text
stringlengths
454
608k
url
stringlengths
17
896
dump
stringclasses
91 values
source
stringclasses
1 value
word_count
int64
101
114k
flesch_reading_ease
float64
50
104
patterns & practices and pontification Architects love abstracting things. And why wouldn't they - it allows you to hide those pesky implementation details out of the way so they don't trouble your callers, and lets you completely change the implementation at a later stage, provided the interface isn't changed. But like most of the good things in life, there comes a point where more is no longer better. All of the Enterprise Library application blocks include great examples of abstraction, generally through the use of the Factory and Plug-In patterns. An application using an Enterprise Library application block need only code against an interface or abstract base class, such as Database, AuthorizationProvider or Validator (or in some cases this is abstracted even further via a façade class such as Logger or ExceptionPolicy). The concrete implementation of each class is determined at runtime by a factory class, which will do things like inspect configuration files and attributes to figure out which one is appropriate. This pattern provides a lot of great benefits, as you can write code at an abstract level, such as "validate this!", "log this!" or "call this stored procedure!", while the specifics of how each of these is done can be encapsulated into a different class and changed without impacting your code. Over the years I've spoken to a lot of people who wanted to (or actually did) take this a step further by completely abstracting away the use of application blocks by hiding them behind their own interfaces and factories. The main arguments I've heard for doing this are as follows: I appreciate that these goals can be important for at least some people, however I'm far from convinced that abstracting away an Enterprise Library block is a good solution. David Hayden started a vibrant discussion on this topic around achieving this second goal in the Repository Factory, and continued it with a number of blog posts (here, here and here). Persistent though David is, I don't buy his arguments. This is not because I think the blocks are perfect and that nobody would ever want to use anything different. However since the blocks already expose an abstracted interface, any further abstractions would need to expose an almost identical interface (or potentially a much watered-down subset). David didn't share his example, but I'm assuming he built something like this for the DAAB: public interface IDataAccessor{ int ExecuteNonQuery(string command, params object[] parameters); IDataReader ExecuteReader(string command, params object[] parameters); DataSet ExecuteDataSet(string command, params object[] parameters); // Add as many more DAAB-like members as you want}public static class DataAccessorFactory{ public IDataAccessor Create(string instanceName) { // Look up configuration and figure out what to return }}public class EnterpriseLibraryDataAccessor : IDataAccessor{ // Wraps an EntLib Database instance and defers interface calls to it} This solution meets David's goals of breaking the dependency between the client code (such as the Repository Factory) and the Data Access Application Block. But let's think a little more about what we've achieved here. We've replaced the DAAB dependency with a dependency on a new interface which is almost identical to the DAAB. Any arguments around why the DAAB dependency may not be desirable should apply equally to this new interface (plus we've added more complexity and more moving parts without adding any new functionality). Even putting this argument aside, another problem I have with this approach is that I can't really see anyone being able to build any other implementations of this interface that are different enough to be interesting. I'm not saying there aren't other interesting ways of accessing a database - solutions such as NHibernate and LINQ to SQL are great examples. But these are philosophically so different to DAAB that they couldn't possibly implement the same interface that was built primarily as a DAAB Abstractor. The only way I can see to avoid this problem is to build an interface so abstract that it provides almost no functionality. Using Logging as as simpler example, one could build an interface like this: public interface ILogger{ void Log(string message, string category)} ...and build different implementations that could talk to the Logging Application Block or Log4Net. But we were only able to do this because we dumbed down the interface to the lowest common denominator. Both logging solutions use quite different approaches for things like routing, filtering, formatting, and these decisions influenced the design of their native interfaces. In our desire to provide a single interface that is abstract enough to work with both solutions, we're going to lose a lot of functionality. I'll wager that not many developers are willing to give this up for the theoretical goodness that this additional layer of abstraction provides. To finish off this discussion, I wanted to add support to Chris Tavares's observation that David's problem is really a design-time one, not a runtime one, meaning that once you've decided what classes you want to use to talk to your database you're unlikely to want to change your mind after deployment. While the abstraction patterns we've been talking about do allow for both design-time and runtime flexibility, Software Factories provide some additional options for design-time variability, such as code generation, that are probably more appropriate in this case. The nice thing about going this way is that at runtime you only have the code you need - and you have just the right amount of abstraction to provide a great flavour, and not so much to cause a stomach ache. I think the actual problem arised here is about when people adding one more abstraction layer or hiding app-blocks behind the interfaces, they usually makes not well-thought interfaces. Most of time when coder want to hide something behind interface (with "books says to do that" motd banner), he just copy current methods signatures into the interface and continue working with it. It's not adding anything to breaking dependencies because there is nothing about abstraction for current class to more abstract one. Its just another copy-pasted layer. Imo this is one of the differences between developer and coder - developer can imagine consequences of the code he writting. Tom, most of your arguments are quite valid, but there's at least one good reason for abstraction away Enterprise Library: Until now, p&p have been releasing software faster than most enterprise organizations can keep up, and they don't guarantee backwards compatibility (or at least: That's the perception). Many development organizations have significant investments in software that uses a particular version of EntLib. As soon as this software has been released, it enters maintainance mode, which means that it will typically require great effort to change the version of EntLib (or so the organization thinks). Abstracting away such implementation details as EntLib (or Log4Net, or anything similar) will make it easier to move code in maintainance mode forward and keep it current. Yes, there's a price to pay, but there are also benefits. In a single software project, it may not make sense, but it might when you look at the entire application lifecycle ecology of a larger organization. Tom, I agree with Ploeh here. In our organization we deal with clients who have their own application blocks/foundation services, few clients who use EL (multiple versions) and few clients who use other blocks like Log4Net. It makes sense for us as a huge organization to standardize on the interfaces for basic foundation services (Data access, Logging, Exception Handling, Authorization etc). Then create adapters for each of the current blocks. Eg Adapter for Log4Net as well as EL logging etc... Currently we have adapters for EL 2.0, EL 3.1 and few of our client frameworks. We have our own foundation services as well. This abstraction helps our huge developer community in our organization a single common interface. Our group works on providing the adapters which ensures to use the latest features of the changing application blocks ( EL 2.0 to EL 3.1 ). We do not break the interface. This would ensure that we have a pure plug and play option here. So, I think it does make sense in our situation. I do agree that we end up not supporting some fucntionalities at times but its worth the flexibility if offers for a huge organization like ours. Thanks, Vyas Good post, Tom. If I always wanted to use Enterprise Library and being dependent on it wasn't a big deal, I agree with you 100%. There is no reason to add another layer of abstraction in that case. Unfortunately, this is not my world. I don't or cannot always use Enterprise Library and therefore I need more of a pluggable model around the data access in the Repository Factory. This pluggable model also insulates me from version changes in Enterprise Library, which has been a real issue for me when dealing with the software factories. This is why I chose to define a data access contract in my version and use the Adapter Pattern to isolate Enterprise Library as just a provider, not a dependency. My situation is very much similar to what Ploeh and Vyas are describing above. In my case, I am not adding an unnecessary layer of abstraction, but doing it very much based on the needs of my clients and their applications. I hope this at least helps clarify my position. As to whether this is important to do as part of the Repository Factory, perhaps not. I was only making a suggestion based on my needs and am not necessarily saying that these needs ring true for all the customers of the Repository Factory. Dave Good post Tom, strong argument Ploeh. My 2 euro cents: Adding an abstraction can be justified in 2 scenario's. 1. I solve a problem, which I would like to make easier to consume. E.g.: "The people in my company find this library too complex to figure out, I'll make this easier by adding another abstraction level". To me this is valid, even with EL. Remember, Enterprise Library is build for 80% of the scenarios, with the remaining 20%, there might be scenario's or team's in which EL is perceived as complicated to consume. 2. I use a library someone else made, which I don’t want to take a binary dependency on and hopefully localize the change in case I find a library that does this job better (or upgrade to a new version for the matter of argument). David, this is where you are, right? I think this makes sense; thought a clean abstraction is very hard to come by. Following this argumentation, you would typically have to start with the consumer of the library to define the contract. In many cases (not all, say 80% :P), this type of abstraction is not worth the effort.. Since it not only implies creating a new contract for each consumer (or standardizing within an org.). This also implies you'd better think it through rather well, or else, after switching libraries you’d have something that smells of A, but actually behaves like B. Creating yet another "1-solution-fits-most-scenario's" - abstraction seems like a big waste of time, to me. (assuming you are not re-targeting this to another audience). To that I'll add: I would not consider "Software Factories" re-targeting to another audience. with "re-targeting" i was thinking more along the lines of DLR, CopmactFx, maybe an IoC application host, whatever. I also do not think it is possible to standardize the logging needs of Software Factories in general either. Great discussion everyone. Mark (pleoh) hit on an important scenario that I hadn't really discussed - I see this as a variation on the "insurance policy" scenario, but since the goal is to abstract multiple versions of the same block, most of my earlier arguements don't apply. While I can definitely see why people would go down this path, it still doesn't sit that well with me. First, while p&p goes out of the way not to promise backward compatibility, in reality there were only a handful of breaking changes between 1.x and 2.x, and none between 2.x and 3.x, so "upgrading" an application to a new version of EntLib really isn't a big deal even without an additional abstraction layer. Also I'd recommend applying the "don't fix it if it ain't broke" principle wherever possible, rather than insist that every deployed app uses the same version of EntLib (or any other shared components for that matter). But if we accept the fact that easier migration between versions is necessary, I think the ideal solution may be to version the block's public APIs separately to the implementations, rather than build another interface around the blocks. If there were no breaking changes from one release to another, the interface assembly would not be touched. But while I think this approach could be quite nice, it would be quite a change from what we have today, and I don't think many people would appreciate the irony of introducing breaking API changes for the sole purpose of preventing breaking API changes :-) I started using EntLib at 1.x and have migrated many projects from one version to the next. The only time that I had problems was from a version of 1.x customized in-house to work better with .NET 2.0 to 2.0 of EntLib. Even then, the dozens of projects migrated in a few weeks, not months. Every version since has been an easy re-compile, re-test, release. I don't buy that there is a need to abstract away EntLib in an organization to ease migration or enable use of multiple versions. I can think of only one case where it'd make good sense to put an abstraction in front of EntLib: to replace the implementation of an interface that's used pervasively in a existing code-base and only in the case that the code-base is sufficiently large or brittle. Olaf, To answer your question, unfortunately, my situation is that I have some clients where I would like to use the Repository Factory ( and other software factories ) that do not or will not touch Enterprise Library. So, although Tom is focusing on the versioning piece, this was never my main point - it was just a nice bonus. My problem is that the Repository Factory as well as all the other software factories require Enterprise Library. This means that if I don't or cannot use Enterprise Library, I am pretty much screwed due to that dependency. It is very much an unnecessary dependency in my opinion, but I can work around it. I have essentially created my own version of all the software factories that allow me to use something other than Enterprise Library if I need to. Obviously if I lived in an ideal world and everyone used Enterprise Library, I wouldn't be wasting my time with the custom changes nor the request. The cool thing is that it is amazing how well you actually get to know the software factories when you need to re-write them :) But David, you haven't eliminated the dependency on Enterprise Library - you've just moved it down a level. In order to make the factory work with something that's not EntLib, you still need to build and test new code. Sure, you won't need to recompile the data access layer to do this, but so what? I appreciate that there are users that can't or don't want to use EntLib, but I don't understand why you're dismissing the design-time solution (replacing or augmenting the code gen templates) that Chris suggested. Tom I think David is spot on. Having a Repository pattern in your application without dependencies on Ent Lib is not a bad thing. Seems to be an attachment to EntLib from it's makers whereas the user community would see value in this. I know I would. That is all that is needed. +1 to David. To me, the same argument can be said about IoC - I would rather use Windsor in my applications. I should be able to plug that into the EntLib or detach it without concern. Loose coupling is a positive thing :) I think you are right to be concerned, but I don't think that the answer is "dont' do that" Take a look at Castle Project's Castle.Core.Logging namespace and notice their version of ILogger is an abstraction for their own logger. Then take a look at their log4net and Nlog Services. It is really great to abstract away both log4net & NLog and use only Castle Core's ILogger and simple log implementations. Then you can pull in log4net and/or NLog if you need them. IMO, it is a great example of abstraction done right. I agree with you Tom it's a common law of leaky abstractions (Joel on Software). A perfect example is last week when I was helping a developer use the data access block in ent lib 2.0. A developer was making SQL stored procedure calls against an SQL Server database. When inserting data using parameters [ala db.AddInParameter(...)] all of a sudden his values were being inserted into the wrong column. After some searching around and prodding for more information the only thing he did was change the order of parameters, looking at his code for quick bit one could not see why this would fail (it was an sql server database he was connecting to after all, parameter order shouldn't matter).... enter the law of leaky abstractions... Since the database object isolated the developer from the database vendor and the code used to interact with the database was at such a high-level, the developer lost sight of the plumbing (the ADO.NET driver he was using) which caused a leak. The driver he was using was an older OleDB driver, which requires parameters to be in order. The program didn't fail, there was no exception able to be thrown, a leak formed. A change of the provider to native .NET SqlServer driver fixed his problem. One new subscriber from Anothr Alerts The only things I tend to hide behind a custom interface are static facades. It helps with mocking/unit testing. Great article. Another coworker and myself constantly run into disagreements with the "architects" where we work who insist on wrapping Enterprise library. Unfortunately these architects don't code much, and don't fully understand what EntLib is, so the new interfaces provided ultimately eliminate the flexibility of EntLib, for example the wrapper for EntLib logging requires my app code to specify my event sink(EntLib 1.x). ?????? WHY ??????? It was mentioned that sometime one would wrap EntLib to allow adapter pattern to be used in order to switch between Log4NET and EntLib. I view EntLib as an abstraction to common application services. I'm not at expert on all of EntLib but if I want to use a different logger, why not just build an adapter and plug it directly into EntLib via config. Why can't entlib be your interface to common application services. Can't an adapter just be built to plug in to EntLib for the specific logging component you want to use? For instance Log4Net, or even to use a newer version of EntLib that has breaking changes(you obviously can make use of new features in EntLib, but possibly ease upgrade path). Am I way off base here or does this make some sense? What David Hayden has done with Repositories is fantastic. I've listened to his podcast, seen his examples. I might actually start using ETLib now. I agree with Steve above, allow substituting Windsor in place of ObjectBuilder along with David's work on Repositories and we'll actually have software I'm interested in using. By the way, this is a pattern that you can read about from Martin Fowler. EntLib allowing Domain driven designs patterns is fantastic. (I'd like to see his Repository factory sit on top of NHibernate) I couldn't agree with you more Tom, in fact I think some of p&p stuff is too abstract itself. I've been buried in bugs caused by abstraction upon abstraction whose sole reasoning was 'what if' scenerio's. And you get down to it and there's no quantitative purpose behind all the extra layers that were introduced; it just cost the company a few extra hundred thousand dollars because a few developers thought it was cool. But don't get me wrong; abstraction is needed, coupling is bad, but like spices in a dish a little is good, a lot ruin the meal. So often I run across software that is so fricken bloated because of all these added interfaces because someday someone may up and decided to change the core architecture of the system without consulting the business or stakeholders who sponsor the project. Bah. If you're worried about that level of change in you're architecture then someone obviously failed to analyze, document, or enforce the strategic enterprise architecture requirements. I've found most of these 'problems' where stuff just happens to change with the wind is because of lack of or poor project management or the project is run by coders who are hip to all the new technologies and want to keep up with change rather than properly retiring the current version and putting a new version in place...again strategic enterprise level requirements. But yeah...requirements...who needs those right??? I'm going to paraphrase something Martin Fowler said in his book 'Refactoring' - speculative generaliteis are when a coder adds something or some architecture because 'we may need it someday' - if it's not needed it's just adding extra complexity and maintnance costs. On the side, it's interesting that so many people who add so many layers of abstraction are big fans of Martin Fowlers Enterprise Patterns (or similiar books) and this is why they do it (because the book said so, which was said earlier), yet so few of them has read a book that is so much more important.
http://blogs.msdn.com/tomholl/archive/2007/08/26/abstractions-you-can-have-too-much-of-a-good-thing.aspx
crawl-002
refinedweb
3,765
59.13
Tutorial: File Handling in C++ In this tutorial, our topic is: File handling in C++. Here we will learn the following things one by one. - What are Headers in C++ - How to open and close a file - How to write into a file in C++ - Read data from a file - Some important operations on file handling in C++ Most of the C++ programs are only capable of Getting an Input and Showing an Output But what if your program has to get something like Username and Password from the user? We can’t be asking for the username password every time and hence we need to store it somewhere This is where file handling is used File Handling In C++ C++ has the functionality to open, read, write and close files. An example of a file is a Text File(.txt) If you know the basics of C++, this tutorial would be very easy for you. So let us begin talking about the important points Headers Along with the “iostream” header, we also import a header called “fstream”. It is used for enabling the file handling function in C++ IOSTREAM = Input Output Stream. Similarly, FSTREAM = File Stream #include <iostream> #include <fstream> This package helps us use 3 new functions - ofstream (Output File Stream): Used for basic Output functions and writing into a file - ifstream (Input File Stream): Used for basic Input functions and reading from a file - fstream (File Stream): Used for both writing and reading from a file Along with these 3 functions, we also get 4 different operations we can use on a file - open() : Used to Open a File - read() : Used to Read the File - write() : Used to Write data into the File - close() : Used to Close the File Opening/Closing a File in C++ #include <iostream> #include <fstream> using namespace std; int main() { fstream obj; obj.open("C:\File1212.txt",ios::out); if(!obj) { cout<<"File exists"; } else { cout<<"file created"; obj.close(); } return 0; } This code is used to open a file. But what if the file at that location does not exist? The compiler automatically creates a new file over there with the name File1212 i.e. the name given to your file Now let us address some important lines in the code - “fstream obj”; : Here we are creating an object “obj” that is used to refer to the function “fstream” we are using. It is basically a file pointer - obj.open(“C:\File1212.txt”,ios::out); : Here we are using the function “open” to tell the compiler to open the file at the location we are entering. The ios is used to tell the compiler what operation we would be performing on the file. It has 4 modes: 1) ios::out : To use for file writing 2) ios::in : To use for file inputting 3) ios::app : To use for appending a file 4) ios::trunc : To use for truncating a file 5) ios::beg : To tell the beginning point of the file 6)ios::cur : To tell the current position of the pointer 7)ios::end : To tell the endpoint of the file - if(!obj) : Here we are checking if the file already exists - obj.close(); : If the file is opened, it’ll have to be closed too Hence a file is created Writing into a file in C++ #include <iostream> #include <fstream> using namespace std; int main() { fstream obj; obj.open("C:File.txt",ios::out); if(!obj) { cout<<"could not create file"; } else { obj<<"Hello World"; obj.close(); } return 0; } If you notice carefully, there is only one line difference between the previous code and this code i.e. obj<<“Hello World” So basically we are writing hello world into the file that obj points to. Do try this code with your preferred file location and file name. Then open that file and notice the text written out there Reading from a File in C++ #include <iostream> #include <fstream> using namespace std; int main() { fstream obj; obj.open("C:File.txt",ios::in); if(!obj) { cout<<"could not create file"; } else { char ch; while(!obj.eof()) { obj>>ch; cout<<ch<<" "; } obj.close(); } return 0; } You may learn: How to fetch a random line from a text file in C++ Again, this code is mostly similar to the previous codes except for a few lines I have written “Testing” into the file and I am reading it and printing it with a space between each character. Notice, we have used ios::in for reading - while(!obj.eof()) : Here we are creating a loop that iterates the number of times a character is there. eof() basically means end of file. It is when the pointer reaches the point after the last character in the file - obj>>ch; : Here we are extracting a character and storing it in ch - cout<<ch<<” “; : Here we are printing the extracted character and printing it. Hence the output would be: T e s t i n g Additional Operations on file handing - tellp(): Tells the current put pointer’s location - tellg(): Tells the current get pointer’s location - seekp(): Moves the put pointer to the desired location - seekg(): Moves the get pointer to the desired location - put(): Write a single line of character - get(): Read a single line of character Hence we have covered file handling in C++. I hope you understood the logic and were able to execute it by yourself. If you have any doubts regarding this, feel free to ask it in the comment section. Thank You.
https://www.codespeedy.com/file-handling-in-cpp/
CC-MAIN-2020-34
refinedweb
923
63.53
I'm having difficulty implementing an abstract class structure and was wondering if someone could tell me what i'm doing wrong. I want to have an abstract parent class Num for which has abstract methods: where we have two (for now) subclasses:where we have two (for now) subclasses:Code: abstract Num add(Num n); abstract Num multiply(Num n) What I want to be able to do is to create a generic object for which the suitable method is used:What I want to be able to do is to create a generic object for which the suitable method is used:Code: public class ComplexNum extends Num public class RealNum extends Num The two ways that I have tried have failed, namely:The two ways that I have tried have failed, namely:Code: Num testNum = new ComplexNum(...) Num otherTestNum = new RealNum(...) testNum.multiply(otherTestNum) // doesn't care what type objs are, handled in subclass 1. Explicitly defining the cases in the abstract class, fails as I want to be able to pass a general Num object i.e. use multiply(Num n), and have the correct method used in the child class. 2. Use type checking in the subclass:2. Use type checking in the subclass:Code: abstract Num add(RealNum n); abstract Num add(ComplexNum n); etc Both seem very anti-OOP, and neither yet work either...Both seem very anti-OOP, and neither yet work either...Code: public Num add(Num n){ if(n instanceof ComplexNum){ ... } } Any help greatly appreciated. Cheers, Hemmer
http://www.webdeveloper.com/forum/printthread.php?t=201200&pp=15&page=1
CC-MAIN-2015-27
refinedweb
256
67.08
A file is a container in computer storage devices used for storing data. a. You can easily create text files using any simple text editors such as Notepad. When you open those files, you'll see all the contents within the file as plain text. You can easily edit or delete the contents. They take minimum effort to maintain, are easily readable, and provide the least security and takes bigger storage space.. File Operations In C, you can perform four major operations on files, either text or binary: - Creating a new file - Opening an existing file - Closing a file - Reading from and writing information to a file Working with files When working with files, you need to declare a pointer of type file. This declaration is needed for communication between the file and the program. FILE *fptr; Opening a file - for creation and edit Opening a file is performed using the fopen() function defined in the stdio.h header file. the fclose() function. fclose(fptr); Here, fptr is a file pointer associated with. Example 1: Write to a text file #include <stdio.h> #include <stdlib.h> int main() { int num; FILE *fptr; // use appropriate location if you are using MacOS or Linux fptr = fopen("C:\\program.txt","w"); if(fptr == NULL) { printf("Error!"); exit(1); } printf("Enter num: "); scanf("%d",&num); fprintf(fptr,"%d",num); fclose(fptr); return 0; } This program takes a number from the user and stores in the file program.txt. After you compile and run this program, you can see a text file program.txt created in C drive of your computer. When you open the file, you can see the integer you entered. Example 2: Read from a text file #include <stdio.h> #include <stdlib successfully created the file from Example 1, running this program will get you the integer you entered. Other functions like fgetchar(), fputc() etc. can be used in a similar way. Reading and writing to a binary file Functions fread() and fwrite() are used for reading from and writing to a file on the disk respectively in case of binary files. Writing to a binary file To write into a binary file, you need to use the fwrite() function. The functions take four arguments: - address of data to be written in the disk - size of data to be written in the disk - number of such type of data - pointer to the file where you want to write. fwrite(addressData, sizeData, numbersData, pointerToFile); Example 3: Write to a binary file using fwrite() #include <stdio.h> #include <stdlib*n; num.n3 = 5*n + 1; fwrite(&num, sizeof(struct threeNum), 1, fptr); } fclose(fptr); return 0; } In this program, the fwrite() function as above. fread(addressData, sizeData, numbersData, pointerToFile); Example 4: Read 5:\n", num.n1, num.n2, num.n3); fseek(fptr, -2*sizeof(struct threeNum), SEEK_CUR); } fclose(fptr); return 0; } This program will start reading the records from the file program.bin in the reverse order (last to first) and prints it.
https://cdn.programiz.com/c-programming/c-file-input-output
CC-MAIN-2020-40
refinedweb
499
65.42
i want to determine the day (sunday, monday, etc..) of a given date (ex: august 3rd, 2005). i have written a function which count the number of days into the year that the date is...example, feb 1st is 32 days into the year. i can't figure out how to do this though... i know that jan 1st, 1900 was a tuesday, but i really have no idea what to do with that . any suggestions? also, i posted the code below because it seemed too easy and produced the right output the very first time.... any insight on possible errors which might occur in special cases? month, day, and year will always have valid values Code://declared in date.h int Date::month; int Date::day; int Date::year; //dummy function until i confirm it's accuracy bool Date::isLeap(void) { return !(year % 4); } int Date::daysIntoYear(void) { if(month == 1) return day; int count = 31; int lastMonth = 31; for(int i = 2; i < month; i++) { if(lastMonth == 31) //if the last month had { //31 days, this month //has 30 days if(i != 8) ///<--unless this month { //is august lastMonth = 30; } count += lastMonth; }else{ lastMonth = 31; count += lastMonth; } } if(month > 2) //if past Feb, remove { //1 or 2 days (if leap 1, else 2) if(isLeap()){ count--; }else{ count -= 2; } } return (count + day); }
https://cboard.cprogramming.com/cplusplus-programming/57691-determing-day-given-date.html
CC-MAIN-2017-13
refinedweb
224
79.4
Due at 11:59pm on 02/04/2015. Download lab. Now we'll see where environment diagrams come in really handy: When dealing with lambda expressions in addition to other higher-order functions. Higher order functions are functions that take a function as an input, and/or output a function. We will be exploring many applications of higher order functions. >>> def square(x): ... return x*x ... >>> def neg(f, x): ... return -f(x) ... >>> neg(square, 4)______-16 >>> def even(f): ... def odd(x): ... if x < 0: ... return f(-x) ... return f(x) ... return odd ... >>> def identity(x): ... return x ... >>> triangle = even(identity) >>> triangle______<function ...>>>> triangle(61)______61>>> triangle(-4)______4 >>> def first(x): ... x += 8 ... def second(y): ... print('second') ... return x + y ... print('first') ... return second ... >>> f = first(15)______first>>> f______<function ...>>>> f(16)______second 39 Lambda expressions are one-line functions that specify two things: the parameters and the return value. lambda <parameters>: <return value> One difference between using the def keyword and lambda expressions is that def is a statement, while lambda is an expression. Evaluating a def statement will have a side effect; namely, it creates a new function binding in the current environment. On the other hand, evaluating a lambda expression will not change the environment unless we do something with this expression. For instance, we could assign it to a variable or pass it in as a function argument. >>> a = lambda: 5 >>> a()______5>>> a(5)______TypeError: <lambda>() takes 0 positional arguments but 1 was given>>> a()()______TypeError: 'int' object is not callable>>> lambda x: x # Can we access this function?______<function <lambda> at ...>>>> b = lambda: lambda x: 3 >>> b()(15)______3>>> c = lambda x, y: x + y >>> c(4, 5)______9>>> d = lambda x: c(a(), b()(x)) >>> d(2)______8>>> b = lambda: lambda x: x >>> d(2)______7>>> e = lambda x: lambda y: x * y >>> e(3)______<function ...>>>> e(3)(3)______9>>> f = e(2) >>> f(5)______10>>> f(6)______12>>> g = lambda: print(1) # When is the body of this function run?______# Nothing gets printed by the interpreter>>> h = g()______1>>> print(h)______None For each of the following expressions, write functions f1, f2, f3, and f4 such that the evaluation of each expression succeeds, without causing an error. Be sure to use lambdas in your function definition instead of nested def statements. Each function should have a one line solution. def f1(): """ >>> f1() 3 """"*** YOUR CODE HERE ***"return 3def f2(): """ >>> f2()() 3 """"*** YOUR CODE HERE ***"return lambda: 3def f3(): """ >>> f3()(3) 3 """"*** YOUR CODE HERE ***"return lambda x: xdef f4(): """ >>> f4()()(3)() 3 """"*** YOUR CODE HERE ***"return lambda: lambda x: lambda: x>>> # Part 2: This one is pretty tough. A carefully drawn environment >>> # diagram will be really useful. >>> g = lambda x: x + 3 >>> def wow(f): ... def boom(g): ... return f(g) ... return boom ... >>> f = wow(g) >>> f(2)______5>>> g = lambda x: x * x >>> f(3)______6 g = lambda x: x * xdoesn't change what f(3) does! A recursive function is a function that calls itself in its body, either directly or indirectly. Recursive functions have two important components:: Write a function sum that takes a single argument n and computes the sum of all integers between 0 and n inclusive. Assume n is non-negative. def sum(n): """Computes the sum of all integers between 1 and n, inclusive. Assume n is positive. >>> sum(1) 1 >>> sum(5) # 1 + 2 + 3 + 4 + 5 15 """"*** YOUR CODE HERE ***"if n == 1: return 1 return n + sum(n - 1) The following examples of recursive functions show some examples of common recursion mistakes. Fix them so that they work as intended. def sum_every_other_number(n): """Return the sum of every other natural number up to n, inclusive. >>> sum_every_other_number(8) 20 >>> sum_every_other_number(9) 25 """ if n == 0: return 0 else: return n + sum_every_other_number(n - 2) Consider what happens when we choose an odd number for n. sum_every_other_number(3) will return 3 + sum_every_other_number(1). sum_every_other_number(1) will return 1 + sum_every_other_number( sum_every_other_number(n): if n == 0: return 0 elif n == 1: return 1 else: return n + sum_every_other_number(n - 2) def fibonacci(n): """Return the nth fibonacci number. >>> fibonacci(11) 89 """ if n == 0: return 0 elif n == 1: return 1 else: fibonacci(n - 1) + fibonacci(n - 2) The result of the recursive calls is not returned. def fibonacci(n): if n == 0: return 0 elif n == 1: return 1 else: return fibonacci(n - 1) + fibonacci(n - 2)) Questions in this section are not required for submission. However, we encourage you to try them out on your own time for extra practice. This question is extremely challenging. Use it to test if you have really mastered the material!) Fill in the blanks as to what Python would do here. Please try this problem first with an environment diagram, and then again without an environment diagram. >>> def troy(): ... abed = 0 ... while abed < 10: ... britta = lambda: abed ... abed += 1 ... abed = 20 ... return britta ... >>> jeff = troy() >>> shirley = lambda : jeff >>> pierce = shirley() >>> pierce()______20
http://gaotx.com/cs61a/lab/lab03/
CC-MAIN-2018-43
refinedweb
839
64.3
Hi everyone, new to the DaniWeb community, i have always used it for homework help in the past, but i'm about to rip my hair out if i stare at this code for another hour. basically the project is to write a code that reads data from a file, gets the name, hitemp, lotemp, and avgrainfall from the input, to be used in later functions. Seemed very simple about a week ago, but the File I/O combined with the Getline() and array of structs is prooving to be a challenge. It just seems like there isn't a problem, but it won't work! I believe its my getline functions. The code compiles correctly in VS8.0, but as soon as command prompt opens, windows closes the window and i get this huge error message (running Windows 7 pro). I'm sure its something stupid, but if anyone can see anything wrong with this please let me know, otherwise I'm going to assume its my computer (again... ;) ) Thanks! #include<iostream> #include<iomanip> #include<string> #include<fstream> using namespace std; struct WeatherInfo { string city; double TotRain; double TempHi; double TempLo; double TempAvg; }; ifstream infile; void fillCities(WeatherInfo Rain [], int &); int main() { int NumCities; WeatherInfo Rain[30]; infile.open("prog1.txt"); fillCities(Rain, NumCities); infile.close(); return 0; } void fillCities(WeatherInfo Rain [], int &NumCities) { string CityName; int i = 0; getline(infile, CityName); while ( !infile.eof() ) { Rain[i].city = CityName; infile >> Rain[i].TotRain; infile >> Rain[i].TempHi; infile >> Rain[i].TempLo; infile.ignore(); getline(infile, CityName); i++; } NumCities = i; }
https://www.daniweb.com/programming/software-development/threads/261267/c-code-problems-with-getline-function
CC-MAIN-2017-17
refinedweb
260
55.95
Overview. NOTE: To complete this tutorial, you must have an active Azure account. If you don't have an account, you can create a free trial account in just a couple of minutes. For details, see Azure Free Trial. Create, and then click the Enable unauthenticated push notifications check box in the Windows Phone notification settings section. >. In Solution Explorer, expand Properties, open the WMAppManifest.xml file, click the Capabilities tab, and make sure that the ID_CAP_PUSH_NOTIFICATION capability is checked. This ensures that your app can receive push notifications. Press the F5 key to run the app. A registration message is displayed. Close the app. You must close the app to receive the toast notification. Send the notification from your backend You can send notifications by using Notification Hubs from any backend via the REST interface. In this tutorial, you send notifications by using a .NET console application. For an example of how to send notifications from an Azure Mobile Services backend that's integrated with Notification Hubs, see "Get started with push notifications in Mobile Services" (.NET backend | JavaScript backend). For an example of how to send notifications by using the REST APIs, see "How to use Notification Hubs from Java/PHP" (Java | PHP). Right-click the solution, select Add and New Project..., and then under Visual C#, click Windows and Console Application, and click OK. file Program.cs and add the following usingstatement: using Microsoft.Azure.NotificationHubs; In the Program class, on the Notification Hubs tab. Also, replace the connection string placeholder with the connection string called DefaultFullSharedAccessSignature that you obtained in the section "Configure your notification hub." Add the following line in your Main method: SendNotificationAsync(); Console.ReadLine(); With your Windows Phone emulator running and your app closed, set the console application project as the default startup project, and then press the F5 key to run the app. You will receive a toast notification. Tapping the toast banner loads the app. You can find all the possible payloads in the toast catalog and tile catalog topics on MSDN. Next steps In this simple example, you broadcasted notifications to all your Windows Phone 8.
https://azure.microsoft.com/en-us/documentation/articles/notification-hubs-windows-phone-get-started/
CC-MAIN-2016-07
refinedweb
356
50.43
it is good example for abstract classes.Thanks View Tutorial By: Nilesh Chavan at 2010-07-17 02:24:42 2. Thanks for the description. Am loading my actionse View Tutorial By: sridevi at 2012-01-13 10:15:40 3. I used code when command button clik , it wil show View Tutorial By: sekh umar at 2011-06-23 01:40:21 4. HI there, thanks for taking time to write this dow View Tutorial By: nick at 2012-07-31 10:41:47 5. Excelent article, I will start to use struts 2 now View Tutorial By: Alex at 2010-01-20 16:13:34 6. thank you...as a beginner this info very useful fo View Tutorial By: snigdha at 2012-10-17 11:41:39 7. Can I ask something, Can you show m View Tutorial By: wawa at 2014-05-03 15:28:35 8. Try this import java.net.*; View Tutorial By: Asad at 2014-02-13 05:55:26 9. /* File name : Employee.java */ public abst View Tutorial By: Anonymous at 2012-11-16 12:23:17 10. I have no mounted the sd card, and I have the &quo View Tutorial By: Cgamboa at 2012-12-01 06:39:14
https://java-samples.com/showcomment.php?commentid=34679
CC-MAIN-2022-33
refinedweb
208
76.52
I. The implementation is really straight, a panel with a asp:Login in it: : ;} Here is the result: Or I think you could have used a LinkButton control, and set the ModalPopupExtender "CancelButton" property to the LinkButton's ID. That would have done the same thing with far less hassle. Robert: Yeah for sure I could, if I used a ModalPopupExtender, but I am using a PopupControlExtender and there is no CancelButton there. Exactly what I was looking for. Thanks!!! SB Enjoy it Steve :) Chris: Use css to do that with cursor: pointer; Hi Laurent, it has been worked fine, thanX! Thiago. If I want to close calendar after selecting the date then how it can be done? You're the greatest!!! I was looking for exactly this solution the whole morning. Finally I found it here and it works fine! Thank you Laurent! You made my day :-D Bianca Bianca: A pleasure !!! You are welcome :-) oh, just another one... i tried to call the function onMouseOver as well. I did this by using onmouseover="this.click();" very simple. OnMouseOut I made it with your purpose. All fine in IE But unfortunatly FF does not recognize "this.click();" here. Error message: "this.click is not a function" Any further idea ...? Thanks a lot! Try out something like that: if (elmt.click) elmt.click(); else { var e = document.createEvent("MouseEvents"); e.initEvent("click", true, true); elmt.dispatchEvent(e); } I think it's the ASP.NET Label that's causing the problem in FF... <asp:Label</asp:Label> Even if I try a simple alert() on mouseover I get no reaction .. :-( Thanks Robert, just the job! Steve: My firstname is Laurent not Robert ! ;) why are you calling me Robert ? thanks buddy, worked for me Close PopupExtender with javascript AjaxControlToolkit.PopupControlBehavior.__VisiblePopup.hidePopup(); Say I have a HyperLink control, I want to open another window after clicking on the link. The popup will close, but somehow it won't open another window even though I set the NavigateUrl. Do you have any idea to work around this? Unbelievable that such a hack is necessary to close a PopupControlExtender. To me it surely looks like you are accessing a property and internal function that was not meant for direct calling outside of this control, given that its name starts with two underscores, "__VisiblePopup". Generally the underscores are meant to indicate an internal only property. It is highly likely that in future release of the toolkit this code could break, given that you are relying on functionality that is meant for internal use only. To me, this shows me how immature the asp.net ajax control toolkit is. Hopefully members of the team responsible for the toolkit will take note of this, and improve their controls, offering "Public" client side functions (as well as code behind server functions) to do this and so many other things. This works great, but not in IE6. Is there any way to have your main page served up http, but have the login stuff submit over https? What may be the best way to wire up this popup with an button in edit template so that when a user clicks on update button in <edittemplate>, a login popup is shown and only if the user is authenticated, the rowupdating(event) process may continue... Sorry Laurent! I don't know why I called you Robert either! My brain cell must have been scrambled from trying to find the answer to the close window prob, of which your page answered elegantly Steve: no problem ;) good one Hi, Is it possible that textbox UserName after pop up was with in focus? Thanks a lot. Great!!! I use it with Button in popupControlExtender and test it in IE, FireFox and Safari. I haven't tried it, but apparently this also works: OnClientClick="$find('popup').hidePopup(); return false;" but you might need to make it an asp.net control for that to work? This is good. But I'm finding if I add any positioning properties, e.g. Position or OffsetX, the login disappears! Why should that happen, I wonder? CJ: I added Position="Left" OffsetX="150" OffsetY="150" it worked fine on IE7 Do you have a working copy of this..when i try to implement on my app i get following this._postBackSettings.async is null or not an object I have also tried using update panels on the page..the issue is how should i keep my popup open in case of there is login failure.. Just added a post earlier with issue of displaying the login failed message on popup extender..the popup extender closes and when i click the link again..i can see the login ctrl with login failure message.. here is the page and codebehined method.. <%@ Page Language="C#" AutoEventWireup="true" CodeFile="login.aspx.cs" Inherits="login" %> <%@ Register Assembly="System.Web.Extensions, Version=1.0.61025> <style> ; </style> </head> <body> <form id="form1" runat="server"> <asp:ScriptManager <asp:UpdatePanel <ContentTemplate> <asp:Panel <asp:Login <div class="closeLoginPanel"> <a onclick="AjaxControlToolkit.PopupControlBehavior.__VisiblePopup.hidePopup(); return false;" title="Close">X</a> </div> </asp:Panel> </ContentTemplate> </asp:UpdatePanel> <ajaxToolkit:PopupControlExtender <asp:HyperLinkLogin</asp:HyperLink> </div> </form> </body> </html> protected void Login1_Authenticate(object sender, AuthenticateEventArgs e) { LoginCtrl.FailureText = "login failed"; } Super.... Has anyone come up with a solution to keep the login window open when the wrong credentials are entered? I have not been successful after several different things, which is unfortunate because I really like this control. Worked like a charm. Thanks for the post. Hello, Its a nice article and nice implementation. I am looking to make almost same. I am looking to show the alert div in the page at regular intervals using a timer and within a UpdatePanel. But i am not succesfull yet. If you have any suggestions or advice please do guide. Thanks and Regards, Prashanth Kumar G. prashanthganathe@gmail.com once again. I am looking to update a label1 as label1.Text=" Mails(x)" where Timer1 will update the values at a regular interval. using popupcontrolExtender,on clicking the label, it has to show the grid. Where grid will be populated at another regular interval maintained by Timer2. I kept both timers in different update panel,(so when Timer1 ticks, it should not disturb the other timer) But seems in Firefox 3.0 some bugs are there, it never allows the Timer to tick, if its interval is bigger than the other.(the smaller one wil have ticks very often and the other Timer gets refresh so it never ticks). I am giving my Source code, below Please help me if it is possible. Instead of Grid i am using a lable.Text +="abc"; to keep the code simple and easy to analyze. <%@ Page Language="C#" AutoEventWireup="true" CodeFile="PopupControlExtender.aspx.cs" Inherits="PopupControlExtender" %> <%@ Register assembly="AjaxControlToolkit" namespace="AjaxControlToolkit" tagprefix="cc1" %> <link href="css/StyleSheet.css" rel="stylesheet" type="text/css" /> <asp:ScriptManager </asp:ScriptManager> <div> <asp:Panel <div class="closeLoginPanel"> <a onclick="AjaxControlToolkit.PopupControlBehavior.__VisiblePopup.hidePopup(); return false;" title="close">X</a> </div> <br /> <br /> <asp:UpdatePanel <ContentTemplate> <asp:Label</asp:Label> <asp:Timer </asp:Timer> </ContentTemplate> </asp:UpdatePanel> > <asp:UpdatePanel <asp:HyperLink</asp:HyperLink> <asp:Timer <cc1:PopupControlExtender ID="PopEx" runat="server" TargetControlID="loginHyperLink" PopupControlID="loginPanel" Position= PopupControlExtender : System.Web.UI.Page static int i; protected void Page_Load(object sender, EventArgs e) protected void Timer1_Tick(object sender, EventArgs e) lblinfo.Text+="abc "; protected void Timer2_Tick(object sender, EventArgs e) this.loginHyperLink.Text =" you have " + i + " mails"; i=i+1; both time I am trying to use 2 timers. Ron: On postback, the popup will be closed. You can use server-side code to show() the popup, perhaps in the PageLoad event using the IsPostBack flag or the event handler of the server control. The Cancel() method seemed to do the trick rather nicely. I'm using a button but should work just as well with a link button for the "X" text link. very nice article but in case of FailureAction the popup closes and when we click on the link again the popup opens again with the red message that either your password or login is incorrect. how can we stop the whole page refresh and the popup from closing. Or is there any other way to stop the FailureAction. Maziz, I asked the same question a couple of months back. It appears that there is no way to both use Ajax to display the control without a page refresh, and to use the control in typical business scenarios. To me, if the control fails to alert the user that she/he has presented the wrong user name or password, without calling the show method (and having the control close/reopen), then it doesn't work. Too bad, because if you have perfect users who never make a mistake, it's a fairly cool item....If you have one user who makes the mistake though, it is a fairly useless item. Did some one try this code by puting on the Master page?. Tanveer, I did, works like a charm. Visit my site and you'll see. Anyone? My target control hyperlink button doesn't have any mouse over effects? Can someone help? This post contains some of the most asked questions when using login control. 1- how to redirect users Login control FAQ :
http://weblogs.asp.net/lkempe/archive/2007/01/28/login-control-in-an-asp-net-ajax-toolkit-popupcontrolextender-with-a-close-button.aspx
crawl-002
refinedweb
1,563
58.89
EJB 3.1 in GlassFish V3 TP2 In this blog, I will describe some of the EJB 3.1 features that are available in GlassFish V3. For a full list of what is planned in EJB3.1 please refer to Ken's blog Note: Before, you run any of the EJB 3.1 applications ensure that you follow the steps outlined in Installing EJB container in GlassFish V3 What EJB features are available in GlassFish V3 TP2 Only Stateless Session beans with local interfaces are supported. Stateful, Message driven and EJB 2.x entity beans are not supported. Remote interfaces and Remote business interfaces for any of the bean type are not supported yet. Timer Service is supported, but a little bit of configuration is needed to enable it. We will be blogging about how to enable TimerService in GlassFish V3 shortly. Support for other types of beans will be available soon. Note: TP2 gives you an early look at GlassFish v3. It is not a full, feature-complete application server and is not suitable for production deployments. It is suitable for experimentation and exploration. Experiment, take a look at the new approach being taken in GlassFish v3, and then let us know what you think Using GlassFish V3 server To run the sample application provided, follow the steps mentioned in How to run the hello.war Quick start guide provides more details on how to use the GlassFish V3 server. Optional Local Business Interfaces Recall that even though EJB 3.1 simplified the EJB development by introducing the business interfaces, the bean developer must still write at least one interface. For most of the applications this is again an overhead. In EJB 3.1 an EJB need not implement any interface as long as it contains one of the component defining annotations (or the XML equivalent). So a simple EJB 3.1 HelloBean looks like this: @Stateless public class HelloBean { public String sayHello() { return "Hello, World!!"; } } Note: The client still has to perform a JNDI lookup or inject a reference of the bean. More specifically, it cannot use the new operator to construct the bean. So a Servlet that use the HelloBean will be coded like the following: public class HelloServlet { @EJB private HelloBean hello; .... hello.sayHello(); .... } Simplified packaging JavaEE 5 greatly improved the ease of use by providing a bunch of annotations that that obviated the need for XMLs. However, it still required that Servlets/JSPs be packaged in a .war file and EJBs be packaged (in possibly multiple) .jar files. These files must further be packaged inside a .ear file. For simple web applications that wanted to use EJBs, the above packaging restrictions was a bit of an overkill Another cool feature that is introduced in EJB 3.1 is the simplification of packaging requirements of EJBs. Now, EJB classes can be packaged inside the .war file itself!! The classes must reside under WEB-INF/classes. Because of the above two features, the structure of our hello.war looks like this. META-INF/ META-INF/MANIFEST.MF WEB-INF/ WEB-INF/classes/ WEB-INF/classes/com/ WEB-INF/classes/com/sun/ WEB-INF/classes/com/sun/v3/ WEB-INF/classes/com/sun/v3/demo/ WEB-INF/classes/com/sun/v3/demo/HelloEJB.class WEB-INF/classes/com/sun/v3/demo/HelloServlet.class WEB-INF/web.xml index.jsp How to run hello.war Download the attachments provided. HelloEJB31.war contains the application that can be deployed. HelloEJB31.zip contains the sources. - Start the server by running: <install_dir>/asadmin start-domain - Deploy the application by running: <install_dir>/asadmin deploy hello.war - Open a browser and go to: See for information on how to enable TimerService in GlassFish V3 Posted by Marina on May 06, 2008 at 10:06 PM PDT # Hi Mahesh, great article, let me ask you, did you try to test an asynchronous method ? Regards Wagner Posted by Wagner Santos on May 23, 2008 at 12:10 AM PDT # Posted by Arun Gupta's Blog on January 19, 2009 at 04:15 PM PST # Hi, when i try to deploy HelloEJB31.war attached, it reports an error like: message: Exception while deploying the app : java.lang.RuntimeException: Invalid ejb jar [HelloEJB31]:), please check server.log to see whether the annotations were processed properly. Posted by Amy on March 05, 2009 at 08:48 PM PST #
http://blogs.sun.com/MaheshKannan/entry/ejb_3_1_in_glassfish
crawl-002
refinedweb
729
57.98
Round-1) Written test conducted on mettl.com There was a pool of questions out of which everyone got 3 questions in 1.5hr. The questions were of easy, easy and medium level. I was asked the following: - Find roots of given quadratic equation. The tricky part was they asked to return (not print) them having only 3 decimal places. - Check for balanced paranthesis in a given piece of code. - Given n students, m colleges and n*m Boolean matrix which represents whether student has applied in a college or not. Also, given number of seats in college, what are the maximum possible admissions that could be given in total. I did all the three to be on safer side. But cutoff surprisingly was low to 1.6 questions solved. They have specific test cases pertaining to corner cases, time complexity cases, etc. 10 test cases per question. 54 students were shortlisted for next round. Round-2) Group fly round I wonder why it is called group fly round, when there is neither any group nor anything flying. Here, they gave 2 questions in 1hr where we have to write complete code on paper in any language of your choice. It is recommended to use either C, C++ or Java. The questions are: - Print all nodes with k distance from target node. - Flood fill algorithm i.e. given n*m matrix with different colors in each pixel. Given a co-ordinate (i, j) and a new color k, you need to fill k color at given co-ordinate and all adjacent pixels with same color will be filled with new color. This is done in recursive manner till the boundaries are of different colors. I did both of them. I would recommend to practice data structures well and basic algorithms. The areas include trees, stack, linked lists, graphs and dynamic programming, in that order. Solving all the questions till this round will give you backup in case you spoil some interview round. Try writing neat and clean code, without cancelling any statement. After this round, they gave a break, followed by presentation by the company officials. After lunch time, results were announced and 21 students moved to next round. Round-3) Technical-1 I used to think that to start with, they will ask all flavoured questions like Introduce yourself, etc. Literally speaking, as soon as I entered, the interviewer just said, let’s start with problem solving. He told me that first explain me your approach, if it’s okay, then write the code for it. - Increasing decreasing array is given, write program to search an element in it. - In a stream of characters coming in, keep track of first non-repeating character at each instance. I explained the approach with an example. After explaining the codes to him, he asked me to write test cases for it. What is of utter importance while writing test cases is all the paths which your program could take should be checked. Round-4) Technical-2 It was a kind of rapid fire kind till the point when I was stuck. He started with What is HashTable? Why do we use it? What is the time complexity associated with various operations? What is a good hash function? How to resolve collisions? If all n keys go into same hash value, then O(1) search is violated, how to still achieve this? How is HashMap implemented? Now, the question came at which I was stuck, “Return a random number from given HashTable.” What he wrote was, X = H.random(); How to implement this? Really speaking, I tried to convince the interviewer, but he seemed to be less satisfied. Then he told, let’s move to problem solving. - Given an array consisting of only 0, 1 and 2. Sort it. Explained multiple approaches. Now, he started dry run on the code I wrote for Dutch National Flag algorithm. He claimed that my code is not working. I explained him 3times, but everytime he missed something and lead to wrong result. Then he told, we are running out of time, let’s move to next problem. - Do you know dynamic programming? I told yes, so he asked me, what all dp problems you have solved. I gave a list of 12-15 different pattern problems. He replied, okay I will not ask you any problem from dp.(probably I had heard of all the problems in his list) He then asked how to check if a given linked list is a palindrome in one pass. I wrote code for both of them. He seemed dissatisfied at end. He said have a nice day. I thought, it’s over now. But, it was just the beginning. The HR coordinator asked me to go to another room and wait. I was wondering, they should have said goodbye directly, but there was a surprise for me within few minutes. HR called me, please come. Round-5) Technical+HR What you learnt in your previous company? Why MTech then? What is your recent interest of study? It was more of a conversation, because my previous company was next to Microsoft office, so kind of neighbour talks ! You mentioned Sudoku solver, h what is it? How you implemented it? Ok, let’s move to a basic problem. He asked me to write recursive equation for 0-1Knapsack problem and explain. He was happy and asked how was my written and group fly. I told him that I did everything, but I could have done 1 problem in a better way, so he was impressed. I was immediately called in. Round-6) Technical+HR The principal manager with 17yrs exp took this interview. She asked which is your favourite website. I was soo tired, I could barely speak. I didn’t had lunch properly and no snacks. Still, I said something and told her about Quora and why I like Quora. She then asked me Celebrity problem. I was not able to think, but she helped me to think and I was able to answer in third time. Anything you do apart from your regular time? I told her about Marathons and football. Ok, we are done. Any questions? We will let you know the results, you may leave. Results were announced same day night and I was among the 6 people selected, followed by celebrations. Some suggestions: - Prepare from any website like leetcode, geeksforgeeks, careercup, interview bit, etc. But stick to one, don’t get confused by other people are doing this and I am not doing. - Learn to write code on paper and not just computer. - Try to attempt before giving up on solutions during interview. The interviewers are very very generous people and they help you a lot. Think that they are here to take only you, so you have solve everything. - Be sure what you are writing on resume, you must know everything what you write. Write less, speak more. If you write more, what will you have to tell in interview. - I would recommend writing mini projects which might be small, but you learnt some nice concept from it. I mentioned Sudoku solver and they asked me about it. - They follow feedback based system after every interview, i.e. they keep on attaching all the sheets you used previously and write their feedback and forward it to next interviewer, so if one interview didn’t go well, don’t feel bad, do your best in next interview and they might still select you. At last, don’t get disheartened if you are not able to code everything in one go. Learn a concept in a day and solve 3-5 questions on it. One day, when the day is yours, everything will come to you. Till then,.
https://www.geeksforgeeks.org/microsoft-interview-experience-for-summer-internship-2020/?ref=rp
CC-MAIN-2021-25
refinedweb
1,301
76.52
Good morning! I have a problem with the interfacing between Arduino DUE board and an external high resolution DAC, the AD5570 I would like to obtain two different output: 1- Constant voltage output: the user will select the desired output voltage (1V, 100mV, -100mV…) and the board will sent to the DAC the proper binary code in order to obtain thet voltage; 2-Voltage ramp out; I’ve written something regarding the first problem but i can’t obtain a good result (I have no idea how to solve the second problem). The code is the following: #include <SPI.h> int DACR; long Din; //Input signal const int V_ref = 5; //reference voltage long tot_level = 65536; //2^16 of the output (16 bit DAC) void setup() { Serial.begin(115200); SPI.begin(pinSYNC_DAC); SPI.setBitOrder(MSBFIRST); SPI.setClockDivider(21); SPI.setDataMode(pinSYNC_DAC,SPI_MODE1); } void loop() { if (Serial.available()!=0){ DACR = Serial.parseInt() ; Serial.print("Voltage selected: "); Serial.println(DACR,DEC); Din = ((DACR + 2* V_ref)*tot_level)/(4*V_ref); Serial.println(Din); delay(1000); if(Din>=tot_level){ Din=tot_level;} byte msg1 = (Din >> 8); byte msg2 = (Din & 0xFF); Serial.println(msg1,BIN); Serial.println(msg2,BIN); } } And this is what i obtain on the serial monitor when i run the program: Voltage selected: 1 36044 10001100 11001100 Voltage selected: 2 39321 10011001 10011001 Voltage selected: 3 42598 10100110 1100110 Voltage selected: 5 49152 11000000 0 Voltage selected: -1 29491 1110011 110011 Voltage selected: -2 26214 1100110 1100110 I don’t know what is wrong but i don’t know how to solve the problem. Unfortunately i’m stuck on these two problem and i can’t go ahead. How can i send the properly binary code to the DAC through Arduino DUE? Thank you for your attention!
https://forum.arduino.cc/t/spi-protocol-with-external-dac/333138
CC-MAIN-2022-27
refinedweb
292
50.36
Using os x 10.5.3, java 1.6.0_05, idea 8445, plugin 0.2.16990, Scala 2.7.1 final Given the following application: object SomeApplication { def main(args: Array[String]) = { val list = List("blah", "blah") println("Hello") } } Go to declaration (or Ctrl+clicking) works properly for List and jumps to the source. However, for println, it correctly identifies that it is from scala.Predef, but instead of jumping to the source, it decompiles a Java stub. Strange given that the source is for both is in the same jar. Cheers, Andrew P.S. The plugin is looking good! Using os x 10.5.3, java 1.6.0_05, idea 8445, plugin 0.2.16990, Scala 2.7.1 final Andrew, the behavior you describe is the consequence of scala PSI not implementing common (aka java) PSI on the method level. doing this is on the list of the plugin development. Another aspect that is not yet implemented is the proper resolution of method targets. This is also to be done in the near future.
https://intellij-support.jetbrains.com/hc/en-us/community/posts/206004339-Go-to-Declaration-fails-for-Predef-println?page=1
CC-MAIN-2020-10
refinedweb
176
71.31
Showing articles with label LPC546xx . Show all articles Sort by: Date Date Views Kudos Helpfulness LPC54608 LIN slave basic usage sharing 1 Abstract This post is mainly about the LPC54608 LIN slave basic usage, it is similar to the post about the LPC54608 LIN master basic usage. NXP LPC54608 UART module already have the LIN master and slave function, so this post will give a simple slave code and test result which is associated with the LIN analyzer. Use the LIN analyzer as the LIN master, LPC54608 as the LIN slave, master will send the specific ID frame (publish frame and the subscribe frame) to LIN slave, and wait the feedback from LIN slave side. 2 LPC54608 LIN slave example Now use the LPCXpresso54608 board as the LIN slave, the PCAN-USB Pro FD LIN analyzer as the LIN master, give the hardware connection and the simple software code about the LIN slave. 2.1 Hardware requirement Hardware : LPCXpresso54608 , TRK-KEA8 , PCAN-USB Pro FD(LIN analyzer), 12V DC power supply LIN bus voltage is 12V, but the LPCXpresso54608 board don’t have the on-board LIN transceiver chip, so we need to find the external board which contains LIN transceiver chip, here we will use the TRK-KEA8, this board already have the MC33662LEF LIN transceiver, or the board KIT33662LEFEVB which is mentioned in the LPC54608 LIN master post. The MC33662LEF LIN transceiver circuit from TRK-KEA8 just as follows: Fig 2-1. LIN transceiver schematic 2.1.1 LPCXpresso54608 and TRK-KEA8 connections LPCXpresso54608 UART port need to connect to the LIN transceiver: No. LPCXpresso54608 TRK-KEA8 note 1 P4_RX J10-5 UART0_RX 2 P4_TX J10-6 UART0_TX 3 P4_GND J14-1 GND 2.1.2 TRK-KEA8 and LIN master analyzer tool connections LIN analyzer LIN bus is connected to the TRK-KEA8 LIN bus. LIN analyzer GND is connected to the TRK-KEA8 GND. TRK-KEA8 P1 port powered with 12V, LIN master analyzer Vbat pin also need to be connected to 12V. TRK-KEA8 J13_2 need to connect to 3.3V DC power, but because TRK-KEA8 is the 5V and 12V, so need to find another 3.3V supply to connect J13_2, here use the FRDM-KL43 as the 3.3V supply. Just make sure the LIN transceiver can input 3.3V and output the 3.3V signal to the UART port. 2.1.3 Physical connections 2.2 Software flow and code This part is about the LIN publisher data and the subscriber ID data between the LIN master and slave. The code is modified based on the SDK LPCXpresso54608 usart interrupt project. 2.2.1 software flow chart 2.2.2 software code Code is modified based on SDK_2.3.0_LPCXpresso54608 usart interrupt, the modified code is as follows: void DEMO_USART_IRQHandler ( void ) { if ( DEMO_USART -> STAT & USART_INTENSET_DELTARXBRKEN_MASK ) // detect LIN break { DEMO_USART -> STAT | = USART_INTENSET_DELTARXBRKEN_MASK ; // clear the bit Lin_BKflag = 1 ; cnt = 0 ; state = RECV_SYN ; DisableLinBreak ; } if ( ( kUSART_RxFifoNotEmptyFlag | kUSART_RxError ) & USART_GetStatusFlags ( DEMO_USART ) ) { USART_ClearStatusFlags ( DEMO_USART , kUSART_TxError | kUSART_RxError ) ; rxbuff [ cnt ] = USART_ReadByte ( DEMO_USART ) ; ; switch ( state ) { case RECV_SYN : if ( 0x55 == rxbuff [ cnt ] ) { state = RECV_PID ; } else { state = IDLE ; DisableLinBreak ; } break ; case RECV_PID : if ( 0xAD == rxbuff [ cnt ] ) { state = RECV_DATA ; } else if ( 0XEC == rxbuff [ cnt ] ) { state = SEND_DATA ; } else { state = IDLE ; DisableLinBreak ; } break ; case RECV_DATA : recdatacnt ++ ; if ( recdatacnt >= 4 ) // 3 Bytes data + 1 Bytes checksum { recdatacnt = 0 ; state = RECV_SYN ; EnableLinBreak ; } break ; default : break ; } cnt ++ ; } /* Add for ARM errata 838869, affects Cortex-M4, Cortex-M4F Store immediate overlapping exception return operation might vector to incorrect interrupt */ #if defined __CORTEX_M && (__CORTEX_M == 4U) __DSB ( ) ; #endif } /*! * @brief Main function */ int main ( void ) { usart_config_t config ; /* attach 12 MHz clock to FLEXCOMM0 (debug console) */ CLOCK_AttachClk ( BOARD_DEBUG_UART_CLK_ATTACH ) ; BOARD_InitPins ( ) ; BOARD_BootClockFROHF48M ( ) ; BOARD_InitDebugConsole ( ) ; /* * config.baudRate_Bps = 19200U; * config.parityMode = kUSART_ParityDisabled; * config.stopBitCount = kUSART_OneStopBit; * config.loopback = false; * config.enableTxFifo = false; * config.enableRxFifo = false; */ USART_GetDefaultConfig ( & config ) ; config . baudRate_Bps = BOARD_DEBUG_UART_BAUDRATE ; config . enableTx = true ; config . enableRx = true ; USART_Init ( DEMO_USART , & config , DEMO_USART_CLK_FREQ ) ; /* Enable RX interrupt. */ DEMO_USART -> INTENSET | = USART_INTENSET_DELTARXBRKEN_MASK ; //USART_INTENSET_STARTEN_MASK | USART_EnableInterrupts ( DEMO_USART , kUSART_RxLevelInterruptEnable | kUSART_RxErrorInterruptEnable ) ; EnableIRQ ( DEMO_USART_IRQn ) ; while ( 1 ) { if ( state == SEND_DATA ) { while ( kUSART_TxFifoNotFullFlag & USART_GetStatusFlags ( DEMO_USART ) ) { USART_WriteByte ( DEMO_USART , 0X01 ) ; break ; //just send one byte, otherwise, will send 16 bytes } while ( kUSART_TxFifoNotFullFlag & USART_GetStatusFlags ( DEMO_USART ) ) { USART_WriteByte ( DEMO_USART , 0X02 ) ; break ; //just send one byte, otherwise, will send 16 bytes } while ( kUSART_TxFifoNotFullFlag & USART_GetStatusFlags ( DEMO_USART ) ) { USART_WriteByte ( DEMO_USART , 0X10 ) ; // 0X10 correct 0Xaa wrong break ; //just send one byte, otherwise, will send 16 bytes } recdatacnt = 0 ; state = RECV_SYN ; EnableLinBreak ; } } } 3 LPC54608 LIN slave test result Master define two frames : Unconditional ID Protected ID Direction Data checksum 0X2C 0XEC subscriber 0x01,0x02 0x10 0X2D 0XAD Publisher 0x01,0x02,0x03 0x4c Now, LIN master send the above two frame to the slave LIN, give the test result and the wave from the LIN bus. 3.1 LIN master configuration Uart baud rate is: 19200bps 3.2 send 0X2C,0X2D frames From the above test result, we can find 0X2D send successfully, 0X2C can receive the data from the LIN save side, the received data is 0X01,0X02 and the checksum 0x10. 3.2.1 0X2D frame LIN bus wave and debug result From the LIN slave debug result, we can find LIN slave can receive the correct data from the LIN master, and after check, the checksum also correct. 3.2.2 0X2C frame LIN bus wave From the LIN Master tool interface, we can find if the slave give the wrong checksum 0XAA, the master will also can find the checksum is wrong. This is the according LIN bus wave with wrong checksum. From the above test result, we can find LPC54608 LIN slave, can receive the correct LIN bus data, and send back the correct LIN data to the master. View full article No ratings 09-10-2020 03:05 Ctimer Trigger ADC This article mainly introduces how to config CTIMER match 3 trigger ADC in LPC804, includes how to config related registers, and the code under SDK. Other LPC serials, also can refer to this DOC. 1. How To Configure ADC Part. 2.How to Configure CTIMER Part 3.Project Basic Information 4.Reference Project is attached, it base on MCUXpresso IDE v11.1.1, LPCXpresso804 board. View full article No ratings 07-23-2020 08:20 PM LPCXpresso54608: Getting Started with IAR Now that you've downloaded & unzipped your LPCXpresso54608 SDK, let's open IAR Embedded Workbench IDE. Note: You must have at least IAR Embedded Workbench version 7.80.3.12146 to use this board Once open, select File>Open>Workspace Navigate to the location where you unzipped your SDK files. Within this folder there are plenty of SDK based demos for you to explore our microcontroller. We will use one of them to guide you through this tutorial, but definitely take time to try all of them! Select boards>lpcxpresso54608>demo_apps>touch_cursor>iar>touch_cursor Once the workspace is loaded, you will see the project files on the left. Along the toolbar the first highlighted item is 'Build' select it. Once your console shows no errors you can select the 'Download and Debug' a few icons to the right of 'Build' Your debug session will start and will look like the following window. Once it opens 'touch_cursor.c' and has a green arrow next to the main function you can select 'Go' After you have successfully flashed the board with this demo you will see the following on your board. 03:47 PM
https://community.nxp.com/t5/LPC-Microcontrollers-Knowledge/tkb-p/lpc%40tkb/label-name/lpc546xx?labels=lpc546xx
CC-MAIN-2022-21
refinedweb
1,216
60.45
I just got my new MacBook Pro with M1 Max chip and am setting up Python. I've tried several combinational settings to test speed - now I'm quite confused. First put my questions here: - Why python run natively on M1 Max is greatly (~100%) slower than on my old MacBook Pro 2016 with Intel i5? - On M1 Max, why there isn't significant speed difference between native run (by miniforge) and run via Rosetta (by anaconda) - which is supposed to be slower ~20%? - On M1 Max and native run, why there isn't significant speed difference between conda installed Numpy and TensorFlow installed Numpy - which is supposed to be faster? - On M1 Max, why run in PyCharm IDE is constantly slower ~20% than run from terminal, which doesn't happen on my old Intel Mac. Evidence supporting my questions is as follows: Here are the settings I've tried: 1. Python installed by - Miniforge-arm64, so that python is natively run on M1 Max Chip. (Check from Activity Monitor, Kindof python process is Apple). - Anaconda.: Then python is run via Rosseta. (Check from Activity Monitor, Kindof python process is Intel). 2. Numpy installed by conda install numpy: numpy from original conda-forge channel, or pre-installed with anaconda. - Apple-TensorFlow: with python installed by miniforge, I directly install tensorflow, and numpy will also be installed. It's said that, numpy installed in this way is optimized for Apple M1 and will be faster. Here is the installation commands: conda install -c apple tensorflow-deps python -m pip install tensorflow-macos python -m pip install tensorflow-metal 3. Run from - Terminal. - PyCharm (Apple Silicon version). Here is the test code: import time import numpy as np np.random.seed(42) a = np.random.uniform(size=(300, 300)) runtimes = 10 timecosts = [] for _ in range(runtimes): s_time = time.time() for i in range(100): a += 1 np.linalg.svd(a) timecosts.append(time.time() - s_time) print(f'mean of {runtimes} runs: {np.mean(timecosts):.5f}s') and here are the results: +-----------------------------------+-----------------------+--------------------+ | Python installed by (run on)→ | Miniforge (native M1) | Anaconda (Rosseta) | +----------------------+------------+------------+----------+----------+---------+ | Numpy installed by ↓ | Run from → | Terminal | PyCharm | Terminal | PyCharm | +----------------------+------------+------------+----------+----------+---------+ | Apple Tensorflow | 4.19151 | 4.86248 | / | / | +-----------------------------------+------------+----------+----------+---------+ | conda install numpy | 4.29386 | 4.98370 | 4.10029 | 4.99271 | +-----------------------------------+------------+----------+----------+---------+ This is quite slow. For comparison, - run the same code on my old MacBook Pro 2016 with i5 chip - it costs 2.39917s. - another post reports that run with M1 chip (not Pro or Max), miniforge+conda_installed_numpy is 2.53214s, and miniforge+apple_tensorflow_numpy is 1.00613s. - you may also try on it your own. Here is the CPU information details: - My old i5: $ sysctl -a | grep -e brand_string -e cpu.core_count machdep.cpu.brand_string: Intel(R) Core(TM) i5-6360U CPU @ 2.00GHz machdep.cpu.core_count: 2 - My new M1 Max: % sysctl -a | grep -e brand_string -e cpu.core_count machdep.cpu.brand_string: Apple M1 Max machdep.cpu.core_count: 10 I follow instructions strictly from tutorials - but why would all these happen? Is it because of my installation flaws, or because of M1 Max chip? Since my work relies heavily on local runs, local speed is very important to me. Any suggestions to possible solution, or any data points on your own device would be greatly appreciated :) Probably a dependancy and or compiler issue... they are not all fully optomized for M1 yet i believe, but could be mistaken. Thank You for doing this test. I love Apple eco-system from Jobs. However, this python has been my workhorse for many things. And apparently, m1/m1-max can not make the python more efficient than intel based solution. Jobs was claiming that the enclosed system could make things more efficient by controlling every detail. This M1/M1 max really makes me think stop to use Apple MacBook. It is immature, no matter how great the hardware as claimed. really hope Apple can think their original intentions. This is not iPAD for convenient or specific purpose. This is Mac for serious work. Don’t know is any other application encountered same results or not since no live comparison for work.
https://developer.apple.com/forums/thread/695963
CC-MAIN-2022-40
refinedweb
684
67.15
The unique prime factors is a factor of the number that is a prime number too. In this problem, we have to find the product of all unique prime factors of a number. A prime number is a number that has only two factors, the number and one. Here we will try to find the best way to calculate the product of unique prime factors of a number. let's take an example to make the problem more clear. There is a number say n = 1092, we have to get the product of unique prime factors of this. The prime factors of 1092 are 2, 3, 7, 13 there product is 546. 2 to find this an easy approach will be to find all the factors of the number and check if the factor is a prime number. if it then multiplies it to the number and then returns the multiply variable. Input: n = 10 Output: 10 Here, the input number is 10 having only 2 prime factors and they are 5 and 2. And hence their product is 10. Using a loop from i = 2 to n and check if i is a factor of n then check if i is the prime number itself if yes then store the product in product variable and continue this process till i = n. #include <iostream> using namespace std; int main() { int n = 10; long long int product = 1; for (int i = 2; i <= n; i++) { if (n % i == 0) { int isPrime = 1; for (int j = 2; j <= i / 2; j++) { if (i % j == 0) { isPrime = 0; break; } } if (isPrime) { product = product * i; } } } cout << product; return 0; }
https://www.tutorialspoint.com/c-cplusplus-program-to-find-the-product-of-unique-prime-factors-of-a-number
CC-MAIN-2021-31
refinedweb
275
83.9
: Xamarin.IOS contains types with the OpenTK namespace (like OpenTK.Vector2, for example), which clashes when you're actually trying to use OpenTK in your project. The only workaround seems to be using extern alias (which looks ugly, and also brings its own issues:). Hello Tzach Are you using your own build of OpenTK or the nuget package? If you are using your own build you could exclude those to avoid the clash. If you are using the nuget package then using the extern alias seems to be your best option. Another option is that you can use the OpenTK dll we provide, if you double click on the references folder and click on packages you will see it, it is based on our fork (). We do have those types borrowed from OpenTK because they are used by Xamarin.iOS dll and we did not want to bring the full OpenTK assembly (also not binding it to a specific version) in order to use them so we can't just remove them from the X.I assembly. "Are you using your own build of OpenTK or the nuget package? If you are using your own build you could exclude those to avoid the clash." I'm building from source (just because the nuget currently doesn't support ios & android), but will switch to nuget once they add those in. I don't want to work with a modified source. "Another option is that you can use the OpenTK dll we provide" No, it's out-of-date, the recommendation is to use the official OpenTK. "so we can't just remove them from the X.I assembly." Well, not remove them, but how about changing the namespace? Hello again Tzach, we currently do not have plans to make this change since it would be a very big breaking one. The ideal fix is to have the iOS build of the custom OpenTK to refer to Xamarin.iOS.dll instead of including it’s own also our fork is public so anyone can contribute :) Cheers!
https://bugzilla.xamarin.com/52/52169/bug.html
CC-MAIN-2021-39
refinedweb
344
70.94
General discussion about Pingouin @raphaelvallat ,Thanks for your solution. this is my code still im getting same error .this is my code-:pip install pandas pip install pingouin pip install xlrd import pandas as pd from pandas import DataFrame, read_csv import matplotlib.pyplot as plt import pandas as pd file = r'C:\Users\rock\Desktop\lance\Initial Data.xls' df = pd.read_excel(file) print(df) import numpy as np import pingouin as pg data = pdata = pg.read_dataset('df') icc= pg.intraclass_corr(data=data, targets='Question', raters='test_rater_1', ratings='correct_rating') print(icc) note : In my dataset i have questions, ratesrs, ratings and correct_ratings. Hello everyone. I am really happy to find such a great and straight-forward package for statistics, if you contributed to it then I'd like to thank you. I have a question regarding the post-hoc tests. I am performing an analysis using a mixed anova (between: treatment/placebo, within: first_day/second_day....). I wish to conduct a pairwise comparison, with bonferroni correction, but I fail to do so in pingouin. Since I am using a strict adjustment, I would like to minimize the number of posthocs, so for five days, I want to perform 5 comparisons: placebo, first day VS experimental first day placebo, second day VS experimental second day .... placebo, fifth day VS experimental fifth day When I use defaults in .pairwise_ttests, It performs all possible combination of comparisons, and most likely adjust the p value, for their number... within_first=False. Importantly, the p-values are corrected separately for each of these three effects: within, between and interaction. Now, if you want to apply the p-values correction only on a subset of comparisons, I'd suggest you get the uncorrected p-values from the output dataframe, select only the ones that you want, and then use the pingouin.multicomp function to correct for multiple comparisons. Hope that makes sense. Thanks! Hi everyone, I'm using the pairwise T-test function of the form pg.pairwise_ttests(dv='dv', within=['iv1', 'iv2'], subject='id', data=df), and I get the error: TypeError: 'int' object is not iterable. Are two within-subject factors not supported? Thank you in advance! I'm facing the same problem. pg.mixed_anova() runs on the same dataframe and arguments so I'd guess the dataframe is fine. I was wondering if there was a solution to this, and if so, could you share it with me? Hi @merjekrepo , can you please try without any p-values correction and send the screenshot again? The difference here is that SPSS calculates all the permutation of pairwise T-tests (ttest(a, b) is considered different than ttest(b, a)), while Pingouin only calculates the combinations (only ttest(a, b) is calculated). I do think that Pingouin's behavior is more adequate, especially when calculating corrected p-values because the p-value does not change when you do ttest(a, b) or test(b, a) so you end up with a lot of duplicate p-values in SPSS. @raphaelvallat I think what you mean without p-values correction is the LSD (Least Significant Difference) in SPSS. I am sending the .htm file which includes those results along with other output. Hi. I am getting issues with the ICC function. It works nicely with the example dataset data = pg.read_dataset('icc')but when I use my data I get the error: AssertionError: Data must have at least 5 non-missing values. I cannot see though any difference in the input data type. What am I doing wrong? Code example: n_val = 100 val_a = np.random.rand(1, n_val) val_b = val_a + 0.6*np.random.rand(1, n_val) data_icc = pd.DataFrame({'test_run': ['test_a']*n_val + ['test_b']*n_val, 'efr_value': np.concatenate((val_a[0], val_b[0]), axis=0), 'rater': ['A']*2*n_val}) icc = pg.intraclass_corr(data=data_icc, targets='test_run', raters='rater', ratings='efr_value').round(3) You can see an example of the data next: val_a) and another one for day 2 (retest, or val_b). So, in reality, there are no raters, but just two sets of measurements. Is there any workaround in your function for raters k = 1? Or do you have any idea how to run your ICC for just 2 arrays? n_val = 100 val_a = np.random.rand(1, n_val) val_b = val_a + 0.6*np.random.rand(1, n_val) data_icc = pd.DataFrame({'targets': np.concatenate((np.arange(1, n_val+1, 1), np.arange(1, n_val+1, 1)), axis=0), 'efr_value': np.concatenate((val_a[0], val_b[0]), axis=0), 'test_session': ['test_a']*n_val + ['test_b']*n_val}) #Pearson print('Pearson') print(pg.corr(x=val_a[0], y=val_b[0], method='pearson')) #ICC print('\n\nICC') print(pg.intraclass_corr(data=data_icc, targets='targets', raters='test_session', ratings='efr_value').round(3))
https://gitter.im/pingouin-stats/Lobby
CC-MAIN-2020-45
refinedweb
782
59.5
Raspberry Pi 2 (raspbian stretch) Adafruit TB6612 Stepper Motor 17hs4223 I've probed with several codes but not works.I've probed with several codes but not works.Raspberry Pi TB6612 Pin 2 Vcc Pin 6 GND Pin 4 PwmA Pin 11 AIN1 Pin 15 AIN2 Pin 13 STBY Pin 16 BIN1 Pin 18 BIN2 Pin 4 PwmB Vmotor to 12V DC VM floating MotorA , red and green wires MotorB, yellow and blue wires For example with pigpio: Code: Select all import pigpio from PigpioStepperMotor import StepperMotor pi = pigpio.pi() motor = StepperMotor(pi, 11, 15, 16, 18) for i in range(2048): motor.doСlockwiseStep() But nothing happens. Best regards
https://lb.raspberrypi.org/forums/viewtopic.php?f=37&t=220247
CC-MAIN-2019-09
refinedweb
109
59.43
Deployment Deploying an AdonisJS application is no different than deploying a standard Node.js application. You need a server/platform that can install and run Node.js >= 14.15.4. For a frictionless deployment experience, you can try Cleavr. It is a server provisioning service and has first-class support for deploying AdonisJS apps . Disclaimer - Cleavr is also a sponsor of AdonisJS Compiling TypeScript to JavaScript AdonisJS applications are written in TypeScript and must be compiled to JavaScript during deployment. You can either compile your application directly on the production server or perform the build step in a CI/CD pipeline. You can build your code for production by running the following ace command. The compiled JavaScript output is written to the build directory. node ace build --production If you have performed the build step inside a CI/CD pipeline, then you can move just the build folder to your production server and install the production dependencies directly on the server. Starting the production server You can start the production server by running the server.js file. If you have performed the build step on your production server, make sure to first cd into the build directory and then start the server. cd buildnpm ci --production# Start servernode server.js If the build step was performed in a CI/CD pipeline and you have copied only the build folder to your production server, then the build becomes the root of your application. npm ci --production# Start servernode server.js Using a process manager It is recommended to use a process manager when managing a Node.js application on a bare bone server. A process manager ensures to restart the application if it crashes during runtime. Some process managers like pm2 can also perform graceful restarts when re-deploying the application. Following is an example ecosystem file for pm2. module.exports = {apps: [{name: 'web-app',script: './build/server.js',instances: 'max',exec_mode: 'cluster',autorestart: true,},],} Nginx reverse proxy When running the AdonisJS application on a bare-bone server, you must put it behind Nginx (or a similar web server) for many different reasons , but SSL termination being an important one. Make sure to read the trusted proxies guide to ensure you can access the visitor's correct IP address, when running AdonisJS application behind a proxy server. Following is an example Nginx config to proxy requests to your AdonisJS application. Make sure to replace the values inside the angle brackets <>. server {listen 80;server_name <APP_DOMAIN.COM>;location / {proxy_pass:<ADONIS_PORT>;}} Migrating database You can migrate your production database using the node ace migration:run --force command. The --force flag is required when running migrations in the production environment. When to migrate Also, you must always run the migrations before restarting the server. If the migration fails, then do not restart the server. If you are using a managed service like Cleavr or Heroku, they can automatically handle this use case. Otherwise, you will have to run the migration script inside a CI/CD pipeline or run it manually by SSHing to the server. Do not rollback in production The down method in your migration files usually contains destructive actions like drop the table, or remove a column, and so on. It is recommended to turn off rollbacks in production inside the config/database.ts file. Disabling rollbacks in production will ensure that running the node ace migration:rollback command results in error. {pg: {client: 'pg',migrations: {disableRollbacksInProduction: true,}}} Avoid concurrent migration tasks When deploying your AdonisJS application on multiple servers, make sure to run the migrations from only one server and not all of them. For MySQL and PostgreSQL, Lucid will obtain advisory locks to ensure that concurrent migration is not allowed. However, it is better to avoid running migrations from multiple servers in the first place. Persistent storage for file uploads Modern-day deployment platforms like ECS, Heroku, or Digital ocean apps run your application code inside ephemeral filesystem , which means that each deployment will nuke the existing filesystem and creates a fresh one. You will lose the user uploaded files if they are stored within the same storage as your application code. Hence, it is better to use third party cloud storage for storing user-uploaded files. We are currently working on a module that allows you to use the local filesystem during development and then switch to an external filesystem like S3 for production. Do all this without changing a single line of code. Logging The AdonisJS logger write logs to stdout and stderr in JSON format. You can either set up an external logging service to read the logs from stdout/stderr or forward them to a local file on the same server. The framework core and ecosystem packages write logs at the trace level. You must set the logging level to trace when you want to debug the framework internals. Debugging database queries The Lucid ORM emits the db:query event when database debugging is turned on. You can listen to the event and debug the SQL queries using the Logger. Following is an example of pretty-printing the database queries in development and using the Logger in production. import Event from '@ioc:Adonis/Core/Event'import Logger from '@ioc:Adonis/Core/Logger'import Database from '@ioc:Adonis/Lucid/Database'import Application from '@ioc:Adonis/Core/Application'Event.on('db:query', (query) => {if (Application.inProduction) {Logger.debug(query)} else {Database.prettyPrint(query)}}) Environment variables You must keep your production environment variables secure and do not keep them alongside your application code. If you are using a deployment platform like Cleavr, Heroku, and so on, you must manage environment variables from their web dashboard. When deploying your code on a bare-bones server, you can keep your environment variables inside the .env file. The file can also live outside the application codebase. Make sure to inform AdonisJS about its location using the ENV_PATH environment variable. cd buildENV_PATH=/etc/myapp/.env node server.js Caching views You must cache the edge templates in production using the CACHE_VIEWS environment variable. The templates are cached in memory at runtime, and no precompiling is required. CACHE_VIEWS=true
https://docs-adonisjs-com.pages.dev/guides/deployment
CC-MAIN-2021-49
refinedweb
1,025
55.34
Python console in the Today widget The Today widget is no longer included in the release version of Pythonista! You cannot run this script in the notification center anymore! If you still want to try it, you can download and run it normally in Pythonista. The UI will appear as a normal sheet view instead. This script is not very useful outside of the notification center though. It had to be done. Not very useful and not very polished, but a fun exercise. The keyboard is just a bunch of ui.Buttons, and the "text field" is a ui.Label. There is a cursor, but it needs to be moved with arrow "keys". To use this script meaningfully, you need to have Pythonista 3 and need to set this script as the Today Widget script. It is possible to run this script normally from the editor, but this meant for debugging - doing so is not very useful on its own and probably breaks the interactive console (until you restart the app). (Warning: Very likely to crash if another app or too many widgets are running. Works best on the home screen.) @dgelessus , thanks for sharing. Very nice. I didn't have any crashes. Was hard for me to use. I am using some dark theme in the today screen. Can't remember how I set it 😱 But was great to get a demo to see how it's done. Just hadn't tried it. Looking fwd to thinking of something that could be useful for me. I have one I dea. Just using it to quickly set notifications. Not sure if I can use it for that or not, but will look into it @Phuket2 I'm not sure what dark theme you mean... The notification center is always dark, and the output text is provided by Pythonista and is always white. So I hardcoded the input line to be white and made the keyboard look like the dark onscreen keyboard. is this Pythonista 3 only? im not on the beta yet and got a Non-ASCII character error when running within Pythonista. The notification center widget is only available in the Pythonista 3 beta, and widget scripts are always run using Python 3. You can run the script normally from the editor, but that just pops the keyboard up as a normal view, which isn't very useful. (It also breaks sys.stdinif you run it normally instead of setting it as a widget script.) @dgelessus , all you say is right. But what I can't see is the editor window. I can see something...but it's like alpha .03 or something like that. I have a very dark custom theme set in Pythonista. I did change it to the very white default theme. I forced quit Pythonista and removed and re added Pythonista today widget. Same result. The only thing I didn't do, was to do was reboot my ipad is the widget only an ios9 thing? 64 bit thing? I cannot seem to even see an option for enabling the widget(i both betas installed) @JonB I accidentally set a deployment target of 9.3 for the widget (Xcode's default), so in the current beta, it won't show up on iOS 8 (or even older versions of iOS 9), will be fixed in the next build. @dgelessus Thanks for clarifying. i just got Pythonista 3 and tried it out. Unfortunately for me, it seems to show up for a brief second and disappear. After a few times of auto-reloading it says unable to load. Seems to sound like the limits on memory @omz mentioned in the release notes. i have a decent number of libraries in my site-packages that might be causing the issue, I assume the entire site-packages is loaded in the today widget. @khilnani No, the site-packagesmodules are only loaded when you importthem. If you have a pythonista_startupfile, you may want to add an appex.is_widget()check and make it not run in the today widget. Also you should try going to the home screen and then open the notification center - then you don't have any other app in the background taking up RAM. The widget should actually skip pythonista_startup. It turned out my problem with not seeing the text clearly was to do with the accessibility setting: Reduce Transparency, does not work so well in the today view @dgelessus i'm not using pythonista_startup. i restarted the phone and tried it before launching any apps- entered my passcode for the home screen and pulled down. I see the same - the keyboard slides down and then disappears leaving a unable to load message. i'm using 9.3.1 on an iPhone 6 Plus. let me know if there is anything i can help with if you'd more info. the script works within from within Pythonista. Do you have many other widgets added? That's the only other possible issue I could think of. I'm on an iPad mini 1, which is a few years old, so I wouldn't expect you to have many issues on an iPhone 6... Good point. I had Battery, Launcher, Dataman, and Darksky Next hour. Removed them all and only kept Pythonista, seems better still disappears after a second or two (vs half a second before) pythonista_startup does seem to run in the today widget. Is there a way to check if the interpreter is being run in the today widget? I'd like to modify my startup to bypass if inside the today widget I am using @dgelessus's pythonista_startup, which is a folder called pythonsta_startup in site-packages with an init. My widget is just doing import appex,ui v=ui.View(bg_color='red',frame=(0,0,200,200)) appex.set_widget_view(v) but pythonista startup seems to be running ( until i get s could not load) @JonB Okay, that's a bug then. For now, you might want to check appex.is_widget()in your startup script. @JonB I found the bug, the "preflight" script (for clearing globals etc.) was importing pythonista_startupas a side effect. I tried the new examples for "Today widget" on my iPad Pro 12,9" with iOS 9.3.2 and all worked fine. But on my iPhone6 and iPhone5s I got the message "Kann nicht geladen werden". I did some reboots! On both iPhones I am running iOS 9.2.1. The widget worked before on iPhone. I am sorry I do not know the beta# Some hints?
https://forum.omz-software.com/topic/3110/python-console-in-the-today-widget/4
CC-MAIN-2020-40
refinedweb
1,096
75.5
XML Schema Welcome to the XML Schema book. It describes the structure of an XML Schema and explains how XML Schemas are used to validate XML documents. Contents PrerequisitesEdit Students reading this book should already be familiar with the fundamental principles of XML and have some background on Data Types. Course GuidelinesEdit Only the The prefix, The root element: <xs:schema> and Elements sections are required to build XML Schemas. History of the XML Schema, What are XML Schemas used For?, When XML Schema become inefficient at validating complex rules and XML Schema Example can be skipped and the sections following the Elements section are additional information starting from the most important ones. History of the XML SchemaEdit XML Schema is a standard created by the world wide web consortium. Unlike DTDs, XML Schema uses XML file formats to define the XML Schema itself. Once you learn the structure of an XML file, you don't have to learn another syntax. What are XML Schemas used For?Edit. When XML Schema become inefficient at validating complex rulesEdit. XML Schema ExampleEdit Here is a full example of a complete XML Schema file of personal contacts. Structure of an XML Schema DocumentEdit Like any other XML file, XML Schema files normally begin with an XML declaration ( <?xml version="1.0"?>), which is followed by a root element (always xs:schema). The prefixEdit Although any prefix can be used to refer to the namespace, the most common convention is to use "xs". Some people prefer "xsd"; some prefer to use the default namespace (which means no prefix is necessary). All XML Schema elements are in this namespace. The root element: <xs:schema>Edit All XML Schema files must begin and end with the <xs:schema> markup. The schema MUST end with an </xs:schema> end markup. An XML Schema defines elements and attributes which are available in a namespace (i.e.). In the XML Schema, this namespace is defined using the targetNamespace attribute. In an XML file, a namespace can be imported using the xmlns attribute ( xmlns stands for XML NameSpace). The xmlns attribute name can be ended with : and a prefix (i.e. xs). In this case, the imported tags must be used with this prefix. Prefix are used to distinguish tags with same names imported from different namespaces. You can see that the target namespace we are defining in the example is one of the namespace imported in the XML file. You can see that we are importing the namespace of the document itself with the tns prefix, so that elements we are defining in the document can be used in the document itself starting with tns: . <xs:sequence> is used for ordered group of elements for unordered group of elements use <xs:all>. ElementsEdit Elements are defined in XML Schema using the <xs:element> markup: Elements with text bodyEdit For elements with text body, the type of the text can be defined with the type attribute: Here are the common XML Schema primitive data types: Some schema restrictions and facets can be defined to the data type using the <xs:simpleType/> and the <xs:restriction/> markups. For instance, a body text of string type can be fixed to a length of 5 characters using the <xs:length/> markup as above: Here are all the schema restrictions and facets that can be used: Complex elementEdit Any element type that can have sub-elements and/or attributes is considered as a complex element. Complex element types are defined using the <xs:complexType/> markup. Sub-elements of a complex elementEdit Sub-elements are defined with different apparition rules. Sub-elements can be defined into a <xs:all/> markup: the sub-elements must all exist and can appear in any order. Sub-elements can be defined into a <xs:sequence/> markup: the sub-elements must appear in the same order. Sub-elements can be defined into a <xs:choice/> markup: one and only one sub-element must appear. Some apparition rules can be included into others apparition rules. <xs:choice/> markup and <xs:sequence/> markup can be included into a <xs:choice/> markup or a <xs:sequence/> markup. Number of occurrences can be changed with the minOccurs and maxOccurs attributes of the <xs:element/> markup. By default, the minimum occurrence is 1 and the maximum occurrence is 1. To define an infinite number of occurrence, specify unbounded. Complex element with sub-elements and textEdit Complex elements can contain text in their body before, between and after their sub-elements setting the mixed attribute to true. By default, the mixed attribute is set to false. Attributes of a complex elementEdit The attributes of an element can be defined with the <xs:attribute/> markup. If the element contains both attributes and sub-elements, the <xs:attribute/> markups must be defined above the <xs:all/>, <xs:sequence/> or <xs:choice/> markup. Data types, restrictions and facets can be defined for attributes as it is for text-body-only elements. By default, attributes are optional. This can be changed with the use attribute. - If its value is optional, the attribute can be left. - If its value is required, the attribute must be present. A default value can be defined with the default attribute. If the attribute is not present, the parsers will consider the attribute is present and its value is the default value. The attribute can be restricted to a constant value with the fixed attribute. As the fixed attribute also acts as a default value, you must not define a default attribute too. Complex element with attributes and text bodyEdit Elements can contain both attributes and text body using the <xs:simpleContent/> markup (remember that a simple type element can't contain attributes). Type definitionEdit Simple and complex types can be defined beside the element tree. In this case, the <xs:element/> markup has no body, keeps its name attribute and has a type attribute. The <xs:complexType/> markup is then defined outside the root element with a name attribute containing the element type name. There is no change for the XML file validation. Let's take this XML Schema: Now let's define Person complex type and the LastUpdate simple type beside the root element tree: Complex and simple types can be defined in any order. A defined type can be reused in different elements of the schema and then its description is not duplicated. It avoids the XSD file to be too much indented. Moreever, using type definitions, the elements have not only a name but also a type name which can be used as a class name too. Some tools used to parse XML content according to an XML Schema can require a type name for complex type elements. Element and attribute referenceEdit Elements and attributes can be reused using references. In this case, the <xs:element/> markup or <xs:attribute/> markup has no body, no name attribute and has a ref attribute. This ref attribute contains the name of another element or another attribute. Let's use a reference on the Person element on the previous example: The difference between separate type definition above and using reference is that any element or attribute can be referenced. Moreever, using reference, links are done using names instead of type names. This means the we are not linking classes but instances of classes. ExtensionEdit Defined complex types can be reused adding sub-elements or attributes. The complex type is then extended. It can be done using the <xs:complexContent/> and the <xs:extension/> markups. The extended type name is defined in the base attribute of the <xs:extension/> markup. Here is an example where the PersonType complex type is extended with the professional attribute for the Person element: Various elements with common and different sub-elements or attributes can be defined like that. The common items would be defined in a common complex type and the different items would be defined in different complex types extending the first one.
https://en.m.wikibooks.org/wiki/XML_Schema
CC-MAIN-2016-30
refinedweb
1,334
62.68
From the last two years, I was planning to invest some money into Bitcoin and yet, here we are, with the price of Bitcoin up more than 2000% in the past 24 months. I just kept thinking and I got nothing. The price was fluctuating and I was waiting for a good time and that good time never come. I wish someone had alerted me at that time. And finally, in November, I invested my some money in various cryptocurrency and yes I got some good return in just two months. But I am not a full-time CryptoInvestors and I can't keep checking the price every time on my laptop. But I also want to sell or buy my coins at a good time. so I planned to build my crypto alert system using Bolt IoT that will notify me the best time to become rich :). The best thing that I like about Bolt IoT is the easy interface to quickly build the IoT product. Ok, so let's get started and see how easy this project goes. Step 1. Hardware Setup Plug the longer end of the Buzzer in the Pin 0 of Bolt WiFi module and the shorter end to the ground pin (GND) using Male/Female Jumper Wire.: Setting up your Environment For this project, I am using Ubuntu 14.04 with python 2.7 but you can use other OS also, you just need to find out the alternatives for that or you can buy some online ubuntu server here . Login to your Ubuntu server and create a folder and you can give any name to the folder. mkdir crypto_alert After creating the folder we will go inside the folder by typing the below commands. cd crypto_alert now we shall install the pip package manager for Python-2.7. A pip command is a tool for installing and managing Python packages, such as those found in the Python Package Index, For example, boltiot, Twilio etc. sudo apt-get -y install python-pip and then we will install the python virtualenv and virtualenvwrapper. virtualenv will help us to create isolated Python environments. Type the below command to install virtualenv and virtualenvwrapper. sudo apt-get install python-virtualenv sudo pip install virtualenvwrapper After installing the virtualenv and virtualenvwrapper , we will add it in bashrc file. Type the below command. sudo echo "export WORKON_HOME=$HOME/.virtualenvs" >> ~/.bashrc sudo echo "source /usr/local/bin/virtualenvwrapper.sh" >> ~/.bashrc source ~/.bashrc . Now installation is done and we will create a virtual environment. mkvirtualenv crypto_alert The above command will create virtual environment with name crypto_alert and we will activate the crypto_alert virtual environment by typing the below command. workon crypto_alert and then we shall install the boltiot packages and after installing the boltiot packages. pip install boltiot pip install --upgrade pip and we will install some security packages because we will be using some external API. pip install pyOpenSSL ndg-httpsclient pyasn1 pip install 'requests[security]' Step 3: Writing your python code. We will use cryptocompare to fetch the current Bitcoin rate using GET request. You can also fetch the rate for other coins. In the first four line of below code, we are importing the json, request , time and Bolt packages. and in last four line we are just setting some global variables like our desired SELLING_PRICE , Bolt Cloud API key and device ID and in the last line creating a bolt object. import json import time import requests from boltiot import Bolt SELLING_PRICE = 17082.93 API_KEY = "1c52500c-0b77-4370-bd0a-015fedce1db5" DEVICE_ID = "BOLT3433748" bolt = Bolt(API_KEY, DEVICE_ID) Then I wrote a function to fetch the current Bitcoin rate from cryptocompare. The below function will return the per bitcoins rate in US doller. You can also fetch the rate for other cryptocurrencies also. def price_check(): url = "" querystring = {"fsym":"BTC","tsyms":"USD"} response = requests.request("GET", url, params=querystring) response = json.loads(response.text) current_price = response['USD'] return current_price and then in last I wrote a infinite while loop that keep checking the bitcoins price in every 4 second and will switch on and off the buzzer according to conditions. while True: market_price = price_check() print "Market price is", market_price print "Selling price is", SELLING_PRICE time.sleep(4) if market_price > SELLING_PRICE: bolt.digitalWrite("0", "HIGH") time.sleep(60) bolt.digitalWrite("0", "LOW") Save the code wih crypto_alert.py and execute it by typing python crypto_alert.py and the alarm will beep as soon as market price will become greater than your desired SELLING_PRICE I have been using this system from from past few days and it helps me a lot in bitcoin trading.
https://www.hackster.io/rahulkumarsingh/crypto-alert-system-using-bolt-iot-d62df1
CC-MAIN-2018-22
refinedweb
771
72.76
1 //XRadar2 //Copyright (c) 2004, 2005, Kristoffer Kvam3 //All rights reserved.4 //5 //Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:6 //- Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.7 //- Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.8 //- Neither the name of Kristoffer Kvam nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.9 /.11 //See licence.txt for dependancies to other open projects.package org.xradar.test.f;12 13 package org.xradar.test.f;14 15 16 /**17 * F1 XRadar test application class18 * 19 * @author Kristoffer Kvam20 * @since XRadar 0.821 */22 public class F1 {23 } Java API By Example, From Geeks To Geeks. | Our Blog | Conditions of Use | About Us_ |
http://kickjava.com/src/org/xradar/test/f/F1.java.htm
CC-MAIN-2018-05
refinedweb
173
55.64
In our previous tutorials about pointers and arrays, we have been primarily looking at how to handle integer arrays with pointers. however, in this guide, we will move ahead and learn about character arrays with pointers that will basically revolve around the concept of strings. Strings Introduction Strings are a group or sequence of characters which is stored at a contiguous memory location. In other words, string is an array of characters. It includes characters including alphabets, numbers, and all other types of characters. For example: - “Hello” - “This is a string” - “1234” Character arrays are very important because we use them as a string in C. Because in C language string data type is not available by default. We can use strings to perform operations such as modifying, copying, concatenating, etc. To be able to efficiently work with strings in C, there are a few things that you need to understand. Storing strings in character arrays To be able to store a string in a character array, the first requirement is that the array should be large enough to accommodate the whole string. A large enough character array is such that it has a size greater than or equal to the number of characters in the string plus 1. Size of array ≥ Number of characters in the string + 1 For example, if our string is “HELLO” consisting of five alphabetical characters then the size of the array will be ≥ (5+1)=6. Although the string consists of 5 characters but we need space at least of 6. This is because we need to store the information specifying the last character of a string. To understand this in a better way let us take an example of storing the string “HELLO” in a character array: If we will declare a character array of size 5, it will be able to store all the characters in the string “HELLO”. ‘H’ will go to the zeroth index, ‘E’ will go to the first index, ‘L’ will go to the second index, the next ‘L’ will go the third index and ‘O’ will go to the fourth index respectively. char X[5]; X[0]='H'; X[1]='E'; X[2]='L'; X[3]='L'; X[4]='O'; Let us now assume that we had the same character array but of size 8. The figure below shows the logical view of our array X. We will store the string “HELLO” in this particular array: As you may notice we have stored all the characters of the string “HELLO” in this array. The three indices 5th, 6th and 7th will be filled with garbage values. However, one vital information is missing. We did not mention that the ‘O’ at the 4th index is the last character of our string. Hence to denote the last character in the string we use a NULL character. We store a NULL character as the last character in the string. A NULL character has an ASCII value of 0. It is denoted by a forward slash with 0 like ‘\0’. Hence X[5] = ‘\0’; All the functions for string manipulation in C except that the strings will terminate with a NULL character. Strings as a Array of Characters Example in C Let us look at an example code to demonstrate this concept. #include <stdio.h> #include <stdlib.h> int main(){ char X[5]; X[0]='H'; X[1]='E'; X[2]='L'; X[3]='L'; X[4]='O'; printf("%s",X); } Here we have taken a character array of size 5 and filled in all the characters. No space is used to null terminate it. Then we are printing this array as an output. Now let’s see the code output. After the compilation of the above code, you will get the following output. As you may notice that the “HELLO” string is being printed but some garbage values are also found alongside it. This is happening because we did not null terminate our string. If we change the size of the character array to 6 and add a null character at the 5th index then we will output the correct output. #include <stdio.h> #include <stdlib.h> int main(){ char X[6]; X[0]='H'; X[1]='E'; X[2]='L'; X[3]='L'; X[4]='O'; X[5]='\0'; printf("%s",X); } Now let’s see the code output. After the compilation of the above code, you will get the following output. If we change the size of the array to a number greater than 6 then still we get the same correct output. This is because of the presence of the NULL character. Further Examples The string.h library has a handful of functions for string manipulation. Now lets find out the length of the string using the strlen() function from the string.h library. Use the following statement to find the length of the string stored in the character array ‘X’. int length = strlen(X); printf("Length of the string is: %d\n",length); The complete code is given below: #include <stdio.h> #include <stdlib.h> #include <string.h> int main(){ char X[10]; X[0]='H'; X[1]='E'; X[2]='L'; X[3]='L'; X[4]='O'; X[5]='\0'; int length = strlen(X); printf("Length of the string is: %d\n",length); } Now let’s see the code output. After the compilation of the above code, you will get the following output. Even though the size of the array is 10 but the length of the string is 5. Thus, the string length function also counts till it spots a NULL character. In our program, instead of writing the characters individually at their appropriate positions, we can also initialize the array by using string literals as shown below: char X[10] = "HELLO"; String literals are a group of characters within double quotation marks. The null termination for the string literal is implicit. So it will always be stored with a NULL termination in the memory. Additionally we can also initialze the character array as follow: char X[] = "HELLO"; In this case, the size of the character array ‘X’ will be set to 6 bytes where 1 bytes stores one character. This is the minimum size required for our character array with 5 characters. Now let us try to print the size in bytes of this character array using the sizeof() function. #include <stdio.h> #include <stdlib.h> #include <string.h> int main(){ char X[] = "HELLO"; printf("Size in bytes: %d\n",sizeof(X)); int length = strlen(X); printf("Length of the string is: %d\n",length); } After the compilation of the above code, you will get the following output. As you will see the size of the array in bytes is 6 as space has been allocated for 6 characters but the length is 5. This is because the NULL character is not included in the length. However, if we initialize the character array with a smaller size e.g. in our case less than 6 then we will get a compilation error. This is because the compiler will force this particular array to be of minimum size 6. Additionally, we can also initialize the character array by using curly brackets and putting all the characters inside them, separated by commas. However, in this case the NULL termination will not be implicit. You will have to induce the NULL character inside the braces as well. This can be seen below: char X[6] = {'H','E','L','L','O','\0'}; Strings and Pointers in C Let us declare a character array Y of size 4. We will initialize it with the string literal “BYE”. char Y[4] = "BYE"; The figure below shows how it is stored in the memory: As arrays are stored in one contiguous block of memory so we can say for example the first character gets stored at the address 100. One character is one byte in size, so the next character will be at address 101, 102 and so on. Y is the variable name for this whole array. Let’s declare a variable ‘ptr’ which is a pointer to a character. char* ptr; A pointer variable in atypical architecture is stored in 4 bytes. For example, this variable has the address 200. Writing the following statement we can equate the pointer to a character with a character array. This statement is valid. ptr = Y; Just using the name of the array returns the address of the first element in the array. Thus, this statement will allot the address 100 to ptr. Therefore ptr will now point to the first element in the array. We can use this variable ‘ptr’ which is a character pointer just like Y to read and write into the array. If we print ptr[1], then the output will be the character at the first index i.e. ‘Y.’ We can even modify the elements of the array using this ptr variable. The following line: ptr[0] = ‘D’; will modify the character at the 0th index. This way the whole string will be changed to “DYE”. When we write ptr[i] for any position i, it is the same as *(ptr+i). As ptr is the base address, (ptr+i) will take us to the address of the i-th element. So in this case lets say (ptr+2) will be 102 and if we put * operator in front of it, we are basically dereferencing and finding out the value. Hence: ptr[i] = *(ptr+i) Even if it is the array name we can still write these two statements as equivalents: Y[i] = *(Y+i) This is how we use arrays and pointers to read and write. As we have seen above ptr = Y is a valid statement however we can not say Y = ptr. This statement is not valid. It does not make sense and will give us a compilation error. Additionally, we can not increment/decrement this variable Y as well. Traversing a string using pointers We can increment/decrement ‘ptr’ which is a pointer variable. ptr = ptr+1 is a valid statement in this case. This will cause ptr to point to the next element in the array. Now ptr will now become 101 instead and point to the second element. To traverse an array, we will run a loop and use a local variable for example ‘i’ to increment it in the loop. If we have a pointer variable, we can keep on incrementing the pointer and hence we will be able to traverse the list. Arrays are always passed to a Function by Reference When we pass an array to a function to only pass the base address of the array in a pointer variable. We do not pass the whole copy of the array. Let us go through some sample example code to understand it in a better way. #include <stdio.h> void print(char* array) { int i=0; while(array[i]!='\0') { printf("%c",array[i]); i++; } printf("\n"); } int main(){ char array[10] = "Welcome"; print(array); } We have declared a character array of size 10. It has the string literal “Welcome” of length 7 stored in it. char array[10] = "Welcome"; As we are using the string literal here thus, the null termination is implicit. We will print this array in the main() without using the printf() function. We will create our own print function and pass the array as a parameter inside it. print(array); This function will print the string part in the character array. The argument to the function according to the compiler will be the address of the character array. As arrays are larger in size thus it is inefficient to create a copy of the same array for each function. This print function that we are creating does not know the size of the array. It only knows the base address of the array. So we will declare a variable ‘i’, initialize it to zero and use it in a while statement. While array[i] is not equal to NULL character, we will print the character array[i] and also increment i. Once we reach the NULL character, we will come out of this loop. void print(char* array) { int i=0; while(array[i]!='\0') { printf("%c",array[i]); i++; } printf("\n"); } After the compilation of the above code, you will get the following output. Additionally, we can also replace the variable ‘i’ we created in the print() function and use only the name of the character array with dereferencing (*array) to access the elements. This can be seen below: void print(char* array) { while(*array!='\0') { printf("%c",*array); array++; } printf("\n"); } This function gives the same result as the one that we previously defined with the integer variable ‘i’. What happens in the system memory? Now, let’s look into what happens in the system’s memory when this code runs. The memory that is allocated for the execution of a program is typically divided into these four sections shown below. One part of the memory stores the instructions in the program known as the Code segment. The next segment stores the global variables. The stack segment is where all the information regarding the function call execution and all the local variables are found when the code runs. For example purposes, we will use the same code used in the previous example where we created our own print function to print the character array as an output. #include <stdio.h> void print(char* array) { while(*array!='\0') { printf("%c",*array); array++; } printf("\n"); } int main(){ char array[10] = "WELCOME"; print(array); } When this program will start executing, first the main() will be invoked. Whenever a function is called some amount of memory from the stack is allocated for the execution of that function. This is known as the stack frame of that function. For example the stack frame from starting address 300 to 350 is allocated for the main() function in one contiguous block of memory. In this stack, the memory increases from bottom to the top. All the local variables of the function will be found in the stack frame of the function. So, when we declare the character array of size 10, 10 bytes from the stack frame will be allocated for this particular character array. Lets suppose they are allocated from the address 300 to 310. Each character is stored in 1 byte so we need 10 bytes for this character array of size 10. Apart from the local variables there may be more information in the stack frame that is why some space is still left in the main() function’s stack frame. After this, the control goes to the following print statement. print(array); As soon as we make a call to another function from a function, the execution of that particular function is paused at that particular line. The system goes on to execute the called function. This called function gets allocated a stack frame on top of the calling function. Whatever function is at the top of the stack at any point is executing. We will wait for this function to finish then main() will be resumed. As print() is executing, it will have a local variable ‘array’ in its stack frame. However this will be a pointer variable. A pointer variable takes 4 bytes of memory in a typical architecture so this will be found at lets say at starting address 354. It has 4 bytes allocated in the stack frame. Notice that this ‘array’ in the print function is not the same ‘array’ in the main() function. Both of these have different scopes. When we make a call to print and pass array as the argument inside it in the main() function, it is the address 300 which is the base address of the array. This is passed to the print() function and the print function stores it in the pointer variable ‘array.’ Sometimes it may confuse us if we are using the same local variable name in the calling function and the same argument name in the called function. You must understand that both of them are different. The figure below shows the character array, ‘array’ of size 10 with its elements stored at the respective indices. The addresses are increasing towards the right. The eighth character is NULL whereas the first seven characters are the characters of the word ‘Welcome.’ The rest of the blocks are filled with garbage values. Now we have the ‘array’ variable from the print() function. It is a character pointer at address 354 that stores the address 300. Thus, it points to the first element of the array. The array in green is local to the main and the array in blue is a character pointer local to the print() function. Now let us look at what happens in the system’s memory when the while loop starts in the print() function. void print(char* array) { while(*array!='\0') { printf("%c",*array); array++; } printf("\n"); } Here, we are saying that while *array is not equal to NULL character continue the while loop. When we put the * operator in front of a pointer variable we are actually looking at the value at that particular address. So at this stage when ‘array’ is pointing to the base address of *array which is ‘W’ so the NULL condition in the while loop is not true. Thus, we will move ahead to the next line where we are printing this element (*array) using printf(). The output will be ‘W.’ Then we are incrementing array by one. This is pointer arithmetic. As we are incrementing the pointer by one unit hence the address increments by the size of the data type that the pointer points to. array here is a pointer to a character data type. Character data type is 1 byte so array+1 is like saying array=array+1. So, array now becomes 301 and it is now pointing to the second element in the array which is ‘E’. Once again we come to the verifying condition in the while loop. Now *array is equal to ‘E’ which is not the NULL character so we will go inside the loop and print ‘E.’ We will keep on going like this until the address in the pointer variable reaches 307. Here the value at this particular address is a NULL character so the loop will not execute. We will go out of the loop and print the following statement which denotes the end of the line: printf("\n"); Thus, the execution of the print() function will finish. So the particular stack frame for print() will be cleared from the stack. Now the main() function will resume and finish its execution. Further Modification in Code Let us now modify this particular code and learn a few more concepts from it. #include <stdio.h> void print(char* array) { while(*array!='\0') { printf("%c",*array); array++; } printf("\n"); } int main(){ char *array="Welcome"; print(array); } Instead of creating a character array of size 10, we will create a character pointer named ‘array’. We will equate it to a string literal in a statement like this: char *array="Welcome"; After the compilation of the above code, you will get the same output as before. In previous examples, when we used a string literal in the initialization statement of an array then the string got stored in the space allocated to that array. It went into the stack in the character array of size 10. But if we use the string literal elsewhere in a statement like this char *array=”Welcome” then in this case the string gets stored as a constant during the compile time. In most cases, it will get stored in the code segment of the system’s memory. However, you will not be able to modify the string as we could previously. - If we want to modify the elements in the array we can do so by first initializing the array as a string literal. We have a character array and we are passing the address of the array to a function, then that function receives it in a character pointer. Using this pointer we can modify the data in this particular array. Suppose we want to change the first character to ‘A’ we will do so in the following way: #include<stdio.h> #include<string.h> void print(char *array) { array[0] ='A'; while(*array!='\0') { printf("%c",*array); array++; } printf("\n"); } int main(){ char array[10]="Welcome"; print(array); } After the compilation of the above code, you will get the following output. Notice that the first element has been changed from ‘W’ to ‘A’. - If we want a function just to read a string and not write anything we will have to change the argument to const character pointer of the print() function. void print(const char *array) { while(*array!='\0') { printf("%c",*array); array++; } printf("\n"); } int main(){ char array[10]="Welcome"; print(array); } We will be able to read the elements in the array however we will not be able to modify it anymore.
https://csgeekshub.com/c-programming/pointers-strings-array-of-characters/
CC-MAIN-2021-49
refinedweb
3,539
71.85
Hi,This patch introduces/fixes three things:- out of memory killing- a nice starting point for newbie kernel hackers (mm/oom_kill.c is full of noteworthy notes)- better handling of the maximum page cache & buffer cache sizeRik.+-------------------------------------------------------------------+| Linux memory management tour guide. H.H.vanRiel@phys.uu.nl || Scouting Vries cubscout leader. |+-------------------------------------------------------------------+--- mm/Makefile.orig Sun Aug 16 17:26:38 1998+++ mm/Makefile Sun Aug 16 17:26:57 1998@@ -9,7 +9,7 @@ O_TARGET := mm.o O_OBJS := memory.o mmap.o filemap.o mprotect.o mlock.o mremap.o \- vmalloc.o slab.o \+ vmalloc.o slab.o oom_kill.o\ swap.o vmscan.o page_io.o page_alloc.o swap_state.o swapfile.o include $(TOPDIR)/Rules.make--- mm/oom_kill.c.orig Tue Aug 18 19:24:07 1998+++ mm/oom_kill.c Sat Aug 22 22:05:21 1998@@ -1 +1,174 @@+/*+ * linux/mm/oom_kill.c+ * + * Copyright (C) 1998.+ *+ *.+ */+#include <linux/mm.h>+#include <linux/sched.h>+#include <linux/stddef.h>+#include <linux/swap.h>+#include <linux/swapctl.h>+#include <linux/timex.h>++#define DEBUG+/* Hmm, I remember a global declaration. Haven't found+ * it though...+ */+#define min(a,b) (((a)<(b))?(a):(b))++/*+ * These definitions should move to linux/include/linux/swapctl.h+ * but I want to change as little files as possible while the patch+ * is still in alpha -- this will have to change before submission+ * however -- Rik.+ */+typedef struct vm_kill_t+{+ unsigned int ram;+ unsigned int total;+} vm_kill_t;++struct vm_kill_t vm_kill = {25, 3};++/*+ * Wow, black magic :) [read closely, the TCP code is hairier]+ */+inline int int_sqrt(unsigned int x)+{+ unsigned int out = x;+ while (x & ~(unsigned int)1) x >>=2, out >>=1;+ if (x) out -= out >> 2;+ return (out ? out : 1);+} ++/*+ * Basically, points = size / (sqrt(CPU_used) * sqrt(sqrt(time_running)))+ * with some bonusses/penalties.+ *+ * The definition of the task_struct, the structure describing the state+ * of each process, can be found in include/linux/sched.h. For+ * capability info, you should read include/linux/capability.h.+ */++inline int badness(struct task_struct *p)+{+ int points = p->mm->total_vm;+ points /= int_sqrt((p->times.tms_utime + p->times.tms_stime) >> (SHIFT_HZ + 3));+ points /= int_sqrt(int_sqrt((jiffies - p->start_time) >> (SHIFT_HZ + 10)));+/*+ * DEF_PRIORITY is the lenght of the standard process priority;+ * see include/linux/sched.h for more info.+ */+ if (p->priority < DEF_PRIORITY)+ points <<= 1;+/*+ * p->(e)uid is the process User ID, ID 0 is root, the super user. Since+ * the super user can do anything, and does almost nothing (on a proper+ * system), we have to assume that the process is trusted/good.+ * Besides, the super user usually runs important system services, which+ * we don't want to kill...+ */+ if (p->uid == 0 || p->euid == 0 || p->cap_effective.cap & CAP_TO_MASK(CAP_SYS_ADMIN))+ points >>= 2;+/*+ * NEVER, EVER kill a process with direct hardware acces. Since+ * they function almost as a device driver, killing one of those+ * might hang the system -- which is something we need to prevent+ * at all cost...+ */+ if (p->cap_effective.cap & CAP_TO_MASK(CAP_SYS_RAWIO)+#ifdef __i386__+ || p->tss.bitmap == offsetof(struct thread_struct, io_bitmap)+#endif + )+ points = 0;+#ifdef DEBUG+ printk(KERN_DEBUG "OOMkill: task %d (%s) got %d points\n",+ p->pid, p->comm, points);+#endif+ return points;+}++inline struct task_struct * select_bad_process(void)+{+ int points = 0, maxpoints = 0;+ struct task_struct *p = NULL;+ struct task_struct *chosen = NULL;+/*+ * These locks are used to prevent modification of critical+ * structures while we're working with them. Remember that+ * Linux is a multitasking (and sometimes SMP) system.+ * -- Luckily these nice macros are made available so we don't+ * have to do cumbersome locking ourselves :)+ */+ read_lock(&tasklist_lock);+ for_each_task(p)+ if (p->pid)+ points = badness(p);+ if (points > maxpoints) {+ chosen = p;+ maxpoints = points;+ }+ read_unlock(&tasklist_lock);+ return chosen;+}++/*+ * The SCHED_FIFO magic should make sure that the killed context+ * gets absolute priority when killing itself. This should prevent+ * a looping kswapd from interfering with the process killing.+ * Read kernel/sched.c::goodness() and kernel/sched.c::schedule()+ * for more info.+ */+void oom_kill(void)+{++ struct task_struct *p = select_bad_process();+ if (p == NULL)+ return;+ printk(KERN_ERR "Out of Memory: Killed process %d (%s).", p->pid, p->comm);+ force_sig(SIGKILL, p);+ p->policy = SCHED_FIFO;+ p->rt_priority = 1000;+ current->policy |= SCHED_YIELD;+ schedule();+ return;+}++/*+ * Are we out of memory?+ *+ * We ignore swap cache pages and simplify the situation a bit.+ * This won't do any damage, because we're only called when kswapd+ * is already failing to free pages and when that is happening we+ * can assume that the swap cache is very small. See the test in+ * mm/vmscan.c::kswapd() for more info.+ */++int out_of_memory(void)+{+ struct sysinfo val;+ int free_vm, kill_limit;+ si_meminfo(&val);+ si_swapinfo(&val);+ kill_limit = min(vm_kill.ram * (val.totalram >> PAGE_SHIFT),+ vm_kill.total * ((val.totalram + val.totalswap) >> PAGE_SHIFT));+ free_vm = ((val.freeram + val.bufferram + val.freeswap) >>+ PAGE_SHIFT) + page_cache_size - (page_cache.min_percent ++ buffer_mem.min_percent) * num_physpages;+ if (free_vm * 100 < kill_limit)+ return 1;+ return 0;+}--- mm/vmscan.c.orig Sat Aug 22 21:35:53 1998+++ mm/vmscan.c Sat Aug 22 21:47:53 1998@@ -28,6 +28,12 @@ #include <asm/bitops.h> #include <asm/pgtable.h> +/*+ * OOM kill declarations. Move to .h file before submission ;)+ */+extern int out_of_memory(void);+extern void oom_kill(void);+ /* * When are we next due for a page scan? */@@ -467,7 +473,10 @@ case 0: if (shrink_mmap(i, gfp_mask)) return 1;- state = 1;+ /* Don't allow a mode change when page cache or buffermem is over max */+ if (((buffermem >> PAGE_SHIFT) * 100 < buffer_mem.max_percent * num_physpages) &&+ (page_cache_size * 100 < page_cache.max_percent * num_physpages)) + state = 1; case 1: if (shm_swap(i, gfp_mask)) return 1;@@ -546,7 +555,7 @@ init_swap_timer(); add_wait_queue(&kswapd_wait, &wait); while (1) {- int tries;+ int tries, tried, success; current->state = TASK_INTERRUPTIBLE; flush_signals(current);@@ -572,18 +581,23 @@ */ tries = pager_daemon.tries_base; tries >>= 4*free_memory_available();+ tried = success = 0; do {- do_try_to_free_page(0);+ if (do_try_to_free_page(0))+ success++;+ tried++; /* * Syncing large chunks is faster than swapping * synchronously (less head movement). -- Rik. */ if (atomic_read(&nr_async_pages) >= pager_daemon.swap_cluster) run_task_queue(&tq_disk);- if (free_memory_available() > 1)+ if (free_memory_available() > 1 && tried > pager_daemon.tries_min) break; } while (--tries > 0);+ if (success * 4 < tried && out_of_memory())+ oom_kill(); } /* As if we could ever get here - maybe we want to make this killable */ remove_wait_queue(&kswapd_wait, &wait);-To unsubscribe from this list: send the line "unsubscribe linux-kernel" inthe body of a message to majordomo@vger.rutgers.eduPlease read the FAQ at
http://lkml.org/lkml/1998/8/22/42
CC-MAIN-2013-48
refinedweb
1,022
57.67
#include <clientprotocol.h> Client protocol event class. All messages sent to a user must be part of an event. A single event may result in more than one protocol message being sent, for example a join event may result in a JOIN and a MODE protocol message sent to members of the channel if the joining user has some prefix modes set. Event hooks attached to a specific event can alter the messages sent for that event. Constructor. Constructor. Get a list of messages to send to a user. The exact messages sent to a user are determined by the initial message(s) set and hooks. Set a single message as the initial message in the event. Modules may alter this later. Set a list of messages as the initial messages in the event. Modules may alter this later.
https://www.inspircd.org/api/3.0/class_client_protocol_1_1_event.html
CC-MAIN-2021-21
refinedweb
139
74.49
Perhaps annotated aspect to that contains a description the type of access to a folder (read, write). And an interface 'Securable' which has the methods for getting a list of roles for this object. public class Folder implement Securable { | | @Secured (access="read") | public void getMessage {...} | } | | public class SecurityAspect { | | public void isAllowed() { | Securable sc = (Securable) getCurrentObject(); | String access = metaData.get("access"); | if (sc.getRoleSet(access).retainAll(currentUser.getRoleSet()).size() > 0) { | // Ok. | } | else { | throw new SecurityException("Bad person doing bad things"); | } | } | } We would define a join point for Security Aspects to be bound to methods annotated with @Secured. One of the things that I was thinking about related to folders is that it would be nice to be able to address any entity in JBMail using a path e.g. my inbox could be addressed as '/{domain}/mail/folders/mike/INBOX'. Mostly this would help REST and CalDAV should we decide to implement these and provide a uniform interface to any object in the system. Perhaps we could have the concept of "mounting" a module. It would require a common contract for all modules that contain entities. Just an idea, probably overkill. View the original post : Reply to the post : Ummm yes... I like the folder addressing scheme. I need to start thinking virtual hosts... I think I like the above aspect but idea... I mostly like it...I think... I dunno it seems like it is missing something but I can't put my finger on it. So do we have to go to JDK 5 yet? I scheduled this for M5 in the jira stuff I'm trying to outline a formal plan... My mind says wait just a little longer....but my heart says "yumm...upgrades!" I'm also salavating over something we should not do (the NIO threading thing....)...at least prototyping it....but I must ....resist....think...release schedule....important stuff first... -Andy View the original post : Reply to the post : While you are working on the Mailbox design maybe you want to keep an eye down the road on features need by imap (and mybe other protocols). In addition to the more JBM internally used attributes you need to be able to attach a set of flexible (and client definded custom) flags to a folder (e.g. \Draft, \Seen, $Spam, etc.). Simplest way todo it would be to introduce a private hashmap to the mailbox and let every protocol have their own key to access their flag object in it and expose it like this: | Object getFlags(String key); | void setFlags(String key, Object flags); | NOTE: String may be prefered over Object and would certainly satisfy the needs for imap but since I have no idea if other protocols my need their own complex objects for flags... It would also be a nice feature to add an event observer type of mechanism to mailboxes. Reason for that: an IMAP connections instance has opened a mailbox and is idleing in it with NOOPs/CHECKs. A second connections instance is accessing the same mailbox and expunges a few mails (could also a user in a webfrontend, a pop3 instance, other imap client, etc). The first connection now needs to be updated that mail # 3, 5 and 8 have been deleted. So to allow a protocol instance to subscribe in some way to certain mailbox events like DELETE or ADD would make things much easier. Else you need to either do a lot of dirty overhead in the protocol implementations and/or place locks on the mailboxes much longer then actually needed (or needed at all). Cheers, Thorsten View the original post : Reply to the post : Very helpful good points. keep it coming! For NOOP/Check, I'd like to use NIO and make hte connection go on a NOOP/Check pool. The tomcat guys did this with native stuff for keep alive with nice results! The latter point I'm less sure of. Its a matter of transacitonal integrity. I'm not sure I like the volatile integrity this implies... My thought is that the Hibernate implemenation will be the default. We'll use versioning and optimistic locking...something goes awry the latter user gets an exception "no sucka you can't" or the IMAP equiv and his DB session is essentially reloaded or something. I'm not sure a notification scheme is safe or necessary or even permissible by IMAP (though I could be wrong). View the original post : Reply to the post : The IMAP RFC calls this kind of server-> client notifications "unitlateral notification" and you need them to keep the client and the server synchonized. Here the RFC text anonymous wrote : Server implementations that offer multiple simultaneous access to the same mailbox SHOULD also send appropriate unilateral untagged FETCH and EXPUNGE responses if another agent changes the state of any message flags or expunges any messages. One of the reasons this needs to be done is that client and server need to be in sync for message sequence number(MSN). But lets talk about a simple case: - mailbox contains 10 messages when connection 1 SELECTs the mailbox - connection 1 NOOPs around for a while since the user just keeps his client open on his workstation - now he also connects his laptop and for some reason opens up connection 2 that SELECTs the same mailbox - he EXPUNGs the mail with MSN 3 on conn 2 - now by IMAP RFC the mailbox is required to reorders it MSNs and decrement all MSN > 3 by 1 after an EXPUNGE and all future references from the clients also need to be aware of the new MSNs -* I am no IMAP expert by any means but this MSN reordering thingy is kinda tricky if you don't want to rely on the clients implementation to check for such things or don't want to totaly lock a mailbox as soon as one imap instance uses it with read-write lock. (This is just my interpretation of it so it may also be wrong) View the original post : Reply to the post : anonymous wrote : So do we have to go to JDK 5 yet? If only there was a way to do annotations in JDK1.4......Hold on :-). anonymous wrote : -* An optimistic lock would prevent this. If the client performed an operation and the version held by connection 2 didn't match that on the folder, then we could force the event at that point. I would need to read the IMAP spec to be certain though. anonymous wrote : it seems like it is missing something but I can't put my finger on it. I know what you mean. I'm not 100% happy about having aspects that look at the data of the objects they are attached to, but I think in order to get the roles for the current object it will be necessary. Would Hibernate filters be applicable here? View the original post : Reply to the post : Filters are good for not getting back folders you don't have access to (that may be yet another permission). . I think I know what I don't like. I think that the interface is the issue. Then I think the security data should be decoupled from the object. SecurityService.getObjectRoles(clazz, approleFromMetaData, id); thus clazz is the class (Folder.class), approleFromMetaData is "read" in the above sample and id is the primary key of the object (we will use all surrogate keys). I think we can get the primary key via some form of introspection (it will be marked)... So I guess we should go EJB3 and JDK5 for the next release (M4) is that your supposition? While I finish the izPack thing can you help knock out the non-install remiaing M3 issues? Once we get that and I get the install ready I'll branch. -Andy View the original post : Reply to the post : anonymous wrote : So I guess we should go EJB3 and JDK5 for the next release (M4) is that your supposition? It would be nice to move the EJB3 & JDK5 (mmm, new stuff), but it not necessary (more fun though) as I am quite happy with JBoss Annotations for JDK 1.4 and Hibernate (Mailbox/Maillist uses this). Will look at the JIRA tasks. Mike. View the original post : Reply to the post : okay good... I don't want to do JDK5 until M5 if possible. View the original post : Reply to the post :
http://sourceforge.net/p/jboss/mailman/jboss-dev-forums/thread/3625602.1122673033249.JavaMail.jboss@colo-br-02.atl.jboss.com/
CC-MAIN-2014-41
refinedweb
1,410
70.84
Nick Chalko <nick@chalko.com> wrote on 02/03/2003 05:56:32 AM: > dion@multitask.com.au wrote: > > > Nick, > > > > can you explain why there is a need for a subproject and not a > > sub-subproject etc? > > Good question. > > This also releates to "what is a project" . Jakarta , avalon, turbine. > poi, poi-contrib. > On the one hand we could allow unlimited subprojects. specify that > projects must start with a letter, and version must start with a number. > > Or the other aproach is only one level of projects then you have > jakarta-avalon-fulcrum. > > This is a namespace problem, how do we avoid naming collitions at Apache > I suppose we could say that a "project"="cvs module" In the interest of a URI that's not going to change too much, cvs module is as fragile as subproject in my experience, and whilst a good idea, still leaves the URI too fragile for my liking. > My preference would be for /project/[subproject/..]/version/artifact. Version being in the directory I've already mentioned. -- dIon Gillard, Multitask Consulting Work: --------------------------------------------------------------------- To unsubscribe, e-mail: community-unsubscribe@apache.org For additional commands, e-mail: community-help@apache.org
http://mail-archives.apache.org/mod_mbox/www-community/200303.mbox/%3COF1B5DEB03.ED1D644F-ONCA256CDD.00456A4E-CA256CDD.00458F98@multitask.com.au%3E
CC-MAIN-2018-05
refinedweb
194
58.48
Introduction to Subversion, an Open Source Version Control Tool In this chapter, I will walk you through the basic use of Subversion, from creating a new repository, all the way through to more complex features such as creating and merging a branch. If you are like me, you learn best by actually sitting down at a computer and getting your feet wet. To allow you to do that, all of the examples in this chapter build on each other, one right after the other, starting with a simple Hello World project. All of the examples in this chapter assume that you are in a UNIX-like environment, such as Linux or Mac OS X. For the most part, they will all work if you are running in a Windows environment, with a few minor changes, such as turning forward slashes (/) in path names into backslashes (\). We'll start the project with two files, which make up our example project. The first file is the source for our Hello World program, hello.c: #include <stdio.h> int main(int argc, char** argv) { printf("Hello World!!\n"); return 0; } The second file is a makefile, which could be used with the make program to compile our fabulous application. The file is named, appropriately, Makefile: all: hello.c gcc hello.c -o hello 4.1 Creating the Repository Subversion stores files in a repository database (which is Berkeley DB by default, but version 1.1 also supports FSFS). So, the first thing to do is create a new repository where we can store Hello World. This is done using the svnadmin program, which is used for most server-side administrative tasks when using Subversion. The repository is created with the svnadmin create command. First, though, you will want to create a directory in your home directory, where you can store the repository (you'll see later why creating it directly in your home directory isn't a good idea). If you were creating a repository to use on a server, for production use, you would probably want to place it somewhere other than your home directory, such as /srv/ or /var/. In the following example, bill should be replaced with your username on the machine where you are creating the repository. Similarly, in all future examples where you see my username, bill, you should replace it with your own username. $ svnadmin create --fs-type fsfs /home/bill/my_repository This creates an empty repository named my_repository in your home directory, using the filesystem-based FSFS repository backend. By choosing FSFS instead of the default Berkeley DB backend, you don't need to worry about repository wedging, which can happen if Berkeley DB is interrupted. Although wedging is not fatal to repositories, it will leave your repository in a temporarily inaccessible state, which requires the Berkeley DB recovery process to be run in order to clear the wedge. In most situations, you will want to create a repository on a server, and access it through HTTP/HTTPS, or the Subversion server svnserve. For simplicity's sake, though, we'll take advantage of Subversion's capability to communicate directly with a repository on the local machine, using a local directory path, for all of the examples in this chapter. After you've run the create command, you can look in your home directory, and you will see that Subversion has created a directory named my_repository. This contains the repository database. In general, you won't directly edit any files in this directory. Instead, you will interact with it through Subversion's svn command. If you look inside this directory, you can see that there are a bunch of files and directories, but there is little reason for you to worry about what they are for at this point. In Chapter 11, "The Joy of Automation," you will learn how you can edit some of the files in your repository to customize Subversion's behavior. $ ls /home/bill/my_repository/ README.txt conf/ dav/ db/ format hooks/ locks/
http://www.informit.com/articles/article.aspx?p=408888&amp;seqNum=3
CC-MAIN-2016-40
refinedweb
670
52.9
Difference between revisions of "Hello XML World Example (Buckminster)" Latest revision as of 19..." componentType="osgi.bundle"> This is what the RMAP XML means: - The 6 first lines declare the name spaces and syntax of the rmap and the repository providers needed. - Below that you see a search path element called default. - Continue down and you see a locator and a redirect declaration. The pattern of those declarations are matched in the order that they are declared. The first match wins and the match stops. - the locator states that if a component name starts with org.demo. then the search path named "default" in this rmap should be used. - the redirect states that all other names should be delegated to another rmap (and its locators and redirects). - Back to the default searchPath: - A provider for a Subversion type repository is declared with a URL that, after parameter substitution, will point to the component root. - This name is obtained from the preset property buckminster.component which contains the name of the component being matched. - The provider will provide source (source=true). The CSPEC in Component org.demo.worlds Since this:attribute </cs:prerequisites> <cs:products <cs:path </cs:products> </cs:public> <cs:private <cs:prerequisites> <cs:attribute </cs:prerequisites> <cs:products <cs:path </cs:products> </cs:private> </cs:actions> <cs:groups> <cs:public <cs:attribute name= source is the XML stuff and declaration of namespaces. Note the use of a cspecExtension element as the top most element. - Next, two component dependencies are listed, on the component org.demo.worlds (a plugin ("osgi.bundle")), and on the tada sax-parser se.tada/tada-sax. - The following actions section declares a private "prebind" action - this action kicks in before the component content is bound to the Eclipse workspace. As you can see, the action is an ant action, and it uses a make/prebind.xml file with the instructions for the build. - There are two pre-requisites - on the sax parser, and on a jar file called worlds-jar that is obtained from the attribute java.binary.archives SVN provider of this RMAP is chosen (it's the only one) - The.
http://wiki.eclipse.org/index.php?title=Hello_XML_World_Example_(Buckminster)&diff=281588&oldid=41653
CC-MAIN-2016-44
refinedweb
358
57.98
Java SE 8 Date and Time: Why do we need a new date and time library? Ben Evans and Richard Warburton outline the reasons why decent support for the date and time use cases of everyday devs is so darn important. A long-standing bugbear of Java developers has been the inadequate support for the date and time use cases of ordinary developers. For example, the existing classes (such as java.util.Date and SimpleDateFormatter) aren’t thread-safe, leading to potential concurrency issues for users—not something the average developer would expect to deal with when writing date-handling code. Some of the date and time classes also exhibit quite poor API design. For example, years in java.util.Date start at 1900, months start at 1, and days start at 0—not very intuitive. thread-safe manner and to think about concurrency problems in their day-to-day development of date-handling code. The new API avoids this issue by ensuring that all its core classes are immutable and represent well-defined values. Domain-driven design. The new API models its domain very precisely with classes that represent different use cases for Date and Time closely. This differs from previous Java libraries that were quite poor in that regard. For example,java.util.Date represents an instant on the timeline—a wrapper around the number of milli-seconds since the UNIX epoch—but if you call toString(), the result suggests that it has a time zone, causing confusion among developers. calendaring systems in order to support the needs of users in some areas of the world, such as Japan or Thailand, that don’t necessarily follow ISO-8601. It does so without imposing additional burden on the majority of developers, who need to work only with the standard chronology. LocalDate and LocalTime The first classes you will probably encounter when using the new API are LocalDate and LocalTime. They are local in the sense that they represent date and time from the context of the observer, such as a calendar on a desk or a clock on your wall. There is also a composite class called LocalDateTime, which is a pairing of LocalDate and LocalTime. The existing classes aren’t thread-safe, leading to potential concurrency issues for users—not something the average developer would expect. Time zones, which disambiguate the contexts of different observers, are put to one side here; you should use these local classes when you don’t need that context. A desktop JavaFX application might be one of those times. These classes can even be used for representing time on a distributed system that has consistent time zones. Creating Objects All the core classes in the new API are constructed by fluent factory methods. When constructing a value by its constituent fields, the factory is called of; when converting from another type, the factory is called from. There are also parse methods that take strings as parameters. See Listing 1. LocalDateTime timePoint = LocalDateTime.now( ); // The current date and time LocalDate.of(2012, Month.DECEMBER, 12); // from values LocalDate.ofEpochDay(150); // middle of 1970 LocalTime.of(17, 18); // the train I took home today LocalTime.parse("10:15:30"); // From a String Listing 1 Standard Java getter conventions are used in order to obtain values from Java SE 8 classes, as shown in Listing 2. LocalDate theDate = timePoint.toLocalDate(); Month month = timePoint.getMonth(); int day = timePoint.getDayOfMonth(); timePoint.getSecond(); Listing 2 You can also alter the object values in order to perform calculations. Because all core classes are immutable in the new API, these methods are called with and return new objects, rather than using setters (see Listing 3). There are also methods for calculations based on the different fields. // Set the value, returning a new object LocalDateTime thePast = timePoint.withDayOfMonth( 10).withYear(2010); /* You can use direct manipulation methods, or pass a value and field pair */ LocalDateTime yetAnother = thePast.plusWeeks( 3).plus(3, ChronoUnit.WEEKS); Listing 3 The new API also has the concept of an adjuster—a block of code that can be used to wrap up common processing logic. You can either write a WithAdjuster, which is used to set one or more fields, or a PlusAdjuster, which is used to add or subtract some fields. Value classes can also act as adjusters, in which case they update the values of the fields they represent. Built-in adjusters are defined by the new API, but you can write your own adjusters if you have specific business logic that you wish to reuse. See Listing 4. import static java.time.temporal.TemporalAdjusters.*; LocalDateTime timePoint = ... foo = timePoint.with(lastDayOfMonth()); bar = timePoint.with(previousOrSame(ChronoUnit.WEDNESDAY)); // Using value classes as adjusters timePoint.with(LocalTime.now()); Listing 4 Truncation The new API supports different precision time points by offering types to represent a date, a time, and date with time, but obviously there are notions of precision that are more fine-grained than this. The truncatedTo method exists to support such use cases, and it allows you to truncate a value to a field, as shown in Listing 5. LocalTime truncatedTime = time.truncatedTo(ChronoUnit.SECONDS); Listing 5 Time Zones The local classes that we looked at previously abstract away the complexity introduced by time zones. A time zone is a set of rules, corresponding to a region in which the standard time is the same. There are about 40 of them. Time zones are defined by their offset from Coordinated Universal Time (UTC).. - ZoneId is an identifier for a region (see Listing 6). Each ZoneId corresponds to some rules that define the time zone for that location. When designing your software, if you consider throwing around a string such as “PLT” or “Asia/Karachi,” you should use this domain class instead. An example use case would be storing users’ preferences for their time zone. // You can specify the zone id when creating a zoned date time ZoneId id = ZoneId.of("Europe/Paris"); ZonedDateTime zoned = ZonedDateTime.of(dateTime, id); assertEquals(id, ZoneId.from(zoned)); Listing 6 - ZoneOffset is the period of time representing a difference between Greenwich/UTC and a time zone. This can be resolved for a specific ZoneId at a specific moment in time, as shown in Listing 7. ZoneOffset offset = ZoneOffset.of("+2:00"); Listing 7 Time Zone Classes ZonedDateTime is a date and time with a fully qualified time zone (see Listing 8). This can resolve an offset at any point in time. The rule of thumb is that if you want to represent a date and time without relying on the context of a specific server, you should use ZonedDateTime. ZonedDateTime.parse("2007-12-03T10:15:30+01:00[Europe/Paris]"); Listing 8 OffsetDateTime is a date and time with a resolved offset. This is useful for serializing data into a database and also should be used as the serialization format for logging time stamps if you have servers in different time zones. OffsetTime is a time with a resolved offset, as shown in Listing 9. OffsetTime time = OffsetTime.now(); // changes offset, whileHour(3) .plusSeconds(2); Listing 9 There is an existing time zone class in Java—java.util.TimeZone—but it isn’t used by Java SE 8 be-cause all JSR 310 classes are immutable and time zone is mutable. Periods A Period represents a value such as “3 months and 1 day,” which is a distance on the timeline. This is in contrast to the other classes we’ve looked at so far, which have been points on the timeline. See Listing 10. // 3 years, 2 months, 1 day Period period = Period.of(3, 2, 1); // You can modify the values of dates using periods LocalDate newDate = oldDate.plus(period); ZonedDateTime newDateTime = oldDateTime.minus(period); // Components of a Period are represented by ChronoUnit values assertEquals(1, period.get(ChronoUnit.DAYS)); Listing 10 Java SE 8 will ship with a new date and time API in java.time that offers greatly improved safety and functionality for developers. The new API models the domain well, with a good selection of classes for modeling a wide variety of developer use cases. Durations A Duration is a distance on the timeline measured in terms of time, and it fulfills a similar purpose to Period, but with different precision, as shown in Listing 11. // A duration of 3 seconds and 5 nanoseconds Duration duration = Duration.ofSeconds(3, 5); Duration oneDay = Duration.between(today, yesterday); Listing 11 It’s possible to perform normal plus, minus, and “with” operations on a Duration instance and also to modify the value of a date or time using the Duration. Chronologies In order to support the needs of developers using non-ISO calendaring systems, Java SE 8 introduces the concept of a Chronology, which represents a calendaring system and acts as a factory for time points within the calendaring system. There are also interfaces that correspond to core time point classes, but are parameterized by: Chronology: ChronoLocalDate ChronoLocalDateTime ChronoZonedDateTime These classes are there purely for developers who are working on highly internationalized applications that need to take into account local calendaring systems, and they shouldn’t be used by developers without these requirements. Some calendaring systems don’t even have a concept of a month or a week and calculations would need to be performed via the very generic field API. The Rest of the API Java SE 8 also has classes for some other common use cases. There is the MonthDay class, which contains a pair of Month and Day and is useful for representing birthdays. The YearMonth class covers the credit card start date and expiration date use cases and scenarios in which people have a date with no specified day. JDBC in Java SE 8 will support these new types, but there will be no public JDBC API changes. The existing generic setObject and getObject methods will be sufficient. These types can be mapped to vendor-specific database types or ANSI SQL types; for example, the ANSI mapping looks like Table 1. Table 1 Conclusion Java SE 8 will ship with a new date and time API in java.time that offers greatly improved safety and functionality for developers. The new API models the domain well, with a good selection of classes for modeling a wide variety of developer use cases. Originally published in the January/February 2014 issue of Java Magazine. Subscribe today. (1) Originally published in the January/February 2014 Edition of Java Magazine (2) Copyright © [2014] Oracle.
https://jaxenter.com/java-se-8-date-and-time-why-do-we-need-a-new-date-and-time-library-107615.html
CC-MAIN-2017-09
refinedweb
1,754
55.44
Can anyone help a novice C# beginner? I'm attempting to call an object created in the same class but a different method. Both methods were called from another class. Below is simplied code. I've left out other code that the methods perform. An error indicates the "listener" object isn't recognized in the 2nd method. Thank you for any help your can offer. Code:// this 1st class calls methods of a 2nd class public class Lru_operation { // create an object of the 2nd class public Lru_Listen LruListen = new Lru_Listen(); // this method calls two methods from other class public void LruOperation() { LruListen.ListenForAag(); // first method call LruListen.LruListenAccReq(); // second method call } } // this is the 2nd class public class Lru_Listen { // 1st method creates an object from a different class (HttpListener) public void ListenForAag() { HttpListener listener = new HttpListener(); } // 2nd method calls 1st method's object to perform // a method task from a different class public void LruListenAccReq() { HttpListenerContext context = listener.Getcontext(); } }
http://forums.devshed.com/programming/955768-call-object-method-last-post.html
CC-MAIN-2018-17
refinedweb
159
56.05
GraphQL is strongest when it is a unified access point to your organization’s entire data universe: You may have a plethora of micro-services churning away in the background, but your GraphQL consumer doesn’t need to know those details. Instead, they can focus on being productive using your organization’s single, cohesive, data model. Often, an app’s entire data universe is way too large to reasonably download and manage entirely in an app, but at the same time we want to fool our users into thinking that we’ve done just that. To build an app that creates this kind of user perception, it is not enough to just layer on some consistency features at the end of the development cycle — you must fundamentally build paradigms into the application’s infrastructure that allow your front-end engineers to efficiently operate a subset of your data universe locally. This is where a GraphQL client comes in. A GraphQL client should allow you to take a slice of your GraphQL data universe and make it accessible on the client. Clients like Apollo store your data in a normalized form where the id is computed by the user defined function dataIdFromObject. In this way, Apollo Client acts very similarly to a database. It saves data using a query language, and provides an interface for you to read that data back out. However, before Apollo Client 0.10.0 there were only two ways for you to access and modify the data in this database: You could try reading data with a query by setting noFetch, or writing data with a call to updateQueries. While these features are great in the context for which they were designed, they were not built to offer complete control over the client-side cache. Instead, Apollo Client now provides the ability to control the store with four new methods: readQuery(), readFragment(), writeQuery(), and writeFragment(). These methods are available on your ApolloClient instance and allow you to read and write directly to your cache. Together, they will allow you to provide a compelling experience to your users by empowering you to update the data in your cache in any way you choose. These methods expose enough power that you may, in fact, be able to write your own customized GraphQL client API on top of them! Let’s dive into the details of each method and how you may use them together to build great experiences. Reading Queries From the StoreReading Queries From the Store The first method for interacting directly with your cache is readQuery(). This method will read data from your cache starting at your root query type. To use the method, you provide it the query you want to read as a named argument like so: const data = client.readQuery({ query: gql` { todo(id: 1) { id text completed } } `, }); If the data exists in your cache then it will be returned and you may interact with the data object however you like! If not, all of the data exists in your store the query can not be fulfilled so an error will be thrown. You may use a query from anywhere in your app with this method. You may also pass in variables: import { TodoQuery } from './TodoGraphQL'; const data = client.readQuery({ query: TodoQuery, variables: { id: 5 }, }); readQuery() is similar to the existing query() method on Apollo Client, except that readQuery() will never send a request using your network interface. It will always try to read from only the cache, and if that read fails then an error will be thrown. Reading Fragments From the StoreReading Fragments From the Store Sometimes, however, you want to read from an arbitrary point in your store and not just from your root query type. For that there is the new readFragment() method. This method accepts a GraphQL fragment and an id and returns you the data at that id matching the provided fragment: client.readFragment({ id: '5', fragment: gql` fragment todo on Todo { id text completed } `, }); The id should be a string that is returned by the dataIdFromObject function you defined when initializing an instance of ApolloClient. For instance, if you use this common dataIdFromObject function: const client = new ApolloClient({ dataIdFromObject: o => { if (o.__typename != null && o.id != null) { return `${o.__typename}-${o.id}`; } }, }); Then your id might be Todo5 instead of just 5 because you added the __typename to beginning of the id. Writing Queries and Fragments To the StoreWriting Queries and Fragments To the Store Both readQuery() and readFragment() have analogous methods for writing: writeQuery() and writeFragment(). These methods allow you to update the data in your local cache, to simulate an update from the server. However, beware: these updates are not actually persisted to your backend! That means if you reload your JavaScript environment the updates will be gone. Also, no other users will be able to see the changes you made with these methods. If you want all of your users to see modified data then you need to send a mutation to update it on the server. The advantage of writeQuery() and writeFragment() is that they allow you to exactly modify the data in your cache to make sure it is in sync with the server in cases where you do not want to do a full server refetch. Or, in cases where you want to slightly modify some data on the client so that the user may have a better experience. writeQuery() has the same interface as readQuery(), except that it also takes a named argument called data. The data object must be in the same shape as the JSON result your server would return for this query. client.writeQuery({ query: gql` { todo(id: 1) { completed } } `, data: { todo: { completed: true, }, }, }); Likewise, writeFragment() has the same interface as readFragment() except for the named argument data. The id follows the same rules as it does in readFragment(): client.writeFragment({ id: '5', fragment: gql` fragment todo on Todo { completed } `, data: { completed: true, }, }); These four methods will allow you to completely control the data in your cache. You no longer have to guess at what your cache contains, as you may now simply read out any data and write back any modifications to remove inconsistencies. Updating Data With Both Reads and WritesUpdating Data With Both Reads and Writes We have made it easy to use these methods anywhere in your app, and especially in the context of mutation results. Since the data you get out of the cache is a copy, you can mutate it without affecting the underlying store. This makes imperative updates simple. Here’s something you could not do before in Apollo Client: const query = gql` { todos { id text completed } } `; const data = client.readQuery({ query, }); data.todos.push({ id: 5, text: 'Hello, world!', completed: false, }); client.writeQuery({ query, data, }); Updating after a mutationUpdating after a mutation The most common place where you might want to update your store is during the lifecycle of a mutation. You often need to do this twice: first, when you immediately execute the mutation with an optimistic response (if you have one), and then a second time after your mutation has completed. Apollo Client now provides an update method that passes in a proxy object with the four read and write methods which allows you to update your cache in whichever way you choose. const text = 'Hello, world!'; client.mutate({ mutation: gql` mutation ($text: String!) { createTodo(text: $text) { id text completed } } `, variables: { text, }, optimisticResponse: { createTodo: { id: -1, // Fake id text, completed: false, }, }, update: (proxy, mutationResult) => { const query = gql` { todos { id text completed } } `; const data = proxy.readQuery({ query, }); data.todos.push(mutationResult.createTodo); proxy.writeQuery({ query, data, }); }, }); We first got the idea for using a proxy to do imperative cache updates in Greg Hurrell’s presentation on Relay 2. We then developed the idea into a full implementation which you can now use in ApolloClient today! In Apollo Client, the main advantage of using a proxy object in update is to apply and roll back optimistic mutation updates in a way that’s completely transparent for developers. updateQueries Going ForwardupdateQueries Going Forward The update function on mutations provides a more flexible alternative to the updateQueries callback people currently use to update their store after a mutation. There have been some issues, both in the general approach and in the specific design of updateQueries, that led the Apollo team to keep looking for better options for updating your store after a mutation. We think that the update function, combined with the new reading and writing methods, is a good path forward. But we want to know what you think! Do you like updateQueries? Do you prefer updateQueries to update for some use-cases? We are always interested in improving Apollo Client’s API to make it better for developers, so we depend on your feedback! ConclusionConclusion With the new methods, you now have complete control over the data in your cache, allowing you to use Apollo Client as a GraphQL-shaped client side database. For more information, read the documentation for these new features. Stay in our orbit! Become an Apollo insider and get first access to new features, best practices, and community events. Oh, and no junk mail. Ever. Make this article better! Was this post helpful? Have suggestions? Consider so we can improve it for future readers ✨.
https://www.apollographql.com/blog/announcement/apollo-clients-new-imperative-store-api-6cb69318a1e3/
CC-MAIN-2022-27
refinedweb
1,559
60.65
FINAL This report has been submitted to the Board. Please do not edit further. Incubator PMC report for July 2014 Timeline Shepherd Assignments Report content Incubator PMC report for July 2014 The Apache Incubator is the entry path into the ASF for projects and codebases wishing to become part of the Foundation's efforts. There are currently 34 podlings under incubation, with three votes to graduate as the report is being closed. All three VOTEs have passed. Konstantin Boudnik People who left the IPMC: David Crossley Joe Schaeffer * New Podlings Fleece * Graduations The board has motions for the following: Tez Celix VXQuery * Releases The following releases were made since the last Incubator report: apache-storm-0.9.2-incubating mrql-0.9.2-incubating samza-0.7.0-incubating * IP Clearance No IP Clearance requests submitted to the Incubator in this timeframe. * Miscellaneous S4 voted to retire. SGA received for Optiq from DynamoBI Corporation. Discussion about exit criteria for podlings, including a suggested set of criteria that would trigger a VOTE to retire if a podling is not active enough. Consensus not yet reached. Stratos has graduated but still needs to finish graduation tasks. -------------------- Summary of podling reports -------------------- * Still getting started at the Incubator Brooklyn Fleece Optiq Parquet * Not yet ready to graduate No release: Aurora DataFu DeviceMap Flink log4cxx2 NPanday Wave Community growth: MetaModel Ripple Slider Usergrid * Ready to graduate Kalumet Samza The Board has motions for the following: Tez Celix VXQuery * Retiring S4 * Did not report, expected next month ODF Toolkit ---------------------------------------------------------------------- Table of Contents Aurora Brooklyn DataFu DeviceMap Fleece Flink Kalumet MetaModel NPanday ODF Toolkit Optiq Parquet Ripple S4 Samza Slider * Contributor addition: Mark Chu-Carroll, 2014-01-14 Issue backlog status since last report: * Created: 257 * Resolved: 161: [X](aurora) Jake Farrell [ ](aurora) Benjamin Hindman [ ](aurora) Chris Mattmann [X](aurora) Henry Saputra Shepherd/Mentor notes: -------------------- Brooklyn Brooklyn is a framework for modeling, monitoring, and managing applications through autonomic blueprints. Brooklyn has been incubating since 2014-05-01. Three most important issues to address in the move towards graduation: 1. Performing our first release under Apache 2. Completing migration into the Incubator - largest task is populating Jira with existing issues 3. Growing a diverse community and PPMC Any issues that the Incubator PMC (IPMC) or ASF Board wish/need to be aware of? No. How has the community developed since the last report? A small number of new users have appeared, contributing posts to the mailing lists, Jira issues for bug reports and suggested improvements, and a code contribution. How has the project developed since the last report? The "boostrapping" process is well underway, with active mailing lists, website, and a burst of commit activity. Date of last release: No releases under Apache yet. When were the last committers or PMC members elected? Andrea Turli and Sam Corbett have become committers and joined the PPMC on 2014-04-01 and -02 respectively. Their committer accounts are currently being processed. Signed-off-by: [ ](brooklyn) Matt Hogstrom [ ](brooklyn) Alex Karasulu [ ](brooklyn) David Nalley [ ](brooklyn) Marcel Offermans [ ](brooklyn) Jean-Baptiste Onofré [ ](brooklyn) Olivier Lamy [X](brooklyn) Chip Childers [ ](brooklyn) Andrei Savu [X](brooklyn) Joe Brockmeier [ ](brooklyn) Jim Jagielski Shepherd/Mentor notes: (cc) As the report notes, Brooklyn is slowly (but surely) converting over to the ASF infrastructure and processes. They are making good progress at this time. -------------------- has been incubating since 2014-01-05. Three most important issues to address in the move towards graduation: 1. Building an ASF-based community. 2. Release. 3. Decide on the future home of the project. Any issues that the Incubator PMC (IPMC) or ASF Board wish/need to be aware of? None. How has the community developed since the last report? Will Vaughan gave a talk on DataFu at ApacheCon in April, and Casey Stella gave a talk on Pig and DataFu at the Hadoop Summit in June. How has the project developed since the last report? Lots of JIRAs on bug fixes and new features, especially in April and May. Work slowed significantly in June, which probably means it's time for a release to mark our progress thus far. Date of last release: None. Six month of incubation. When were the last committers or PMC members elected? 2014-02-22 Signed-off-by: [ ](datafu) Ashutosh Chauhan [X](datafu) Roman Shaposhnik [ ](datafu) Ted Dunning Shepherd/Mentor notes: (jmclean) : Mentor active, no obvious issues. -------------------- DeviceMap Apache DeviceMap is a data repository containing device information, images and other relevant information for all sorts of mobile devices, e.g. smartphones and tablets. While the focus is initially on that data, APIs will also be created to use and manage it. DeviceMap has been incubating since 2012-01-03. The report was not delivered on time from the project itself, as a mentor I (bdelacretaz) have sent the following challenges to the project's dev list to try and get the current somewhat active PPMC members to take over: 1. Challenge #1: provide regular reports 2. Challenge #2: make a release 3. Challenge #3: form a PMC with 4-5 members to graduate Those should really not be challenges but at this point that felt like an appropriate way of indicating the importance of those actions. There's already promising responses, we'll see if those translate into concrete actions. Apart from that there's been some good discussions in the last weeks, but no concrete results yet. Best is probably to evaluate the progress on the above challenges next month to make a decision about the future of the project. Date of last release: No releases yet When were the last committers or PMC members elected? May 2013 Signed-off-by: [x](devicemap) Bertrand Delacretaz [ ](devicemap) Kevan Miller [ ](devicemap) Andrew Savory Shepherd/Mentor notes: (rvs) The report is missing. This on-n-off seems to continue with the project. I know that some of the mentors are recommending giving it more time, but it seems like we need to establish some metrics to at least get the community in shape to do the basics (like reporting and releasing). Without any kind of forcing function I am not sure what the future for this project really is. (bdelacretaz) Agreed - I have now provided a mentor report above. -------------------- Fleece Implementation of JSon Processing Java specification. Fleece has been incubating since 2014-06-09. Three most important issues to address in the move towards graduation:? * First communication/discussions via mailing lists took place, first issues reported and fixed. How has the project developed since the last report? * Incubator status page, the mailing lists and the initial website have been setup. Initial code have been imported. Date of last release: * No releases as of yet When were the last committers or PMC members elected? * N/A Signed-off-by: [X](fleece) Justin Mclean [ ](fleece) Christian Grobmeier [ ](fleece) Daniel Kulp Shepherd/Mentor notes: (jmclean) : Everything set up, off to a good start, no issues. -------------------- was originally known as Stratosphere when it entered the Incubator. Flink has been incubating since 2014-04-14. Three most important issues to address in the move towards graduation: 1. The new name ("Flink") has still not been confirmed by the trademark team. 2. Setup of release infrastructure and first release 3. Continue with community growth Any issues that the Incubator PMC (IPMC) or ASF Board wish/need to be aware of? None. How has the community developed since the last report? Two presentations (Meetup in Nice by a committer, one in Budapest by a contributor), new users are showing up on the mailing list and on JIRA. How has the project developed since the last report? Most of the infrastructure setup has been done. Users start using the new mailing lists. In the last month, 21 authors have pushed 120 commits to master. On master, 910 files have changed and there have been 74,313 additions and 37,094 deletions. Date of last release: 2014-05-31 (no incubator release yet) When were the last committers or PMC members elected? None. Signed-off-by: [ ](flink) Sean Owen [ ](flink) Ted Dunning [ ](flink) Owen O'Malley [X](flink) Henry Saputra [ ](flink) Ashutosh Chauhan [X](flink) Alan Gates Shepherd/Mentor notes: Mentors look active; dev maillist is active. No obvious issues. -------------------- Kalumet Kalumet a complete environment manager and deployer including J2EE environments (application servers, applications, etc), softwares, and resources. Kalumet has been incubating since 2011-09-20. Community Developement: Apache Kalumet 0.6-incubating version has been released. However, due to some misunderstanding, the release vote has not been completed by 3 IPMC. Especially, some legal files issues have been raised. We are preparing a 0.6.1-incubating release to fix the legal files and submit to IPMC vote. We are in the way of promoting the documentation on the website. Project Development: We are preparing the 0.6.1-incubating (plan for July, 14) to fix the legal files issues raised on 0.6-incubating release and have a complete IPMC vote. We are preparing the 0.7-incubating release with the development changes. Local branches have been created containing: - new model and REST API - new webconsole (remove of Echo framework) These local branches will be merged on the 0.7-incubating branch (master). Before Graduation: - The documentation has been updated and aligned with the 0.6-incubating release. The documentation will be promoted on the website and "linked" in announcement e-mails as soon as the 0.6.1-incubating release has been voted. -. Any issues that the Incubator PMC (IPMC) or ASF Board wish/need to be aware of: None so far. Date of last release: 2013-11-22 Date of next release: 2014-07-14 When were the last committers or PMC members elected? None Signed-off-by: [ ](kalumet) Jim Jagielski [ ](kalumet) Henri Gomez [X](kalumet) Jean-Baptiste Onofre [ ](kalumet) Olivier Lamy Shepherd/Mentor notes: --------------------. Finalize 4.1 release to demonstrate new functionality and evolution within Apache 3. Connect with other projects from Apache's ecosystem such as HBase, Phoenix, Cassandra, Optiq Any issues that the Incubator PMC (IPMC) or ASF Board wish/need to be aware of? None How has the community developed since the last report? A few new people have started to work actively on the mailing list. It is still a small community, and growth is needed. On the positive side we do see certain new individuals starting to contribute continuously to the project. We have been working on blogging, tweeting etc. to create more out-going communication about MetaModel. We feel that more of such activity is needed. How has the project developed since the last report? Apache MetaModel 4.1.0-incubating was released on Jan 21. This time with a new release engineer, which meant that the release instructions were re-iterated and updated. Communication on mailing list is improving and we see more diversity of requests. For instance, connectivity to Hadoop and HBase was previously not very active but now it's is taking a good share of the focus. Date of last release: May 12th When were the last committers or PMC members elected? June 2013 (but a new committer is being invited just now) Signed-off-by: [X](metamodel) Henry Saputra [X](metamodel) Arvind Prabhakar [ ](metamodel) Matt Franklin [X](metamodel) Noah Slater Shepherd/Mentor notes: -------------------- NPanday NPanday allows projects using the .NET framework to be built with Apache Maven. NPanday has been incubating since 2010-08-13. Since the last report in April, a few obstacles have been removed: - the status page was updated with the current podling state and correct mentors - svnpubsub was enabled so the website can be updated again - a number of JIRA issues have been cleaned up to prepare for the release Not blocking, but outstanding things to do: - resolve issues with Jenkins builds with infrastructure - finish closing out JIRA issues that have been partially finished for release - apply suitable patches that have been overlooked in the past and try to reconnect with contributors Three most important issues to address in the move towards graduation: 1. Ship the changes on trunk as a release and make it easier for new users to get up to speed when interested in the project 2. Get a critical mass of committers/PPMC members that can respond to contributors, apply patches, nominate committers, and vote on releases 3. Provide guidance on how to get involved in contributing The incubator is already aware of the low level of activity, that many of the PPMC are now disengaged and lack of mentors for the project. Konstantin Boudnik has put his hand up to help out and that discussion is in progress. There continues to be interest in a new release from users, and new interest from some in making contributions that continue to be followed up. Date of last release: 2011-05-16 The last committer was added on 2011-04-19. There have not been any PPMC additions since inception. Signed-off-by: [ ](npanday) Raphael Bircher Shepherd/Mentor notes: -------------------- Optiq Optiq is a highly customizable engine for parsing and planning queries on data in a wide variety of formats. It allows database-like access, and in particular a SQL interface and advanced query optimization, for data not residing in a traditional database. Optiq has been incubating since 2014-05-19. Three most important issues to address in the move towards graduation: 1. Migrate fully to Apache infrastructure (next: web site and nightly builds). 2. Re-organize code into org.apache.optiq namespace. 3. Regular releases. 4. Build an ASF community. Any issues that the Incubator PMC (IPMC) or ASF Board wish/need? This is our first report. The community remains very similar to the point where we joined the Incubator. We are doing outreach. * Julian Hyde gave two talks related to Optiq at Hadoop Summit. * Julian Hyde attended the ACM SIGMOD conference and discussed Optiq with several researchers. Optiq was mentioned in several talks there. *: [ ](optiq) Ted Dunning [ ](optiq) Alan Gates [ ](optiq) Steven Noels Shepherd/Mentor notes: -------------------- Parquet Parquet is a columnar storage format for Hadoop. Parquet has been incubating since 2014-05-20 . Three most important issues - Finish bootstrapping project(completed), IP clearance (completed), initial website (in progress) - Expanding the community and adding new committers - 1st release Any issues that the Incubator PMC (IPMC) or ASF Board wish/need to be aware of? - None at this time Latest Additions: * PMC addition: N/A * Contributor addition: N/A Issue backlog status since last report: * Created: 8 * Resolved: 2 Mailing list activity since last report: * @dev 69 messages How has the project developed since the last report? - All bootstrap tickets have been completed and status page updated - Mailing lists created, Jira setup, Code imported - Jira issues starting to be imported to issues.apache.org - Website in the works and will be available soon, infra for this is all ready setup - Working on documenting contributing guide and committers workflow - We have now setup the mechanisms to accept contributions through the Apache Github and have already accepted one external contribution. Date of last release: - No releases as of yet. Signed-off-by: [X](parquet) Todd Lipcon [X](parquet) Jake Farrell [ ](parquet) Chris Mattmann [X](parquet) Roman Shaposhnik [X](parquet) Tom White Shepherd/Mentor notes: -------------------- Ripple overall decision of what to do with Ripple as an ASF project, and whether it can become a sub-project of Cordova is still under discussion. Additionally, there are discussion threads proposing how to more tightly integrate and use Ripple within Cordova. How has the community developed since the last report? A new committer was voted in. Raymond Camden. How has the project developed since the last report? Minor user contributions. Date of last release: N/A When were the last committers or PMC members elected? June, 2014. Signed-off-by: [ ](ripple) Jukka Zitting [X](ripple) Christian Grobmeier [ ](ripple) Andrew Savory Shepherd/Mentor notes: -------------------- Samza Samza is a stream processing system for running continuous computation on infinite streams of data. Samza has been incubating since 2013-07-30. Three most important issues to address in the move towards graduation: 1. Possible second Incubator release, otherwise ready to go. 2. 3. Any issues that the Incubator PMC (IPMC) or ASF Board wish/need to be aware of? None. How has the community developed since the last report? Voted in two new committers/PPMC members, both from outside of the original code contributor. Martin Kleppmann presented on the project at Berlin Buzzwords, Sriram Subramanian will be presenting in Seattle in August. How has the project developed since the last report? Currently in middle of first incubator release. 94 issues opened in since last reporting window, 86 resolved. Date of last release: Vote for 0.7.0 release has just passed in podling, now being run in Incubator. When were the last committers or PMC members elected? June 12. Signed-off-by: [ ](samza) Chris Douglas [ ](samza) Arun Murthy [X](samza) Roman Shaposhnik Shepherd/Mentor notes: -------------------- Slider Slider is a collection of tools and technologies to package, deploy, and manage long running applications on Apache Hadoop YARN clusters. Slider has been incubating since 2014-04-29. Three most important issues to address in the move towards graduation: 1. Building a user community 2. Getting those users to contribute their work back 3. Improving the application to make it easier to use Any issues that the Incubator PMC (IPMC) or ASF Board wish/need to be aware of? No How has the community developed since the last report? * We've made our first ASF-based release and are starting to get people discussing it on our dev list -our sole mailing list to date. This shows some take up, but it also identifies the challenge in diagnosing problems. We need to provide more application-side diagnostics to help both users and ourselves. How has the project developed since the last report? * As stated, we've made our first ASF release. We plan to do this monthly for the next few months, to get our release process refined, as we as evolve the application from users' experiences. * We've fully migrated to the ASF JIRA server, and have been cross-filing issues with sibling Apache projects -notably YARN- so helping gain awareness of us and our needs. So far the other projects have been very helpful. * We're trying to contribute some of our changes back into the Hadoop and Bigtop projects -our workflow YARN services and service launcher to Hadoop; improvements to the test runner shell for Bigtop. These will spread the benefits of these features, and tighten our relationship with those projects on which we depend. Date of last release: 2014-06-02 When were the last committers or PMC members elected? 2014-05 Signed-off-by: [ ](slider) Arun C Murthy [ ](slider) Devaraj Das [X](slider) Jean-Baptiste Onofré [X](slider) Mahadev Konar Shepherd/Mentor notes: --------------------. Obtain Usergrid release 1.0 2. Resolve relationship with Apache in general 3. Continue to grow community Any issues that the Incubator PMC (IPMC) or ASF Board wish/need to be aware of? Recently, Usergrid has been through the wars with regards to its development ethos, entire development process and most importantly code commit process. The latter has been an issue which resulted in one particular Apache Member having his account temporarily disabled, and a new contributor workflow that the project believes does satisfy board and infrastructure requirements: It has not been an easy month for Usergrid however the community spirit is higher than it ever has been and the community is in a strong position to meet Incubator criteria. An extremely positive note here is that the Usergrid community has been actively expanding throughout the above process. This is something we can all learn from. How has the community developed since the last report? The Usergrid community has been growing steadily and very encouragingly based on community VOTE's. We welcome contributions to Usergrid. Most importantly, many members of the existing Usergrid PPMC have been (extremely) actively involved in Usergrid's dissemination and expansion. * 74 subscribed to dev@ How has the project developed since the last report? Many, many commits. Usergrid is very healthy with regards to its development. What needs to be addressed however is the following: * Resolve commit process... MAJOR * Reflect commit messages to commit@ Date of last release: Usergrid (incubating) has not made an official release as of date. The community areactively working towards a release for 1.0. When were the last committers or PMC members elected? Askhat Asanaliev Wed, 23 Apr 2014 16:59:35 GMT Signed-off-by: [X](usergrid) Dave Johnson [X](usergrid) Jake Farrell [ ](usergrid) Jim Jagielski [X](usergrid) Lewis John Mcgibbney [ ](usergrid) Luciano Resende Shepherd/Mentor notes: -------------------- VXQuery A standards compliant parallel XML Query processor. VXQuery has been incubating since 2009-07-06. The second release has been released (by a different release manager). The PPMC has voted on the composition of the PMC (=committers) and the graduation vote is ongoing on the dev-list. Any issues that the Incubator PMC (IPMC) or ASF Board wish/need to be aware of? No. How has the community developed since the last report? No change. How has the project developed since the last report? There has been work on better handling of big XML files and greater functional coverage.: [ ](vxquery) Anthony Elder [ ](vxquery) Jochen Wiedmann [x](vxquery) Marvin Humphrey [ ](vxquery) Sanjiva Weerawarana [ ](vxquery) Radu Preotiuc-Pietro Shepherd/Mentor notes:
https://wiki.apache.org/incubator/July2014?highlight=MetaModel
CC-MAIN-2019-04
refinedweb
3,566
56.05
During the keynote speeches, someone mentioned that the streetcar no. 5, which goes to Jazoon’07, also goes to the zoo of Zurich. The good news was that the zoo was at the other end of the line, so JaZOOn (which apparently doesn’t mean anything) is either not related to the zoo or it’s related in such a way that it’s the opposite. I kind of disagree. A zoo is a place where you can see things that you normally can’t and in a safe way. In this regard, Jazoon is a zoo full of Java animals and I’m a happy part of it. Yesterday, I attended the keynote given by Ted Neward which was “Why the Next Five Years Will Be About Languages”. He mentioned a lot of interesting things, like: - Tools to build custom languages (a.k.a DSL’s) become more simple, more powerful, more widespread - The need to use there tools grows because it takes so much to formulate some things in general purpose languages like Java. What was great ten years ago seems clumsy today. - There is a plethora of languages that run on the Java VM (which is not Java(TM)) like Groovy, JRuby, Jython, Nice, Rhino (see here for a more complete list). He mentioned something like 200 languages using the VM besides Java but my memory could fail me here. For me, this means that my own talk What’s Wrong With Java?, where I compare Java, Groovy and Python, probably wasn’t that far off. Of course, I was pretty nervous how people at a Java conference would take it (plus I got sick on the weekend, so I had to take so many drugs to be able to give the talk that, if I had fallen into the Lake of Zurich, they would have had to pump it dry and deposit the water as medical waste 😉 … anyway …). Moreover, I had to rush through my talk because the time limits were really tight. All in all, I felt my performance could have been better but the critics seem fair. (see Fabrizio Gianneschi’s comment, thomas and another blog). Also, the room in my talk was full of people; something I haven’t seen for any other talk since (which probably means that I attend the wrong ones ;-)) and comments at the show were good, too (but I can’t prove it). I was thinking about registering a BOF but I just don’t feel well enough, so I’ll expand my thoughts and ideas a bit more here where space and time are only limited by your and my endurance. And you can think about your comments before sharing them with the world. Win-win, I’d say. Back to Jazoon. After my own talk, I attended Space Based Architecture – Scalable as Google, Simple as Spring. The talk itself was interesting and made sense; unfortunately, my body demanded sleep and it takes what it can’t get. So if you want to know any details, ask the person who sat next to me. I can only pray that I didn’t snore. Not the fault of the speaker, I swear! After having restored some of my energy, I went to see Impossible Possibilities – Programming Java an Unusual Way. The presenter, Michael Wiedeking, has the same problem with English as I: Great pronunciation but small built-in dictionary. Still, I could get what he talked about. He presented a way to implement a generator/corouting in Java 5. The basic idea here is that you have a piece of code which can return something to the caller and then continue it’s work when the caller calls it again. Confused? Here is an example: def parse(filename): handle = file(filename, 'r') while True: line = handle.readline() if line[0] == '#': continue yield line # <-- If you call parse() a second time, you will be here. handle.close() parse() throws away every line that starts with a hash (#) and returns (“yields”) all the rest. The interesting part is when you call parse a second time: It will not start with the line where a new file is opened but it will continue with the next statement after “yield”, therefore reading the next line in the already opened file. In Python, you can have as many yields in one method or function as you like. They work with recursion and exceptions. This way, you can run a complex algorithm until a certain point (when you have a first result to return), return it and then go on as if the return had never happened. You don’t have to worry about local variables, closing the file handle, control flow. The language all handles it for you. If Java, you achieve the same thing with two threads and about four or five hoops to jump through. This is the difference between a modern dynamic language like Python or Ruby: There are completely new ways to do things that are very powerful, simple to understand and (almost) impossible to do in Java. I spend the rest of the day with Michael Wiedeking and Neil M. Gafter, arguing about checked exceptions until I was to tired that I crept home and went to bed.
https://blog.pdark.de/2007/06/26/back-from-jazoon-first-day/?shared=email&msg=fail
CC-MAIN-2020-50
refinedweb
880
78.08
PocketUML is a portable UML tool for Visual Studio.NET. It's support C# Projects' UML generation from source code. This edition is the first milestone. It only supports some basic UML tools functions. You might think there is a big gap between PocketUML and some other UML tools (such as Rational Rose). But this is just a starting, and I will continue in it. In this article, I will introduce how to install and build it. Then, I'll discuss the project itself. I'm just a UML beginner, there might be many basic notional mistakes in the UML graphics. If you find the mistake, please mail me. Thanks! You can change it's font, color, position. But can't edit its property. Those features will be added in the future. From the beginning, I was supposed to read the file and analyse the source code to generate the UML structure by myself. It's quite a big job to do. But when I am finished reading the documents of VS.NET extension, I was impressed by those guys' work. It's definitely perfect. What I have to do is just get the object and read it's properties. So easy! Thanks them! In PocketUML project, I use the VS.NET object to get the code model and save it to XML files. Everything maybe can't be seen under the UML graphics. But everything are all written in the XML files. If you don't want to use UML tools, just want to do some other works outside the VS.NET, you can use this XML files to know everything about the project. Those files can be found in the sub-directory of the project named PokcetUML. I have done a class named VSNetCollector which are used to collect code information from the project. This class is in the namespace PocketUML.DataOperator. Also, another very huge class named CodeData to store all the project information is placed in the namespace PocketUML.Data. By using this two classes, I can collect all the information about the project to my own data struct. The class Data2XML which can help me to read and write those data to XML files is stored in namespace PocketUML.DataOperator. So the working flow is: When I create a new VS.NET Add-in project, I can find the EnvDTE._DTE object. This object is the root object of the VS.NET Object model. By using this object, I can create a toolwindow, toolbar, menubar and control all the child windows in the VS.NET IDE. Here, I'll explain the Code Model. ( Assume appObject is EnvDTE._DTE object ) EnvDTE.Solution sln = appObject.Solution; // Get all the projects and add to the solution data for( int i = 0 ; i < sln.Count; i ++ ) { // First muse ensure the project is a C# based project // check... EnvDTE.Project prj = sln.Item(i+1); // Support C# Project if (prj.FullName.EndsWith(".csproj") == true) { // ...... } } for( int i = 0 ; i < prj.ProjectItems.Count ; i ++ ) { // First must ensure the ProjectItems is a C# source code // otherwise break this circle EnvDTE.ProjectItem prjItem = prj.ProjectItems.Item(i+1); if (prjItem.Name.EndsWith(".cs") == true && prjItem.Name.IndexOf("Assembly") == -1) { } // This step is very important // If the project contain many sub-directory and store the // source in those sub-directory, I must collect it by // using this functions. this function is very similar with step 3. else if( prjItem.ProjectItems.Count > 0 ) CollectProjectSubItem( prjItem.ProjectItems, prjData ); } EnvDTE.FileCodeModel codeModel = prjItem.FileCodeModel; EnvDTE.CodeElements codeElements = codeModel.CodeElements; // code element contain all the code elements, such as class, struct, // interface, enum..... // Get All the code elements for( int i = 0; i < codeElements.Count; i ++ ) { EnvDTE.CodeElement codeElement = codeElements.Item(i+1); // collect item data CollectElementData( codeElement, codeElementsData ); } The first idea to view the UML data is to create a document window like WinForm editor or code editor. But I have searched all of the documents and samples to find how to create a document windows, the answer is I can't. Though it's might can be done by using Visual Studio Integrator Program (VSIP), but it's too expensive to use by individual. Fortunately, I noticed that it's embedded a Navigated Window Object. So, I can write a control to display the UML data in a HTML document, that's means I have to write a html file too. The PocketUML Viewer Control is an ActiveX control to show the UML Data( XML files). It's only support One function : PocketUML::View( String xmlFileName ). When I have created the control, the only thing I have to do is just to call the View function and pass the XML file's name to it. The XML file is created by PocketUML VS.NET Add-in. For more information in how to create an ActiveX control in C#, there are two very good articles to discuss it. Also, I'm one of the reader of those great works. Thanks them. UML is a very good language to manage a project.I found there a few of UML tools support VS.NET. But all are very expensive to use it. Therefore, I hope after the first 1.0 version released(I'm not sure the time), it can be truely useful for others. Also, the source code can be valuable for programmers. I need more feedback about this project. Is it useful or not? If you get any question and comment or good ideas, please give it to me. My email address is JieT@msn.
http://www.codeproject.com/Articles/3099/Pocket-UML?msg=674442
CC-MAIN-2017-17
refinedweb
928
69.28
Kernel initialization. Part 8. Scheduler initialization This is the eighth part of the Linux kernel initialization process chapter and we stopped on the setup_nr_cpu_ids function in the previous part. The main point of this part is scheduler initialization. But before we will start to learn initialization process of the scheduler, we need to do some stuff. The next step in the init/main.c is the setup_per_cpu_areas function. This function setups memory areas for the percpu variables, more about it you can read in the special part about the Per-CPU variables. After percpu areas is up and running, the next step is the smp_prepare_boot_cpu function. This function does some preparations for symmetric multiprocessing. Since this function is architecture specific, it is located in the arch/x86/include/asm/smp.h Linux kernel header file. Let's look at the definition of this function: static inline void smp_prepare_boot_cpu(void) { smp_ops.smp_prepare_boot_cpu(); } We may see here that it just calls the smp_prepare_boot_cpu callback of the smp_ops structure. If we look at the definition of instance of this structure from the arch/x86/kernel/smp.c source code file, we will see that the smp_prepare_boot_cpu expands to the call of the native_smp_prepare_boot_cpu function: struct smp_ops smp_ops = { ... ... ... smp_prepare_boot_cpu = native_smp_prepare_boot_cpu, ... ... ... } EXPORT_SYMBOL_GPL(smp_ops); The native_smp_prepare_boot_cpu function looks: void __init native_smp_prepare_boot_cpu(void) { int me = smp_processor_id(); switch_to_new_gdt(me); cpumask_set_cpu(me, cpu_callout_mask); per_cpu(cpu_state, me) = CPU_ONLINE; } and executes following things: first of all it gets the id of the current CPU (which is Bootstrap processor and its id is zero for this moment) with the smp_processor_id function. I will not explain how the smp_processor_id works, because we already saw it in the Kernel entry point part. After we've got processor id number we reload Global Descriptor Table for the given CPU with the switch_to_new_gdt function: void switch_to_new_gdt(int cpu) { struct desc_ptr gdt_descr; gdt_descr.address = (long)get_cpu_gdt_table(cpu); gdt_descr.size = GDT_SIZE - 1; load_gdt(&gdt_descr); load_percpu_segment(cpu); } The gdt_descr variable represents pointer to the GDT descriptor here (we already saw definition of a desc_ptr structure in the Early interrupt and exception handling part). We get the address and the size of the GDT descriptor for the CPU with the given id. The GDT_SIZE is 256 or: and the address of the descriptor we will get with the get_cpu_gdt_table: static inline struct desc_struct *get_cpu_gdt_table(unsigned int cpu) { return per_cpu(gdt_page, cpu).gdt; } The get_cpu_gdt_table uses per_cpu macro for getting value of a gdt_page percpu variable for the given CPU number (bootstrap processor with id - 0 in our case). You may ask the following question: so, if we can access gdt_page percpu variable, where it was defined? Actually we already saw it in this book. If you have read the first part of this chapter, you can remember that we saw definition of the gdt_page in the arch/x86/kernel/head_64.S: early_gdt_descr: .word GDT_ENTRIES*8-1 early_gdt_descr_base: .quad INIT_PER_CPU_VAR(gdt_page) and if we will look on the linker file we can see that it locates after the __per_cpu_load symbol: INIT_PER_CPU(gdt_page);INIT_PER_CPU(gdt_page); and filled gdt_page in the arch/x86/kernel/cpu/common.c: DEFINE_PER_CPU_PAGE_ALIGNED(struct gdt_page, gdt_page) = { .gdt = { ), ... ... ... more about percpu variables you can read in the Per-CPU variables part. As we got address and size of the GDT descriptor we reload GDT with the load_gdt which just execute lgdt instruct and load percpu_segment with the following function: void load_percpu_segment(int cpu) { loadsegment(gs, 0); wrmsrl(MSR_GS_BASE, (unsigned long)per_cpu(irq_stack_union.gs_base, cpu)); load_stack_canary_segment(); } The base address of the percpu area must contain gs register (or fs register for x86), so we are using loadsegment macro and pass gs. In the next step we writes the base address if the IRQ stack and setup stack canary (this is only for x86_32). After we load new GDT, we fill cpu_callout_mask bitmap with the current cpu and set cpu state as online with the setting cpu_state percpu variable for the current processor - CPU_ONLINE: cpumask_set_cpu(me, cpu_callout_mask); per_cpu(cpu_state, me) = CPU_ONLINE; So, what is cpu_callout_mask bitmap... As we initialized bootstrap processor (processor which is booted the first on x86) the other processors in a multiprocessor system are known as secondary processors. Linux kernel uses following two bitmasks: cpu_callout_mask cpu_callin_mask After bootstrap processor initialized, it updates the cpu_callout_mask to indicate which secondary processor can be initialized next. All other or secondary processors can do some initialization stuff before and check the cpu_callout_mask on the boostrap processor bit. Only after the bootstrap processor filled the cpu_callout_mask with this secondary processor, it will continue the rest of its initialization. After that the certain processor finish its initialization process, the processor sets bit in the cpu_callin_mask. Once the bootstrap processor finds the bit in the cpu_callin_mask for the current secondary processor, this processor repeats the same procedure for initialization of one of the remaining secondary processors. In a short words it works as i described, but we will see more details in the chapter about SMP. That's all. We did all SMP boot preparation. Build zonelists In the next step we can see the call of the build_all_zonelists function. This function sets up the order of zones that allocations are preferred from. What are zones and what's order we will understand soon. For the start let's see how linux kernel considers physical memory. Physical memory is split into banks which are called - nodes. If you has no hardware support for NUMA, you will see only one node: $ cat /sys/devices/system/node/node0/numastat numa_hit 72452442 numa_miss 0 numa_foreign 0 interleave_hit 12925 local_node 72452442 other_node 0 Every node is presented by the struct pglist_data in the linux kernel. Each node is divided into a number of special blocks which are called - zones. Every zone is presented by the zone struct in the linux kernel and has one of the type: ZONE_DMA- 0-16M; ZONE_DMA32- used for 32 bit devices that can only do DMA areas below 4G; ZONE_NORMAL- all RAM from the 4GB on the x86_64; ZONE_HIGHMEM- absent on the x86_64; ZONE_MOVABLE- zone which contains movable pages. which are presented by the zone_type enum. We can get information about zones with the: $ cat /proc/zoneinfo Node 0, zone DMA pages free 3975 min 3 low 3 ... ... Node 0, zone DMA32 pages free 694163 min 875 low 1093 ... ... Node 0, zone Normal pages free 2529995 min 3146 low 3932 ... ... As I wrote above all nodes are described with the pglist_data or pg_data_t structure in memory. This structure is defined in the include/linux/mmzone.h. The build_all_zonelists function from the mm/page_alloc.c constructs an ordered zonelist (of different zones DMA, DMA32, NORMAL, HIGH_MEMORY, MOVABLE) which specifies the zones/nodes to visit when a selected zone or node cannot satisfy the allocation request. That's all. More about NUMA and multiprocessor systems will be in the special part. The rest of the stuff before scheduler initialization Before we will start to dive into linux kernel scheduler initialization process we must do a couple of things. The first thing is the page_alloc_init function from the mm/page_alloc.c. This function looks pretty easy: void __init page_alloc_init(void) { int ret; ret = cpuhp_setup_state_nocalls(CPUHP_PAGE_ALLOC_DEAD, "mm/page_alloc:dead", NULL, page_alloc_cpu_dead); WARN_ON(ret < 0); } It setups setup the startup and teardown callbacks (second and third parameters) for the CPUHP_PAGE_ALLOC_DEAD cpu hotplug state. Of course the implementation of this function depends on the CONFIG_HOTPLUG_CPU kernel configuration option and if this option is set, such callbacks will be set for all cpu(s) in the system depends on their hotplug states. hotplug mechanism is a big theme and it will not be described in this book. After this function we can see the kernel command line in the initialization output: And a couple of functions such as parse_early_param and parse_args which handles linux kernel command line. You may remember that we already saw the call of the parse_early_param function in the sixth part of the kernel initialization chapter, so why we call it again? Answer is simple: we call this function in the architecture-specific code ( x86_64 in our case), but not all architecture calls this function. And we need to call the second function parse_args to parse and handle non-early command line arguments. In the next step we can see the call of the jump_label_init from the kernel/jump_label.c. and initializes jump label. After this we can see the call of the setup_log_buf function which setups the printk log buffer. We already saw this function in the seventh part of the linux kernel initialization process chapter. PID hash initialization The next is pidhash_init function. As you know each process has assigned a unique number which called - process identification number or PID. Each process generated with fork or clone is automatically assigned a new unique PID value by the kernel. The management of PIDs centered around the two special data structures: struct pid and struct upid. First structure represents information about a PID in the kernel. The second structure represents the information that is visible in a specific namespace. All PID instances stored in the special hash table: static struct hlist_head *pid_hash; This hash table is used to find the pid instance that belongs to a numeric PID value. So, pidhash_init initializes this hash table. In the start of the pidhash_init function we can see the call of the alloc_large_system_hash: pid_hash = alloc_large_system_hash("PID", sizeof(*pid_hash), 0, 18, HASH_EARLY | HASH_SMALL, &pidhash_shift, NULL, 0, 4096); The number of elements of the pid_hash depends on the RAM configuration, but it can be between 2^4 and 2^12. The pidhash_init computes the size and allocates the required storage (which is hlist in our case - the same as doubly linked list, but contains one pointer instead on the struct hlist_head]. The alloc_large_system_hash function allocates a large system hash table with memblock_virt_alloc_nopanic if we pass HASH_EARLY flag (as it in our case) or with __vmalloc if we did no pass this flag. The result we can see in the dmesg output: $ dmesg | grep hash [ 0.000000] PID hash table entries: 4096 (order: 3, 32768 bytes) ... ... ... That's all. The rest of the stuff before scheduler initialization is the following functions: vfs_caches_init_early does early initialization of the virtual file system (more about it will be in the chapter which will describe virtual file system), sort_main_extable sorts the kernel's built-in exception table entries which are between __start___ex_table and __stop___ex_table, and trap_init initializes trap handlers (more about last two function we will know in the separate chapter about interrupts). The last step before the scheduler initialization is initialization of the memory manager with the mm_init function from the init/main.c. As we can see, the mm_init function initializes different parts of the linux kernel memory manager: page_ext_init_flatmem(); mem_init(); kmem_cache_init(); percpu_init_late(); pgtable_init(); vmalloc_init(); The first is page_ext_init_flatmem which depends on the CONFIG_SPARSEMEM kernel configuration option and initializes extended data per page handling. The mem_init releases all bootmem, the kmem_cache_init initializes kernel cache, the percpu_init_late - replaces percpu chunks with those allocated by slub, the pgtable_init - initializes the page->ptl kernel cache, the vmalloc_init - initializes vmalloc. Please, NOTE that we will not dive into details about all of these functions and concepts, but we will see all of they it in the Linux kernel memory manager chapter. That's all. Now we can look on the scheduler. Scheduler initialization And now we come to the main purpose of this part - initialization of the task scheduler. I want to say again as I already did it many times, you will not see the full explanation of the scheduler here, there will be special separate chapter about this. Here will be described first initial scheduler mechanisms which are initialized first of all. So let's start. Our current point is the sched_init function from the kernel/sched/core.c kernel source code file and as we can understand from the function's name, it initializes scheduler. Let's start to dive into this function and try to understand how the scheduler is initialized. At the start of the sched_init function we can see the following call: sched_clock_init(); The sched_clock_init is pretty easy function and as we may see it just sets sched_clock_init variable: void sched_clock_init(void) { sched_clock_running = 1; } that will be used later. At the next step is initialization of the array of waitqueues: for (i = 0; i < WAIT_TABLE_SIZE; i++) init_waitqueue_head(bit_wait_table + i); where bit_wait_table is defined as: static wait_queue_head_t bit_wait_table[WAIT_TABLE_SIZE] __cacheline_aligned; The bit_wait_table is array of wait queues that will be used for wait/wake up of processes depends on the value of a designated bit. The next step after initialization of waitqueues array is calculating size of memory to allocate for the root_task_group. As we may see this size depends on two following kernel configuration options: 2 * nr_cpu_ids * sizeof(void **); alloc_size += 2 * nr_cpu_ids * sizeof(void **);alloc_size += CONFIG_FAIR_GROUP_SCHED; CONFIG_RT_GROUP_SCHED. Both of these options provide two different planning models. As we can read from the documentation, the current scheduler - CFS or Completely Fair Scheduler use a simple concept. It models process scheduling as if the system has an ideal multitasking processor where each process would receive 1/n processor time, where n is the number of the runnable processes. The scheduler uses the special set of rules. These rules determine when and how to select a new process to run and they are called scheduling policy. The Completely Fair Scheduler supports following normal or in other words non-real-time scheduling policies: SCHED_NORMAL; SCHED_BATCH; SCHED_IDLE. The SCHED_NORMAL is used for the most normal applications, the amount of cpu each process consumes is mostly determined by the nice value, the SCHED_BATCH used for the 100% non-interactive tasks and the SCHED_IDLE runs tasks only when the processor has no task to run besides this task. The real-time policies are also supported for the time-critical applications: SCHED_FIFO and SCHED_RR. If you've read something about the Linux kernel scheduler, you can know that it is modular. It means that it supports different algorithms to schedule different types of processes. Usually this modularity is called scheduler classes. These modules encapsulate scheduling policy details and are handled by the scheduler core without knowing too much about them. Now let's get back to the our code and look on the two configuration options: CONFIG_FAIR_GROUP_SCHED and CONFIG_RT_GROUP_SCHED. The least unit which scheduler operates is an individual task or thread. But a process is not only one type of entities of which the scheduler may operate. Both of these options provides support for group scheduling. The first one option provides support for group scheduling with completely fair scheduler policies and the second with real-time policies respectively. In simple words, group scheduling is a feature that allows us to schedule a set of tasks as if a single task. For example, if you create a group with two tasks on the group, then this group is just like one normal task, from the kernel perspective. After a group is scheduled, the scheduler will pick a task from this group and it will be scheduled inside the group. So, such mechanism allows us to build hierarchies and manage their resources. Although a minimal unit of scheduling is a process, the Linux kernel scheduler does not use task_struct structure under the hood. There is special sched_entity structure that is used by the Linux kernel scheduler as scheduling unit. So, the current goal is to calculate a space to allocate for a sched_entity(ies) of the root task group and we do it two times with: 2 * nr_cpu_ids * sizeof(void **); alloc_size += 2 * nr_cpu_ids * sizeof(void **);alloc_size += The first is for case when scheduling of task groups is enabled with completely fair scheduler and the second is for the same purpose by in a case of real-time scheduler. So here we calculate size which is equal to size of a pointer multiplied on amount of CPUs in the system and multiplied to 2. We need to multiply this on 2 as we will need to allocate a space for two things: - scheduler entity structure; runqueue. After we have calculated size, we allocate a space with the kzalloc function and set pointers of sched_entity and runquques there: ptr = (unsigned long)kzalloc(alloc_size, GFP_NOWAIT); root_task_group.se = (struct sched_entity **)ptr; ptr += nr_cpu_ids * sizeof(void **); root_task_group.cfs_rq = (struct cfs_rq **)ptr; ptr += nr_cpu_ids * sizeof(void **); root_task_group.rt_se = (struct sched_rt_entity **)ptr; ptr += nr_cpu_ids * sizeof(void **); root_task_group.rt_rq = (struct rt_rq **)ptr; ptr += nr_cpu_ids * sizeof(void **); As I already mentioned, the Linux group scheduling mechanism allows to specify a hierarchy. The root of such hierarchies is the root_runqueuetask_group task group structure. This structure contains many fields, but we are interested in se, rt_se, cfs_rq and rt_rq for this moment: The first two are instances of sched_entity structure. It is defined in the include/linux/sched.h kernel header filed and used by the scheduler as a unit of scheduling. struct task_group { ... ... struct sched_entity **se; struct cfs_rq **cfs_rq; ... ... } The cfs_rq and rt_rq present run queues. A run queue is a special per-cpu structure that is used by the Linux kernel scheduler to store active threads or in other words set of threads which potentially will be picked up by the scheduler to run. The space is allocated and the next step is to initialize a bandwidth of CPU for real-time and deadline tasks: init_rt_bandwidth(&def_rt_bandwidth, global_rt_period(), global_rt_runtime()); init_dl_bandwidth(&def_dl_bandwidth, global_rt_period(), global_rt_runtime()); All groups have to be able to rely on the amount of CPU time. The two following structures: def_rt_bandwidth and def_dl_bandwidth represent default values of bandwidths for real-time and deadline tasks. We will not look at definition of these structures as it is not so important for now, but we are interested in two following values: sched_rt_period_us; sched_rt_runtime_us. The first represents a period and the second represents quantum that is allocated for real-time tasks during sched_rt_period_us. You may see global values of these parameters in the: $ cat /proc/sys/kernel/sched_rt_period_us 1000000 $ cat /proc/sys/kernel/sched_rt_runtime_us 950000 The values related to a group can be configured in <cgroup>/cpu.rt_period_us and <cgroup>/cpu.rt_runtime_us. Due no one filesystem is not mounted yet, the def_rt_bandwidth and the def_dl_bandwidth will be initialzed with default values which will be retuned by the global_rt_period and global_rt_runtime functions. That's all with the bandwiths of real-time and deadline tasks and in the next step, depends on enable of SMP, we make initialization of the root domain: init_defrootdomain();init_defrootdomain(); The real-time scheduler requires global resources to make scheduling decision. But unfortunately scalability bottlenecks appear as the number of CPUs increase. The concept of root domains was introduced for improving scalability and avoid such bottlenecks. Instead of bypassing over all run queues, the scheduler gets information about a CPU where/from to push/pull a real-time task from the root_domain structure. This structure is defined in the kernel/sched/sched.h kernel header file and just keeps track of CPUs that can be used to push or pull a process. After root domain initialization, we make initialization of the bandwidth for the real-time tasks of the root task group as we did the same above: init_rt_bandwidth(&root_task_group.rt_bandwidth, global_rt_period(), global_rt_runtime());init_rt_bandwidth(&root_task_group.rt_bandwidth, global_rt_period(), global_rt_runtime()); with the same default values. In the next step, depends on the CONFIG_CGROUP_SCHED kernel configuration option we allocate slab cache for task_group(s) and initialize the siblings and children lists of the root task group. As we can read from the documentation, the CONFIG_CGROUP_SCHED is: This option allows you to create arbitrary task groups using the "cgroup" pseudo filesystem and control the cpu bandwidth allocated to each such task group. As we finished with the lists initialization, we can see the call of the autogroup_init function: list, &task_groups); INIT_LIST_HEAD(&root_task_group.children); INIT_LIST_HEAD(&root_task_group.siblings); autogroup_init(&init_task);list_add(&root_task_group. which initializes automatic process group scheduling. The autogroup feature is about automatic creation and population of a new task group during creation of a new session via setsid call. After this we are going through the all possible CPUs (you can remember that possible CPUs are stored in the cpu_possible_mask bitmap that can ever be available in the system) and initialize a runqueue for each possible cpu: for_each_possible_cpu(i) { struct rq *rq; ... ... ... The rq structure in the Linux kernel is defined in the kernel/sched/sched.h. As I already mentioned this above, a run queue is a fundamental data structure in a scheduling process. The scheduler uses it to determine who will be runned next. As you may see, this structure has many different fields and we will not cover all of them here, but we will look on them when they will be directly used. After initialization of per-cpu run queues with default values, we need to setup load weight of the first task in the system: set_load_weight(&init_task); First of all let's try to understand what is it load weight of a process. If you will look at the definition of the sched_entity structure, you will see that it starts from the load field: struct sched_entity { struct load_weight load; ... ... ... } represented by the load_weight structure which just contains two fields that represent actual load weight of a scheduler entity and its invariant value: struct load_weight { unsigned long weight; u32 inv_weight; }; You already may know that each process in the system has priority. The higher priority allows to get more time to run. A load weight of a process is a relation between priority of this process and timeslices of this process. Each process has three following fields related to priority: struct task_struct { ... ... ... int prio; int static_prio; int normal_prio; ... ... ... } The first one is dynamic priority which can't be changed during lifetime of a process based on its static priority and interactivity of the process. The static_prio contains initial priority most likely well-known to you nice value. This value does not changed by the kernel if a user will not change it. The last one is normal_priority based on the value of the static_prio too, but also it depends on the scheduling policy of a process. So the main goal of the set_load_weight function is to initialze load_weight fields for the init task: static void set_load_weight(struct task_struct *p) { int prio = p->static_prio - MAX_RT_PRIO; struct load_weight *load = &p->se.load; if (idle_policy(p->policy)) { load->weight = scale_load(WEIGHT_IDLEPRIO); load->inv_weight = WMULT_IDLEPRIO; return; } load->weight = scale_load(sched_prio_to_weight[prio]); load->inv_weight = sched_prio_to_wmult[prio]; } As you may see we calculate initial prio from the initial value of the static_prio of the init task and use it as index of sched_prio_to_weight and sched_prio_to_wmult arrays to set weight and inv_weight values. These two arrays contain a load weight depends on priority value. In a case of when a process is idle process, we set minimal load weight. For this moment we came to the end of initialization process of the Linux kernel scheduler. The last steps are: to make current process (it will be the first init process) idle that will be runned when a cpu has no other process to run. Calculating next time period of the next calculation of CPU load and initialization of the fair class: __init void init_sched_fair_class(void) { open_softirq(SCHED_SOFTIRQ, run_rebalance_domains); } Here we register a soft irq that will call the run_rebalance_domains handler. After the SCHED_SOFTIRQ will be triggered, the run_rebalance will be called to rebalance a run queue on the current CPU. The last two steps of the sched_init function is to initialization of scheduler statistics and setting scheeduler_running variable: scheduler_running = 1; That's all. Linux kernel scheduler is initialized. Of course, we have skipped many different details and explanations here, because we need to know and understand how different concepts (like process and process groups, runqueue, rcu, etc.) works in the linux kernel , but we took a short look on the scheduler initialization process. We will look all other details in the separate part which will be fully dedicated to the scheduler. Conclusion It is the end of the eighth part about the linux kernel initialization process. In this part, we looked on the initialization process of the scheduler and we will continue in the next part to dive in the linux kernel initialization process and will see initialization of the RCU and many other initialization stuff in the next part. If you have any questions or suggestions write me a comment or ping me at twitter. Please note that English is not my first language, And I am really sorry for any inconvenience. If you find any mistakes please send me PR to linux-insides.
https://0xax.gitbooks.io/linux-insides/content/Initialization/linux-initialization-8.html
CC-MAIN-2019-43
refinedweb
4,085
59.64
Implementation of basic functions of a binary Merkle tree. This module handles binary trees like this (v = value, n = node, r = nonce): n0 | --------- | | n1 n2 | | |-----| | v0 r0 | --------- | | n3 n4 | | |-----| | v1 r1 r2 A user defines an array of values where these values are hashed into an imprint, which is a Merkle root tree hash. A user can expose selected values to a third-party by providing the evidence file which includes a recipe of values and nodes. This file holds enough information for a third-party to recreate the imprint. import { sha } from '@0xcert/utils'; import { Merkle } from '@0xcert/merkle'; const merkle = new Merkle({ hasher: (v, p, k) => sha(256, v), noncer: (p) => Math.random().toString(36).substring(7), }); const values = ['A', 'B', 'C', 'D', 'E']; const expose = [2, 3]; const fullRecipe = await merkle.notarize(values); const minRecipe = await merkle.disclose(fullRecipe, expose); const imprint = await merkle.imprint(minRecipe);.
https://preview.npmjs.com/package/@0xcert/merkle
CC-MAIN-2021-25
refinedweb
149
54.63
Greetings good folk of Spiceworld I was wondering if any of thy weary and overworked inhabitants can assist me with information of the general kind. The network admin before me made the unfortunate choice of hosting our public DNS in house. Now due to a series of unfortunate events we are migrating from one of our ISP's data centers to a new one and the the IP addresses on our Public facing DNS servers needs to change. Does anyone know what the impact of this will be, how long an outage we are looking at for DNS to replicate across yonder planet and if we need to inform our domain registrar? Many thanks and jolly good day. 7 Replies Oct 10, 2013 at 12:59 UTC What records are you looking to host outside? If it is different than your local DNS namespace then there should not be too many issues. If it is the same namespace you will probably just have to create some local records to point to their new name server. Replication generally doesn't take long at all. Do the cutover on a weekend and test everything. Good idea to document well before doing anything so you can test thoroughly. Oct 10, 2013 at 13:00 UTC The idea would be to setup the new DNS server at the new IP. Then make the change for the world at the registrar. It should only take a day before most of the world repopulates, During the one day change, both DNS servers would be up. Then after the day (and TESTING) then turn off service at old location/IP Oct 10, 2013 at 13:10 UTC This is a good opportunity to offload your external DNS. You could move your DNS to an external provider (GoDaddy, or whatever your preferred is) and supply whatever external DNS records you need there. With the current DNS, leave it in-place for the in-house services/clients and turn off the inbound DNS port forwarding to it. This is how most companies have their DNS and would give you the flexibility to re-design it without any disruption. Oct 10, 2013 at 13:35 UTC I'm with Ron - $20/year to easyDNS/DNSmadeeasy etc. and all this just goes away. Oct 10, 2013 at 13:51 UTC setup the new DNS with a decent off site DNS (ie no godaddy etc) duplicate all the records etc etc. Drop the main DNS ttl down to an hour or so... then it's just a matter of updating the domain record to point at the new DNS servers - so yes you WILL have to make the change at the domain registrar. zero downtime. Oct 10, 2013 at 14:49 UTC +1 to what Martin said. How many DNS servers do you have? Bring the TTL down to an hour. I would move one to the other data center and leave it there until it hosts have enough time to learn its location from the others. Then move the last of them over and re-IP them. Oct 10, 2013 at 17:20 UTC The key to moving DNS servers seamlessley lies in the Time To Live value set on resource records. Any other server that wants to look up addresses on your domain will use your DNS servers to get the record(s), then will cache it. The resolving DNS server and the client both cache the records. I have my TTL's at 1 week. If you change your DNS server address, any new queries will be resolved from the new server, but cached records, in my case, which point to the old server, can last around the net for the week. What I do is this: 1. A week before I want to move over, I wind down the TTL from 1 week to 1 day. A day before the move, I wind it down to 1 hour., On the day of the move, and 2 hours before the mover, I wind down the TTL to as low as the DNS server will allow. THEN at the appointed hour, I move the DNS across to the new server, and turn the ttl back up to 1 week. This keeps the time that other servers will cache the 'wrong' records to a minimum and will not increase dns traffic too much. I've done this a couple of times as I moved ISPs. The first time I forgot to wind down the TTLs, and for just about 1 week all traffic went to thold address, then almost exactally 7 days after the move, the new addresses kicked in. As for using DnsMadeEasy - I agree. Ive used them for several years and they have not skipped a beat in all that time. The cost of their service is far, far, far less than the cost to run your own servers. I'd bet their fees are less, over a year, than the cost of the electricity to cool and run your on-prem server. - and that's before accounting for the costs of the bandwidth involved. I love DNSMadeEasy. This discussion has been inactive for over a year. You may get a better answer to your question by starting a new discussion.
https://community.spiceworks.com/topic/393077-changing-the-ip-addresses-of-public-facing-dns-servers
CC-MAIN-2018-43
refinedweb
882
79.09
I never use clang. And I accidentally discovered that this piece of code: #include <iostream> void функция(int переменная) { std::cout << переменная << std::endl; } int main() { int русская_переменная = 0; функция(русская_переменная); } It's not so much an extension as it is Clang's interpretation of the Multibyte characters part of the standard. Clang supports UTF-8 source code files. As to why, I guess "why not?" is the only real answer; it seems useful and reasonable to me to support a larger character set. Here are the relevant parts of the standard (C11 draft): 5.2.1 Character. The representation of each member of the source and execution basic character sets shall fit in a byte. In both the source and execution basic character sets, the value of each character after 0. 4 A letter is an uppercase letter or a lowercase letter as defined above; in this International Standard the term does not include other characters that are letters in other alphabets. 5 The universal character name construct provides a way to name other characters. And also: basic character set shall be present and each character shall be encoded as a single byte. — The presence, meaning, and representation of any additional members is locale- specific. —. Such a byte shall not occur as part of any other multibyte character. 2 For source files, the following shall hold: — An identifier, comment, string literal, character constant, or header name shall begin and end in the initial shift state. — An identifier, comment, string literal, character constant, or header name shall consist of a sequence of valid multibyte characters.
https://codedump.io/share/8oeO4YI35leC/1/identifier-character-set-clang
CC-MAIN-2016-44
refinedweb
265
54.12
Java, J2EE & SOA Certification Training - 35k Enrolled Learners - Weekend - Live Class Whenever you are building a server application, the demand for creating a new thread arises every time a request arrives. This new request is the new thread that is created. This tutorial would be circulating around the thread pool in Java, depicting its advantages and disadvantages followed by the definition! The topics discussed in this article are: As the name suggests, the thread pool in Java is actually a pool of Threads. In a simple sense, it contains a group of worker threads that are waiting for the job to be granted. They are reused in the whole process. In a Thread Pool, a group of fixed size threads is created. Whenever a task has to be granted, one of the threads is pulled out and assigned that task by the service provider, as soon as the job is completed the thread is returned back to the thread pool. Thread pool is preferably used because active threads consume system resources, when is JVM creates too many threads at the same time, the system could run out of memory. Hence the number of threads to be created has to be limited. Therefore the concept of the thread pool is preferred! Let us move towards our next segment which states the risks related to the thread pool in Java. There are a few risks while you are dealing with the thread pool, like; Now, let us move towards the advantages of the thread pool. Some of the advantages of using thread pool when programming in Java are: Now, let us check out the disadvantages of the thread pool. Some of the disadvantages of using thread pool when programming are: Now let me introduce to the implementation part of the thread pool. Here it goes! Implementation of a Thread Pool Check out the code below to understand the concept of thread pool in Java Code: package MyPackage; import java.util.concurrent.LinkedBlockingQueue; public class ThreadPool { private final int nThreads; private final PoolWorker[] threads; private final LinkedBlockingQueue<Runnable> queue; public ThreadPool(int Threads) { this.nThreads = Threads; queue = new LinkedBlockingQueue<Runnable>(); threads = new PoolWorker[Threads]; for (int i = 0; i < nThreads; i++) { threads[i] = new PoolWorker(); threads[i].start(); } } public void execute(Runnable task) { synchronized (queue) { queue.add(task); queue.notify(); } } private class PoolWorker extends Thread { public void run() { Runnable task; while (true) { synchronized (queue) { while (queue.isEmpty()) { try { queue.wait(); } catch (InterruptedException e) { System.out.println("An error occurred while queue is waiting: " + e.getMessage()); } } task = (Runnable)queue.poll(); } // If we don't catch RuntimeException, // the pool could leak threads try { task.run(); } catch (RuntimeException e) { System.out.println("Thread pool is interrupted due to an issue: " + e.getMessage()); } } } } } This brings us to the end of this ‘Thread Pool in Java’ article. I have covered one of the most fundamental and important topics of Java. I hope you are clear with all that has been shared with you in this article. Make sure you practice as much as possible and revert your experience. ‘Thread Pool in Java’ article and we will get back to you as soon as possible.
https://www.edureka.co/blog/thread-pool-in-java/
CC-MAIN-2020-05
refinedweb
526
64.61
Opened 16 years ago Last modified 21 months ago #601 defect new ThrottlingFactory doesn't throttle static web resource Description Attachments (1) Change History (10) comment:1 Changed 16 years ago by comment:2 Changed 14 years ago by Investigating. The addition of __getattr__ on ProtocolWrapper <a href="">in rev 9767</a> is the cause for the traceback -- ThrottlingProtocol and its transport end up having a namespace collision around "producer." haven't decided if this is also the reason for the failure to limit. Unfortunately the ThrottlingTestCase tests are marked as "skip." comment:3 Changed 14 years ago by <keturn> brilliant! ThrottleStuff doesn't work on web.static because web.static..pauseProducing is defined as "pass" <foom> keturn: as it should be. <foom> keturn: static.File is a non-streaming-producer, which means resumeProducing should be called once every time data is wanted so policies.ThrottlingProtocol doesn't support non-streaming producers. It ignores the "streaming" argument to registerProducer and doesn't change its behaviour accordingly. so either fix, or have it raise exceptions when it gets non-streaming producers registered to it. comment:4 Changed 12 years ago by comment:5 Changed 9 years ago by Changed 8 years ago by comment:6 Changed 8 years ago by I have added a patch that'll fix the problem, but as I am uncertain this is a good way to solve it, I would like to request a preliminary review of my method of solving the problem. A big problem with the ThrottlingFactory is that any producer can run rampant for up to a second before it is stopped. IF the producer is done and the ThrottlingFactory attempts to pause, it runs into a problem where self.producer is None (I am not sure why that happens). As noted elsewhere, the way the ThrottlingFactory limits the traffic is bad, but with this patch only the way to do the actual throttling needs a makeover. What I want to know is if this is an acceptable way to do the actual limiting. comment:7 Changed 8 years ago by - I am skeptical that this needs to be solved by changing twisted.internet.abstract. If the problem is that "policies.ThrottlingProtocol doesn't support non-streaming producers", the solution would be to add that support. twisted.protocols.tls._PullToPushand related code is a way to do that. - In the unlikely case that it does, lack of parenthesis means I have to remember precedence rules for "and" and "or". - No tests. comment:8 Changed 7 years ago by Hm. That review seems rather snippy. My apologies, I guess I was having a bad idea. I appreciate someone trying to fix this! Like I said, though, using something like the _PullToPush class is probably the way to go. comment:9 Changed 21 months ago by This may have been fixed, as HTTPChannel now internally adapts pull producers to push producers.
https://twistedmatrix.com/trac/ticket/601
CC-MAIN-2020-16
refinedweb
486
56.25
. Why do we need it? Let’s say that we decide to create a class that could store your height in centimeters. Internally, we would like the class to implement a method to convert centimeters into inches. This is a pretty straightforward case and we would do something like this: class PeopleHeight: def __init__(self, height = 150): self.height = height def convert_to_inches(self): return (self.height * 0.3937) As we can see, we have a class variable named “height” and we have a method that converts it to inches. We can now make objects out of this class and manipulate the attribute “height” as we like. Just go into the Python shell and do the following (you can go into the Python shell by typing “python” from your terminal): Create a new object: >>> person = PeopleHeight() Set the height attribute: >>> person.height = 182 Get the value of the height attribute >>> person.height 182 Convert the height to inches >>> person.convert_to_inches() 71.6534 An interesting thing to note here is that whenever we assign or retrieve any object attribute, like “height” in our case, Python searches it in the object’s __dict__ dictionary. >>> person.__dict__ {'height': 182} Internally, person.height becomes person.__dict__[‘height’]. So far, so good? We don’t really see why we would need “property” just yet, right? Okay, let’s move along then. Let’s say that other people start using this class in their programs. They just inherit your class, create a child class and do all sorts of things. Whenever you are working in a team, people like to create class hierarchies and build software systems. Alright, so coming back to our case, other programmers inherited your class and did all kinds of assignments to the object. This seems fine up until now. Now that things are getting serious, somebody comes and suggests that we need to make the parent class robust, and that the value of “height” cannot go below 0. This is not an unfair demand, given that people cannot have negative height. So now, we have to implement this constraint in our class. So we can just update the class and release a new version. Where’s the encapsulation? Object oriented programmers might cringe at the thought of providing direct access to class variables. So a good solution to the above problem will be to hide the attribute i.e. make it private, and define new getter and setter interfaces to manipulate it. This can be done as follows. class PeopleHeight: def __init__(self, height = 150): self.set_height(height) def convert_to_inches(self): return (self.get_height() * 0.3937) # new getter method def get_height(self): return self._height # new setter method def set_height(self, value): if value < 0: raise ValueError("Height cannot be negative") self._height = value As we can see here, the new methods get_height() and set_height() are defined and height has been replaced with _height. An underscore (_) at the beginning is used to denote private variables in Python. Technically speaking, there is no concept of “private variables” in Python. It’s just a convention to use underscore to denote that it’s private. We can still access it and modify it from outside. It works more on an honor system than anything else! >>> p = PeopleHeight(-80) Traceback (most recent call last): ... ValueError: Height cannot be negative >>> p = PeopleHeight(164) >>> c.get_height() 164 >>> c.set_height(173) >>> c.set_height(-159) Traceback (most recent call last): ... ValueError: Height cannot be negative This update successfully implemented the new restriction. Although we are no longer allowed to explicitly set the height below 0, we can still do this: >>> p._height = -147 >>> c.get_height() -147 We accessed the private variable and changed its value to a negative number. This is what we were talking about earlier. Python doesn’t impose that restriction. Wait a minute, doesn’t that defeat the whole purpose? Well, be that as it may, it’s not of great concern to us at the moment. We will cross that bridge when we get to it! The bigger problem at hand here that the above update affects all those programmers who used this as their base class to build their classes. Now, they have to modify their code from obj.height to obj.get_height() and all assignments like obj.height = val to obj.set_height(val). This kind of refactoring seems like a lot of work, especially when you have tens of thousands of lines of code! So basically, what I’m getting at is that our new update is not backward compatible. This is where the concept of property comes to our rescue. The properties of Property Let’s get Pythonic from here on. A good way to deal with the above problem is to use property. Here is how we can do it: class PeopleHeight: def __init__(self, height = 150): self.height = height def convert_to_inches(self): return (self.height * 0.3937) def get_height(self): print("Inside the getter method") return self._height def set_height(self, value): if value < 0: raise ValueError("Height cannot be negative") print("Inside the setter method") self._height = value height = property(get_height, set_height) The print() statements inside get_height() and set_height() help us observe what methods are being executed. The last line of the code makes a property object “height”. Simply put, property attaches some code (get_height and set_height) to the member attribute access (height). Any code that retrieves the value of height will automatically call get_height() instead of a dictionary (__dict__) look-up. Similarly, any code that assigns a value to height will automatically call set_height(). This is a cool feature in Python. >>> p = PeopleHeight() Inside the setter method We can see above that set_height() was called even when we created an object. Can you guess why? The reason is that when an object is created, __init__() method gets called. This method has the line self.height = height. This assignment automatically called set_height(). Isn’t that nice? >>> p.height Inside the getter method 150 Similarly, any access like p.height automatically calls get_height(). This is what property does. Here are a few more examples. >>> p.height = 177 Inside the setter method >>> p.convert_to_inches() Inside the getter method 69.6849 By using property, we modified our class and implemented the value constraint without needing any changes to the client code. Thus our implementation was backward compatible and everybody is happy. Finally, note that the actual height value is stored in the private variable _height. The attribute height is a property object which provides interface to this private variable. Is there more to Property? In Python, property() is a built-in function that creates and returns a property object. So go ahead and type the following in the Python shell to see the property object: >>> property() <property object at 0x107ad2890> The signature of this function is given below: property(fget=None, fset=None, fdel=None, doc=None) where, fget is a function to get the value of the attribute, fset is a function to set the value of the attribute, fdel is a function to delete the attribute and doc is a string (like a comment). As seen from the implementation, these function arguments are optional. A property object has three methods, getter(), setter(), and delete() to specify fget, fset and fdel at a later point. Consider the following line: height = property(get_height, set_height) This could have been broken down as: height = property() height = height.getter(get_height) height = height.setter(set_height) The above two snippets of codes are equivalent. If you are familiar with decorators in Python, you can see that the above construct can be implemented as decorators. Wouldn’t it be nice if we don’t have to define names like get_height and set_height? I mean, they are unnecessary and they pollute the class namespace. So to address this issue, we reuse the name “height” while defining our getter and setter functions. This is how it can be done. class PeopleHeight: def __init__(self, height = 150): self._height = height def convert_to_inches(self): return (self.height * 0.3937) @property def height(self): print("Getting the value of height") return self._height @height.setter def height(self, value): if value < 0: raise ValueError("Height cannot be negative") print("Setting the value of height") self._height = value The above implementation is the recommended way to make properties. It’s simple too! You will most likely encounter these types of constructs when looking for property in Python. ——————————————————————————————————–– Honestly I couldn’t find a better explanation than this. Thanks 🙂 I’ve been searching for quite a while, this is the best tutorial on python’s Property. Thank you. Wow… I have read roughly a billion explanations on properties from what is available using google, and none of them explained the subject very well… At all. Just setters this, getters that. Don’t use them, blah blah blah. I was starting to think that maybe I was not meant to understand them, but I was able to follow your article with no trouble at all. and now I fully comprehend them. Thanks, I will be sure to check out your other articles, I hope to find some other useful stuff I may or may not be struggling with! This was an amazing explanation. I couldn’t wrap my head around properties until I read this. Thank you so much! Thank you for this informative read, I have shared it on Facebook.
https://prateekvjoshi.com/2014/09/13/understanding-python-property/
CC-MAIN-2020-40
refinedweb
1,565
67.65
Configuring DNS on SLES 9 This chapter covers the following requirements for Novell's Certified Linux Engineer (CLE) 9 certification: - Configure a DNS server using BIND. On a modern IP-based network, users take for granted the fact that they can access local network and Internet resources using easy-to-remember domain names instead of IP addresses. I doubt that a single work day goes by that the typical employee doesn't access some website with a URL that uses a domain name, such as. As a Linux system administrator, it's your job to know how to provide users with this functionality. In this chapter, we're going to do just that. We're going to discuss how to implement domain name service (DNS) on your SLES 9 server. Let's begin! The Need for DNS TEST OBJECTIVE COVERED: - Configure a DNS server using BIND. Let's visit an imaginary world; a world without DNS. In this world, users can't use the domain names that we are so used to in our modern lexicon. Your coworker comes to you and says, "Hey, I found a great website for searching the Internet. Just go to 66.102.7.99." Later, you're watching television and you see an advertisement for an online auction website. The slogan for it goes, "I found just what I needed on 66.135.192.124." It's not very catchy, is it? Fortunately, in the real world, this isn't a problem. We have DNS. As you probably know, DNS is a network service that allows you to map easy-to-remember host and domain names to IP addresses. Before going any farther, let's review a little bit of the history behind DNS. Life Before DNS Believe it or not, DNS hasn't always been with us. In the early days of IP-based computer networks, we had two choices: - Don't use any kind of name resolution. - Use the hosts file for name resolution. As you can guess, the first option wasn't terribly popular. If you're a tech-head (and you probably are if you're pursing the CLE 9 certification), you probably could handle using IP addresses instead of hostnames. It wouldn't be easy, but as soon as you memorized a list of frequently used IP address, you could probably get by. However, this option would be a support nightmare for your typical network users. Could you imagine how many help-desk calls you would get? For whatever reason, humans have a tough time memorizing long numbers. Our brains tend to just jumble up the numbers. Imagine what would happen if you sent out the memo in Figure 3.1 to your users. Figure 3.1 The World without name resolution. I can tell from personal experience that your phone will be ringing off the hook. It's just hard for the typical user to comprehend IP addresses. Because of this, most system administrators used the second option. Instead of requiring users to memorize IP addresses, they instead used the hosts file to provide a simple form of name resolution. Most operating systems are designed to use some type of hosts file to map hostnames to IP addresses. A sample hosts file from a Linux system is shown in Figure 3.2: Figure 3.2 A sample Linux hosts file. On a Linux system, this file resides in /etc. Even the latest Windows operating system still has a hosts file available should it be needed. On a Windows XP system, this file resides in the \windows\system32\drivers\etc directory. A sample hosts file from a Windows system is shown in Figure 3.3: Figure 3.3 A sample Windows hosts file. Notice in Figures 3.2 and 3.3 that each mapping resides on a single line. The syntax is as follows: IP_address Host_Name Alias The IP_address parameter is the IP address of the host you want the hostname mapped to. The Host_Name parameter is the alphanumeric hostname you want mapped to the IP address. The Alias parameter is an optional, secondary hostname you want mapped to the same IP address. It's usually shorter than the hostname. For example, in the preceding figures, the IP address 192.168.1.47 is mapped to the hostname of fs1.cle9.com. Notice that you're not limited to a hostname only for this parameter. You can also use a fully qualified domain name (FQDN). The Alias parameter is usually a shorter, easy-to-remember name that you want additionally mapped to the specified IP address. In Figures 3.2 and 3.3, we've also mapped the alias of fs1 to 192.168.1.47 in addition to the FQDN. With this hosts file, we can use either fs1.cle9.com or fs1 to access the host configured with the IP address 192.168.1.47. Sounds pretty easy, huh? Can you still use hosts files to provide name resolution services on your network? Absolutely. This can be configured on your Linux host using the /etc/host.conf file. The order directive in this file specifies whether you are going to use hosts files and, if so, where to look first. Do system administrators still use hosts files to provide name resolution services? Very rarely. Although editing the hosts file to define mappings is relatively uncomplicated, using hosts files has two major shortcomings. First, maintaining hosts files on a small network is somewhat feasible. However, if a network gets very large at all, it becomes an impossible task. Suppose, for example, that you are responsible for managing an IP-based network that has 800 hosts on it. If you were to add a server to the network, you would have to manually update 800 hosts files with the new server's IP address and hostname. Unless you're the type of person who lives for tedium, this really isn't feasible, especially if your network is a growing, dynamic network. However, in the "old days," this was the only real name resolution option available and system administrators did the best they could. The second problem with hosts files relates to Internet access. If an organization allowed very few users to access the Internet from their desktops, this wasn't an issue. You could maintain your users' hosts files (very tediously) with mappings of IP address to hostnames for systems on your network. However, imagine the problem you would face if you wanted to implement hosts files to allow users to access hosts on the Internet. Basically, each user with Internet access would need a hosts file that contained mappings for all Internet hosts (or at least the ones you want them to be able to access). Yikes! This task sounds almost impossible. To make this possible, the registration of Internet host names was centrally managed by the InterNIC (Network Information Center) at Stanford. This organization kept a master hosts file. Early system administrators would have to download new versions of this file regularly. They would then have to add mappings to the file for hosts on their own network. When they were done, they would copy the file around to all of the systems on their network. Essentially, with hosts files, the smallest change required a great deal of manual effort to implement and distribute. That's where DNS comes into play. How DNS Works DNS makes name resolution on your IP network a much easier administrative task. The main weakness with hosts files was that name resolution was decentralized. Each computer system had its own hosts file. Any change in the network required each hosts file on every system to be changed. DNS rectifies all that. Where the hosts file was a decentralized name resolution system, DNS is a centralized name resolution system. Recall that when we installed and configured our SLES 9 server in the previous chapter, we configured the system with the IP address of a DNS server, as shown in Figure 3.4: Figure 3.4 Configuring the IP address of the DNS resolver. Instead of relying on the hosts file, the system will instead send requests for resolving hostnames into IP addresses (and vice versa) to the DNS server. This strategy provides distinct advantages over hosts files. Key among these is that name resolution services are centralized in the network. Recall the example we looked at earlier. You have 800 computer systems in your network and you've just added a new server. You need to update your name resolution system with the new hostname and IP address of the server. We related that when using hosts files, you would have to make 800 manual updates; every hosts file would have to be edited or copied. With DNS, however, you would have to make a single update to the DNS server. As soon as you add the mapping, the hostname can immediately be resolved for any host on the network. That's a lot of time saved on your part. Let's review how DNS works. THE DNS NAMESPACE One of the key differences between DNS and hosts files is that DNS employs a hierarchy of domains and zones. This hierarchy is called the DNS namespace. By way of comparison, refer back to Figure 3.2. The hosts file is flat. What does the term "flat" mean? It means there is no structure to the file that would allow records to be nested within units of organization. All records in a hosts file reside at the same level. For example, you could enter the following list of hostnames and IP addresses in a single hosts file: 192.168.1.47 fs1.cle9.com fs1 130.57.4.27 novell 192.168.1.1 gateway.cle9.com gateway 195.135.220.3 suse Notice that the mappings aren't arranged in any particular fashion. They don't appear in any particular order nor are similar records grouped together. For a small hosts file, this isn't a problem. However, imagine how messy a hosts file could become if there were hundreds or even thousands of different records in the hosts file. DNS, on the other hand, organizes hosts into a highly structured domain structure. Think of this structure as an inverted tree, as depicted in Figure 3.5. Figure 3.5 The DNS domain hierarchy. To understand how DNS domains organize hostnames, let's analyze a sample domain name:. At the top of the DNS hierarchy is the root domain. It's denoted by a simple period, as shown in Figure 3.5. This will be the right-most domain in any DNS domain name. Notice the period at the end of. This period represents the root domain. Now, as you visit websites, you probably don't include the trailing period in the URL. Most people don't. However, you should always remember that a properly written FQDN name ends with a trailing period denoting the root domain. As an experiment, try opening a web browser and navigating to your favorite websites using a trailing period after the domain name. You'll find that it works! In Figure 3.6, you see Novell's website opened using just this type of URL: Figure 3.6 Using a trailing period in a URL. The root domain contains a number of top-level domains (TLDs). If you've visited websites on the Internet, you're probably already familiar with these top-level domain names, which include - com— Contains commercial organizations. - edu— Contains educational organizations. - org— Contains nonprofit organizations. - gov— Contains United States government organizations. This list isn't all-inclusive. In recent years, new top-level domains have been added, including tv, biz, and info. In addition, top-level domains exist for specific countries. For example, the top-level domain for Australia is au. The top-level domain for Spain is es. In our. example, the next domain after the root domain is com. Within the top-level domains reside thousands of subdomains or zones. Zones are specific to an organization. Zones themselves can contain either subzones or specific hosts. In our example, the zone comes immediately to the left of the top-level domain; in this case, novell. In Figure 3.5, you'll notice that the novell zone contains two specific records; one for www and one for ftp. These records contain mappings, just like in a hosts file, that map a hostname to an IP address. In our example, www specifies a specific host within the novell zone. With this in mind, let's look at how the name resolution process works with DNS. RESOLVING HOSTNAMES WITH DNS Recall that with a hosts file, the system needing to resolve a hostname parses the locally stored file until it finds a match and reads the appropriate IP address. The process is quite a bit more complex when using DNS to resolve hostnames. However, it's this complexity that makes DNS a much more manageable system than using hosts files. The DNS name resolution system uses DNS servers. Instead of reading a local file, a computer system that needs to resolve a hostname into an IP address sends a resolution request to the DNS server it's been configured to use; as shown in Figure 3.4. What happens after that gets a little more complex. The process is depicted in Figure 3.7: Figure 3.7 The Name resolution process. Here's how it works: - The system needing to resolve a hostname to an IP address sends a request to the DNS server it's been configured to use on IP port 53. If the DNS server is authoritative for the zone where the hostname being requested resides, it responds with the IP address. If not, the process continues to step 2. - The DNS server sends a request to a root-level DNS server. There are 13 root-level DNS servers on the Internet. When you install your own DNS server, it's automatically configured with the IP addresses of these servers, as shown in Figure 3.8. These root-level servers are configured with records that resolve to authoritative DNS servers for each top-level domain. Figure 3.8 Root-level DNS servers. - The root-level DNS server contacted responds to your DNS server with the IP address of a DNS server that's authoritative for the top-level domain of the FQDN in question. - Your DNS server sends a resolution query for the FQDN to the top-level domain authoritative DNS server. - The top-level domain DNS server responds to your DNS server with the IP address of the DNS server that's authoritative for the DNS zone of the FQDN that you need to resolve. - Your DNS server sends a resolution request to the DNS server that's authoritative for the zone where the FQDN resides. - The authoritative DNS server for the FQDN responds to your DNS server with the respective IP address. - Your DNS server responds to the system that originated the request with the IP address. At this point, something very important happens. When your DNS server resolves a hostname for which it is not authoritative, it saves that address in its name cache. In the future, if it receives a request to resolve the same hostname again, it will pull the IP address out of its cache and respond to the requesting system directly instead of going through the entire resolution process again. This saves both time and network traffic, especially on a heavily utilized DNS server. With this in mind, you need to know a couple of things about the DNS server's name cache. First, the cache resides in the server's memory; it's not saved in a file. This is significant because, many times, system administrators want to manipulate their DNS server's cache, such as manually editing it to add hosts or to copy it to another DNS server. Simply put, you can't do it. This brings to bear the second point: The name cache on a given DNS server isn't persistent. Because it resides in memory only, it's lost if you stop the DNS service or if you reboot the server system that's running the service. Many administrators want to save the cache to a file and then reload it when the service comes back up. The idea is a good one; rather than wait for the name cache to be rebuilt, they want to force the service to use an existing cache, saving time and reducing network traffic. Unfortunately, it can't be done. Before we go any further, we need to discuss the two roles that a DNS server can take: master or slave. MASTER AND SLAVE DNS SERVERS One of the problems with current DNS implementations is fault tolerance. If you have your DNS database hosted on a particular server and it goes down, name resolution for your network is gone. To provide a degree of redundancy, BIND allows you to configure master and slave DNS servers. A master server is a DNS server that hosts zone files. Any changes made to the zone are made to the zone files on the master server. A slave DNS server, on the other hand, is configured to get its zone data from a master DNS server. Every so often, the slave server contacts the master server and downloads zone data. This transfer is called a zone transfer. By configuring your DNS implementation with master and slave servers, you provide a degree of fault tolerance. That's because a slave DNS server can resolve hostnames just like a master DNS server. Your workstation doesn't know the difference between the two. In fact, you'll notice that most organizations and ISPs provide two or more DNS server addresses for client workstations. One is usually a master server, the others slave servers. If your master server were to go down, workstations can still use the slave server for name resolution. In addition to knowing about master and slave servers, you also need to understand that two types of zones can be hosted by a DNS server. Let's look at those next. FORWARD- AND REVERSE-LOOKUP ZONES DNS servers can perform two types of lookups performing name-resolution tasks. The first type is called a forward lookup. A forward lookup is the type of lookup we've been focusing on in the beginning pages of this chapter. When performing a forward lookup, the client system sends a request to the DNS server asking it to resolve a hostname into an IP address. However, this process also works in reverse. These are called reverse lookups. During a reverse lookup, the client system sends a request to the DNS server that asks it to resolve an IP address into a hostname. At first glance, you may conclude that the DNS server can use the same zone data to perform both types of lookup. After all, it's just a matter of direction, right? Well, it doesn't work that way. If you want a DNS server to provide forward and reverse lookups, you have to create two zones: a forward zone and a reverse zone. Both zones contain the same data; it's just formatted in a slightly different fashion. We'll look at the difference later in this chapter. Now that you know how DNS works conceptually, you need to learn how to implement it on your SLES 9 server.
http://www.informit.com/articles/article.aspx?p=413666&amp;seqNum=5
CC-MAIN-2016-50
refinedweb
3,260
66.13
A Polyline is same as a polygon except that a polyline is not closed in the end. Or, continuous line composed of one or more line segments. In short, we can say a polygon is an open figure formed by coplanar line segments. n JavaFX, a Polyline is represented by a class named Polygon. This class belongs to the package javafx.scene.shape.. By instantiating this class, you can create polyline node in JavaFX. You need to pass the x, y coordinates of the points by which the polyline should be defined in the form of a double array. You can pass the double array as a parameter of the constructor of this class as shown below − Polyline polyline = new Polyline(doubleArray); Or, by using the getPoints() method as follows − polyline.getPoints().addAll(new Double[]{List of XY coordinates separated by commas }); To Draw a Polyline { } } You can create a line in JavaFX by instantiating the class named Line which belongs to a package javafx.scene.shape. You can instantiate this class as follows. //Creating an object of the class Polyline Polyline polyline = new Polyline(); Specify a double array holding the XY coordinates of the points of the required polyline (hexagon in this example) separated by commas. You can do this by using the getPoints() method of the Polyline class as shown in the following code block. //Adding coordinates to the hexagon polyline.getPoints().addAll(new Double[]{ 200.0, 50.0, 400.0, 50.0, 450.0, 150.0, 400.0, 250.0, 200.0, 250.0, 150.0, 150.0, }); In the start() method create a group object by instantiating the class named Group, which belongs to the package javafx.scene. Pass the Polyline (node) object, created in the previous step, as a parameter to the constructor of the Group class, in order to add it to the group as follows − Group root = new Group(polyline); Create a Scene by instantiating the class named Scene which belongs to the package javafx.scene. To this class pass the Group object (root) that was following method. generates a polyline using JavaFX. Save this code in a file with the name PolylineExample.java. import javafx.application.Application; import javafx.scene.Group; import javafx.scene.Scene; import javafx.stage.Stage; import javafx.scene.shape.Polyline public class PolylineExample extends Application { @Override public void start(Stage stage) { //Creating a polyline Polyline polyline = new Polyline(); //Adding coordinates to the polygon polyline.getPoints().addAll(new Double[]{ 200.0, 50.0, 400.0, 50.0, 450.0, 150.0, 400.0, 250.0, 200.0, 250.0, 150.0, 150.0, }); //Creating a Group object Group root = new Group(polyline); //Creating a scene object Scene scene = new Scene(root, 600, 300); //Setting title to the Stage stage.setTitle("Drawing a Polyline"); //Adding scene to the stage stage.setScene(scene); //Displaying the contents of the stage stage.show(); } public static void main(String args[]){ launch(args); } } Compile and execute the saved java file from the command prompt using the following commands. javac PolylineExample.java java PolylineExample On executing, the above program generates a JavaFX window displaying a polyline as shown below.
https://www.tutorialspoint.com/javafx/2dshapes_polyline.htm
CC-MAIN-2019-47
refinedweb
523
55.95
Contents - 1 Introduction - 2 Pandas Copy : Copy() - 3 Pandas Cut : Cut() - 4 Pandas Query : Query() - 5 Conclusion Introduction We have seen in earlier tutorials how useful Pandas dataFrames are in Data Science or machine learning projects. In this tutorial, we will be learning about some new pandas operations – copy(), cut() and query(). The tutorial will look into the syntax of each function and also the examples which are used in real-world scenarios. Importing Pandas Library Starting the tutorial by importing the Pandas library. import pandas as pd import numpy as np Pandas Copy : Copy() The pandas copy() function is used for creating a copy of the object’s indices and data. Syntax DataFrame.copy(deep=True) deep : bool : After passing the object to the function, we have to decide whether a deep copy of the specified object should be created or not. The default value of deep parameter is True. If set as True, then a new object will be created with a copy of the calling object’s data and indices. Modifications to the data or indices of the copy will not be reflected in the original object If specified as False, then a new object will be created without copying the calling object’s data or index. Any changes to the original object will be reflected in the copy as well. This function returns the copy of the passed object. Example 1: Simple example of Pandas Copy Function Using copy() function we can generate a copy of the series object. s = pd.Series([7, 9], index=["p", "q"]) s_copy = s.copy() s_copy p 7 q 9 dtype: int64 Example 2: Showing difference in Pandas Shallow and Deep copy In this example, we will look at the difference between shallow and deep copy created using the copy() function of pandas. s = pd.Series([7, 9], index=["p", "q"]) For creating deep copy, we have to use copy() function whereas for creating a shallow copy, we pass the deep parameter value of False. deep = s.copy() deep p 7 q 9 dtype: int64 shallow = s.copy(deep=False) shallow p 7 q 9 dtype: int64 Checking whether the series object is shallow or deep. s is shallow False Since the values and indices of the original series is copied in shallow copy, thus we get True as the output. s.values is shallow.values and s.index is shallow.index True Here we know that the original object is not deep copy and than the values and indices are also not copied in the original object in case of a deep copy. s is deep False s.values is deep.values or s.index is deep.index False Example 3: Main difference in Pandas Shallow and Deep Copy Since in the shallow copy, the changes made in the original object are reflected, we can see those changes. Whereas in case of deep copy, the changes made in the original copy are not shown. So this is the main difference between shallow and deep copy. s[0] = 3 shallow[1] = 4 s p 3 q 4 dtype: int64 shallow p 3 q 4 dtype: int64 deep p 7 q 9 dtype: int64 Pandas Cut : Cut() Pandas cut() function is used for creating bins with the help of discrete intervals. The cut() function can be used when we are looking to segment and sort the data values into bins. Syntax pandas.cut(x, bins, right = True, labels=None, retbins = False, precision = 3, include_lowest = False, duplicates = ‘raise’) x : array-like – This takes the array that has to be binned bins : int,sequence of scalars – Here the desired kind of bins are right : bool – It tells whether the rightmost edge is included or not Labels : array or False – Using this parameter we can specify the labels for the bins returned. retbins : bool – This parameter is used to tell the function whether the bins have to be retunrned or not. precision : int – The precision at which to store and display the bins labels. include_lowest : bool – This decides whether the first interval should be left-inclusive or not duplicates : {default ‘raise’, ‘drop’}, optional – It checks that if bin edges are not unique, raise ValueError or drop non-uniques The function returns an array-like object and bins which were desired or specified. Example 1: Simple example of Pandas Cut Function Segmenting the values into three equal-sized bins. Here the complete array is divided into three bins of equal size and then the resulting array is displayed as output. pd.cut(np.array([2, 8, 3, 9, 6, 7]), 3) [(1.993, 4.333], (6.667, 9.0], (1.993, 4.333], (6.667, 9.0], (4.333, 6.667], (6.667, 9.0]] Categories (3, interval[float64]): [(1.993, 4.333] < (4.333, 6.667] < (6.667, 9.0]] Example 2: Using series as an input s = pd.Series(np.array([1, 3, 5, 7, 9]),index=['p', 'q', 'r', 's', 't']) pd.cut(s, 3) p (0.992, 3.667] q (0.992, 3.667] r (3.667, 6.333] s (6.333, 9.0] t (6.333, 9.0] dtype: category Categories (3, interval[float64]): [(0.992, 3.667] < (3.667, 6.333] < (6.333, 9.0]] Pandas Query : Query() The pandas query() function is used to query the columns of a dataframe with the help of boolean expression. Syntax DataFrame.query(expr,inplace=False,kwargs)** expr : str – It contains the query string to evaluate inplace : bool – It decides whether the query should modify the data in place or return a modified copy. kwargs – For additional arguments. Example 1: Simple example of Pandas Query Function Here a dataframe is created using range() function. df = pd.DataFrame({'A': range(2, 7), 'B': range(20, 0, -4), 'C': range(20, 10, -2)}) df As we can see the 4th index row has a value which is greater in column ‘A’ than column ‘B’ and thus we get the output. df.query('A > B') Example 2: Checking equal condition Clearly the first or 0th index row satisfies the condition and we get the output. df.query('B == C') Conclusion We have reached the end of this article, through this article we learned about some new pandas functions, namely pandas copy(), cut() and query(). –
https://machinelearningknowledge.ai/pandas-tutorial-pandas-copy-pandas-cut-and-pandas-query/
CC-MAIN-2022-33
refinedweb
1,048
62.07
Last week I introduced you to vSphere Supervisor cluster APIs and also had a post on how to use DCLI for managing vSphere Supervisor cluster. In this post, I am going to show you how to enable/configure vSphere Supervisor cluster and also create namespace on the top of vSphere Supervisor cluster. These key APIs are demonstrated using couple of python scripts. This time I thought let me try little different style of writing. I am sure you will enjoy learning. 1. Enable/configure vSphere Supervisor cluster : How to run script : C:\vThinkBeyondVM\vcpy>python configure_supervisor_cluster.py -s “10.x.x.x” -u “Administrator@vsphere.local” -cl “WCP-cluster-1” -mnw “VM Network” -sip “10.x.x.x” -sm “255.255.x.x” -gw “10.x.x.x” -dns “10.x.x.x” -ntp “10.x.x.x” -sp “k8s-gc-policy” -egress “10.x.x.x” -ingress “10.x.x.x” Password will be asked on CLI. You might wonder, am I not passing VDS and Edge cluster? please refer the line 161 through 170. REST APIs allowed me to use some trick. Which UI workflow is automated? This python script automates below UI worklow, where user will configure workload network, management network, storage etc. How it looks from UI once Super visor cluster is enabled, this is how it looks (H5C > Menu > Workload Management) 2. Creating your first namespace using script How to run script: C:\vThinkBeyondVM\vcpy>python create_namespace.py -s 10.x.x.x -u Administrator@vsphere.local -cl WCP-cluster-1 -role EDIT -st USER -subject Administrator -domain vsphere.local -sp k8s-gc-policy -ns my-ns-2 How it looks from UI ? I hope you enjoyed learning. Please stay tuned for upcoming posts around vSphere with K8s and other vSphere 7.0 functionality. Let me know if you have any queries, feedback. Further reading: 1. REST API documentation 2. How to get vSphere with Kubernetes? 3. Introduction to manage vSphere Supervisor Cluster using API 4. I encourage exploring vSphere automation SDKs here 5. vSphere with Kubernetes 101 is here 6. Official documentation for vSphere with Kubernetes is here
http://vthinkbeyondvm.com/author/vthinkbeyondvm/
CC-MAIN-2020-24
refinedweb
354
63.25
: Unlike my first post, this will not show you how to setup the development environment for android applications. If you need to do so, please read through the setup guide here and then come back for another exciting learning experience. Counter App Definition This app is relatively simple but not as simple as the todolist we created earlier. We will be using a few more things that might be new to you. Here are some of the things we will use in our development. - Instead of hard-coding strings, we will use values and resources that we will set inside the strings.xml file which resides in the values folder. - The main activity that we will define will implement an interface. In our previous tutorial, we used the OnKeyListener inside a method. We are not going to do that here because we want to make things easier to understand and stick to good coding styles. - There will be three buttons. Each of which will be listening for clicks. If one is clicked, we do something after knowing which one was clicked. The first button will add 1 to the counter, the second will subtract 1 and the third one will reset everything to 0. - There will be a few fancy things we will add: every time you click the reset button, the score background will change color. Likewise, when you click add or subtract, the score background will change as well. Styles, anyone? - The layout will include three components: TextView, EditText and Button. That is all. I know you are probably thinking, show me the code. It is okay, but I think it is also good to understand the structure of the app before doing anything else. Files that we will use - MainActivity.java - main.xml - strings.xml Note: There are several folders that get created when you create a project using the Android tools on Eclipse. In those folders are files that you can use to add resources.Some, you don’t need to touch like R.java which is automatically generated for you. There is also the AndroidManifest.xml which we will talk about in the future tutorials. You are free to look inside those files but since we are not dealing with them directly in this post, I am not going to talk much about them. Create Counter App project Like we did in my first example, from within Eclipse IDE, let us go to File -> New ->Android Application Project. Fill in the details of your project and application. When you are done, you should have your project ready to go. The easiest way to define the layout of your application is using the main.xml file that opens when your project is created. Yours might have a different name. While that file is open, you will see a Graphical Layout tab on the bottom of that file. To its right, you will see main.xml or whatever you named it. Here is a snapshot if you don’t mind: As you can see, instead of typing all the xml inside main.xml file, you can simply drag and drop whatever components you want your app to show; like input areas, buttons, forms and many more. Doing that will save you a lot of time. Since we already have a TextView showing “Hello World”, we don’t need to drag a new one, we will instead edit the value and the name as well inside strings.xml file. Drag and drop EditText – resize it as it pleases. Drag and drop your first button. Drag and drop your second button. Drag and finally drop your third button. Remember, what you see after dragging and dropping the components to your view is how your final app will look like. If you look inside your main.xml file, you will notice that EditText and three Buttons have been added and even positioned for you. Cool huh? Using strings.xml file I mentioned earlier that it is good to avoid hard-coding values in your app. Maybe your app needs to show different values for different countries or languages and that is why we use the res/values/strings.xml file. The Resource window looks like this: We need to create four string names and values: Click Add, select string and add these: - name = intro, value = Score - name = addone, value = +1 - name = subtractone, value = -1 - name = reset, value = RESET SCORE Type them without quotes. I am saying this because some people might have the idea of a string having double quotes around them. After creating these strings, we can now use them in our main.xml file: main.xml [xml] [/xml] First, we have our TextView where we use an id ‘myTextTitle’. As you can see, the last android:text has a value “@string/intro” – we just created that inside string.xml remember? The same applies to the three remaining buttons. Note: Remember to Capitalize EditText, TextView and Button in your code – this syntax highlighter doesn’t do it as I would like it to. If you know a better highlighter for WordPress, please tell me. We will need those ids to reference the components inside the java code that we will write next. MainActivity.java [java] package com.simpledev.counterapp; import android.os.Bundle; import android.util.TypedValue; import android.view.View; import android.view.View.OnClickListener; import android.widget.Button; import android.widget.EditText; import android.widget.TextView; import android.app.Activity; import android.graphics.Color; public class MainActivity extends Activity implements OnClickListener { Button btn1; Button btn2; Button btn3; TextView textTitle; EditText scoreText; int counter = 0; @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.main); btn1 = (Button)findViewById(R.id.addButton); btn2 = (Button)findViewById(R.id.subtractButton); btn3 = (Button)findViewById(R.id.resetButton); scoreText = (EditText)findViewById(R.id.editText); textTitle = (TextView)findViewById(R.id.myTextTitle); //—set on click listeners on the buttons—– btn1.setOnClickListener(this); btn2.setOnClickListener(this); btn3.setOnClickListener(this); // change font size of the text textTitle.setTextSize(TypedValue.COMPLEX_UNIT_SP, 24); } @Override public void onClick(View v) { if (v == btn1){ counter++; scoreText.setText(Integer.toString(counter)); scoreText.setBackgroundColor(Color.CYAN); } if (v == btn2){ counter–; scoreText.setText(Integer.toString(counter)); scoreText.setBackgroundColor(Color.GREEN); } if (v == btn3){ counter = 0; scoreText.setText(Integer.toString(counter)); scoreText.setBackgroundColor(Color.RED); } } } [/java] Code Breakdown - While defining our MainActivity.java class, we tell it to implement the OnClickListener interface which means we will have to use the onClick method . Eclipse is really cool, you only need to hover over MainActivity and double click it and a method is created for you. Repeat this procedure to import the necessary packages. - Immediately after that, we define our objects. EditText, Button, TextView and a counter variable which we set to zero. At this point, we just define them and leave them for later use. - From within onCreate method, we finally assign values to our TextView, Buttons and EditText references. We are using the ids we assigned inside main.xml for each one of them. You can always switch between the java code and the xml file to make sure you don’t make errors or name mismatches. - We then set the OnClickListener on our buttons passing in the (this) keyword – the context. Remember we are doing all these inside MainActivity class. - I realized the Score text was too small and I therefore increased the size to 24. Pretty straight-forward I think. - Finally, we define what we want to do every time a particular button is clicked. Using *if* statements, we see if View v is equals to button 1, 2 or 3. Once that is clear, we either increment, decrease or reset the counter. Again, I added some cheap styles – changing background colors depending on which button was clicked. That, is all you needed for this application to work. If you have any questions, please let me know. I will truly appreciate you sharing this post with your friends online. Have comments? I would love to hear from you. Thank you for learning with me. 35 Comments on “How To Build Simple Counter Android App” Moose The app crashes right after it is run. Thoughts? Elisha Chirchir There are several possibilities here: 1) There are errors in your code somewhere i)That could be inside the xml files or in the java code. Please tell me which file you had a problem with if you can. Remember that inside main.xml file, elements start with uppercase like Moose I don’t really know what happened, but i re-did the whole thing and it worked this time. Thanks for the tutorial! For the code, try SyntaxHighlighter Evolved. Cheers! Nike Helpful tutorial ! Elisha Chirchir I am glad you found it helpful. Thank you for stopping by! Mark Please send me updates and newsletters from your site. Thanks in advance, Elisha Chirchir All you need to receive updates is to subscribe through the form on the SUBSCRIBE page. Thanks for visiting. aleem ahmed I am having an error saying function main is not defined, searched all over the web couldn’t fix it. please help. Elisha Chirchir Normally the debugger will show in red where the error message is and if you click that location, it opens up the code location where it is crashing. I don’t know exactly what could be causing your issue because you didn’t give more details on the error. Please try making sure that all the syntax is correct, restart the Emulator if you use one or tablet or phone. In fact, I would uninstall it; Remember to always add each new activity to the Androidmanifest file each time or your code won’t work. Let me know if you need more help beyond this point. How To Build Simple Counter Android App - appgong […] How To Build Simple Counter Android App […] Absolutkarlos hello, I just read your post about: how-to-build-simple-counter-android-app/… Chance Mine wont to run. it only adds once and then stops how do i make it continue to add for every click. Waseem Akram i want to the code that if i click on button a counter is add into some activity and show the detail of the counter How To Set Layout Margin In Android | MY NEWS […] How To Build Simple Counter Android App – Android app development using a real Counter app will show you step by step how to create your first android app from start to finish. Java and Eclipse… […] tariq rahiman Nice article. Took 2 hours [I am an android beginner and new to java], but I was able to successfully debug it in Android Studio 1.3 with Lollipop. Ran it in Froyo attached device. Please share more articles. ~ Tariq Rahiman Rico DeMarco Thanks for the counter code. I created a app that is used as a test simulator and I needed something to count correct answers as users navigated their way through all the questions. This was very helpful. I appreciate you, many thanks! Nigel Thank you, good source, It would of taken my ages to work out the Integer.toString. I was able to adapt the code to produce a Toast if the value was already 0. Elisha Chirchir Good to hear!! Gerry Is it possible to add more buttons that would also add values? Staying with increment by 1 each time. I have 5 children and would like a button for each of us. I would also think it should be rather easy to display each persons points separately, however I am not sure of that. Elisha Chirchir You can add as many buttons as you need without a problem. Just repeat the same process. Gerry E Elisha, I very much enjoyed reading and following your tutorial. Thank you for such a quick response. Do you think it would it be possible for you to provide me sample code for the following requests? 1. How can I find the # of button clicks per button and perhaps display on the bottom of this Activity or perhaps have it switch Activity to display. 2. How to code in a Submit or Finish button? I am a newbie having been at this now for 7 days and with lessons such as yours, I can actually measure a small amount of progress. Elisha Chirchir Gerry, I think I might find time to help you with this; but instead of doing it through the comments on my site, we can continue here on gmail? Elisha Chirchir I have created a quick project to show what you might want Gerry; Here it is Let me know if you need anything else. David Ogundepo Wad up elisha. Could you please make a tutorial of food counter. Like how to sum up prices of food or if removed then decrement the removed. Thanks in advance Elisha Chirchir Sure, I can; you can contact me personally with your email so I can help since that is a personal need? praveen good tutorial, working Simple Android App Tutorial – All About Android OS […] How To Build Simple Counter Android App […] mohsen thanks for your tutorial, as beginner am happy 2 see some errors but am straggling with one errors in main.java, it said view cannot be resolved to type (public void onClick(View v) {) any idea? Toni For me it doesn’t work, i can’t even get it to render it, i don’t know what is going on but it looks like a mess, probably there are a ton of things i did wrong but this is my main.xml this are my strings and this is MainActivity.java if anyone knows how to fix this rijwan khan how to create a button which changes color on click but revert it’s action and change again to default on second click Drew Roach Could you help me with these 2 tablet app maker questions: 1) Best drag and drop app maker for creating a custom chess game clock? 2) For 2 to eight players? (preferably in a radial/circular format; 360 degree view) Any help, direction, humor greatly appreciated Thanks Bruce Thanks for this tutorial! I’ve been a web developer for a long time but just getting into app development. Worked great for me. I extended it slightly to have 5 buttons for balls and strikes to make a simple pitch counter app 🙂 Nrupesh Is there any way to retain the counter value after closing the app? Elisha Chirchir Use a mobile database. Husnain Farooq thank you soo much bro it is really helpful.
http://simpledeveloper.com/how-to-build-simple-counter-android-app/
CC-MAIN-2019-35
refinedweb
2,436
74.59
A Python GUI-based Python debugger enabling realtime watching and modification of variables and expressions, plus a REPL-light Project description It's 2019 and this project is still actively developed. imwatchingyou A "live" Python debugger. Watch your program work without stopping its operation or flow imwatchingyou A "live debugger". It was developed to help debug PySimpleGUI based programs, but it can be used to debug any program including non-GUI programs. PySimpleGUI is the only requirement. With this "debugger" you can: - Set "variable watches" that update in realtime - Write expressions / code that update in realtime - Use a REPL style prompt to type in "code", expressions, and modify variables All of this is done using separate windows from your primary application. Installation Installation is via pip: pip install imwatchingyou or if you need to upgrade later: pip install --upgrade --no-cache-dir imwatchingyou Note that you MUST install the debugger using pip rather than downloading. It depends on other packages and the pip install will make sure they are installed properly. So, don't forget: You must pip install imwatchingyou in order to use it. Integrating imwatchingyou Into Your Application There are 3 lines of code to add to a program in order to make it debugger ready - The import, a "show debugger window" call, and a "refresh debugger windows" call. Integrating with a Non-GUI Application It's your application's job to periodically call a "refresh" function. The more frequently you call the refresh, the more quickly your commands/actions will be executed. If you refresh once a second, then it could be import imwatchingyou import time # imwatchingyou.show_debugger_window() # Uncomment if you want to immediately display the debug window counter = 0 # Some variable for you to watch / changing # Using a loop in order to call the debugger refresh function on a periodic basis while True: imwatchingyou.refresh_debugger() time.sleep(.1) # Simulating doing a bunch of work # Using the counter to trigger the debug window display. You can use something else as your trigger. if counter == 20: imwatchingyou.show_debugger_window() # do something with a variable that we can see/modify print(counter) counter += 1 Integrating with a PySimpleGUI Based Program You can use imwatchingyou with any of the PySimpleGUI ports. The only requirement is that you call the refresh function periodically. Adding it to your PySimpleGUI event loop is a good way of doing that. Make sure you are not blocking on your Window.read() calls by adding a timeout. Here is an entire program that is debugged using imwatchingyou: import PySimpleGUI as sg # import PySimpleGUIQt as sg # can use with the Qt port too import imwatchingyou # STEP 1 """ Demo program that shows you how to integrate the PySimpleGUI Debugger into your program. This particular program is a GUI based program simply to make it easier for you to interact and change things. In this example, the debugger is not started initiallly. You click the "Debug" button to launch it There are THREE steps, and they are copy and pastes. 1. At the top of your app to debug add import imwatchingyou 2. When you want to show a debug window, call one of two functions: imwatchingyou.show_debug_window() imwatchingyou.show_popout_window() 3. You must find a location in your code to "refresh" the debugger. Some loop that's executed often. In this loop add this call: imwatchingyou.refresh() """ sg.change_look_and_feel('BlueMono') layout = [ [sg.T('A typical PSG application')], [sg.In(key='_IN_')], [sg.T(' ', key='_OUT_', size=(30, 1))], [sg.Radio('a', 1, key='_R1_'), sg.Radio('b', 1, key='_R2_'), sg.Radio('c', 1, key='_R3_')], [sg.Combo(['c1', 'c2', 'c3'], size=(6, 3), key='_COMBO_')], [sg.Output(size=(50, 6))], [sg.Ok(), sg.Exit(), sg.Button('Debug'), sg.Button('Popout')], ] window = sg.Window('This is your Application Window', layout) counter = 0 timeout = 100 while True: # Your Event Loop event, values = window.read(timeout=timeout) if event in (None, 'Exit'): break elif event == 'Ok': print('You clicked Ok.... this is where print output goes') elif event == 'Debug': imwatchingyou.show_debugger_window() # STEP 2 elif event == 'Popout': imwatchingyou.show_debugger_popout_window() # STEP 2 counter += 1 # to prove window is operating, show the input in another area in the window. window['_OUT_'].update(values['_IN_']) # don't worry about the "state" of things, just call this function "frequently" imwatchingyou.refresh_debugger() # STEP 3 - refresh debugger window.close() Showing the debugger There are 2 primary GUI windows the debugger has to show. The Primary Debug Window The main debug window is displayed by calling: imwatchingyou.show_debugger_window() This will display the Primary / Main Debug Window, starting on its "Variables" Tab. The main debug window has 2 tabs one for variable watches the other for REPL and expression watches. Variables Tab Like all of the imwatchingyou debugger windows, this window is refreshed every time your application calls the refresh function imwatchingyou.refresh_debugger() Here you can see up to 8 of your variables and one custom expression. You select which of your variables to see using the "Choose Variables To Auto Watch" buttton. This will bring up this selection window: Use this window to check the variables you want to "watch" on the debug screen. This is also where you type in your custom watch. REPL Tab The is the REPL portion of the debugger You can also examine objects in detail on this page using the "Obj" button. This feature is currently broken / crippled. Will be turning attention to it shortly Popout Debug Window The "Popout Debug Window" is the small "Popout" window that floats on top of your other windows and is located in the upper right corner of your display. Note that this popout window is created in the upper right corner of your screen. If you right click this window's text (anything that is text), you'll bring up the right click menu which can be used to close the window or to open the main debug window. This Popout window is displayed in either of these 2 manners: - by clicking the "Popout" button from the Main Debug Window - by calling imwatchingyou.show_debugger_popout_window() Refreshing the debugger The most important call you need to make is a imwatchingyou.refresh() call. If debugginer a PySimpleGUI based application, this "refresh" call that must be added to your event loop. Your window.Read call should have a timeout value so that it does not block. If you do not have a timeout value, the debugger will not update in realtime. If you are debugging a non-PySimpleGUI program, no problem, just put this call somewhere that it will be called several times a second. Or say once a second at minimum. This frequency will determine how quickly the variable values will change in your debug windows. Add this line to the top of your event loop: imwatchingyou.refresh_debugger() Accessing the debugger windows Your task is to devise a way for your appliction to call the needed 2 or 3 functions. If you're making a GUI program, then make a hotkey or a button that will call imwatchingyou.show_debugger_window() and you're off to the races! You can use the main debugger window to launch the smaller "Popout" variable window. Or maybe call imwatchingyou.show_debugger_popout_window() after the action gets started in your program and then forget about it, glancing up at the window in the corner of your desktop for the current values of all your variables. The Future Have been working on a version that is integrated direcetly into PySimpleGUI itself (only the tktiner version) that is not officially up and running. Release Notes imwatchingyou 1.1 26-May-2019 - Addition of "Code" line so that things like "import os" can be run from the repl imwatchingyou 1.2.1 27-May-2019 - Can press ENTER for both REPL fields and it'll execute them! NICE - Code cleanup - STILL under 200 lines of code! WITH a GUI. imwatchingyou 1.3.0 27-May-2019 - New "Auto Watcher" feature - New viewing area for these variables - Chosen using a page of checkboxes - Other cool shit that I can't recall. Was up coding all night - Up to 250 lines of code in total, but I've been extremely inefficient. Can be compacted quite a bit. I went for readability for now. - Still the only 250 lines of Python code, real-time, GUI, watcher with REPL that you'll find anywhere imwatchingyou 1.4.1 27-May-2019 - Forgot release notes imwatchingyou 1.5.0 28-May-2019 - Lots of nice code cleanup - Rework of auto-watching - Clear capability in 2 places - Can cancel out of choosing to make changes - Confirmation when choosing to clear auto-watches in main interface - Choose autowatches now has a "real event loop"... it also means it BLOCKS waiting on your choices - Shows non-blocking, "Message" when clearing checkboxes imwatchingyou 1.6.0 28-May-2019 - No more globals! Cheating and using a class instead. Same diff - Working of all interfaces is the best way to sum it up - there are 45 differences that I don't feel like listing - lots of shit changed imwatchingyou 1.7.0 28-May-2019 - User interface change - expect lots of those ahead. This was a good enough one to make a new release - Nice selection interface for auto display - Next is to create a tiny version of this output that is a floating, tiny window imwatchingyou 2.0.0 29-May-2019 Why 2.0? So soon? Well, yea. Been working my ass off on this project and a LOT has happened in a short period of time. Major new functionality AND it breaks the APIs badly. That was a major reason for 2.0. Completely different set of calls. - There are now 3 and only 3 user callable functions: imwatchingyou.show_debug_window() imwatchingyou.show_popout_window() imwatchingyou.refresh() - These functions can be called in any order. You do not have to show a window prior to refreshing - All of the initializing and state handling are handled for you behind the scenes, making it trivial for you to add to your code. - The famous "Red X" added to this program too - Changed user interfaces in a big way - Experimenting with a "Paned" main intrterface - It really paned me to do it this way - Perhaps tabs will be better in the future? - It looks pretty bitching - It makes this code COMPLETELY un-portable to other PySimpleGUI ports - This is another reason tabs are a better choice - Lots of large letter comments - New "Auto choose" features that will choose variables to watch for you - New "Clear" features - New PopOut window!! - Displays in the upper right corner of your display automatially - perhaps can move in the future releases - Stays on top always - Can be used with or without main debugger window - Can be easily shown with imwatchingyou.show_popout_window() - Every call to refresh()will automatically refresh the list of available varaiables along with the values imwatchingyou 2.1.0 - 01-June-2019 - TONS of changes - Mostly centered around the use of Debugger class - Different features than in the built-in version. - Need to continue to make changes so that the exact same code can be used by PySimpleGUI itself for the internal debugger. This will enable a copy and paste. - Over 60 changes in this release.... let's all keep our fingers crossed imwatchingyou 2.2.2 - 09-June-2019 - Hopefully the "last" release for a while - Changed floating to 4 lines max per variable - Changed to 9 auto watches - Starts debug window with all locals chosen that don't start with _ - Removed the fullname function - Added comments - Moved the debugsole global variable into a class variable - Automatically create the debug class instance when any show or refresh call is made (no init needed!) imwatchingyou 2.3.0 - 12-Dec-2019 - Addition of location parameter to popout window - Addition of location parameter to main debugger window - Added version number string - Changed the REPL to be a single line - Looks and acts like the built-in debugger inside PySimpleGUI Design Author Mike B. License GNU Lesser General Public License (LGPL 3) + Project details Release history Release notifications | RSS feed Download files Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
https://pypi.org/project/imwatchingyou/
CC-MAIN-2021-17
refinedweb
2,033
63.39
Session Registration Coming soon! Our webinar just ended. Check back soon to watch the video. How to Use InfluxDB to Visualize and Monitor MQTT Messages in an IIoT System Session date: 2021-04-13 08:00:00 (Pacific Time) HiveMQ is an MQTT broker messaging platform built for fast, efficient and reliable movement of sensor data to and from connected IoT devices. IIoT systems can generate a tremendous amount of data that needs to be analyzed and visualized. MQTT is becoming the dominant protocol for transferring IIoT data from equipment to the cloud. Discover how HiveMQ’s MQTT broker and InfluxDB can store time series data, using the MQTT protocol, for visualization and analysis. Learn how to use InfluxDB to monitor the metrics produced by operating HiveMQ. Watch the Webinar Watch the webinar “How to Use InfluxDB to Visualize and Monitor MQTT Messages in an IIoT System” by filling out the form and clicking on the Watch Webinar button on the right. This will open the recording. Transcript + Here is an unedited transcript of the webinar “How to Use InfluxDB to Visualize and Monitor MQTT Messages in an IIoT System”. This is provided for those who prefer to read than watch the webinar. Please note that the transcript is raw. We apologize for any transcribing errors. Speakers: - Caitlin Croft: Customer Marketing Manager, InfluxData - Till Seeberger: Software Engineer, HiveMQ - Anja Helmbrecht-Schaar: Senior MQTT & Architecture Consultant, HiveMQ Caitlin Croft: 00:00:04.366 Welcome to today’s webinar. My name is Caitlin Croft. I am very excited to be joined by our friends from HiveMQ where we will be talking about how to use InfluxDB to visualize and monitor MQTT messages in an IoT system. Once again, please post any questions you may have for our speakers in the chat or the Q and A. I will be monitoring both. And without further ado, I’m going to hand things off to Anja and Till. Anja Helmbrecht-Schaar: 00:00:38.659 Yeah, thanks, Caitlin. And yeah, thank you for inviting us to hold this webinar today. Yeah, and hello to everyone. I hope you can see my screen. So the first slide here. And so then we will start and tell you today how we are using InfluxDB and the Influx dashboard on one side to monitor our metrics from HiveMQ, and on the other side, how we can monitor really the data from sensors or from IIoT devices. Also with the tools from InfluxDB and Influx dashboard and HiveMQ. So for this, we prepared two demos to show you this. And I’m also not alone here. So also my colleague, Till Seeberger, is with me in this webinar today. And Till will show us the demo for the HiveMQ metrics. And Till is a HiveMQ engineer. Yeah, he’s working on improvements of the HiveMQ broker. And beside this, he’s also maintaining our nice tool, and MQT command line interface so for MQTT messaging. Anja Helmbrecht-Schaar: 00:02:11.130 My name is Anja Helmbrecht-Schaar. I’m a senior consultant and I am working for HiveMQ since about 4 years. And I am supporting customers in the application, the specific implementation of HiveMQ extensions and also in the integration of HiveMQ in the customer’s system landscape. Whoops. That’s the Google slides, they are sometimes a little bit fast. Yeah, so let me really short introduce our company. So we are setting near Munich and so this is our headquarter. We founded 8 years or 9 years now ago, and with our products and our expertise, our main job is to help moving the data to and from connected devices in an efficient, fast and reliable manner. Today, we have more than 130 customers and these customers have HiveMQ in production environments running. And we have really very, very different use cases. So from the customers that where MQTT is working for them. Our main product is the HiveMQ MQTT broker. It’s an enterprise MQTT broker also with some open source edition. And this broker is really for high availability and fast and scalable business critical IoT applications build. And we support 100% the MQTT protocol, and also in both or in the three major versions that are relevant in the MQTT world. And we also support, for example, if you have different devices that can only run different implementations of MQTT, this is something that our MQTT broker is also supporting. We can interoperate the communication between MQTT clients with different versions. Anja Helmbrecht-Schaar: 00:04:35.984 So MQTT is one of the most important things here in this webinar. And that’s why I’m giving you a brief introduction of the history. It’s really not the newest protocol, I would say. It’s founded for more than 20 years or invented for more than 20 years by Andy Stanford-Clark from IBM and Arlen Nipper. And the reason was that they needed a protocol that is really minimized and related to network bandwidth and device and resource requirements. And that’s why they invented MQTT. And 3 years later, it gets a candidate for standardization from Oasis. And then in October 2014, MQTT3 became an Oasis standard. And 4 years later also MQTT5 started with an initial release. Anja Helmbrecht-Schaar: 00:05:40.010 And now we have all these two versions available. And with the MQTT5 Oasis standard, HiveMQ also provides an edition, an open source edition that is able to speak MQTT5 as well as MQTT3. Yeah. And today it can be stated MQTT is really the de facto standard for machine-to-machine communication in the Internet of Things. So the main thing — or the key features of MQTT is maybe not everybody is aware and it’s not working always with MQTT is the publish-subscribe pattern. And these publish-subscribe pattern allows the decoupling of sender and receiver. MQTT is a binary protocol that is very simple and lightweight. And it supports states with the session concept. And another thing that is also important is that MQTT has a dynamic topic concept that means participants that subscribing to a topic — So only in this moment where we’re subscribed, one participant or one MQTT client to a topic, the topic exists and it must not be preconfigured. It must not be created in a different way or something like this. It’s really completely dynamic. Anja Helmbrecht-Schaar: 00:07:20.186 So just for recap, this is how that pops up pattern looks like. In the middle we have always the MQTT broker. And on the right side, for example, there are some clients that subscribe to a specific pattern, a topic. And when they have subscribed, then they get automatically each message that is published from another MQTT client and, yeah, they get then the message. So here you can see the sender and the receiver must not know each other. And they are completely independent. Anja Helmbrecht-Schaar: 00:08:03.102 So let’s go back to our HiveMQ MQTT platform. So today we only we have really a couple of editions and tools around, but today we will only look on the open source site, because the things that we will show you today is all these things are available or doable with our open source and our community editions. We have our HiveMQ broker that is publicly available, and we have an extension framework. And with this extension framework, it is possible to extend the functionality of MQTT broker by your own business logic or business application functionality. And with this extensibility, we will work also today in this webinar. Anja Helmbrecht-Schaar: 00:09:03.671 Beside this, we also need our really, really brand new test tool. It’s called HiveMQ Swarm. And HiveMQ Swarm is something — it’s a tool that allows you to simulate MQTT clients. And you can really run this in very high dimensions. You can simulate million of MQTT devices with this, and also some — only some — so for the open source or the public, the community edition is available just to run this with smaller scenarios. But you have the full functionality available. And with this customization for payload and security, you can really simulate your MQTT environment. And so let’s go back a little bit more to InfluxDB. Also, our test tool is supporting InfluxDB, so you can also — so also the metrics from our benchmark tool can also be reported to InfluxDB. And so the third thing. So we need the HiveMQ core edition, we need the benchmark tool, and we need something from our marketplace. And so one of these extensions that we have and the extension for monitoring, we have, for example, also an InfluxDB extension. This is the extension that is also used in our HiveMQ cloud solution. So we also provide a HiveMQ hosted solution for those they don’t want to host HiveMQ by themselves. Anja Helmbrecht-Schaar: 00:10:55.156 And here we also use the InfluxDB extension, and also with InfluxDB 2.0 and with an Influx dashboard. Yeah. And for our customers, this is one of the most widely used extension. And we also create dashboards sometimes or help customers to create dashboards for when they use the InfluxDB extension. And yeah, for our demo, we will also use this. And now, I would like to switch to Till over, because Till will show us how you can use this, how you can configure this and how the day was looking like. So it’s yours, Till. Till Seeberger: 00:11:41.546 Okay, and can you lend me the screen there? Anja Helmbrecht-Schaar: 00:11:44.120 I can. Yeah, I can stop mine. Okay. Till Seeberger: 00:11:49.088 Okay. Okay. So now you should be able to see my screen. Okay, so first of all, thank you, Anja, for your quick introduction. And also a warm welcome from me, from my side. And also thank you for your interest in HiveMQ and InfluxDB. And next up, we will have a quick look at the monitoring opportunities for HiveMQ. So the first thing which you might come in contact with if you are trying to monitor your HiveMQ instance, would be the so-called HiveMQ control center. And this control center is basically simple dashboard, which displays the most important HiveMQ metrics. So, for example, connections and inbound and outbound published rates and also, for example, subscriptions. But you also have like a control plane integrated in the control center. So you might also be able to disconnect clients or manage subscriptions in the control center itself. But if you need a more customizable experience for your user, for a use case or a more custom dashboard in general, you might have to use InfluxDB and our InfluxDB extension to push all our HiveMQ metrics to an InfluxDB database. And then you can monitor your HiveMQ instance by using a graph on a dashboard on top. But since the release of InfluxDB 2.0, I think, they introduced this really nice InfluxDB UI with with which you don’t need a graph on a dashboard anymore. So no third party solution needed, just HiveMQ and InfluxDB, which is pretty nice. Till Seeberger: 00:13:37.042 And you also have many other solutions which you could use for monitoring, for example, the REST Interface, Prometheus, and Splunk streaming. So what metrics does HiveMQ actually offer? So in HiveMQ, we have around 1,000 predefined metrics available. And these can be pushed to InfluxDB by using an InfluxDB extension, but you can also access them programmatically via an extension. And with our Extension SDK. And this is all based around the metrics, and the Dropwizard metrics framework. And this allows you to dynamically extend metrics with your own metrics. Yeah, and also access our predefined metrics and programmatically. So Dropwizard offers you these five metric types. So gauge, timer, counter, meters and histogram. So a really commonly used and one of the most important metrics, I would argue, would be the current total number of active MQTT connections. So all metrics, all predefined HiveMQ metrics are prefixed with com.hivemq. And followed with the specific metric name. So, for example, networking connections current and, yes, I already said with returns you the total number of active MQTT connections. And this you would typically visualize by using a line graph and aggregate this over the last 10 seconds. And if you now see a significant unsuspected drop of this same value in your dashboard, in your graph, this might hint to a problem in your infrastructure, and this could lead you to analyzing a specific time frame where you want to go into your further analysis. Till Seeberger: 00:15:36.838 So for a list of all our available metrics, you can go to our user guide and just look up the monitoring part. So now let’s see how you would access a metrics programmatically via our extension SDK. As I already told you, we used the Dropwizard framework, and this basically exposes us a so-called metric registry. And we fill this metric registry by our own predefined metrics. But you can also access this metric registry with our “Services” API, and then you can access the specific metric which may be predefined by us by using the getMetrics get method. But you can also now add your own metrics and your own custom extension and by, for example, using the timer function to create a timer which depends on what metric you want to add. And then you would set your metric by using the specific functions for those metrics. So for example here, .time or .stop. And then if you have an InfluxDB extension configured, this metric would also be sent to the InfluxDB. Till Seeberger: 00:16:51.550 So as Anja already told you, an extension is basically a simple program written in Java, which extends Hive MQ broker functionality, and with this you can seamlessly link in your own business logic to events, messages and content that is processed by HiveMQ. So a common use case would be to maybe intercept the connect packets. So if an MQTT client connects to the HiveMQ broker and you put intercept this and in this case, maybe add your own metric for specific details you want to read out from this connect packet. And also a comprehensive documentation, and examples for HiveMQ extensions in general, and how to use the extension SDK can be also found in our documentation on our website. So as Anja already told you, the HiveMQ InfluxDB extension is a really commonly used extension, and you can — So it basically just takes the metrics from Dropwizard with that and pushes them to your InfluxDB and you can get this extension, and from our marketplace under the download with the download button. And this will basically give you a zip file, which you just need to unzip. And this is basically the extension for the unit. Till Seeberger: 00:18:16.335 You can also download and clone and our GitHub repository and build the whole extension yourself or use it to do specific changes for your use case and for the extension itself. So after this, you might need to configure your InfluxDB extension and therefore you would just copy the unzipped folder into the HiveMQ extension home folder. And after that, you might need to configure your HiveMQ InfluxDB extension by using the properties file called InfluxDB.properties and there you could set your things like the host, the port or maybe your authentication token and which you need to authenticate to InfluxDB. So, yeah, now let’s see. And now let’s put this all together and see a short demo on this. So here you see I will put up a HiveMQ community edition broker, and install an InfluxDB extension to it. Then I will use this broker to periodically push the metrics from HiveMQ to an InfluxDB bucket called HiveMQ. And then I also will show you a small dashboard with the most important HiveMQ community addition metrics for this. And yeah, if everything is set up, I will simulate a small MQTT scenario which will publish with a rate of around 1,000 publishers per second, and will also receive around 1,000 publishes per second from a HiveMQ community edition broker. Till Seeberger: 00:20:01.298 So yeah. Now let’s get into this demo. As you see here in my finder, I’ve already downloaded all the things I need. So the HiveMQ Community Edition, the InfluxDB Extension, HiveMQ Swarm and also I’ve already preconfigured my own dashboard, which I will import, and a comment to run InfluxDB which we will now have a look at. So this is just a plain, simple docker command, which will run an InfluxDB on port 1886 and will set up InfluxDB with a specific username and password, and also initialize an organization and a bucket for it. And as you can see here, we are using an InfluxDB 2.0 because we use it for the dashboards. So we will do this part first by using the right command. And this might take some seconds to start, but as soon as InfluxDB has started, we should be able to go to localhost 1886 and access our InfluxDB. So now we need to authenticate our InfluxDB extension from our HiveMQ edition to InfluxDB and therefore we need authentication token. And for simplicity, I will just use the admin’s token for now. So I copy and paste this admin’s token, and now I can configure my HiveMQ InfluxDB extension. Till Seeberger: 00:21:44.185 So as I already told you, we go into the influxdb.properties file, therefore, and have to insert our authentication token right here at the authentication property. And you might need to change little things for your specific deployment. For example, if you’re not using localhost, obviously, you might need to add your host here. But that’s it for the configuration for us for now. And now we will open a new HiveMQ community edition folder and there you see an extensions folder. And in this extensions folder, we will just drop in a HiveMQ InfluxDB extension. And that’s the whole installation process for an extension in HiveMQ. So now we should be able to run our HiveMQ instance and by using the run shell script located in the bin folder. So this might also take some seconds. And there you see that the extension InfluxDB monitoring extension started successfully and also our HiveMQ started successfully in around five seconds. Till Seeberger: 00:23:02.323 So now we get this part. Now we can go back to our InfluxDB and explore the data HiveMQ is already sending to InfluxDB. And here you see that this bucket HiveMQ has created, and that all the metrics HiveMQ community edition offers is sent to InfluxDB. So, for example, as we have seen, I might want to have a look at the MQTT connections. So I go to this metric. Called com.hivemq.networking.connections.current, and then I would look at them in the last five minutes. And there you should see that I currently have zero connections on my MQTT broker. So now let’s change this, and we will just quickly put up the MQTT CLI with which we can simulate MQTT clients, go into the so-called shell mode. And in this shell mode, we can use a connect command to simply connect MQTT client to a broker. So I type connect, and it connected me and I add MQTT client to localhost, to our localhost broker. And you should see. But this is also quite fast and reflected in our InfluxDB dashboard. So I might also want to disconnect it to prove that this metric also goes down. And here you see that this is reflected. Till Seeberger: 00:24:41.428 Okay, now let’s close MQTT CLI and get to the last part of this demo. So I have already preconfigured a dashboard which we will now import. So it’s just a plain simple JSON, which we can import by going to boards and then using the import dashboard button here, pasting out JSON in this panel. So there you see it, HiveMQ dashboard was successfully imported. And here you now see a simple dashboard for MQTT metrics. So MQTT connections, the total amount of publishes which were received by HiveMQ, the total publishes HiveMQ sent, and the subscription which are currently present on HiveMQ, also the rate of incoming publishes and outgoing publishes and also some networking traffic. So the incoming bytes per second, outgoing bytes per second and the total bytes read from the network. So, as I already promised, we will now simulate a small scenario by using HiveMQ Swarm, and I’ve already preconfigured the scenario itself. So as I said, we will publish with the rate of 1,000 publishes per second and we will receive 1,000 publishes per second also to HiveMQ Swarm. Till Seeberger: 00:26:11.599 So to start HiveMQ Swarm, we just execute the binary HiveMQ Swarm in the win folder and it should just take a few seconds to start. Here you see that stage one started and it’s in progress. And this was basically connecting all our clients. And stage two is now publishing, basically. And if I now update to the last five minutes and set the refresh into five seconds, you should see that the scenario is in progress. So you see that we have 500 clients connected to our broker and their publishes is incoming, more and more publishes incoming, and also publishes outgoing. So half of our MQTT connections are subscriptions, so we have 250 subscriptions and which receive outgoing publishers from HiveMQ. Till Seeberger: 00:27:04.002 So also in these two metrics, and these two panels, you see that we have our current incoming rate of the promised 1,000 publishes per second, and also an outgoing rate of 1,000 publishes per second. And here you see the current traffic which is generated on HiveMQ. So you see that 30 kilobytes per second are currently written to HiveMQ. And HiveMQ is writing 15 kilobytes per second currently. Okay, so that’s it for the demo. I hope you learned something new from this. And Anja, feel free to take over anytime. Anja Helmbrecht-Schaar: 00:27:47.693 Okay, thanks Till. So this is my screen, hopefully this is it. And so our next topic is that we — I hate this, that we will talk about how, yeah, is the way to visualize IIoT data in the now kind of generic way. That’s the point here, maybe. And when you look at Classico or the status quo at IIoT systems, you have often some of these challenges here. So maybe you have still a client server architecture where you have many integration points and a couple of devices. And with this you have maybe devices and endpoints that have different topic payloads and different data structures. Maybe the data agnostic is given, the payload must be also [inaudible]. But there is not always the context available for this. And also the applications, assuming some specific formats and some structures that have to be available. Anja Helmbrecht-Schaar: 00:29:15.243 So this is something that is today often the case, and with this it is really hard to implement something that our unique approach to visualize your data. But why this is the case and there are a group has built up — and to think about how it could be better to have to use MQTT, and on top of MQTT define something that makes it easier to work and have access to all the data from the devices in IIoT infrastructure. And this is, for sure, not only for the metrics — it’s a point. It’s also for all the data and what you want to do with this data. It is really important. And for this, the Sparkplug group was built up. I think it was last year. And this project is hosted under the Eclipse organization. And the idea is that they use MQTT. And on top of MQTT, they try to build a simple and open specification that has exactly these targets that you can really have interoperability between the IIoT devices and the applications, that it is really easy to maintain and easy to handle. And to come to this target, they defined three things. So there are three major things in the end specification. Anja Helmbrecht-Schaar: 00:31:05.121 The first thing is that they define a unique topic namespace so that all the participants in this infrastructure knows the namespaces and they have a kind of ontology around, and that is well known for all the participants. The second thing is that they use a unique — or the Sparkplug defines a data model and structure, so that all the components know these — they know how to interpret the payload and they know how to build the payload and how that — and what kind of payload are available. So because there is simply a schema defined and with a data model that fulfills the conditions to share all the data between the devices. And the third part of this Sparkplugs specification is that it shows a mechanism how the MQTT estates can be handled and can be managed. And so that in the infrastructure, every device, every participant that is interested in the state of a device can get the information about these devices. Is it online or not, and so on. Anja Helmbrecht-Schaar: 00:32:31.013 And this specification or these concepts will be built on top of MQTT with the concept of — So it’s based on MQTT3. Maybe there are some things, some MQTT5 features that would be really brilliant to fit, but yeah. To have more interoperability, the MQTT3 is now the base. And they use the concept of the last will and testament. And so the last will and testament, this is a concept that you send during the connect, a kind of predefined message that will be sent out if the device goes offline. And they also use the mechanism of retained messages. And so a retained message is a message that stays on the topic. It’s only one message that stays on the topic. And for each participant that is subscribing to this topic, he will at first get this retained message. And with this, you can really manage an online/offline state. So this is the classical way in MQTT to manage the status information for devices. And then Sparkplug, so it’s not looking at security and some of these things because this is something that can all be handled with MQTT and with the latest TCP IP security technologies. So this is everything is provided by MQT itself and this specification is this open, and it’s standardized so that you have no vendor lock-in. Anja Helmbrecht-Schaar: 00:34:28.910 So when we have these things all together, and we look to our infrastructure or our architecture, then the architecture looks completely different — not completely different. We have the same participants and also these HiveMQ or the MQTT broker at least, which is the central component. And we have here now our old participants, now a little bit reordered, so we have here the SCADA IIoT host that is the SCADA system represented in this architecture. And this is now interacting directly with the MQTT broker as a specific MQTT client. And you have here other MQTT — or other applications that have at least an MQTT client inside that it is able to read and communicate with Sparkplug specification. And here on the other side, you have Etch nodes. These are nodes that are Sparkplug enabled, and also are responsible for devices and sensors that maybe have not a Sparkplug implementation available and communicate with other protocols. And these Etch nodes are working then as gateways to forwards and backwards information for the devices. Anja Helmbrecht-Schaar: 00:36:03.161 So when we look a little bit deeper into the Sparkplug, because we will use in our second demo a Sparkplug, and that’s why I have to introduce this a little bit more. I have here, this is our Sparkplug topic structure because it’s the predefined topic structure. And this is a snippet from a Sparkplug payload in JSON interpretation. So the payload is protobuf because it has a very small footprint, but it has a schema that can be very, very dated. And the typical piece of the payload is this metric piece here, where you have a name and a timestamp and at least a value. And when you look into the kind of data flow from an Etch node to the broker, so these things has been done. You have a connect message that has this death certificate inside as last will and testament, and then you publish the online state with the birth certificate, and the Etch node has to subscribe to some command, message types that are represented by this topic structure. And yeah, with these certificates, it is possible, if a connection lost is there, that all the other participants get this information, if this is necessary or if they are interested in. And if the Etch node is available again, then the data from the devices itself that are behind the Etch node and the own data can be published. And yeah, as I said, we are using for the messages, this retained feature from MQTT, and here is other subscriptions for this example. Anja Helmbrecht-Schaar: 00:38:19.231 So what we also need is a kind of Sparkplug extension. So we have started to implement Sparkplug extension, and this extension will be also available in the near future for public access. And so the first step is that our Sparkplug extension is implementing the starting and the stopping methods to have access to our HiveMQ metrics service. And the second thing is that — or the main part is that we created a kind of inbound listener so that each incoming message MQTT published message can be listened to. And depending on the payload and on the topic structure, the specific message can be, yeah, put into a metric, into our HiveMQ metrics object and with this then the metric can be visualized. It was our InfluxDB extension and with an InfluxDB dashboard. Anja Helmbrecht-Schaar: 00:39:32.032 So this is what I would like to show you now. So I think the setup is nearly the same, but we have also this Sparkplug extension here. And our scenario is a scenario that has that payload generated that stimulates Sparkplug payload and, yeah, is setting up so that a kind of Sparkplug scenario is built up. So this is a short or a brief description of what the scenario is doing. We have here two Etch nodes that are connecting and subscribing to these topics here to command topics of their [inaudible] and of the command topics of the devices. And here are the devices. So the devices are not MQTT clients. But they we are simulating that the clients, these Etch node MQTT clients sending the data from them. And on the other side, we have this kind of SCADA host simulated that is publishing the state and is subscribing to the whole group of these set up. And our Etch nodes published and data to the specific topics. Yeah. So let me show you how this looks in detail. Anja Helmbrecht-Schaar: 00:41:14.262 Yeah, this is our extension, and as I said, it’s, I think, some weeks, maybe one or two months, and this extension is also available on our marketplace. And we have here, so the main part is here that we have the extension start and to stop. So it’s really easy. Maybe you would like to try it by your own, and build your own extension. So that’s really not so hard. And this is inbound publisher. Yeah, inbound published interceptor that is reading all the published packets and getting the payload and the topic structure, and depending on some information about the topic structure. So we are validating this. And if the payload is present, then we put the payload into our Sparkplug object, or we pass the payload into a Sparkplug object. And then we can get access to metrics from our Sparkplug interface. Anja Helmbrecht-Schaar: 00:42:26.418 And so the Sparkplug schema is here. You see here there is the metric objects, for example, with name, alias, timestamp and the data type. So these are the things that we access to check what kind of data this is. And then we accessing the value and put this into one specific, yeah, metrics holder. So this is what we put then here. And then if it’s an integer, we put the integer into long and double and so on. So that’s all what happens. So now I have running my Sparkplug extension, where my HiveMQ with the Sparkplug extension here in the background. And I’m starting my scenario, so a short look here, this is how you can describe a scenario. Maybe it’s not too much too much time to explain. But we really use the setup of the Sparkplug specification, how the Etch nodes in their environment published data. And then, yeah, then I’m running this scenario. And when this starting, you can see on our dashboard, so it’s the same setup that we have our InfluxDB available and now you see we have our two Etch nodes connected. So they are online. They have sent these birth certificates and for each of them, so five devices per Etch node. All the devices have sent their own online status. Anja Helmbrecht-Schaar: 00:44:21.578 And as you can see, I have simulated some devices that send temperature data and some devices that send some level data. And I have also a device that is sending some power data. And so this is really random data, because I have no real devices in the background. But yeah, as you can see, this is an easy way to have a generic approach on getting the real data from the devices here. On our HiveMQ control center, you could look into the — you have topic structure and so on, yeah. Yeah, so this is, I think, more or less all, and now I’m — Yeah, we are open for questions. Caitlin Croft: 00:45:17.601 Awesome, thank you. So a lot of people had a lot of questions for you guys around Sparkplugs. So I think you covered this, but does HiveMQ support the Sparkplug B version of MQTT? Anja Helmbrecht-Schaar: 00:45:36.403 Yeah, so as I said, we — so MQTT is from the nature, is totally agnostic, but to really work with Sparkplug, you need a kind of Sparkplug extension or something like this. So from the MQTT side, HiveMQ is supporting everything because we support MQTT 100%. But the way how I denote this right now, so that you have a Sparkplug extension, this is something that we will have — So you can build this by your own with all the things from the Sparkplug group. But we will also have such an extension available in the next few weeks on our marketplace and as partly available. Caitlin Croft: 00:46:26.614 Awesome. Anja Helmbrecht-Schaar: 00:46:28.154 I hope this is answering the question. Caitlin Croft: 00:46:32.263 What is the maximum rate for publishing points per second using HiveMQ? Anja Helmbrecht-Schaar: 00:46:39.152 This is a really complex question because it depends totally on the amount of clients, on the quality of services, maybe, on the — Yeah, on the size of your HiveMQ cluster. And so we have implementations or infrastructures running where we have really millions of devices connected, and we have also things running so where the latency is really something that is very important. But I don’t know what number you listen. So having 20,000 messages per second is something that can be handled without any problem in a quite standard setup in the cluster. So this is what we often see, I would say. This is so. Oh, Till, do you want to add something? Till Seeberger: 00:47:43.519 Yeah. Just wanted to add that there’s no specific limit in HiveMQ for the publishes per second, actually. So it really depends on your machine and what your specific use case can actually handle. Caitlin Croft: 00:47:57.995 Does the protobuf payload size impact the number of points? Anja Helmbrecht-Schaar: 00:48:07.931 So. We have also customers that — so the Portagraf, I think this is not a really heavy payload because it is, yeah, protobuf is compiled at the end or binary. And this is then not so much. And we have also customers that are sending really much, much bigger messages around. This is not something where we have some doubts on it. Absolutely not. Caitlin Croft: 00:48:48.828 Right. The code that you used for the demo — will you be able to share it with us? I know a few people were asking for that. Anja Helmbrecht-Schaar: 00:48:58.243 Yeah. What code is the question? And so the Swarm, HiveMQ Swarm is something that is now available, public available. And the scenario is something that I could send over. But yeah, the system. And but the extension is something that is, as I said, in some weeks also available on our marketplace and also for free. So that’s not the point. Caitlin Croft: 00:49:35.942 Perfect. Yes, someone was asking if this Sparkplug extension is an open source project, so I’m assuming it is and will be made available soon. Anja Helmbrecht-Schaar: 00:49:45.852 Mm-hmm. Caitlin Croft: 00:49:46.303 Okay. Right. Let’s see. Someone was also asking about the dashboard that you showed. Is that available on the marketplace? Till Seeberger: 00:49:59.391 So, yeah, both of our dashboards which we have shown and the demos are currently not available anymore, as far as I’m concerned. Yeah, but we might be able to also release a dashboard anywhere in the future, I think. Right, Anja? Anja Helmbrecht-Schaar: 00:50:20.694 Yeah, sure. So normally, so when the customer has to use HiveMQ and InfluxDB, they have often very different needs what is on the dashboard and whatnot. And that’s why we — so this is not on our list that we provide dashboards, but we do this very often for customers and also some kind of standard dashboards that can be also available. Yes. Caitlin Croft: 00:50:53.273 Right. What happens to the data if the network is disconnected for a few minutes? Is the data stored locally by HiveMQ in this case? Anja Helmbrecht-Schaar: 00:51:08.652 Yeah. Do you want to answer, Till? I [crosstalk] steal you the show. Till Seeberger: 00:51:14.542 Yeah, yeah, it depends. So there is an MQTT feature called a Persistent Session, which you might use. And so that data is stored at the broker, and you can receive it if your client reconnects later. So, yeah, this would be a feature you might want to check out regarding this question. Anja Helmbrecht-Schaar: 00:51:34.058 Yeah, and this belongs also to the concept of Sparkplug. So what MQTT features should be used. And this is also one point. So there are features inside that is not each broker or so-called broker is really able to provide these features. So for example, retained messages is something that is not every broker is able to provide. And that’s why I explained this with these 100% MQTT features in the beginning, because you need all the features for Sparkplug for full implementation. Caitlin Croft: 00:52:19.863 Right. So there were a few questions. I know you kind of covered a little bit, but do you mind just covering briefly again the connection between HiveMQ, Sparkplug, and then getting the Sparkplug data into InfluxDB? Anja Helmbrecht-Schaar: 00:52:38.402 So by the way, we are also working or working to link it together also with the Sparkplug group. So there’s a really deep coupling of knowledge and we are really interested to build these Sparkplug extension and improve this also to have this fully available. And yeah, InfluxDB, this is something that is in the IIoT environment, something that seems to be set for the most use cases. Caitlin Croft: 00:53:26.812 Okay. Wow, that was a lot of questions around Sparkplugs. So I appreciate you guys answering all of them. Thank you, everyone, for joining. We’ll stay on here just for another minute or two more if you guys have any more last minute questions. I just want to remind everyone once again that we have InfluxDays coming up on May 18th and 19th. The conference itself is completely free. And we also have a hands-on Flux training on May 10th and 11th. There is a fee attached to the Flux training. This is just so we can ensure a really great student-to-teacher ratio. And then on May 17th, we have our free Telegraf training coming back. So we offered the Telegraf training for the first time last fall, and it was very successful. And so we’re offering it again, and we’ve actually increased the number of available seats. Caitlin Croft: 00:54:30.454 So be sure to check out the InfluxDays website and register for it. We’re super excited to see you all there. It’s a lot of fun. It’s always interesting having the large-scale virtual events and I got to say, our InfluxDB community is amazing. Last year, yes, obviously we would have rather seen everyone in person, but we definitely had a lot of fun during the conference and over Slack, so glad to see everyone there. Thank you, everyone, for joining once again this session has been recorded. And the recording and the slides will be made available later today. Anja Helmbrecht-Schaar: 00:55:11.798 Okay. Caitlin Croft: 00:55:15.427 Thank you. Anja Helmbrecht-Schaar: 00:55:15.716 Thanks. Bye. Till Seeberger: 00:55:17.633 Thanks. Till Seeberger Software Engineer, HiveMQ Till is a software engineer at HiveMQ GmbH, the software manufacturer of Enterprise MQTT Broker HiveMQ, one of the world's leading MQTT experts. Currently Till is working on improvements of the HiveMQ broker, and beside this, HiveMQ's open source tool MQTT-CLI — a command line interface for MQTT messaging — is maintained by him. Anja Helmbrecht-Schaar Senior MQTT & Architecture Consultant, HiveMQ Anja works as Senior MQTT & Architecture Consultant at HiveMQ GmbH. Anja supports customers in the application-specific implementation of HiveMQ extensions as well as the introduction and integration of HiveMQ into the system landscape. As an MQTT expert, she holds workshops around the protocol and the broker.
https://w2.influxdata.com/resources/how-to-use-influxdb-to-visualize-and-monitor-mqtt-messages-in-an-iiot-system/
CC-MAIN-2022-33
refinedweb
7,376
73.27
Tagging. A common use of tags, which we all already know, is by Twitter to collect tweets around a certain topic related to the (hash)tag. Tools - Rails 4.1.4 - Ruby 2.0.1 - Foundation 5 Getting Started The enitre source code of this application can be found in this repository First, create your Rails project: rails new TaggingTut Then, add the foundation-rails gem to the Gemfile, are remove the turbolinks gem. Run bundle install. We will use sqlite, the default database used by Rails Remove this line from app/assets/javascript/application.js., since we removed the turbolinks gem. //= require turbolinks Creating Tags Generate the model for tags with a single attribute, name: rails g model tag name:string We will index the name attribute ( index: true) to speed up our search with these tags. I recommend this tutorial for using indexes in Rails associations. Tags have many Posts, and Posts can have more than one tag. As such, the relationship will be many-to-many. We can represent this association in Rails in two ways: First: Use a has_and_belongs_to_manyassociation. This will generate the join table in the database, but there wont be a generated model for the join. So, you won’t be able to add validations or any other attributes to the join. Second: Use has_many, throughwhich requires a model to be created for the join table. This way is preferred for most cases, so we will use it. Create models “Post” and “Tagging”, as well rails g model post author:string content:text rails g model tagging post:belongs_to tag:belongs_to After creating these models, run rake db:migrate. Now, we will create associations between posts and tags through ActiveRecord as follows: app/models/post.rb has_many :taggings has_many :tags, through: :taggings app/models/tag.rb has_many :taggings has_many :posts, through: :taggings app/models/tagging.rb will be generated like so: belongs_to :post belongs_to :tag We now have a join between posts and tags through the taggings join table. Now, we will need to handle the creation of tags as part of the post create action. So, we will define a method to take all the entered tags, strip them, and then write each tag to the database. The Post model had two attributes, author and content, which are also defined in the current form. An attribute for all_tags will be added to the form data, as well. In Rails 4, add the desired (virtual, in this case) attribute using strong parameters. Virtual attributes are very simple, in this case defined as a getter and setter methods. The strip function is for removing whitespace app/models/post.rb def all_tags=(names) self.tags = names.split(",").map do |name| Tag.where(name: name.strip).first_or_create! end end def all_tags self.tags.map(&:name).join(", ") end The all_tags function will be customized to render all the tags separated by commas. Before creating the controller and views, install Zurb Foundation: rails g foundation:install Now, customize the controller and views for rendering the posts including all the tags. Create app/controllers/posts_controller.rb by typing: rails g controller posts index create Specify the strong parameters as follows, including our virtual attribute to hold all the tags entered through the view: private def post_params params.require(:post).permit(:author, :content, :all_tags) end The permit method creates a whitelist of parameters to be allowed to pass. Read more about about strong parameters here Let’s create the form with a text field for tags. We will create the post using AJAX. It’s pretty simple: app/views/posts/_new.html.erb <div class="row text-center"> <%= form_for(Post.new, remote: true) do |f| %> <div class="large-10 large-centered columns"> <%= f.text_field :author, placeholder: "Author name" %> </div> <div class="large-10 large-centered columns"> <%= f.text_area :content, placeholder: "Your post", rows: 5 %> </div> <div class="large-10 large-centered columns"> <%= f.text_field :all_tags, placeholder: "Tags separated with comma" %> </div> <div class="large-10 large-centered columns"> <%= f.submit "Post", class: "button"%> </div> <% end %> </div> __remote: true__ is the attribute that tells the form to be submitted via AJAX rather than by the browser’s normal submit mechanism. After creating our post, create will redirect to the index action and view the existing posts. app/controllers/posts_controller.rb def index @posts = Post.all end app/views/posts/index.html.erb <div class="row"> <div class="large-8 columns"> <%= render partial: "posts/new" %> </div> </div> Don’t forget to handle the routes. config/routes.rb root 'posts#index' resources :posts, only: [:create] Add some very simple styling to the view as follows: app/assets/stylesheets/posts.css.scss .tags-cloud { margin-top: 16px; padding: 14px; } .top-pad { padding: 25px; } .glassy-bg{ box-shadow: 0px 3px 8px -4px rgba(0,0,0,0.15); background: white; border-radius: 4px; padding-bottom: 12px; } .mt{ margin-top: 10px; } .mb{ margin-bottom: 10px; } .pt{ padding-top: 10px; } .pb{ padding-bottom: 10px; } Run rails s and let’s see what we have. Oops, there are no posts!. We never wrote the create action. app/controllers/posts_controller.rb def create @post = Post.new(post_params) respond_to do |format| if @post.save format.js # Will search for create.js.erb else format.html { render root_path } end end end This snippet creates a new Post with the parameters specified by the user, checking whether it’s valid and returning the result. Since the form is submitted with AJAX, the respond format is js. Now, we need to create the create.js.erb file to hold the javascript that will run after creating the post: app/views/posts/create.js.erb var new_post = $("<%= escape_javascript(render(partial: @post))%>").hide(); $('#posts').prepend(new_post); $('#post_<%= @post.id %>').fadeIn('slow'); $('#new_post')[0].reset(); This code renders a partial view of the newly created post, the prepend function allows it to be rendered on top of the old posts with a fadeIn effect. Create a partial that will render each post: app/views/posts/_post.html.erb <%= div_for post do %> <div class="large-12 columns border border-box glassy-bg mt pt"> <strong><%= h(post.author) %></strong><br /> <sup class="text-muted">From <%= time_ago_in_words(post.created_at)%></sup><br /> <div class="mb pb"> <%= h(post.content) %> </div> <div class="tags"> <%=raw post.all_tags %> </div> </div> <% end %> Before we check the output, modify the index view to hold the partial for posts: app/views/index.html.erb <div class="row mt pt"> <div class="large-5 columns"> <div class="top-pad glassy-bg"> <%= render partial: "posts/new" %> </div> </div> <div class= "large-7 columns" id="posts"> <%= render partial: @posts.reverse %> </div> </div> Posts will be in reverse order from top to bottom, meaning, the most recenlty entered post will be first. At this stage, we have posts with tags stored in the database using the two tables, tags and taggings . The taggings table saves the association between posts and tags. Here’s what our posts look like: Tag-based Search In this section, we will create scope-based searches on tag name. Create a class method called tagged_with(name) which will take the name of the specified tag and search for posts associated with it. app/model/post.rb def self.tagged_with(name) Tag.find_by_name!(name).posts end Create an instance variable holding the results on the controller. app/controllers/posts_controller.rb def index if params[:tag] @posts = Post.tagged_with(params[:tag]) else @posts = Post.all end end Add a get route to hold the tag name and point to the posts_controller#index method: config/routes.rb get 'tags/:tag', to: 'posts#index', as: "tag" After that, change the tags of each post to be links to the ‘index’ method, as follows: app/views/_post.html.erb <%=raw tag_links(post.all_tags)%> tag_links(tags) is a helper method which will hold the logic of converting the tags to links. app/helpers/posts_helper.rb def tag_links(tags) tags.split(",").map{|tag| link_to tag.strip, tag_path(tag.strip) }.join(", ") end Yay! Now, we have tag-based search for our posts! Tag Cloud Let’s generate one of those cool tag clouds based on counting the number of occurrences for each tag across all posts. First, create a method to count all tags associated with posts: app/models/tag.rb def self.counts self.select("name, count(taggings.tag_id) as count").joins(:taggings).group("taggings.tag_id") end This query groups the matched tag_ids from the taggings join table and counts them. We will style them according to their counts by creating a helper method called tag_cloud which take the result of calling the counts function and CSS classes. app/helpers/posts_helper.rb def tag_cloud(tags, classes) max = tags.sort_by(&:count).last tags.each do |tag| index = tag.count.to_f / max.count * (classes.size-1) yield(tag, classes[index.round]) end end This helper method will get the tag with the max count. Then, it loops on each tag to calculate the index which will choose the CSS class based on rounded value. Then, the passed block will be executed. We need to add styles for different sizes as follows: app/assets/tags.css.scss .css1 { font-size: 1.0em;} .css2 { font-size: 1.2em;} .css3 { font-size: 1.4em;} .css4 { font-size: 1.6em;} Don’t forget to add *= require tags to application.css. Finally, add the code to display the tags in the view and apply the CSS classes to them. app/views/posts/index.html.erb <div class="tags-cloud glassy-bg"> <h4>Tags Cloud</h4> <% tag_cloud Tag.counts, %w{css1 css2 css3 css4} do |tag, css_class| %> <%= link_to tag.name, tag_path(tag.name), class: css_class %> <% end %> </div> Check it out, our tags are in a cloud! actastaggable_on After this article, you should be able to handle the act_as_taggable_on gem without issue. You can read more about it on its github repo. Conclusion I hope this tutorial helps you understand what goes into creating a basic tagging system. Tag, you’re it! :)
https://www.sitepoint.com/tagging-scratch-rails/?utm_source=sitepoint&utm_medium=articletile&utm_campaign=comments&utm_term=ruby/
CC-MAIN-2020-10
refinedweb
1,661
59.8
Hi everybody :-) this is my first post... I'm hoping to learn C++ so that I can change my career and get out of the crappy Logistics industry!! I'm a total programming noob (C++ is my first language I'm learning) and I'm a little stuck. Just as an exercise I'm trying to manipulate individual elements of a private char array (using the member function setChar here). This is my code: insertThat which I've highlighted in bold, the setChar function, is what is causing this basic program to crash.That which I've highlighted in bold, the setChar function, is what is causing this basic program to crash.Code: #include <iostream> #include <string> using namespace std; class Cat { public: Cat() {itsAge = new int; *itsAge=3; itsName = new char[10];} Cat(int age) {itsAge = new int; *itsAge = age; new char[10];} ~Cat () {delete itsAge; itsAge = 0; delete itsName; itsName = 0;} int getAge () const {return *itsAge;} char* getName () {return itsName;} char getChar (unsigned short offset) {return itsName[offset];} void setChar (int x) {itsName[x] = 'J';} void setName (char* NewName) {itsName = NewName;} private: int *itsAge; char *itsName; }; int main () { Cat Furball; Furball.setName("Furball"); cout << Furball.getName() << "\n"; cout << Furball.getChar(0) << "\n"; Furball.setChar(0); cout << Furball.getChar(0) << "\n"; return 0; } Can anyone help before windows lives up to its name and get's thrown out of my living room one?!! Cheers :-)
https://cboard.cprogramming.com/cplusplus-programming/114177-manipulating-private-individual-char-elements-printable-thread.html
CC-MAIN-2017-22
refinedweb
235
62.17
Contents What is it? XmlRpc is an API to remotely call an application, remote procedure call, embedded in XML, usually transported over the net via HTTP. This sounds complicated when you first hear about it. The good news is that wiki XmlRpc is very easy to use, it doesn't require XML, RPC or HTTP protocol knowledge. XmlRpc is for calling remote procedures (it internally uses XML and http(s)). Wiki XmlRpc is a standard for a interface to a wiki using xmlrpc. Usage cases: - automatically get pages out of or into a wiki - automatically get rendered pages out of a wiki - automatically get link structure out of a wiki Example code That's all you need to get the complete content of a wiki via Wiki XmlRpc. All results will be utf-8 encoded, so make sure your terminal supports them (or add .encode('iso8859-1') to the strings). MoinMoin Wiki XmlRpc versions Note that XmlRpc putPage does not use the page name you give as parameter but PutPageTestPage - except if you change the code in wikirpc.py (on your own risk). This is to avoid major problems until the code is better tested / security checked. v1 MoinMoin/wikirpc.py implements version 1 of the wiki xmlrpc standard (you get it by action=xmlrpc). Using v1 is relying on a ready-to-use standard. But it is also a bit strange, because when v1 was made, the XmlRpc specification defined String type to be ASCII. Because of that, v1 had to encode (utf-8) strings either as URL encoding (using %XX) or base64 encoding - and that was a bit annoying (especially regarding python XmlRpc by default uses XML with utf-8 encoding anyway). v2 MoinMoin/wikirpc.py implements upcoming version 2 of the wiki XmlRpc standard (you get it by action=xmlrpc2). As the XmlRpc standard changed to drop the demand for a String to be ASCII-only, v2 will use UTF-8 Strings directly with no encoding. That's much more comfortable to use. base64 might be used for binary files like attachment, but not for page names or page content. Also, v2 will have some other features not implemented yet. Extensions - searchPages(querystring) returns a list of tuples (pagename, text with hightlighting) - still testing/may change in the near future Links WikiRPCInterface (v1) and WikiRPCInterface2 (v2) Ideas LionKimbro had the good idea to modularize XmlRpc using plugins dynamically loaded like it is done for macros currently - this is implemented in moin 1.2 and later. How to tell whether a page exists or not? A script to append to wiki pages first calls getPage - but getPage fails & returns a dict instead of string if the page doesn't exist One can test whether the result of getPage was a string & use '' if not - but this risks replacing the entire page incase of some other error Would be nice to explicitly check whether the page exists or not Thanks! -- JackBates 2005-11-26 04:19:47 Authentication For Apache based servers, http auth should work. See the examples in MoinMoin/scripts/xmlrpc-tools. For Twisted server, moin 1.3 supports getting the user name, but not the password. This is why there are those insecure and trusted config switches - you need them for that case (see also MoinMoin/wikirpc.py, search for putpage). For moin 1.5 we try to make both Apache and Twisted working correctly with http auth. How about the case that the user authenticates to the WikiRpc script - or the script performs some action like verifying a PGP signature & obtaining the signer's wiki username In this case the script authenticates to the wiki using http auth, but needs to set the acting username for changes to be correctly attributed Is this possible? - putPage lacks an argument for the username making the change -- JackBates 2005-11-23 23:09:48 v3? Cannot judge that exactly but communication between wikis in a farm and/or with remote wikis seems to grow with comment pages, AccessibleMoin, SisterSites and the idea to use a farm like TWikiWebs or Mediawikis namespaces. This might put forward the need to have an enhanced version 3 of WikiRpc maybe. A version... that works neatly together with the different authentication methods of Moin, so that e.g. some can also search remote, friendly wikis with FeatureRequests/SearchWikiFarm if he is already validated by NTML if the user/ rpc caller is authenticated that he also can put a username with put_page? (as wanted by JackBates) I would like to see that FindPage returns a tuple of (number_pages_searched, search_result_list), also only TitleSearch should be possible with (number_pages_searched, search_result_list), also the retrieving of results of xapian search?? Currently you can get the total number of pages searched only by getting the whole list of pagenames and then doing a len(..) operation on it throwing away the rest. This is not efficient on big wikis gets even worse on remote wikis (much traffic). Partly done except xapian Is it possible to explicitly check whether a page exists or not in a remote wiki (JackBates)? = Check on existence of SisterSites Is possible! Can do the changes for the search stuff (xapian excluded), but I have no knowledge on or testing environment for the authentication stuff... -- OliverSiemoneit 2006-12-04 17:18:48 Here is a first version for the new search functions.. but I did not test them.. wikirpc.py -- OliverSiemoneit 2006-12-04 19:36:00 Users What users does this functionality have? That is, who's using it, and what for? I didn't find any obvious place to look for what I've written, nor to see it's duplicated work. AndersEurenius Extra actions MoinMoin wiki xmlrpc support has plugin architecture. There is one project providing a set of xmlrpc plugin. The plugins allow user to 'rename', 'delete', 'putNameWithAttributes' via xmlrpc. Using XML-RPC to read/list/rename/save I've spent some times to get MoinMoin remoting (with auth) possible. I have write-up the details on here: You can also found a script which wrapped the 'read'/'list'/'save'/'rename' operations.
http://www.moinmo.in/WikiRpc
crawl-003
refinedweb
1,019
54.22
Hey readers! This blog is all about ES6. It includes all the topics related with examples. Before reading further, I want to specify that this was not a blog post initially, these are just my personal notes that I use as a reference guide, so I apologize for any misspells here :) Table of Contents Notes let/const Before moving to the point, let us understand two concepts here: - Global Scope - Variable is declared outside the function. This variable is accessible inside every function present in the code. - Function Scope - Variable is declared inside (within) a function, outside that it is not accessible anywhere. - Block Scope - In short, block scope means variables which are declared in a { } block are not accessible outside it. This block can be an ifstatement, for/ whileloop, etc. var: function/ global scoped. Eg: → as you can see, var is both global and function scoped, which often creates a confusion. So avoid using it. var name = 'Jack'; // global scope function message() { var msg = 'Hey Jack!' //function scope } console.log(msg); // ERROR The above line of code will throw an error as there's no variable msg outside the function message (where we have logged the variable). So it will show as undefined. let: block scoped. Eg: → let keyword can't be redeclared: let x = 1; let x = 3; result: SyntaxError - redeclaration of let x But when we use let inside a function, it works like: let size = "big"; function box() { for (let x = 0; x < 7; x++) { console.log(size); //Output: ReferenceError - `size` is not defined let size = "small"; console.log(size); } } box(); // small console.log(size); //big Inside the function box() when we log the value of size, it shows a reference error. That is because, let is block scoped. Anything inside curly braces { } is block scoped. In the above scenario, the function box() is a block. const: block scoped. Eg: const are very similar to let except that they can't be changed and redeclared. const m = 8; console.log(m); //m = 8 m = 5; // 🚫 this will throw an error console.log(m); // Uncaught TypeError: invalid assignment to const 'm'. } → therefore let and const are preferred over var keyword for declaring variables. Objects - objects are written within curly braces { }as collection of key:value pairs. key: property name value: value of that property - Creating an empty object: const car = { model: 'Tesla', color: 'black', price: 800 } Talking specifically about ES6, before ES6 we had to specify both (key, value) even if both are of same names. function Boy(name, age) { return( name: name, age: age ); } ES6 help us to get rid of duplication when we have same key:value names. So now our code will look like this: function Boy(name, age) { return(name, age); } this this is a keyword. It basically returns a reference to the object it is placed within 💡 NOTE: - When we call a function as a method in an object, the thiskeyword returns a reference to that object. 👇 const user = { name: 'Mike'; call() { console.log(this); } } user.call(); // ⚙️ Output: {name: 'Mike, call: f} - But when we call the function alone, outside the object thisreturns the global object (browser window) and hence we get the result as undefined 👇 const user = { name: 'Mike'; call() { console.log(this); } } const myCall = user.call; myCall(); // ⚙️ Output: undefined Arrow Functions - Normally, before ES6: const square = function(num) { return num * num; } - In ES6: const square = num => num * num; array.map() If we have an array - const colors = ["red", "green", "blue"]; We want to map the objects. Now there are two methods, es6 one is shorter and easier. - normal case: const items1 = colors.map(function (color) { return "<li>" + color + "</li>"; }); - es6: const items2 = colors.map((color) => `<li> ${color} </li>`); Object Destructuring Let's say we have an object called girl such that it has 3 keys as follows: const girl = { name: "", age: "", country: "", }; - Normally, we would do something like this to get the values: const name = girl.name; const age = girl.age; const country = girl.country; - here, as you can see we have to repeat the object name girleverytime we want to get a value. This problem can be solved by object destructuring: const { name, age, country } = girl; this one line code works same as the previous code. So destructuring made our code shorter and easier to understand. - In case you want to use an alias (a different variable name) for your work: const {country: ctry} = girl; This above line of code means we've defined a new variable called ctry and set that equals to country. Spread Operator CASE I - COMBINING ARRAYS - If we want to combine these two arrays: const one = [1, 2, 3]; const two = [4, 5, 6]; - without ES6: const combined = one.concat(two); - With ES6: const combined = [...one, ...two]; - If we want to add things in-between: const combined = [...one, '9', '7', ...two ]; - If we want to clone an array: const myDupli = [...two]; CASE II - COMBINING OBJECTS - If we want to combine these two objects: const alpha = { name: 'Shreya' }; const beta = { age: 19 }; - In ES6: const combined = {...alpha, ...beta}; - If we want to add more properties in b/w: const gamma = { ...alpha, surName:'Purohit', ...beta, country: 'India'} - cloning an object: const betaV2 = {...beta}; Classes - Let us take an example of an object boyhere. We have a function called runinside it. Now if we've some bug in the future or we've to modify our function for a different object, it would be a long way. const boy = { name: "Sam", run() { console.log("running..."); }, }; - To overcome this and make our work easier, we use classes: class Boy { constructor(name) { this.name = name; } run() { console.log("running..."); } } - Now that we've created a class, let's try building our object again - const boy = new Boy("Samridh"); with this above class, we've implemented the run method in a single line of code. If someday we find a bug here, we've to modify it in just a single place {inside class Boy}. So this is the advantage of using classes in JS. Inheritance - If we have a class Boy such that - class Boy { constructor(name) { this.name = name; } run() { console.log("running"); } } - and we want to create another class (having similar properties + some specific properties of its own). We can do this using the keyword extends class Girl extends Boy { eat() { console.log("eating"); } } - we just created the class Girlhere. Let us now create a const using this - const myGirl = new Girl("Shreya"); - and we're done. This code basically means that now the const myGirlwill have the functions eat+ run+ constructorproperty of Boyclass. So we can use it like - myGirl.eat(); myGirl.run(); - Now let's say we want to create another constructor inside the Girlclass {which is extended from Boyclass, So the constructor inside this Girlclass is called derived class constructor.}. - We MUST HAVE TO call super()constructor inside the new constructor, otherwise we'll get an error (as using thisin derived class constructor requires super()class). Now this must be looking confusing, let's look at the example below - class Girl extends Boy { constructor(age) { this.age = age; } eat() { console.log("eating"); } } // *result - Uncaught ReferenceError: must call super constructor before using 'this' in derived class constructor* - calling super()constructor: class Girl extends Boy { constructor(name, age) { super(name); this.age = age; } eat() { console.log("eating"); } } const myGirl = new Girl("Shreya"); - In a child class constructor, thiscannot be used until superis called. Modules Sometimes we have many no. of classes declared in a single file. This makes the code long, confusing and messy. To avoid this, we separate these classes into different files and import them as a module into the main file. This is called modularity. Let's look it in action. Here's what our folder src will look like: // src/boy.js export class Boy { constructor(name) { this.name = name; } run() { console.log("running"); } } // src/girl.js import { Boy } from './src/boy'; export class Girl extends Boy { constructor(name, age) { super(name); this.age = age; } eat() { console.log("eating"); } } both Boy and Girl classes are private in the folder, in order to use them we made them public using the exportkeyword. We use importkeyword in line 1 of girl.js as it is an extended version of the Boyclass. Now half of the work is done. For now, these classes are not accessible in our main app.js file. For that we've to import them in our app.js file. We can do that by using - import { Boy } from './src/boy'; import { Girl } from './src/girl'; Default and Named Exports Named Exports - We can export more than one objects from a specific module. This is called named export. Eg: export class Car { constructor(model) { this.model = model; } } export function add(a, b){ return a + b; } - Here we exported a class Carand a function add. Default Exports - It is basically the main object that is exported from the module. It is generally used in case we've only a single object to export. Let's see how it is - export default class Car { constructor(model) { this.model = model; } } 💡 Now we don't need the import { Car } from "./car"; Instead, we use import Car from "./car"; in case of default exports. Default exports -> import Car from "./car"; Named exports -> import { Car } from "./car"; 👋 Woosh! You've made it to the end. Hope I've helped you somehow. I write articles like this whenever I've some spare time. Besides this, I share content related to web development daily on Twitter. Let's connect there! @eyeshreya If you like my articles, you can support me by buying me a cup of coffee here:
https://designctivity.hashnode.dev/es6-handbook
CC-MAIN-2022-40
refinedweb
1,609
67.04
APEX 4.2 Q: Is there a way of retrieving the X-Axis label from a Flash 3D Stacked Column Chart to be used for drill down to report on another page? The data for chart (simplified example to show issue): STORE JAN FEB MAR abc 10 20 30 def 15 25 35 This results in a chart with the x-axis being JAN-MAR and the y-axis being 10-35 and each stack in the column represents the store (abc,def). I can get the store and the value but what I need to be able to retrieve is the store and the month that was selected so I can drill down to the details that represent the value for that month. I cannot add the month to the original SQL as this would change the grouping. This chart is generated using one series. SELECT store_name store, sum(jan_total) jan, sum(feb_total) feb, sum(mar_total) mar FROM store_sales_pivot_mv WHERE calendar_year=2013 GROUP BY store_name Not sure if I can get the month label with one series or if I will have to make each month a separate series. BTW, I was able to get it to work as needed by creating a series for each month. Chart still looks the same but requires 12 queries to run instead of one. I am still interested if anyone knows how to get it to work when using one series as the original discussion details.
https://community.oracle.com/message/11129744?tstart=0
CC-MAIN-2017-43
refinedweb
244
70.57
Pages: 1 This not a flame but an effort clarifying what was said in "General Programming Forum" regarding languages what Arch consider as KISS (keep it simple). Not only as KISS but some languages are "evil". Not evil as its written but the way devs feel a language doesn't do or... I don't exactly know what they refer. It causes a confusion between devs (educated in programming) and eudevs (end user developers who learn on their own). In the said topic, PERL is evil and not KISS. Most likely BASH is also evil because its similar to PERL. Also PHP (not the OOP PHP). OOP based languages are considered as KISS, if I have understood correctly. Languages such as C and Python. My question here, what is the KISS in a language? In general OOP languages require a proper study and best if learned in a school. BASH and other similar languages any person with a logical mind, can understand and do simple coding with no pre-educated knowledge. Lean the basic and there you go. Offline hmmm, I'd probably have to vote for python here - python has the most straightforward syntax I've ever seen.... I mean, look at the feedparser module import feedparser f = feedparser.parse("") print f.title print f.entries[0].contents Offline Aye, ill agree on python (me a python user) Ruby looks pretty simple too. Lua is evil, really unusual iphitus Offline ruby is easy as well, and has alot of powerful features compared to python... the problem I have is that ruby is one of those "you want to do X? here's 397 different ways to do it" languages... Offline? Offline i don't consider lua evil, but the bit of C/C++ code required to call an external Lua function is pure evil. Offline ok then, Ruby is pretty simple, much of it is very human readable. One of it's ideals is to follow KISS philosophy. Lua is not as KISS and uses very unusual syntax, that I still find hard to comprehend. iphitus Offline I vote ruby... The "Ruby Way" is all about simplicity and direct approaches. Read "the pragmatic programmer" too. a good book. "Be conservative in what you send; be liberal in what you accept." -- Postel's Law "tacos" -- Cactus' Law "t̥͍͎̪̪͗a̴̻̩͈͚ͨc̠o̩̙͈ͫͅs͙͎̙͊ ͔͇̫̜t͎̳̀a̜̞̗ͩc̗͍͚o̲̯̿s̖̣̤̙͌ ̖̜̈ț̰̫͓ạ̪͖̳c̲͎͕̰̯̃̈o͉ͅs̪ͪ ̜̻̖̜͕" -- -̖͚̫̙̓-̺̠͇ͤ̃ ̜̪̜ͯZ͔̗̭̞ͪA̝͈̙͖̩L͉̠̺͓G̙̞̦͖O̳̗͍ Offline Offline Coke! Nothing says tasty like de-cokanized-coka-leaves. "Be conservative in what you send; be liberal in what you accept." -- Postel's Law "tacos" -- Cactus' Law "t̥͍͎̪̪͗a̴̻̩͈͚ͨc̠o̩̙͈ͫͅs͙͎̙͊ ͔͇̫̜t͎̳̀a̜̞̗ͩc̗͍͚o̲̯̿s̖̣̤̙͌ ̖̜̈ț̰̫͓ạ̪͖̳c̲͎͕̰̯̃̈o͉ͅs̪ͪ ̜̻̖̜͕" -- -̖͚̫̙̓-̺̠͇ͤ̃ ̜̪̜ͯZ͔̗̭̞ͪA̝͈̙͖̩L͉̠̺͓G̙̞̦͖O̳̗͍ Offline. Offline Python reigns supreme. Some PKGBUILDs: Offline. Offline Offline. AKA uknowme I am not your friend Offline Offline. Sweet, now I can play with myself. Offline s? Offline Pages: 1
https://bbs.archlinux.org/viewtopic.php?pid=98768
CC-MAIN-2016-40
refinedweb
487
77.33
AXIOM - Thanks Elliotte Elliotte, Thanks for the feedback on AXIOM. We have enormous respect for your work and am i have been an avid follower of your Cafe Con Leche and Cafe Au Lait for years now. I personally tried to contact you way back in Oct, 2002 about Axis 1.0 Release and got promptly snubbed. The emails you sent me privately will remain private. No need to bring them up again :) Let's switch to the topic of interest now. - Duly noted and agreed to the subtle distinction on phrasing for XOP/MTOM in our announcement. Very few of us are native English speakers. - "The Axiom API itself is too complex". Please see the Goals, Use cases and Requirements from our *OLD* wiki pages, we ask for too much from AXIOM w.r.t usage when developing web services. - The specific example you picked, the need for using a factory is because we wanted to be able to plugin a link list implementation or a array backed implementation and hence we used a factory. - I've created a bug report (WS-COMMONS-18) for the "use relative namespace URIs" issue. - Please give us a pointer to the locations where you found "Incorrect white space handling, and some serious mistakes with encoding detection" and we will fix it. Easiest way is to open a JIRA issue here. Now let me give u the spiel from our end: - AXIOM operates at various levels. Our Nightmare scenario is having to build the whole tree from the incoming stream. - AXIOM can give you an XMLStreamReader which is a composite of already built nodes as well as the original stream which is still unread. Xerces can't do that!. - Please see the following bug report (AXIS2-533) for a detailed analysis of the speed comparison between DOM4J, JDOM, Xerces2 and AXIOM in our *NIGHTMARE* scenario. Some performance charts are here. Please click on all 3 sheets tabs at the bottom. - Since we do so well in our *NIGHTMARE* scenario, obviously we do much better in the scenarios where we dont' need/have-to build the whole tree. - We have build a SOAP1.1 object model, a SOAP1.2 object model, a DOM3 object model and a SAAJ object model on top of the underlying llom (Linked List) implementation with minimal overhead in terms of performance. - We have integrated XmlBeans which is stax based as our databinding in Axis2, we also have our own native databinding called ADB. We have gotten AXIOM to work even with JaxMe using a SAX Bridge. There is support for JAXB 2.0 in the works. So as u can see AXIOM was built specifically to be able to work with existing data binding tools. - If you look at the OMDataSource, you can plug-in your own data binding with zero effort and make it work seamlessly with AXIOM - Guess what? You can build a Servlet endpoint for accepting SOAP messages with MTOM attachments using just AXIOM and nothing else. Thanks for listening. Elliotte, Thanks a ton for the feedback. Team, After a few iterations off-list with Elliotte, here's the list of problems and resolutions. - OMTutorial's examples show prettified output : FIXED (updated site with non-pretty output) - Using FileReader in OMTutorial is bad practice as it causes problems with non UTF-8 xml documents : FIXED (used FileInputStream instead of FileReader) - Warn/Throw error when users use relative namespace URIs : (Created an issue - WS-COMMONS-18 [1]). We need to decide how to handle this. Thanks, dims [1] Posted by: Davanum Srinivas | May 6, 2006 05:35 PM
http://blogs.cocoondev.org/dims/archives/004619.html
crawl-002
refinedweb
601
64.91
You may be aware that there are some 3-rd party add-ins for PowerShell that allow you to create charts and graphs from your PowerShell scripts. What you may not be aware of is that there is a free download from Microsoft that will allow you to do the same. The Microsoft Chart Controls for Microsoft .NET Framework 3.5 are a set of .NET classes that allow you to draw bar, line, pie, etc charts with relative ease. I’ve been using these for a C# project I’m working on, but I thought I’d write a short post to show how easy they are to use from PowerShell. If you want to follow along with the examples, you’ll need to install the following: PowerShell v1.0 (I used v2.0 on Windows 7, but don’t see any reason why v1.0 won’t do just as well) Microsoft Chart Controls for Microsoft .NET Framework 3.5 I’ll build a simple example script step-by-step. To use it, simply copy the individual sections into a file called something like “Chart.ps1”, then execute from the PowerShell command window. To create a chart the first thing you need to do is to load the appropriate .NET assemblies: # load the appropriate assemblies [void][Reflection.Assembly]::LoadWithPartialName(“System.Windows.Forms”) [void][Reflection.Assembly]::LoadWithPartialName(“System.Windows.Forms.DataVisualization”) System.Windows.Forms gives you the standard forms classes. While not necessary in order to use the Chart Controls, I’ll be using a form later to display the chart. System.Windows.Forms.DataVisualization is the main namespace for the chart controls. Next you’ll need to create a Chart object and set some basic properties: # create chart object $Chart = New-object System.Windows.Forms.DataVisualization.Charting.Chart $Chart.Width = 500 $Chart.Height = 400 $Chart.Left = 40 $Chart.Top = 30 Next you must define a ChartArea to draw on and add this to the Chart: # create a chartarea to draw on and add to chart $ChartArea = New-Object System.Windows.Forms.DataVisualization.Charting.ChartArea $Chart.ChartAreas.Add($ChartArea) Now for some data to display: # add data to chart $Cities = @{London=7556900; Berlin=3429900; Madrid=3213271; Rome=2726539; Paris=2188500} [void]$Chart.Series.Add(“Data”) $Chart.Series[“Data”].Points.DataBindXY($Cities.Keys, $Cities.Values) For simplicity, I’ve hard-coded some data on European cities taken from WikiPedia. As you’ll see later, it is just as easy to use data gathered or generated by the script itself. The final step is to display the chart on a Windows Form: # display the chart on a form $Chart.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Right -bor [System.Windows.Forms.AnchorStyles]::Top -bor [System.Windows.Forms.AnchorStyles]::Left $Form = New-Object Windows.Forms.Form $Form.Text = “PowerShell Chart” $Form.Width = 600 $Form.Height = 600 $Form.controls.add($Chart) $Form.Add_Shown({$Form.Activate()}) $Form.ShowDialog() If you put all of this together and run it, you should see a Window similar to the one below: The chart will re-size when you pull the edges of the form around. In fact, when displayed on a form like this the charts can be quite interactive and, for example, can be updated with live data. I’ll leave that as an exercise for the reader! So, we’ve got a fairly basic chart, but what tweaks can we make to improve it? First thing is to add a title and some labels to the axes: # add title and axes labels [void]$Chart.Titles.Add(“Top 5 European Cities by Population”) $ChartArea.AxisX.Title = “European Cities” $ChartArea.AxisY.Title = “Population” Although it is quite clear in this example which item is the largest, in some instances it might not be as obvious, so it is possible to highlight that item (as well as the smallest): # Find point with max/min values and change their colour $maxValuePoint = $Chart.Series[“Data”].Points.FindMaxByValue() $maxValuePoint.Color = [System.Drawing.Color]::Red $minValuePoint = $Chart.Series[“Data”].Points.FindMinByValue() $minValuePoint.Color = [System.Drawing.Color]::Green Let’s get rid of the extra white space around the chart: # change chart area colour $Chart.BackColor = [System.Drawing.Color]::Transparent Finally, those flat looking bars aren’t too interesting, so let’s give them a slightly 3D appearance: # make bars into 3d cylinders $Chart.Series[“Data”][“DrawingStyle”] = “Cylinder” Now, you should have something like this: A nice little chart, with minimal effort. This is all good, but your chart is gone once you close the form. Wouldn’t it be great if you could save a copy? Well, the good news is that you can. The code below adds a button to the form that saves the chart to your desktop when clicked: # add a save button $SaveButton = New-Object Windows.Forms.Button $SaveButton.Text = “Save” $SaveButton.Top = 500 $SaveButton.Left = 450 $SaveButton.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Right $SaveButton.add_click({$Chart.SaveImage($Env:USERPROFILE + “\Desktop\Chart.png”, “PNG”)}) $Form.controls.add($SaveButton) A couple of points about this button: - I also reduced the height of the chart to make room for the button, by changing the chart height set earlier in the script: $Chart.Height = 450 - As it happens, this button is not necessary, and you can call the save method directly from PowerShell, like this: # save chart to file $Chart.SaveImage($Env:USERPROFILE + “\Desktop\Chart.png”, “PNG”) - You should call “$Form.controls.add($SaveButton)” after creating the form object. This seems obvious, but I just wanted to be clear as the snippet above doesn’t show the rest of the code for the form and depending on where you paste it in, it may fail. If you’re more interested in a fully automated script with no GUI or user interaction, then you’ll be glad to hear that the Windows Form is not necessary at all – you can create, populate, configure and save the chart to file without ever displaying it. This is useful if you don’t actually want to see it there and then, but need it for a report or presentation later. Ok, so you’re not interested in European demography. In that case, let’s look at an example that is more useful if you’re a SysAdmin. As you know, with PowerShell it is trivial to gather certain system information. For example, here is how to gather information on running processes and display it in a (truncated) table: PS C:\Windows\system32> Get-Process | Format-Table Handles NPM(K) PM(K) WS(K) VM(M) CPU(s) Id ProcessName ——- —— —– —– —– —— — ———– 128 10 15848 15556 52 5580 audiodg 909 40 19888 33372 128 5.79 2368 CcmExec 1324 79 45556 53780 351 26.96 3924 communicator 57 7 2356 6404 74 0.06 668 conhost 665 13 1976 4128 48 2.56 364 csrss 509 19 3972 18040 112 9.86 452 csrss 116 15 29240 26832 139 43.98 3064 dwm 1171 148 56664 66612 307 38.08 1256 explorer Tables are good, but often a simple graph is better, especially in presentations. Let’s assume you want to show the top 5 consumers of physical memory (WS – Working set – in the table above). Normally, to show this in a table, you’d do something like this: Get-Process | Sort-Object -Property WS | Select-Object Name,WS,ID -Last 5 | Format-Table -AutoSize To add this to a chart, do this instead: # add data to chart $Processes = Get-Process | Sort-Object -Property WS | Select-Object Name,WS,ID -Last 5 $ProcNames = @(foreach($Proc in $Processes){$Proc.Name + “_” + $Proc.ID}) $WS = @(foreach($Proc in $Processes){$Proc.WS/1MB}) [void]$Chart.Series.Add(“Data”) $Chart.Series[“Data”].Points.DataBindXY($ProcNames, $WS) Apart from this change to how the data is gathered (and the chart titles), everything else in our script remains the same as before. This is great – once we have a script that shows a chart, we can easily re-use it to show other data. Obviously, if you’re going to use a lot of charts, then you probably want to organise the charting part as a separate function you can call when needed. So, this time, your chart should look something like this: As before, the largest and smallest columns are highlighted. If your data does not come pre-sorted, as it is in the example, the chart control can sort the data after it is bound to the control, like this: $Chart.Series[“Data”].Sort([System.Windows.Forms.DataVisualization.Charting.PointSortOrder]::Descending, “Y”) This chart is pretty clear and easy to understand, but not all data benefits from a Column view. Although not ideal for the current example, let’s assume a pie chart would be better. How do you draw one of those? Easy. Remove these code sections from your script: $Chart.Series[“Data”].Sort([System.Windows.Forms.DataVisualization.Charting.PointSortOrder]::Descending, “Y”) $ChartArea.AxisX.Title = “Process” $ChartArea.AxisY.Title = “Working Set (MB)” # Find point with max/min values and change their colour $maxValuePoint = $Chart.Series[“Data”].Points.FindMaxByValue() $maxValuePoint.Color = [System.Drawing.Color]::Red $minValuePoint = $Chart.Series[“Data”].Points.FindMinByValue() $minValuePoint.Color = [System.Drawing.Color]::Green # make bars into 3d cylinders $Chart.Series[“Data”][“DrawingStyle”] = “Cylinder” Substitute the following: # set chart type $Chart.Series[“Data”].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::Pie Which gives you a basic pie chart: To improve the appearance, add the following code: # set chart options $Chart.Series[“Data”][“PieLabelStyle”] = “Outside” $Chart.Series[“Data”][“PieLineColor”] = “Black” $Chart.Series[“Data”][“PieDrawingStyle”] = “Concave” ($Chart.Series[“Data”].Points.FindMaxByValue())[“Exploded”] = $true Now, your chart should look like this: Well, that’s it for this short tutorial, but if you’re hungry for more (and there is a lot more) on using the Chart Controls, download the Chart Control documentation and samples: Microsoft Chart Controls for .NET Framework Documentation Samples Environment for Microsoft Chart Controls
https://blogs.technet.microsoft.com/richard_macdonald/2009/04/28/charting-with-powershell/
CC-MAIN-2016-40
refinedweb
1,655
57.77
Python: find faces with incorrect normals to flip and flip them . Hi all, Here is the issue. I've a mesh with some faces that need to be flipped in other to have something consistent: These faces are selected: So I would like to find the faces that must be flipped and flip them using a Python script. I tried making faces constistent by it didn't work. My idea was the following: Loop on the bmesh vertices (I can do it) Check that the vertice is selected (I can do it) Check that the normal has to be flipped (I can't do it. Should I check the normal?? Flip normal (I can do it) I hope I explained the issue clearly. Thanks, Maxime PS: here is my blend file enter link description here Solutions/Answers: Answer 1: This script finds the average normal from the selected faces, then finds normals that are very different by calculating the dot product between the average and each face normal. Any face that has a negative dot product will be flipped. This fixes the normals on the faces in your blendfile, although your selection doesn’t include all the flipped faces (if selected, they will be fixed). The script assumes you are in edit mode with all the faces of interest selected. import bpy, bmesh from mathutils import Vector bm = bmesh.from_edit_mesh( bpy.context.object.data ) # Reference selected face indices bm.faces.ensure_lookup_table() selFaces = [ f.index for f in bm.faces if f.select ] # Calculate the average normal vector avgNormal = Vector() for i in selFaces: avgNormal += bm.faces[i].normal avgNormal = avgNormal / len( selFaces ) # Calculate the dot products between the average an each face normal dots = [ avgNormal.dot( bm.faces[i].normal ) for i in selFaces ] # Reversed faces have a negative dot product value reversedFaces = [ i for i, dot in zip( selFaces, dots ) if dot < 0 ] # Deselect all faces and (later) only select flipped faces as indication of change for f in bm.faces: f.select = False bm.select_flush( False ) for i in reversedFaces: bm.faces[i].select = True bm.faces[i].normal_flip() # Flip normal bm.select_flush( True ) Answer 2: Did you try to go to edit mode, select all faces then recalculate normals? (Ctrl+N) Answer 3: . well i had same as your issue, i was trying to resolve it, i get in your question to see the answers to resolve mine! , i found the solution, is Make Normals Consistent the shortcut Ctrl + N while you are still in the edit mode 🙂 thanks References - Database Administration Tutorials - Programming Tutorials & IT News - Linux & DevOps World - Entertainment & General News - Games & eSport
https://oraerr.com/
CC-MAIN-2020-05
refinedweb
438
64.71
Possible Duplicate: Why use getters and setters? //Case 1 public class Shoe{ public int size; } //Case 2 public class Shoe{ private int size; public int getSize(){ return size; } public void setSize(int sz){ size = sz; } } What I have seen someday on SO, as answer (written by @ChssPly76) why to use getters and setters Because 2 weeks (months, years) from now when you realize that your setter needs to do more than just set the value, you'll also realize that the property has been used directly in 238 other classes :-) there are much more advantages: before: private boolean alive = true; public boolean isAlive() { return alive; } public void setAlive(boolean alive) { this.alive = alive; } after: private int hp; // change! public boolean isAlive() { return hp > 0; } // old signature //method looks the same, no change in client code public void setAlive(boolean alive) { this.hp = alive ? 100 : 0; } EDIT: one additional new advange when you are using Eclipse - you can create watchpoint on field, but if you have setter you need just a breakpoint, and... breakpoints (e.g. in setter method) can be conditional, watchpoints (on field) cannot. So if you want to stop your debugger only if x=10 you can do it only with breakpoint inside setter.
https://codedump.io/share/sUXk2mTOxX/1/advantage-of-set-and-get-methods-vs-public-variable
CC-MAIN-2018-17
refinedweb
206
59.67
A package manager that installs and runs Swift command line tool packages. $ mint run realm/SwiftLint@0.40.3 This would install and run SwiftLint version 0.40.3 Mint is designed to be used with Swift command line tools that build with the Swift Package Manager. It makes installing, running and distributing these tools much easier. Homebrew is a popular method of distributing Swift executables, but that requires creating a formula and then maintaining that formula. Running specific versions of homebrew installations can also be tricky as only one global version is installed at any one time. Mint installs your package via SPM and lets you run multiple versions of that package, which are installed and cached in a central place. If your Swift executable package builds with SPM, then it can be run with Mint! See Support for details. Swift Package Manager Tools -> SPMT -> Spearmint -> Mint! 🌱😄 Mint: a place where something is produced or manufactured Make sure Xcode 10.2 is installed first. $ brew install mint $ git clone $ cd Mint $ make $ git clone $ cd Mint $ swift run mint install yonaskolb/mint $ mint install yonaskolb/mint Use CLI $ git clone $ cd Mint $ swift run mint Use as dependency Add the following to your Package.swift file's dependencies: .package(url: "", from: "0.15.0"), And then import wherever needed: import MintKit Until 1.0 is reached, minor versions will be breaking. Run mint help to see usage instructions. runlater, and also links that version globally Package reference run and install commands require a package reference parameter. This can be a shorthand for a github repo ( mint install realm/SwiftLint) or a fully qualified git path ( mint install). In the case of run you can also just pass the name of the repo if it is already installed ( run swiftlint) or in the Mintfile. An optional version can be specified by appending @version, otherwise the newest tag or master will be used. Note that if you don't specify a version, the current tags must be loaded remotely each time. $ mint run yonaskolb/XcodeGen@2.18.0 # run the only executable $ mint run yonaskolb/XcodeGen@2.18.0 --spec spec.yml # pass some arguments $ mint run yonaskolb/XcodeGen@2.18.0 xcodegen --spec spec.yml # specify a specific executable $ mint run --executable xcodegen yonaskolb/XcodeGen@2.18.0 --spec spec.yml # specify a specific executable in case the first argument is the same name as the executable $ mint install yonaskolb/XcodeGen@2.18.0 --no-link # installs a certain version but doesn't link it globally $ mint install yonaskolb/XcodeGen # install newest tag $ mint install yonaskolb/XcodeGen@master --force #reinstall the master branch $ mint run yonaskolb/XcodeGen@2.18.0 # run 2.18.0 $ mint run XcodeGen # use newest tag and find XcodeGen in installed packages By default Mint symlinks your installs into usr/local/bin on mint install, unless --no-link is passed. This means a package will be accessible from anywhere, and you don't have to prepend commands with mint run package. Note that only one linked version can be used at a time though. If you need to run a specific older version use mint run. A Mintfile can specify a list of versioned packages. It makes installing and running these packages easy, as the specific repos and versions are centralized. Simply place this file in the directory you're running Mint in. The format of the Mintfile is simply a list of packages in the same form as the usual package parameter: yonaskolb/xcodegen@2.18.0 yonaskolb/genesis@0.4.0 Then you can simply run a package with: mint run xcodegen Or install all the packages (without linking them globally) in one go with: mint bootstrap If you prefer to link them globally, do such with: mint bootstrap --link --silentin mint runto silence any output from mint itself. Useful if forwarding output somewhere else. MINT_PATHand MINT_LINK_PATHenvs to configure where mint caches builds, and where it symlinks global installs. These default to /usr/local/lib/mintand /usr/local/binrespectively mint install --forceto reinstall a package even if it's already installed. This shouldn't be required unless you are pointing at a branch and want to update it. Mint works on Linux but has some limitations: If your Swift command line tool builds with the Swift Package Manager than it will automatically install and run with mint! Make sure you have defined an executable product type in the products list within your Package.swift. let package = Package( name: "Foo", products: [ .executable(name: "foo", targets: ["Foo"]), ], targets: [ .target(name: "Foo"), ... ] ) You can then add this to the Installing section in your readme: ### [Mint]() ``` $ mint install github_name/repo_name ``` Since Swift 5.3 resources are now built into the Swift Package manager, so if you're targetting that version or above the Package.resourcesfile is no longer necessary The Swift Package Manager doesn't yet have a way of specifying resources directories. If your tool requires access to resources from the repo you require a custom Package.resources file. This is a plain text file that lists the resources directories on different lines: MyFiles MyOtherFiles If this file is found in you repo, then all those directories will be copied into the same path as the executable. Feel free to add your own! Swiftpack is being maintained by Petr Pavlik | @ptrpavlik | @swiftpackco | API | Analytics
https://swiftpack.co/package/yonaskolb/Mint
CC-MAIN-2021-39
refinedweb
897
65.62
: October 27, Ray of] 1 S .;-'T ,* ., .. .' 9..''r, f '^ 0> -- _ Tampa seeks to rebound in C IT RU'S ____ .i ' g^3^aaSd~B^^ '\'^^ jSS '' S s^ World Series /11 FORECAST: Sunny. North shifting to the in the afternoc PAGI OCTOBER 27, 2008 LATE DELIVERY? In an effort to provide coverage of Tampa Bay Rays World Series games, the Chronicle is extending deadlines, which may cause late delivery of today's edi- tion. Should your newspaper arrive late, we apologize for the inconvenience. NO. 1 TUNE: Top of the class "High School Musical 3: Sen- ior Year," starring Zac Efron and Vanessa Hudgens, is tops of the class for the box office./Page C1 OPINION: A functioning Democracy requires people with differing opinions to talk with one another. LETTERS. '3. A10 'POP' GOES THE FRAUD: Illegal returns Eleven states grapple with the problem of lost revenue due to illegal bottle and can returns./Page A6 CAMPAIGN TRAIL: 9 days to go! Presidential candidates Sen. John McCain and Sen. Barack Obama continue to excite supporters as Election Day draws near./Page A12 ONLINE POLL: Your thoughts? Are presidential debates a waste of time? A. Yes. There was no real sub- stance provided on the issues. B. No. I learned enough to make an educated decision. C. I didn't bother to watch them. D. I watched for comic relief. To vote, visit the Web site at. Results will appear next Monday. Annie's Mailbox ..............B6 Comics ...................... B7 Crossword ...............B6 Editorial ........ ........ A10 Entertainment ..............B12 Horoscope ......................B6 Lottery Numbers ............B4 Lottery Payouts ............B12 Movies ........................ B7 Obituaries ............... A6 Weird Wire ....................A8 Two Sections 6 1141571812101012 51 5 Charges jolt customers Progress Energy taping residents for money to build new nuclear plant 1 CHRIS VAN ORMER "What other business can pr lVmUI I U~ iliicUnU dtrQ fh j it 1 f1.4 i11i Nancy Argenziano understands customers' unhappiness. cvanormer@. chronicleonline.com Chronicle Progress Energy Florida cus- tomers are questioning why they have to pay up front for the utility's new nuclear plant in Levy County. Uin customerstlor iU Ls future in- vestment?" asked Fred Taylor of Crystal River. "I think it's atro- cious, a complete rip-off of the customers. We just can't afford it" Earlier this month, the utility announced its updated 2009 pro- posed monthly rate for electric- ity service of $137.88. The sum would include increases from 2008 of $14.09 for projected fuel costs (including under-recovered amounts from this year), $11.42 for new nuclear-plant construc- tion in Levy County and $2.50 for environmental projects, such as clean-air technology at coal-fired power plants. Many customers have called the Public Service Commission in Tallahassee to ask commis- sioners to fight the cost-recovery charge, according to Commis- sioner Nancy Argenziano. "The PSC has no discretion about cost recovery," said Argen- ziano, who has served in both the Florida House of Representa- tives and the Florida Senate. "We are mandated by the Legislature. The PSC cannot deny cost recov- ery." Argenziano, who said the job of the PCS was to determine the See CHARGES/Page A4 PATH TO A NEW BEGINNING -, '." ,--',.-_r,,- :; : ;:: _-: -. 4 -- .:" :': ., ?_" --' ,-1._ Josh Lopatin, 25, a resident at New Beginnings Into Recovery in Inverness, is working to get his life back together after years of addiction and homelessness. He says his dream is to become a professional wrestler and he works out every day toward this goal. After each workout he says a prayer to his grandfather who taught him to box. Inverness facility provides hope for men battling substance addictions NANCY KENNEDY nkennedy@chronicleonline.com Chronicle t 25, Josh Lopatin knows the emptiness and loneli- .LI.ness of not having a home. "I slept in the woods and in garbage cans anywhere I could," he said. Today, he calls New Be- ginnings Into Recovery in Inverness his home, at least temporarily. New Beginnings is a faith-based, not-for-profit residential recovery pro- gram for adult men deal- , ing with alcohol or drug J addiction. Lop After being referred by hop a local church, Lopatin earn arrived Sept 3, a month McD before his 25th birthday drunk and desperate. "One of my buddies told me about a church," he said, "but I bought liquor first before I went there. I started drinking and got on my knees and prayed, 'I don't want to drink anymore,' and I went to the church and they called here. When I came here, I was so messed up." He had grown up in New Jer- sey and started drinking at 15 and getting into fights with his stepfa- ther At 16, he left home to live with his grandpar- ents, then moved around from place to place. At one point, he quit ." high school but did return to complete it and gradu- ate. He wanted to go to college, but couldn't read osh well. patin "People put me down," )ing to he said. "They'd say, Tosh, a job at' you're drinking. You're onald's going nowhere,' and that made me go for that bottle of Jack" Believing what people said to See BEGINNING/Page A2 Group provides home; new start for addicted Organization serving county since 2005 NANCY KENNEDY nkennedy@ chronicleonline.com Chronicle Sometimes a man's life be- comes unmanageable. When drugs or alcohol are involved, sometimes a man finds himself homeless - and sometimes a man finds a new beginning and a way out of his addictions and home- lessness. New Beginnings Into Re- covery, a faith-based, not-for- profit transitional housing Drug coalition slates town hal Event scheduled Thursday night SHEMIR WILES swiles@chronicleonline.com Chronicle Deborah Scott says teens are citing boredom as the No. 1 reason why they begin using prescription pills. "It's an excuse ... there are things * WHAT: Drug Coalition of Citrus County town hall meeting. * WHEN: 6:30 to 8 p.m. Thursday. M WHERE: Curtis Peterson Auditorium, 3810 W. Educational Path, Lecanto. * INFO: Deborah Scott at 341-7480. to do in Citrus County," said Scott, ex- ecutive director of the Drug Coalition of Citrus County County schools are seeing an in- crease in the abuse of prescription pills and Scott hopes the drug coali- tion's town hall meeting will effec- tively address the issue. The meeting starts at 6:30 p.m. Thursday, at the Curtis Peterson Au- ditorium in Lecanto. It will be an open forum where a panel will an- facility in Inverness for adult men dealing with alcohol or drug addiction, is one of the best-kept secrets in Citrus7 County, said Ray Cox, New Beginnings director. Open in H November 2005, 175 ymen have *i found their way to the R. C program's Ray Cox doorstep. 20-year Cox, him- recovering self a 20-year alcoholic, recovering ,alcoholic who has served time in prison for DUI manslaughter, understands what it takes to restore an addicted man to wholeness, See GROUP/Page A2 1 meeting swer questions about prescription pill abuse and how the problem is af- fecting Citrus County. "We're covering the gamut from prevention to treatment," Scott said. Some of the panelists are Melissa Burns, a head pharmacist at Wal- Mart; Andy Cox, a Citrus County Sheriff's Office deputy; Craig Fulss, a student resource officer for Lecanto High School; and Willie Mitchell, a Community Anti-Drug Coalitions of See COALITION/Page A4 74 LOW 41 e- A2 MONDAY, OcTOBna 27, 2008 BEGINNING Continued from Page Al him and about him, he started trav- eling around, sleeping wherever he could, working for food or booze or a shower. He'd clean basements, chop wood, mow lawns or clean horse stalls. "When I was homeless, I didn't like myself much," he said. "It was hard to look in the mirror My family didn't like me; I didn't like me. It was pretty bad." He came to Florida with some friends, staying at a buddy's house until they kicked him out "I had $5 in my pocket and I went to the bar to drink my life away," he said. According to information from the National Health Care for the Homeless Council, homeless peo- CITRus COUNTY (FL) CHRONICLE ple are particular victims of certain diseases. Approximately one-third have mental illnesses and perhaps one- half have a current or past drug or alcohol addiction. Not all alcoholics become home- less and not all who are homeless are alcoholics, but many are. '"Josh came to us really damaged," said Ray Cox, director of New Be- ginnings Into Recovery. "He came here drunk and wasn't sure he was ready to quit, only that he was homeless and he wanted to do something about it. "When he sobered up and saw that the guys weren't here to hurt him, he bought in." One day at a time Lopatin begins his day at 8 a.m. at New Beginnings. Lights are out at 11 p.m. He shares a dorm with other men. TV viewing is limited to news SO YOU KNOW E New Beginnings Into Recovery will have its annual fundraiser from 8 a.m. to 3 p.m. Satur- day and Sunday. Events in- clude a yard sale, car wash and barbecue. New Beginnings is at 1515 White Lake Drive, Inverness. For information or directions, call 344-8600. programs from 5 to 11 p.m. Monday through Thursday Friday through Sunday the TV can stay on until 1 a.m. and the guys can watch PG-13 movies or football. Computer use for checking e- mails is during TV hours. Residents attend Bible studies or Christian discipleship groups and up to five weekly on-site 12-step meetings. In the early days after Lopatin first arrived, he worked at the shel- ter, assisting in the kitchen and help- ing out wherever he was needed. Natural gifts and talents are put to use. Lopatin's main job is keeping the fire going in the fire pit out back It's there that the men sit and talk about their recovery, form relation- ships and help one another. "When I build the fires, it calms me down when I'm thinking about drinking," he said. Anger is something he continually deals with, a big part of working through his addiction, he said. When his temper flares or he starts feeling emotions he used to drink away, now he heads for tlfe punching bag out back "Instead of hitting somebody, we hit the bag," he said. "If we're still angry, we can chop wood." Lopatin chops a lot of wood. Currently one of the youngest men in the program, he said living with the other men is like a family. "These are my brothers and my uncles and even my grandpas," he said. "We all help each other like a family does." Currently, Lopatin is hoping to get a job at McDonald's inside the Wal- Mart Superstore in Inverness.When not at work, residents work at "home" as part of their recovery. As for Lopatin's future, planning for that will come soon enough when he's further along in the program. "I've got a lot of dreams," he said.; "I want to be a pro wrestler But what I really want to do is talk to young people and let them know that drinking is not a good life. "My mom worries about me," he said. "She wants me to get better. IfI -. ever hit rock bottom again, like if I ever started drinking again, I'm going to end my life because I don't. ever want to live in the woods again, But God wants me to live I want to live." GROUP Continued from Page Al physically, socially, psycholog- ically and spiritually "To succeed in this pro- gram, it takes a desire and a willingness to do whatever it takes to surrender your way of thinking," Cox said. "The dis- ease of alcoholism or drug ad- diction is extremely self-centered, and unless a man changes his mindset and realizes that the world does not revolve around them, he won't make it" He said anyone can read the literature and recite it back, but unless a person takes that first step and ad- mits being powerless over drugs or alcohol and that his life has become unmanage- able, he will be right back out on the street "Only those who surrender themselves are the ones who make it," he said. In 2000, Cox, together with Circuit Court Judge Patricia Thomas, Was instrumental in creating the local drug court program. After leaving prison and going through his own treatment for his alcohol ad- diction and finding faith in Christ Cox went to college and became a state-certified addictions professional. He is also internationally certified and an ordained minister. He has worked as a treat- ment provider for Marion Cit- rus Mental Health and a caseload counselor in Pinel- las County. He was drug court chief from 2000 to 2002 when he left to go to North Carolina where his wife got a job. They returned to Florida in 2003 and Cox went to work at the now-defunct Act II residential recovery program in Ocala. In his involvement with drug court, Cox never told his personal story, but performed his job with an understanding of what people were going through, Judge Thomas said. "He's been there; he's been where these people have been," she said. "He's put his life back together and has come out as a strong man of faith ... his strength comes from the walk that he's walked, and he has a real heart for the people he's serv- ing." Men come to New Begin- nings through referrals from a variety of sources the De- partment of Children and Families, the Salvation Army, the courts and word of mouth. They come damaged, broken, distrustful and often without basic living skills. Some are angry. Some are depressed. For most, this is a place of last resort. They're met with rules, order, accountability and hope. They live dorm-style in the 15-bed facility. "It helps form relation- ships," Cox said. "These guys really do look out for each other. The younger ones get put in the right direction by the older ones." Ages range from 18 to 82; average age is 43. "I drank to escape from THURSDAY OCT. 30 HALLOWEEN PRACTICE PARTY Just so we get it right! Jimmn Sparks Band 9-12z -v^- iPfd S4 GIVE % / ALWAYS BUCKET OF 5 BUSCH/BUSCH LT. I 3 LONG NECKS *3.00 All Night life's problems," said Rob Brittelli, 37. An air-condition- ing technician by trade, his drinking and prescription drug abuse cost him his mar- riage and another relation- ship after his divorce. "By that point, the drinking and drug use had gotten so out of control that I was asked to leave the house," he said. "It became such a problem that I couldn't work and I had no place to stay." He stayed with friends, in hotels, even the Salvation Army for a while. "It destroys your self-worth and, your self-esteem goes down ...I had hit rock bottom and didn't have any other op- tions," he said. "I couldn't work anymore I couldn't do anything; I needed a change." He found New Beginnings through his mom in Ohio who had researched places for him to get help. Brittelli is al- most five months into the pro- gram. Residents are expected to attend 12-step recovery meet- ings, undergo individual counseling, work at the facil- ity and find a job in the com- munity. They're encouraged to go to church. After 30 days, men who have vehicles are able to have FRIDAY OCT. 31 HALLOWEEN NIGHT HOWL South Paw band IMrIDu.ine FL (Also playing Saturday Night) m Costume Contest $100 First Place ^ BEER SPECIAL ICE HOUSE or- NATURAL LIGHT DRAFT 750 All Night 0 2":r 8AGH JY 9 .., O I them at the facility. Most ride bicycles. Also, each man pays $110 a week for his stay. "We're not funded by any- one," Cox said, "only by what these guys earn by working and by donations from the community." Some scholarships are available and sometimes it's best for a man to not get a job right away, to get sober and healthy first But it's part of the restoration process for the men to go out as soon as they can to find work, even day labor It's important that a man pay his way, Cox said. "When there's a financial investment in their recovery it means more." On Saturday, New Begin- nings will have its annual fundraising yard sale, car wash and barbecue. Last year, it raised $1,000. Each resident is assigned a color, which corresponds to the random color of the day drug screening. Newcomers get screened at least twice a week Those who are further along in the program are tested less frequently. After 30 days they are eligible for posi- tions of responsibility as "ex- pediters." Since Cox lives with his family in Ocala and there isn't a 24-hour caretaker on staff, expediters are in charge. It's a matter of trust, pride and ownership. This place be- longs to the men who live there, if only for a short sea- son. "These guys know how the house runs, and they have a personal investment in keep- ing it safe and sober," Cox said. "Their buy in ultimately makes this whole thing work" The four-phase program be- MEET AND GREET * Clubs are invited to submit information about regular meetings for publication in The Meeting Place. * Include the name of the organization, the time, day and place of the meeting, whether it meets weekly, biweekly. 7".*, ^1 LK^1'R %; i!.i Value... Jim Green Jewelers Cr) C.al Rjer Shopping Center 1665 SE H.y. 19 Neil to weeti' Crn:,il. Rw'. FL 352-563-0633 -a ~C i HOMOSASSA IONS BINGO I Ist Monday 10 Every onlhalt6pm Package $20 Pkg. $50 Pavout (511 250 Per Game Jackpiots Free Cofjcc & 'ea Von-Smoking Room HOMOSASSA LIONS CLUB HOUSE Rt. 490 Al Becker 794-3184 gins with a two- to four-week' orientation that may include going through physical with- drawal. This is the basic 101. intro to recovery, with inten-, sive evaluation, education: and counseling. , The next phase, which lasts up to three months, focuses on,. developing a sober support system. After that, residents spend up to six months con- tinuing to learn life skills - budgeting, cooking, etc.'- and making a plan to live success- fully in the community. The last phase is called after care in which the men , come back every other week for accountability and sup-,; port, and random drug tests.. Those residents in the- after-care phase pay $75 per week so they can save enough , money to move out "They can stay here up to . two years, but I haven't had' anybody do that yet," Cox said. "This is a good thing for a par-' ticular season in their lives, but at one point it's time to ' move on, and they know when: that time is." nF]eP H. C.i P ofeL PoeonjlHeanng Centes- S mDenny Dingier, A.C.A. 21 ope Audieoproseiooges M. Div., BC-HS 211 S. Apopka Ave., Inverness r For aD aorNghti SFun and to Meet New Friends. . ^gj30Come and Play!.: To place your Bingo ads, Scall 563-5592 (6we (debARte HAlkweer)' Thurs., Oct. 30th ONLY 12:30 PM Other "FREE" Drawn BEVERLY HILLS ' 1 r FREE D---- --- UONS BINGO, BRING IN THIS AD FOR The Friendliest Bingo in Town! ,-; GEoNEFREE:, ., ET EONE I ' Bonanza W t Mon. & Thurs. I FREE HOT DOG ,; rH PURCHASE OFA BEVERAGE Thurs., Oct. 30th _ONLY 72 CIVIC CIRCLE BEVERLY HILLS Info 527-0962 OUR LADY OF FATIMA CHURCH i 550 HWY. U.S. 41 SOUTH, INVERNESS, FL .,. TUESDAY AT NOON & THURSDAY AT 6:30PM $50 PRICES JACKOTS PAYOUTS 2 PACK...................$10JACKPOTS 3 PACK.................$12 $150 20 REGULAR 4 PACK.......$...14 $200 GAMES 5 PACK.................$15 $250 8 SPEED SPEED PACK..............$5 Ji-~I -s i' GAMES XTRA PACK..............$2 '." ALL PAPER I I BINGO PRIZES Residents are expected to attend 12-step recovery meetings, undergo ... counseling, work at the facility and find a job in the community. They're encouraged to go to church. Y ISLAND LIoHI'HMSE "Preserving Florida's Southern Spirit" Irritable Bowel? Do you have diarrhea predominant Irritable Bowel Syndrome or its symptoms? If you are 18 to 70 years of age and have mid to moderate abdominal pain or cramping you may be eligible to partici- pate in a clinical research study to explore an investiga- tional medication to treat the symptoms of Irritable Bowel Syndrome. LL Qualified participants will receive at no cost: Study related laboratory tests' Investigational medication Study related physical exams HOMOSASSA LIONS AUXILIARY Friday Nights @ 6:30pm 3 JACKPOTS WINNER TAKES ALL KING & QUEEN Refreshments Avail. FREE Coffee and Tea Smoking & Non-smoking Rooms $15 pkg. FREE PLAY For Vision Impaired Homosassa Lions Club House, RT 490 Bob Mitchell 628-5451 All Friday Nights $10 Pkg I Nature Coast Clinical Research (352) 341-2100 210 S. Pine Avenue, Inverness, Florida (6D I...,, CO) CITRUS COUNTY CHRONICLE (C7 VUI ON DAY OCTOBER 27, 2008 Around THE STATE Citrus County Crystal River Council to meet today The Crystal River City Council meets at 7 p.m. today at City Hall on U.S. 19. The agenda includes a sug- gestion by the Community Re- development Agency to rename the Third Street Pier in memory of Roger Goettel- mann, the former CRA execu- tive director who died earlier this year. Goettelmann was instru- mental in leading the effort to- ward reconstruction of the pier and obtaining the grants to purchase Kings Bay Park. To view the council agenda, go to. Early voting continues through Saturday Early voting has begun and ends Saturday at five sites in Citrus County. The sites are open Monday through Satur- day: Citrus County Court- house, 9 a.m. to 5 p.m. Inverness City Hall, 8:30 a.m. to 4:30 p.m. Central Ridge Library, 8:30 a.m. to 4:30 p.m. Crystal River elections of- fice, 9 a.m. to 5 p.m. Homosassa Public Li- brary, 8:30 a.m. to 4:30 p.m. For more information, call the Supervisor of Elections Of- fice at 341-6740, or go online to. Ocala Bar fight ends with 2 stabbed Authorities say two people were stabbed during a bar fight in Ocala. Police say the stabbings oc- curred early Sunday morning. Javier Ordonas was stabbed in his arms and back and was rushed to Ocala Regional Medical Center where he is in stable condition. Sulpicio Dominguez was stabbed in the chest and flown to Shands at University of Florida. He's in critical condition. Police say his injuries do not appear to be life threatening. Investigators are question- ing those involved in the fight, asking for a detailed descrip- tion of the suspect. Riviera Beach Bees kill 3 dogs, injure elderly woman A swarm of bees that terror- ized a Palm Beach County neighborhood killed three dogs and injured a 70-year-old woman. Authorities say crews re- moved 50 pounds of honey- comb from the side of a Riviera Beach home after Fri- day's attack. The hive has been contained. The bees swarmed Nancy Hill and her two dogs, killing the animals. The bees also at- tacked two other dogs in the neighborhood, killing one and sending the other to the hospi- tal. Hill was treated at a hospi- tal where the stingers were removed. Lab tests would be needed to determine whether the bees were Africanized bees. Their stings are no more potent than an ordinary bee, but they are far more aggressive and at- tack in swarms. Tallahassee Florida Lotto jackpot rises to $9 million The jackpot in the Florida Lotto game has grown to $9 million after no one matched the six winning numbers in the latest drawing, lottery officials said Sunday. A total of 59 y tickets matched five numbers to win $5,997 each; 3,188 tickets matched four numbers for $90 each; and 64,444 tickets matched three numbers for $6 each. The win- ning numbers selected were: 14-34-36-39-49-53. -From wire reports Aoba sea m -w -. Copyrighted Material , [Syndicated Content - - Available fromCommercial News Providers- ... ... -_--a_ -- o - e - - a a - --low Ob 0 - - w .' a .M b.- - - C a 4 * - - a - -- - - C ~. aC ~- - - - Toy drive gears up for holidays Goal for desired donations doubled from last year NANCY KENNEDY nkennedy @chronicleonline.com Chronicle Even though Christmas is two months away, the staff and volunteers at The Spot (Spiritual People Offering Time and Resources) in In- verness have been in Christ- mas mode for months. Beginning Nov. 1 through Dec. 21, the not-for-profit ministry to Citrus County families will be accepting donations of new, un- wrapped toys for their fourth annual three-day super jam Dec. 22 to 24. The toys will be distrib- uted on Christmas Eve, Thursday, Dec. 24, at The Spot Family Christmas Jam, at 501 S.E. Seventh Ave. in Crystal River, next to the Boys & Girls Club. Each of the three nights they feed people last year more than 800 people at- tended, plus they have games, prizes and gift give aways. Last year, the ministry re- ceived donations of between 1,500 and 2,500 gifts from about 25 different vendors, said Evelyn Vissicchio, who, together with her husband, Joe, operate the ministry. "Our goal is 5,000 toys," she said. "We're doubling last year because we believe the need will be double this year due to troubling eco- nomic times." Their goal is to ensure that every child (ages 2 to 16) receives a gift. As time approaches, a mass toy wrapping party will take place. In addition to toys, people can also donate wrapping paper and tape. Drop-off locations are: The Spot Family Center, 1315 U.S. 41, across from the post office; Citrus Equip- ment & Repair, 6659 W. Norvell Bryant Highway, Crystal River; Mercantile Bank, 1000 S.E. U.S. 19, Crys- tal River and 2080 State Road 44 W, Inverness; ERA Suncoast Realty, 1206 S.E. U.S. 19, Crystal River; De- Lites, 2848 Heritage Plaza, Hernando; Dynabody Fit- ness & Rehab, 2232 State Road 44, Inverness and Ad- vanced Family Hearing Aid Center, 6441 W Norvell * WHAT: The Spot annual toy drive for Christmas. WHEN: Starts Saturday and continues through Dec. 21. WHERE: Donations may be made at several locations throughout Citrus County. FOR INFO: 726-0099. Bryant Highway, Crystal River. Volunteers are also needed to wrap gifts. For monetary donations, make checks payable to The Spot Family Center, 1315 Hwy. 41 N., Inverness, FL 34450. For more information on the event, volunteering or designating your business as a drop-off location, please call The Spot at 726-0099. 41W__. - - * -- s.-lo - a - - a a--dk 4w D C m - W-.b-wow - --@dub --m bf- o b AM a - sft - l- 4D-.-- a a. - I, 7L -~ Cooterween costume cutie CATHY KAPULKA/For the Chronicle Shilah Goodwin prepares her 10-week-oldi daughter, Eden Gennaro, to enter the Cooterween costume contest Sunday as she places her in a freshly carved pumpkin at the annual Cooterfest in Inverness. Goodwin said she is happy with the way her daughter's costume turned out and was hoping for a prize. Cooler temperatures and lower humidity brought out a large crowd who turned out for the event and to see children, adults and animals dress up for the festival competition. - * CITRUS COUNTY (FL) CHRONICLE A4 MONDAY OCTOBER 27. 2008 Make A Difference Day entries sought USA WEEKEND is taking en- tries for its annual Make A Differ- ence Day edition. Those who participated in a Make A Difference Day event Saturday should fill out an entry form and submit it by Nov. 17. Visit makeadifferenceday.com for information or to enter. Stone Crab Jam planned Nov. 15 Kings Bay Rotary Foundation will host the inaugural Stone Crab Jam from 3 to 11 p.m. Nov. 15 in downtown Crystal River. Festivities will include live enter- tainment, local artists showcasing their work, and plenty of food ven- dors with plenty of treats to sell in- cluding stone crab claws. Proceeds of this year's event will go to the efforts to purchase the Three Sisters Springs property in Crystal River. Future Stone Crab Jam proceeds will benefit a different charity each year. Sponsorship levels range from $200 to $20,000. To learn more about sponsoring the event or for vendor information, call 422-7925. Food drive planned for Election Day An Election Day food drive is being planned for Nov. 4. Voters are asked to cast their votes for their favorite candidates, and also cast their votes against hunger in Citrus County by bring- ing a non-perishable food item to their voting precinct. Volunteer needed to deliver pet food The Citrus County Home De- livered Meals Programs provides "PetMeals" to the dogs and cats of homebound seniors in Citrus County. The group needs a volunteer driver for the Homosassa area, specifically near U.S. 19 and U.S. 98. This position requires the volunteer to pick up pre- packaged pet food after 10 a.m. on the fourth Friday monthly from the Humanitarians of Florida lo- cated in Crystal River. The volun- teer can then deliver the pet food to the clients on the route at his or her convenience. Interested volunteers should call 527-5975. Support troops during home show The Annual Home & Outdoor Show, hosted by Home Improve- ment Sponsor Home Depot, will be 9 a.m. to 4 p.m. Saturday, Nov. 15, and 10 a.m. to 3 p.m. Sunday, Nov. 16, at the Crystal River National Guard Armory. The event is free and open to the public. During the event, the Future Builders of America Club will help in collecting supply dona- tions to be sent to the troops overseas. For a list of recom- mended supply donations or for more information on the 2008 Home & Outdoor Show, contact the CCBA at 746-9028 or visit. Halloween Party to benefit BGCC Harrington's Lodge Steak- house will host a Halloween Party at 7 p.m. today to benefit The Boys & Girls Clubs bf Citrus County. Live music from Strutt will be played until 10. There is a $5 cover charge and proceeds will benefit the Boys & Girls Clubs. Harrington's is on the Pepper Creek, next to the Homosassa Wildlife Park at 4076 S. Suncoast Blvd. (comer of U.S. 19 and West Halls River Road). For more information, call 621- 9225. From staff reports -f - -=.= County BRIEFS COALITION Continued from Page Al America board member and former Super Bowl player with the Kansas City Chiefs. Scott said there are various reasons why the use and dealing of prescription pills has increased over the years. "They're available," Scott said. "They're in the medicine cabinet" In a county where Scott said the ratio of grandparents caring for grandchil- dren is high, the accessibility becomes easier. Scott said she believes some grandparents can't imagine their grand- children swiping medications from their homes. "Kids are in a different culture," Scott said. , In addition, selling the drugs is easy cash, Scott said. She also said teens have a misconception that legal drugs like OxyCotin and Vicodin are 'less harmful than illegal drugs. "But a drug is still a drug is still a Ift 4 4 U q..m a. 0O --- - p * 0 * Copyrighted Material *0 m- Syndicated Content F Available from Commercial News P a 0e * - p - p - S - * me V W * mm p - - - - o,. I - a Imo mb 10= 40" 4 'a U * * -* 4EW CHARGES Continued from Page Al need for energy, said she wanted people to know that they should call their legisla- tors about the utility's cost re- covery for the nuclear plant Taylor said he was aware of where the responsibility lies. "I don't blame the Public Service Commission for this," Taylor said. "I blame our local legislators for voting for it.". He said he has contacted state Rep. Charlie Dean, state Sen. Mike Fasano and Gov. Charlie Crist, but has had no reply so far Argenziano said House Bill 7135 that was approved in April was aimed at increasing energy efficiency and encouraging the use of renewable energy. "Renewable energy is ab- solutely a must But the legisla- tion allowed more cost recovery than ever before, in- drug," Scott said. Also, we are part of ture, Scott said. We a cept medication as aliments, Scott said, misunderstanding ti tions all the time is pills are also easy to around and it's hard detect if someone is them. "How can you tell has popped a Xai Scott said. Teens say there is ing to do in the couni Scott there are plenty ties teens can partic several local volu groups. To show teens their besides drugs and a] percussion band ma and young adults wo side the auditorium. piece swing band c young and older mus stage. eluding pre-construction costs," she said. All risk for construction of the nuclear plant now rides on the consumers, she said, not on the utility or the shareholders. "The utility has virtually no risk if the plant does not come to fruition," Argenziano said. "It does not have to return the money. It could have been more fair if the risk was spread." The Legislature may have not realized the financial im- pact of the cost-recovery sec- tion of the bill, Argenziano said. According to the legislation: "The bill allows utilities to re- cover preconstruction and con- struction costs incurred after the issuance of a final order granting a determination of need for nuclear power plant and electrical transmission lines and facilities in the event that the utility elects not to complete or is precluded from completing construction of any new, expanded, or relocated fa pill-popping cul- ire socialized to ac- the solution to all and that breeds the hat taking medica- OK behavior. The At the end of the meeting, the drug; coalition and the Citrus County Sheriff's Office will announce the launch of Oper- ation Medicine Cabinet This program, which begins Nov. 4, was created to re- duce the accessibility of medications to children and others. People will be able carry to bring their old medica- der to She encourages tions to the sheriff's office, ' using no questions asked, and the', kid parents, teens sheriff's office will prop- a kid early dispose of the pills. It nax?" ... to attend will not only decrease the noth th m in ease of access, but Scott: noth- e meeting. said it would also reduce' ty, but the dumping of medica- y of outdoor activi- tions into the county's drinking water. ipate in along with Not every teen in Citrus County is using, nteer and social pills, Scott said, but we have to be mindful, of the ones who are. re are other options "Ifwe don't act now it will be out of con-; Icohol, Scott said a trol," Scott said. ade up of children She encourages parents, teens and, uld be playing out- other concerned citizens to attend the Inside, a 25- to 30- meeting. consisting of local 'This is something for everyone," Scott. sicians will play on said. "This can make a big difference in: the community." C IT R U SRU.C O U N T Y "- LHRONICLL SFlorida's Best Community. Newspaper Serving Florida's Best Community *- To start your subscription: S* Call now for home delivery by our carriers: * Citrus County: (352) 563-5655 Marlon County: 1-888-852-2340 w* or visit us on the Web at .html to subscribe. 13 wks.: $34.00* 6 mos.: $59.50* 1 year $106.00* *Plus 6% Florida sales tax For home delivery by mall: In Florida: $59.00 for 13 weeks Elsewhere in U.S.: $69.00 for 13 weeks To contact us regarding your service: S563-5655 Call for redellvery: 6:30 to 11 a.m. Monday to Friday i 7 to 10 a.m. Saturday and Sunday Call with questions: 6:30 a.m. to 4 p.m. Monday to Friday S9 7 to 10 a.m. Saturday and Sunday Providers Main switchboard phone numbers: Citrus County 563-6363. Citrus Springs, Dunnellon and Marion/Ine.com Newsroom: newsdesk@chronicleonllne.com S Where to find us: Meadowcrest office 1624 N. ....---Norvell BryanltHwy. Meadwcrest Dunkenfield -.Cannondale Dr. irL ai429 A Meadowdrest N B.,- Blvd. T % J Invemess Courthouse office 2ToEmpkinsSt. g ___ square ~! r " 106 W. Main 40 Founded in 1891, The Chronicle is printed in part on recycled newsprint. Please recycle your newspaper. Visit us on the World Wide Web o Published every Sunday through Saturday P By Citrus Publishing, Inc. 4 1 ^1624 N. Meadowcrest Blvd., Crystal River, FL 34429 Phone (352) 563-6363 ** POSTMASTER: Send address changes to: mo ^ Citrus County Chronicle POST OFFICE BOX 1899, INVERNESS, Fl. 34451-1899 S--- 106 W. MAIN ST., INVERNESS, FL 34450 O S PERIODICAL POSTAGE PAID AT INVERNESS, FL ** SECOND CLASS PERMIT #114280 ,1 .1 "' ,1 - 14 *.1 4 *.1 '4- 44 electrical transmission lines or penditures, said Cherie Ja- facilities of a nuclear power cobs, spokeswoman for plant" Progress Energy. "Perhaps the Legislature "We have interest payments should go back and lessen the on the land and deposits on burden on the large pieces of consumer by Utility equipment," spreading the The utility Jacobs said. costs further," has virtually no She said the Argenziano has virtually PSC would said. "They risk if the plant have an an- should not just nual oversight dump it on the does not come of the costs. consumers." "Every year, According to to fruition. they will ana- the legislation, It does not lyze the costs the PSC must I oes not to say yes, it's allow for the have to return prudent, or no, recovery in it isn't," Jacobs rates of all pru- the money. said. dently incurred The cost-re- costs. cover charge "All the PSC Nancy Argenziano will come into can do is deter- about Progress Energy's rate effect in Janu- mine that the increase to pay for new plant. ary costs are spent "People in a prudent manner," Argen- can't take the rate increase," ziano said. Argenziano said. "My message The utility is asking for in- to people is that you need to vestments on its current ex- read your utility bill." 0. PIY 0 * S mw.l6m 43P wo!t w ar.? 0 I eammnw-imp op 16 CITE! ~ Con tHin' (FL) CHRONICLE MONDA~~ OCTOBER 27, 2008 A5 * ~f.-r * "'. ""* '* .*'^ ' % *.......'~ :Z-~ ~ UI . 10 .. .. -. SIIl iillll1 ., .. ... .. I... . . . . 5- 0r-'~ ~V 0~ For those wf0,h-oa bli Tram a grandchildtcfi or family netei . , Fine Tuning 8 Channels & 12 Bands for the most precise level of fine tuning, plus less "head in a barrel," hollow sound. Active Feedback Intercept Provides the best feedback elimination in the industry. Automatic Telephone Response Instantaneously and automati- cally adjusts for optimum telephone listening. Environmental Adaptation Automatically identifies and adjusts to sounds instantly. Improves speech understanding in noisy environments. U Hearing Technology So Small, It's "Virtually Invisible" Audibel Electronics has spent years researching cutting-edge technology that would eliminate echoes, static, feedback or white noise and raise our products to the next level. The result: Virtue, a digital hearing instrument created with the power and intelligence of nanoscience that is sensitive, adaptive, and nearly as intuitive as the human ear. With Virtue, you can enjoy hearing again. This is a hearing instrument that actually learns your particular listening needs and habits as you wear it. Finally, a device that delivers the listening experience you deserve. A 'D: IBEL A " A UDtBE L V, : ii AUDIBEL HEARING CENTERS KSave st1, on New Virtue 12 Technology Exp. 11/7/08 L --- -- Crystal River Mall 1801 NW US 19 N Near JC Penny 352-564-8884 Inverness 2036 Hwy. 44 West 352-586-7599 M- SThe patient and any other person responsible for payment has a right to refuse, cancel payment, or be reimbursed tfor payment for any other service, examination, or treatment VIS I that Is performed as a result of and within 72 hours of responding to the advertisement for the free, discounted fee, or reduced fee service, examination, or treatment. r w- - up 1Ing, Too Trade-in on current hearing aids! Exp. 11/7/08 L--------------------- !:1 iL. ~ ^Fi iE I MONDAY, OCTOBER 27, 2008 AS cases counry ca) c g 1' 11,1 . . ii.. um --J - :' ' mammm I IDfn ifdlonm frdnm CrrRus COUNTY (FL) CHRONICLE A6 MONDAY, OcTOBiR 27, 2008 rI u not - bons( - o AE O - -" 0 4w - p *m * m * - - ol .do * do ** Copyrighted Material Syndicated Content & b e4 Available from Commercial News Providers Obituaries Joan Berard, 79 HOMOSASSA Joan Mary Berard, 79, of Homosassa died Sunday, Oct. 19, 2008, in Homosassa. Born Aug. 6, 1919, in Troy, NY, and moved to Homosassa two years ago from Leesburg, FL. Joan was a retired clerk for New York State. She is sur- vived by her husband, William E. Berard of Ho- mosassa; son, John M. Hukle of Staten Island, NY; daugh- ters, Patti Motto of Dothan, AL, and Kathi Hukle of Cum- ming, GA. Memorial service will be held 11:00 AM Thurs- day, Oct. 30, 2008, at Wilder Funeral Home, Homosassa Springs, with Fr. Ronald Marecki officiating. Inurn- ment will follow in Florida National Cemetery. Sign the guest book at. Lois Erd, 81 BEVERLY HILLS -~ ~- a - * -.*- ~ - a - - 4 - -a- - .~ -~. S. * - S - a * - - - a .* a. - a - * - - - G. - - a - jjj oM. - A Funeral Mass for Mrs. Lois J. Erd, age 81, of Beverly Hills, will be held 11:00 AM Thursday, October 30,2008, at Our Lady of Grace Catholic Church with Reverend Mon- signor Austin Mullen officiat- ing. Cremation will be under the direction of Hooper Cre- matory, Inverness, Florida. The family will receive friends from 6:00 to 8:00 PM, o Wednesday, October 29, 2008, * at the Beverly Hills Chapel of Hooper Funeral Homes. On- -- - line condolences may be sent to the family at- S- FuneralHome.com She was born June 20, 1927, *-- in Oconto Falls, WI, daughter of the late Ambrose .and -- "- Bertha (Ibinger) Wilhelm. "- She died Monday, October 20, 2008, in Lecanto. She was a homemaker and moved to Beverly Hills from Eagle River, WI, in 1993. Mrs. Erd was a member of Our Lady of Grace Catholic Church, Beverly Hills. Mrs. Erd was preceded in death by her husband, Ralph Erd (10/29/2006), and brother, S- Francis Wilhelm. * Survivors include her 2 sons, Randall Erd of Crystal Lake, IL, and Larry Erd of Pompano Beach, FL; daugh- ter, Bonita Culp of College Station, TX; 2 brothers, Richard Wilhelm of St Louis, S- -. MO, and Ralph Wilhelm of - Fond du Lac, WI; 4 sisters, S- Mildred Nolan of Toronto, * Ontario, Canada, Mary Essel- * OBITUARIES m The Citrus County Chroni- cole's policy permits both free and paid obituaries. *lAUM- Whould ' - a - -N OW ft - ft_ -Now. 40- 41 -M - - ~-MEN.- . - - --6 - Sm lob low 0a * -.a --- q-a - === Death- - Death ELSEWHERE Federico Luzzi ATHLETE ROME Federico Luzzi, a former top 100 tennis player, has died of leukemia. He was 28. Luzzi died at a hospital in Arezzo, the Italian Tennis Federation said Saturday. He had been there for a few days after leaving an Italian league match last weekend, Ital- ian. In February, Luzzi was sus-, pended for 200 days and fined $50,000 by the Associa- tion of Tennis Professionals for betting on the game. -From wire reports C&. E. ^bav Funeral Home With Crematory Burial Shipping Cremation. brlnternanolud Order oflh GL DEN For Information and costs, call 726-8323 -n * Obituaries must be sub- rmitted by the funeral home or society in charge of arrangements. 0F e'aaULJtiin Lan in o ree obituaries can in S clude: Full name of de- - ceased: age; .- -' hometown/state; date of death; place of death; date, time and place of visitation and funeral services. S-- U MA flag will be included for S" "free for those who served S in the U.S. military. (Please note this service when submitting a free obituary.) Additionally, all S" obituaries will be posted -" online at- S cleonline.com. S. Deadline is 3 p.m. for * obituaries to appear in the S next day's edition. Phone .. 563-5660 for details. - doD An.a - br II/ W- fW 6- Beverly Hills DENTAL CENTER *Dentures, Partials & Bridges N W i *Interceptive Orthodontics (Minor Tooth Movements) * Invisalign (Removable Braces) AMR y O - * Children Welcome * Veneers, Bonding, & Extractions I I Clanigi * One Visit Root Canals I I .MX 00210 *Gum Surgery -Implants -One Hour Whitening Prophy 01110 J .- Initial Oral eed A Secondpinion.Raphael C. Lewis, DD.S. P.A. Exams 00150 I ,.1 Value1155.00 onREE Senior Citizens i lAA A SWith the Dentist C n AskFor T I Discount Details) MustPresen 120-i CoonAt 1 Regina Blvd., Beverly Hills (Across From Fire Station) - w M I Open Fridays 746-033 e.f t. aa wwwJbevhillsdentalOcm NWWWWWW[W I -,s. i - Rol Visit Latest News at gardneraudiology.com 700 S E. 5th Terrace Crystal River, FL . B man of Menomonee Falls, WI, Eleanor Veech of Lake Geneva, WI, and Helen Thomas of Portage, WI; and 3 grandchildren. Beverly Hills Chapel, Hooper Funeral Homes. Sign the guest book at wwwchronicleonline.com. Roy Simon Jr., 85 FLORAL CITY Roy Simon Jr., 85, Floral City, died Saturday, October 25, 2008, at Hospice of Citrus County Care Unit at Citrus Memorial hospital under the loving care of his family Roy was born May 13, 1923, in Wyatt, West Virginia, to the late Roy Sr. and Marie (Cobb) Simon and came to this area in 1985 from Whispering Pines, N.C. He served our country in the United States Air Force. Roy was employed by Mobile Oil Corporation as a salesman for 25 years. He enjoyed hunting, fishing, wa- tersports and boating. He loved nothing more than being with his family and friends. Roy was known for his great sense of humor and his ability to turn a phrase into a joke. He relished using "old-fashioned phrases" with his family His survivors in- clude his wife of 59 years, Ret- taLee Simon, Floral City; one son, Christopher David and wife Pamela Simon, Monroe, CT; three daughters, Michelle and husband Timothy Kear- ney, East Freetown, MA, Carissa and husband David Keepin, Harwinton, CT, and Candace and husband Barry Barnhart, Foothills Ranch, CA; one sister, Norma Jean and husband William Stern, Citrus Hills, FL; nine grand- children. He was preceded in death by two sisters. Private cremation arrangements under the care of Chas. E. Davis Funeral Home with Crematory, Inverness. Sign the guest book at wwwchronicleonline.com. PICK YoUW EAR Participants sought to compare two hearing aid inventions Lend Your Ears" to experience and compare the value to two different open ear digital hearing aid inventions during a 30 day field study. One has the first voice recognition patent and the other is the world's first nano digital aid. Compensation: Our free candidate screening could qualify you to receive a $25 gas card,. J2.ctober 27-31 - O*- . . O . . . 9 * - .0 ..do- - 0 p Q O t _ 0 ,o ..- -- 0 o Cimus CouNTy (FL) cHRONICLE MONDAY, Ocrorn~n 27, 2008 A7 Humana's 2009 Medicare Advantage health plans are here! PV .. -,.,',- s. Join us to learn about our 2009 plans and to see if Humana is right for you! HOMOSASSA Z Chefs 7781 South Suncoast Blvd. November 3rd, 14th, 19th, 24th 9:00 am INVERNESS Frankie's 1674 Highway 41 North November 5th, 20th 2:00 pm LECANTO Holiday Inn Express 903 East Gulf to Lake Highway November 10th 9:30 am For information reservations or for accommodation of persons with special needs at sales meetings call: 1-800-372-2472 TTY: 1-877-833-4486 8 a.m. to 8 p.m., HUMANA. Guidance when you need it most 7 days a week -Medicare -Group Health -Individual Health -Dental, Life, Vision Medic ^arepool.gn aalbet aynSnoldi6 oh6 rtAadPr fMdcrtruhaeo iaiiy Enrollment pen t0 .n6sa M0006-GHAO 32ORR@ *10/08 MONDAY, OcTOB'lt 27, 2008 A7 CITaRUS COUNTr (FL) CHRONICLE *.Jr",;.'" ,- "', u CITRUS COUNTY (FL) CHRONICLE Weird WIRE Couple get more than order of tacos LAKEWOOD, Colo. -A Col- or. Klermund initially denied any knowledge but admitted the bag was meant for a friend after a search dog found more mari- juana in a locker, police said. Klermund no longer works at the restaurant, said manager Ulises Montero. A message left for Klermund was not returned. Woman has dreads of nearly 9 feet MIAMI ." Hogzilla? 200-lb wild boar struck by car LANCASTER, Mass.- This was no ordinary road kill. Massachusetts State Police say q 200-pound Russian wild boar Nas- ote bait. Goof leads store to sell diesel too cheap LYONS, Wis. Diesel fuel was on heavy discount at a rural Wis- consin convenience store -just 59 cents a gallon. That is, until the owner discov- ered wam- ing light indicating the diesel tank had only 200 gallons left. Eighteen-year-old Jordan Koster knew something was wrong when he filled his pickup's 30-gallon tank for only $10. He told his father, and his father ad- vised him to make things right. The teen stopped Monday and paid the full amount. SWhat you do after the fact Associated Press A volunteer loads items into a truck Friday after the House of Burns Memorial Chapel was evicted from their Pontiac, Mich., location. Even the dead can't escape foreclosure. Five bodies and the cremated remains of 22 people were removed in the wee hours Friday from the funeral home. They were delivered to the Oakland County medical examiner's office for storage around 4:30 a.m., said administrator Robert Gerds. No rest for dead at this funeral home PONTIAC, Mich.. A medical examiner's administrator, Robert Gerds, said some of the cremated remains date to the 1990s. The county will send the bod- ies to another funeral home if a family member makes a claim. A pastor who went to the building Friday to attend a fu- neral service says he disap- proves of the timing and the way the eviction was carried out. Detroit television stations also aired video of caskets being re- moved. Man may get money mutilated by mice JACKSON, Mo.-A bunch of mice turn out to be no match for the U.S. Mint. A Mis- s When mopping isn't enough call... Mr. Tile Cleaner Showers Floors Lanais Cleaning & Sealing | Residential & Commercial 586-1816 746-9868 * I TWENTY DOLLARS FOR HAVING,4 YOUR HEARING CHECKED Tri-County is providing a complete Audiometric 44 testing for folks over the age of 62* and 44 giving them a $20 Malmart gift card FREE! Wust be 62 or older. Must have appointment Seniors discounts. Trade-in your old hearing aid. Ends 10/31/08 Over 23 Years of Service 001TOIRI-COUNTY HEARING AID INCA,4 Beverly Hills 746-1 '133 Dunnelion 489-6565 Homosassa 382-5800 printed on the bills must be com- plete to get reimbursement. Johns said mint officials in- structed her to send the re- assembled bills and the feces and feathers to them in Wash- ington, D.C. The mint will then issue the customer a check for the exact amount the torn money is worth. Parade draws fire for dropping 'Christmas' PATCHOGUE, N.Y.-A famed fireworks company is pulling out of a holiday boat pa- rade because "Christmas" was dropped from the event's name. Fireworks by Grucci won't lend its sparkle to Patchogue's Nov. 23 parade decorated yachts on the Patchogue River-- be- cause the organizers have re- named it the Patchogue Holiday Boat Parade. It was the Patchogue Christmas Boat Pa- rade last year, when the Grucci company donated $5,000 worth of fireworks. The company's vice president, Philip Butler, who has criticized the secularization of Christmas in the past, said parade organizers were "using all the themesof Christmas and plagiarizing all those themes." com- pany is famous for providing spectacular fireworks displays at major national celebrations. It is based in Brookhaven. -From wire reports Identity theft, part 2 ast week's column dis- cussed how to recog- nize identity theft and the steps we can all take every day to prevent it. This column will discuss what to do, if despite your best ef- forts, you find yourself a vic- tim of identity theft. Remember, identity theft is the unauthorized use of your personal in- formation for - fraudulent pur-. . poses. If identity theft happens to you, you will want . to take all neces- sary steps to pre- vent any fraudulent actions from being attrib- uted to your good Maria name. What ASKI should you do? ANSW The first thing to do is place a fraud alert on your credit reports, and then review these reports frequently There are three major credit bureaus, TransUnion, Equifax, and Experian. You need to place the fraud alert with only one of these com- panies; the company you contact will notify the other twp. You may place the alert by phone (advisable, since time is everything in this sit- uation), or by mail. Once you've placed the alert by phone, follow it up with a certified letter stating the facts of the crime, return re- ceipt requested. TransUnion: (800) 680- 7289 (toll free), or by mail to Fraud Victim Assistance Di- vision, PO. Box 6790, Fuller- ton CA 92834-6790. Equifax: (800) 525-6285 (toll free), or by mail to PO. Box 740241, Atlanta GA 30374-0241. Experian: (888) EXPER- IAN (toll free), or by mail to PEO. Box 9532, Allen, TX 75013. You are entitled to a free copy of your credit report from each of these compa- nies once you've placed the alert. Check each for any- thing suspicious in- quiries from companies you haven't done business with, addresses, phone numbers or employers you don't rec- ognize, accounts you didn't open, or abnormally high balances on accounts you do have. If you see anything wrong, contact the credit re- porting company at once to have it corrected. You will be asked to state your case in writing and a copy of your dispute will be placed in your file. Next, close any accounts you didn't open, or you be- lieve may have been used without authorization. Call I 0 0 0 I O2OOOFF $I 0000 O or more ACRYL OR - Our Expertise purchase. - - Extends to Many ......" Specific Products for Licensed Florida Building Contractor #CBC001467 Specific Products for Licensed Florida Roofing Contractor #CCC035617 Residential, Commercial Screen, Vinyl, Acrylic & Glass Rooms Roof-Overs Awnings Patio Covers Carports Soffit/Fascia Vinyl Siding Pool Cages Storm Protection I i each creditor and ask for the security or fraud de- partment, not just customer service. It is important to follow up a phone conversa- tion with a written request immediately, certified mail, return receipt requested. Make sure you keep copies of all correspondence. Ask each company to send you the necessary forms to dis- pute all unauthorized trans- actions. When the disputed transactions and/or ac- counts are resolved, insist that each com- .. pany send you a -* letter stating that fact. Should you .. choose to reopen l accounts with these same com- -' panies, make sure you use new PINs and passwords. An additional Weiser option is to file an ED & "Identity Theft fERED Report". An Iden- tity Theft Report is an enhanced police report, with specific details about the crime. Once you get this report, for- ward a copy to each of the three credit bureaus. This should get questionable ac- counts closed, but in itself isn't sufficient to dispute specific charges. To do that, you will have to follow the dispute procedure outlined above. You should also send a copy of the Identity Theft Report to each of your cred- itors to substantiate your as- sertion that your identity has been stolen. Finally, you may want to consider placing a credit freeze on your account. A credit freeze restricts ac- cess to your credit report until you lift the freeze. A freeze would make it impos- sible for a thief to open a new account in your name, as the creditor would not have the ability to pull a credit report on you, a nec- essary step before opening a new credit line. This is a two-way street. Should you decide to apply for credit - if you're buying a car, get- ting a mortgage, or even opening a cell phone ac- count you need to lift the freeze. There may be a fee for the freeze, usually $10, although it is often waived for identity theft victims. Companies that you cur- rently do business with are still able to obtain your credit report with a freeze in place, as are collection agencies and sometimes po- tential employers and land- lords. In addition, you will still be able to obtain your free annual credit report. Identity theft is a serious crime. It can impact not only your credit but your life, making it difficult to get a new job, rent an apart- ment, or simply get cell phone service. Unfortu- nately, the burden of work in mitigating the fallout re- sulting from this crime falls on you, the victim. The cliche in this case proves the point--an ounce of pre- vention is worth a pound of cure. Guard your identity the way you would any tan- gible asset. Do not give out privileged information if you have any doubts about why it's being requested. Shred any documents that contain personal informa- tion with a cross-cut shred- der. Educate your children not to give information to strangers who may call the house. Request that your employer not divulge infor- mation without checking with you first. These simple steps will prevent your spending weeks or even months trying to undo dam- age that need not have been done in the first place. Sources: US Federal Trade Commission, Privacy Rights Clearinghouse. Maria Weiser had a 32-year career in the banking and finance arena before starting an Internet research consulting firm. She is a transplanted New Yorker who has lived in Citrus Hills for the past 1 1/2 years. She can be reached at chronicleaskedand answered@gmail.com or 527-9156. BLINDS WE'LL MEET OR BEAT ANY COMPETITORS PRICE* The Savings Are Yours Because The Factory Is Ours! FAST DELIVERY PROFESSIONAL STAFF S HOULIND FACT F. n SIn Home Consultng -Installation ala1.nces-e A. [ AIRPORT TRANSPORTATION 637-5909, Group Discounts aj./.rfl~~~.'o.,,~rJ .rJ THE PERFECT INDOOR ENVIRONMENT, BROUGHT TO YOU BY TRANE. UP TO $1,100 REBATE plus 6 months same as cash* when you purchase any qualifying Trane XLi system between Aug. 28 and Oct. 29, 2008. Install a new Trane heating and cooling system and you'll be rewarded year after year with no premium comfort and lower energy bills. And, now through October 29, 2008, you'll also be rewarded with up to $1,100 dealer. DANIEL'S HEATING & AIR CONDITIONING INC. .Mw 4581 S. Florida Ave., Inverness, FL / ns^-* 352-726-5845 U Lic. #CAC042673 Rebate up to a maximum of $1,100 Is available on qualifying systems and accessories only and may vary depending on models purchased August 28th through October 29th. Available through participating dealers only. Dealer sales to a builder, where no homeowner purchases directly from the dealer at the time of Installation, are not eligible. All Installations must be located In the contiguous United States. Void where prohibited. NOTE: Rebate up to $1.100 is dependent upon system purchased. credit plans may be available. Ask seller for details. All credit plans subject to normal credit policies. A MONDAY, OcrOBER 27, 2 8 SATISFACTION 2 YR. INSTALLATION WRRANTY AR MO-N-, n-I 9. 7 / UnnO A I WHITE ALUMINUM I ('r, '.K (?, rrsjrv(F!) CHn~tlNJfy OD' COER2,208A a * '1 n~I * A.~t:A.~ A FREE Hearing Test! FATHER & SONS il EA NG k The New Curve is Completely Water Resistant!! 40% OFF A Pair of Curve Hearing Aids Try Curve FREE for 30 days FREE Hearing Evaluation Curve Lifetime Circuit Warranty *: **.'. o."*( ",.\ ai .. .... t.2' : ..... ...... ^.. --. - I ' fREE CLEAN & CHECK 4 -El I I * WALMART HOMOSASSA TRAIL * PUBLIC FATHER & SONS HEARING, INC. OPTICAL OUTLET nDAIOn cuSACr 1 2 OUTBACK * CRYSTAL 0 CHEVROLET HEARING, INC. * CINNAMON STICKS A - 71 g urve" L ,11AI I M 1 ^ fA I J "..'N'TY MONDAY, OCTOBER 27, 2008 A9 Onus;r; reruytrv )CHRrONICrR t cv *;yv ;i,.i *' ^--, ;:.. N\ 1 "mAh A10 MONDAY OCTOBER 27, 2008 '/ (~ ) -- ~ ~ / / ) J J C ] "A constitutional statesman is in general a man of common opinions and uncommon abilities." Walter Bagehot English essayist (1826-77) CITRUS COUNTY CHRONICLE CITRUS COUNTY CHRONICLE Founded in 1891 by Albert M. Williamson EDITORIAL BOARD Gerry M ulligan.......................................... publisher Charlie Brennan ............................................ editor Neale Brennan ........ promotions/community affairs Kathle Stewart ..........................circulation director Mike Arnold ..................................managing editor Cherl Harris......................................features editor Curt Ebltz .......................................citizen member Mac Harris ...................................... citizen member Cliff Pierson ....................................guest member - -, % 4 l Aw m Copyrighted Material Syndicated Content Available from Commercial News Providers Send Dean back to Senate for new term LETTERS to the Editor Charlie Dean has a history of knowing what the peo- ple he works for want Be it when he was serving Citrus County as sheriff for 16 years, representing his constituents in the Florida House from 2002-07, or serving those in the 13 coun- ties that make up state Senate District 3 he now represents, Dean has stood out as a conser- vative leader who talks and walks the way the majority believe their leader should talk and walk Dean's down-to- earth demeanor and affable ap- proach to consensus building has won him more friends than foes in his four decades of public service. That dis- THE IS State S Distri OUR OP Charlie dese another tinct sense of familiarity is a rare commodity, especially in his cur- rent district, which extends like an outstretched& greei beani over more miles than 'ahy other state Senate district. But that hasn't kept Dean from making the most of his almost larger-than-life image of a statesman who is as comfortable fighting a battle on the Senate floor as he is attend- ing a high school football game. 'Add to that image the fact that he is a lifelong resident of Citrus County, has been a small busi- nessman, a teacher, a rancher and a Marine, and voters seem to agree Charlie Dean is someone you are glad is on your team. That's hard to beat, especially for his Democrat opponent, Suzan Franks, who has an ad- mirable history of political serv- ice to the state of New Hampshire but limited under- standing of the state of Florida, having moved to Citrus Hills from New England four years. Franks served on the New Hampshire Legislature for eight years, served as an elected mem- ber of the New Hampshire Board of Education and has impressive credentials in the areas of health and education. She logs in more than 23 years of public service, but just simply cannot match the relationship that Charlie Dean has garnered in his lifetime of public service in Citrus County and throughout Florida. This is not the first time these candidates have squared off in an election. Dean received 67 percent of the vote over Franks in an abbreviated special Senate election last summer when Nancy Argenziano was ap- pointed to the Public Service Commission, leaving the Senate seat open. And while Dean has added Senate experience to his cam- paign resume, not much else has changed between the two to merit a change of leadership in this position. Franks has ad- mirably taken Dean SSUE: to task on some heavy issues while Senate on the campaign ct 3. trail, but was unable to substantiate a 'INION: convincing argu- Dean ment that she would rves be able to bring r term. about the changes she says are needed. Her con- cerns for economic policies and public education have been uni- versal platforms throughout this election and even' her' cries' against unfunded mandates failed to rally the confidence that she could do the job any better than Dean. Dean has proven that he is re- sponsive to the concerns that his constituents are facing and his conservative perseverance to bring needed change is not that far off from the ideals of his op- ponent. But when he adds to the list his record for bringing grant funding into his district, his con- tinued empathy for the plight of the smaller communities, his proven stance on lowering taxes and his avowed commitment to water quality, the choice for which candidate to support be- comes clear. Suzan Franks has introduced herself as a public servant and we hope that she continues to fol- low that vocation. Her dedica- tion, fortitude and amiable personality have marked her as an asset to this community and there will be many opportunities for her to serve and make that mark But in this race, it would be dif- ficult to find a runner who can match the course set for the Florida Senate for the next four years than Charlie Dean. His rep- resentation promises to be per- sonal, passionate and memorable. His return to the Florida Senate would be the right choice for voters and the right decision for this district. Nasty attacks It is unfortunate that you chose to print the article by Diana West, "Radicalism growing chasm" on Oct 13. Its content is similar to cer- tain content on Web sites whose facts have been seriously chal- lenged by the mainstream press.This is not good for our Democracy Do you wish for peo- ple to vote? These sorts of attacks are what citizens hate in politics with good reason. A functioning Democracy requires people with differing opinions to talk with one another in an earnest effort to un- derstand one another's point of view. Inflammatory speech can have unexpected consequences. It keeps people of good will from un- derstanding and talking to one an- other. Democracy cannot function without discussion and compro- mise. Or, do we not really want a democracy? The recent tone in the campaign has gotten out of line and is way over the top. Flankly, I am e-mail- ing because I sincerely fear for Sen. Obama's life. Whoever wins or loses this election, the current method of negative attacks is not good for democracy here or abroad. It is a bad example to other countries and cultures that either do or do not like us very much. I worry about these words "radi- cal" and "liberal." The sons and daughters of the American Revolu- tion were called radicals by sup- porters of the king and loyal citizens of England at the time. The word liberal does not mean terrorist, does not meant unethical or unspiritual. We have to think carefully before speaking or writ- ing or reading the words of others. Inflammatory articles like West's only serve to hinder open discus- sion to solve our rather daunting problems. I believe in our country and its promise. To keep our democracy we must respect one another. I would like.to see both campaigns and enthusiastic supporters pro- mote fair campaigns now and in the future that places democracy first. Win or lose, we must ask our- selves are we better able to talk with one another or less so as the result of our elections. If not, we have not served our democracy well whether independent, Repub- lican or Democrat. Sheila Woods Hernando Get out and vote Though not a particularly politi- cal person, I take the privilege of voting seriously. Our country is fac- ing problems mostly created by those we, the people, put into of- fice. We did that because we lis- tened to impossible empty promises which were lies re- hearsed to gain votes. Here we are again! Obnoxious signs, debates that aren't, intrusive commercials, and daily mailings have taken over our towns and air- waves. What's the answer and for whom shall I.vote? Risky business, tough choices, deep concern and even fear has invaded our lives. The American people must be- come united and strong, standing up to our corrupt government, De- mocrat, Republican or independ- ent. To keep our freedoms, regain control of our rights, and fulfill the needs and hopes of each and every.. American, we must vote. Vote, not because of disdain for yesterday, but for what only we can build in our today and tomorrow. Credibility, performance, pro- ductivity, truth, morals and proven leadership must be prerequisites, without question. Use caution when casting your vote; don't be fooled by smooth talk and declara- tions not attainable. Vote. We must make these United States great once again, as fellow Americans. Joanie Welch Inverness Change is due Social Security and Medicare have a shortfall of $74 trillion and for decades successive congresses have failed to make any substan- tial reform. A number of other countries, however, have solved their Social Security problem through privatization. Noted economist Jose Pinera developed the first major privatized Social Security system when he was Labor Minister of Chile. The pro- gram has been in operation for 29 years, is fully phased in and pro- vided workers with more than 10 percent return/year. Thirty other countries have adopted the plan and the evidence is clear; in both theory and practice this priva- tized system provides better re-, tirement and is more flexible. Mr. Pinera, working with the Cato Institute, has developed a plan for the U.S., which calls for no tax increase, fully protects those nearing retirement while giving younger workers the proba- bility of much higher return on contributions, and is more flexi- ble once workers retire. Our cur- rent system relies solely on the payroll taxes of 158 million salaried workers; shortly, each re- tiree will be supported by payroll taxes on only two workers. The entire system is unsustainable un- less taxes are increased dramati- cally, benefits cut, or retirement age pushed back markedly. Medicare's spiraling costs can also be solved by privatization and a market-based system. Greatly expanded health savings accounts (HSA) coupled with cata- strophic insurance will solve the problem for most people; reserve government programs only for those who are unable to work or earn enough. Think tanks other than Cato have similar programs also. Health care spending in the U.S. is a much greater percentage of GDP than any other country and cost effectiveness is far below what it could be. Candidates con- stantly call for "eliminating waste and fraud." Meanwhile, we are still waiting for a true statesman with the courage to apply a rea- sonable cost benefit test and scrap those programs which don't meas- ure up. Finally, evidence is mounting to show it's possible, once Social Security and Medicare are privatized, to elimi- nate our entire SRS system and replace it with a 10 percent con- sumption tax similar to the pro- posal in the Fair Tax. How about that for real change! Joseph R Ryan - Homosassa Fraught with fiction Since the year 2000, America has been declining in distinction, preservation and authenticity. Lit- tle truth comes from the mouths of our representation, preserving constitutionality. The Florida pri- mary holds witnesses of that Does censorship of votes enhance equal representation? Can we sin- cerely support a voting process, where fraud has generated votes, since 2000? Inconsequential accuracy pro- gressed in a war that followed the World Trade Center tragedy, too. How can we conclude the argu- ment for this war, when reasoning for being in Iraq has changed nu- merous times? Negative truths about privatizing Social Security never materialized either, but truth is clear, as the Stock Market plunged recently exposing the idea of gambling with retirement funds may not be beneficial. Symptomatically, we live other inequalities of validity such as the price of gas lowering at the pump, we wonder why? What is the truth behind gas prices, exports versus self supply, over-abundance of oil or perhaps a government playing Russian roulette with our econ- only, getting rich by supply/de- mand and necessity pricing? The latest disparity came with the bailout, which gave money to the very individuals unable to sup- port sound investments or lending of effective returns! Since these seemingly truthful elections started, no one seems overly con- cerned about our enormous deficit, so how much of that is a misrepresentation? As our government leadership enjoys benefits such as health care, traveling expenses, lodging costs, while receiving a salary of raises within their political ca- reers, Americans live without, but pay the price. It is time for the truth and past the duration of equalization. Astoundingly, all America heard the truth during this last political debate for president Obama con- cluded his opponent Republican candidate makes untrue declara- tions and it was completed that Obama doesn't speak accuracy, as well, by that same Republican pe- titioner, McCain. Did we finally hear the truth from both party candidates, that fiction governs America? Sandra Bra asmeister Inverness. "You may differ with my choice, but not my right to choose." David S. Arthurs publisher emeritus CHRONICLE EDITORIAL BOARD ENDORSEMENTS For the Nov. 4 General Election * CRYSTAL RIVER COUNCIL: John Kostelnick. * INVERNESS COUNCIL: Cabot McBride. * SHERIFF: Jeff Dawsy. * CIRCUIT JUDGE: Denise Lyn. * PROPTERY. .I.... ..... ....... ......... -". ENDORSEMENT MONDAY, OCTOBER 27, 2008 All L) H^ R Ot\ i n u ___ - -______________________ __ _ _____ ------------ --- NIC----------------- ----------------," ; Political LETTERS Men with vision The Republican Primary Election on Aug. 26 ex- ploded into a new era with 67 percent and 68 percent support for Joe Meek and Winn Webb, respectively The voters in that primary recognized the vision and wisdom that these fine men have to offer the citizens of Citrus County and sent them on to the November General Election to face their Demo- crat opponents. Likewise, the majority of primary voters thanked Dennis Damato for his keen vision and the business sense shown this last term by re-electing him to square off against the Democrat candidate. Damato won even with the anti-incum- bent sentiment that exists. These candidates know their job is to plan well be- yond my lifetime and even that of my children. ' One example is the issue of the Suncoast Parkway 2. The parkway will alleviate highway overcrowding by al- lowing traffic that wishes to pass through Citrus County to do so, non-stop. If a driver from Tampa wishes to drive toward Tallahassee, why would she want to stop at every light along U.S. 19 in Homosassa Springs and Crystal River? Let her go, at highway speed! If a rock truck from Inglis wishes to deliver product to Tampa or St Petersburg, let him pass through on a high-speed toll road. Why should Citrus roads accept the unneces- sary traffic and our taxpay- ers foot the repair bills? The best time to build a roadway would be when the highest percentage of the route would be undeveloped land. That time would be today. We could benefit from that decision for the next 50 to 75 years. That is vision. Damato, Webb and Meek completely understand the concept of the long view. Please vote for these men. The short sightedness of the current board has con- tributed to the building in- dustry being at a standstill in Citrus County. I'll also mention our high unemploy- ment rate, the closing of restaurants and shops, and the quick retreat of many businesses that would like to expand to Citrus County. Rise abo Jim Loos Homosassa ve it Today I received a "hate letter" in the mail regarding Barack Obama. The letter was addressed to "Resi- dent," had our address and no return address. It was a letter and various photo copies, all with outrageous lies about Obama. Nothing was signed. We have already had an Obama-Biden sign stolen from our yard and this bit of slanderous, hateful propa- ganda was just the straw .that has pushed me to write this letter. I cannot fathom the depth of iniquity and ha- tred which would cause a WE WANT YOUR PHOTOS * Photos need to be n sharp focus. * Photos need to be :n proper exposure: neither too light nor too dark. * include your name, address and phone number on all photos. * When identifying persons in your photo, do so from left to right. * For more information, call 563-5660. IN S ID E " ' SEARS- Hs.eadiRg Re , all makes andmodels Crystal River Mall S le V 795-1484 IBattery Sale | Paddock Mall, Ocala 9 237-1665 Ico (Limit 2 packs per visit) NEED A LAWYER Sen'ing Citrus Coiti' lor over 25 ears Altiorne) David Best \rlorne) Dutch inderson' ,, ..... ,-- '..... -K . Car Accidents Personal Injurn Social Securirt Medical Malpracutice FREE CONSULI.1I IO ,N. II.,r. ..r H...,.il BEST, KANDERSON.P-.. ATIORNEYS AT LAVV ,.6', HL.. aPe ,,. I 352-795-1107 C,-.,.,,Ip.,.cr.FL V\ Best.Anderor cornm Do You /"/V Have EnoughZ Coverage? / Von't wait to find out that the insurance you purchased online or from an 800 number gave you a discount on the wrong coverage. Talk to your neighborhood inde- pendent Auto-Owners agent, about a policy thatfits your needs and budget. Visit today and form a valued relationship, that won't let you down in a time of need. dIuto-Owners Insurance VanAllen INSURANCE AGENCY 352-637-5191 1-800-988-5191 *AUTO* HOME. BUSINESS. LIFE." * Through the Nov. 4 General Election, the Chronicle will not publish Sound Offs that comment on candidates. * General Election: Nov. 4; early voting is Oct. 20 to Nov. 1. person or group to send out something like this. I have turned the mailing over to the Democrats. They need to know the lows to which people are stooping in this election. It is hard to believe.that these people can disseminate such overt lies and still live with them- selves. I only hope the na- tion can rise above these base people. Kathleen Stonerock Homosassa Feminists for Palin This is in response to the man who wrote in saying that feminists hated Sarah Palin. I repeat: a man. How the heck does he know what feminists hate? I am a dyed- in-the-wool feminist. I cam- paigned for the passage of the ERA in the '70s, and I am very pro-Sarah. Femi- nism is about accepting who we are, what we are and what our daughters can be- come. It is neither one issue nor one-sided. Sarah Palin is exactly what feminism is about She is a wife, mother and public servant. She's doing it all. She speaks her mind. I can relate to her. That man who wrote in that feminists hate wives and mothers, a) is a man, b) has a twisted view of feminists, and c) should ei- ther join the rest of us in this millennium or keep this chauvinistic thoughts to himself. To actually write something like that and sign his name makes me very thankful that God in his infi- nite wisdom created more women than men. Martha Bowman Floral City Common sense Tell all of our lawmakers that our desire is to spend at least half of the billions des- tined to bail out the banks and stock market to be used to free us from foreign oil. We the people have toler- ated this extreme display of incompetence for too long, from both parties, and through the years of greed and ignorance they have de- stroyed all the confidence we had in them. So, remem- ber this fiasco at the polls and vote for all new Con- gress and Senate members to rid our country of corrup- tion, greed and gridlock. I would love to see a few more people like Gov. Sarah Palin, who I believe would better serve our country than all the rest we don't need lawyers with sharp tongues and very soiled backgrounds but we do need a lot of common sense that seems to elude almost all of our lawmakers today, especially the few with ad- vanced degrees, who only think "they" know what makes the world go around. Eggheads? With no ability to reflect practical experience! Gaylord LaGraves Stevens Point, Wis Doing it right Just received my "Sample Ballot" from the Supervision of Elections, Citrus County, offering an opportunity for early voting in the General Election. As usual,;our Su- pervisor of Elections has es- tablished an outstanding presentation of material in order for us to consider who we wish to vote for. Too, may I suggest we have not expe- rienced any problems in Cit- rus County in our voting experience. This tells me ,Susan Gill is doing it right Neville Anderson Inverness .. Geoff Greene Experienced &... I will apply over 35 years of successful business leadership experience to effectively manage our Property Appraiser's Office for the benefit of all taxpayers. I will provide service that treats all taxpayers fairly and with the utmost respect they deserve. I am firmly committed to lower value assessments consistent with the. real world marketplace. Together we can make the changes that will move Citrus County's future in the right direction. Ready to Serve, .. SExperienced Real Estate Appraiser ^ Experienced Housing Development Executive SExperienced Real Estate Broker & Mortgage Banker L-- Experienced Manager of 200 Employees & $20 Million Budgets Ready for Changes. E Fiscal Responsibility. E' Lower Assessed Values L' Higher Standards in Service er i.,. '*,' '*\H7' ^,yiw Property Appraisi I L_ OPINION CT rynrr .. .. OTRus COUNTY (F TOER 27. 2008DAY OCTOBER 27, 2008 CITRUS COUNTY CHRONICLE S. -fir -. 00 -4, Off with ' N a the glov , Copyrighted Material Syndiccated Content Available from Commercial News teo.... *j fl me .amomn a w 16- 40* a* 4 a.m a*-M Providers -am aw Ipaa wqm amihd ,,a avw'oM- w sp bra o"I an : 14" en am ~ .0 9 al s w Pakan militim thwart aomm a. a na= .e n kedb kaw hA; I kM Ar*At rmtIr" *A ( '"Aa ni i iLMUUUX~pt .=.. ii iiyf f ,.a, : =s= i^ 1^ fbm-n.l Ga- umo -a 1dmSaa semw i.nmw 4 Klm 1% a owmlft ao- a W--RWa- am0-4pA wwmka us -ho a __ fl S 4W, b Ma OW--a OmW ~ S 40 aM -M a 'Wm mt-o. e fl 440.a.n. %EAa- ra M~df M ONM- 4a aT w f o a-rn a a. .i .-e Nbk- mwewlw a .wa* i w ft.i *uuf ronicleonlin e.oom * NFL/B2, B5 * Golf/B3 * Local Sports/B4 * Scoreboard /B4 * Lottery/B4 B MONDAY OCTOBER 27, 2008 "V Buccaneers come up short on final drive Copyrighted Material SSyndicated Content Available from Commercial News Providers JoummI Cup ked AVO&- eam Ommommo m wisil %W 4mu mm 4wa00000ll two M mmmom lbm II OOM 411m llllll% lD ( W 4w m, ftm sID WANMMO..MMUmb 400O 011PaM asMOlD M 40000 W u .: 0 Olb 4MvMM 41 4049 MiMOW lOiMMilil Rayi |BL|- -_ _ -~m Q~ ' I -4 0 *fml %wam q n a 4mmba 4w 48 CI S ~ a a Flondia's -se edmamm Mewr issues ( ortdr (aomxingr Bulkk .~ea .4 * awe ____ -~ a a .. ~a e * a n .. a fl a S a ,._ ..- a .... .... ivanx,, x S "a. .... ft " ...... .:** _, IIIIII * ... . ... Aft. *.. y, OCTOBER 27, 2008 SIC -OBER 3/,-U. . BOX SCORES Dolphins 25, Bills 16 Buffalo 3 6 7 0-16 Miami 7 0 10 8-25 First Quarter Mia-Fasano 2 pass from Pennington (Carpen- ter kick), 9:26. Buf-FG Lindell 19, 4:21. Second Quarter Buf-FG Lindell 43,8:19. Buf-FG Lindell 47, :00. Third Quarter But-Lynch 8 run (Lindell kick), 10:17. Mia-FG Carpenter 43, 7:56. Mia-Williams 3 run (Carpenter kick), 1:15. Fourth Quarter Mia-FG Carpenter 45, 13:17. Mia-Anderson safety, 7:40. Mia-FG Carpenter 35, 3:53. But Mia First downs .19 19 Total Net Yards 339 358 Rushes-yards 27-119 27-52 Passing 220 306 Punt.Retums 1-0 0-0 Kickoff Returns 6-121 3-37 Interceptions Ret. 0-0 1-30 Comp-Att-Int 21-35-1 22-30-0 Sacked-Yards Lost 2-7 1-8 Punts 3-47.3 4-39.5 Fumbles-Lost 4-3 2-1 Penalties-Yards 7-64 7-51 Time of Possession 28:48 31:12 INDIVIDUAL STATISTICS RUSHING-Buffalo, Lynch 13-61, Jackson 10- 41, Edwards 4-17. Miami, Brown 14-43, Williams 7- 16, Polite 1-3, Pennington 4-(minus 5), Camarillo 1-(minus 5). PASSING-Buffalo, Edwards 21-35-1-227. Miami, Pennington 22-30-0-314. RECEIVING-Buffalo, Evans 7-116, Lynch 5-34, Royal 2-26, Hardy 2-19, Reed 2-19, Schouman 1- 9, Parrish 1-3, Jackson 1-1. Miami, Ginn Jr. 7-175, Camarillo 5-35, Williams 2-43, Martin 2-20, Fasano 2-17, Bess 2-13, London 1-6, Brown 1-5. MISSED FIELD GOALS-Miami, Carpenter 46 (BK). Patriots 23, Rams 16 St Louis 3 7 3 3-16 New England 7 6 0 10-23 First Quarter StL-FG J.Brown 20,8:49. NE-Green-Ellis 2 run (Gostkowski kick), 1:43. Second Quarter StL-Avery 69 pass from Bulger (J.Brown kick), 14:14. NE-FG Gostkowski 30,1:49. NE--FG Gostkowski 27,:00. Third Quarter StL-FG J.Brown 44,8:03. Fourth Quarter StL-FG J.Brown 25,12:25. NE-FG Gostkowski 41,8:22. NE-Faulk 15 pass from Cassel (Gostkowski kick), 3:13. StL NE First downs 15 23 Total NetYards 358 348 Rushes-yards 26-90 29-98 Passing 268 250 Punt Returns 0-0 3-30 Kickoff Returns 4-78 4-121 Interceptions Ret. 2-29 1-47 Comp-Att-Int 18-34-1 21-33-2 Sacked-Yards Lost 4-33 3-17 Punts 6-40.8 3-49.7 Fumbles-Lost 1-0 0-0 Penalties-Yards 9-63 0-0 Time of Possession 29:25 30:35 INDIVIDUAL STATISTICS RUSHING-St Louis, Pittman 19-83, Minor 4-8, Burton 1-0, Krekier 1-0, Avery 1-(minus 1). New Eng- land, Faulk 13-60, Cassel 7-22, Green-Ellis 9-16. PASSING-St Louis, Bulger 18-34-1-301. New England, Cassel 21-33-2-267. RECEIVING--St. Louis, Avery 6-163, D.Hall 4- 47, Holt 3-28, Pittman 3-22, Burton 2-41. New Eng- land, Moss 7-102, Welker7-79, Faulk 4-47, Gaffney 1-17, Watson 1-13, D.Thomas 1-9. MISSED FIELD GOALS-None. Ravens 29, Raiders 10 Oakland 0 0 10 0-10 Baltimore 2 17 3 7-29 First Quarter Bal-J.McClain safety, 10:32. Second Quarter Bal-McGahee 1 run (Stover kick), 14:26. Bal-Williams 70 pass from Flacco (Stover kick), 7:26. Bal-FG Stover 38, :10. Third Quarter Oak-FG Janikowski 22,10:13. Bal-FG Stover 30, 3:18. Oak-Griffith 2 pass from Russell (Janikowski kick),:36. Fourth Quarter Bal-Flacco 12 run (Stover kick), 3:35. Oak Bal First downs 10 18 Total Net Yards 234 375 Rushes-yards 19-47 46-192 Passing 187 183 Punt Returns 3-5 4-63 Kickoff Returns 6-109 3-70 Interceptions Ret. 0-0 1-0 Comp-Att-Int 15-33-1 13-25-0 Sacked-Yards Lost 4-41 0-0 Punts 5-49.8 6-40.3 Fumbles-Lost 0-0 1-1 Penalties-Yards 2-10 8-52 Time of Possession 23:40 36:20 INDIVIDUAL STATISTICS RUSHING-Oakland, Fargas 12-24, Russell 1- 13, Bush 5-8, Griffith 1-2. Baltimore, Rice 8-64, Mc- Gahee 23-58, LMcClain 7-32, Flacco 4-23, T.Smith 3-13, Clayton 1-2. PASSING-Oakland, Russell 15-33-1-228. Bal- timore, Flacco 12-24-0-140, T.Smith 1-1-0-43. RECEIVING-Oakland, Schilens 3-76, Miller 2- 56, Walker 2-28, Higgins 2-16, Curry 2-13, Lelie 1- 23, Bush 1-9, Stewart 1-5, Griffith 1-2. Baltimore,. Rice 3-37, Heap 2-17, Wilcox 2-13, McGahee 2- (minus 1), Williams 1-70, Flacco 1-43, Mason 1-3, LMcClain 1-1. MISSED FIELD GOALS-None. Redskins 25, Lions 17 Washington 3 3 10 9-25 Detroit 7 3 0 7-17 First Quarter Was-FG Suisham 25,8:12. Det-R.Johnson11:58. Was Det First downs 22 13 Total Net Yards 439 274 Rushes-yards 33-135 15-57 Passing 304 217 Punt Returns 5-99 0-0 Kickoff Returns 2-43 5-115 Interceptions Ret. 0-0 0-0 Comp-Att-Int 23-28-0 21-35-0 Sacked-Yards Lost 3-24 1-6 Punts 2-40.5 6-43.8 Fumbles-Lost 2-1 2-0 Penalties-Yards 8-67 7-51 Time of Possession 35:45 24:15 INDIVIDUAL STATISTICS RUSHING). i .0"JPA AIL SCopyirighted Material_ HSyndicated Content Available from Commercial News Prov ,_ ... > , ... x,. Sl i dq a 4 . - .. ::: BOX SCORES Saints 37, Chargers 32 San Diego 3 14 3 12-32 New Orleans 3 20 7 7-37 First Quarter NO-FG Mehlhaff 23, 6:34. SD-FG Kaeding 33, 3:30. Second Quarter NO-Henderson 12 pass from Brees (kick failed), 11:02. NO-McAllister 1 run (Mehlhaff kick), 8:52. SD-Tomlinson 12 pass from Rivers (Kaeding kick), 5:35. NO-Moore 30 pass from Brees (Mehihaff kick), 3:29.' SD-Gates12 pass from Rivers (Kaed.kick), 1:08. Third Quarter NO-Campbell 1 pass from Brees (Mehlhaff kick), 10:15. SD-FG Kaeding 24, 3:25. Fourth Quarter NO-Karney 1 run (Mehlhaff kick), 14:49. S9-FG Kaeding 31, 9:35. SD-Jackson 14 pass from Rivers (Kaeding kick), 7:21. SD-Team safety, :08. SD NO First downs 22 28 Total Net Yards 451 409 Rushes-yards 22-110 26-70 Passing 341 339 Punt Returns 2-20 0-0 Kickoff Returns 8-201 6-113 Interceptions Ret. 0-0 1-8 Comp-Aft-Int 25-40-1 30-41-0 Sacked-Yards Lost 0-0 0-0 Punts 2-48.0 3-42.0 Fumbles-Lost 1-1 2-0 id e rs Penalties-Yards 14-134 6-60 Time of Possession 29:10 30:50 INDIVIDUAL STATISTICS RUSHING-San Diego, Tomlinson 19-105, Sproles 1-6,Tolbert 1-0, Rivers 1-(minus 1). New m Orleans, McAllister 18-55, Thomas 3-28, Stecker 2-9, Karney 2-4, Brasees 1-(minus 26). PASSING-San Diego, Rivers 25-40-1-341. New Orleans, Brees 30-41-0-339. RECEIVING-San Diego, Gates 6-96, Tomlitn- son 5-65, Chambers 5-47, Jackson 4-60, Sproles 3-45, Floyd 1-21, Manumaleuna 1-7. New Or- leans, Miller 7-82, Moore 6-90, Stecker 5-27, McAllister 4-30, Henderson 3-34, Colston 2-56, -. Campbell 2-14, Shockey 1-6. MISSED FIELD GOALS-None. Panthers 27, Cardinals 23 Arizona 3 7 13 0-23 Carolina 0 3 21 3-27 First Quarter Ari--FG Rackers 21, 6:56. .. .... Second Quarter Adri--Bo~in5passfromVWamrner(Rpdemitk), 11:16. Car-FG Kasay 23,5:42. Third Quarter Ari--Hightower 2 run (Rackers kick), 10:13. Car-Williams 15 run (Kasay kick), 6:54. Car-Smith 18 pass from Delhomme (Kasay S .... kick), 6:10. .Ari--Boldin 2 pass from Wamrner (run failed), :58. Car-Smith 65 pass from Delhomme (Kasay kick), :02. Fourth Quarter Car-FG Kasay 50,9:09. ... _a U S * 4a m . S..M. . 5-A ". - -- -.',~ - ~. - * w -~ - e m ,-. ~HH~ Giat get p2114 Gians ge pas Sicien - # s 4 -~ a ~. in- - ft-, .-Im gmm dam 4.-..a f4 e sum * O.-...4w amMOlmilNO quoom*munmmmwmoamowmmw"* ilNhm- -a h -am n kgmuw OiNinM a ~. * r.. Ari Car First downs 25 22 Total Net Yards 425 351 Rushes-yards 14-50 29-113 Passing 375 238 Punt Returns 2-0 0-0 Kickoff Returns ,5-103 3-86 Interceptions Ret. 0-0 1-44 Comp-Att-Int 36-51-1 20-28-0 Sacked-Yards Lost 2-16 1-10 Punts 3-55.7 3-44.3 Fumbles-Lost 2-1 2-1 Penalties-Yards 7-60 3-25 Time of Possession 32:37 27:23 INDIVIDUAL STATISTICS RUSHING-Arizona, Boldin 1-30, James 7-17, h.Inio,.h,i '6< 6 .-xvoha Wr IumT 17-106. Sitwar * a. II., H ,:.er 1r-. Derir ri.ii'ne 2 .,nnus 2)1 S Imar 1-(minus 6). PASSING-Arizona, Warner 35-49-1-381, D.Johnson 1-1-0-10, Arrington 0-1-0-0. Carolina, Delhomme 20-28-0-248. RECEIVING-Arizona, Breaston 9-91, Boldin 9- 63, Fitzgerald 7-115, Urban 4-51, Tuman 3-41, Hightower 2-18, Anington 1-7, Doucet 1-6. Carolina, Smith 5-117, Muhammad 5-38, King 3-41, Jarrett 2-25, Williams 2-15, Hoover 2-12, Stewart 1-0. MISSED FIELD GOALS-None. Eagles 27, Falcons 14 Atlanta 0 7 .0 7-14 Philadelphia 0 10 7 10-27 Second Quarter At--White 55 pass from Ryan (Elam kick), 8:56. Phi-McNabb 3 run (Akers kick), 2:25. Phi-FG Akers 36,:00. Third Quarter. Phi-Westbrpok 16 run (Akers kick), 10:24. Fourth Quarter Phi-FG Akers 18,7:57. Atl-White 8 pass from Ryan (Elam kick), 3:55. Phi-Westbrook 39 run (Akers kick), 1:51. Atl Phi First downs 19 24 Total Net Yards 335 432 Rushes-yards 24-77 32-192 Passing 258 240 Punt Returns 4-22 3-(-5) Kickoff Returns '5-85 3-47 Interceptions Ret. 0-0 2-0 Comp-Att-Int 23-44-2 19-34-0 Sacked-Yards Lost 2-19 2-13 Punts 7-37.7 7-40.9 Fumbles-Lost 1-1 1-1 Penalties-Yards 6-51 7-70 Time of Possession 27:39 32:21 INDIVIDUAL STATISTICS RUSHING-Atlanta, Turner 17-58, Douglas 2- 10, Norwood 4-5, Ryan 1-4. Philadelphia, West- brook 22-167, McNabb 6-25, Buckhalter 4-0. PASSING-Atlanta, Ryan 23-44-2-277. Philadelphia, McNabb 19-34-0-253. RECEIVING-Atlanta, White 8-113, Norwood 5-55, Jenkins 3-50, Finneran 3-20, Snelling 2-20, Peelle 1-17, Mughelli 1-2. Philadelphia, Westbrook 6-42, D.Jackson 3-72, Curtis 3-45, Buckhalter 2- 29, LSmith 2-29, Celek 2-28, Baskett 1-8. MISSED FIELD GOALS-None. Jets 28, Chiefs 24 Kansas City 0 14 3 7-24 N.Y. Jets 7 7 7 7-28 First Quarter NYJ-Washington 18 pass from Favre (Feely kick), 8:50. Second Quarter KC-Gonzalez 19 pass from Thigpen (Barth kick), 13:51. NYJ-Washington 60 run (Feely kick), 1:48. KC-Biadeyll pass frmTigpen (Barth kick ), '04. Third Quarter KC-FG Barth 30,9:51. NYJ--Jones 1 run (Feely kick), :48. Fourth Quarter KC-Flowers 91 int, return (Barth kick), 7:48. NYJ-Coles 15 pass from Favre (Feely kick), 1:00. KC NYJ First downs 17 22 Total Net Yards 330 420 Rushes-yards 20-80 24-135 Passing 250 285 Punt Returns 2-7 3-71 Kickoff Returns 5-123 5-124 Interceptions Ret. 3-118 0-0 Comp-Att-Int 25-36-0 28-41-3 Sacked-Yards Lost 4-30 1-5 Punts 7-41.3 3-47.7 Fumbles-Lost 0-0 0-0 Penalties-Yards 4-39 4-20 Time of Possession 26:44 33:16 INDIVIDUAL STATISTICS RUSHING-Kansas City, Charles 5-45, Thig- pen 4-20, K.Smith 11-15. N.Y. Jets, Washington 3-67, Jones 14-54, Chatman 4-8, Coles 1-6, B.Smith 1-1, Favre 1-(minus 1). PASSING-Kansas City, Thigpen 25-36-0-280. N.Y. Jets, Favre 28-40-3-290, B.Smith 0-1-0-0. RECEIVING-Kansas City, Bowe 6-102, Gon- zalez 6-79, Bradley 5-42, Cottam 4-34, K.Smith 2-15, Charles 1-4, Darling 1-4. N.Y. Jets, Cotchery 9-102, Coles 7-64, Keller 4-38, Stuckey 3-43, Washington 3-34, Jones 1-6, Chatman 1-3. MISSED FIELD GOALS--N.Y.Jets, Feely 36 (WIL). .*. ~E--."' B2 MONDAY CITRUS COUNTY (FL) CHRONICLE NATIONAL FOOTBALL LEAGUE "::: ,:N, "" ,. n. J ..,N, ........ .. 'j..MM *a. :::....,h .::. ... * G = so= a C'Il,,rTQ CTNI I' (H CnhknNI(UjSPRS vluI cn~ 2,208 o - h~,mm fWm W . Available GNP e w a a 0 - righted Material.- icated ContenUt ommerci a iNews F - = -..- *o~o am 4- w Go- 4 qwp 4100- 4p op .40 - .. n 'a. -ow r 0 a 'a~ - a - a-421- a- - a a - .me - dw a a a - MMINNIM* dpf- a - - O a a O a" 4 aO-- O % 4D *-o -P qo Provide - a - - - *- e 'ae a - - 'm * a 0 4m aD - a .Ip U* S .0 o ,* * a- * ob.- -m- .-,ialo w - -* a. - __ , -o lo '" in. ispo4w - ,f -0 1 ,n m- *A .d mp - a' - .w .NRM t-now 44 - Is- 4D em 'a p a a 'a - S a' 'a t 4 . mo o 0 S-- o o _ * , 0 - - - - a a- a - - a - me a - 0e - - . ea we - -* * a - * a- e - S. * 0 **a * - a a a,. S 40. 0 O o O - * ' O o * O * * O o 0 o - 'a a - * * o O * o 'a * * o * o O a a * *0 o - a- * * a * * a a a Q a * a a oa _ 4D - S a - = - . b - - - 'a- a - a- = 'a = a - a a - - a - - a a - -- a. 0' a a.- - - " -- a -'a --"a - -- a- a - a - a *q - MOP- 4m-a - 'a 4w -mus 0.0o- Mlwpm -00 - w 40 -- a a-dip .-mob' 4D 4m * - a a p a- 'a 'a a - a 0 'a- a -a - a a -'a * - a 'a * a 0000 - ,. O 4m 40 W- 40 * O -r Oa .a * * na S 'a 'a O- rs MONDAY, OCTOBEiR 27, 2008 B3 SPORTS CrrRus CouNTY (FL E o o d 0 . e o . - o w * * ** Q o B4 MONDAY, OCroneR 27, 2008 Spoirrs CITRUS CoUNm' (FL) CHRONICLE For the record Florida LOTTERY CASH 3 (early) 3-2-8 PLAY 4 (early) 9-6-8-0 CASH 3 (late) Florida Lottery 4-8-4 Here are the winning PLAY 4 (late numbers selected 9 9 1 6 Sunday in the FANTASY 5 Florida Lottery: 7 10 24 25 -33 On the AIRWAVES .. TODAY'S SPORTS MLB PLAYOFFS 8 p.m. (13,51 FOX) World Series Game 5 -,Tampa Bay Rays at Philadelphia Phillies NFL FOOTBALL 8:30 p.m. (ESPN) Indianapolis Colts at Tennessee Titans NHL HOCKEY 8 p.m. (VERSUS) Chicago Blackhawks at Minnesota Wild Prep SCHEDULE TODAY'S PREP SPORTS VOLLEYBALL District 4A-6 Tournament at Lecanto High School 6 p.m. No. 1 Belleview vs. No. 8 South Sumter 8 p.m. No. 2 Lecanto vs. No. 7 Dunnellon GOLF PGA Tour-Frys.com Open Sunday At Grayhawk Golf Club, Raptor Course Scottsdale, Arlz. Purse: $5 million Yardage: 7,125; Par: 70 Final Round x-won on second hole of playoff x-Cameron Beckman, $900,000 69-66-64-63-262 -18 Kevin Sutherland, $540,000 67-66-63-66-262 -18 Mathew Goggin, $340,000 69-63-68-63-263 -17 Mike Weir, $206,667 66-68-69-63-266 -14 J.J. Henry, $206,667 65-69-68-64-266 -14 Arron Oberholser, $206,667 65-64-71-66-266 -14 Pat Perez, $150,625 71-66-67-63-267 -13 Michael Sim, $150,625 72-63-68-64-267 -13 Steve Allan, $150,625 67-63-68-69-267 -13 Paul Goydos, $150,625 70-62-66-69-267 -13 Aaron Baddeley, $102,500 67-70-66-65-268 -12 Davis Love III, $102,500 69-67-67-65-268 -12 Brenden Pappas, $102,500 69-69.64-66-268 -12 Woody Austn.5 102500 * 69-65-65-69-268 -12 Bob Tway, $102,500 69-67-64-68-268 -12 George McNeill, $102,500 68-63-66-71-268 -12 Sean O'Hair, $75,000 68-65-69-67-269 -11 Billy Mayfair, $75,000 69-64-68-68-269 -11 Steve Elkington, $75,000 66-67-68-68-269 -11 Robert Garrigus, $48,944 66-66-71-67-270 -10 Charley Hoffman, $48,944 70-65-69-66-270 -10 Peter Lonard, $48,944 69-70-64-67-270 -10 Rod Pampling, $48,944 70-68-65-67-270 -10 Bill Haas, $48,944 66-68-68-68-270 -10 Nick Watney, $48,944 69-67-66-68-270 -10 Todd Hamilton, $48,944 69-69-64-68-270 -10 Brad Elder, $48,944 68-63-70-69-270 -10 John Mallinger, $48,944 63-69-66-72-270 -10 Michael Letzig, $32,500 69-66-68-68-271 -9 Robert Gamez, $32,500 67-69-69-66-271 -9 Rocco Mediate, $32,500 68-69-66-68-271 -9 Chris Stroud, $32,500 65-71-67-68-271 -9 Tim Clark, $32,500 70-64-71-66-271 -9 Patrick Sheehan, $23,667 72.64-68-68-272 -8 Doug LaBelle II, $23,667 63-72-69-68-272 -8 Jeff Quinney, $23,667 68-71-65-68-272 -8 Omar Uresti, $23,667 67-70-66-69-272 -8 Bubba Watson, $23,667 69-66-70-67-272 -8 Mathias Gronberg, $23,667 65-68-72-67-272 -8 John Merrick, $23,667 74-65-67-66-272 -8 Y.E.Yang, $23,667 66-71-64-71-272 -8 Martin Laird, $23,667 73-66-67-66-272 -8 John Riegger, $16,500 70-68-66-69-273 -7 Steve Lowery, $16,500 72-64-69-68-273 -7 Tommy Gainey, $16,500 68-68-66-71-273 -7 Rory Sabbatini, $16,500 72-67-68-66-273 -7 Tim Herron, $16,500 72-65-71-65-273 -7 Bob Estes, $13,350 71-68-66-69-274 -6 Ryan Palmer, $13,350 73-66-69-66-274 -6 Jonathan Byrd, $11,886 71-67-67-70-27f -5 Charlie Vi, $11,886 68-70-67-70-275 -5 Brett Quigley, $11,886 71-67-68-69-275 -5 Scott Verplank, $11,886 69-70-67-69-275 -5 Steve Flesch, $11,886 69-70-67-69-275 -5 Richard Johnson, $11,886 64-71-72-68-275 -5 Jim McGovem, $11,886 67-70-71-67-275 -5 John Douma, $11,150 70-69-65-72-276 -4 Olin Browne, $11,150 68-71-66-71-276 -4 Kevin Streelman, $11,150 68-67-67-74-276 -4 James Driscoll, $11,150 70-69-68-69-276 -4 Tom Pernice, Jr., $10,750 67-7P-68-72-277 -3 Mark Hensby, $10,750 69-66-70-72-277 -3 Todd Demsey, $10,750 65-69-72-71-277 -3 Chad Collins, $10,750 67-68-66-76-277 -3 Nick Flanagan, $10,450 71-67-67-69-71-278 -2 Chris Riley, $10,450 67-67-73-71-278 -2 Brian Davis, $10,300 72-63-71-73-279 -1 Marco Dawson, $10,050 65-71-69-75-280 E Frank Uckliter II, $10,050 69-67-70-74-280 E Shane Bertsch, $10,050 69-69-70-72-280 E Eric Axley, $10,050 73-66-69-72-280 E Made cut, but did not qualify for weekend play Charles Warren, $9,650 68-68-73-209 Mark Wilson, $9,650 69-69-71-209 Lee Janzen, $9,650 67-72-70-209 Justin Bolli, $9,650 69-70-70-209 Tommy Armour III, $9,350 72-66-72-210 Scott McCarron, $9,350 72-67-71-210 Glen Day, $9,200 69-69-73-211 Ryan Armour, $9,100 70-69-74-213 LPGA Grand China Air Sunday At West Coast Golf Club Haikou, China Purse: $1.6 million Yardage: 6,422; Par: 72 Final a-amateur Helen Alfredsson, $270,000 70-69-65-204 -12 Yani Tseng, $171,913 72-67-68-207 -9 Laura Diaz, $124,711 63-73-72-208 -8 Karen Stupples, $96,475 67-67-75-209 -7 Young Kim, $77,650 70-69-71-210 -6 Shanshan Feng, $63,532 70-73-63-211 -5 Allison Fouch, $49,885 70-69-73-212 -4 Christina Kim, $49,885 70-68-74-212 -4 Suzann Pettersen, $32,648 72-73-68-213 -3 Lindsey Wright, $32,648 73-69-71-213 -3 Brittany Lang, $32,648 73-69-71-213 -3 Nicole Castrale, $32,648 72-69-72-213 -3 Na Yeon Choi, $32,648 71-68-74-213 -3 JiYoung Oh, $32,648 68-71-74-213 -3 Seon Hwa Lee, $32,648 66-73-74-213 -3 Candle Kung, $32,648 69-69-75-213 -3 Hong MelYang, $22,150 72-74-68-214 -2 Meena Lee, $22,150 72-72-70-214 -2 Annika Sorenstam, $22,150 72-70-72-214 -2 Diana D'Alessio, $22,150 71-71-72-214 -2 Teresa Lu, $22,150 70-70-74-214 -2 Louise Friberg, $22,150 68-69-77-214 -2 In-Kyung Kim, $17,996 70-75-70-215 -1 Angela Park, $17,996 75-68-72-215 -1 Jill McGill, $17,996 71-72-72-215 -1 Katherine Hull, $17,996 73-69-73-215 -1 Jeong Jang, $17,996 71-70-74-215 -1 Hee Young Park, $14,511 72-76-68-216 E Leta Lindley, $14,511 74-72-70-216 E Sophie Gustafson, $14,511 72-74-70-216 E Mi Hyun Kim, $14,511 74-70-72-216 E Jane Park, $14,511 73-70-73-216 E Catriona Matthew, $14,511 70-70-76-216 E Pat Hurst, $11,812 74-75-68-217 +1 Cristie Kerr, $11,812 74-72-71-217 +1 Tao-Li Yang, $11,812 69-76-72-217 +1 Juli Inkster, $11,812 71-68-78-217 +1 Laura Davies, $10,401 74-74-70-218 +2 Eun-Hee Ji, $10,401 74-71-73-218 +2 Se Ri Pak, $9,601 74-73-72-219 +3 Jimin Kang, $9,601 70-77-72-219 +3 Stacy Prammanasudh, $8,495 74-73-73-220 +4 Krlsty McPherson, $8,495 76-69-75-220 +4 H.J. Chol, $8,495 67-77-76-220 +4 Song-Hee KIm, $8,495 72-71-77-220 +4 Xlaolong Zhong, $7,577 74-72-75-221 + Hee-Won Han, $7,577 73-71-77-221 +5 Carin Koch, $6,753 78-72-72-222 +1 Sun Young Yoo, $6,753 77-73-72-222 +l Minea Blomqvisi, $6,753 75-75-72-222 +1 Giulia Sergas, $6,753 75-73-74-222 +6 Jin JooHong, $6,118 76-75-72-223 +7 Morgan Pressel, $6,118 75-73-75-223 +7 Linyan Shang, $5,836 75-74-75-224 +1 LI Ying Ye, $5,647 80-72-73-73-225 +1 a-XIn Wang 79-74-73-226 +1( Ping Huang, $5,459 77-72-78-227 +1- a-Si Mmin Fng 78-77-74-229 +13 Yanhua Shen, $5,271 76-75-78-229 +1; Inbee Park, $5,083 77-78-76-231 +15 a-Jiayun Li 78-76-78-232 +16 Xiangzhen Hu, $4,894 84-78-77-239 +23 Shi Hyun Ahn 70-68-WD Champions Tour- AT&T Championship Sunday At Oak Hills Country Club San Antonio Purse: $1.65 million Yardage: 6,735; Par: 71 Final Charles Schwab Cup points In parentheses John Cook (248), $247,500 69-63-65-197 -16 Keith Fergus (145), $145,200 65.70-65-200 -13 John Morse (109), $108,900 68-70-63-201 -12 Jay Haas (109), $108,900 67-68-.66-201 -12 Bruce Fleisher (68), $68,200 68-65-69-202 -11 Jeff Sluman (68), $68,200 67-64-71-202 -11 Mark James (68), $68,200 63-69-70-202 -11 Joey Sindelar (45), $45,375 72-69-63-204 -9 Scott Simpson (45), $45,375 69-67-68-204 -9 Gene Jones (45), $45,375 66-69-69-204 -9 Dan Forsman (45), $45,375 64-69-71-204 -9 Tom McKnight, $32,588 69-69-67-205 -8 Mike Reid, $32,588 69-69-67-205 -8 Bruce Vaughan, $32,588 67-70-68-205 -8 Lonnie Nielsen, $32,588 69-68-68-205 -8 D.A. Weibring, $25,616 72-67-67-206 -7 Fulton Allem, $25,616 69-69-68-206 -7 Mark McNulty, $25,616 68-69-69-206 -7 Tom Jenkins, $25,616 68-69-69-206 -7 Hale Irwin, $17,210 72-67-68-207 -6 Vicente Fernandez, $17,210 70-69-68-207 -6 Larry Nelson, $17,210 68-70-69-207 -6 David Eger, $17,210 69-69-69-207 -6 Andy Bean, $17,210 68-69-70-207 -6 Gary Hallberg, $17,210 73-64-70-207 -6 Mike Goodes, $17,210 70-67-70-207 -6 Larry Mize, $17,210 68-67-72-207 -6 Jim Thorpe, $17,210 70-63-74-207 -6 Tom Purtzer, $17,210 67-66-74-207 -6 Gil Morgan, $11,660 67-73-68-208 -5 Scott Hoch, $11,660 70-69-69-208 -5 Chip Beck, $11,660 72-70-66-208 -5 Bob Gilder, $11,660 74-68-66-208 -5 Loren Roberts, $11,660 68-68-72-208 -5 Dave Stockton, $11,660 66-70-72-208 -5 Craig Stadler, $8,938 67-73-69-209 -4 Fred Funk, $8,938 71-70-68-209 -4 Donnie Hammond, $8,938 71-70-68-209 1 -4 Morris Hatalsky, $8,938 70-69-70-209 -4 Denis Watson, $8,938 69-73-67-209 -4 Tom Kite, $8,938' 69-66-74-209 -4 Jeff Klein, $7,425 70-72-68-210 -3 Ronnie Black, $7,425 74-68-68-210 -3 Phil Blackmar, $7,425 69-76-65-210 -3 Bobby Wadkins, $6,765 73-67-71-211 -2 Walter Hall, $5,940 66-74-72-212 -1 Bruce Lietzke, $5,940 70-70-72-212 -1 Hybert Green, $5,940 71-73-68-212 -1 Don Pooley, $5,940 73-72-67-212 -1 Wayne Levi, $4,785 70-68-75-213 E John Harris, $4,785 71-73-69-213 E Kirk Hanefeld, $4,785 71-73-69-213 E R.W Eaks, $3,960 70-71-73-214 +1 Dave Eichelberger, $3,960 71-70-73-214 +1 Joe Ozaki, $3,960 72-74-68-214 +1 Ken Green, $3,383 71-69-75-215 +2 Ben Crenshaw, $3,383 72-69-74-215 +2 Mike McCullough, $3,383 74-68-73-215 +2 Dan Pohl, $3,383 75-70-70-215 +2 Des Smyth, $2,970 72-73-72-217 +4 Raymond Floyd, $2,640 727-76-218 +5 Tim Simpson, $2,640 72-74-72-218 +5 Hal Sutton, $2,640 76-74-63-218 +5 Mark O'Meara, $2,063 73-74-73-220 +7 Bob Murphy, $2,063 77-72-71-220 +7 Blaine McCallister, $2,063 76-74-70-220 +7 John Jacobs, $2,063 72-79-69-220 +7 Sandy Lyle, $1,650 70-75-76-221 +8 Fuzzy Zoeller, $1,502 73-73-76-222 +9 Jim Dent, $1,502 72-76-74-222 +9 Mark McCumber, $1,353 77-76-71-224 +11 Jim Colbert, $1,254 76-83-74-233 +20 Jim Albus, $1,155 82-82-71-235 +22 Bill Rogers, $1,089 79-78-79--236 +23 CR Tennis Fest comes to a close This is why we choose to live here: What a beau- tiful day for tennis or any other activity in the great outdoors. The 4th Annual Crystal River Fall Tennis Fest is history again. The or- ganizers can look back at a successful event and are looking forward already to Jan. 17-18, when they will host another tournament at Crystal River High School. We do hope you will support next week's Skyview - Charity Tennis Tournament at - Skyview, followed [ on Dec. 6-7 by the county's longest running tennis event, the Chroni- cle/Pines Tennis Tournament at Eric v Whispering Pines Hoi Park in Inverness. ON TI Thank you, Karen Tringali and Robin Wise, for all your time and effort, together with your volunteers for putting to- gether this tournament. A special thank you goes out to Waterworks Carwash and De- tail Center, Curry's Roofing, Top Seed Tennis and Soccer International and Citrus Sports and Apparel for their support. The more than 75 participants deserve a big "thank you" as well; without you there would be no tour- nament! Sunday's scores were as follows: Women's Doubles: Lana Shale/Tana Hubbard def. Lisa Steed/Lori Wilkes, 5-7,5- 3(ret.); Teresa Walker/Sherri Stitzel def. Candace Charles/Marie Cipriani, 6-4,6- 3; Kristin Tringali/Shu Sha Mu def. Susan Garrick/Leslie McCue, 0-6,6-4,7-6(7-4); Judy Jeanette/Holly Goodchild def. Josephine Perrone/Vicki Bierczinski, 6-0,6-1. Women's East Final:Kristin Tringali/Shu Sha Mu def. Judy Jeanette/Holly Good- child, 6-3,6-2. Women's North Final: Teresa Walker/Sherri Stitzel def. Lana Shale/Tana Hub- bard, 6-3,6-3. Women's West Final: Kayla Papp/Zeel Patel def. Micki Brown/Antoinette van den Hoogen, 4-6,6-4,10-8. Women's South Final: Katie Campbell/Ankshara Patel def. Katie Camp- bell/Ankshara Patel, 3-6,6- 0,6-1. Mixed Doubles East Final: Kristin Tringali/Mehdi Taliiri def. Shu Sha Mu/Vinnie Tre- mante, 6-2,6-3. Mixed Doubles North Final: Leila Pinklava/Don Kirby def. Antoinette van den Hoogen/Elias Posth, 6-4,6-2. -Mixed Doubles West Final: Teresa Walker/Dave deMont- fort def. Zeel Patel/Brandon Papp, 6-1,6-1. Mixed Doubles South Final: Kayla Papp/Alex Papp def. Radhaka Gandhi/Patrick Simon, 7-6(7-2), 6-2. Men's Doubles: Mike Noland/Jake Noland def. AJ Glenn/Patrick Simon, 6-3,6-2; M e h d i Tahiri/Sunil Gandhi def. Jim Lavoie/Josh Noland, 6-2,6-2; Donnie Sim- an den mons/Chuck Coo- )gen ley def. Brandon ENNIS Papp/Alex Papp, 7-5,6-0; PJ Water- son/Simon Tofte- gaard def. David Miller/Norm Berry, 6-4,6-1; Bergen Hart II/Mike Sicula def. Ron Leaky/Bill Goldbach, 6-3,6-1; Elias Posth/Dave deMontfort def. Ed Goodhart/Sal C., 6-1,6- 3; Mike Brown/Eric van den Hoogen def. Andy Belski/Jorge Privat, 6-2,64. Men's Doubles East Final: Mehdi Tahiri/Sunil Gandhi def. Mike Brown/Eric van den Hoogen, 6-2,6-0. Men's Doubles North Final: PJ Waterson/Simon Toftegaard def. Donnie Sim- mons/Chuck Cooley, 6-4,6- 7(10-3). Men's Doubles West Final: Bergen Hart II/Mike Sicula def. Mike Noland/Jake Noland, 6-3,7-6. Men's Doubles South Final: Elias Posth/Dave de- Montfort def. Mike McCor- mack/Bergen Hart, 6-3,6-1. November 1-2: The 2008 Skyview Charity Tennis Tour- nament at Skyview. December 6-7: Chroni- cle/Pines Tennis Tournament. at Whispering Pines Park in Inverness. Saturday's scores were as follows: Women's first round: Lisa Steed/Lori Wilkes def. Kayla Papp/Zeel Patel, 8-3; Candace Charles/Marie Cipriani def. Micki Brown/Antoinette van den Hoogen, 9-8(10-8); Teresa Walker/Sherri Stitzel def. Katie Campbell/Ankshara Patel, 8-3; Lana Shale/Tanny Hubbard def. Samantha Pow- ers/Bayley Kelly, 8-1. Second round: Kristin Tringali/Shu Sha Mu def. Lisa Steed/Lori Wilkes, 7-5,6- 2; Susan Garrick/Leslie McCue def. Lana Shale/Tanny Hubbard, 6-0,6- 1; Judy Jeanette/Holly Good- child def. Teresa Walker/Sherri Stitzel, 6-1,6-0; Josephine Perrone/Vicki Bierczinski def. Candace Charles/Marie Cipriani, 6-0,6- 2. Kayla Papp/Zeel Patel def. Samantha Powers/Bailey Kelly, 6-1,6-3. Micki Brown/Antoinette van den Hoogen def. Katie Camp- bell/Ankshare Patel, 6-2,6-2. Mixed first round: An- toinette van den Hoogen/Elias Posth def. Teresa Walker/Mike Walker, 8-6; Kristin Tringali/Mehdi Tahiri def. Radhika Gandhi/Patrick Simon, 8-1; Leila Pinkava/Don Kirby def. Zeel Patel/Brandon Papp, 8- 2; Shu Sha Mu/Vinnie Tre- mante def. Kayla Papp/Alex Papp, 8-1. Second round: Kristin Tringali/Mehdi Tahiri def. Leila Pinkava/Don Kirby, 6- 7,6-0,6-3; Shu Sha Mu/Vinnie Tremante def. Antoinette van den Hoogen/Elias Posth, 6- 0,6-0; Zeel Patel/Brandon Papp def. Radhika Gandhi/Patrick Simon, 5-7,6- 1,10-7. Men's first round: Brandon Papp/Alex Papp def. A.J. Glenn/Patrick Simon, 8-0; Mike Brown/Eric van den Hoogen def. Elias Posth/Alex Korotayev, 8-1; PJ Water- son/Simon Toftegaard def. Ed Goodhart/Sal C., 8-0; Donnie Simmons/Chuck Cooley def. Mike Noland/Jake Noland, 8- 2; Jim Lavoie/Josh Noland def. Mike McCormack/Bergen Hart, 8-3; Andy Belski/Jorge Privat def. Bergen Hart II/Mike Sicula, 8-0; David Miller/Norm Berry def. Ron Leaky/Bill Goldbach, 8-0. Second round: Mehdi Tahiri/Sunil Gandhi def.Don- hie Simmons/Chuck Cooley, 6- 3,6-1; Mike Brown/Eric van den Hoogen def. David Miller/Norm Berry, 6-2,6-0; Jim Lavoie/Josh Noland def. Brandon Papp/Alex Papp, 6- 4,6-3;Andy Belski/Jorge Privat def PJ : Waterson/Simon Toftegaard, 6-2,6-2. A.J. Glenn/Wayne Steed def. Mike McCormack/Bergen Hart, 6- 4,6-3; Bergen Hart II/Mike Sicula def. Ed Goodhart/Sal C., 6-0-6-1; Ron Leaky/Bill Goldbach def. Elias Posth/Alex Korotayev, 6-2, 7- 6(7-4). Eric van den Hoogen, Chronicle tennis columnist, can be reached at hoera@juno.com. Burkert takes first win in Cooter Triathlon LARRY BUGG For the Citrus Chronicle Alyssa Burkert won her first but probably not her last female triathlon title Sunday at the Great American Cooter Triathlon. The Winter Gardens resi- dent is only 16 and moved easily through the field. Burkert won the female title with a time of 1:01:56 im- proving on her second place finish of last year. Burkert took time out from her cross-country sea- son to compete at Wallace Brooks and Liberty Parks. The Ocoee High athlete is ranked one of the top dis- tance runners among high school teen runners. "(I felt) pretty good," said Burkert who led from start to finish.. "It was a little chilly" Gainesville's Tom Lowery, 46, won the overall title with a 49:43. Marathon's Martin Sykut was the master's win- ner with a time of 55:31. "It was cool," said Matthew Braun of Silver Springs, who finished fourth. "The water was nice. It was warm compared to the air." De Leon Springs athlete Sue Clifton was the top women's master's competi- tor with a 1:10:31. The race was ran with a sad burden. Race director Chris Mol- ing said the race was dedi- cated to Dwight Fitzgerald of Dunnellon, "He is fighting for his life," said Bob Brockett of Lecanto. Brockett said Fitzgerald was seriously hurt in a car accident 12 days ago. Fitzgerald was in Shands Hospital in Gainesville. Fitzgerald's son, Todd, is a member of the University of Central Florida Triathlon Club. Both Fitzgerald's are regulars in Citrus County triathlons. Brockett was 12th with a 1:02:54. Tallahassee's Connie We- instein ran her first triathlon ever at the age of 51. A researcher at Florida State University, she was talked into the race by her boy friend, Jimmy Kalfos. Kalfos had a herniated disc and could not run the race. "I was forced into it," said Weinstein. "My boyfriend talked me into it. "I am really pleased that I finished it," she continued. "The water was the scariest part." Moling couldn't have been happier about the race's re- sults. "We had a record crowd," said Moling. "I think we were over 200." Race Results Men's Overall winner: Tom Lowery, Gainesville, 49:43 Women's Overall winner: Alyssa Burkert, Winter Gar- den, 1:01:56 Men's Masters winner: Martin Sykut, Marathon, 55:31 Women's Masters winner: Sue Clifton, De Leon Springs, 1:10:31 Top 10 Finishers 1. Tom Lowery, Gainesville, 49:43; 2. Martin Sykut, Marathon, 55:31; 3. Ken Allen, Spring Hill, 56:03; 4. Matthew Braun, Sil- ver Springs, 57:30; 5. Team the Larson Beaters, Gainesville, 57:45; 6. Jason Snow, Charlottesville, Va., 58:37; 7. Ken Page, Lutz, 59:21; 8. Team Bull Gators, Zephyrhills, 1:00:45; 9. Christopher Spinoza, Gainesville, 1:01:29; 10. Alyssa Burkert, Winter Gar- dens, 1:01:56. CHECK OUT SPECIAL PAGES IN SPORTS * Local golf leaders can be seen every Wednesday as well the national golf schedule. * Read about the great outdoors on Thursday and check out the tide charts for local rivers, * See who's leading the point standings on our racing page every Friday. , -' .- CITRUS COUNTY (FL) CHRONICLE B4 MONDAY, OCTOBER 27, 2008 SPORTS oE o E Cirwus Cou~vn (FL) CHRONICLE NATIONM FoomAl.L LEAGUE MONDAY, OCTOISER 27, 2008 B5 Browns 23, Jaguars 17 Cleveland 7 10 0 6-23 Jacksonville 0 7 7 3-17 First Quarter Cle-Stallworth 3 pass from Anderson (Daw- son kick), 2:08. Second Quarter Jac-R.Williams 5 pass from Garrard (Scobee kick), 10:28. Cle-Lewis 2 run (Dawson kick), 7:20. Cle-FG Dawson 32, 2:09. Third Quarter Jac-M.Jones 8 pass from Garrard (Scobee kick), 10:27. Fourth Quarter Jac-FG Scobee 53, 8:48. Cle-FG Dawson 20, 4:35. Cle-FG Dawson 42, 4:06. Cle Jac ] First downs 15 23 Total Net Yards 327 380 Rushes-yards 24-91 29-113 Passing 236 267 Punt Returns 1-5 2-23 Kickoff Returns 3-78 6-134 Interceptions Ret. 0-0 0-0 Comp-At-Int 14-27-0 25-42-0 Sacked-Yards Lost 1-10 3-16 Punts 5-41.4 3-46.7 Fumbles-Lost 1-0 1-1 Penalties-Yards 1-15 6-40 Time of Possession 24:55 35:05 INDIVIDUAL STATISTICS RUSHING-Cleveland, Lewis 20-81, Vickers 2- 10, J.Wright 1-1, Harrison 1-(minus 1). Jack- sonville, Garrard 7-59, Jones-Drew 12-29, Taylor 8-24, Williamson 1-1, G.Jones 1-0. PASSING-Cleveland, Anderson 14-27-0-246. Jacksonville, Garrard 25-42-0-283. RECEIVING-Cleveland, Heiden 3-73, Stall- worth 3-13, Edwards 2-64, J.Wright 2-18, Step- toe 1-53, Vickers 1-13, Lewis 1-7, Dinkins 1-5. Jacksonville, M.Jones 8-117, Northcutt 5-49, R.Williams 3-42, M.Lewis 3-34, Jones-Drew 3-19, G.Jones 1-11, Williamson 1-6, Angulo 1-5. MISSED FIELD GOAL-Jacksonville, Scobee 38 (BK). Texans 6, Bengals 6 Cincinnati 3 3 0 0-6 Houston 7 7 14 7-35 First Quarter Hou--Jones73 punt return (K.Brown kick), 12:42. Cin-FG Graham 43, 6:24. Second Quarter Hou-Anderson 6 pass from Schaub (K.Brown kick), 3:23. Cin-FG Graham 32, :50. Third Quarter Hou--vee7passfrom Schaub (K.BrownIck), 9:19. Hou-Water39passfom Schab (K.BrfWt k), 630. Fourth Quarter Hou-Slaton 20 run (K.Brown kick), 9:54. Cin Hou First downs 16 23 Total Net Yards 253 384 Rushes-yards 22-105 31-109 Passing 148 275 Punt Returns 1-15 1-73 Kickoff Returns 5-102 3-58 Interceptions Ret. 0-0 2-17 Comp-Att-Int 20-32-2. 24-28-0 Sacked-Yards Lost 2-7 1-5 Punts 3-42.3 2-29.5 Fumbles-Lost 1-1 0-0 Penalties-Yards 7-51 7-55 Time of Possession 24:49 35:11 INDIVIDUAL STATISTICS RUSHING-Cincinnati, Benson 13-49, Fitz- patrick 7-42, Houshmandzadeh 1-9, Watson 1-5. Houston, Slaton 15-53, Green 9-41, Moats 3-17, Schaub 4-(minus 2). PASSING-Cincinnati, Fitzpatrick 20-32-2-155. Houston, Schaub 24-28-0-280. RECEIVING-Cincinnati, Houshmandzadeh 8- 54, C.Johnson 5-44, Kelly 4-34, Benson 2-20, Henry 1-3. Houston, A.Johnson 11-143, Walter 5- 70, Daniels 3-21, Anderson 2-28, Slaton 2-13, Green 1-5. MISSED FIELD GOALS-None. Giants 21, Steelers 14 N.Y. Giants 3 6 0 12-21 Pittsburgh 7 0 7 0-14 First Quarter Pit-Moore 32 run (Reed kick), 11:15. NYG-FG Carney 26, 4:39. Second Quarter NYG-FG Carney 35, 10:30. NYG-FG Carney 25, 3:31. Third Quarter Pit-Washington 65 pass from Roethlisberger (Reed kick), 10:00. Fourth Quarter NYG-FG Carney 24, 8:18. NYG-Team safety, 6:48. NYG-Boss 2 pass from Manning (Carney kick), 3:07. First downs Total Net Yards Rushes-yards Passing Punt Returns Kickoff Returns Interceptions Ret. Comp-Att-Int Sacked-Yards Lost Punts Fumbles-Lost Penalties-Yards Time of Possession New England Buffalo N.Y. Jets Miami Chicago Green Bay Minnesota Detroit NYG 14 282 35-83 199 3-28 3-76 4-30 19-32-0 0-0 5-41.0 2-0 7-71 34:24 W L 4 3 4 3 3 4 0 7 W L Arizona 4 3 Seattle 2 5 St. Louis 2 5 San Francisco 2 6 Pit 12 249 22-95 154 2-14 5-95 0-0 13-29-4 5-35 4-44.3 3-0 8-59 25:36 T 0 0 0 0 T 0 0 0 0 T 0 0 0 0 T 0 0 0 0 T 0 0 0 0 T 0 0 0 0 T 0 0 0 0 T 0 0 0 0 INDIVIDUAL STATISTICS Sea-Weaver 62 pass from S Wallace (Mare RUSHING-N.Y. Giants, Jacobs 18-47, Ward kick), 6:10. 13-37, Manning 4-(minus 1). Pittsburgh, Moore A-67,504. 19-84, Russell 1-8, Roethlisberger 1-3, Berger Sea SF 1-0. First downs 14 21 PASSING-N.Y. Giants, Manning 19-32-0-199. Total Net Yards 261 388 Pittsburgh, Roethlisberger 13-29-4-189. Rushes-yards 28-39 24-124 RECEIVING-N.Y. Giants, Ward 5-43, Boss 4- Passing 222 264 34, Smith 3-45, Burress 3-15, Toomer2-39, Hixon Punt Returns 4-26 3-26 1-17, Jacobs 1-6. Pittsburgh, Miller 3-52, Ward 3- Kickolf Returns 1-40 6-157 30, Sweed 3-28, Moore 2-10, Washington 1-65, Interceptions Ret. 1-75 0-0 C,Davis 1-4. Comp-Attlir 15-25-0 28-44-1 MISSED FIELD GOALS-None. Sacked-Yards Lost 1-0 5-40 Seahawks 34, 49ers 13 Punts 5-53 1 4-490 Seattle 6 14 7 7-34 Fumbles-Lost 0-0 4-1 San Francisco 0 3 3 7-13 Penalties-Yards 3-15 7-65 First Quarter Time of Possession 25:58 34:02 Sea-FG Mare 43, 9:58. INDIVIDUAL STATISTICS Sea-FG Mare 42, 6:10. RUSHING-Seattle, Morris 11-16, Weaver 2- Second Quarter 13, J.Jones 6-9, Duckett 8-1, O.Schmitt 1-0. San Sea-Duckett 1 run (Mare kick), 12:01. Francisco, Gore 18-94, SHill 2-20, Robinson 3- SF-FG Nedney 42, 7:05. 9, Foster 1-1. Sea-Wilson 75 interception return (Mare PASSING-Seattle, S.Wallace 15-25-0-222. kick), :31. San Francisco, S.Hill 15-23-0-173, O'Sullivan 13- Third Quarter 21-1-131. SF-FG Nedney 40, 4:12. RECEIVING-Seattle, Weaver4-116, K.Robin- Sea-Weaver 43 pass from S.Wallace (Mare son 4-31, Engram 3-40, J.Jones 2-22, Carlson 1- kick), 1:50. 13, Colbert 1-0. San Francisco, Gore 7-65, Bruce Fourth Quarter 4-49, Davis 4-29, J.Hill 3-38, Johnson 3-30, Bat- SF-J.Hill 2 pass from S.Hill (Nedney kick), tie 3-26, Walker 2-53, Robinson 2-14. 9:57. MISSED FIELD GOALS-None. NFL Standings AMERICAN CONFERENCE East Pct PF PA Home Away AFC NFC DIv .714 153 132 3-1-0 2-1-0 3-2-0 2-0-0 1-1-0 .714 165 143 3-0-0 2-2-0 3-1-0 2-1-0 0-1-0 .571 182 170 3-1-0 1-2-0 3-3-0 1-0-0 1-1-0 .429 145 146 2-2-0 1-2-0 3-3-0 0-1-0 2-1-0 South Pct PF PA Home Away AFC NFC Div 1.000 149 66 3-0-0 3-0-0 5-0-0 1-0-0 2-0-0 .500 128 131 1-2-0 2-1-0 2-1-0 1-2-0 1-1-0 .429 141 151 1-3-0 2-1-0 3-4-0 0-0-0 2-1-0 .429 175 185 3-1-0 0-3-0 2-4-0 1-0-0 0-3-0 North Pct PF PA Home Away AFC NFC DIv .714 155 110 2-1-0 3-1-0 5-0-0 0-2-0 3-0-0 .571 134 110 3-1-0 1-2-0 4-3-0 0-0-0 2-1-0 .429 115 123 1-2-0 2-2-0 2-2-0 1-2-0 1-2-0 .000 104 217 0-3-0 0-5-0 0-6-0 0-2-0 0-3-0 West Pct PF PA Home Away AFC NFC Div .571 173 195 3-1-0 1-2-0 2-3-0 2-0-0 2-1-0 .375 224 199 2-1-0 1-4-0 3-3-0 0-2-0 1-1-0 .286 107 177 1-2-0 1-3-0 2-4-0 0-1-0 1-2-0 .143 99 193 1-2-0 0-4-0 1-4-0 0-2-0 1-1-0 NATIONAL CONFERENCE East Pct PF PA Home Away NFC AFC Div .857 191 115 4-0-0 2-1-0 4-0-0 2-1-0 1-0-0 .750 165 145 3-1-0 3-1-0 5-2-0 1-0-0 2-1-0 .625 202 184 3-1-0 2-2-0 3-3-0 2-0-0 1-1-0 .571 194 137 3-1-0 1-2-0 3-3-0 1-0-0 0-2-0 South Pet PF PA Home Away NFC AFC Div .750 174 127 5-0-0 1-2-0 4-2-0 2-0-0 2-1-0 .625 170 120 4-0-0 1-3-0 5-2-0 0-1-0 2-1-0 .571 153 154 3-0-0 1-3-0 3-3-0, 1-0-0 0-2-0 .500 216 195 4-1-0 0-3-0 2-3-0 2-1-0 1-1-0 North Pct PF PA Home Away NFC AFC DIv .571 196 150 2-1-0 2-2-0 3-3-0 1-0-0 2-0-0 .571 194 159 2-2-0 2-1-0 3-3-0 1-0-0 2-0-0 .429 154 167 2-1-0 1-3-0 3-2-0 0-2-0 1-2-0 .000 114 212 0-3-0 0-4-0 0-6-0 0-1-0 0-3-0 West Pct PF PA Home Away NFC AFC DIv .571 200 171 3-0-0 1-3-0 2-2-0 2-1-0 1-0-0 .286 144 184 1-2-0 1-3-0 2-4-0 0-1-0 2-1-0 .286 112 201 1-2-0 1-3-0 2-3-0 0-2-0 0-1-0 .250 171 230 1-4-0 1-2-0 2-5-0 0-1-0 1-2-0 -s - B * -- - l - - - - w. ~- - ~- ~- ~ - ~ ~ 0 a S S __ - - S ~- - -- a - - - - - e - -. _______a -a - - -a *a m -w = 0.- - - w- - e. 0- -.~ - mp - - ,, ,. a - - lb Copyrighted Material Syndicated Content Available from Commercial News Providers NATIONAL FOOTBALL LEAGUE MONDAY, OCTOBER 27, 2008 BS Cn-Rs COUNTY (FL) CHRONICLE - q=, - * - ,* 8 - q lO U-- n- .-NI 97AY, U OK / UO, MONDAY EVENING OCTOBER 27, 2008 (N) NBC News Entertainment Holywood Chuck N) (In Stereo)'PG' Heroes "Eris Quod Sum My Own Worst Enemy (N) News(N) Tonight nC 19 19 19 466 718 1195 x602 4379 (N)'14 7843 '14 7602 14371983 11758008 n --BBC World Business The NewsHour With Jim Antiques Roadshow American Experience "LB: We Shall Overcome/The inside the Handy Writers' I QF 3 3 News 992 Rpt. 244 Lehrer (N) 5485 "Jackpot!"'G' 1805 Last Believer"'PG' 4992 Colony 'PG' 39973 BBCNews Business [heNewsHoufWi tim Antiques Roadshow America n E erience"LBJ:We Shall Overcome/The 'Alo,'Allol Tavis Smiley PBS ~ 1783 Rpt. 4553 Lehrer (N) 90911 "Jackpotl"'G' 76331 Last Believer'PG' 86718 -'(__ PG 54621 568534 SNews (N) NBNews tertainment xra(N) Chk(N Tlereo)PG Heroes "Eris Quod Sum Own Worst Enemy (N) ews night NBC F.I 8 8 8 6911 7263 5640 PG'3447 c50599 N)'14"89805 '14' 82992 5032756 18826973 N News (N) ABC Wld Jeopardy! Fortune Dancing Witie Stars (n tereo Live) Samantha Boston Legal "Happy News(N) Nightline A 20 20 2 2 0 2973 News 6553 'G'7553 2737 'PG' M 4394263 Who 86843 Trails" (N) in 33640 65594 70775089 ....- .. nNews 3843 Evening-Inside- Millionaire BiBang T How I Met Two Men orst C:Miami (In Stereo)'14' News Late Show CSU 0 10 10 10 10 News 4195 Edition 5195 3909 4843 3350 7933992 84485 i 31282 65 57089 53688331 News (N1y 90060 -- T N Thnsidere MTI Base all or d series Game 5 --ampa Bay Rays at Philadelphia Phillies. News tN) TMZG' S 13 13 PG'95 3 4737 (In Stereo Live) on 597244 51128 4 7605447 - News (N) ABC News Entertain Inside Edition Dancing th e tars (n Stereo Live) Samantha Boston Legal Hapy News Nightline AIBCff QQ 1 1 11 84843' 75195 39805 ... 71379 'PG'u 2792737 Who 44447 TraiTs" (N) 15824 4155805 3445 2m 2^ Richard and Lindsa The Word Zola Levitt Dickow Possess Lie Today P. Stone The 700 Club 'PG' e Leslie Hate I o 6635089 S 2 2 2 2 Roberts'G'561319 9890824 5453718 9876244 9895379 5471843 5618640 1121485 S News(N) ABC News Fortun Jeopardy DancingWith the Stars (In Stereo Live) Samantha Boston Legal Happy ewsN) Nightne 8Au Q8 11 6843 5 159195 37485 22461553 'PG' ]6615737 Who 42027 Trails" (N) s 80176 2681485 49784114 Ummr E D12-Famil Guy Familp Guy Frasier PG Frasier 'PG' Law & Order: Criminal Movie ** "Creature" (1998 Horror) CraigT. Punkd 'P Cribs 'P @ 12 12 70737 61089 32089 50973 Intent 14'n 25263 Nelson, Kim Cattrall. '14, V'n 28350 94805 82282 SJud e Mathis (N)'PG' Deal No ea No 2008 G mnastics Magic's Biggest Secrets News '70s Show 70sShow nfel S 6 6 6 6 146 027 4767263 9711337 Superstars 8221973 Finally 8241737 4613447 4701824 5865843 3015447 g @ 21 21 21 Variety 5669 The 700 Club'PG' Variety 5805 Love a Child Pastor Jim inspiration Scarborgh Variety Claud Bowers 34263 Tims 43602 T BN 21 21 21 882244 4878 IRaley2553 44244 50379 18805 TB A Two/Half King 6195 The Simpsons TwoHalf Gossip Girl"Pret-a-Poor- One TreeHill (N) (In King 68973 According- According- South Park r 4 4 4 4 Men 5843 7195 Men 2379 J' (N) '14'74911 Stereo) 61447 Jim 77621 Jim 29973 '14'9973 1616 16 16 20 Planning Court 49379 ing On nsde CitrusClubhouse Golf: Laies European Classic Gof Links llus. TV20 Court 66244 M1 966350 78379 67263 58027 37534 Tour 29089 40195 59843 10945 m TMZ(N) King of the The Simpsons The Simpsons MLB Baseball World Series Game 5 -- Tampa Bay Rays at Philadelphia Phillies. News 14027 Seinfeld 'PG FOX 9 1 13 13 'PG'7669 Hill 1621 2621 7805 (In Stereo Live) s 903756 15422 S15 15 15 15 icias62 Noiiero QueridaEnemiga 639981 Cudado con el Angel FuegoenlaSangre Cristina 911462 Noticias 62 oiciers UNI 15,15,151" 388737 379089 639701 239945 357992 787379 ,, 17 Mr. Cooper Mr. Cooper Fam Feud Fam.Feud Boston Legal "Finding NCIS "Pop Life"'PG' s ER "Parenthood"'PG'a PaidProg. Paid Prog. ION S 17 11911 41373 73263 41337 Nimmo"'14'50911 47447 40534 12263 86060 S 4 54 Cold Case Fl es'14' CSI: Miami (in Stereo) '14' intervention Drug addicts. I mention "Allison" '14' Paranormal State "I Am Paranorml Paranorml AE. 54 48 54 54 363640 N 907973 '14' 916621 N 936485 Six"' PG' 906244 285263 227440 - - Movie *** "Panic Room" (2002) Jodie Foster, Movie *% "House on Haunted Hill" (1999, Movie "Return to House on "Tales- ({AM( 55 64 55 55 Forest Whitaker. 380282 Horror) Geoffrey Rush. Premiere. 392027 Haunted Hill"(2007) 3607398 Crypt" S 5 3- It's Me or the Dog 'G' Alligators 'G' 1191244 Miami Animal Police'PG' Miami Animal Police'PG' Miami Animal Police'PG' Miami Animal Police 'P (O 52 35 52 52 5615553 en 1100992 Na 1120756 m 1123843 [ 6637447 The West Wing "Election The West Wing 'PG'o Movie ** "National Lampoon's Vacation" (1983, Movie **X "National Lampoon's Vacation" (1983, (RAYVO 51 Night"'PG' 279640 829669 Comedy) Chevy Chase.'R'f 809805 Comedy) Chevy Chase.'R' 192027 "Scar4" IREN911 Scrubs'14' Scrubs'14' Daily Show oColbert Futurama ISouth Park Futurama Futurama DailyShow Colbert (M) 27 61 27 27 840007 '14'63447 34447 52331 43195 122602 'PG'91718 '14'77737 'PG'35263 'PG'44911 96263 84640 9 Trading Spouses: Meet- Trading Spouses: Meet- Extreme Makeover: Home DallasCowboys Cheerleaders Cheerleaders Cheerleaders "Funny MP 98 45 98 98 Mommy 78466 Mommy 21447 Edition 30195 Cheerleaders: Making 10331 48737 57485 10927 Farm S One Angels Daily Mass: Our Lady The Journey Home'G' Swear Rosary Abundant Life'G' The World Over 5451114 (IWTM 95 70 95 9513870466 3861718 9629824 9605244 8152350 6014911 9628195 S~ 22 "-9MyWife MyWife 70s Show '70s Show Movie "Godzilla"(1998) Matthew Broderick, Jean Reno. A giant mutated The 700 Club 'PG' (FIM) 29 52 29 29 752485 743737 770517 732621 lizard wreaks havoc in New York. IM137114 961331 S Movie ** "'nvincible' (2006) MarkWahlberg, Movie ** "Alien vs. Predator" (2004, Science Fiction) Sanaa Movie ** "Blade"(998, Horror) (EB 30 60 30 30 Greg Kinnear. 6750553 Lathan, Raoul Bova. 2764534 Wesley Snipes. 2785027 S0 ToSell M House M House House Property Curb Amazing Potential House House Ext Living Beyon (H~lTj 23 57 23 23 3854398 3838350 8832195 3834534 8841843 8820350 7189843 4230089 9234008 9243756 7151060 7635896 S Modern Marvels 'G' Modern Marvels "Oil Modern Marvels (N) 'P' Primal Fear (N) 'PG' 9613263 Bloodlines: Dracula HIS 51 2.5 51 51 6024398 Tankers"'G'9634756 N 9610176 Family 5433718 Reba'PG' Reba'P' Still Standing Still Standing Army Wives'PG' Movie "Sex & Lies in n City: The Ted Will-Grace Wil-Grace (IFE 24 38 24 24 725331 749911 675783 745195 16431 Binion Scandal"(2008) Mena Suvari.s 174718 433973 251466 e Drake Drake Zoey 101 iCarly 'Y7' OddParent iCarl 'Y7' Home Imp. Home Imp. Lopez Lopez Fam. Mat. Fam. Mat. N i1 28 36 28 28571447 595027 840089 584911 859737 838244 286992 348331 639195 648843 298737 322094 S- The Stand '14, V' Lost "Exodus" 9144114 Lost "Man of Science, Lost "Adrift" (In Stereo) a Lost "Orientation" (In Gurren Gurren S IF) 31 59 31 31 7922114 Man of Faith" 9120534 9140398 Stereo) a 9143485 6598973 3908468 E. 3 43 Unsolved Mysteries (N) CSI: Crime Scene CSI: NY "Hung Out to Movie *** "Training Day"(2001,Crime Drama) Denzel MANswers P 37 43 37 37 (in Stereo)'14' 646398 Investigation '14' 939485 Dry"'14' e 915805 Washington, Ethan Hawke (n Stereo 331398 617911 SRa mond Friends Seinfeld Seinteld Fam. Guy Fam. Guy Fam. Guy Fam. Guy Name Earl Name Earl Seinfeld Sex& City MTBIl 49 23 49 49 196805 110485 465447 116669 474195 1453602 839008 991447 275911 2521331 1834553 615640 Movie** "Paris When It Sizzles" (1964) Movie ***"ToBeor Notto Be" 1942) Movie*** "Mr. and Mrs. Smith"(1941, (I n 53 William Holden. en 8222602 Carole Lombard. 8234447 Comedy) Carole Lombard. en 8705008 SCash Cab Cash Cab How-Made How-Made Destroyed Destroyed UFOs Over Earth (N)'14' Investigation X (N)'PG' How-Made How-Made U 5. 53 34 53 53 'G'573805 597485 842447 593669 851195 830602 918089 911176 290195 827224 S' What Not to Wear "Dottie" Little People Little People Little People Little People Jon & Kate Jon & Kate 17 Kids 17 Kids Little People Little People E) 50 46 50 50 'PG'631466 821992 573843 830640 826447 206669 1636911 995176 904624 201114 619379 .. .. Law & Order "Born Again" Law & Order "Sects" (In Law & Order The Closer"Problem Raising the Bar (N)'14' Bones "The Crank in the M 1 48 33 48 48 '14'639008 Stereo)'14'922195 'Misbegotten"14'931843 Child"'14'928379 U921466 Shaft"'14'355669 Y. .. ~ ~9 Anthony Bourdain: No Anthony Bourdain: No Anthony Bourdain: No Bizarre Foods Halloween Anthony Bourdain: No Anthony Bourdain: No ( E 9 54 9 9 Reservations 4220602 Reservations 5971756 Reservations 5957176 Special 5960640 Reservations 5970027 Reservations7870008 And Griffith And Griffith And Griffith Andy Griffith Cosby Cosbv Scrubs Scrubs 3rd Rock 3rd Rock Extreme Makeover: Home 93 32 49 32 32 5460008 5444060 9887350 (5440244 9803398 9882805 5475669 5612466 4869805 4878553 Edition 6655843 NCIS "Hiatus" 987244 NCIS "Dead Man Talking" House "Acceptance" B WWE Monday Night Raw In Stereo Live) 'P, V s NCIS "Shalom" (In (UA 47 32 47 47 N 561195 570843 6808843 Stereo) 26612195 .. 7th Heaven "Sin..." 'G' 7th Heaven "...And 3-rowd 3-Crowd 3-Crowd 3-Crowd WGN News at Nine (N) Scrubs Scrubs WriH o18 18 18 18273466 Expiation"G'816195 470282 466089 165973 278911 815466 177718 233973 MONDAY EVENING OCTOBER 27, 2008 C: Comcast, Citrus B: Bright House D: Comcast, Dunnelon 1: Comcast, Inglis C B| D| I | 6:00 | 6:30 7:00 7:30 1 8:00 8:30 1 9:00 19:30 10:00110:30 111:00111:30 CABLE IND PREMIUM CHANNELS -6 -Sute Life Suite Lifif e Suite Lifete Life Montana Movie "Halloweentown High" Wizards Wizards Life Derek Suite Life Montana (05 46 40 464610853 199805 476466 2214089 (2004) (in Stereo) 'G'm 6265805 73000737 5027008 533350 175350 248805 _, 39 68 3 3M*A*S*H M'A*S*H Walker, Texas Ranger Walker, Texas Ranger Movie "Love Comes Softly"(2003 Drama) Murder, She Wrote 'G'0 HA 39 68 39 39 5451350 5442602 'PG' e 1117282 'PG' 1193602 Katherine Heigl, Dale Midkiff.'PG' 1103089 6653485 Movie *i "Deck the Halls" (2006) Danny DeVito. Real Time With Bill Maher Movie ***% "The Departed" (2006) Leonardo DiCaprio, Matt Life (in Stereo) a 57737973 'MA' 396843 Damon. (In Stereo) a 60229282 3224027 "Quest" Movie ** "RENO 911!: Miami" Movie ** "Where the Heart Is" (2000) Natalie Movie *** "The Simpsons "Sex [MAX_ 4912027 (2007) (In Stereo) 39117535 Portman. (In Stereo) a 177805 Movie"(2007) me 334398 Games" 97 66 97 97 Parental Parental Sex 570599 Sex 730263 Paris Hilton's My New Exiled 'PG The Hills The Hills (N) Exiled Brazil. The Hills Exiled Brazil. (n) 97 66 97 97 750027 741379 BFF'14'199027 456824 548379 822843 808263 468669 246534 65 Hooked: Monster Fishl'G' Dog Whisperer "ATF K-9 The Hunt for the Lost Ark Locked Up Abroad (N) Taboo Gender sex and The Hunt for the Lost Ark 65 3338195 Gavin"'G'7947282.., ,'G'7923602 '14'7943466 sexuality.'14'.946553 'G'1006534 rT^ .; ? -n 62 "Diary oftai Movie ***.The Abss"(1f989) Ed HarrisMary Elizabeth Movie .. 'Legal Eagles"(1986) obert Movie** "Boys"B PLEX- ,, 6 Madman" Mastrantonio. (In Stereo) e 51059992' ".. .R.. eiuiid. (in Sli., 842'60398 -,_78503008 __o! r _, __ _. NEWS INEws S 4342 43 43Mad Money 9764027 Wall Street Crisis: Is Your Money Safe? 3945176 On the Money 7158282 TheBildeaWith Mad Money 3934060 S The Situation Room Lou Dobbs Tonight en CNN Election Center Lar King Live'PG' Anderson Cooper 360'PG's 826534 1C 40 29 40 40 862398 R 576027 552447 565911 P Special Report a Fox Re ort With Shepard The O'Reilly Factor e Hannity & Colmes e On the Record-Van The O'Reilly Factor (Hr )J 44 37 44 44 7437814 Smith 9139282 9115602 9135466 Susteren 9138553 9257008 4_ _, Race for White House- Hardball a 9142756 Countdown With Keith The Rachel Maddow Countdown With Keith The Rachel Maddow [M. NC) 42 41 42 42 David Gregory 7532468 Olbermann 9128176 Show 9131640 Olbermann 9141027 Show 9253282. ...... ,,5 -World's Wildest Police Cops'14' Cops'14' SkiPatrol SkiPatrol Smoking Gun: Dumbest Smoking Gun: Dumbest Forensic Forensic C.mr 25 55 25 25 Videos PG'9759195 4099089 7295992 4008737 4087244 7143350 7153737 3633640 6711244 _______ ~SPORTS .. ,_ ~ ,.,n..: ,-, M .. M ,rly ''y t,.lhl ,:.":,u-l,:, ILv R s & FL F .I'i l, n i3na p l, .. Cols T r T nre.i e TiijiN F r LP Field in Nashville SportsCtr. ESl PN) 33 27 33 33 -r'.rui,, ,' I.if ri :~ 1 w iL "T nn iLCel G1g7 C ins a T T i s FI LP 7Field in Nashville, 861485 SI H, ,r ', I n rin u ,l : l M ,rd J ,: 8 W o r l ,1 ,e ,. c i 1 ,'C0 W ,ri 1 S er 'e n l -i ) t h o n ) S en oa E : 6 0 7 8 6 3 7 1 8 (ESPN2J 334 28 34 34 IJ'. Viui. F,.:"r 0jr.'z.t ca. ,)j.r 'It: Pei ..s. 'o 2,00IA.41SFe, Foljb.0 7.8iv______e____'__.__o S 5 35Knockouts BestDamn ShipShape InFocus World Poker Tour: Season Best Damn Poker Show Best Damn Final Best Damn Poker Show rFSNLr 35 39 35 3 733263 50757843 233896 753027 1(N) 456737 436973 50410060 436008 528553 6 7-- Road Trio Road Trip Jr PGA Highlights School GolfCentrl Masters Highlights Trevor The Turn Learning Hole GolfCentdi 1GO6LF 67 7299718 7213398 7161756 4015027 4094534 Immelman.7150640 1763824 '1749244 3617602 6728534 .1221121221226L, n Whips 'PG L Pinks Passime This Week in NASCAR Big Shots: Titans at the Barrett-Jackson2008: Pinks Pass fime 01 466 3736992 3850602 (N) 9605244 ee (N) 98625008 The Auctions 9628195 8164195 9279621 3 ,Portraits Animals Tailgate Overtime (Live) Magic Heat Specia Inside Moore Tailgate Overtime 55466 FIGHTZONE Presentq 631 36 36c 26843 17195 56195 97843 76350 15350 84089 445602. 0- 0 a. a -dam 0 40 -mb% . ..ftIW 4 400am*em - w4w-- -e -ma 40D 40 010- M a --- a a a.- am - 04 a. -- a. -aa0-- - dp- 4w b 4 f- mmm00--. -.0 -40' o -a 4 'a -s* -am bm- -44111P - a. a a - a-- a. - a a a - '.m - --w . 0 * * 0 ~ 0 * a * ''V. a Y YVY -. A4A& a - - a. a -.- %- a. a-. a a... ~ ' a-woo a.- - b 40a - - -of -moo M." M a -a aft 4m- f- --am -aw -. -e .O - ft aw am 41b ft.- e- a. -- al a-- amp OMone G - .*- a. -- .. a-..w- t -- a- mp a. jw a- 41 s r " * * m -~ a.41D a. do am& .aS e e I Available -m -~ "" aY- -- "a=- -- - - map ow n i-m L - - - SCopyrighted Ma Syndicated Cor from.Commercial ~a - a - a. - - - o- Alp l a. 490m trial I t --- a - a. ..Ijw a- ve-Sw- wf to kt k Oebr a. ms .a MM44ow. WD w - a. 4 4 a-q -a a-" -p0 a. News Providers 4ow -ow 440 a. - a.4w 4WD . a. -- w .- w w-411a. -Ia. do 400 eam --b -ap- a- 4 -- u- -- -.No- -4h ob 4- a- - 0. .m 4 E a abm a dol a. d ftml_.40_am am a- 6 a- MONDAY, OCTOBER 27, 20 8 CITRUS COUNTY (FL) CHRONICLE ENTERTAINMENT n IMP CnIRUS COUNTY (FL) CHRONICLE oi_--- d * * 0 .A4 - 0 ~ - a - __ 0 - 2 * - a -- a - Copyrighted Materi MONDAY, OcroBFR 27, 2008 st *1 I 0 I' *** A I Syndicated Content - Available fromCommercial News Providers w -: 4K "oI .I? t - 1L'I m bi - a -4 W4 , . a '.._ - qm --o st 0 a f * Nm * ap-qb - 0 - 9 6 __ ja% I I S&A ' ski. ab M 4D - - b ~P~*&d4~qj~ _bol- 4 w.O -omno maa '"Mob MLA "p q.I I*T 0- - I W a p & 9 6 S " 11. -_' o .4 aw !low 60 New' -m a c- S T 4a ptB k^^ ** a'' IAAA& -.- - - 9= a - a coai" off w a - m a-a- 4WD - - lef- hoe ql O0o O * o 0 m a0M Oa a * a. a a a 0 m 0 -b ID d Jep O o 4b O04M -4b ab O. a -e aO 0 O000# aoOO 0 0 0 Oe0SO S e 0a0 0 *O0 ** O o00 0 O O .O e @0 . *0 o05 o0900oo 0. oe. .00OOOO 0**0* 0 0 40 -10- 0* * 0OO00O0 *4m 0a __ doll. *- s-p 4b 0 0 4a w 4w -mm-4& - 0 401o a a - AA 0 , '000 40 0 I / v * V .0. S *: 1 Mi za o Q F 4m I O.b o udrit * 0 ymoq To~j A&- 7 ,zz '2 iLS CITRUS COUNTY (FL) CHRONICLE To place an ad, call 563-5966 Classifieds In Print and Online All The Time Fax:(352)563-56551Tolli :(888)852.23401Em aIw h l o e * 0 $ Oee Chronicle I JConnection SPECIAL NOTICES 002-066 CONNECTION: 002 FREE OFFERS: 020 I LOST: 025 FOUND: 035 HELP WANTED I 100-199O-999 --- --- ag Happy 0 Notes A BANK REPO! 4/2 $24ki $199/mol 5% Dn, 20 yrs. 8% for lisitings 800-366-9783x5705 'EntertainmentI A BANK REPO! 4/2 $24k l $199/mol 5% Dn, 20 yrs. 8% for lisitings 800-366-9783x5705 %0 Free Services I TOP DOLLAR I SForFreeOffers| 2 fixed m/f cats orange/wt go together 352-228-1789 ABSOLUTELY FREE BOAT RENTAL TIME 8 hrs. for the cost of 6 Only $125. Port Hotel Dive Center. 795-7234 I 4 S* . SFree Offers Removal of Scrap meta apples etc. Pay upto$200/vehicles + dump runs, 287-1820 KITTENS 2 MALES ...Need GOOD HOMES, 9 Weeks old (352) 302-0868 | Lost | AIR SEAT CUSHION for cancer patient. Lost on Hwy 491 be- tween Lecanto & Dunnellon. 352-465-7353 Stolen Male yellow lab, off of Independence. If you know anything or have the dog please call 352-613-0665 un Found | Jack Terrier, call to identify. 563-0593 Pit Bull mix young female, had a chain, no collar found on W. Cardinal Street (352) 634-5880 1 Announcements DIVORCES/BANK Probate/Evictions *352-613-3674* 4 bed 2 ba $19,8001 Foreclosure! Won't last! For Listings 800-366-9783 X H796 7 MO. OLD QH FILLY Sweet & gentle, handled daily, will hold till Christmas. $500. 352-628-1472 3/2 HUD Home! $225/mol 5% down 20 yrs @ 8% apr call for Lisltngs 800-366-9783 x 5704 = HALLOWEEN HEARSE FOR HIRE Add a Ghoulish Touch to Your Haunt or Party. I Old Style Hearse w/Casket and n "Body".. Call: Last Ride I Hearse Rentals (352) 586-2806 ^Act~ow. ITS FREE Place any General Merchandise Ad for FREE on our all new CLASSIFIED SITE. 5 Days, 5 Lines. 2 Items totaling less than $100.00 each. Go to: chronicleonline.com. and click Place an Ad in the top right hand corner. Open House Today! Motivated Sellers OPEN BUYERS FIND. . Open House's Directions & Maps By Owner Homes MLS & More.. OpenHouse MakeOffer.com Announcements - Act No%% PLACE YOUR AD 24hrs A DAY AT OUR ALL NEW EBIZ CITRUS CLASSIFIED SITE Go to: chronicleonline.com and click place an ad SELL YOUR ANTIQUES Table or space rentals available. Display your antique car, boat or truck on the grounds of HERITAGE VILLAGE MARKET DAY Nov. 8th. Call 302-3026 for more information. SERTOMA CLUB The Sertoma Club is looking for people who would enjoy helping Children with Speech or Hearing Impediments. JOIN TODAY I (352) 795-5000 (352) 7951088,OR (352) 628-7519. 0. o Situation o Wanted ELDERLY & HANDI- CAP CARE. 27 yrs exp. Non smoker/ Citrus County Area. 352-270-8377 (850) 443-5069 LPN Looking for private duty, Pediatric & General care. (352) 795-8704 , Websites A FREE Report of Your Home's Value LOCAL INFO citrus.comrn NEWSPAPERS online.com SPersonal/ L! Beauty I= Personal/ | i S I te el I ou Employment| LA Beauty || I g -Sales Hip |J g E.~ | nT, 1YLIOI 44surance Rez L Insurance Reps BE YOUR BOSS, In quiet Upscale Citrus Hills Solon. Must have Client Base. (352) 726-4060 E Domestic A BANK REPOI 4/2 $24k1 $199/mo! 5% Dn, 20 yrs. 8% for listings 800-366-9783x5705 S Medical 1' 1 3/2 HUD Home! $225/mol 5% down 20 yrs @ 8% apr call for Lisltngs 800-366-9783 x 5704 CNA & RECEPTIONIST for busy medical office. Benefits offered, Fax: 352-746-2236 CNA/HHA'S Live in Needed $175. a day Interim Health Care (352) 637-3111 EARN AS YOU LEARN CNA Test Prep/CPR Continuing Education 352-341-2311 Oncology Group Practice FT seeking a Phlebotomist for busy Physician lab Mon-Fri. 9a-5pm Benefits Include: Insurance/401K, Competitive Salary Fax Resume to: (352) 746-6333 P/T, F/T X-RAY TECH/ MEDICAL ASSISTANT R/N/LPN. tcvpret@ avantegroup.com Z; Professional 3/2 HUD Homel $225/mol 5% down 20 yrs @ 8% apr call for Lisltngs 800-366-9783 x 5704 SUPERVISOR COOK Immediate Opening at Cypress Creek Juvenile Detention Center Institutional cooking and hands on experience preferred and must be able to lift 501bs Competitive Wages & Benefits. Must pass back- ground check and pre-employment drug screen, Contact KIm at 352-527-3091 ext 119 or fax resume to 352-527-0395 email to HR11 @ABLMANAGE MENT.COM. attn 648. EOE [ZRestaurant/1 u. Lounge Line Cook Apply at 505 E. Hartford St. Hernando 352-746-6855 NEW ITALIAN RESTAURANT Opening Soon Positions Needed Cooks PT Bussers PT Servers Apply in Oak Run SR 200 west of Ocala Mon. thru Thurs. 8am-Noon Call 352-854-6557 DFWP/EOE For Growing Insurance Agency In Citrus Springs. Immediate Opening. Call (352) 746-0606 INSIDE SALES Garaunted Salary Great opportunity Medical & Dental Call Barbara (352) 726-5600 SPRING HILL Plumbing/Irrigation Wholesaler Exp. counter person needed. DFWP 352-799-1301 L Trades/Skills i 3/2 HUD Homel $225/mol 5% down 20 yrs @ 8% apr call for Lisitngs 800-366-9783 x 5704 AEROSPACE BROACH MFG. CO. Hiring exp. Surface/Form Grinder & exp. Cutter grinder. Benefits, overtime. Crystal River, FL 352,795-1163 -7 General 0 Help 4 bed 2 ba $19,8001 Foreclosure! Won't last! For Listings 800-366-9783 X H796 APPOINTMENT SETTERS Want to join a winning team? Very busy office looking for serious minded people. Call Steve @ 352-628-0254 Full time or Part time Position All applicants must have computer skills, cash handling, loan processing, customer serv., clean Fla. D/L, Heavy lifting, deliver- les and background check required. Pay Day Cash Advance & All Star Rentals (352) 564-0700 CARRIERS NEEDED Delivery Routes Available NOW* EARN EXTRA CASH!!. Experience desired, But not Required! Call 563-3201 Leave name, Address and Call back Number CHi )NirLEi OFFICE/SALES For Both Stores, Apply Crystal River JOE'S CARPET OPPORTUNITIES FOR A NEW CAREER! Stanley Steemer Will train, FT, bene- fits. Must have FL Driver's lic. and be at least 21 yrs. of age. Drug Free. Apply at 911 Eden Drive Inverness I Part-time S Help CHRONICLE CARRIERS NEEDED Delivery Routes Available NOW* Experience desired, But not Required! Call 563-3201 Leave name, Address and Call back Number 1 Financial --- -----I 4 bed 2 ba $ 19,8001 Foreclosure Won't last! For Listings 800-366-9783 X H796 SBusiness oO opportunities Asphalt Maintenance Prod. & Equip., Supply Bus., Steady Income 352-302-0202 :Z Money to Len Did the Bank Say No? They Can't, We Can. Commercial Ventures w/ Credit & History. We're Funding Now. Michael Peters, Broker Commercial Capital (352) 246-7483 1 Work at 1 Home Lic # CGC060565 www. metal structuresllc.com SSheds & Garages Sof Any Size S*SHEDS NOW* We Move & Buy Used Sheds Independence/41 (352) 860-0111 Appliances A BANK REPOI 4/2 $24kI $199/mol 5% Dn, 20 yrs. 8% for llsit. COSMETOL07y- BARBER ESTHETICS/ SPA TRAINING Nail Technology Massage Therapy -FallClasses- W Nov 17, Dec 22, Feb 9, 2009 Cosmetoloav Nich Oct 20, Jan 5, 2009 Massage Therapy Davs April 20, 2009 Mass W Way Jan 26, 2009 Barbering Nights DecI5 93% of our Graduates passed the NCETMB the 1st time! SKIN & NAI SPECIAL CLASSES Weekly (727) 848-8415 BENE'S International School of Beauty, Barber & Massage Therapy (our new ad ress) 7027 U.S. Hwy. 19 New Port Richey, FL 34652 11 ...... i Appliances ABCBriscoeAppl. Refrig., washers, stoves. Serv. & Parts (352) 344-2928 ALMOND GE Electric stove & refrig- erator, Exc. cond. Used dishwasher for free. $210/both; $125/ each. 352-489-6627 Franklin Wood Stove $150 obo Whirlpool Washing Machine, works, $40. (352) 228-0905 aft 6p GAS RANGE Magic Chef, very clean, works great. $135. 352-563-2385 Ge Built-in Oven $350 obo Bosh Dishwasher White $350 obo (352) 422-7116 5-9pm only GE REFRIGERATOR 23.6 cuff. KENMORE washer & dryer, runs like new, $150 for both (352) 637-4642 Refrigerator Side by side, ice/water in door, almond $200. (352) 726-6736 Washer & Dryer matching, Whirlpool, both work great. Like New $225. obo (502) 619-1538 WASHER AND DRYER Washer and dryer.Good condition. $ 75.00 pair 270-8809 Washer/Dryer White Large capacity Excellent Condition. $100.00. Call after 4:00. (352) 419-4627 Office 4 Furniture DESKS 2 office desks, executive brown with marble tops ($50) 727-393-0033' | Tools AIR COMPRESSOR Craftsman 7HP, 60 gallons, vertical on skid, Oil-less pump. 240 volts/1 amps. 175psi max. Never outdoors, new cond. $375/obo. Will deliver. 352-860-1008, Tom. (Computers/I o Video COMPUTER DOCTORS /2 m. S.E. Inv Walmart Repairs-all PC's & Laptops, 1.3GHz Gateway Computer Hi- speed w/wlndows $125, 352-344-4839 CI Farm S Equipment All Matching Sofa, love seat chase lounge 2 glass end tbls., glass cocktail tble. matching lamps $750 (352) 503-3540 ANTIQUE VANITY DRESSER W MIRROR Good condition $100.00 352-563-8210 BAR STOOLS Oversized, w/arms & cloth seats. Nice wood. $675. 352-794-3067 BEDROOM SUITE 6pc exlong twin beds w/rattan hdbds, triple dress, nite stand, bu- reau $200 795-9026 BUNK BEDS Very good condition. Incis. mattresses. $100 Queen Bed Frame $20. 937-207-4273 China Cabinet Solid Oak, like new 63" Wide. 4 doors, 3 drawers, glass upper panels $600. & Grand Father Clock $50 (352) 382-4651 COFFEE TTABLE,END TABLE Light Oak Cof- fee table,55x25,three glass inserts, $45.End table, 25x25,4 glass in- serts,$25. 352-382-0069 Desk top hutch, oak, 57" W, 32" H 10-/2" D, $50. Credenza. drk oak, 72" L x 28" H x19-'/2" D $100 (352) 464-4138 Dining Room Table Dark wood W/extra leaf. Six cushioned chairs /green fabric. $125. Call after 4:00. (352) 419-4627 S~w C '3 Copyrighted Material __ SSyndicated Content Available from Commercial News Providers I 4 4' - *4# IL S4 U) SFurniture DISPLAY CASE Wood, glass top display case 3 ft wide and 4 1/2 ft high. (727) 895-6655 office03@knology.net Exec. chair block HUGH Entertainment Center. Antiq/white KING SIZE WATER- BED AND COUCH Has new mattress $45.00 Blue couch $45.00 352-563-8210 Kitchen Table, 5 pc. w/ leaf, chairs on casters $200. King Sz. Box spring & matt. w/ frame $150. (352) 564-8551 LANE STRESSLESS RECLINER, Leather. Like new cond. $500 INCLINER SOFA. New, mist green. $400. 352-726-9675 LEATHER CHAIR Haverty's, oversized. Reddish brown, quality. New over $1500, sell $350. Good cond. 352-382-5517 Love Seat and Sofa. White background w/floral pattern, Loose cushions & small contrasting stripped pillows $250. (352) 637-5209 New Glass Dining Table seats 4 $100.00 (352) 726-3731 OVERSIZED BROWN Upholstered easy chair. Matching large ottoman. $125. Crystal River 352-638-1079 PAUL'S FURNITURE Open for the Season Tues.- Sat. 9am-2pm Homosassa 628-2306 POOL TABLE Older Pool table with two pool sticks(included) for sale $100.00 352-563-8210 QUEEN ANN CHAIR Black arms, legs, blue seat and back. new. . $35 office03@knology.net QUEEN BED Mattress, box spring & frame. Good condition & clean. $100 352-419-4588 SOFA BED Like new. 61/2 ft Blue & white. $300 352-726-7529 Solid Oak Corner Computer desk Exc. cond $150 (352) 527-1399 Square Coffee Table, & 2 Square end Ta- bles, wood,$150. 2 Area Rugs, 8' x 11' $200 (352) 746-2521 The Path's Graduates, Single Mothers, Needs your furniture. Dining tables, dressers & beds are needed. Call (352) 746-9084 TWIN BED Oak Mis- sion Retreat Twin Bed Havertys Almost New! Costs over 400 Asking 200. Call 228-0844 KS8 Ociroaii 0 *nir 2- 7,2008 SFurniture ANTIQUE CHEST good condition $100.00 352-563-8210 WATERBED Older pedestal waterbed with double dresser,2 nite . stands, chest of draw- ers, mirrored head- board, dark wood.....$100.00 2 light wood ehd ta- bles...$20.00 Leave message 352-560-7415 Garden/Lawn co Supplies 28" SNAPPER Riding mower w/rear bag. $325. Crystal River 352-638-1079. WHEEL BARROW 2-wheels, special feature to allow dumping. $110 352-794-3067 SClothing CLOTHING Lost weight. Losts of selec- tions. Great condition. XL-3X. Reasonable! (352) 794-3067 LEATHER JACKET woman's black size medium,worn once,$50 firm 352-341-1366 SGeneral 10" RADIALARM SAW craftsman saw with stand $100 obo 352 270-3641 12' PRE LITE CHRIST- MAS TREE Excellent condition. $125.00 352-527-1399 ABSOLUTELY FREE BOAT RENTAL TIME 8 hrs. for the cost of 6 Only $125. Port Hotel Dive Center. 795-7234 APPLIANCES Micro- wave 1.4 cu.ft. $45. Kitchen Stove with Hood $50. OBO 726-4592 Carpet Factory Direct since 1914 shopHome Repairs laminate clean 341-0909 CARPORT Aluminium 2 car, Free Standing $550 (352) 726-0891 Cash for Owners I buy mobiles, houses & seller financed mortgages, Fred Farnsworth, 36 yrs, same address & phone 352-726-9369 CERAMIC KILN Used ceramic kiln. $100 firm. 352-615-8362 leave message. CHRISTMAS TREE 7 foot ridge pine christ- mas tree exc. condition $25.00 [3521527-9982 DYNATRAK '88 -178 SS flsh/ski 150 Evinrude & trailer, $3800/or trade for tractor/atv etc. 352-302-5220 Electric Treadmill, Cadence, fold up $80. Antique Treadle Sewing Machine $85. (352) 249-7195 Encyclopedia Set How It Works Science Books. $100 352-637-2881 Leave Message Entertainment Center 3-tier wood. Great for TV, DVD player. $80 352-637-2881 Leave Message. c General I DOLL HOUSE Barbie Dream Doll House pink with elevatorcollapsible $35 352)527-9053 EXTRA LARGE DOG DOOR for sliding glass door. $95 or best offer 352-628-9195 FORD F100 TRUCK COVER Complete Truck Cover, (nylon), $40.00 (352)628-1734 Gas Chain Saw $50. 16" Western Stock Saddle $125. (352) 628-7688 GIANT PAINT SALE Paint, Stain, Int. & Ext. $2.00 a gallon 302-4902, 795-3563 Go Cart Challenger, 5.0 Hp. Subaru eng. Originally $900, will sell for $550. Mobile Home Steps All wood, heavy duty. You must pick up. $75.00 (352) 465-9396 GO KART Next Event 10/23 This Cart is Eligible for the ROAD RAT CHALLENGE $650. (352) 344-1441 r-----El HALLOWEEN HEARSE FOR HIRE SAdd a Ghoulish Touch to Your I Haunt or Party. Old Style Hearse0 w/Casket and "Body".. Call: Last Ride Hearse Rentals (352) 586-2806 Inside Liftt Harmer.AL/400 Scooter Pride Sonic.New battery.$1000.00 (352) 563-5730 (352) 228-1719 New Systems & RepcrehsJIn .SQC,= --ALLE- I TIESCut outs & New Homes. Installed & Rolled. A.L EVANS 352-422-0641 Act No ITS FREE Place any General Merchandise Ad for EREEon our all new CLASSIFIED SITE. 5 Days, 5 Lines. 2 Items totaling less than $100.00 each. Go to: chronicleonline.com and click place an Ad In the top right hand comer. KEROSENE HEATER Kerosene heater, $25.00, needs wick (352)628-1734 Pool Table, 7ft. Mizerak w/ ball set and 2 cues, $100 obo Wall Tile, Imoker, cream color $15. (352) 228-0905 aft 6p PROPELLER Evinrude stainless steel $100 or trade for mans bike. 352-860-1748 RV Roof Air Condition Coleman, $100. 15,000 BTU, AC, 220V very good cond. $70 (352) 249-7195 Trailer Axles (2) I- w/brakes, 5,000 Ib capacity Mobile home type $145. both (352) 628-0045 TRAIN FOR SALE. "N" Gauge, layout on 5.5 x 7 board, com- plete system with roll- ing stock. 28 buildings many accessories. $500. obo (352) 382-1339 WATERBED Queen size waterbed, individ- ual tube type, use regu- lar sheets. $40 7264592 CITRUS CouNTY (FL) CHRONICLE [ Business | S ion S Equipment | o ELECTRONIC CASH GUN & REGISTER Sony Cash register In great condi- SHOW tion.$ 75.00 270-8809 Show b Tire Machine & Electi Air Compressor $750 for both Brooks (352) 489-9267 HSC C Nov 1.9 o Medical Nov2.9, S Equipment Hernando Falrgroi HOVEROUND Admlsslor Like New $400 (352) 799 Electric Scooter$300 (352) 726-0891 Muzzle L Thompson 50 Cal. Per S Coins Dble. set t C4 Co I $150. (352): BUYING US COINS Beating all Written WE BUY offers. Top $$$$ Paid On SIte Gun (352) 228-7676 (352) 726 Musical I | Baby instruments | KEYBOARD,ELECTRIC 3 Wheel Jo GUITARANDAMP Strolle Casio CT 310 expedition KeyboardChordsRhthy Greco Baby m.tones, Both have, adaptor, cover,Book, Both Clean $45. (352) 628 First Act Electric guitar, - amplifier and guitar case.variable basstreble, volume c N controls, still in boxes $75. 352-382-0069 PLACE YOU PIANO Mid 1970's up- 24hrs A DAY right Kimball piano ALL NEW EBI. $125 OBO CLASSIFIED 464-5419 Kim Go to C4i- chronicleonli Household and click an ac BEDDING FULL SIZE Almost new comforters U Swap o & sheet sets that are in excellent condition. 380 STAR AU TL(352)794for a 45 rev TABLE English solid $300 ca wood. With sides up Call Dwi 48". $75.00 352-795-1 (352)794-3067 Oreck upright in great IM Buy condition. , $95.00 (352)794-3067 WIRE WE! I Fitnede ssp 140A+with (4 Finess 352-447-6 it Equipment | -- SEARS EXERCISE 9 Pet, Bike. Computerized A d Great cond. $175. 352-794-3067 Sporting 16. U1 Goods Browning Automatic, 16 Gauge, Shot Gun used very little; in excellent shape 1/2PriceB (352) 464-1537 a Neu CLEVELAND IRONS Due to the huge si 3- iron thru pitching the Spay and Neute wedge w/ bag, the offer will be ext putter & 2-metal the entire month of woods. $125 All spay and neuts 3 Club Wedge Set Loft performed for 1/2 52,56,60. $125. Hours. Mon 352-527-4932 -CALL FOR APF GOLF CLUBS Men Midway AD King Cobra Irons & d - bag's $125. Golf Pull HOSPWII cart $20. Sm Mens ex- 1635 soasi Bid,t& erclse bike Tunturl (352)71957111 $50.(352) 382-0001 rating KNIFE Last beforee ons sville Club '-5pm '-4pm County funds n $6.00 9-3605 oader Center, rcusslon trigger, 746-4630 GUNS Smithing -5238 egging ir, Model y Stroller Air Tires $50. ea -7688 UR AD AT OUR 'Z CITRUS D SITE a: ine.com place id OMATIC olver or sh. ght 1764 DER gas. '281 Spay ter success of er program ended for October. r will be 2 price. -Fni nal.corn imal al assa,FL3444 CLASSIFIED 0 P P ets mFor Rent [| ForrSale 4bed 2 ba$19,801 JACK TERRIER HILLS 4 bed ba $9,8001 Foreclosure Won't Pups, 8 wks. H/C, Furn. 1 BR, 1 Full BA Foreclosurel Won't last For Listings $250./ Adult Fern Park Model, Includes last For Listings 800-366-9783 X H796 $100 352) 812-2370 util. & basic cable, 800-366-9783 X H796 ADULT SHIH-TZU's KITTENS & CATS $165. wk. sec. dep GREEN ACRES Male & Fem, bik/ many breeds, all (352) 465-7233 Lg.3/2 on 1/2 acre. white,1 yr old. $250. neutered micro chip, CRYSTAL RIVER Owner financing M, W, F, 1:30 -4pm or tested, shots some 2/2 on 1 Acre $600 avail, $76,000 by appt 305 872-8099 declawed $85-$150 1st/Sec. 843-639-9325 (352) 795-6081 3902 N. Lecanto Hwy 352-476-6832 CRYSTAL RIVER (352) 586-7802 AKC YORKIE PUP PIGEONS 3/2, 1st/last/sec, Palm Harbor 16 eksoldmle For Sale. Tipplers It No dogs $550/mo. Homes 352 wNice colors, $15.00 (352) 302-1424 5-628-6914 a pair. Good flyers CRYSTAL RIVER 3/2 HUGE. Loaded American Bull Dog great pets. Lecanto 3BR $500; No Pets 14 houses to Puppy, NKC Reg. UTD (970) 412-5560 (352) 563-2293 choose from on Shots, Health Cert., Champion CRYSTAL RIVER Starting at $389 Background $500, Nlce.2/1.$485 (352) per month. (352) 726-9342 7A-0 464-2505/697-1591 800-622-2832 BEAGLE PUPPIES tri A HERNANDO River Lakes Manor colored will be small 9 PLACE YOUR AD 2/2 $150. Wk. + Dep. 1 bedroom, 1 bath. weeks adorable 24hrs A DAYAT OUR 2/1 $125. Wk. + Dep. Double-wide on 1 acre $195-295 ALL NEWEBIZ CITRUS (352) 464-0719 in quiet neighborhood. 352-628-7942 CLASSIFIED SITE! HERNANDO NEEDS TLC Great CA IRArental property $40k CHIHUAHUA PUPPIES Go to: Lease w/Ootion. aBoe 352-634-1882 1 male, 3 fern. 8 wks chronicleonline.com Owner Fin. Like NEW, 3-- on 10/4/08., Vet POMERANIAN PUPPY 3/2, DW, W/D, fence Taylor Made checked, Health for sale. 5 month old fe- lot $795 352 560-3355 Homes shCert, wormed, st male with shots up to HOMOSASSA shots $275 ea. date and health certifi- 1/1 & 2/1 1st/last/sec. New Homes (352) 726-7971 cate. Awaiting return of 352-634-2368 From $32,900 CHIHUAHUA'S registration papers from HOMOSASSA Used Homes CKC Reg. Current CKC. $450.00 Call shots, $250. 352-628-9465 2/1.5 dbl. carport $3,000 (352) 406-7123 $500 Mo. F/L/Sec. Repo's from (352) 406-712MIN PURE BRED PIT BULL (813) 361-4615 $19,900 DACHSHUNDS MINI Puppies. $ 100 $1OSSS CALL ",yU LONG HAIR PUPS 1/F 352-287-9628; HOMOSASSA CALL 1/M.AKCRE 352-287-98 2BR,1BA, nice older CA L4 SHOTS,HEALTH 352-341-0156 mobile & land. $378 352-621-9181 CERT. $350.00 CASH Rottweiller Pups mo. (352) 726-9369 ONLY. 352-382-4973- & Adults Absolutely HOMOSASSA Waterront 352-287-1119 Beautiful champion Nice 2/2, $600/mo oMobile For Rent lines,, shots, wormed, No Pets 352-464-3254 EXOTIC HIPPIE guaranteed, parents NoPets352-4643254 3/2 HUD Homel BUNNY RABBITS on site (352) 464-0194 HOMOSASSA $225/mol 5% down Order for 4H now Nice 3/1. $600 mo. No 20 yrs @ 8% apr Ler rn Shih-Tzu Puppies pets. 352-464-3254 call for Llsitngs $12 -$35 ea. state on $250. INVERNESS 800-366-9783 x 5704 All colors, adults 2 (352) 527-2270 2/2 $425. Mo, Homes to 3.5 lbs. Over Well, Scr. Prch. !. Mobile Homes stocked Bunnies & STANDARD POODLE (352) 220-4082 And Land Meat $10 ea. Male, beautiful white INVERNESS 6018 W Oaklawn St - 621-0726 14 mos. house & 55+ Park 232 Satalllte Homosassa Cell (352) 422-0774 crate,trained, 55+ ark 232 Satlte Homosassa Must Sacrifice Ave. 2BR, 1-'2BA, $395 14x60, 1.25 acre, $450. 352-229-2941 + utli. 2BR/1 BA, $395 needs TLC. Pic - 352-476-4964 zillow.com, $39,900. [ LECANTO 813-985-2646 S Horses 2/2, Dbld Carport, DW 100% MORTGAGE i 1st Ist dep, apple. Fee LOAN 7 MO. OLD QH FILLY Sr. Park. 352-746-1189 NO DOWN Sweet & gentle, LECANTO PAYMENT handled daily, will HOMOSASSA & Low Income appll- -,.-.,--- hold till Christmas. klQLR 3/2 $700. cants can quality S". $500. 352-628-1472 MO. Lg. Yrd Fenced FIRST TIME Tennessee Walker 352-302-9217 HOMEBUYER'S UP TO 2 yo natural gaits, exc YANKEETOWN Little 00% ground manners, 45 2/2 Complete Furn., Little or no credit days pro training, 1 me rent + $300 dep. recent bankrupcy finish your way $800 15 min. from pwr ecent bankruptcy S obo(352) 302-6699 plant, More Info OKAY*g Paul (407) 579-6123 CAll TIM OR CANDY Livestock 1BR Furn.& Unfurn. Finance LLC 2BR Unfurn. Scr. rm, 352-563-2661 local F Snew carpet & paint. 866-785-3604 toll FOR SALE S(All extra ngle bed RV park ree 1/2 GRAIN FEED BEEF mod' Rents $300/up. ACredlt and income PET SPECIALS 2 yrs old, prime. $600 Park pool. 628-4441 restriction aply 5 lines obor Lee at M A rstinas 10 Days...........$2350 20896#352-344-2395 )307-2 Mobile Hom244 Florida licensed 30 Days ........... $39.50 Moe For S lelender $1.00 per line) 1 For Rent ATTENTION!I 352-563-5966 9105 sCty DOUBLEWIDE ", . 1 Pet per ad. 2 bedroom, 2 bath. $37,900. Delivered Private Party Only Doublewide in Country and Set, S0-Down All Ads are prepaid, Setting.Central heat Land/Home $650. A BK9 4/o Some restrictions and air. No pets. $550 me. Re5Os Avail, $24k 0 $199/mo% Call Janet or Lee at HOMEMART 5% Dn, 20 yrs. 8% may apply. 800-6924162. (352)307-2244 for Ilsitings 800-366-9783x5705 v Mobile Homes j And Land | BEVERLY HILLS 12x65 2/1V2 on 1 wooded ac. Partially furn, Incis appls,10x20 shed. Reduced! $35illard 352- 422-5731 Home On 1/2 Acre MUST SELL 3/2 28 x 52 on end of road, quite, home has deck. Sacrifice $3,000 down $745 mo W.A.C. CALL * 352-621-9183 Homosassa 2 bedroom, 1 bath trailer In country, on 7 acres with barn, fenced area & woods, off Peach St. 7 miles to beach. Lease w/deposit, $600/month. Availa- ble November 15. (937) 644-0925 Homosassa 3br/2ba. on 1 acre newer Kit. 7 yr roof, parquat floor, flrepl deck, 2 new sheds $89k(352) 563-9857 Homosassa, 3BR/2BA singlewlde on Is-AC chain link fenced, nice trees, needs TLC, low down, $425 mo. owner finance. 352-726-9369 INVERNESS 3/1.5, V2 mol fenced $59 Mobile Homes With or W-Out Property. Financing Avail.(352)302-9217 MONIAYv O'rannoR 27 ? 0Q. Copyrighted Material Syndicated Content Available from Commercial News Providers A M % A I - ~ . Mobile Homes I P And Land I TRIPLEWIDE On 21/2 Acres New Jacobsen, 2,150 sq. ft. 3/2 High End Home On Beautiful Land $858.88/mo. WAC Will Finance 352-621-9181 [ Mobile Homes 0 In Park I 3/2, Double Wide, All app's, Lg. Scrn Rm 3 Sheds, $27K abo (352) 270-8420 Crystal River Village Fully furnished, 2/2 dollhouse Reduced Lg dbl. carport S58.000 obo. (352) 795-6895 INVERNESS I/I CHA, Screened room. Totally renovated, $10,000 (352) 201-0903 INVERNESS 2/1 Furn'd In 55+ Park. Lot rent $220 $12k. 352-726-7132 INVERNESS 55+ park. 1/1, new CHA, $3500. Washer/dryer, new fridge. 352-746-6623 SINGING FORREST 14 X 64, Lovely turn. 2/2, New lanai, roofover, Fl. rm., car- port. Inc. Golf Cart. $149 Lot rent. 28KK Flnanc Avail. 352-726-2446 V Mobile Homes | (A In Park Roomy, urnshed, Price Reduced, 55+ Sr. Park, Lecanto $1 OK (352) 634-5544 Walden Woods 2/2/carport, Fur- nished, enclosed lanal, Immaculate, $38,000. 527-4213, 220-3223 WALDEN WOODS 55+ retirement park, 3yrs. old, mobile home, turn. 2/2, scrn. porch, carport, shed, good cond. Reduced to $48,000. Call (352) 697-2779 g Mobile Home| S Lots For SaleJ Act Now ITS FREE Place any General Merchandise Ad for FREE on our all new CLASSIFIED SITE. 5 Days, 5 Unes. 2 Items totaling less than $100.00 each. (charges will be applied after 5 lines) S Go to: chronicleonllne.com and click Place an Ad In the top right hand corner (* Sale or 5 Rent Citrus Springs 3/2/2 for sale or Rent New Home, low down, easy terms 352-840-3324 S Real Estate j o For Rent 3/2 HUD Homel $225/mol 5% down 20 yrs @ 8% apr call for Llsltngs 800-366-9783 x 5705 Property Management & Investment Group, Inc. Licensed R.E. Broker )> Property & Comm. Assoc. Mgmt. Is our only Business >- Res.& Vac. Rental Specialists )- Condo & Home owner Assoc. Mgmt. Robbie Anderson LCAM, Realtor 352-628-5600 Info@oDropertv managmentgroup. I Apartments S Furnished | CRYSTAL RIVER Near Town lbr $450 2br$600 352-563-9857 CRYSTAL RIVER NEW Apartments 2BR/1BA & 2BR/2BA Furnished & Unfurn. Close to Progress Energy, 1st. & Sec. from $700 month (352)795-1795 appt. oronertles.com FLORAL CITY Nice Studio. Incl. all util.+ cable TV. $575. mo + dep. No pets. (352) 228-1325 o Services DAVE'S MOBILE REPAIR Repairing gas & diesel engines. No Job too big or small. 352-228-2067 STree Service A TREE SURGEON Uc. & Ins. Exp'd friendly serv. Lowest ratLes Free est. 352-860-1452 D & R Tree Specialist All phases of Tree Work, Landscaping, lic, Ins., ref, *Cheap* *Lowest Rates *k Free Est. 352-302-5641 Brannon's Ag. Serve. Sprinkler, fencing. laowncare, landclear- Ing, hauling, welding Uc. & Ins. 302-4702 COLEMAN TREE SERV. LIc. 35227-3496 Ins. GRIFFIN'S Full service Tree Shrub.Lawn *Landscaping. FREE EST. Sen. Discounts Lic. 352-527-3496 Ins. OSBORNE'S Lawn/Tree/Shrub Quality Work Free Est. LOWEST RATES GUARANTEED! Uc (352) 400-6016 Ins R WRIGHT TreeService Tree removal, stump grind, trim, lns.& Lic 0256879352-341-6827 o Loans 3/2 HUD Homel $225/mol 5% down 20 yrs @ 8% apr call for Llsltngs 800-366-9783 x 5704 S Air Duct S Cleanin A BANK REPOI 4/2 $24kl $199/mol 5% Dn, 20 yrs. 8% for Ilsltlngs 800-366-9783x5705 S Computers ALL COMPUTER Repair We Come to You, FREE Anti Virus 21 Yrs. Exp. 212-1165 , Boats AFFORDABLE Boat Malnt. & Repair Mechanical/Electric al. Custom Rig. John (352) 746-4521 PHIL'S MOBILE MARINE 27 yrs. exp. Certified Best prices/guarante- ed. 352-220-9435 t! Lawnmower | OD Repair i AT YOUR HOME Res. mower & small engine repair. Lic#99990001273 352-220-4244 DAVE'S MOBILE REPAIR Gas / Diesel Engines No lob too blig or sma// 352-228-2067 .. Kitchen h o & Bath BATHTUB REGLAZING Old tubs & ugly ceramic tile Is re- stored to new cond. All colors avail. 697-TUBS (8827) Upholstery UPHOLSTERY/SEWING Specializing In Furn & Boat Cushions call Caro](352) 637-3419 " Care For the Elderly Need In Home Care For A Loved One?? CNA/CPR Certified Exp. w/Alzheimers Flex. Hrs. 563-5609 Cell 352-601-2053 Private Home To care for your love one. Alzhelmer Dementia 621-3337 " Computers | [ CarpetF O Repair Carpet Factory Direct since 1914 shopHome Repairs laminate clean 341-0909 REPAIR SPECIALIST Restretch Installation Call for Fast Service C & R SERVICES Sr. Discount 586-128 Painting Paint/Press.Clean 16 yrs. in Inverness Uc.&Ins. 637-3765 DAVID RODGERS Painting. lic/ins Int/Ext repaints. Satis faction Guaranted. 20 yrs exp.212-3160 INTERIOR/EXTERIOR & ODD JOBS. 30 yrs J. Hupchick Uc./Ins. (352) 726-9998 PAINTING by Greg 10% oAl written Est All Painting Needs 352-476-7556 Installations by p Brian c BC1253853 !e 3em 4&m- 42 8- 75aamuW 352-628-7519 S--,Ilm iding. SfOlit & I-ascia, 'Skirting, Roofovers, Carports, & Screen Rooms. x g Home/OffIice I wo Cleaning n Home Offices Pet Sit Lic/Bond/Ins/Refs. Gift certs. available 503-6279; 220-4259 House cleaning $35.00 most 211. Experienced w/references 228-1789 HOUSECLEANING Honest, dependable, exper. Reasonable Lic. 352-419-4935 0 Cabinetry Affordable CABINETS & COUNTER TOPS New & Remodel 352-586-8415 CABINETS, GARAGES REMODEL, CBC024041 (352) 795-2789 CELL (772)-263-1159 Carpentry/ I o Building QUALITY CRAFTED BUILDERS INC. Remodeling, addi- tions, custom homes & commercial. 352- 26-550Z: CBC014582 ROGERS Construction Repairs & All types of Construction637-4373 CRC1326872 SAluminum SUBURBAN IND. INC. Rescreen, Screen Rms Carports, Roofovers Garage Screen Doors Vinyl & Acrylic Windows, Siding/Soffit Lic#2708 (352) 628-0562 i Pressure I Cleanin CALL STELLAR BLUE All Int./ Ext. Painting Needs. Lic, & Ins. FREE EST. (352) 586-2996 P pressure I I" Cleaning Father & Son Pressure clean & gutter cleaning. 352-527-1097 PRESSURE CLEANING Driveways, roofs, mobiles, home etc. Kerry (352) 795-4204 454-8373 Services Naydene's Girl Friday Service LLC Grocery, Light House Cleaning, Etc., Lic/Bonded (352) 341-0193 SHandyman #1 A+TECHNOLOGIES All home repairs. Also Phone, Cable, Lan & Plasma TV's Installed, Pressure wash & Gutters LIc. 5863 (352) 746-0141 #1 All Improvements Maint./Repairs/Paint 25 yrs exp. Llc#5953 .Ca/LScoa 560-7609 Elite Home Service Maint/repair/install 20+yrs exp. Reg & Ins. 352-428-9734 FAST AFFORDABLE! RELIABLEI Most repairs Free Est., Lice0256374 * (352) 257-9508 * Air Conditioning Service DONE RIGHT! Serving Citrus County Over 14 Years I WINTER CHECK-UP I I $45.00 I 1 Mention ad at time of service. Expires 11/20/08 Residential Commercial 7 a' e [ * (352)746-9484 Lic.#CAC058291 SHandyman HANDYMAN If Its Broke, Jerry Can Fix It. Lic#189620, 352-201-0116 Nature Coast Home Repair, & Maint. Inc. Offering a Full -Range of Services Lic. 2776/lns., 352-634-5499 Visa/MC 0 Self Storale Sheds & Garages I of Any Size l *SHEDS NOW* We Move & Buy n Used Sheds n Independence/41 (352) 860-0111 Electrical #1 A+TECHNOLOGIES All home repairs. Also Phone, Cable, Lan & Plasma TV's Installed. Pressure wash & Gutters Lic.5863 (352) 746-0141 DUN-RITE ELECTRIC INC. Elec/Serv/Repairs New const. Remodel Free Est 726-2907 EC 13002699 Thomas Electric LLC Generator maint & repair. Guardian Homestandby, & Centurion. Cert, Tech. 352-621-1248 #ER00015377 S Plumbing FAST AFFORDABLE RELIABLEI Most repairs Free Est,, Lic#0256374 * (352) 257-9508 * I Moving and | Hauling I C.J.'S Sm.Local Moves Furniture, clean-outs, Dump runs & Brush Low $$$ 7 day service 726-2264/201-1422 S Paving VIGLIONE LLC Asphalt Paving. Seal Coating, Landscaping Free Est. Uc.(352)726-3093 Ins. Lic (352) 400-6016 Ins Sprinklers/I S irrigation I Brannon's Ag. Serv. Sprinkler, fencing, lawncare, landclear- Ing, hauling, welding Lic. & Ins. 302-4702 New Systems & Repairs.Ins.Llc.3000 *SQ--AL|_VARfi- IlES Cut outs & New Homes. Installed & Rolled. A.L EVANS 352-422-0641 A A Roofing Gouda Roofs We might not be the lowest bidL BUT we build thejEST roof RC2 29027344 352-795,7570 John Gordon Roofing Reas. Rates. Free est. Proud to Serve You. ccc 325492. 795- 7003/800-233-5358 I Concrete | BIANCHI CONCRETE Driveways-Patios- Sidewalks. Estimates Lic#2579/lns, 257-0078 Beer Lic.1476 726-6554 Remodeling Additions, Garages Decks, Bathrooms & Handyman Services, 40 Yrs Exp L/c. CRC058140 344-3536; 563-9768 W. F. GILLESPIE Room Additions Home Construction, Garages. Baths, Kitchens CRC1327902 (352) 344-0009 M Stone/ co Ceramic A QUALITY TILE JOB Showers. Firs, Counters Etc. (352) 422-2019 Llc. #2713, Insured. co Ceramic The Tile Man Bathroom remodel Specializing in handicap. Uc/lns. #2441. 795-7241 -h Drywall REPAIRS Wall & Ceiling Sprays Int./Ext. Painting Uc/Ins 73490247757 352-220-4845 g Dirt Services FILL, ROCK, CLAY, Stn Drives Etc. Allmtesot D.ldISeca Call Mike 352-564-1411 Mobile 239-470-0572 Brannon's Ag. Serve. Sprinkler, fencing, lawncare, landclear- ihg, hauling, welding Lic. & Ins. 302-4702 RED MULCH Two Week Special $20 Per Yard 352-302-6436 ATOP SOIL SPECIAL* 3 Yd -$75/5 Yd $85 10Yd $150/20Yd $250 Stone/Mulch Avail. 352-302-6436 SClearing/ Bushhoggmgi Brannon's Ag. Serv. Sprinkler, fencing, lawncare, landclear- Ing, hauling, welding Lic. & Ins. 302-4702 Garden Areas Cleared, Lot Clean Up Bushhogging Uc/Ins (352) 726-7951 u Landscaping D's Landscape & Expert Tree Svc Personalized design. Bobcatwork fill/rock & sod 352-563-0272 IE3NTR3I3OECI BRANNON'S 'n BRANNON'S / Bruce Kaufman AGRICULTURAL SERVICES K Construction Your Agricultural Handyman *Srnkers Land Clig Free Estimates/SmallJobs Welcome Seeding *lMowing *Driveways re Etc. Doors & Windows Porch Enclosures s Fencing 'Welding Lawn Care a Etc, Remodeling Soffit & Facia S352-302-4702 Room Additions Vinyl Siding ijc/bnsured Comnmercial/Residenhal *Also Repair & Maintenance* 15% OFF (352) 400-0230 All New Customers Expires 11/18/08 Lic. & Insured CRC1326310 L awn Care Andersen's Lawn Serv Mowing, Trimming, Clean Up Low Rates 1-352-277-6781 Brannon's Ag. Servw. RATES Uc (352) 400-6016 Ins Steve's Lawn Service Mowing & Trimming Clean up, Uc. & Ins. (352) 797-3166 k RV Services MOBILE RV REPAIR We Come To Youl Trir. & 5th Wheel Towing 352-270-3411 S Firewood DRY OAK FIREWOOD Split, 4 X 8Stack $70 delivered/stacked. 352-344-2696 Seasoned Oak Fire- wood spilt, 4x 8 Face cord, del. & stacked $65 (352) 201-6483 5 Water - WATER PUMP SERVICE & Repairs- all makes & models. Anytime, 344-2556, Richard Gutters ALL EXTERIOR I Quality Pricel 6" Seamless . L 621-0881 . S sod - PICK UP a freshly cut pellet of Bahia sod at Circle T Sod Farms local field today 352-400-2221 Blinds 4bed 2 ba$19,8001 Foreclosurel Won't last For Ustings 800-366-9783 X H796 Get Results In The Homefront Classifieds! 9 BIO MONDAY, OCTOBER 27, 2008 S Apartments Condos/Villas i furnished | For Rent INVERNESS FLORAL CITY 55+ Park Upper 2/1, 1/1, $750 monthly. furniture, TV, bed, $300. Sec.Long & incl, util. & cable TV Short term avail. $595 352-476-4964 (352)447-1594 I INVERNESS S Apartments 2/2, New Carpet/ o Unfurnished apprls. $695.mo/Rent 352 746-4611 Cit Hills/Inverness INVERNESS 1 BR Inverness $500mo INVERNESS 2BR, Ig. liv. rm., + Pool LANDINGS 2/2 clean Cit. Hills $800mo roomy, great location 352-726-2370 $600/mo F/L/S No smoke/No pets CRYSTAL RIVER (352) 341-1847 1 Br. Laundry on site, Sugarmill Woods No pets Special rates 2/2, Completely turn. Lecanto 2/2 Duplex $850. mo.,- Yr Lease Dsh/Wsh.Was/dry $1,200,- seasonal (352)628-2815 Lv.Msg. All utilities. 3 mo. min. CRYSTAL RIVER 352-746-4611 w NEW Apartments Dulexes 2BR/1BA&2BR/2BA 0 Duplexes Furnished & Unfurn. o For Rent Close to Progress CITRUS SPRINGS Energy 1st. & Sec CITRUS SPRINGS from $700 month ew, 2/2, all apple , (352)795-1795 appt. W/D $600.-$650. w (954) 557-6211 arooerties.com CRYSTAL RIVER 3/1, CHA, $550.mo FLORAL CITY 382-1344/423-0739 1BR Cabin, just 150 yards from fishing CRYSTAL RIVER dock, $300 + $250 Rentals Available dep. Quiet forested $650. & Up area, near (352) 795-9123 Floral City, 10 min. Charlotte G Realty from Invern. Tralls End & Investment LLC Camp No Petsi 362-726-3699 DUNNELLON FLORAL CITY 2/1, Apt In Rainbow FLORAL CITY End, Kit, w/din, area, 2BR i/ BA, MH, ust lv rm,, Ig, until rtm, 10 yards trom fllIng scrn, pore, IrMg dock, S560, + $00 wooded lot. $600 mo, dep, Near (352) 884.9929 Floral City, 10 min, from Invorness, Trails FLORAL CITY End Camp 2/1, $500/ mo, + sec, 352-726-3699 Incis. Water, W/D, Hk, HERNANDO -ups, 352-428-6057 1/1 $450 +sec Incis HOMOSASSA w/s/garbage 2/1, new applis & tile, 352-527-2428 $575/mo. F/S. No pets,smokers HOMOSASSA (352) 382-3014 1/1 $450 mo No pets. INVERNESS Incis garb & H20. 352- LIKE New 2/2, w/ W/D 628-7300 or 634-1176 $675mo 352-563-2118 INGLIS LECANTO 2BR IBA CLEAN $495 1104 N Line Cup mo. 352-447-0333 2/2 nice area,$650 INVERNESS F/S (352) 613-6951 1/1, Water &Trash incl. LECANTO newer 2/2 S$500. mo. dplx, all ktchn appls, 352-726-3849 patio, W/D hook-up, INVERNESS nice yard, Exc. cond, 2 bedroom, 1 bath $675 (352) 634-1341 Newly remodeled Effici ies/ INVERNESS 1 ottagesI 2/1 Tri-plex, great loc, A BANK REPO! 4/2 clean & roomy, no $24k! $199/mo! smoke/no pets 5% Dn, 20 yrs. 8% $550 /mo lst/Ist/sec. for listings 352-341-1847 800-366-9783x5705 INVERNESS CRYSTAL RIVER 2/1,.W/D Hkup, incl. 1/1, All Util, $475. mo. watr trash Iwn main. + dep. (352) 527-8261 $550. + Sec. 634-5499 INVERNESS LECANTO & Efficiency 1/1 $450 + CRYSTAL RIVER $100 sec. Incis. elec */2 OFF 1st Mo. Rent! garb/water/ appls/ *2Bd/1Ba, furn/unfurn cable. 352-270-8298 Spacious Apartments View or book it Located in quiet A1VALUEINN.com neighborhood btw. Hernando New Lecanto & Crys. Riv, Renvt'd Effic $225 wk. $650. mo incl. gar- Pool. Trailers $200 wk bage, water, sewer, Inverness (6) Furn'd and lawn maint., All 3 bd. Luxury Homes units have dishwasher, $425 wk. 726-4744 & Ig scrn. in back Q Rental porch Avail. Now! Houses Call for Details 302-9323 or 302-2178 5455 thrasther ave LECANTO homosassa 1 BR Apartment (352) 3 bedroom, 2 bath. 746-5238/613-6000 nice block home with LECANTO newer 2/2 inclosed inground dplx. all ktchn apples, pool corner lo01t coun- patio, W/D hook-up, try setting frank nice yard, Exc. Cond. 352-628-0950 $675 (352) 634-1341 3/2 HUD Home! LA --$225/mol 5% down co Apartments | 20yrs@8%apr - call for Lisitngs A BANK REPO! 4/2 800-366-9783 x 5704 $24k! $199/mo! CITRUS HILLS 5% Dn, 20 yrs. 8% 3/3/2 Lrg. Executive for listings iHome Clean, w/ 800-366-9783x5705 HUGE master. WOW A BANK REPOI 4/2 $1550 nc: Lawn & $24kl $E199/mo! Pool serv + Free Golf $24k! $120 yrs. 8% w/Soc Mbrshp. Possi- 5% Dn, 20 yrs. 8% ble rent2own option for listings @ MLS #322351. 800-366-9783x5705 352-586-7944 V Rental owner/agent c Information I HERNANDO 3/2/2 Forest Ridge Act No0 J- PLACE YOUR AD 24hrs A DAY AT OUR ALL NEW EBIZ CITRUS CLASSIFIED SITE Go to: chronlcleonllne.com and click place an ad We Have Rentals Starting at $425/mo + Many others LANDMARK REALTY 352-726-9136 Kathy or Jane 311 W Main St. nv s Business o Locations BROKER/OWNER Garage & office $1000+tx. Office $800+tx. Both on Hwy 19. 352-634-0129 CITRUS HILLS BEAUTY SALON Upscale & Quiet. (352) 726-4060 CRYSTAL RIVER Comm. bldg. for Rent $460 mo. 1st. last & sec. (352) 795-4786 SPACE FOR RENT 1600sf, $10.ft + cam 1 yr. lease or longer Brand New Location w- (352) 279-9890 l Condos/Villasl 0 For Rent /mo! 5% down 20 yrs @ 8% apr call for Lisitngs 800-366-9783 x 5704 CITRUS HILLS 2/2.5 Townhome, turn, CIEAN1 352-613-5655 Citrus Hills 2/2/2 Furn, $1000, mo, 2/2/2 $800 mo, lyr Ise (352) 302-0576 INVERNESS 2/2 Scr.porch, across from pool/clubhouse 605 Whispering Pines Blvd. $695/Mo, F/L No smoking, (352)422-2706 Villa, E-Z Maint. close to Shops $850 352- 527-4998/527-1888 Rentals/All Prices GREAT AMERICAN REALTY (3521 637-38a. www. choosegar.com nRent: Housess S Furnished BEVERLY HILLS 2/1/1, 1st., last., sec., $650 month 352-302-3290 BEVERLY HILLS 491 2/1 $600/Mo+Sec. CLEAN 795-6282 CRYSTAL RIVER Apt. 2/1 $475. Furn. $500. 352-795-2204 CRYSTAL RIVER Lrg. 2/2/2 Incls all utils near Power Co $1,250 + dep.(352)564-8165 INVERNESS 2/2, Carport, Pool, $800mo 352-344-8291 INVERNESS Cambridge Green 3/2/2 Furnon1/2Acre. Newly Remodeled, No smoking, No Pets.$1000. Mo. (352) 212-5894 View or book it AlVALUEINN.com Hernando New Renvt'd Effic $225 wk. Pool. Trailers $200 wk InDLerness (6) Furn'd 3 bd Luxury Homes $425 wk. 726-4744 o Rent: Houses o Unfurnished 2 And 3 Bedrooms RENT TO OWN- NO CREDIT CHECK!I Low Down! 352-484-0866 iademission.com BEVERLY HILLS I or 2 bdrm c/h/a , Only 1st & Sec Req. 352-422-7794 BEVERLY HILLS 2/1, CHA, $595 E-Z Terms 352-400-4275 BEVERLY HILLS 2/2/I, F. Rm., Sun Rm. W/D. no smoke/pets $760. 352-563-2500, 352-212-9267 BEVERLY HILLS 202 S. Barbour St. Nice 2/1/1 FR. SunRm $595+ 352-628-0033 BEVERLY HILLS 2Bdrm/lBth/lCar Gar 352-464-2514 Beverly Hills 3/1 Carport $600, 2/1 Scrn prch $550, 352-637-2973 BEVERLY HILLS Well kept 2/1/2. 9 S. Lincoln Ave. $650. Call Bill 352-746-1403 oRent: Houses Unfurnished 3/2, new home $800/mo. Small pets, non smoking, gsute st 352-812-4848. CITRUS HILLS 3/2/2 with Pool. Pets OK $1,250. mo. 352-860-1245 CITRUS SPRINGS 3/2/1 built '04. All apple's + dshwr, washr & dryer. $700. 352- 726-8751:; 875-8637 CITRUS SPRINGS 3/2/2 homes w/ coveredporch $750/mo. Many homes pet friendly. aAction Prop M2t-Lic RE Broker 352-584-4194 CITRUS SPRINGS Clean 2/1/2, in quiet established Neigh., scm, par. W/D $750. 352-382-1373 Citrus Springs Pass, Owner FInancIn Rent-lease towown 3/2,5w/pool/waterfall 382-795-0088 CRYSTAL RIVER 2/1, $475 mo. It, lost + neo. (352) 798-4786 CRYSTAL RIVER 2/2/1, $695, mo. + see, 382-464-2716 CRYSTAL RIVER 2/2/2, Ig. fencd. lot; Ist/last/sec. $700/mo, mInt/sale 850-371- 1568 CRYSTAL RIVER 3/2 Clean, $850/mo 795-6299 697-1240 CRYSTAL RIVER 3/2/2 fenced yard, washer, clean. Across Rockcrusher Elem. $850 mo 1lst/L/S. 352-621-9285 CRYSTAL RIVER Rentals Available $650. & Up (352) 795-9123 Charlotte G Realty & Investment LLC GOSPEL ISLAND Waterfront 2/I. Very clean. $725. Gottus Realty. 352-344-4811 HERN/INVERNESS 2/1 $500mo; $1000 moves-U-in. 352-726- 4639; 352-400-0004 HOMOSASSA j4502/1 Duplex $775 Meadows 3/2/2 new carpet. $850 Green acres 4/2/2. River Links Realty. 628 -1616: 800-488-5184. HOMOSASSA 2/1 Very Nice, Quite $500/mo 352-220-0740 letaj.com/karmac HOMOSASSA 2/1, CHA, $550 month. Fst.& Sec. No pets. (352) 628-4210 HOMOSASSA 3/2, Nice .CHA, dwasher, Good Area 5629 Hesse Ct, $650/ mo., 352-795-0538 INVERNESS 2/1 With pool. $800. Mo. BEVERLY HILLS 2/1/1 $650. Mo. (352) 344-1411 INVERNESS 2/1+Bonus Rm, Close to town,$550/Mo, Fst, & Sec. 352-489-5813 INVERNESS 2/2, Just Remodeled, $800 mo., $2,800. Total To Move In. (352) 726-2196 INVERNESS 2/2/1, clean, Ig. rms great rm. Fenced yd, storage bidg, pet ok w/ additional dep. Ref. req. $700. mo. For Details: 352-637-3126 INVERNESS 2/2/2 Detached home, RoyaL Oks upgrds, clubhouse, pol, lawn serve, WD. $800/mo. Incls. cable /water 949-633-5633 INVERNESS 2/2/2 w/media rm, frpi, fl rm, fenc'd, avall Nov. 1. $600+1st/L/S 352-212-2841 INVERNESS 3/2 $670 mo. BEVERLY HILLS 2/2/1, $649 mo. Pets OK, Flex. Lse. For Both (321) 723-5498 INVERNESS 3/2, Ig. kIt & din. area like new, many extras $850. mo w/$50 mo discount, 1st, last, sec. 5201 E. Jasmln Ln off N. 41,727-403-2975 INVERNESS 3/2/2 & 4/2/2 starting at $790 mo. (352)341-1 142 INVERNESS 3/2/2 In Highlands. $850 mo, $850 dep, (352) 341-2994 INVERNESS 3/2/Carport, fenc, yd. Newly Remodeled, $775 mo+ sec 727-726-4738 INVERNESS 3/2Y2. Watrfmrnt. Apple's dock, pool & tennis, $975. 352-812-3213 INVERNESS HIGHLANDS, 2/2/I, $650. 3/2/I $695. 352-726-4285 INVERNESS Spacious 3/2/2, newly remodel, $795 1st, last, sec. Lease opt. to purchase & owner fin, avail, great terms. 352-400-1501 LECANTO Hills of Avalon, Newer 3/2/2, CHA, $950. mo. 1st. Ist Sec. 352-563-2480 Sugarmill Woods Upscale Ctry Club Brand New Deluxe Villa 2/2/2 w/ Fam Rm + Lanal, Most Utilities Paid., Just $875. Owner: 352-382-1132 0 Waterfront UI Rentals (2) CONDO'S Lease or Sale 2/2 furnished & 3/2 on Crystal River, great views, wildlife refuge, boat slip & more, Lease $1300 (turn) & $1200. Sale $275K & $295K. Slip extra. 727-458-4964 CLASSIFIED 0 Waterfront Real Estate Pine S Rentals For Sale Ridge Crystal River 4bd 2 ba $9,800 BY OWNER 2 bedroom, 2 bath. Wa- Foreclosurel Won't 4/3/2 Split plan, terfront townhome in last For Listings w/heated pool, Pelican Cove. Newly 800-366-9783 X H796 den & bonus room. redone, 10K boat lift. Picture Perfect All appliances + spa. $9400Rent Homes NEW HOMES $324,500. 352-454-9973 STARTING At $85,000 (352) 746-7598 CRYSTAL RIVER 2/1 On Your Lot Duplex. Great area. Atkinson on canal, nopels $650 Construction RealtySelect + Dep.(813)986-6630 352-637-4138 Citrus.com Crystal River Uc.# CBCO59685 3/1.5 Dock/Deep O en Canal, Upscale Area pen Pristine Cond. Non a House Smoking, F/L $950 (352) 795-0102 pm Open House CRYSTAL RIVER Today! 3/2 Furn'd/unfurn'd. Seasonal or yearly. $1800 -$2500/mo. Motivated 352-787-5885 or Motivated ;F valuevacation- Sellers BETTY MORTON rentals.com, listing GOSPEL ISLAND 2.8% COMMISSION Waterfront 2/1. Very OPEN R clean. $725. Gottus ". t' S ect Realty. 352-344-4811 | ..o... M ..,. INVERNESS I352) 795-1555 Beautiful 3/2, (352) 795-1555 townhse. New Everything $800. BUYERS FIND.. ..-ee L (352) 746-6862 Open House's Beverly KINGS BAY CR Directions & Maps oHIls Homes| KINGS BAY CR By Owner Homes 2/2 Immaculate MLS & More. home w/dock. Prime 2 And 3 Bedrooms view. 51600-$1800 mo OpenHouse RENDIT CHECKIITO OWN- NO Chris 32-304-1659 Makffercom CREDIT CHECKII three- Low Downi doloans@yahoo.com REDUCED $201k, 352-484-0866 NEAR CRYSTAL RIVER Citrus HIls, I1ac, 3/2/2 la2l*milAlon.Com 2/2 LR/DR, go pan= pool home Golf, eledt ro rm w/fipl, tennis, w/opa, 2108 N, BEVERLY HILLS cwall/dock, $1100. Essex. off Rt 486. VILLA, 55+ Private 795-9026, 422-3898 Qct25&26.,Novy&2. Comm.J L6UULU 382-827-6481 2/2/1,CBS Cons, Rent or LIv/Dlnrm, front & Sale Home back porches, Just Loans Remodeled and 1/2 ACRE RANCH Ready to move Inl 2+Den, 2/ 2 gar. like 100% MORTGAGE $135,K Call for Appt new,Poss lease opt, LOAN (352) 270-3559 Keller Williams Phyllis NO DOWN Strlckland,$99,000 PAYMENT Remodeled 352-613-3503 "Low Income oppll- 2BR /2 Full BA/ 1 CG GREAT PRICE cants can quality BRAND NEW: Roof 3/2/2, Highlands, Tiled FIRST TIME AC, Kitchen, cab. Scr.por.Wkshop. Pass HOMEBUYER'S UP TO Stainless Appl.'s, Bath, lease Opt. KW Realty, 100% Carpet, tile, fixtures. Phyllis Strickland Little or no credit Nice Area, $94,900. 352-613-3503 OKAY (352) 464-2160 *recent bankruptcy SUGAR MILL WOODS OKAY' 3/2/2 turn. $900-$1400 CAl TIM OR CANDY LecantO Chassahowitza 2/2 Putnam Mortgage& r Homes waterfront $550. Finance LLC Beverly Hills ,2/1.5 352-563-2661 local carport 5550 866-785-3604 toll Agent(352) 382-1000 free 2 Soo m I Credit and income SRoomsntFor restriction apply Rent Florida licensed 1 Bdroom, all utilities mortgage lender included. Furn.Full house privledges$75/wk (352)564-1411. BONNIE CRYSTAL RIVER PETERSON $100 wkly/$250 dep. Realtor, GRI Incis utils. & satellite. oCommercial 352-563-1465 Z Real Estate Your SATISFACTION CRYSTAL RIVER Is M Future $450/up. Pays ALL 3.1 acres zoned furnished, Elect, GNC Busy (352) 586-6921 W/D, phone, clean, Hwy 44, or (352)795-9123 352-563-6428 CBS Bldg. $599,000. Charlotte G Realty CRYSTAL RIVER (239) 571-2628 & Investments LLC Priv. Rm & Bath $450 CITRUS INDUSTRIAL Louise(352) 794-7424 Park WH- Hernando INVERNESS 5,000 sqft/o000sqft Meadowcrest 1 BR w/ priv. BA, um. a/c office. 352-302- Homes incls utils., house 0673. 352-746-5951 privileges, no pets, Did the Bank Say No? MEADOWCREST nice area, $370. mo They Can't, We Can. 2/2/2 Enclosed air (352)344-0085 Commercial Ventures cond. lanai.Hurricane View or book it- w/Credit & History. reinfrcd gar.door.Lots AiVALUEINNcom We're Funding Now. of extras. Must see to Hernando New Michael Peters, Broker Appreciate.$145.000 Renvtd Efic. $225 wk. Commercial Capital (352) 795-2843 Pool. Tailers$200 wk (352)246-7483 - Inrness (6) Furn'd 1US 19 miles South 3 bd Luxury Homes of Hormosassa -" -Citrus Hills $425 wk. 726-4744 2 bath. building 3000 Homes sqft., showroom 0* Seasonal 1-877-712-1665 J RentalS 4 Investment REALTY SAVINGS CITRUS HILLS Properties $249 MLS Flat Fee 2/2/1 VILLA Sa Req 4 bed 2 ba $19,8001 3.9% Total Listing Uti Inc. & 2/2/1 VILLA Foreclosurel Won't Buyer rebate-33% with/Pool, Sec. Req. last For Listings 352-637-9069 800-366-9783 X H796 25+ Yrs Experience FLORAL CITY Citru S in Knowledge/Integrity Nice 2/2 scr prch. Ctrus springs all For Details Nice yard. Long/short 1 Homes term. 352-344-8213 Ron & George Neltz term. 352-344-8213 3/2/2 For Sale or Rent Ron & George Neltz View or book it Citrus Springs New Broker/Realtor AIVALUEINN.c Home, ow/dn easy CITRUS REALTY Hernando New terms 352-840-3324 Renvt'd Effic $225 wk. terms 352GROUP Pool. Trailers $200 wk 3/2/2 NEW HOME 352-795-0060 Inverness (6) Furn'd Golf Course Comm. 3 bd Luxury Homes $140,000.- $180,000.- $425 wk. 726-4744 352-400-0230 Inverness I, Storage/ REAL ESTATE c Homes LiWarehouses HOME OWNER 3/2/2, Fenced, new rf. CITRUS INDUSTRIAL SPECIALS High effi. heat pump Park WH- Hernanda 6 lines S/S appl's much more 5,000 sqft/1000 sqff 14 Days ...........36.50 excel area $144,000 a/c office. 352-302- 30 Days.,;.......$56.50 (352) 341-8479 0673; 352-746-5951 (All extra linage (417) 273-0020 $5.00 per line) (417) 712-4739 CALLVacation |LL Rentals 352-563-5966 COUNTRY CLUB AREA Private Party Only, 3/2/2 Split, built 96; View or book It at Owner must dead end st; light/ AIVALUEINN.com live In home. r gh, Hfgim rNew __ (Non Refundable) brighrn prch; 2 sheds Renvtd Efflc,225/wk. All Ads are prepaid, rgeectc& water Pool. Trailers $200/wk. Some restrictions spw/elerss o w a- 3 bd. Luxury homes. __ ___ tnwlpriv.fene $425/wk. 726-4744 -- Incis extra 4 ac. lot; 425/wk 726444 pine furnishings negotable. Real Estate I Ridge 5180K. 352-341-4888 For al ** ~ For Sale, By Owner PUBLISHER'S REALTY SAVINGS 3BR 3BA, pool, 16x24 workshop, close to NOTICE: *$249 MLS Flat Fee school, hosp., library, All real estate *39% Total Lstn WTI, 518 Poinsettia, advertising In this Buyer rebate-33% Ave. (352) 860-0878 newspaper Is subject to Fair 25+ Yrs Experience Lovely 2/2/1 Housing Act which Knowledge/Integrity Whispering Pines Park makes It Illegal to call For Details Villa awesome advertise any location & amenities preference, Ron & George Neltz Must sell, Make offer dlscrimination o based on race, CITRUS REALTY Ratelc color, religion, sex, RealtySelect handicap, familial GROUP i status or national 352-795-0060 ilrus.com origin, or an intention, to make and read such preference, nd r d limitation or . discrimination. 2410 West Tall Oaks Familial status Dr Includes children 3 bedroom, 2 bath. under the age of 18 1700 sf living Beau- ., living with parents tiful Home, New A/C, or 10x12 workshop, leaal custodians, Fenced in lacre pregnant women yard with custom and people built wood privacy BETTY MORTON securing custody of on back and dog children under 18. kennel, Great Deal 2.8% COMMISSION This newspaper will wont last long at not knowingly 159,900. Select accept any 352-344-3744 or ,,1 = advertising for 352-527-0635 real estate which is (352) 795-1555 in violation of the law, Our readers are hereby SELLERS dwellings our World The Fish advertised In this -" Are Bifingi newspaper are available on an pu 4 4t W CALL ME equal opportunity basis, To complain of discrimination call HUD toll-free at 1-800-669-9777. The toll-free telephone number for the hearing impaired Is. 1-800-927-9275. . S' '' Deb Infantine ,- EXIT REALTY LEADERS .: .... ,crebrfr& (352) 302-8046 1,625 sf. New Roof. Nice Neighborhood (352) 400-0230 1 Citrus County 0 Homes REALTY SAVINGS *$249 MLS Flat Fee * 3.9% Total Listing * Buyer rebate-33% 25+ Yrs Experience Knowledge/Integrity Call For Details Ron & George Neltz Broker/Realtor CITRUS REALTY GROUP 352-795-0060 Sold $1 Million In Sept. PLEASE call me befroe U buy or sale, Let's Talkil PHYLLIS STRICKLAND (352) 613-3503 KW Realty BONNIE PETERSON Realtor, GRI Your SATISFACTION Is MyvFuturell (352) 586-6921 or (352)795-9123 Charlotte G Realty & Investments LLC Crystal River Manor 3/1.5/2 CB 2yrs, old on 1/1.5 acres, illness forces sale. Our loss is your gain. $187.500 (772) 201-9418 LECANTO 2003- 3/2/2 Meadows sub, remodid, $100K 2/I Gorgeous, park like 114 acre. $105K 352-697-2884 Michele Rose REALTOR "Simply Put- I'll Work Harder" 352-212-5097 thorn@atlantic.net Craven Realty, Inc. 352-726-1515 Open House Today! Motivated Sellers &OPEN HOUSE BUYERS FIND... Open House's Directions & Maps *By Owner Homes SMLS & More.. OpenHouse MakeOffer.com CITRUS COUNTY (FL) CHRONICLE Copyrighted Material Syndicated Content * Available from Commercial News Providers S o D OW -wum 460, MEW TtITLE[ a[I ] rilelpiyou sil'' All 1`5130S IiI Crieo Cal VIC MCDONALD (352) 637-6200 Realtor My Goal Is Satisfied Customers REALTY ONE O()ustadingAge ts Oultsanding Results SDunnellon Homes DUNNELLON 'S HISTORIC VILLAGE RESIDENI- BUSNESSNewer3/1 ,CBS Home. Big lot 30' scr.rm. Pickett fence cottage look, $109k R. Martin Callahan NEWLY REMODELED 3/1.5. New roof & A/C. 16x32 in ground pool w/new liner w/extra lot $99,000 352-465-6631 S Lev County A oAmes GULF HAMMOCK 4/3 on 5+ Secluded acres. Great wildlife, hunting & fishing near Waccassasa River. $189,900 (352)486-4308 CA Condos For Sale (2) CONDO'S Lease or Sale 2/2 furnished & 3/2 on Crystal River, great views, wildlife refuge, boat slip & more. Lease $1300 (tum) & $1200. Sale $275K & $295K. Slip extra. 727-458-4964 CITRUS HILLS 2/2.5 Townhouse, malnt. free. Reno- vated & updated. Country Club mem- bership. Owner finance avail. No credit check, $119,900 (352) 746-5527 FLORAL CITY $53K,Purchase/Lease Option 2/1 water acc on premises. 8722 E. Moonrise In (352) 212-8219 Inverness 2BR, 2BATH Cypress Cove, water- front condo, Avg. retail $95,000 Poss. owner finance $75,000 or disc. for cash. (352) 726-9369 Waterfront co Homes (2) CONDO'S Lease or Sale 2/2 furnished & 3/2 on Crystal River, great views, wildlife refuge, boat slip & more. Lease $1300 (fum) & $1200. Sale $275K & $295K. Slip extra. 727-458-4964 3/2 CB 12x20 fl rm, laundry & office, file & berber carpet. On canal w/gulf access. Priv. dock, 2 bidgs, $195K. 352-382-0722 BEAUTIFUL 3/2/2 Duvall Is. turn key, Ig. Waterfront lot. Keller Williams Realty Phyllils Sttrlckland 352-613-3503 LET OUR OFFICE GUIDE YOUI Plantation Realty. In.(352) 795-0784 Cill 422-7925 Lisan VanDeboe Broker (R)/Owner See all of the listings In Citrus County at realtvlnc.com S Waterfront S Homes CRYSTAL RIVER FSBO- lease opt. avail, BIk/stucco, Al/=/ dble covered boat llp, Frpl, fenc'd, Possible owner fin. 1138 Midlron Pt, 382-638-1079 Open Sat & Sun, 11-4 INVERNESS 2/2, 1 car garFirm, Scr porch, Boat dock new paint & shingle roof 1214 Lakeshore Reduce 434-489-1384 INVERNESS New Home 2/2 1 car gar. Lg Lot, Great nelghborhd canal toLk Hen- ,-ldron A4.A-A8-134A Citrus.com BETTY MORTON 2.8% COMMISSION ReabiRlect (352) 795-1555 I Real Estate c Wanted BUYING HOMES - Any: Size. cond, loca- tion, price, situation. Over flnac'd, dblwlde & mobile homes okay. 1-727-992-1372 Vacant Property Make an Offerl 1.5 acre lot In Pine Ridge. Only $48,880 SHARON LEVINS 352-228-1301 Rhema Realty o County Land A BANK REPOI 4/2 $24kl $199/mol 5% Dn, 20 yrs. 8% for Ileltlngs 800-366-9783x6705 a Lots For S Sale 1 + Acre, Wooded, part. cleared, 6322 Monticello, Heritage Acres $27,500 727-667-6720 727-393-1257 TWO for the PRICE Of ONE Buy one city limits lot for $21,000, get IHW gorgeous lot for free. Call 637-4904 or 563-9614, owner Lic. Realtor so Boat t O Accessories| 3/2 HUD Homel $225/mol 5% down 20 yrs @ 8% apr call for Lisltngs 800-366-9783 x 5704 0 Boats 2003 CENTURY 1901 Bay, Yamaha 115 hp 4-stroke w/109 hrs,Galv tir, electron- ics, bimini top, much more. $14,900 OBO 352-344-4447 Used Boats Want quick results and top dollar for your used boat? Including Free Advertising? Call 352-628-2991 HOMOSASSA MARINE CONSIGNMENTS Our family of newspapers reaches more than 170. 1624 North Meadowcrest Boulevard Crystal River, FL 34429 (352) 563-6363 m pl- SEA- PRO '03, 5th wheel, 3 slides 07, 186 Dual Console, like new,$34,000. 115hp Merc. very to Truck avail also for hrs. exc. cond. Road tow (352) 422-5731 King, Custom Alum Tril ROCKWOOD $16,900 (352)560-7178 '06, 31FT. 2 slides. SEAHUNT Sleeps 9, Smoke free. 2007, 21FT, center Lots of extras, $19,900 console, 150 Yamaha (352)400-1257 GPS, Take over pymts STARCRAFT (352) 344-5561 POP-UP 02, Model SEAMAID 1701L, a/c. 3 way Frig. Aluminum Boat Awning, Exc.Cond 5HP Outboard motor, $3250.(352) 249-3263 $400. obo IAuto Parts/ 352-344-5993 arts STINGER Accessories 97 16' Center Con- CAPPER TOP for fullsize sole, loaded 50hp '96 Dodge Ram & Yamaha 4 stroke bedllner. Tinted & all w/traller exc. cond hydrollc windows. $6200 (352) 527-8150 Exc. cond. $500/obo WELLCRAFT 352-257-0078 1987, 250 Sportsman, Fiberglass Cap 25', Gas eng., 30" For '88 to'98 draft, 260 hp I/O, Extended Cab alum. trir.$8,000 chevy truck. $400. (352) 344-9651 (352) 302-5863 CITRUS COUNTY (FL) CHRONICLE S Boats Boats Foreclosurel Won't 20FT, 1988, OMC last For Listings SeaDrive 140HP eng, 800-366-9783 X H796 must sell, $2,000 (352) ACTION CRAFT 400-3243 277-8857 '03 Coastal Bay Tour- 'o Recr nament Edition. 21'6 Recreational 225/4 stroke Vehicles Yamaha. '05 Cont. GEORGIA BOY 35' alum. trailer. Excellent 98 GERGIA 26BOY 35 cond. Many extras, w/slde, 26k cond, Many extras miles,dual ac, full $18,500 bath,r/camera,wood 352)726-2117 floorsanew awning. AIRBOAT $24,500 (352)503-7101 1996, 15', 500cublc inch. A BANK REPOI 4/2 Cadillac engine $24ki $199/mol completely rebuilt 5% Dn, 20 yrs. 8% (352) 560-3019 for llsltings AQUA SPORT 800-366-9783x5705 2000:225 Explorer 24' ALUMSCAPE Cuddy cabin. 225 John- '03 32' 2 slides self son Ocean Pro. contained, Furn'd Loadmaster tandem Lots of extras. $23k axle trailer. Exc. cond. b7e. (727) 243-5110 $22,500.352-493-7377; oo.() 352-221-5230 *AUTO. BOAT & AQUA SPORT RT *M '86 25FT.Cuddy DONATIONS Cabin. W/twin '06 43 year old Mec.Optimaxs. Non-reporting & Dbl axle trailer. 501-C-3 Charity. $17,500 (352)257-1355 Maritime Ministries (352) 795-9621 BAYLINER Tax Deductible * '86. 21ft, Clera, Cuddy cabin, 225hp, Lots of COACHMEN extras $4500. Good PATHFINDER '03,31' cond. (352) 726-3302 w/27,200 miles. or 697-2513 $35,000 obo BIG 0 AIRBOAT (352) 726-0263 2000 13' Big 0 airboat CONQUEST 7' wide: 72" power shift '92, 20 FT., Class "C" carbon fiber prop, new 350/400. GM Chassis, seat covers & heavy GD Tires, Self Con- duty trailer. Nice ride & tained $7,500. (352) clean title. Asking 746-9212 $8,000. CALL Dale 352-220-8076 OR DAMON 352-220-8727. '92, 32', 454 Chevy BOS2-T7N eng, 27 2 ACs. qn. BOSTON bed. Non Smok, No WHITEHALL -pets, Lots of extras & 16', beautiful wood Exc. Cond! boat, hand crafted $16,900.352-527-8247 by a master Mariner, ENDEAVOR wood inlay seats and 38' T/Axle '98 Slide. In- 2 sets of oars, has cludes 99 Jeep mast for sailboat con- Wrangler $47,500obo version, transom for 352-637-5149 or electric motor, used 352-586-3090 twice, Incl trailer, $6,000.(352) 382-1895 FOUR WINDS CAROLINA SKIFF '03, Hurricane 30Q, 19fft semi V, wide one class A motor home, 115 4-strkYah, 24V 31 2ft., 20k mi. V10 elec. motr, exc cnd. gas, ducted rf. air, $8950. 352-637-5426 onan 4K gen., qn bed, etc. Saturn tow CENTURY Avail. $35,000. Lets '01- Bay, 21ft. talk (352) 397-5007 '02, 150HP Yamaha w/ GOLF CART ITir., custom cover G LCA dep/flnd, VHF, lw hrs., ,05 Club Car like new, $14,900. President, electric, 48 (352) 442-7772 Volt. W/ 07 batteries. (352)4427772 $2.70.(352) 465-7940 HURRICANE 2GULFSTREAM '01, Dekboat20., 05 BT Crulser(Class B) 115HP,4stroke Yamaha, Chevy V -86.0 L 22ft. w/ tflr, excel. cond. 18k ml. exc cond $15,900. (352) 503-3778 Consumers Best Buy $28K 352-628-5412 Holiday Rambler '03, By Monico, 300 Cummins, 2 slides, ITS FRE iE ncl. tow vehicle, T FREE mint cond. $79,900. (352) 302-7073 Place any General Holiday Rambler Merchandise Ad for Admiral Motor Home 36' FREE on our all new 2 slides, 340hp, gas eng. CLASSIFIED SITE. all options transf ext. warr. $56,900 5 Days, 5 Unes. 352 795-3970 2 items totaling less than $100.00 each. ITASCA NAVION '06 24FT, Mercedes die- Go to; sel. Class C. Good mpg, chronlcleonllne.com low ml, 1, slide, loaded. and click $57,995. 352-464-0371 Place an Ad In the JAMBOREE top right hand comer. 29',2005, V-10 Class C JON BOAT 12,400 mi., Loadedl 16', .0' H .1. T/T. Pert,.*.:r,..r, _.. Biriin irlr FF Tr.- Mtr., Ready -c g,:i : .O -J Xtras, Excel. cond. (352) 465-2138 $2,950 obo 746-4160 PACE ARROW KEY WEST 225 04, 38' 3 SLIDES '05 Walk, T-top. 225 21k ml fully loaded Yahamo 4 strk, trailer, 3 tv's $92,500 obo LOADED PERFECT! 352-302-0743 $31,550. 352-527-4341 PACE ARROW Nature Coast Marine '98 Fleetwood 38ft New, Used & Brkrg. Fully loaded, 1-slide, We Pay $$ for Clean low miles. MUSTSELUL Used Boats.794-0094 $42K. 352-621-0804 OSPREY WINNEBAGO 1994 16ft, GREAT '96 Itasca Suncruiser, 34'. FISHING BOATI 88 HP 1 slide. Exc. Cond. Evinrude, electronics, 17K Miles $23,000 $5000. 352-621-4711 (352) 465-3203 After 5 RV2 RVs ACtN .~.; Wanted PLACE YOUR AD 24hrsADAYATrOUR _5 F ALL NEW EBIZ CITRUS . CLASSIFIED SITE! Go to: - chronlcleonline.com and click place an ad PONTOON R '03, 25' SUN TRACKER, '05 90hp Merc, low hrs. , fresh bottom paint, VHF alum. deck, tandem tdr. cust. dive platform $12,500.352-586-1676 PONTOON '09 20ft Bentley 50hp B D 2 strk Merc. $13,995 Gulf to Lake Marine OU (352) 527-0555 PONTOON 25' 50 hp Johnson *AA4 A MLIgUEELLNo Traller 3 -J3'r -14 I I- $3900 (352) 794-0267 PONTOON T C pers Sylvan 20' Yamaha T50 I Travel Trailers TLRC Engine Uke New 40hrs. Playpen Cover COACHMAN port-o-potty, extras '00, 5th Wheel Travel $14,900 Trailer, CD/ Stereo (352) 628-0281 slide out, clean, PROLINE $9000.(352) 503-5446 03 32ft center Gulfstream consolebunk under, '04, 38 ft., slide out twin OB 160 hrs. like w/ sliding glass door, new, loade, d IncI trial full kit., bedrm./bath may consider newer very clean, $13,500. Coethe as part (352) 527-8911 Cindy trade $62K I BUY (352) 201-1833 RV'S, Travel Trailers, PROLINE 5th Wheels, W/UTT Motor Homes W/CUTIY Call Glenn 95, 20' 120 HP (352) 302-0778 Merc. Dep/flnd. Radio, fish rigging. KODIAK Includes trailor. '04, Hybrid Travel Trir. Good cond.$6,900. AC, Heat, Micro. Tub/ Call Pete @ Shwer, toilet exccond (352) 746-4969 $9,500. 352-564-4151 SEA ERA MOBILE RV REPAIR '98 -19ft, 115hp John- W Come To Youl son, C console, color Trlr. & 5th Wheel Tow- fish flnder/radio/gps. Ing 352-270-3411 $7500. 352-503-3236 Montana 30 Days..........$68.50 ----- (All extra linage 4x4s $5.00 per line) CALL CHEV BLAZER 352-563-5966 01 2DR, LS, auto, V6 1 vehicle per ad. 69Kml. air bags, Private Party Only FM/ stereo CD wide (Non Refundable) stance auto 4x4. Full All Ads are prepaid, pwr, great cond, $5,900 Some restrictions (352) 726-9733 may apply. CHEVY SClassic '87 Cheyenne. 8ft assic new tires & trans. Vehicles Needs motor. $750/ '67 CUTLASS ab. 352-465-9301 Convertible V8. Will 0 consider trade In part. W Vans 352-621-0182 727-422-4433 Dodge AUTO/SWAP/CAR '85 3/4 Ton, cargo CORRAL SHOW van. One owner. Fresh trans.$1,400 Sumter Co. (352) 212-5117 Fairgrounds Ford Sumter 1996 Windstar GL V6, Swap Meets 140k, ml. loaded, .2, 2008 cold a/c, great NOV. 2, 2008 shape, 8 pass .$2500 1-800-438-8559 (352) 422-2611 Auto Parts! [ Classic Accessories Vehicles Tires AARZ2 4 new mounted & '88 Red, LT -1 eng. balanced. LT 215/85 PS./PB. Cold A.C. R-16. W/8 lug rilms. 62,000 MI. Great $150. (352) 628-4210 Condition. $7,900. Tires Camaro Z 28, '79 BF Goodrich radials. Black 4 spd. super All terrain. Mounted T-10 Tran. Cam.more, on rims.32 /1150 ,15Lt. Must see $7,500. $300.(352) 270-3183 (352) 422-5663 CHEROLET '0 Vehicles '94, Camaro Z28, SWanted convertible, black w/ S ID LT1 eng. runs & drives $$CASH PAID$$ great $5,750 Wanted Vehicles (352) 382-7001 Dead or Alive, CHEVY Dale's Auto Parts '69 Classic C10 SHT 352-628-4144 352-628-4144 BD 350/350 AC, PS, pFm $15K or trade TOP DOLLAR I (352) 746-9212 For Junk Cars | FORD $ (352) 201-1052 $ 1955 F 100 PICK UP Hot L $m3521 5- J Rod 350 eng ,BLk $$ CASH PAID $$ CHERRY COLOR $9,500 Junk Cars, Trucks, OBO. 352-302-0743 Vans, FORD J.W. 352-228-9645 MUSTANG '68, 289 Buying Junk Vehicles ALL ORIGINAL Highest Prices Paid fact. a/c, 59,500 ml. Fast, Free Pick Up Runs Greatl $12K (352) 267-5253 or trade for RV (352)302-7681 Cars GTO 1967, The real deal, '09 PONTIAC older restoration, Just out Vibe GT. Sllver/blk of storage $25K or trade Loaded, sunroof, (352) 621-0666 auto, Pd $22K, asking JEEP $17,550. Full warranty '72 CJ5 304 V8, 30+mph, 352-257-1513 35x1250 tires, head- ACURA ers, Edelbrock man & 04 3.5RL leather 42k carb, low gears. New mi. loaded, paint In/out & more. moonroof, nav. all 90% comp,$6000/obo options $19,995 352-341-0952 352-422-2960 MERCEDES BMW '72, 350SL, both tops. '03, 745 LI. excel. $7900 or Trade cond. NAV, black, (352) 586-8576 sun rf. all opt. Must MERCEDES BENZ Sell, Order New one 1985 380SL, 2 top (352) 746-2696 roadster. Drives, looks BUICK great. Many new '00, Regal, silver, Ither Mercedes parts, 91Kml .25+rg.' New A/C. Must seel Reduced $4,500 $8,700. David (352) 795-5032 352-637-6443. (352) 634-3333 NOVA BUICK '72350, V8/Auto '95 Park Ave, 4 dr. 3.8 $3,500. V6, leather, 124K ml, Chevy great shape. Loaded '57 210, 4 Dr. $2500. 352-341-0247 6Cyl, 3 Spd.$6,500. CADILLAC (352) 464-4735 DeVille, 1995. Estate Car. White, Very l Trucks Clean. $4,200.00. (352)795-4500. 03 TOYOTA TUN- CADILLAC XLR DRA Limited 57k '06. Convertible. Blue GREAT ON GAS w/white leather. Low ml- $13200 les. 352-795-0956 352-601-7164 leave CHEVROLET a message. 02, Corvette, Z06, '94 CHEVY Black, low ml., over 30 Ext. cab, 8 ft bed. New mpg hwy. $24,400. motor, good cond. 2 (352) 613-5355 wheel drive Z71 pkg. CHRYSLER $4,750. 2006 Paclfica 352-563-1518 Iv msg LIKE NEW. MUST SELL '97 FORD F350 $15,300 XLT pwr strk diesel. 352-489-3507 Loaded, 5th wheel, CHRYSLER Apprs $15,500; sell PT Cruiser '06, Convtbl $11,700. 352-503-7188 4k MI, Loaded Like CHEVY New $12.000. 2003 Slverado 352-527-6988 78k miles, $5200 ask for John (352)563-2977 Chrysler CHEVY Sebring Conv. 98, 2005 GMC, Diesel 1 owner,gar kept Loaded 49K miles mint 43km .loaded $26,000(352) 563-2977 $5750(352) 228-1267 $0CHEVY5 CHEVY CORVETTE '85 3/4 Ton, 4 x 4 16- 2007 convertible tires & rims 16331250, corvetteonly 4,076 Posi Axles, Trans/. miles on this rare sil- Transfer $1,500. firm ver on silver on silver 352-302-8935 vette, power converta- ble top, 6 sp auto, CHEVY paddle shift, heads up '97, Suburban 1500. display, magnetic F55 Great condition. suspension, naviga- $4,500 OBO. tion system, all op- (352) 586-7126 tions available are on DODGE this gorgeous vette 2000 Ram Quad cab, Over $2,000 in after- 5.9, shrt bed w/lliner, market parts pwr cruise, a/c, auto, included, Your's hitch. Exc. cond. for only, $52,500. $7295. 352-628-3868 352- 270-3193 FORD CORVETTE '04, F150, Super Cab. '80, Stingray, white, original owner, 86K mil. org. blue mechanically perfect Inter. T -top roof, very $11,400 352-746-5157 good cond. $10,250. Ford 352-5 428 90 F150 PS Auto Inline DODGE 6, Long bed w/liner. 03 INTREPID, 4 dr. All new brakes.1.,795 low ml. White $3995 (352) 726-0094 Larry's Auto Sales FORD 352)564-8333 '99 F150 XL, V6, auto, air, HONDA am/frm, bedllner. 120k. '03, Civic EX, Tan $2,900.352-503-6348 or 4 Dr., 31K MI. Auto 287-9215 Alarm, Asking $11,500 Ford 352-464-2410 '99, F350 44, 7,.3 KIA diesel/Auto. 5 wh. hitch. '04 Amanti, 38K ml. Aux. 100 Gal. tank.110k Leather, loaded. Mid- MI.$11,500 night Blue. $10,200 (352) 382-2272 Obo. 352-382-3269 GMC MERCURY '05 Sierra 2500SLTA,4x4, '97, Sable GS, V-6, Crew cab, duramax Auto, 126K, Fully 45K ml.$23,000.banks loaded Cold AC. klt(352)560-3685 MERCURY exhaust System. Re- '97, Sable GS, V-6, mote, am/fm/CD Auto, 126K, Fully 5 spd.great work loaded Cold AC. truck, excel, on Gas Exc. Cond. $1,900 $3,000 aba. (352) 453-7326 (352) 726-9724 ConvertIble 1977,57k Vehicles ml. Blue, many xtras e . Excellent Condition AZTEK $10,500(352) 628-0281 Pontiac'04 Low OLDSMOBILE miles, loaded Full '83, 98 Regency financing/warranty MUST SELLI $1500 1-877-566-6686 Good cond. ID#30883: 352-628-7983 352-726-5715 PONTIAC DODGE '98 Sunfire, 4dr., 4 cyl. 99, DURANGO 4x4, auto, looks & runs 80K ml., loaded, dual good. $1.575. air & exhaust, Exc. 352-637-5394 Cond. $6500 obo TOYOTA (352) 344-0505 '04, Camry LE, FORD $10,399. mlnt, all org. '02 Expedition Eddie cond, 81k ml., silver, Bauer, leather, Great Call Clella Cond. 108K ml $5500 (352) 436-4521 352-527-2486 352-212-5913 TRANSPORTATION Yuk on-5 SPECIALS Yukon HEADER + 4 lines '04, GMC. SLT 67K. M'I. 7 Days.............$30.50 $13,000. 14 Days...........$42.50 (352) 382-5787 c Vans FORD '98 Windstar, Good cond. new tires, 7 passenger $2,600(352) 860-0319 FORD '98, Chateau, very clean, non-smoker 100k ml. $4,500 352-746-9059 0 ATVs HONDA '03 Rancher. 350cc, 4wdr, 5spd + reverse. Climbs mountains & tows heavy loads. $5300mi. Adult driven. $7,500/ obo. 352-746-4521 H/Davidson '01 Sportster, Recently serviced. Lots of chrome.$6,000/obo (352) 497-7342 HARLEY '05 Heritage Softall Classic.Leather saddle bags,fuel inJ. Prof.detalled. Gold Medallion Pkg. Only 6,113 Ml. Ultra gard cover. Bike Jack. $14,700 (352)228-0841 Harley Davidson '07, 1200 XL, Low Sportster, 528 mi. $2,000. Cash + Fin. Bal. owned $9,527.00 352-628-9141 HARLEY DAVIDSON 1998 Ultra Classic Green/Black. Corbin Seat Very good condition. $9500.00 352 746-6264 ,eIo j 414-1027 MCRN 2008-CP-918 Mary 1. Ehresman Notice to Cred. PUBLIC NOTICE IN THE CIRCUIT COURT FOR CITRUS COUNTY, FLORIDA PROBATE DIVISION File No. 2008-CP-918 t Division Probate IN RE: ESTATE OF MARY I. EHRESMAN Deceased. NOTICE TO CREDITORS The administration of the estate of MARY I. EHRESMAN, deceased, whose date of death was July 30,2008, file number 2008-CP-918, Is pending In the Circuit Court for Citrus County, Florida, Probate Divislon; the address of which Is 110 N. Apopka Avenue, Inverness, FL 34450. The names and addresses of the personal representative and the personal representative's attorney are set forth below. All creditors of the decedent and other peTsons 10/20/2008. Personal Representative: /s/ Robert J. Ehresman. Sr. PO Box 456 Inverness, Flodrida 34451-0465 Attorney, October 20 and 27. 2008. 402-1027 MCRN 2008-DR-5239 William & WIphada Harmon Notice of Action- Dissolution of Marriage PUBLIC NOTICE IN THE CIRCUIT COURT OF THE FIFTH JUDICIAL CIRCUIT. IN AND FOR CITRUS COUNTY, FLORIDA Case No.: 2008-DR-5239 Division: Family Domestic WILLIAM G. HARMON, Petitioner, and WIPHADA HARMON, Respondent NOTICE OF ACTION FOR PUBUCATION TO: WIphada Harmon Address Unknown YOU ARE NOTIFIED that an action for Dissolution of Marriage, Including claims for dissolution of marriage, has been filed against you. You are required to serve a copy of your written defenses, If any, to this action on James R. Dozier, of Grant & Samargya, LLC, Petitioner's attorney, whose address Is 123 N. Apopka Avenue, Inverness, FL 34450, on or before Nov. 5re quires certain automalc disclosure of documents and Information, Failure to comply can result in sanctions, including dismissal or striking of pleadings. DATED this 26 day of September, 2008. BETTY STRIFLER, CLERK OF COURTS CLERK OF THE CIRCUIT COURT By: /s/ M.A. Michel Deputy Clerk Published four (4) times in the Citrus County Chronicle, October 6, 13, 20 and 27, 2008. 408-1103 MCRN 2008 DR 005370 Loulse & Lawrence Brennan Notice of Action for Dissolution of Marriage PUBLIC NOTICE IN THE CIRCUIT COURT OF THE FIFTH JUDICIAL CIRCUIT, IN AND FOR CITRUS COUNTY, FLORIDA Case No.: 2008 DR 005370 Division: LOUISE CARTIER BRENNAN, Petitioner and LAWRENCE EUGENE BRENNAN, Respondent NOTICE OF ACTION FOR DISSOLUTION OF MARRIAGE TO: LAWRENCE EUGENE BRENNAN ADDRESS UNKNOWN YOU ARE NOTIFIED that an action has been filed against you and that you are required to serve a copy of your written defenses, If any, to It on LOUISE CARTIER BRENNAN, whose address Is 3491 E CHAPPELL CT., HERNANDO, FL 34442 on or before Nov. 12 re- DEUTSCHE BANK NATIONAL TRUST COMPANY, AS TRUSTEE FOR THE REGISTERED HOLDERS OF NEW CENTURY HOME EQUITY LOAN TRUST, SERIES 2005-B, ASSET-BACKED PASS-THROUGH CERTIFICATES, Plaintiff, vs. DEBORAH ANN ROBERSON; et al., Defendant(s) NOTICE OF ACTION To the following Defendant(s): DEBORAH ANN ROBERSON (CURRENT RESIDENCE UNKNOWN) Last known address: 9374 NORTH CITRUS SPRINGS BLVD., CITRUS SPRINGS, FL 34434 UNKNOWN SPOUSE OF DEBORAH ANN ROBERSON (CURRENT RESIDENCE UNKNOWN Last Known address: 9374 NORTH CITRUS SPRINGS BLVD., CITRUS SPRINGS, FL 34434 YOU ARE HEREBY NOTIFIED that an action for Foreclosure of Mortgage on the following described property: I LOT 23, BLOCK 165, CITRUS SPRINGS, UNIT 12, ACCORDING TO THE PLAT BOOK 5, PAGE 108 OF THE PUBLIC RECORDS OF CITRUS COUNTY, FLORIDA. CLASSIFIE.DS SMotorcycles HarleyDavidson 2005, XL 1200 Custom, Under 7k mlScreamin Eagle Performance Pkg & more. Gar.kept $7500 (352) 209-7495 Harley Davidson '81 Shovelhead, 80", completely serviced, good shape, Ex. access. $6,495. obo 352-746-7655; 726-4109 HARLEY DAVIDSON '86 1100 Sportster. Runs great.Low mileage.Extra's,3 gal tank,original leather bags,etc.Must sell due to health.$3,500.00 obo. 352-860-2156 Harley Davidson Heritage Softtall '94 Aqua & silver 5k ml. Exc. Cond. $9,500 (352) 795-1615,600 obo (352) 382-2532 SCOOTER '05, 650 Bergman 5000K Ml,. Powerful, fast & fun. Loaded, like new. $5,900.50 (352) 637-6046 SCOOTER 2007 Kymco People S200 Perfect condition, like new with Service Manual and 4x7 cus- tom utility trailer for scooter (used once) scooter and trailer "Black" $3,200. Firm call for appointment 352 344-3969 YAMAHA '03 4 cycle, 6 hp, w/tank. Like new. $1300. 352-563-2253 S Legals Legals | Legal J suit In sanctions, Including dismissal or striking of plead- Ings. Doted: October 1, 2008. BETTY STRIFLER, Clerk of Courts CLERK OF THE CIRCUIT COURT By: /s/ M.A. Michel Deputy Clerk Published four (4) times In the Sumter County Times on October 13, 20,27 and November 3. 2008. 415-1103 MCRN 2008-CP-952 Catherine J. Sito Notice to Cred. PUBLIC NOTICE IN THE CIRCUIT COURT FOR CITRUS COUNTY. FLORIDA PROBATE DIVISION FILE NO. 2008-CP-952 IN RE: ESTATE of CATHERINE J. SITO, DECEASED, NOTICE TO CREDITORS The administration of the estate of CATHERINE J. SITO, deceased, whose date of death was SEPTEMBER/27/2008. Personal Representative: /s/ ROCHELLE PISO 212 S. LUCILLE STREET, October 27 and November 3, 2008. 409-1103 MCRN 2008 DR 5429 Guy & Elizabeth Jobe Dissolution of Marriage PUBLIC NOTICE IN THE CIRCUIT COURT OF THE FIFTH JUDICIAL CIRCUIT, IN AND FOR CITRUS COUNTY, FLORIDA Case No.: 2008 DR 5429 Division: GUY A. JOBE, Petitioner and EUZABETH LEE JOBE, Respondent. NOTICE OF ACTION FOR DISSOLUTION OF MARRIAGE TO: ELIZABETH LEE JOBE I Respondent's last known address): 7722 Homer Ave., Hudson, FL 34667 YOU ARE NOTIFIED that an action has been filed against you and that you are required to serve a copy of your written defenses, If any, to it on Guy A. Jobe, whose address Is 371 N. Seton Ave., Lecanto, FL 34461 on or before Nov. 12, 2008, and file the original with the clerk of this Court at 110 N. Apopka Avenue, Inver- ness, FL 34450, before service on Petitioner or Immedi- ately: Oct. 6.2008 -..... BETTY STRIFLER. Clerk of Courts CLERK OF THE CIRCUIT COURT (COURT SEAL) By: /s/ M.A. Michel Deputy Clerk . Published four (4) times In the Citrus County Chronicle, October 13,20,27 and November 3.2008. 418-1103 MCRN 09-2008-CA-005159 Aurora/ Rodriguez Notice of Action PUBLIC NOTICE IN THE CIRCUIT COURT OF THE 5TH JUDICIAL CIRCUIT, IN AND FOR CITRUS COUNTY, FLORIDA I CIVIL DIVISION CASE NO.: 09-2008-CA-005159 AURORA LOAN SERVICES, LLC. Plaintiff, vs. LOUIS RODRIGUEZ, et al. Defendants. NOTICE OF ACTION TO: MARTA PARDO Last Known Address: 5732 E Tangelo Lane. Inverness FL 34453 Current Residence Unknown YOU ARE NOTIFIED that an action for Foreclosure of Mortgage on the following described property: LOT 42, SPORTSMEN'S PARK SUBDIVISION, ACCORDING TO THE PLAT THEREOF AS RECORDED IN PLAT BOOK 2, PAGE 39, PUBLIC RECORDS OF CITRUS COUNTY, FLORIDA. has been filed against you and you are required to serve a copy of your written defenses, If any, to it, on FT. LAUDERDALE FL 33309 on or before November 26,atlon thls 21 day of October, 2008. Betty Strifler As Clerk of the Court (SEAL) By: /s/ M. A. Michel As Deputy Clerk Published two (2) times In the Citrus County Chronicle, October 27 and November 3, 2008 08-39689 416-1103 MCRN 09-2008-CA-004201 Deutsche/Roberson Notice of Action PUBLIC NOTICE IN THE CIRCUIT COURT OF THE FIFTH JUDICIAL CIRCUIT, IN AND FOR CITRUS COUNTY, FLORIDA CASE NO. 09-2008-CA-004201 Friday. November 14.2008. at 1:00 p.m.. the Canvass- Ing Board will meet to canvass military and cMlianodda, provision of certain assistance. Please contact the Elections Office at 120 N. Apopka Ave. Inverness, F. MONDAY, OCTOBER 27, 2008 B11 I 'Legals Lega s I has been filed against you and you are required to serve a copy of your written defenses, if any, to J. Anthony Van Ness, Esq.. VANN NESS LAW FIRM, PA., Attorney for the Plaintiff, whose address Is 1239 E. NEW- PORT CENTER DRIVE, SUITE #110, DEERFIELD BEACH, FL 33442 on or before November 26, 2008,, If you are a person with a disability who needs any ac- commodation in order to participate In this proceed- ing, you are entitled, at no cost to you, to provision of certain assistance. Please contact the Court Adminis- trator at 110 N. APOPKA AVENUE INVERNESS FL 34450, within 2 working days of your receipt of this notice or pleading. WITNESS my hand and the seal of this Court this 21 day of October, 2008. BETTY STRIFLER CLERK OF COURT (COURT SEAL) By /s/ M.A. Michel As Deputy Clerk Published two (2) times In the Citrus County ChronIcel on October 27 and November 3, 2008. 417-1103 MCRN 09-2008-CA-004204 Suntrust/ Moore Notice of Action Constructive Service PUBLIC NOTICE IN THE CIRCUIT COURT OF THE 5TH JUDICIAL CIRCUIT, IN AND FOR CITRUS COUNTY, FLORIDA GENERAL JURISDICTION DIVISION CASE NO.: 09-2008-CA-004204 SUNTRUST MORTGAGE INC., PLAINTIFF, VS. DAVID A. MOORE, ET AL., DEFENDANTSS. NOTICE OF ACTION CONSTRUCTIVE SERVICE TO: DAVID A. MOORE; UNKNOWN SPOUSE OF DAVID A. MOORE; TONYA M. MOORE; UNKNOWN SPOUSE OF TONYA M. MOORE whose residence Is unknown If he/she/they be living; and If he/she/they be dead, the unknown defendants who may be spouses, heirs, devisees, grantees, assign- ees, Ilenors, creditors, trustees, and all parties claiming an Interest by, through, under or against the Defendantss, who are not known to be dead or alive, and all parties having or claiming to have any right, title or Interest In the property described in the mortgage being forclosed herein. YOU ARE HEREBY NOTIFIED that an action to foreclose a mortgage on the following property: LOT 5, IN BLOCK B-206, OF OAK VILLAGE, SUGARMILL WOODS, ACCORDING TO THE PLAT THEREOF, AS RECORDED IN PLAT BOOK 9, AT PAGES 86 THROUGH 150, INCLUSIVE, Nov. 26, 2008, (no later than 30 days from the date of the first publication of this notice of action) and file the original with the clerk of this court either before service on Plaintiffs attorney or Immediately thereafter; otherwise a default will be en- tered against you for the relief demanded In the com- plaint or petition filed herein. WITNESS my hand and the seal of this Court at CITRUS County, Florida, this 21 day of October, 2008 BETTY STRIFLER, Clerk of Courts CLERK OF THE CIRCUIT COURT (COURT SEAL) By: /s/ M. A. MIchel Deputy Clerk IN ACCORDANCE WITH THE AMERICANS WITH DISABILI-, October 27 and November 3,2008 08-70346 e of the Supervisor of Elections 120 N. Apopka Ave., Inverness, wtih FOR early voting sites and polling sites, pursuant to 101.5612. Wednesday. October 29.2008. at 8:30 am., .m.. the Can- vassing Board will meet to continue to canvass and process absentee ballots. The ballots will be processed through the theabulation equipment and will be availa- ble for public Inspection between 11:30 a.m. and 12:00 Noon. The results will e not be known or released until af- ter the polls close at 7:00 p.m. November 4. 2008. Tuesday. 2008.at 11:30 a.m., the Can- vassing Board will meet to canvass and process provi- sional ballots. MONDAY OCTOBER 27, 2008 CITRUS COUNTY CHRONI E 'HSM top of the Florida LOTTERIES = SO YOU KNOW Find last night's winning numbers on Page B4. - wm t - ~ V Copyrighted Material Syndicated Content Available from Commercial News Providers . . :: ::. -. : ~l UP - x . . .ic::. ^ :::. ..:::... -m -iM pel -"'in - rt- ^ -p1^^^- ^ j ^ wam =.-umm am WmOu puM W 0 OMOMm4 D OK~r.o log qp gumbo 4 4 w g. bmibup A il wasow A .qmb M010few mwl a, W.. ..MO M . bO mOM -0 A mNOW. 1900ROM I l v- o '..nMMI ______ *MINN ___ a, wAMOM am a- MOMvw o 1 nothing." Theodore Roosevelt, American president (1858-1919). SATURDAY, OCTOBER 25 Lotto: 14 34 36 39 49 53 6-of-6 No winner 5-of-6 59 $5,997 4-of-6 3,188 $90 3-of-6 64,444 $6 Fantasy 5:1 -4-5-8-24 5-of-5 1 winner $262,687 4-of-5 605 $70 3-of-5 16,450 $7 FRIDAY, OCTOBER 24 Mega Money: 2-36-42-43 Mega Ball: 20 4-of-4 MB No winner 4-of-4 7 $3,132.50 3-of-4 MB' 47 $1,020 3-of-4 991 $144.50 2-of-4 MB 1,433 $70 2-of-4 33,052 $5 1-of-4 MB 13,805 $7.50 Fantasy 5:1 -2- 19-24-31 5-of-5 3 winners $82,070.43 4-of-5 281 $141 3-of-5 10,305 $10.50 THURSDAY, OCTOBER 23 Fantasy 5:11 14-18 -22 -35 5-of-5 1 winner $217,776.55 4-of-5 289 $121.50 3-of-5 9,126 $10.50 INSIDE THE NUMBERS S To verify the accuracy of winning lottery numbers, players should double- check the numbers printed above with numbers offi- cially posted by the Florida Lottery. On the Web, go to ,, or call (850) 487-7777. Today in HISTORY Today is Monday, Oct. 27, the 301st day of 2008. There are 65 days left in the year. Today's Highlight in History: On Oct. 27, 1858, the 26th president of the United States, Theodore Roosevelt, was bom in New York City. On this date: In 1787, the first of the Federal- ist Papers, a series of essays call- ing for ratification of the United States Constitution, was pub-. lished in New York. In 1795, the United States and Spain signed the Treaty of San Lorenzo (also known as "Pinck- P ney's Treaty"), which provided for free navigation of the Mississippi River. In 1914, author-poet Dylan Thomas was bom in Swansea, Wales. In 1938, Du Pont announced a name for its new synthetic yam: 'nylon." In 1954, Walt Disney's first tele- vision program, titled "Disneyland" After the yet-to-be completed t theme park, premiered on ABC. S In 1978, Egyptian President e l Anwar Sadat and Israeli Prime * Minister Menachem Begin were named winners of the Nobel S* Peace Prize for their progress to- ward achieving a Middle East ac- cord. ^ Ten years ago: Hurricane Mitch cut through the western Caribbean, pummeling coastal Honduras and Belize; the storm caused several thousand deaths in Central America in the days that followed. Five years ago: Suicide bombers in Baghdad struck Red Cross headquarters and three po- lice stations, killing dozens of peo- ple. One year ago: Despite signifi- cant dissent among some of its workers, United Auto Workers members narrowly passed a four- year contract agreement with Chrysler LLC.- wood is 66. Producer-director Ivan Reitman is 62. Country singer- musician Jack Daniels is 59. Au- thor Fran Lebowitz is 58. Actor-director Roberto Benigni is 56. Actor Peter Firth is 55. Actor Robert Picardo is 55. Singer Simon Le Bon is 50. Musician J.D. McFadden is 44. Rock singer Scott Weiland is 41. Actor Sean Holland is 40. Thought for Today: "In any moment of decision, the best thing you can do is the right thing, the next best thing is the wrong thing, and the worst thing you can do is m - p lhmlrl-lin. mm n , if .... :tb: Nok iw4M .40.s s.. e amg B12 n E ,,a 0. 1 A 004-. Contact Us | Permissions | Preferences | Technical Aspects | Statistics | Internal | Privacy Policy © 2004 - 2010 University of Florida George A. Smathers Libraries.All rights reserved. Acceptable Use, Copyright, and Disclaimer Statement Last updated October 10, 2010 - Version 2.9.7 - mvs
https://ufdc.ufl.edu/UF00028315/01414
CC-MAIN-2021-04
refinedweb
40,492
75.2
Custom spinbox with "classic" spinbox display I need to use a double spinboxfor my QML viewand in this case, I based my spinboxon this example . } } It seems that when you use a custom spinbox, it is not displayed as a "classic" spinbox. It is displayed like this: However, buttons are too big for my interface. I would like to know is there is a easy way to display the spinbox as a "classic" spinbox like this: Thanks a lot and have a good day ! @Fheanor It looks like you're using Controls 2. See the documentation for SpinBox; in the end of "Detailed description" there's a link to "Customizing SpinBox" like in all docs of Controls 2 types. You can change the location and size of the buttons. It's not necessarily "easy". Ask if you have some specific questions. @Eeli-K Thanks for your answer, I might try to set my own buttons but it is not so easy. I finally found a simple solution that allow me to use QtQuick.Controls.2.x: import QtQuick 2.7 import QtQuick.Controls 2.0 import QtQuick.Controls 1.4 as OldCtrl ApplicationWindow { // Unprefixed, therefor from the new QtQuick.Controls 2.0 id: root visible: true width: 400; height: 450 OldCtrl.SpinBox { width: 100 value: 20 decimals: 2 } }
https://forum.qt.io/topic/78890/custom-spinbox-with-classic-spinbox-display
CC-MAIN-2018-05
refinedweb
218
76.32
Regular expressions have been widely popular in languages such as PERL and AWK and have been utilized for pattern matching, text manipulation and text searching. These languages are specifically known for its advanced pattern matching features. . Some of the commonly used regular expression elements are: The following are matching substitutions: Regular expressions could also be used to find repeating patterns by making use of backreferencing, using which you can name a pattern found and then use that reference elsewhere in the expression. This naming of patterns is also useful in case we need to parse a string like free form date or time strings. string string Instead of giving loads of examples here, I suggest that you download Expresso and check its analyzer view for detailed analysis of the regular expression. As already discussed, .NET regular expressions are based on that of Perl and are compatible with Perl 5 regular expressions. .NET contains a set of powerful classes that makes it even easier to use regular expressions. The classes are available in the System.Text.RegularExpressions namespace. The following is a list of classes in the namespace: System.Text.RegularExpressions Capture CaptureCollection Group GroupCollection Regex RegexObj RegexObj.IsMatch (subjectString) How to Perform Regular Expression Substitution (Search and Replace) in .NET RegexObj.Replace ( subjectString, replaceString ) RegexObj.Match ( subjectString ) Free Form Time Parsing Function in .NET The following is a utility function that can parse a free format time string. This could be extended to a combined date and time parser along with many more enhancements. If anyone needs further help, feel free to contact me. private const string TIME_STR = @"^\s?(?" + @"(?\d{1,2})" + @"(:(?\d{1,2}))?" + @"\s?((?(am|pm)))?" + @")\s?$"; static DateTime ParseTime (string strTime) { DateTime currTime = DateTime.Now; DateTime finalTime = DateTime.Today; Match m; int hour = 0, min = 0; Regex regExTime = new Regex (TIME_STR, RegexOptions.IgnoreCase | RegexOptions.CultureInvariant | RegexOptions.IgnorePatternWhitespace | RegexOptions.Compiled); m = regExTime.Match (strTime); if (m.Success) { if (m.Groups["hour"].Success) hour = Int32.Parse (m.Groups["hour"].Value); if (m.Groups["min"].Success) min = Int32.Parse (m.Groups["min"].Value); if (m.Groups["am_pm"].Success) hour = ConvertAmPm (m.Groups["am_pm"].Value, hour); } else throw new FormatException ("Invalid time format"); if (hour > 23 || min > 59) throw new FormatException ("Invalid time format"); finalTime = new DateTime (currTime.Year, currTime.Month, currTime.Day, hour, min, 0); return finalTime; } private static int ConvertAmPm (string amPm, int hour) { int retHour = hour; amPm = amPm.ToLower(); if (amPm.Equals("am")) // all hours remain the same except the 12:00 am // (which is 0000 hours) if (hour == 12) retHour = 00; else if (amPm.Equals("pm")) // add 12 to hours except if 12:00 pm if (hour != 12) retHour = hour + 12; else throw new FormatException ("Invalid amPm flag format"); return retHour; } Expresso Analysis of the regular expression used above is shown in the figure below. This should help you understand the.
https://www.codeproject.com/articles/12452/regular-expressions-in-net?fid=241685&select=1298389&fr=1
CC-MAIN-2017-09
refinedweb
474
51.04
Subscriber portal Hi I want to show RSS feeds into a listView which having plain text as title and HTML text as description. So how can I parse description into list. Don't want to use webview if there is another control available in xaml? or webview is right way to do this ? sandeep chauhan Hi, So you just want to get the RSS feeds from one URL and show them inside a listview, right? If so, there is a way could retrieve and display a web feed. You could use classes in Windows.Web.Syndication namespace. At first, you could use Windows.Web.Syndication.SyndicationClient to access the web feed. Then use SyndicationClient.RetrieveFeedAsync method to get the feeds. For more details steps and the sample code, please refer this link:RSS/Atom feeds.
https://social.msdn.microsoft.com/Forums/en-US/ce09334d-66ba-43cb-9640-2da92f71c5ec/uwpxamlc-how-to-display-html-text-in-a-listview?forum=wpdevelop
CC-MAIN-2019-22
refinedweb
135
77.74
Streaming operations on NumPy arrays Project description npstreams is an open-source Python package for streaming NumPy array operations. The goal is to provide tested routines that operate on streams (or generators) of arrays instead of dense arrays. Streaming reduction operations (sums, averages, etc.) can be implemented in constant memory, which in turns allows for easy parallelization. This approach has been a huge boon when working with lots of images; the images are read one-by-one from disk and combined/processed in a streaming fashion. This package is developed in conjunction with other software projects in the Siwick research group. Motivating Example Consider the following snippet to combine 50 images from an iterable source: import numpy as np images = np.empty( shape = (2048, 2048, 50) ) for index, im in enumerate(source): images[:,:,index] = im avg = np.average(images, axis = 2) If the source iterable provided 1000 images, the above routine would not work on most machines. Moreover, what if we want to transform the images one by one before averaging them? What about looking at the average while it is being computed? Let’s look at an example: import numpy as np from npstreams import iaverage from scipy.misc import imread stream = map(imread, list_of_filenames) averaged = iaverage(stream) At this point, the generators map and iaverage are ‘wired’ but will not compute anything until it is requested. We can look at the average evolve: import matplotlib.pyplot as plt for avg in average: plt.imshow(avg); plt.show() We can also use last to get at the final average: from npstreams import last total = last(averaged) # average of the entire stream Streaming Functions npstreams comes with some streaming functions built-in. Some examples: - Numerics : isum, iprod, isub, etc. - Statistics : iaverage(weighted mean), ivar(single-pass variance), etc. More importantly, npstreams gives you all the tools required to build your own streaming function. All routines are documented in the API Reference on readthedocs.io. Benchmarking npstreams provides a function for benchmarking common use cases. To run the benchmark with default parameters, from the interpreter: from npstreams import benchmark benchmark() From a command-line terminal: python -c 'import npstreams; npstreams.benchmark()' The results will be printed to the screen. Future Work Some of the features I want to implement in this package in the near future: - Optimize the CUDA-enabled routines - More functions : more streaming functions borrowed from NumPy and SciPy. API Reference The API Reference on readthedocs.io provides API-level documentation, as well as tutorials. Installation The only requirement is NumPy. To have access to CUDA-enabled routines, PyCUDA must also be installed. npstreams is available on PyPI; it can be installed with pip.: python -m pip install npstreams npstreams can also be installed with the conda package manager, from the conda-forge channel: conda config --add channels conda-forge conda install npstreams To install the latest development version from Github: python -m pip install git+git://github.com/LaurentRDC/npstreams.git Each version is tested against Python 3.6+. If you are using a different version, tests can be run using the standard library’s unittest module. Citations If you find this software useful, please consider citing the following publication: Support / Report Issues All support requests and issue reports should be filed on Github as an issue. License npstreams is made available under the BSD License, same as NumPy. For more details, see LICENSE.txt. Project details Download files Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
https://pypi.org/project/npstreams/
CC-MAIN-2019-47
refinedweb
590
56.45
Hey guys, I am trying to make a program that allows you to input music artist into an array. The array row length is dependent upon a number entered by the user. There are only three column. I am having trouble with a line inside the for loop printing twice in a row before recieving input for the array. However if I change the " int songs=keyboard.nextInt " to a " final songs=3 or any other number, the loop processes correctly. It seems to be an issue with the keyboard.nextint not reading correctly in the array I assume. Here is part of my code. public class Music { public static void main(String[] args) { System.out.print("You may enter up to 20 songs. "+ "How many songs would you like to enter?"); Scanner keyboard=new Scanner(System.in); int songInfo=3; int songs=keyboard.nextInt(); String[][] music=new String[songs][songInfo]; System.out.println("Please, enter song title, artist, and album title."); for(int row=0; row<songs; row++) { for(int col=0; col<songInfo; col++) { System.out.print("Enter inforomation."); music[row][col]=keyboard.nextLine(); } System.out.println(); } The loop prints Enter Information. Enter Information. before it asks for an input for the first Enter Information. Any help would be appreciated. Just looking for a push in the right direction.
https://www.daniweb.com/programming/software-development/threads/421681/simple-trouble-with-for-loop-and-keyboard-nextint
CC-MAIN-2018-13
refinedweb
221
53.98
Opened 7 years ago Closed 7 years ago Last modified 7 years ago #10920 closed defect (fixed) UnicodeDecodeError: 'ascii' codec can't decode byte 0x8c in position 14: ordinal not in range(128) Description I can see that this is related to the Polish locale, the unicode error occured at the local time designation "X-WR-TIMEZONE:\x8crodkowoeuropejski czas…" where \x8c stands for Polish "ś". How to Reproduce While doing a GET operation on /roadmap, Trac issued an internal error. (please provide additional details here) Request parameters: {'format': u'ics', 'user': u'admin'} User agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20100101 Firefox/16.0 System Information Enabled Plugins Python Traceback Traceback (most recent call last): File "c:\users\lukasz\appdata\local\temp\easy_install-myvpng\Trac-1.0-py2.7-win32.egg.tmp\trac\web\main.py", line 497, in _dispatch_request dispatcher.dispatch(req) File "c:\users\lukasz\appdata\local\temp\easy_install-myvpng\Trac-1.0-py2.7-win32.egg.tmp\trac\web\main.py", line 214, in dispatch resp = chosen_handler.process_request(req) File "c:\users\lukasz\appdata\local\temp\easy_install-myvpng\Trac-1.0-py2.7-win32.egg.tmp\trac\ticket\roadmap.py", line 442, in process_request self._render_ics(req, milestones) File "c:\users\lukasz\appdata\local\temp\easy_install-myvpng\Trac-1.0-py2.7-win32.egg.tmp\trac\ticket\roadmap.py", line 574, in _render_ics ics_str = buf.getvalue().encode('utf-8') File "c:\Python27\lib\StringIO.py", line 270, in getvalue self.buf += ''.join(self.buflist) UnicodeDecodeError: 'ascii' codec can't decode byte 0x8c in position 14: ordinal not in range(128) Attachments (0) Change History (14) comment:1 by , 7 years ago comment:2 by , 7 years ago Could you please try the following patch? comment:3 by , 7 years ago This doesn't work. I can see that req.tz.tzname(now) is still in my local encoding. When I do this dirty hack: import sys print sys.stdout.encoding write_prop('X-WR-TIMEZONE', req.tz.tzname(now).decode(sys.stdout.encoding)) the calendar gets generated. My codepage displayed from the above is cp852. comment:4 by , 7 years ago I wonder how the result of LocalTimezone.tzname() gets localized on Linux, if at all. From my limited testing, it seems I always get back the abbreviated timezone, so in plain ascii. Back to your problem on Windows. Maybe reusing some code from datefmt could help: Could you please try this one? Here, I'm hoping that getpreferredencoding() also gives 'cp852' on your system. But maybe not, it's often quite different from the encoding on sys.stdout. The problem is that we can't assume we have a meaningful sys.stdout, as in some contexts (e.g. mod_wsgi) it's redirected. And btw. Jun, getpreferredencoding in the above reminds me that we still have #10768 on the todo list ;-) comment:5 by , 7 years ago I've tried all three methods in 'lc_time_encoding()' and I'm getting None, cp1250 and ascii on the command line (sic! I'm getting cp1250 while the code in roadmap.py prints cp852 for standard out). Anyway, the problematic character '0x8c' is actually Polish "Ś" (which is the first non-ascii character in the locale time designator "Środkowo…") in cp1250 so the encoding in my environemnt seem to be cp1250 and your patch will probably work. I'm having problems applying patches using Tortoise Merge (I'm getting Rejected patch hunks stuff). Can you provide entire file ? Or maybe the svn location ? Thanks. comment:6 by , 7 years ago I've pushed two branches: - cboos.git:0.12/ticket10920/localtz-unicode - cboos.git:1.0/ticket10920/localtz-unicode ⇐ this is the one you need; if you do a clone of that one, you'll get current 1.0-stable with the patch Now the big question is whether the above approach is a pertinent one or not… If there's any interoperability concern, using the localized name of the timezone is probably not a good idea, even if it has a correct unicode representation (see for example the discussion in pythonbug:883604). Which other software will understand your "Ścrodkowoeuropejski czas…"? Certainly not a single one on Linux… A better approach would probably be to try to "normalize" the tzname to some known value. Not trivial either, see e.g. SO:7669938, which we need to adapt in order to ignore the possibly localized time.tzname. Going through all_timezones and pick the best match w.r.t. utcoffset(dt) for a few sample datetimes? follow-up: 8 comment:7 by , 7 years ago Ok, the patch works. As for an elegant solution: I found this interesting article:). What do you think ? follow-up: 10 comment:8 by , 7 years ago Replying to lukasz.matecki@…: Ok, the patch works. As for an elegant solution: I found this interesting article: Ha! Quite interesting (and funny!) read. Yes, it looks it's even more broken on Windows than I thought.). Would such a made up list really be useful? I think it won't help for interoperability. We could perhaps use the closest FixedOffset timezone and use formal names (UTC+01:00, etc.). But the more I think about it, the more I think we should just emphasize the importance of picking an explicit timezone in the user preferences (and ask your admin to install pytz!), rather than relying on the localtz. And in that perspective, the patches proposed are maybe enough. comment:9 by , 7 years ago Fine for me. comment:10 by , 7 years ago Just to be complete: … We could perhaps use the closest FixedOffsettimezone and use formal names (UTC+01:00, etc.). i.e. format what localtz.utcoffset(now) gives us: What do others think? Should unicode(localtz) return: - whatever name given by the system - an UTC offset, as per the above patch - (+) simple and has the extra bonus property that str(localtz)will always work, i.e. no further fix in roadmap.py for the present issue - (-) besides the Wikipedia article linked above, there's no evidence that other programs will understand those UTC timezones… - something else? Now that I spent a ridiculous amount of time getting the above patch to work, my preference would be 2. ;-) follow-ups: 12 13 comment:11 by , 7 years ago - is probably useless. My preference is 2. (OT: What's the trick again to avoid starting a <ol> when the beginning of a line is "1."?) comment:12 by , 7 years ago (OT: What's the trick again to avoid starting a <ol>when the beginning of a line is "1."?) It used to be a leading `` … which is no longer invisible. Well, maybe that would count as a bug and we could just replace `` with nothing instead of producing an empty <tt> (which looks pretty useless anyway, but even if there would be an use, then we could leave {{{}}} for that → ). 1. this is 1. at the start of a normal paragraph. comment:13 by , 7 years ago - is probably useless. My preference is 2. Good! I applied the patch (hopefully correct this time…) on 0.12-stable in r11414. DONE I'll add some unit-tests for this, but after Jun commits his extensive changes in this area of the code. (r11422) It's a bit difficult to reproduce (on Linux I always get plain ascii timezone names), but it's not hard to see what's going on… Thanks for the report!
https://trac.edgewall.org/ticket/10920
CC-MAIN-2019-47
refinedweb
1,249
67.65
#include <unistd.h> char *gettxt (const char *msgid, const char *dflt_str); For gettxt( ) to retrieve text strings from a message database, the msgid argument must have the following structure: [msgfilename]:msgnumber If archivename is specified, then gettxt( ) accesses the message database in an archive directory. The environment variable NLSPATH specifies the pathname for the message database, substituting filename for %N and archivename for %A. (See the explanation of NLSPATH, below.) If msgfilename is omitted, gettxt( ) tries to retrieve the string from the default catalog specified by the last call to setcat(S). If NLSPATH does not exist in the environment, or if a message catalog can not be opened in any of the paths specified by NLSPATH, then the following default paths are used: %L can be viewed as the language in which the text strings are written. It is specified by the LC_MESSAGES category of setlocale( ), which is C by default. You can change the language of the messages by invoking setlocale( ) with appropriate arguments. You can also specify a language by setting environment variables (but only if the calling program calls setlocale(LC_MESSAGES,"") or setlocale(LC_ALL,""). The first of the following environment variables with a nonempty value is used: LC_ALL, LC_MESSAGES, and LANG. If the locale is explicitly changed (via setlocale( )), the pointers returned by gettxt( ) may no longer be valid. Message not found!! it indicates that gettxt( ) cannot retrieve the text string because of one of the following conditions: gettxt("test:10", "hello world"); gettxt("test:10", ""); setcat("test"); gettxt(":10", "hello world");
http://osr507doc.xinuos.com/cgi-bin/man?mansearchword=gettxt&mansection=S&lang=en
CC-MAIN-2020-50
refinedweb
256
50.77
This post introduces glom, Python’s missing operator for nested objects and data. If you’re an easy sell, full API docs and tutorial are already available at glom.readthedocs.io. Harder sells, this 5-minute post is for you. Really hard sells, meet me at PyCon. The Spectre of Structure In the Python world, there’s a saying: “Flat is better than nested.” Maybe times have changed or maybe that adage just applies more to code than data. In spite of the warning, nested data continues to grow, from document stores to RPC systems to structured logs to plain ol’ JSON web services. After all, if “flat” was the be-all-end-all, why would namespaces be one honking great idea? Nobody likes artificial flatness, nobody wants to call a function with 40 arguments. Nested data is tricky though. Reaching into deeply structured data can get you some ugly errors. Consider this simple line: value = target.a['b']['c'] That single line can result in at least four different exceptions, each less helpful than the last: AttributeError: 'TargetType' object has no attribute 'a' KeyError: 'b' TypeError: 'NoneType' object has no attribute '__getitem__' TypeError: list indices must be integers, not str Clearly, we need our tools to catch up to our nested data. Enter glom. Restructuring Data glom is a new approach to working with data in Python, featuring: - Path-based access for nested structures - Declarative data transformation using lightweight, Pythonic specifications - Readable, meaningful error messages - Built-in data exploration and debugging features A tool as simple and powerful as glom attracts many comparisons. While similarities exist, and are often intentional, glom differs from other offerings in a few ways: Going Beyond Access Many nested data tools simply perform deep gets and searches, stopping short after solving the problem posed above. Realizing that access almost always precedes assignment, glom takes the paradigm further, enabling total declarative transformation of the data. By way of introduction, let’s start off with space-age access, the classic “deep-get”: from glom import glom target = {'galaxy': {'system': {'planet': 'jupiter'}}} spec = 'galaxy.system.planet' output = glom(target, spec) # output = 'jupiter' Some quick terminology: - target is our data, be it dict, list, or any other object - spec is what we want output to be With output = glom(target, spec) committed to memory, we’re ready for some new requirements. Our astronomers want to focus in on the Solar system, and represent planets as a list. Let’s restructure the data to make a list of names: target = {'system': {'planets': [{'name': 'earth'}, {'name': 'jupiter'}]}} glom(target, ('system.planets', ['name'])) # ['earth', 'jupiter'] And let’s say we want to capture a parallel list of moon counts with the names as well: target = {'system': {'planets': [{'name': 'earth', 'moons': 1}, {'name': 'jupiter', 'moons': 69}]}} spec = {'names': ('system.planets', ['name']), 'moons': ('system.planets', ['moons'])} glom(target, spec) # {'names': ['earth', 'jupiter'], 'moons': [1, 69]} We can react to changing data requirements as fast as the data itself can change, naturally restructuring our results, despite the input’s nested nature. Like a list comprehension, but for nested data, our code mirrors our output. And we’re just getting started. True Python-Native Most other implementations are limited to a particular data format or pure model, be it jmespath or XPath/XSLT. glom makes no such sacrifices of practicality, harnessing the full power of Python itself. Going back to our example, let’s say we wanted to get an aggregate moon count: target = {'system': {'planets': [{'name': 'earth', 'moons': 1}, {'name': 'jupiter', 'moons': 69}]}} glom(target, {'moon_count': ('system.planets', ['moons'], sum)}) # {'moon_count': 70} With glom, you have full access to Python at any given moment. Pass values to functions, whether built-in, imported, or defined inline with lambda. But glom doesn’t stop there. Now we get to one of my favorite features by far. Leaning into Python’s power, we unlock the following syntax: from glom import T spec = T['system']['planets'][-1].values() glom(target, spec) # ['jupiter', 69] What just happened? T stands for target, and it acts as your data’s stunt double. T records every key you get, every attribute you access, every index you index, and every method you call. And out comes a spec that’s usable like any other. No more worrying if an attribute is None or a key isn’t set. Take that leap with T. T never raises an exception, so worst case you get a meaningful error message when you run glom() on it. And if you’re ok with the data not being there, just set a default: glom(target, T['system']['comets'][-1], default=None) # None Finally, null-coalescing operators for Python! But so much more. This kind of dynamism is what made me fall in love with Python. No other language could do it quite like this. That’s why glom will always be a Python library first and a CLI second. Oh, didn’t I mention there was a CLI? Library first, then CLI Tools like jq provide a lot of value on the console, but leave a dubious path forward for further integration. glom’s full-featured command-line interface is only a stepping stone to using it more extensively inside application logic. $ pip install glom $ curl -s \ | glom '[{"type": "type", "date": "created_at", "user": "actor.login"}]' Which gets us: [ { "date": "2018-05-09T03:39:44Z", "type": "WatchEvent", "user": "asapzacy" }, { "date": "2018-05-08T22:51:46Z", "type": "WatchEvent", "user": "CameronCairns" }, { "date": "2018-05-08T03:27:27Z", "type": "PushEvent", "user": "mahmoud" }, { "date": "2018-05-08T03:27:27Z", "type": "PullRequestEvent", "user": "mahmoud" } ... ] Piping hot JSON into glom with a cool Python literal spec, with pretty-printed JSON out. A great way to process and filter API calls, and explore some data. Something genuinely enjoyable, because you know you won’t be stuck in this pipe dream. Everything on the command line ports directly into production-grade Python, complete with better error handling and limitless integration possibilities. Next steps Never before glom have I put a piece of code into production so quickly. Within two weeks of the first commit, glom has paid its weight in gold, with glom specs replacing Django Rest Framework code 2x to 5x their size, making the codebase faster and more readable. Meanwhile, glom’s core is so tight that we’re on pace to have more docs and tests than code very soon. The glom() function is stable, along with the rest of the API, unless otherwise specified. A lot of other features are baking or in the works. For now, we’ll be focusing on the following growth areas: - Validation functionality, in the vein of schema and cerberus - CLI robustness, better error messages, etc. - Extension API, clean up some internal code, open up extensions - Automatic default registration of default behaviors for co-installed packages (e.g., Django) We’ll be talking about all of this and more at PyCon, so swing by if you can. In either case, I hope you’ll try glom out and let us know how it goes!
https://www.deeplearn.me/2095.html
CC-MAIN-2018-22
refinedweb
1,176
62.38
In Part 1 we did the simple version which can be found here: Let kick it up a notch by trying it using aws-amplify authentication in this same app. Plenty of stuff material around on setting up AWS. is good place to start. Once you have the aws-cli configured, run amplify init in the root of the project from part 1. It should look something like this: Then run amplify add auth to get a Cognito Identity Pool and Cognito User Pool set up. Be sure to run amplify push to get all the backend set up in the cloud. Since we didn't set up signing in we want to create a test user in our UserPool via the aws cognito interface on aws. That didn't sound clear, let me know if you don't get what I mean. In your terminal run amplify console auth which will open up that page. User Pool then enter. This will open up the AWS Cognito Users page in your User Pool. On the menu on the left, click Users and Groups then the blue outlined Create User button. This is how I filled it out. The password I used was Password12345@ so cognito wouldn't complain. Even though it says that we will need to update the password, we are dealing with that here and it will let you use the temporary password for a while. Cognito will also send it to you in an email because we check that option. Setting Up Aws Auth In The App Bindings! The first thing we want to do is add the aws-amplify package. We will use it to configure aws-amplify and run auth functions. yarn add aws-amplify touch Amplify.re // create a file for our Amplify binding. Then create a file for our Amplify binding. touch Amplify.re In Amplify.re we want to add the following: type t; [@bs.module "aws-amplify"] external amplify: t = "default"; type config; [@bs.module "./aws-exports.js"] external awsConfig: config = "default"; [@bs.send] external _configure: (t, config) => unit = "configure"; let configure = () => _configure(amplify, awsConfig); What is going on here? Ripped from Patrick Kilgore's BigInteger.re What is type t? It is a ocaml convention for "the type of this module". So if the module was named "Fish", type twould be the fish. We could just as easily call it anything else, even type fish, but then we'd be referring to it as Fish.fishwhich seems silly, right? So we call it type tand refer to it as Fish.tand by convention know tmeans the module's type. A ReasonML module is a type packaged with its behavior. In this way, it is similar to an Object-Oriented language's concept of class. So here, type tis the Amplify data structure, packaged with the methods we can to operate on that type. Because we don't really know (or, honestly, care) about how the Amplify library implements the Amplify type, we just declare it here, which means it is an "abstract type", which I always think of as, "a type that must be used consistently by the functions that operate on it, but for which the particular implementation of the type and those functions are assumed to be correct". Thanks, Patrick for taking the time to write those awesome comments. So t is our Amplify javascript data structure bound to aws-amplify's default export. The type config may or may not be overkill. I would love to hear back from you all on this. It works without it but its a pattern I picked up somewhere and this code works so moving on. We are using bs.module to import the aws-exports.js file that the amplify-cli generated in our src dir when we ran amplify push. It's got our configuration keys for accessing our auth service. We are going to pass to that to Amplify's configure method/function which configures our app to use our services. We use [@bs.send] to call the function called configure on out type t. I aliased it as _configure so that I could call it using configure, no underscore later, and not hurt my eyes trying to see which configure function I was calling. In Reason, you can call them both configure and the second configure will just call the previous configure. Normally in JS it would look like this in your app's entry point: import Amplify, { Auth } from 'aws-amplify'; import awsconfig from './aws-exports'; Amplify.configure(awsconfig); I went ahead and retrieve aws-exports and passed it to configure here. So in our app's entry point we can configure our app like so: ...other stuff Amplify.configure(); //add this line ReactDOMRe.renderToElementWithId(<Root />, "root"); Also in Amplify.re we want to add a binding to Amplify's Auth object. Let's add the following bindings and implementations functions: /* assigning Amplify Auth object as type auth */ type auth; [@bs.module "aws-amplify"] external auth: auth = "Auth"; [@bs.send] external _signOut: (auth, unit) => unit = "configure"; [@bs.send] external _signIn: (auth, ~username: string, ~password: string, unit) => Js.Promise.t('a) = "signIn"; /* a function that calls Amplify's signOut to sign out our user. This works wether passing auth or amplify as our type t */ let signOut = () => _signOut(auth, ()); /* a function that takes a username and password then calls Amplify's signIn to sign in our user */ let signIn = (~username, ~password) => _signIn(auth, ~username, ~password, ()) |> Js.Promise.then_(res => Js.Promise.resolve(res)); By binding to the Auth object and assigning type auth we can use this same binding to call its functions using [bs.send]. We tell the compiler that the function is found on the auth binding by passing requiring an argument with type auth in our bs.send definitions like so: [@bs.send] external _signIn: (auth, ~username: string, ~password: string, unit) => Js.Promise.t('a) = "signIn"; The implementation is written so that when we call username and password which we then pass to the the underscore auth binding called in it. let signIn = (~username, ~password) => _signIn(auth, ~username, ~password, ()) |> Js.Promise.then_(res => Js.Promise.resolve(res)); I am pretty sure, this is what they call currying. The docs aren't very helpful so let me take a stab at explaining it to us. The auth property and is just waiting on the last two variables that it needs to be able to make the call. These remaining variables are the username and password values we pass into signIn(). This makes it so we don't have to pass in the auth property at the call sites every time we want to use the module. Anyone with a better explanation, please teach me! Using Our Binding Now that we have the binding, let use them in the Header.re module. We are going to add to functions that will handle signOut. // ...other code let handleSignin = () => Js.Promise.( Amplify.signIn(~username, ~password) |> then_(res => { // Js.log2("res", res); // this is bad, i think, because we aren't handling errors. We know, for purposes of the example, that the username is at the `username` key so let's go with it. let username = res##username; Js.log("sign in success!"); dispatch(UserLoggedIn(username)); resolve(); }) |> catch(err => { Js.log(err); let errMsg = "error signing in.." ++ Js.String.make(err); Js.log(errMsg); resolve(); }) |> ignore ); let handleSignOut = () => { Amplify.signOut(); dispatch(UserLoggedOut); Js.log("signing out!"); /* test if user is logged out because you can still log the user after logging out. Running currentAuthenticated user shows that we are logged out so why is `user` logging out below?*/ Amplify.currentAuthenticatedUser |> Js.Promise.then_(data => { Js.log2("data", data); Js.Promise.resolve(data); }) |> Js.Promise.catch(error => Js.log2("error", error)->Js.Promise.resolve) |> Js.Promise.resolve |> ignore; /* user still logs after logging out. Why? */ Js.log2("signing out user!",user); }; // ...other code The handleSignIn function is going to read the username and password off of our state and call Amplify.signIn with it. If we get a positive answer, then we read the username key off of the response object, res##username and set it in our user context by calling dispatch(UserLoggedIn(username)). The ## is how you read the value at a key on a javascript object. See Accessors in the bucklescript docs. The handleSignOut is pretty simple since it doesn't return anything. I added a call to currentAuthenticatedUser because you can still log the username after signing out. In fact, the currentAuthenticatedUser response shows that we are signed out. If anyone wants to tell me why the username is still logging, I would love to understand it. I though it would error or return Anonymous. Idea? Ideas? Thank's in advance. Now let change: | Anonymous => <form className="user-form" onSubmit={e => { ReactEvent.Form.preventDefault(e); dispatch(UserLoggedIn(userName)); }}> To: | Anonymous => <form className="user-form" onSubmit={e => { ReactEvent.Form.preventDefault(e); handleSignin(); }}> And further down, change: | LoggedIn(userName) => <div className="user-form"> <span className="logged-in"> {s("Logged in as: ")} <b> {s(userName)} </b> </span> <div className="control"> <button className="button is-link" onClick={_ => dispatch(UserLoggedOut)}> {s("Log Out")} </button> </div> </div> to: | LoggedIn(userName) => <div className="user-form"> <span className="logged-in"> {s("Logged in as: ")} <b> {s(userName)} </b> </span> <div className="control"> <button className="button is-link" onClick={_ => handleSignOut()}> </div> </div> That's it. Now you are using Aws Cognito to for overkill authentication in Ms. Brandt's music app. Reach with questions or lessons, please. Thank you! Discussion
https://practicaldev-herokuapp-com.global.ssl.fastly.net/idkjs/reason-tutorial-mashup-using-context-1622
CC-MAIN-2021-04
refinedweb
1,597
67.04
08 April 2011 22:39 [Source: ICIS news] HOUSTON (ICIS)--US spot acrylonitrile (ACN) prices continued to rise on Friday, sources said, as supply tightened following a force majeure (FM) and a plant shutdown. Deals were heard at $2,880/tonne (€2,016/tonne) FOB (free on board) from North America to a European acrylic fibre (AF) producer, and $2,890/tonne FOB from ?xml:namespace> The deals pushed the US Gulf (USG) spot market assessment on the high end to $2,750-2,900/tonne FOB, up from $2,750-2,800 a day earlier, according to market sources. A producer also said a deal was done above $3,000/tonne for delivery in In addition, Another factor contributing to higher prices is the expected settlement of the
http://www.icis.com/Articles/2011/04/08/9451338/us-spot-acn-prices-resume-upward-trend-on-tight-supply.html
CC-MAIN-2014-52
refinedweb
129
51.72
NAME aa_find_mountpoint - find where the apparmor interface filesystem is mounted SYNOPSIS #include <sys/apparmor.h> int aa_find_mountpoint(char **mnt); Link with -lapparmor when compiling. DESCRIPTION The aa_find_mountpoint function finds where the apparmor filesystem is mounted on the system, and returns a string containing the mount path. It is the caller's responsibility to free(3) the returned path. RETURN VALUE On success zero is returned. On error, -1 is returned, and errno(3) is set appropriately. ERRORS ENOMEM Insufficient memory was available. EACCES Access to the the required paths was denied. ENOENT The apparmor filesystem mount could not be found BUGS None known. If you find any, please report them at <>. SEE ALSO apparmor(7), apparmor.d(5), apparmor_parser(8), and <>.
http://manpages.ubuntu.com/manpages/oneiric/man2/aa_find_mountpoint.2.html
CC-MAIN-2014-42
refinedweb
121
53.58
One way to decrease your site’s load time is to set a far future Expires header on all your static content. This doesn’t help first-time visitors, but can greatly improve the experience of returning visitors. And you get to decrease your bandwidth needs at the same time, because all your static content will be cached by their browser. S3 weotta puts all of its awesome plan images in Amazon’s S3 using django-storages S3Storage backend, which by default does not set any Expires header. To remedy this, I set AWS_HEADERS in settings.py like so from datetime import date, timedelta tenyrs = date.today() + timedelta(days=365*10) # Expires 10 years in the future at 8PM GMT AWS_HEADERS = { 'Expires': tenyrs.strftime('%a, %d %b %Y 20:00:00 GMT') } Now every uploaded file gets an Expires header set to 10 years in the future. upload_to One potential drawback to using a far future Expires header is that if you change the file content without also changing the file name, no one will notice because they’ll keep using the old cached version of the file. Luckily, Django makes it easy to create (mostly) unique new file names by letting you include strftime formatting codes in a FileField or ImageField upload_to path, such as upload_to='images/%Y/%m/%d'. This way, every uploaded file automatically gets stored by date, which means it would take some deliberate effort to change the contents of a file without also changing the file name.
http://streamhacker.com/tag/aws/
CC-MAIN-2016-44
refinedweb
252
58.42
MP4AddRtpPacket - Add an RTP packet #include <mp4.h> bool MP4AddRtpPacket( MP4FileHandle hFile, MP4TrackId trackId, bool setMBit = false, int32 transmitOffset = 0 ); hFile Specifies the mp4 file to which the operation applies. trackId Specifies the hint track to which the operation applies. setMBit Specifies the value of the RTP packet header marker bit for this packet. The value depends on the rules of the RTP payload used for this hint track. transmitOffset Specifies an offset to apply to the normal transmission time of this packet. The purpose of this offset is to allow smoothing of packet transmission over the duration of the hint.)
http://huge-man-linux.net/man3/MP4AddRtpPacket.html
CC-MAIN-2017-13
refinedweb
101
56.96
SourceCodeItemServiceand an according SourceCodeItemDaoclass in my nicely layered app and there is the method removeSourceCodeItem(SourceCodeItem)with the following content public class SourceCodeItemService implements ISourceCodeItemService{Note, the method really only has one line and all the logic it executes is to delegate the command to the underlying data access object class. Many devs, especially "unit testing newbies" would be tempted to not test this method because "it hasn't really logic inside but just delegates". Indeed, to some degree this is true, but note that the ... private ISourceCodeItemDao sourceCodeItemDao; //this will be injected at runtime public void removeSourceCodeItem(SourceCodeItem itemToRemove){ sourceCodeItemDao.delete(itemToRemove); } ... } SourceCodeItemServiceclass is just in its beginnings. Remember, a test should not only verify the correctness of the current behavior but also preserve that behavior in case of future changes.I want to be sure that if other devs modify my remove method, it will still work the way I expected it to do! Said that, let's take a look on how the actual unit test for such a method would look like. First of all, what do we want to verify? We want to test the logic of the SourceCodeItemService.removeSourceCodeItem(...) in isolation. In a test-first approach, we know that our service class will use a DAO for persisting the delete operation. So as there will be no other planned behavior for the remove method we want to assure that dao is being called correctly, nothing more, nothing less. public class SourceCodeItemServiceTest{That's it. I'm using Mockito here, a mocking library for Java. The //setup stuff etc.. @Test public void testRemoveSourceCodeItem(){ //the dummy item to be deleted SourceCodeItem item = new SourceCodeItem(...); verify(mockSourceCodeItemDao).delete(item); sourceCodeItemService.removeSourceCodeItem(item); } } verifycall in the middle is a call to the Mockito library which assures the method delete of the DAO is correctly called with the object I'm passing. So there is a further check that the correct object is being given to the DAO. However you could easily also achieve the same behavior without a mocking framework, although I highly suggest you to adopt one which suits your needs. So to conclude, a question that may arise when you look at this is "how I did verify whether the item has actually been deleted". To be honest, I didn't! But this is not the scope of the unit test of this service class here but rather of a possible (integration) test of the SourceCodeItemDaoclass :)
https://juristr.com/blog/2010/08/do-i-really-need-to-test-this/
CC-MAIN-2018-05
refinedweb
410
53.51
17558/python-aws-boto3-how-do-i-read-files-from-s3-bucket Using Boto3, the python script downloads files from an S3 bucket to read them and write the contents of the downloaded files to a file called blank_file.txt. What my question is, how would it work the same way once the script gets on an AWS Lambda function? AWS Lambda usually provides 512 MB of /tmp space. You can use that mount point to store the downloaded S3 files or to create new ones. I have specified the command to do so below. s3client.download_file(bucket_name, obj.key, '/tmp/'+filename) ... blank_file = open('/tmp/blank_file.txt', 'w') The working directory used by Lambda is /var/task and it is a read-only filesystem. You will not be able to create files in it. You can use the following code, import boto3 s3 = boto3.resource('s3') obj = s3.Object(bucketname, itemname) body = obj.get()['Body'].read() itemname is Key (string) -- Key of the object to get. You can download the file from S3 bucket import boto3 bucketname = 'my-bucket' # replace with your bucket name filename = 'my_image_in_s3.jpg' # replace with your object key s3 = boto3.resource('s3') s3.Bucket(bucketname).download_file(filename, 'my_localimage.jpg')) s3 = boto3.resource('s3') bucket = s3.Bucket('test-bucket') for obj in bucket.objects.all(): key = obj.key body = obj.get()['Body'].read() Yes, you can! Have a look at this: You can use data.Body.toString('ascii') to get the contents of the text file, assuming that the text file was encoded used ascii format. This is the code i found and can be used to read the file from S3 bucket using lambda function def lambda_handler(event, context): # TODO implement import boto3 s3 = boto3.client('s3') data = s3.get_object(Bucket='my_s3_bucket', Key='main.txt') contents = data['Body'].read() print(contents) You can use this function to read the file exports.handler = (event, context, callback) => { var bucketName = process.env.bucketName; var keyName = event.Records[0].s3.object.key; readFile(bucketName, keyName, readFileContent, onError); }; All of the answers are kind of right, but no one is completely answering the specific question OP asked. I'm assuming that the output file is also being written to a 2nd S3 bucket since they are using lambda. This code also uses an in-memory object to hold everything, so that needs to be considered: import boto3 import io #buckets inbucket = 'my-input-bucket' outbucket = 'my-output-bucket' s3 = boto3.resource('s3') outfile = io.StringIO() # Print out bucket names (optional) for bucket in s3.buckets.all(): print(bucket.name) # Pull data from everyfile in the inbucket bucket = s3.Bucket(inbucket) for obj in bucket.objects.all(): x = obj.get()['Body'].read().decode() print(x) # Generate output file and close it! outobj = s3.Object(outbucket,'outputfile.txt') outobj.put(Body=outfile.getvalue()) outfile.close() Check out "Amazon S3 Storage for SQL Server Databases" for setting up new Amazon S3 buckets I believe that you are using the ...READ MORE Of Course, it is possible to create ...READ MORE CloudTrail events for S3 bucket level operations ...READ MORE It can work if you try to put ...READ MORE It might be throwing an error on ...READ MORE Hey, 3 ways you can do this: To ...READ MORE s3_client=boto3.resource('s3') bucket = s3_client.Bucket('test') for obj in bucket.objects.all(): contents=obj.get()['Body'].read().decode(encoding="utf-8",errors="ignore") for line ...READ MORE You can take a look at the ...READ MORE As it is described in the Amazon ...READ MORE OR Already have an account? Sign in.
https://www.edureka.co/community/17558/python-aws-boto3-how-do-i-read-files-from-s3-bucket?show=32496
CC-MAIN-2020-10
refinedweb
598
61.53
We’ve published a KB for using access-based enumeration together with DFS Namespaces. Access-based enumeration makes visible only those files or folders that the user has the rights to access. When access-based enumeration is enabled, Windows will not display files or folders that the user does not have the rights to access. It takes some tweaking to make this work in a namespace. The KB (907458) also provides a link to download the ABE tool. –Jill Join the conversationAdd Comment I’ve got ABE working with DFS however can’t seem to get it working when the links are to EMC NAS shares. Enable ABE is relatively straightforward from a checkbox. But implementing ABE with the right permissions (nested grouping) is a nightmare! What further debugging tools are available to verify ABE? As when disabled, access works to the correct folders. When enabled, some subfolders don’t even have files listed. Cheers, Stran
https://blogs.technet.microsoft.com/filecab/2006/01/23/using-access-based-enumeration-and-dfs/
CC-MAIN-2019-04
refinedweb
156
66.23
.. client app listens to changes to that document and lets the UI reflect those changes - A clerk working on the backend updates the document and performs state transitions on that document - The client app also updates the document and performs state transitions Introduction The transaction, checkout, reservation or payment experiences are usually the parts of the application that deliver the most value but, unfortunately, are also the ones that usually contain the most friction. We've all been victims of this: a checkout experience with an endless loading spinner, or a reservation page that warns you not to move a muscle while the next page is loading, one that tells you the reservation succeeded but actually only booked one of the legs, or even one that makes a double reservation (without you having to click any button twice). Now that you have your shiny new micro-services architecture running and you're able to deploy new features and fixes several times a day, how do you deliver complex transactions to your customers? How do you deliver payments, trip reservations or the purchase of an entire shopping cart with a good user experience? HTTP has taken us far, but it's probably not the best transport to deliver transactions, especially when they are performed over flaky mobile networks. A lot of error-handling logic must fall on the client application: How does the app react to request timeouts? Or gateway problems? Can it assume a transaction failed with no fear of duplication? Can the transaction survive client crashes? Can the client-side of the application solve all these existing edge cases without making it overly complex and bug-prone? This article proposes an original architecture style that will sit in front of your micro-service stack, onto which you can attach to any existing service back-end. I will show you an implementation of this architecture pattern: a proof-of-concept application and a set of client and server open-source libraries built on top of PouchDB and Node.js. Remote CRUD APIs are the wrong level of abstraction HTTP has been around for a long time and we have taken it for granted. We use it to deliver hypertext, images, sound, videos. We use it to transfer form data from the client to the server. We also use it as the transport mechanism of remote service calls, either initiated by web applications, a mobile native app or even a simple command-line interface. We started by using complicated constructs like XML messages inside SOAP envelopes and delivered using HTTP, but we gained some sense along the ways and now we fully embrace HTTP and live and breathe by the URL path, the HTTP methods and the HTTP response status codes. A URL structure represents the resources behind the service, and the HTTP methods indicates the action: a GET request shouldn't change the server state, a POST request is used to create a resource, a 403 response status means that you're not allowed to access the given resource, etc. The body of knowledge surrounding HTTP and the expected behavior has permeated the many and growing numbers of client libraries, service wrappers and applications. We now rely on HTTP-transported APIs to do almost everything digital that needs remote communication: from simple things like reading a blog post to sending a message, onto more complex operations like making a payment using online banking or reserving a flight on your favorite airline carrier. But is HTTP really suited for these more complex transactions? Being a request-response protocol, HTTP imposes serious limitations on what can be solved at the protocol level. Take this example: John is booking a three-legged train trip that spans two train providers using a web interface. Once he inputs all the required personal and payment data and hits the "Confirm and pay" button, what happens behind the scenes? To start with, the web application John is using performs a POST request to the URL, with the body of the request containing all the details necessary to book the journey: all the identifiers for the legs, his personal details and the necessary payment data. The request will eventually reach an HTTP server where it starts getting handled. Let's say that this server, having now received the request, has to contact a series of back-end services to process the payment and make the reservation. On the back-end, this request has a set of possible states that the end user is never aware of: each of the legs has to be reserved separately (because they use difference providers), the payment has to be authorised, the customer invoice must be created and many other possible things, all tied between themselves in complicated ways that took a long time to develop. On a good day, this request goes through all the necessary steps with no problems: all the internal databases, cache and queueing systems are up and running, the supplier back-end services reply correctly and with little latency, the payment provider and customer bank don't decline the payment, and a few seconds later the customer web app signals that the reservation has been successful and a few seconds later the customer gets and email with the issued tickets. But there are a bunch of things that can go wrong in this scenario. Here are some of them: The request returns a 5xx error In this case there was a server-side error, where a lot of things could have gone wrong: - The load balancer could have lost connectivity to the application server - The application server process could have died - There could be a bug in the application server - One of the back-end services misbehaved in an unexpected way What is the current state of the transaction? Did it complete, was it aborted, is it in transit? Maybe there's some useful information of the current state of the transaction on the response, or maybe there isn't... The request times out The response to the client request takes a lot of time to come, and eventually the client will have to declare defeat and give up. To the client, this scenario is similar to the one before (they just don't know the current state of the transaction), but with an added bonus: the customer is even more frustrated because of the waiting time. There is a networking error Here we can have two sub-scenarios: The first one is where the client never got to connect to the server, in which case it is safe to retry. The other one is where the connection was dropped before getting a reply. Here, the client is also left not knowing what the state of the transaction is. The browser session disappears (the computer blows up or shuts down, the customer OS crashes, the browser process dies or the user inadvertently closes the browser tab) When John presses that "Confirm and pay" button, he should be very careful about what he does to the browser. When switching tabs he may inadvertently close the tab with the undergoing transaction or activate a different web app that makes the whole browser crash. What happens now? Now John doesn't know the outcome of the transaction, and he's left looking at his email inbox, wondering... The common result I think most of us have been through this: clicking on the "Confirm and pay" button and hoping that it all goes right. Transactions are, most of the time, inherently complex, but if we don't move this complexity away from the client code, we're inducing mistrust, fear and frustration of using the one part of the application that generates value. Existing workarounds Many customer-facing applications are aware of these problems and use some technical solutions / workarounds to address this problem. The main issue here is that this problem is not only one single problem: given the low abstraction level (given by CRUDy RESTful HTTP APIs) to the client, this problem is a set of problems, and for each one we can try to come up with a solution. In face of an error, retry or not? What should be the client reaction when it gets an error? Should it try to post the transaction again? If the transaction actually went through, there is the risk of duplicating it. One way of avoiding the risk of duplication is for the client to create a unique customer transaction identifier for each remote call. If this identifier is sent for every transaction, the back-end has a chance to avoid duplicating the transactions. If the client reposts the transaction and finds that the server replies with something like "duplicate client transaction id", we can be confident that our transaction is being processed and everything is back on track again. Long-running transactions In some types of transactions, the times it takes to complete is too long for the HTTP request to be left hanging and a timeout results. If that is the case, the way to deal with long-running transactions is that the initial request only begins the transaction. The client will then be notified once the transaction reaches a final state. This may involve several techniques: - Again, creating a client-side transaction ID that can be used for polling (it also avoids duplicates if the user needs to resend the first request); - Either polling the server for the state of the transaction or - get notified by the server (using XHR long polling, server-sent events or websockets) that the transaction changed state. The client session disappears If the browser tab gets closed, the browser process dies or even if the device runs out of battery, or the CPU explodes, how can the customer recover? If the transactions are associated with a user account, losing the session mid-transaction (for instance, by closing the browser tab or powering down the computer) is a problem that can be solved through: - the backend stores each customer transaction associated to the account - the user can use the app to list all the recent transactions, discovering if the transaction exist and what is its state Another more user-friendly technique is, before starting the transaction, to create it locally. If the session is lost mid-transaction, the application can eventually pick that up and enquire the back-end about its latest status. Is there a better way? Because they deviate from the "happy" application flow, these solutions and techniques are hard to implement right on the client-side. They require the application developer to simulate all these diverse failure modes and edge cases, and hopefully create automated tests for them to make sure they keep working in the future. In this article we present a way to develop applications where recovering from these kinds of errors requires no programming effort and is a direct consequence of the way the clients interact with the service. Hello offline-first An offline-first application is an application that is built never assuming that the device that is running it is connected to the internet. Instead, some or all possible operations can be performed locally, and later be sync'ed with the service once the device is connected to the internet. This mode of operation is very realistic: mobile networks are flaky, intermittent and often not available. The majority of internet users are using mobile networks, and this share will keep on growing. Developing an application using an offline-first approach also offers another advantage: by allowing a subset of the application functions to be performed without a connection to the back-end service means that these interactions will be local, which in turn means they'll be orders of magnitude faster. Not all operations? At first glance, we can say that not all operation types are suitable candidates for this scheme. For instance, how can operations like "transferring money" or "booking a train trip" be performed while we are offline? If the service is centralised, the application needs to be able to contact the service eventually, but the transaction should not be interrupted only because the service is not reachable right now. Let me show you my idea of how I think most (if not all) operations can benefit from it, increasing development speed, availability, robustness, perceived quality and customer experience. Using replication An offline-first solution for transactions requires two important pieces: one client-side data store and a corresponding server-side one. They're both kept in sync by a sync protocol: a change in the client is asynchronously propagated to the server, and the reverse is true: a change to customer data performed on the server is replicated into the client. The centre of this scheme is the replication protocol, and not all databases types lend themselves easily to this. CouchDB is an open-source document-oriented database server that has been built from the ground up with two-way replication on the mind. Any group of CouchDB databases can be kept in sync with each other by activating its replication protocol. PouchDB is a close cousin of CouchDB, but it's written in JavaScript and can run in a JS client browser or in a server using Node.js. PouchDB is protocol-compatible with CouchDB, which means that you can replicate a CouchDB database into PouchDB and vice-versa. CouchDB and PouchDB may not be the only databases that allow the type of replication we need, but they're very suited to our needs, so we're going to assume we'll be using these. If there are other products out there (open-source or not) that have the required capabilities and run on the client, these can be used as drop-in replacements in this type of architecture. What about conflicts? CouchDB and PouchDB both allow one-way replication, but for this article we're going to use two-way replication: any change of either the client or server databases is going to get propagated into the other. This means that both databases behave like master databases, which means that conflicts can occur. How are they to be handled? CouchDB and PouchDB can keep every change for a given document in a tree-like structure. Each version of a document can have one or more descendants. When there's a conflict in the replication process, one of the versions gets picked as being the winner, but the database keeps all the information about the conflict around. Any one of the client or server databases can then get the unresolved conflicts and solve them by using whatever merging strategy they see fit. What about authentication? The way that we're going to use Couch or PouchDB is to have one database per client (in CouchDB-speak, one “database" corresponds to what a “table” is to relational databases). We have to make sure that each client database can only be accessed by the owner client and the clerk working on it. On the server-side, any one of these databases can be limited to only be accessible by the owner client. I'm not going to dive too much into authentication here, but just to give you a glimpse of the architectural solution, here are the two techniques that can be used to solve this: - If using CouchDB as the server, you can use CouchDB system users. Here, one customer is one CouchDB system user, given permission to write to only that one database. - Use an ad hoc authentication mechanism (like when exposing the database through a smart proxy) The first one works because we're using one database per user or session. In our solution, we're not using HTTP — instead we're using a web-socket sync server where the client and server negotiate an authenticated channel over an encrypted connection using a server certificate. Once the sync server has verified the credentials that were sent by the client when negotiating the channel, that channel is established, the sync server has the user identified and has it boxed into a private database. A persistent transaction document Now that we have a client database sitting in both the server side and the client side and they're being kept in sync, let's persist our transaction. Instead of performing a remote call to begin the transaction, let's create one document that describes the transaction in its entirety. For instance, if you want to book a train travel, create a document that will eventually describe all the legs of the journey and the details about the passengers. Or, if you're ordering tangible products, create a shopping basket document that will eventually contain the product codes, quantities, discount codes, delivery address and payment method details. If you want to perform a bank transaction, include the source and target accounts, the amount, and perhaps some authentication token. The client then persists this transaction document in the local database. A finite state machine This document has one special property: the current state. In any given time and database, a given transaction document can be in one state. You need then to define a given finite state machine, containing all the possible states and the possible transitions between them. For instance, if you're using an app to order a taxi, the document can be in one of the following states: requested, searching driver, driver assigned, driver en route, driver arrived, in transit, arrived destination, paid, canceled and perhaps others. Simplified Finite State Machine for a Taxi Service Mind you that, in this type of architecture, an application can support many different transaction types without needing to share a common state machine. Each transaction type would be a different document type, handled by separate clerks. State transitions Each state has a set of next states that are possible. To simplify, we're going to assume that, in any given state, either the client or the server can perform a state change, not both. Depending on business requirements, deviations from this rule can exist. If you require it, you must handle state change conflicts. The CouchDB and PouchDB APIs make it relatively straight-forward for you to get notified when a conflict happens and to resolve that conflict. Client UI Since the document is replicated in both directions, any change of state is sent the other way. If, for instance, the server changes the taxi request document state from "requested" to "driver assigned", that change will be propagated to the client. The client then has to listen to document changes (PouchDB allows you to do this very easily), and reflect them in the UI. If you're using a technology like Angular, React or Ember, the UI can react to document changes and reflect the document state easily. For instance, when the document state is "driver en route", you can present the driver's estimated time of arrival. Or when the document state is "in transit", the UI can present a map of the current location, etc.. Client synchronisation status The only concern that the client may need to have regarding the synchronisation algorithm is the status of the synchronisation. Whether all the local changes have been sent to the server and whether the client is connected to the back-end (and thus apt to receive the latest server-side changes) may be the only two important signals the programmer may need to show up on the UI. A clerk working on your behalf An important part of this system is the clerk. The clerk is an entity that is on the server side. It reacts to document changes (easily accomplished by listening to a changes feed), does what it needs to do (invoke back-end services, for instance), and then changes the transaction document state. Any server-side change to the transaction document is saved and consequently replicated into the client. There are several advantages to this: Latency In terms of network latency, the clerk is in a better position to interact with the back-end systems. Less client complexity All the recovery from recovering from error conditions and weird edge cases is now going to be performed by the clerk in a controlled environment, not the client. Also, this is a much simpler programming model for the front-end developer. Less responsibility on the client The clerk's job of making a change in a document in a database nearby is much less complex than replying to a request or pushing that change into the client. It is the job of the sync mechanism to transport the state change into the client. Security In a typical public service, the customer is not allowed to directly change central records, but that's exactly what most APIs let customers do: directly change the records they have access to (minus some validations that the developers remember to put in place). When looking at a transaction document as a declaration of intention from the customer, the clerk is bound to make much informed, and controlled changes to any central record. Benefits for the customer - Network Fault-tolerance: When using this scheme, the client can recover gracefully from network failures without any additional logic. - Responsiveness: Also, since all changes deriving from user interaction are local, this can improve the perception of application responsiveness. - Convenience and ease of use: users can start and progress transactions independent of whether the back-end service is reachable or not. - Improved quality: it can be argued that, with a simpler programming model, it will be easier to ship less bugs. - Increased satisfaction: since the transaction availability and overall experience is improved, the customer satisfaction with the service should also improve. Benefits for the programmer This model could set a simpler and easier programming paradigm for building apps. In what regards the back-end services, the only concern the programmer needs to have is the synchronization status, everything else boils down to state transition handlers on the clerk side, and, on the client side, making document state changes and propagating these changes to the UI. Even this last concern can be avoided by using a modern web framework like React and a plugin that takes care of this — this is explained in detail further down. Programming Framework There are two places where the business logic now needs to go: the clerk and the client application. The clerk The clerk code needs to handle two things: state transitions and performing asynchronous updates. Handling state transitions The clerk sits on the back-end and reacts to changes to any document. Since each user has its own database, we require one clerk per user database. When a state transition change happens in a document (triggered by the customer application or by the clerk itself), the clerk handles the state transition. This handler then potentially invokes back-end services and, as a result, change the document and transition the document to a new state. // handle arrived destination module.exports = handleArrivedDestination; function handleArrivedDestination(transaction, next) { backendServices.arrivedDestination((err, transaction) => { if (err) next(err); else { transaction.somefield = result.someotherfield; next(null, 'finished'); // transition to state 'finished' } }); } Performing asynchronous updates Not all changes to the document can be pushed by state changes: for instance, perhaps the clerk is waiting on a back-end system to deliver a confirmation, or update an estimate of the time it will take for the driver to arrive. In this case, the clerk could, for instance, be listening on an queue service and push those incoming changes asynchronously into the document. // example of an async updater exports.start = function(doc) { this._listener = backendMessageQueue.listen(doc._id, onMessage); function onMessage(message) { // get the latest doc version and update it doc.get((err, transaction) => { transaction.somefield = message.someotherfield; doc.put(transaction); } } }; exports.stop = function() { backendMessageQueue.stopListening(this._listener); }; The client application This is, as promised, the easiest part. Presuming you use a library to synchronize the transaction document in the local database with the memory representation of that document, all the client needs to do is for the UI to reflect changes of the memory representation of that document. This last part can easily be done by using a modern web framework like Angular or React. For the first part (syncing the memory document with the local database document), a generic library should take care of that. As an example, you can take a look at the pouch-redux-middleware package that I built, which does just that. Some open-source libraries Besides PouchDB, React, Redux, and surrounding packages, here are some more specific open-source libraries that I used to create a proof-of-concept application. pouch-redux-middleware Bi-directional replication between the Redux state and a local PouchDB database. pouch-websocket-sync Syncs the local database with a remote via a web-socket connection, providing custom authentication mechanisms. pouch-clerk Node.js server-side clerk where you can program - The reactions to any transition on a transaction document; - The asynchronous updates to a given transaction document that depend on external events. Demo I built a very rough and unpolished proof-of-concept application. Here is a quick demo of it: Some related problems Here are some problems that this type of architecture does not address: Clerk: action idem-potency When a clerk picks up a new state change, it triggers the state handler. The state handler then calls back-end service. After the result from the back-end service, it changes the state of the transaction document. If saving that state fails (the clerk process dies), how do we handle it? This is basically the same problem that the client had before (when was using an API instead of a replicated transaction document), but with a much smaller probability of happening (clients and client-side networks typically have higher latency and a much higher probability of failure). This is not really a problem to be at this level, but we can glimpse ay two generic solutions for this: a) Distributed transaction Implementing a protocol like 2 phase commit or a shared lock, rolling back the transaction if one of the parties fails. For this to happen all the participant entities for one transaction must implement such a protocol. b) Idempotent operations Since it's hard to have distributed transactions, all back-end operations should be idempotent: they can be safely retried in case of failure. There are several ways to do this, and depends on the service. For instance, if you're going to perform a money transaction, support a unique client key in the back-end. This client key should be created on the transaction document by the client or the clerk. If a duplicate transaction is attempted with the same client ID, this should be detected by the back-end. The clerk can then recover gracefully and give the transaction as performed and move on to the next state. Clerk: scheduling and concurrency At each time, no two clerks can be processing the same customer document change. Again, this is not a problem to be handled at this level, but here are some alternative solutions: - Have only one instance of a clerk running at a given time, or - Have a bunch of them, but use a quorum mechanism to elect the master for a given client, or - Push all changes into a queuing service and let the queuing service worry about not letting the same clerk handle the same change All of these have pros and cons, but again, this is not a problem that needs to be solved at this level. Security: the client can change the document at will Much like a client can make any HTTP request to any public API endpoint, in this architecture the client can freely change a transaction document. This poses some challenges, but mainly this one: how can the clerk trust that any data that the document contains is true? If the information was generated by the back-end and should remain a secret to the customer, the clerk can either: - Simply omit the information from the document. If the clerk needs to access it later, it should use a back-end storage service not accessible to the customer. - If that information needs to be shared with the client, the clerk can write it on the transaction document and then sign it with a key only known by the clerk, also saving the signature in the document. This way, when later the clerks needs this information, it can validate it’s authenticity by verifying the signature against the private key. - Inside the transaction document, create two namespaces: one for the clerk and one for the customer. Everything that the clerk writes can be signed to make sure the customer can not change without the clerk knowing. Offline-first Camp I'll be going to the first Offline-First Camp where I'll be talking about and debating this and other related subjects. If you find offline-first technologies interesting, come back to our blog for further updates! Summary HTTP RESTful APIs are the wrong level of abstraction to deliver complex transactions. Proposed solution: - The client app puts all the data in a document and saves it locally - The client app continuously sync it with a remote replica - The client app listens to changes to that document and lets the UI reflect those changes - A clerk working on the backend updates the document and performs state transitions on that document - The client app also updates the document and performs state transitions
https://blog.yld.io/2016/06/24/how-to-build-a-reliable-transaction-experience-for-your-customers/
CC-MAIN-2018-09
refinedweb
4,933
55.37
August 2003 - August 29, 2003 29 Aug'03 Developing a charting control - August 28, 2003 28 Aug'03 Check the isolation level of any SPID Check the isolation level of any SPID on your Microsoft SQL Server 2000. Continue Reading - August 28, 2003 28 Aug'03 .NET ORPC options What these options are in .NET. Continue Reading - August 27, 2003 27 Aug'03 Can I get a browser to 'echo' a password after postback? - August 26, 2003 26 Aug'03 Is there a way to pass a variable from VB to my ASPx HTML JavaScript? - August 25, 2003 25 Aug'03 What do I need to do to get certified as an MCAD or MCSD? - August 25, 2003 25 Aug'03 Defining custom entry points Explains how to manipulate the IL code to change the behavior of how a .NET program executes. Continue Reading - August 25, 2003 25 Aug'03 Getting environment information System.Environment namespace provides all the functionality to extract the environment information -- like UserName and OS version, for instance. Continue Reading - August 25, 2003 25 Aug'03 The Singleton Pattern in VB.NET Use the Singleton Pattern where there must be exactly one instance of the class. Continue Reading - August 25, 2003 25 Aug'03 A simple database access component This is a generic component that can be used for database access. You can connect to any database with a valid connection string and pass any valid SQL statement. Continue Reading - August 24, 2003 24 Aug'03 10 rock-solid UI tips Give your Web applications that rich-client look and feel using ASP.NET. Lots of code samples in this one. Continue Reading - August 22, 2003 22 Aug'03 VS.NET installation errors -- thinking of defecting to Java - August 22, 2003 22 Aug'03 I don't want to use Access. Is there a cheaper/easier solution than full SQL Server? - August 20, 2003 20 Aug'03 Can I change sqldataAdapter.Selectcommand dynamically at run time? - August 19, 2003 19 Aug'03 How can you make a timer that counts down from 30 to 0 in a text box? - August 18, 2003 18 Aug'03 How can I fill data using DataReader and also store the ID in the database? - August 18, 2003 18 Aug'03 Migrating to VB .NET Checklist for migrating apps to VB .NET. Continue Reading - August 15, 2003 15 Aug'03 How can I check/null value controls instead of just using 'If' statements? - August 13, 2003 13 Aug'03 What's the difference between VC.NET and VC# .NET? - August 12, 2003 12 Aug'03 Use the firehose cursor When and how to use the firehose cursor in SQL Server. Continue Reading
https://searchwindevelopment.techtarget.com/archive/2003/8
CC-MAIN-2019-09
refinedweb
451
65.32
Content uploaded by Jean-Michel Sahut Author content All content in this area was uploaded by Jean-Michel Sahut on Oct 04, 2015 Content may be subject to copyright. ESG Impact on Market Performance of Firms: International Evidence (Working Paper, June 17, 2014) Jean-Michel SAHUT IPAG Business School, Paris Hélène PASQUINI-DESCOMPS HEC Geneva Abstract: The question of how and why investors take into account Corporate Social Responsibility (CSR) activities of firms when making their investment decision is highly relevant for research on CSR disclosure and CSR investments as well as for firms themselves. This study investigates how news-based scores in environmental, social, and corporate governance (ESG) may have influenced the monthly stocks’ market return in Switzerland, the US, and the UK during the 2007–2011 period. Our model is a multifactor linear model, consisting of the classic four-factors (Fama-French’s three factors and momentum), plus a fifth factor, the EGS score, which represents the potential of the ESG to explain monthly returns during the observed period. By linear regression, we find that the variation of the overall ESG score is not significant in the US and Switzerland for the observed stocks. In the UK however, the change in the overall ESG score is a significant and slightly negative factor of the observed stocks’ monthly performance in the 2007–2010 period. Using the same model, we also study if the changes in sub-categories of ESG ratings (namely, governance, economic, environment, labor, human rights, society, and products) could explain the monthly market return. We find that the changes in sub-category ratings exhibit a small but significant impact on the stock’s performance during limited periods or on limited sectors, which varies among the countries. Finally, to explore a possible non-linear influence of the ESG score over monthly returns, we use a non-parametric model for Switzerland during the 2007–2011 period. The non- parametric kernel regression shows that the function linking a stock’s performance to its ESG- score changes is probably non-linear. Keywords: ESG; rating; governance, performance; return; kernel regression. We would like to thank Professor Chris Mallin of Norwich Business School for her review and constructive 2 1. INTRODUCTION Socially responsible investment (SRI) consists of introducing criteria related to sustainability into investment decisions, in contrast to classic investment that focuses solely on financial criteria. Sustainability criteria are usually organized around three themes: environmental, social/society and corporate governance (ESG). The first form of SRI is the exclusion of certain sectors such as weapons, alcohol, and tobacco for religious or moral purposes and can be traced back to the 18th century. The exclusion-based strategies now incorporate exclusions based on recent international standards and norms and still apply to more than half of SRI in Europe. In addition, the modern form of SRI uses various positive screening strategies such as the “best-in-class” approach, which favors companies that are better rated according to ESG criteria than other companies in the same sector (Cf. Appendix A). In addition, active strategies such as sustainability-themed funds or shareholder rights usage to direct a corporate strategy are also growing in popularity. SRI in all its forms has experienced growing popularity in the last decade 1 . This interest comes mainly from institutional investors, as public funds undergo further moral pressure toward sustainability from communities and legislators. The popularity of responsible investment has grown even more following the 2007 financial crisis that shattered the confidence of investors in financial markets and traditional investments, while triggering many new policies and rules. SRI proved to be a safer investment during dropping markets, while rewarding investors with a certain moral satisfaction, thus emerging as a seductive alternative investment portfolio approach. It is still unclear, however, how ESG criteria are linked to a firm’s market performance, which is the main question of this study. The question of how and why investors take into account Corporate Social Responsibility (CSR) activities of firms when making their investment decision is highly relevant for research on CSR disclosure and CSR investments as well as for firms themselves. The academic world has been actively studying the field of modern SRI since the 1990s. This long lasting interest is fuelled by the growth in SRI and a lack of a clear consensus despite numerous studies. Historically, evaluation of SRI studies was hindered by a lack of theory, data, and methodology (McWilliams and Siegel; 1999, Margolis et al.; 2007). Recently, ESG- related data have become more accessible and standardized, and successful methodologies have been identified. As a result, more and more papers offering sound theoretical framework as well as strong associated results are being published, mainly focused on the American market. But, given large variations in the empirical results, some authors warn that there is no conclusive evidence regarding the relationship between ESG and financial performance of companies (Ioannou and Serafeim; 2011, Orlitzky; 2013). Therefore, our research question is how the individual company’s market and financial performance are related to ESG criteria. The last financial crisis showed the SRI potential to reduce the risk of an investment through better long-term management of a company, and this perspective seems more and more attractive to investors. Our hypothesis is that companies with high ESG scores have a lower residual risk and therefore show a higher performance. We also believe that only ESG information that is publicly available will reflect positively in the market price as investors associate this with lower residual risk and higher goodwill. 1 According to US SIF, assets under SRI strategies went from $2.1 bn in 1999 to $3.7 bn in 2002. EURO SIF claims a 1.7€ bn in 2005, coming to 11.7 € bn in 2011 which includes norm-based screening since 2009. 3 We then propose an original econometric study of the monthly market performance related to ESG criteria for major companies in Switzerland; the US, and the UK between 2007 and 2011. 2 Our approach, in order to include ESG into a company’s market price, is a linear model using Carhart four-factors plus ESG criteria, as well as a non-parametric model for kernel regression on the same variables. Our results show that the variation of the global ESG score is a significant but slightly negative factor of a stock’s monthly performance in the UK, but is not significant in the US or Switzerland. The changes in sub-categories ratings (for instance, governance, environment, and labor) exhibit a small but significant influence over the stock’s performance only during limited periods or on limited sectors, which varies among the countries. Moreover, the non- parametric regression shows that the response of market performance related to ESG is nonlinear, which could be explained in various ways. In fact, these results provide valuable information for asset managers looking to include ESG criteria into their portfolio strategy and for companies to understand the influence of ESG news–based ratings on their market price. This study also contributes to the literature on corporate social responsibility showing how ESG criteria are linked to a firm’s market performance, with a new methodological approach, and the non-parametric response of performance to ESG criteria may open a new way of research to better understand the complexity of this relationship (Orlitzky; 2013). 2. CSR AND FINANCIAL PERFORMANCE Academia seeks actively to demonstrate a connection between the various ESG criteria and financial performance, and an increasing number of studies have been devoted to this topic over the past ten years. It is important to make a distinction between studies on the financial performance of a firm or stock related to ESG, and studies on the overall performance of an SRI portfolio or fund (Renneboog et al.; 2008, and Galema et al.; 2008). In this second category of researches, studies compare the performance of SRI funds to non-SRI funds. Instead, they do not take into account the SRI funds’ heterogeneity. Moreover, the practices of fund management significantly differ in the world (Sandberg et al., 2009). Almost all SRI funds in the US use negative screening criteria, which is far from being the case in Europe. In Europe, the best-in-class approach –where the leading companies with regard to ESG criteria from all industries are included in the portfolio – is the norm. But the best-in-class approach is often considered at the cutting-edge of SRI (Statman and Glushkov, 2009). Few studies try to overtake these limits. For example, Capelle-Blancard and Monjon (2011) use a different approach, by looking into the determinants of the financial performance among the SRI funds. They demonstrate that a higher screening intensity reduces the risk-adjusted return. However, this result is significant only for sector-specific screening criteria; transversal screening criteria do not necessarily lead to poor diversification, and so, do not reduce financial performances. For all these reasons, our study relates to the first category, and we will therefore focus our review primarily on those, i.e., studies that explore the link between a firm’s ESG commitment and its stock’s performance. While a valuable contribution in many aspects, the 2 The UK period is 2007 to 2010 only, as we did not have the four-factors for the year 2011 at the time of the study. 4 studies on SRI funds or constructed portfolio require additional theories on the construction and management of the portfolio that prevents relating those results solely with the performance of the individual stocks. For a single company, the stock’s market performance should adjust to the corporate’s operational and financial performance, at least in the semi- strong form of the efficient-market hypothesis. Therefore, we will first explore why ESG could signal a change in the financial performance for a corporate. 2.1 Linking Social Responsibility and Corporate Performance Regarding the definition of a “responsible” company, a theory often mentioned is the stakeholder theory of R.E. Freeman (1984). His theory of modern management says that the managers of a company must take into account all stakeholders, that is to say, employees, civil society, and suppliers in their investment decisions and not just shareholders. Although the stakeholder theory has laid a framework in the methods of corporate social responsibility (for instance ISO 26000 on Global Reporting Initiative uses methods similar to those suggested by Freeman), it does not, however, provide information about the relative performance of a company applying ESG principles in relation to its peers. Therefore, several studies tried to identify and evaluate these effects and show that CSR activities can create opportunities for firms to increase image or sales (Albuquerque et al., 2012), to attract or motivate employees (Balakrishnan et al. 2011), to lower the costs of capital (El Ghoul et al. 2011), to reduce the “residual risk” (Sharfman and Fernando, 2008), or to anticipate “best practices” (Eccles et al. 2012). A prevailing view on the positive impact of ESG activities is to enhance a firm’s image—let us call it the “ESG advertising” effect. From a marketing perspective, adopting a policy of sustainability would provide costs and benefits similar to those of an advertising campaign. Waddock and Graves (1997) demonstrated a strong relationship between a company's reputation (according to the list of most admired by Fortune magazine) and its ratings in social responsibility. The impact of ESG advertising seems bigger for firms whose clients are individuals, rather than other firms. A survey for Switzerland from Birth et al. (2008) surveyed the 300 largest Swiss companies on their CSR communication; 81% of respondents claimed to direct their communication toward customers and 62% point out that their primary objective is customer loyalty. In addition, a recent work (Albuquerque et al., 2012) demonstrates that ESG is a strategic product sold to clients by a company, and that this product is bringing more positive revenues the sooner it will be created, with late followers receiving less value from it. In the same way, Porter and Kramer (2011) showed that CSR could become part of a company's competitive advantage if it is approached in a strategic way. In particular, societal concerns can yield productivity benefits to a company; “society benefits because employees and their family become healthier, and the firm minimizes employees absences and lost of productivity”. Moreover, a global survey of 1,122 corporate executives suggests CEOs perceived that businesses benefit from CSR because it increases attractiveness to potential and existing employees (Economist, 2008). These findings have been confirmed by the researches of Battacharya et al. (2008) and Balakrishnan et al. (2011). These last researchers use a laboratory experiment to show how corporate giving to charity motivates employees. They highlight a double effect: a strong altruism effect and a signaling effect. Firstly, even when employees cannot be remunerated for their actions, employee contributions to employers significantly increase as the level of corporate giving increases. Secondly, when employees can be remunerated for their actions, employee contributions initially increase as the level of corporate giving increases. 5 Among the reasons why ESG should lead to increased performance for a firm, a widely accepted theory in SRI is the “cost of capital” reduction. The prevailing opinion is that the costs incurred by the establishment of a socially responsible structure in a company are offset by a decrease in its cost of capital. In view of this, Mackey et al. (2007) postulates that responsible behavior is a “product” sold by companies to socially responsible investors; but is this product a profitable one for a company? Previous studies tend to believe that the impact of investors’ opinion on the cost of capital is not a significant one. Angel and Rivoli (1997) demonstrated through an analysis based on the CAPM that the impact of a boycott of shareholders on the cost of capital of a company would probably be small if less than 65% of the shareholders were boycotting the firm. Similarly, Teoh, Welch, and Wazzan’s (1999) study on the largest shareholder boycott in South Africa shows minimal impact on securities. With SRI investments reaching about 12% of all institutional investment in the US as of 2010, this could be a bone of contention. However, a recent analysis from El Ghoul et al. (2011), using accounting models on American firms, reveals a constantly lower cost of capital for firms with high SRI ratings (KLD rating), bringing a renewed interest to the cost of capital theory. Another common theoretical position around ESG and firms’ performance is the residual risk’s “information effect.” Several authors (Kurtz, 2005; Sharfman and Fernando, 2008) argue that the ratings of a company on non-accounting parameters tell us about how the company controls the risks it faces. Therefore, high ESG ratings would mean lower residual risk for such companies compared to the market. This paradigm is tightly linked to the well- known reputational risk. The media in the last 10 years have evolved tremendously and the propagation of news, both good and bad, is now extremely fast. A reputation risk issue on ESG criteria could affect the company market price, 3 or even destroy a thus-far successful company. 4 The risk reduction effect of ESG is not to be neglected, as reputation risk arises as a major threat for companies today. One last group of principles concerns what could be called the “best practices’ anticipation” theory. Porter (1991) explains, about environmental regulations, that the costs arising from the implementation of a sustainable structure are offset in time by improving business productivity. This anticipation theory claims two type benefits: first, sustainable companies should also have a better distribution of costs in relation to upgrading to future regulations. This could be measured, for instance, by the stability of cash flows over time, in contrast to other companies increased spending to adapt to new regulations in target years. Secondly, companies putting in place regulations before others are the leaders in best practices, they are more advanced and forward thinking compared to their peers, which should lead to an increase in its wealth and the wealth of its shareholders. This is what Garriga and Melé (2004) call the instrumental theory of corporate social responsibility, further supported in a recent paper from Eccles et al. (2012), who explains from a management standpoint how mandatory innovation in products, processes, and business models in sustainable firms leads to better performance. In contrast, let us now review some theories on how high ESG standards could negatively affect a firm’s performance. One can reply to the stakeholder theory that the primary purpose 3 Apple’s Foxconn scandal on labor conditions may have cause share prices to drop 5% when it was announced, taking all other factors into account.- stock 4 Following the Jan.2013 horsemeat scandal, the French company Spanghero filed for bankruptcy in April 2013 6 of a business is solely to increase the wealth of its shareholders (Friedman, 1962), and any other purpose diverting the firm from this purpose will make it less effective. Some work such as Mackey et al. (2007) and Graff, Zivin, and Small (2005) argue that a shareholder expects from a firm to maximize its wealth without ESG constraints, and that ESG engagement should be done separately, by for instance giving to charity. A shareholder investing in a firm with ESG constraints makes a consumption choice where the charity portion is going to the firm, hence he expects a lower cost of capital from the firm. This model should lead to neutral effect for the performance of firms with high ESG ratings, but it does not account for the risk reduction effect of ESG. Another branch bringing controversy are the recent studies on “sin stocks.” Hong and Kacperczyk (2006) and Statman and Glushkov (2008) studied “sin stocks” (tobacco, weapons, alcohol) and found that they shows superior performance to the same extent as companies highly praised by socially responsible investors. Consequently, they argue that, contrary to common belief, social responsibility efforts as such are not reflected in the share price. To summarize, setting-up an ESG program within a firm has some costs that the firm expects to be compensated by an advertising effect, more stable revenues from loyal clients, and a possibly lower cost of capital, i.e., lower expected return from investors. In the process, the company might as well lower its risk and perform better, because considering all of its stakeholders will bring a broader view of its risks and processes. Our first hypothesis is therefore: We expect a slightly positive relationship between yearly ESG ratings of a firm and its yearly financial performance. (H1.a ) This concept of synergies created within a firm by engaging with stakeholders, whether it is clients, business partners, or employees, is not quite new. It could be considered as part of the goodwill priced on top of the book value by investors. Therefore, when a positive ESG score or news is published, we should observe higher demand, growth, and higher market prices for the corresponding firm as investors should recognize this added value and lower residual risks. This additional value and lower residual risk should be reflected in a stocks market model as a positive alpha of the alpha of the stock. We expect a slightly positive relationship between monthly ESG ratings of a firm and its monthly risk-adjusted market performance. (H1.b) This is consistent with the findings of Gompers, Ishii, and Metrick (2003) who found that low-rated companies in terms of governance had a risk-adjusted performance below average. A study by Russo and Fouts (1997) also showed that, after adjusting for the most probable parameters (size, growth, media, finance, and others), companies with better environmental scores had a better-than-average performance. More recently, Edmans (2007) also found, taking into account the parameters of the model of Carhart four-factors (market risk, size, style, and momentum) that companies ranked by Fortune among the one hundred most- desirable employers outperformed the average. Finally, a few excellent meta-analyses have been performed on SRI studies that summarize the findings in the domain and provide a good overview of the methods used. The synthesis work carried out by Orlitzky et al. (2003) and more recently, Margolis et al. (2007) for instance, concludes that there is, in general, a slightly positive relationship between ESG and financial performance of companies, although less so over the last decade. However, given large variations in the empirical results, some authors warn that there is no conclusive evidence regarding this correlation and emphasize that explanations for the link are complex (Ioannou and Serafeim; 2011, Orlitzky; 2013). 7 2.2 Measuring the financial and CSR performances Indeed, though the link between a firm’s market performance and ESG criteria has been much discussed in recent literature, the empirical results, however, are often inconclusive. This lack of consistency in the results may be explained by the multiplicity of data and methodologies used among studies. Specially, the strength of the link between financial and CSR performances depends on the way the two performances are measured and numerous moderating variables (Gramlich and Finster 2013). With support from the above-mentioned meta-analyses and additional ones cited below, we review the methods used in previous studies leading to significant results and summarize our findings below. There is no doubt that the model used in the studies to evaluate a firm’s performance plays a central role. We can distinguish first between studies that assess the market performance (stock market returns) and the accounting financial performance of a company. In general, accounting models more often bring significant, positive results than market models. An example of an accounting model is the Ohlson (1995) model with ROE, ROA, and Tobin’s q variables. The major problem with accounting models is the number of samples, as it is limited to yearly or quarterly observations that may be hard find for long periods (over ten years). For market models, the simple CAPM model has been progressively abandoned in the profit of multifactor models such as Fama and French, Fama and MacBeth and Carhart (1997) models. Regressions on such multifactor models generally lead to significant positive results, whereas CAPM-based models bring little results. Logic would suggest that working on the most recent practicable data with the longest possible observation period would provide a certain significance during statistics tests; however, the availability of ESG data might limit the ability of the researchers. Revelli and Viviani’s (2013) recent meta-analysis shows that an observation period of less than 5 years tends to show negative coefficients, whereas 5 to 10 years of data usually bring the most positive results. They also record that having an observation panel of more than 100 samples will greatly increase the significance. Nonetheless, the most common practical issue causing discrepancies in results might be the sampling frequency. Orlitzky et al. (2003) believe it to be the main cause of variance among studies in corporate social responsibility. It should be emphasized that each of the three categories of ESG scores, whether it is environment, society, or governance, brings overall positive results regarding accounting performance. However, if we speak about market or fund performance, the results vary greatly with the selected category, which could explain why previous findings argue that stock market rewards are rarely observable at the aggregate level. Hence, we can expect, if using a market model, that ratings in different subcategories could bring a neutral, negative, or a positive influence. Therefore, we add the following hypothesis to our study: Environmental, Social/Society or Governance factors do not affect market performance in the same proportion (H2) The most studied ESG category is by far governance, whose positive effect brings a consensus among studies (Orlitzky et al., 2003); second is environment, while society factors are the less studied. Horváthová’s (2010) meta-analysis on ecological studies warns that a simple correlation coefficient will bring more negative results when linking performance to ecological factors. Therefore it seems appropriate to rely on advanced econometric methods instead. She also warns that a positive link is found more frequently in common law countries than in civil law countries, which bring us to our next topic. Concerning the country of observation, there seems to be a difference in the results obtained in the US and other countries. Studies in the US bring positive results more often, while non- US studies lead to neutral results. An attempt to justify these discrepancies is the activism of 8 US pension funds toward sustainability. An interesting study would be to compare emerging markets, as well as the influence of the legal system toward ESG results across categories as Horváthová (2010) did, but this can be made difficult as most data providers focus on developed countries. To summarize our findings, to provide certain significance during statistics tests, a study should make the choice of an accounting model or a multifactor market model as a base for their performance model. If a market model is used, we should break down the ESG observation into sub-categories, as the aggregated score would lead to no result. The observation period should be over 5 years or at least 100 samples. There might be a need to resample the data according to previous studies if no significant results can be found. Finally, we should expect less positive results in non-US studies that in US ones. 3. METHODOLOGY 3.1 Models measure the change in the market value of a stock using a five-factor linear market model derived from Carhart’s model (Carhart 1997). Carhart’s model explains a stock’s market performance contains the Fama-French three factors HML (Fama and French, 1993), namely the market’s excess return (RM-RF), the small firm’s excess return SMB, and the growth firms excess return HML. In addition, Carhart’s four-factors model adds the momentum factor WML to model the market trend anomaly. Our hypothesis to add our fifth factor, called ESG, is that the ESG score variations could explain partly the stocks’ performance, as it would represent the overall opinion of investors about a corporate’s ability to lower its risks and anticipate trends. We expect a neutral or slightly positive relationship between ESG ratings and adjusted market performance (Hypothesis H1.b). (Model 1) with StockReturn = monthly company stock’s performance RF = monthly risk free rate (RM-RF) = monthly performance of the Market Index, minus RF SMB = difference in performance between small and large companies (by market capitalization) HML = difference in performance between growth and mature companies WML = differential performance between companies with a positive or negative trend over the past month ESG = monthly change in ESG overall score or sub-score see details in section 4-DATA In addition, we want to test if the relation with each factor is indeed be linear. In case of the four-factors, the wide recognition of those factors might have shaped the response in a linear way. However, in case of the ESG score, we believe that the positive variations or negative 9 variations may not affect the stocks in the same way, and that the magnitude of the change in ESG score might affect the stock’s performance in a non-linear way. To test the form of this response without constraint, we conduct a non-parametric regression on the five factors of the first model. (Model 2) where f1 to f5 are functions that will be identified during the regression to minimize the error under constraints. In parametric regression, we must determine the functions f(x) from the start. In non- parametric regression, no hypothesis is made about form of the f(x) functions, instead, it is deduced from the data themselves. The objective of the kernel regression is to find a non- linear relation i.e., f(x) between two random variables, in our case (StockReturn-RF) and each other variable of the model. As in ordinary least squares (OLS), a weighted sum of the (StockReturn-RF) observations is used to obtain the fitted values. An important parameter when fitting the curve to observation is the bandwidth, which provides smoothing so that only some level variation will affect the fitting, and “noise” variation, on the contrary, will not affect it. We estimate the unknown regression function using Nadaraya-Watson kernel implemented in the R “np” package that uses automatic (data-driven) bandwidth selection. 3.2 Dependent and Independent Variables The stock market return (StockReturn) is computed monthly for each stock based on month- end close prices by Telekurs. For Switzerland, the risk-free rate (RF) and four factors (RM- RF, SMB, HMW, and WML) are available until 2011 on the Amman-Steiner website. 5 RF is the Swiss Franc call money rate from Factset and the market return is a constructed portfolio bringing returns very similar to the Swiss performance index (SPI). The UK four-factors are taken from the University of Exeter’s 6 website, available until 2010 at the time of our study. RF (risk-free rate) is the monthly return on three-month UK Treasury bills, while RM is the total return computed on the FT All-Share Index. The four factors for the US are available on the Jason Hu website 7 until June 2011 where RF also represents the yield of three-month US Treasury bills. More details on the construction of the factors are available on the respective websites. Concerning our ESG variable, it corresponds to the change in the Global EthicalQuote® score (hereafter global score or rating) between the beginning and the end of the observation period. It can also correspond to the change in each of the respective sub-scores of one the following sub-category (governance, economic, environment, labor, human rights, society, products), as we will test those variables successively. The Global EthicalQuote® score and the score in each sub-category are monthly news-based ratings provided by Covalence 8 on various ESG thematic. More details about how Covalence 5 6 7 8 Covalence SA is a limited company based in Geneva, Switzerland, founded in 2001. They provide ESG ratings, news and data of the world’s largest companies to investors, as well as reputation research and benchmarks to corporations. 10 computes those ratings and how they link to the Global Reporting Initiative (GRI) are available in our data section. 3.3 Control Variables To take into account the specificities of the companies, we considered two control variables commonly used for the analysis of results within the same market: firm size and sector. In our sample, however, the 11 firms are among medium or large within their respective markets. In a study on common stock returns, Banz (1981) has shown that smaller firms have higher returns, but this effect is not distinctive between medium and large firms. Since our sample only consists of medium and large firms, we tend to believe that the parameter influencing the stock returns will not play differently relative to the size factor; therefore, we disregard this factor in our market model. Concerning the sector variable, we will split our sample in the US and UK according to their sectors, as presented in Table 1. As our sample for Switzerland is too small to consider each sector individually, we decided instead to group the firms into the three themed groups that are detailed below. The rationale for the first group is that it seems that those firms that are selling consumer products directly to individuals are more impacted by ESG activities (Eccles, 2012), so we want to see if their market prices are differently influenced by ESG news. We also segregate banks and insurance as a special group because of the indirect influence of the assets holdings. Insert Table 1 4. ESG DATA Our first study sample consists of 618 monthly observations of change in ESG ratings, corresponding market parameters on 11 stocks for Switzerland from 2007 to 2011. Our second study sample consists of 1,335 monthly observations of change in ESG ratings and corresponding financial parameters on 32 UK firms, with observation range from year 2007 to 2010. Our last study sample consists of 8,039 monthly observations of change in ESG ratings and corresponding financial parameters on 189 US firms, with observations ranging from 2007 to 2011. In each case, the ESG variable corresponds to the change in the ESG ratings. ESG ratings available nowadays can be categorized as compliance-based ratings and news-based ratings, this study’s ratings following the second category. The compliance-based ratings depend on the compliance of a firm with respect to some pre-defined rules; for instance, CO2 emissions, the presence of external auditors, the disclosure of a code of business conduct and ethics. They often follow the Global Reporting Initiative (GRI) directives, which has set a standard set of rules for firms to comply with. The rating is then computed depending on how the firm is complying with the rules. Such data are found, for instance, on Thomson Reuters’s ASSET4 or CSRHub. The news-based scores, on the other hand, are based on positive and negative news concerning a company found in newspapers and other media and which contains keywords in relation to environment, society, and governance; for instance, trials, charities, and NGO activities. Regardless of the method chosen to create the ratings, the awarded ESG scores are classified by most providers according to large categories of ideals, often in the number of three (ESG) or four (ecological, corporate governance, community, i.e., contribution to society, and humanitarian, i.e., non-operating employees). An overall ESG score that aggregates all categories is usually available. 11 The compliance-based and news–based rating systems each have certain advantages and disadvantages. The first method seems easier to assess because it is following a grid of specific criteria, but the exact knowledge of what is required to comply with a rule gives companies the freedom to simulate good conduct by, for instance, disclosing a code of conduct which is in fact not followed internally. Another problem is that it offers only a qualitative but not a quantitative appreciation, so it may not allow to compare companies that both comply with the same criterion. Finally, compliance rules rely on a yearly evaluation, which makes it hard for re-assessment during the year. News-based scores have the advantage of being re-assessed more often, as they are based on new communicated by the media and may therefore come from several sources external to the company that may provide different opinions in an ad-hoc manner. The major drawback is the media’s over-exposure of big companies and client-facing businesses relative to others. Large companies will be drowned in a flood of accusation by some organizations or conversely, the media will extensively cover their good deeds, while smaller companies will remain in the shadows and often without a realistic score. To address this issue, advanced news-based scores compute the media exposure and adjust the ratings accordingly. Here are more details on how the ESG scores from Covalence are calculated. The score is obtained by comparing the amounts of positive and negative information collected on the Web, i.e., by subtracting daily the negative information from the positive information. When a majority of negative information is observed, the score then becomes a negative number. S = score = A - B With A = positive information (or ethical bids) B = negative information (or ethical demands) To overcome the bias due to media exposure and size, a rate representing the total volume of information affecting the company score is introduced into the formula. Media exposure adjustment: V = volume = A + B R = rate = S / V│ Final score = S * R An erosion factor of 2% per month gives less importance to old news as compared to the latest ones. The final score takes into account results performed by several human analysts specialized in ESG. A text encoded in the database must also be attached to one or two criteria among the fifty “criteria for business contribution to human development” listed below. Those criteria follow the dimensions of the GRI’s sustainability reporting and are distributed among seven dimensions. This allows Covalence to compute the sub-score for each dimension, namely: A_Governance, B_Economic, C_Environment, D_Labor, E_HumanRights, F_Society, G_Products. Table 2 summarizes the groups and the criteria belonging to it. The availability of sub-ratings in each of the seven ESG dimensions, on top of the global score, will allow us to test which group may have an influence on the stock’s excess return (Hypothesis H2). Insert Table 2 12 5. RESULTS 5.1 Descriptive Statistics The descriptive statistics of our first sample (market Model 1 and 2) is summarized in the table below for each country. For Switzerland, we have 618 observations for each variable over the period 2007–2011 and 8,039 for the US on the same period. We have 1,335 observations in the UK between 2007 and 2010. The stock excess returns range between -53% and +49% in Switzerland, -63% and +90% in the UK, and -78 and +260% in the US. The ESG ratings experience a higher range of variations (e.g., Switzerland, between -4,500% and 180%) than the other dependent variables (e.g., Switzerland, min - 15% and max 12%). Insert Table 3 We test positively for normality by drawing histograms, where the high kurtosis can be noted for the ESG scores. Heteroscedasticity is tested negatively by using a plot of each of our independent variables against the square of the residual, showing no pronounced pattern. The multi-colinearity between the Carhart four-factors’ and the ESG scores’ change is low with VIF indices below 2. The Pearson correlation between the excess stock return and the variables are shown in Table 2. In the overall sample, the four-factors are, as expected, highly correlated with the stock’s excess return. For Switzerland and the UK stocks excess return is also correlated to the global ESG score, positively for Switzerland, and negatively for the UK. The US does not display any significant correlation between the stock’s excess return and the global score, but a positive one with the labor sub-score changes. Despite the high correlation between the four-factors for all countries and ESG scores for Switzerland, the VIF indices are low and below 3 for all coefficients. Insert Table 4 5.2 Model 1 Analysis We run our regression toward Model 1 in R, with results presented below. As expected, the market premium RM-RF shows the highest positive significance toward the stock’s performance. The other classic factors also display a various degree of significance with an expected negative coefficient for SMB since all of our firms are large-cap and an expected positive coefficient for our firm since our stocks are value stocks, confirming global findings on Fama-French models. The momentum factor seems slightly negative for Switzerland. Our first model linear regression shows a slightly positive relationship between the EthicalQuote global score and the market performance; however, it is not significant. The coefficient factor for the ESG Global score change over stock’s market performance is 0.004, which is very small. A bigger sample might be required to confirm such a small effect in a significant manner. Insert Table 5 To explore the influence of each ESG subcategory individually, we then regress for a linear model consisting of four factors, and the score changes in each of the seven subcategories. The figures are presented below. For Switzerland, economic news expectedly demonstrates a positive relation to stock market performance. The overall sample exhibits a significant negative relation between labor score changes and the stock’s excess return changes. This small negative impact of labor ratings over the whole period, which might confirm 13 Friedman’s (1970) concern that business should focus on profit only, but this effect tends to disappear in recent years as we later explore regression by year. Labor rating results from positive and negative news concerning the labor practices and decent work, such as employment and employee benefits, trade unions, health and safety at work, training and education, and diversity (see Table 2 for equivalent GRI criteria). A bivariate Granger causality test with a one-period shift shows a highly significant probability that it is the labor’s score change that is causing the changes in market value. We also consistently measure the impact of ESG news-based ratings to be smaller in comparison with market premium and smaller than SMB, HML, and MOM factors. For the US and UK, only the market premium and momentum factors show a high degree of significance. Society news demonstrates a statistically significant relation in the UK over the whole period, but the factor’s coefficient seems too small to be meaningful. Insert Table 6 In order to further explore the relationship with each ESG subcategory, we observe each category’s score per year. For Switzerland, over year 2011, the environment score exhibits a positive and significant (P < (t) 0.05) influence over the stock market’s performance, while the labor score’s significant negative coefficient only seems to apply to the year 2008. Those results suggest that some factors may be more influential during some periods or context, as, for instance, 2008’s sensitivity to labor when the financial crisis began. For labor, this could mean that positive news concerning the employee benefits of employment are perceived negatively in the markets during a crisis or more probably that negative news, such as lay-offs, are still perceived as a positive sign that the business is restructuring, which might be challenged. 2011’s sensitivity to environmental questions might have been triggered by the Fukushima Daiichi nuclear disaster or by the 2011 proposal for a new regulation from the Swiss federal office to cut CO2 emission, which was finally rejected. The environment category in our news-based score contains news related to materials, energy, water management, biodiversity, emission and waste, pollution, ecological impact of products and transports. Changes in the society score also show a significant positive coefficient for year 2008. A bivariate Granger causality test for each variable with respect to the stock’s excess return does not enable us to conclude on the direction of causality. The UK sample demonstrates a negative, but significant, coefficient over the year 2009 for the society score (local communities, humanitarian action, corruption and lobbying, etc.) has a negative significant relation with market performance, which might be a reaction to the lingering recovery and the MP expenses scandal causing defiance toward anything but economic value. The economic score, which gathers new related to economic performance and social factors, such as wages, local sourcing and hiring, and property rights has a positive significant relation with market performance for 2010, but the causality is not confirmed by the Granger test. Therefore, it is unknown if the firms improved their socio-economics because of better performances that usual, or the firms with a higher socio-economic score were having better market performances. The US sample shows a positive significant coefficient toward society score changes in 2007 and a slightly negative one for the year 2009 regarding product changes (product safety and labeling, product social impact, consumer privacy, etc.), but both impacts are very small. As we will see later with our split by sector, products score shows a significant positive relation to the technology sector in the whole period. 14 Insert Table 7 As described in our methodology section, we then split our sample by sector and groups in order to control for a possible industry effect. The application of our linear model for each sector/group shows the following results: The influence of market premium RM-RF is still the highest significant factor, and the other three factors show their previous significance over the period. For Switzerland, the client-facing groups show a positive significant factor toward human rights. Banks and financial firms seems positively influenced by society and negatively by labor changes, while the rest of the industry seems oriented toward economic ESG news. For the UK, oil and gas shows a highly significant positive factor for environment news, which links to the oil split affair. For banks, there seems to be a negative link toward society, while media has a very positive one. The travel industry seems to have a negative link with labor. For the US, we find that financial services seem negatively influenced by society score changes, while oil and gas are neutral toward such changes. Retail seems influenced negatively by economic changes and telecom by labor changes. Technology, however, seems positively influenced by product changes and telecom by governance and economic. Insert Table 8 5.3 Model 2 Analysis The functions obtained with a non-parametric kernel regression for each parameter over the whole Swiss sample are as follows: • f1 = positive linear function of RM-RF, a confirmation or a consequence of CAPM • f3 = positive linear function of HML with almost flat slope • f5 = the function of ESG Global Ethical quote score seems to be flat until a certain amount of positive change in score. It then becomes positive linear but with a cap, i.e., past a certain threshold, the ESG score has little additional influence on market performance. This could mean that ESG-related information is of importance to investors but that investors may be unable to distinguish between “virtuous” companies and those that are “very virtuous.” Insert Figure 1 Non-parametric regression over the ESG score in each category shows highly nonlinear functions for B_Economic and C_Labor score changes, which could require further confirmation on bigger sample or different markets. The functions obtained with a non-parametric kernel regression for each parameter over the whole sample are presented in Figure 2 below. The shape of the function displayed for each ESG factors does not seems significant. Since the non-parametric regression is sensitive to the bandwidth, a more detailed regression could be conducted using a non-automatic bandwidth to better tailor the variation of the data sample. Insert Figure 2 15 6. CONCLUSION Our research question was how the individual company’s market and financial performance are related to ESG criteria. We tried to identify the influence of ESG ratings on a firm’s market performance in Switzerland, the UK, and the US, with two linear and nonlinear models. In theory, a good ESG rating should signal firms with lower residual risks and therefore increase their market value as demand and valuation would adjust accordingly. We tested monthly stock’s excess performance over a five-year period for several Swiss, US, and UK companies and their related news-based ratings in various ESG categories. We find a neutral or slightly negative relationship with the overall rating for the UK but not for the US or Switzerland. Our results regarding the sub-categories scores highlight that the link with such scores and market performance is highly dependent on the year and sector. Those results could be a sign that investors do not recognize ESG ratings variation as a flag of a lower/higher residual risk, except for some periods where the market is sensitive to specific conditions. Only under those conditions would the prices adjust to the better/worst perception of the risk of the firm, which could be an interesting topic to expand in the field of behavioral finance. We also consistently measured the impact of ESG news-based ratings on the stock’s market return to be smaller than the Fama-French and momentum factors. Our results should, however, be considered with care as our sample only consists of hundreds of firms and as such, should be extended to a larger number of firms and a longer observation period in order to confirm the link with theory. The kernel regression for Switzerland displays a nonlinear relation for news-based ratings toward the market over the whole period, which could be taken into account and may lead to further studies using a non-linear relationship. To conclude, the stakeholder theory (Freeman, 1984) postulates that there are some benefits for firms to improve their ESG ratings as this could increase their performance. But we show that this link, however, is still not fully understood and recognized by the market, as it will not sanction the overall monthly increase or decrease of ESG ratings, except during specific, contextual periods. It is an interesting result for a firm’s management who might want to expose their good deeds in those contextual periods when there is exposure regarding that factor, for instance, when there is discussion on new regulation that the firm is already compliant with. It is also interesting for public policy maker regulators to know that the market does not clearly sanction negative or positive ESG efforts yet and that firms or investors, despite being favorably minded toward sustainability, might need further incentives from them. This study also contributes to the literature evaluating the relationship between financial and CSR performances, and the non-parametric response of performance to ESG criteria may open a new way of research to better understand the complexity of this relationship (Orlitzky; 2013). Moreover, it would be interesting to further study the link between an ESG news-based rating and market performance with regard to a larger sample and other countries, as well as study the link between those returns and financial performance using accounting models over the same period. 16 Bibliography Albuquerque, R., Durnev, A., Koskinen, Y., 2012. Corporate Social Responsibility and Asset Pricing in Industry Equilibrium. Working paper. Angel, J.J., Rivoli, P., 1997. Does ethical investing impose a cost upon the firm? The Journal of Investing 6 (4), 57-61. Balakrishnan, R. Sprinkle, G.B., Williamson M.G., 2011. Contracting Benefits of Corporate Giving. An Experimental Investigation. The Accounting Review 86 (6), 1887–1907. Banz, R.W., 1981. The relationship between return and market value of common stocks. Journal of Financial Economics 9, 3–18. Battacharya, C.B., Sen, S., Korschun, D., 2008, Using Corporate Social Responsibility to Win the War for Talents. MIT Sloan Management Review 49 (2), 37–44. Capelle-Blancard, G. and Monjon S., 2011. The performance of socially responsible funds does the screening process matter? CEPII, Working paper n°2011-12. Carhart, M.M., 1997. On Persistence in Mutual Fund Performance. The Journal of Finance 52(1), 57–82. Edmans, A., 2011. Does the stock market fully value intangibles? Employee satisfaction and equity prices. Journal of Financial Economics 101 (3), 621–640. Eccles, R.G., Ioannou, I., Serafeim, G., 2012. The Impact of a Corporate Culture of Sustainability on Corporate Behavior and Performance. National Bureau of Economic Research Working Paper Series n°17950. Economist, 2008. Just good business. Special report on CSR. January, 19th. El Ghoul, S., Guedhami, O., Kwok, C.C.Y., Mishra, D.R., 2011. Does corporate social responsibility affect the cost of capital? Journal of Banking & Finance 35(9), 2388–2406. Fama, Eugene F., Kenneth R. French, 1993. Common risk factors in the returns on bonds and stocks. Journal of Financial Economics 33 (1), 3–53. Freeman, R.E., 1984. Strategic management: A stakeholder approach. Cambridge University Press, Cambridge. Friedman, M., 1970. The Social Responsibility of Business is to Increase its Profits. New York Times Magazine. Galema, R. Plantinga, A. and B.Scholtens. 2008. The stocks at stake: Return and risk in socially responsible investment. Journal of Banking & Finance 32 (12), 2646–2654. Garriga, E., Melé, D., 2004. Corporate Social Responsibility Theories: Mapping the Territory. Journal of Business Ethics 53, 51–71. Gompers, P., Ishii, J., Metrick, A., 2003. Corporate Governance and Equity Prices. Quarterly Journal of Economics 118 (1), 107-156. Graff Zivin, J., Small, A., 2005. A Modigliani-Miller Theory of Altruistic Corporate Social Responsibility. B.E. Journal of Economic Analysis & Policy: Topics in Economic Analysis & Policy 5, 1–21. Gramlich, D. Finster, N., 2013; Corporate Sustainability and Risk. Journal of Business Economics 83, 631–664. Gregory Birth, Laura Illia, Francesco Lurati, Alessandra Zamparini, 2008. Communicating CSR: practices among Switzerland’s top 300 companies. Corporate Communications: An International Journal 13, 182–196. Hong, H., Kacperczyk, M., 2009.The price of sin: The effects of social norms on markets. Journal of Financial Economics 93, 15–36. Horváthová, E., 2010. Does environmental performance affect financial performance? A meta-analysis. Ecological Economics 70, 52–59. Ionnou, I., Serafeim, G., 2011. The Consequences of Mandatory Corporate Sustainability Reporting. Working Paper, Harvard Business School. 17. Kang, K.H., Lee, S., Huh, C., 2010. Impacts of positive and negative corporate social responsibility activities on company performance in the hospitality industry. International Journal of Hospitality Management 29, 72–82. Kurtz, L., 2005. Answers to Four Questions. Journal of Investing 14(3), 125–139. Mackey, A., Mackey, T.B., Barney, J.B., 2007. Corporate social responsibility and firm performance: investor preferences and corporate strategies. Academy of Management Review 32 (3), 817–835. Margolis, J., Elfenbein, H., Walsh, J., 2007. Does it pay to be good ? A meta-analysis and redirection of research on the relationship between corporate social and financial performance, Working Paper Harvard University. McWilliams, A., Siegel, D., 1997. Event studies in management research: theoretical and empirical issues. Academy of Management Journal 40 (3), 626–657. Myers, S.C., 1977. Determinants of Corporate borrowing. Journal of Financial Economics 5, 147–175. Ohlson, J.A., 1995. Earnings, Book Values, and Dividends in Equity Valuation. Contemporary Accounting Research 11 (2), 661–687. Orlitzky, M., Schmidt, F.L., Rynes, S.L., 2003.Corporate Social and Financial Performance: A Meta-Analysis. Organization Studies, 24 (3), 403–441. Orlitzky, M., 2013. Corporate Social Responsibility, Noise, and Stock Market Volatility. Academy of Management Perspectives 27 (3), 238–254. Porter, M.E., 1991. America’s green strategy. Scientific American, 264 (4), 168. Porter, M.E., Kramer, M.R., 2011. The big idea: created shared value. Harvard Business Review, January-February, 4-17. Renneboog, L., Horst, T., Zhang, C., 2008. Socially responsible investments: Institutional aspects, performance, and investor behavior. Journal of Banking & Finance, 32 (9), 1723–1742. Revelli, C., Viviani, J, 2013. Performance financière de l’investissement socialement responsable (ISR) : une méta-analyse. Finance Contrôle Stratégie [Online], 15-4 |2013, Online since 18 March 2013. URL :. Russo, M.V., Fouts, P.A., 1997. A resource-based perspective on corporate environmental performance and profitability. Academy of Management Journal 40 (3), 534–559. Sandberg, J., C., Juravle, T.D. Hedesström, and I. Hamilton, 2009. The heterogeneity of socially responsible investment. Journal of Business Ethics, 87, 519-533. Sharfman, M.P., Fernando, C.S., 2008. Environmental risk management and the cost of capital. Strategic Management Journal 29 (6), 569–592. Statman, M., Glushkov, D., 2009. The Wages of Social Responsibility. Financial Analysts Journal 65 (4), 33–46. Teoh, S.H., Welch, I., Wazzan, C.P., 1999. The Effect of Socially Activist Investment Policies on the Financial Markets: Evidence from the South African Boycott. Journal of Business 72, 35–89. Waddock, S.A., Graves, S.B., 1997. Finding the link between stakeholder relations and quality. Journal of Investing 6 (4), 20-24. 18 Table 1: Sectors of the empirical study In order to study if environmental, social, and corporate governance (ESG) scores have a specific impact on a particular sector, the firms in our study were sorted by sectors. US and UK firms where divided using ICB supersectors. In Switzerland, as the number of sample was too small, we grouped the ICB supersectors in three custom groups by type of activity: Consumer facing, Bank and Insurance, Industry and other. Sectors for US & UK Number of compani es Sector groups for Switzerland : UK US Automobi le s & Parts 1 4 Banks 5 5 GROUP I - Consumer facing Bas ic Resource s 3 7 Food & Beverages Nestlé S.A. Chemi cals 6 Personal & House hold Goods Compa gnie Financie re Richemont SA Construction & Materia ls 3 Fina nci al Services 12 GROUP II Banks & Insurance Food & Beverages 3 14 Banks UBS AG Hea lth Care 2 13 Credit Suiss e Group Indus trial Goods & Services 1 17 Insura nce Swis s Re AG Insurance 1 7 Financial Services Juli us Bär Gruppe AG Media 3 11 Oil & Gas 1 1 4 GROUP III - Industry & Others Personal & House hold Goods 3 12 Health Care Novartis AG Reta il 4 22 Roche Holding AG Technology 19 Indus trial Goods & Services ABB Ltd. Telecommunicat ion 2 4 Chemica ls Syngenta AG Travel & Lei sure 1 9 Const ruction & Materi al s Holc im Ltd. Utiliti es 2 10 Grand Total 32 189 Total 11 19 Table 2: Methodology of Covalence score GRI (Global Reporting Initiative) is one of the most renowned standards for sustainability reporting, The news-based scores from Covalence are grouped under seven categories, the GRI dimension. Each dimension covers specific criteria, which correspondence to the GRI guidelines G3.1 is provided below. The news-based scores are computed for the seven categories, and a Global score that aggregate all seven dimensions is provided as well. GRI Dimension GRI Aspect id Crit eria name Referenc es to GRI G3.1 Governanc e 1 Governanc e 4. Governa nce, Commi tments, and Engage ment Unite d Nati ons Polic y 2 Unite d Nati ons Polic y Commit ments to Exte rnal Init ia tive s 3 Commit ments to Exte rnal Initia tive s Part 2. 4 Stake holder Engagem ent 4 Stake holder Engagem ent Economic Performanc e 5 Fiscal Contri buti ons EC1 Economic Performanc e 6 Socia l Sponsors hip EC1 Economic Performanc e 7 Public Fundi ng EC4 Market Pres ence 8 Wages Market Pres ence 9 Loca l Sourcing EC6 Market Pres ence 10 Loca l Hiring EC7 Indir ect Economic Impacts 11 Infras tru cture s GRI 3.1 EC8 Indir ect Economic Impacts 12 Indirect Economic Impac ts EC9 Indir ect Economic Impacts 13 Pricing / Needs EC9 Indir ect Economic Impacts 14 Inte lle ctual Propert y Rights EC9 Mater ia ls 15 Mater ia ls EN1, EN2 Energy 16 Energy EN3, EN4, EN5, EN6, EN7 Wat er 17 Water Mana gement EN8, EN9, EN10 Biodi vers ity 18 Biodi vers ity EN11, EN12 Emiss ions, Effluent s, and Was te 19 Emiss ions EN16, EN17, EN18, EN19, EN20 Emiss ions, Effluent s, and Was te 20 Was te Management EN21, EN22, EN24, EN25 Emiss ions, Effluent s, and Was te 21 Poll ution EN23 Products and Servi ces 22 Environme ntal Impa cts of Product s EN26, EN27 Compl ia nce 23 Compl iance EN28 Trans port 24 Environme ntal Impa ct of Trans port EN29 Employme nt 25 Employme nt LA1, LA2 Employme nt 26 Employee Bene fits LA3, LA15 Lab or/Mana gement Relati ons 27 Trade Unions LA5 Occupa tional Health and Safety 28 Hea lth and Safety LA6, LA7, LA8, LA9 Train ing and Educati on 29 Traini ng and Educati on LA10, LA11, LA12 Diversi ty and Equal Opport unit y 30 Diversi ty and Equal Opportu nity LA13 Inves tment and Procureme nt Pra ctices 31 Huma n Rights Policy HR1, HR2, HR3, HR10, HR11 Non-dis crim ina tion 32 Dis crimina ti on HR4, LA14 Child Labor 33 Child Labor HR6 Forced and Compuls ory Labor 34 Forced Labor HR7 Security Pra ctices 35 Security Pra ctices HR8 Indige nous Rights 36 Indige nous Rights HR9 Loca l Communiti es 37 Loca l Communiti es SO1 Loca l Communiti es 38 Huma nitari an Action SO1 Corrupt ion 39 Corrupt ion SO2, SO3, SO4 Public Pol icy 40 Lobbyi ng Practic es SO5 Public Pol icy 41 Contri butions to Polit ical Pa rties SO6 Anti-Compe titive Behavi or 42 Competition SO7 Compl ia nce 43 Socia l Complia nce SO8 Awards 44 Awards , Reports and Comme nts Cust omer Heal th and Safety 45 Product Safety PR2 Product and Service Lab eli ng 46 Product Lab eling PR4 Market ing Communica tions 47 Market ing Communica tions PR6, PR7 Cust omer Priva cy 48 Cust omer Priva cy PR8 Compl ia nce 49 Product Compl iance PR9 Socia l Impact s of Products 50 Socia l Impacts of Products Socie ty Product Res ponsibi lit y Covalence EthicalQuote Criteria © Covalence SA 2012 The EthicalQuo te index aggregates tho usands of do cuments gathered o nline from vario us sources and classified acco rding to 50 sust ainability criteria inspired by the Global Repo rting Initiative's G3.1 sustainabilit y reporting guidelines, as well as by the experience accumulat ed by Co valence since 2001. These criteria co ver the econo mic, social, enviro nmental and gov ernance impacts o f companies . The Global Reporting Initiative (GRI) is a non-pro fit organizatio n that prom otes econo mic, environm ental and social sust ainability. GRI provides all companies and organizatio ns with a com prehensive sustainabilit y reporting framework that is widely used around the world. Governanc e,Co mmitment s, and Engagemen t Economic Environm enta l Lab or Pra cti ces and De cen t Work Huma n Rights 20 Table 3: Descriptive statistics 2007-2011 Count Mean Standard Deviation Kurtosis Skewness Minimum Maximum Range StockReturn-RF 618 -0.010 0.095 4.70 0.28 -0.53 0.49 1.02 RM-RF 618 -0.004 0.044 0.32 -0.23 -0.11 0.12 0.23 SMB 618 0.001 0.028 0.05 0.21 -0.06 0.09 0.15 HML 618 -0.002 0.022 -0.05 -0.13 -0.06 0.05 0.11 MOM 618 0.005 0.033 6.34 -1.68 -0.15 0.08 0.23 ESG Global Chng 618 0.026 0.717 144.34 6.67 -7.38 11.69 19.08 ESG A_Governance Chng 618 0.001 0.443 113.05 7.36 -2.40 6.56 8.96 ESG B_Economic Chng 618 0.008 0.251 103.46 5.39 -2.16 3.77 5.92 ESG C_Environment Chng 618 0.039 0.395 185.32 12.45 -0.88 6.59 7.47 ESG D_Labor Chng 618 -0.098 1.979 457.44 -19.53 -45.56 12.81 58.37 ESG E_Human Rights Chng 618 0.001 1.318 221.14 -8.06 -24.59 12.83 37.42 ESG F_Society Chng 618 -0.032 1.312 170.82 -3.44 -20.74 18.17 38.91 ESG G_Product Chng 618 -0.015 0.421 415.75 -18.35 -9.48 2.05 11.53 UK 2007-2010 Count Mean Standard Deviation Kurtosis Skewness Minimum Maximum Range StockReturn-RF 1'335 0.003 0.107 10.25 0.81 -0.63 0.90 1.53 RM-RF 1'335 0.002 0.054 -0.23 -0.45 -0.14 0.10 0.24 SMB 1'335 -0.002 0.045 5.65 1.15 -0.12 0.19 0.30 HML 1'335 -0.004 0.032 4.60 1.46 -0.07 0.11 0.19 MOM 1'335 0.006 0.064 6.79 -1.85 -0.27 0.14 0.41 ESG Global Chng 1'335 -0.049 1.249 689 -24.34 -38.10 4.68 42.78 ESG A_Governance Chng 1'335 0.018 0.873 490 18.84 -8.75 23.23 31.98 ESG B_Economic Chng 1'335 -0.020 2.890 789 -18.84 -90.39 50.66 141.06 ESG C_Environment Chng 1'335 -0.042 1.315 808 -25.43 -42.19 9.74 51.93 ESG D_Labor Chng 1'335 -0.178 5.149 782 -23.30 -163.34 63.64 226.98 ESG E_Human Rights Chng 1'335 -0.104 2.377 817 -26.86 -76.24 9.84 86.08 ESG F_Society Chng 1'335 -0.318 8.603 947 -29.76 -286.18 26.86 313.04 ESG G_Product Chng 1'335 -0.081 2.377 511 -18.39 -61.94 31.44 93.39 US 2007-2011 Count Mean Standard Deviation Kurtosis Skewness Minimum Maximum Range StockReturn-RF 8'039 0.005 0.112 65.74 3.00 -0.78 2.60 3.38 RM-RF 8'039 0.004 0.055 0.48 -0.66 -0.17 0.10 0.27 SMB 8'039 0.005 0.024 -0.36 0.51 -0.03 0.07 0.10 HML 8'039 -0.005 0.039 1.17 0.15 -0.12 0.11 0.22 MOM 8'039 0.000 0.071 9.22 -2.34 -0.35 0.13 0.48 ESG Global Chng 8'039 0.146 6.615 7'408 84.58 -32.08 581.12 613.20 ESG A_Governance Chng 8'039 0.096 3.986 5'027 65.81 -37.80 316.28 354.08 ESG B_Economic Chng 8'039 0.063 2.376 2'670 41.15 -65.82 157.57 223.38 ESG C_Environment Chng 8'039 0.060 1.860 2'334 43.82 -20.84 103.29 124.13 ESG D_Labor Chng 8'039 0.023 3.473 2'447 38.97 -58.96 226.74 285.70 ESG E_Human Rights Chng 8'039 -0.137 10.824 6'227 -75.32 -909.12 86.73 995.85 ESG F_Society Chng 8'039 -0.012 4.375 5'567 -69.22 -357.37 30.56 387.93 ESG G_Product Chng 8'039 0.097 5.580 7'299 83.54 -41.23 488.38 529.61 21 Table 4: Correlation between variables% 60%(***) 30%(***) -33%(***) -36% (***) 7% (.) 0% 4% -3% -6% 2% 5% 3% RM - R F 100% 32% -42% -50% 7%(.) 2% 0% -7% 0% -1% 2% 1% HML 100% -33% -29% 2% 5% 1% 2% 5% -7%(.) 5% 6% SMB 100% 19% 5% -3% 7% (.) 8%( *) 0% -3% 1% - 1% MOM 100% -6% -3% 3% 1% 3% 4% -5% -3% ESG G lob al Chng 100% 27%(***) 16%(***) 4% 9%( *) 3% 10%( *) 9%( *) ESG A_G overna nce Ch ng 100% 15%(**) 3% 8%(*) 2% 6% 14%(**) ESG B _Econom ic Chng 100% 2% 16%(***) 4% 13%(**) 3% ESG C_En vironme nt Chn g 100% 1% 2% -16%(***) 2% ESG D _Labo r Chng 100% 1% 1% 0% ESG E_H uma n Ri ghts Chng 100% 9%(*) -1% ESG F _Socie ty Chng 100% 5% ESG G _Product Chn g 100% n=618 Si gnif . code s: 0 '***' 0.001 '**' 0.01 '*' 0.05 '.' 0.1 ' ' 1 UK% 51% (***) 39% (***) 23% (***) -30% ( *** ) -15% ( *** ) -2% -1% -2% 3% -1% 1% -1% RM.RF 100% 69% (***) 28% (***) -35% ( *** ) -4% -2% -1% -2% 3% -3% 0% 0% HML 100% 51% (***) -57% ( *** ) -9% ( ** ) 0% 0% 0% -1% -1% -2% -1% SMB 100% -68% ( *** ) -10% ( ** ) 2% 4% 3% -1% 1% -4% 2% MOM 100% 12% (***) 2% -2% -2% -1 % 1% 0% -1% ESG G lob al Chng 100% 2% 2% 6% (*) 1% 1% 11% (***) 1% ESG A_G overna nce Ch ng 100% 1% 1% -1% 1% 0% -2% ESG B _Econom ic Chng 100% 3% 1% 0% 2% 1% ESG C_En vironme nt Chn g 100% 1% 0% 0% 1% ESG D _Labo r Chng 100% 3% 0% 0% ESG E_H uma n Ri ghts Chng 100% -1% 0% ESG F _Socie ty Chng 100% 0% ESG G _Product Chn g 100% n=1335 S igni f. cod es: 0 '***' 0.001 '**' 0.01 '* ' 0.05 '.' 0.1 ' ' 1 US% 55% (*** ) 28% ( ***) 22% ( ***) -33% ( *** ) -1% 1% 1% -1% 2% (.) -1% -2% -1% RM.RF 100% 43% (***) 39% (***) -48% ( *** ) -2% ( * ) 1% 1% -1% 2% (.) -1% 0% -1% HML 100% 18% (***) -47% ( *** ) 3% (*) 0% 0% 0% 1% 0% 1% 0% SMB 100% -14% ( *** ) -1% -2% -2% -1% 2% (*) 1% 2% -2% MOM 100% 1% -2% -1% 0% 1% 2% (.) -1% 0% ESG G lob al Chng 100% 1% 4% (**) 1% 0% 0% 1% 0% ESG A_G overna nce Ch ng 100% 1% 0% 0% 3% (*) 1% 0% ESG B _Econom ic Chng 100% 0% 0% 0% 1% 0% ESG C_En vironme nt Chn g 100% -2% ( . ) 0% 0% 0% ESG D _Labo r Chng 100% 0% 0% 0% ESG E_H uma n Ri ghts Chng 100% 0% 0% ESG F _Socie ty Chng 100% 0% ESG G _Product Chn g 100% n=8039 S igni f. cod es: 0 '***' 0.001 '**' 0.01 '* ' 0.05 '.' 0.1 ' ' 1 22 Table 5: Regression results for Model 1 ESG Global Chng factor represents the variation in the overall news-based score on environmental, social/societal and governance criteria StockReturn-RF ~ RM-RF + S MB + HML + MOM + ESG Global Chng CH Estimate Std. Error t-value Pr(>|t|) VIF RM-RF 1.084 *** 0.0881 12.3130 <2e-16 1.6037 SMB -0.244 * 0.1215 -2.0100 0.0448 1.2994 HML 0.411 ** 0.1541 2.6650 0.0079 1.2098 MOM -0.196 . 0.1079 -1.8160 0.0699 1.3805 ESG Global Chng 0.004 0.0043 0.8310 0.4062 1.0138 (Intercept) -0.004 0.0031 -1.2970 0.1951 Signif. codes: Pr(>|t|) 0 '***' 0.001 '**' 0.01 '*' 0.05 '.' 0.1 ' ' 1 Residual standard error : 0 .07548 on 6 12 degrees of freedom Multiple R-squared: 0.3 75, Adjusted R-s quared: 0.3699 F-statist ic: 73.44 on 5 an d 612 DF, p -va lue: < 0.0000 Residuals : Min 1Q Median 3Q M ax -0.35965 -0.04201 -0.0018 0.0398 0.3060 UK Estimate Std. Error t value Pr(>|t|) VIF RM-RF 0.969 *** 0.0640 15.1440 < 2e-16 1.9392 SMB 0.024 0.0765 0.3130 0.7543 1.9393 HML -0.115 0.1239 -0.9300 0.3523 2.6133 MOM -0.211 *** 0.0564 -3.7330 0.0002 2.1385 ESG Global Chng -0.010 *** 0.0020 -4.8290 0.0000 1.0160 (Intercept) 0.001 0.0025 0.2600 0.7949 Signif. codes: Pr(>|t|) 0 '***' 0.001 '**' 0.01 '*' 0.05 '.' 0.1 ' ' 1 Residual standard error : 0 .09026 on 1 329 degrees of freedom Multiple R-squared: 0.2 93, Adjusted R- squ ared: 0.2904 F-statist ic: 110.2 on 5 an d 1329 DF, p- value: < 2.2e-16 Residuals: Min 1Q Media n 3Q Max -0.4927 - 0.0438 -0.0005 0.0408 0. 755 8 US Estimate Std. Error t value Pr(>|t|) VIF RM-RF 1.005 *** 0.0241 41.7790 < 2e-16 1.6075 SMB 0.070 0.0471 1.4930 0.1350 1.1836 HML 0.072 * 0.0318 2.2740 0.0230 1.3845 MOM -0.126 *** 0.0178 -7.0810 0.0000 1.4666 ESG Global Chng 0.000 0.0002 0.2830 0.7770 1.0024 (Intercept) 0.001 0.0011 1.0900 0.2760 Signif. codes: Pr(>|t|) 0 '***' 0.001 '**' 0.01 '*' 0.05 '.' 0.1 ' ' 1 Residual standard error : 0 .09356 on 8 033 degrees of freedom Multiple R-squared: 0.3 061 ,Adjusted R -sq uared: 0.3057 F-statist ic: 708.7 on 5 an d 8033 DF, p- value: < 2.2e-16 Residuals: Min 1Q Media n 3Q Max -0.6242 -0.04328 -0 .00256 0. 0403 2.44116 23 Table 6: Regression results for Model 1 - Sub-scores. 24 CH Estimate Std.Error tvalue Pr(>|t|) VIF RM-RF 1.087 *** 0.087765 12.38 <2e-16 1.600978 SMB -0.255 * 0.121912 -2.089 0.0371 1.313569 HML 0.423 ** 0.155375 2.721 0.0067 1.235752 MOM -0.195 . 0.107964 -1.809 0.0709 1.390157 ESG A_G over nan ce Chng -0.006 0.007012 -0.823 0.4107 1.051974 ESG B_E cono mic Chng 0.023 . 0.01251 1.873 0.0615 1.075129 ESG C_E nvir onm ent Chng 0.003 0.007842 0.323 0.7469 1.046932 ESG D_L abor Ch ng -0.003 * 0.001558 -2.112 0.0351 1.034534 ESG E_H uman .Ri ghts Chng 0.002 0.002324 0.937 0.3491 1.021631 ESG F_S ocie ty Chng 0.002 0.00239 0.661 0.5086 1.06963 ESG G_P rodu ct Chng 0.004 0.007288 0.546 0.585 1.02624 (Intercept) -0.004 0.003087 -1.409 0.1594 Signif. codes: Pr(>|t|) 0 '***' 0.001 '**' 0.01 '*' 0.05 '.' 0.1 ' ' 1 Residual standard error: 0.07529 on 606 degrees of freedom Multiple R-squared: 0.3841, Adjusted R-squared: 0.3729 F-statistic: 34.36 on 11 and 606 DF, p-value: < 2.2e-16 Residuals: Min 1Q Median 3Q Max -0.35766 -0.04021 -0.00118 0.03955 0.30425 UK Estimate Std. Error t value Pr(>|t|) VIF RM-RF 0.959 *** 0.06482 14.801 < 2e-16 1.947188 SMB 0.036 0.07756 0.47 0.639 1.951354 HML -0.093 0.1254 -0.743 0.458 2.620275 MOM -0.224 *** 0.05701 -3.922 0.0000925 2.139914 ESG A_G over nan ce Chng -0.001 0.002865 -0.382 0.703 1.003457 ESG B_E cono mic Chng 0.000 0.0008656 -0.532 0.595 1.003316 ESG C_E nvir onm ent Chng -0.001 0.001902 -0.412 0.68 1.002886 ESG D_L abor Ch ng 0.000 0.0004861 0.471 0.638 1.004173 ESG E_H uman .Ri ghts Chng 0.000 0.001052 -0.089 0.929 1.00196 ESG F_S ocie ty Chng 0.000 0.0002909 0.189 0.85 1.003889 ESG G_P rodu ct Chng 0.000 0.001051 -0.253 0.8 1.001766 (Intercept) 0.001 0.002561 0.523 0.601 Signif. codes: Pr(>|t|) 0 '***' 0.001 '**' 0.01 '*' 0.05 '.' 0.1 ' ' 1 Residual standard error: 0.09122 on 1323 degrees of freedom Multiple R-squared: 0.2811,Adjusted R-squared: 0.2752 F-statistic: 47.04 on 11 and 1323 DF, p-value: < 2.2e-16 Residuals: Min 1Q Median 3Q Max -0.491 55 -0.043 81 -0.0 0108 0 .04 055 0.747 87 US Estimate Std. Error t value Pr(>|t|) VIF RM-RF 1.004 *** 0.02406 41.713 < 2e-16 1.60753 SMB 0.071 0.0471 1.516 0.1295 1.185605 HML 0. 073 * 0.03182 2.297 0.0216 1.382455 MOM -0.126 *** 0.01776 -7.108 1.28E-12 1.468276 ESG A_G over nan ce Chng 0.000 0.000262 0.348 0.7279 1.001718 ESG B_E cono mic Chng 0.000 0.0004394 0.862 0.3887 1.000742 ESG C_E nvir onm ent Chng 0.000 0.0005613 -0.886 0.3759 1.00075 ESG D_L abor Ch ng 0.000 0.0003007 0.983 0.3256 1.001574 ESG E_H uman .Ri ghts Chng 0.000 0.00009648 0.272 0.7858 1.001517 ESG F_S ocie ty Chng 0 .00 0 . 0.0002386 -1.776 0.0758 1.000549 ESG G_P rodu ct Chng 0.000 0.000187 -0.244 0.807 1.000373 (Intercept) 0.001 0.001084 1.091 0.2753 Signif. codes: Pr(>|t|) 0 '***' 0.001 '**' 0.01 '*' 0.05 '.' 0.1 ' ' 1 Residual standard error: 0.09356 on 8027 degrees of freedom Multiple R-squared: 0.3066,Adjusted R-squared: 0.3057 F-statistic: 322.7 on 11 and 8027 DF, p-value: < 2.2e-16 Residuals: Min 1Q Median 3Q Max -0.624 26 -0.0 4328 -0.00 26 0.04035 2.44102 25 Table 7: Regression results for Model 1 - Sub-scores per year. CH 2007 2008 2009 2010 2011 Estimate Estimate Estimate Estimate Estimate RM-RF 1.18 *** 0.96 *** 0.98 * 1.49 *** 0.95 *** SMB -0.02 -0.55 . -0.37 -0.19 -0.51 HML 0.24 0.03 0.12 0.51 . 0.66 * MOM -0.44 -0.09 -0.40 0.12 -0.20 ESG A_Governance.Chng -0.001 -0.025 . -0.004 -0.019 0.000 ESG B_Economic.Chng 0.009 0.047 0.086 . - 0.023 0.023 ESG C_Environment.Chng 0.004 -0.055 -0.068 -0.032 0.085 * ESG D_Labor.Chng 0.036 -0.005 * 0.006 -0.012 0.014 ESG E_Human.Rights.Chng -0.008 0.009 0.003 0.001 -0.031 ESG F_Society.Chng 0.001 0.018 * -0.005 0.012 -0.019 ESG G_Product.Chng 0.025 0.116 . -0.059 -0.010 0.004 (Intercept) -0.01 -0.02 0.00 0.00 -0.01 Signif. codes: 0 '***' 0.001 '**' 0.01 '*' 0.05 '.' 0.1 ' ' 1 UK 2007 2008 2009 2010 Estimate Estimate Estimate Estimate RM-RF 1.18 *** 0.83 *** 1.01 *** 1.14 *** SMB -0.19 0.04 0.10 0.05 HML -0.53 -0.02 -0.29 -0.62 . MOM -0.16 -0.19 . -0.30 * 0.05 ESG A_Governance.Chng -0.015 -0.004 -0.014 0.002 ESG B_Economic.Chng -0.016 . -0.001 0.000 0.029 * ESG C_Environment.Chng 0.007 0.000 -0.014 0.013 ESG D_Labor.Chng 0.002 0.001 0.000 0.001 ESG E_Human.Rights.Chng 0.002 0.006 0.014 -0.001 ESG F_Society.Chng 0.020 0.000 -0.017 *** 0.000 ESG G_Product.Chng -0.002 0.000 -0.001 0.017 (Intercept) -0.01 0.00 -0.01 0.00 Signif. codes: 0 '***' 0.001 '**' 0.01 '*' 0.05 '.' 0.1 ' ' 1 US 2007 2008 2009 2010 2011 Estimate Estimate Estimate Estimate Estimate RM-RF 0.94 *** 1.10 *** 0.92 *** 1.00 *** 0.90 *** SMB -0.08 0.05 0.10 0.01 0.08 HML -0.17 0.16 * 0.10 0.08 0.14 MOM -0.12 . -0.02 -0.17 *** 0.04 -0.30 ESG A_Governance.Chng 0.000 -0.001 0.000 0.003 0.000 ESG B_Economic.Chng 0.001 0.002 0.000 0.001 0.001 ESG C_Environment.Chng 0.000 0.000 -0.006 0.002 0.004 ESG D_Labor.Chng 0.002 0.000 0.001 -0.001 0.001 ESG E_Human.Rights.Chng -0.001 0.000 0.000 0.000 0.001 ESG F_Society.Chng 0.000 ** -0.002 0.002 -0.001 -0.001 ESG G_Product.Chng 0.001 0.000 -0.008 ** 0.000 0.001 (Intercept) 0.00 0.00 0.00 0.00 0.00 Signif. codes: 0 '***' 0.001 '**' 0.01 '*' 0.05 '.' 0.1 ' ' 1 26 Table 8: Regression results for Model 1 – Sectors and Sector’s groups. In this regression, US and UK firms where divided using ICB supersectors. In Switzerland, as the number of sample was too small, we grouped the ICB supersectors in three custom groups by type of activity: Consumer facing, Bank and Insurance, Industry and other. 27 CH -by sectors Estimate Estimate Estimate RM-RF 1.04 *** 1.32 *** 1.01 *** SMB -0.25 - 0.42 . -0.18 HML -0.19 1.52 *** 0.01 MOM 0.24 - 0.88 *** 0.13 ESG A_Governance Chng -0.025 -0.017 -0.018 * ESG B_Economic Chng 0.014 0.001 0.085 *** ESG C_Environment Chng -0.008 0.083 0.001 ESG D_Labor Chng 0.035 -0.005 ** 0.005 ESG E_Human.Rights Chng 0.210 * 0.029 0.001 ESG F_Society Chng 0.003 0.018 * - 0.002 ESG G_Product Chng 0.038 0.002 0.002 (Intercept) 0.00 -0.01 -0.01 . UK - by sectors Estimate Estimate Estima te Estima te Estimate Estimate Estimate Estim ate Estimate RM.RF 3.05 ** 0.99 *** 1.98 *** 0.86 *** 0.66 *** 1.04 *** SMB 2.47 * 0.31 -0.01 -0.19 -0.57 *** 0.23 HML -2.35 0.64 . -0.40 -0.37 -0.66 * -0.90 . MOM -0.16 - 0.85 *** 0.02 -0.17 -0.32 ** 0.05 A_Governance.Chng NA -0.004 -0.199 0.017 0.002 0.070 B_Economic.Chng -0.008 0.050 . -0.008 0.055 0.061 0.000 C_Environment.Chng 0.004 -0.001 0.037 -0.010 0.085 -0.014 D_Labor.Chng -0.126 0.007 0.001 0.004 -0.002 -0.012 E_Human.Rights.Chng NA 0.002 0.000 -0.001 0.003 NA F_Society.Chng NA -0.010 * 0.036 -0.013 0.081 0.797 G_Product.Chng NA 0.052 0.001 -0.029 0.002 0.028 * (Intercept) -0.01 0.00 0.01 0.01 0.00 -0.01 Estimate Estimate Estima te Estima te Estimate Estimate Estimate Estim ate Estimate RM.RF 0.66 . 0.78 *** 0.96 *** 0.64 *** 0.83 *** 0.70 *** 0.89 *** 0.58 * SMB 0.41 0.13 -0.73 ** 0.05 0.18 -0.10 -0.03 -0.17 HML 1.06 -0.47 . 0.23 - 0.51 * -0.21 0.69 . -0.71 -0.04 MOM -0.30 0.06 0.00 0.01 -0.15 0.10 -0.17 -0.03 A_Governance.Chng 1.195 -0.543 -0.069 *** -0.022 0.001 -0.301 -0.005 NA B_Economic.Chng -0.972 0.367 0.182 0.002 -0.002 -0.162 -0.008 -0.068 C_Environment.Chng -1.159 NA 0.113 ** -0.006 0.328 0.460 -0.012 . -0.063 D_Labor.Chng 0.017 -0.007 -0.019 0.000 -0.003 - 0.001 -0.021 *** 0.050 E_Human.Rights.Chng NA -0.049 0.014 0.005 0.004 -0.015 0.005 NA F_Society.Chng 0.252 0.241 * 0.002 0.000 0.056 0.257 -0.001 0.266 G_Product.Chng -0.218 . - 0.018 0.005 0.000 -0.073 0.059 0.000 0.054 (Intercept) 0.00 0.00 0.00 0.00 0.00 0.00 0.01 0.00 Signif. codes: 0 '***' 0.001 '**' 0.01 '*' 0.05 '.' 0.1 ' ' 1 US - by se ctors Estimate Estimate Estima te Estima te Estimate Estimate Estimate Estim ate Estimate RM-RF 1.42 *** 1.14 *** 1.59 *** 1.00 *** 1.11 *** 1.43 *** 0.61 *** 0.88 *** 1.05 *** SMB 0.76 -1.34 *** -0.09 0.42 . 0.42 - 0.43 -0.34 ** -0.45 *** - 0.08 HML 0.22 2.23 *** -0.41 * 0.26 -0.06 0.48 . -0.02 - 0.16 . 0.16 * MOM -0.84 *** -0.46 *** -0.25 * -0.41 *** -0.17 -0.24 0.05 0.04 -0.13 *** ESG A_Governance Chng 0.047 0.000 0.001 -0.021 0.023 -0.003 -0.001 0.001 0.001 ESG B_Economic Chng -0.018 0.187 0.000 0.046 0.017 0.000 0.001 -0.019 0.001 ESG C_Environment Chng -0.011 0.034 0.003 -0.001 -0.002 - 0.020 0.000 -0.005 . 0.001 ESG D_Labor Chng 0.002 0.000 0.000 0.003 -0.010 -0.004 0.001 -0.001 0.001 ESG E_Human.Rights Chng 0.010 0.003 0.007 -0.036 0.001 0.030 0.000 0.001 0.000 ESG F_Society Chng 0.060 -0.006 - 0.002 0.011 -0.007 0.000 0.001 -0.002 0.000 ESG G_Product Chng 0.018 -0.005 -0.010 - 0.001 -0.056 -0.010 * 0.001 0.001 0.002 (Intercept) 0.01 0.01 0.00 0.00 -0.01 -0.01 0.00 0.00 0.00 Estimate Estimate Estima te Estima te Estimate Estimate Estimate Estim ate Estimate RM.RF 1.11 *** 1.22 *** 1.27 *** 0.75 *** 0.79 *** 1.17 *** 1.05 *** 0.69 *** 0.73 *** SMB -0.34 0.32 . -0.16 0.01 0.61 *** 0 .33 ** -0.15 1.35 *** -0.30 ** HML 0.68 *** 0.04 -0.50 *** 0.29 ** 0.10 -0.31 *** -0.62 ** 0.52 * -0.36 * ** MOM -0.37 *** 0.03 0.03 -0.02 -0.17 *** -0.02 0.07 -0.64 *** 0.10 ** A_Governance.Chng -0.028 0.008 0.000 0.003 0.000 0.003 0.013 * 0.001 0.000 B_Economic.Chng 0.339 0.004 0.009 . -0.003 -0.003 * 0.001 0.051 * -0.024 . 0.002 C_Environment.Chng -0.014 0.000 -0.002 0.001 0.000 -0.002 -0.001 0.000 0.000 D_Labor.Chng 0.121 0.004 0.001 0.000 0.000 0.001 -0.025 * 0.015 -0.004 E_Human.Rights.Chng 0.060 -0.001 0.001 -0.003 0.000 0.002 -0.010 0.000 -0.003 F_Society.Chng 0.005 0.005 0.000 * 0.003 -0.003 0.001 0.001 0.000 -0.013 G_Product.Chng 0.016 0.000 0.006 0.001 -0.004 0.016 * -0.013 -0.004 . 0.000 (Intercept) 0.01 0.00 0.00 0.00 0.00 0.00 0.00 0.01 -0.01 * Signif. codes: 0 '***' 0.001 '**' 0.01 '*' 0.05 '.' 0.1 ' ' 1 Personal & Household Goods Food & Beverages Grou p II Banks Insurance Financial Services Industrial Goods & Services Construction & Materials Health Care Chemicals Stoc kRet urn-R F ~ RM-R F + SMB + HM L + MOM + ES G A_G over nanc e Ch ng + ESG B_E conom ic.C hng + ES G C_ Envi ronm ent. Chng + ESG D_La bor.C hng + ES G E_ Huma n.Ri ghts .Chn g + ESG F _Soc iety .Chn g + ESG G_Pr oduct .Chn g Grou p I Grou p II I Food & Health Care Industrial Insurance Media Oil & Gas Personal & Retail Technology Telecommun Automobiles B anks B asic Resources Chemicals Construction & Financial Travel & Utilities Automobiles & Parts Banks Basic Resources Chemicals Construction & Materials Financial Services Food & Beverages Health Care Industrial Goods & Technology Telecommun ication Travel & Leisure UtilitiesInsurance Media Oil & Gas Personal & Household Goods Retail 28 Figure 1: Regression results for Model 2. Global Chng factor represent the variation in the news-based score on environmental, social/societal and governance criteria. The graphs represent the estimated functions of the StocksReturn-RF(y-axis) depending of the variable in the x-axis. 29 Figure 2: Regression results for Model 2 - Sub-scores variable(Category) Chng represent the variation in the news-based score computed only in one of the seven GRI dimension measured by Covalence. The graphs represent the estimated functions of the StocksReturn-RF(y-axis) depending of the variable in the x-axis. 30 Appendix A Fig. A1 - Socially Responsible Investment – Acknowledged Strategies Fig. A2 - US and European SRI Growth –US SIF 2012 Executive Summary report, EURO SIF 2012 report SRI in the US IN $bn 1997 1997 1999 2003 2005 2007 2010 2012 639 1'185 2'159 2'323 2'290 2'711 2'069 3'744 SRI in Europe in €bn 2005 2007 2009 2011 1'768 4'066 *7'375 *11'661 * includes norm-based screening since 2009 - 2009 988bn-2011 2'346bn Type Strategies Definition Negative Screening Exclusion Exclusion of certain sectors such as weapons etc. Norm-based screening Exclusion based on compliance with international standard and norms Positive screening ESG Integration Integration of ESG criteria to classic Financial analysis Best-in-Class Selection or Weighting of stocks according to ESG criteria Active Investment Themed Funds Funds with a theme focused on Sustainability , e.g. Green energy, Health, etc. Engagement Voting Active Ownership through share voting on ESG topics Impact Investment Investing for a clear ESG impact e.g. Microfinance, local business funds, etc...
https://www.researchgate.net/publication/279239598_ESG_Impact_on_Market_Performance_of_Firms_International_Evidence
CC-MAIN-2022-27
refinedweb
14,609
54.02
This Article is about the Python Tkinter Scale, what it is and how to use it. What is the Python Tkinter Scale? The Python Tkinter Scale widget is used to implement a graphical slider to the User interface giving the user the option of picking through a range of values. The Maximum and minimum values on the Scale can be set the programmer. Options Creating Tkinter Scales Example 1 Here we have created two Tkinter scales, with different orientations. The first is by default VERTICAL, and we have set the second to HORIZONTAL. We defined the range of the scales from 0 to 10 by setting these values in the from and to options respectively. from tkinter import * root = Tk() root.geometry("200x200") frame = Frame(root) frame.pack() Scala = Scale(frame, from_=0, to=10) Scala.pack(padx=5, pady=5) Scala2 = Scale(frame, from_=0, to=10, orient=HORIZONTAL) Scala2.pack(padx=5, pady=5) root.mainloop() Example 2 The following code has two new features. For one, it has the command option linked to the function val. Because of this, anytime the value of the slider is changed, that function will be called. The value of the slider is sent as a argument to the function. Secondly, in the second Tkinter Scale we have set the resolution to 0.5. This allows us to pick a larger range of values than we can in the first Tkinter Scale. See the output to understand., resolution = 0.5, command=val, orient=HORIZONTAL) Scala2.pack(padx=5, pady=5) root.mainloop() This image was taken side by side the Standard Python IDE. You can see the output that is a result of us moving the slider. Example 3 Sometimes you may want your scale to be labelled. Which is where the tick interval comes in. Setting it to 1, creates intervals of 1, in the range 0 to 10. Make sure that the length of your Scale is large enough to hold that much text, else it will appear all jumbled up together. We’re also going to decrease the slider length, because it’s default size is pretty big., length = 200, tickinterval = 1, command=val, orient=HORIZONTAL, sliderlength = 15) Scala2.pack(padx=5, pady=5) root.mainloop() Video Code The Code from our Video on Tkinter Scale Widget on our YouTube Channel for CodersLegacy. import tkinter as tk class Window: def __init__(self, master): self.master = root # Frame self.frame = tk.Frame(self.master, width = 300, height = 200) self.frame.pack() # Scale self.scale = tk.Scale(self.frame, from_ = 0, to = 10, orient = tk.HORIZONTAL, command = self.ret, resolution = 1, digit = 2, tickinterval = 1, length = 200, sliderlength = 20, label = "My Scale", showvalue = 0, troughcolor = "blue") self.scale.place(x = 30, y= 30) # Button self.button = tk.Button(self.frame, text = "DISABLE the Scale", command = self.disable) self.button.place(x = 30, y = 100) def disable(self): self.scale.config(state = tk.DISABLED, troughcolor = "grey") def ret(self, value): print(value) root = tk.Tk() window = Window(root) root.mainloop() This marks the end of the Python Tkinter Scale page. You can head back to the main Tkinter article using this link to learn about other widgets. Any contributions or suggestions you may have are more than welcome. Feel free to ask any questions in the comments below.
https://coderslegacy.com/python/python-gui/python-tkinter-scale/
CC-MAIN-2022-40
refinedweb
556
61.02
1234567891011121314151617181920 #include <fstream> ///header file for ifstream and ofstream #include <iostream> using namespace std; main(){ int x, y,z; ifstream in("file.txt"); ///gets input from file.txt ( for other files, just type /// the filename inside the "", "in" is just a word ///used as a substitute for "cin". you can use /// other words so long as it isnt a reserved word. ofstream out("out.txt"); ///outputs to another .txt file in>>x>>y>>z; ///gets 3 inputs in file.txt. we used "in" because ///thats the variable we used in getting file.txt out<<x<<y<<z; ///outputs the 3 inputs from file.txt to out.txt return 0; }
http://www.cplusplus.com/forum/beginner/115444/
CC-MAIN-2017-34
refinedweb
109
78.96
Since this is my first real compiler, I wanted to start off with a simple language. So, I created a simple esoteric programming language (its not turing complete though) that was inspired by Fortran and BrainF*ck. Lets take the following VB: Public Class App Public Shared Sub Main() Dim x As Integer = 5 Dim y As Integer() = {1,2,3,4,...} '1 through 10 For Each num As Integer in y Dim result As Integer = 2+(x*num) Console.Writeline(result.ToString()) Next End Sub End Class If I wanted to write that in Mizu, it would go something like this: x`5|y`[1..11]|?z:2+(x*y)|.z Yes, I know this language is not practical, but the point is... I made a compiler. The compiler even emits debugging information so you can debug your exe via VS: Now, how I generate IL and the executable is simple. I use the System.Reflection.Emit namespace. I used a tool called TinyPG to generate my scanner/parser combo. I used the tool called Peverify (included with VS) to verify my IL. Let me know what you think or if you have any questions. You can find the source code here. Oh and I plan on making this into a tutorial. More information is on the README. This post has been edited by Amrykid: 05 September 2011 - 01:01 PM
http://www.dreamincode.net/forums/topic/243944-project-mizu-concept-programming-languages-with-a-net-compiler/page__p__1414457
CC-MAIN-2016-18
refinedweb
232
75.1
PostgresDoc is a simple F# library for working with document data in Postgresql. Recently, I have been experimenting with ways to use it from C#. Using an F# Library from C# It is certainly possible to use an F# library from C#, but the syntax can be difficult. To ease the pain I experimented with ways to make the API more C# friendly, and ultimately gave up. Wrapping an F# Library for C# consumers The approach that ultimately worked for me was to create a new C# project that wraps the F# version of PostgresDoc and provides an API that is optimised for C#. The unit of work is represented by a Queue. New operations are added via the Enqueue method, and created via static factory methods on the Operation class, like so: unitOfWork.Enqueue(Operation.Insert(ernesto._id, ernesto)); The PostgresDocCs C# API Here is a simple example of working with a document from C#: public class Person { public Guid _id { get; set; } public string Name { get; set; } public int Age { get; set; } public string[] FavouriteThings { get; set; } } var ernesto = new Person { _id = Guid.NewGuid(), Name = "Ernesto", Age = 31, FavouriteThings = new[] { "Pistachio Ice Cream", "Postgresql", "F#" } }; var connString = "Server=127.0.0.1;Port=5432;User Id=******;Password=*****;Database=testo;"; var unitOfWork = new Queue<Operation<Guid>>(); // insert a document unitOfWork.Enqueue(Operation.Insert(ernesto._id, ernesto)); // modify a document ernesto.Age = 32; unitOfWork.Enqueue(Do.Update(ernesto._id, ernesto)); // persist the changes in a transaction UnitOfWork.Commit(connString, unitOfWork) Querying var ernesto = Query<Person>.For( connString, "select data from Person where id = :id", new Dictionary<string, object> { {"id", ernesto._id} });
https://www.withouttheloop.com/articles/2014-10-05-postgresdoc-csharp/
CC-MAIN-2022-27
refinedweb
271
55.54
Colin has a nice little quiz about enumeration on his blog. Basically he asks, how would you implement a class to enumerate through all the letters of the alphabet. Below is my "cute" response. using System; using System.Collections; public class Alphabet : IEnumerable { public IEnumerator GetEnumerator() { return "abcdefghijklmnopqrstuvwxyz".GetEnumerator(); } } Now if you compile my answer and run it, it seems to answer the question correctly (for an academic quiz), but it's completely wrong for a real world developer. The right answer is "Well, which alphabet or alphabets must I support? Does it need to be localizable based on the current locale?". Yes my friends, the answer is to gather more requirements. Make sure you really understand the problem domain. This is why software isn't as easy as "well I want it to do this so just do it." This quiz asks what seems to be a very straightforward question. If you as a developer gave me the solution I wrote above, I'd be pretty pissed as a client if I was ready to deploy this to Korea....
http://haacked.com/archive/2005/01/25/c-net-quizzes.aspx
CC-MAIN-2013-20
refinedweb
180
66.23
Pandas: Indexing by Time Pandas Time Series: Exercise-7 with Solution Write a Pandas program to create a time series object that has time indexed data. Also select the dates of same year and select the dates between certain dates. Sample Solution: Python Code : import pandas as pd index = pd.DatetimeIndex(['2011-09-02', '2012-08-04', '2015-09-03', '2010-08-04', '2015-03-03', '2011-08-04', '2015-04-03', '2012-08-04']) s_dates = pd.Series([0, 1, 2, 3, 4, 5, 6, 7], index=index) print("Time series object with indexed data:") print(s_dates) print("\nDates of same year:") print(s_dates['2015']) print("\nDates between 2012-01-01 and 2012-12-31") print(s_dates['2012-01-01':'2012-12-31']) Sample Output: Time series object with indexed data: 2011-09-02 0 2012-08-04 1 2015-09-03 2 2010-08-04 3 2015-03-03 4 2011-08-04 5 2015-04-03 6 2012-08-04 7 dtype: int64 Dates of same year: 2015-09-03 2 2015-03-03 4 2015-04-03 6 dtype: int64 Dates between 2012-01-01 and 2012-12-31 2012-08-04 1 2012-08-04 7 dtype: int64 Python Code Editor: Have another way to solve this solution? Contribute your code (and comments) through Disqus. Previous: Write a Pandas program to create a time-series from a given list of dates as strings. Next: Write a Pandas program to create a date range using a startpoint date and a number of
https://www.w3resource.com/python-exercises/pandas/time-series/pandas-time-series-exercise-7.php
CC-MAIN-2021-21
refinedweb
255
64.95
Have you built a new Windows Server 2012 or Windows 8 computer or virtual machine only to find out that the Microsoft Dynamics CRM 2011 SDK managed code samples no longer compile? You may get build errors similar to the following: ‘Microsoft.IdentityModel.Protocols.WSTrust.RequestSecurityTokenResponse’ does not contain a definition for… Could not resolve this reference. Could not locate the assembly “Microsoft.IdentityModel” At run time, you would see this error: System.IO.FileNotFoundException was unhandled by user code HResult=-2147024894 Message=Could not load file or assembly ‘Microsoft.IdentityModel, … This is a known problem and has to do with changes in Windows Identity Foundation (WIF). When Microsoft updated WIF 3.5 to the latest WIF 4.5 there was a change in the identity namespace name, and various method changes that are used by the Dynamics CRM SDK samples. The good news is that there are easy fixes you can apply to build the SDK samples. On your Windows Server 2012 or Windows 8 computer, run a Command Prompt window or PowerShell window as administrator. Next, enter the following command to enable WIF 3.5. dism /online /enable-feature:windows-identity-foundation Similarly, you can disable WIF 3.5 using the following command. dism /online /disable-feature:windows-identity-foundation Notice that you are not downloading and installing the WIF 3.5 SDK as was documented in the 2011 SDK. Those instructions do not apply to Windows Server 2012 and Windows 8. After you do this, most of the managed code samples in the SDK should compile and run. However, the Windows Azure code samples located in the SampleCode\CS|VB\Azure folder of the SDK download need a little attention of their own. After you install the required Azure SDK 1.8 or later on your computer or VM as instructed by the SDK documentation, you must remove and re-add the Microsoft.ServiceBus.dll assembly reference in each listener application’s project. The Windows Azure samples should now build. The QueuedListener sample will compile with warnings because it uses the now obsolete .NET classes. The provided PersistentQueueListener sample is an updated version of that same sample. If you want to read about the changes in the identity namespace from WIF 3.5 to WIF 4.5 and the identity coding changes that will be required to move your Dynamics CRM SDK-based application code to .NET 4.5 at some future time, see Guidelines for Migrating an Application Built Using WIF 3.5 to WIF 4.5. Microsoft Dynamics CRM SDK team I think this could be an article in Wiki to help people better. Nice article !!! Excellent one !!!
https://blogs.msdn.microsoft.com/crm/2013/04/10/how-to-build-and-run-the-dynamics-crm-sdk-samples-on-windows-server-2012-and-windows-8/
CC-MAIN-2017-17
refinedweb
443
50.12
To view parent comment, click here. To read all comments associated with this story, please click here. You do realise that PHP is being used in some of the biggest websites in thw world (Yahoo, Facebook, and many many others) don't you? And these organizations hire elite software engineers, who are usually given carte blanche to choose the language/framework/platform to build whatever offering they have, and make it work, and be competitive, and present a compelling product. And quite often, the choice is PHP, for various reasons. In fact, a few years back there was a long online article that presented the process Yahoo engineers went through in choosing a scripting language to replace their previous in-house proprietary scripting language (which was getting unwieldly to maintain), and why they chose PHP. Of course, PHP has it's warts, lack of proper namespacing is one of them (until recently), just to name one. But guess what - it works, and enables people to create great websites. Personally, if I were implementing a greenfield website, I would take a long look at the following: Rails Django Grails CakePHP ... and others. I would honestly look at all the plusses and minuses of each, including the language itself. But I would certainly not take an elitist stance and automatically dismiss one or the other due to trolling I read on message boards. Member since: 2005-07-24 ... ...take a look at CI () and at least give it a fair review before making statements... Fine with me. Whatever you say. In the end, It's probably good that so many people are still clinging to PHP. It gives people who don't just stick to the first thing they learned a well deserved edge. Building a house (framework) on top of a poor foundation doesn't change the poor foundation. PHP's supposed "object orientation" was bolted on in 5.0. Its namespace support was bolted on in *this* release. It's 2008, and namespaces are *new* in this release of PHP (if you can believe it). Until now, *everything* has lived in the (one and only) global namespace. How can anyone who has worked in anything else call that a real language? PHP, an acronym for Personal Home Page, was never designed for the kinds of applications that are common today. Languages that were designed with larger projects in mind, and have the required features built into their foundations, rather that attached with sheet metal screws, are simply better suited to today's web. I'd be interested in the details of your web development experiences in other languages and frameworks. Java/Tapestry? Python/Django? Ruby/Rails? Perl/Catalyst? Others? Compare and contrast them with your PHP/Codeigniter experiences? You do have actual web development experience with languages and frameworks other than PHP ones, right? Edited 2008-12-22 15:57 UTC
http://www.osnews.com/thread?341051
CC-MAIN-2018-43
refinedweb
481
63.9
Hello all👋 I hope you are doing well. This is going to be a short introductory article about the most useful package in Java i.e., java.util package. Let's begin... Let's first understand package What is a package? In short a Java package is collection of similar type of classes. A Package can be defined as a collection of similar types of classes, interfaces and sub-packages in the form of directory structure. You can read more about packages in one of my article here. java.util The basic utility classes required to a programmer are present in this package. It contains the collections framework, legacy collection classes, event model, date and time facilities, internationalization, and miscellaneous utility classes (a string tokenizer, a random-number generator, and a bit array). To use any class you have to import java.util package at top of the program:- import java.util.*; or import java.util.Class_name; To make it easy let's take an example, let's suppose you want to print date and time in your program you will need to import java.util package. import java.util.Date; //or //import java.util.*; public class Demo { public static void main(String[] args) { Date date = new Date(); System.out.println("The date is : " + date); } } You can run your code online here What is use of java.util package? - For Java collections. - For random number generation. - For Calendar. - For string parsing. - For internationalization support by using the internationalization supported classes from java.util package (Locale). Some important and generally used classes Some important and generally used classes and interfaces which are present inside the java.util package are:- - Arrays :- This class contains various methods for manipulating arrays. - ArrayList :- This class is resizable-array implementation of the List interface. - Collections :- This class consists exclusively of static methods that operate on or return collections. - Date :- This class represents a specific instant in time, with millisecond precision. - EventObject :- This class is the root class from which all event state objects shall be derived. - Formatter :- An interpreter for printf-style format strings. - HashMap :- The HashMap class Hash table based implementation of the Map interface. - HashSet :- The HashSet class implements the Set interface, backed by a hash table (actually a HashMap instance). - HashTable :- The HashTable class implements a hash table, which maps keys to values. - LinkedList :- The LinkedList class Doubly-linked list implementation of the List and Deque interfaces. - Locale :- A Locale object represents a specific geographical, political, or cultural region. - Objects :- This class consists of static utility methods for operating on objects. - Random :- An instance of this class is used to generate a stream of pseudorandom numbers. - Scanner :- A simple text scanner which can parse primitive types and strings using regular expressions. (Read more) -. - TreeMap :- The TreeMap class A Red-Black tree based NavigableMap implementation. - TreeSet :- The TreeSet class A NavigableSet implementation based on a TreeMap. Resources- Documentation || Tutorial Discussion (0)
https://practicaldev-herokuapp-com.global.ssl.fastly.net/ritvikdubey27/introduction-to-java-util-package-7d5
CC-MAIN-2021-43
refinedweb
487
50.73
paramesh Evolution Platform Developer Build (Build: 5.6.50428.7875)2005-06-12T23:15:00ZHyderabad Happenings<P><FONT face=Tahoma color=#000000 size=2><SPAN style="FONT-SIZE: 10pt; FONT-FAMILY: Tahoma">I). </SPAN></FONT></P> <P><FONT face=Tahoma color=#000000 size=2><SPAN style="FONT-SIZE: 10pt; FONT-FAMILY: Tahoma">So, our commitments to TechEd 2005, <?xml:namespace prefix = st1<st1:country-region w:India</st1:country-region> and <st1:place w:Europe</st1:place>.</SPAN></FONT></P> <P><FONT color=#000000><FONT face=Tahoma size=2><SPAN style="FONT-SIZE: 10pt; FONT-FAMILY: Tahoma">Both VJ# and the Java Language Conversion Assistant are pretty much done, save for the occasional corner case bug that is reported. The team is putting its final touches on the products. As you may have read on MSDN, in VS 2005, VJ# includes <SPAN style="COLOR: black". </SPAN></SPAN></FONT></FONT></P><FONT color=#000000><FONT face=Tahoma size=2><SPAN style="FONT-SIZE: 10pt; FONT-FAMILY: Tahoma"><SPAN style="COLOR: black"></SPAN></SPAN></FONT><?xml:namespace prefix = o<o:p> <P><FONT face=Tahoma color=#000000 size=2><SPAN style="FONT-SIZE: 10pt; FONT-FAMILY: Tahoma">And while all of this is going on, I have developed a new interest. Solving Su DoKu puzzles. Actually, I can better characterize myself and call out that this has become a craze for me. Su DoKu has become a phenomenon in India, what with almost every newspaper publishing a puzzle every day. I try to solve the puzzles in the Times of UK, as well. They have some good ones, there. I believe that the minimum number of populated entries for a 9*9 puzzle, to be able to solve it is 19. Is this true? </SPAN></FONT></P></o:p></FONT> <P><FONT face=Tahoma color=#000000 size=2><SPAN style="FONT-SIZE: 10pt; COLOR: black; FONT-FAMILY: Tahoma". </SPAN></FONT><o:p></o:p></P> <P><FONT face=Tahoma color=#000000 size=2><SPAN style="FONT-SIZE: 10pt; COLOR: black; FONT-FAMILY: Tahoma". </SPAN></FONT><o:p></o:p></P> <P><FONT face=Tahoma color=#000000 size=2><SPAN style="FONT-SIZE: 10pt; FONT-FAMILY: Tahoma". </SPAN></FONT></P><div style="clear:both;"></div><img src="" width="1" height="1">Paramesh.V Ed, 2005, Bangalore and VSTS<P>I.</P> <P>The overall feedback and feeling seems that productivity of software teams will be significantly positively impacted by VSTS. This is exciting for our customers, Microsoft and of course, the teams that are working on VSTS. Exciting times ahead!!</P><div style="clear:both;"></div><img src="" width="1" height="1">Paramesh.V Tools, India<P>Hello, there! I work out of Microsoft's India Development Center at Hyderabad, India. I am the Director of the Developer Tools group, which is part of the Developer Division, home to Visual Studio and the .NET framework. I moved back to India after a long stint in Redmond, for family reasons, in 2001. Although most of my career at Microsoft has been on operating systems, I took the plunge into the developer tools arena in late 2002. I should confide that I was nervous about a large change like this, but I have been having a ton of fun.</P> <P>My original responsibility in the Developer world was to manage the Visual J# effort. You may know that Visual J#, that ships as one of the 4 languages with Visual Studio, was built from scratch out of Microsoft's India Development Center. Visual J# is a tool that Java-language programmers can use to build applications and services to run on the .NET Framework. Visual J# targets the common language runtime and can be used to develop .NET applications, including XML Web services and Web applications, making full use of the .NET Framework In addition to Visual J#, I also own the Java Language Conversion Assistant tool, that also ships as part of Visual Studio. This tool helps convert Java applications to C# and .NET.</P> <P>A big part of my charter now includes components that ship as part of the new Visual Studio Team System (VSTS). VSTS will make its debut with Visual Studio 2005 later this year. My team is building some key technologies that ship with the server components of VSTS (called the Team Foundation Server). Team Build, which is basically a "Build in a Box" is one of the significant pieces that we are creating out of my team. The intent of Team Build is to help customers establish a build lab without going through the process of writing a bunch of custom scripts. A lot of information gets generated as part of the build process that touches all the different tools we are providing. The intent is to unite all the components to add value to the suite. We are also building conversion tools to migrate existing source code and work item tracking software to the new generation source code control system and work item tracking software that ship with VSTS. </P> <P><SPAN>Overall, I am super excited to be part of the effort to build cool technologies that reach out and benefit millions of developers, testers, project managers and architects, worldwide.</SPAN></P><div style="clear:both;"></div><img src="" width="1" height="1">Paramesh.V
http://blogs.msdn.com/b/paramesh/atom.aspx
CC-MAIN-2016-26
refinedweb
890
56.35
The QDropEvent class provides an event which is sent when a drag and drop action is completed. More... #include <QDropEvent> Inherits QEvent and QMimeSource. Inherited by QDragMoveEvent. required drop action is different to the proposed action, you can call setDropAction(). Sets the drop action to be the proposed action. See also setDropAction(), proposedAction(), and accept(). Returns the action that the target is expected to perform on the data. If your application understands the action and can process the supplied data, call acceptAction(); if your application can process the supplied data but can only perform the Copy action, call accept().().. See also dropAction().().
http://doc.trolltech.com/4.0/qdropevent.html
crawl-001
refinedweb
102
68.47
B-Tree. B-Trees. a specialized multi-way tree designed especially for use on disk In a B-tree each node may contain a large number of keys. The number of subtrees of each node, then, may also-Tree 1. Every node has at most m children. 2. Every node (except root and leaves) has at least ceil(m⁄2) children. 3. The root has at least two children if it is not a leaf node. 4. All leaves appear in the same level, and carry information. 5. A non-leaf node with k children contains k–1 key 6. Each leaf node (other than the root node if it is a leaf) must contain at least ceil(m / 2) - 1 keys 7. Keys and subtrees are arranged in the fashion of search tree 1. the element in an internal node may be a separator for its child nodes 2. deleting an element may put it under the minimum number of elements and children Additional changes -- Rebalancing after deletion *. Delete H 2-3 B-Trees or simply referred as 2-3 tree Properties • trinary tree - 3 or fewer children per node • each node is either a 2-node or 3-node (subtree count) • 2-nodes contain 1 value and 3-nodes contain 2 sorted • BST property holds for node content & left, mid, right subtrees • all leaves have same level public class TwoThreeTree<Content> { private boolean is2node; private Content smallContent; private Content bigContent; private TwoThreeTree<Content> left; private TwoThreeTree<Content> mid; private TwoThreeTree<Content> right; private TwoThreeTree<Content> parent; ... } 2-3 Tree Implementation Ways to improve a B-tree •keep all values in the leaves •form a linked list of leaf nodes B+-Tree How do these modifications change the performance of ...a search? ...an insertion or removal?
http://www.slideserve.com/matia/b-tree
CC-MAIN-2017-04
refinedweb
297
68.7
SYNOPSIS #include <Xm/Text.h> Boolean XmTextCopyLink( Widget widget, Time time); DESCRIPTION XmText widget itself does not copy any links; XmNconvertCallback procedures are responsible for copying the link to the clipboard and for taking any related actions. - widget - Specifies the Text widget ID. - time - Specifies the time of the transfer. This should be the time of the event which triggered this request. One source of a valid time stamp is the function XtLastTimestampProcessed. For a complete definition of Text and its associated resources, see XmText(3). RETURN This function returns False if the primary selection is NULL, if the widget does not own the primary selection, if the function is unable to gain ownership of the clipboard selection, or if no data is placed on the clipboard. Otherwise, it returns True.
https://manpages.org/xmtextcopylink/3
CC-MAIN-2022-33
refinedweb
131
57.06
' }, ], ); => ':' }, id_generator => '-uuid', ); show properties Thing with the caveat that "currently available" means you need to be under a namespace directory that contains the class you're describing... __errors__() on the object, and indirectly when data is committed back to its data source.. Besides property definitions, there are other things that can be specified in a class definition.' A single string to list some short, useful documentation about the class.". sav', default_value => 'No one' }, ], }; ..: A reference to a subroutine. In this case, resolve_path_with is a synonym for file_resolver. The subref will be called to resolve the path. Its arguments will be taken from the values in the rule from properties mentioned. ) UR::Object::Type, UR::Object::Property, UR::Manual::Cookbook
http://search.cpan.org/~brummett/UR-0.392/lib/UR/Object/Type/Initializer.pod
CC-MAIN-2016-26
refinedweb
119
51.65
Using XEP Event Persistence XEP provides extremely rapid storage and retrieval of .NET attributes used to analyze a .NET .NET .NET .NET class and import a schema, which defines how the data structure of a .NET .NET class structure. If structural information must be preserved, the full schema model may be used. This preserves the full .NET inheritance structure by creating a one-to-one relationship between .NET >. String arguments for namespace, username, password, and establishes a connection to the specified InterSystems IRIS namespace. The following example establishes a connection: // Open a connection string host = "127.0.0.1"; int port = 51774; the InterSystems Managed Provider for .NET). Always call Close() on an instance of EventPersister before it goes out of scope to ensure that all locks, licenses, and other resources associated with the connection are released. Importing a Schema Before an instance of a .NET .NET .NET class and import a schema of the desired type: EventPersister.ImportSchema() — imports a flat schema. Takes an argument specifying a .dll .NET namespace test are to be imported: namespace test {) {Console.WriteLine( .NET .++; } Console.WriteLine("Stored " + itemCount + " of " + eventItems.Length + " events"); newEvent.Close(); } catch (XEPException e) { Console.WriteLine(associated) {Console.WriteLine("Failed to process event:\n" + e);} } Console.WriteLine("Updated " + itemCount + " of " + itemIdList.Length + " events"); newEvent.Close(); } catch (XEPException e) {Console.WriteLine( “XEP Sample Applications” for information on the sample programs that define and use the SingleStringSample class. “Simple Applications to Store and Query Persistent Events” for an example of how this is done. .NET .NET class. The following EventQuery<T> methods define and execute the query: AddParameter() — binds a parameter for the SQL query associated with this EventQuery<T>. Takes Object value as the argument specifying the value to bind to the >.Add.(); } simple numeric types and their associated System types, strings, and enumerations. collection classes. .NET Attributes — XEP attributes can be added to a .NET .NET classes are mapped to InterSystems IRIS event schemas. Schema Import Models XEP provides two different schema import models: flat schema and full schema. The main difference between these models is the way in which .NET .NET .NET source classes and InterSystems IRIS projected classes, so the .NET class inheritance structure is preserved. Full object projection preserves the inheritance structure of the original .NET []{, or long, or their corresponding System types.. Sample programs IdKeyTest and FlightLog provide demonstrations of IdKey usage (see “XEP Sample Applications” for details about the sample programs). Intersystems.XEP.InterfaceResolver to resolve specific interface types during processing. InterfaceResolver is only relevant for the flat schema import model, which does not preserve the .NET class inheritance structure. The full schema import model establishes a one-to-one relationship between .NET) {Console.WriteLine(:. Naming Conventions Corresponding InterSystems IRIS class and property names are identical to those in .NET, with the exception of two special characters allowed in .NET will receive global name xep.samples.SingleStrinA5BFD.
https://docs.intersystems.com/irisforhealthlatest/csp/docbook/DocBook.UI.Page.cls?KEY=BNETXEP_XEP
CC-MAIN-2021-10
refinedweb
482
52.56
User Datagram Client and Server¶ The user datagram protocol (UDP) works differently from TCP/IP. Where TCP is a stream oriented protocol, ensuring that all of the data is transmitted in the right order, UDP is a message oriented protocol. UDP does not require a long-lived connection, so setting up a UDP socket is a little simpler. On the other hand, UDP messages must fit within a single packet (for IPv4, that means they can only hold 65,507 bytes because the 65,535 byte packet also includes header information) and delivery is not guaranteed as it is with TCP. Echo Server¶ Since there is no connection, per se, the server does not need to listen for and accept connections. It only needs to use bind() to associate its socket with a port, and then wait for individual messages. import socket import sys # Create a TCP/IP socket sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) # Bind the socket to the port server_address = ('localhost', 10000) print >>sys.stderr, 'starting up on %s port %s' % server_address sock.bind(server_address) Messages are read from the socket using recvfrom(), which returns the data as well as the address of the client from which it was sent. while True: print >>sys.stderr, '\nwaiting to receive message' data, address = sock.recvfrom(4096) print >>sys.stderr, 'received %s bytes from %s' % (len(data), address) print >>sys.stderr, data if data: sent = sock.sendto(data, address) print >>sys.stderr, 'sent %s bytes back to %s' % (sent, address) Echo Client¶ The UDP echo client is similar the server, but does not use bind() to attach its socket to an address. It uses sendto() to deliver its message directly to the server, and recvfrom() to receive the response. import socket import sys # Create a UDP socket sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) server_address = ('localhost', 10000) message = 'This is the message. It will be repeated.' try: # Send data print >>sys.stderr, 'sending "%s"' % message sent = sock.sendto(message, server_address) # Receive response print >>sys.stderr, 'waiting to receive' data, server = sock.recvfrom(4096) print >>sys.stderr, 'received "%s"' % data finally: print >>sys.stderr, 'closing socket' sock.close() Client and Server Together¶ Running the server produces: $ python ./socket_echo_server_dgram.py starting up on localhost port 10000 waiting to receive message received 42 bytes from ('127.0.0.1', 50139) This is the message. It will be repeated. sent 42 bytes back to ('127.0.0.1', 50139) waiting to receive message and the client output is: $ python ./socket_echo_client_dgram.py sending "This is the message. It will be repeated." waiting to receive received "This is the message. It will be repeated." closing socket $
https://pymotw.com/2/socket/udp.html
CC-MAIN-2018-47
refinedweb
440
60.82
Tables present information in orderly rows and columns. This is useful for presenting financial figures or representing data from a relational database. Like trees, tables in Swing are incredibly powerful and customizable. If you go with the default options, they're also pretty easy to use. The JTable class represents a visual table component. A JTable is based on a TableModel, one of a dozen or so supporting interfaces and classes in the javax.swing.table package. JTable has one constructor that creates a default table model for you from arrays of data. You just need to supply it with the names of your column headers and a 2D array of Objects representing the table's data. The first index selects the table's row; the second index selects the column. The following example shows how easy it is to get going with tables using this constructor: //file: DullShipTable.java import java.awt.*; import java.awt.event.*; import javax.swing.*; import javax.swing.table.*; public class DullShipTable { public static void main(String[] args) { // create some tabular data String[] headings = new String[] {"Number", "Hot?", "Origin", "Destination", "Ship Date", "Weight" };) } }; // create the data model and the JTable JTable table = new JTable(data, headings); JFrame frame = new JFrame("DullShipTable v1.0"); frame.getContentPane( ).add(new JScrollPane(table)); frame.setDefaultCloseOperation( JFrame.EXIT_ON_CLOSE ); frame.setSize(500, 200); frame.setVisible(true); } } This small application produces the display shown in Figure 18-7. For very little typing, we've gotten some pretty impressive stuff. Here are a few things that come for free: Column headings The JTable has automatically formatted the column headings differently than the table cells. It's clear that they are not part of the table's data area. Cell overflow If a cell's data is too long to fit in the cell, it is automatically truncated and shown with an ellipses (...). This is shown in the Origin cell in the second row in Figure 18-7. Row selection You can click on any cell in the table to select its entire row. This behavior is controllable; you can select single cells, entire rows, entire columns, or some combination of these. To configure the JTable's selection behavior, use the setCellSelectionEnabled( ), setColumnSelectionAllowed( ), and setRowSelec-tionAllowed( ) methods. Cell editing Double-clicking on a cell opens it for editing; you'll get a little cursor in the cell. You can type directly into the cell to change the cell's data. Column sizing If you position the mouse cursor between two column headings, you'll get a little left-right arrow cursor. Click and drag to change the size of the column to the left. Depending on how the JTable is configured, the other columns may also change size. The resizing behavior is controlled with the setAutoResizeMode( ) method. Column reordering If you click and drag on a column heading, you can move the entire column to another part of the table. Play with this for a while. It's fun. JTable is a very powerful component. You get a lot of very nice behavior for free. However, the default settings are not quite what we wanted for this simple example. In particular, we intended the table entries to be read-only; they should not be editable. Also, we'd like entries in the Hot? column to be checkboxes instead of words. Finally, it would be nice if the Weight column were formatted appropriately for numbers rather than for text. To achieve more flexibility with JTable, we'll write our own data model by implementing the TableModel interface. Fortunately, Swing makes this easy by supplying a class that does most of the work, AbstractTableModel. To create a table model, we'll just subclass AbstractTableModel and override whatever behavior we want to change. At a minimum, all AbstractTableModel subclasses have to define the following three methods: public int getRowCount( ) public int getColumnCount( ) Returns the number of rows and columns in this data model public Object getValueAt(int row, int column) Returns the value for the given cell When the JTable needs data values, it calls the getValueAt( ) method in the table model. To get an idea of the total size of the table, JTable calls the getrowCount( ) and getColumnCount( ) methods in the table model. A very simple table model looks like this: public static class ShipTableModel extends AbstractTableModel {]; } } We'd like to use the same column headings we used in the previous example. The table model supplies these through a method called getColumnName( ). We could add column headings to our simple table model like this: private String[] headings = new String[] { "Number", "Hot?", "Origin", "Destination", "Ship Date", "Weight" }; public String getColumnName(int column) { return headings[column]; } By default, AbstractTableModel makes all its cells noneditable, which is what we wanted. No changes need to be made for this. The final modification is to have the Hot? column and the Weight column formatted specially. To do this, we give our table model some knowledge about the column types. JTable automatically generates checkbox cells for Boolean column types and specially formatted number cells for Number types. To give the table model some intelligence about its column types, we override the getColumnClass( ) method. The JTable calls this method to determine the data type of each column. It may then represent the data in a special way. This table model returns the class of the item in the first row of its data: public Class getColumnClass(int column) { return data[0][column].getClass( ); } That's really all there is to do. The following complete example illustrates how you can use your own table model to create a JTable using the techniques just described: //file: ShipTable.java import java.awt.*; import java.awt.event.*; import javax.swing.*; import javax.swing.table.*; public class ShipTable { public static class ShipTableModel extends AbstractTableModel { private String[] headings = new String[] { "Number", "Hot?", "Origin", "Destination", "Ship Date", "Weight" };]; } public String getColumnName(int column) { return headings[column]; } public Class getColumnClass(int column) { return data[0][column].getClass( ); } } public static void main(String[] args) { // create the data model and the JTable TableModel model = new ShipTableModel( ); JTable table = new JTable(model); table.setAutoResizeMode(JTable.AUTO_RESIZE_OFF); JFrame frame = new JFrame("ShipTable v1.0"); frame.getContentPane( ).add(new JScrollPane(table)); frame.setDefaultCloseOperation( JFrame.EXIT_ON_CLOSE ); frame.setSize(500, 200); frame.setVisible(true); } } The running application is shown in Figure 18-8. To illustrate just how powerful and flexible the separation of the data model from the GUI can be, we'll show a more complex model. In the following example, we'll implement a very slim but functional spreadsheet (see Figure 18-9) using almost no customization of the JTable. All of the data processing is in a TableModel called SpreadSheetModel. Our spreadsheet does the expected stuffallowing you to enter numbers or mathematical expressions such as (A1*B2)+C3 into each cell.[1] All cell editing and updating is driven by the standard JTable. We implement the methods necessary to set and retrieve cell data. Of course, we don't do any real validation here, so it's easy to break our table. (For example, there is no check for circular dependencies, which may be undesirable.) [1] You may need to double-click on a cell to edit it. As you will see, the bulk of the code in this example is in the inner class used to parse the value of the equations in the cells. If you don't find this part interesting, you might want to skip ahead. But if you have never seen an example of this kind of parsing before, we think you will find it to be very cool. Through the magic of recursion and Java's powerful String manipulation, it takes us only about 50 lines of code to implement a parser capable of handling basic arithmetic with arbitrarily nested parentheses. Here's the code: //file: SpreadsheetModel.java import java.util.StringTokenizer; import javax.swing.*; import javax.swing.table.AbstractTableModel; import java.awt.event.*; public class SpreadsheetModel extends AbstractTableModel { Expression [][] data; public SpreadsheetModel( int rows, int cols ) { data = new Expression [rows][cols]; } public void setValueAt(Object value, int row, int col) { data[row][col] = new Expression( (String)value ); fireTableDataChanged( ); } public Object getValueAt( int row, int col ) { if ( data[row][col] != null ) try { return data[row][col].eval( ) + ""; } catch ( BadExpression e ) { return "Error"; } return ""; } public int getRowCount( ) { return data.length; } public int getColumnCount( ) { return data[0].length; } public boolean isCellEditable(int row, int col) { return true; } class Expression { String text; StringTokenizer tokens; String token; Expression( String text ) { this.text = text.trim( ); } float eval( ) throws BadExpression { tokens = new StringTokenizer( text, " */+-( )", true ); try { return sum( ); } catch ( Exception e ) { throw new BadExpression( ); } } private float sum( ) { float value = term( ); while( more( ) && match("+-") ) if ( match("+") ) { consume( ); value = value + term( ); } else { consume( ); value = value - term( ); } return value; } private float term( ) { float value = element( ); while( more( ) && match( "*/") ) if ( match("*") ) { consume( ); value = value * element( ); } else { consume( ); value = value / element( ); } return value; } private float element( ) { float value; if ( match( "(") ) { consume( ); value = sum( ); } else { String svalue; if ( Character.isLetter( token( ).charAt(0) ) ) { int col = findColumn( token( ).charAt(0) + "" ); int row = Character.digit( token( ).charAt(1), 10 ); svalue = (String)getValueAt( row, col ); } else svalue = token( ); value = Float.parseFloat( svalue ); } consume( ); // ")" or value token return value; } private String token( ) { if ( token == null ) while ( (token=tokens.nextToken( )).equals(" ") ); return token; } private void consume( ) { token = null; } private boolean match( String s ) { return s.indexOf( token( ) )!=-1; } private boolean more( ) { return tokens.hasMoreTokens( ); } } class BadExpression extends Exception { } public static void main( String [] args ) { JFrame frame = new JFrame("Excelsior!"); JTable table = new JTable( new SpreadsheetModel(15, 5) ); table.setPreferredScrollableViewportSize( table.getPreferredSize( ) ); table.setCellSelectionEnabled(true); frame.getContentPane( ).add( new JScrollPane( table ) ); frame.setDefaultCloseOperation( JFrame.EXIT_ON_CLOSE ); frame.pack( ); frame.show( ); } } Our model extends AbstractTableModel and overrides just a few methods. As you can see, our data is stored in a 2D array of Expression objects. The setValueAt( ) method of our model creates Expression objects from the strings typed by the user and stores them in the array. The getValueAt( ) method returns a value for a cell by calling the expression's eval( ) method. If the user enters some invalid text in a cell, a BadExpression exception is thrown, and the word "error" is placed in the cell as a value. The only other methods of TableModel we must override are getrowCount( ), getColumnCount( ), and isCellEditable( ) to determine the dimensions of the spreadsheet and to allow the user to edit the fields. That's it! The helper method findColumn( ) is inherited from the AbstractTableModel. Now on to the good stuff. We'll employ our old friend StringTokenizer to read the expression string as separate values and the mathematical symbols (+-*/( )) one by one. These tokens are then processed by the three parser methods: sum( ), term( ), and element( ). The methods call one another generally from the top down, but it might be easier to read them in reverse to see what's happening. At the bottom level, element( ) reads individual numeric values or cell namese.g., 5.0 or B2. Above that, the term( ) method operates on the values supplied by element( ) and applies any multiplication or division operations. And at the top, sum( ) operates on the values that are returned by term( ) and applies addition or subtraction to them. If the element( ) method encounters parentheses, it makes a call to sum( ) to handle the nested expression. Eventually, the nested sum returns (possibly after further recursion), and the parenthesized expression is reduced to a single value, which is returned by element( ). The magic of recursion has untangled the nesting for us. The other small piece of magic here is in the ordering of the three parser methods. Having sum( ) call term( ) and term( ) call element( ) imposes the precedence of operators; i.e., "atomic" values are parsed first (at the bottom), then multiplication, and finally, addition or subtraction. The grammar parsing relies on four simple helper methods that make the code more manageable: token( ), consume( ), match( ), and more( ). token( ) calls the string tokenizer to get the next value, and match( ) compares it with a specified value. consume( ) is used to move to the next token, and more( ) indicates when the final token has been processed. Java 5.0 introduced an API that makes it easy to print JTables. It is now so easy, in fact, that you might program it accidentally. Think we're kidding? If you accept the basic default behavior, all that is required to pop up a print dialog box and print is the following: myJTable.print( ); That's it. The default behavior scales the printed table to the width of the page. This is called "fit width" mode. You can control that setting using the PrintMode enumeration of JTable, which has values of NORMAL and FIT_WIDTH: table.print( JTable.PrintMode.NORMAL ); The "normal" (ironically, nondefault) mode will allow the table to split across multiple pages horizontally to print without sizing down. In both cases, the table rows may span multiple pages vertically. Other forms of the JTable print( ) method allow you to add header and footer text to the page and to take greater control of the printing process and attributes. We'll talk a little more about printing when we cover 2D drawing in Chapter 20.
https://flylib.com/books/en/4.122.1.154/1/
CC-MAIN-2019-43
refinedweb
2,198
56.15