. This might require manually downloading using stash wget, then copying the egg info files into site packages. Also you will need to install setuptools and pkg_resources. @dgelessus had a "fistutils" which i think allowed setuptools to work on pythonista, but I am not entirely sure. fistutils was very "experimental" to say the least. It's a hack that only barely works and isn't very useful in the end, there isn't much that fistutils pip can do that stash pip can't. As for pkg_resources, you could try getting the standard pkg_resourcespackage from. I don't have a custom version or patch of pkg_resourcesin fistutils, which means that the standard version might work unmodified on Pythonista. I tried to download setuptools and copy its pkg_resourcessub-folder into site-packages. Then import pygaljust worked. Maybe we can make this a standard process to install pkg_resourcesthe first time stash pipis called. By the way, these are the commands I used to install pkg_resources. pip download setuptools tar -zxvf setuptools-25.1.0.tar.gz cp setuptools-25.1.0/pkg_resources site-packages/ If there are any import errors afterwards, try restart Pythonista.
https://forum.omz-software.com/topic/3375/installing-pygal/2
CC-MAIN-2021-17
refinedweb
445
75.71
A micro framework for modern web apps built from the ground up on the shelf framework Introduction A micro framework for modern web apps built from the ground up on the Shelf Framework. Like its namesake, Mojito is mostly sugar and a blend of other ingredients. Mojito is deliberately a very thin layer over several shelf packages and focuses on the overall experience of building an application. The focus of Mojito is on modern rich web apps that have a clean separation of ui from services. As such it doesn't bundle any server side templating packages although these can be easily added. The core architecture of Mojito is shelf itself. All components are existing pub packages that are built from the ground up as shelf components. This makes it super easy to take advantage of any new shelf based packages that come along in the future Usage Import and initialise import 'package:mojito/mojito.dart'; final app = mojito.init(); Set up some global authentication. These will be applied to all routes. app.auth.global .basic(_lookup) ..allowHttp=true ..allowAnonymousAccess=true; Set up a route for the ui that will proxy to pub serve in dev and serve from the filesystem in prod. app.router..addStaticAssetHandler('/ui');: - Shelf Route - Shelf Bind - Shelf Rest - Shelf Auth - Shelf Auth Session - Shelf OAuth - Shelf OAuth Memcache - Shelf Proxy - Shelf Static - Shelf Exception Response More doco to come...
https://www.dartdocs.org/documentation/mojito/0.3.0-beta.7/index.html
CC-MAIN-2017-13
refinedweb
234
62.68
Pythonscript show console on error Sometimes I run one of my pythonscripts and nothing happens – meaning the script function doesn’t happen. I’m left wondering why. Usually when this happens the Pythonscript console window isn’t active – or I’d see the Python error in red and know my script bombed out due to programmer error. So I could probably “show” the pythonscript console as the first line in every script I write. That would get annoying, plus it is disruptive to workflow (I may have the Find Result panel active instead of the pythonscript console because I’m doing something with it). So my question is, is it possible to install a “handler” such that if an unhandled python exception occurs, the Pythonscript console window is made active to make it obvious what has occurred? If so, how would I do such a thing? What comes first into my mind is to use always a main function and call it with a try block, in the except part call console.show() Intercepting exceptions in general would mean to register a function to sys.excepthook. Cheers Claudia Hello Claudia and thank you for your reply. I think using a main function with a try block could work, although it may get tiresome to always use it, plus I would forget to do it, but it is a good idea. I was looking for a suggestion along the lines of your exception hook one. I remember researching this a while ago, and I could get it working under standard Python, but not as part of Pythonscript. I could register the hook but it wouldn’t get called. I could not figure out why. Unfortunately, as it was some time ago, I can’t remember any more details, if there were any to recall. I would like to revisit it if anyone has any suggestions of a working example under Pythonscript… to be honest, I didn’t try it with python script yet. Just thought it works. I should have known better ;-) So, let’s start diggin’ - will follow up. Cheers Claudia ok - I tried to duplicate your “mport os” example, but I didn’t see “got it” – all I saw was the standard “SyntaxError: invalid syntax” traceback. I restarted N++ after commenting out the 2 lines in code.py. I see what you mean now about overwriting the run_code function, but it seems like I could avoid that complexity and just copy+paste+modify the functionality of your “sys.excepthook = xxxxx_func” in startup.py and have that xxxxx_func function do what I want (e.g. console.show()) upon unhandled exception. Of course, currently since I don’t see the “got it” example working that is going to be problematic. :-) strange. You do use python script 1.0.8? On Windows or like me on linux? Current npp version? Cheers Claudia wait - I guess I know why - just need to investigate why it didn’t happen to me. Cheers Claudia Needs more investigation - will follow up on this tomorrow. Good night Cheers Claudia Yes, using PS 1.0.8.0 on Win7. I renamed code.py (and deleted code.pyc) and restarted N++. I thought this would have really bad effects when trying to run PS’s in N++, but it had no effect at all (scripts ran just the same as always). This seems to indicate that code.py has no influence…but this is odd since you seem to see the effects of changing it. I’m confused… - Alan Kilborn last edited by Alan Kilborn I’m hesitant to post this, because I really prefer the “hook” solution if it can be worked out, but I tried wrapping a “main” function: def main(): x=y # cause exception as y is undefined try: main() except: console.show() Running this results in a hard hang of Notepad++! ok - tried to understand the python script source code and this is what I assume is what happens. When executing python files, the one we create with Plugins->PythonScript-New Script code.py is NOT used, instead the C++ implementation of the python interface, namely PyRun_Simplefile. Makes a lot of sense. When executing code in the console then code.py is used. (Not interesting for this issue) Because of this, there is no need to change code.py but to make a global execption hook working we have to put the following code into one of the startup.py files. I prefer user startup.py but machine startup.py will work too. import sys def my_logging_func(exctype, value, traceback): console.show() console.write('{}\n{}\n{}\n'.format(exctype, value, traceback)) sys.excepthook = my_logging_func Of course the my_logging_func code could look different for each. But the parameters need to be 3! When does it fail? Python interpreter tries to compile the source before it gets executed and that means if an exception is raised while compiling the source which includes the exception hook, the hook cannot be installed. Concerning the console.show() freeze, I’m using the console.show() since I started with python script. I also tried your example it is working for me. When your npp hangs than it means that python script created a deadlock. But what could be the cause when running console.show()? Can you run console.hide() when you open the console manually (via menu)? Is there something special in your startup.pys? Cheers Claudia came just into my mind - could it be that you are using callbacks in your startup.py files which could jump in? Cheers Claudia Okay, I disabled code initiated from startup.py that had a callback associated with it, and…everything (the “my_logging_func” stuff, and the “try/main()” stuff) discussed above now works. So the question becomes, what do the callbacks have to do with anything, as long as the callbacks don’t contain any code with unhandled exceptions? And then the next question is, how do I get it all…my code with callbacks, and a custom exception handler (which does the console.show() )? And again, Claudia, thank you for your diligence! Just a quick update - the exception hook should work together with your callbacks, opening the console is the problem. If you want to know more about this there must be an old thread at sourceforge forum. To overcome this, use notepad.runPluginCommand(‘Python Script’, ‘Show Console’) instead of console.show() (Please double check syntax) Cheers Claudia I found this at sourceforge. It doesn’t really detail anything, but it reminds me of our current discussion! So here’s what I ended up embedding in startup.py…seems to do the job and meet the original requirement: import traceback def custom_exception_handler_func(exctype, value, trace_back): notepad.runPluginCommand('Python Script', 'Show Console') # can't/don't use console.show() sys.stderr.write('(Single-level) Traceback:' + '\n') sys.stderr.write(traceback.format_tb(trace_back)[-1]) # only write out ONE level sys.excepthook = custom_exception_handler_func I found this at sourceforge. It doesn’t really detail anything, but it reminds me of our current discussion! No, I have something in my mind related to the problems using console object together with editor callbacks. Did a quick search but wasn’t able to find it. Anyway, good to see that you have a working solution and I hope you don’t open new python script related threads in the near future. Don’t get me wrong, but it looks like have a knack to find all those nasty issues ;-) Cheers Claudia
https://community.notepad-plus-plus.org/topic/13277/pythonscript-show-console-on-error/11
CC-MAIN-2019-51
refinedweb
1,251
75.5
Write. Hint: write a method that counts the number of letters (and ignores punctuation) in a string that holds a single word without spaces. In your main program, break the input string up into words and send each one to your method. public class WordCount { public static void main(String[] args) { System.out.println("Enter string: "); String str = IO.readString(); System.out.println("Enter minimum length: "); int length = IO.readInt(); int wordcount = str.split("\\s+").length; int counter = 0; boolean isletter; for (int i = 0; i < str.length(); i++) { if (str.charAt(i) == ' ' || str.charAt(i) == '!') { isletter = false; } else { counter++; } } { } } } So far, I'm able to count the number of words (although I'm not really sure if I even need that for this problem) and the number of letters without ONE space. However, I have a few questions. In this line, if (str.charAt(i) == ' ' || str.charAt(i) == '!') { How do I account for multiple spaces and other symbols? Such as if the user inputs: the cat !?@ dog. Another question I have is how am I supposed to compare the length of EACH word to the minimum length the user inputted? Any help would be appreciated. I'm just not sure how to get around these issues.
http://www.dreamincode.net/forums/topic/269520-word-count-that-ignores-punctuation-and-space/
CC-MAIN-2017-13
refinedweb
207
76.82
VB.NET Uncovered: Big Changes Coding whatnots. What has really changed that you need to know about? Well, apart from the namespaces thang, let's review the stuff that will affect you: Longs, Integers - Our old Long has turned into anInteger and the Integer has turned into something called Short. The new Long inVB.NET holds a 64-bit number Byte, Char - The new Byte data type can hold a numberbetween 0 and 255. The new Char data type consumes 2 bytes of space and canhold one Unicode character. Goodbye Variants - Variants have disappeared. In itsplace is the generic Object data type, which can now hold virtually anything(it ain't as memory-intensive as VB6 neither) Currency Replacement - The Currency data type no longer exists in VB.NET and is replaced by the more powerful 128-bit Decimal data type Variant Declaration - In VB6, "Dim X, Y, Z As Integer" would result in two Variants and anInteger. Yet in VB.NET, this gives us three Integers (which, remember are our old Longs!) Zero-Based Arrays - This is something a lot of people have complained about and is subject to change. Arrays in VB.NET are zero-based - meaning they always start at 0. So code such as "Dim MyArray(10) As Integer" would result in an Integer array of eleven elements - zero through to ten Top Tip: To declare variables (+ arrays!) that have a "form-level" scope, place them before the 'New' method automatically created for you in the code window. This is the old Declarationsarea. UDT Changes - User-defined types are awfully useful. But when declaring in future, you need to use the API-like keyword Structure instead of Type. So here's how you would declare a sample UDT: Structure MyStructurePublic Name As StringPublic Age As ByteEnd Structure Collections Gone - VB.NET doesn't support the Collection object as we know it. Instead, it provides you with a bunch of new collection types in the System.Collections namespace - the most similar are HashTable and ObjectList. However you can use the old Collection object using the Compatibility namespace, like this: Dim MyCol As Microsoft.VisualBasic.Compatibility.VB6.Collection MyCol.Add("My Information") New Operators - VB.NET brings with it a few new arithmetic operators to help cut down your code. For example, "X += 4" in VB.NET will do what "X = X + 4" did in VB6. Try playing with these too: "X -= 10, X *= 2", "X /= 13", "X \=13", "X ^= 3", "X &= " OK" Short Circuiting - VB.NET short circuits If...Then statements. So, if you have two parts of an If...Then statement and the first returns False, VB.NET doesn't bother to look at the second part No Set - In VB6, we used the Set statement quite often - it was the one thing that set objects apart from any other regular data type. In VB.NET, everything is an object - so there's no need for it. If you do type it in, VB.NET currently removes it for you. How nice Property Declarations - Properties are now declared differently - no more separate Lets and Gets. Here's an example of a new property procedure... note that Value is now a keyword that always contains the value passed to this property. Public Property MachinePart() As StringSetmstrName = ValueEnd SetGetMachinePart = mstrNameEnd GetEnd Property Error Handling - Even error handling has changed in VB.NET. Here, you use a Try, Catch and Finally structure. The code within the Try block is run - if an error occurs, code in the Catch block is run. Whatever happens, the Finally block is always run. This is a strange concept to VB programmers yet is common practice to anyone familiar with C or Java. I recommend you use the VB.NET help index to find Error Handling, Overview - "Introduction to Exception Handling". Be sure to check out the 'Try...Catch...Finallystatement' section and test the example provided. Default ByVal - By default, all parameters are now passed 'by value' as opposed to 'by reference'. To be safe, make all declarations explicit It's No .Show - There's no longer a simple Form.Show method. Everything in VB.NET is an object - so you need to actually 'Dim FormName As New Form1', then do a 'FormName.Show' Control Arrays - Hasta la Vista, Guten Tag and all that, baby Garbage Collection - Although not a coding change, Garbage Collection is a process that runs when the operating system (slash .NET Framework) thinks it's time to clear up object references and such. So in VB6, when you set an object to Nothing, it immediately disappears from memory. However in VB.NET, this doesn't happen straight away - and your object may stay 'live' for a few minutes before being terminated by the Garbage Collector - so you can never be too sure when class termination code will run! Strange though it may seem, this 'nondeterministic finalization' does have its benefits - such as automatically correcting circular references. Check out the help for more (if you're really that interested <snore>) Return Keyword - Inside a function, instead of setting the function name to your return value or object, you can simply state "Return MyData" allowing you to perhaps change the function name without altering the actual code Top Tip: I can't hope to cover all of the syntax changes here, though hope to have presented what I deem to be the most important. To find out more on any particular subject, check the help. And of course, if you have any important additions - post a message at the feedback forum. Another Top Tip: - Don't forget, much of the old VB6 functionality is still available to you in VB.NET - simply refer to them via the Microsoft.VisualBasic.Compatibility.VB6 namespace. However, asever, it's better if you can move along to the newer, more generic functions. Page 6 of 7
http://www.developer.com/net/vb/article.php/10926_1540261_6/VBNET-Uncovered-Big-Changes.htm
CC-MAIN-2017-04
refinedweb
980
65.73
7.3 Primitive Types The primitive types are identified through keywords, which are aliases for predefined types in the System namespace. A primitive type is completely indistinguishable from the type it aliases: writing the reserved word Byte is exactly the same as writing System.Byte. Because a primitive type aliases a regular type, every primitive type has members. For example, Integer has the members declared in System.Int32. Literals can be treated as instances of their corresponding types. The primitive types differ from other structure types in that they permit certain additional operations: - Primitive types permit values to be created by writing literals. For example, 123Iis a literal of type Integer. - It is possible to declare constants of the primitive types. - When the operands of an expression are all primitive type constants, it is possible for the compiler to evaluate the expression at compile time. Such an expression is known as a constant expression. Visual Basic .NET defines the following primitive types: - The integral value types Byte (1-byte unsigned integer), Short (2-byte signed integer), Integer (4-byte signed integer), and Long (8-byte signed integer). These types map to System.Byte, System.Int16, System.Int32, and System.Int64, respectively. The default value of an integral type is equivalent to the literal 0. - The floating-point value types Single (4-byte floating point) and Double (8-byte floating point). These types map to System.Single and System.Double, respectively. The default value of a floating-point type is equivalent to the literal 0. - The Decimal type (16-byte decimal value), which maps to System.Decimal. The default value of decimal is equivalent to the literal 0D. - The Boolean value type, which represents a truth value, typically the result of a relational or logical operation. The literal is of type System.Boolean. The default value of the Boolean type is equivalent to the literal False. - The Date value type, which represents a date and/or a time and maps to System.DateTime. The default value of the Date type is equivalent to the literal # 01/01/0001 12:00:00AM #. - The Char value type, which represents a single Unicode character and maps to System.Char. The default value of the Char type is equivalent to the constant expression ChrW(0). - The String reference type, which represents a sequence of Unicode characters and maps to System.String. The default value of the String type is a null reference. See Also 7.1 Value Types and Reference Types | 7.6 Structures | 7.5 Classes | 7.7 Standard Modules | 7.8 Interfaces | 7.9 Arrays | 7.10 Delegates | 11.2 Constant Expressions | Data Type Summary (Visual Basic Language Reference) | Value Types and Reference Types (Visual Basic Language Concepts)
https://msdn.microsoft.com/en-us/library/aa711900(VS.71).aspx
CC-MAIN-2017-26
refinedweb
455
51.85
Asked by: Nagle under Windows XP Question Hi, I'm having problems getting the Nagle algorithm to work under WinXP (and Win2K), but it seems fine under Win7. I've written a simple program to test this as shown below. Basically, it opens a TCP connection to a hardware device at IP address 192.168.2.104 - port 1002. Then it deliberatly calls send() 1000 times sending 4 bytes at a time. I then monitor what happens 'on the wire' using Wireshark. Under Win7, Windows coalesses these multiple calls into larger internet packets correctly - per the Nagle spec such that there is only one ethernet packet "in-flight" at any one time. However, under WinXP and Win2K I get storms of very short packets - each typically 8 or 12 bytes long. So windows is merging some packets together, but it isn't following Nagle because its sending several tens of internet packets before the first ACK comes back from the other end. These packets are separated by only 4 or 5 microseconds on the wire. Everything i've read on the web says all versions of Windows (since NT4 at least) enable Nagle by default. Most web articles are about how to turn Nagle off for gaming. I've tried setsocketopt() with TCP_NODelay, but nothing seems to change the behaviour. I've searched my registry for keys which may be affecting this, but can't find anything. So - any ideas what's going wrong? Can I get XP to correctly implement Nagle? Cheers Malcolm ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ #include "stdafx.h" int main(int argc, char* argv[]) { WSADATA m_wsaData; SOCKET m_Socket; sockaddr_in m_SockAddr; DWORD nRet; int i; // Try to start the windows socket support if (WSAStartup(MAKEWORD(2,1),&m_wsaData) != 0) {return (1);} // Try to create an IP Socket m_Socket = WSASocket (AF_INET, SOCK_STREAM, IPPROTO_IP, NULL, 0, WSA_FLAG_OVERLAPPED); if (m_Socket == INVALID_SOCKET) {return (-1);} memset(&m_SockAddr, 0, sizeof(m_SockAddr)); m_SockAddr.sin_addr.S_un.S_addr = 0x6802A8C0; // 192.168.2.104 m_SockAddr.sin_family = AF_INET; m_SockAddr.sin_port = htons(1002); // Port 1002 if (connect(m_Socket, (sockaddr*)&m_SockAddr, sizeof(m_SockAddr) )) {return (WSAGetLastError());} char stNetCmd[] = {0x00,0x00,0x04,0x00}; for (i = 0; i < 1000; i++) { nRet = send( m_Socket, stNetCmd, sizeof(stNetCmd), 0 ); } return (0); } ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++Thursday, June 13, 2013 12:11 PM All replies Hi, to get help optimizing the code, you better turn to the msdn forums. Also chek which indicates an application should attempt coallescing data and not rely on winsock to do everyting. As far as I know, winsock performance is dependend on the nic driver and settings. It might be worth tryin another driver or even nic, and see if the issue still occurs. MCP/MCSA/MCTS/MCITPFriday, June 14, 2013 9:39 AM Thanks, Yes, i'm aware an applicaton should attempt to coalless, but i'm only responsible for the device driver and API DLL. The users write their own code and I can't control what they do. Also legacy stuff has to be supported. I suppose I'll have to start cacheing the send() requests in my DLL and/or driver. We have now verified the behaviour on several machines using different NIC's. They all behave correctly under Win7, and all fail under Win2K and WinXP. So I dom't think it's a NIC or driver problem, seems to be the WinXP TCP stack which I think is TCPIP.SYS. This appears to be a bug in the Windows XP TCPIP implementation of Nagle, which is why I'm asking here. Cheers Malcolm Friday, June 14, 2013 9:46 AM - Edited by MalcolmR1965 Friday, June 14, 2013 9:53 AM Hi, i would still recommend to turn to msdn to find other developers which might be experienced in this particular field. Here on technet, it are mostly infrastructure guys answering. One thing I can confirm: the windows TCP/Ip stack was heavily revised when Vista/2008 was released. Vista and up do have significant improvements. MCP/MCSA/MCTS/MCITPFriday, June 14, 2013 10:16 AM
https://social.technet.microsoft.com/Forums/en-US/1529c696-4562-4098-9fcd-681de82010c7/nagle-under-windows-xp?forum=itproxpsp
CC-MAIN-2020-45
refinedweb
661
63.9
Introduction About Rational Manual Tester IBM® Rational® Manual Tester (RMT in file or path names) is an Eclipse-based application that provides test case-related functions for manual testing. It is also well integrated with IBM® Rational® ClearQuest® test management features for test case management. Testers can use it to design manual test cases, associate test cases with Rational ClearQuest test plans, run those test cases, and report results, including any unresolved defects. About Rational Quality Manager IBM® Rational® Quality Manager (use RQM for short) is a collaborative, Web-based, comprehensive test planning and management tool based on the Jazz® platform. It is designed to be used by test teams to define the comprehensive test plan, construct and run the tests, reuse test cases and test scripts, exhibit test reports, and assist in test analysis and laboratory management. This single solution can replace IBM® Rational® Manual Tester, Rational ClearQuest test management features, and IBM® Rational® TestManager. Rational Manual Tester functional coverage on Rational Quality Manager Rational Manual Tester includes a test script design feature. The test script is stored as an .rmt file that shows the defined steps. There are four kinds of steps: normal steps, verification points, report points, and group (one group can include several steps). Figure 1 shows an example of a Rational Manual Tester test script. Figure 1. Rational Manual Tester test script Rational Quality Manager almost the same design functions as Rational Manual Tester, except for these differences: - Rational Quality Manager does not support group as a step type as Rational Quality Manager does. - Rational Quality Manager does not use .rmtfile to store test script, either. Figure 2 shows a Rational Quality Manager test script as a comparison. Figure 2. Rational Quality Manager test script Preparation for migration process Prepare Rational Manual Tester test scripts Figure 3 shows three test scripts in <RMT_Home>\SampleScripts: TutorialCreate.rmt TutorialReuse.rmt TutorialUpdate.rmt For this article, we use these three files to create a sample Rational Manual Tester project to show migration from that project, as well as to show migration directly from files. Figure 3. Rational Manual Tester files for migration Prepare the Rational Manual Tester project Rational Manual Tester project is used to organize test scripts, test logs, or other resources. When you use the RMT2RQM migration tool to choose files from a Rational Manual Tester project for migration, you need a project to show the process. Follow these steps to create a project: - In Rational Manual Tester, select File > New > Project to open the "Create New Project" window. - In the "Create New Project" window (Figure 4), provide this information: - Directory: Browse to the storage location for the project, Rational Manual Tester will create project under this folder. - Project Name: Type the name of your project. - Check Add Existing Files into Project?" to open another window so that you can add Rational Manual Tester files to the new project. - Click Next to continue to the next window, "Create New Project – Add Files to New Project." In that window, select Add Files. - In the "Select Files to Add" panel, navigate to this folder: <RMT_Home>\SampleScripts ("D:\Program Files\IBM\RMT70\SampleScripts. - Choose these three files, and then click Open to confirm the selection. - When you see those three files listed in the "Create New Project – Add Files to New Project" view, click Finished to create the project. - The new project will be added to the Project Explorer in Rational Manual tester. For this exercise, you will migrate the newly created project to Rational Quality Manager. Figure 4. Rational Manual Tester project for Migration Prepare a Rational Quality Manager project A Rational Quality Manager project is used to organize testing-related resources, such as the test plan, test cases, test scripts, defect reports, requirements information, and so forth. In this section, you will create a Rational Quality Manager project as a migration destination: - Log on to the Rational Quality Manager console and select Admin > Jazz Project Administration to open the Rational Quality Manager project management view (see Figure 5). - Select Create Project Area to open new project page. - In the Active Project Area field, type the name of your project (in this example: MigrationPrj). This is the only field that you must fill. - Click Save to create the project. Figure 5. Rational Quality Manager project Option A. Use the migration tool Install the migration tool - The migration installation package RMTMigration.zipfile is stored in <RQM_Home>\migration. Copy it to c:\temp. - Extract the zipped file under c:\temp\RMTMigration. - Open a Microsoft® Windows® command window and change to this folder: c:\temp\RMTMigration\rmt2rqm. - Run install_tool.batto install the migration tool (see Figure 6). Figure 6. Steps to install the migration tool Verify the installation of the migration tool - The migration tool will be installed, and an rmt2rqm.batfile, such as D:\Program Files\IBM\RMT70,will be added under <RMT_Home>. - Double-click the file rmt2rqm.bat file to launch the RMT to RQM Migration tool (RMT2RQM) so that you can start the migration (Figure 7). Figure 7. Steps to verify the installation Run the RMT2RQM migration tool to start the migration - Double-click <RMT_Home>\rmt2rqm.bat to launch the migration tool. - Add the Rational Quality Manager server information in the Migration Info Page view (see Figure 8). - RQM Server: The host name of Rational Quality Manager server, "localhost" if the Rational Quality Manager server and Rational Manual Tester migration tool is installed in the same machine; - Port: Rational Quality Manager Web service port, The default value is given at the opening of this panel. Often 9443. - User Name/Password: Rational Quality Manager user name and password, as a testing, ADMIN is used here; - Check box for "Make me the owner of the migrated assets": If the box is checked, the "User Name" field defines the owner of the migrated test scripts. Otherwise, migrated test scripts will not be assigned an owner and they will need to be assigned in the Rational Quality Manager console. - Click Next to connect to the Rational Quality Manager server, and navigate to the next window: Migration Options. - In the Migration Options view, set these properties: - Rational Manual Tester Migration Type: "Migration Non-Project Assets" or "Migrate Project Assets." - You can define a project in Rational Manual Tester and add .rmtfiles it for management. - When "Migrate Project Assets" is checked, the migration tool can list all .rmtfiles defined for projects as choices for migration. - When "Migrate Non-Project Assets" is checked, the migration tool can let you choose .rmtfiles from any folder for migration. - Check the box for Convert Group Statements to Steps. - In Rational Manual Tester, as a special testing step type, "Group" is used to quote a series of testing steps so as to make the testing description much like a programming code in order to make things clearer for readers, those steps quoted by the "Group" can be verification points, report points, normal steps, or sub-groups. However, Rational Quality Manager does not support Group as a testing step type. Therefore, there are two choices we can choose: - The first one is convert the "group" and "steps" quoted by it into a large one step, please uncheck "Convert Group Statements to Steps" to tell the migration tool of this choice. - The second one is convert the "group" and ""steps" quoted by it into multiple separated steps, please check "Convert Group Statements to Steps" to tell the migration tool of this choice. - Please refer to Figure 12 for a comparison of the check boxes. - Select Rational Quality Manager Project Area. The migration tool lists all projects defined in Rational Quality Manager for you to choose from. For this example, select MigrationPrj, as defined previously. - Click Next to continue. Figure 8. Steps when using the migration tool - There are two different sources of Rational Manual Tester files for migration: Non-Project Assets and Project Assets. Non-Project Assets. If you select Migrate Non-project Asset, the migration tool provides a panel where you can select files (Figure 9). You can then add .rmt files to the migration by following these steps: - Click Add Files to open the Select Files to Add window where you can choose files. - Navigate to the folder where you have stored the Rational Manual Tester files that you want to migrate (example: <RMT_Home>\SampleScripts), and choose any number of files. - Then click Open to confirm the selection and return to the Migrate Assets page. - Click Next to continue the migration. Figure 9. Non-Project Assets (choose files from the file location) Project Assets. If you select Migrate Project Asset, the migration tool will provide a project selection panel (Figure 10). You can include Rational Manual Tester project files in the migration by following these steps: - Click Add Project to open the "Select Project to Add" view to choose a project. - In the "Select Project to Add" window, expand folders and locate where the Rational Manual Tester project that you want to migrate is stored. For example, we created a new project under c:\temp\named RmtPrjMigrationSrc, so click c:\temp\ RmtPrjMigrationSrc and then click OK to confirm the selection and return to the Migrate Project page. - Rational Manual Tester files under the selected project will then listed in the panel. If there are files that you do not want to include in the migration, choose those files and use Remove to delete them from the list. - Click Next to continue the migration. Figure 10. How to choose files from Project Assets Larger view of Figure 10. - In the next window, click Finish to start the migration. When the progress panel shows that the migration is finished, the migration report will show; just check it and then close it. You have finished the migration. Check the migration result - Check the number and title: - Log on to Rational Quality Manager (Figure 11). - Open the MigrationPrj project. - Click Construction in the left panel, and then click View test scripts to check how many test scripts have migrated into it and what the test script IDs are. (The number should be correct, and the title for every test script should be correct.) Figure 11. Check the migrated test scripts Larger view of Figure 11. - Check the contents of the test scripts: - Open the TutorialCreate tab to check the scripts (Figure 12). - There is a comparison of the Rational Manual Tester source and migrated Rational Quality Manager test scripts. - When "Convert Group Statements to Steps" is checked or unchecked, the migrated result is different. - Top picture, the test script source. A group is included and will be converted into different steps according to Group Conversion Type. - Bottom-left picture.Checked means to convert group line and any other inner lines into separate steps. - Bottom-right picture.Unchecked means to combine the group line and all of its inner lines into one step. Figure 12. Test script contents and Group conversion comparison Larger view of Figure 12. Option B. Export from Rational Manual Tester, import into Rational Quality Manager Rational Quality Manager provides batch import toolkits to import the sample data by batch. These toolkits can be used as an alternative method for RMT2RQM migration. In this method, you export the Rational Manual Tester files as XML files by using the Rational Manual Tester export function. Then you need to update those XML files to match the format requirement of Rational Quality Manager Importer. After that, you use the import toolkits to import those XML files into your Rational Quality Manager project. Sample data and batch import toolkits introduction The Rational Quality Manager sample data files are stored under <RQM_home>\samples\classics in XML format. These files, such as Classics_TP.xml, are the resources predefined as sample data, and they can be imported into Rational Quality Manager. The batch file named install_samples.bat is used to import XML files into Rational Quality Manager ( install_samples.sh is for the Linux® operating system). In these batch files, the import toolkits are used to import XML files into Rational Quality Manager. See Figure 13 for the sample files provided by Rational Quality Manager. The Rational Quality Manager import toolkits are installed under RQM_home\tools\import (Figure 14). Figure 13. Sample data files in Rational Quality Manager Figure 14. Rational Quality Manager import toolkits Export XML file from Rational Manual Tester - From the Rational Manual Tester menu, select File > Export Test Assets to open the Export window (Figure 15). - In the "Manual Tester Export" view: - Click Add" to add files to be exported. - Choose a destination folder where you want to store the exported XML files. - Click Finish to export the selected files into XML files. Figure 15. Steps to export Rational Manual Tester files to XML files Larger view of Figure 15. Update exported XML files to match the importer format requirement Figure 16 shows a sample of a simple test script that matches the format required for the Rational Quality Manager importer tool. Every element in this sample is mandatory for the importer. Therefore, you need to change the differences in the exported Rational Manual Tester files. Figure 16. Sample XML for the Rational Quality Manager importer Difference between exported scripts and the ample XML for the importer There are a few differences between the Rational Manual Tester exported XML files and the format for the Rational Quality Manager importer. - The XML namespace attribute (xmlns) has not been defined in the Rational Manual Tester exported XML file. - "Type" is used to define a step rather than "type." - "Group" is defined in Rational Manual Tester exported XML but not supported by the Rational Quality Manager importer. - Every step is tagged by the first Type='Group'(Root Group) rather than using <steps>. You must fix those differences before import the files into Rational Quality Manager. Figure 17. Exported XML from Rational Manual Tester Change exported scripts to match the format of the importer - Add xmlns= the <testscript>tag. - Delete the first "Group" (it is the root Group). - Find the first line that starts with <step>. - Keep the line that includes the <title>tag. - Delete any line until you find another <step>tag. As Figure 18 shows, delete the lines marked with gray. Figure 18. Erase First Group - Change every other "groups" and those "steps" quoted by the group into multiple-separated steps to avoid the group and its steps being translated into one single large step by the importer: - Change Type="group"into Type="simple"(see Figure 19). - Insert a "</step> " tag ahead ofthe first "<step>" tag inside the group(it has now been changed to "simple" already in step A). - Delete any </step>line that is followed by another </step>tag. Note: A and B is used to destroy the start tag of a group and change the group description into one step description; C is used to destroy the end tag of a group; If you do not make these changes, any statement quoted with "group" will be converted into a single, normal step. Figure 19. Replace "group" with "simple" - And <steps>above the first <step>tag and </steps>below the last </step>tag. - Replace any "Type"with "type". Other comments: type="sample", normal steps type="vp", verification points type="rp", report points Use the Rational Quality Manager importer to import one script Code Listing 1 shows the command format. Listing 1. Command for import action "<RQM_Home> \tools\import\import.bat" /S "<RQM_Host:port> " /U <UserName> /P <Password> /A <RQM_Project_as_destination> /T testscript /F <xml_file_to_be_imported> /N <New_TestCaseID_in_RQM> Command description: - <RQM_Home>: Rational Quality Manager installation path, such as D:\Program Files\IBM\RQM - <RQM_Host:port>: Rational Quality Manager host name and port, such as - <UserName>: Rational Quality Manager console user name, such as ADMIN - <Password>: Password for <UserName> - <RQM_Project_as_destination>: Project in Rational Quality Manager, must be defined previous of the importing, such as MigrationPrj - <xml_file_to_be_imported>: Files prepared for the import action, such as C:\temp\export_Migration\TutorialCreateScript.xml(the file must match the format required by importer) - <New_TestCaseID_in_RQM>: This ID is not mandatory, but it is needed if a test case is imported using the Rational Quality Manager importer and the importer associates this test script with the test case. For example, it is needed if you want to create a relationship between a test case and test script by using Rational Quality Manager importer when you import them. The value can be 1, 2, or any string, such as the file name. Listing 2 shows an example of a command. Listing 2. Example command with full parameters "D:\Program Files\IBM\RQM\tools\import\import.bat" /S "" /U ADMIN /P ADMIN /A MigrationPrj /T testscript /F "C:\temp\export_Migration\TutorialCreateScript.xml" /N "TutorialCreateScript.xml " Check the result of importing Open the test script in Rational Quality Manager (Figure 20) to check these field values: - Title in XML is the test script title in Rational Quality Manager - Step in XML will be one line in Rational Quality Manager (the description of the step in XML is mandatory, because it is the step description in Rational Quality Manager) Figure 20. Check the import result Larger view of Figure 20. Benefits and limitations of these two methods As described in the previous sections, the two methods of migration from Rational Manual Tester to Rational Quality Manager are significantly different. Table 1 summarizes the advantages and disadvantages and offers suggestions based on our experience. Table 1. Benefits and limitations summary Resources Learn - Useful information that is related to this article: -) - For Managing your first project with IBM Rational Quality Manager (October 2008) - Browse the IBM Quality Management page to learn more about what is available. - the Rational TestManager forum on developerWorks. -.
http://www.ibm.com/developerworks/rational/library/09/migratefrommanualtestertoqualitymanager/
CC-MAIN-2014-23
refinedweb
2,940
53.61
Source code for pyro.ops.dual_averaging from __future__ import absolute_import, division, print_function[docs]class DualAveraging(object): """ :math:``` and ``kappa`` is :param float prox_center: A "prox-center" parameter introduced in :math:`[1]` which pulls the primal sequence towards it. :param float t0: A free parameter introduced in :math:`[2]` that stabilizes the initial steps of the scheme. :param float kappa: A free parameter introduced in :math:`[2]` that controls the weights of steps of the scheme. For a small ``kappa``, the scheme will quickly forget states from early steps. This should be a number in :math:`(0.5, 1]`. :param float gamma: A free parameter which controls the speed of the convergence of the scheme. """ def __init__(self, prox_center=0, t0=10, kappa=0.75, gamma=0.05): self.prox_center = prox_center self.t0 = t0 self.kappa = kappa self.gamma = gamma self._x_avg = 0 # average of primal sequence self._g_avg = 0 # average of dual sequence self._t = 0[docs] def step(self, g): """ Updates states of the scheme given a new statistic/subgradient ``g``. :param float g: A statistic calculated during an MCMC trajectory or subgradient. """ self._t += 1 # g_avg = (g_1 + ... + g_t) / t self._g_avg = (1 - 1/(self._t + self.t0)) * self._g_avg + g / (self._t + self.t0) # According to formula (3.4) of [1], we have # x_t = argmin{ g_avg . x + loc_t . |x - x0|^2 }, # where loc_t := beta_t / t, beta_t := (gamma/2) * sqrt(t) self._x_t = self.prox_center - (self._t ** 0.5) / self.gamma * self._g_avg # weight for the new x_t weight_t = self._t ** (-self.kappa) self._x_avg = (1 - weight_t) * self._x_avg + weight_t * self._x_t
http://docs.pyro.ai/en/0.2.1-release/_modules/pyro/ops/dual_averaging.html
CC-MAIN-2018-51
refinedweb
263
54.69
dependency “merb-cache” do Merb::Cache.setup do register(:memcached, MemcachedStore, :namespace => "my_app", :servers => ["127.0.0.1:11211"]) end end # a default FileStore dependency “merb-cache” do Merb::Cache.setup do register(FileStore) end end # another FileStore dependency “merb-cache” do Merb::Cache.setup do register(:tmp_cache, FileStore, :dir => "/tmp") end end end def # lets keep the popularity rating cached for 30 seconds # merb-cache will create a key from the model's id & the interval parameter Merb::Cache[:memcached].fetch(self.id, :interval => Time.now.to_i / 30) do self. end end end Or, if you want to use memcache’s built in expire option: # expire a cache entry for “bar” (identified by the key “foo” and # parameters => :bay) in two hours Merb::Cache.write(“foo”, “bar”, => :bay, :expire_in => 2.hours) # this will fail, because FileStore cannot expire cache entries Merb::Cache.write(“foo”, “bar”, => :bay, :expire_in => 2.hours) # writing to the FileStore will fail, but the MemcachedStore will succeed Merb::Cache[:default, :memcached].write(“foo”, “bar”, => :bay, :expire_in => 2.hours) # this will fail Merb::Cache[:default, :memcached].write_all(“foo”, “bar”, => :bay, :expire_in => 2.hours) Setting up strategy stores is very similar to fundamental stores: Merb::Cache.setup do #(:secured, SHA1Store[GzipStore[FileStore], FileStore], :dir => Merb.root / "private") end You can use these strategy stores exactly like fundamental stores in your app code. Action & Page Caching Action & page caching have been implemented in strategy stores. So instead of manually specifying which type of caching you want for each action, you simply ask merb-cache to cache your action, and it will use the fastest cache available. First, let’s setup our page & action stores: config/environments/development.rb: class Tags < Merb::Controller # index & show will be page cached to the public dir. The index # action has no parameters, and the show parameter's are part of # the URL, making them both page-cache'able cache :index, :show def index render end def show(:slug) display Tag.first(:slug => slug) end end Our controller now page caches but the index & show action. Furthermore, the show action is cached separately for each slug parameter automatically. class Tags < Merb::Controller # the term is a route param, while the page & per_page params are part of the query string. # If only the term param is supplied, the request can be page cached, but if the page and/or # per_page param is part of the query string, the request will action cache. cache :catalog def catalog(term = 'a', page = 1, per_page = 20) @tags = Tag.for_term(term).paginate(page, per_page) display @tags end end Because the specific type of caching is not specified, the same action can either be page cached or action cached depending on the context of the request. Keeping a “Hot” Cache Cache expiration is a constant problem for developers. When should content be expired? Should we “sweep” stale content? How do we balance serving fresh content and maintaining fast response times? These are difficult questions for developers, and are usually answered with ugly code added across our models, views, and controllers. Instead of designing an elaborate caching and expiring system, an alternate approach is to keep a “hot” cache. So what is a “hot” cache? A hot cache is what you get when you ignore trying to manually expire content, and instead focus on replacing old content with fresh data as soon as it becomes stale. Keeping a hot cache means no difficult expiration logic spread out across your app, and will all but eliminate cache misses. The problem until now with this approach has been the impact on response times. If the request has to wait on any pages that it has made stale to render the fresh version, it can slow down the response time dramatically. Thankfully, Merb has the run_later method which allows the fresh content to render after the response has been sent to the browser. It’s the best of both worlds. Here’s an example. class Tags < Merb::Controller cache :index eager_cache :create, :index def index display Tag.all end def create(slug) @tag = Tag.new(slug) # redirect them back to the index action redirect url(:tags) end end The controller will eager_cache the index action whenever the create action is successfully called. If the client were to post a new tag to the create action, they would be redirect back to the index action. Right after the response had been sent to the client, the index action would be rendered with the newly created tag included and replaced in the cache. So when the user requests for the index action gets to the server, the freshest version is already in the cache, and the cache miss is avoided. This works regardless of the way the index action is cached. Hot cache helps fight dog pile effect (highscalability.com/strategy-break-memcache-dog-pile).
https://www.rubydoc.info/gems/merb-cache/1.1.3
CC-MAIN-2021-21
refinedweb
808
57.06
lcd_hd44.c File ReferenceLM044L type LCD hardware module (impl. More... #include "lcd_hd44.h" #include "hw/hw_lcd.h" #include "cfg/cfg_arch.h" #include <drv/timer.h> #include <cfg/debug.h> Go to the source code of this file. Detailed DescriptionLM044L type LCD hardware module (impl. ) - Version: - Id - lcd_hd44.c 2506 2009-04-15 08:29:07Z duplo Definition in file lcd_hd44.c. Function Documentation Write the character c on display address addr. NOTE: argh, the HD44 lcd type is a bad beast: our move/write -> write optimization requires this mess because display lines are interleaved! Definition at line 340 of file lcd_hd44.c. Remap the glyph of a character. glyph - bitmap of 8x8 bits. code - must be 0-7 for the Hitachi LCD-II controller. Definition at line 365 of file lcd_hd44.c. Variable Documentation Current display position. We remember this to optimize LCD output by avoiding to set the address every time. Definition at line 136 of file lcd_hd44.c.
http://doc.bertos.org/2.2/lcd__hd44_8c.html
crawl-003
refinedweb
160
72.53
hg — Mercurial source code management system Examples (TL;DR) - Execute Mercurial command: hg command - Call general help: hg help - Call help on a command: hg help command - Check the Mercurial version: hg --version tldr.sh ) - - - --pager <TYPE> when to paginate (boolean, always, auto, or never) (default: auto) [+] marked option can be specified multiple times Commands Repository creation clone make a copy of an existing repository:.. - Note Specifying a tag will include the tagged changeset but not the changeset containing the tag. or inline from the same stream. When this is done, hooks operating on incoming changesets and changegroups may fire more than once, once for each pre-generated bundle and as well as for any additional remaining data.: hg clone project/ project-feature/ clone from an absolute path on an ssh server (note double-slash): hg clone ssh://user@server//home/projects/alpha/ do a streaming clone while checking out a specified version: hg clone --stream ose, status is also displayed for each bookmark like below: BM1 01234567890a added BM2 1234567890ab advanced BM3 234567890abc diverged BM4 34567890abcd changed The action taken locally when pulling depends on the status of each bookmark: - added pull will create it - advanced pull will update it - diverged pull will create a divergent bookmark - changed result depends on remote changesets From the point of view of pulling behavior, bookmark existing only in the remote repository are treated as added, even if it is in fact locally deleted. For remote repository, using -: BM1 01234567890a added BM2 deleted BM3 234567890abc advanced BM4 34567890abcd diverged BM5 4567890abcde changed The action taken when pushing depends on the status of each bookmark: -:: - -f, --force force push - -r,--rev <REV[+]> a changeset intended to be included in the destination - -B,--bookmark <BOOKMARK[+]> bookmark to push - commit commit the specified files or all outstanding changes: -: Reverse the effect of the parent of the working directory. This backout will be committed immediately: hg backout -r . Reverse the effect of previous bad revision 23: hg backout -r 23 Reverse the effect of previous bad revision 23 and leave changes uncommitted:: - -]... REV... - -r 234 . Options: - : - -f, --force force a merge including outstanding changes (DEPRECATED) - -r,--rev <REV> revision to merge - -P, --preview review revisions to merge (no merge is performed) - --abort abort the ongoing merge - -t,--tool <TOOL> specify merge tool Change organization bookmarks create a new bookmark or list existing bookmarks: hg bookmarks [OPTIONS]... [NAME]....: hg branch [-fC] : - -f, --force set branch name even if it shadows an existing branch - -C, --clean reset branch name to parent branch name - -r,--rev <VALUE[+]> change branches of the given revs (EXPERIMENTAL) [+] marked option can be specified multiple times branches list repository named branches: hg branches [-c][+]> revision cat output the current or given revision of files: hg cat [OPTION]... FILE...: - %%: <PATTERN[+]> include names matching the given patterns - -X,--exclude <PATTERN[+]> exclude names matching the given patterns - -n, --dry-run do not perform actions, just print output [+] marked option can be specified multiple times aliases: cp diff diff repository (or selected files): hg diff [OPTION]... ([-c REV] | [-r REV1 [-r REV2]]) [FILE]... Show differences between revisions for the specified files. Differences between files are shown using the unified diff format. - Note h <REV[+]> revision - -c,--change <REV> change made by revision - - -S, --subrepos recurse into subrepositories [+] marked option can be specified multiple times: - -0, --print0 end fields with NUL - --all print all revisions that match (DEPRECATED) - --diff search revision differences for when the pattern was added or removed - [+]>: revisions.bisect for more about the bisect() predicate. Returns 0 on success. Options: - STARTREV] [REV]...: - ] - -L,--line-range <FILE,RANGE[+]> follow line range of specified file (EXPERIMENTAL) - --removed include revisions where files were removed - -m, --only-merges show only merges (DEPRECATED) (use -r "merge()" instead) - ):. This command is deprecated, please use hg heads instead. Returns 0 on success. Options: - -p, --patch show patch - -g, --git use git extended diff format - --style <STYLE> display using template map file (DEPRECATED) - -T,--template <TEMPLATE> display with template Working directory management add add the specified files on the next commit: hg add [OPTION]... [FILE]...: - ]... Add all new files and remove all missing files from the repository. Unless names are given, new files are ignored if they match any of the patterns in .hgignore. As with add, these changes take effect at the next commit. Use the -s/--similarity option to detect renamed files. This option takes a percentage between 0 (disabled) and 100 (files must be identical) as its parameter. With a parameter greater than 0, this compares every removed file with every added file and records those similar enough as renames. forget forget the specified files on the next commit: hg forget [OPTION]... FILE...: forget newly-added binary files: hg forget "set:added() and binary()" forget files that would be excluded by .hgignore: hg forget "set:hgignore()" Returns 0 on success. Options: - -i, --interactive use interactive mode - -I,--include <PATTERN[+]> include names matching the given patterns - -X,--exclude <PATTERN[+]> exclude names matching the given patterns - -n, --dry-run do not perform actions, just print output [+] marked option can be specified multiple times locate locate files matching specific patterns (DEPRECATED):. remove remove the specified files on the next commit: hg remove [OPTION]... FILE...: - shelve save and set aside changes from the working directory: hg shelve [OPTION]... [FILE]...: - - -t,--terse <VALUE> show the terse output (EXPERIMENTAL) (default: nothing) - ]... [FILE]... [-n SHELVED] (when no files are specified,: - ] REV]: hg export [OPTION]... [-o OUTFILESPEC] [-r] [REV]...: - -B,--bookmark <BOOKMARK> export changes only reachable by given bookmark - -o,--output <FORMAT> print output to file with formatted name - --switch-parent diff against the second parent - -r,--rev <REV[+]> revisions to export - -a, --text treat all files as text - -g, --git use git extended diff format - --binary generate binary diffs in git mode (default) - --nodates omit dates from diff headers - -T,--template <TEMPLATE> display with template [+] marked option can be specified multiple times import import an ordered set of patches: hg import [OPTION]... PATCH... Import a list of patches and commit them individually (unless --no-commit is specified). To read a patch from standard input (stdin), import patches from stdin: hg import - attempt to exactly restore an exported changeset (not always possible): hg import --exact proposed-fix.patch use an external tool to apply a patch which is too fuzzy for the default internal tool. change the default fuzzing from 2 to a less strict 7 Returns 0 on success, 1 on partial success (see --partial). Options: - -p,--strip <NUM> directory strip option for patch. This has the same meaning as the corresponding patch option (default: ) - -b,--base <PATH> base path (DEPRECATED) - recover roll back an interrupted transaction: hg recover Recover from an interrupted commit or pull. This command tries to fix the repository status after an interrupted operation. It should only be necessary when Mercurial suggests it. Returns 0 if successful, 1 if nothing to recover or verify fails. Options: - --verify run hg verify after succesful recover (default: ) rollback roll back the last transaction (DANGEROUS) (DEPRECATED): hg rollback Please use hg commit --amend instead of rollback to correct mistakes in the last commit.. - -f, --force ignore safety measures verify verify the integrity of the repository:: - -. Template: The following keywords are supported. See also hg help templates. - name String. Config name. - source String. Filename and line number where the item is defined. - value String. Config value. Returns 0 on success, 1 if NAME does not exist. Options: - -u, --untrusted show untrusted configuration options - -e, --edit edit user config - -l, --local edit repository config - -g, --global edit global config - -T,--template <TEMPLATE> display with template aliases: showconfig debugconfig show help for a given topic or a help overview: hg help [-eck] [-s PLATFORM] [TOPIC] With no arguments, print a list of commands with short help messages. Given a topic, extension, or command name, print help for that topic. Returns 0 if successful. Options: - -e, --extension show only help for extensions - -c, --command show only help for commands - -k, --keyword show topics matching keyword - . Colorizing Outputs Mercur.. Mode Mercurial can use various systems to display color. The supported modes are ansi, win32, and terminfo. See hg help config.color for details about how to control the mode. Effects. Labels Custom colors Deprecated Features Mercurial evolves over time, some features, options, commands may be replaced by better and more secure alternatives. This topic will help you migrating your existing usage and/or configuration to newer features. Commands. Options - web.allowpull Renamed to allow-pull. - web.allow_push Renamed to allow-push., see hg help config.ui.editor) -, see hg help config.ui.merge) -.) - blackbox log repository events to a blackbox for debugging - bugzilla hooks for integrating with the Bugzilla bug tracker - censor erase file content at a given revision - churn command to display statistics about repository history - - githelp try mapping git commands to Mercurial commands - gpg commands to sign and verify changesets - hgk browse the repository in a graphical way - highlight syntax highlighting for hgweb (requires Pygments) - histedit interactive history editing - keyword expand keywords in tracked files - largefiles track large binary files - mq manage a stack of patches - notify hooks for sending email push notifications - - strip strip changesets and their descendants from history - transplant command to transplant changesets from another branch - win32mbcs allow the use of MBCS paths with problematic encodings -. - Deprecated Feature removed from documentation, but not scheduled for removal. -. - Experimental Feature that may change or be removed at a later date. - ^. To get the same effect with glob-syntax, you have to use rootglob./ overwritten. Commands and URLs The following web commands and their URLs are available: /annotate/{revision}/{path}. . Technical Implementation Topics To access a subtopic, use "hg help internals.{subtopic-name}" -.. File Name Patterns Mercur, revisions and each corresponding phase: hg log --template "{rev} {phase}\n" resynchronize draft changesets relative to a remote repository: hg phase -fd "outgoing(URL)" See hg help phase for more information on manually manipulating phases.. - extinct() Obsolete changesets with obsolete descendants only. -. - successors(set) All successors for set, including the given set themselves -,. However, if you specify the full path of a file in a subrepo, it will be added even without -S/--subrepos specified.repos being specified.. Push is a no-op for Subversion subrepositories. -repos. Git and. - changessincelatesttag Integer. All ancestors not in the latest tag. -. - graphnode String. The character representing the changeset node in an ASCII revision graph. - graphwidth Integer. The width of the graph drawn by 'log --graph' or zero. - index Integer. The current iteration of the loop. (0 indexed) -. - p1 Changeset. The changeset's first parent. {p1.rev} for the revision number, and {p1.node} for the identification hash. - p', Filters. (EXPERIMENTAL) - : - Deny list for branches (section acl.deny.branches) - Allow list for branches (section acl.allow.branches) - Deny list for paths (section acl.deny) - Allow list for paths (section acl.allow) The allow and deny sections take key - an asterisk, to match anyone; You can add the "!" prefix to a user or group name to invert the sense of the match. Path-based Access Control Use the acl.deny and acl.allow sections to have path-based access control. Keys in these sections accept a subtree pattern (with a glob syntax by default). The corresponding values follow the same syntax as the other sections above.." and "@hg-denied" - see acl.deny above) # will have write access to any file under the "resources" folder # (except for 1 file. See acl.deny): src/main/resources/** = * .hgtags = release_engineer Examples using the ! prefix Suppose there's a branch that only a given user (or group) should be able to push to, and you don't want to restrict access to any other branch that may be created. The "!" prefix allows you to prevent anyone except a given user or group to push changesets in a given branch or path. In the examples below, we will: 1) Deny access to branch "ring" to anyone but user "gollum" 2) Deny access to branch "lake" to anyone but members of the group "hobbit" 3) Deny access to a file to anyone but user "gollum" [acl.allow.branches] # Empty [acl.deny.branches] # 1) only 'gollum' can commit to branch 'ring'; # 'gollum' and anyone else can still commit to any other branch. ring = !gollum # 2) only members of the group 'hobbit' can commit to branch 'lake'; # 'hobbit' members and anyone else can still commit to any other branch. lake = !@hobbit # You can also deny access based on file paths: [acl.allow] # Empty [acl.deny] # 3) only 'gollum' can change the file below; # 'gollum' and anyone else can still change any other file. /misty/mountains/cave/ring = !gollum] track = command, commandfinish, commandexception, exthook, pythonhook [blackbox] track = incoming [blackbox] # limit the size of a log file maxsize = 1.5 MB # rotate up to N log files when the current one gets too big maxfiles = 3 bugzilla hooks for integrating with the Bugzilla bug tracker. Four basic modes of access to Bugzilla are provided: - Access via the Bugzilla REST-API. Requires bugzilla 5.0 or later. - Access via the Bugzilla XMLRPC interface. Requires Bugzilla 3.4 or later. - Check data via the Bugzilla XMLRPC interface and submit bug change via email to Bugzilla email interface. Requires Bugzilla 3.4 or later. -. Only adding comments is supported in this access mode... - for update in changeset commit message. It must contain one "()" Bug 1234, Bug no. 1234, Bug number 1234, Bugs 1234,5678, Bug 1234 and 5678 and variations thereof, followed by an hours number prefixed by h or hours, e.g. hours 1.5. Matching is case insensitive. - bugzilla.fixregexp Regular expression to match bug IDs for marking fixed in changeset commit message. This must contain a "()" Fixes 1234, Fixes bug 1234, Fixes bugs 1234,5678, Fixes 1234 and 5678 and variations thereof, followed by an hours number prefixed by h or hours, e.g. hours 1.5. Matching is case insensitive. - bugzilla.fixstatus The status to set a bug to when marking fixed. Default RESOLVED. - bugzilla.fixresolution The resolution to set a bug to when marking fixed. Default FIXED. -.. censor erase file content at a given revision The censor command instructs Mercurial to erase all content of a file at a given revision without updating the changeset hash. This allows existing history to remain valid while preventing future clones/pulls from receiving the erased data. Typical uses for censor are due to security or legal requirements, including: * Passwords, private keys, cryptographic material * Licensed data/code/libraries for which the license has expired * Personally Identifiable Information or other private data Censored nodes can interrupt mercurial's typical operation whenever the excised data needs to be materialized. Some commands, like hg cat/hg revert, simply fail when asked to produce censored data. Others, like hg verify and hg update, must be capable of tolerating censored data to continue to function in a meaningful way. Such commands only tolerate censored file revisions if they are allowed by the "censor.policy=ignore" config option.. Cloning can be a CPU and I/O intensive operation on servers. Traditionally, the server, in response to a client's request to clone, dynamically generates a bundle containing the entire repository content and sends it to the client. There is no caching on the server and the server will have to redundantly generate the same outgoing bundle in response to each clone request. For servers with large repositories or with high clone volume, the load from clones can make scaling the server challenging and costly.". Instead of the server generating full repository bundles for every clone request, it generates full bundles once and they are subsequently reused to bootstrap new clones. The server may still transfer data at clone time. However, this is only data that has been added/changed since the bundle was created. For large, established repositories, this can reduce server load for clones to less than 1% of original. server). - A process for keeping the bundles manifest in sync with available bundle files. Strictly speaking, using a static file hosting server isn't required: a server operator could use a dynamic service for retrieving bundle data. However, static file hosting services are simple and scalable and should be sufficient for most needs. Bundle files can be generated with the hg bundle command. Typically hg bundle --all is used to produce a bundle of the entire repository. hg debugcreatestreamclonebundle can be used to produce a special streaming clonebundle. These are bundle files that are extremely efficient to produce and consume (read: fast). However, they are larger than traditional bundle formats and require that clients support the exact set of repository data store formats in use by the repository that created them. Typically, a newer server can serve data that is compatible with older clients. However, streaming clone bundles don't have this guarantee. Server operators need to be aware that newer versions of Mercurial may produce streaming clone bundles incompatible with older Mercurial versions.. Keys in UPPERCASE are reserved for use by Mercurial and are defined below. All non-uppercase keys can be used by site installations. An example use for custom properties is to use the datacenter attribute to define which data center a file is hosted in. Clients could then prefer a server in the data center closest to them.. - REQUIRESNI Whether Server Name Indication (SNI) is required to connect to the URL. SNI allows servers to use multiple certificates on the same IP. It is somewhat common in CDNs and other hosting providers. Older Python versions do not support SNI. Defining this attribute enables clients with older Python versions to filter this entry without experiencing an opaque SSL failure at connection time. If this is defined, it is important to advertise a non-SNI fallback URL or clients running old Python releases may not be able to clone with the clonebundles facility. Value should be "true". -.clonebundleprefers config option). The client then attempts to fetch the bundle at the first URL in the remaining list. Errors when downloading a bundle will fail the entire clone operation: clients do not automatically fall back to a traditional clone. The reason for this is that if a server is using clone bundles, it is probably doing so because the feature is necessary to help it scale. In other words, there is an assumption that clone load will be offloaded to another service and that the Mercurial server isn't responsible for serving this clone load. If that other service experiences issues and clients start mass falling back to the original Mercurial server, the added clone load could overwhelm the server due to unexpected load and effectively take it offline. Not having clients automatically fall back to cloning from the original server mitigates this scenario. Because there is no automatic Mercurial server fallback on failure of the bundle hosting service, it is important for server operators to view the bundle hosting service as an extension of the Mercurial server in terms of availability and service level agreements: if the bundle hosting service goes down, so does the ability for clients to clone. Note: clients will see a message informing them how to bypass the clone bundles facility when a failure occurs. So server operators should prepare for some people to follow these instructions when a failure occurs, thus driving more load to the original Mercurial server when the bundle hosting service fails. commands convert convert a foreign SCM repository to a Mercurial one.: hg convert [OPTION]... SOURCE [DEST [REVMAP]] Accepted source formats [identifiers]: - Mercurial [hg] - CVS [cvs] - Darcs [darcs] - git [git] - Subversion [svn] - Monotone [mtn] - GNU Arch [gnuarch] - Bazaar [bzr] - Perforce [p4] Accepted destination formats [identifiers]: - Mercurial [hg] -. - --closesort try to move closed revisions as close as possible to parent branches, (e.g.:. The default if there are no include statements is to include everything. If there are any include statements, nothing else is included. The exclude directive causes files or directories to be omitted. The rename directive renames a file or directory if it is converted. To rename from a subdirectory into the root of the repository, use . as the path to rename to. --full will make sure the converted changesets contain exactly the right files with the right content. It will make a full conversion of all files, not just the ones that have changed. Files that already are correct will not be changed. This can be used to apply filemap changes when converting incrementally. This is currently only supported for Mercurial and Subversion. new branch name. a boolean argument and defaults to False. - convert.hg.startrev specify the initial Mercurial revision. The default is 0. - convert.hg.revs revset specifying the source revisions to convert.. -]+)}} - convert.localtimezone use local time (as determined by the TZ environment variable) for changeset date/times. The default is False (use UTC). - hooks.cvslog Specify a Python function to be called at the end of gathering the CVS log. The function is passed a list with the log entries, and can modify the entries in-place, or add or delete them. - hooks.cvschangesets Specify a Python function to be called after the changesets are calculated. - convert.localtimezone use local time (as determined by the TZ environment variable) for changeset date/times. The default is False (use UTC). Source history can be retrieved starting at a specific revision, instead of being integrally converted. Only single branch conversions are supported. - convert.svn.startrev specify start Subversion revision number. The default is 0. Git Source The Git importer converts commits from all reachable branches (refs in refs/heads) and remotes (refs in refs/remotes) to Mercurial. Branches are converted to bookmarks with the same name, with the leading 'refs/heads' stripped. Git submodules are converted to Git subrepos in Mercurial. The following options can be set with --config: - convert.git.similarity specify how similar files modified in a commit must be to be imported as renames or copies, as a percentage between 0 (disabled) and 100 (files must be identical). For example, 90 means that a delete/add pair will be imported as a rename if more than 90% of the file hasn't changed. The default is 50. - convert.git.findcopiesharder while detecting copies, look at all files in the working copy instead of just changed ones. This is very expensive for large projects, and is only effective when convert.git.similarity is greater than 0. The default is False. - convert.git.p4.encoding specify the encoding to use when decoding standard output of the Perforce command line tool. The default is default system encoding. - convert.p4.startrev specify initial Perforce revision (a Perforce changelist number). Mercurial Destination The Mercurial destination will recognize Mercurial subrepositories in the destination directory, and update the .hgsubstate file automatically if the destination subrepositories contain the <dest>/<sub>/.hg/shamap file. Converting a repository with subrepositories requires converting a single repository at a time, from the bottom up. An example showing how to convert a repository with subrepositories: # so convert knows the type when it sees a non empty destination $ hg init converted $ hg convert orig/sub1 converted/sub1 $ hg convert orig/sub2 converted/sub2 $ hg convert orig converted. - convert.hg.sourcename records the given string as a 'convert_source' extra value on each commit made in the target repository. The default is None. - directory. The .hgeol file use the same syntax as all other Mercurial configuration files. It uses two sections, [patterns] and [repository]. The [patterns] section specifies how line endings should be converted between the working directory behavior; directory, e.g. by updating to null and back to tip to touch all files. The extension uses an optional [eol] section read from both the normal Mercurial configuration files and the .hgeol file, with the latter overriding the former. You can use that section to control the overall behavior. There are three settings: - eol.native (default os.linesep) can be set to LF or CRLF to override the default interpretation of native for checkout. This can be used with hg archive on Unix, say, to generate an archive where files have line endings for Windows. -. - eol.fix-trailing-newline (default False) can be set to True to ensure that converted files end with a EOL character (either \n or \r\n as per the configured patterns).. meld = # add new command called vimdiff, runs gvimdiff with DirDiff plugin # (see) Non # English user, be sure to put "let g:DirDiffDynamicDiffText = 1" in # your .vimrc vimdiff = gvim -f "+next" \ "+execute 'DirDiff' fnameescape(argv(0)) fnameescape. When two revision arguments are given, then changes are shown between those revisions. If only one revision is specified then that revision is compared to the working directory, and, when no revisions are specified, the working directory files are compared to its parent. factotum http authentication with factotum. A configuration section is available to customize runtime behavior. By default, these entries fetch pull, update and merge in one command (DEPRECATED) Commands Remote repository management fetch pull changes from a remote repository, merge new changes if needed.: is needed, the working directory is first updated to the newly pulled changes. Local changes are then merged into the pulled changes. To switch the merge order, use --switch-parent. See hg help dates for a list of formats valid for -d/--date. Returns 0 on success. Options: - -r,--rev of the in repository's root directory. This allows them to read configuration files from the working copy, or even write to the working copy. The working copy is not updated to match the revision being fixed. In fact, several revisions may be fixed in parallel. Writes to the working copy are not amended into the revision being fixed; fixer tools should always write fixed file content back to stdout as documented above.. If the checked-out revision is also fixed, the working directory will update to the replacement revision.) If warn_when_unused is set and fsmonitor isn't enabled, a warning will be printed during working directory updates if this many files will be created. gpg commands to sign and verify changesets Commands sigcheck verify all the signatures there may be for a particular revision: hg sigcheck REV verify all the signatures there may be for a particular revision sign add a signature for the current or given revision: hg sign [OPTION]... [REV]... If no revision is given, the parent of the working directory is used, or tip if no revision is checked out. The gpg.cmd config setting can be used to specify the command to run. A default key can be specified with gpg.key. option to the incoming, outgoing and log commands. When this options is given, an ASCII representation of the revision graph is also shown. Commands glog show revision history alongside an ASCII revision graph: hg glog [OPTION]... [FILE] Print a revision history alongside a revision graph drawn with ASCII characters. Nodes printed as an @ character are parents of the working directory. This is an alias to hg log -G. - --removed include revisions where files were removed - -m, --only-merges show only merges (DEPRECATED) - ]. histedit interactive history editing With this extension installed, Mercurial gains one new command: histedit. Usage is as follows, assuming the following history: @ If you were to run hg histedit c561b4e977df, you would see the following file open in your editor: pick c561b4e977df Add beta pick 030b686bedc4 Add gamma pick # In this file, lines beginning with # are ignored. You must specify a rule for each revision in your history. For example, if you had meant to add gamma before beta, and then wanted to add delta in the same revision as beta, you would reorganize the file to look like this: pick 030b686bedc4 Add gamma pick c561b4e977df Add beta fold # At which point you close the editor and histedit starts working. When you specify a fold operation, histedit will open an editor when it folds those revisions together, offering you a chance to clean up the commit message: Add beta *** Add delta Edit the commit message to your liking, then close the editor. The date used for the commit will be the later of the two commits' dates. For this example, let's assume that the commit message was changed to Add beta and delta. After histedit has run and had a chance to remove any old or temporary revisions it needed, the history looks like this: @ 2[tip] Note that histedit does not remove any revisions (even its own temporary ones) until after it has completed all the editing operations, so it will probably perform several strip operations when it's done. For the above example, it had to run strip twice. Strip can be slow depending on a variety of factors, so you might need to be a little patient. You can choose to keep the original revisions by passing the --keep flag. The edit operation will drop you back to a command prompt, allowing you to edit files freely, or even use hg record to commit some changes as a separate commit. When you're done, any remaining uncommitted changes will be committed as well. When done, run hg histedit --continue to finish this step. If there are uncommitted changes, you'll be prompted for a new commit message, but the default commit message will be the original message for the edit ed revision, and the date of the original commit will be preserved. The message operation will give you a chance to revise a commit message without changing the contents. It's a shortcut for doing edit immediately followed by hg histedit --continue`. If histedit encounters a conflict when moving a revision (while handling pick or fold), it'll stop in a similar manner to edit with the difference that it won't prompt you for a commit message when done. If you decide at this point that you don't like how much work it will be to rearrange history, or that you made a mistake, you can use hg histedit --abort to abandon the new changes you have made and return to the state before you attempted to edit your history. If we clone the histedit-ed example repository above and add four more changes, such that we have the following history: @ 6[tip] 038383181893 2009-04-27 18:04 -0500 stefan | Add theta | o 5 140988835471 2009-04-27 18:04 -0500 stefan | Add eta | o 4 122930637314 2009-04-27 18:04 -0500 stefan | Add zeta | o 3 836302820282 2009-04-27 18:04 -0500 stefan | Add epsilon | o 2 If you run hg histedit --outgoing on the clone then it is the same as running hg histedit 836302820282. If you need plan to push to a repository that Mercurial does not detect to be related to the source repo, you can add a --force option. kwfiles show files configured for keyword expansion: largefiles track large binary files Large binary files tend to be not very compressible, not very diffable, and not at all mergeable. Such files are not handled efficiently by Mercurial's storage format (revlog), which is based on compressed binary deltas; storing large binary files as regular Mercurial files wastes bandwidth and disk space and increases Mercurial's memory usage. The largefiles extension addresses these problems by adding a centralized client-server layer on top of Mercurial: largefiles live in a central store out on the network somewhere, and you only fetch the revisions that you need when you need them. largefiles works by maintaining a "standin file" in .hglf/ for each largefile. The standins are small (41 bytes: an SHA-1 hash plus newline) and are tracked by Mercurial. Largefile revisions are identified by the SHA-1 hash of their contents, which is written to the standin. largefiles uses that revision ID to get/put largefile revisions from/to the central store. This saves both disk space and bandwidth, since you don't need to retrieve all historical revisions of large files when you clone or pull. To start a new repository or add new large binary files, just add --large to your hg add command. For example: $ dd if=/dev/urandom of=randomdata count=2000 $ hg add --large randomdata $ hg commit -m "add randomdata as a largefile" When you push a changeset that adds/modifies largefiles to a remote repository, its largefile revisions will be uploaded along with it. Note that the remote Mercurial must also have the largefiles extension enabled for this to work. When you pull a changeset that affects largefiles from a remote repository, the largefiles for the changeset will by default not be pulled down. However, when you update to such a revision, any largefiles needed by that revision are downloaded and cached (if they have never been downloaded before). One way to pull largefiles when pulling is thus to use --update, which will update your working copy to the latest pulled revision (and thereby downloading any new largefiles). If you want to pull largefiles you don't need for update yet, then you can use pull with the --lfrev option or the hg lfpull command. If you know you are pulling from a non-default location and want to download all the largefiles that correspond to the new changesets at the same time, then you can pull with --lfrev "pulled()". If you just want to ensure that you will have the largefiles needed to merge or rebase with new heads that you are pulling, then you can pull with --lfrev "head(pulled())" flag to pre-emptively download any largefiles that are new in the heads you are pulling. Keep in mind that network access may now be required to update to changesets that you have not previously updated to. The nature of the largefiles extension means that updating is no longer guaranteed to be a local-only operation. If you already have large files tracked by Mercurial without the largefiles extension, you will need to convert your repository in order to benefit from largefiles. This is done with the hg lfconvert command: $ hg lfconvert --size 10 oldrepo newrepo In repositories that already have largefiles in them, any new file over 10MB will automatically be added as a largefile. To change this threshold, set largefiles.minsize in your Mercurial config file to the minimum size in megabytes to track as a largefile, or use the --lfsize option to the add command (also in megabytes): [largefiles] minsize = 2 $ hg add --lfsize 2 The largefiles.patterns config option allows you to specify a list of filename patterns (see hg help patterns) that should always be tracked as largefiles: [largefiles] patterns = *.jpg re:.*\.(png|bmp)$ library.zip content/audio/* Files that match one of these patterns will be added as largefiles regardless of their size. The largefiles.minsize and largefiles.patterns config options will be ignored for any repositories not already containing a largefile. To add the first largefile to a repository, you must explicitly do so with the --large flag passed to the hg add command. Commands Uncategorized commands lfconvert convert a normal repository to a largefiles repository: hg lfconvert SOURCE DEST [FILE ...] largefile is the size of the first version of the file. The minimum size can be specified either with --size or in configuration as largefiles.size. After running this command you will need to make sure that largefiles is enabled anywhere you intend to push the new repository. Use --to-normal to convert largefiles back to normal files; after this, the DEST repository can be used without largefiles at all. Options: - -s,--size <SIZE> minimum size (MB) for files to be converted as largefiles - --to-normal convert from a largefiles repo to a normal repo lfpull pull largefiles for the specified revisions from the specified source: hg lfpull -r REV... [-e CMD] [--remotecmd CMD] [SOURCE] Pull largefiles that are referenced from local changesets but missing locally, pulling from a remote repository to the local cache. If SOURCE is omitted, the 'default' path will be used. See hg help urls for more information. Some examples:. It may be desirable for mq changesets to be kept in the secret phase (see hg help phases), which can be enabled with the following setting: [mq] secret = True You will by default be managing a patch queue named "patches". You can create other, independent patch queues with the hg qqueue command. If the working directory contains uncommitted files, qpush, qpop and qgoto abort immediately. If -f/--force is used, the changes are discarded. Setting: [mq] keepchanges = True make them behave as if --keep-changes were passed, and non-conflicting local changes will be tolerated and preserved. If incompatible options such as -f/--force or --exact are passed, this setting is ignored. This extension used to provide a strip command. This command now lives in the strip extension. Commands Repository creation qclone clone main and patch repository at same time: : hg qdelete [-k] [PATCH]... The patches must not be applied, and at least one patch is required. Exact patch identifiers must be given. With -k/--keep, the patch files are preserved in the patch directory. To stop managing a patch and move it into permanent history, use the hg qfinish command. Options: - -k, --keep keep patch file - -r,--rev : hg qpop [-a] [-f] [PATCH | INDEX] Without argument, pops off the top of the patch stack. If given a patch name, keeps popping off patches until the named patch is at the top of the stack. By default, abort if the working directory contains uncommitted changes. With --keep-changes, abort only if the uncommitted files overlap with patched files. With -f/--force, backup and discard changes made to such files. Return 0 on success. Options: - -a, --all pop all patches - -n,--name : hg qpush [-f] [-l] [-a] [--move] [PATCH | INDEX] By default, abort if the working directory contains uncommitted changes. With --keep-changes, abort only if the uncommitted files overlap with patched files. With -f/--force, backup and patch over uncommitted changes. Return 0 on success. Options: - --keep-changes tolerate non-conflicting local changes - -f, --force apply on top of local changes - -e, --exact apply the target patch to its recorded parent - -l, --list list patch name in commit text - -a, --all apply all patches - -m, --merge merge from another queue (DEPRECATED) - -n,--name <NAME> merge queue name (DEPRECATED) - --move reorder patch series and apply only the patch - --no-backup do not save backup copies of files qqueue manage multiple patch queues:)". Specifying --active will print only the name of the active queue. - --active print name of active queue - -c, --create create new queue - --rename rename active queue - --delete delete reference to queue - --purge delete queue, and remove patch dir qrename qselect set or print guarded patches to push: qdiff diff of the current patch and subsequent modifications: [+] notify hooks for sending email push notifications This extension implements hooks to send email notifications when changesets are sent from or received by the local repository. First, enable the extension as explained in hg help extensions, and register the hook you want to run. incoming and changegroup hooks are run when changesets are received, while outgoing hooks are for changesets sent to another repository: [hooks] # one email for each incoming changeset incoming.notify = python:hgext.notify.hook # one email for all incoming changesets changegroup.notify = python:hgext.notify.hook # one email for all outgoing changesets outgoing.notify = python:hgext.notify.hook This registers the hooks. To enable notification, subscribers must be assigned to repositories. The [usersubs] section maps multiple repositories to a given recipient. The [reposubs] section maps multiple recipients to a single repository: [usersubs] # key is subscriber email, value is a comma-separated list of repo patterns user@host = pattern [reposubs] # key is repo pattern, value is a comma-separated list of subscriber emails pattern = user@host A pattern is a glob matching the absolute path to a repository, optionally combined with a revset expression. A revset expression, if present, is separated from the glob by a hash. Example: [reposubs] */widgets#branch(release) = qa-team@example.com This sends to qa-team@example.com whenever a changeset on the release branch triggers a notification in any repository ending in widgets. In order to place them under direct user management, [usersubs] and [reposubs] sections may be placed in a separate hgrc file and incorporated by reference: [notify] config = /path/to/subscriptionsfile Notifications will not be sent until the notify.test value is set to False; see below. Notifications content can be tweaked with the following configuration entries: - notify.test If True, print messages to stdout instead of sending them. Default: True. - notify.sources Space-separated list of change sources. Notifications are activated only when a changeset's source is in this list. Sources may be: - serve changesets received via http or ssh - pull changesets received via hg pull - unbundle changesets received via hg unbundle - push changesets sent or received via hg push - bundle changesets sent via hg unbundle Default: serve. - notify.strip Number of leading slashes to strip from url paths. By default, notifications reference repositories with their absolute path. notify.strip lets you turn them into relative paths. For example, notify.strip=3 will change /long/path/repository into repository. Default: 0. - notify.domain Default email domain for sender or recipients with no explicit domain. It is also used for the domain part of the Message-Id when using notify.messageidseed. - notify.messageidseed Create deterministic Message-Id headers for the mails based on the seed and the revision identifier of the first commit in the changeset. - notify.style Style file to use when formatting emails. - notify.template Template to use when formatting emails. - notify.incoming Template to use when run as an incoming hook, overriding notify.template. - notify.outgoing Template to use when run as an outgoing hook, overriding notify.template. - notify.changegroup Template to use when running as a changegroup hook, overriding notify.template. - notify.maxdiff Maximum number of diff lines to include in notification email. Set to 0 to disable the diff, or -1 to include all of it. Default: 300. - notify.maxdiff.merge If True, send notifications for merge changesets. Default: True. - notify.mbox If set, append mails to this mbox file instead of sending. Default: None. - notify.fromauthor If set, use the committer of the first changeset in a changegroup for the "From" field of the notification mail. If not set, take the user from the pushing repo. Default: False. send changesets by. You can include a patch both as text in the email body and as a regular or an inline attachment by combining the -a/--attach or -i/--inline with the --body option. With [auth] example.schemes = https example.prefix = phab.example.com # API token. Get it from example.phabtoken = cli-xxxxxxxxxxxxxxxxxxxxxxxxxxxx Commands Change import/export phabsend will check obsstore and the above association to decide whether to update an existing Differential Revision, or create a new one. Options: - -r,--rev <REV[+]> revisions to send - --amend update commit messages (default: ) - --reviewer <VALUE[+]> specify reviewers - --blocker <VALUE[+]> specify blocking reviewers - -m,--comment <VALUE> add a comment to Revisions with new/updated Diffs - --confirm ask for confirmation before sending - - [OPTIONS] DREVSPEC selects revisions. See hg help phabread for its usage. Options: - --accept accept revisions - --reject reject revisions - --abandon abandon revisions - --reclaim reclaim revisions - -m,--comment <VALUE> comment on the last revision - --test-vcr <VALUE> Path to a vcr file. If nonexistent, will record a new vcr transcript, otherwise will mock all http requests using the specified vcr file. (ADVANCED) Uncategorized commands purge command to delete untracked files from the working directory Commands Repository maintenance purge removes files not tracked by Mercurial: hg purge [OPTION]... [DIR]... --all is specified) - New files added to the repository (with hg add) The --files and --dirs options can be used to direct purge to delete only files, only directories, or both. If neither option is given, both will be deleted. - -et qrecord interactively record a new patch: hg qrecord [OPTION]... PATCH [FILE]... See hg help qnew & hg help record for more information and usage. record interactively select changes to commit: hg record [OPTION]... [FILE]... If a list of files is omitted, all changes reported by hg status will be candidates for recording. See hg help dates for a list of formats valid for -d/--date. If using the text interface (see hg help config), you will be prompted for whether to record changes to each modified file, and for files with multiple changes, for each change to use. For each query, the following responses are possible: y - record this change n - skip this change e - edit this change manually - -w, --ignore-all-space ignore white space when comparing lines - -b, --ignore-space-change ignore changes in the amount of white space - -B, --ignore-blank-lines ignore changes whose lines are all blank - relink recreate hardlinks between two repositories:.) Automatic Pooled Storage for Clones When this extension is active, hg clone can be configured to automatically share/pool storage across multiple clones. This mode effectively converts hg clone to hg clone + hg share. The benefit of using this mode is the automatic management of store paths and intelligent pooling of related repositories. The following share. config options influence this feature: - share.pool Filesystem path where shared repository data will be stored. When defined, hg clone will automatically use shared repository storage instead of creating a store inside each clone. - share.poolnaming How directory names in share.pool are constructed. "identity" means the name is derived from the first changeset in the repository. In this mode, different remotes share storage if their root/initial changeset is identical. In this mode, the local shared repository is an aggregate of all encountered remote repositories. "remote" means the name is derived from the source repository's path or URL. In this mode, storage is only shared if the path or URL requested in the hg clone command matches exactly to a repository that was cloned before. The default naming mode is "identity". This extension allows you to strip changesets and all their descendants from the repository. See the command help for details. Commands Repository maintenance strip strip changesets and all their descendants from the repository: hg strip [-k] [-f] [-B bookmark] [. Strip is not a history-rewriting operation and can be used on changesets in the public phase. But if the stripped changesets have been pushed to a remote repository you will likely pull them again. Return 0 on success. Options: - -r,--rev <REV[+]> strip specified revision (optional, can specify revisions without this option) - -f, --force force removal of changesets, discard uncommitted changes (no backup) - --no-backup do not save backup bundle - --nobackup do not save backup bundle (DEPRECATED) - -n ignored (DEPRECATED) - -k, --keep do not modify working directory during strip - -B,--bookmark <BOOKMARK[+]> remove revs only reachable from given bookmark - --soft simply drop changesets from visible history (EXPERIMENTAL) [+] marked option can be specified multiple times transplant command to transplant changesets from another branch This extension allows you to transplant changes to another parent revision, possibly in another repository. The transplant is done using 'diff' patches. Transplanted patches are recorded in .hg/transplant/transplants, as a map from a changeset hash to its hash in the source repository. Commands Change manipulation transplant transplant changesets from another branch: hg transplant [-s REPO] [-b BRANCH [-a]] [-p REV] [-m REV] [REV]... Selected changesets will be applied on top of the current working directory with the log of the original changeset. The changesets are copied and will thus appear twice in the history with different identities. Consider using the graft command if everything is inside the same repository - it will use merges and will usually give a better result. Use the rebase extension if the changesets are unpublished and you want to move them instead of copying them.. --source/-s specifies another repository to use for selecting changesets, just as if it temporarily had been pulled. If --branch/-b is specified, these revisions will be used as heads when deciding which changesets to transplant, just as if only these revisions had been pulled. If --all/-a is specified, all the revisions up to the heads specified with --branch will be transplanted. Example: You can optionally mark selected transplanted changesets as merge changesets. You will not be prompted to transplant any ancestors of a merged transplant, and you can merge descendants of them normally instead of transplanting them. Merge changesets may be transplanted directly by specifying the proper parent changeset by calling hg transplant --parent. If no merges or revisions are provided, hg transplant will start an interactive changeset browser. If a changeset application fails, you can fix the merge by hand and then resume where you left off by calling hg transplant --continue/-c. Options: - -s,--source - : - Japanese Windows users using shift_jis encoding. - Chinese Windows users using big5 encoding. - All users who use a repository with one of problematic encodings on case-insensitive file system. This extension is not needed for: - Any user who use only ASCII chars in path. - Any user who do not use any of problematic encodings. Note that there are some limitations on using this extension: - You should use single encoding in one repository. - If the repository path ends with 0x5c, .hg/hgrc cannot be read. - (DEPRECATED) Zeroconf-enabled repositories will be announced in a network without the need to configure a server or a service. They can be discovered without knowing their actual IP address. To allow other people to discover your repository using run hg serve in your repository: $ cd test $ hg serve You can discover Zeroconf-enabled repositories by running hg paths: $ hg paths zc-test = Files - . - .hgignore This file contains regular expressions (one per line) that describe file names that should be ignored by hg. For details, see hgignore(5). - .hgsub This file defines the locations of all subrepositories, and tells where the subrepository checkouts came from. For details, see hg help subrepos. - .hgsubstate This file is where Mercurial stores all nested repository states. NB: This file should not be edited manually. - .hgtags This file contains changeset hash values and text tag names (one of each separated by spaces) that correspond to tagged versions of the repository contents. The file content is encoded using UTF-8. - .hg/last-message.txt This file is used by hg commit to store a backup of the commit message in case the commit fails. - .hg/localtags This file can be used to define local tags which are not shared among repositories. The file format is the same as for .hgtags, but it is encoded using the local system encoding.) Resources Main Web Site: Source code repository: Mailing list: Copying Copyright (C) 2005-2019 Matt Mackall. Free use of this software is granted under the terms of the GNU General Public License version 2 or any later version. Referenced By chg(1), hgignore(5), hgrc(5), hg-ssh(8), reposurgeon(1).
https://dashdash.io/1/hg
CC-MAIN-2021-21
refinedweb
8,463
54.32
Developing API Plugins Let's take a closer look at how the Reaction Commerce headless API works, by building one from scratch. mkdir my-reaction-api cd my-reaction-api echo "12.14.1" >> .nvmrc nvm use # run nvm install if prompted npm init -y touch index.js (Note: You can choose a higher version of Node.js, but 12.14.1 is the minimum.) This will create a simple Node.js app. Now open this directory in your favorite code editor. For example, enter code . to open it in Visual Studio Code. Reaction Commerce API packages assume that your project is using ECMAScript modules, so first edit package.json and add ”type”: “module”. Also in package.json, add the following "engines": { "node" : ">=12.14.1" }, Add a start script in the scripts object: "scripts": { "start": "node --experimental-modules --experimental-json-modules ./index.js" }, Note: if you’re using Node.js 14+, the --experimental-modules flag is no longer necessary but --experimental-json-modules flag may still be needed Then install the @reactioncommerce/api-core NPM package: npm install @reactioncommerce/api-core Edit the index.js file and paste in the following: import { ReactionAPICore } from "@reactioncommerce/api-core"; import packageJson from "./package.json"; const api = new ReactionAPICore({ version: packageJson.version }); async function run() { await api.start(); } run().catch((error) => { console.error(error); process.exit(1); }); This is technically all you need to do to create a barebones Reaction Commerce API. Before we start it, though, you’ll need a MongoDB server running on the default port on localhost. The quickest way to do this is: docker pull mongo:4.2.0 docker run -p 27017:27017 mongo:4.2.0 mongod \ --oplogSize 128 --replSet rs0 --storageEngine=wiredTiger With the database now running, you can enter npm start in the my-reaction-api directory and you should see some startup logging ending with “GraphQL listening at (port 3000)” If you go to that URL in any browser, you should see a GraphQL Playground UI. But view the Docs on the right side of the screen and you’ll notice that there are only 3 operations available: ping, echo, and tick. These are simple test operations included with the api-core package, but most of Reaction Commerce is missing! That’s because the stock Reaction Commerce API is really a combination of 37 API plugins, which need to be installed and registered. Registering a PluginRegistering a Plugin To get an idea of what registering an API plugin entails, add this in the run function, above the api.start() call. await api.registerPlugin({ name: "test", functionsByType: { startup: [ function testStartupFunction() { console.log("I am startup code for the test plugin."); }, ], }, }); ctrl+c to stop the running API, and then npm start to start it again. It should now pick up our test plugin and you should see the startup logging. Hopefully this gives you an idea of how plugins work, but plugins can actually do much more than this, and we recommend that all plugins be separate packages that you can install with NPM. For more information, refer to A Better Way to Register PluginsA Better Way to Register Plugins We saw above how you can call api.registerPlugin one or more times before calling api.start to register plugins. You could npm install any plugin packages, import them into index.js, and then pass each one in to api.registerPlugin, but there is a simpler, more declarative way. The recommended way to add plugins to a Reaction Commerce API project is by listing them in a JSON file: - Create a file plugins.jsonalongside index.js - npm install each plugin package you need - List all plugins in the plugins.jsonfile, which is an object where each key is any unique identifier for the plugin and each value is the plugin package name, for example, @reactioncommerce/api-plugin-carts - In index.js, import and use the importPluginsJSONFile function from api-core async function run() { const plugins = await importPluginsJSONFile("./plugins.json"); await api.registerPlugins(plugins); await api.start(); } Note that if you want to experiment with a plugin without yet creating a separate package for it, the keys in the plugins.json file can also be a relative path to a local ES module file that exports the package configuration. Stock Reaction CommerceStock Reaction Commerce As we’ve seen, you can build a Reaction Commerce API from scratch with your own mix of plugins. However, if you have simple needs or just want to try it out, it’s unlikely that you’ll need to do that. There’s an easier way! The reaction GitHub repo is a Node.js project in which we’ve already installed and registered a particular “blessed” set of API plugins. This is the API configuration that Reaction Commerce maintainers test against, and which we believe to be the most useful for most use cases. So you can start by simply cloning or forking that repository if you know how to do so. In fact, this stock Reaction Commerce configuration is also published as a Docker image, so you can very easily install and run it on any computer or on Docker-based cloud hosting services, too. But what about all of the related services and UI applications? As explained in the “Current Reaction Commerce Architecture” section, Reaction is actually made up of several different services. How do you run the whole system locally? Well, actually all Reaction Commerce services are published as Docker images, so all you need to do is pull, configure, and run them, with proper connections among them. For an easy way to do this, there is the Reaction Development Platform, which is where most people, whether you are looking to try, demo, test, or develop Reaction Commerce, will want to start. Switching to Development ModeSwitching to Development Mode Now let’s say you want to make some changes to a service and be able to see those changes reflected in the running service. By default, any changes you make do not affect the running service because all services run in standard mode. It’s done this way because it is much faster to start a service in standard mode. To develop a service, you need to switch it to development mode. Development mode differs from standard mode in the following ways: - A generic Node.js development Docker image is used for the container rather than the published service image. - Your locally checked out project files, other than those under node_modules, are mirrored into the container by way of a Docker volume mount. - NPM packages are installed when the container starts and therefore reflect the project’s package.jsonfile. (In other words, you can add additional NPM dependencies and then stop and restart the container.) - In the container, the project runs within nodemon, which will restart the app whenever you change any file in the project. Switching a project to development mode is easy. - Start the whole system in standard mode using makecommand in the Reaction Development Platform directory. - Run make dev-<project folder name>for one or more services to restart them in development mode. For example, make dev-reactionif you want to make API changes. But what exactly is this doing? Hopefully you don’t need to concern yourself with the details, but for those who want to know or who run into troubles, here’s the breakdown: - Every project repo has two Docker Compose configuration files: docker-compose.ymlfor standard mode and docker-compose.dev.ymlfor dev mode. The dev mode file is intended to extend the standard file, so it isn’t a complete configuration. - There is a feature built in to Docker Compose that looks for a docker-compose.override.ymlfile and uses it to extend docker-compose.ymlwhenever you run docker-composecommands. - The make dev-*commands stop the service if necessary, symlink docker-compose.dev.ymlto docker-compose.override.ymlin that service’s project folder, and then restart the service with the dev override now in effect. Conversely the makecommand and other non-dev-mode makesubcommands always remove the docker-compose.override.ymlsymlink before running the service, ensuring that it will revert to standard mode. To put that another way, this sequence of commands: make dev-reaction cd reaction is equivalent to this sequence of commands: cd reaction docker-compose down ln -sf docker-compose.dev.yml docker-compose.override.yml docker-compose pull docker-compose up -d Developing API PluginsDeveloping API Plugins Everything discussed so far has been true since the 3.0.0 release or earlier. With the 3.7.0 release, though, developing the API is slightly more complicated because almost all API code actually lives in NPM plugins, each of which lives in its own GitHub repository. You may be familiar with the npm link command as a way of temporarily linking NPM package code into a project to test before publishing it, but unfortunately npm link doesn’t work easily with code running inside a Docker container. Initially, the solution was to use temporary Docker volume links to map NPM package code from the host machine into the node_modules directory in the API container. However, this had a number of rather severe down sides, including the fact that the node_modules folder in the linked plugin project folder on the host machine would often get completely deleted. So Reaction Commerce 3.8.0 introduces two new scripts that implement a smarter way of linking in plugin packages (or any NPM packages): bin/package-link and bin/package-unlink. But before we discuss the linking approach, let’s talk about how to clone the built-in plugin packages in the first place. There are nearly 40 API plugins. That’s a lot of repositories to clone, and it can be helpful to clone them all so that you can run searches across the full codebase. Fortunately, there is a quick way to do that, too: make clone-api-plugins When you run this command in the Reaction Development Platform directory, it will clone every built-in plugin into an api-plugins subfolder, alongside the service subfolders. You can then modify files in these plugins as necessary and link them into the API project to test them. So back to the linking scripts. Let’s say you think there’s a bug in the built-in carts plugin. You cloned all the plugins and then changed a file in api-plugins/api-plugin-carts directory in an attempt to fix the bug. Now the first thing to do is to put the API in development mode if you haven’t already. After that, linking in your local carts plugin code is as simple as this: cd reaction bin/package-link @reactioncommerce/api-plugin-carts The already-running API server will automatically restart to pull in your changes. If your fix wasn’t quite correct and you make more changes to files in the carts plugin, you’ll have to run the link command again: bin/package-link @reactioncommerce/api-plugin-carts If necessary, you can run the link command for other plugins as well. You can even run it for other NPM packages that are not API plugins, but then you’ll need an additional argument that is the relative or absolute path to the package code on your host machine. For example: bin/package-link some-other-package ../../some-other-package (You can also use the code path argument for API plugin linking if you have cloned your API plugins to a non-standard location.) When you’re done, be sure to unlink before stopping the API service or running make stop: bin/package-unlink @reactioncommerce/api-plugin-carts Note that there is currently a [bug](] in the npm unlink command that in turn causes our bin/package-unlink command to unlink ALL linked packages instead of just the one you specify. Because of this you’ll need to relink any that you still wanted linked after you unlink one. This linking approach works pretty well but has the potential to get the API into a state where it complains about missing dependencies and won’t start. If this happens and restarting the API service does not fix it, you will need to use the docker volume rm command to delete the API node_modules volume (usually named something like reaction_api_node_modules). If that doesn’t work, running docker-compose down -v in the reaction directory will work, but be careful because that command will also wipe out your local MongoDB database.
https://docs.reactioncommerce.com/docs/next/core-plugins-developing
CC-MAIN-2020-29
refinedweb
2,092
54.83
The zbin task was a simple reverse-engineering/crackme challenge on the Olympic CTF Sochi 2014, which was organized by the MSLC. We've used the word "simple" as the application itself was indeed simple (from our narrow point of view); what made the task worth 500 points was the unusual platform it run on - 64-bit GNU/Linux (SuSE) running on an IBM's s390 CPU. On behalf of the Dragon Sector this task was solved by gynvael with aid from jagger and mak. The first step was to be able to run and disassemble the binary - the last part turned out to be problematic as the usual tool of our trade - IDA - doesn't support the s390. We ended up creating the following setup: - qemu-s390x + dynamic libraries extracted from SuSE s390x RPMs - this was used to run zbin on our local machines. We also tried to use s390x gdb this way to debug the app, but it turned out that some required syscall (ptrace probably) was not supported by qemu-s390x and it just didn't work (we also tried remote connecting s390x gdb to qemu's gdb server, but it turned out not to work at all either). Still, qemu has some tracing capabilities and we did play a little with these. - Debian on s390x emulator - we used this to solve zpwn and re-used it for gdb/ltrace/objdump for this task as well; you can read more about this setup in our zpwn write-up: olympic-ctf-2014-zpwn-200. Recon phase We started with the basics - strings and objdump for disassembly. In the string dump we've spotted two interesting things: - zlib's inflateInit/inflate/inflateEnd - we followed up by looked for high-entropy area and then for a zlib/DEFLATE magic, and we did find it at 0x30F0: - "Correct! Use MD5 now." - a hint that the final flag will be the MD5 of whatever is the solution to this crackme. Given the wordlist above, we guessed it would probably have to be an MD5 of a word from that dictionary. The dead-listing, SIGABRT and the hash We then focused on the disassembler output itself. Since it was kinda hard to read we decided to take some time and create a Python script that would append a description of every s390 assembly mnemonic in the same line as a given instruction - in the long run this saved us quite a lot of time looking up all the s390 weirdness in the manuals. The final disassembly form we've worked: After a brief analysis of the code (which did take some time since we were not familiar with the s390's huge instruction set) we were able to pinpoint main(), the decompression of the wordlist and checking if enough parameters were provided (+feeding the first one into strtol). And here is where we got lucky - we decided to run the application with some numbers (123456789) and look for them under the debugger, but before we ever got to that we spotted a SIGABRT being raised: We found the hashing function quite quickly and it turned out to be really short. We also found the expected value - 619767641. We decided to just calculate the hash (we ported the hashing function to Python) of every word in the dictionary and see if there are any matches vs the expected value. The code that does this: import md5 d = open("oooo", "rb").read().split("\n") def fix(x): return x & 0xffffffff def calc(w): r3 = 0 r5 = 0 for ch in w: r2 = ord(ch) r2 += r3 r2 = fix(r2) r1 = r2 r1 = r1 << 10 # or 10 r1 += r2 r1 = fix(r1) r3 = r1 r3 = r3 >> 6 r3 ^= r1 r5 += 1 r1 = r3 r1 = r1 << 3 r1 += r3 r1 = fix(r1) r3 = r1 r3 = r3 >> 11 r3 ^= r1 r2 = r3 r2 = r2 << 15 r2 += r3 r2 = fix(r2) return r2 i = 0 for w in d: w = w.strip() h = calc(w) # Not sure it the constant is hex or dec lol. if h == 619767641 or h == 0x619767641: print i, w, h, md5.md5(w).hexdigest() i += 1 Shortly after we run this we found exactly one match (format: index word hash md5_of_word): 592405 thymicolymphatic 619767641 6b30ce0743be6b6530ecbdb8c6c414bd And, after adding CTF{...}, it turned out to be the correct flag. To sum up, as one can see we didn't have to analyze the task too deeply - did in fact skipped 90% of analysis of its logic - this was mostly due to the lucky verbose SIGABRT. All in all it was a really fun task on an interesting and unusual platform. Great, Thanks ! great and congratz for the CTF, just a question : in the 2nd picture it's debugger or what ? @hamdi mechergui Thanks ;) It's just gvim with GNU assembly syntax coloring (the output viewed was taken from objdump as described). Great write-up, thank you! I wonder if you use some tool which automizes the process of searching high-entropy chunks in files? @cxielamiko I use a simple tool we developed with j00ru a long time ago - (it's open source)
http://blog.dragonsector.pl/2014/02/olympic-ctf-2014-zbin-re-500.html
CC-MAIN-2018-43
refinedweb
856
71.28
May 2014 Volume 29 Number 5 Data Points : Tips for Updating and Refactoring Your Entity Framework Code Julie Lerman | May 2014 I have worked with many clients to help refactor existing software that uses Entity Framework (EF). In the case of EF code, refactoring can have a variety of meanings and often involve an update. In this column, I’ll take a look at some of the ways you might be overhauling your EF code, or applications that involve EF. For each of these approaches, I’ll provide some guidance—based on my experiences working with clients’ production applications—that should help you be well-prepared and avoid some headaches. The changes I’ll discuss are: - Updating to a new version of Entity Framework - Breaking up a large Entity Data Model - Replacing the ObjectContext API with the DbContext API I’ll cover the first two at a high level this month and then follow up in my next column by digging into the last scenario with guidance, as well as some concrete examples. Before you embark on any of these tasks, there’s an initial bit of advice I highly recommend you follow: Do them one at a time. I’ve taken part in endeavors that include an old project that uses EF4, a huge model and the ObjectContext API. Attempting to change all three at the same time can only lead to tears and frustration—and, perhaps, worse. In this case, my suggested course was to first update the EF version without making any other changes, and then make sure everything continued to work. The next step involved identifying an area of the model that could be extracted into a new small model. But, initially, I let the new model continue to target the ObjectContext API. When everything was back in working order, the shift to the DbContext API was started, but for that small model only. Otherwise, too many things could break throughout the application and you’d be on a wild, incoherent mission to hunt down a variety of bugs. By shifting one small model at a time, you have a smaller surface area of broken code to rework and you can learn some good lessons and patterns that will make shifting the next small model much less painful. Updating to a Newer Version of Entity Framework Thanks to the EF team’s focus on backward compatibility, moving from one version to another provides minimal friction. I’ll focus on updating to EF6 —the major version of EF6, as well as its minor updates, such as EF6.02 and EF6.1. The worst issues with moving from EF4, EF4.1 or EF5 to EF6 (which, in my opinion, really aren’t so bad) result from some namespace changes. Because the original APIs are still in the Microsoft .NET Framework, having them duplicated in EF6 would cause a problem. So in the EF6 API, those classes are in a namespace that’s different from System.Data to avoid conflicts. For example, there are a number of namespaces in the .NET-based EF APIs that begin with System.Data.Objects, System.Data.Common, System.Data.Mapping, System.Data.Query, as well as a few others. There are also some classes and enums that live directly in System.Data; for example, System.Data.EntityException and System.Data.EntityState. Most of the classes and namespaces that were tied directly to System.Data in this way were moved to the new namespace root, System.Data.Entity.Core. There are a handful of classes moved into System.Data.Entity, such as EntityState, which is now found at System.Data.Entity.EntityState. For example, the Mapping namespace is now System.Data.Entity.Core.Mapping while the Objects namespace is now System.Data.Entity.Core.Objects. See item 4 in the Data Developer Center documentation, “Upgrading to EF6” (bit.ly/OtrKvA), for the specific exceptions that didn’t go into System.Data.Entity.Core. When updating existing applications to EF6, I just let the compiler highlight the changes by showing me any “The type or namespace … is not found” errors and then I do some solution-wide finding and replacing to correct the namespaces. As an example, I started with a small sample solution from the second edition of my book, “Programming Entity Framework.” This solution was written using EF4, an EDMX model, code-generated POCO entity classes and the ObjectContext API. Code First and the DbContext API didn’t exist at the time. Before I got started, I verified the application still worked (debugging in Visual Studio 2013). Though I’m focusing on a bigger leap—from EF4 to EF6—you need to follow the same path of namespace fixes if you’re going from EF5 to EF6, because these namespace changes occurred between EF5 and EF6. Moving from EF4 directly to EF6 has a few extra challenges, plus my old solution used a T4 template that doesn’t have a direct replacement. My Steps to Update from EF4 to EF6 If you’re used to getting Entity Framework using the NuGet Package distribution, you’ll need to think back to a time when EF was simply part of the .NET Framework and all of its DLLs lived in the Windows Global Assembly Cache (GAC). Before updating to EF6, I manually removed the references to System.Data.Entity (version 4.0.0.0) in each of my solution’s projects. I also cleaned the solution (by right-clicking the solution in Solution Explorer and choosing Clean Solution) to be sure any of the original DLLs I may have forced into the BIN folders were gone. It turns out my diligence wasn’t necessary because the NuGet package installer for EF6 removes the old references for you. Then I used NuGet to install EF6 into the relevant projects and rebuilt the solution. The project dependencies in your own solutions will drive how quickly the namespace issues surface. With my solution, I was only shown one namespace error at first. I fixed that and rebuilt the solution, and then saw many more errors—all but one were namespace issues. For the one exception, the compiler provided a helpful message telling me that a less frequently used attribute I had taken advantage of (EdmFunction) had undergone a name change (and was therefore marked as Obsolete) and had been replaced by the attribute DbFunction. After a series of iterative namespace fixes and rebuilds, which took only a few minutes for this small solution, I was able to successfully build and run the application—viewing, editing and saving data. Fixing the ObjectContext Plus POCO T4 Template There’s one other possible task to keep in mind. My solution used an EDMX—an Entity Data Model designed and maintained with the EF Designer. Because I created it in Visual Studio 2010 with EF4, it relied on an older code-generation template that generated an ObjectContext to manage all of the data persistence and caching. That template generated POCO classes (which have no dependency on Entity Framework) from the entities in the model. If I make any changes to my model, I’ll need to regenerate the classes and the context. But that older template—the one that generates the context—isn’t aware of the new namespaces. While there are DbContext templates and ObjectContext (plus EntityObjects) templates (see Figure 1), there’s no replacement for my template that provides the ObjectContext plus POCOs combination. And to make things more interesting, I had customized the template I used. So rather than selecting a new template that wouldn’t work with my application, I made two small changes to the Context.tt template that was stored in my existing solution: - On Line 42, “using System.Data.Objects;” becomes “using System.Data.Entity.Core.Objects;” - On line 43, “using System.Data.EntityClient;” becomes “using System.Data.Entity.Core.EntityClient;” Figure 1 You’ll Find Templates to Generate DbContext Plus POCOs or ObjectContext Plus Non-POCOs. .png) Now, any time I regenerate the classes from the model, the ObjectContext class will get the correct namespaces and my custom POCO-generated classes will continue to function in my application. Note that the Data Developer Center documentation I mentioned earlier explains how to use the supported templates. Benefits You’ll Gain Without Changing Any More Code I found updating the application to use EF6 pretty painless. However, there’s a very important point to consider. While the application is now using the most recent version of Entity Framework, it’s benefitting only from the underlying improvements to Entity Framework—in particular some great performance gains that came in EF5 and EF6. Because the bulk of these performance gains came in EF5, moving from EF5 to EF6 without leveraging the other new features won’t have as much impact. To see what else is new in EF6, check out my December 2013 article, “Entity Framework 6: The Ninja Edition” (bit.ly/1qJgwlf). Many of the improvements are related features of the DbContext API and Code First. If you want to update to EF6 and also update to DbContext, I recommend starting with the simple upgrade to EF6, and getting everything working again before you begin to shift to the DbContext API. That’s a more complex change that I’ll cover in detail in my next column. Even with these possibly minimal changes, your codebase is now ready to leverage the more modern APIs. Breaking Up a Large Model Whether you’ve used the EF Designer to create your model or the Code First workflow (see “Demystifying Entity Framework Strategies: Model Creation Workflow” at bit.ly/Ou399J), models with many entities in them can cause design-time and even runtime problems. My personal experience is that large models are just too unwieldy and difficult to maintain. If you’re using the Designer and have many entities (hundreds), not only does it take longer for the designer to open and display the model, it’s difficult to visually navigate the model. Thankfully, the Designer gained some great capabilities in Visual Studio 2012 that help (see “Entity Framework Designer Gets Some Love in Visual Studio 2012” at bit.ly/1kV4vZ8). Even so, I always recommend that models be smaller. In my column, “Shrink EF Models with DDD Bounded Contexts” (bit.ly/1isIoGE), I talk about the benefits of smaller models, as well as some strategies for using them in your application. If you already have a big model, however, it can be a challenge to break that apart. I’ve had clients who were working with models they reverse-engineered from huge databases ending up with 700 or even 1,000 entities. Whether you’re shrinking an EDMX model in the Designer or using Code First, the story is the same: Breaking up is hard to do. Here are some useful pointers for breaking up a large model into smaller models for simpler maintenance and potentially better runtime performance. Don’t attempt to refactor the entire model at once. For each small model you extract, you’ll need to do some additional code refactoring because references change and you might have some relationship code to tangle with as well. So the first step is to identify a section of the model that’s nearly autonomous. Don’t worry about overlap at first. For example, you might be working on a system for a company that manufactures and sells products. The software may include a feature for maintaining your sales force—personnel data, contact information, sales territory and so forth. Another part of the software might reference those sales people when building a client’s order based on the definition of your sales territories. And yet another part might be tracking their sales commissions. So tackle one particular scenario—say, maintaining the salesperson list—at a time. Here are the steps for shifting to smaller models: - Identify the entities involved in that scenario (see Figure 2). - Create a completely new project. - In that project, define a new model (either with the EF Designer or using Code First) that’s aware of the relevant entities. - Identify the application code involved with product maintenance. - Update the relevant code that uses the original context (for querying, saving changes or other functionality) so it uses the new context you’ve created. - Refactor the existing code until the target functionality is working. If you have automated testing in place, this might make the task of refactoring more efficient. Some additional advice to keep in mind during this process: - Do not remove these entities from the big model. Doing so would cause a lot of things to break. Just leave them there and forget about them for now. - Keep a log of what kind of refactoring you had to do to get the application to work with the new smaller model. Figure 2 SalesPerson and Territory Maintenance Can Be Extracted into a Separate Model with Little Impact to Other Entities .png) You’ll learn patterns you can apply as you continue to break off other focused models from the big model. By iteratively adding one new small model at a time to your solution and directing code to use it, your experience will be much more pleasant. In the big model, these same entities might be tangled up in relationships that have nothing to do with the SalesPerson maintenance task. For example, you might have a relationship from SalesPerson to a Sales Order, so you probably won’t want to remove SalesPerson completely from the model. It’s simpler to have a trimmed down, read-only SalesPerson type used as a reference during Order creation in one model and then the full-blown editable SalesPerson type (with no knowledge of Orders) used for maintenance in another model. When all is done, both entities can continue pointing to the same database. If you’re using Code First and migrations, check the aforementioned article on shrinking EF models for guidance on sharing a database when you have multiple overlapping models. Eventually you could end up with many small models and still some references to the big model. At that point, it will be easier to identify which entities are no longer touched in the big model and can be safely removed. Patience: Yes, It’s a Virtue The most important takeaway is to approach these updates and refactors in small bites and at each iteration, get your tests and application functioning again before moving on. Consider updating to a newer version of Entity Framework as its own work item. And even that can be broken in two as you first concentrate on pulling in the newer APIs and making sure your code continues to run before changing the code to take advantage of new features. The same baby steps apply to breaking up a big model—especially if you’re planning to update from ObjectContext to DbContext. Extract small models and refactor to make sure relevant logic can function with the new smaller model. Once that’s working, it’s time to break your ties to ObjectContext, which will break a bunch of code at first. But at least that broken code will be quarantined to a smaller area of your codebase and you’ll be refactoring less code at a time. In my next column, I’ll delve into the more painful but totally achievable goal of moving ObjectContext code to use the DbContext API.: Rowan Miller
https://docs.microsoft.com/en-us/archive/msdn-magazine/2014/may/data-points-tips-for-updating-and-refactoring-your-entity-framework-code
CC-MAIN-2020-16
refinedweb
2,580
52.8
: 10-07-2014 Record Information Rights Management: All applicable rights reserved by the source institution and holding location. Resource Identifier: aleph - 366622 oclc - 15802799 System ID: UF00028315:03623 This item is only available as the following downloads: ( PDF ) Full Text PAGE 1 OCTOBER 7, 2014Floridas Best Community Newspaper Serving Floridas Best CommunityVOL. 120 ISSUE 61 50 CITRUS COUNTYVolleyball: Longtime teammates lead Panther squad /B1 HIGH85LOW59Sun and clouds. Light winds.PAGE A4TODAY& next morning TUESDAY INSIDE INDEX Classifieds . . . .C11 Comics . . . . .C10 Community . . .C8 Crossword . . . .C9 Editorial . . . .A20 Entertainment . . .A4 Horoscope . . . .A4 Lottery Numbers . .B3 Lottery Payouts . .B3 Movies . . . . .C10 Obituaries . . . .A6 TV Listings . . . .C9 Scarves offer hope: Watch your weight: Active recovery:A local woman knits scarves for cancer survivors./ A3 Eating healthy helps reduce the risk of breast cancer re-occurring./ A14 Exercise helps in the recovery process after breast cancer surgery./ C1 Cancer cant stop her NANCYKENNEDY Staff writerINVERNESS With shining blue eyes and an easy laugh, 58-year-old Carol Recanzone is bold and sassy. Thats even how she signs her correspondences as vice president branch area manager at Brannen Bank where she has worked for 32 years: Carol Recanzone Bold and Sassy. Shes not shy about talking about her prosthetic breast, her boob in a box as she calls it, or about not having hair. Heres a Hallmark moment for you, she said. Its well known that Im a slob when I eat, and I always wear a bib. I even had a wedding bib when I got married. So, heres my Hallmark moment: my grandson and I eating together wearing bibs, both with bald heads. Having gone through surgery, gone through chemo, still going through radiation every day, she laughs, and says she has to in order to get through it. But she also cries. This is her second go-around with breast cancer. This time its more aggressive. This time she lost her entire breast and not just a part of it. Shes still upbeat and positive, but this time, shes also angry. When youre told you have cancer, you go through stages, Recanzone said. Even before that, you procrastinate. You put off going to the doctor. Life is busy; youre taking care of your family, you dont think about yourself. My sister got sick in 2008 and died of ovarian cancer within 10 weeks. She was 57. When your sister dies, its MATTHEW BECK/ChronicleCarol Recanzone receives radiation treatment at Robert Boissoneault Oncology Institute. Radiation therapists Katrina Donovan, left, and Jed Hernandez, right, work with her as David Cork, a radiation therapy student, looks on. Recanzone is dealing with her second bout of breast cancer, yet lives life with a positive spirit. Local banker keeps a positive attitude despite a second go-around with breast cancer See SURVIVOR/ Page A5 Study: Vitamin D helps in breast cancer survival PATFAHERTY Staff writerVarious studies have focused on the role of Vitamin D in the health and treatment of breast cancer survivors, and local cancer experts have their own views. A study out in March by the researchers at the University of California, San Diego School of Medicine, suggests breast cancer patients with high levels of Vitamin D in their blood are twice as likely to survive the disease as women with low levels of this nutrient The study came out of previous studies by Dr. Cedric F. Garland, a professor in the Department of Family and Preventive Medicine, that showed low Vitamin D levels were linked to a high risk of premenopausal breast cancer. It appeared in the March issue of Anticancer Research. In the schools news release, Garland said that study prompted him to question the relationship between 25-hydroxyvitamin D, which is produced by the body from the ingestion of Vitamin D, and breast cancer survival rates. Vitamin D metabolites increase communication between cells by switching on a protein that blocks aggressive cell division, Garland said. As long as Vitamin D receptors are present, tumor growth is prevented and kept from expanding its blood supply. Vitamin D receptors are not lost until a tumor is very advanced. This is the reason for better survival Fear of recurrence always there after beating breast cancer Body changes a constant reminder of the diseaseERYNWORTHINGTON Staff writerLisa Sperry knows herself better than anyone else does. She knew a biopsy was essential. She knew she had a rare form of breast cancer. And she knew that fighting for her life was her only choice. Her worst fears were discovered in 2006 after a scalloping trip. We had been scalloping, and I had red spots on my breast. I thought it was from being in a wet bathing suit, Sperry said. I used ointments like I would any rash, but it didnt work. Then I went to my sisters house, and she showed me a video about inflammatory breast cancer. After convincing the doctors of her findings, the 40-year-old Citrus High School 2003 Teacher of the Year heard the ringing diagnosis: inflammatory breast cancer, a rare and aggressive form of cancer. MATTHEW BECK/ChronicleCitrus High School ESE staffing specialist Lisa Sperry was diagnosed with cancer eight years ago. Following successful treatment, she has been cancer-free since. See CANCER/ Page A2 See a list of breast cancer suppor t groups on Page A8. See STUDY/ Page A8 PAGE 2 A2TUESDAY, OCTOBER7, 2014CITRUSCOUNTY(FL) CHRONICLELOCAL 000JHMV HEARING HEALTH EVENT! TOO BAD ERASERS DONT WORK ON CARPET. From Start To Satisfaction 352-794-0270 of Citrus County 2014 2014 2014 2014 000JEDN FALL SAVINGS $10 OFF Any Cleaning Service over $100 Valid at this ServiceMASTER Restore location only. Expires 10/31/14 WE GIVE YOU BEAUTIFUL SOLUTIONS 621-1944 HOMOSASSA Landscaping Water Gardens Retaining Walls Brick Pavers Call John Today for a FREE Consultation FOR YOUR OUTDOOR LIVING SPACES Visit our website to view ideas for your landscaping at: 24 Years Beautifying Citrus County XERISCAPING the perfect answer for Florida landscapes RELANDSCAPING to transform your home WATER FEATURES to add beauty BEFORE AFTER 000JEJT A Leader in Florida Landscape Solutions CALL FOR FREE CONSULTATION Workshops to explain Tourist Development Tax Special to the ChronicleThe Tourist Development Council will sponsors public workshops to help inform citizens about the Tourist Development Tax and their role in collecting tax for transient rentals. All workshops will be from 3 to 5 p.m. The workshops will be: Tuesday, Oct. 7 (today) Central Ridge Library 425 W. Roosevelt Blvd., Beverly Hills. Tuesday, Oct. 21, Coastal Region Library, 8619 W. Crystal St., Crystal River. Wednesday, Nov. 5, Lakes Region Library, 1511 Druid Road, Inverness. Wednesday, Dec. 3, Central Ridge Library, 425 W. Roosevelt Blvd., Beverly Hills. The Tourist Development Tax is a local option tax levied by Citrus County at a current rate of 3 percent. This tax is levied on all short-term residential rental charges, which includes all residential rentals for a period of six months or less. Examples would be an apartment, bed and breakfast, campground/RV park, condo, cottage, hotel/motel, mobile home park, rooming house or single-family dwelling. Staff will be addressing issues of how to collect and remit the required tax, what the penalties are for non-payment of the tax, and the potential use of the projected revenue from the tax. All members of the public are invited to attend and learn the taxcollection process. If you have any questions, email to adam.thomas@visit citrus.com, or call 352-6289305. It was the week of her 41st birthday. I was upset, but I was also thinking, Wow, this is a way to start my sons years in high school. I was worried, like any parent would be, about what was going to happen to my child if I am not here, Sperry said. She started treatment immediately and discovered that she inherited the gene BRCA2 positive from her father. A double mastectomy followed in March and concluded with daily radiation for weeks. Now, she is celebrating eight years as a survivor, but the fear of recurrence is a constant thought. I have a double birthday every year, Sperry said. But it is something that you think about every single day of your life. She is reminded of her life-altering diagnosis every time she looks at her body. I use to have to pluck my eyebrows regularly, Sperry said. Now, I draw them in, as they never came back completely. I have a vitamin deficiency that I have to take supplements for. I have dry mouth. I have dental issues from radiation and chemotherapy. And when lymph nodes are removed, the arm pit is shaped differently. Shaving there is different. But she is optimistic that she can overcome these daily challenges. After all, she beat cancer. You just figure out different ways to do everyday things, Sperry said. Positive thinking goes a long way. When she couldnt think positive, support was her medicine. Seek support whether it is professional or through others who have experienced it, Sperry said. You think you are strong to handle it. But what you experience not only affects you but those surrounding you.Contact Chronicle reporter Eryn Worthington at 352-563-5660, ext. 1334, or eworthington@ chronicleonline.com. CANCERContinued from Page A1 STATISTICS FROM THE AMERICAN CANCER SOCIETY WEBSITE,: Breast cancer is the second leading cause of death of women, behind lung cancer The chance that breast cancer will be the cause of death for a woman is one in 36, or a bout 3 percent. Death rates have declined since 1989, particularly for woman under 50. That is attrib uted to earlier screening and better treatment. There are more than 2.8 million breast cancer survivors in the U.S. The rate of women having mammograms increased from 29 percent in 1988 to 67 per cent in 2010. Breast cancer death rate dropped 34 percent since 1990, due to early detection and better tr eatment. PAGE 3 Around theSTATE STATE& LOCAL Page A3TUESDAY, OCTOBER 7, 2014 CITRUSCOUNTYCHRONICLE Corrections/ Clarifications Due to photographer error, a photo caption on Page A3 of Mondays edition, Cyclists flock to Liberty Park for Tails to Trails ride, contained an error. The ride was Sunday, not Saturday as the caption stated. The Chronicle regrets the error.A story on Page A1 of Mondays edition, Three Sisters proposals to be unveiled, warrants a correction and clarification. The Waterfronts Advisory Board meeting noted in the story will be at 5:30 p.m. Tuesday, Oct. 7, at Crystal River City Hall. The story incorrectly listed a different date. The Chronicle regrets the error. Also, Andrew Gude, manager at the Crystal River National Wildlife Refuge, will not be presenting Three Sisters Springs recommendations at the Waterfronts Advisory Board meeting, due to issues to be discussed further by involved agencies.A story on page A1 of Saturdays edition, Fear of failure drives rower, warrants clarification. Angela Madsen did row from California to Hawaii via the Pacific Ocean, not the Atlantic Ocean..com or by calling 352-563-5660. A.B. SIDIBE Staff writerOne of the Chroniclessignature annual events aimed at fighting cancer went off with aplomb over the weekend. Dubbed the night out with girls, the second Diva Night and Sassy Cups event was infused with a lot of sass Saturday night and the best bra was crowned by popular vote. Sassy Cups was designed to bring community members from various walks of life together through creative and whimsical decoration of bras. Proceeds from the fundraiser will be donated to the local cancer charity Citrus Aid Cancer Foundation. Voters chose from four categories of submitted designs and monikers ranging from the festive Passion of Mardi Gras which mimicked the masks worn during the festival to the whimsical Raise a Glass, which was adorned with grapes and a mini wine bottle. Voting fees were: $5, five votes; $10, 10 votes; $15, 20 votes; $20, 30 votes; and $25; 40 votes. The categories and winners were: Business: Waverley Florist, first place for Star Gazing For A Cure; the second and third place vote-getters were NAPAs Racing for the Cure and Passion of Mardi Gras by Jazzercise. Individual: Busty Peacock by Theresa Martinson. Nonprofit: First place, Simply Pink by the Rotary Club of Inverness and second place, Treasure Your Chest, Take The Test by the Citrus County Chamber of Commerce. Judges choice: Be A Super Hero In The Fight Against Cancer by Sisto Plastic Surgery. It was a great event and its for a great cause, said Michael Gaouette, coowner of Waverley Florist. It was a lot of fun and we wanted to get involved in the community, said Gaouette, who co-owns the business with his wife, Cheryl. Cheryl Gaouette, along with Linda Allen, Kelly Green and Elena Ruggiero, helped design the winning business bra.Contact Chronicle reporter A.B. Sidibe at 352564-2925 or asidibe@ chronicleonline.com. Sassy Cups winners announced Annual event is highlight of Diva Night to benefit charity Special to the ChronicleSisto Plastic Surgerys Be A Super Hero In The Fight Against Cancer was the judges pick at the second Diva Night and Sassy Cups bra design competition. ERYNWORTHINGTON Staff writerScarves and hats often cover Donna Toscanos new head of hair. But it was only months ago that these head pieces joined her wardrobe. When I first went down to Moffitt (Cancer Center), I saw little hats and scarves in a basket. I wondered who they were for, Toscano said. Once I got into the chemo part and started losing my hair, I realized what they were for. Her stage 3 breast cancer journey began November 2013 when her husband noticed Toscanos breasts didnt look right. But she had had a mammogram every year since she was 50. She thought nothing off it until two weeks later, when he insisted there was a noticeable difference. On Nov. 15, 2013, I went to my gynecologist and he sent me to Citrus Diagnostics Center and they did a mammogram and an ultrasound. They immediately called another doctor at Seven Rivers hospital, she explained. A biopsy was done there, at which time I sort of already knew. You can never get into a doctors office on the same day. For them to send me from one place to another, I just knew something was wrong. Her fears were confirmed and she spent four months undergoing chemotherapy, followed by 36 treatments to destroy the 9.2-centimeter mass, a mastectomy and removal of 36 lymph nodes. When she had her grandchildren shave her head, Toscano began making scarves to pass the time. I started making them while I was in chemo and placed them in the basket. As fast as I put them in the basket they disappeared, she said. It was funny walking around with no hair but flinging the scarf around and off my shoulder. It helped me get through. The 24-year Citrus County Craft Council member is now living by her beliefs. For every scarf I sell, I donate an extra scarf to someone at Moffitt, Toscano said. That way others can feel like they are doing their part and giving to someone going through breast cancer. To those newly diagnosed, she says to fight. Fight. Fight like you have never fought before in your life and win that battle, Toscano said. Think of all of the things in your life that you want to do. Think of your family and friends. I have a bucket list now. I plan on checking them off. Like my grandson said, You are the little engine that could, grandma, she said with a warm smile. As of Aug. 27, Toscano has been declared cancer-free. She will follow up with doctors later in October. Survivors scarves offer hope MATTHEW BECK/ChronicleDonna Toscano knits a scarf in her Homosassa home last week and discusses her battle with cancer. For each scarf she creates to sell, she knits one to give to cancer patients at Moffitt Cancer Center. CRAFT SHOWSCitrus County Craft Council upcoming shows: Nov. 8 and 9 at the Homosassa Seafood Festival. Nov. 22 at Belk location in the Crystal River Mall. Donna Toscanos hands keep busy with brightly colored material from which she creates scarves. A.B. SIDIBE Staff writerINVERNESS The tiny cottage at 208 Grace St., on the campus of Citrus Memorial Health System, is still being discovered by county residents ailing from cancer and dealing with the added stresses of hair loss. But not fast enough for volunteer Ann Possinger. Last year, the American Cancer Society opened what it calls a resource room at the site offering free wigs, turbans, scarves and bras to uninsured and underinsured patients. The room is operated two mornings a week Mondays and Wednesdays and is manned by volunteers like Possinger. I am the Monday person, she said. Possinger would like to see more volunteers sign up so the resource room can be open every day and she is eager for word to spread about their mission. She points to a display of wigs and stacks of medical bras waiting to be put into good use and improve a recovering patients outlook and esteem. If people come in and get free bras, it just makes me feel good because you can see their moods just pick up, Possinger said. Some of the volunteers like Possinger are themselves cancer survivors and are familiar with the stresses that come with losing hair during chemotherapy and, therefore, make it a point to impart empathy and provide comfort to those who come to the room. Possinger, 79, of Hernando, said she was diagnosed with cancer about a decade ago and lost her hair to chemotherapy, too. I never thought I would still be alive, she said. She is currently cancerfree and sports a tattoo of a frog on her right forearm with the word FROG written underneath it. Possinger said her husband, Cliff, urged her to get the tattoo as a reminder of what is important what the frog stands for Forever Rely On God. She sees herself as an embodiment what it means to endure the trauma of cancer. Her 56-year-old daughter Roann Adams succumbed to the disease two years ago and she said many of her relatives died at relatively young ages battling some form of cancer. Its really a miracle that I am still here, but that is what I try to convey to the people who come in here. We have a saying here called look good ... feel better. Looking good can really make you feel better and put a smile on your face, Possinger said. Possinger said the resource room could use more volunteers to expand its hours of operation. Presently, it is open from 8 a.m. to noon on Monday and 9 a.m. to noon on Wednesday. Anyone who would like to volunteer or to be helped by the program should call 352637-5577.Contact Chronicle reporter A.B. Sidibe at 352564-2925 or asidibe@ chronicleonline.com. Facility offers a place to look good, feel better Daytona BeachThird case of West Nile confirmedHealth officials have issued an alert after a third person was diagnosed with West Nile virus in Volusia County. Officials said in a statement Monday there is a heightened concern additional residents will become ill. The alert issued urged residents to take extra precaution to avoid mosquitoes. West Nile is most commonly transmitted to human by mosquitoes. A woman in Volusia County was diagnosed with the virus last month. Officials have not released the name, age or gender of the latest West Nile victims. The best way to avoid mosquitoes is to empty all standing water and wear long sleeves, long pants and use mosquito repellant. From wire reports PAGE 4 Birthday Your perceptiveness will keep you in constant motion, letting you know what to do and when to make your move. The ability to manage several projects at once will help you reach your goal. This year will be about about progressive action and aggressive pursuits. Libra (Sept. 23-Oct. 23) Despite your best intentions, a current love connection will pose a problem for you. Scorpio (Oct. 24-Nov. 22) Attention to detail and the ability to absorb pertinent information will help your unceasing quest for success reach a turning point. whats irrelevant and put it aside. Homing in on whatslasting damage will occur if you are too demanding. Try to see the situation from your opponents perspective. Aries (March 21-April 19) You will reap benefits from property or personal investments. Everyone will be on your side, and changes at home will be well-received. Taurus (April 20-May 20) You will have conflicts with youngsters. Financial losses are likely if you get involved with an unscrupulous salesperson. Gemini (May 21-June 20) Be careful when it comes to sharing your plans. Someone will want to take credit for your ideas. Cancer (June 21-July 22) Lectures and travel should be part of your plans. Dont hesitate to ask friends and family for advice if you are questioning what you should do next. Leo (July 23-Aug. 22) If a project has reached a dead end, take stock and consider taking a different approach. Virgo (Aug. 23-Sept. 22) Unexpected surprises lie ahead. Pay close attention to your finances. TodaysHOROSCOPES Today is Tuesday, Oct. 7, the 280th day of 2014. There are 85 days left in the year. Todays Highlight: On Oct. 7, 1954, Marian Anderson became the first black singer hired by the Metropolitan Opera Company in New York. (Anderson made her Met debut in January 1955 playing the role of Ulrica in Verdis Un Ballo in Maschera.) On this date: In 1849, author Edgar Allan Poe died in Baltimore at age 40. In 1960, Democratic presidential candidate John F. Kennedy and Republican opponent Richard Nixon held their second televised debate, this one in Washington. In 2001, the current war in Afghanistan started as the United States and Britain launched air attacks against military targets and Osama bin Ladens training camps in the wake of the September 11 attacks. Ten years ago:. Five years ago: Americans Venkatraman Ramakrishnan and Thomas Steitz and Israeli Ada Yonath won the Nobel Prize in chemistry. One year ago: Americans James Rothman and Randy Schekman and German-born researcher Thomas Suedhof won the Nobel Prize in medicine for discoveries on how proteins and other materials are transported within cells. Todays Birthdays: Retired South African Archbishop and Nobel Peace laureate Desmond Tutu is 83. Former National Security Council aide Lt. Col. Oliver North (ret.) is 71. Singer John Mellencamp is 63. Thought for Today : If your contribution has been vital, there will always be somebody to pick up where you left off, and that will be your claim to immortality. Walter Gropius, German-American architect (1883-1969).Today inHISTORY CITRUSCOUNTY(FL) CHRONICLE Todays active pollen: Ragweed, elm, chenopods Todays count: 5.5/12 Wednesdays count: 6.9 Thursdays count: ............................................Terri Whittaker, Freak Show gets red carpet treatmentLOS ANGELES Hollywood rolled out the red carpet on Sunday for the premiere of Freak Show, the fourth season of the FX networks American Horror Story series. Debuting Wednesday, this AHS chapter set in Jupiter, Fla., shows co-creator Ryan Murphy said Lange came up with the concept. I think back in season one, she said, Weve got to do carnival, freak shows, and she kept sending me books, he said.sas show desperately needs. Paulson called the roles the most difficult thing Ive ever done in my life. She said the characters heads cant turn to look into each others eyes. And thats worlds smallest living woman, and Erika Ervin, who, at 6-feet 8-inches, is dubbed the worlds tallest professional model by Guinness World Records.Downey screens new movie at Ohio military baseDAYTON, Ohio Actor Robert Downey Jr. made a surprise appearance at an Ohio Air Force base for a screening of his new movie. Approximately 900 military personnel and friends cheered when Downey walked into the packed theater Sunday at WrightPatterson Air Force Base near Dayton. He was there to screen his new movie, The Judge, which doesnt open until Friday. The Dayton Daily News reported that Downey said he wanted to stop at the base because hes always been drawn to all things military. He said its just a way of reminding myself that there are people out there who put their lives on the line so I can go out and make movies. In The Judge, Downey portrays a Chicago lawyer who confronts his past in his rural Indiana hometown.Lady Gaga, Tony Bennett set for new years duetLAS VEGAS Lady Gaga and Tony Bennett are set to take the stage at The Cosmopolitan casino on New Years cant wait to kick off 2015 cheek to cheek with the legendary Mr. Tony Bennett, Lady Gaga said in a statement. New Years celebrations are about cherishing family, friendship, and the future three things this man has taught me much about. From wire reports Associated PressKathy Bates poses for a photo with fans on Sunday at the premiere screening of American Horror Story: Freak Show at the TCL Chinese Theatre in Los Angeles. A4TUESDAY, OCTOBER7, 2014 000JER5 in Todays Citrus County Chronicle LEGAL NOTICES Citrus County Property Appraiser . . . A19 Citrus County Housing Division . . . . . . C3 Meeting Notices . . . . . . . . . . . . . . . . . . C14 Notice to Creditors/Administration . . . C14 Self Storage Notices . . . . . . . . . . . . . . C14 PAGE 5 LOCALCITRUSCOUNTY(FL) CHRONICLETUESDAY, OCTOBER7, 2014 A5 000JGS4 Celebrating 30 Years! Join Us October 18, 1-4 PM 3628 N. Lecanto Hwy., Beverly Hills Pet Friendly Activities Free Giveaways Kiddie Corner w/Crafts & Face Painting Petting Zoo Food and Refreshments Clinic Tour Entertainment by Citrus 95.3 Pet Costume and Pet/Owner Look-A-Like Contests! Fun For Everyone! For More Information Call 352-746-7171 Take Home A New Best Friend Our local shelter, Citrus County Animal Control, will be on site with our adoptable friends looking for their forever family. 000JECH PREVENTION IS THE BEST PROTECTION! T ermite damage is not covered by your homeowners insurance! FAIR PRICES FOR QUALITY SERVICE, WITH GUARANTEED RESULTS! A+ R A TI N G 2014 2014 2014 2014 11 YEARS IN A ROW! GUARANTEED TO BEAT OUR COMPETITORS PRICES Service to fit any budget: Once a year Quarterly Monthly 406 N.E. 1ST ST., CRYSTAL RIVER (352) 563-6698 (866) 860-BUGS LICENSED & INSURED #8688 Did you know BedBugs are common this time of year? Dont be confused by their name, 70% of the time BedBugs are found in other areas of your home! NO MATTER HOW YOUR HOME IS CONSTRUCTED, WHERE ITS LOCATED, OR HOW OLD IT IS, IT COULD BE ATTACKED BY SUBTERRANEAN TERMITES. THEY CAUSE $5 BILLION DOLLARS WORTH OF DAMAGE EACH YEAR IN THE U.S. ALONE DAMAGE THAT IS NOT COVERED BY MOST HOMEOWNERS INSURANCE Focused in their pursuits and abundant in number, termites eat continuously until nothing is left 100% PROTECTION AGAINST SUBTERRANEAN & FORMOSON TERMITES *New Residential Customers Only. Expires 10/30/2014 INCLUDES PEST CONTROL FOR ONE YEAR 000JA2M like looking into a mirror, she said. So, because of her dying, I decided to go to the doctor and get all the routine stuff done. Everything was fine, but her mammogram was inconclusive. She was called back for an additional six tests, including ultrasounds and two stereotactic biopsies. I had no lumps, bumps, symptoms or signs, but for some reason divine intervention they never stopped looking, she said. The cancer was lodged deep underneath her breast and would have gone undetected if local doctors had written it off. On Oct. 3, 2008, she had a lumpectomy followed by 10 months of chemo and radiation treatment. When they tell you youve got cancer, you go into denial and are numb, she said. Ive never been sick I dont know how to be sick. Im not a patient, so I had to learn how to be one. Then you go into a depression, and thats where some people stay. Eventually, you accept it. Im the kind of person that Im not about to let this take me over. Thats her bold and sassy spirit However, after reaching the five-year cancer-free mark, earlier this year when she was told the cancer had returned, her sassiness turned to anger. What do you mean I have cancer again? I did everything I was supposed to do, and it came back, in the same damn place? Not only that, it came back with a vengeance, in my chest wall, she said. That meant a mastectomy and no reconstructive surgery, and it meant doing it right away. I was angry, and I was filled with self-pity, she said. Losing a boob is losing part of your womanhood, and everybody can see it. Its slice and dice, right there for everyone to see. On the day of her surgery, her daughter took out her phone to take a picture, one last cleavage. Just retelling that part of her story caused tears to flow. I couldnt say it then, but I can now: Id rather lose a boob than a limb, she said. Ive got my arms and legs, and now Ive got my boob in a box. For Recanzone, losing her hair has been the hardest part of her whole ordeal. The first time, I lost my hair two days after chemo started, she said. It felt like my head was burning. I had gone on a girls weekend and got myself some turbans and cut my hair real short to prepare myself, but youre never really prepared when my husband got out the clippers, we both cried. The first time she wore a Marilyn Monroe wig, but this time shes wearing turbans. I work with the public, so theres the issue of appearance, she said. Here you are, you dont have any more eyebrows or eyelashes, youve got a bald head, and you look sick, even though you feel not too bad. So, now you have to think about how can I spruce myself up a bit to come to work? Shes not a bling person, she said, but she has had to wear longer earrings, fancy hats and remember to grab her hat on the way out the door in the morning. The thing about cancer, it completely takes over your life, she said. Everything revolves around it, going for tests, treatments, doctors appointments. You cant schedule a vacation. And it inconveniences everyone around you, too. Plus, it labels you. Im the lady with cancer. Still, cancer hasnt stopped Carol Recanzone. She goes to work every day, smiles, laughs, talks about her boob in a box. Work is important, its vital that I be here, she said. Ive gotten more cards and flowers and hugs lots of hugs, and Im on everyones prayer list. This is where theres good. Theres so much bad in the world, and if I stayed home and watched the news, Id be depressed. But I come here and realize there are good, kind, compassionate people out there, and this is a tremendous part of my healing. Shes also an inspiration to those she works with. Shes so strong, said co-worker Michelle Poydack. She comes to work every day. Its her therapy. Watching her, weve learned to be strong, said co-worker Casey Cook. You cant let things take over your life. She has cancer, but shes still out running 5Ks, doing Zumba, swimming. Nothing stops her. SURVIVORContinued from Page A1 Carol Recanzonebreast cancer survivor. STATISTICS FROM THE SUSAN G. KOMEN WEBSITE, ww5.komen.org: 1.7 million new cases of breast cancer have been diagnosed worldwide since 2012. One in eight women will be diagnosed with breast cancer. More than 200,000 cases of invasive breast cancer are diagnosed each year. About 62,000 cases of non-invasive breast cancer will be diagnosed this year. Breast cancer is the second most often diagnosed cancer in women, behind only skin cancer More than 2,000 cases of breast cancer are expected to be diagnosed in men in the U .S. each year. PAGE 6 Donald BradyJr., 56BEVERLY HILLSDonald Coleman BradyJr., 56, of Beverly Hills, Florida, died Sept.29, 2014. A celebration of his life will take place at 10:30a.m. Friday, Oct.10, 2014 at Strickland Funeral Home Chapel in Crystal River.Bonnie Cleaveland, 71INVERNESSBonnie S. Cleaveland, 71, of Inverness, Florida, passed away Oct.3, 2014, under the care of Hospice of Citrus County, Lecanto. She was born May5, 1943, in Elmira, New York, to the late Alfred and Myrtle Short. Bonnie was a retired kitchen aide at Citrus Memorial hospital, a Presbyterian by faith, and arrived in this area in 1998 coming from Naples. She enjoyed painting, gardening, word puzzles and cooking. Survivors include her loving husband of 50years, Richard Cleaveland. Other survivors include sons Richard J. Cleaveland of Inverness, and Andrew Cleaveland of Poplar Bluff, Missouri; three grandchildren; many nieces and nephews; and many loving and caring friends. A celebration of Bonnies life will be scheduled by the family at a later date. In lieu of flowers or cards, the family requests donations be made to Hospice of Citrus County, P .O. Box 641270, Beverly Hills, FL 34464, in Bonnies name. Private cremation arrangements are under the direction of Chas. E. Davis Funeral Home with Crematory, Inverness. Sign the guest book at Davis, 50HERNANDORobert Stanley Davis, 50, of Hernando, Florida, passed away Oct.4, 2014, at Citrus Memorial hospital, Inverness. He was born May 17, 1964, in Drexel Hill, Pennsylvania, to the late William S.N. and Elaine (Kahlert) Davis. Robert was a liquor store manager, and arrived in this area in 1991, coming from Delaware County, Pennsylvania. He was Southern Baptist by faith, and enjoyed fishing, firearms, scalloping, boating and playing Playstation. He is survived by his loving wife of 28 years, Kathleen Davis. Other survivors include son Joshua Hornbuckle of Hernando; daughters Patricia (Paul) Wakefield of Inverness, and Rebecca Jacobs of Alaska; brother William Davis; sister, Denise Zambrano; two grandchildren, Jackson and Trenton Wakefield; and many dear and loving friends. A celebration of life gathering will be held by the family at a later date. Chas. E. Davis Funeral Home with Crematory, Inverness, is in charge of arrangements. Sign the guest book at Matthews, 28HOMOSASSATyler H. Matthews, 28, Homosassa, died Oct.4, 2014. Chas. E. Davis Funeral Home with Crematory is assisting the family with private arrangements. L.C. Fleenor, 77HOMOSASSAL.C. Fleenor, 77, of Homosassa, Florida, passed away peacefully while embraced by his wife and son on Friday, Oct.3, 2014, at Citrus Memorial hospital in Inverness. He was born in Lee County, Virginia, to Elcannor and Oda Fleenor, but lived most of his life in Mount Airy, North Carolina. He and his wife Jeanelle moved to Homosassa in 2005. L.C. was a passionate man that prided himself in his dedication to work and taking care of his family. He was extremely detailoriented with the many jobs he held in his lifetime. Recently, he was employed by Walmart, where he was liked by so many who encountered him. He always greeted everyone with a smile and loved talking with all people; he never met a stranger. L.C. is survived by his wife of 52 years, Jeanelle; his son Greg and partner Randall; his brothers Carl, Kenneth and Donnie; and many loving nieces and nephews who looked upon him as a father in their lives. The family will receive friends from 2 to 3p.m. Wednesday, Oct.8, 2014, with a brief memorial service following at the Chas. E. Davis Funeral Home, 3075 S. Florida Ave., Inverness. Sign the guest book at, OCTOBER7, 2014CITRUSCOUNTY(FL) CHRONICLE 000JG93 000JEHH S UPERIOR R ESIDENCES 4865 W. Gulf to Lake Highway, Lecanto, FL | T HE S UPERIOR C HOICE Youre invited L.C. Fleenor Robert Davis Bonnie Cleaveland Deadline is 3 p.m. for obituaries to appear the next day. All obituaries will be edited to conform to Associated Press style unless a request to the contrary is made. Obituaries See DEATHS/ Page A7 000JHO5 PAGE 7 Sylvia LaVallee, 83HOMOSASSASylvia W. LaVallee, 83, of Sugarmill Woods in Homosassa, passed away Oct.4, 2014, at home under the loving care of her husband and Hospice of Citrus County of the Nature Coast. Sylvia was born Aug.23, 1931, to Wesley and Beth (Swett) Woodward in New London, New Hampshire. Sylvia graduated from Johnson Sate College in Vermont and obtained her masters degree from Northeastern University in Boston, Massachusetts. She then taught in the Concord, New Hampshire, school district for 31 years before retiring and moving to Crystal River in 1984 with her husband Pierre. After a brief stint in real estate, she decided to return to teaching, obtained her State of Florida teaching certificate and taught fourth grade at Homosassa Elementary School. In 1988, she represented Homosassa Elementary School as Teacher of the Year. Sylvia retired from teaching in 1998. A loving wife, mother, grandmother and greatgrandmother, she will be cherished by her husband of 34 years, Pierre L. LaVallee; her sons James Rice (wife Janet), of Millbury, Massachusetts, Nathan J. Rice (wife An) of Lutz; daughter Laurie Kimball (husband Leroy) of Land O Lakes; grandchildren, Kyle and Nicole; her bothers Sumner Woodward (wife Joan) of New London, New Hampshire, John Woodward (wife Glennis) of New London, New Hampshire; nephews Trent and Mark; nieces Meg, Katie, Kim and Sarah; her stepchildren, Peter, Paul, Patricia and James LaVallee; and stepgrandchildren, Lauren and Rachel LaVallee. Private arrangements are under the care of Wilder Funeral Home, Homosassa. In lieu of flowers, the family suggests memorials to Hospice of Citrus County, P.O. Box 641270, Beverly Hills, FL 34464. Sign the guest book at Weber, 81INVERNESSCalvin Weber, 81, Inverness, passed away Oct.5, 2014, under the loving care of his family and Hospice of Citrus County at his residence. Calvin was born Dec.18, 1932, in New York City to the late Ben and Sadie (Zucker) Weber and came to Citrus County in 1976 from Commack, Long Island, New York. He was a retired police officer from the New York City Police Department and proudly served our country during World WarII in the U.S. Army. He was Jewish by faith. He enjoyed cooking and spending quality time with his family. He is survived by his daughter, Marcy WeberDove of Inverness; son-inlaw Tony Amendola of Gainesville; former son-inlaw Robert Craig Schwinabart, Belleview; daughter-in-law, Emily Schwinabart, Tampa; three grandchildren, Jennifer Schwinabart, Diane Lynn Amendola and David Michael Schwinabart; and three great-grandchildren, Tatianna Lyn Amendola, Calvin Paul Schwinabart and Grayson Lee Amendola. He was preceded in death by his wife, Harriet, on Jan.16, 2009; and his son, Phillip Weber, on March12, 2002. Graveside services with military honors will be conducted at 2p.m. Friday, Oct.10, 2014, at Florida National Cemetery with VFW Post 4252 officiating. There will be no calling hours at the funeral home. Chas. E. Davis Funeral Home is assisting the family with arrangements. In lieu of flowers, memorials to the family will be appreciated. Sign the guest book at CHRONICLETUESDAY, OCTOBER7, 2014 A7 Wednesday, Oct. 15 9 AM -1 PM at the College of Central Florida Learning and Conference Center 3800 S. Lecanto Hwy., in Lecanto Annual Fall Job Fair open to any Job Seeker NO CHARGE TO PARTICIPATE. PROFESSIONAL DRESS REQUIRED IN PARTNERSHIP WITH PRESENTED BY For more information call: 352-249-3278 ext. 5200 or visit careersourceclm.com/calendar No charge! Professional dress required 20 employees with jobs to fill Thursday, Oct. 9 9 AM at the One-Stop Career Center 683 S. Adolph Point, Lecanto BE PREPARED WITH FREE JOB FAIR 101 WORKSHOP 000JHBA Email obits@chronicleonline.com or phone 352-563-5660 for obituary details. OBITUARIES The Citrus County Chronicles policy permits both free and paid obituaries. Obituaries must be verified with the funeral home or society in charge of arrangements. All obituaries will be edited to conform to Associated Press style unless a request to the contrary is made. Free obituaries, run one day, can include: full name of deceased; age; hometown/state; date of death; place of death; date, time and place of visitation and funeral services.) Additional days of publication or reprints due to errors in submitted material are charged at the same rates. Deadline is 3 p.m. for obituaries to appear in the next days edition. Obituaries are at www. chronicleonline.com. Email obits@ chronicleonline.com, call 352-563-5660 or fax 352-563-3280 for more information. DEATHSContinued from Page A6 Calvin Weber Sylvia LaVallee PAGE 8 in patients whose Vitamin D blood levels are high. Garland recommended randomized controlled clinical trials to confirm the findings but suggested physicians consider adding Vitamin D into a breast cancer patients standard care now, and then closely monitoring the patient. There is no compelling reason to wait for further studies to incorporate Vitamin D supplements into standard care regimens, he said. Garlands 2011 study found that a certain level of Vitamin D is associated with a 50 percent lower risk of breast cancer. Vitamin D is also being studied for its role in breast cancer treatment. The Stanford University School of Medicine is currently setting up a clinical trial to help determine if Vitamin D administration might be beneficial for women suffering bone loss and related symptoms as a result of their treatment with Aromatase inhibitors, a class of drugs used to treat breast cancer. I think there is a role for any that will make a womans or a mans, for that matter bones stronger because breast cancer, for example, is very related to hormone balance, said Dr. Gustavo A. Fonseca, a physician at Seven Rivers Regional Medical Center, Florida Cancer Specialists and Research Institute in Lecanto. He explained it is very likely in breast cancer treatment they will be using inhibitors, which block the effects of estrogen. And one of the beneficial effects of estrogen is precisely to make the bones stronger. There are a lot of very good studies that have shown that Vitamin D and calcium in conjunction with physical activity is very important for the bones, he said. So the utilization of Vitamin D as a complement or supplement for women who want to prevent bone disease is definitely well established, and I endorse it 100 percent. He emphasized that for a breast cancer survivor, exercise, increased physical activity, Vitamin D and calcium are vital. But he noted that, unfortunately, sometimes people will use the pills in lieu of the other components, such as physical activity. The truth of the matter is that physical activity, sun exposure thats how we get the Vitamin D is really the magical key, he said. Its doing something outdoors, several hours a week, and we dont do that. Vitamin D is part of the treatment, but not instead of natural Vitamin D from exposure to the sun, he said. Being in Florida, we have no excuse. We know sun exposure is good, but we just want to take the pill. We know that a lot of cancers are related precisely to diabetes, obesity and a sedentary lifestyle, and genetics, which are exactly the same things that have been associated with low levels of Vitamin D. It is definitely a solid component of the recovery, he said, and I do encourage patients to be as active as possible. However, Dr. Fonseca said it has not been established whether taking a Vitamin D supplement is going to prevent the cancer. He added there are concerns of too much Vitamin D causing kidney stones in a small subgroup of people, because their calcium goes up. But he said if they are physically active with weight-bearing exercises, that calcium will be driven into their bones. The research really is mixed, said Dr. Angela Watt, a radiologist at Citrus Memorial hospital and Associated Radiologists of Inverness. Indeed, it looks like Vitamin D can reduce the rate of cancer cells growing in the lab and also has been shown that it can decrease growth of blood vessels that supply the cancer cells. There have been a bunch of studies, and again, these experts do not agree. She cited an analysis that looked at the six largest studies up to that point in time and, based on that, found it had not been shown that Vitamin D decreases the risk of breast cancer. And regarding the recent University of California study, I think the jury is still out, she said. These researchers led to the recommendation that women who are breast cancer survivors should be receiving the appropriate RDA (recommended daily allowance) of Vitamin D. But she cautioned it is possible to have too much Vitamin D, it is fat soluble, meaning it doesnt just pass out of your system if you take too much; it can be stored in your body and it can be toxic. Her recommendation for all women is to take the recommended amount and no more. She said we get Vitamin D through sunlight and diet, but sunlight is tricky. Part of the problem in researching Vitamin D is intake is hard to measure, she said. Thats why sometimes these studies are very hard to interpret. It is very hard to objectively measure how much Vitamin D a person is taking, especially with sunlight. Even with diet, many things in our diet that have Vitamin D also have calcium. Calcium has been associated with lower cancer rates, but how do you separate the two? We have studies that say it matters and studies that say it has no effect, she said. But seeking the recommended amount per day would not hurt you and certainly would help your bones. Women have only to benefit from taking the recommended amount and there may be as-yetunproven benefits from Vitamin D. She said Vitamin D supplements can be used since the sun is not the most efficient way and not everyone does get or can get the Vitamin D they need in their diets. She said Vitamin D levels can be measured with a blood test and people should always talk with their doctor before taking any new supplements. A8TUESDAY, OCTOBER7, 2014CITRUSCOUNTY(FL) CHRONICLELOCAL Closing time for placing ad is 4 business days prior to run date. There are advanced deadlines for holidays. 000IYYL Contact Darrell Watson 564-2917 Lori Driver 564-2931 To Place Your In Memory ad, Richard T. Brown Funeral Director/Owner000JDVK Brown Funeral Home & CrematoryLecanto, FloridaIgrayne Brown Dias Funeral DirectorTwo Generations serving you with compassionate, personalized service.352-795-0111 1901 SE H WY 19 C RYSTAL R IVER 352-795-2678 Your Trusted Family-Owned Funeral Home for over 50 Years trickland S Funeral Home and Crematory 000JE01 Funeral Directors C. Lyman Strickland, LFD & Brian Ledsome, LFD L.C. FLEENOR Service: Wed. 3:00 PM CHARLES THOMPSON Service: Thurs. 1:00 PM Florida National Cemetery BONNIE CLEAVELAND Private Arrangements ROBERT DAVIS Pending Arrangements 000J8D5 With Crematory Funeral Home Chas. E. Davis Chas. E. Davis 726-8323 000JA7X 355 NE 10th Avenue Crystal River, FL 34429 352-228-4967 000JGK1 Informed citizens know how to help others. Informed citizens read the Chronicle. GET INFORMED. FERO Memorial Gardens & Funeral Home 000J8Y5 352 746-4646 S ERVING F AMILIES FOR 37 YEARS WITH D IGNITY & R ESPECT Beverly Hills STUDYContinued from Page A1 Dr. Gustavo A. Fonseca Dr. Angela Watt SUPPORT GROUPSBreast Cancer Support Group, meets the second Friday, 11:30 a.m., at the Robert Boissoneault Cancer Institute, Allen Ridge Medical Mall, 522 N. Lecanto Highway, Lecanto, Contact: Judy Bonard, 352-527-4389. Citrus Cancer Support, meets the third Tuesday, 4:30 p.m., Citrus Memorial hospital cafeteria meeting room. Contact: Carol, 352-726-1551, ext. 6596 or ext. 3329. Cancer Support group meets at the Cancer Treatment Center, Contact: Jeanette at 352-746-1100, for date and time. Time Out From Cancer Monthly Group, firstWednesday, 6 p.m.,Clawdaddys on U.S. 19 in Crystal River. Contact Wendy Hall at 352527-0106 A new breast cancer support group is starting up in Homosassa. Contact Tammy at 352-423-3052 or tammygirl444@yahoo.com. ww5.koman.org includes online forums for breast cancer survivors and their families. Several breast cancer organizations can be found on Facebook or Twitter, including: breastcancer.org; ww5koman.org; (American Cancer Society). PAGE 9 NANCYKENNEDY Staff writerINVERNESS People come in and out of our lives for a reason. Sometimes the reasons arent known, and sometimes, like the friendship between Hazel Alcorn and Jennifer (not her real name), its to pass on lessons learned. Jennifer has been gone 20 years, having suffered breast cancer that reoccurred and metastasized into other parts of her body, but Alcorn has never forgotten her friend. Two years ago, Alcorn, a part-time Inverness resident, wrote a book and study guide about Jennifers breast cancer experience, We Shared the Time of Her Life, published through Amazons CreateSpace Independent Publishing Platform under the pen name Anna Lynn. The book is from my perspective as her friend and also from her husbands perspective I tell his story, she said. He talked about his feelings and emotions, a real behind-closed-doors look, and he was very transparent and honest about some of the things he felt. One of the things he said was, I wish I couldve read a book telling about the experiences we were going through. That wouldve helped me. So, he was willing to be transparent because there might be another guy out there whose wife has cancer and wasfeeling the same things he felt and feeling guilty and that hes the only one who ever felt that way. The book also talks about what Jennifer considered helpful and nothelpful, where friends were concerned. Some of the things she said surprised me, Alcorn said. For example, when she learned her cancer was terminal and people started bringing food to her house for her family, she understood why people wanted to do that, but to her, she felt it took away from her role as a wife and mother. She worked hard to prepare her family to go on without her, and that meant teaching them how to cook, Alcorn said. Shed say, Are these people going to continue bringing food for the rest of their lives? Alcorn also learned that wellmeaning friends could be intrusive and ill-timed with their questions. If she had a doctors appointment and people knew about it, they would immediately call and ask, Whats going on? What did the doctor say? She said if it was bad news, she needed time to process it, Alcorn said. Alcorn said she also learned that her friend believed in self-fulfilling prophesies, that if she focused on what was bad, she would feel worse. So, even when she knew she was terminal, even if she felt bad, she would say, Im doing good. Im OK. She told me, Im not trying to be deceptive. It helps me to say Im doing well. She didnt want her focus to be on what was wrong, but what was good, and there was good, Alcorn said. Alcorn said she wrote the book and study guide to share Jennifers courage and humor and her husbands candor, as well as her own thoughts about what it means to be a friend to someone going through any difficult time, not just cancer. In the study guide, I take Jennifers story and make the transition to the readers life, Alcorn said. Its about how to be a friend. The book, We Shared the Time of Her Life and study guide by Anna Lynn are available at Amazon.com. LOCALCITRUSCOUNTY(FL) CHRONICLETUESDAY, OCTOBER7, 2014 A9 000JHOE servi ces. Must present coupon at time of service. Valid at participating locations only. Certain restrictions may apply. Ca ll for details. CITRUS 726-4646 MARION 622-5885 FL #CAC1816408 AL #08158 2014 2014 2014 2014 0003443627-01 Cleaning Completed By 10/31/14 Promo Code: OCT Cleaning Completed By 10/31/14 Promo Code: OCT FL#CAC1816408 Cleaning Completed By 10/31/14 Promo Code: OCT 000JGQG Not a Chain Store No Salesmen 31 Years of Experience You Can Trust HEAR CLEARER NOW! HEAR CLEARER NOW! HEAR CLEARER NOW! 100% SATISFACTION GUARANTEED. Oct. 31, 2014 527-0012 72 HOUR BLIND FACTORY FAUX WOOD BLINDS, TOP TREATMENTS DRAPERY, SHADES, SHUTTERS VERTICALS B LIND S 1657 W. GULF TO LAKE HWY LECANTO 2012 2012 2012 2012 000JBQN 000JGR2 ERYNWORTHINGTON Staff writerNational volunteer knitters are restoring local spirits. Homosassa resident Donna Toscano, a stage 3 breast cancer patient in remission, wants to share her belief in Knitted Knockers Charities Inc. with fellow breast cancer patients locally. Knitted Knockers Charities is a nonprofit corporation that exists to raise awareness and help mastectomy patients regain a sense of self by receiving free Knitted Knockers, prosthetic breasts made by volunteers, according to Knitted Knockers website. There are people out there that cannot afford the prostheses, Toscano said. It was easy and slipped right into my bra. It stayed in position and I was able to wear it up until a month ago. Toscano described the knitted prosthetic breasts as formfitting, 100 percent cotton, machine washable and made by non-smokers, which she said was essential for patients undergoing treatment. Y ou cant get an allergic reaction from it, Toscano said. Recipients will receive a knitted breast in any color, rounded or flat with a nipple and in cup sizes from A to DD based on request. Toscano received her free prosthetic breast from a knitter in Indiana. It is something that somebody out there is doing that will help someone else, Toscano said. She sent a thank-you card with a pay-it-forward donation back to the sender and vowed to advocate for the cushioned device that helped lift her spirits. Over 4,000 Knitted Knockers have been donated to women throughout all 50 states. For more information on Knitted Knockers, visit knittedknockers.info. Knitters help victims Donna Toscano Hazel Alcorn Book uses friends story to educate about breast cancer PAGE 10 PATFAHERTY Staff writerThere is a special connection between breast cancer survivors and the sport of dragon boat racing. When paddlers hit the water Nov. 15 for the Lake Hernando Dragon Boat Festival, one of the return entries will be the Pink Dragon Ladies, a team of breast cancer survivors from Tampa Bay. Between now and then, team members will have experienced the 2014 International Breast Cancer Paddlers Commission (IBCPC) Dragon Boat Festival in Sarasota. The Pink Dragon Ladies are co-hosting the Oct. 24 to 26 event with Save Our Sisters, another team of cancer survivors from Miami. Lim Bonomo, president and co-chair of the event, said they will host more than 3,000 survivors and their supporters from 10 countries. The international festival is held every four years, but this is first time in the United States. Team members have been getting ready for the event for the past year, which is a progression of a health innovation for breast cancer survivors. The first breast cancer dragon boat was launched in Vancouver, Canada, in 1996 by Don McKenzie, a sports medicine physician at the University of British Columbia, explained Jane Frost, IBCPC president. Don wanted to testhis theory that a moderate exercise routine for people treated for breast cancer would not cause lymphedema, a painful swelling of the arm after treatment. Don asked for 24 volunteers and I was one of those women, she said. We went to the gym for three months and then started paddling. We had the time of our lives and formed a team called Abreast In A Boat, now a Canadian legend and one that launchedthe international movement. The sport caught on and grew with the realization it could be used to raise awareness of breast cancer and the ability of survivors to lead normal lives. She said IBCPC now has 140 member teams in 12 countries Breast cancer dragon boat paddlers are now on the forefront of awareness advocacy, encouraging women of all ages to get mammograms and perform self-examinations. The Pink Dragon Ladies were formed in 2004 as the first cancer survivor dragon boat team in Florida. They compete in a 42-foot-long pink canoe called the The Dragon Lady. In the 2005 international festival, the team was the 10th fastest out of 77 entries. However, member Sylvia Moss does not think this years team is quite as strong. And one team member has gone to a hospice. Thats part of it, we lose them occasionally, said Moss, 77, the oldest team member. Our numbers fluctuate. She said the team came out to Hernando a little early last year, to check out the lake and get in some sightseeing. We find it a fairly close trip for us, she said. We really enjoyed it last year. Its wonderful camaraderie and group spirit, she added. Thats why we enjoy this sport.A10TUESDAY, OCTOBER7, 2014CITRUSCOUNTY(FL) CHRONICLESTATE 000JEHI 8733 W. Yulee Dr., Homosassa, FL 34448 Contact Us Today for Your Tour and to Place Your Priority Reservation Now (352) 621-8017 Assisted Living License # 11566 Like us on Facebook Dont Wait To Live The Lifestyle. Call Us Or Just Drop In And Learn Why Its A Life In Full Bloom! Melissa and Amy A Fulfilled Lifestyle Custom Service plan Means you are not charged for services you dont need. All Inclusive Amenities Chef prepared, three meals a day Snacks available in the Ice Cream Parlor 24-hours a day Medication assistance and supervision Licensed staff 24-hours a day Social, recreational, fitness and educational programs Studio, one-bedroom or two-bedroom apartments with kitchenettes Chauffeured transportation to appointments and social events 000JB03 Bird of Paradise Associated PressKilah Foster, dressed as the Bird of Paradise, dances for the judges Sunday at the Miami Broward Junior Carnival parade in Lauderhill, Fla. Young masqueraders were judged on their creativity, presentation, originality and craftsmanship of their vibrant and colorful masquerade costumes. Dragon boat racing: The sport of survivors PAGE 11 LOCALCITRUSCOUNTY(FL) CHRONICLETUESDAY, OCTOBER7, 2014 A11 Assisted Living Facility Lic. # 12230 311 NE 4th Ave. Crystal River 352563-0235 000JG3R When It Comes To Memory Care We Know The SCORE! We put the A in c A re A Peaceful supportive environment A Resident centered homelike feeling A Choice of room style A Focus on Specialized Amenities A Range of free support services for families & Caregivers A 24 hour compassionate care staff with specialized training Call or Stop in TODAY We are always ready for Company! 685 E. Gulf to Lake Hwy. Lecanto (1 Mile West of Lowes on Hwy, 44) 341-0813 MON.-FRI. 8:30-5, Sat. 9-4, Evenings By Appt. 000JHO. Surviving together BUSTERTHOMPSON Staff writerINVERNESS For loved ones battling cancer, the fight is rarely fought alone. Sandi Phillips has been diagnosed with three different forms of cancer, three separate times in the past 20 years. She was diagnosed with breast cancer this past September and is still fighting alongside her caregiver and husband of almost 50 years, Larry Phillips. When I was in really, really bad chemo, he was everything, Sandi Phillips said. He did the laundry, he did the floors, and he took me to my treatment, sat there and waited for me everything that I couldnt do because I was laying on the couch or in bed. She survived kidney cancer 20 years ago and melanoma eight years ago, each time with her husband by her side. Theres not much I can do because shes in pain, and I cant help, Larry Phillips said. Day to day is the same, and we just fight along, Sandi Phillips had a double mastectomy in January and received 52 chemotherapy treatments since March, with six more months to go. Each day comes something different, and some days I would be able to smile at him, and some days I couldnt even be around people because I would be so sick, she said. The Phillipses moved to Inverness in 1993 from Cadillac, Michigan, and have volunteered at Citrus Memorial hospital for almost 20 years. Sandi Phillips is currently in her second term as president of the volunteer auxiliary and is chairwoman of the information desk. Her husband is a volunteer transporter for diagnostic imaging, moving patients throughout the hospital in wheelchairs and beds some also receiving treatments for cancer. I try to make everything light, so they dont get shook up, Larry Phillips said. Every one of them has something different. He doesnt say much, but Larry Phillips doesnt have to when his physical compassion and caring demeanor speak for him in the presence of other patients. (Volunteering at the hospital) just brought him out so much, Sandi Phillips said. I see him standing in the hallway talking to people in wheelchairs. Other hospital volunteers have also showed their support by letting the Phillipses know theyre there every day, at every opportunity. The volunteers themselves are wonderful people, Sandi Phillips said. They brought us food after surgery, cards and hugs they supported me and helped me up, so I cant let them down. Every summer, the Phillipses venture up north to Michigan to stay in their fifth wheel set up in the resort community of Cadillac a break from the day to day but not from each other. Hes just there day after day doing whatever needs to be done, Sandi Phillips said. Our feelings for each other havent changed; we love each other more as we get older. For now, the Phillipses will continue volunteering at the hospital theyve loved for almost 20 years, hoping they can be there for as long as possible. I dont know what the future will be, Sandi Phillips said. I want to live out the rest of my life and I dont want to cut it short Ive beat it twice, Im going to beat this one. For Larry, he will continue to be there for the woman hes loved for almost 50 years. I put my faith in God and let him take care of it, he said. Its the best we can do, we try to keep a smile and keep going. One partner sick, the other becomes caretaker BUSTER THOMPSON/ChronicleLarry Phillips visits his wife, Sandi, at the front desk inside Citrus Memorial hospital, where theyve both volunteered for almost 20 years. Sandi Phillips has been receiving treatments since March for breast cancer, diagnosed in September of last year. I put my faith in God and let him take care of it.Larry Phillipshis wife is battling breast cancer. PAGE 12 A12TUESDAY, OCTOBER7, 2014CITRUSCOUNTY(FL) CHRONICLELOCAL Expires 8/31/13 Carpet & Upholstery Cleaning Services Tile & Grout Carpet Stretching Upholstery Water Extraction Air Duct Cleaning 35% OFF TILE CLEANING Expires 10/31/14 Minimum charge applies. 3 ROOMS & HALLWAY $ 65 00 Expires 10/31/14 Minimum charge applies. CARPET STRETCHING OR REPAIR 25% OFF Expires 10/31/14 Minimum charge applies. Toll Free 866-443-1766 Local 352-503-2091 Only 30% OFF AREA RUG CLEANING Expires 10/31/14 Minimum charge applies. coupon required coupon required coupon required coupon required 000JH2U FAMILY OWNED & OPERATED Free Estimates Licensed & Insured 100% Guaranteed 24 Hour Emergency Water Removal!!! Carpet Dries Fast, 1-2 Hours Clean Up Specials for Summer! CRYSTAL RIVER MARINE CRYSTAL RIVER MARINE 2014 B LOWOUT O N X CURSION 2014 B LOWOUT O N X CURSION 2014 2014 2014 2014 Pilates Yoga Toning Bend/Stretch Massage Turbo Kick Empowering Women Through Good Health 208 W Highland Blvd., Inverness (352)201-0149 000JGSY 000JGM3 Specialty Gems 600 SE Hwy. 19, Crystal River 795-5900 Est. 1985 Exceptional Jewelry Custom Designs Quality Repair Personalized Service WE BUY GOLD! Go Gators! Specialty Gems D IAMONDS E STATE J EWELRY L ARGE B RIDAL S ELECTION G EMSTONES BRING IN THIS AD AND GET 20% OFF ANY PURCHASE (EXCLUDING REPAIRS) LAYAWAY AVAILABLE JUST IN TIME FOR THE HOLIDAYS 1665 SE Hwy. 19, Crystal River Next to Winn Dixie in the Crystal River Shopping Center Jim Green Jewelers 563-0633 14 K 18 K P LATINUM S ILVER A PPRAISALS R ESTORATIONS S EIKO W ATCHES E NGRAVING R EPAIRS B UYERS OF P RECIOUS M ETALS & E STATES Family Owned & Operated Since 1987 FOR 16 CONSECUTIVE YEARS! 000JG5S Dont Miss The HAUNTED HOUSE $2.00 Suggested Donation for Children to the Haunted House 000JGN1 Fri., Oct. 24 and Sat., Oct. 25, 2014 6-10 Fox 96.7, and Codys Crystal River. Suggested donation: Adults $5.00 (age 13 and over) Children (ages 12 and under) $3.00 Costume Contests Refreshments Fun Games Face Painter For more information, please call (352) 628-5343 Brice Insurance Agency 3633 E. Gulf to Lakes Hwy., Inverness, FL 344-1277 Putting our clients first above all. Our policies are Trust and Service. SERVING CITRUS FOR 33 YEARS. Call Us For A Free Quote. Auto Home Life Business Weve always offered the best rates available with the best service possible. 000JH78 000JH7A Truck Mount Steam Cleaning Only at time of service. Some restrictions may apply. Not valid with any other offer. Expires 10/31/ 14. 24 HR. EMERGENCY SERVICE WATER DAMAGE RESTORATION SATISFACTION GUARANTEED Family Owned and Operated Over 20 years experience 352-795-0178 COUPON REQUIRED $ 69 Only SUPER SPECIAL 3-Rooms Carpet Cleaning (up to 200 sq. ft. each) Deep Cleaned Plus . THE HALLWAY IS FREE! FREE ESTIMATES Fully licensed & Insured Carpet & Area Rugs Tile & Grout Cleaning Pet Stain & Odor Removal Kid Spills Upholstery COMPLETE CARPET CARE RESIDENTIAL & COMMERCIAL Appointment Call 228-4975 6254 W. Corporate Oaks Drive, Crystal River (In Meadowcrest) Dr. Kenneth P. Pritchyk DPM Comprehensive foot & ankle care for the entire family. 000JFGN We Cater to Cowards! HONEST PROFESSIONAL COMPASSIONATE FREE SECOND OPINION. Next to ACE in Homosassa ( 352 ) 628-3443 Se habla espaol Ledgerdentistry.com 2014 2014 2014 2014 License #DN 17606 000JFE8 For the RECORD Domestic battery arrests John Mayo, 40, of Hernando, at 1:23 a.m. Oct. 4 on a misdemeanor charge of domestic battery. Demare Barnes II, 26, of Homosassa, at 5:33 p.m. Oct. 4 on a misdemeanor charge of domestic battery. Daniel Spurling II, 39, of Crystal River, at 12:32 a.m. Oct. 5 on a misdemeanor charge of domestic battery. Laura Thompson, 42, of Dunnellon, at 2:56 a.m. Oct. 5 on a misdemeanor charge of domestic battery.Other arrests Shane McGlone, 41, of West Parks Drive, Homosassa, at 10:24 a.m. Oct. 3 on an active warrant for felony violation of probation stemming from original charges of dealing in stolen property and false verification of ownership. Thomas Kirkpatrick, 40, of South Stonewood Point, Homosassa, at 12:30 p.m. Oct. 3 on an active warrant for failing to report an address change within 48 hours as required by sex offenders. Kirkpatrick turned himself in to the Citrus County Sheriffs Office. Joseph Brooks, 44, of East Gina Lynn Path, Hernando, at 1:30 p.m. Oct. 3 on an active warrant for felony violation of probation stemming from an original charge of dealing in stolen property. Charles Rushing-Griffen, 24, of Northeast Ninth Avenue, Ocala, at 2:13 p.m. Oct. 3 on an active warrant for felony violation of probation stemming from an original charge of possession of hydrocodone. He was transported from the Marion County Jail to the Citrus County Detention Facility. Nicholas Haros, 21, of North Overlook Path, Hernando, at 9:44 p.m. Oct. 3 on misdemeanor charges of retail petit theft and resisting a merchant after a theft. According to his arrest affidavit, Haros is accused of shoplifting an outdoor solar light and a hair dye kit from the Lecanto Walmart. Haros reportedly resisted the loss prevention employee when he was confronted. His bond was set at $1,500. Kenneth Kirkland, 20, of North Stafford Drive, Citrus Springs, at 12:24 a.m. Oct. 4 on an active warrant for grand theft. He was also charged with felony violation of probation stemming from an original charge of lewd and lascivious battery. Shannon Mayo, 36, of Hernando, at 1:28 a.m. Oct. 4 on an active warrant for felony violation of probation. Cameron Corbin, 47, of West Noble Street, Lecanto, at 11:55 a.m. Oct. 4 on a felony charge of leaving the scene of a crash with personal injury and a misdemeanor charge of leaving the scene of a crash with property damage. According to his arrest report, Corbin is accused of being involved in a hit and run crash at the intersection of Cardinal Street and U.S. 19. Corbin reportedly crashed into the rear of the victims vehicle and both parties got out of their cars and spoke to one another. After helping the victim move his vehicle off the road, Corbin reportedly got back into his car and drove away before law enforcement was notified. The victim was able to provide the tag number of the fleeing vehicle to the deputies. Corbins bond was set at $2,250. Jeffrey Rook, 33, of South Hummingbird Avenue, Inverness, at 2:21 p.m. Oct. 4 on an active warrant for felony violation of probation stemming from an original charge of witness tampering. Peter Farley, 26, of West Riverbend Road, Dunnellon, at 7:02 p.m. Oct. 4 on a misdemeanor charge of retail petit theft. According to his arrest affidavit, Farley is accused of shoplifting a stylus pen and Bluetooth headset with a total value of $36.76 from the Lecanto Walmart. Farley reportedly opened the items and placed them in his pocket, leaving the empty packages in the store. His bond was set at $500. John Bianchi, 55, of Homosassa, at 7:01 p.m. Oct. 4 for felony battery with one prior conviction for battery. Timothy Trehuba, 36, of North Bluewater Drive, Hernando, at 10:37 p.m. Oct. 4 on a felony charge of battery by a detainee to another detainee. According to his arrest affidavit, Trehuba is accused of getting into a physical altercation with another inmate while incarcerated at the Citrus County Detention Facility. He reportedly pushed the victim, struck him in the back, then head butted him. Trehubas bond was set at $2,000. Melissa Ingeneri, 46, of South Alita Terrace, Homosassa, at 4:39 p.m. Oct. 4 on felony charges of grand theft and burglary to an unoccupied residence. According to her arrest affidavit, Ingeneri is accused of breaking into a Homosassa apartment and stealing clothes, art supplies and miscellaneous items valued at approximately $500. The victim spotted the stolen art supplies in a car belonging to Ingeneri in the apartment parking lot and other items were reportedly found in a bedroom where Ingeneri was staying. Her bond was set at $7,000. Misty Miles, 36, of North Page Avenue, Hernando, at 4:22 a.m. Oct. 5 on a felony charge of two counts of possession of a controlled substance and a misdemeanor charge of drug paraphernalia. According to her arrest affidavit, Miles was a passenger in a vehicle pulled over for a faulty headlight. A K-9 unit alerted to possible drugs in the vehicle and 1.5 grams of methamphetamine, along with 0, 5 grams of Ecstasy, a wooden pipe and some burnt straws were found in her possession. Miless bond was set at $5,000. Nicole Tate, 33, of Northeast 13th Lane, Silver Springs, at 5:40 a.m. Oct. 5 on an active warrant for felony violation of probation stemming from an original charge of robbery. She was transported from the Palm Beach County Jail to the Citrus County Detention Facility. Lynn McCallister, 49, of Floral City, at 7:04 a.m. Oct. 5 on a felony charge of aggravated assault with intent to commit a felony. Christopher Baldwin, 40, of West Goldenleaf Lane, Crystal River, at 8:28 p.m. Oct. 5 on a misdemeanor charge of retail petit theft. According to his arrest affidavit, Baldwin is accused of shoplifting two 18 packs of beer valued at $26.23 from the Crystal River Publix. Baldwin reportedly went to the beer aisle, selected two 18 packs of Natural Light and then proceeded to exit the store without attempting to pay. His bond was set at $500. Citrus County Sheriffs OfficeBurglaries A vehicle burglary was reported at 9:13 a.m. Friday, Oct. 3, in the 7400 block of W. Pedersen Loop, Homosassa. A residential burglary was reported at 3:54 p.m. Oct. 3 in the 1700 block of S. Carriage Terrace, Homosassa. A vehicle burglary was reported at 4:22 p.m. Oct. 3 in the 400 block of N.E. Ninth St., Crystal River. A burglary to a structure was reported at 6:53 a.m. Saturday, Oct. 4, in the 8600 block of N. Golfview Drive, Dunnellon. A vehicle burglary was reported at 8:01 a.m. Oct. 4 in the 800 block of E. Charleston Court, Hernando. A vehicle burglary was reported at 9:51 a.m. Oct. 4 in the 1300 block of N. Abalone Terrace, Hernando. A residential burglary was reported at 10:41 a.m. Oct. 4 in the 1100 block of N. Brookhaven Terrace, Inverness. A burglary to a structure was reported at 1 p.m. Oct. 4 in the 3100 block of Crystal River High Drive, Crystal River. A residential burglary was reported at 1:13 p.m. Oct. 4 in the 6300 block of S. Suncoast Blvd., Homosassa. A residential burglary was reported at 5:13 p.m. Oct. 4 in the 6000 block of W. Green Acres St., Homosassa. A vehicle burglary was reported at 6:12 p.m. Sunday, Oct. 5, in the 1700 block of Forest Drive, Inverness.Thefts A larceny petit theft was reported at 10:59 a.m. Friday, Oct. 3, in the 7500 block of E. Watson St., Inverness. A larceny petit theft was reported at 2:10 p.m. Oct. 3 in the 5000 block of N. Harding Terrace, Hernando. A grand theft was reported at 5:07 p.m. Oct. 3 in the 9800 block of W. Arms Drive, Crystal River. A petit theft was reported at 8:55 p.m. Oct. 3 in the 1900 block of N. Lecanto Highway, Lecanto. An auto theft was reported at 10:31 p.m. Oct. 3 in the area of S. Suncoast Boulevard and W. Cardinal Street, Homosassa. A grand theft was reported at 11:02 a.m. Saturday, Oct. 4, in the 2400 block of N. Junglecamp Road, Inverness. An auto theft was reported at 2:47 p.m. Oct. 4 in the 800 block of W. Main St., Inverness. A petit theft was reported at 6:07 p.m. Oct. 4 in the 1900 block of N. Lecanto Highway, Lecanto. A grand theft was reported at 10:12 a.m. Sunday, Oct. 5, in the 8400 block of E. Derby Oaks Drive, Floral City. A grand theft was reported at 10:26 a.m. Oct. 5 in the 10800 block of W. Gem St., Crystal River. A larceny petit theft was reported at 1:13 p.m. Oct. 5 in the 3500 block of E. Jonah Place, Inverness. A petit theft was reported at 7:37 p.m. Oct. 5 in the 6700 block of W. Gulf-to-Lake Highway, Crystal River. A petit theft was reported at 7:51 p.m. Oct. 5 in the 900 block of State Road 44 East, Inverness.Vandalisms A vandalism was reported at 6:40 a.m. Friday, Oct. 3, in the 40 block of Beverly Hills Blvd., Beverly Hills. A vandalism was reported at 8:42 p.m. Sunday, Oct. 5, in the 3000 block of W. Gulf-toLake Highway, Lecanto. ON THE NET For more information about arrests made by the Citrus County Sheriffs Office, go to and click on the Public Information link, then on Arrest Reports. For the Record reports are also archived online at www. chronicleonline.com. 000JGS0 How do I talk to Mom about getting a little extra help? 4224 W Gulf to Lake Hwy., Lecanto, FL 34461 homeinstead.com 352-249-1257 HHA299993253 Youre not alone facing this sensitive issue, which is why Home Instead Senior Care is helping family care givers bridge the communication gap when discussing sensitive subjects with senior family members. If youre 40 and theyre 70 its time to talk For a free 40-70 booklet and info about our 40-70 survey, visit: 4070talk.com 000JE5Y Grooming Services Boarding & Daycare Pet Supplies Training Programs VIP Club (Very Important Pet) Mon., Tues., Thus. & Fri. 8 am 5 pm Wed. & Sat. 8 am Noon, reopen 5 pm Sun. & Holidays 8 am 5 pm (Pick up and drop off only) Daycare $8 Day Daycare $8 Day Daycare $8 Day 5625 W. Gulf to Lake Hwy Crystal River 352-795-1684 Where your pet is #1 25 years serving Citrus Count y Ruff Week ? $ 3 OFF Dental Cleaning. Reg. $20 NAIL TRIM $ 4 00 Reg. $5.00 w/coupon Offer expires 10/31/14 2014 2014 2014 2014 PAGE 13 Associated PressANKARA, Turkey The NATO alliance has drawn up a strategy to defend Turkey if it is attacked along its border with Syria, a Turkish official said Monday. Defense Minister Ismet Yilmaz, whose country is a NATO member, said the alliance did that at his governments request as Islamic State militants, who have captured a large swath of Iraq and Syria, are trying to take the Syrian town of Kobani near the Turkish border. If there is an attack, NAT. NATOs new secretary general, Jens Stoltenberg, appeared to confirm what Turkey was saying during a news conference in Warsaw, Poland, on Monday. After expressing concern about the violence in Syria and the fact that it has spilled over into Iraq, he said: The main responsibility for NATO is to protect all allied countries. Turkey is a NATO ally and our main responsibility is to protect the integrity, the borders of Turkey, and thats the reason why we have deployed Patriot missiles in Turkey to enhance, to strengthen their air defense of Turkey. And Turkey should know that NATO will be there if there is any spillover, any attacks on Turkey as a consequence of the violence we see in Syria. Kurdish forces are defending Kobani, but two banners of the Islamic State group were raised over a building and a nearby hill on Monday, suggesting that the militants may have broken through the Kurdish perimeter.WORLDCITRUSCOUNTY(FL) CHRONICLETUESDAY, OCTOBER7, 2014 A13. 000JHOZ Join us for exclusive specials and your chance to win prizes at our upcoming event! Tuesday, October 28th at 1:00 p.m. Citrus Hills Golf and Country Club 505 E. Hartford Street, Hernando, FL 34442 Back by Popular Demand!! Keeping an eye on things Associated PressSaudi security officers monitor Muslim pilgrims Sunday during the hajj in the Mina neighborhood of Mecca, Saudi Arabia. Muslims around the world celebrated the start of Islams biggest holiday this weekend as more than 2 million pilgrims took part in one of the final rites of the annual hajj pilgrimage in Saudi Arabia. Associated PressHONG KONG The students whose calls for democratic reforms sparked the most dramatic challenge to authorities since Hong Kong returned to Chinese control are vowing to keep up the fight. But as the numbers of protesters dwindled Monday from tens of thousands into the hundreds, it was unclear where the tumult of the past week would lead. Schools reopened and civil servants returned to work after protesters cleared the area outside the city government headquarters, a focal point of the demonstrations that began Sept. 26. Crowds also thinned markedly at the two other protest sites, and traffic flowed again through many roads that had been blocked. In the Mong Kok district, the site of weekend clashes in which mobs tried to drive the demonstrators out of the intersection they were blocking, hundreds of curious onlookers surrounded the remaining protesters Monday evening, taking pictures. The threats in Mong Kok have passed, and now people are just curious about the sit-in, said 36year-old Anita Lee, a resident. Thats why there are more onlookers than protesters. Many in Hong Kong are wondering if the protest movement may have run its course and whether the students have a clear strategy for pressing their demand that all candidates for the citys top leader, or chief executive, not be screened by a pro-Beijing committee. They cant sustain attendance in protests if it goes on and on, said Michael Davis, a professor at Hong Kong University. They need some strategy where they can withdraw the crowds so they can say to the government that if they are not sincere, they will mobilize crowds back on the streets. Disagreements were evident after the students and the government began preliminary talks. Lau Kong-wah, the undersecretary of constitutional affairs, said late Monday that the government and students had agreed on terms for the talks, including that the two sides would be on an equal footing. Lester Shum, a leader of the Hong Kong Federation of Students, confirmed the agreement, but said they had not discussed or reached a consensus on the agenda. Chief Executive Leung Chun-ying, who has rejected the protesters calls for him to resign, said in a TV address Monday that the government would seek a sincere dialogue on political reform. At the same time, Leung reiterated that everyone should go home and stop blocking the streets. There are lots of teenagers and students with passion who love Hong Kong in various assemblies. However, some of them are aggressive and use violence. No matter what your attitude is toward Occupy Central, the police will firmly take enforcement action to those who use violence, he said. The students say they would walk away from the talks if police, who fired tear gas and pepper spray on unarmed protesters Sept. 28, use force to clear away the remaining demonstrators. The police violence and attacks by mobs drew huge crowds in a massive show of support. Its up to the government now. This is the first step, but the pressure has to continue, said Alex Chow, one of the student leaders. Questions surround Hong Kong protests Momentum begins to fade Associated PressPolice officers stand guard Monday at a main road in the Mong Kok area in Hong Kong. Turkey: NATO will help defend country Islamic State forces drawing close to border Associated PressSAO PAULO Aecio Neves surprisingly strong showing in the first round of Brazils presidential election has turned the nations politics on its head and put him within striking distance of incumbent Dilma Rousseff, but the former governor still faces a heavy task if he is to unseat her. The business-minded Neves came within 8 percentage points of Rousseff in Sundays vote and has momentum and a strong central-right party on his side. The challenge for Neves, who was born into affluence and political power, will be to connect with Brazils poor, millions of whom have directly benefited from Rousseffsays first-round vote, finishing second with 34 percent to Rousseffs 42 percent. Socialist Party candidate Marina Silva, who at one point led Rousseff in polling, finished third at 21 percent and will not advance to the Oct. 26 runoff. Voters now have a clear choice: Reelect partys initial candidate who died in a plane crash in August. But her appeal waned after Rousseff launched an aggressive campaign to discredit her, including negative ads that portrayed Silvas plans to loosen control of the business sector as a threat to the social gains made under 12 years of Workers Party rule. Aecio hasnt been under much scrutiny in the past month given Marinas surge. But now he is going to be the center of attention for the PTs (Workers Party) machinery, said Joao Augusto de Castro Neves, Latin America director for the Eurasia Group consulting firm. Associated PressAecio Neves, presidential candidate of the Brazilian Social Democracy Party, PSDB, smiles as he arrives Monday for a press conference in Sao Paulo, Brazil. President Dilma Rousseff piled up more votes in Sundays election than any challenger, but it wasnt enough to avoid a runoff. Neves, a center-right former governor and senator, came in second. Surprise contender in Brazil election runoff Associated PressBUENOS AIRES, Argentina Argentinas former Economy Minister Domingo Cavallo was absolved by a local court on Monday in a case over the 2001 debt swap ahead of the countrys worst economic crisis. Cavallo, 68, had faced charges of illegal negotiations in the hiring of banks to carry out the $30 billion swap. A Buenos Aires court said that he didntinas worst economic crisis. Argentinian court absolves former Economy Minister PAGE 14 A14TUESDAY, OCTOBER7, 2014CITRUSCOUNTY(FL) CHRONICLELOCAL 000JI8B Honoring Survivors Remembering Loved Ones Marion Carl Boatright, Sr. 10-16-56 8-5-2013 Still missing you after one year! Go Seminoles Diane Simmons and Kay Bookmyer 000JHCM 000JHCZ Honoring Cancer Survivors Michele Snellings My Mother is The Heart of Relay Fighting For A Cure To Celebrate More Birthdays! Cancer Survivor 13 years 000JHF5 Judy Wein Antoon 12-28-1958 05-31-2013 Judy, strong and courageous, loved the gift of life GOD gave. Her family and friends will miss her and the encouragement she gave to all. 136 NE. 12th Avenue, Crystal River, FL 34429 FX (352) 795-5848 PH (352) 795-5044 Health Services of Florida, LLC d/b/a Crystal River Health and Rehabilitation Center 000JB01 24-hour, Seven-Day-aWeek Skilled Nursing Care Physician Oversight Seven-Day-a-Week Physical, Occupational and Speech TherapiesLet us help you and your loved one reclaim the highest level of independence possible with services including: Beth... your strength, courage and positive attitude are an inspiration to all who know and love you. Youre my sunshine. Love You, Mom 000JH8C 000JH5V In Loving MemoryRay RussoMy Husband, My Best Friend. I miss you and I will love you forever. Pauline xoxo 000JFKL When one beautiful life passes, another is born. That was Dottie Polk, loving wife, mother, grandmother and friend to many. Dottie Polk 000J36Z KATIEHENDRICK CorrespondentFor breast cancer patients in remission, there is no magic diet that will keep you cancer free, but watching what you eat certainly matters. Its very individual, said Dr. Vipul Patel, a hematologist and oncologist with Florida Cancer Specialists in Inverness. It doesnt matter so much what you eat, just that you maintain a healthy weight. Two studies from The National Cancer Institute The Womens Interventional Nutrition Survey and The Womens Healthy Eating Study examined diets link to breast cancer treatment by comparing the outcomes of women who adhered to a low fat (fewer than 20 percent of daily calories) and high vegetable diet to those in a control group who ate whatever they wanted. In The Womens Interventional Nutrition Survey, the healthy eaters felt better and had a lower rate of recurrence. In the second study, there was no effect. The difference? No one lost weight in The Womens Healthy Eating Study, Dr. Patel said. According to the National Cancer Institute, women should keep their body mass index (BMI) below 30 to reduce the risk of recurrence of breast cancer. A BMI under 25 is ideal, Dr. Patel said. Leaner women tend to do better with chemotherapy, he said. Achieving a healthy BMI has many factors, including genetics, but certain lifestyle choices have generally positive results. Dr. Patel and the American Cancer Society recommend reaching for foods high in nutrients and low in calories, such as whole fruits and vegetables (versus canned), minimizing consumption of saturated and trans fats, drinking 2.7 liters of water a day to stave off dehydration, and getting a minimum of 150 minutes of moderate exercise a week. Theres also some data suggesting spices cumin, garlic, ginger and turmeric might have a positive impact, he said. The thinking there, he said, is that spices add flavor to food without adding calories. One much-maligned ingredient patients frequently ask Dr. Patel about is sugar. Sugar does not feed cancer, he said. But, it adds calories, which can lead to weight gain, which increases the risk of recurrence. The only ingredient known to have an adverse impact on breast health: alcohol. There have been many studies that show heavy alcohol consumption, which is about three glasses of wine a day, increases the risk of breast cancer by 11 percent, Dr. Patel said. He advises his patients to abstain from alcohol during their treatment and to keep drinking to a minimum when theyre in remission. Norma Reynolds, a dietician with Citrus Memorial Health System, explained the reasons heavy drinking is dangerous, particularly for breast cancer patients. Alcohol consumption can increase blood levels of estrogen, a sex hormone linked to the risk of breast cancer, Reynolds said. It also impairs the bodys ability to break down and absorb a variety of nutrients such as Vitamins A, B complex, C, D, E and carotenoids. Reynolds also addressed the other side to weight maintenance: not eating enough. To combat weight loss and fatigue, side effects for many undergoing cancer treatment, its important to eat whenever youre hungry, regardless of time of day, Reynolds said. Whole grains can help offset peaks and valleys of energy. To get adequate nutrients, Reynolds recommends a diet rich in lean meats, fish, poultry, whole grains, legumes, dairy, cheese, soy products and mushrooms. Protein, which helps repair body tissue and keeps the immune system healthy, is very important, she said. Good examples of this include applesauce, bananas, oatmeal, cream of wheat, Jello, nuts, peanut butter and cottage cheese. Finally, cancer patients should be extra vigilant in avoiding raw and undercooked foods. (A safe temperature is 165 degrees or higher, she said.) Cancer and its treatments can weaken the immune system, making you more susceptible to many types of infections, including those brought on by disease-causing bacteria and other pathogens that lead to food-borne illnesses, she said. Those undergoing cancer treatments are more likely to have lengthier illnesses, undergo hospitalization or die, should they contract a food-borne illness. Watch your weight after breast cancer For an easy and healthy burst of energy, try these recipes, courtesy of Citrus Memorial Health System dietician Norma Reynolds. TWENTY-MINUTEVEGETABLESOUPIngredients: 1 cup leeks, washed and sliced thin 1 cup grated or diced carrot 1 cup diced celery 1 teaspoon thyme leaves 1 tomato, seeded and chopped a pinch of salt 4 ounces parmesan cheese (or other grated aged cheese) 1 quart of chicken broth Directions: Mix all ingredients except for tomato and cheese in chicken broth. Simmer for 15 minutes. Add tomato and cheese. Continue simmering for 5 minutes. DARKCHOCOLATEFRUITDISCSIngredients: 1 pound of dark chocolate chips 4 ounces dried fruit 1/4 cup walnut pieces Directions: Place chocolate in microwave-safe bowl. Microwave for two minutes. Remove and stir the chocolate. It should be softened enough to dissolve. (If it hasnt softened, continue microwaving in 20-second bursts.) Allow the chocolate to cool for a few minutes. While you wait, line a cookie sheet with wax paper and assemble fruit and nuts. When the chocolate has cooled, drop 16 spoonfuls onto the wax paper. (These will form circles.) Divide the dried fruit and nuts among the 16 discs, gently pressing them into the chocolate. Place cookie sheet in fridge and allow the chocolate to set for at least one hour. Eating healthy helps reduce risk of recurrence Special to the ChronicleThere is some data suggesting that spices such as garlic (above), cumin, ginger and turmeric might have a positive impact on a post-breast cancer diet. PAGE 15 Associated PressDENVER Former Florida Gov. Jeb Bush hasnt said whether hes going to run for president in 2016, but hes going on the air in three races this year in Spanish. The U.S. Chamber of Commerce on Monday released Spanish-language ads Bush filmed for three Republican candidates: Rep. Cory Gardner in Colorado, who is running for U.S. Senate; embattled Rep. David Valadao in California; and Martha McSally, who is trying to oust Democratic Rep. Ron Barber in Arizona. Bush is President George W. Bushs brother and many Republican power brokers favored 2016 candidate. He is bilingual and supports immigration reform. But that position could make it challenging for him to win a Republican primary if he runs. Jeb Bushs. Associated PressORLANDO Floridas Republican Attorney General Pam Bondi and Democratic challenger George Sheldon clashed with each other and with Libertarian Bill Wohlsifer on Monday, tackling issues such as medical marijuana and samesex marriage during the first and only debate in the race for Floridas top legal job. Bondi said she worries a ballot initiative legalizing medical marijuana will allow the drug to fall into the hands of young teens, but Sheldon said he trusts doctors to prescribe it if the measure passes. Bondi said she doesnt want to hurt Floridians with terminal illnesses but she said Floridas young teens could get their hands on the drug as an unintended consequence of the initiative. The proposal would allow marijuana to be prescribed to people with debilitating diseases. I think were doesnt samesex marriage. Bondi called it a tremendous win for supporters of same-sex marriage. She said her office would review how they should respond. Sheldon said the high courts decision not to take up any of the same-sex marriage cases showed the justices didntidas ban on same-sex marriage. But Bondis office has appealed the rulings and asked judges to stop ruling on same-sex marriage cases until the U.S. Supreme Court decides whether states can ban gay marriage. During Mondaysidas largest power companies, Duke Energy Florida, to give back $54 million it collected from ratepayers to pay for a failed nuclear plant.STATECITRUSCOUNTY(FL) CHRONICLETUESDAY, OCTOBER7, 2014 A15 000JEHNP Dr. Richard C. Swanson PROFESSIONAL CONVENIENT PAIN FREE 352-795-1223 1815 N. Suncoast Blvd. Crystal River, FL New Patients Free Consults Emergency Care CEREC One-Visit Crowns Implants Lumineers and Veneers Dentures, Partials & Bridges Extractions Invisalign (clear alternative to metal braces) In-House Specialty Care Root Canal Therapy Periodontal Gum Care Fillings Cleanings Sealants AAID/ICOI Botox & Juvederm And much more! HELP US HELP THEM The proceeds from all dental procedures done on Tuesday, November 11th will go to two of Dr. Swansons favorite charities. Wounded Warrior Project Shriners Hospitals Schedule your appointment today and help us help them. 000JBPI Same-sex marriage, marijuana among topics at AG debate Jeb Bush cuts ads for candidates PAGE 16 Associated PressWASHINGTON Vice President Joe Bidensias role in aiding extremists. The diplomatic scramble that followed underscores the Middle Easts tangled alliances and the murky sources of support that have helped Syria become a hotbed for extremists. While Bidens. Even after Bidens backto-back apologies, the White House was still in clean-up mode Monday. Officials made clear that Biden had erred in his public comments, but stopped short of declaring them inaccurate. He himself wishes he had said them a little differently, White House spokesman Josh Earnest said in response to one of several questions on the matter in his daily briefing foraida wereve stopped short of calling out specific countries and governments by name. A key question about the source of the support for extremist groups is whether the regional governments explicitly facilitated the flow of money, weapons and fighters, or just turned a blind eye to the actions of wealthy and well-connected individuals within their country. Biden appeared to suggest a more direct government role than other U.S. officials have. WHY DID BIDEN APOLOGIZE? The timing of Bidens remarks created a diplomatic headache for a White House that has spent months trying to convince powerful regional players to join the fight against the Islamic State group. Thus far, Obama has had surprising success in garnering their support. Five Arab nations have joined the U.S. in the bombing campaign against the militants in Syria, including Saudi Arabia and the UAE. Turkeys parliament also approved a motion giving the government powers for military operations across the border in Syria and Iraq and for foreign troops to use Turkeys territory. The swiftness of Bidens personal apologies to Turkeys president and Prince Mohamed bin Zayed, the crown prince of Abu Dhabi, reflect the degree to which the White House wants to keep those partnerships in place. Still, the White House readouts of both apologies were carefully crafted. Officials said Biden apologized to Erdogan for implying that his country had intentionally supplied or facilitated the growth of the Islamic State or other extremist groups in Syria. The White House said Biden similarly told the crown prince of Abu Dhabi that he had not meant to imply that the Emirates had facilitated or supported extremists.A16TUESDAY, OCTOBER7, 2014CITRUSCOUNTY(FL) CHRONICLENATIONJF93. ONE WEEK ONLY 000JGQP Painless! Permanent Makeup Permanent makeup is always there! We cater to cowards! ABSOLUTELY YOU (352) 726-1100 HIGHLAND SQUARE SHOPPING CENTER 219 E. Highland Blvd. Inverness, Florida 3445275 Licensed, Bonded & Insured NO CREDIT CHECK FINANCING Gets You The AIR CONDITIONING 352-795-7405 Your Family Can Rely On Residential & Commercial #CAC051514 Biden critique of allies creates headache for US Associated PressVice President Joe Biden speaks Monday about the minimum wage at an event at a Mexican restaurant in Las Vegas. PAGE 17 Associated Press its there for future generations to learn, said Fawn Sharp, president of the Quinault Nation, a tribe. We dont wouldnt be America without Christopher Columbus. Seattle Mayor Ed Murray is expected to sign the resolution,ans Day. Seattle councilmember Bruce Harrell said he understood the concerns from people in the ItalianAmerican community, but he said, I make no excuses for this legislation. He said he co-sponsored the resolution because he believes the city wont be successful in its social programs and outreach until we fully recognize the evils of our past. Councilmember Nick Licata, who is Italian-American, said he didnt see the legislation as taking something away, but rather allowing everyone to celebrate a new day where everyones strength is recognized. David Bean, a member of the Puyallup Tribal Council, told councilmembers the resolution demonstrates that the city values tribal members history, culture, welfare and contributions to the community. Associated PressHARRISBURG, Pa. Pennsylvania Gov. Tom Corbett said Monday he supports a bill designed to prevent offenders from causing their victims mental anguish, a proposal launched after a Vermont college choose a convicted cop killer as a commencement speaker. Corbett spoke at a Capitol event one day after Mumia Abu-Jamal gave a recorded address to about 20 graduates at Goddard College in Plainfield. Nobody has the right to continually taunt the victims of their violent crimes in the public square, Corbett said. He called the schools choice of Abu-Jamal unconscionable. The bill that advanced out of a House committee Monday would allow victims to go to court for an injunction against conduct which perpetuates the continuing effects of the crime on the victim. Abu-Jamal is serving life in prison for killing Philadelphia Police Officer Daniel Faulkner in 1981. In the recorded remarks, he encouraged the students to think about the myriad of problems that beset this land and strive to make it better.NATIONCITRUSCOUNTY(FL) CHRONICLETUESDAY, OCTOBER7, 2014 A17 WE ACCEPT MEDICARE AND MEDICAID FOR MOST MEDICAL EQUIPMENT 609 SE U.S. HWY. 19 CRYSTAL RIVER (352) 564-1414 Life just got a little easier Quality Mobility $ 159 AND UP In Stock 4-Wheel Walkers 000JGAN 8303 S. Suncoast Blvd., Homosassa (Just South of Sugarmill Woods) 352-628-9900 000JGPN Monday Friday 8:00 am to 5:00 pm OTHER HOURS BY APPOINTMENT Breast Cancer Awareness Month SPECIAL $ 60 Mammogram if you mention this ad 1st 100 patients receive a FREE commemorative tote. 000JGLX Lic. #CBC1252474 000JFEP 1639 W Gulf to Lake Hwy., Lecanto, FL CELL 352-220-1140 746-6800 1639 W Gulf to Lake Hwy., Lecanto, FL dealerschoice@tampabay.rr.com Support Awareness & Finding The Cure CAR AUDIO VIDEO TRUCK ACCESSORIES CUSTOM WHEELS & TIRES M.E.CLP. Certified 000JFFZ 1445 Hwy. 41 N., Hernando City Heights (Look for the Stone House) For your convenience, call Linda Evans for an appointment. Tues.Sat. 10 AM 4 PM (352) 726-6868 PRECISION CUT S PERMS COLOR PRECISION HAIR NEW YORK TRAINED! 1050 SE US Hwy 19 Crystal River 352-795-7233 STOP IN TODAY! Let us inspect your battery, belts & hoses for signs of wear this August. They can greatly affect the performance of your car. Dissolves deposits from transmission components & flushes old worn out fluid. Most vehicles. Expires 10/31/14 Not valid with any other offer. 10 % OFF Most vehicles. Expires 10/31/14 Not valid with any other offer 15 MINUTE OIL CHANGE $ 5 00 OFF 000JGT6 ANY FLUID FLUSH SERVICE The way it should be done 000jg5b Pulmonary Group Of Central Florida Dr. Jose Diaz, M.D. Accepting New Patients Call Sandy at 352-201-8448 Participating with most insurance plans 000JEJX 221 N.E. Hwy. 19, Crystal River, FL (352) 795-2526 Toll Free: (800) 282-6341 A Lens For Every Lifestyle. 000JH8A SAVE THIS DATE! SAVE THIS DATE! WED. OCT. 29, 6:30 AM -9 PM ALL OLIVE TREE WAITSTAFF WILL DONATE: 100% OF ALL TIPS ~ ALL DAY & NIGHT YOUR TIPS BENEFIT THIS LOCAL CANCER CHARITY! *100% of all donations go directly to Dr. Joseph Bennetts LOCAL Citrus Aid Cancer Foundation TIPS FOR THE CURE Olive Tree Restaurant 963 N. Suncoast Blvd., Crystal River 352-563-0075 ~ ~ 000JGNR Natures Resource352-666-1005Quality Water SystemsCheck and adjust most makes or models of water softener conditioners$4995set timer, clean screens, adjust coil settings. test water, check regeneration cycle.Limited time offer!WE FIX BAD WATER Whole House Water FilterFREE INSTALLATION!Dual Alternating TechnologyClean Water 24/7Eliminates: Yellow Water, Iron, Odors, Chlorine & Hardness Call today for ourFREE WATER TESTServing Citrus, Pasco & Hernando Counties Since 1996 No Filtersfor you to change ...EVER! Reg. $69.95Call Today 000JGLZ Specialty Gems 600 SE Hwy. 19, Crystal River 795-5900 Est. 1985 Exceptional Jewelry Custom Designs Quality Repair Personalized Service WE BUY GOLD! October Birthstone Opal & Diamonds Specialty Gems 000JFF1 The Crystal River Home Depot #6332 70 N. Suncoast Blvd., Crystal River, FL 34429 352-563-9800 Mon-Sat 6am to 9pm Sun 8am to 8pm 864 NE 5th Street, Crystal River 000JGYL 2014 2014 2014 2014 M-F 8:30am 7pm Sat 8:30am 5pm Thank You Pat Sparkman ...over 26 years in 3-dimensional, high-resolution breast scanning. 471 N. Dacie Point, Lecanto.....................746-3420Hwy. 491 Next To Suncoast Dermatology206 W. Dampier Street, Inverness...........637-2079One Block Behind City Hall On Seminole Ave., Inverness 8:30-6 Sat 8:30-1BrashearsPHARMACY TMA convenient way to have all your medications filled at the same time each month. Contact your Pharmacist at Brashears Pharmacy today to get started!Sync Your Refillsat Brashears Pharmacy 000JE8E Citrus County Dog Training Center F OR ALL BREEDS OF DOGS AND THEIR OWNERS at SHAMROCK INDUSTRIAL PARK SHAMROCK INDUSTRIAL PARK 6843 N C ITRUS A VENUE C RYSTAL R IVER 212-5596 OR 212-1697 Call Us Call Us Today! Today! C LIMATE C ONTROLLED F ACILITIES O VER 3000 SQ FT M ORNING & E VENING C LASSES Puppy Socialization Basic Pet Obedience Novice Obedience A.K.C Rally A.K.C Good Citizen Therapy Dog Conformation Buddy Training Nose Work Seattle: Columbus out, natives in City to celebrate Indigenous Peoples Day Speech by cop killer leads to bill PAGE 18 Associated PressWEST POINT, N.Y. Former Secretary of State Condoleezza Rice was honored Monday at West Point with the U.S. Military Academys annual Thayer Award. The award is given to a U.S. citizen for outstanding service in the national interest that illustrates the academys motto of Duty, Honor, Country. For more than three decades and during some of Americas more trying times, she has participated in shaping our Nations development and implementation of foreign policy and national security strategies, according to Rices award citation. Interspersed with government service, Dr. Rices contributions within Americas academic, corporate, and social spheres have been far-reaching and, at times, groundbreaking. Rice, 59, is a professor at the Stanford University Graduate School of Business and a senior fellow at the Hoover Institution. She was President George W. Bushs. The award is named for Col. Sylvanus Thayer, West Points fifth superintendent and known as the Father of the Military Academy. Last years honoree also was a former secretary of state: Madeleine Albright, who served during President Bill Clintons second term.A18TUESDAY, OCTOBER7, 2014CITRUSCOUNTY(FL) CHRONICLENATION 352-628-1400 Toll Free: 1-877-647-1400 tritonlumber@tampabay.rr.com At Triton Lumber We Now Carry . We stock all sizes from 2x4 to large timbers. We also specialize in special orders. We are also a full service hardwood supplier, rough sawn or dressed. We carry 1/4 3/4 4x8 sheets of plywood of most species including domestics & exotics. We also have veneers as well as molding and flooring in stock. We will cut and ship to your specs. Boat Lifts Dock Hardware Marine Lumber Composite Decking Hardwood Lumber Floating Docks/Hardware Milling Facilities 000JGYY 6971 W. Homosassa Trail, Homosassa, Fl Mon. thru Fri. 7am to 5pm and Sat. 8am to 12:30PM BUY SELL TRADE SERVICE STORAGE BOAT SALES BUY SELL TRADE SERVICE STORAGE BOAT SALES (352) 563-5510 (352) 563-5512 1038 N. SUNCOAST BLVD., CRYSTAL RIVER 000JGZJ 2 GREAT NEW LINES/14 We have pumpkins of all sizes. 000JG6G OUTBOARD MOTOR SERVICES Full Service including Trolling Motor Repairs, Boat Bottom Painting and Free Pickup/ D elivery at Ramp WE SELL BULK OIL OUTBOARD MOTOR SERVICES AAA OUTBOARD MOTOR REPAIR 1422 S.E. Hwy. 19, Crystal River, FL 352-795-9630 aaaoutboardmotors.com aaaoutboardmotors@gmail.com 000JGYN Connies Mastectomy Boutique Trulife 000JFSY 1801 NW Hwy. 19, Ste. 355, Crystal River Mall 352-564-8470 Knowledge Superior Service TrustworthinessWatch & JewelryJewelry repairs done while you shop FREE ESTIMATES Blind Lady Driving ALL TYPES OF WINDOW TREATMENTS 000JH2C 2968 W. Gulf to Lake Hwy, Lecanto 5454 US Hwy 19, Homosassa 2 Locations To Serve You 352-628-7888 352-746-1998 VERTICALS & HORIZONTALS SHUTTERS & SOFT TREATMENTS NO JOB TOO SMALL CUSTOM MADE BLINDS BLIND FACTORY BY JO ANN 000JG6J Shawls Hats Yarns Toys Scarves Throws Garden Decor Accessories Learn About the Alpaca Lifestyle 4920 Grover Cleveland Homosassa, FL 352-628-0156 surialpaca@yahoo.com A lpacaMagicUSA.com Come Experience The ALPACA ALPACA MAGIC! MAGIC! Call for your free visit with the alpacas! Browse the alpaca store... Shop for unusual plants! Open House Oct. 11-12 and Oct. 18-19 10am-4pm. Richard T. Brown Funeral Director/Owner000JDX6 Brown Funeral Home & CrematoryLecanto, FloridaIgrayne Brown Dias Funeral DirectorTwo Generations serving you with compassionate, personalized service.352-795-0111 T amara S Y oung EA Tax & Accounting Service, LLC Financial Statements for Small Business Federal Reports Monthly & Quarterly Tax Preparation Personal & Business Pick-Up & Drop Off Service Available Notary Public Service VISIT OUR NEW STOREFRONT LOCATION 7888 W. Dunnellon Rd., Dunnellon, FL 34433 Visit Our Website at: tammyyoungtax.net 7888 W. Dunnellon Rd., Dunnellon, FL 34433 352-795-2496 Fax 352-795-8745 Onyx 000JFAU Located in the Golden Eagle Plaza HOMOSASSA 3297 S Suncoast Blvd. Hwy. 19 (Next to Comos RV Sales) 352-503-6853 Follow Us On EARLY EVENING SPECIALS 3pm-6pm Sun. Noon-6pm Half Price Wine & Beers Entrees served with choice of fresh homemade soup or crisp house salad and yes, fresh complimentary dessert! Sirloin Steak, Baked Potato, Fresh Homemade Soup or Greek Salad & Dessert SUNDAYS: Serving Wonderful Breakfast, Lunch & Dinner Wed.-Sat. 3pm-9pm Sun. 8am-7pm Closed on Mon. & Tue. 000JHDO The BEST of Seafood Fresh Clams Mussels Snow Crab Calamari & Shrimp Gyros Lamb Shanks Moussaka Italian Dishes SOMETHING FOR EVERYONE WEDNESDAY STEAK NIGHT $ 12 95 000JG2J $ 99 through the end of the year Unlimited Classes Offer expires Oct. 31, 2014 000JGXN6546 W. Gulf to Lake Hwy. Crystal River Open: M-F 9am-5-pm Sat. 10am-2pm Wed Like To Thank Our Customers For Their Support In 2013 IN STOCK LAMINATE & TILE$399sq. ft. Installed Mention This Ad$199sq. ft.LAMINATE Cash & Carry $150sq. ft. Cash & Carry TILE TEAR OUTS AND MOULDINGS NOT INCLUDED. Ex-Bush official receives top West Point award Associated PressWest Point cadets grab a photo op Monday with former Secretary of State Condoleezza Rice before she receives the U.S. Military Academys annual Thayer Award at West Point, N.Y. PAGE 19 Associated PressSAN FRANCISCO Personal computer sales have been in a slump for years, as customers flock to increasingly powerful smartphones, tablets and other mobile devices. Now Hewlett-Packard, the Silicon Valley stalwart that was once the worlds biggest seller of personal computers, is splitting off its PC and printing businesses. Its the latest shakeup in a tech industry thats being reshaped by the mobile revolution. IBM sold its PC business years ago. Dell took its struggles private. Can an HP spinoff focused on personal computing thrive? The. HPs split is a sign that CEO Meg Whitman sees more growth and profit opportunity in selling commercial tech products, including data-center hardware, business software and cloud services, some analysts say. Thats the business she plans to lead, as chief executive of a new company dubbed HewlettPackard Enterprise. That puts more pressure on the HP Inc. spinoff, which will be led by current PC and printing executive Dion Weisler as CEO. Though it was once the world leader in both segments, HP is now No.2 to ChinMs server business and taking over the Motorola smartphone division from Google Inc. PC sales arent going away entirely, to be sure. There are still some cases where PCs are more useful than smaller-screen devices, especially in the workplace, said Bob ODonnell of TECHnalysis Research. The industry sold more than 310million desktop and laptop computers last year, and one out of six were sold by Palo Alto, California-based HP. But global sales fell 10percent in 2013 and are likely to fall another 4percent this year, according to the IDC research firm. PC sales should level off in 2015, forecasts ODonnell. They can be profitable, he said, but its.BUSINESSCITRUSCOUNTY(FL) CHRONICLETUESDAY, OCTOBER7, 2014 A19 Money&MarketsAclick of the wrist gets you more at 1,800 1,850 1,900 1,950 2,000 2,050 AMJJAS 1,920 1,960 2,000 S&P 500Close: 1,964.82 Change: -3.08 (-0.2%) 10 DAYS 16,000 16,400 16,800 17,200 17,600 AMJJAS 16,640 16,940 17,240 Dow Jones industrialsClose: 16,991.91 Change: -17.78 (-0.1%) 10 DAYSAdvanced1542 Declined1585 New Highs43 New Lows72 Vol. (in mil.)3,261 Pvs. Volume3,483 1,773 1,728 857 1807 30 117 NYSE NASD DOW 17099.3916930.3816991.91-17.78-0.10%+2.51% DOW Trans.8545.678382.238384.63-97.36-1.15%+13.30% DOW Util.558.78553.14555.34-0.15-0.03%+13.20% NYSE Comp.10704.9010611.2310647.51+12.02+0.11%+2.38% NASDAQ4496.264444.104454.80-20.82-0.47%+6.66% S&P5001977.841958.431964.82-3.08-0.16%+6.30% S&P4001370.191358.021360.55-3.85-0.28%+1.34% Wilshire 500020815.0220607.7420665.04-50.49-0.24%+4.87% Russell 20001108.001093.771094.65-10.09-0.91%-5.93% HIGH LOW CLOSE CHG. %CHG. YTD StocksRecap AK Steel Hold AKS3.81511.37 7.30-.35 -4.6ttt-11.0+97.7dd... AT&T Inc T31.74737.48 35.49+.13 +0.4sss+0.9+10.6111.84 Ametek Inc AME43.40462.05 50.18+.09 +0.2stt-4.7+12.4220.36 Anheuser-Busch InBev BUD93.727116.65 108.42+.97 +0.9stt+1.8+12.12.82e Bank of America BAC13.68918.03 17.29... ...rss+11.0+24.1200.20f Capital City Bank CCBG11.33714.98 13.53+.13 +1.0stt+15.0+12.6250.08 CenturyLink Inc CTL27.93845.67 40.68-.32 -0.8tst+27.7+38.4dd2.16 Citigroup C45.18855.28 52.28-.04 -0.1tss+0.3+8.2120.04 Disney DIS63.10091.20 88.56+.11 +0.1stt+15.9+39.5210.86f Duke Energy DUK66.15075.77 75.07-.10 -0.1tss+8.8+18.1243.18f EPR Properties EPR47.39360.80 51.38+.60 +1.2sts+4.5+11.9163.42 Equity Commonwealth EQC22.06528.28 24.87-.15 -0.6ttt+6.7+11.1dd... Exxon Mobil Corp XOM84.795104.76 94.52+.60 +0.6sts-6.6+12.9122.76 Ford Motor F14.40118.12 14.52-.07 -0.5ttt-5.9-11.190.50 Gen Electric GE23.50428.09 25.22-.18 -0.7ttt-10.0+9.0180.88 HCAHoldings Inc HCA43.20073.94 70.91-.34 -0.5tss+48.6+55.118... Home Depot HD73.74093.75 93.26-.28 -0.3tss+13.3+25.6221.88 Intel Corp INTC22.48935.56 34.11+.08 +0.2stt+31.4+54.6170.90 IBM IBM172.197199.21 189.04+.37 +0.2stt+0.8+4.8124.40 LKQ Corporation LKQ24.46334.32 27.09-.29 -1.0tts-17.6-16.023... Lowes Cos LOW44.13954.81 53.60+.01 ...rss+8.2+13.4220.92 McDonalds Corp MCD90.533103.78 93.84-1.02 -1.1tst-3.3+3.6173.40f Microsoft Corp MSFT32.80947.57 46.09... ...rtt+23.2+39.4181.24f Motorola Solutions MSI58.61368.33 61.50+.20 +0.3sst-8.9+3.3191.36f NextEra Energy NEE79.157102.51 93.66-.57 -0.6ttt+9.4+22.2202.90 Penney JC Co Inc JCP4.90811.30 9.44-.56 -5.6ttt+3.2+18.9dd... Piedmont Office RT PDM15.83519.97 17.71+.05 +0.3sts+7.2+4.9510.80 Regions Fncl RF9.19411.54 9.98-.12 -1.2ttt+0.9+10.3130.20 Sears Holdings Corp SHLD24.10254.69 29.12+.90 +3.2sts-26.7-45.6dd... Smucker, JM SJM87.105112.95 98.50-.16 -0.2ttt-4.9-3.7182.56f Texas Instru TXN38.93849.77 46.63-.20 -0.4ttt+6.2+19.4221.36f Time Warner TWX60.72588.13 73.82-.90 -1.2ttt+10.4+21.4161.27b UniFirst Corp UNF91.592117.91 96.03-.88 -0.9ttt-10.3-3.4160.15 Verizon Comm VZ45.45653.66 50.08+.37 +0.7sss+1.9+10.3112.20f Vodafone Group VOD31.87242.14 32.98+.47 +1.4sts-17.5-10.41.82e WalMart Strs WMT71.51681.37 77.35+.03 ...rss-1.7+8.3161.92 Walgreen Co WAG54.54376.39 60.65-.12 -0.2tts+5.6+10.9301 appliance and home furnishings retailer said it is considering selling itself as it explores strategic alternatives. A Stifel analyst upgraded the consulting companys stock to a Buy rating citing the companys new growth initiatives set by its CEO. The tax preparer said its attempt to sell its banking business will be delayed until next year because of regulatory issues. The medical equipment maker is being bought by rival Becton Dickinson in a deal thats worth $12.2 billion. HP is splitting itself into two companies: one focused on its computer and printer business and another on technology services. Stocks fell slightly Monday, continuing the markets downward trend in the last two weeks. A bit of positive corporate news from Hewlett-Packard was not enough to push stocks higher. Small, riskier stocks found in the Russell 2000 index were the hardest hit. 30 35 $40 JAS Hewlett-PackardHPQ Close: $36.87 1.67 or 4.7% $20.25$38.25 Vol.: Mkt. Cap: 55.7m (5.4x avg.) $68.81 b 52-week range PE: Yield: 13.9 1.7% 40 50 $60 JAS CareFusionCFN Close: $56.75 10.58 or 22.9% $36.73$57.37 Vol.: Mkt. Cap: 50.6m (24.1x avg.) $11.54 b 52-week range PE: Yield: 29.0 ... 28 30 32 $34 JAS H&R BlockHRB Close: $29.91 -1.75 or -5.5% $26.60$33.92 Vol.: Mkt. Cap: 11.3m (5.7x avg.) $8.23 b 52-week range PE: Yield: 16.4 2.7% 34 36 38 $40 JAS FTI ConsultingFCN Close: $35.74 0.88 or 2.5% $28.23$46.73 Vol.: Mkt. Cap: 423.4k (1.6x avg.) $1.46 b 52-week range PE: Yield: ... ... 20 30 40 $50 JAS ConnsCONN Close: $32.68 -0.26 or -0.8% $26.60$80.34 Vol.: Mkt. Cap: 2.2m (1.6x avg.) $1.18 b 52-week range PE: Yield: 12.3 ... The yield on the 10-year Treasury fell to 2.42 percent Monday. Yields affect rates on consumer and business loans.NET 1YR TREASURIES YEST PVS CHG AGO 3.25 3.25 3.25 .13 .13 .13 PRIME RATE FED FUNDS 3-month T-bill.010.01....02 6-month T-bill.040.04....03 52-wk T-bill.090.09....09 2-year T-note.540.56-0.02.33 5-year T-note1.691.73-0.041.41 10-year T-note2.422.44-0.022.65 30-year T-bond3.133.12+0.013.72 NET 1YR BONDS YEST PVS CHG AGO Barclays LongT-BdIdx2.952.97-0.023.51 Bond Buyer Muni Idx4.394.39...5.13 Barclays USAggregate2.332.32+0.012.34 Barclays US High Yield5.956.08-0.136.14 Moodys AAACorp Idx3.983.99-0.014.57 Barclays CompT-BdIdx1.992.02-0.031.60 Barclays US Corp3.073.06+0.013.27 YEST 6 MO AGO 1 YR AGO Commodities The price of oil rose Monday as the value of the dollar dropped. Natural gas fell sharply on forecasts of warmer weather. Gold, silver and copper rose. Corn and soybeans declined.Crude Oil (bbl)90.3489.74+0.67-8.2 Ethanol (gal)1.531.50-0.20-20.1 Heating Oil (gal)2.622.62+0.19-14.8 Natural Gas (mm btu)3.904.04-3.49-7.9 Unleaded Gas (gal)2.412.38+1.46-13.4 FUELS CLOSEPVS. %CHG%YTD Gold (oz) 1206.701192.20+1.22+0.4 Silver (oz) 17.1816.78+2.38-11.2 Platinum (oz)1248.401226.00+1.83-9.0 Copper (lb) 3.032.99+1.20-11.9 Palladium (oz)765.25753.70+1.53+6.7 METALS CLOSEPVS. %CHG%YTD Cattle (lb) 1.631.62+0.40+21.2 Coffee (lb) 2.211.85+7.75+99.5 Corn (bu) 3.333.23+2.86-21.2 Cotton (lb) 0.650.63+3.03-23.2 Lumber (1,000 bd ft)350.20349.20+0.29-2.8 Orange Juice (lb)1.431.41+1.17+4.5 Soybeans (bu)9.429.12+3.29-28.2 Wheat (bu) 4.924.86+1.18-18.8 AGRICULTURE CLOSE PVS. %CHG%YTD American Funds AmBalAm 25.39-.01 +5.3+12.8+15.7+12.5 CapIncBuAm 59.39+.16 +4.7+9.6+12.3+9.3 CpWldGrIAm 46.01+.14 +3.2+10.4+17.0+9.8 EurPacGrAm 48.05+.27 -2.1+4.3+12.9+6.5 FnInvAm 53.65-.05 +5.1+14.8+20.4+14.0 GrthAmAm 45.37-.13 +5.5+14.5+21.4+14.1 IncAmerAm 21.36+.02 +5.9+12.0+14.6+11.9 InvCoAmAm 39.39-.03 +8.5+19.0+21.2+14.1 NewPerspAm 37.78+.05 +0.6+8.8+16.9+11.2 WAMutInvAm 41.57-.05 +6.8+17.2+20.2+15.7 Dodge & Cox Income 13.85+.01 +4.9+6.1+5.2+5.4 IntlStk 44.73+.49 +3.9+11.1+17.3+9.2 Stock 178.51+.04 +7.2+18.9+25.3+16.1 Fidelity Contra 100.69-.25 +5.8+16.3+20.4+15.6 ContraK 100.69-.26 +5.9+16.5+20.5+15.8 LowPriStk d 48.46-.08 +2.7+10.0+20.4+15.7 Fidelity Spartan 500IdxAdvtg 69.71-.11 +7.9+18.6+21.6+15.6 FrankTemp-Franklin Income C m 2.49+.01 +5.3+10.7+13.7+10.6 IncomeAm 2.46+.01 +5.8+11.4+14.3+11.2 Harbor IntlInstl 67.92+.70 -4.4+0.2+11.9+7.3 Oakmark Intl I 24.61+.34 -6.5-2.2+16.1+10.4 T Rowe Price GrowStk 54.63-.25 +3.9+15.4+22.2+16.9 Vanguard 500Adml 181.33-.29 +7.9+18.6+21.6+15.6 HltCrAdml 90.04-.12 +19.3+30.9+28.0+20.2 IntlStkIdxAdm 27.07+.19 -1.0+3.3+11.2NA MuIntAdml 14.24... +6.3+6.8+4.6+4.3 PrmcpAdml 107.14-.27 +11.9+23.6+24.2+17.0 STGradeAd 10.72+.01 +1.8+2.3+2.8+3.2 Tgtet2025 16.45... +4.4+10.1+13.8+10.6 TotBdAdml 10.83+.01 +4.6+4.5+2.7+4.1 TotIntl 16.18+.11 -1.2+3.2+11.1+5.7 TotStIAdm 49.09-.11 +6.5+16.5+21.6+15.8 TotStIdx 49.07-.12 +6.4+16.4+21.4+15.7 WelltnAdm 68.42+.02 +6.4+12.9+15.2+11.6 WndsIIAdm 68.98+.02 +7.0+16.5+21.4+14 519-1007 TUCRN NOTICE OF CERTIFICATION OF ASSESSMENT ROLL Pursuant to Section 193.122(2) Florida Statutes, LES COOK, Property Appraiser of CITRUS County, Florida, hereby gives notice that the 2014 Assessment Roll of CITRUS County, including its required extensions thereon to show taxes attributable to taxable property, and an accompanying Supplemental Roll for back assessments, were certified to the Tax Collector on the 2nd day of October, 2014 for the collection of taxes. 000JHRP 000JHMD US stocks edge lower Associated PressNEW YORK Some encouraging corporate news failed to give the broader stock market a boost on Monday, and stocks edged lower as investors waited for news on the outlook for the Federal Reserves interest rate policy. After opening higher, stocks gave up their early gains and alternated between small gains and small losses. The markets bull run has faltered in recent weeks and the Standard & Poors 500 index logged its biggest monthly drop since January last month. Stocks rebounded from that slump on Friday after a report showed a pickup in hiring last month, but many investors remain uncertain about the outlook for stocks as the Fed nears the end of its bond-buying stimulus program and considers raising rates. The tug of war between the bulls and the bears is ongoing now, said Quincy Krosby, a market strategist at Prudential Financial. The S&P 500 fell 3.08points, or 0.2percent, to 1,964.82. The Dow Jones industrial average dropped 17.78points, or 0.1percent, to 16,991.91. The Nasdaq composite fell 20.82points, or 0.5percent, to 4,454.80. TheFedisdueto releaseminutesWednesdayofitspolicymeeting lastmonthandthecentral bankwillenditsbondpurchasesthismonth.Nowinvestorsarewatchingfor cluesaboutthelikelytimingofanyinterestratehike. Investors should remember that if the Fed is raising rates, it will be because the economy is strengthening, said Karyn Cavanaugh, a senior market strategist at Voya. If the potential rise in interest rates is predicated on stronger growth ... and if the market recognizes that earnings are good, and the economy is good then (higher rates) it shouldnt be much of an event, Cavanaugh said. Associated PressA Hewlett Packard logo is shown Feb 21, 2012, in Frisco, Texas. Hewlett-Packard on Monday said it is splitting itself into two companies, one focused on its personal computer and printing business and another on technology services, such as data storage, servers and software, as it aims to drive profits higher. Can HP survive the tablet trend? PAGE 20 OPINION Page A20TUESDAY, OCTOBER 7, 2014 Go through governorI have been out of town for the past two weeks. When I came home, I saw the editorial regarding a disabled veteran and his plight to get his license plate. It surprised me, as I thought this would have been an issue addressed many years ago, as I did as a state legislator in New Hampshire in 1999. At the time in 1999, my telephone number was, as it always was, in the local telephone book, and I got a couple of calls from disabled veterans asking me if I could help them. I met with them, both World WarII veterans, who told me that they had gone to get their disabled veteran license plates, and were told they needed a doctors note to prove to the Department of Motor Vehicles that they were disabled. They were taken aback, since both of them were determined to be permanently disabled and receive veterans benefits for their disability from the Veterans Administration in Washington. I told them I would bring in legislation to correct the situation. Needless to say, my bill HB 92 flew through the New Hampshire House and Senate and was signed into law by the governor. This act exempted permanently disabled veterans from the requirement of reestablishing their disability status for the Department of Motor Vehicles every 4 years to prove eligibility for special license plates. It was clear to me that the sacrifice they endured was significant and the state DMV was adding insult to injury asking them to go through yet another hoop when they were already designated as our clearly courageous veterans. It was an easy fix to the problem. I am taken aback that the Florida Legislature has taken so long to catch up to New Hampshire. The language of the simple fix has been sent to both state Sen. Charlie Dean and state Rep. Jimmie Smith to file to help correct this issue for both the individual affected and for all permanently disabled veterans across our state of Florida. I believe our local DMV in Citrus County called Tallahassee to seek an exemption for that individual, but was unable to prevail. My recommendation to anyone who is elected would be, since the Legislature is in recess, to ask the governor to issue an executive order to enable that individual to receive his license plate as a permanently disabled veteran without having to go to their physician to get a doctors note to prove their disability once again, until the newly legislation is introduced and passed.Suzan Franks Hernando SHAWNEE, Kan.Tacked to the wall of Greg Ormans Wars overture. Today, Orman, who is as calm as Brown was crazed, is emblematic of fascinating Kansas. Orman wants to deny Pat Roberts a fourth Senate term, thereby ending a congressional career that began in 1981 with 16years in the House. Orman, who favors term limits and pledges to serve only two terms, is running as an independent. The Democrats nominee has dropped out of the race, so Orman, 45, or Roberts, 78, will be a senator come January. Sensible Kansans have a problematic choice to ponder: Electing Orman would deepen the Senates pool of talent, but it might thwart Republican efforts to control the Senate. Kansas has not elected a Democratic senator since 1932 and has voted Republican in 12 consecutive presidential elections. It has, however, had Democratic governors during 28 of the past 50years, and its Republican senators have often had Bob Doles collaborative (Ormans approving word) style. Orman has made campaign contributions to Barack Obama, Hillary Clinton and Harry Reid, and voted for Obama in 2008 but favored Romney in 2012. Orman discusses policy problems with a fluency rare among Senate candidates and unusual among senators. From his firmly Republican father, who owns a small furniture store in Stanley, Kansas, Orman acquired an animus against the beehive of regulations: One regulation is a pinprick but cumulatively regulations are akin to falling into a beehive. He is reading Paul Ryans new book, and shares Ryans anxiety about how nearly 60percent of the federal expenditures are not subject to annual appropriations. He also shares Ryans dismay that a single mother earning about $20,000 can pay, in effect, a marginal tax rate twice as high as the 39.6percent in 1986 a Rose Garden ceremony with Ronald Reagan. In 1988, while at Princeton, he did some work for George H.W. Bushs presidential campaign. That year, Orman says, a sight on New Yorks subway two children clinging to their father, who did not seem to feel safe quickened his interest in politics, which has occupied more of his life since business success made him wealthy. In Ormans office here, Princetons 1991 yearbook is open to the page with his picture. Next to it is a pungent quotation he chose from Ross Perot (The wimps are us), who a year later as an independent presidential candidate would receive 19percent of the popular vote, including 27percentmans clearly might indicate his understanding that a narrow Republican majority won in 2014 might evaporate in 2016, when Republicans will be defending 24seats rather than this years 15. The Senates intellectual voltage would be increased by Ormans election. But improving 1percent of the Senate is less important than taking 100percent of Senate control from Harry Reid, who has debased the institution to serve Barack Obama, whose job approval among Kansans is just 40percent. Some Kansans will try to calculate whether they can send Orman to a Senate that will be clearly controlled by Republicans. So, this campaign is a prelude to a wager with national consequences. George Wills email address is georgewill@washpost.com. After youve done a thing the same way for two years, look it over carefully. After five years, look at it with suspicion. And after ten years, throw it away and start all over.Alfred Edward Perlman, The New York Times, July 3, 1958 High stakes in K CENT FOR CITRUS Infrastructure decisions a test for new commission Many Citrus County residential roads are in need of repaving, but funding for doing the work is not in the county budget. County residential road resurfacing stopped in 2012, when Duke Energy refused to pay the amount of property taxes levied by the county. But the need for repaving has not gone away. According to county officials, about half of the 1,600 miles of residential roads in the county are ready for resurfacing, while only a third of residential roads are considered to be in good shape. The current commissions proposal for raising the money for residential road repaving is an additional 1 cent sales tax, which county officials call Cent for Citrus. This new tax is on the November ballot. This is an idea that was proposed in 2009, but never made it to the ballot, and from the time the current sales tax proposal was announced, it has stirred opposition. This opposition has come from some commissioners, from the public through letters to the editor and Sound Off comments, and now comes from the Citrus County Chamber of Commerce, which says the new tax is unnecessary and would cause a burden for taxpayers. Chamber officials say that with the revenue coming from the planned Duke Energy generating plant and from taxes paid by Hospital Corporation of America (HCA) on the Citrus Memorial hospital deal, the new tax is not necessary. With a proposal that is unlikely to be passed by taxaverse voters, and the odds of a new commission majority who have said they are against the idea, it appears highly unlikely that road paving money will come from the proposed sales tax increase. However, the need will not go away with defeat of a tax proposal. Roads in need of repair do not heal themselves. They continue to get worse, and fixing them costs money. What this means for the new commission is that many residential roads either go without repaving or the commission will have to come up with funds for paving, either from general county revenue, from the gas tax or from levies on individual property owners whose roads are repaved. This will be a test of whether the new commission can address real problems in the community and still hew to the lower taxes and reprioritizing of spending themes that have been popular refrains this year. We hope they are successful, because many of the countys roads need repaving, and the commission will be responsible for deciding how to fund this work. THE ISSUE:Chamber of commerce joins opposition to new sales tax for road paving.OUR OPINION:Road paving a challenge to new county commission. Dont vote for sales taxThis is in regards to the resurfacing of roads in the Citrus County area and I really get tired of listening on what were going to do and how were going to end up doing these roads. I live in Citrus Springs, and every year theres been an MSBU on mine for Citrus Springs and its a $25 cost. And also, I have the solid waste of $25 and obviously the fire thing that was on there last year. So Im just wondering, you know. Theyre talking that if we dont do this 1 cent tax, theyre going to end up, were going to have to petition the county to fix our roads. But here we already pay taxes to the county for this kind of stuff, so now were going to end up paying tens of thousands of dollars. And this is what people really need to listen to. ... If this does happen, I was very, very, very much behind our commissioners Joe Meek, especially but if this does go through and theyre going to end up making us petition to get our roads fixed, I will vote, myself will vote to get rid of every commissioner that is in there right now so we can get some people that have got some sense.Please vote for Joey WhiteI do not know Joey White, I have not met Joey White, I have never seen Joey White, but I heard his commercials on the radio and did a little research and the man seems like hes pretty qualified to be a commissioner. Since Scott Adams is so smugly laughing at the fact that Ron Kitchen is a shoo-in in the November election, I would love to encourage Democrats and independents alike to vote for Joey White and deny Mr. Adams his ridiculous attitude on a majority on the county commission. Please vote for Joey White. George WillOTHER VOICES PAGE 21 Citrus County is not a country clubReading the different articles about the road tax of one penny and the MSBU for fire department services makes me wonder what kind of thinking takes place on the part of our commissioners and department heads. Both of these taxes will take money from us and have it set aside (saved) until the project identified needs the money. Both will be collecting money before it is needed or definite plans are made and approved. This is no way to run the county finances! This is not the way a county government should operate. When a plan for a project has been prepared, submitted and approved it should include the type of financing that will be required. Usually this requires bonding, which is the correct way to finance large or capital expenditures. For example, road paving. The project for the year would be identified. A bond would be issued for the amount of money required, say $10million at 3percent interest for one year. The interest of $300,000 would be paid off as a part of the operating budget for that year, leaving the principal of $10million. The second-year project would be identified at, say, $10million again and the next bond would be issued for $20million at 3percent interest again for one year. $10million to pay off the first bond and $10million for the second years work. Again, the interest on this bond of $600,000 would be paid off monthly as a part of the years operating budget. The third year would be the same as year two and so forth until the last year of the program. The last year would require a longer term to actually pay off the bond, say 10 or 20years. By using the bonding program, the cost to the taxpayers would be deferred over many years and only interest on the bonds would be paid out of taxpayers pockets until the last year when the principal amount would need to be retired. I think that this would be much preferred over a one-cent tax. A similar type of bonding program should be used for the fire departments future expenditures such as purchasing land and building fire houses and only when definite plans for projects including costs and financing have been submitted and approved by the commissioners. You and I can set our money aside and save it for, perhaps, years when there is something big that we want to buy and own. A country club could also operate this way. But this is not the way a county government should be operating and that is why the bonding system is available to them and this is what they should be doing. When what we want to own is too large to save for, such as a car or house, then we borrow money and pay off the loan for years. This is exactly what the county should be doing for the road and fire house program borrow the money and then pay it off. I wonder if the commissioners have a threshold for money expenditures as to when the expense should be a part of the operational budget or when bonding is required for capital or large repair expenses. If they dont have a threshold, they should. Come on commissioners, start acting like a government should and stop acting like you are running a country club.Alfred E. Mason Crystal River Shoe, sock drive enormously successfulThe Nature Coast Volunteer Center of Citrus County and the Retired & Senior Volunteer Program are grateful for the socks and shoes donations received from the community during their annual Two Good Soles Shoes & Socks Drive. Through the efforts of wonderful and dedicated volunteers, we were able to collect 2,553 pairs of new socks and shoes for children in need. Donation boxes were located throughout the county at various locations, and we came together as a community to give back in honor of those who gave their lives and service to others on 9/11. We would especially like to thank all who donated monetarily to the program. The Mens Auxiliary of VFW Post 10087, the Ladies Auxiliary of VFW Post 10087, and the general membership of VFW Post 10087 contributed significantly to the success of this program. We would also like to thank John Garvey of VFW Post 10087 for presenting the colors at the 9/11 Remembrance Ceremony. In addition, wed like to thank James and Wanda Reynolds, Jadem Padem, Helen McNabb, Mary Ivey, and Christopher Venuto for their generous donations. Our programs would also not be successful without the participation of our RSVP volunteers. Without their tireless efforts of delivering donation boxes, picking up the shoes & socks, counting and sorting each pair, and displaying at our 9/11 Remembrance Ceremony, we could not have accomplished this feat. A big thank you to Jim and Jan Squires, Ron and Irene Kornatowski, Gunny Heron, Andi Pokryfke, Sally Greiner, Dave Marden, and Kimberly Williams. Thank you for all you do!Laurie Diestler Nature Coast Volunteer Center supervisorOPINIONCITRUSCOUNTY(FL) CHRONICLETUESDAY, OCTOBER7, 2014 A21 6659 W. Norvell Bryant Hwy. Crystal River (Hwy. 486, just east of Hwy. 44) 352-795-6635 Citrus Equipment & Repair Inc. 000JHIZ 000JFKY Pink Paper Edition Tuesday, October 7th Team up with the Citrus County Chronicle and RaceTrac to raise awareness of breast cancer. Pick up your copy at any Citrus County RaceTrac Location: Crystal River Inverness Homosassa HELP RAISE AWARENESS OF BREAST CANCER. Dont forget about FREE Coffee Week October 12th 18th! You cant beat that price! FREE DRINK coupon FREE any size coffee or fountain drink with in-store newspaper purchase. Valid only Tuesday October 7th Good at participating RaceTrac locations. One coupon per customer. Reproductions not accepted. No cash value. While supplies last. Letters to theEDITOR PAGE 22 Even a coroner gets surplus guns Associated PressBATON ROUGE, La. Doug Wortham used a Defense Department giveaway program for law enforcement to stock his office with an assault rifle, a handgun and a Humvee even though the people in his custody are in no condition to put up a fight. Theyre dead. Wortham is the Sharp County, Arkansas, coroner. He said the Humvee helps him navigate the rugged terrain of the Ozarks foothills, but he struggled to explain why he needs the surplus military weapons he acquired more than two years ago. I just wanted to protect myself, he said. His office isnt the only government agency with limited policing powers and a questionable need for high-powered weaponry to take advantage of the program. While most of the surplus weapons go to municipal police departments and county sheriffs, an Associated Press review shows that a diverse array of other state and local agencies also have been scooping up guns and other tactical equipment no longer needed by the military.s Sergeant-atArms. The Pentagons 1033 Program has been controversial; the White House ordered a review of it and similar programs in August after a deadly police shooting in Ferguson, Missouri, led to clashes between protesters and officers decked out in combat gear. Under the 1033 Program, thousands of lawenforcement agencies have acquired hundreds of millions of dollars in weapons and other military castoffs. Among them were dozens of fire departments, district attorneys, prisons, parks departments and wildlife agencies that were eligible to join the program because they have officers or investigators with arrest powers. Guns, armored vehicles and aircraft only account for a fraction of the equipment up for grabs. Several agencies surveyed by the AP said they never asked for any weapons and only enrolled in the program to get free office equipment and other common items that wouldnt be deployed on any battlefield. The agencies receiving firearms are difficult to pinpoint because the federal agency overseeing the program only releases county-level data on weapons transfers, citing security concerns. But some participating agencies or state officials who coordinate the program were willing to disclose their inventories. Wortham was qualified to enroll in the 1033 Program because Arkansas coroners have arrest powers. Elected to his first term as coroner in 2010, he obtained a .45-caliber pistol and an M16 rifle in 2012 after getting a Humvee the previous year. He said he is trying to arrange for a local police department to take the two weapons. Ebola Associated PressA hazardous material cleaner removes a wrapped item from the Dallas apartment where Thomas Eric Duncan, the Ebola patient who traveled from Liberia to Dallas, stayed last week. New Ebola concerns spread WASHINGTON. In dealing with potential Ebola cases, Obama said, we dont. In Spain, the stricken nurse had been part of a team that treated two missionaries flown home to Spain after becoming infected with Ebola in West Africa. Medical workers in Texas were among Americans waiting to find out whether they had been infected by Duncan, the African traveler.VA fires four senior executives WASHINGTON The Veterans Affairs Department has fired to who experience delays to get care outside VAs, and a regional hospital director in central Alabama.New York cancels phone booth planNEW YORK New York City is scuttling a project that would have installed in payphone booths thousands of transmitters that could track peoples movements. A private company named Titan had received city approval to install the beacons, which emit signals that are picked up by smartphones. It has put in 500 of them. The beacons could be used to send advertising onto peoples cellphones. And they could be used to track the movements of the cellphones owners. From wire reports Nation BRIEFS NATION& WORLD Page A22TUESDAY, OCTOBER 7, 2014 CITRUSCOUNTYCHRONICLE Nobel Associated PressNorwegian scientists May-Britt and Edvard Moser, pictured when they received the Fernstrom award in 2008, will share the Nobel Prize for Medicine 2014 with the U.S.-British John OKeefe. Nobel Prize for work on brainSTOCKHOLM How do we remember where we parked the car? And how do we figure out a shortcut to work when theKeefe were honored for breakthroughs in experiments on rats that could help pave the way for a better understanding of human diseases such as Alzheimers. We can actually begin to investigate what goes wrong in Alzheimers, said OKeefe, a dual BritishAmerican citizen. He said the findings might also help scientists design tests that can pick up the very earliest signs of the mind-robbing disease, whose victims lose their spatial memory and get easily lost. The Nobel Prizes will be handed out Dec. 10, the anniversary of prize founder Alfred Nobels death in 1896. This years Nobel announcements continue today with the physics award, followed by chemistry, literature and peace later this week. The economics prize will be announced next Monday.Islamic State hits Syrian border townMURSITPINAR, Turkey Islamic State fighters backed by tanks and artillery pushed into an embattled Syrian town on the border with Turkey on Monday, touching off heavy street battles with the towns Kurdish defenders. Hours after the militants raised two of their Islamic State groups black flags on the outskirts of Kobani, the militants punctured the Kurdish front lines and advanced into the town itself, the Local Coordination Committees activist collective and the Britain-based Syrian Observatory for Human Rights said. Since it began its offensive in mid-September, the Islamic State group has barreled through one Kurdish village after another as it closed in on its main target the town of Kobani, also known as Ayn Arab. The assault has forced some 160,000 Syrians to flee and put a strain on Kurdish forces, who have struggled to hold off the extremists even with the aid of limited U.S.-led airstrikes. The Syrian Observatory for Human Rights said about 20 Islamic State fighters managed to sneak into the eastern part of Kobani overnight, but were ambushed and killed by Kurdish militiamen. World BRIEFS From wire reports Supreme Court starts session Associated PressWASHINGTON The Supreme Court unexpectedly cleared the way Monday for a dramatic expansion of gay marriage in the United States and may have signaled that itslahomas ban, as she and her partner got their license in the Tulsa County Clerks Office. Directly affected by Mondays courts action officials did not sound ready to give up the fight. However, their legal options are limited. Mondays. GM uses Facebook, calls to get recalled cars fixed Associated PressDETROIT Eight months after General Motors began recalling more than 2million cars because of a deadly ignition-switch defect, less than half the owners have gotten their vehicles fixed. At first, the problem was a shortage of parts. But now the problem is people. Despite the heavy publicity surrounding the scandal, many drivers evidently havent heard of the recall or havent grasped how serious the defect is because it hasve gone to the owners home and gotten the vehicle, gave them a loaner, and are working to fix it, Barra said last week.assisted steering and disable the air bags. Despite recall letters that bluntly warn that the defect can lead to injury and even death and despite five congressional hearings and thousands of news stories about the furor only about 1.16million of the 2.36million affected vehicles still on the road have been bought in for repairs. Because the recalled cars are no longer produced, parts supplier Delphi Automotive had to bring machinery out of mothballs to start cranking out replacement switches. Repairs finally began in April when the replacement switches started to arrive at dealers. Last Wednesday, GM announced that Delphi had made enough to fix all the cars. Military surplus Associated PressKim Clark, senior investigator for the Wyoming Livestock Board, shows off his Colt .45 semi-automatic pistol on Thursday in Cokeville, Wyo. Clarks law enforcement unit, which investigates cattle thefts and other industry related crimes, was given seven .45-caliber handguns from amilitarysurplusprogram roughly three years ago. John O'Keefe Justices clear the way for gay marriage expansion Associated PressA key is shown April 1 in the ignition switch of a 2005 Chevrolet Cobalt in Alexandria, Va. Fewer than half of the roughly 2.36 million people still driving Chevy Cobalts, Saturn Ions and other small cars with defective and potentially deadly ignition switches have had them replaced. PAGE 23 MLB Playoffs/ B2 Scoreboard/B3 Sports briefs/B3 Lottery, TV/ B3 Football/B4 Nationals stay alive in NLDS with 4-1 win over Giants./B2 S PORTsS Section B TUESDAY, OCTOBER 7, 2014 c UF freshman faces sexual assault allegation rrGAINESVILLE Florida freshman Treon Harris went from potentially becoming the starting quarter back fo rensic evidence. A GPD forensics crime unit truck was parked outside the residence hall Monday afternoon. We have no tolerance for sexual assault on our cam pus, doesnt expect his client to be, either. We are cooperating with the investigation, Johnson said. And I would be surprised and disappointed if he ends up being prosecuted. UPD said the incident report was still being finalized and would be released in the next day or so. Ice tilted to the West in NHL Hockey is a booming business right now. After an attention-grabbing Olym pic trip and an exciting postseason for the scandal-free NHL, revenue and tele vision hockeys unbalanced standings made significant offseason additions to chase the leagues ards. Only the champs essentially stood pat, daring the West to catch them. It seems like the West is loading up again, Kings center Anze Kopitar said. But at the end of the day, I dont think its going to matter too much what the other teams do. Its going to matter what we do. The Blackhawks and the Kings each have two titles in the last five years, and theyre both the widely considered favorites to play for the Stanley Cup again. But when Los Angeles beat the New York Rang ers in five games in the Stanley Cup finals last year, many prog nosticators scoffed that five West teams could have beaten any East representative and the theoret ical math appears much the same this fall. The West is such a grind, Ducks defenseman Ben Lovejoy said. Theres C.J. RISAK The match-ups for the upcoming district tournaments will be de cided by weeks end. Three of these matches are criti cal, and Seven Rivers Christian will be involved in two of them. To night, the Warriors host Leesburg First Academy, a team they lost to in straight sets in the first week of the season. There are only three teams in 2A-3, with Ocala St. John Lutheran having already locked up first place with a 3-0 mark the Saints lost for the first time this season last Tuesday at Ocala Trinity Cath olic, making them 18-1 overall. First Academy is next at 1-2 (14-3 overall), followed by Seven Rivers at 0-2 (14-6 overall). There are no weak links in this district, as the teams overall re cords will attest. Certainly the War riors have improved since the seasons initial week, but theyll have to prove how much. The district race is decided, with St. John having clinched the top spot and the opening-round bye in the district tournament that goes with it. That means whatever hap pens tonight, First Academy and Seven Rivers will have a rematch, with the winner advancing to the 2A-3 final against St. John. So this is actually a statement match. A win would give Seven Riv ers the momentum going into dis tricts, but to accomplish that the Warriors will need what every team needs at this time of year defense and good passing to set up kill opportunities for Alyssa Gage, Julia Eckart and Michaela Wallace. The Eagles attack goes through Emma Gray and Victoria Gause, which means Seven Rivers de fense will be tested, particularly since blocking shots at the net is not a team strength. That means digging up kill attempts and con verting them into scoring chances, which is a formula that has worked all season for the Warriors. VOLLEYBALL NOTEBOOKDecisive week in districtsSee NOTEBOOK/ Page B3 f rnrtb C.J. RISAK Its been a long time since Shannon Fer nandez and Olivia Grey didnt play on each others volleyball team. This season, Lecanto is reaping the benefits of that relationship. Since the second semester of eighth grade, weve been playing club together, said Grey. Not surprisingly, there isnt a single ability that makes either of them stand out. And thats what defines Lecantos team this season several key players who can, and do, fill a variety of roles. That the teams two captains are at the top of that list shows how valuable such players are to the team. Their time spent playing together increases their value. Theyre almost like twins, they can read each other, said Lecanto coach Alice Christian. Theyre very aware of each other on the court. Theyre both skilled, they both set very well, they both hit very well, they both serve very well, and they can play any position. As all-around good players, theyre there. Their experience playing together not only knowing what to expect before it happens, but also knowing when your teammate needs a mental boost is a message both girls are trying to send to their teammates. In 2013, mental lapses were costly for the Panthers. I think our girls have a lot more experience this season, Fernandez said. Last season was more of a rebuilding season. This season weve jelled more to gether, were able to capitalize more on our strengths. We look to each other, we hold each other up. Whenever Im down I look MATT PFIFFNER /Chronicle rfntbbf fbf fb ffffff rbfffftffff ff bbfftb tfbbAssociated Press See HARRIS/ Page B3 See NHL/ Page B3On the same page See SAME/ Page B3 PAGE 24 B2 Nationals 4, Giants 1 Washington San Francisco ab r h bi ab r h bi Span cf 4 0 2 0 GBlanc cf 4 0 0 0 Rendon 3b 4 0 2 0 P anik 2b 4 0 0 0 Werth rf 4 0 0 0 P osey c 4 0 1 0 LaRoch 1b 4 0 0 0 Sando vl 3b 4 1 2 0 Dsmnd ss 4 1 1 0 P ence rf 4 0 1 0 Harper lf 3 2 1 1 Belt 1b 3 0 2 0 WRams c 3 1 0 0 BCrwfr ss 3 0 0 0 ACarer 2b 4 0 1 1 Ishika w lf 3 0 0 0 Fister p 3 0 0 0 Bmg rn p 1 0 0 0 Clipprd p 0 0 0 0 MDuffy ph 1 0 0 0 Schrhlt ph 0 0 0 0 Machi p 0 0 0 0 Zmrmn ph 1 0 0 0 Aff eldt p 0 0 0 0 Storen p 0 0 0 0 Totals 34 4 7 2 T otals 31 1 6 0 Washington 000 000 301 4 San Francisco 000 000 001 1 EBumgarner (1). LOBWashington 5, San Francisco 7. 2BPence (2). HRHarper (2). CSBelt (1). SW.Ramos. SFB.Crawford. IP H R ER BB SO Washington Fister W,1-0 7 4 0 0 3 3 Clippard H,1 1 0 0 0 0 0 Storen 1 2 1 1 0 1 San Francisco Bumgarner L,0-1 7 6 3 2 1 6 Machi 1 2/3 1 1 1 0 1 Affeldt 1/3 0 0 0 0 0 UmpiresHome, Tom Hallion; First, Hunter Wendelstedt; Second, Mike Winters; Third, Brian Knight; Right, Vic Carapazza; Left, Laz Diaz. T:47. A,627 (41,915). Postseason glance WILD CARD Tuesday, Sept. 30: Kansas City 9, Oakland 8, 12 innings Wednesday, Oct. 1: San Francisco 8, Pittsburgh 0 DIVISION SERIES (Best-of-5) x-if necessary American League 1 Friday, Oct. 3: San Francisco 3, Washington 2 Saturday, Oct. 4: San Francisco 2, Washington 1, 18 innings Monday, Oct. 6: Washington 4, San Francisco 1 Today: Washington (Gonzalez 10-10) at San Francisco (Vogelsong 8-13), 9:07 p.m. (FS1) x-Thursday, Oct. 9: San Francisco at Washington, 5:07 p.m. (FS1) St. Louis 1, Los Angeles 1 Friday, Oct. 3: St. Louis 10, Los Angeles 9 Saturday, Oct. 4: Los Angeles 3, St. Louis 2 Monday, Oct. 6: Los Angeles (Ryu 14-7) at St. Louis (Lackey 3-3), late Today: Los Angeles (Kershaw 21-3) at St. Louis (Miller 10-9), 5:07 p.m. (FS1) x-Thursday Oct. 9: St. Louis at Los Angeles, 9:07 p.m. (FS1) LEAGUE CHAMPIONSHIP SERIES (Best-of-7) American League All AL games televised by TBS Friday, Oct. 10: Kansas City (Shields 14-8) at Baltimore (Tillman 13-6), 8:07 p.m. Saturday, Oct. 11: Kansas City at Baltimore, 4:07 p.m. Monday, Oct. 13: Baltimore at Kansas City, TBA Tuesday, Oct. 14: Baltimore at Kansas City, TBA x-Wednesday, Oct. 15: Baltimore at Kansas City, TBA x-Friday, Oct. 17: Kansas City at Baltimore, TBA x-Saturday, Oct. 18: Kansas City at Baltimore, TBA National League Saturday, Oct. 11: St. Louis-Los Angeles winner at Washington OR San Francisco at St. Louis-Los Angeles winner, 8:07 p.m. (Fox) Sunday, Oct. 12: St. Louis-Los Angeles winner at Washington OR San Francisco at St. LouisLos Angeles winner, TBA (FS1) Tuesday, Oct. 14: Washington at St. Louis-Los Angeles winner OR St. Louis-Los Angeles winner at San Francisco, TBA (FS1) Wednesday, Oct. 15: Washington at St. LouisLos Angeles winner OR St. Louis-Los Angeles winner at San Francisco, TBA (FS1) x-Thursday, Oct. 16: Washington at St. LouisLos Angeles winner OR St. Louis-Los Angeles winner at San Francisco, TBA (FS1) x-Saturday, Oct. 18: St. Louis-Los Angeles winner at Washington OR San Francisco at St. Louis-Los Angeles winner, TBA (Fox) x-Sunday, Oct. 19: St. Louis-Los Angeles winner at Washington OR San Francisco at St. Louis-Los Angeles winner, TBA This date In baseball 1904 Jack Chesbro got his 41st victory of the season, and the New York Yankees defeated the Boston Red Sox 3-2. 1928 Lou Gehrigs two home runs led the New York Yankees to a 7-3 victory over the St. Louis Cardinals in the World Series, giving them a 3-0 lead. 1945 Hank Greenbergs three doubles led Detroit to an 8-4 victory over the Chicago Cubs, giving the Tigers a 3-2 lead in the World Series. 1952 Billy Martins running catch on a high infield pop with the bases loaded in the seventh inning snuffed a Dodgers rally and the New York Yankees went on to win Game 7 of the World Series 4-2. 1961 New Yorks Roger Maris won the third game of the World Series with a ninth-inning home run off the Reds Bob Purkey. The Yankees won 3-2 at Cincinnatis Crosley Field. 1984 The San Diego Padres won the National League pennant with a 6-3 victory over the Chicago Cubs in the final game of the playoffs. The Padres won three straight after dropping the first two games. extrabase hits also was an NLCS record, as were the 17 total extra-base hits. 2013 Jose Lobaton hit a solo home run with two outs in the bottom of the ninth inning and Tampa Bay staved off elimination again by beating the Boston Red Sox 5-4. Lobatons solo homer off Koji Uehara landed into the giant fish tank beyond the center-field wall. The Red Sox closer didnt allow a home run in his last 37 regular-season appearances. Todays birthdays: Alex Cobb, 27; Evan Longoria, 28; Kris Medlen, 29. MLB PLAYOFFS Giants cant close out Nats Rousing rookies KANSAS CITY, Mo. One by one, the camera panned over the faces of the Kansas City Roy als, who had lined up along the first-base line for introductions before Game 3 of their AL Divi sion Series. When it settled on Brandon Finnegan, the crowd roared just a little bit louder. On one hand, it made perfect sense. Finnegan has been down right stellar in the playoffs, pitching four sharp innings and earning a win. Hes provided the power left-handed arm out of the bullpen that the Royals knew they would need if they were to make a deep run. On the other hand, it made lit tle sense at all. This is a guy that few fans knew anything about six weeks ago, and virtually no body knew anything about six months ago. Its definitely a shock to me, said Finnegan, who began the year leading TCU to the College World Series and could end it by leading the Royals to a very dif ferent World Series. Its been a whirlwind, Fin negan said, but its been a blessing and a lot of fun. The 21-year-old first-round pick could be a poster child for rousing rookies taking the base ball playoffs by storm this year. On the Royals alone, hes joined by young flamethrower Yordano Ventura, infielder Christian Colon and speedy utility man Terrance Gore. With the exception of Ventura, none of them played much in the regular season. Giants reliever Hunter Strick land, who skipped Triple-A on his way to the big leagues, and struck out Washingtons Ian Des mond on a 100 mph fastball with the bases loaded to end the sixth inning Friday. While he gave up two solo homers in the seventh, the Giants still hung on for a 3-2 victory in their NL Division Se ries opener. Stricklands 23-year-old team mate, Joe Panik, had five hits in his first 10 playoff at-bats. He made his major league debut in May and batted .305 in 73 games. In the other National League series, St. Louis outfielder Ran dal Grichuk homered off the Dodgers Clayton Kershaw in his first postseason plate ap pearance on Friday. His 22-yearold teammate Marco Gonzales earned the win when the Cardi nals held on, 10-9, in Game 1. When it comes down to it, it is the same game, Panik said. You have to be more fine with the little things. When the pres sure gets on you, tell yourself to stay within yourself. He did that sublimely in Game 2 on Saturday night. San Francisco was trailing 1-0 with two outs in the ninth in ning, and Nationals starter Jor dan Zimmermann had retired 20 batters in a row. Panik came to the plate representing either the tying run or final out, and he worked a walk to extend the game. He later scored to force extra innings, and the Giants ulti mately won 2-1 in 18. Its fun to watch a guy whos confident in himself, said Gi ants catcher Buster Posey, no stranger to doing big things at a young age. He understands what type of player he is. It looks to me like hes got one of those swings thats just extremely con sistent. Youre going to see a lot of line drives and base hits. Hes been huge for us. So many young players have been huge in so many situations over the years. Relief pitcher Trevor Rosen thal helped the Cardinals to the postseason as a wide-eyed rookie two years ago, and was dynamic in helping them to the World Series last season. Another reliever, Francisco Rodriguez, had never won a major league game before win ning five of them in the 2002 playoffs, helping the Angels win the championship. Tigers ace David Price made his big league debut on Sept. 14, 2008, as a reliever for Tampa Bay. He would later be the win ning phe nomenal. Its tough enough to make your big league debut, Royals first baseman Eric Hosmer ex plained, but to be fresh for a month a month fresh in the big leagues and come into a playoff situation, a do-or-die situation like that, it shows a lot. Associated Press rfntb b rfnt br SAN FRANCISCO Doug Fister pitched seven shutout innings and the Washington Nationals took advantage of Madison Bumgarners one off-target throw, staving off elimination in the NL Division Series with a 4-1 win against the San Francisco Giants on Monday. Fister dazzled again in San Francisco, helping the Nationals cut their deficit to 2-1 in the best-of-five series and ending the Gi ants 10-game postseason winning streak that started with Game 5 of the 2012 NL Champi onship Series against St. Louis. Washington scored two runs on Bumgar ners throwing error in the seventh inning to end the aces 21-inning scoreless streak. Bryce Harper punctuated the victory with a solo homer in the ninth. Really it came down to every pitch, Fis ter said. Fortunately a ball bounced our way. Drew Storen allowed the first two batters to reach in the bottom of the ninth but shook off his postseason struggles, allowing a run in closing it out as Washington forced a Game 4 tonight. Now, the 96-win Nationals will send lefthander Gio Gonzalez up against San Fran cisco right-hander Ryan Vogelsong. On a day Bumgarner had been nearly un touchable, his 21-inning postseason score less streak ended on his own miscue. Now, the Giants must wait another day to try to eliminate the Nationals. Bumgarner fielded Wilson Ramos twostrike sacrifice bunt between the mound and the first-base line and fired to third rather than going for the sure out at first. Bumgarners throw sailed wide of Pablo Sandovals. Asdrubal Cabrera followed fright ening. Fister hardly needed that Japanese good luck figurine that appeared in the NL East champions dugout Monday morning cour tesy Bran don Crawfords sacrifice fly in the ninth be fore finishing the 2-hour, 47-minute game for his first save. It was a far cry from Game 2, which took a postseason record 6:23. Harpers three postseason homers are the fourth-most before age 22 behind Mickey Mantle, Miguel Cabrera and Andruw Jones, all with four. Associated Press f rrfb Dodgers to go with Kershaw on short rest in Game 4 ST. LOUIS The Los Angeles Dodgers will go to ace Clayton Kershaw on three days rest in tonights Game 4 of their NL Di vision Series against the St. Louis Cardinals. Manager Don Mattingly made the an nouncement Monday before Game 3 in a best-of-five series tied at a game apiece. He added he pretty much knew before the series started. Mattingly said Zack Greinke would start a potential Game 5. Mattingly had previously penciled in Dan Haren for Game 4. Mondays Game 3 finished after the Chronicle s deadline. From wire reports PAGE 25 AIRWAVES TODAYS SPORTS MAJOR LEAGUE BASEBALL 5 p.m. (FS1) NLDS Game 4: LA Dodgers at St. Louis Cardinals 9 p.m. (FS1) NLDS Game 4: Washington Nationals at SF Giants NBA PRESEASON BASKETBALL 7:30 p.m. (NBA) Chicago Bulls at Detroit Pistons 7:30 p.m. (SUN) Orlando Magic at Miami Heat 10:30 p.m. (NBA) Golden State Warriors at LA Clippers COLLEGE FOOTBALL 6 a.m. (ESPNU) Alabama at Mississippi (taped) 12 a.m. (ESPNU) South Carolina at Kentucky (taped) 2:30 a.m. (ESPNU) Vanderbilt at Georgia (taped) GOLF 11 a.m. (GOLF) Ladies European Tour: Ladies Open de France, Third Round (taped) UEFA CHAMPIONS LEAGUE SOCCER 2:30 p.m. (FSNFL) Arsenal FC vs Galatasary A.S (taped) TENNIS 6 a.m. (TENNIS) ATP Shanghai Rolex Masters, Mens 2nd Round 1 a.m. (TENNIS) ATP Shanghai Rolex Masters, Mens 2nd Round Note: Times and channels are subject to change at the discretion of the network. If you are unable to locate a game on the listed channel, please contact your cable provider. CALENDAR TODAYS PREP SPORTS VOLLEYBALL 6 p.m. Lecanto at Crystal River 6 p.m. Citrus at Dunnellon 6:30 p.m. First Academy at Seven Rivers Christian SWIMMING 5 p.m. Nature Coast at Citrus GIRLS GOLF 3:30 p.m. Hernando at Citrus 3:30 p.m. The Villages at Lecanto 3:30 p.m. Crystal River at South Sumter 4 p.m. Seven Rivers Christian at Bishop McLaughlin BOYS GOLF 4 p.m. Crystal River, Dunnellon, West Port at Juliette Falls 4 p.m. Seven Rivers Christian at Bishop McLaughlin so much talent. All these huge, physi cal teams that skate very well. We can have another great regular season, and it wont matter if we dont Easts stars realize theyll have to go West to win a title. The West is where its at right now, and it runs in spurts, Buffalo general manager Tim Murray said. The West ern teams are good teams. Theyre big. Theyre strong. Someone is going to have to dethrone L.A. to say the West is not the best. While the other 29 teams get to work on that project, there are plenty of in triguing subplots to the season. With labor peace and no momentum-killing Olympic break, the NHL is back on a normal schedule this winter. Many players believe the qual ityancouvers re building project. The highest-profile job belongs to Pittsburghs Mike John ston, a 57-year-old NHL coaching rookie who must gain the trust of Crosby and Evgeni Malkin to spur the underachieving Penguins back into Cup contention. The NHL reduced its slate of out door games from six to two this sea son, hitting only Washington, D.C., and Californias Bay Area, while adding an old-fashioned indoor All-Star weekend for Columbus in January. The league and the players union also are inching toward reviving the World Cup of Hockey, likely celebrat ing a 2016 return for the summer showcase event. The league made some minor rule tweaks, notably banning the spin-orama move on penalty shots and shootouts a huge disappointment for the few players capable of doing it effectively. The NHL also instituted slightly bigger fines for players caught diving and for their coaches, who will be charged for repeat offenders on their rosters. The AP Top 25 Team Recor d Pts Pv 1. Florida St. (35) 5-0 1,461 1 2. Auburn (23) 5-0 1,459 5 3. Mississippi 5-0 1,320 11 3. Mississippi St. (2) 5-0 1,320 12 5. Baylor 5-0 1,258 7 6. Notre Dame 5-0 1,186 9 7. Alabama 4-1 1,060 3 8. Michigan St. 4-1 981 10 9. TCU 4-0 979 2 10. Arizona 5-0 951 NR 11. Oklahoma 4-1 904 4 12. Oregon 4-1 888 2 13. Georgia 4-1 854 13 14. Texas A&M 5-1 731 6 15. Ohio St. 4-1 534 20 16. Oklahoma St. 4-1 527 21 17. Kansas St. 4-1 486 23 18. UCLA 4-1 460 8 19. East Carolina 4-1 344 22 20. Arizona St. 4-1 325 NR 21. Nebraska 5-1 283 19 22. Georgia Tech 5-0 235 NR 23. Missouri 4-1 212 24 24. Utah 4-1 206 NR 25. Stanford 3-2 143 14 Others receiving votes: Clemson 92, Mar shall 78, Southern Cal 61, Louisville 36, LSU 35, BYU 26, West Virginia 18, Arkansas 14, Wisconsin 7, California 6, Penn St. 5, Kentucky 4, Rutgers 4, N. Dakota St. 3, Minnesota 2, South Carolina 1, Virginia 1. NFL standings AMERICAN CONFERENCE East W L T Pct PF P A Buffalo 3 2 0 .600 96 89 New England 3 2 0 .600 123 107 Miami 2 2 0 .500 96 97 N.Y. Jets 1 4 0 .200 79 127 South W L T Pct PF P A Indianapolis 3 2 0 .600 156 108 Houston 3 2 0 .600 104 87 Tennessee 1 4 0 .200 88 139 Jacksonville 0 5 0 .000 67 169 North W L T Pct PF P A Cincinnati 3 1 0 .750 97 76 Baltimore 3 2 0 .600 116 80 Pittsburgh 3 2 0 .600 114 108 Cleveland 2 2 0 .500 103 105 West W L T Pct PF P A San Diego 4 1 0 .800 133 63 Denver 3 1 0 .750 116 87 Kansas City 2 3 0 .400 119 101 Oakland 0 4 0 .000 51 103 NATIONAL CONFERENCE East W L T Pct PF P A Philadelphia 4 1 0 .800 156 132 Dallas 4 1 0 .800 135 103 N.Y. Giants 3 2 0 .600 133 111 Washington 1 3 0 .250 95 109 South W L T Pct PF P A Carolina 3 2 0 .600 104 120 Atlanta 2 3 0 .400 151 143 New Orleans 2 3 0 .400 132 141 Tampa Bay 1 4 0 .200 103 156 North W L T Pct PF P A Detroit 3 2 0 .600 99 79 Green Bay 3 2 0 .600 134 106 Minnesota 2 3 0 .400 101 126 Chicago 2 3 0 .400 116 131 West W L T Pct PF P A Arizona 3 1 0 .750 86 86 Seattle 2 1 0 .667 83 66 San Francisco 3 2 0 .600 110 106 St. Louis 1 3 0 .250 84 119 Thursdays Game Green Bay 42, Minnesota 10 Sundays Games Mondays Game Seattle at Washington, late Late Sunday Patriots 43, Bengals 17 Cincinnati 0 3 14 0 17 New England 14 6 14 9 43 First Quarter NERidley 1 run (Gostkowski kick), 10:03. NEWright 17 pass from Brady (Gostkowski kick), 3:12. Second Quarter CinFG Nugent 23, 4:33. NEFG Gostkowski 48, 1:12. NEFG Gostkowski 19, :09. Third Quarter CinSanu 37 pass from Dalton (Nugent kick), 11:27. NEGronkowski 16 pass from Brady (Gostkowski kick), 6:06. NEArrington 9 fumble return (Gostkowski kick), 6:00. CinGreen 17 pass from Dalton (Nugent kick), 3:43. Fourth Quarter NEFG Gostkowski 23, 14:54. NEFG Gostkowski 47, 7:53. NEFG Gostkowski 35, 2:55. A,756. Cin NE First downs 17 30 Total Net Yards 320 505 Rushes-yards 18-79 46-220 Passing 241 285 Punt Returns 2-53 3-12 Kickoff Returns 7-141 1-16 Interceptions Ret. 0-0 0-0 Comp-Att-Int 18-29-0 23-35-0 Sacked-Yards Lost 1-8 1-7 Punts 4-41.5 3-40.3 Fumbles-Lost 3-3 1-0 Penalties-Yards 4-37 12-114 Time of Possession 21:04 38:56 INDIVIDUAL STATISTICS RUSHINGCincinnati, Bernard 13-62, Dalton 2-16, Hill 2-1, Tate 1-0. New England, Ridley 27-113, Vereen 9-90, Brady 4-13, Develin 2-5, Bolden 1-3, Garoppolo 3-(minus 4). PASSINGCincinnati, Dalton 15-24-0-204, Campbell 3-5-0-45. New England, Brady 2335-0-292. RECEIVINGCincinnati, Green 5-81, Sanu 5-70, Hill 3-68, Gresham 2-15, Bernard 2-10, Sanzenbacher 1-5. New England, Gronkowski 6-100, Wright 5-85, Edelman 5-35, Vereen 3-18, LaFell 1-20, Dobson 1-16, Develin 1-11, Amendola 1-7. MISSED FIELD GOALSCincinnati, Nugent 52 (SH). POINT SPREADS Major League Baseball Playoffs Tonight National League FAVORITE LINE UNDERDOG LINE Los Angeles -165 at St. Louis +155 Washington -120 at San F ran. +110 NCAA Football Thursday FAVORITE OPEN TODAY O/U UNDERDOG at UCF 3 3 BYU Friday at Stanford 17 17 W ashington St. San Diego St. 6 5 at Ne w Mexico Fresno St. 9 11 at UNL V Saturday Oklahoma-x 14 14 T exas Michigan St. 23 22 at Purdue at Minnesota 2 3 Nor thwestern at Army +1 Pk Rice at Temple 15 16 T ulsa at Marshall 21 21 Middle T enn. at Kent St. 1 1 UMass Florida St. 22 22 at Syr acuse at Georgia Tech 6 5 Duk e at Wisconsin 23 24 Illinois at NC State 5 4 Boston College at Miami 11 14 Cincinnati Buffalo 14 13 at E. Michigan at Akron 14 14 Miami (Ohio) at Iowa 6 6 Indiana Bowling Green 1 2 at Ohio West Virginia 4 3 at T exas Tech Oklahoma St. 20 20 at Kansas at Baylor 11 10 TCU at Memphis 7 8 Houston at UAB 4 3 Nor th Texas Auburn 3 2 at Mississippi St. at Ball St. 2 3 W Michigan at Troy 7 7 Ne w Mexico St. Alabama 8 9 at Ar kansas LSU 1 2 at Flor ida at Iowa St. 5 6 T oledo Oregon 3 3 at UCLA Southern Cal 2 2 at Ar izona at California 1 1 W ashington Georgia 3 3 at Missour i at Clemson 10 12 Louisville at Notre Dame 16 16 Nor th Carolina at N. Illinois 10 10 Cent. Michigan at Ga. Southern 20 22 Idaho Arkansas St. 14 10 at Georgia St. at UTSA 13 13 FIU at Kentucky 20 20 Louisiana-Monroe at Texas A&M 2 3 Mississippi at Utah St. 9 7 Air F orce East Carolina 14 14 at South Flor ida at Michigan 1 1 P enn St. at UTEP 2 3 Old Dominion at Tulane 4 3 UConn Colorado St. 1 2 at Ne vada at Hawaii 3 3 W yoming x-at Dallas NFL Thursday FAVORITE OPEN TODAY O/U UNDERDOG Indianapolis 2 2 (46) at Houston Sunday Denver 7 7 (47) at N.Y Jets at Cleveland Pk 2 (47) Pittsb urgh at Tennessee 6 6 (44) Jacksonville at Atlanta 3 3 (53) Chicago Green Bay 3 3 (49) at Miami Detroit 3 2 (44) at Minnesota at Cincinnati 7 7 (44) Carolina New England Pk 3 (45) at Buff alo Baltimore 3 3 (43) at Tampa Bay San Diego 7 7 (43) at Oakland at Seattle 8 9 (47) Dallas at Arizona 4 3 (45) W ashington at Philadelphia 3 2 (50) N.Y Giants Monday San Francisco 3 3 (43) at St. Louis NHL Continued from Page B1 CASH 3 (early) 0 3 5 CASH 3 (late) 6 8 9 PLAY 4 (early) 4 3 7 1 PLAY 4 (late) 9 8 8 4 FANTASY 5 5 7 23 30 34 rfnftfb Players should verify winning numbers by calling 850-487-7777 or at. fb Fantasy 5: 4 18 23 31 36 5-of-5 2 winners $92,792.76 4-of-5 219 $136.50 3-of-5 7,009 $1 1.50 LOTTERY B3 FOOTBALL But this wont be the only statement match of the week for Seven Rivers. On Thursday it travels to St. John Lu theran for a rematch; on Sept. 18, the Warriors lost at home to the Saints in four sets. If a win on Tuesday over First Acad emy would be a boost to their confi dence, a victory at St. John Thursday would send it into the stratosphere. Its a big week for Seven Rivers. Now for 5A-6, which will feature the match that will decide the framework of the district tournament when Crys tal River hosts Lecanto. On Sept. 16 at Lecanto, the Pan thers handed Crystal River its only district loss in three straight sets. The Pirates will try to even that score and the standings atop 5A-6 at 6 p.m. tonight. In 2013, Citrus, Crystal River and Lecanto tied for first in the district standings at 4-2. The Pirates should be inspired to attain that goal again. This shapes up as a match-up of strength against strength. Both teams boast two of the areas strongest out side hitters Cassidy Wardlow for Crystal River, Annalee Garcia for Le canto and both are solid at the net, offensively and defensively. The districts top setters will also be present, the Pirates Kaite Eichler and the Panthers Shannon Fernandez. Bottom line: This could go either way. Lecanto has a marginal edge in experience, Crystal River has the home-court advantage. Emotion could be decisive, who can use it and control it the best. Area leaders TEAM RECORDS: Lecanto, 12-4 overall, 5-0 in 5A-6; Crystal River, 13-7 overall, 4-1 in 5A-6; Citrus, 6-10 overall, 1-4 in 5A-6; Seven Rivers Christian, 14-6 overall, 0-2 in 2A-3. INDIVIDUAL STATISTICS KILLS: Alyssa Gage (Seven Rivers), 237 (12.5 per match); Kayla King (Citrus), 82 (9.0); Cassidy Wardlow (Crystal River), 156 (8.2); Abby Epstein (Crystal River), 134 (6.7); Annalee Garcia (Lecanto), 87 (6.2). KILL PERCENTAGE: Epstein (Crystal River), .367; Gage (Seven Rivers), .357; Julia Eckart (Seven Rivers), .322; Myrcia Powell (Crystal River), .305; Kaylan Simms (Crystal River), .297. ASSISTS TO KILLS: Katie Eichler (Crystal River), 337 (16.9 per match); Kim Iwaniec (Seven Rivers), 316 (16.6); Shan non Fernandez (Lecanto), 203 (14.5); Gage (Seven Rivers), 193 (10.2); Alicia Breviario (Citrus), 109 (7.8). BLOCKS: Kaylan Simms (Crystal River), 42 (3.8 per match -11 matches); Epstein (Crystal River), 71 (3.6); Cheyann Reneer (Citrus), 48 (3.4); Gage (Seven Rivers), 55 (2.9); DeeAnna Mohering (Lecanto), 39 (2.8). DIGS: Wardlow (Crystal River), 262 (13.8 per match); Erin Smilgen (Lecanto), 158 (11.3); Kim Iwaniec (Seven Rivers), 196 (10.3); Tessa Kacer (Seven Rivers), 190 (10.0); Gage (Seven Rivers), 169 (8.9). SERVING ACES: King (Citrus), 32 (3.6 per match); Garcia (Lecanto), 48 (3.4); Iwaniec (Seven Rivers), 43 (2.3); Wardlow (Crystal River), 42 (2.2); Eckart (Seven Rivers), 41 (2.2). NOTEBOOK Continued from Page B1 Its unclear how long the investiga tion will take, but it almost certainly means Jeff Driskel will start Saturday nights game against LSU. Florida State quarterback Jameis Winston was not charged after a woman said he sexually assaulted her in December 2012. It took several months for the State Attorneys Office to complete its investigation before an nouncing the Seminoles QB would not be charged because a lack of evidence. Prosecutors cited inconsistencies in the evidence and the womans story. Winston continued to play during the investigation. Florida suspended Harris almost immediately Monday after the allega tion was made. Harris was in position to be named the starter Monday, but Florida can celed its weekly media available with coach Will Muschamp because of the investigation. Driskel hasnt played turnover-free football since the season opener and really struggled the last two games. The fourth-year junior completed 39 percent of his passes for 142 yards, with a touchdown and five intercep tions. HARRIS Continued from Page B1 to Olivia to help me back up. Were very encouraging toward each other. We feel a lot of responsibility, being seniors, so close to being district champs, we really need to support each other to help support the team. And theres no doubting their min imum objective for the season: I think our goal this year definitely is to be district champs, Grey said. Since weve been here, our sopho more year we were runners-up to West Port. Then districts got rear ranged and now its more of a true county district. It was our goal last year too, but I think this year its much more attainable. They also know saying what they want and obtaining it are very differ ent, with plenty of formidable obsta cles along the way. That, too, was an unneeded and unwanted lesson learned last season when they tied for first in 5A-6 during the regular season, but failed to reach the dis trict final in tournament play. So is vengeance a motivational fac tor? I think a little bit, they an swered in unison, both of them smiling. The skills on the Lecanto team, currently 12-4 overall and 5-0 in 5A-6, are present. Focusing them to enable the team reach its goals is their job. Theyre very positive, very en couraging, on and off the court, which makes a big difference, Christian said. They help jell the team. They take their responsibilities se riously. Asked what her teams strengths were, Grey replied, Our closeness on the court, how well we work together. I think individually you have a lot of very good skill sets that, as a team, makes us much stronger than we have been in the past. A lot of us have played club before, and thats really improved our skills, so we have a much stronger team. There have been sacrifices that needed to be made. For one, Fernan dez has evolved into the teams pri mary setter. It was a little difficult, because usually Im more of a hitter and this year Ive hardly been hitting at all until recently, she said. But it defi nitely keeps me moving on the court more than hitting does. Its a much more challenging position. But then again, making such sacri fices is hardly surprising consider ing whos making them. After all, thats what has given Lecanto at least a tie for the regular season dis trict title once again. SAME Continued from Page B1 Help Panthers win a rally You can help Lecanto High School win a MyFoxPrep rally on Friday morning for that nights home football game against Mitchell. To vote for the Panthers, text Prep2 to the number 94465, or visit. com, click on the sports drop down menu and select MyFoxPrep. The poll will be located down the right-hand side of the page. The winner will get a visit from the Good Day Tampa Bay crew and be featured live from the rally on FOX 13. Voting ends at 10 p.m. tonight. Rattlers sweep Pirates The Crystal River volleyball team fell to 13-8 on the season with a 25-23, 25-16, 25-22 loss Monday night at home to Belleview. Cassidy Wardlow had seven kills, 36 digs and two aces for the Pirates. Abby Epstein added eight kills and a block, Kaylan Simms had six kills, Kaite Eichler passed out 14 assists and Natalie Ortiz had nine digs. The Pirates host Lecanto tonight for their annual Breast Cancer Awareness Night in a match that will decide the top seed in District 5A-6. USA Swimming suspends Michael Phelps for 6 months USA Swimming has suspended Michael Phelps for six months, forced him to withdraw from next years world championships and taken away his funding from the sports na tional governing body as a result of the Olym pic champions second DUI arrest. Phelps wont be allowed to participate in USA Swimming-sanctioned meets through April 6, 2015. From staff and wire reports SPORTS BRIEFS PAGE 26 B4 to cl 000JHSZ B l a c k D i a m o n d I n v i t a t i o n a l Black Diamond Invitational C a r S h o w Car Show Y o u r o u t s t a n d i n g v e h i c l e h a s b e e n s e l e c t e d Your outstanding vehicle has been selected! November, 8, 2014 9 am 3 pm Youre invited to join us at the 1st Annual Black Diamond Invitational Car Show benefitting the YMCA of Citrus County! Classics, Hot Rods and Muscle Cars from the areas Top Car Clubs! Great Food, Entertainment, and Lots of Prizes & Giveaways! Get treated like a VIP on Friday, November 7, 2014 from 7 pm 10 pm as we present our vendors & participants with a celebratory dinner party. Dont forget to RSVP as our VIP for $25 per person. Black Diamond Ranch 3125 West Black Diamond Circle, Lecanto, FL 352-746-3440 $25 Registration Fee ($30 Day of Event) 000JBL5 The Florida Council of the International Federation of Fly Fishers presents Florida 2014 featuring Bob Clouser & Wanda Taylor For more information, go to at Plantation on Crystal River Friday & Saturday, Oct. 10 & 11, 2014 See the latest fly tackle & gear Clinics & workshops with IFFF certified casting instructors Fly tying demos & workshops with the southeasts top fly tiers Programs for Women & Kids Free programs & seminars Fri. reception & Sat. banquet Raffles, silent auctions, live auctions & much more. Join us! 000JEGB Jaguars apologize for mascots Ebola sign on SundayJACKSONVILLE The Jacksonville Jaguars have apologized for their mas-cot using the Ebola epi-demic to mock the Pittsburgh Steelers. Jaxson de Ville held one of Pittsburghs famed yellow Terrible Towels next to a homemade sign that read TOWELS CARRY EBOLA during Sundays game. Team president Mark Lamping said the Jaguars had no prior knowledge of the sign and will handle the matter internally. Lamping said improvisa-tion and humor mascots inception in 1996.Dolphins Shelby suspended in wake of arrestDAVIE Miami Dol-phins defensive lineman Derrick Shelby has been suspended indefinitely in the wake of his arrest on misdemeanor charges of resisting arrest and tres-passing at a nightclub. Shelby was suspended hours before Mondays practice for conduct detri-mental to the team. The Dolphins will gather more information on the arrest before making a final de-termination on disciplinary action, coach Joe Philbin said in a statement. Shelby was arrested around 2 a.m. Saturday at a Fort Lauderdale club after refusing to leave, po-lice said. He was released from jail on a $100 bond. Shelbys attorney said his client is innocent. A third-year veteran, Shelby has played in all four games as a reserve this season.Cardinals Dwyer pleads not guilty to hitting wifePHOENIX Arizona Cardinals running back Jonathan Dwyer pleaded not guilty to charges that he assaulted his wife during two arguments in July at their Phoenix apartment. Dwyer appeared at an arraignment hearing Mon-day in Maricopa County Superior Court. He is charged with felony aggra-vated assault and eight misdemeanors, including assault. Investigators say Dwyer broke his wifes nose with a head-butt during a July 21 argument and engaged in a dispute the following day in which he punched his wife and threw a shoe at his 17-month-old son, who wasnt injured.Police used stun gun on Vikings DT JohnsonMINNEAPOLIS A po-lice report shows Minneap-olis disor-derly conduct. From wire reports NFL BRIEFSNo. 1 FSU could be down three starters TALLAHASSEE Topranked Florida State could be missing three starters when the Semi noles play at Syracuse on Saturday. Coach Jimbo Fisher an nounced Monday center Austin Barron is out with an arm injury and will be replaced by redshirt freshman Ryan Hoefeld. Leading receiver Rashad Greene suffered a concus sion in last weekends 43-3 win against Wake Forest and has not been cleared to return. Run ning back Karlos Williams injured his ankle during the game and is in a walking boot. Redshirt sophomore Mario Pender would re place Williams if he is un able to play and freshman Dalvin Cook would be the primary backup. Pender and Cook have run for a combined 382 yards and five touchdowns. If I had to give a per centage, I would say yes Williams will miss the game, Fisher said. But its how guys heal and where theyre at. Sophomore Jesus Bobo Wilson could start in place of Greene, but freshman Travis Rudolph is also a candidate. Greene is four receptions from setting the school re cord for career catches. The Seminoles could also be a play away from an emergency situation at quarterback. Backup Sean Maguire is out after injuring his hand against Wake Forest. Fisher said Jameis Winstons backup would either be redshirt freshman John Franklin or walk-on redshirt fresh man Troy Cook. Neither has ever thrown a collegiate pass and Franklin has spent much of the season working as a receiver. The Seminoles have had a variety of shortterm ailments keep play ers out of games this season after being rela tively injury free during the title run. Starting defensive end and Pender both missed the N.C. State game with concussions. Nose tackle Niles Lawrence-Stample is out for the season with a torn pectoral muscle. His replacement, Derrick Mitchell, Jr., missed last week with a knee prob lem and cornerback P.J. Williams has missed a game with a hamstring issue. Youre always con cerned, but ... theyre not pulls and tears, Fisher said. When you run a bunch of big guys into each other, things break sometimes. Thats just ball. You get a bunch of bodies fall ing around out there, that happens. ... Sometimes the gods smile on you, sometimes they dont. That doesnt mean you still cant have success. Youve got to have a plan.Associated Pressrfnf tbfr btt tnntnt trbnt Dolphins may get back six DAVIE Healthier than theyve been since the season began, the Miami Dolphins should benefit from a wave of reinforcements Sunday against Green Bay. As many as six players might rejoin the starting lineup, and all practiced Monday when the Dol phins reconvened fol lowing their bye week. Running back Know shon Moreno practiced for the first time since he was sidelined by an elbow injury in Week 2. Also back are two start ers expected to play Sun day for the first time this season, safety Reshad Jones and Pro Bowl cen ter Mike Pouncey, whose comeback could involve a switch to guard. Others returning from injuries are middle linebacker Koa Misi (ankle), defensive tackle Randy Starks (back) and guard Shelley Smith (knee). The bye came at a pretty good time, re ceiver Mike Wallace said. Its going to be good for our team. We havent seen these guys to gether like this in a long time. Im excited; I know our whole team is excited. Absent on Monday was reserve defensive line man Derrick Shelby, suspended indefinitely in the wake of his weekend arrest on misdemeanor charges of resisting ar rest and trespassing at a nightclub. Cornerback Cortland Finnegan and receiver Brandon Gib son also sat out. Even so, there was a dramatic net gain in manpower, which is es pecially welcome as the Dolphins (2-2) prepare for perhaps their tough est opponent so far. Green Bay (3-2) has won its past two games by a combined score of 80-27. The reinforcements mean lots of depth-chart reshuffling this week. You want to get these guys up to speed as quickly as you possibly can, coach Joe Philbin said. Some look great, some not so much. Weve got to see where they are and how much they can be used in a game. Moreno practiced with an elbow brace and said hell wear it in a game if necessary. His return buoys a ground game that has been a strength even in his absence. It felt good to get out there on the field and work out a little of the rust, he said. Moreno led the NFL with 134 yards rushing in Week 1. Pouncey, returning from hip surgery in June, should help an offensive line that is much im proved over last season. His replacement, Sam son Satele, has played well enough to prompt speculation hell remain at center while Pouncey moves into the lineup at guard. Whatever position Im playing, its going to be for the better of the team, Pouncey said. Well see. Its coach Philbins decision. Pouncey played mostly guard for the Florida Ga tors but has been at cen ter since being drafted by the Dolphins in 2011. Guard is my posi tion, Pouncey said. I was kind of forced to play center when I got drafted here. The defense is getting a boost with the return of Misi, Starks and Jones, who was suspended for the first four games for violating the NFL policy on performanceenhancing substances. PAGE 27 HEALTHLIFE Section CTUESDAY, OCTOBER 7, 2014 CITRUSCOUNTYCHRONICLE So you know: T he information contained in the Health & Life section is not intended to cover all possible directions, precautions, warnings, drug interactions, allergic reactions, or adverse effects and is not intended to replace consultation with a physician. Inside:Best Foot Forward/C2 Ear, Nose & Throat/ C3 Navigating Cancer/ C4 000J8DT MATTHEW BECK/ChronicleDynabody Fitness Club aqua-aerobic instructor Vickie Reed leads her class Monday morning at the club in Inverness. Reed, diagnosed with breast cancer three years ago, says she has benefitted greatly from exercise during her recovery. MEGANCARELLA CorrespondentFitness instructor Vickie Reed never expected a breast cancer diagnosis three years ago. With no family history and a very healthy lifestyle, breast cancer was the last thing on the then 54-year-olds mind. A mammogram and then a biopsy indicated stage 1 cancer. A lumpectomy and radiation therapy followed. Reed believes in the power of exercise. As an instructor at Dynabody Fitness Club in Inverness since 2004, shes seen firsthand the benefits for her clients of all ages and health conditions. Reed teaches water aerobics, Pilates, strength training and Silver Sneakers classes designed for senior citizens. After her surgery, she was determined to get back to exercise, and work, as quickly as possible. She began as a student three weeks post-surgery, taking Silver Sneakers classes while sitting in a chair. From no weights to light weights, she began to build strength and endurance. At home, she did basic stretching and tried other techniques to regain flexibility in her left arm and shoulder. I would take my fingers and walk them up a wall, she said. Each day Id get a little higher. Her doctors were impressed with her methods and her rapid improvement. Five weeks after surgery, she was back to teaching her classes, with some modifications. She continued her teaching schedule through her entire sixweek radiation therapy regimen. Research supports Reeds instinct regular exercise during breast cancer treatment can reduce depression, lessen fatigue and improve quality of life. It can also help to prevent the cancer from recurring. The American Cancer Society recommends that women who have been diagnosed with breast cancer exercise for about four hours each week, not only to improve quality of life, but also to lower the risk of breast cancer recurrence and the development of other cancers. Exercise improves blood flow, which has a lot to do with healing, said James Lapid. A physical therapist at Seven Rivers Outpatient Rehab, Lapid has treated many breast cancer patients during his 20-year career. Exercise helps reduce the pain and inflammation that can follow breast cancer surgery, he said. With a mastectomy, many women also have muscle and lymph nodes removed, causing pain and swelling. After surgery, a woman still needs to comb her hair, get dressed and do the normal activities of daily living. Exercise can improve a persons outlook and general well being so she feels more able to cope with treatment and recovery. Some patients also experience nerve pain known as allodynia. In these cases, patients feel pain from simple sensory stimulation that normally wouldnt cause pain. A light touch or movement, for example, can be interpreted by the brain to be painful. These factors can cause a patient to experience fatigue in three ways, said Lapid: physical fatigue, which has to do with muscles; neurological fatigue, which is unexplained discomfort, or allodynia; and mental fatigue. Mental fatigue is the major thing here, said Lapid. You cant sleep; do daily activities, hobbies, sports. Plus, youre cooped up at home. Physical therapy and exercise can improve all three factors. Just going out to PT or exercise, having that interaction helps, he said. Early physical therapy and exercise helps in other important ways, said Lapid. Post-surgery, the body develops scarring and adhesions in soft tissue and connective tissue, which can cause pain and discomfort. We can use techniques to break down the scarring and focus on stretching exercises and moderate to intense strengthening. Exercise during chemotherapy and radiation has benefits as well, he added. Chemo and radiation attack healthy cells as well as cancer cells. Exercise assures that the body will have proper nutrients because of improved blood flow. This adds healing elements and when theres healing, strength returns, along with function and activity. When Lapid first started treating breast cancer patients, such exercise wouldnt have been possible. But advances in surgical techniques and pain management have improved things immensely. Because of early detection and minimally invasive procedures, patients can actually exercise with minimal to moderate intensity quite soon after surgery, he said. Back in the day, a woman who had a mastectomy would be in a sling for a couple of weeks. By that time, the scar tissue had already invaded. Exercise improves a womans self-image as well. Exercise and activity are good for mental health, he said. People know they arent dealing with this on their own, that there is help and support out there. Reed agrees. Exercise kept me strong and positive. It got me out of my own head. After my surgery, part of me wanted to just curl up and be alone and protect my left side. But youve got to get back out and live your life. Dont stay home. Get active. Post-surgery exercise a boon to improvementActive recoveryA PAGE 28 The lymphatic system is the part of the circulatory system that helps transport lymphocytes to fight infection and filter intracellular fluid that escapes from and returns it to the circulatory system. Compromise to the lymphatic system can lead to edema known as lymphedema. Edema is a general term describing a build up of fluid outside our cells and circulatory system absent of any lymphatic damage or compromise. The lymphatic system can become compromised primarily through inherited characteristics or secondarily due to injury or stress, or as a side effect of medical therapy. Secondary lymphedema of the upper extremity can be a side effect of breast cancer treatment from insult of the axillary lymph nodes that may be removed or damaged as a result of biopsy or surgical insult from lumpectomy, mastectomy or metastasis, and radiation therapy. Swollen, puffy fingers, forearms, or the entire upper extremity may be a result. Physical therapy with manual lymphedema therapy, compression gradients and positioning techniques are some treatments for upper extremity edema. Swollen, achy, tender, stiff legs, ankles and feet are classic signs of lower extremity edema. Lower extremity edema can be a result of compromised vein circulation, blood pressure medication, thrombus or blood clot, heart disease and kidney failure to name a few. Chemotherapy treatment, hormone replacement therapy and steroids used in treatment of breast cancer can result in edema in the lower extremity, as well. Docetaxel (Taxotere, Docefrez) is an anti-mitotic intravenous agent used in the treatment of breast, prostate, ovarian and some lung cancers. This agent interferes with microtubular function within cancer cells leading to their death. Use of this agent may lead to the development of temporary edema in the lower extremity, also. Development of edema in the lower extremity should be relayed to your oncologist. Treatments for lower extremity edema can be suggested after your oncologist establishes the edema is a side effect of treatment and not due to another serious issue, such as renal or cardiac compromise. Proper diet and nutrition can play a role in reducing edema in the extremities. Avoid cooking with salt or MSG. Try to get some aerobic exercise if you are able and advised by your oncologist. Elevate the legs when resting. Try to avoid sitting for long periods with the legs dependent. The use of medial grade support or compression stockings can help a great deal if indicated. Stockings are not a favorite of patients because they can be hot, uncomfortable and difficult to don and doff; however, stockings are the best treatment for edema, in my opinion. Pneumatic compression pumps are another option, but they are time consuming and must be used consistently. Diuretics or water pills can be used to encourage the kidneys to spill more water into the urine, reducing the fluid in the body. This would then pull excess water from the legs, thus reducing edema. Diuretics, though convenient in a pill form, make a nearby bathroom an inconvenient necessity as they increase urinary output. If you experience any symptoms of lower or upper extremity edema, consult with your oncologist, of course.David B. Raynor, DPM, is a podiatrist in Inverness and can be reached at 352-726-3668 or at FootCenters.com with questions or suggestions for future columns.C2TUESDAY, OCTOBER7, 2014CITRUSCOUNTY(FL) CHRONICLEHEALTH& LIFE 000JAXJ 000JI2L Edema during, after treatment for breast cancer Dr. David RaynorBEST FOOT FORWARD Special to the ChronicleScott Traynor, Area 13 behavior analyst for the Agency for Persons with Disabilities, will speak about behavior issues as experienced by persons with developmental disabilities at 10 a.m. Wednesday, Oct. 15, in the Chet Cole Life Enrichment Center (CCLEC) at the Key Training Center. The public is welcome. Caring, or any combination thereof. Teaching appropriate behavior is not just a concern for parents of young children, but for caregivers of adults. Other rapidly expanding areas of concern are aging populations with behavioral problems linked with dementia, and dually diagnosed individuals, those with both a developmental disability and a diagnosed mental illness. The presentation will be followed by a short meeting of the Key Center Family Connection. The CCLEC is at 5521 Buster Whitton Way, on the Lecanto campus of the Key Training Center. For more information, call Stephanie Hopper at 352-344-0288. Behavior analyst to speak at Key Center PAGE 29 Seven Rivers offers programs, screeningsSeven Rivers Regional Medical Center offers health education programs and screenings facilitated by board-certified physicians and licensed medical professionals. Call 795-1234 to register. Childbirth Education Expectant couples learn about labor, delivery and relaxation techniques, exercising, newborn characteristics and breastfeeding. Expectant mothers should attend in the seventh month of pregnancy. Began Thursday, Oct. 2, and continues each Thursday from 6:30 p.m. to 8:30 p.m. through Oct. 23. Cost is $30. Joint Camp Having knee or hip replacement surgery? This one-hour session prepares patients for surgery and helps them understand what to expect following surgery. Learn about the replacement procedure, post-operative exercises and recovery at home. Bring a caregiver or support person. Next class is today, Oct. 7, 1 p.m. Breastfeeding & Newborn Care Provides expectant or new mothers with effective techniques that may help them successfully breastfeed. Fathers are encouraged to attend. Saturday, Oct. 11, 9 a.m. to noon. Parkinsons Disease Outreach Group Provides people with Parkinsons and their caregivers an opportunity to discuss topics of interest, share information and experiences, and brainstorm solutions to common problems. Meetings are held at 2:30 p.m. the second Thursday of the month, feature a different topic each month, and are presented by Lisa Walter, MS-CCC, speech language pathologist. Healing Ways Health education for people concerned about skin health and wound care, especially individuals with diabetes. Programs are held at 10:30 a.m. the third Wednesday of every month, feature a different topic each month, and are presented by Michelle Arevalo, program director of wound care and hyperbaric medicine at Seven Rivers Wound Care Center. Balance Screenings Seven Rivers Outpatient Rehab offers free balance screenings. Located at 11541 W. Emerald Oaks Drive, Crystal River (adjacent to the hospital). Call 352-795-0534 to schedule your screening. 352200-2190.Post-polio support group to meetA post-polio support group will meet at 2 p.m. Sunday, Oct. 12, at the Collins Health Resource Center, 9401 S.W. State Road 200, Bldg. 300, Ste. 303, Ocala. Nuris Lemire will be the guest speaker about Are You Digging Your Grave with Your Fork? For more information, call President Carolyn Raville at 352-489-1731. HEALTH& LIFECITRUSCOUNTY(FL) CHRONICLETUESDAY, OCTOBER7, 2014 C3JE4B Gardner Audiology 2014 Participants sought 000JE02 4805 S. Suncoast Blvd. Homosassa, FL 34446 352-628-0012 Always Welcoming New Patients FRANK J. VASCMINI, DDS jenuinedesignstudios.com 2981 East Gulf To Lake Hwy., Inverness, FL 34453 Breast Cancer Awareness Month Empowering women through beauty B RING A F RIEND 2 FOR 1 H AIRCUTS A LL MONTH OF O CTOBER *Restrictions apply must bring one new guest. S PREAD T HE W ORD CALL TODAY TO SCHEDULE YOUR APPOINTMENT 352-341-2887 000JHAG 000JHZZ 521-1007-TUCRN TO ELIGIBLE NON-PROFIT ORGANIZATIONS ONLY NOTICE OF FUNDS AVAILABLE AND SOLICITATION FOR PROPOSALS FOR THE CITRUS COUNTY STATE HOUSING INITIATIVES PARTNERSHIP (SHIP) PROGRAM SHIP FY 2014/2015 The Citrus County Local Housing Assistance Plan requires that Citrus County advertise the notice of funding availability in a newspaper of general circulation and periodicals, at least 30 days before the beginning of the application period of any Housing Assistance Program. Under the State Housing Initiatives Partnership Program (SHIP) Citrus County announces the following housing program and availability of funding: NOT FOR PROFIT DEVELOPER STRATEGY This NFPD strategy assists with the construction or rehabilitation of homes sold by non-profit developers. This strategy will provide a subsidy to eligible sponsors, as established by resolution, to pay development costs including fees charged by government entities in conjunction with residential construction (impact fees, building permits, utility fees, etc.), wells, septic and site preparation. Any funds not used for the paymen t of development costs may be used to offset cost of construction or rehabilitation of an acquired eligible housing unit. Sponsors eligible will be those of 501(c)(3) agencies that build or repair affordable homes. APPLICATION PERIOD SHIP Application deadline 4 p.m. November 14, 2014 Application period November 10-14, 2014: No applications will be accepted prior to November 10, 2014. Applications must be delivered by Friday November 14, 2014 deadline, no later than 4:00 p.m. Applications received after the deadline will be disqualified, faxed and e-mailed applications will be disqualified. The address is Citrus County Housing Services 2804 W Marc Knighton Ct. #12, Lecanto, FL 34461. Interested persons should contact Housing Services at 352-527-7520. The passing of the comedian Joan Rivers has grabbed our attention. Headlines in the newspaper and on TV have likely also stirred some fears and concerns about safety of outpatient surgery. First of all, with regard to Rivers passing, it is too early to say what exactly occurred during her endoscopy. Im sure that information will be made public, as there is an ongoing investigation. Let me also say that that day during that week when Joan Rivers had surgery, there were many successful and safe outpatient surgeries which occurred in New York and elsewhere in the United States. As an ear, nose and throat surgeon, the majority of my cases and procedures are performed in the office or ambulatory surgery centers (otherwise known as outpatient surgery centers). Endoscopy is a common procedure and has increased during the past 20 to 30 years and the percentage of procedures being done in this setting is increasing. The majority of surgical procedures are done in the outpatient setting with a great deal of success and safety. There are a number of reasons why patients select the outpatient surgery setting for their procedure. Privacy, ease, efficiency and cost are some of the reasons. But, admittedly, there are patients who are better suited for the hospital setting. Those would be people who have complicated medical histories and would be at more risk. The hospital setting provides them a safe environment where they can get immediate care. That being said, surgery centers are not unsafe at all. They are accredited by organizations that accredit hospital operating rooms and they are equipped to handle cardiac emergencies. The difference is they would have to transfer a patient to a hospital should an event occur, like what happened to Joan Rivers. The typical outpatient surgery setting center usually starts the day at 7 a.m. and most patients are home by noon, and all are usually completed by 5 p.m. More personalized attention, one-on-one with nurses, convenience of a flexible schedule and a decreased exposure to hospital-based infections are some of the other benefits from a surgery center. Since outpatient surgery centers are not exactly new, there are many years of data and studies in research that suggest the complication rates are very low, if the procedure is done in a properly accredited facility. Currently, we have two hospitals in our county with outpatient surgery departments and several freestanding facilities in the center of the county. Types of anesthesia, performed at these facilities, includes local anesthesia or numbing the area to be treated, as well as conscious sedation, which involves an IV administered intravenous medication that can be combined with local anesthesia, as well. Deeper sedation including general anesthesia, which means the patient is asleep, is also used in these facilities. Typically, the anesthesia decision is made by the anesthesiologist as well as the surgeon, taking into account the patients age and medical condition to make sure that it is safe. Orthopedic and eye doctors use block procedures, which can be used to completely numb an extremity or the eye to be worked on. I can assure you the tragedy of Joan Rivers will not undo the surgery center and its ability to deliver safe and effective care. There have been and there will always be a majority of surgical cases that will do well and patient outcomes will be fine. But there is always a degree of risk undergoing any type of procedure, whether it is in the hospital or the outpatient facility. If you are contemplating surgery, discuss your concerns with your surgeon and your anesthesiologist. Do a little research to make sure your facility is certified by an accreditation group such as JCAHO, which is a nationally recognized entity used by hospitals and surgery centers. There is no 100 percent guarantee you cant have a complication or problem, particularly if there are other medical issues going on, but you can make the procedure less risky by making sure you have the right surgeon, the right facility and the right care, do your homework and dont be afraid to ask a few questions.Denis Grillo, D.O., FOCOO, is an ear, nose and throat specialist in Crystal River. Call him at 352-795-0011 or visit CrystalCommunityENT.com. Dr. Denis GrilloEAR, NOSE & THROAT Outpatient surgery and anesthesia HEALTH NOTES See NOTES/ Page C6 PAGE 30 C4TUESDAY, OCTOBER7, 2014CITRUSCOUNTY(FL) CHRONICLEHEALTH& LIFE 000JAVQ The Sgt. Dennis James The Sgt. Dennis James Flanagan Foundation Flanagan Foundation Presents The 4th Annual Never Forget 5K/ 1Mile Walk 9:00 am November 11, 2014 Historic Courthouse, Inverness The race will precede the Annual Veterans Day Parade. Stay for the parade after the race. Awards given for largest team group participation. $25 per entry to register in advance $30 register day of race All proceeds go to Sgt. Dennis James Flanagan Foundation For registration and more information visit or call Marissa Balderas 620-4356 Dennis Flanagan 697-1815 Registration at 7am Race at 9am 000JEGO 13th Annual Chili Cook Off for Charity October 11-12, 2014 Natures Resort 10359 West Halls River Road Homosassa Gates Open at 10am Chili available at Noon $5.00 admission includes cup for tasting Florida State Open Chili Championship Saturday Turn in at 2 $20.00 entry fee Sunshine State POD Cook Off Sunday Turn in at 12:30 $15.00 entry fee CASI Cook Off for Charity hosted by Lecanto Levis 4-H Club to benefit Citrus County Blessings, Citrus County Anti Drug Coalition Lecanto Levis 4-H Club FRIDAY Free Family Movie in the Park 7pm SATURDAY Youth & Open Chili Cook Off and Salsa Contest Youth $10 entry / Open $20 entry / Salsa $10 entry NEW! Chili-themed Decorated Hat Contest Saturday at 3 $5 entry Halloween Themed Decorated Vehicle* Parade and Contest Saturday 6pm $10 entry *Bikes, Carts, ATVs) 000IOPJ 4th Annual Run for New Beginnings Youth Shelter$40 for 5k $15 for Fun Run SATURDAYOctober 25, 2014Downtown BrooksvilleRegister at Sponsorship & Vendor Opportunities Still Available000J7JO 000J5ND Eckerd E-Nini Hassee, The First Name in Second Chances for Girls a not for profit organization, is hosting our Annual Spaghetti Dinner on October 16th from 3:30 to 7:00 p.m. Donations are $8.00 per person, which includes salad, bread, spaghetti (with assorted homemade sauces), dessert and drink. Please call 726-3883 for more information We are located at 7027 E. Stage Coach Trail, Floral City SAVE THE DATE SPAGHETTI DINNER Thursday, October 16, 2014 3:30 to 7:00 p.m. Includes Salad, Bread, Dessert and Drink 7027 E. Stagecoach Trail, Floral City Questions: 352-726-3883 $8.00 DONATION 000JATP 27th ANNUALSCARECROW FESTIVALSat., Oct. 11, 2014 9:00 AM 4:00 PMPony Rides Pumpkin Patch Craft Show Trampoline Bounce House & Slide Pilot Club Puppet Show Old Fashioned Childrens Carival Live Butterfly Exhibit with Butterfly Workx West Citrus Ladies of the Elks Annual Arts & Crafts Show Saturday, Oct. 25, 2014 From 9 a.m. to 2:30 p.m. For more information call 586-6171 West Citrus Elks Lodge 7890 W. Grover Cleveland Blvd. Homosassa, FL 34446 000JAXZ Citrus County AuditoriumCitrus County Fairgrounds U.S. 41 S., InvernessSale Hours Fri. 5-8 p.m. with $5 donationNo admission charge for the followingSat. 9 a.m.-4 p.m. Sun. 1 p.m.-4 p.m. Mon. 10 a.m.-7 p.m. (half price day)Tues. 10 a.m.-3 p.m. ($3 a bag) book sale information call 746-1334 or 527-8405Oct. 10 thru Oct. 14Friends of the Citrus County Library SystemMEGA BOOK SALEFundraiser 000IGFUCash or Checks Only Great bargains in recycled reading! 000HQOE Community Happenings Community Happenings Last week, we began a series of articles regarding tumors of the brain. This week, we will mention and discuss in some detail the more common types of brain tumors. Tumors that begin in the brain tissue are known as primary brain tumors. This distinguishes them from secondary tumors, or those which metastasize from other parts of the body to the brain. Primary tumors of the brain are typically classified based on the type of tissue in which they begin.. Next week, we will discuss the generalized approach of the treatment of brain tumors.Dr. C. Joseph Bennett is a boardcertified radiation oncologist. If you have any suggestions for topics, or have any questions, contact him at 522 N. Lecanto Highway, Lecanto, FL 34461, or email cjbennett@rboi.com. Dr. C. Joseph BennettNAVIGATING CANCER The many types of brain tumors Groups to celebrate anniversary Thursday Special to the ChronicleBridge to Serenity Al-Anon and Alateen Family Group will celebrate their second anniversary with an open house at 7 p.m. Thursday, Oct. 9, at St. Margarets Episcopal Church, 114 N. Osceola Ave., Inverness. There will be Al-Anon and Alcoholics Anonymous speakers, snacks and beverages. The meeting is open to the public. Information on both Al-Anon and Alateen will be available. This Al-Anon group and its separate Alateen group both meet each week at this time and location. Al-Anon is an anonymous fellowship of friends and family members of alcoholics. If a loved ones drinking is a problem in someones life, Al-Anon can help. Alateen is part of the Al-Anon Family Groups. In Alateen meetings, teens can find support and understanding from people their own age who are going through similar difficulties. Two adult sponsors with sanctioned Alateen training work with Alateen groups. There are several other Al-Anon meetings in Citrus County weekly. Call 352-697-0497 or go to the District 5 Al-Anon webpage at district5.com For more information, call or email Sharon at 352637-2916 or slnalepa@yahoo.com; or Joe at 727580-0891 or joemarteski@live.com. PAGE 31 CITRUSCOUNTY(FL) CHRONICLETUESDAY, OCTOBER7, 2014 C5 000JG9L PAGE 32 C6TUESDAY, OCTOBER7, 2014CITRUSCOUNTY(FL) CHRONICLEHEALTH& LIFE Festival of the Arts43rd Anniversary Fine Arts Crafts Juried Art Show Student Display Food Refreshments Free Parking Free Admission 000J7K4 Sponsored by: The BFF Society presents the $25.00 per person Includes: Lunch and Fashion Show For more information, call Sylvia at 352-563-1606 or Alica at 352-564-2336 Proceeds go to Pat Woessner Scholarship/Education Fund Changing Lives Through Education 7th Annual Pat Woessner Fashion Extravaganz a Citrus Hills Golf & Country Club Saturday, November 15 10:30am to 2:00pm (Shopping 10:30am to 11:30am) 000J7RE The BFF Society, Inc. is a Not for Profit Organization with a 501C3! 000ISE2 000J7JV 000HQOE Community Happenings Community Happenings George Washington Carver Community Center 2nd Annual GWCCC Golf Tournament Saturday, Oct. 25, 2014 Shotgun start at 8:00am Juliette Falls 6933 SW 179th Ave Road, Dunnellon, FL 34432 352-522-0309 Contests Hole-In_-One Contest Sponsored by Eagle Buick & GMC Putting Contest Mulligans $5/Ball Toss $10 Format & Entry Fee 4-Person Scramble $75.00 per player Hole Sponsor $100 Lunch Provided Contact Harold Walker at 352-586-3230 000JGZBa.m. board meeting. 9:15 to 9:30a.m. coffee, doughnuts, networking. 9:30 to 10:30a.m. membership meeting. For information, call the office at 352-389-0472 or email substancefree.citrus@yahoo .com.Spine surgery talk on tap Oct. 7SPRING HILL Oak Hill Hospital will continue its For Your Health Community Education Series from 5:30 to 7 p.m. today, Oct. 7, with Dr. Frank S. Bono, board certified in orthopaedic surgery and fellowship trained. He will present Minimally Invasive Spine Surgery at Heritage Pines Country Club, 11524 Scenic Hills Blvd., Hudson. Bono is a spine surgeon on staff at Oak Hill Hospital. He will hold a discussion about the advances in spine surgery and the benefits of minimally invasive spine surgery. He will also discuss the treatment of back and leg pain due to failed laser spine surgery, spinal stenosis, herniated disc, degenerative disc disease, scoliosis and spinal fractures due to trauma or osteoporosis. Admission is free and a complimentary hot meal will be served. Seating is limited and reservations are required. Call 352-628-6060 or register online at OakHill Hospital.com/ForYourHealth. Sleep apnea topic for Mended HeartsThe Citrus County Chapter of Mended Hearts will welcome as guest speaker Dr. Daeclin St. Martin at 10 a.m. Friday, Oct. 10. His topic will be sleep apnea. The meeting will be in the Gulf Room at the Historic Citrus High School (old red brick building). Additional parking is provided in lot 2A across from the hospital main entrance, with shuttle service available. Mended Hearts is a national nonprofit support organization that includes heart patients, spouses, caregivers, health professionals and others interested in helping patients with emotional recovery from heart disease. With 280 community-based chapters nationwide, Mended Hearts has 24,000 members, making it the largest heart-related patient support group. All meetings are open to the public. Citrus Mended Hearts is sponsored by Citrus Memorial Health System For more information, call President Millie King at 352637-5525 or cardiovascular services at 352-344-6416. Walk to End Alzheimers coming up Oct. 10BROOKSVILLE The Alzheimers Association invites Hernando and Citrus residents to unite in a movement to reclaim the future for millions by participating in the Alzheimers Association Walk to End Alzheimers. Downtown Brooksville will be the site of Walk at 9a.m. Saturday, Oct.10. Walk to End Alzheimers is an experience for 250 participants in Hernando and Citrus counties who will learn about Alzheimers disease and how to get involved with this critical cause, from advocacy opportunities, the latest in Alzheimers research and clinical trial enrollment to support programs and services. Each walker will also join in a meaningful ceremony to honor those affected by Alzheimers disease. In addition to the 2-mile walk, participants will enjoy local celebrities, entertainment and a special tribute to those who have experienced or are experiencing Alzheimers. Start or join a team today at alz.org/walk or 352-688-4537. Oak Hill offers low-cost screeningsBROOKSVILLE During Breast Cancer Awareness Month, Oak Hill Hospital reminds the public that it offers digital mammography screenings for only $60 to patients without health insurance. The screening includes the imaging and the radiologists reading. Oak Hill Hospital will bill insurance companies for patients with health insurance. Refer to your insurance provider for information about whether or not Oak Hill Hospital is in your network and if there are other copays or out-of-pocket expenses. Patients do not need a script from a physician to schedule a mammogram screening at Oak Hill Hospital. For more information or to schedule an appointment, call 800-921-7158. Check, cash, or credit cards will be accepted. The screening will take place at the Womens Imaging Center at 11375 Cortez Blvd., State Road 50. NOTESContinued from Page C3 A75-year-old woman was referred to me for persistent elevation of white blood cells or WBCs. She had several blood counts or CBCs done over the past few months and all showed increased WBCs. WBCs fight against infections and so it can increase when there is an infection such as pneumonia. But if it is high for a few months without any evidence of infection, the doctor needs to look for other reasons. I examined the patient and found that her spleen was mildly enlarged. I advised a bone marrow biopsy. It was done in my office. She tolerated it well. The results were diagnostic. She has CML, or chronic myeloid leukemia. Leukemia is a cancer of the blood. Leukemia begins when normal blood cells change and grow uncontrollably. It can be chronic or acute. Usually, acute leukemia is fast growing and requires more aggressive therapy. Chronic leukemia is slow growing and requires less aggressive therapy. Chronic myeloid leukemia (CML) is a cancer of the bloodforming cells, called myeloid cells, found in the bone marrow (the spongy, red tissue in the inner part of large bones). CML most often causes an increase in the number of white blood cells (neutrophils or granulocytes that normally fight infection).. Patients with CML have specific genetic mutation. In CML, part of chromosome 9 breaks off and bonds to a section of chromosome 22, resulting in what is called the Philadelphia chromosome or Ph chromosome. This creates one fusion gene called BCR-ABL. It is found only in the blood-forming cells, not in other organs of the body. The BCR-ABL gene causes myeloid cells to make an abnormal enzyme that allows white blood cells to grow out of control. Thus, the target is the unique protein called the BCR-ABL tyrosine kinase enzyme. There are now five different drugs available which hit this target. This targeted drug work wonders in patients with CML. I started my patient on one of these drugs called Gleevec. It is taken as a pill a day. Usually, it is well tolerated. My patient is tolerating it well. Most patients respond well and they go into complete remission. As per one study, these patients tend to live normal lives and most of them do not die due to the disease. In short, CML is becoming more like a chronic illness like diabetes. We may not cure them, but we can put it in remission and keep it under control for life 352746-0707. Update on leukemia Dr. Sunil GandhiCANCER & BLOOD DISEASE PAGE 33 Several area support groups offer help and education for Parkinsons sufferers and their caregivers. Monthly meetings are: Parkinsons Support Group, 3to 5p.m. the second Wednesday at American Legion Hall, County Road 466 and Rolling Acres Road, Lady Lake. Parkinsons Support Group, 2:30to 4:30p.m. the third Wednesday at Collins Health Resource Center at Timber Ridge Medical Park, 9401 State Road 200 SW, Ocala (west of I-75). All are welcome to join patients and caregivers at all meetings. You do not have to be a Parkinsons patient, only have a desire to learn more about the disease. Citrus County Alzheimers Family Organization support group meetings: Crystal Gem Manor ALF, 10845 W. Gem St., Crystal River 3p.m. last Tuesday monthly. Support group leader: Ce Ce, 352-794-7601, Highland Terrace ALF, 700 Medical Court E., Inverness 2p.m. fourth Thursday monthly. Support group leader: Ce Ce, 352-794-7601. Sunshine Gardens of Crystal River, 311 NE Fourth Ave., Crystal River 2:30p.m. first and third Thursday monthly. Support group leader: Debbie Selsavage, 352-563-0235. Superior Residence of Lecanto, 4865 W. Gulf-toLake Highway 2:30p.m. third Thursday monthly. Support group leader: Carolyn Reyes, 352-746-5483.-772-8672. Website: Live chat every Wednesday at noon. Message boards open at all times to post questions and leave replies. Join the Alzheimers Association online community at _alzheimers_ bessage_ 352683-9009. Free respite care provided, call to reserve. First United Methodist Church of Homosassa has several support groups that run on a monthly basis. All groups are open to the public and free of charge, and meet at 1p 352229-4202. Stroke Support Group of Citrus County: 3p.m. third Wednesday monthly, CMHS Annex Building conference room, State Road 44 across from Walgreens. Call 352344-6596 or 352-344-1646. Hospice of Citrus and the Nature Coast support groups and workshops. Call 866-642-0962 or 352-6211500 for information. Grief workshops: 1p.m. Thursday Hospice of Citrus and the Nature Coast Clinical Office, 326. S. Line Ave., Inverness. 2p.m. Wednesday Newly Bereaved Grief Workshop, Wings Education Center, 8471 W. Periwinkle Lane, Homosassa. Grief support groups: 11a.m. Tuesday Our Lady of Grace Catholic Church Parish Life Center, 6 Roosevelt Blvd., Beverly Hills. 9a.m. Wednesday Griefs Journey ... A Walking Group, Whispering Pines Park, Inverness (Parking Area E). 10a.m. Thursday Wings Education Center, 8471 W. Periwinkle Lane, Homosassa. 2p.m. second Thursday Hospice of Citrus and the Nature Coast Levy Clinical Office, 24-B County Road 40 E., Inglis. 10:30a.m. Saturday First United Methodist Church, 831 Bradshaw St., Homosassa. Evening support groups (for working people): 6p.m. Tuesdays, newly bereaved Hospice of Citrus and the Nature Coast Hospice House, 3350 W. Audubon Park Path, Lecanto. Social support: 10a.m. Tuesday Franks Family Restaurant, 2780 N. Florida Ave., Hernando. 11:30a.m. third Tuesday LIFT luncheon (widows/widowers), CitrusHEALTH& LIFECITRUSCOUNTY(FL) CHRONICLETUESDAY, OCTOBER7, 2014 C7 0 00H90Y_2x1 000J7JY $75 Entry per Golfer $100 Hole Sponsorship $400 Team and Hole Sponsorship Four person scramble 1:00 pm Shotgun start Lunch during the event Chance to win a Harley Davidson Motorcycle for a Hole in One! Weve all known someone who has losts the battle... or know someone who is fighting hard now... this is an opportunity to show you really care. 13th Annual Friday, November 7, 2014 12:30 pm Shotgun Start All proceeds to benefit All entries/Hole Sponsorships must be received by 11/3/2014. 000JGDI StarringBilly LindseyFriday, October 17, 2014 Doors Open 5:30pm Show Starts 7:00pm Citrus Springs Community Center1570 W. Citrus Springs Blvd., Citrus Springs, FL Dinner and Show$15 per personPulled Pork and Chicken With All The FixingsCASH BEER AND WINE BAR Sponsored By:Presented By: Citrus County Parks and RecreationPurchase Tickets at Parks Office with Check or Money Order 2804 W. Marc Knighton Ct., Lecanto, FL Call 352-527-7540, 352-465-7007 or 352-746-4882 for info 000HQOE Community Happenings Community Happenings SUPPORT ORGANIZATIONS October is breast cancer awareness month, so if you see Nature Coast EMS team members wearing pink shirts this month, please know not only did they purchase their own shirts, they also made a donation for breast cancer awareness. Cooterfest rounds out the month with festivities starting on Oct. 24 and at the Tri Cooter Spring Triathlon on Oct. 26. On Thursday, Oct. 30, from 5:30 to 8 p.m., children can enjoy food, fun, treats, kidfriendly hallways and scary haunted house for those who like a little thrill. October also celebrates our second annual Stock Up For Seniors effort. A large percentage of our seniors live alone, are on a very limited income and have no support from family members. Nature Coast EMS believes Citrus County should help and support our seniors in every way, so we have once again teamed with Citrus County Support Services, and area businesses have agreed to be collection locations. Its one of the easiest things youll ever do. Next time you go shopping, pick up a few extra little things. You can drop off your items any time during the month of October, Monday through Friday, here at Nature Coast EMS on Homosassa Trail in Lecanto, theCitrus County Chronicle in Crystal River, the Citrus County Resource Center in Beverly Hills, Citrus 95 and The Fox 96.7 studios in Crystal Glen (in Lecanto), Capital City Bank in Crystal River, Select Physical Therapy in Beverly Hills and Insight Credit Union in Crystal River and Inverness. Just look for the boxes marked Stock Up for Seniors. This year, Caylas Coats is also supporting Stock Up for Seniors by accepting blankets at their collection box locations inside Citrus County Walgreens stores. Here is a list of items needed: baby wipes, toilet paper, powder, lotions, paper towels, denture cream, Polident or Poligrip, tissues, incontinence pads, deodorant, socks, toothpaste and brushes, combs, towels and wash cloths, shampoo, bars of soap and throw blankets. Every little bit helps! Last year, we put more than 200 care packages together for our seniors. For more information, call 352249-4730, Monday through Friday, or email katie.lucas@naturecoastems .org. Nature Coast EMS is an essential part of our health care community, and we are here for you every day whenever, wherever you need us. As always, take care and stay well. Nature Coast EMS does not call soliciting donations on behalf of paramedics and EMTs. The Citrus County Professional Paramedics and EMTs Local 365 is a union, and Nature Coast EMS team members do not benefit from any donation to this organization. Its a busy month for Nature Coast EMS Katie LucasNATURE COAST EMS See SUPPORT / Page C11 PAGE 34. Trash & Treasure Sale at Masonic LodgeSprings Masonic Lodge will have its Trash to Treasure Sale from 9 a.m. to 5 p.m. Thursday and Friday, Oct. 9 and 10. A large, varied amount of items will be for sale. The lodge is a nonprofit organization which has been active in support of the local community. Come out to the fundraiser and go home with something nice. Springs Masonic Lodge is at 5020 S. Memorial Drive in Homosassa. Look for a sign off West Grover Cleveland Boulevard or West Cardinal Street.Elvis back on stage in Central RidgeCitrus County Parks & Recreation will once again host a Dinner Show with Elvis starring Billy Lindsey, on Friday, Oct. 17, at the Citrus Springs Community Center, 1570 W. Citrus Springs Blvd. Doors open at 5:30 p.m. with first-come, first-served seating. Tickets are $15 per person and include dinner and the show. Dinner is a southern-style barbecue buffet with all the fixings. A cash bar of wine and beer will also be available. Food and beverages will be provided by Gruffs Catering. Billy Lindsey always draws a big crowd, so get tickets early. Tickets may be purchased by check, money order or charge card at the Citrus County Parks & Recreation office, 2804 W. Marc Knighton Court, Lecanto. For information, call 3525277540, 352-465-7007 or 352746-4882.Native Plant Society meets today in BHThe next meeting of the Citrus Native Plant Society will be today, Oct. 7, at 7 p.m. at the Beverly Hills Lions Club, 72 Civic Circle. Speaker will be Shari BlissettClark of the Florida Bat Conservancy. She will be presenting a program called Floridas Forest Bats. This colorful program discusses Floridas bats and the important role they play in the environment. Attendees will have the opportunity to meet some Florida bats after the program. Anyone with an interest in native plants is welcome. There will be a table with free information about native plants, a native plant raffle and refreshments. For more information, email citrusNPS@gmail.com. COMMUNITYPage C8TUESDAY, OCTOBER 7, 2014 CITRUSCOUNTYCHRONICLE Precious PawsADOPTABLE Sweet siblings Special to the ChroniclePhoenix and Cherry Blossom are litter mates, about 12 weeks old. Both are black, like to be a part of family activities, are quite verbal, well socialized and sleep under the covers. They might be a little timid at first, but together they can provide instant entertainment. They can be separated, but would love to move into their special family home together. If you would like to meet these charmers or more special kitties, call 352-7264700, leave a message for foster Mom Jenny and we will arrange for an introduction. Kittens and cats are available for adoption at the Pet Supermarket on State Road 44 in Inverness during regular store hours. The Floral City location at 7358 S. Florida Ave. is open from 10 a.m. to 2 p.m. Wednesday through Saturday. Precious Paws volunteers and adoptable pets are also at the Crystal River Rural King pet department from 10 a.m. to 2 p.m. Saturday. NEWS NOTES October Spotlight of Events: The GFWC Crystal river Womans Club Military Card Party luncheon is at 11:45 a.m. Thursday, Oct. 9, at the Crystal River Womans Club, 320 N. Citrus Ave. For reservations, call Lois at 352-382-0777. The event will benefit local charities. Grannys Attic and Bake Sale, sponsored by St. Timothys Lutheran Church, is from 8 a.m. to 1 p.m. Friday, Oct. 10, at the church, 1070 N. Suncoast Blvd., Crystal River. The event will benefit Hospice of Citrus and the Nature Coast, the Key Training Center and Mission in Citrus Inc. Joe Beddia, as the Godfather, will perform at 7:30 p.m. Saturday, Oct. 11, at the Kellner Auditorium, Congregation Beth Shalom in Beverly Hills, at 92 Civic Center Circle. The event will benefit the Community Food Bank. For tickets, call Barbara Hamerling at 352-513-5169. All retired educators and school personnel are invited to the Citrus County Retired Educators luncheon at 12:30 p.m. Monday, Oct. 13, at Mamas Kuntry Kafe in Inverness. Erin Ray of FDS Disposal will present a recycling program. For membership information, call Margaret Williams, president, at 352-795-6369. The public is invited to the Crystal River Christian Womens autumn luncheon at noon Tuesday, Oct. 14, at the Chet Cole Life Enrichment Center on the Key Training Center campus in Lecanto. Patti Smith will present the special feature on the Inverness Festival of the Arts and Marilyn Nase will bring the inspirational message. For luncheon reservations, call Ginny at 352-746-7616. The Music at the Museum Concert Series opening concert is at 6 p.m. Thursday, Oct. 16, at the Courthouse Museum in Inverness sponsored by the Citrus County Historical Society. The Johnny Carlson Trio will present Lady Legends of Jazz. Call 352-341-6427 for more information. The Path Harvest Hope Banquet is from 6 to 8:30 p.m. Friday, Oct. 17, at Crystal River First Baptist Church, 700 Citrus Ave. For reservations, call Kathryn at 352-522-0514. Take Stock in Children will present Dollars For Scholars and Trivia Treats at 6:30 p.m. Friday, Oct. 17, at the Crystal River Mall. For tickets, call Pat Lancaster at 352422-2348. The Southern Heritage Festival and Cracker Cattle Roundup is from 10 a.m. to 5 p.m. Saturday, Oct. 18, at the Historic Hernando Elementary School on U.S. 41 to benefit converting the school into a museum and community center, sponsored by the Hernando Heritage Council of the Citrus County Historical Society. The Homosassa Public Library will host an Author Fair from 1 to 4 p.m. Saturday, Oct. 18. Readers and writers are invited. The event is free. For more information, visit or the Facebook page. The Spanish community of St. John the Baptist Catholic Church of Dunnellon will host a Latin dance from 7 to midnight Saturday, Oct. 18, in the parish hall on the corner of U.S. 41 at State Road 40. For reservations, call Lilly at 352489-3166. The Industry Appreciation Month Barbecue is Saturday, Oct. 18, at the M&B Dairy in Lecanto. For tickets call the Economic Development Council at 352-795-2000 or visit. Citrus County Florida Friendly Landscaping will host a free gardening workshop from 2 to 3:30 p.m. Tuesday, Oct. 21, at the Extension Service building, 3650 W. Sovereign Path, Lecanto. To attend, call Steven at 352527-5708. The Citrus Abuse Shelter Association (CASA) Domestic Violence Awareness Month Telethon is from noon to 5 p.m. Wednesday, Oct. 22, and at 7 p.m. on ABC Action News Channel 28. The Agape House garage sale is from 8 a.m. to 1 p.m. Friday and Saturday, Oct. 24 and 25, at First Baptist Church in Crystal River, 700 N. Citrus Ave., to benefit the purchase of Bibles, toiletries and items that are given to people in need of clothing, shoes and household items. For more information, call 352-795-7064. Veterans Appreciation Week is Oct. 25 through Nov. 16 in Citrus County to honor our veterans. For a schedule of events, call Chris at 352-7957000 or the Chronicleat 352563-6363. The Freemans Southern Gospel musicians will be in concert at 6 p.m. Sunday, Oct. 26, at Hernando Church of the Nazarene, 2101 N. Florida Ave. Call 352-726-6144.This special column appears the first Tuesday of the month. For a listing of your event, call Ruth Levins at 352-795-3006 by Oct. 15 for the November events listings or write her at P.O. Box 803, Crystal River, FL 34423-0803. Welcome back to busy season in Citrus County Ruth LevinsAROUND THE COMMUNITY Special to the ChronicleThe Friends of the Citrus County Library System (FOCCLS) will offer library lovers a bountiful harvest of books and more in the upcoming mega fall sale. The five-day event runs from Friday, Oct. 10, to Tuesday, Oct. 14, at the Citrus County Auditorium on U.S. 41 South in Inverness, next to the fairgrounds. Sale hours are: 5 to 8 p.m. Friday, $5 donation; 9 a.m. to 4 p.m. Saturday; 1 to 4 Sunday; 10 a.m. to 7 p.m. Monday (halfprice day); and 10 a.m. to 3 p.m. Tuesday ($3 a bag). A special bonus for the sale is the chance to win a new Kindle Fire HDX 7-inch tablet donated by Quest Wealth Management. In addition to ebooks access, the Kindle Fire includes Web browsing, email and calendar support, and gaming, all for a $5 drawing ticket. More than 1,000 banana boxes are brimming with values for readers of all ages and tastes. Books are grouped into more than 45 categories including fiction, crafts and sewing, cooking, childrens lit, classics, gardening, history, large print, psychology, religion, Florida and vintage treasures. In addition to mystery favorites like Janet Evanovich, Tami Hoag, Stephen King, Dean Koontz, James Patterson and John Sandford, the treasure section features works such as Andrew Wyeth: An Illustrated Folio; Jeff Klinkenbergs Seasons of Real Florida; The Romance of Travel by Ronald Pearsall; and Einstein: A Hundred Years of Relativity. Highlight of the sale is an extensive collection of more than 1,000 volumes of military history, half dealing with the Civil War, including books representing each state that fought in the Civil War. History buffs will find Civil War treasures like Picketts Charge: Last Attack by Earl Hess; Citizen Soldier by Stephen Ambrose; Antietam by James McPherson; and Shelby Footes three-volume series Civil War. World War II titles include Achtung Panzer by Gen. Heinz Guderian; Burma by Louis Allen; The Atlantic Campaign by Dan Van der Vat; and books about famous military leaders like Eisenhower, Patton, Rickenbacker, and Chennault. All are in pristine condition with archival book jacket protectors and are just a small sampling from the donated library of Edward Cuneo, a respected collector of military history. The FOCCLS sale is more than just books. Sale shoppers will find great deals in puzzles, games, CDs and DVDs. Organizers suggest the public visit early and often to take advantage of the bargains for personal libraries or holiday gifts. No credit cards, but cash or checks are welcome. Friends of the Citrus County Library System is a nonprofit all-volunteer organization. Proceeds from the Friends semi-annual fundraisers enhance the Citrus County Library system, making possible the purchase of materials and equipment not covered by the library budget. Thanks to the support of book-loving sale patrons, the combined FOCCLS partners have raised more than $825,500 for Citrus County libraries since 2001. For book sale information, call 352-746-1334 or 352-5278405 or visit. After the success of the Citrus Hills Womens Club inaugural effort to collect coats last year, the club is gearing up to once again help those in need in Citrus County. Since we collected more than 1,000 coats last year, we are expanding our efforts to include hats, gloves and mittens, sweatshirts and blankets to help those in need of protection from our winter cold spells. At the Oct. 8 and Nov. 12 luncheon meetings, we will have a huge collection box outside the door to the club. Please check your closets and ask your friends and family to do the same. We need clean, gently worn garments and, of course, will welcome new ones, too. Childrens sizes are particularly needed, so check with your children and grandchildren to see if they would like to donate. Together, we can Keep Citrus Warm. For more information, call Ileen Zavoda at 352-537-3104 or Sheri Tigner at 352-586-2831. The Citrus Hills Womens Club will also hold a Bunco Bash on Thursday, Jan. 19, at the Lions Club in Beverly Hills. Plan on another funfilled evening with cash prizes, raffles and more surprises. Get tickets at the October luncheon or call Kay Stegeman at 352-726-5902 for more information. Spouses and guests are welcome. CH women want to Keep Citrus Warm CITRUS HILLS WOMENS CLUB Special collection headlines annual fall sale for library system Friends Special to the ChronicleFOCCLS volunteers, in their signature yellow shirts, smile in anticipation of the Friends of the Citrus County Library System mega fall book sale. The five-day sale, which promises values in quality books, DVDs, CDs and puzzles, begins Friday, Oct 10. Pictured from left, back row, are: Janeen Caudle, John Bader, Ann Bader, Joan Billison, Joyce Duvall, Sue Haderer, Marge Montana, Marcia Dalkalitsis, Mary Ochs, Mary Ann Lynn, Kit Plourde, Sandy Price, Lynne Boele and Mary Cairns. PAGE 35 TUESDAY, OCTOBER7, 2014 C9CITRUSCOUNTY(FL) CHRONICLEENTERTAINMENT PHILLIPALDER Newspaper Enterprise Assn.Henry Ford said, If everyone is moving forward together, then success takes care of itself. That applies to bridge partners. And for declarer, when the dummy comes down in a suit contract, it is so important that he start moving forward by counting his losers. Assuming his hand has at least as many trumps as the dummy, he looks at his own 13 cards and takes dummys high cards into account. Then, if the loser count is not too high, declarer should draw trumps as quickly as possible. But if the loser count is too high, declarer must work out how to eliminate the excess. In this deal, how many losers does South have in four hearts, given that West leads the club queen? How should he plan the play? The bidding was straightforward, North jumping to game with opening count when he found a 4-4 major-suit fit. South starts with at least five losers: two spades, one heart or two, and two clubs. But he has discards coming on dummys diamonds. Declarer takes the first trick with dummys club ace, plays a diamond to his ace, leads a heart to dummys ace, and shakes his club losers on the diamond king-queen. Then he plays a spade to his ace and leads another spade. Suppose West returns a club. South trumps, ruffs a spade in the dummy, leads a trump to his king, and plays on spades to land an overtrick. West makes his trump winner whenever he likes. Notice the commonplace concepts of discarding losers from hand and ruffing losers in the Legend of The Legend of Live Free or Die PGThe Legend of The Legend of The Legend of The Legend of Live Free or Die Trial by Fire PG The Legend of The Legend of (NICK) 28 36 28 35 25NickyiCarly GThunderMaxNick Full HseFull HseFull HsePrincePrinceFriendsFriends (OWN) 103 62 103 Oprah: Where Now?Loving You Loving You Loving You Loving You Loving You (OXY) 44 123 Magic Mike (2012) R BGC: RedemptionNaild It Nail PrideNaild It Nail PrideBGC: Redemption (SHOW) 340 241 340 4 Double Jeopardy (1999) R Homeland Carrie makes a critical decision. (In Stereo) MA Inside the NFL (N) (In Stereo) PG 60 Minutes Sports (N) Inside the NFL (In Stereo) PG (SPIKE) 37 43 37 27 36Ink Master Pin up Pittfalls Ink Master Head to Headache Ink Master Geishas Gone Wrong Ink Master Glass on Blast Ink Master Cheek to Cheek (N) Tattoo; Miami Tattoo; Miami (STARZ) 370 271 370 Unbreakable (2000) Bruce Willis. PG-13 Bounce (2000, Romance) Gwyneth Paltrow. iTV. (In Stereo) PG-13 Survivors Remorse Ronin (1998, Action) Robert De Niro, Jean Reno. iTV. (In Stereo) R (SUN) 36 31 36 Cllege Football Inside the Heat (N Subject to Blackout) NBA Preseason Basketball Orlando Magic at Miami Heat. From the AmericanAirlines Arena in Miami. Inside the Heat (Subject to Blackout) Inside the HEAT Inside the Heat (SYFY) 31 59 31 26 29Face Off Serpent Soldiers Face Off Scared Silly Face Off Teachers Pets Face Off Off With Their Heads (N) TownLiving TownLiving Face Off Off With Their Heads (TBS) 49 23 49 16 19SeinfeldSeinfeldSeinfeldSeinfeldBig BangBig BangBig BangBig BangBig BangBig BangConan (TCM) 169 53 169 30 35 A Kiss Before Dying (1956, Suspense) Robert Wagner. NR In the Cool of the Day (1963) Jane Fonda. NR Network (1976) Faye Dunaway. A TV station will air almost anything for big ratings. R (TDC) 53 34 53 24 26Yukon Men The Longest Day PG Yukon Men Rising Sons PG Yukon Men: Revealed New Blood Yukon Men (N) (In Stereo) PG Ice Lake Rebels: Deep Freeze (N) PG Yukon Men (In Stereo) PG (TLC) 50 46 50 29 3019 Kids19 Kids19 Kids-Count19 Kids19 Kids19 Kids19 KidsPreaching Alabama19 Kids19 Kids (TMC) 350 261 350 Silver Linings Playbook (2012) Bradley Cooper. (In Stereo) R Sinister (2012, Horror) Ethan Hawke, James Ransone. (In Stereo) R City of God (2002, Crime Drama) Matheus Nachtergaele. R (TNT) 48 33 48 31 34Supernatural (In Stereo) Supernatural (In Stereo) Rizzoli & Isles Just Push Play Rizzoli & Isles Food for Thought Rizzoli & Isles CSI: NY Identity Crisis (TOON) 38 58 38 33 TeenStevenGumballUncle King/HillKing/HillClevelandClevelandAmericanAmericanFam. GuyFam. Guy (TRAV) 9 106 9 44Bizarre FoodsFoodFoodHunt IntlHunt IntlHotel ImpossibleResort Rescue PGManMan(truTV) 25 55 25 98 55Most ShockingMost ShockingJokersJokersJokersJokersCarbonCarbonTowTow (TVL) 32 49 32 34 24HillbilliesHillbilliesHillbilliesHillbilliesFamFeudFamFeudFamFeudSoul ManThe ExesClevelandFriendsFriends (USA) 47 32 47 17 18Law & Order: Special Victims Unit Law & Order: Special Victims Unit Modern Family Modern Family Modern Family Modern Family Modern Family Modern Family Modern Family Modern Family (WE) 117 69 117 Law & Order Hubris Law & Order (In Stereo) Law & Order (In Stereo) Law & Order Teenage Wasteland Law & Order Phobia Law & Order A Losing Season (WGN-A) 18 18 18 18 20Funny Home VideosFunny Home Videos Hulk (2003, Fantasy) Eric Bana, Sam Elliott. PG-13 Manhattan Dear Annie: My daughter is getting a divorce and moving into an apartment that allows her to have two cats. The problem is, she has four cats. She asked whether I would take two of them. I live in another state. It would be difficult to get the cats here, and I dont think I can handle them. The idea of cat hair everywhere, smelly litter boxes, clawed furniture and finding cats in my bed when Im sleeping is just too stressful. And frankly, I dont want to be tied down. My husband and I are retired and travel a lot. How do we tell our daughter that we cant take her cats without causing her grief? I only want to make her happy. Love Cats, But Not Here Dear Love Cats: We know you want to please your daughter, but this request is unfair to you, as well as to the unwanted cats. You have to say no. Does she have any friends in her town who might take one or both of the cats? Is there a no-kill shelter where she could leave them for adoption or an animal rescue that could help find a foster home? Can she find another place to live where there is no restriction on the number of cats or offer her landlord a larger security deposit to cover the extra cats? Please remind yourself that the cats would not be better off with you, and then inform your daughter of your decision. Dear Annie: My father recently passed away. In his will, he left some money to my disabled daughter. My husband and I are her legal guardians and plan to put this money in a special needs trust per my fathers request. My sister feels I should share this money with her and her son, even though Dad left my sister a substantial amount of money. While we control how our daughters money is spent, we dont feel it is ours to give away. But should we give some to my sister to keep the peace? Inheritance Dilemma Dear Inheritance: If the bequest to your daughter was in your fathers will, you probably do not have the legal right to alter the terms. Since your sister has already received a substantial sum from Dads estate, we find it rather greedy that she wants to take money specifically designated for your daughters long-term care. Have the executor of the will (or a lawyer) explain to Sis that this is not possible. If it comes from a professional, it will help. Dear Annie: The letter from In Pain struck a chord with me. He said his wife refuses intimacy and wont discuss it. He says he helps around the house, makes her coffee, takes her out to dinner, sends her flowers and keeps himself in shape. Over the past few years, I have heard the same complaints from my husband. Heres whats going on in our house: My husband works a high-stress job, and even the smallest things set him off. I hear about these things all day long through his text messages, phone calls and in conversation after we both are home from work. What he doesnt realize is that these conversations have an effect on me. After listening to him vent and complain (with anger and swearing), the last thing I want to do at the end of the day is be intimate with him. All I want is a break from the stress that he passes on. I have tried to talk to him about this, but he responds with anger and frustration, and the conversations resolve nothing. I love my husband and have no intention of leaving, but there are limits to what I can tolerate. In Pain should examine whether anything has changed in his behavior. He may be unknowingly pushing his wife away. While spouses should support each other, there are still limits. We shouldnt use our loved ones as emotional dumping grounds. Need My Sanity) STYLE FENCE SPRAIN TRUSTY Yesterdays Jumbles: Answer: The campers are receiving their gifts right now...They are getting PRESENTTENTS Now arrange the circled letters to form the surprise answer, as suggested by the above cartoon.THAT SCRAMBLED WORD GAMEby David L. Hoyt and Jeff Knurek Unscramble these four Jumbles, one letter to each square, to form four ordinary words. PLEEO FUYIN STUMCO ADFAIR Tribune Content Agency, LLC All Rights Reserved. Check out the new, free JUSTJUMBLE app Print answer here: TUESDAY EVENING OCTOBER) (In Stereo) PG Chicago Fire (N) NewsJ. Fallon # (WEDU) PBS 3 3 14 6World News Nightly Business PBS NewsHour (N) (In Stereo) Finding Your RootsHenry Louis Gates Makers Women in Hollywood (N) Frontline Arson conviction. (N) PG Latino Americans PG (DVS) % (WUFT) PBS 5 5 5 41News at 6BusinessPBS NewsHour (N)Finding Your RootsMakers (N) Frontline (N) PGWorldT. Smiley ( (WFLA) NBC 8 8 8 8 8NewsNightly NewsNewsChannel 8Extra (N) PG The Voice The Best of the Blind Auditions A recap of the blind auditions. PG Chicago Fire Just Drive the Truck NewsTonight Show ) (WFTV) ABC 20 20 20 NewsWorld News Jeopardy! (N) G Wheel of Fortune Selfie (N) Manhattan Lov Marvels Agents of S.H.I.E.L.D. (N) PG Forever Memories torment Henry. (N) Eyewit. News Jimmy Kimmel (WTSP) CBS 10 10 10 10 1010 News, 6pm (N) Evening News Wheel of Fortune Jeopardy! (N) G NCIS So It Goes (N) (DVS) NCIS: New Orleans Breaking Brig Person of Interest Wingman (N) 10 News, 11pm (N) Letterman ` (WTVT) FOX 13 13 13 13NewsNewsTMZ (N) PG The Insider (N) Utopia Week Five in Utopia -A (N) New Girl (N) Mindy Project FOX13 10:00 News (N) (In Stereo) NewsAccess Hollywd 4 (WCJB) ABC 11 11 4 NewsABC EntLets AskSelfie (N)ManhatS.H.I.E.L.D. Forever (N) NewsThisMinute Selfie (N) Manhattan Lov Marvels Agents of S.H.I.E.L.D. (N) PG Forever Memories torment Henry. (N): CILaw Order: CICops Rel.Cops Rel.ClevelandCougar H (WACX) TBN 21 21 VarietyThe 700 Club (N) GBabersVarietyP StoneVarietyVarietyStudio Direct HealingPrince L (WTOG) CW 4 4 4 12 12King of Queens King of Queens Mike & Molly Mike & Molly The Flash City of Heroes PG Supernatural Black (In Stereo) Two and Half Men Two and Half Men Friends Friends Donnie Brasco (1997) R The Walking Dead Bloodletting MA The Walking Dead MA The Walking Dead MA 4th and Loud (N) 4th and Loud (ANI) 52 35 52 19 21To Be AnnouncedWild Russia (In Stereo) PG Wild Russia (In Stereo) PG Madagascar Madagascar was left untouched by man. (In Stereo) PG Wild Russia (In Stereo) PG (BET) 96 19 96 The Real (N) (In Stereo) PG Husbands White Chicks (2004) Shawn Wayans. Two male FBI agents pose as female socialites. PG-13 Real Husbands of Hollywood (N) Real Husbands of Hollywood (BRAVO) 254 51 254 Below Deck Below Deck Below Deck Below Deck (N) The Peoples CouchHappensBelow (CC) 27 61 27 33Colbert Report Daily ShowSouth Park Tosh.0 Chappelle Show Tosh.0 Tosh.0 Tosh.0 Tosh.0 (N) Brickleberry (N)Daily ShowColbert Report (CMT) 98 45 98 28 37Reba PG Reba PG Raising Hope Raising Hope Raising Hope Raising Hope The Replacements (2000) Keanu Reeves. Misfit substitutes take the field during a football strike. PG-13 (CNBC) 43 42 43 Mad Money (N)The Profit Shark Tank PGShark Tank PGThe Profit Shark Tank PG (CNN) 40 29 40 41 46SituationCrossfireErin Burnett OutFrontAnderson CooperCNN Special ReportCNN Tonight (N)Anderson Cooper (DISN) 46 40 46 6 5Girl MeetsGirl MeetsJessie G Austin & Ally G My Babysitters a Vampire (2010) NR Star Wars Rebels: Spark of RebellionWolfblood PG My Babysitter My Babysitter (ESPN) 33 27 33 21 17SportsCenter (N) (Live) E:60 (N) 30 for 30 (N) SportsCenter (N) (Live) (ESPN2) 34 28 34 43 49AroundPardonNFL Live (N) NFL RankWorld/Poker World/Poker 30 for 30 (N) (EWTN) 95 70 95 48NewsVisibleDaily Mass G Mother Angelica LiveNewsRosaryThreshold of HopeGrab Women (FAM) 29 52 29 20 28Boy Meet World Ella Enchanted (2004, RomanceComedy) Anne Hathaway. PG Miss Congeniality (2000, Comedy) Sandra Bullock, Michael Caine, Benjamin Bratt. PG-13 The 700 Club (In Stereo) G (FLIX) 118 170 Mad Hot Ballroom (2005, Documentary) Premiere. (In Stereo) PG Three Men and a Baby (1987) Tom Selleck. PG Three Men and a Little Lady (1990) Tom Selleck. (In Stereo) PG The Producers (FNC) 44 37 44 32Special ReportGreta Van SusterenThe OReilly FactorThe Kelly File (N)Hannity (N) The OReilly Factor (FOOD) 26 56 26 Chopped G Chopped G Chopped G Chopped G Chopped G Chopped G (FS1) 732 112 732 To Be AnnouncedFOX Sports Live (N)To Be Announced FOX Sports Live (N) (FSNFL) 35 39 35 UnderGolf LifeNHL Hockey From March 7, 2014. PanthersPanthersTable Tennis World Poker (FX) 30 60 30 51Mike & Molly Mike & Molly Snow White and the Huntsman (2012) Kristen Stewart. A huntsman sent to capture Snow White becomes her ally. PG-13 Sons of Anarchy Violence at the Stockton Ports. MA Sons of Anarchy (GOLF) 727 67 727 CentralPGA TourPlaying LessonsBig Break Big Break Big Break PGA TourLearning (HALL) 59 68 59 45 54The Waltons The Conflict G The Waltons The Conflict G The Waltons The First Day G The Middle PG The Middle PG The Middle PG The Middle PG Golden Girls Golden Girls (HBO) 302 201 302 2 2Real Time, Bill State of Play (In Stereo) PG Fight Game The Hobbit: The Desolation of Smaug (2013, Fantasy) Ian McKellen. (In Stereo) PG-13 Dracula Untold Boardwalk Empire MA (HBO2) 303 202 303 The Negotiator Identity Thief (2013) Jason Bateman. A victim of identity theft fights back. Jerrod Carmichael: Love at the Store Last Week To. Real Time With Bill Maher MA REAL Sports With Bryant Gumbel PG (HGTV) 23 57 23 42 52Flip or Flip or Flip or Flip or Flip or Flip or JennieJennieHuntersHunt IntlFlip or Flip or (HIST) 51 54 51 32 42Modern Marvels (In Stereo) G Pawn Stars PG Pawn Stars PG Pawn Stars PG Pawn Stars PG Top Gear A high speed road trip. PG Counting Cars PG Counting Cars PG Top Gear What Can It Take PG (LIFE) 24 38 24 31Dance Moms Second Solos PG Dance Moms (Part 1 of 2) PG Dance Moms: Abbys Studio Rescue PG Dance Moms (Season Finale) (N) PG Kim of Queens (N) PG Kim of Queens Angie Returns! PG (LMN) 50 119 To Be AnnouncedTo Be AnnouncedIntervention Sandi Intervention Nick Intervention Tiffany Intervention Sarah P. (MAX) 320 221 320 3 3 Girl, Interrupted (1999, Drama) Winona Ryder. (In Stereo) R The Legend of Hercules (2014) Kellan Lutz. (In Stereo) PG-13 The Knick Working Late a Lot MAThe Hobbit: An Unexpected Journey WANT MORE PUZZLES? Look for Sudoku and Wordy Gurdy puzzles in the Classified pages. PAGE 36 CITRUS X OZA AJDDIJVCHC GB HKEDZIDCXVZDB OILHV XV LB RXUH OPI EZJMPE LH ZGIJE SJXHE AEDHVMEP ZVC CXMVXEB. LXYPHRRH IGZLZPrevious Solution: When somebody says The last thing I want to do is hurt you, it means theyve got other things to do first. Mark Schiff (c) 2014 by NEA, Inc., dist. by C10TUESDAY, OCTOBER7, 2014 PAGE 37 HEALTH& LIFECITRUSCOUNTY(FL) CHRONICLETUESDAY, OCTOBER7, 2014 C11 Fax: (352) 563-5665 l Toll Free: (888) 852-2340 l Email: classifieds@chronicleonline.com l website: To place an ad, call563-5966 Chronicle ClassifiedsClassifieds In Print and Online All The Time699186 000JER4 000JER I I I I I I I I Tell that special person Happy Birthday with a classified ad under Happy Notes. Only $28.50 includes a photo Call our Classified Dept for details352-563-5966 I I I I I I I I We are expanding our office and are in need of:F/T ORAL SURGICALASSTSurgical or dental experience required. Benefits include health insurance and retirement pension. Mail Resume to: 6129 W. Corporate Oaks Dr. Crystal River, FL. 34429 Cook/BreakfastExp. Full timeHostess/CashierAJs Cafe 216 NE Hwy 19Crystal River ELECTRICIANSResidential New Construction Exp. preferred. Rough, Trim, Slab,Lintel, Service.Employer Paid Benefits, Holiday & Vacation /EOE APPL Y A T : Exceptional Electric 4042 CR 124A WildwoodWe are expanding are nursing services. Excellent Benefits Apply at: ARBOR TRAIL REHAB 611 Turner Camp Rd, InvernessAn EEO/AA Employer M/F/V/D SERVICE TECH/ DRIVERFor local DME Co. Must have a clean driving record & pass drug screening. CDL a plus. Heavy lifting required. Exp. preferred, but we will train the right person. 344-9637 PREARRANGED INTERNMENT, URNS & NICHES for 2 @ Fountains Memorial Park HALF PRICE $2828 Call 382-5067 OFFICE ASST.Experience Needed APPL Y A T : 4079 S Ohio Ave. Homosassa, 34446 Tell that special person Happy Birthday with a classified ad under Happy Notes. Only $28.50 includes a photo Call our Classified Dept for details352-563-5966 Set of Twin Mattresses and Springs (352) 746-7775 Girls Roadmaster Bike Found Near of Vikre Path on Saturday. (352) 628-6316 YAMAHA2005 650, full dress w/pipes, 8900. miles $3500. obo (352) 860-1106 NaturalSoil Builder Horse Manure You Load. Pine Ridge (352) 270-9372 (352) 613-3205 One free rooster, yellow (buff orpington mix), four months old. 352-419-4652. Two Cats declawed, all shots house cats, they dont go outside, trained, free to good home (352) 208-4062 Todays New Ads CITRUS SPRINGSMOVING SALE 1982 W Gardenia Dr Fri & Sat 9am-4pm FORD 650, 8 YARD 1984 DUMP TRUCKV8, new shocks, carb, rear brakes, starter, radiator, battery, hydrolic dump system -same as 18yd dump truck, 86k miles, very good shape, priced @ $3500. 352-422-3371 FORD 650, 8 YARD 1984 DUMP TRUCKV8, new shocks, carb, rear brakes, starter, radiator, battery, hydrolic dump system -same as 18yd dump truck, 86k miles, very good shape, priced @ $3500. 352-422-3371 Have you seen Louie? Small male cat, grey w/ blk stripes, yellow eyes. By Seven Rivers Hosp. 563-5018/795-7650 Oak Table w/ 2 leaves, 6 chairs, w/ China Hutch $600 Oak Entertainment Center $100 (352) 746-5215 Oldsmobile2001 Maroon Aurora 107k mi. exc. new ac, brakes, & more $5750. aft.6p (352) 637-5525 PREARRANGED INTERNMENT, URNS & NICHES for 2 @ Fountains Memorial Park HALF PRICE $2828 Call 382-5067 SUNLINEoldie but goody! like new, 15 RV, 1750 lbs, fully self contained asking $3500. (352) 726-9647 Todays New Ads 1994 EZ-Go Golf Cart Very good cond w/ charger $1850. (352) 601-2480 Carpentry/Painting 30 years exp. Mobile home repairs. Low hourly rates. 220-4638 Chest Freezergood working condition $160.00 obo (352) 795-0037 Todays New Ads BUICK2000 LeSabre 55k mi, extra clean new tires, $4950. (352) 257-3894 CARGO TRAILER 2012, 5X8, side door bench, diamond plate front & fenders, 15 chrome wheels, round top, $1275. (352) 860-1106 Todays New Ads 2 File Cabinets 4 drawers, wood pecan finish, antique brass handles, $100., Wall Unitcherry finish, 3 shelves full length cabinet 2 sets of drawers $350. 352-795-7424 Hills Golf & Country Club, 509 E. Hartford St., Hernando;, call 352621-1500 for information.. SUPPORTContinued from Page C7 MONTHLY SUPPORT MEETINGS Head and Neck Cancer Discussion Group 9:30a.m. the first Tuesday monthly at the Timber Ridge, Robert Boissoneault Oncology Institute (RBOI) office across from Walmart on State Road 200. This support group formerly met in Lecanto. Anyone interested in sharing successes and challenges in dealing with a head or neck cancer is welcome to attend. Newly treated and veteran survivors join together to inspire and assist others. Groups are free and open to the public. The address is 9401 S.W. State Road 200, Building 800, Ocala. Call Wendy Hall, LCSW and cancer navigator, at 352-861-2400. Karen Barton at 352-279-6904. Sugarmill Women Cancer Survivor Group, 2p.m. the second Friday monthly from September to June at First United Methodist Church, Homosassa, with noon luncheons some months in the community. The December, March and June days are luncheon meetings in the community. Call Pat Schuessler at 352-3820057 or email patschue@aol.com.. Speaker will be Dr. Watts from CMHS, discussing mammograms: 3D Imaging ultra sound vs. MRI.a. National Falls Prevention DayStrong Today, Falls Free Tomorrow National Falls Prevention Day on Sept. 23 at Tuscany on the Meadows inside Quality Inn & Conference Center at Citrus Hills was a success. Sponsored by Nature Coast EMS, Audibel Hearing Centers and Tuscany on the Meadows, the free event featured free health screenings for seniors related to falls and balance and a presentation on the A Matter of Balance program and Nature Coast EMSs Mobile Integrated Health Care Program. Screenings included blood pressure, blood sugar levels, hearing, vision, hypertension, balance and coordination, plus life enrichment planning and support services. Seniors were able to speak to a Brashears pharmacist regarding medication reconciliation and could drop old prescription medicine for safe disposal. Participants were Audibel Hearing Centers, Brashears Pharmacy, Performance by Achievement, West Coast Eye Institute, HPH Hospice, Citrus County Support Services, Citrus Memorial Health System, Mederi Caretenders, the Citrus County Sheriffs Office and Rutabagas Natural Food Market. Community partners were the Citrus County Chronicle, Citrus 95 & The Fox 96.7. If your club or organization would like a presentation on A Matter of Balance, call Katie Lucas at 352-249-4730 or email to katie.lucas@naturecoastems.org. Pictured is Brian Bentley, Mobile Integrated Health Care paramedic with Nature Coast EMS, speaking to those in attendance for the Matter of Balance presentation. Special to the Chronicle PAGE 38 C12TUESDAY,OCTOBER7,2014 CLASSIFIEDS CITRUSCOUNTY( FL ) CHRONICLEFW7 A/C & AIR QUALITYYour Neighborhood Indoor Air Quality SpecialistFall Tune Up Special $ 49 95 Reg. $139.95Guaranteeing 10x Cleaner Air or tune-up is freeIncludes Our Exclusive Laser Particle Scan to determine the quality of the air you breathe in your home. NO OTHER COMPANY OFFERS THIS SERVICE!Expires Oct. 31, 2014Back To NewHeating & Cooling628-5700 newair.biz Since 1997 Exclusive Lic #CAC1815891 000JG0E TREE SERVICE/EXCAVATING Tree Work Trim/Removal Clearing Site Prep Bush Hogging Demolition Debris Removal Rock Driveways Commercial BurningLamar Budd, owner B U D D BUDD E X C A V A T I N G EXCAVATING 352-400-1442 Cabinets & Countertopsto suit your needs. 352-341-5200We squeeze out the competition with our superior quality at an affordable price.000JHDQ CABINETS CitrusCustomCabinets.com Lic. & Insured POOLS AND PAVERS 000JGQF Copes Pool & Pavers YOUR INTERL OCKING BRICK PAVER SPECIALIST More Photos on our Facebook page WEEKLY POOL SERVICE DRYER VENT CLEANING Call1-352-566-6615Dr. Vent1-855-4DR-VENTLocally Owned 15+ Yrs. Lic./ins., BondedFlat Rate No Hidden Costs000JF08 $35DONT LET Y OUR DR YER START A FIRE! PAINTING 352-465-6631 Ferraros PaintingInterior & Exterior PressureWashing FREE ESTIMATES Repaint Specialist000JGHN 000JFCKG65 ELECTRICAL REPAIR 352-621-1248Thomas Electric, LLC Residential/Commercial ServiceGenerac Centurion Guardian Generators Factory Authorized Technicians EC13005525 000JG6O Stand Alone Generator 000JG70! All phases of T ile Handicap Showers, Safety Bars, Flrs. 422-2019 Lic. #2713 TILE INSTALLATION AND REPAIR Showers & Floors CALL352-464-2120 Lawncare -N -More Comm/Res: Lawn hedges & beds, handyman & pressure wash OVER 20 YRS. EXP! **352-726-9570** A1 Floors /walls. Tubs to shower conv. No job too big or small. Ph: 352-613-TILE /lic# 2441 HOME CLEANING reliable & exp. lic/ins needs based, refs Bonded-352-212-6659 NA TURE COAST CLEANING Rate $20. hr. Windows $25hr. No T ime W asted 352-489-2827 Install, restretch, repair Clean, Sales, Vinyl Carpet, Laminent, Lic. #4857 Mitch, 201-2245 #1 A+TECHNOLOGIES All Home Repairs. All TVs Installed lic#5863352-746-3777 RICHARD ST OKES *HOME SERVICES also Vinyl Windows & Rescreening. No Job too Small. 302-6840 **ABOVE ALL** M & W INTERIORS All Home Improvement -N -More Comm/Res: Lawn hedges & beds, handyman & pressure wash OVER 20 YRS. EXP! **352-726-9570** WARD HANDYMAN All Home Rep airs -Pressure Washing -Roof Coating, -Re-screens, Painting Driveway sealcoat Lic & Ins(352)464-3748 Seasoned Oak Fire Wood F ALL SPECIAL $70. 4x7 stack, will deliver (352) 344-2696 OAK FIRE WOOD Seasoned 4x8 stack. Delivered & Stacked $80 (352) 637-6641 SEASONED FIREWOOD Hickory or Hardwood Split & Delivered (352) 464-1894 SMITTYS APPLIANCE REPAIR. Also W anted Dead or Alive W ashers & Dryers. FREE PICK UP! 352-564-8179 TRANSMISSIONS TRANSMISSIONS TRANSMISSIONS Low Cost Repairs Financing Available CONSIGNMENT USA 461-4518, 644 N US19 Carpentry/Painting 30 years exp. Mobile home repairs. Low hourly rates. 220-4638 Airport/Taxi Transportation DAYS Transportation Airports, Ports & Med DaysT ransport ation. com or (352) 613-0078 Your world firstemployment Classifieds ww.chronicleonline.com Need a job or a qualified employee? This areas #1 employment source! 000JERB Green Sofa Like New $100 (352) 746-5215 Living Room Suite sofa, loveseat, end & coffee table & lamp oak w/claw feet all all, like new $850. (352) 860-2792 Dresser $10 Call for details. 352-419-4464 GLASS PUB TABLE 36 Glass top and has a metal base. Comes w/ 2 cushioned chairs. Excellent condition. $100. 352-697-0180 CHINACABINET Large,very good cond.3 shelve display area. 3 draws,2 side doors w/shelves.$150 obo 954-825-3949 COUCH & RECLINER Pale Green Couch 78; LG-Terra Cotta Recliner $100. 352-419-4581 CRAFTSMAN Radial Arm Saw 10 Call before 6pm $325. (352) 628-5638 LITTLE GIANT LADDER -10103 Type 1AModel 22. Like New, Will deliver local. $215. cash only 240-461-6943 TABLE SAW Craftsman 10 blade. Very good condition. $65. 352-746-1017 Celestion Speakers model DL4 $10 352-419-4464 Jensen Speakers model J4 $15 352-419-4464 SPEAKER BOX Loaded with two (2) 12 inch speakers $20 352-419-4464 SPEAKER BOX Loaded with two (2) 12-inch speakers. $20 352-419-4464 VCR ZENITH Works Perfect. Excellent shape. Includes remote and VHS movies $15. 352-621-0175 KIDS DVDS 40 like new with cases. $80.00 call 628-4271 NINTENDO DS LITE White, like new cond. Only played few times. No charger. $40. Call 352-628-4271 4 Poster Bedroom Set full sz bed, dresser mirror, chest of drawers, desk & Hutch $500. (352) 201-1219 BEDROOM FURNITURE & MATTRESS SET Full mattress, box springs, headboard, dresser w/ mirror & end table. Color driftwood. $350. 352-382-3159 SMITTYS APPLIANCE REPAIR. Also W anted Dead or Alive W ashers & Dryers. FREE PICK UP! 352-564-8179 2 File Cabinets 4 drawers, wood pecan finish, antique brass handles, $100., Wall Unitcherry finish 3 shelves full length cabinet 2 sets of drawers $350. 352-795-7424 Desk Chair, Large, $40. (352) 795-7424 Well Established and HIGHLY profitable franchise retail store in Crystal River. Call Pat for details at 1813-230-7177 DESK SMALLTelephone Solid dark wood one shelf 22L16W 27H EXCELLENT$50. 352-621-0175 COOKIE JAR Little Red Riding Hood Cookie Jar 967 Hull Ware $100 631-353-1731 DISNEYTEAPOT Mickey and the Beanstalk tea pot $50., 631-353-1731 HOMER LAUGHLIN DISHES Svce/4+.Soup bowls,sugar bowl. Eggshell Georgian pattern. $25.00 352-422-1309 PRECIOUS MOMENTS Set of 4 Precious Moments cookie jars. $50. Call 628-4271 APPLIANCES like new washers/dryers, stoves, fridges 30 day warranty trade-ins, 352-302-3030 Chest Freezergood working condition $160.00 obo (352) 795-0037 FABERWARE Convection/Toaster Oven/Rotisserie. Big enough to hold pizza or casserole disehes. 1y/o. $25.352-697-0180 Kitchen Appliance Set GE, Almond, S-by-S Refrig w/ ice/water Range glass top, and Diswasher. May Divide $600; 352-601-3728 MEDICALBILLING TRAINEES NEEDED! Become a Medical Office Assistant. NO EXPERIENCE NEEDED! Online training can get you job ready! HS Diploma/GED & PC/Internet needed 1888 EXP. PLUMBERSWANTEDBENEFITS. Must Have Drivers Lic., Apply At: 4079 S Ohio Ave Homosass Skyview Restaurant at Citrus Hills Is Seeking Exp. Part TimeServers and Hostesses.Call 746-6727 Tues-Sat from 2:00-4:30pm for application/appoint AIRLINE CAREERS START HERE-Get FAAapproved Aviation Maintenance Technician training. Housing and Financial aid for qualified students. Job placement assistance. Call AIM 866-314-3769 Driver Trainees Needed NOW!Become a driver for Werner Enterprises. Earn $800 per week! Local CDLTraining. 1-877-214-3624 Exp. Laminator, Fabricator, Installerapply at: Built-Rite Cabinets 438 E. Hwy 40, Inglis HVAC Service TechMinimum 5 yrs. Exp. references, clean DL, honest, drug-free ALPHAAIR (352) 726-2202 PAGE 39 TUESDAY,OCTOBER7,2014 C 13 CITRUS COUNTY (FL) CHRONICLE CLASSIFIEDS 000JER8. $375,000 (352) 563-9857 Your High-Tech Citrus County RealtorROD KENNER352-436-3531 ERA Suncoast Realty SCAN OR GO TO www. BestNatur eCoast Pr operties.com To view my properties $0 DOWN, 0% INTEREST $19,900. Corner Lot 1868 Allegrie,in Citrus Hills Cambridge Greens rudydelv@yahoo.com (908) 310-3448 Cell LaWanda WattNOW IS AGREAT TIME TO LIST YOUR HOME! CALLLAWANDA FOR AFREE, NO OBLIGATION MARKET ANALYSIS! 352 212 1989 lawanda.watt@ century21.com Century 21 J.W. Morton Real Estate, Inc. MICHELE ROSERealtor Simply By Owner 4 bd/2 cg, newer roof/ac, private, end of cul de sac, $125k (352) 563-9857 Buying or Selling REALESTATE, Let Me Work For You!BETTYHUNTREALTORERA KEY 1 Realty, Inc. 352 586-0139hunt4houses68 @yahoo.com homes.com. OWNER SALE 4 Bed/2 Bath w/ pool, Approx. 2400 Ft, Kick out Garage, Alarm, furn avail $187,500 OBO(352) 382-5298 RealtorYour Success is my goal.. Making Friends along the way is my reward !BUYING OR SELLING CALL ME 352-422-6417bjpowell@ netscape.com ERA American Realty & Investments Specializing in Acreage,Farms Ranches & Commercial Richard (Rick) Couch, Broker Couch Realty & Investments, Inc. (352) 212-3559 RCOUCH.com Sugarmill Woods Villa 2/2/2 new flooring, screened porch backs up to deep green belt. $70K 352-382-5971 UNIQUE & HISTORIC Homes, Commercial Waterfront & Land Small Town Country Lifestyle OUR SPECIALTY SINCE 1989LET US FIND YOUAVIEW TO LOVEwww. crosslandrealty.com(352) 726-6644Crossland Realty Inc.!!! FLORAL CITYLAKEFRONT 1 Bedrm. AC, Clean, No Pets (352) 344-1025 CRYSTAL RIVER1/1, All Utilities Incl,d. $600. mo. + Sec., 352-634-5499 INVERNESS2/1 or 1/1 near CM Hospital $525 or $475 incld water/garb 352-422-2393 CITRUS HILLS2/2, Furnished, Starting @ $800. seasonal or Lng term 352-527-8002 or 352-476-4242 HERNANDOWATSONs Fish Camp 55+ Rental Community (352) 726-2225 LECANTOCottage 1/1 $525 incls. pwer /water, Dirt Road (352) 220-2958 **INVERNESS**Golf & Country loc. 3/2/2 Spacious pool home $850. ( 908) 322-6529 At SM WOODSDeluxe Cottage 3/2/2, FP, Ht. Pool, Maint. Free, Sm. Pet $1,100 mo, 422-1933 Beverly Hills2/1,w/Florida room MOVE IN JUST $1350 (352)422-7794 HERNANDOWatsons Fish Camp 55+ Rental Community (352) 726-2225. BRING YOUR FISHING POLE! INVERNESS, FL55+ park on lake w/5 piers, clubhouse and much more! Rent incl. grass cutting and your water 1 bedroom, 1 bath $450. 2 bedroom, 1 bath $475. Pets considered and section 8 is accepted. Call 800-747-4283 For Details! Available 800-622-2832 *See habla espanol Amenities/Low Rent New Homes A vailable Call JIm(352) 628-2090 CRYSTAL RIVERFully Furnished Studio Efficiency w/ equipped kit. All util., cable, Internet, & cleaning provided. $649.mo 352-586-1813 SADDLE BAGS Large for rear bicycle. Never used. $15. 352 746-1017 Walter Hagin Mens Golf Clubs, 18 pc. T3, All graphite, w/ bag & covers, never used. $180. Ladies golf clubs 14 pc. w/ bag & covers $30. 352-382-3202 CARGO TRAILER 2012, 5X8, side door bench, diamond plate front & fenders, 15 chrome wheels, round top, $1275. Ave. Dunnellon, Fl. AKC LABRADOR PUPPIES Beautiful Lab Puppies born Aug. CROCKPOT Rival, harvest green, good shape, $5 352-613-7493 I WANT TO BUY A HOUSE or MOBILE Any Area, Condition, Situation. 726-9369 MOTORCYCLE ITEMS Helmet, $25; Boots, Size 10, $25. (352) 382-0069 MOTORCYCLE ITEMS Honda Mufflers, Alert for Seniors.Bathroom falls can be fatal. Approved by Arthritis Foundation. Therapeutic Jets. Less Than 4 Inch Step-In. Wide Door. Anti-Slip Floors. American Made. Installation Included. Call 1-800-605-6035 for $750 Off. SEWING ITEMS Accuquilt Go! 13 cutting dies extra mats and 5 patterns $300. Many more sewing items and machine. Call Sue at 352 419 6354 Stove, white, glasstop w/ convection oven $250 Microwave, over stove, white $75. 352-513-5400 TWEEN CDS 17 cds.ex Radio Disney. $25.00 Call 628-4271 Wii console w/ sportsboard $100 OBO; French Provincial China Cabinet $100 OBO (352) 795-4892 4 WHEELED WALKER with seat and brakes Good shape, only $65. 352 464 0316 4 TOILET SEAT RISER Makes it much easier to get up. $20. 352-464 0316 SHOWER CHAIR & BEDSIDE COMMODE Adjustable legs. $20. each 352-464-0316 Transport Wheelchair (Small Wheels) No footrests,Very Light. $40. 352 464 0316 ACOUSTIC GUITAR Crafter, model D-18 $85 352-419-4464 EQUALIZER PeaveyPV215EQ, New, stereo 15 band, rack mount, $40 352-212-1596 Fender Frontman 15 watt guitar amp $25 352-419-4464 MONITORS TOA #SL-12m, 12, good shape, both for $50 352-212-1596 PUBLIC ADDRESS SPEAKERS (2) 10 Radioshack #40-210, pole mount, good cond. $40 352-212-1596 SPEAKER STANDS Quiklok, heavy-duty, great shape, $40 352-212-1596 TROMBONE with case. Good cond. Great for school band $50. call 628-4271 PIE/CAKE MAKER Wolfgang Puck Electric. Incl cookbook NEW Cost $125. Sell $25. 352-621-0175 Electric Treadmill Spacesaver (folds up) ALLELECTRONIC Only $100. 464 0316 ELLIPTICAL Excercise machine, all electronic. T ime T o Get Fit! $100. 352 464 0316 Exercise Schwinn Bike, with 6 programs, like new org. cost $400. asking $175. Call Walter (352) 527-3552 MANUALTREADMILL WORKS GREAT! $75.00 352 464 0316 1994 EZ-Go Golf Cart Very good cond w/ charger $1850. (352) 601-2480 BICYCLE LOCK New Brinks adjustable shackle solid brass 2x 6 all purpose $10. Dunnellon 352.465.8495 BICYCLE Mens 26 Raleigh 18 speed bicycle, good condition, $45. Call Gene 352 746-1017 BICYCLE RACKS 1 1/4 receiver hitches 3-bike & 2-bike Heavy Duty $25. ea. Dunnellon 352.465.8495 Chrome Golf Cart Hub caps $40.00 (352) 601-2480 Club Car 2008 Super Clean Golf Cart, Two-Tone Seats. Charger Included. $3,800. Call Love Motorsports @ 352-621-3678 LEFT HANDED HUNTING BOWS Hoyt, w/ arrows & case $400. Blue Mountain; Grey Wolf w/ arrows & case $450. (352) 527-8713 MENS BIKE 6 speed 26 Huffy Beach bike w/ baskets. In good condition. $50. 352-746-1017 Kitchen Table $10 Call for details. 352-419-4464 Mattr ess Liquidation 50% -80% OFF RETAIL WHY PAY MORE? (352) 484-4772 Oak Table w/ 2 leaves, 6 chairs, w/ China Hutch $600 Oak Entertainment Center $100 (352) 746-5215 ROCKING CHAIRS (2) Plush, rust brown in color, great shape, no holes or stains. $40 352-613-7493 SOFABED Queen Size, Good Condition! $99 (352) 628-5107 SOLID OAK SMALL COMPUTER DESK with pull out shelf & drawer $75.00 OBO 352-527-1399 SOLID TEAK dining room set, 6 chairs, 2 leafs, EXQUISITE $1,000 (352) 726-4043 THOMASVILLE Couch Exc.Cond; LARGE RECLINER. $100 for both 352-746-4160 2013 Husqvarna Riding Lawn Mower 24HP, 48 cut $1350. (352) 513-5436 24 HEDGE TRIMMER (ELEC) Black & Decker Excellent condition $35.00 352-746-4160 Bobs Discarded Lawn Mower Service Free Pick-up. (352) 637-1225 DANCE CLOTHES 23 pieces. Shorts, skirts & leotards. Childrens size medium. $50. Call 352-628-4271 KIDS SNEAKERS Size 7 used.12 pairs. $20. call 352-628-4271 SQUARE DANCE CLOTHES 20+ outfits in all colors. Size Sm. Slips to match. $100 Ruth 352-382-1000 2 DESIGNER HANDBAGS Like new! $15-$35 Cash Only 352-476-7516 5 DESIGNER WRISTLETS Like New, $10 each Cash Only 352-476-7516 12x10TENT Quickset dome, Ozark Trail, new $30 352-212-1596 CAR COVER Medium size/Chevy Malibu Breathable fabric $20. 352 464 0316 CHARCOALGRILL Large Kingsford charcoal grill w/ wheels, good condition. $45. 352-746-1017 CRAFTSMAN GAS BLOWER needs carb work. Has manual $20.00 352-746-4160 CRIB MATTRESS good condition. Asking $25. Phone 527-3177 Custom Made Morton Rug Hooking Frame exc. cond. includes stand & lap frame attachment $150. bo(352) 527-1100 DECORATIVE BATHROOM SET 4 peice, ivory-stainless steel, good shape, $20 352-613-7493 DEHUMIDIFIER 2008 Energy Star, 45 pint,cost $215. Sell for $50. Firm price 352-382-0079 Double Book Case $100 Home Made Quilt Tops 6 for $100. (352) 795-7254 PAGE 40 C14TUESDAY,OCTOBER7,2014 CLASSIFIEDS CITRUSCOUNTY( FL ) CHRONICLE 520-1007 TUCRN Schedule of Meetings PUBLIC NOTICE Southwest Florida Water Management District Schedule of Meetings Fiscal Year 2014-15 Governing Board -All meetings will begin at 9:00 a.m., excluding the October Board meeting October 28, 2014 (The Villages Savannah Center) 10:00 a.m. start time November 18, 2014 (Tampa Service Office) December 16, 2014 (Tampa Service Office) January 27, 2015 (Tampa Service Office) February 24, 2015 (Sarasota Service Office) March 24, 2015 (District Headquarters) April 28, 2015 (Lake Eva Banquet Hall, Haines City) May 19, 2015 (Tampa Service Office) June 23, 2015 (District Headquarters) July 20, 2015 (Tampa Service Office) August 25, 2015 (Tampa Service Office) September 29, 2015 (Tampa Service Office) Governing Board Public Budget Hearings -6:00 p.m., Tampa Service Office September 15 & 29, 2015 Public Meeting for Pending Permit Applications -9:00 a.m., Tampa Service Office 2014 -October 1; November 5; December 3 2015 -January 7; February 4; March 4; April 1; May 6; June 3; July 1; August 5; September 2 Environmental Resource Permitting Advisory Group -10:00 a.m., and Water Use Permitting Advisory Group -2:00 p.m., Tampa Service Office 2014 -November 19 2015 -March 25; July 22 Agricultural & Green Industry Advisory Committee -9:00 a.m., Tampa Service Office 2014 -December 4 2015 -March 12; June 11; September 10 Environmental Advisory Committee -1:30 p.m., Tampa Service Office 2014 -October 21 2015 -January 13; April 14; July 14 Industrial & Public Supply Advisory Committee -1:00 p.m., Tampa Service Office 2014 -November 13 2015 -February 10; May 12; August 11 Springs Coast Steering Committee, 2:00 p.m. Location to be Determined 2014 -November 5 2015 -February 4; May 6; August 5 Springs Coast Management Committee -2:00 p.m. Brooksville District Headquarters 2014 -October 22; December 10 2015 -February 11; April 8; June 10; August 12 Well Drillers Advisory Committee -1:30 p.m., Tampa Service Office 2014 -October 29 2015 -January 14; April 8; July 8 Citrus County Task Force -All meetings will begin at 2:00 p.m., excluding the October meeting 2014 -October 20 Brooksville District Headquarters -1:00 p.m. Start time 2015 -January 12; March 9, April 13; May 11; July 13, September 14 Lecanto Government Building Hernando County Task Force -3:30 p.m., Brooksville District Headquarters 2015-January 5; March 2; April 6; June 1; September 8 Citrus/Hernando Waterways Restoration Council -3:00 p.m. Brooksville District Headquarters 2014 -October 20 Meeting Locations Brooksville Headquarters -2379 Broad Street, Brooksville 34604-6899 Sarasota Service Office -6750 Fruitville Road, Sarasota 34240-9711 Tampa Service Office -7601 US Highway 301 North, Tampa 33637-6759 Lake Eva Banquet Hall -799 Johns Avenue, Haines City 33844 Lecanto Government Building -3600 West Sovereign Path, Lecanto 34461-7727 Springs Coast Environmental Center -9170 Cortez Boulevard, Weeki Wachee 34613 The Villages Savannah Center -1545 Buena Vista Boulevard, The Villages 32162 Published October 7, 2014 EXE-0355 516-1014 TUCRN Dobbs, Sara T. 2014-CP-415 Notice to Creditors PUBLIC NOTICE IN THE CIRCUIT COURT FOR CITRUS COUNTY, FLORIDA PROBATE DIVISION File No. 2014-CP-415 IN RE: SARA T. DOBBS Deceased. NOTICE TO CREDITORS The administration of the estate of Sara T. Dobbs, deceased, whose date of death was April 12,/ Clyde Stanifer Post Office Box 113 Jefferson, Georgia 30549 Attorney for Personal Representative: /s/ John A. Nelson Florida Bar Number: 0727032 Slaymaker and Nelson, P.A. 2218 Highway 44 West Inverness, Florida 34453 Telephone: (352) 726-6129 Fax: (352) 726-0223 E-Mail: john@slaymakerlaw.com Secondary E-Mail: deanna@slaymakerlaw.com Published October 7 & 14, 2014 517-1014 TUCRN McSherry, Mary L. 2014-CP-325 Notice to Creditors PUBLIC NOTICE IN THE CIRCUIT COURT FOR CITRUS COUNTY, FLORIDA PROBATE DIVISION File No. 2014-CP-325 IN RE: MARY LOU MCSHERRY Deceased. NOTICE TO CREDITORS The administration of the estate of Mary Lou McSherry, deceased, whose date of death was March 13,/ Roland McSherry, Jr. 1330 Briargate Drive York, Pennsylvania 17404 Attorney for Personal Representative: /s/ John A. Nelson Florida Bar Number: 0727032 Slaymaker and Nelson, P.A. 2218 Highway 44 West Inverness, Florida 34453 Telephone: (352) 726-6129 Fax: (352) 726-0223 EMail: john@slaymakerlaw.com Secondary E-Mail: deanna@slaymakerlaw.com Published October 7 & 14, 2014 518-1014 TUCRN Self Storage Lien Sale on October 23, 2014 at 9:00 AM on the premises where said property has been stored and which is located at: StoreRight Self Storage, 1227 S. Lecanto Hwy., Lecanto, Florida, 34461 the following: Elizabeth Wing Unit A027 Household Goods Tanu O. Thomas Unit A087 Boxes of Papers, Books Tracy Stanton, Unit C022 Household Goods Peter Celli, Unit C041 Household Goods Elizabeth Ann Christopher, Unit C040 Household Goods Stephanie Billick, Unit D022 Household Goods Christopher Cassidy Unit D038 Household Goods John Holland, Unit E036 Oct 7 & 14, 2014 514-1007 TUCRN Bledsoe, Cecelia T. 2014-CP-491 NTC PUBLIC NOTICE IN THE CIRCUIT COURT FOR THE FIFTH JUDICIAL CIRCUIT IN AND FOR CITRUS COUNTY, FLORIDA PROBATE DIVISION File No.: 2014-CP-491 IN RE: ESTATE OF CECELIA T. BLEDSOE, Deceased. NOTICE TO CREDITORS The administration of the estate of CECELIA T. BLEDSOE, deceased, whose date of death was June 1, 2014, is pending in the Circuit Court for CITRUS County, Florida, Probate Division, the address of which is 110 N. Apopka Ave., 30, 2014. Personal Representative: /s/ CRAIG BLEDSOE 10575 W. Bresler Ct. Homosassa, Florida 34448 Attorney for personal representative: /s/ ROBERT S. CHRISTENSEN, ESQ. Florida Bar No. 0075272 Attorney for the estate PO Box 415 Homosassa Springs, Florida 34447 Telephone (352) 382-7934 Fax (352) 382-7936 Email: christensenlaw@earthlink.net Published September 30th and October 6, 2014 000JHOO FORD2007 F-150 XL White, 6ft bed Really Good condition. $5900 OBO (917) 733-3644 FORD 650, 8 YARD 1984 DUMP TRUCKV8, new shocks, carb, rear brakes, starter, radiator, battery, hydrolic dump system -same as 18yd dump truck, 86k miles, very good shape, priced @ $3500. 352-422-3371 MITSUBISHI1989 Montero 4x4 with a Brand new motor. Priced for quick sale. $2900 OBO (917) 733-3644 NISSAN, Frontier, auto., all pwr, loaded, king cab 56k org. miles, good cond. $11,000 obo (352) 746-6397, or 726-6362 after 1pm BUICK2005, Rendezvous $5,995. 352-341-0018 CHEVY2000, Blazer, 2 Door $2,995. 352-341-0018 &twin,100 cubic inch. 5-speed transmission $7,400. Call Love Motorsports @ 352-621-3678 YAMAHA2005 650, full dress w/pipes, 8900. miles $3500. obo (352) 860-1 106 BUYING JUNK CARS Running or Not CASH PAID-$300 & UP (352) 771-6191 BUICK2000 LeSabre 55k mi, extra clean new tires, $4950. (352) 257-3894 Oldsmobile2001 Maroon Aurora 107k mi. exc. new ac, brakes, & more $5750. aft.6p (352) 637-5525 SELL YOUR VEHICLE IN THEClassifieds**3 SPECIALS ** 7 days $26.50 14 days $38.50 30 Days $58.50 Call your Classified representative for details. 352-563-5966 Freedom Hawk14 ft. KAYAK, stand up fishing model or regular Kayak, brand new 3 yrs. ago, Pd. $1,900 make offer (352) 726-1040 ** BUY, SELL** & TRADE CLEAN USED BOATS THREE RIVERS MARINE US 19 Crystal River **352-563-5510** 20 ft Pontoon Boat 40HP, TNT, Great fishing boat excellent condition, Lots of extras! $4650 OBO call after 11am 352-489-3914 Aluminum Boat16ft, Wide body, good condition. With Title. $500 (678) 617-5560 CENTURY186CC1995 Center Console 186 Nice 18-6 Center Console w/Tow Master trailer. 115 HPYamaha 2 cycle. Lots of extras. Priced right at $ 5995.00 Call Rick at 352-445-1573 SUNLINEoldie but goody! like new, 15 RV, 1750 lbs, fully self contained asking $3500. (352) 726-9647 WE BUYRVS, TRUCKS, TRAILERS, 5TH WHEELS, & MOTOR HOMES Call US 352-201-6945 T AURUS MET AL Recycling Best Prices for your cars or trucks also biggest U-Pull-It thousands of vehicles offering lowest price for parts 352-637-2100 PAGE 41 CITRUSCOUNTY(FL) CHRONICLETUESDAY, OCTOBER7, 2014 C15 $ 24,500 $ 21,800 $ 18,700 0 % APR 60 mos* T141280 000JGUI NO WEASELS HERE 2014 COROLLAs 2014.5 CAMRYs 2014 PRIUSs 2014 RAV4s 2014 TUNDRAs OR LEASE A NEW 2014.5 CAMRY SE $ 189 per month for 36 months* OR LEASE A NEW 2014 PRIUS $ 239 per month for 36 months* OR LEASE A NEW 2015 COROLLA $ 179 per month for 36 months* OR LEASE A NEW 2014 RAV4 XLE $ 239 per month for 36 months* 0 % APR 72 mos* 0 % APR 60 mos* 0 % APR 36 mos* T141342 T141461 T141450 OWN IT FOR OWN IT FOR VILLAGE TOYOTA SALE DAYS! VILLAGE TOYOTA 2431 S. Suncoast Blvd., Homosassa 352-628-5100 Of CRYSTAL RIVER Delivering Delivering Quality Cars, Quality Cars, Preserving Preserving Quality Quality Standards Standards $ 15,900 OWN IT FOR $ 21,800 OWN IT FOR NO WEASELS HERE! NO WEASELS HERE! 0 % APR 60 mos* NO WEASELS HERE! PAGE 42 C16TUESDAY, OCTOBER7, 2014CITRUSCOUNTY(FL) CHRONICLE 000JGV7 PAGE 43 CITRUSCOUNTY(FL) CHRONICLETUESDAY, OCTOBER7, 2014 C17 000JGV5 PAGE 44 C18TUESDAY, OCTOBER7, 2014CITRUSCOUNTY(FL) CHRONICLE ^PRICE INCLUDES ANN REBATES AND INCENTIVES, NOT EVERYONE WILL QUALIFY. MUST QUALIFY FOR FINANCING W ITH NMAC. EXCLUDES TAX, TAG, TITLE AND DEALER FEE $599.50 *LEASE IS 39 MONTHS / 39,000 MILES 15 CENTS PER MILE OVER. INCLUDES ALL REBATES AND INCENTIVES, NOT EVERYONE WILL QUALIFY. SELLING PRICE/ RESIDUAL ALTIMA $19,548/$13,802; FRONTIER$19,458/$14,056. MUST QUALIFY FOR FINANCING WITH NMAC. EXCLUDES TAX, TAG, TITLE AND DEALER FEE $599.50. ALL OFFERS ARE WITH APPROVED CREDIT AND CAN NOT BE COMBINED. PICTURES ARE FOR ILLUSTRATION PURPOSES ONLY. SEE DEALER FOR COMPLETE DETAILS. CHOOSE A 2015 AT CRYSTAL NISSAN 000JGWX 2015 NISSAN FRONTIER S NO MONEY DOWN 2 OR MORE AVAILABLE AT THIS PRICE MODEL #32115 VIN #704305 $ 19,458 ^ $ 289 mo. BUY FOR LEASE FOR 2015 NISSAN ALTIMA 2.5 S NO MONEY DOWN 2 OR MORE AVAILABLE AT THIS PRICE MODEL #13115 VIN #321182 $ 17,748 ^ $ 229 mo. BUY FOR LEASE FOR YOU CHOOSE YOU CHOOSE
http://ufdc.ufl.edu/UF00028315/03623
CC-MAIN-2017-22
refinedweb
49,129
64.71
Chatlog 2011-03-29 From SPARQL Working Group See original RRSAgent log and preview nicely formatted version. Please justify/explain all edits to this page, in your "edit summary" text. 13:57:43 <RRSAgent> RRSAgent has joined #sparql 13:57:43 <RRSAgent> logging to 13:57:45 <trackbot> RRSAgent, make logs world 13:57:45 <Zakim> Zakim has joined #sparql 13:57:47 <trackbot> Zakim, this will be 77277 13:57:47 <Zakim> ok, trackbot; I see SW_(SPARQL)10:00AM scheduled to start in 3 minutes 13:57:48 <trackbot> Meeting: SPARQL Working Group Teleconference 13:57:48 <trackbot> Date: 29 March 2011 13:57:48 <LeeF> zakim, this will be SPARQL 13:57:48 <Zakim> ok, LeeF; I see SW_(SPARQL)10:00AM scheduled to start in 3 minutes 13:58:20 <LeeF> Regrets: Chime, NickH, sandro 13:58:23 <LeeF> Chair: LeeF 13:58:27 <bglimm> bglimm has joined #sparql 13:58:41 <LeeF> Agenda: 13:58:54 <Zakim> SW_(SPARQL)10:00AM has now started 13:58:56 <Zakim> +AxelPolleres 13:59:06 <Zakim> +[IPcaller] 13:59:08 <Zakim> +??P13 13:59:09 <Zakim> -??P13 13:59:09 <Zakim> +??P13 13:59:13 <cbuilara> zakim, IPcaller is me 13:59:13 <Zakim> +cbuilara; got it 13:59:31 <MattPerry> MattPerry has joined #sparql 13:59:43 <Zakim> +bglimm 13:59:45 <Zakim> +LeeF 13:59:46 <kasei> Zakim, ??P13 is me 13:59:46 <Zakim> +kasei; got it 13:59:52 <Zakim> +OlivierCorby 14:00:08 <SteveH__> SteveH__ has joined #sparql 14:00:10 <LeeF> scribenick: bglimm 14:00:28 <Zakim> +MattPerry 14:00:50 <Zakim> +??P21 14:00:58 <SteveH__> Zakim, ??P21 is me 14:00:58 <Zakim> +SteveH__; got it 14:01:06 <LeeF> zakim, who's on the phone? 14:01:06 <Zakim> On the phone I see AxelPolleres, kasei, cbuilara, bglimm, LeeF, OlivierCorby, MattPerry, SteveH__ 14:01:56 <apassant> apassant has joined #sparql 14:02:35 <LeeF> topic: Admin 14:02:39 <LeeF> PROPOSED: Approve minutes at 14:02:41 <bglimm> Topic: Admin 14:02:53 <Zakim> +pgearon 14:03:00 <Zakim> + +539149aaaa 14:03:12 <apassant> Zakim, +539149aaaa is me 14:03:12 <Zakim> +apassant; got it 14:03:21 <LeeF> RESOLVED: Approve minutes at 14:03:26 <Zakim> +??P26 14:03:29 <LeeF> Next regular meeting: 2011-04-05 @ 15:00 UK / 10:00 EST (scribe: Axel or Alex) 14:03:30 <AndyS> zakim, ??P26 is me 14:03:30 <Zakim> +AndyS; got it 14:04:17 <Souri> Souri has joined #sparql 14:04:27 <AxelPolleres> comments page should be up-to-date 14:04:34 <bglimm> LeeF: We have some comments, mostly under control 14:04:39 <LeeF> 14:04:47 <AxelPolleres> some are unasigned, still 14:05:03 <bglimm> ... maybe spend some tome on not in, in 14:05:13 <Zakim> +Souri_ 14:05:55 <bglimm> .... SPARQL implementations currently have no understanding of datatypes, which can result in unintuitive results for comparissons 14:06:34 <bglimm> ... should SPARQL prescribe some understanding for core datatypes in comparrisson operators 14:06:45 <bglimm> ... Andy, Steve, should we look into that? 14:07:07 <bglimm> SteveH: Seems like an improvement, but not full understanding 14:08:13 <bglimm> AndyS: The comment is related to 1.0 stuff and not specific to 1.1 14:08:33 <AndyS> It will change a basic, unextended SPARQL 1.0 query processor. (we should have done it last time but that makes it a change) 14:08:45 <bglimm> LeeF: Not much enthusiasm for this topic, so lets not spend too much time on it 14:09:08 <bglimm> AxelPolleres: We are mostly up-to-date 14:09:15 <SteveH> would be it be sufficient to recommend that SPARQL 1.1 processors should handle all the datatypes so that... 14:09:16 <LeeF> 14:09:17 <AndyS> While sensible, it's technically a change. Not sure if its in the 1.0 test suite or not. 14:09:25 <SteveH> SHOULD or something 14:09:26 <bglimm> ... regarding the comments 14:10:38 <LeeF> topic: Last Call Status 14:10:49 <LeeF> 14:11:14 <bglimm> LeeF: Lets go through the documents and editors correct me if I am wrong with something 14:11:34 <bglimm> ... Query has still some editorial comments and aggregates algebra section 14:11:51 <bglimm> ... has still some things that can be improved 14:12:03 <bglimm> SteveH: Not much knew from me 14:12:24 <bglimm> AndyS: I did some changes for RDF merge and wait for Axel's second part of the review 14:12:46 <bglimm> LeeF: If I had some time, shoud I rather work on the protocoll or review query? 14:13:10 <bglimm> AndyS: We had already three reviews, so I think protocol is more important to get done 14:13:21 <Zakim> -AndyS 14:13:21 <bglimm> SteveH: Same from my side 14:13:51 <Zakim> +[IPcaller] 14:13:55 <AndyS> zakim, IPcaller is me 14:13:55 <Zakim> +AndyS; got it 14:14:00 <kasei> was I meant to start that review yet? I thought I was waiting on somebody to ping me on that? 14:14:05 <bglimm> LeeF: Update had some work done regarding Axel's review, Andy's review is still to be addressed 14:14:31 <LeeF> kasei, ah, i did not realize that 14:14:52 <bglimm> AxelPolleres: There is nothing that cannot be resolved by us. Andy suggested some restructuring to make the distinction between the formal and informal part 14:15:01 <bglimm> ... that has not been done yet 14:15:31 <NicoM> NicoM has joined #sparql 14:15:34 <bglimm> .... I'll sync up with Paul and Alex for that. We are not too far from LC 14:15:45 <bglimm> LeeF: I think Greg can go ahead with his review 14:16:35 <bglimm> Axel: I worked in parallel to Axel, so now we have to resolve CVS conflicts and get an overview again 14:16:57 <bglimm> .... seems Axel has done a lot of stuff, so most might be addressed 14:17:13 <kasei> ok 14:17:15 <bglimm> AxelPolleres: Points that are open are marked in my email answer to Andy 14:17:17 <LeeF> kasei, thanks 14:17:34 <kasei> am out of the country now, but will try to review it soon 14:17:36 <bglimm> .... some things are left open because I wait for conirmation from Paul 14:17:55 <bglimm> LeeF: Protocol, nothing new, same for Service Descriptions 14:17:55 <kasei> correct 14:18:23 <bglimm> .... RDF Dataset/HTTP Protocol, we have to look at the name of the doc shortly 14:18:41 <bglimm> ... Kjetil's comments still have to be considered 14:19:42 <bglimm> bglimm: d-entailment updated for ent. regimes and section added for property paths 14:20:05 <LeeF> ACTION: Matt to look at new d-entailment text 14:20:05 <trackbot> Sorry, couldn't find user - Matt 14:20:08 <bglimm> LeeF: Matt, can you look at the D-Entailment section? 14:20:09 <LeeF> ACTION: Matthew to look at new d-entailment text 14:20:09 <trackbot> Created ACTION-422 - Look at new d-entailment text [on Matthew Perry - due 2011-04-05]. 14:20:10 <bglimm> Matt: Yes 14:20:43 <bglimm> LeeF: Federated Query is waiting on Axel and myself to finish the review 14:20:49 <bglimm> .... other documents nothing new 14:20:58 <bglimm> ... Anything important for LC? 14:21:10 <LeeF> topic: Name of the RDF dataset protocol specification 14:21:12 <bglimm> (silence) 14:21:38 <bglimm> LeeF: We realised that the name might not be appropriate 14:22:03 <LeeF> PROPOSED: Rename the datset protocol to the SPARQL 1.1 Graph Store HTTP Protocol 14:22:12 <bglimm> ... It is about managing graph stores. So we could change dataset to graph store 14:22:19 <bglimm> ... Chime is ok with that 14:22:26 <bglimm> ... any objections to that change? 14:22:35 <AndyS> seconded 14:22:38 <NicoM> +1 14:22:40 <AxelPolleres> +1 14:22:40 <Souri> +1 14:22:52 <LeeF> RESOLVED: Rename the datset protocol to the SPARQL 1.1 Graph Store HTTP Protocol 14:23:05 <AxelPolleres> Note that we need to propagate this change to other docs referring to that one! 14:23:08 <LeeF> topic: tests 14:23:16 <AxelPolleres> q+ 14:23:27 <LeeF> close ACTION-421 14:23:27 <trackbot> ACTION-421 Look through test cases and provide a summary by next TC closed 14:23:31 <bglimm> LeeF: Olivier looked through the test cases and where we stand 14:24:17 <kasei> I reference it in the SD doc 14:24:20 <kasei> will change 14:24:26 <bglimm> me too 14:24:27 <LeeF> AxelPolleres: we need to make sure that all other documents update the name of the http protocol document 14:25:01 <LeeF> 14:25:37 <bglimm> LeeF: Hope we can approve some tests 14:26:54 <bglimm> LeeF: Olivier ran the tests with his implementation 14:27:19 <LeeF> Corese 14:27:19 <bglimm> .... two areas where we miss test cases 14:27:34 <AndyS> See ARQ gets: Tests = 332 : Successes = 298 : Errors = 9 : Failures = 25 14:27:47 <bglimm> ... for the IF function and scoping? for zero length paths 14:28:12 <bglimm> LeeF: AndyS, can we get that covered 14:28:24 <bglimm> AndyS: I was hoping for WG support for this 14:28:58 <bglimm> LeeF: Matt, would you mind to come up with a test that covers the missing property path features? 14:29:05 <LeeF> ACTION: Matthew to include a test on nodes in path of length zero come from specified named graph (e.g. graph <g1> {?x <p>* ?y}) 14:29:05 <trackbot> Created ACTION-423 - Include a test on nodes in path of length zero come from specified named graph (e.g. graph <g1> {?x <p>* ?y}) [on Matthew Perry - due 2011-04-05]. 14:29:06 <bglimm> Matt: I can do that 14:29:17 <LeeF> ACTION: Lee to follow-up and make sure we get IF() tests 14:29:17 <trackbot> Created ACTION-424 - Follow-up and make sure we get IF() tests [on Lee Feigenbaum - due 2011-04-05]. 14:29:40 <bglimm> LeeF: We still have some empty directories 14:31:02 <bglimm> ... I fixed the manifest now. 14:31:24 <bglimm> ... Olivier picked up on negative syntax tests, should we keep these types? 14:31:46 <bglimm> ... Do we have similar types for the positive tests? 14:32:10 <bglimm> ... Any opinions? 14:32:14 <bglimm> (silence) 14:32:18 <kasei> is it in a different namespace? 14:32:23 <kasei> the new 1.1 namespace? 14:32:30 <LeeF> mf:NegativeSyntaxTest 14:32:30 <LeeF> mf:NegativeSyntaxTest11 14:32:30 <LeeF> mf:NegativeUpdateSyntaxTest11 14:32:39 <kasei> mf is the old dawg namespace, then? 14:32:42 <Zakim> -apassant 14:32:53 <Zakim> -cbuilara 14:32:59 <LeeF> @prefix mf: <> . 14:33:06 <kasei> if it's the same namespace, I'd prefer keeping the '11' 14:33:35 <bglimm> AndyS: I suggest the negative syntax tests without 1.1 should be changed 14:34:05 <Zakim> +NicoM 14:34:07 <Zakim> +[IPcaller] 14:34:08 <bglimm> LeeF: Should we move all syntax tests into one directory? 14:34:09 <AxelPolleres> I didn't add those classes yet, I am afraid (the ones with 11) 14:34:14 <cbuilara> Zakim, IPcaller is me 14:34:14 <Zakim> +cbuilara; got it 14:34:19 <Zakim> + +3539149aabb 14:34:29 <apassant> Zakim, +3539149aabb is me 14:34:29 <Zakim> +apassant; got it 14:34:33 <AxelPolleres> q+ 14:34:39 <LeeF> ack AxelPolleres 14:34:46 <bglimm> AndyS: The syntax tests should have coverage even if hey are scattared in different directories 14:35:21 <bglimm> AxelPolleres: Do we need NegativeSyntaxTest11 and NegativeUpdateSyntaxTest11? 14:35:32 <kasei> think it needs to either be just negativesyntaxtest11 or be explicit by changing NegativeSyntaxTest to NegativeQuerySyntaxTest 14:35:39 <kasei> prefer the latter 14:35:42 <bglimm> .... Is that not clear from the fact that the test is an update test or a query test? 14:35:52 <bglimm> AndyS: I find it clearer the way it is. 14:36:08 <bglimm> AxelPolleres: Do we need the same for PositiveSyntax...Test? 14:36:16 <bglimm> AndyS: I think we have that already. 14:36:34 <bglimm> .... Yes, and that's the only way to distinguish them, so we have to keep it 14:37:10 <AxelPolleres> I need an action to add those new types to mf: and to README.html 14:37:12 <bglimm> AndyS: For the syntax tests the type is important to distinguish them 14:37:35 <bglimm> LeeF: The ones in Aggregates without the 11 have to be updated. I'll do that now 14:38:20 <AxelPolleres> ACTION: Axel to add those new types to mf: and to README.html 14:38:20 <trackbot> Created ACTION-425 - Add those new types to mf: and to README.html [on Axel Polleres - due 2011-04-05]. 14:38:58 <AxelPolleres> ... new types: Positive/NegativeSyntaxTest11 and Positive/NegativeUpdateSyntaxTest11 yes? 14:39:01 <bglimm> LeeF: Do you know whether that is the only place? 14:39:06 <bglimm> AndyS: Yes. 14:39:14 <bglimm> LeeF: Ok, then I updated that 14:40:56 <LeeF> ACTION: Andy to change the @prefix : prefix in the syntax directories to use an absolute URI 14:40:56 <trackbot> Created ACTION-426 - Change the @prefix : prefix in the syntax directories to use an absolute URI [on Andy Seaborne - due 2011-04-05]. 14:41:39 <AxelPolleres> q+ 14:41:57 <LeeF> ack AxelPolleres 14:41:59 <bglimm> LeeF: We are not consistent in the update tests for specifying the data 14:42:18 <bglimm> AxelPolleres: We don't really need new types for the query evaluation tests 14:42:23 <AxelPolleres> :QueryEvaluationTest vs :QueryEvaluationTest11 ? 14:43:01 <bglimm> AndyS: We make sure that when you execute the test suite, you do 1.1. 14:43:13 <LeeF> ut:graphData [ ut:graph 14:43:13 <LeeF> ut:graphData [ ut:data 14:43:25 <bglimm> LeeF: ut:data vs. ut:graph, which one should be used? 14:44:20 <bglimm> AxelPolleres: data is just for the default graph 14:44:59 <bglimm> LeeF: Is the second of my example incorrect? 14:45:02 <AxelPolleres> 14:45:55 <LeeF> ACTION: Lee to clean up occurrences of ut:graphData [ ut:data 14:45:55 <trackbot> Created ACTION-427 - Clean up occurrences of ut:graphData [ ut:data [on Lee Feigenbaum - due 2011-04-05]. 14:46:24 <bglimm> LeeF: extra prefixes don't harm, could be cleaned up 14:46:32 <bglimm> ... same for duplicate tests 14:47:07 <bglimm> ... delete/insert, we know about the blank node in the template issue 14:47:16 <bglimm> ... should now be a negative syntax test 14:47:33 <LeeF> ACTION: Lee to fix the delete-insert queries that should be negative syntax tests in delete-insert 14:47:33 <trackbot> Created ACTION-428 - Fix the delete-insert queries that should be negative syntax tests in delete-insert [on Lee Feigenbaum - due 2011-04-05]. 14:48:21 <bglimm> LeeF: Olivier identified six ent. test cases that have a mistake 14:48:27 <bglimm> bglimm: I'll check that 14:49:03 <bglimm> LeeF: Axel, Olivier had some comments for the readMe document, can you address those? 14:49:19 <AxelPolleres> ACTION: Axel to ckeck Olivier's comments on the test cases README.html 14:49:19 <trackbot> Created ACTION-429 - Ckeck Olivier's comments on the test cases README.html [on Axel Polleres - due 2011-04-05]. 14:50:05 <bglimm> LeeF: We have several successful implementations for property paths that path the property path tests 14:50:19 <bglimm> ... AndyS, have you run those tests? 14:50:28 <bglimm> AndyS: Yes, there are 30 tests and I have run them 14:50:32 <AndyS> Tests = 30 : Successes = 30 : Errors = 0 : Failures = 0 14:51:09 <LeeF> PROPOSED: Approve the 30 tests in the property-path directory 14:51:10 <AndyS> (error means bad test setup e.g. data syntax wrong ; failure means different results) 14:51:22 <kasei> +1 14:51:24 <AndyS> seconded 14:51:30 <OlivierCorby> +1 14:51:34 <LeeF> RESOLVED: Approve the 30 tests in the property-path directory 14:51:42 <LeeF> ACTION: Lee to mark 30 prop path tests approved today 14:51:43 <trackbot> Created ACTION-430 - Mark 30 prop path tests approved today [on Lee Feigenbaum - due 2011-04-05]. 14:52:06 <bglimm> LeeF: I wanted to look at the negative syntax tests 14:53:12 <bglimm> ... bad01 to bad03, they don't have update opertions, AndyS suggests we make that legal, so the tests are no longer negative tests 14:53:27 <bglimm> ... can be useful in some applications 14:53:45 <kasei> I'm hesitant, but no strong feelings 14:54:05 <bglimm> ... Paul, Alex, any implications for the upate spec? 14:54:21 <bglimm> Paul (?): I think that wouldn't be a big change. 14:54:39 <bglimm> LeeF: Are you indifferent, in favour, or against that? 14:54:57 <bglimm> Paul (?): I don't have strong feeling, but seems ok 14:55:30 <bglimm> LeeF: I don't see it doing harm and seems easy 14:55:44 <bglimm> AndyS: Changes the grammar 14:56:00 <bglimm> .. the grammar is in the query doc even for update 14:56:06 <LeeF> ACTION: Andy to change update grammar to allow zero-operation update requests 14:56:06 <trackbot> Created ACTION-431 - Change update grammar to allow zero-operation update requests [on Andy Seaborne - due 2011-04-05]. 14:57:03 <bglimm> AxelPolleres: AndyS, for INSERT DATA and DELETE DATA, we do have quads there now. Is that intended? 14:57:19 <bglimm> AndyS: That is unrelated to zero operation deletes 14:57:25 <bglimm> AxelPolleres: Yes 14:57:42 <bglimm> AndyS: There is a note that says that there are no variables 14:57:50 <LeeF> PROPOSED: Approve tests in syntax-update-1 except for *bad-0{1,2,3}.ru 14:57:54 <bglimm> ... that's in 19.8 14:58:31 <LeeF> Let's take up all the syntax tests next time 14:58:35 <bglimm> AndyS: I can do the prefix update first and then approve the tests next week 14:58:45 <LeeF> Adjourned. 15:00:17 <Zakim> SW_(SPARQL)10:00AM has ended 15:00:19 <Zakim> Attendees were AxelPolleres, cbuilara, bglimm, LeeF, kasei, OlivierCorby, MattPerry, SteveH__, pgearon, apassant, AndyS, Souri_, NicoM # SPECIAL MARKER FOR CHATSYNC. DO NOT EDIT THIS LINE OR BELOW. SRCLINESUSED=00000280
https://www.w3.org/2009/sparql/wiki/Chatlog_2011-03-29
CC-MAIN-2017-26
refinedweb
3,143
67.89
It is used to extracts characters from the input sequence and discards them, until either n characters have been extracted, or one compares equal to delim. Following is the declaration for std::basic_istream::ignore. basic_istream& ignore (streamsize n = 1, int_type delim = traits_type::eof()); stream object. In below example for std::basic_istream::ignore. #include <iostream> int main () { char first, last; std::cout << "Please, enter your first name followed by your surname: "; first = std::cin.get(); std::cin.ignore(256,' '); last = std::cin.get(); std::cout << "Your initials are " << first << last << '\n'; return 0; } The output should be like this − Please, enter your first name followed by your surname: John Smith Your initials are JS
https://www.tutorialspoint.com/cpp_standard_library/cpp_basic_ios_ignore.htm
CC-MAIN-2020-16
refinedweb
113
65.62
Odoo Help Odoo is the world's easiest all-in-one management software. It includes hundreds of business apps: CRM | e-Commerce | Accounting | Inventory | PoS | Project management | MRP | etc. Revert @api.onchange or access original value How do we revert the value of the parameter changed by @api.onchange. Or get the original value back. I'm on odoo Version 9. Ex: @api.onchange('carrier_id') def on_carrier_changed(self): if something: # give some warning & do some logic # revert back carrier_id Thanks! Hi no i didn’t find an answer to that question, but my coworker suggested to change the way I do things to eliminate needing to go into onchange: Doing validation in other area, using domain filter to filter out values I don’t want…etc Update: old values are in self._origin. Self only contains new values. Even self.id = openerp.models.NewId I'm too new to this forum to post a commentary so please forgive me my 'answer'. Have you found any solution? I am searching for about an hour now and I cannot find any way how to solve it! Thank you! old values are in self._origin. Self only contains new values. Even self.id = openerp.models.NewId About This Community Odoo Training Center Access to our E-learning platform and experience all Odoo Apps through learning videos, exercises and Quizz.Test it now
https://www.odoo.com/forum/help-1/question/revert-api-onchange-or-access-original-value-108052
CC-MAIN-2018-13
refinedweb
229
57.57
On 6/16/11 8:42 PM, Jambunathan K wrote: > I was hoping that there is an elisp equivalent for C-like > > #if emacs-version > a > do this > #else > do that > #endif > The Common Lisp #+ reader macro provides the facility you want. For example, (progn #+some-feature 42) would read as (progn 42) on systems with some-feature present and (progn) on systems without that feature. CL also allows arbitrary combinations of and, or, and not calls, e.g, #+(or feature1 (not feature2)) #- also exists, and is similar, except that the sense of the test is inverted. Might this feature be worth adding to Emacs? Of course, it would only help code written for Emacs 24 and above. signature.asc Description: OpenPGP digital signature
https://lists.gnu.org/archive/html/emacs-devel/2011-06/msg00675.html
CC-MAIN-2016-36
refinedweb
124
71.75
I am not sure if I am posting this under the right thread or not but here it goes. I ran into a little problem while using the Calendar class. At work our work weeks are from Monday to Sunday and I developed a report to show data for each day in the work week. So I created the method below to get the Sunday date of the week that the selected date the user selects falls in. So a user selects a Wednesday date, that date (Calendar instance) is passed into the method and the following Sunday (Calendar instance) is returned, works fine. The issue was coming that I was getting the month, for a monthly total, after this method was called and the date of the passed date was also changed to that Sunday's date and I am not sure why and/or how. Simply work around for me was to get the month before this method was called but I want to try and figure out what I am doing to cause this so I can prevent myself from doing this in the future. The code below produces the following output. Any insight or helpful links would be appreciated. Thanks Quote: The month before getting sundays date 8 The month after getting sundays date 9 Code : public class DateClass { public DateClass() { } public Calendar getSundaysDate(Calendar passedDate) { Calendar newDate = passedDate; int day = newDate.get(Calendar.DAY_OF_WEEK); if (day != 1) { int dayIterator = day; while (dayIterator < 8) { newDate.add(Calendar.DAY_OF_MONTH, 1); dayIterator++; } } return newDate; } public static void main(String[] args) { SimpleDateFormat df = new SimpleDateFormat("yyyy/MM/dd"); Date date = new Date(); try { date = df.parse("2012/08/28"); } catch (Exception ex) { ex.printStackTrace(); } Calendar cal = Calendar.getInstance(); cal.setTime(date); DateClass dateClass = new DateClass(); System.out.println("The month before getting sundays date " + (cal.get(Calendar.MONTH) + 1)); Calendar newCal = dateClass.getSundaysDate(cal); System.out.println("The month after getting sundays date " + (cal.get(Calendar.MONTH) + 1)); } }
http://www.javaprogrammingforums.com/%20algorithms-recursion/17637-calendar-class-question-printingthethread.html
CC-MAIN-2016-22
refinedweb
329
55.74
hwit-examples 0.01-r00018 Examples for use with HWIT:author: D Haynes :contact: tundish@thuswise.org .. Titling ##++::==~~--''`` This is a package from the `hwit` namespace. It provides example forms and templates. You will need this package when you are learning how forms are made from templates, and then how they can be customised for your application. `Here's What I Think`_ is a set of components for information management on the desktop and in the cloud. `HWIT` defines a microformat which is readable both by machines and human beings. It carries structured data in a form which can be checked for validity, viewed on any platform, and indexed for searching. `HWIT` makes durable the artifacts of business processes. It gives you the flexibility to build sophisticated workflows without requiring any IT infrastructure. .. _Here's What I Think: - Downloads (All Versions): - 2 downloads in the last day - 10 downloads in the last week - 61 downloads in the last month - Author: D Haynes - License: COPYING - Categories - Package Index Owner: login.launchpad.net_94 - DOAP record: hwit-examples-0.01-r00018.xml
https://pypi.python.org/pypi/hwit-examples
CC-MAIN-2015-18
refinedweb
180
64.81
- List basics - List slicing - Adding items to a list - Removing items from a list - Sorting lists - Using sorted() and reversed() - Creating number sequences Lists are ordered and mutable collections of non-unique items. In other programming languages, lists are sometimes called arrays. List basics Lists are delimited by square brackets and can contain different types of items: >>> list1 = [1, -20, "hello", 4.347, 500] Accessing list items List items can be accessed by their index or position. In Python and most other programming languages, the first item has index 0 (zero): >>> list1[0] # first item 1 >>> list1[2] # third item hello Negative numbers can be used to access items backwards: >>> list1[-1] # last item 500 Nested lists Lists can contain other lists, which can contain other lists, and so on. This is known as nested lists: >>> list2 = [1, 2, 3, ["a", "b", "c"]] >>> list3 = [1, 2, 3, ["a", ["A", "B"], "b", [], "c"]] Items in nested lists can be accessed by ‘chaining’ the indexes of the parent lists and the item index: >>> list3[-1][1][0] 'A' Operations with lists Lists can be added using the + operator. The result is a new list with the items of the lists concatenated in the given order. >>> list1 + ['b', 100] + ['abcdef'] [1, -20, 'hello', 4.347, 500, 'b', 100, 'abcdef'] Lists can also be multiplied by integers. The result is equivalent to adding the list to itself n times: >>> list1 * 3 [1, -20, 'hello', 4.347, 500, 1, -20, 'hello', 4.347, 500, 1, -20, 'hello', 4.347, 500] Subtraction and division operations are not supported with lists. Making copies of a list Assigning a list to a new variable does not create another list, just a new reference to the same list object. >>> anotherList = list1 >>> anotherList.append(-9999) # add an item to the list >>> list1 [1, -20, 'asdsd', 4.347, 500, -9999] We’ve added an item to anotherList, and it appeared when we printed list1. It makes sense once we understand that both variable names point to the same list. There are different ways to create a copy of a list. One of them is using the built-in function list(): >>> aCopy = list(list1) >>> aCopy.append(9999) >>> aCopy [1, -20, 'hello', 4.347, 500, -9999, 9999] >>> list1 [1, -20, 'hello', 4.347, 500, -9999] Another way of making a copy of a list is by creating a slice of the whole list (see the next section): >>> anotherCopy = list1[:] List slicing A slice is a continuous range of items in a list. Slicing a list returns a new list. Consider the following ASCII diagram +---+---+---+---+---+---+ | P | y | t | h | o | n | +---+---+---+---+---+---+ Slice position: 0 1 2 3 4 5 6 Index position: 0 1 2 3 4 5 A slice is defined using start and end indexes separated by a colon: >>> list1 = [1, -20, 'hello', 4.347, 500, 'abcdefg'] >>> list1[2:4] # get a slice from 3nd to 5th items ['hello', 4.347] The item at the start index is included in the slice, the one at the end index is not. To start a slice before the first item, use 0 or simply leave out the first index: >>> list1[:4] # same as: list1[0:4] [1, -20, 'hello', 4.347] To finish a slice after the last list item, leave out the second index: >>> list1[2:] ['hello', 4.347, 500, 'abcdefg']] Slice indexes can also be negative. We can count items from the end of the list >>> list1[-2:] # last two items in the list [500, 'abcdefg'] or exclude some items at the end of the list >>> list1[:-2] # last two items in the list [1, -20, 'hello', 4.347] # everything except the last two items The slicing notation works with any kind of sequence, so you can apply what you have learned here to strings and tuples Adding items to a list Use the append method to add new items to a list: >>> list1 = ['spam', 'eggs'] >>> list1.append('bacon') >>> list1 ['spam', 'eggs', 'bacon'] Similarly, use the extend method to append a list of items to another list: >>> list1.extend(['spam', 'spam']) >>> list1 ['spam', 'eggs', 'bacon', 'spam', 'spam'] The insert method allows you to insert an item at a specific position using a list index: >>> list1.insert(3, 'sausages') >>> list1 ['spam', 'eggs', 'bacon', 'sausages', 'spam', 'spam'] Finally, the slice notation can be used to replace a section of a list with another list: >>> list1[1:4] = ['spam', 'spam', 'spam'] >>> list1 ['spam', 'spam', 'spam', 'spam', 'spam', 'spam'] Removing items from a list List items can be removed using the del command and the item’s index: >>> L = ['Graham', 'Eric', 'Terry', 'John', 'Terry', 'Michael'] >>> del L[-1] >>> L ['Graham', 'Eric', 'Terry', 'John', 'Terry'] If you don’t know the index of item, you can use the remove method and refer to the item itself: L.remove('Terry') >>> L ['Graham', 'Eric', 'John', 'Terry'] If an item appears multiple times in the list, only the first one is removed. The slice notation can be used to remove several continuous items at once: >>> del L[1:3] >>> L ['Graham', 'Terry'] ‘Popping’ items The pop method removes an item from a list and at the same time returns it. This is useful to make lists behave like stacks. Here we take the last item from the stack: >>> myList = ['parrot', 'ant', 'fish', 'goat', 'cat', 'rabbit', 'frog'] >>> myList.pop() frog If we ask to see the list again, we can see that the last item is gone: >>> myList ['parrot', 'ant', 'fish', 'goat', 'cat', 'rabbit'] The pop method can also take a index – this allows us to take out an item which is not the last one: >>> myList.pop(0) # take the first item 'parrot' >>> myList ['ant', 'fish', 'goat', 'cat', 'rabbit'] Sorting lists List items can be sorted using the sort method. Sorting is straightforward when all items in a list are of the same type. For example, if all items are strings, the list will be sorted alphabetically: >>> stringsList = ['parrot', 'ant', 'fish', 'goat', 'cat', 'rabbit', 'frog'] >>> stringsList.sort() >>> stringsList ['ant', 'cat', 'fish', 'frog', 'goat', 'parrot', 'rabbit'] If all items are numbers, they will be sorted numerically in ascending order: >>> numbersList = [7, 3.1416, 13, -273.15, 2.718, 0, 356.25] >>> numbersList.sort() >>> numbersList [-273.15, 0, 2.718, 3.1416, 7, 13, 356.25] Reversing a list The reverse method can be used to revert the order of the items in a list: >>> aList = ['one', 'two', 'three', 'four', 'five'] >>> aList.reverse() >>> aList ['five', 'four', 'three', 'two', 'one'] The sort method also has a reverse keyword to invert the default sorting order from ascending to descending: # sort list items in reverse alphabetical order >>> aList.sort(reverse=True) >>> aList ['two', 'three', 'one', 'four', 'five'] Sorting lists with mixed object types If a list contains different types of objects, we need to define a parameter for comparison. A straight sort with different object types is like comparing apples to oranges, and will not work in Python 3: >>> mixedList = ['z', 'a', 'abcdefg', 100, 2.4, True, [], None] >>> mixedList.sort() Traceback (most recent call last): File "<stdin>", line 1, in <module> TypeError: '<' not supported between instances of 'int' and 'str' How does a number compare to a string? How do numbers and strings compare to lists, boolean values, or to None? There are different ways to answer these questions depending on the context and on the desired result. Sorting mixed lists was supported in Python 2, but only thanks to many assumptions about comparisons between types. Python 3 requires us to be explicit about the comparison criteria used for sorting. The example script shows how to sort a list containing different data types using a key function: # create a flat list containing strings and numbers myList = ['Graham', 'Eric', 'Terry', 'John', 'Terry', 'Michael'] myList += ['parrot', 'ant', 'fish', 'goat', 'cat', 'rabbit', 'frog'] myList += [7, 3.1416, 13, -273.15, 2.718, 0, 356.25] myList += ['3M', '7UP', '7-Eleven'] # define a key function def sorter(item): '''Convert a list item into a key for sorting.''' return str(item).lower() # sort the list using the key function myList.sort(key=sorter) print(myList) [-273.15, 0, 13, 2.718, 3.1416, 356.25, '3M', 7, '7-Eleven', '7UP', 'ant', 'cat', 'Eric', 'fish', 'frog', 'goat', 'Graham', 'John', 'Michael', 'parrot', 'rabbit', 'Terry', 'Terry'] Sorting lists of values with itemgetter One of the many uses for lists is storing groups of values. As an example, let’s imagine that we have some very basic information about a group of people as a list of values: a tuple with first name, last name and birth year: persons = [ # first name, last name, birth year ('Graham', 'Chapman', 1941), ('Eric', 'Idle', 1943), ('Terry', 'Gilliam', 1940), ('Terry', 'Jones', 1942), ('John', 'Cleese', 1939), ('Michael', 'Palin', 1943), ] Using what we’ve learned in the previous section, we could write separate key functions to sort this list based on different index values: def lastNameSorter(item): return item[1] def birthYearSorter(item): return item[2] persons.sort(key=lastNameSorter) # option: key=birthYearSorter print(persons) [('Graham', 'Chapman', 1941), ('John', 'Cleese', 1939), ('Terry', 'Gilliam', 1940), ('Eric', 'Idle', 1943), ('Terry', 'Jones', 1942), ('Michael', 'Palin', 1943)] Notice how the functions repeat a ‘get item’ pattern. This is so common that Python provides a convenience itemgetter function in the operator module (we’ll learn more about modules later): from operator import itemgetter persons.sort(key=itemgetter(2)) # sort by year print(persons) [('John', 'Cleese', 1939), ('Terry', 'Gilliam', 1940), ('Graham', 'Chapman', 1941), ('Terry', 'Jones', 1942), ('Eric', 'Idle', 1943), ('Michael', 'Palin', 1943)] Using itemgetter it is also possible to define multiple levels of sorting. For example, sorting by first name (1st item) and last name (2nd item): persons.sort(key=itemgetter(0, 1)) print(persons) [('Eric', 'Idle', 1943), ('Graham', 'Chapman', 1941), ('John', 'Cleese', 1939), ('Michael', 'Palin', 1943), ('Terry', 'Gilliam', 1940), ('Terry', 'Jones', 1942)] Using sorted() and reversed() In addition to the list.sort method, Python also offers a sorted() built-in function which builds a new sorted list from a collection (not just a list). Using sorted(list) is often more convenient than using list.sort(). Here’s an example of sorted() in use. Notice that the original list is not modified: >>> flags = ['Foxtrot', 'Bravo', 'Whisky', 'Tango', 'Charlie', 'Echo'] >>> sorted(flags) ['Bravo', 'Charlie', 'Echo', 'Foxtrot', 'Tango', 'Whisky'] >>> flags ['Foxtrot', 'Bravo', 'Whisky', 'Tango', 'Charlie', 'Echo'] The reversed() built-in function works similarly, but returns an iterator object instead of a new list. Both sorted() and reversed() are often used to loop over a list of items: >>> for flag in reversed(flags): ... flag 'Echo' 'Charlie' 'Tango' 'Whisky' 'Bravo' 'Foxtrot' Creating number sequences Sequential lists of numbers can be created dynamically using the range built-in function. Here’s how we create a list of numbers, starting at 0 and ending before 10: >>> list(range(10)) [0, 1, 2, 3, 4, 5, 6, 7, 8, 9] In Python 2, rangereturns a list. In Python 3, it returns an iterator object – which we can convert into a list using the list()built-in function. We can start a sequence at a different number by using range with two arguments: >>> list(range(5, 10)) [5, 6, 7, 8, 9] Finally, we can use a third argument to specify an interval between the numbers: >>> list(range(1, 19, 3)) [1, 4, 7, 10, 13, 16]
https://doc.robofont.com/documentation/tutorials/python/lists/
CC-MAIN-2021-39
refinedweb
1,872
66.78
A node in the scene graph that can hold a Portal Polygon, which is a rectangle. More... #include "portalNode.h" List of all members. A node in the scene graph that can hold a Portal Polygon, which is a rectangle. Other types of polygons are not supported for now. It also holds a PT(PandaNode) Cell that this portal is connected to Definition at line 34 of file portalNode.h. Default constructor, just an empty node, no geo This is used to read portal from model. You can also use this from python to create an empty portal. Then you can set the vertices yourself, with addVertex. Definition at line 44 of file portalNode.cxx. References PandaNode::set_cull_callback(). Referenced by make_copy(), and make_from_bam(). 10.0 Create a default rectangle as portal. Use this to create an arbitrary portal and setup from Python Definition at line 65 of file portalNode.cxx. References add_vertex(), and PandaNode::set_cull_callback(). [inline] Adds a new vertex to the portal polygon. The vertices should be defined in a counterclockwise orientation when viewing through the portal. Definition at line 142 of file portalNode.I. Referenced by PortalNode(). Resets the vertices of the portal to the empty list. Definition at line 130 of file portalNode.I. [virtual]. Reimplemented from PandaNode. Definition at line 196 of file portalNode.cxx. References TypedObject::is_exact_type(). Receives an array of pointers, one for each time manager->read_pointer() was called in fillin(). Returns the number of pointers processed. Reimplemented from TypedWritable. Definition at line 467 of file portalNode.cxx. [protected, virtual] Called when needed to recompute the node's _internal_bound object. Nodes that contain anything of substance should redefine this to do the right thing. Definition at line 386 of file portalNode.cxx. References GeometricBoundingVolume::around(). This function will be called during the cull traversal to perform reduced frustum culling. Basically, once the scenegraph comes across a portal node, it calculates a CulltraverserData with which cell, this portal leads out to and the new frustum. Then it traverses that child The return value is true if this node should be visible, or false if it should be culled. Definition at line 227 of file portalNode.cxx. References PortalClipper::get_clip_state(), SceneSetup::get_cull_center(), CullTraverser::get_current_thread(), NodePath::get_name(), WorkingNodePath::get_node_path(), CullTraverser::get_portal_clipper(), PortalClipper::get_reduced_frustum(), PortalClipper::get_reduced_viewport(), CullTraverser::get_view_frustum(), NodePath::is_empty(), is_open(), PortalClipper::prepare_portal(), PortalClipper::set_clip_state(), PortalClipper::set_reduced_frustum(), PortalClipper::set_reduced_viewport(), set_visible(), and CullTraverser::traverse_below(). initialize the clipping planes and renderstate Definition at line 145 of file portalNode.cxx. References NodePath::attach_new_node(). Referenced by set_clip_plane(). This internal function is called by make_from_bam to read in all of the relevant data from the BamFile for the new PortalNode. Definition at line 501 of file portalNode.cxx. References DatagramIterator::get_uint16(), and LVecBase3f::read_datagram(). Referenced by make_from_bam(). Sets the cell that this portal belongs to. Definition at line 181 of file portalNode.I. Sets the cell that this portal leads out to. Definition at line 198 of file portalNode.I. Returns the current "from" PortalMask. In order for a portal to be detected from this object into another object, the intersection of this object's "from" mask and the other object's "into" mask must be nonzero. Definition at line 71 of file portalNode.I. Returns the current "into" PortalMask. In order for a portal to be detected from another object into this object, the intersection of the other object's "from" mask and this object's "into" mask must be nonzero. Definition at line 85 of file portalNode.I. Returns the maximum depth this portal will be visible at. Definition at line 275 of file portalNode.I. Returns the number of vertices in the portal polygon. Definition at line 152 of file portalNode.I. Returns the current state of the portal_geom flag. See set_portal_geom(). Definition at line 120 of file portalNode.I. Returns the nth vertex of the portal polygon. Definition at line 162 of file portalNode.I. References LPoint3f::zero(). Referenced by PortalClipper::draw_current_portal(), and PortalClipper::prepare_portal(). Is this portal clipping against its left-right planes. Definition at line 220 of file portalNode.I. Is this portal open from current camera zone. Definition at line 257 of file portalNode.I. Referenced by cull_callback(). 342 of file portalNode.cxx. Is this portal facing the camera. Definition at line 239 of file portalNode.I. Returns a newly-allocated Node that is a shallow copy of this one. It will be a different Node pointer, but its internal data may or may not be shared with that of the original Node. Definition at line 123 of file portalNode.cxx. References PortalNode(). [static, protected] This function is called by the BamReader's factory when a new object of type PortalNode is encountered in the Bam file. It should create the PortalNode and extract its information from the file. Definition at line 482 of file portalNode.cxx. References fillin(), and PortalNode(). Referenced by register_with_read_factory(). Writes a brief description of the node to the indicated output stream. This is invoked by the << operator. It may be overridden in derived classes to include some information relevant to the class. Definition at line 356 of file portalNode.cxx. Returns true if the node's name has extrinsic meaning and must be preserved across a flatten operation, false otherwise. Definition at line 135 of file portalNode.cxx. [static] Tells the BamReader how to create objects of type PortalNode. Definition at line 437 of file portalNode.cxx. References BamReader::get_factory(), make_from_bam(), and Factory< Type >::register_factory(). Definition at line 172 of file portalNode.I. Definition at line 189 of file portalNode.I. this is set if the portal will clip against its left and right planes Definition at line 208 of file portalNode.I. References enable_clipping_planes(). Sets the "from" PortalMask. Definition at line 38 of file portalNode.I. Referenced by set_portal_mask(). Sets the "into" PortalMask. Definition at line 52 of file portalNode.I. References PandaNode::mark_bounds_stale(). Set the maximum depth this portal will be visible at. Definition at line 266 of file portalNode.I. Python sets this based on curent camera zone. Definition at line 248 of file portalNode.I. Sets the state of the "portal geom" flag for this PortalNode. Normally, this is false; when this is set true, the PortalSolids in this node will test for portals with actual renderable geometry, in addition to whatever PortalSolids may be indicated by the from_portal_mask. Setting this to true causes this to test *all* GeomNodes for portals. It is an all-or-none thing; there is no way to portal with only some GeomNodes, as GeomNodes have no into_portal_mask. Definition at line 105 of file portalNode.I. Simultaneously sets both the "from" and "into" PortalMask values to the same thing. Definition at line 23 of file portalNode.I. References set_from_portal_mask(), and set_into_portal_mask(). this is set if the portal is facing camera Definition at line 230 of file portalNode.I. Writes the contents of this object to the datagram for shipping out to a Bam file. Definition at line 448 of file portalNode.cxx. References Datagram::add_uint16(). Transforms the contents of this node by the indicated matrix, if it means anything to do so. For most kinds of nodes, this does nothing. Definition at line 175 of file portalNode.cxx. References LMatrix4f::is_nan().
http://www.panda3d.org/reference/1.7.2/cxx/classPortalNode.php
CC-MAIN-2014-15
refinedweb
1,199
52.66
#include <proton/import_export.h> #include <sys/types.h> #include <stdbool.h> #include <proton/engine.h> Go to the source code of this file. API for using SSL with the Transport Layer. A Transport may be configured to use SSL for encryption and/or authentication. A Transport can be configured as either an "SSL client" or an "SSL server". An SSL client is the party that proactively establishes a connection to an SSL server. An SSL server is the party that accepts a connection request from a remote SSL client. This SSL implementation defines the following objects: A pn_ssl_domain_t object must be created and configured before an SSL session can be established. The pn_ssl_domain_t is used to construct an SSL session (pn_ssl_t). The session "adopts" its configuration from the pn_ssl_domain_t that was used to create it. For example, pn_ssl_domain_t can be configured as either a "client" or a "server". SSL sessions constructed from this domain will perform the corresponding role (either client or server). Some per-session attributes - such as peer verification mode - may be overridden on a per-session basis from the default provided by the parent pn_ssl_domain_t. If either an SSL server or client needs to identify itself with the remote node, it must have its SSL certificate configured (see pn_ssl_domain_set_credentials()). If either an SSL server or client needs to verify the identity of the remote node, it must have its database of trusted CAs configured (see pn_ssl_domain_set_trusted_ca_db()). An SSL server connection may allow the remote client to connect without SSL (eg. "in the clear"), see ::pn_ssl_allow_unsecured_client(). The level of verification required of the remote may be configured (see ::pn_ssl_domain_set_default_peer_authentication ::pn_ssl_set_peer_authentication, ::pn_ssl_get_peer_authentication). Support for SSL Client Session resume is provided (see ::pn_ssl_get_state, ::pn_ssl_resume_state). Determines the type of SSL endpoint. Indicates whether an SSL session has been resumed. Determines the level of peer validation. ANONYMOUS_PEER does not require a valid certificate, and permits use of ciphers that do not provide authentication. VERIFY_PEER will only connect to those peers that provide a valid identifying certificate signed by a trusted CA and are using an authenticated cipher. VERIFY_PEER_NAME is like VERIFY_PEER, but also requires the peer's identity as contained in the certificate to be valid (see pn_ssl_set_peer_hostname). ANONYMOUS_PEER is configured by default. Create a new SSL session object associated with a transport. A transport must have an SSL object in order to "speak" SSL over its connection. This method allocates an SSL object associates it with the transport. Create an SSL configuration domain This method allocates an SSL domain object. This object is used to hold the SSL configuration for one or more SSL sessions. The SSL session object (pn_ssl_t) is allocated from this object. Permit a server to accept connection requests from non-SSL clients. This configures the server to "sniff" the incoming client data stream, and dynamically determine whether SSL/TLS is being used. This option is disabled by default: only clients using SSL/TLS are accepted. Release an SSL configuration domain This method frees an SSL domain object allocated by pn_ssl_domain. Set the certificate that identifies the local node to the remote. This certificate establishes the identity for the local node for all SSL sessions created from this domain. It will be sent to the remote if the remote needs to verify the identity of this node. This may be used for both SSL servers and SSL clients (if client authentication is required by the server). Configure the level of verification used on the peer certificate. This method controls how the peer's certificate is validated, if at all. By default, neither servers nor clients attempt to verify their peers (PN_SSL_ANONYMOUS_PEER). Once certificates and trusted CAs are configured, peer verification can be enabled. Configure the set of trusted CA certificates used by this domain to verify peers. If the local SSL client/server needs to verify the identity of the remote, it must validate the signature of the remote's certificate. This function sets the database of trusted CAs that will be used to verify the signature of the remote's certificate. Get the name of the Cipher that is currently in use. Gets a text description of the cipher that is currently active, or returns FALSE if SSL is not active (no cipher). Note that the cipher in use may change over time due to renegotiation or other changes to the SSL state. Access the configured peer identity. Return the expected identity of the remote peer, as set by pn_ssl_set_peer_hostname. Get the name of the SSL protocol that is currently in use. Gets a text description of the SSL protocol that is currently active, or returns FALSE if SSL is not active. Note that the protocol may change over time due to renegotiation. Initialize an SSL session. This method configures an SSL object using the configuration provided by the given domain. Check whether the state has been resumed. Used for client session resume. When called on an active session, indicates whether the state has been resumed from a previous session. Set the expected identity of the remote peer. The hostname is used for two purposes: 1) when set on an SSL client, it is sent to the server during the handshake (if Server Name Indication is supported), and 2) it is used to check against the identifying name provided in the peer's certificate. If the supplied name does not exactly match a SubjectAltName (type DNS name), or the CommonName entry in the peer's certificate, the peer is considered unauthenticated (potential imposter), and the SSL connection is aborted.
http://qpid.apache.org/releases/qpid-proton-0.4/protocol-engine/c/api/ssl_8h.html
CC-MAIN-2014-52
refinedweb
922
57.37
You need to sign in to do that Don't have an account? Winter 14: Community users can't contact support / submit NewCase Hello,! () I didn't see your issue listed there. Does the profile associated with community users have access to the object the selection links to? Good manual: Thanks for the response! I had looked through the known issues and could not find my particular item. It's possible my issue is buried in some bad / missing config but I've yet to find it. All the users & profiles I've configured for the community including the one I used to test are set to access Cases and related objects. Reading through the guide you posted, I did add the "New Case" pub action to the standard layout but am still unable to create a new case from the community! Any other ideas? From the Getting Started with Communities guide (pg 25); () Enable Cases for Communities Users Enable cases for external users so that they have access to and can create cases in your communities. When you enable cases for external users in your community, you can assign cases to those members. Additionally, external members can edit cases, create new cases, add case comments, reassign cases, find case solutions, and create case teams. External users can’t edit case comments, associate assets with cases, or delete cases. Note: Case comments added by external users in communities are public and can be viewed by any user that can view the case. 1. Add the Cases tab to the list of available tabs in your community. 2. Set tab visibility and “Read,” “Create,” and “Edit” object permissions. You can either set them on the profile or using a permission set. We recommend using a permission set if you plan to apply these permissions selectively. a. If using a profile, such as the Partner Community profile, set the cases tab setting to Default On and enable the “Read,” “Create,” and “Edit” object permissions for cases. b. If using a permission set, create a permission set with the following settings for cases: • In the Tab Settings, select Available and Visible. • In the Object Settings, select “Read,” “Create,” and “Edit” I updated the Profiles for the users in question AND created a permission set as described. I also upate the community Admin settings to "Use Salesforce.com Tabs" (insdead of "Use Community Designer to create custom pages") We are still unable to create cases through the community. In testing, we still get the error described. Are there any other settings I might look at? Hi, Nick, if you followed all of the steps in my last post, I'm at a loss. Three suggestions: And if you find a solution please update this post with it. And I'll keep poking around to see if anything else comes to mind. Best, Jason . Have set my Community site to use Community Designer pages which works for all other functions so far. This is the only error I have gotten from the Preview function. I have been able to create new Articles and new Posts (Chatter Answer) directly from the community designer Preview pages. I can create Cases in the standard SFDC UI and View them in the preview but it will not allow be to CREATE a new case. NewCase action is a default Published action and has not override in place. For some reason, I couldn't get this to work in my DE with a namespace prefix, but it worked perfectly on my UE that did not have a namespace. j WIth help from SalesForce support, we discovered that the issue has to do with a bug in how the Global Action Record Types work. In our case, I had to switch the Record Type for NewCase global action to something other than the default 'Master'. You can see some extra detail on the SF Success community here:
https://developer.salesforce.com/forums/?id=906F0000000AnB3IAK
CC-MAIN-2020-34
refinedweb
656
62.68
[groovy-user] Can't override equals method for Lists 2014-11-15 11:11:44 GMT Hello, New versions of groovy-eclipse-compiler 2.9.1-01 and groovy-eclipse-batch 2.3.7-01 are about to be released. Those components can be accessed on Codehaus staging repo: Looking forward your feedback. Thank you, Denis I have a pretty hefty application (about 200 classes, I would estimate) the currently compiles with Groovy 2.0 and runs on Java 1.7.0_40. I would like to start using Meteor for the UI, which means exposing some of my Groovy application data using DDP. There is a Java DDP client at, but it requires Java 8. So, I'm facing the prospect of upgrading Groovy and Java, and I'm very concerned that my application will never run again. Should this be a smooth process, or am I asking for trouble jumping all the way to Groovy 2.3 and Java 1.8? Thanks for any advice, for or against. (I'm open to other suggestions regarding Meteor DDP integration, as well.) -- View this message in context: Sent from the groovy - user mailing list archive at Nabble.com. --------------------------------------------------------------------- To unsubscribe from this list, please visit: I’ve extended Script with a couple of methods that all look like this: import any.old.organisation.WeirdObject WeirdObject getWeirdObject() { (WeirdObject)binding.getProperty(“weirdObject”) } Now a single line with a BaseScript Annotation pointing to my extended Script class lets Intellj know what type those otherwise miraculous binding variables have. I’ve applied that to scripts for the GroovyServlet. Now I can type “request.” or “response.” and get the whole glory of code completion and type inference!! Before I had imports and assignments to typed local variables for this purpose. This approach nicely reduced that boilerplate. Just wanted to post something useful to give back to the community. I’ve just put together a web application with Angular.js frontend and a Groovy backend for the JSON data. My boss was pretty perplexed, when I said the prototype was ready on day two. I’ve created a servlet based on the original Groovy servlet that injects a connection to our own backend in to the scripts. Now I just need to pump information from our proprietary objects (legacy Java APIs made Groovy through extensions) into the ScreamingJsonBuilder. It rocks. 5 scripts of less than 100 lines for the backend; 1 HTML, 1 CSS and 1 JS for the front end, neither in access of 100 lines again. Cheers, Jochen Hi G8 community, I’ve been absent from the list for a while. I’ve noticed that StreamingJsonBuilder is not only supposedly much faster, but also finally offers a way to create Array/List output in a sensible fashion. But in my first real life application I have objects providing an Iterator (thus being an Iterable). But they don’t implement Collection. Can somebody give me a reason, why this feature has not been made available for the more general Iterable interface? Andrey B? I mean, the inner workings of the new implementation would not look any different for an Iterable: writer.write("["); boolean first = true; for (Object it : coll) { if (!first) { writer.write(","); } else { first = false; } writer.write("{"); curryDelegateAndGetContent(writer, closure, it); writer.write("}"); } writer.write("]"); And I don’t see any confusion with other parameter combinations for the call methods. I’d advocate going from Collection to Iterable in a future release of Groovy. Any comment? Both workarounds for the Iterable at hand are not very pretty Calling asList() defies the whole purpose of the streaming exercise, i.e. not building data structures before streaming. json (iter as List) { … } The Iterable at hand has a count property, so this should give better performance, but looks clumsy: json (0..<iter.count) { def item = iter.getItem(it) … } Thanks for any insight. Keep the grooviness coming! Jochen We have a relative complex business application, where some layers are written in groovy. We try to switch from call site caching groovy (2.3.6 on 8u25) to the indy version. One task running in the call site caching version 30 seconds jumps up to 3 minutes in the indy version and the CPU's on the app server jumps up to 90% usage. The code area in question seems to use heavyly nested each closures with more each and findAll calls. My question is now, should the indy version always be faster than the call site version? Is it worth to isolate a test case for this? Thanks, Marcel --------------------------------------------------------------------- To unsubscribe from this list, please visit: Hi everybody! This is my first post to the list, so be patient if I sound too beginner. :D I've been looking for a nice "groovy way" to interrupt/cancel/kill/stop a long running query executed using the groovy.sql.Sql class. The main idea is to achive similar functionality to this post () but I don't want to stop using the groovy sql methods like sql.executeUpdate or sql.execute. There is any way to accomplish this? Any idea is appreciated! Thanks in advance! -- View this message in context: Sent from the groovy - user mailing list archive at Nabble.com. --------------------------------------------------------------------- To unsubscribe from this list, please visit: /**If the above precedes a method, the method will be tagged with the given keywords. The generated html would have a new link at the top of the page Search that would open a page to provide for faceted searching of <at> tag content as well as <at> version and other content. ...<at> tag color>conversion hsl rgb, analytics... <p> Perform color conversion between hsl and rgb, supporting underlying analytics. </p> */ Hi there, I have been playing around with the MarkupTemplateEngine available in Groovy 2.3. In particular I am interested in the internationalization support it offers. I have put together a small example (shown below) whereby, when a template file named "greeting-fr-FR.tpl" exists, this template's contents are retrieved. TemplateConfiguration templateConfiguration = new TemplateConfiguration() templateConfiguration.setLocale(new Locale("fr-FR")) MarkupTemplateEngine templateEngine = new MarkupTemplateEngine(templateConfiguration) Template template = templateEngine.createTypeCheckedModelTemplateByPath("greeting.tpl",['person': 'com.pauldailly.groovy.templating.demo.Person']) Writable output = template.make([person: person]) println(output.writeTo(new StringWriter()).toString()) However, I am wondering whether it is possible for the templating engine to perform some form of 'closest match' template file resolution. Currently, if I specify the locale of the TemplateConfiguration object to be "fr-FR", but I only have template files named "greeting.tpl" and "greeting-fr.tpl", the file "greeting.tpl" is used. I would like "greeting.-fr.tpl" to be the template file resolved in this case. Is this possible? Many thanks, Paul -- View this message in context: Sent from the groovy - user mailing list archive at Nabble.com. --------------------------------------------------------------------- To unsubscribe from this list, please visit:
http://blog.gmane.org/gmane.comp.lang.groovy.user
CC-MAIN-2014-49
refinedweb
1,139
58.89
Today, let’s turn our attention to a very basic, and highly useful feature of C#: Static Constructors. I don’t make common use of this feature myself. But, when it is needed, it fits the job very well indeed. So, what is a static constructor? To quote the documentation, “A static constructor is used to initialize any static data, or to perform a particular action that needs to be performed once only.” To start with, let’s look at some code that satisfies the first part of that quote, and initialize some static data. public class Clock { static DateTime TIME_STATIC_CONSTRUCTOR_WAS_CALLED; static Clock() { TIME_STATIC_CONSTRUCTOR_WAS_CALLED = DateTime.UtcNow; } } In the preceding code, we have a static constructor that is used to initialize a static field of type DateTime with the current UTC time. Very simple. However, there are a few things we can note from this code. Firstly, the static constructor does not take any access modifiers. So, for example, if we were to do this… public static Clock() { TIME_STATIC_CONSTRUCTOR_WAS_CALLED = DateTime.UtcNow; } …you would see an error. Furthermore, a static constructor does not accept any parameters, and it cannot be called directly. It is called automatically to initialize the class before the first instance is created or any static members referenced. My complete code at this point looks like this… public class Program { public static void Main(string[] args) { var clock = new Clock(); Console.WriteLine(clock.Get().Ticks); } } public class Clock { static DateTime TIME_STATIC_CONSTRUCTOR_WAS_CALLED; static Clock() { TIME_STATIC_CONSTRUCTOR_WAS_CALLED = DateTime.UtcNow; } public DateTime Get() { return TIME_STATIC_CONSTRUCTOR_WAS_CALLED; } } Running this code, which is part of a standard .NET console application, I have an output that looks like Figure 1. Figure 1: The console application running Now that we have a simple application you may run, let’s look at the second part of the quote above, and examine what we mean by ‘to perform an action only once.’ As we now know, a static constructor is automatically called once, and called to initialize a class before the first instance of that class is created. Consider the following piece of code. public static void Main(string[] args) { var clock1 = new Clock(); Console.WriteLine(clock1.Get().Ticks); Thread.Sleep(1000); var clock2 = new Clock(); Console.WriteLine(clock2.Get().Ticks); Thread.Sleep(1000); var clock3 = new Clock(); Console.WriteLine(clock3.Get().Ticks); } What would you expect the output to the console to be for the other two instances of Clock? The exact DateTime they were initialized? Or the DateTime of the first instance of the class? For the answer, see Figure 2… Figure 2: The output from the three instances of Clock Let’s compare the behaviour from above, with that of a standard constructor. Let’s change the static constructor of our Clock class to something like the following, and re-run the program. public Clock() { TIME_STATIC_CONSTRUCTOR_WAS_CALLED = DateTime.UtcNow; } And the result… Figure 3: The output showing different results The ticks we are looking at now represent the time at which the constructor was called. Each one differs because we are making that call every time the class is initialized. Conclusion There isn’t a lot to this little feature of C#, but its application can be very powerful to you at the right time. For example, if you’re familiar with EntityFramework, you may need to evaluate a connection string at run-time, rather than connected using a constant string. It’s also quite possible that once you’ve evaluated this string, you don’t need to do so again for the lifetime of the application. This is the kind of situation a static constructor can really help, and one I’ve recently found myself in with a WPF application. I ended up in a situation where the location of a local SQLite database can change, but it never changes once the application is running. If you have any questions or comments on this article, please find me on Twitter @GLanata.
https://www.codeguru.com/dotnet/c-back-to-basics-static-constructors/
CC-MAIN-2021-43
refinedweb
654
63.49
asyncio API (PEP 3156) implemented on top of gevent aiogevent implements the asyncio API (PEP 3156) on top of gevent. It makes possible to write asyncio code in a project currently written for gevent. aiogevent allows to use greenlets in asyncio coroutines, and to use asyncio coroutines, tasks and futures in greenlets: see yield_future() and wrap_greenlet() functions. The main visible difference between aiogevent and trollius is the behaviour of run_forever(): run_forever() blocks with trollius, whereas it runs in a greenlet with aiogevent. It means that aiogevent event loop can run in an greenlet while the Python main thread runs other greenlets in parallel. - aiogevent on Python Cheeseshop (PyPI) - aiogevent at Bitbucket See also the aioeventlet project. Hello World Code: import aiogevent import trollius as asyncio def hello_world(): print("Hello World") loop.stop() asyncio.set_event_loop_policy(aiogevent.EventLoopPolicy()) loop = asyncio.get_event_loop() loop.call_soon(hello_world) loop.run_forever() loop.close() API aiogevent specific functions: Warning aiogevent API is not considered as stable yet. yield_future yield_future(future, loop=None): Wait for a future, a task, or a coroutine object from a greenlet. Yield control other eligible greenlet until the future is done (finished successfully or failed with an exception). Return the result or raise the exception of the future. The function must not be called from the greenlet running the aiogreen event loop. Example of greenlet waiting for a trollius task. The progress() callback is called regulary to see that the event loop in not blocked:import aiogevent import gevent) task = asyncio.async(coro_slow_sum(1, 2)) value = aiogevent.yield_future(task) print("1 + 2 = %s" % value) loop.stop() asyncio.set_event_loop_policy(aiogevent.EventLoopPolicy()) gevent.spawn(green_sum) loop = asyncio.get_event_loop() loop.run_forever() loop.close() Output:computation in progress... computation in progress... computation in progress... 1 + 2 = 3 wrap_greenlet wrap_greenlet(gt): Wrap a greenlet into a Future object. The Future object waits for the completion of a greenlet. The result or the exception of the greenlet will be stored in the Future object. Greenlet of greenlet and gevent modules are supported: gevent.greenlet and greenlet.greenlet. The greenlet must be wrapped before its execution starts. If the greenlet is running or already finished, an exception is raised. For gevent.Greenlet, the _run attribute must be set. For greenlet.greenlet, the run attribute must be set. Example of trollius coroutine waiting for a greenlet. The progress() callback is called regulary to see that the event loop in not blocked:import aiogevent import gevent import trollius as asyncio from trollius import From, Return def progress(): print("computation in progress...") loop.call_later(0.5, progress) def slow_sum(x, y): gevent.sleep(1.0) return x + y @asyncio.coroutine def coro_sum(): loop.call_soon(progress) gt = gevent.spawn(slow_sum, 1, 2) fut = aiogevent.wrap_greenlet(gt, loop=loop) result = yield From(fut) print("1 + 2 = %s" % result) asyncio.set_event_loop_policy(aiogevent.EventLoopPolicy()) loop = asyncio.get_event_loop() loop.run_until_complete(coro_sum()) loop.close() Output:computation in progress... computation in progress... computation in progress... 1 + 2 = 3 Installation Install aiogevent with pip Type: pip install aiogevent Install aiogevent on Windows with pip Procedure for Python 2.7: If pip is not installed yet, install pip: download get-pip.py and type: \Python27\python.exe get-pip.py Install aiogevent with pip: \Python27\python.exe -m pip install aiogevent pip also installs dependencies: eventlet and trollius Manual installation of aiogevent Requirements: - Python 2.6 or 2.7 - gevent 0.13 or newer - trollius 0.3 or newer (pip install trollius), but trollius 1.0 or newer is recommended Type: python setup.py install To do - support gevent versions older than 0.13. With version older than 0.13, import gevent raise “ImportError: …/python2.7/site-packages/gevent/core.so: undefined symbol: current_base” - support gevent monkey patching: enable py27_patch in tox.ini - enable py33 environments in tox.ini: gevent 1.0.1 does not support Python 3, need a new release. Tests pass on the development (git) version of gevent. gevent and Python 3 The development version of gevent has an experimental support of Python 3. See the gevent issue #38: python3. Threading gevent does not support threads: the aiogevent must run in the main thread. Changelog 2014-12-18: Version 0.2 - Rename the link_future() function to yield_future() - Add run_aiotest.py - tox now also runs aiotest test suite 2014-11-25: Version 0.1 - First public release Download Files Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
https://pypi.org/project/aiogevent/
CC-MAIN-2017-34
refinedweb
737
53.47
Integrating Google Maps in React Using refs The content of this tutorial is extracted from a React Live Class given by Thomas Tuts. IntroductionIntroduction React's ref provides an easy way to access DOM nodes and components, and to integrate third-party libraries in our React components. Let's take a brief look at how we can use React's ref attribute to hook up our component with a basic Google Maps integration. As an exercise, we'll render a map using Google Maps that starts on the Eiffel Tower, and has a button that pans us all the way to the Arc de Triomphe. Simple stuff, but it should be enough to get you up and running with using refs. Of course, feel free to modify things as you see fit! Here's a demo of the end product: We're going to write our code in ES2015, so some familiarity with its syntax is required. To avoid having to set up a whole build system, we'll use Codepen instead. What's a ref? ref is a special attribute in React that you can use to store a reference to that component or DOM node. You can then access that React component (or DOM node) and do things with it. Keep in mind that when you attach a ref to a DOM node, you get access to that node, whereas a ref on a React component, will get you a reference to the component instance instead. The ref attribute takes either a function or a string, which is passed in much like you would pass in a prop. When you pass in a function, that function gets executed when the component is mounted and unmounted. You can then do stuff with the component, or store it for later use. When you pass in a string instead, you can access the component using this.refs.refname. To keep things simple, we'll use the string method of accessing our ref. Why you would use ref Suppose you want to add a custom scrollbar to your fancy looking component. To do so, you might use something like perfect-scrollbar. If you check out the documentation, you'll notice that we need to pass it a DOM element so it can initialize and add extra DOM elements to provide the custom scrollbar: var container = document.getElementById('container'); Ps.initialize(container); We can use a ref here to pass to Ps.initialize(). As mentioned before, you can also use ref to access a React component. You can then access that component instance in its parent. For example, this could be handy to call a method on a child component to clear an input field after the parent component has finished processing the passed data. You could also use state for this, but this solution is a little cleaner. Exercise: Google MapsExercise: Google Maps You can find the basic setup for the exercise on Codepen. When you open the page, you'll most likely get a Google Maps error. That's because we need to add our own API key first. Let's Adding the Google API keyAdding the Google API key To get a key for the Google Maps JS API, follow these instructions. Once you have your key, plug it into the Codepen exercise by clicking the cog icon next to JS. In the modal, you'll see a list of all our externally loaded dependencies (React, ReactDOM and Google Maps JS API). In the last one that says, replace YOUR_API_KEY with the one that you just generated. Rendering the initial mapRendering the initial map Now that our Google Maps has been hooked up with an API key, let's take it for a spin. To access the DOM node to render our map into, we'll need to add a ref first: // In the Map's render() method return ( <div ref="map" style={mapStyle}I should be a map!</div> ); Now that we can access our ref, we'll use the componentDidMount() lifecycle method to instantiate the map: componentDidMount() { this.map = new google.maps.Map(this.refs.map, { center: EIFFEL_TOWER_POSITION, zoom: 16 }); } Why do we use componentDidMount()? If we used componentWillMount(), we would not have access to our refs yet, because at that point, our component doesn't exist yet, but it will. When it has mounted (i.e. componentDidMount(), we do have access to the DOM representation of our component, and we can access our ref. This stuff should not go into render() either, because render() can get called multiple times in a component's lifecycle (recreating the map every time, losing your position). Even more important: a render() method should be pure and free from any side effects! Side effects are things like making an XHR request, modifying variables outside of the function's scope, writing data, manipulating the DOM, and so on. Render should only be concerned with returning a representation of the component based on its current props and state. That's all! Panning to the Arc De TriomphePanning to the Arc De Triomphe Lastly, let's add a button that pans the map to the Arc De Triomphe. First, we'll add a button to our component, along with a click handler: return ( <div> <button onClick={this.panToArcDeTriomphe}>Go to Arc De Triomphe</button> <div ref="map" style={mapStyle}>I should be a map!</div> </div> ); You might have noticed that I am not returning not just the map <div>, but rather one surrounding <div> that contains both the map and the button. This is because the render() method can only return one child element, that optionally has children of its own. To add the click handler logic, we first need to know how we can achieve panning in the Google Maps JS API. We can use the Google Maps JS API Reference to find this out. Luckily, there's a .panTo() method that takes a latLng pair, much like the one we used to instantiate the map. Let's add the method to pan to the desired location: panToArcDeTriomphe() { this.map.panTo(ARC_DE_TRIOMPHE_POSITION); } If you click the button, you'll notice that the map doesn't pan yet. That is because React ES2015 components do not autobind your methods for you. In the .panToArcDeTriomphe() method, we don't have access to the right scope, and cannot access this.map. To fix this, you can use .bind() to create a new function that does have the right scope. This can be done either when defining the click handler, or in your constructor. I prefer placing the .bind() stuff in the constructor since it's a little cleaner: constructor() { super(); this.panToArcDeTriomphe = this.panToArcDeTriomphe.bind(this); } If you click the button now, it should pan your map to the right location. If you feel like you missed something or have run into any errors, check out the solution on Codepen if you need a nudge in the right direction. Found this tutorial helpful? Be sure to sign up for Codementor's React Live Class where you can learn React with a live instructor! You can also find Thomas's original blog post here. Hi I need learning support for javascript oops can the source code be shared for this tutorial, please? +1
https://www.codementor.io/thomastuts/integrate-google-maps-api-react-refs-du10842zd
CC-MAIN-2017-22
refinedweb
1,216
71.24
[ ] Pallavi Rao commented on FALCON-1573: ------------------------------------- [~ddcprg], totally appreciate your contribution. I agree that your patch keeps it simple. However, personally, I prefer the second approach you proposed - that of using a namespace for user properties. A few reasons for my preference: 1. We have been wanting to distinguish between falcon system properties(falcon.system) and user properties(falcon.user) in the entity definition for a while now. This also enables users to override the values at schedule time, that is more intuitive for a user. 2. Having namespace allows Falcon to consume what is relevant to it and pass on to downstream engines what is not. For example, when user says falcon.x.y, Falcon will intercept it. If it is oozie.x.y, it will just pass it along to Oozie. 3. It fits well with our uber feature where we want to support definition time, deployment time and runtime properties. 4. If we do not use namespace when we introduce the feature, it becomes hard to introduce later because it would break backward compatibility. Thoughts are more than welcome. > Supply user-defined properties to Oozie workflows during schedule > ----------------------------------------------------------------- > > Key: FALCON-1573 > URL: > Project: Falcon > Issue Type: New Feature > Components: oozie > Affects Versions: trunk > Reporter: Daniel del Castillo > Priority: Minor > Fix For: trunk > >)
http://mail-archives.apache.org/mod_mbox/falcon-dev/201511.mbox/%3CJIRA.12908857.1446115125000.146586.1446612807918@Atlassian.JIRA%3E
CC-MAIN-2017-51
refinedweb
215
59.3
Firebase Hosting has additional features that let you customize how your content is hosted. This article describes custom error pages, redirects, rewrites, and headers. Custom 404/Not Found page Specify a custom 404 Not Found error to serve when a user tries to access a page that doesn't exist. Add a 404.html page to your project's public directory to display the content of the 404.html page when Firebase Hosting needs to serve a 404 Not Found error to a user. Redirects Use a URL redirect to prevent broken links if a page has moved or for URL shortening. When a browser attempts to open a specified source URL, the destination URL is opened instead and the browser's location is updated to that destination URL. For example, you could redirect example.com/team to example.com/about.html. Specify URL redirects by defining a redirects section within hosting in the firebase.json file: "hosting": { // Add the "redirects" section within "hosting" "redirects": [ { "source" : "/foo", "destination" : "/bar", "type" : 301 }, { "source" : "/firebase/*", "destination" : "", "type" : 302 } ] } The redirects setting is an optional parameter that contains an array of redirect rules. Each rule must specify a source, destination, and type. The source parameter is a glob pattern that is matched against all URL paths at the start of every request (before it's determined whether a file or folder exists at that path). If a match is found, an HTTP redirect response is set with the "Location" header set to the static destination string, which can be a relative path or an absolute URL. Finally, the type parameter specifies the specific HTTP response code served and can either be 301 for 'Moved Permanently' or 302 for 'Found' (Temporary Redirect). Rewrites Use a rewrite to show the same content for multiple URLs. Rewrites are particularly useful with pattern matching, as you can accept any URL that matches the pattern and let the client-side code decide what to display. For example, you can use rewrite rules to support apps that use HTML5 pushState for navigation. When a browser attempts to open a specified source URL, it will be given the contents of the file at the destination URL. Specify URL rewrites by defining a rewrites section within hosting in the firebase.json file: "hosting": { // Add the "rewrites" section within "hosting" "rewrites": [ { "source": "**", "destination": "/index.html" } ] } The rewrites setting is an optional parameter that contains an array of internal rewrite rules. Similar to redirects above, each rewrite rule must have a source glob pattern and a local destination (which should exist and be a file). When a file or folder does not exist at the specified source, Firebase Hosting applies the rewrite rule and returns the actual content of the specified destination file instead of an HTTP redirect. In the example above, if any file in any folder doesn't exist, the rewrite rule returns the content of /index.html. This can be useful for apps that utilize HTML5 pushState. Headers Specify custom, file-specific headers by defining a headers section within hosting in the firebase.json file: "hosting": { // Add the "headers" section within "hosting". "headers": [ { "source" : "**/*.@(eot|otf|ttf|ttc|woff|font.css)", "headers" : [ { "key" : "Access-Control-Allow-Origin", "value" : "*" } ] }, { "source" : "**/*.@(jpg|jpeg|gif|png)", "headers" : [ { "key" : "Cache-Control", "value" : "max-age=7200" } ] }, { // Sets the cache header for 404 pages to cache for 5 minutes "source" : "404.html", "headers" : [ { "key" : "Cache-Control", "value" : "max-age=300" } ] } ] } The headers setting is an optional parameter that contains an array of custom header definitions. Each definition must have a source key that is matched against the original request path regardless of any rewrite rules using glob notation. Each definition must also have an array of headers to be applied, each with a key and a value. The example above specifies a CORS header for all font files and overrides the default one hour browser cache with a two hour cache for image files. Note that the following headers cannot be set using a headers configuration: Strict-Transport-Security Public-Key-Pinning Set-Cookie See all available configuration options in the Deployment Configuration reference. Hosting priorities The different configuration options can sometimes overlap. If there is a conflict, the response from Firebase Hosting is determined in the following priority order: - Reserved namespace ( /__*) - Configured redirects - Exact-match static content - Configured rewrites - Custom 404 page - Default 404 page
https://firebase.google.com/docs/hosting/url-redirects-rewrites
CC-MAIN-2018-26
refinedweb
731
53.1
Modin (Pandas on Ray)¶ Modin, previously Pandas on Ray, is a dataframe manipulation library that allows users to speed up their pandas workloads by acting as a drop-in replacement. Modin also provides support for other APIs (e.g. spreadsheet) and libraries, like xgboost. import modin.pandas as pd import ray ray.init() df = pd.read_parquet("s3://my-bucket/big.parquet") You can use Modin on Ray with your laptop or cluster. In this document, we show instructions for how to set up a Modin compatible Ray cluster and connect Modin to Ray. Note In previous versions of Modin, you had to initialize Ray before importing Modin. As of Modin 0.9.0, This is no longer the case. Using Modin with Ray’s autoscaler¶ In order to use Modin with Ray’s autoscaler, you need to ensure that the correct dependencies are installed at startup. Modin’s repository has an example yaml file and set of tutorial notebooks to ensure that the Ray cluster has the correct dependencies. Once the cluster is up, connect Modin by simply importing. import modin.pandas as pd import ray ray.init(address="auto") df = pd.read_parquet("s3://my-bucket/big.parquet") As long as Ray is initialized before any dataframes are created, Modin will be able to connect to and use the Ray cluster. Modin with the Ray Client¶ When using Modin with the Ray Client, it is important to ensure that the cluster has all dependencies installed. import modin.pandas as pd import ray import ray.util ray.init("ray://<head_node_host>:10001") df = pd.read_parquet("s3://my-bucket/big.parquet") Modin will automatically use the Ray Client for computation when the file is read. How Modin uses Ray¶ Modin has a layered architecture, and the core abstraction for data manipulation is the Modin Dataframe, which implements a novel algebra that enables Modin to handle all of pandas (see Modin’s documentation for more on the architecture). Modin’s internal dataframe object has a scheduling layer that is able to partition and operate on data with Ray. Dataframe operations¶ The Modin Dataframe uses Ray tasks to perform data manipulations. Ray Tasks have a number of benefits over the actor model for data manipulation: Multiple tasks may be manipulating the same objects simultaneously Objects in Ray’s object store are immutable, making provenance and lineage easier to track As new workers come online the shuffling of data will happen as tasks are scheduled on the new node Identical partitions need not be replicated, especially beneficial for operations that selectively mutate the data (e.g. fillna). Finer grained parallelism with finer grained placement control Machine Learning¶ Modin uses Ray Actors for the machine learning support it currently provides. Modin’s implementation of XGBoost is able to spin up one actor for each node and aggregate all of the partitions on that node to the XGBoost Actor. Modin is able to specify precisely the node IP for each actor on creation, giving fine-grained control over placement - a must for distributed training performance.
https://docs.ray.io/en/master/data/modin/index.html
CC-MAIN-2022-05
refinedweb
507
54.02
As I understand it, we can use sqlite instead which doesn't use the posix io functions that break dbm's build. Created attachment 347347 [details] [diff] [review] patch v1 Created attachment 347361 [details] [diff] [review] patch v2 Comment on attachment 347361 [details] [diff] [review] patch v2 This patch makes changes to NSS that are desired by the Fennec project, but it makes them for all users who would build NSS on WinCE. In effect, Fennec assumes it is and will be the only use of NSS on WinCE. I think that if the Fennec project decides to omit parts of NSS from the build, the Makefiles should be ifdef FENNEC rather than (or in addition to) ifdef WINCE. until someone fixes dbm for wince, no project will be able to use it. > until someone fixes dbm for wince, That work was previously done, long ago. I'll bet it's still on a branch somewhere. *** Bug 460923 has been marked as a duplicate of this bug. *** nelson, lets just add a configure flag that allows anyone do enable or disable DBM. Created attachment 349382 [details] [diff] [review] uses --disable-dbm thanks brad. this is great. Comment on attachment 349382 [details] [diff] [review] uses --disable-dbm +[ --disable-dbm Disable building dbm], Should we be more specific and call this --disable-nss-dbm ? I hate having hard-to-decipher build flags. +ifndef NSS_DISABLE_DBM ifdef MOZ_MORK DIRS = mdb mork endif +endif Are NSS_DISABLE_DBM and MOZ_MORK mutually exclusive? --- a/dbm/Makefile.in I can't for the life of me figure out how the build gets into dbm/. Does NSS call back down into there? Seems silly to comment out the DIRS in this dir, we should just ask NSS not to build in this dir, if possible. r=me on the mozilla build system bits. I object to NSS bugs being double-secret Confidential Mozilla Project Bugs. Any change made to NSS needs to have the scrutiny of all NSS developers. I lack the power to remove that flag, or I would.. NSS builds dbm in the directory security/dbm. The make in that directory is invoked from the Makefile in security/nss. Look at the build_dbm target in security/nss/Makefile (In reply to comment #11) > I object to NSS bugs being double-secret Confidential Mozilla Project Bugs. > Any change made to NSS needs to have the scrutiny of all NSS developers. > I lack the power to remove that flag, or I would. agreed. Doug, did you set it for a reason? > >. We're not setting the default behavior of windows ce with this patch, instead creating a configure flag to disable dbm building since dbm uses posix io functions not available on windows ce. The app we're building (xulrunner and anything else built with the mozilla build system) sets the NSS_DEFAULT_DB_TYPE env var to sql. Is one of the other 2 ways a build flag that we can set so the configure flag can handle it? it should NOT be confidential. Thanks for dropping that flag. I don't object (at all!) to creating a build-time option to build NSS such that it always uses sql and never uses dbm. In fact, I welcome it. Such a project needs to: a) be configurable on all platforms, enabled through a "feature test macro" such as "NSS_SQL_ONLY" or "NSS_NO_DBM" that is not tied to any one platform (not WINCE). and b) change the behavior of NSS when built that way so that by default, even without a "sql:" prefix on the DB directory name and without NSS_DEFAULT_DB_TYPE in the environment, NSS will use sql, and not attempt to use dbm. I perceive the above two characteristics to be requirements for this RFE. In addition, there's a LOT more code than just the DBM directory that can be left out of such a configuration. The memory "footprint" of NSS could be reduced significantly when built that way. But I wouldn't require that for this RFE. Changing the default form of DB used by NSS in the absence of a directory name prefix or NSS_DEFAULT_DB_TYPE envariable is a very simple fix. I think it's just one line. This one: NSS_DISABLE_DBM looks like it will do nicely for the FTM. This patch conditionally removes mcom_db.h from a number of files in the certdb directory. If everything compliles correctly, I think we should always remove mcom_db.h from those files. I believe the are an ancient historical dreg. libnssdbm was put in it's own shared library precisely so it could be easy to drop from a distribution (as long as that distribution never needed to reference old NSS dbm databases). It also reduces the in memory footprint of applications that are not actively using the database. I agree such a distribution should make sql: the default. Nelson has correctly identified the correct line of code to change. Comment on attachment 349382 [details] [diff] [review] uses --disable-dbm This is close, but a few changes are needed. There are certain files modified by this patch that I have excluded from my review because they are outside of NSS. Some reviewer for the module(s) that contain those files should review them. They are: mozilla/config/autoconf.mk.in mozilla/configure.in mozilla/db/Makefile.in mozilla/security/manager/Makefile.in I believe no change is required to mozilla/dbm/Makefile.in because AFAIK, that is a dead file. The makefiles actually used to build dbm are not in this directory but rather are in mozilla/security/dbm. I believe the lines you want to undo are: and the way to do that is to add some lines in section 6 of mozilla/security/dbm/Makefile to conditionally redefine DIRS = $(NULL) because manifest.mn should have no ifdefs. Bob's right that, IFF mcom_db.h is not needed, those 8 #includes should just be deleted. But If they are needed, then rather than ifdef'ing the #include "mcom_db.h" in 8 files, I might suggest putting that ifdef into the mcom_db.h source file, bracketing the file's entire contents. To make that work, you would change the patch to the build_dbm target in mozilla/security/nss/Makefile to just make the export target, not the libs target. If mcom_db.h is not needed any more at all, then, rather than changing the build_dbm target in mozilla/security/nss/Makefile to do nothing (as this patch does), I would suggest changing it to output (echo) a string such as "skipping the build of DBM". Rather than modifying the contents of file mozilla/security/nss/lib/softoken/legacydb/Makefile to disable the build of that directory, you can just add about 3 lines into section 6 of file mozilla/security/nss/lib/softoken/Makefile that conditionally redefine DIRS = $(NULL) if the FTM is defined. Note: manifest.mn should not have ifdefs. Created attachment 349795 [details] [diff] [review] removes mcom, removes dead makefile, fixes ruleset.mk, clears DIRS as nelson suggested we can carry the r=ted for the non-nss bits of this patch since they didn't change Unsolicited comments: I'm not sure I would removed SDB_LEGACY altogether. It may be preferable to have applications fail when explicitly requesting opening dbm databases rather than silently moving to sql databases. Your changes a line 548 is sufficient to switch any applications that don't explicitly specify which database to open sql databases and your changes at line 593 are sufficient to prevent selection of dbm databases based on the user setting an environment variable. All other cases someone explicitly decided that the specific database to open was an old dbm database, so I think that case should simply fail (which it will when if fails to load libnssdbm3.so... er.. or nssdbm3.dll). If you do remove SDB_LEGACY, then you also need to remove SDB_MULTIACCESS. The now defunct multiaccess database code is implemented in nssdbm3 (with appropriate shared library decoration). Multiaccess loaded an external module that had a DBM programming interface, so it used the DBM mapping code. bob Comment on attachment 349795 [details] [diff] [review] removes mcom, removes dead makefile, fixes ruleset.mk, clears DIRS as nelson suggested This patch is really close. I'm delighted to learn that no sources outside of nss/lib/softoken/legacydb and dbm itself need mcom_db.h. Truly. I agree with Bob 100% that an attempt to use the dbm: or multiaccess: prefixes (which explicitly request the use of something like the old DB) should return an error instead of silently using cert9 and sql instead. The change to the default implementation should suffice. So, do NOT ifdef out SDB_LEGACY. Thanks. The proposed change to security/coreconf/ruleset.mk simply breaks the build. It causes the "for" statement to evaluate $directory as a single value which is a string that is the concatenation of all the DIRS, e.g. as "lib cmd", and of course, you cannot cd to "lib cmd". So, that change is bad. r- for that. Created attachment 349937 [details] [diff] [review] leaves SDB_LEGACY alone note that ruleset.mk doesn't handled an empty DIRS out of the box. If it encounters and empty DIRS, sh can't parse the script (at least on windows) because it evaluates as "for directory in ; do" and ';' is not a valid list. I've appended "dummy" to the list of dirs to avoid this, which will get ignored after the following test and should be harmless. If there's a more elegant way to do this, please let me know. Created attachment 350095 [details] [diff] [review] patch - also builds nss/cmd (checked in on trunk) I was ready to give r+ to the preceding patch, but I applied it to the trunk and tried to build NSS, and found that the cmd directory did not build. So, I fixed that and created a new patch. Bob, please review. This patch is basically the same as the previous one, except a) It only modifies files that are part of NSS, b) Instead of adding "dummy" to the for command in coreconf/ruleset.mk it changes the makefiles that are defining DIR = $(NULL) to instead define DIR = dummy . It does not change ruleset.mk . c) it also modifies security/nss/cmd/platlibs.mk so that the utilities all build when NSS_DISABLE_DBM is defined. I have successfully built the CVS trunk of NSS, including libs and cmds, both with and without NSS_DISABLE_DBM, with this patch. I'd like the Fennec guys to test this patch, and confirm here that it works for them. Remember, this patch includes only the NSS files. Comment on attachment 349937 [details] [diff] [review] leaves SDB_LEGACY alone I almost gave r+ to this patch, but then I tried it. I pulled the trunk and applied it, and tried building both with and without NSS_DISABLE_DBM. I found that with that symbol defined, the NSS utility programs don't build. I have produced a new patch that fixes it. It awaits review. Created attachment 350111 [details] [diff] [review] non-nss parts of previousl patch [Checked in: Comment 29 & 31] Nelson, you patch built just fine on windows ce. I've attached the non-nss parts of the previous patch and carried ted's review. Comment on attachment 350095 [details] [diff] [review] patch - also builds nss/cmd (checked in on trunk) r+ rrelyea Comment on attachment 350095 [details] [diff] [review] patch - also builds nss/cmd (checked in on trunk) Checked in on trunk. dbm/Makefile.in; new: 1.10; previous: 1.9 security/coreconf/config.mk; new: 1.26; previous: 1.25 security/dbm/Makefile; new: 1.3; previous: 1.2 security/nss/Makefile; new: 1.36; previous: 1.35 security/nss/cmd/platlibs.mk; new: 1.59; previous: 1.58 security/nss/lib/certdb/certdb.c; new: 1.95; previous: 1.94 security/nss/lib/certdb/genname.c; new: 1.37; previous: 1.36 security/nss/lib/certdb/stanpcertdb.c; new: 1.83; previous: 1.82 security/nss/lib/certdb/xauthkid.c; new: 1.8; previous: 1.7 security/nss/lib/certdb/xbsconst.c; new: 1.6; previous: 1.5 security/nss/lib/certdb/xconst.c; new: 1.13; previous: 1.12 security/nss/lib/pk11wrap/secmodi.h; new: 1.31; previous: 1.30 security/nss/lib/softoken/Makefile; new: 1.7; previous: 1.6 security/nss/lib/softoken/pkcs11.c; new: 1.155; previous: 1.154 security/nss/lib/softoken/sftkpars.c; new: 1.7; previous: 1.6 security/nss/lib/softoken/legacydb/config.mk; new: 1.8; previous: 1.7 non-nss patch pushed to m-c Comment on attachment 350111 [details] [diff] [review] non-nss parts of previousl patch [Checked in: Comment 29 & 31] a191=beltzner this landed on the 1.9.1 branch. adding keyword fixed1.9.1 Created attachment 546457 [details] [diff] [review] Supplemental cleanup patch Brad: This patch cleans up your NSS patch (attachment 350095 [details] [diff] [review]) that Nelson checked in for you. 1. In mozilla/security/nss/Makefile, add '@' to the echo command so that gmake won't echo the echo command. I also change ifndef to ifdef and reverse the two branches. 2. mozilla/security/nss/lib/softoken/legacydb/config.mk does not need to check NSS_DISABLE_DBM because that entire directory is skipped for NSS_DISABLE_DBM. Comment on attachment 546457 [details] [diff] [review] Supplemental cleanup patch Review of attachment 546457 [details] [diff] [review]: ----------------------------------------------------------------- Comment on attachment 546457 [details] [diff] [review] Supplemental cleanup patch I moved this patch to bug 700066.
https://bugzilla.mozilla.org/show_bug.cgi?id=464088
CC-MAIN-2016-50
refinedweb
2,253
66.64
? In Direct3D 10 you might have used the D3D10_CREATE_DEVICE_DEBUG flag with a D3D10CreateDeviceAndSwapChain or D3D10CreateDevice call. In a D3D 11.1-based Metro style app you get an analogous D3D11_CREATE_DEVICE_DEBUG flag to pass to D3D11CreateDevice and in fact the Direct3D App project template does that for you in the Debug Solution Configuration. #if defined(_DEBUG) // If the project is in a debug build, enable debugging via SDK Layers with this flag. creationFlags |= D3D11_CREATE_DEVICE_DEBUG; #endif I believe the difference is that you used to need to something like this to trace the errors: #include <dxerr.h> // link to dxerr.lib HRESULT hr = CreateDevice( ... ); if( FAILED(hr) ) { DXTrace( __FILE__, __LINE__, hr, DXGetErrorDescription(hr), FALSE ); } DxErr is not available in Windows 8 though. I spent some time looking for it and trying to add some tracing in DirectXHelper.h/DX::ThrowIfFailed() until I decided to check the Output Window (Ctrl+W,O) and lo and behold – there are all the helpful messages like: D3D11 ERROR: ID3D11Device::CreateBuffer: The Dimensions are invalid. For ConstantBuffers, marked with the D3D11_BIND_CONSTANT_BUFFER BindFlag, the ByteWidth (value = 4) must be a multiple of 16. ByteWidth must also be less than or equal to 65536 on the current driver. [ STATE_CREATION ERROR #66: CREATEBUFFER_INVALIDDIMENSIONS] You can also tag your resources using SetPrivateData calls to get names of allocated objects when looking at memory leaks. Then there are new shader tracing APIs that you can explore. Lots of helpful tools that make developing in Direct3D a bit more sane. The gist of it though is that if you get exceptions in your Direct3D code you should look at your Output Window before doing anything else. Note – for general purpose tracing from your C++ code – you can call OutputDebugString(L”Trace”). If you build a trace line from a Platform::String – you just need to pass its ->Data. Also – this article mentions how you would open a console window in a WinRT app:
https://blog.onedevjob.com/2012/06/05/debug-layer-in-direct3d-11-1-metro-style-applications/?replytocom=605
CC-MAIN-2019-35
refinedweb
320
63.7
Validating a Username via jQuery with Ajax It all starts when John hits your website and clicks the big 'Register' link. John types his name, '_John_' into the username box, and hands over his e-mail address and password (unless you're cool and hip, and you let him sign up using his OpenID) and hit 'Submit', just like every other website he's signed up to in the past. Except this time, somebody else called John (what are the chances, eh?) has already signed up using that username, so after waiting a few seconds John sees an error message asking him to select another username. He types a new username and tries 'Submit' again, unsure as to whether his new selection will be suitable. So we fix this problem easily - we tell your users, while they're entering their username, whether their selection is available. To achieve this we're going to use jQuery with it's fantastic Ajax support. To get started, we create a simple view in Django that confirms the presence of a given username. This view will be accessible at /check_username/; and will expect a username via a GET paramater. def checkusername(request): from django.contrib.auth.models import User from django.http import HttpResponse username = request.POST.get('username', False) if username: u = User.objects.filter(username=username).count() if u != 0: res = "Already In Use" else: res = "OK" else: res = "" return HttpResponse('%s' % res) You'll now find that accessing /checkusername/?username=john_ will return 'Already in Use' or 'OK', as required. The next thing to do is access it from within your registration form. I use James Bennett's fantastic django-registration with a customised template. This means I don't have to alter the registration code at all! I've added a little element just next to the username field, which we'll update shortly. The username field on my form looks like this: <dt><label for="id_username">Username:</label></dt> <dd>{{ form.username }} <span id='username_status'></span> {% if form.username.errors %}<span class="formerror">{{ form.username.errors|join:", " }}</span>{% endif %}</dd> We've got an empty there called usernamestatus_. Now, when the user types a username, we want to check that username via background AJAX call and update the <span%gt; appropriately. In the header of your registration form (I use a block in my templates called {% block extrahead %} which is inside theof my base.html) you will need to add a handful of lines of JavaScript: <script type='text/javascript' src='/media/jquery.js'></script> <script type='text/javascript'> var"); $("#username_status").load('/check_username/', {username: username}, function() {in_ajax = 0;}); } previous_username = username; } $(function() { setInterval("checkUsername()", 1000); }); </script> This code is relatively simple. Firstly, it loads jquery.js, which I hope by now you've downloaded and placed into a suitable media directory. Then, using the last 3 lines, it causes the checkUsername() function to be called every second. This function does an AJAX request to our checkusername_ view and puts the response into our usernamestatus_ . We do a few niceties here, too. Firstly, we make sure the username isn't the same as when we last checked it (no point in checking the same username every second - it would increase server load with no real benefit). We also put a 'busy' image into the status area whilst doing the AJAX call - I use a simple image from ajaxload.info. Net result? The user gets real-time feedback on whether their username is available, so they don't have to think as hard when the page re-loads with an error message. Note that this won't stop the user submitting a form with an invalid username - if they do submit it, they'll get an error message as per usual. All this function does is provide some nice feedback to users who wish to use it. Signing up to a website should be easy, after all.
http://www.rossp.org/blog/2007/aug/20/django-ajax-username-validation/
crawl-002
refinedweb
655
64.91
When looking for a random floating-point number, we usually want a value between 0 and 1 that is just as likely to be between 0 and 0.1 as it is to be between 0.9 and 1. Because of the way that floating-point numbers are stored, simply casting bits to a float will make the distribution nonuniform. Instead, get a random unsigned integer, and divide. Because integer values are uniformly distributed, you can get a random integer and divide so that it is a value between 0 and 1: #include <limits.h> double spc_rand_real(void) { return ((double)spc_rand_uint( )) / (double)UINT_MAX; } Note that to get a random number between 0 and n, you can multiply the result of spc_rand_real( ) by n. To get a real number within a range inclusive of the range's bounds, do this: #include <stdlib.h> double spc_rand_real_range(double min, double max) { if (max < min) abort( ); return spc_rand_real( ) * (max - min) + min; }
http://etutorials.org/Programming/secure+programming/Chapter+11.+Random+Numbers/11.12+Getting+a+Random+Floating-Point+Value+with+Uniform+Distribution/
CC-MAIN-2017-04
refinedweb
157
63.49
> Sorry I should have been clearer. My example meant the > default package, and > the question was in relation to what would > happen if classes/packages were the same. > > ie > WEB-INF/lib/a.jar > contains; > org.apache.C > > WEB-INF/lib/b.jar > contains; > org.apache.C > > Which C is loaded? The first class in the classpath Depending on how the filesystem on the OS you are working on. In other words, I believe in windows it would end up being the a.jar class that is loaded. The reasoning behind this is found in the following: javac -classpath .\Classes\A.jar;..\OptClasses\A.jar Something.java The .\Classes\A.jar class are actually loaded by the classloader and the OptClasses\A.jar ones are essentially ignored. I imagine in most cases, Unix flavors included, it would be a.jar that gets loaded into the class namespace. An easy way to test this is create two jars(a.jar and b.jar) with the same class but the two classes differ in a System.out.println call and then create an instance of that class and see which println you get. Please correct me if I'm wrong anyone? --- Michael Wentzel Software Developer <A HREF="">Software As We Think</A> <A HREF="mailto://wentzel@aswethink.com">Michael Wentzel</A>
http://mail-archives.apache.org/mod_mbox/tomcat-users/200101.mbox/%3CA1C69E9A4D29D311AFE000A024CA0B0B0F37BF@snax.thwt.com%3E
CC-MAIN-2016-30
refinedweb
219
61.83
On Thu, Mar 8, 2018 at 5:44 PM, Kees Cook <keescook@chromium.org> wrote:>> My concerns are mostly about crossing namespaces. If a container> triggers an autoload, the result runs in the init_ns.Heh. I saw that as an advantage. It's basically the same semantics asa normal module load does - in that the "kernel namespace" is init_ns.My own personal worry is actually different - we do check thesignature of the file we're loading, but we're then passing it off toexecve() not as the image we loaded, but as the file pointer.So the execve() will end up not using the actual buffer we checked thesignature on, but instead just re-reading the file.Now, that has two issues: (a) it means that 'init_module' doesn't work, only 'finit_module'. Not a big deal, but I do think that we should fail the 'info->file== NULL' case explicitly (instead of failing when it does an execve()of /dev/null, which is what I think it does now - but that's just fromthe reading the patch, not from testing it). (b) somebody could maybe try to time it and modify the fileafter-the-fact of the signature check, and then we execute somethingelse.Honestly, that "read twice" thing may be what scuttles this.Initially, I thought it was a non-issue, because anybody who controlsthe module subdirectory enough to rewrite files would be in a positionto just execute the file itself directly instead.But it turns out that isn't needed. Some bad actor could just do"finit_module()" with a file that they just *copied* from the moduledirectory.Yes, yes, they still need CAP_SYS_MODULE to even get that far, but itdoes worry me.So this does seem to turn "CAP_SYS_MODULE" into meaning "can run anyexecutable as root in the init namespace". They don't have to have themodule signing key that I thought would protect us, because they cando that "rewrite after signature check".So that does seem like a bad problem with the approach.So I don't like Andy's "let's make it a kernel module and then thatkernel module can execve() a blob". THAT seems like just stupidindirection.But I do like Andy's "execve a blob" part, because it is the *blob*that has had its signature verified, not the file! Linus
https://lkml.org/lkml/2018/3/8/1524
CC-MAIN-2018-13
refinedweb
388
62.88
PTHREAD_CREATE(3) Linux Programmer's Manual PTHREAD_CREATE(3) pthread_create - create a new thread #include <pthread.h> int pthread_create(pthread_t *thread, const pthread_attr_t *attr, void *(*start_routine) (void *), void *arg); Compile and link with -pthread. The pthread_create() function starts a new thread in the calling process. The new thread starts execution by invoking start_routine(); arg is passed as the sole argument of start_routine(). The new thread terminates in one of the following ways: * It calls pthread_exit(3), specifying an exit status value that is available to another thread in the same process that calls pthread_join(3). * It returns from start_routine(). This is equivalent to calling pthread_exit(3) with the value supplied in the return statement. * It is canceled (see pthread_cancel(3)). * Any of the threads in the process calls exit(3), or the main thread performs a return from main(). This causes the termination of all threads in the process. The attr argument points to a pthread_attr_t structure whose contents are used at thread creation time to determine attributes for the new thread; this structure is initialized using pthread_attr_init(3) and related functions. If attr is NULL, then the thread is created with default attributes. Before returning, a successful call to pthread_create() stores the ID of the new thread in the buffer pointed to by thread; this identifier is used to refer to the thread in subsequent calls to other pthreads functions. The new thread inherits a copy of the creating thread's signal mask (pthread_sigmask(3)). The set of pending signals for the new thread is empty (sigpending(2)). The new thread does not inherit the creating thread's alternate signal stack (sigaltstack(2)). The new thread inherits the calling thread's floating-point environment (fenv(3)). The initial value of the new thread's CPU-time clock is 0 (see pthread_getcpuclockid(3)). Linux-specific details The new thread inherits copies of the calling thread's capability sets (see capabilities(7)) and CPU affinity mask (see sched_setaffinity(2)). On success, pthread_create() returns 0; on error, it returns an error number, and the contents of *thread are undefined. EAGAIN Insufficient resources to create another thread. threads, /proc/sys/kernel/threads-max, was reached (see proc(5)); or the maximum number of PIDs, /proc/sys/kernel/pid_max, was reached (see proc(5)). EINVAL Invalid settings in attr. EPERM No permission to set the scheduling policy and parameters specified in attr. POSIX.1-2001. See pthread_self(3) for further information on the thread ID returned in *thread by pthread_create(). Unless real-time scheduling policies are being employed, after a call to pthread_create(), it is indeterminate which thread—the caller or the new thread—will next execute. A thread may either be joinable or detached. If a thread is joinable, then another thread can call pthread_join(3) to wait for the thread to terminate and fetch its exit status. Only when a terminated joinable thread has been joined are the last of its resources released back to the system. When a detached thread terminates, its resources are automatically released back to the system: it is not possible to join with the thread in order to obtain its exit status. Making a thread detached is useful for some types of daemon threads whose exit status the application does not need to care about. By default, a new thread is created in a joinable state, unless attr was set to create the thread in a detached state (using pthread_attr_setdetachstate(3)). On Linux/x86-32, the default stack size for a new thread is 2 megabytes. Under the NPTL threading implementation, if the RLIMIT_STACK soft resource limit at the time the program started has any value other than "unlimited", then it determines the default stack size of new threads. Using pthread_attr_setstacksize(3), the stack size attribute can be explicitly set in the attr argument used to create a thread, in order to obtain a stack size other than the default. In the obsolete LinuxThreads implementation, each of the threads in a process has a different process ID. This is in violation of the POSIX threads specification, and is the source of many other nonconformances to the standard; see pthreads(7). The program below demonstrates the use of pthread_create(), as well as a number of other functions in the pthreads API. In the following run, on a system providing the NPTL threading implementation, the stack size defaults to the value given by the "stack size" resource limit: $ ulimit -s 8192 # The stack size limit is 8 MB (0x800000 bytes) $ ./a.out hola salut servus Thread 1: top of stack near 0xb7dd03b8; argv_string=hola Thread 2: top of stack near 0xb75cf3b8; argv_string=salut Thread 3: top of stack near 0xb6dce3b8; argv_string=servus Joined with thread 1; returned value was HOLA Joined with thread 2; returned value was SALUT Joined with thread 3; returned value was SERVUS In the next run, the program explicitly sets a stack size of 1MB (using pthread_attr_setstacksize(3)) for the created threads: $ ./a.out -s 0x100000 hola salut servus Thread 1: top of stack near 0xb7d723b8; argv_string=hola Thread 2: top of stack near 0xb7c713b8; argv_string=salut Thread 3: top of stack near 0xb7b703b8; argv_string=servus Joined with thread 1; returned value was HOLA Joined with thread 2; returned value was SALUT Joined with thread 3; returned value was SERVUS Program source #include <pthread.h> #include <string.h> #include <stdio.h> #include <stdlib.h> #include <unistd.h> #include <errno.h> #include <ctype.h> #define handle_error_en(en, msg) \ do { errno = en; perror(msg); exit(EXIT_FAILURE); } while (0) #define handle_error(msg) \ do { perror(msg); exit(EXIT_FAILURE); } while (0) struct thread_info { /* Used as argument to thread_start() */ pthread_t thread_id; /* ID returned by pthread_create() */ int thread_num; /* Application-defined thread # */ char *argv_string; /* From command-line argument */ }; /* Thread start function: display address near top of our stack, and return upper-cased copy of argv_string */ static void * thread_start(void *arg) { struct thread_info *tinfo = arg; char *uargv, *p; printf("Thread %d: top of stack near %p; argv_string=%s\n", tinfo->thread_num, &p, tinfo->argv_string); uargv = strdup(tinfo->argv_string); if (uargv == NULL) handle_error("strdup"); for (p = uargv; *p != '\0'; p++) *p = toupper(*p); return uargv; } int main(int argc, char *argv[]) { int s, tnum, opt, num_threads; struct thread_info *tinfo; pthread_attr_t attr; int stack_size; void *res; /* The "-s" option specifies a stack size for our threads */ stack_size = -1; while ((opt = getopt(argc, argv, "s:")) != -1) { switch (opt) { case 's': stack_size = strtoul(optarg, NULL, 0); break; default: fprintf(stderr, "Usage: %s [-s stack-size] arg...\n", argv[0]); exit(EXIT_FAILURE); } } num_threads = argc - optind; /* Initialize thread creation attributes */ s = pthread_attr_init(&attr); if (s != 0) handle_error_en(s, "pthread_attr_init"); if (stack_size > 0) { s = pthread_attr_setstacksize(&attr, stack_size); if (s != 0) handle_error_en(s, "pthread_attr_setstacksize"); } /* Allocate memory for pthread_create() arguments */ tinfo = calloc(num_threads, sizeof(struct thread_info)); if (tinfo == NULL) handle_error("calloc"); /* Create one thread for each command-line argument */ for (tnum = 0; tnum < num_threads; tnum++) { tinfo[tnum].thread_num = tnum + 1; tinfo[tnum].argv_string = argv[optind + tnum]; /* The pthread_create() call stores the thread ID into corresponding element of tinfo[] */ s = pthread_create(&tinfo[tnum].thread_id, &attr, &thread_start, &tinfo[tnum]); if (s != 0) handle_error_en(s, "pthread_create"); } /* Destroy the thread attributes object, since it is no longer needed */ s = pthread_attr_destroy(&attr); if (s != 0) handle_error_en(s, "pthread_attr_destroy"); /* Now join with each thread, and display its returned value */ for (tnum = 0; tnum < num_threads; tnum++) { s = pthread_join(tinfo[tnum].thread_id, &res); if (s != 0) handle_error_en(s, "pthread_join"); printf("Joined with thread %d; returned value was %s\n", tinfo[tnum].thread_num, (char *) res); free(res); /* Free memory allocated by thread */ } free(tinfo); exit(EXIT_SUCCESS); } getrlimit(2), pthread_attr_init(3), pthread_cancel(3), pthread_detach(3), pthread_equal(3), pthread_exit(3), pthread_getattr_np(3), pthread_join(3), pthread_self(3), pthreads(7) This page is part of release 3.70 of the Linux man-pages project. A description of the project, information about reporting bugs, and the latest version of this page, can be found at. Linux 2014-05-28 PTHREAD_CREATE(3)
http://man7.org/linux/man-pages/man3/pthread_create.3.html
CC-MAIN-2014-35
refinedweb
1,313
52.8
Tee in PythonI needed a way to send the output of a Python program to two places simultaneously: print it on-screen, and save it to a file. Normally I'd use the Linux command tee for that: prog | tee prog.out saves a copy of the output to the file prog.out as well as printing it. That worked fine until I added something that needed to prompt the user for an answer. That doesn't work when you're piping through tee: the output gets buffered and doesn't show up when you need it to, even if you try to flush() it explicitly. I investigated shell-based solutions: the output I need is on sterr, while Python's raw_input() user prompt uses stdout, so if I could get the shell to send stderr through tee without stdout, that would have worked. My preferred shell, tcsh, can't do this at all, but bash supposedly can. But the best examples I could find on the web, like the arcane prog 2>&1 >&3 3>&- | tee prog.out 3>&- didn't work. I considered using /dev/tty or opening a pty, but those calls only work on Linux and Unix and the program is otherwise cross-platform. What I really wanted was a class that acts like a standard Python file object, but when you write to it it writes to two places: the log file and stderr. I found an example of someone trying to write a Python tee class, but it didn't work: it worked for write() but not for print >> I am greatly indebted to KirkMcDonald of #python for finding the problem. In the Python source implementing >>, PyFile_WriteObject (line 2447) checks the object's type, and if it's subclassed from the built-in file object, it writes directly to the object's fd instead of calling write(). The solution is to use composition rather than inheritance. Don't make your file-like class inherit from file, but instead include a file object inside it. Like this: import sys class tee : def __init__(self, _fd1, _fd2) : self.fd1 = _fd1 self.fd2 = _fd2 def __del__(self) : if self.fd1 != sys.stdout and self.fd1 != sys.stderr : self.fd1.close() if self.fd2 != sys.stdout and self.fd2 != sys.stderr : self.fd2.close() def write(self, text) : self.fd1.write(text) self.fd2.write(text) def flush(self) : self.fd1.flush() self.fd2.flush() stderrsav = sys.stderr outputlog = open(logfilename, "w") sys.stderr = tee(stderrsav, outputlog) And it works! print >>sys.stderr, "Hello, world" now goes to the file as well as stderr, and raw_input still works to prompt the user for input. In general, I'm told, it's not safe to inherit from Python's built-in objects like file, because they tend to make assumptions instead of making virtual calls to your overloaded methods. What happened here will happen for other objects too. So use composition instead when extending Python's built-in types. [ 09:48 Apr 16, 2010 More programming | permalink to this entry | comments ]
https://shallowsky.com/blog/programming/python-tee.html
CC-MAIN-2020-34
refinedweb
512
74.08
I was asking myself if I could import PowerShell modules from a newer Windows version. The *-NetAdapter CMDLets in Windows 8 and 8.1 are quite nice, so I wanted to use 'em in Windows 7 too. Unfortunately they need PowerShell 4.0. I managed to upgrade my local PowerShell and found out that it doesn't include the CMDlets. I found the location of the module on Windows 8 and copied to my Windows 7 machine. When I try to use Get-NetAdapter on Windows 7, I get an error. The error is the following: Get-NetAdapter : invalid namespace Get-NetAdapter ~~~~~~~~~~~~~~ + CategoryInfo : MetadataError: (MSFT_NetAdapter:ROOT/StandardCim v2/MSFT_NetAdapter) [Get-NetAdapter], CimException + FullyQualifiedErrorId : HRESULT 0x8004100e,Get-NetAdapter Is there a way to make this, or other newer CMDLets from Windows 8/Server 2012, available on Windows 7/Server 2008?
https://serverfault.com/questions/645170/import-module-from-newer-powershell-version
CC-MAIN-2022-33
refinedweb
139
55.64
can you give a step by step procedure, if its ok, im using eclipse IDE, tnx. can you give a step by step procedure, if its ok, im using eclipse IDE, tnx. sorry for late reply, hire is the error. i don't get this, please help me on this one. tnx Cannot connect to database server: com.mysql.jdbc.Driver java.lang.ClassNotFoundException:... i don't know what is the problem with my code, can pls someone help me on this one, pls. hire's my code: import java.sql.*; public class Connect { public static void main(String[]... All done, thx for your help, i hope there's a lot of people like you in this forum, thx.. very appreciated..... isn't ok to set an JScrollPane to JPanel and another JPanel within the JScrollPane ? how can i set up layout to JPanel, can you pls. give me some example. if you dont mind. Sir i have a problem with JScrollPane, it suppose to appear JScrollPane when they reach the limit size, but as you can see nothings happen, can someone help me with this one, that will be... Here's my code: import java.awt.*; import javax.swing.*; public class GUI_example extends JFrame { private final static long serialVersionUID = 1L;
http://www.javaprogrammingforums.com/search.php?s=565da5c447e64fedb21cc47e7b79836f&searchid=1272246
CC-MAIN-2014-52
refinedweb
211
75.91
POPUPMENUITEM structure Contains information about the menu items in a menu resource that open a menu or a submenu. The structure definition provided here is for explanation only; it is not present in any standard header file. Syntax - type Type: DWORD Describes the menu item. Some of the values this member can have include those shown in the list below. In addition to the values shown, this member can also be a combination of the type values listed with the fType member of the MENUITEMINFO structure. The type values are those that begin with MFT_. To use these predefined MFT_* type values, include the following statement in your .rc file: #include "winuser.h" - state Type: DWORD Describes the menu item. This member can be a combination of the state values listed with the dwState member of the MENUITEMINFO structure. The state values are those that begin with MFS_. To use these predefined MFS_* state values, include the following statement in your .rc file: #include "winuser.h" - id Type: DWORD A numeric expression that identifies the menu item that is passed in the WM_COMMAND message. - resInfo Type: WORD A set of bit flags that specify POPUPMENUITEM structure for each menu item that opens a menu or a submenu. Identify this type of menu item by setting the type member to MF_POPUP and by setting the MFR_POPUP bit in the resInfo member to 0x0001. In this case, the final data written to the RT_MENU resource for the menu or submenu is the MENUHELPID structure. MENUHELPID contains a numeric expression that identifies the menu during WM_HELP processing. Additionally, every POPUPMENUITEM structure that has the MFR_POPUP bit set in the resInfo member will be followed by a MENUHELPID structure plus an additional number of POPUPMENUITEM structures, one for each menu item in that submenu. The last POPUPMENUITEM structure in the submenu will have the MFR_END bit set in the resInfo member. To find the end of the resource, look for a matching MFR_END for every MFR_POPUP plus one additional MFR_END that matches the outermost set of menu items. Indicate the last menu item by setting the type member to MF_END. Because you can nest submenus, there can be multiple levels of MF_END. In these instances, the menu items are sequential. Requirements See also - Reference - MENUHEADER - MENUHELPID - MENUITEMINFO - NORMALMENUITEM - Conceptual - Resources
http://msdn.microsoft.com/en-us/library/windows/desktop/ms648025(v=vs.85).aspx
CC-MAIN-2014-52
refinedweb
386
64.3
#include <iostream> #include <cstdio> #include <string> #include <vector> #include "CoinFinite.hpp" Include dependency graph for CoinMessageHandler.hpp: This graph shows which files directly or indirectly include this file: Go to the source code of this file. The COIN Project is in favo(u)r of multi-language support. This implementation of a message handler tries to make it as lightweight as possible in the sense that only a subset of messages need to be defined --- the rest default to US English. The default handler at present just prints to stdout or to a FILE pointer Definition in file CoinMessageHandler.hpp. Log levels will be by type and will then use type given in CoinMessage::class_. Definition at line 565 of file CoinMessageHandler.hpp. Definition at line 566 of file CoinMessageHandler.hpp. Definition at line 213 of file CoinMessageHandler.hpp. A function that tests the methods in the CoinMessageHandler class. The only reason for it not to be a member method is that this way it doesn't have to be compiled into the library. And that's a gain, because the library should be compiled with optimization on, but this method should be compiled with debugging.
http://www.coin-or.org/Doxygen/Smi/_coin_message_handler_8hpp.html
crawl-003
refinedweb
196
57.06
The to replace a poorly predictable branch by a table lookup. For example: float a; bool b; a = b ? 1.5f : 2.6f; The ?: operator here is a branch. If it is poorly predictable then replace it by a table lookup: float a; bool b = 0; const float lookup[2] = {2.6f, 1.5f}; a = lookup[b]; If a bool is used as an array index then it is important to make sure it is initialized or comes from a reliable source so that it can have no other values than 0 or 1. In some cases the compiler can automatically replace a branch by a conditional move. I was trying to implement this lookup table optimization (to replace ternary operator) on a floating-point value which the code is compiled with G++ and ran on Linux. I also ran the integer benchmark and on other compilers such like Visual C++ 2019 and Clang and also the Visual C# 7 to see their differences. Below is the C++ benchmark code. The lookup array is declared as a static local variable inside the function. int64_t IntTernaryOp(bool value) { return value ? 3 : 4; } int64_t IntArrayOp(bool value) { static const int64_t arr[2] = { 3, 4 }; return arr[value]; } double FloatTernaryOp(bool value) { return value ? 3.0f : 4.0f; } double FloatArrayOp(bool value) { static const double arr[2] = { 3.0f, 4.0f }; return arr[value]; } int main() { const size_t MAX_LOOP = 1000000000; int64_t sum = 0; double sum_f = 0; timer stopwatch; stopwatch.start("IntTernaryOp"); sum = 0; for (size_t k = 0; k < MAX_LOOP; ++k) { sum += IntTernaryOp(k % 2); } stopwatch.stop(sum); stopwatch.start("IntArrayOp"); sum = 0; for (size_t k = 0; k < MAX_LOOP; ++k) { sum += IntArrayOp(k % 2); } stopwatch.stop(sum); stopwatch.start("FloatTernaryOp"); sum_f = 0; for (size_t k = 0; k < MAX_LOOP; ++k) { sum_f += FloatTernaryOp(k % 2); } stopwatch.stop(sum_f); stopwatch.start("FloatArrayOp"); sum_f = 0; for (size_t k = 0; k < MAX_LOOP; ++k) { sum_f += FloatArrayOp(k % 2); } stopwatch.stop(sum_f); return 0; } In Visual C# code, static local variable is not permitted so the lookup array is declared as a static member variable inside the class. C# does not allow casting integer bool to integer (to be used as array index), so I use a integer instead. static Int64[] arrInt64 = new Int64[] { 3, 4 }; static Double[] arrDouble = new Double[] { 3.0, 4.0 }; static Int64 IntTernaryOp(Int64 value) { return (value==1) ? 3 : 4; } static Int64 IntArrayOp(Int64 value) { return arrInt64[value]; } static double FloatTernaryOp(Int64 value) { return (value == 1) ? 3.0f : 4.0f; } static double FloatArrayOp(Int64 value) { return arrDouble[value]; } static void Main(string[] args) { const int MAX_LOOP = 1000000000; Int64 sum = 0; double sum_f = 0.0; Stopwatch stopWatch = new Stopwatch(); stopWatch.Start(); sum = 0; for (Int64 k = 0; k < MAX_LOOP; ++k) { sum += IntTernaryOp(k % 2); } stopWatch.Stop(); DisplayElapseTime("IntTernaryOp", stopWatch.Elapsed, sum); stopWatch = new Stopwatch(); stopWatch.Start(); sum = 0; for (Int64 k = 0; k < MAX_LOOP; ++k) { sum += IntArrayOp(k % 2); } stopWatch.Stop(); DisplayElapseTime("IntArrayOp", stopWatch.Elapsed, sum); stopWatch = new Stopwatch(); stopWatch.Start(); sum_f = 0; for (Int64 k = 0; k < MAX_LOOP; ++k) { sum_f += FloatTernaryOp(k % 2); } stopWatch.Stop(); DisplayElapseTime("FloatTernaryOp", stopWatch.Elapsed, sum_f); stopWatch = new Stopwatch(); stopWatch.Start(); sum_f = 0; for (Int64 k = 0; k < MAX_LOOP; ++k) { sum_f += FloatArrayOp(k % 2); } stopWatch.Stop(); DisplayElapseTime("FloatArrayOp", stopWatch.Elapsed, sum_f); } This is the benchmark results on a computer with Intel i7-8700 at 3.2Ghz with 16GB RAM. VC++ /Ox results IntTernaryOp: 562ms, result:3500000000 IntArrayOp: 523ms, result:3500000000 FloatTernaryOp: 3972ms, result:3.5e+09 FloatArrayOp: 1030ms, result:3.5e+09 G++ 7.4.0 -O3 results IntTernaryOp: 306ms, result:3500000000 IntArrayOp: 519ms, result:3500000000 FloatTernaryOp: 1030ms, result:3.5e+09 FloatArrayOp: 1030ms, result:3.5e+09 Clang++ 6.0.0 -O# results IntTernaryOp: 585ms, result:3500000000 IntArrayOp: 523ms, result:3500000000 FloatTernaryOp: 1030ms, result:3.5e+09 FloatArrayOp: 1030ms, result:3.5e+09 C# 7 Release Mode, .NET Framework 4.7.2 IntTernaryOp: 1311ms, result:3500000000 IntArrayOp: 1038ms, result:3500000000 FloatTernaryOp: 2448ms, result:3500000000 FloatArrayOp: 1036ms, result:3500000000 For the integer benchmark, the lookup table got worse performance than lookup table with G++, while in Visual C++/C# and Clang++, there is improvement. As it turns out in the floating benchmark I am looking for (in G++), improvement is only seen Visual C++/C# while G++ and Clang++ retained the same timing for both ternary and lookup table code. I did check the assembly code at the Godbolt Compiler Explorer, none of the ternary operator is converted to use conditional move as suggested by Agner Fog’s book so I guess the short branch is still with the CPU cache, therefore it makes little difference in G++ and Clang++ floating-point test. The morale of the story is never take a book’s word at its value and always measure to confirm your hypothesis. In my case, I forgo this lookup micro-optimization.
https://codingtidbit.com/2020/02/01/real-case-of-premature-micro-optimization/
CC-MAIN-2021-17
refinedweb
802
58.28
This article explains the new features in Python 2.2.2, released on October 14, 2002. Python 2.2.2 is a bugfix release of Python 2.2, originally released on December 21, 2001. Python 2.2 can be thought of as the “cleanup release”. There are some features such as generators and iterators that are completely new, but most of the changes, significant and far-reaching though they may be, are aimed at cleaning up irregularities and dark corners of the language design. This article doesn’t attempt to provide a complete specification of the new features, but instead provides a convenient overview. For full details, you should refer to the documentation for Python 2.2, such as the Python Library Reference and the Python Reference Manual. If you want to understand the complete implementation and design rationale for a change, refer to the PEP for a particular new feature. The significant addition to 2.2 is an iteration interface at both the C and Python levels. Objects can define how they can be looped over by callers. In Python versions up to 2.1, the usual way to make for item in obj work is to define a __getitem__() method that looks something like this: def __getitem__(self, index): return <next item> __getitem__() is more properly used to define an indexing operation on an object so that you can write obj[5] to retrieve the sixth element. It’s a bit misleading when you’re using this only to support for loops. Consider some file-like object that wants to be looped over; the index parameter is essentially meaningless, as the class probably assumes that a series of __getitem__() calls will be made with index incrementing by one each time. In other words, the presence of the __getitem__() method doesn’t mean that using file[5] to randomly access the sixth element will work, though it really should. In Python 2.2, iteration can be implemented separately, and __getitem__() methods can be limited to classes that really do support random access. The basic idea of iterators is simple. A new built-in function, iter(obj)() or iter(C, sentinel), is used to get an iterator. iter(obj)() returns an iterator for the object obj, while iter(C, sentinel) returns an iterator that will invoke the callable object C until it returns sentinel to signal that the iterator is done. Python classes can define an __iter__() method, which should create and return a new iterator for the object; if the object is its own iterator, this method can just return self. In particular, iterators will usually be their own iterators. Extension types implemented in C can implement a tp_iter function in order to return an iterator, and extension types that want to behave as iterators can define a tp_iternext function. So, after all this, what do iterators actually do? They have one required method, next(), which takes no arguments and returns the next value. When there are no more values to be returned, calling next() should raise the StopIteration exception. >>> L = [1,2,3] >>> i = iter(L) >>> print i <iterator object at 0x8116870> >>> i.next() 1 >>> i.next() 2 >>> i.next() 3 >>> i.next() Traceback (most recent call last): File "<stdin>", line 1, in ? StopIteration >>> In 2.2, Python’s for statement no longer expects a sequence; it expects something for which iter() will return an iterator. For backward compatibility and convenience, an iterator is automatically constructed for sequences that don’t implement __iter__() or a tp_iter slot, so for i in [1,2,3] will still work. Wherever the Python interpreter loops over a sequence, it’s been changed to use the iterator protocol. This means you can do things like this: >>> L = [1,2,3] >>> i = iter(L) >>> a,b,c = i >>> a,b,c (1, 2, 3) Iterator support has been added to some of Python’s basic types. Calling iter() on a dictionary will return an iterator which loops over its keys: >>> m = {'Jan': 1, 'Feb': 2, 'Mar': 3, 'Apr': 4, 'May': 5, 'Jun': 6, ... 'Jul': 7, 'Aug': 8, 'Sep': 9, 'Oct': 10, 'Nov': 11, 'Dec': 12} >>> for key in m: print key, m[key] ... Mar 3 Feb 2 Aug 8 Sep 9 May 5 Jun 6 Jul 7 Jan 1 Apr 4 Nov 11 Dec 12 Oct 10 That’s just the default behaviour. If you want to iterate over keys, values, or key/value pairs, you can explicitly call the iterkeys(), itervalues(), or iteritems() methods to get an appropriate iterator. In a minor related change, the in operator now works on dictionaries, so key in dict is now equivalent to dict.has_key(key). Files also provide an iterator, which calls the readline() method until there are no more lines in the file. This means you can now read each line of a file using code like this: for line in file: # do something for each line ... Note that you can only go forward in an iterator; there’s no way to get the previous element, reset the iterator, or make a copy of it. An iterator object could provide such additional capabilities, but the iterator protocol only requires a next() method. Generators. In recent versions, the distinction between regular integers, which are 32-bit values on most machines, and long integers, which can be of arbitrary size, was becoming an annoyance. For example, on platforms that support files larger than 2**32 bytes, the tell() method of file objects has to return a long integer. However, there were various bits of Python that expected plain integers and would raise an error if a long integer was provided instead. For example, in Python 1.5, only regular integers could be used as a slice index, and 'abc'[1L:] would raise a TypeError exception with the message ‘slice index must be int’. Python 2.2 will shift values from short to long integers as required. The ‘L’ suffix is no longer needed to indicate a long integer literal, as now the compiler will choose the appropriate type. (Using the ‘L’ suffix will be discouraged in future 2.x versions of Python, triggering a warning in Python 2.4, and probably dropped in Python 3.0.) Many operations that used to raise an OverflowError will now return a long integer as their result. For example: >>> 1234567890123 1234567890123L >>> 2 ** 64 18446744073709551616L In most cases, integers and long integers will now be treated identically. You can still distinguish them with the type() built-in function, but that’s rarely needed. The most controversial change in Python 2.2 heralds the start of an effort to fix an old design flaw that’s been in Python from the beginning. Currently Python’s division operator, /, behaves like C’s division operator when presented with two integer arguments: it returns an integer result that’s truncated down when there would be a fractional part. For example, 3/2 is 1, not 1.5, and (-1)/2 is -1, not -0.5. This means that the results of division can vary unexpectedly depending on the type of the two operands and because Python is dynamically typed, it can be difficult to determine the possible types of the operands. .) Because this change might break code, it’s being introduced very gradually. Python 2.2 begins the transition, but the switch won’t be complete until Python 3.0. First, I’ll borrow some terminology from PEP 238. “True division” is the division that most non-programmers are familiar with: 3/2 is 1.5, 1/4 is 0.25, and so forth. “Floor division” is what Python’s / operator currently does when given integer operands; the result is the floor of the value returned by true division. “Classic division” is the current mixed behaviour of /; it returns the result of floor division when the operands are integers, and returns the result of true division when one of the operands is a floating-point number. Here are the changes 2.2 introduces:. --enable-unicode=ucs4 to the configure script. (It’s also possible to specify --disable-unicode to completely disable Unicode support.) When built to use UCS-4 (a “wide Python”), the interpreter can natively handle Unicode characters from U+000000 to U+110000, so the range of legal values for the unichr() function is expanded accordingly. Using an interpreter compiled to use UCS-2 (a “narrow Python”), values greater than 65535 will still cause unichr() to raise a ValueError exception. This is all described in PEP 261, “Support for ‘wide’ Unicode characters”; consult it for further details. Another change is simpler to explain. Since their introduction, Unicode strings have supported an encode() method to convert the string to a selected encoding such as UTF-8 or Latin-1. A symmetric decode([*encoding*])() method has been added to 8-bit strings (though not to Unicode strings) in 2.2. decode() assumes that the string is in the specified encoding and decodes it, returning whatever is returned by the codec. Using this new feature, codecs have been added for tasks not directly related to Unicode. For example, codecs have been added for uu-encoding, MIME’s base64 encoding, and compression with the zlib module: >>>>> data = s.encode('zlib') >>> data 'x\x9c\r\xc9\xc1\r\x80 \x10\x04\xc0?Ul...' >>> data.decode('zlib') 'Here is a lengthy piece of redundant, overly verbose,\nand repetitive text.\n' >>> print s.encode('uu') begin 666 <data> M2&5R92!I<R!A(&QE;F=T:'D@<&EE8V4@;V8@<F5D=6YD86YT+"!O=F5R;'D@ >=F5R8F]S92P*86YD(')E<&5T:71I=F4@=&5X="X* end >>> "sheesh".encode('rot-13') 'furrfu' To convert a class instance to Unicode, a __unicode__() method can be defined by a class, analogous to __str__(). encode(), decode(), and __unicode__() were implemented by Marc-André Lemburg. The changes to support using UCS-4 internally were implemented by Fredrik Lundh and Martin von Löwis.). of the changes only affect people who deal with the Python interpreter at the C level because they’re writing Python extension modules, embedding the interpreter, or just hacking on the interpreter itself. If you only write Python code, none of the changes described here will affect you very. The most significant change is the ability to build Python as a framework, enabled by supplying the --enable-framework option to the configure script when compiling Python. According to Jack Jansen, “This installs a self- contained Python installation plus the OS X framework “glue” into /Library/Frameworks/Python.framework (or another location of choice). For now there is little immediate added benefit to this (actually, there is the disadvantage that you have to change your PATH to be able to find Python), but it is the basis for creating a full-blown Python application, porting the MacPython IDE, possibly using Python as a standard OSA scripting language and much more.” Most of the MacPython toolbox modules, which interface to MacOS APIs such as windowing, QuickTime, scripting, etc. have been ported to OS X, but they’ve been left commented out in setup.py. People who want to experiment with these modules can uncomment them manually. author would like to thank the following people for offering suggestions, corrections and assistance with various drafts of this article: Fred Bremmer, Keith Briggs, Andrew Dalke, Fred L. Drake, Jr., Carel Fellinger, David Goodger, Mark Hammond, Stephen Hansen, Michael Hudson, Jack Jansen, Marc-André Lemburg, Martin von Löwis, Fredrik Lundh, Michael McLay, Nick Mathewson, Paul Moore, Gustavo Niemeyer, Don O’Donnell, Joonas Paalasma, Tim Peters, Jens Quade, Tom Reinhardt, Neil Schemenauer, Guido van Rossum, Greg Ward, Edward Welbourne.
http://docs.python.org/release/3.2.3/whatsnew/2.2.html
CC-MAIN-2013-20
refinedweb
1,937
62.88
Home >>C++ Tutorial >C++ Date and Time As a matter of fact we know that C++ is an upgraded version of C hence, there are many functions and structures that are inherited by the C++ from C language. Date and time in C++ is one of structure that has been inherited by the C language in order to manipulate date and time. <ctime> header file is included in the C++ program in order to access date and time regulated functions and structures. Here are the types of time-related: The system time and date is represented as some sort of integer by the types clock_t, size_t and time_t. Here is the list of the elements that are held by the structure type tm. The structure type tm generally holds the date and time in the form of a C structure that has these following elements: struct tm { int tm_sec; int tm_min; int tm_hour; int tm_mday; int tm_mon; int tm_year; int tm_wday; int tm_yday; int tm_isdst; } Here is the list of the very important functions that are used when working with the date and time in C or C++. These below mentioned functions are basically a part of the standard C++ or C library. Whether the programmer wants to retrieve the current date and time of the system either in the format of local time or in UTC that is basically the Coordinated Universal Time, here is an example that will give you the discussed output: #include <iostream> #include <ctime> using namespace std; int main() { // Get current date and time time_t now = time(0); // convert into string format of now char* dt = ctime(&now); cout << "The current date and time = " << dt << endl; // convert to tm struct for UTC tm *gmtm = gmtime(&now); dt = asctime(gmtm); cout << "The date and time of UTC is ="<< dt << endl; } The tm structure generally holds the date and time just in the form of a C structure. It is known to be the most important structure while working with the date and time either in C or C++. This function is generally used by the most of the time related functions. Here is an example that will make the use of various time-related functions and tm structure. #include <iostream> #include <ctime> using namespace std; int main() { // Get date and time of current system time_t now = time(0); cout << "Total Number of sec From 1 January 1970:" << now << endl; tm *ltm = localtime(&now); // print various components of tm structure. cout << "Current Year" << 1900 + ltm->tm_year << endl; cout << "Current Month: "<< 1 + ltm->tm_mon<< endl; cout << "Current Day: "<< ltm->tm_mday << endl; cout << "Current Time: "<< 1 + ltm->tm_hour << ":"; cout << 1 + ltm->tm_min << ":"; cout << 1 + ltm->tm_sec << endl; }
http://www.phptpoint.com/cpp-date-and-time/
CC-MAIN-2021-10
refinedweb
448
54.49
Here’s a fun programming puzzle. In any language, define a function map that takes another function f and maps it over a list l. This means that map returns a new list where f has been applied to every element of l. An example in Python: def map(f, l): return [f(x) for x in l] Here’s the catch: you can’t use any of your language’s iteration constructs, e.g. for, while, each, or obviously any built-in map. The above example is banned because of the for. Sample solution: We just use recursion instead of iteration def map(f, l): if len(l) == 0: return [] return [f(l[0])] + map(f, l[1:])
https://vitez.me/map-puzzle
CC-MAIN-2019-26
refinedweb
119
73.17
The Cortex-M architecture defines Fault Handlers that are entered when the core attempts to execute an invalid operation such as an invalid opcode or accessing non-mapped memory. On parts with a Cortex-M3 or Cortex-M4 core, the following handlers are defined: The first three must be specifically activated and will automatically escalate to a Hard Fault if not enabled. When a fault occurs the SCB->CFSR register contains information about what caused the fault. In addition, the hardware automatically pushes several CPU registers on the stack before entering the Hard Fault handler. These can be inspected to further debug the cause of the hard fault. In addition to CFSR, the SCB->MMFAR and SCB->BFARgives the address that caused a fault in the case of a Memory Management Fault or Bus Fault, respectively. The code below shows a way to implement a Hard Fault handler for debug. The handler will fetch and dump the fault registers and the stacked CPU registers over Serial Wire Output (SWO). Note that this requires that the SWO pin is connected to the debugger. The code makes use of stdio retargeting which means the file retargetio.c (found in the EFM32 SDK directory under kits/common/drivers/) must be included in the project. The setupSWOForPrint() function is found in the energyAware Commander under the SWO tab. The Hard Fault Handler needs a bit of assembly. The code checks which stack is in use and copies the stack pointer to R0. It then calls debugHardfault() with the stack pointer as the argument. This function fetches the register values and prints them to SWO. The Hard Fault Handler is defined with __attribute__((naked)) to avoid the compiler generating a function prologue which modifies the stack pointer. #include <stdio.h> #include "em_device.h" void setupSWOForPrint(void); void debugHardfault(uint32_t *sp) { uint32_t cfsr = SCB->CFSR; uint32_t hfsr = SCB->HFSR; uint32_t mmfar = SCB->MMFAR; uint32_t bfar = SCB->BFAR;]; printf("HardFault:\n"); printf("SCB->CFSR 0x%08lx\n", cfsr); printf("SCB->HFSR 0x%08lx\n", hfsr); printf("SCB->MMFAR 0x%08lx\n", mmfar); printf("SCB->BFAR 0x%08lx\n", bfar); printf("\n"); printf("SP 0x%08lx\n", (uint32_t)sp); printf("R0 0x%08lx\n", r0); printf("R1 0x%08lx\n", r1); printf("R2 0x%08lx\n", r2); printf("R3 0x%08lx\n", r3); printf("R12 0x%08lx\n", r12); printf("LR 0x%08lx\n", lr); printf("PC 0x%08lx\n", pc); printf("PSR 0x%08lx\n", psr); while(1); } __attribute__( (naked) ) void HardFault_Handler(void) { __asm volatile ( "tst lr, #4 \n" "ite eq \n" "mrseq r0, msp \n" "mrsne r0, psp \n" "ldr r1, debugHardfault_address \n" "bx r1 \n" "debugHardfault_address: .word debugHardfault \n" ); } int RETARGET_ReadChar(void) { return 0; } int RETARGET_WriteChar(char c) { return ITM_SendChar(c); } int main(void) { setupSWOForPrint(); printf("Start\n"); /* Create an invalid function pointer and call it. * This will trigger a Hard Fault. */ void (*fp)(void) = (void (*)(void))(0x00000000); fp(); while(1); } The SWO output can be viewed in energyAware Commander under the 'SWO' tab. In the example shown here, a Hard Fault is generated by trying to branch to address zero. Note: If SWO output is not desired or possible, the printf statements can be removed and the values inspected directly with the debugger by placing a breakpoint at the while(1) loop in the handler. The SWO output shows that bit 17 in SCB->CFSR is set. Referring to [1], this bit indicates INVSTATE: One of the possible causes for INVSTATEis "Loading a branch target address to PC with LSB = 0". On Cortex-M all branches must have the last address bit set to '1' to indicate "Thumb State". The LR value on the stack points to the instruction following the instruction that generated the fault. By inserting a breakpoint at the instruction immediately before this address (in this case 0x58e) it is possible to halt the CPU right before the fault is generated. In the screenshot above, the next instruction is a branch to the address in register R3 which has the value '0x00'. On devices with a Cortex-M0+ core (e.g. Zero Gecko), none of the fault status registers are available, and there are no SWO support. Debugging a hard fault on a Cortex-M0+ is therefore a bit more difficult and involves inspecting only the stacked registers with a debugger. The following code can be used on a Cortex-M0+ device. void debugHardfault(uint32_t *sp) {]; while(1); } __attribute__( (naked) ) void HardFault_Handler(void) { __asm volatile ( "mrs r0, msp \n" "mov r1, #4 \n" "mov r2, lr \n" "tst r2, r1 \n" "beq jump_debugHardfault \n" "mrs r0, psp \n" "jump_debugHardfault: \n" "ldr r1, debugHardfault_address \n" "bx r1 \n" "debugHardfault_address: .word debugHardfault \n" ); } References: [1] Application Note 209: Using Cortex-M3 and Cortex-M4 Fault Exceptions [2] Developing a Generic Hard Fault handler for ARM Cortex-M3/Cortex-M4 [3] Debugging a HardFault on Cortex-M [4] Analyzing HardFaults on Cortex-M CPU 10X a lot, Shimon. :-)
https://www.silabs.com/community/mcu/32-bit/knowledge-base.entry.html/2014/05/26/debug_a_hardfault-78gc
CC-MAIN-2020-16
refinedweb
824
50.87