text
stringlengths
454
608k
url
stringlengths
17
896
dump
stringclasses
91 values
source
stringclasses
1 value
word_count
int64
101
114k
flesch_reading_ease
float64
50
104
On 19 Apr 2005 08:31:42 +0300, Marc Girod <[EMAIL PROTECTED]> wrote: > >>>>> "KS" == Kevin Smith <[EMAIL PROTECTED]> writes: > > KS> "what's so special about files ?" where the author suggests that > KS> existing SCM systems are so blinded by the tradition of file > KS> orientation that they can't see that there might be alternatives. > > Correct: file orientation is eventually a limitation. > > But there are other dimensions to investigate in order to overcome it. > The issue is to offer a *location* for the possible versions -- not > only sequential changes but also alternatives. > > A directory may be considered as a namespace. > Note that there are other cases of 'containers': archives, packages, > libraries, etc... > Advertising Of course, it is not just SCM's that are "blinded" by file orientation - every other tool (editors, compilters, etc) that we use has this orientation. An SCM really has to have some notion of file orientation, at least at the UI level, because every other tool we use has the same orientation. The ENVY/VisualAge environments tried to work with a pure class-level orientation and in some ways that was great, but most developers hated it precisely because it removed the file orientation and hence their ability to work with their favourite tools. IBM/OTI saw the light which is why Eclipse is avowedly a file-oriented platform.... Given the purity of Linus' concept and his natural orientation towards file systems rather than SCMs, this seems like a rather natural thing to do. If anyone is planning to do this and wants a helper, count me in! jon. -- homepage: blog: - To unsubscribe from this list: send the line "unsubscribe git" in the body of a message to [EMAIL PROTECTED] More majordomo info at
https://www.mail-archive.com/git@vger.kernel.org/msg00746.html
CC-MAIN-2017-17
refinedweb
288
59.74
. Program: Consider the following example. #include class ABC { int data ; Public: void xyz (int) ; void dff (int) ; void display ( ) ; friend void pqr ( abc &); }; void abc :: xyz (int d) { data=d ; } void abc :: def (int d) { data=d ; } void abc :: display ( ) { cout< } void pqr (abc & t) { t.data=5; } void main ( ) { abc a ; a.xyz (3) ; a.display ( ) ; a.def (4) a.display ( ) ; pqr (a) ; a.display ( ); } Explanation:- → In the above program the class abc defines one private data member data and it defines three public member function xyz, def and display. → Consider the following declarations. Friend void pqr (abc &); this declarations indicate that pqr is a function that accepts alias of object of class abc and it returns nothing. → The word friend indicates that it is not a member function of class ABC. The class ABC declares it as its friend function. → The member fn xyz, def, display are called for object a. → The friend fn pqr is called and object a is passed a parameter. → The t acts as alias of object a and the value of t data i.e a data will become 5. → Even if pqr is not a member function of class ABC still it can acess private datameter data of class abc. This because class abc has declared fn pqr as its friend fn → Suppose we write a statement a.data=6 in The main fn then error will occur this is because main is number member fn of the class ABC nor a friend of class ABC. class period { int hour, min ; public: void setperiod (int, int) ; void getperiod ( ) ; void display ( ) ; friend period add ( period, period) }; void period :: setperiod (int h, m) { hour=h ; min=m ; } void period :: getperiod ( ) { cin>>hour>>min ; } void period :: display ( ) { cout<<"hour<<"hour;"< } period add (period x, period y) { period temp ; temp.hour = x.hour + y.hour ; temp.min = y.hour + y.hour ; temp.min = x.min + y.min ; if (temp.min>=60) { temp.min−=60 ; temp.hour ++ ; { return temp ; } void main ( ) { period P1,P2,P3; P1.setperiod (2,26) ; cout<<"Enter period in hrs and min=" ; P2.get period ( ); P3=add (p1+p2) ; cout<<"1st period \n" ; p1. display ( ) ; cout<<"2nd period\n' ; P2.display ( ) ; cout<<"Addition\n" ‘ P3.display ( ) ; } Explanation:- In the above program add is declared as friend function by class period Consider the statement P3=add (P1,P2); It indicates that friend function add is called and objects P1 and P2 are passed as parameters. Returned answer will be assigned to P3. Even if add is not a member function of class period. It can still access private datamember of class period i.e hour and min. This is possible only because fn add acts as friend fn of class period. Friend class: One class can act as friend class of other class. All the member fn of the friend class can access the private members of other class. Consider the following example: # include class def ; class abc ; { public: void fun 1 (def & ) ; void fun 2 (def &) ; void fun 3 (def &) ; }; class def { int data ; public: void set data (int) ; void display ( ) ; friend class abc ; }; void abc :: fun 1 (def & d) { d.data + = 5 ; } void abc :: fun 2 (def &d) { d.data *=5 ; } void abc :: fun 3 (def & d) { d.data - =5 ; } void def :: set data (int x) { data=x ; } void def :: display ( ) { cout< } void main ( ) { abc a1 ; def d1 ; d1.setdata (3) ; d1. display ( ) ; a1.fun 1 (d1) ; d1. display ( ) ; a1.fun 2 (d1) ; d1.display ( ) ; a1.fun 3 ( d1) ; d1.display ( ) ; } Explanation: → In the above program fun 1, fun 2, fun 3 are all member functions of class abc. setdata and display are member functions of class def. → Consider the declaration within the class def friend class abc; with this declaration class def declares that class abc its friend. It means that all the member fn of the class abc can access the private datameter data of class def. → a.fun 1(d1) ; The member funtn fun 1 of class abc is called for object a1 of class abc. and object d1 of class df is passed as parameter the corresponding formal alias object will be a. The value of d.data i.e d1.data will be incremented by five. Similar explanation is applicable for calls of f2 and f3. The fun 1, fun 2, fun 3 are all member fn of class abc and they can still access private datamember data of the other class def. this is possible because that class def declares class abc as its friend. Like it on Facebook, +1 on Google, Tweet it or share this article on other bookmarking websites. Download App Random Poll What is the best way to do cost cutting and do more financial saving? What is the best way to reduce cost cutting and do more financial saving? 44.78% votes 14.93% votes 26.87% votes 13.43% votes [{"id":"22826","title":"Cut down on shopping for clothes, shoes, and other useless accessories","votes":"30","type":"x","order":"1","pct":44.78,"resources":[]},{"id":"22827","title":"Cut down on buying too many food items","votes":"10","type":"x","order":"2","pct":14.93,"resources":[]},{"id":"22828","title":"Use vehicles only for going long distances, for short distances prefer walking","votes":"18","type":"x","order":"3","pct":26.87,"resources":[]},{"id":"22829","title":"Minimize using too much of cell phone, TV, internet, saves money","votes":"9","type":"x","order":"4","pct":13.43,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22"," bottom 200 Latest Articles Top reasons for divorce: Part-2 (24 Hits) No married couple wants to end up getting divorced. It is not like they have planned for it. They try to put up with their partners for as long as they How to improve digestive health (17 Hits) Due to our modern lifestyle, we feel that digestion related disorders are a common problem. Thus, we neither give importance to them nor seek any help Top reasons for divorce: Part-1 (14 Hits) The bond of marriage brings the two people together. Initially, everything may seem okay and both of them slowly start discovering each other in the journey. Related Articles RecentlyI had been to Burma now called Myanmar. A fact that stood out was that the Burmese Army had a constitutional role in the governing of the state. Life is full of ups and downs. It is never a straight line and the same applies to the life of the superstar Sridevi. The death of this actress has shocked Allauddin Khilji is an important name in Indian history. As can be seen from the map above he ruled a massive empire and his vassals extended right up Hinduism along with the Hebrew religion is the oldest among religions in the world. There is also no doubt that the reach of Hinduism was much greater Giant Size heroes of our society This is my first post on this site about humans, but all of them are superhuman size, larger than life, larger than all
https://www.boddunan.com/articles/programming/28-c-a-c/17494-friend-function-and-friend-class.html
CC-MAIN-2019-26
refinedweb
1,174
74.08
On Mon, 30 Apr 2001, Sylvain Wallez wrote: > I came to the conclusion that logicsheet dependency should be expressed > by <?xml-logicsheet?> processing instructions and not namespaces, and > Donald outlined some problems when a logicsheet like esql that generates > class-level declaration is applied more than once. Dims worked on that > to ensure that logicsheet are applied only once, but I don't know the > status of this. Dims ? as far as i've been able to tell, it works fine. i have not been able to create a situation in which the same logicsheet is applied twice, nor have i been able to envision a rational scenario in which circular dependencies are, in fact, necessary. we could certainly benefit from more people trying to break it though. :) - donald --------------------------------------------------------------------- To unsubscribe, e-mail: cocoon-dev-unsubscribe@xml.apache.org For additional commands, email: cocoon-dev-help@xml.apache.org
http://mail-archives.apache.org/mod_mbox/cocoon-dev/200104.mbox/%3CPine.LNX.4.30.0104300904090.15039-100000@localhost.localdomain%3E
CC-MAIN-2016-07
refinedweb
149
54.42
#include <Pt/Unit/Assertion.h> Test Assertion exception More... Assertions are modeled as an exception type, which is thrown by Unit tests when an assertion has failed. This class implements std::exception and overrides std::exception::what() to return an error message Besides the error message, Assertions can provide information where the exception was raised in the source code through a SourceInfo object. It is recommended to use the PT_UNIT_ASSERT for easy creation from a source info object. Constructs a assertion exception from a message string and a source info object that describes where the assertion failed. Use the PT_UNIT_ASSERT macro instead of this constructor.
http://pt-framework.net/htdocs/classPt_1_1Unit_1_1Assertion.html
CC-MAIN-2018-34
refinedweb
105
54.73
change the Icon or the Title property of the master detail page whenever the user has some communication to read. When I change the Icon or the Title the code run smoothly, but to have the changes rendered in the view I need to open and then Close the Menu.. Here is the code that I'm using... Firstly the menuView, AKA the master page for the master detail page public class MenuView : ContentPage { public Action<MenuItem> MenuItemSelected; private MenuViewModel _viewModel; public MenuView() { NotificationsHandler.UpdateAppIconBadge (); Title = "Notifications"+"("+ AppContext.NotificationNumber+")"; _viewModel = new MenuViewModel (this) BindingContext = _viewModel; var header = SetupHeader(); var menuItems = SetupMenuItems(); var listView = SetupMenuList(menuItems); Content = new StackLayout { Spacing = 1, Children = { header, listView } }; } } And here is the ViewModel for it: public class MenuViewModel : ViewModel { MenuView _view; public MenuViewModel (MenuView view) { _view = view; _view.Title = "Notifiche"+"("+ AppContext.NotificationNumber+")"; MessagingCenter.Subscribe<CommunicationHelper> (this, Messages.NotificationNumber, (sender) => { _view.Title = "Notifiche"+"("+ AppContext.NotificationNumber+")"; }); } } As you can see I'm using the MessagingCenter to trigger the event... In my case the event is triggered whenever I receive a RemoteNotification As I said the problem is that the Title (the result is the same if I try to change the Icon) does not change when I change the property.. But only after I open and close the menu. Even using the Binding the result is the same. @Davide I have tried to reproduce this issue but not able to reproduce this issue. Could you please provide us a sample project? so that I can reproduce this issue at my end efficiently. Thanks. Created attachment 11905 [details] Example of code replicating the error The error is not replicable on emulator.. Only on device.. @Parmendra Just to be clear, the code that I provided does not work in any ambient, device or emulator but both have different behaviour. In the emulator the Icon is not changed at all, never. Meanwhile in a device the Icon changes when opening or closing the Menu. @Davide I have checked this issue with attached sample project in comment #2 and I am getting blank screen on both emulator and device. Screencast: Please check the screencast and let me know if I have missed anything. Thanks. @Parmendra The behaviour that I want: the icon on top left (the 3 gray bar ) after clicking on the button should become the image NotificationBadge.png. But this does not happen. What happens instead for iOS: In iOS in the device if you click the button change icon nothing will happen, but if you open then close the menu the icon will change becoming the NotificationBadge.png. On Android nothing at all happens. Any news? Thanks @Davide I have rechecked this issue and observed that after clicking on the button should not become Please ignore comment #7 Thanks @Davide I have checked this issue and observed that after clicking on the button it doesn't changed Should be fixed in 1.5.0-pre1 I have checked this issue with Xamarin.Forms 1.5.0-pre1 and its working fine at my end. Hence closing this issue. Yeah one thing, why the image is blue? Can't it be of the native color? Also there is a little problem in how it is solved, it doesn't work in my solution... I reproduced the error case, do you read me here and I can post it here or do I need to open a new bug? @Davide: The reported issue has been FIXED. Please file a new bug for the behavior you mentioned in comment #11 and comment #12. Thanks. @Davide is blue in iOS? That's the default tint color, you can change it by setting BarTextColor on your NavigationPage
https://xamarin.github.io/bugzilla-archives/31/31664/bug.html
CC-MAIN-2019-43
refinedweb
614
56.55
ok for this exercise i had to put in the entered word into an array and print it backwords... i was able to do it but in a bad way heres my code: how can i do this without having to enter the word twice?how can i do this without having to enter the word twice?Code: #include <stdio.h> #include <string.h> int main(void) { char c[20],index,word; int i; printf("Enter a word: "); scanf("%s", c); word = strlen(c); printf("Please enter the word again: "); for(i = 0; i <= word; i++) scanf("%c", &c[index]); for(i = word; i >= 0; i--) printf("%c", c[i]); printf("\n"); return 0; }
http://cboard.cprogramming.com/c-programming/102028-another-method-printable-thread.html
CC-MAIN-2015-27
refinedweb
114
80.82
- NAME - MANUAL - NEXT STEPS - AUTHOR - DISCLAIMER OF WARRANTIES NAME Type::Tiny::Manual::UsingWithMoo3 - alternative use of Type::Tiny with Moo MANUAL Type Registries In all the examples so far, we have imported a collection of type constraints into each class: package Horse { use Moo; use Types::Standard qw( Str ArrayRef HashRef Int Any InstanceOf ); use Types::Common::Numeric qw( PositiveInt ); use Types::Common::String qw( NonEmptyStr ); has name => ( is => 'ro', isa => Str ); has father => ( is => 'ro', isa => InstanceOf["Horse"] ); ...; } This creates a bunch of subs in the Horse namespace, one for each type. We've used namespace::autoclean to clean these up later. But it is also possible to avoid pulling all these into the Horse namespace. Instead we'll use a type registry: package Horse { use Moo; use Type::Registry qw( t ); t->add_types('-Standard'); t->add_types('-Common::String'); t->add_types('-Common::Numeric'); t->alias_type('InstanceOf["Horse"]' => 'Horsey'); has name => ( is => 'ro', isa => t('Str') ); has father => ( is => 'ro', isa => t('Horsey') ); has mother => ( is => 'ro', isa => t('Horsey') ); has children => ( is => 'ro', isa => t('ArrayRef[Horsey]') ); ...; } You don't even need to import the t() function. Types::Registry can be used in an entirely object-oriented way. package Horse { use Moo; use Type::Registry; my $reg = Type::Registry->for_me; $reg->add_types('-Standard'); $reg->add_types('-Common::String'); $reg->add_types('-Common::Numeric'); $reg->alias_type('InstanceOf["Horse"]' => 'Horsey'); has name => ( is => 'ro', isa => $reg->lookup('Str') ); ...; } You could create two registries with entirely different definitions for the same named type. my $dracula = Aristocrat->new(name => 'Dracula'); package AristocracyTracker { use Type::Registry; my $reg1 = Type::Registry->new; $reg1->add_types('-Common::Numeric'); $reg1->alias_type('PositiveInt' => 'Count'); my $reg2 = Type::Registry->new; $reg2->add_types('-Standard'); $reg2->alias_type('InstanceOf["Aristocrat"]' => 'Count'); $reg1->lookup("Count")->assert_valid("1"); $reg2->lookup("Count")->assert_valid($dracula); } Type::Registry uses AUTOLOAD, so things like this work: $reg->ArrayRef->of( $reg->Int ); Although you can create as many registries as you like, Type::Registry will create a default registry for each package. # Create a new empty registry. # my $reg = Type::Registry->new; # Get the default registry for my package. # It will be pre-populated with any types we imported using `use`. # my $reg = Type::Registry->for_me; # Get the default registry for some other package. # my $reg = Type::Registry->for_class("Horse"); Type registries are a convenient place to store a bunch of types without polluting your namespace. They are not the same as type libraries though. Types::Standard, Types::Common::String, and Types::Common::Numeric are type libraries; packages that export types for others to use. We will look at how to make one of those later. For now, here's the best way to think of the difference: Type registry Curate a collection of types for me to use here in this class. This collection is an implementaion detail. Type library Export a collection of types to be used across multiple classes. This collection is part of your API. Importing Functions We've seen how, for instance, Types::Standard exports a sub called Int that returns the Int type object. use Types::Standard qw( Int ); my $type = Int; $type->check($value) or die $type->get_message($value); Type libraries are also capable of exporting other convenience functions. is_* This is a shortcut for checking a value meets a type constraint: use Types::Standard qw( is_Int ); if ( is_Int($value) ) { ...; } Calling is_Int($value) will often be marginally faster than calling Int->check($value) because it avoids a method call. (Method calls in Perl end up slower than normal function calls.) Using things like is_ArrayRef in your code might be preferable to ref($value) eq "ARRAY" because it's neater, leads to more consistent type checking, and might even be faster. (Type::Tiny can be pretty fast; it is sometimes able to export these functions as XS subs.) If checking type constraints like is_ArrayRef or is_InstanceOf, there's no way to give a parameter. is_ArrayRef[Int]($value) doesn't work, and neither does is_ArrayRef(Int, $value) nor is_ArrayRef($value, Int). For some types like is_InstanceOf, this makes them fairly useless; without being able to give a class name, it just acts the same as is_Object. See "Exporting Parameterized Types" for a solution. Also, check out isa. There also exists a generic is function. use Types::Standard qw( ArrayRef Int ); use Type::Utils qw( is ); if ( is ArrayRef[Int], \@numbers ) { ...; } assert_* While is_Int($value) returns a boolean, assert_Int($value) will throw an error if the value does not meet the constraint, and return the value otherwise. So you can do: my $sum = assert_Int($x) + assert_Int($y); And you will get the sum of integers $x and $y, and an explosion if either of them is not an integer! Assert is useful for quick parameter checks if you are avoiding Type::Params for some strange reason: sub add_numbers { my $x = assert_Num(shift); my $y = assert_Num(shift); return $x + $y; } You can also use a generic assert function. use Type::Utils qw( assert ); sub add_numbers { my $x = assert Num, shift; my $y = assert Num, shift; return $x + $y; } to_* This is a shortcut for coercion: my $truthy = to_Bool($value); It trusts that the coercion has worked okay. You can combine it with an assertion if you want to make sure. my $truthy = assert_Bool(to_Bool($value)); Shortcuts for exporting functions This is a little verbose: use Types::Standard qw( Bool is_Bool assert_Bool to_Bool ); Isn't this a little bit nicer? use Types::Standard qw( +Bool ); The plus sign tells a type library to export not only the type itself, but all of the convenience functions too. You can also use: use Types::Standard -types; # export Int, Bool, etc use Types::Standard -is; # export is_Int, is_Bool, etc use Types::Standard -assert; # export assert_Int, assert_Bool, etc use Types::Standard -to; # export to_Bool, etc use Types::Standard -all; # just export everything!!! So if you imagine the functions exported by Types::Standard are like this: qw( Str is_Str assert_Str Num is_Num assert_Num Int is_Int assert_Int Bool is_Bool assert_Bool to_Bool ArrayRef is_ArrayRef assert_ArrayRef ); # ... and more Then "+" exports a horizonal group of those, and "-" exports a vertical group. Exporting Parameterized Types It's possible to export parameterizable types like ArrayRef, but it is also possible to export parameterized types. use Types::Standard qw( ArrayRef Int ); use Types::Standard ( '+ArrayRef' => { of => Int, -as => 'IntList' }, ); has numbers => (is => 'ro', isa => IntList); Using is_IntList($value) should be significantly faster than ArrayRef->of(Int)->check($value). This trick only works for parameterized types that have a single parameter, like ArrayRef, HashRef, InstanceOf, etc. (Sorry, Dict and Tuple!) Do What I Mean! use Type::Utils qw( dwim_type ); dwim_type("ArrayRef[Int]") dwim_type will look up a type constraint from a string and attempt to guess what you meant. If it's a type constraint that you seem to have imported with use, then it should find it. Otherwise, if you're using Moose or Mouse, it'll try asking those. Or if it's in Types::Standard, it'll look there. And if it still has no idea, then it will assume dwim_type("Foo") means dwim_type("InstanceOf['Foo']"). It just does a big old bunch of guessing. The is function will use dwim_type if you pass it a string as a type. use Type::Utils qw( is ); if ( is "ArrayRef[Int]", \@numbers ) { ...; } NEXT STEPS You now know pretty much everything there is to know about how to use type libraries. Here's your next step: Type::Tiny::Manual::Libraries Defining your own type libraries, including extending existing libraries, defining new types, adding coercions, defining parameterizable types, and the declarative style..
http://web-stage.metacpan.org/pod/distribution/Type-Tiny/lib/Type/Tiny/Manual/UsingWithMoo3.pod
CC-MAIN-2021-04
refinedweb
1,258
53.21
I was recently very interested in taking a look at how structures in C# worked after having done a fair amount of previous work already with MSIL. During my investigation, I learned a few interesting things that I thought I would share here as most of them aren't blatantly obvious to someone who doesn't go looking. The majority of this article will use C# code (as well as IL) for examples, however, most of it, if not all of it, can be applied to VB.NET as well. The reason for this is very simple. The .NET infrastructure only allows classes to inherit one other type. This one other type is already occupied for structures by System.ValueType. System.ValueType public struct Foo { public int v; public int v2; } public class Foo2 { public int v; public int v2; } Results in the following: .class public sequential ansi sealed beforefieldinit Foo extends [mscorlib]System.ValueType { .field public int32 v .field public int32 v2 } .class public auto ansi beforefieldinit Foo2 extends [mscorlib]System.Object { .field public int32 v .field public int32 v2 // parameterless constructor .method public hidebysig specialname rtspecialname instance void .ctor () cil managed { .maxstack 8 ldarg.0 call instance void [mscorlib]System.Object::.ctor() ret } } The only notable differences (aside from the constructor) is that Foo is sealed meaning it cannot be inherited (which makes sense since classes cannot inherit structures, and structures cannot inherit anything). The only other notable difference is that the structure extends System.ValueType and the class extends System.Object. Had a type been specified to inherit from, System.Object would be that given type. Foo sealed System.Object One thing that may not be completely obvious to you is that when you cast a structure to an interface, this requires a box. And casting an interface to a structure requires an unbox. When you think about it, this makes perfect sense as a structure is a value type whereas an interface is a reference type. ** I didn't feel it was necessary to post code to justify this claim, if anyone feels otherwise please comment. The reason for this is the parameterless constructor isn't really a constructor at all. When you create a structure with no parameters (at least in C#, I'm not sure if any other .NET language allows you to implement parameterless constructors for structures as it's very possible to do at the IL level when you're the compiler), it actually generates the IL instruction initobj (which does not invoke a constructor). initobj What's interesting is that if you pass a structure via a pointer to a method, you're not required to initialize it anymore before using it. I suspect this is because the compiler treats passing it as a pointer similar to passing it as a parameter with the out modifier: out Foo foo; DoStuff2(&foo); // you can now freely use foo despite DoStuff2() being empty and doing nothing to pFoo When you invoke a method passing a structure via ref/out, an address of that given structure is obtained and passed to the method -- but is this any different than passing the pointer yourself? ref DoStuff(ref obj); DoStuff2(&obj); ldloca.s obj call void Program::DoStuff(valuetype Foo&) ldloca.s obj conv.u call void Program::DoStuff2(valuetype Foo*) Once you look up what conv.u is, it becomes apparent that there is no significant difference between obtaining the address of the variable or passing it by reference as they are exactly the same. The same applies to the out keyword. In reality, it's not really any different than the ref-keyword at the IL level other than the constraints it imposes when you're coding in C#. There is however a difference between the pointer type and reference type. If the GC decides to move memory around, the reference's address will be updated as required and will have no impacts on the code what-so-ever, however, if the pointer Foo* points to gets moved, it now points to invalid memory which could cause nasty things to occur such as crashes. Foo* Typically, you don't have to worry about this. Locals (stack declared variables) do not get moved by the GC (however, pointers to them become invalid after the method they exist in has exited) and if it is not a local, C# forces you to use the 'fixed' keyword to ensure the object is pinned down and does not get moved by the GC. fixed It is usually more inexpensive to pass a structure by reference via ref than it is to pass it by address using a pointer type due to the fact that passing it by a pointer type may require to pin the object down. In short, T& is safer than T*. This also explains why you can use T& (a ref-keyworded variable) as a parameter for a pointer type in a platform invoke call as you can safely convert from T& to T* implicitly. T& T* When you invoke an instance method similar to above, the address of (reference to) the structure must first be obtained before the method is invoked as it is passed as the first argument. This explained why the this object of instance methods affect by reference the calling object. In constant, when a reference-type invokes an instance method, the reference-type is simply passed as the first argument and no address needs to be obtained as we already have a reference-type. this I suspect due to the this, instance methods of a structure (value type) are slower than an instance method of a class (reference type), but don't quote me on this as I haven't ran adequate tests to prove this, it just seems the most logical to me. Unlike instance methods, when you set or get a value of a structure, a reference to the object is not obtained. When a structure is bound to an object or the context of if it is or isn't unavailable (instance methods), you're required to use the fixed keyword to pin down an object and prevent it from being moved by the GC. Pinning the object down ensures that the pointer you obtain does not become invalid as it belongs to another object which could be moved by the GC. Box<int> box = new Box<int>(); fixed (int* pInt = &box.Value) { // logic... } The way this is achieved at the IL-level is through the pinned modifier: pinned .locals init ( [0] class Box`1<int32> 'box', [1] int32& pinned pInt ) // Box<int> box = new Box<int>(); newobj instance void class Box`1<int32>::.ctor() stloc.0 ldloc.0 // fixed (int* pInt = &box.Value) ldflda !0 class Box`1<int32>::Value stloc.1 // { nop // } nop // compiler added code ldc.i4.0 conv.u stloc.1 ret While a pinned variable holds a reference, the reference will not be moved by the GC thereby preventing any owner object (in this case box) from being moved as well by the GC. At the end of the method, pInt is set to null (0) to allow the GC to move the object around again. This typically occurs at the end of a fixed scope. Due to the object being pinned down for the duration of the fixed statement, the object has a static address as it cannot be moved by the GC. box pInt null (0) This operator does not exist at the IL-level. The operator is fairly straightforward. If T is a reference type, the default value returned is null. If T is a value type the return value is the equivalent of having used the new keyword which results in the instruction initobj. T null new Foo foo1 = new Foo(); // this is the same as default(Foo) Foo foo2 = default(Foo); // this is the same as new Foo(); The symbol ? can be used to denote a reference type equivalent of a value type. This operator comes in handy when having to deal with boxing and unboxing as seen here. The reference equivalent can implicitly be casted to its value type representative. When the ? operator is used, it is actually syntactic sugar for Nullable<T>. Nullable<T> can be assigned to implicitly by its T-type as well as explicitly converted to its T-type. A Nullable<T> type is immutable which means once one is created, you cannot alter the value it holds (the Value property) as it is read-only. ? Nullable<T> Value static void PrintInteger(int val) { Console.WriteLine(val); } static void Main(string[ ] args) { int? refInteger = 22; // implicit assignment Nullable<int> refInteger2 = 55; // implicit assignment PrintInteger((int)refInteger2); // explicit cast } A well written overview of Nullable types and their uses can be found on MSDN. This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)
https://www.codeproject.com/Articles/442985/An-indepth-look-at-structures-in-Csharp
CC-MAIN-2017-43
refinedweb
1,490
61.97
Why does the video stream look jerky in Mozilla/Netscape? The video stream from the server should always be embedded in a HTML page (see How can I embed the video stream in my web page?). Pointing the browser directly at it (that is, entering the server's address in the location bar) is very likely to give poor results. Why does the captured picture look corrupted? First, try some other video capture application (e.g. xawtv) to make sure that your device is properly working and the correct driver is loaded. If your video standard is NTSC or SECAM, check that the proper video norm is selected: you need to add VideoNorm NTSC VideoNorm SECAM What should I know about the pwc driver? When it was maintained by Nemosoft, this driver used to have a closed-source companion driver called pwcx, which enabled support for compressed capture modes. Being distributed in binary-only form due to license issues, it was not included in the Linux kernel source tree, and not all distributions included it in compiled form either. Luc Saillard, the current maintainer, claims to have reverse-engineered the decompression routines in pwcx, producing a fully open source driver which can support full-size (640x480) capture. Whether and in what form this driver will make its way into future kernel source trees is still under discussion. In the meantime, you can download it from the maintainer's website. Why does the captured picture look so small? Are you using the pwc driver? If so, you probably need to insert an additional module called pwcx or upgrade the driver. See here for a discussion of the issues with this driver. The server dies with "Fatal error: SWIN: No such file or directory". What can I do? Your camera is most likely using the pwc driver. In this case, the "No such file or directory" error text is a bit misleading. The correct interpretation is that a capture mode (combination of resolution and frame rate) which requires compression was requested, but the driver does not know how to support it. See here for a more complete discussion of these issues. The recommended fix is to upgrade pwc to the latest version. If you don't feel like upgrading the driver, you can try to lower the capture resolution (use the proper command-line or configuration file option) or the frame rate (which, unfortunately, at the moment requires editing one of the source files; see video.c around line 209). The server dies with "Cannot open video device /dev/video0: Cannot allocate memory". What can I do? If you are using the pwc driver, upgrade it. How can I embed the video stream in my web page? <img src="" alt="[Live stream]"> How can I embed the Java client in my web page? For the applet to work, it must be downloaded from the same server running Palantir. This means that you will have to run a web server in addition to Palantir on that machine. Also, note that you will have to upload all the *.class files, not only pclient.class. This is the HTML code snippet for embedding the applet: <applet codebase="" code="pclient.class" width="430" height="340"> <param name="port" value="PORT"> </applet> <param name="port" value="PORT"> Can I use the Java applet as a stand-alone client? Sure. You need to embed it in a HTML wrapper and load the wrapper in the Java appletviewer. The Palantir distributions (both source and binary) include a sample wrapper, clients/java/index.html. Edit this file to specify the server and port to connect to, e.g. <param name="server" value="palantir.santinoli.com"> <param name="port" value="14334"> appletviewer index.html How can I control my QuickCam Sphere/Orbit webcam? First, make sure the version of the pwc driver in use is at least 8.12. If this is not the case, please upgrade it (you can download the source from the current maintainer's site or find a precompiled package from your favourite distro's repository). Then, you need to tell the server about the two devices (pan and tilt servos) on the camera, by adding appropriate definitions to your palantir.conf file: Device { Carrier Internal 5 Direction readwrite Name "Pan" Hint "Camera pan" Range -7000 7000 Notifier client Visual Slider_X } Device { Carrier Internal 6 Direction readwrite Name "Tilt" Hint "Camera tilt" Range -3000 2500 Notifier client Visual Slider_Y } Please refer to the palantir.conf manual page for further details. How can I grab single frames for archival purposes? The simpest way is to run curl, either locally (on the server) or on a remote client: curl '' -s -o snap.jpg #!/bin/bash # Palantir timed capture script (suitable for FFmpeg) n=0 while true ; do curl '' -s -o $n.jpg n=$(($n+1)) sleep 5 done #!/bin/bash while true ; do curl '' -s -o `date +%H%M%S`.jpg sleep 5 done ffmpeg -r 10 -i %d.jpg movie.mpg #!/bin/bash # Palantir timed capture script (suitable for MPlayer/MEncoder) n=0 while true ; do curl '' -s -o `printf %04d $n`.jpg n=$(($n+1)) sleep 5 done Can I limit the output frame rate? Unfortunately, at the moment the transmitted frame rate cannot be directly limited. It is however possible to throttle the outgoing bandwidth originating from Palantir's video port with tools like traffic shapers. This feature could be added in some next version if there's enough interest. Why do I get weird errors when compiling the server from source? I'm using Mandrake 9.x/SuSE 9.x. This is probably a side effect of some recent distributions' support for both video4linux and video4linux2. Until a more elegant solution is found, you might try to disable the videodev2.h file inclusion by amending the file /usr/include/linux/videodev.h. For example, on Mandrake turn the #if 1 #if 0 #define HAVE_V4L2 1 #include <linux/videodev2.h> Why do I get the error "gsm.h: No such file or directory" when compiling the server from source? Your source code is obsolete. Starting with Palantir 2.5.1, the source code for the GSM library is included with the Palantir source, and problems related to incomplete installations of the GSM library should be gone forever.
http://www.fastpath.it/products/palantir/faq.html
CC-MAIN-2014-15
refinedweb
1,051
65.52
Referencing .NET Framework Libraries in .NET Core 1.1 There are many old libraries targeting the .NET Framework which, for various reasons, do not yet target .NET Core or .NET Standard. Topshelf, a fantastic library that helps you to easily create Windows services, is one of these. At the time of writing this article, the last release of Topshelf was 4.0.3 back in October 2016. There was no way that Topshelf could target .NET Standard because the .NET Standard spec did not support the APIs that are required for it to function. This was a problem because there was no way you could create a Windows service using Topshelf for a .NET Core 1.1 application. Simply trying: Install-Package Topshelf …is bound to fail miserably: If you want to make a Windows service out of an application targeting .NET Core 1.1, then you have to use an alternative such as NSSM. What Changed in .NET Core 2.0 With the release of .NET Core 2.0 and .NET Standard 2.0, applications or libraries targeting either of these are able to reference old libraries targeting the full .NET Framework. Presumably this is because the .NET Core/Standard 2.0 implementations have enough API coverage to overlap with what the full framework was able to offer. Quoting the .NET Core/Standard 2.0 announcement linked above: “You can now reference .NET Framework libraries from .NET Standard libraries using Visual Studio 2017 15.3. This feature helps you migrate .NET Framework code to .NET Standard or .NET Core over time (start with binaries and then move to source). It is also useful in the case that the source code is no longer accessible or is lost for a .NET Framework library, enabling it to be still be used.” Example with Topshelf In order to actually test this out, you’ll need to have Visual Studio 15.3 or later. You will also need to separately install the .NET Core 2.0 SDK. In an earlier section, we tried installing Topshelf in a .NET Core 1.1 application, and failed. Let’s try doing the same thing with a .NET Core 2.0 application: Install-Package Topshelf The package installation works pretty well: However, the warning that shows under the dependency is not very promising: There’s only one way to find out whether this will actually work in practice. Let’s steal the code from the Topshelf quickstart documentation: public class TownCrier { readonly Timer _timer; public TownCrier() { _timer = new Timer(1000) {AutoReset = true}; _timer.Elapsed += (sender, eventArgs) => Console.WriteLine("It is {0} and all is well", DateTime.Now); } public void Start() { _timer.Start(); } public void Stop() { _timer.Stop(); } } } } Nope, looks like Topshelf won’t work even now. I guess the APIs supported by .NET Core 2.0 still do not have enough functionality for Topshelf work as-is. Other .NET Framework libraries may work though, depending on the dependencies they require. In the “.NET Core 2.0 Released!” video, one of the demos shows SharpZipLib 0.86 (last released in 2011) being installed in an ASP .NET Core 2.0 application. It is shown to build, but we don’t get to see whether it works at runtime. It is still early, and I suppose we have yet to learn more about the full extent of support for .NET Framework libraries from .NET Core 2.0 applications and .NET Standard 2.0 libraries. The problem is that when evaluating a third-party library such as Topshelf, it’s difficult to determine whether its own dependencies fall within the .NET Standard API set. This looks to me like a matter of pure trial and error.
http://gigi.nullneuron.net/gigilabs/2017/08/
CC-MAIN-2020-05
refinedweb
616
79.77
Romanians Find Cure For Conficker 145 mask.of.sanity writes "Bit. The Romanian security vendor said its removal tool will delete all versions of Downadup and will not be detected by the virus." How long before it doesn't work? (Score:3, Insightful) Re:How long before it doesn't work? (Score:5, Informative) they are not "distributing a worm", it's a tool for disinfection and I suspect that they'll need to take a page out of biology's book on dealing with dangerous microbes and evolve along with the worm. In other words, constantly update their tool as the worm adapts. So it's likely going to be quite dynamic. Re:How long before it doesn't work? (Score:5, Insightful) Instead, Microsoft is laying off workers. Perhaps they should concentrate on fixing these issues even faster -- which would probably be better for their public perception of being a virus haven -- instead of cutting staff to appease stockholder's lust for profits. In the long run, producing a quality OS and fixing these kinds of vulnerabilities promptly would do far more good for their bottom line. Re: (Score:3, Insightful) Microsoft does. They release a utility about once a month that targets and removes malware from a system. It is distributed automatically via Windows Updates but can also be downloaded and run manually. Of course since worms like this often disable Windows Update the automatic clean up vector is closed. Vulnerabilities exist in every system. If by "quality" you mean that it has no vulnerabilities then you are limited to running software that has only about 10 lines of code produced by the upper level stu Re: (Score:2) Currently the parent is modded +4 Insightful. What is going on here? Wishful thinking hardly qualifies as insightful. Or even informative. Foward-looking wishful thinking -- like ideas on how to improve something -- can be considered "interesting," but this is intended as an explanation. It is backwards facing pablum. It's not like Microsoft sits there and ignores these issues when they are reported. Cough. Gasp. Get me some water, I'm choking. (Simutaneously the person next to be is laughing so hard their face is turning blue.) That line about worms disabling automatic updates, so matter-of Re: (Score:1) Re: (Score:1) Yea RIGHT....... when has MS EVER thoroughly tested *ANYTHING* ??? They end up fixing bugs and forgetting to pick up the fixes for the last bug. I know large corporations (LIKE MS, IBM and others) have issues with items like this but at least IBM almost never (1 in 10,000 roughly) drops a previous fix. If IBM can do a good job why can't MS? Re: (Score:2) Companies think short term. On the one hand you have others that solve your problems without your need to invest anything. On the other hand you can lay of people that saves you money. Sounds like a scale with on one side lead and helium on the other side. Re: (Score:1, Funny) Congratulations. You have successfully made yourself look racist, shortsighted, ignorant and apathetic all in one single posting on Slashdot. Maybe next time you can shoot for doing it in just two sentences. Re: (Score:2, Insightful) Re:How long before it doesn't work? (Score:4, Insightful) I'm more curious how many people would actually install any "fix" that comes from Eastern Europe. A lot. Eastern Europe is renowned for having spawned many, many extremely good coders and mathematicans. Another link to the tool (Score:4, Insightful) [ubuntu.com] Re: (Score:1, Insightful) I checked and the bd_rem_tool isn't available on ubuntu.com, particularly that page. Perhaps you are mistaken or fucking stupid? Re: (Score:2) Re: (Score:2) or even better: not touching a hot stove is the cure for frequent burns Quite so. An ounce of prevention and all that. Re: (Score:2) You might be filled with bullshit up to your ears, from all those doctors telling you that "curing" is taking some pills (mostly painkillers), so it is a-ok that you did shit in the first place... But in the real world, future prevention is actually the cure for any disease you can ever have. Who would have thunk of that? And your analogy is bogus, because you replacing your OS (which is done in 30 minutes and poses no problems at all for the average e-mail+surfing+media-playing user) is NOT like changing wh Re: (Score:1) Re: (Score:2) Your comparison is bogus. Ubuntu is not to a computer what amputation is to your body. Re: (Score:2) No. I would suggest NOT DOING SHIT THAT BREAKS YOUR FINGER! You see, I -- different than every doctor on the planet -- search for the *true cause* of a problem. Which in that case would be why you broke your finger in the first place. Everything else -- including amputation or putting some painkiller on it and putting it in a cast (what your doctor would do) -- is just "fixing" the symptoms, and fraud too. That's exactly, why a virus-removal tool and maybe a patch never are a solution at all. They only put a Re:Another link to the tool (Score:5, Funny) Re: (Score:3, Interesting) I used that same tool on another virus. Haven't had an issue since! Me too. I can't find drive C: ever since. Re:Another link to the tool (Score:5, Funny) I used that same tool on another virus. Haven't had an issue since! I found that non of my games would work and my wifi is now broken too. Re:Another link to the tool (Score:4, Informative) Re: (Score:3, Interesting) Re: (Score:2) I second that. Broadcom cards work perfectly with Ubuntu. I'm curious as to why you had to use the command line for other reasons. Other than software development and SSHing to other machines, I've not had to use the command line in a long time. Re: (Score:2) What exactly doesn't work? The two (three?) most-common brands (Intel, Broadcom, Maxwell) have open-source drivers (with a firmware blob in the case of broadcom) Is it an external card, by USB or something? Re: (Score:3, Insightful) What exactly doesn't work? The two (three?) most-common brands (Intel, Broadcom, Maxwell) have open-source drivers (with a firmware blob in the case of broadcom) Is it an external card, by USB or something? My very common internal Broadcom card didn't work in 8.04 a couple months ago until I spent an evening on the internet finding and trying a few different sets of command line fixes. The problem was that most of them that were in Ubuntu help pages included a typo (or more than one) somewhere that didn't let me just copy/paste each line. I did manage to get it to work, but a few days later I stopped using Ubuntu because my laptop was too sluggish with it. Re: (Score:2) Just a note, when Dell first brought out Ubuntu laptops a few years ago, I bought one. With the exception of an update bug when it first came out that near bricked it (but which was easily fixed), I've had hardly any problems with it. The biggest issue I have with linux on my laptop is that, unlike my desktop machine (which runs XP Pro 64bit) I can't just go to, say, the openoffice website, download an installer, double click it, click next a few times, and have some new software to play with. The lack of a Re: (Score:2) You can also add the repository with OO.o 3 and install that, too. Re: (Score:1) Can you not? Whats stopping you going to [openoffice.org] and clicking "download"? I really am actually asking, by the by- I can't remember how easy or difficult it was when I installed OO.o 3.0 on my Ubuntu machine last. Re: (Score:2) OOo 3.0 does require a bit of tweaking to upgrade in 8.10, but there are lots of hints on the user forums, including several step-by-step tutorials, very clearly written. You can't be afraid of opening a terminal session, if you want it to work right, though. I haven't done this in over a month, and I'm pretty sure that Synaptic should be able to take care of this by now pretty easily. Or, you could just wait another month or so and download Jaunty, which should have OOo 3.0 included as a standard package Re: (Score:2) Oh sure, I did some searching, saw some tutorials, but my point is that it isn't ready for grandma until you've moved past these issues and she can go download software for "linux" and have it just work (at least most of the time), at least as well as it does for windows.. And point of whole thread is finding a way to avoid Windows worms, and easiest path to success in this is switching to Linux. Problem solved.. The point is only moot if you missed it. The point wasn't open office, open office was an example to illustrate a point: you can't download software and install it as easily on linux as you can on windows. Re: (Score:2) The other point (going back to the original topic of TFA) is that is that you can't download and install the Conficker Worm as easily on linux as you can on windows. :-) Re: (Score:2) Strange. I've not had any issues getting WiFi to work on my Linux boxes. I dual-boot one between XP and XUbuntu, and it worked great first time out. I have another system booting between Vista/Win7/Intrepid_8.10 and it works just dandy, too under all 3 OS environments. Never had a problem myself, though I have seen many posts in the forums where people complain about WiFi support under different distros of *nux. Re: (Score:2) What's this ubuntu thingy? Once more around the block my friend (Score:3, Informative) This gets old. It is worth nothing more than a gratuitous +5 mod-up on Slashdot and a 0.83% share of the client desktop for Linux. Time to dig deeper I think. Cornflicker was dealt with in the January release of the Microsoft Windows Malicious Software Removal Tool [microsoft.com] Deployment of the Microsoft Windows Malicious Software Removal Tool in an enterprise environment [microsoft.com] That many Windows Servers unprotected and online?? (Score:1, Insightful) [...]some 9 million Windows machines [...]. The worm [...] exploits a bug in the Windows Server service... Without elaborating what Windows Server service that might be... Are there really that many vulnerable, not firewalled Windows servers connected to the Internet? Or is this a Server function that has no business on a Desktop that is getting infected? In the first case blame the administrators (for not knowing how to properly protect a Windows server), in the second case blame Microsoft (for running servers on a desktop that should not be there in the first place). I would expect the second case as that I re Re:That many Windows Servers unprotected and onlin (Score:5, Informative) In the first case blame the administrators (for not knowing how to properly protect a Windows server), in the second case blame Microsoft (for running servers on a desktop that should not be there in the first place). I would expect the second case as that I recall we have seen before, a virus exploiting a bug in a server function that can not even be stopped on a desktop. Description of the Server service: Supports file, print, and named-pipe sharing over the network for this computer. If this service is stopped, these functions will be unavailable. If this service is disabled, any services that explicitly depend on it will fail to start. Dependant services: Computer Browser ("Maintains an updated list of computers on the network and supplies this list to computers designated as browsers. If this service is stopped, this list will not be updated or maintained.") I think it starts automatically. It can probably be disabled, but who knows... Re: (Score:2) OK thanks for the info. Sounds like that having the Server service listen to localhost/loopback (assuming there is such a thing in Windows) only would close the infection vector... it should definitely not be listening to incoming connections from other computers without being explicitly instructed to do so. So we can shove this on Microsoft's poor design. And after the recent discussion here on /. about User Access Control in XP/Vista/Win7 it again makes me wonder whether Windows as it is can be fixed at a Re: (Score:2, Informative) You don't need the Server service. Or at least, I haven't needed it in the last 6 months or so. I even run IIS on my Windows box for ASP.NET development. Seems like something called 'Server' would be needed for that, right? Nope. I would certainly disable it on all desktops. In fact, Google 'unnecessary windows services' for a list of other services that seem to serve no practical purpose. Re: (Score:1, Informative) Regarding "stalling" CONFICKER specifically: ( From [xtremepccentral.com] ) ---- "A.) STALL SERVER SERVICE (if you don't need a LAN/WAN to connect to & all you do is hit the internet on a single standalone machine)... AND B.) It recommends you stall out indiscriminate usage of javascript also! Between those 2 measures (&, possibly ALSO, a HOSTS file that stops access to this CONFICKER worm's control servers -> http [opendns.com] Its required for Message Queueing Service (Score:3, Interesting) which is an additional service that increases the latencies greatly in Xp pro and vista and up. ie, it can bring down a 400 ms world of warcraft connection to 120 ms ping in average case. Re: (Score:2) Out of curiosity, what software installed that service on your computer? I don't have it on my XP, nor at a Win2k3 workstation I'm using at work... Re: (Score:2) Xp Pro. MQS is installed not by default - you have to install it from windows xp pro cd. Re: (Score:2) I found BV's list years ago and it helped me turn off a lot of services that I didn't need. I was under the impression that my copy of WindowsXP was faster and more stable than other peoples'. At least, it got to 7 years old without needing to be reformatted and reinstalled. Pretty good for Windows if you ask me. I stopped using Windows a couple of years ago so it doesn't matter to me now, but for all those people that haven't gone Linux Re: (Score:2) Sounds like this permits sharing of those items over SMB? So, if you're not "sharing" anything on that server, then you can turn this off, yes? Also, I wonder if this service's interaction w/ the SMB Browsers would cause any adverse affects WRT browsing "Network Neighborhood" from a machine with this service disabled. Re: (Score:1) Re:That many Windows Servers unprotected and onlin (Score:5, Informative) This "server" service has nothing to do with what you might expect from a "server", i.e. being a big machine that hosts a lot of stuff like mail or webpages. This "server" service is an integral portion of Windows' ability to share files through the local network and access network printers. Also, some other services (IIRC the whole bunch that deals with networking, from WiFi to telephony) depends on it. In other words, the term "server" is maybe a bit preposterous. It's just the thingie that enables networking on Windows machines. So, IMO, it's neither. It's neither a "real" server crappily configured by admins that should get their hands tied and pushed into administration where they can't do no harm, nor is it MS's fault for putting something that only a server OS should have on a desktop. It's simply the network thingamajig gone bad. Re: (Score:2) Re: (Score:2) More likely, people running Linux don't automatically connect "server" with "big, fat machine, swallowing jiggawatts of power and operates only with liquid helium flowing around it". Re: (Score:2) It handles RPC requests. That makes it a server. Nothing in a desktop/workstation needs to be listening on a real network interface for RPC requests. Having it do that, especially on a network interface connected to the Internet, is a really bad idea. Re:That many Windows Servers unprotected and onlin (Score:5, Interesting) You seem to be working under the assumption that most servers have real admins. Fact of the matter is, outside the very largest of companies, a very large majority of internet connected servers are run by small to medium size business who do not have a full-time IT department and/or often cannot either afford all the necessary equipment and software and man-hours necessary to secure against these threats, esp. since good security often winds up annoying a high-level manager who insists that they should be able to log in to the network and all their apps without a password and insists they have passwords to every computer in the building and that they can use myspace messenger and browse the web from the DNS server if they want to (which they will). Also, many many many web servers are hosted with hosting companies like the one I work for where less than 5% of the 10,000+ physical servers have anything like a knowledgeable admin and are instead run by idiots in India who use cracked VoipSwitch software (which is itself virus infected, but they keep using it anyway even though the virus causes them to have to re-install every week or two). Or you get people who want to run their own website but simply don't have the skills to maintain it properly, but are convinced they don't need a real admin either... or a firewall... or anti-virus. Oh, and the desktop has nothing to do with anything - these services would exists and be just as exploitable regardless of a GUI, as it's not the GUI that is being exploited - it's the poorly coded system services and libraries that aren't subject to any kind of external or peer review that are written by people who usually don't even know exactly what they are coding, leaving plenty of room for exploits to bad code crop up. Funny, now that I think about it, MS treats the coding of it's OS similar to a terrorist operation, small groups of people working on compartmentalized tasks, never knowing who is doing exactly what or what the desired end-product actually is. This may be a great idea if you're a terrorist organization trying to get away with something and trying to prevent a loss of the whole project due to the capture of one or more cells, but this is not a good way to write software - I think the past 10+ years of shoddy performance and infection/exploit history of MS products should be a clear enough sign of the problem, but the MS execs are obviously too blind or ignorant to figure this out for themselves. Re:That many Windows Servers unprotected and onlin (Score:5, Interesting) Funny, now that I think about it, MS treats the coding of it's OS similar to a terrorist operation, small groups of people working on compartmentalized tasks, never knowing who is doing exactly what or what the desired end-product actually is. Funny, now I think of it, this is EXACTLY how the whole Linux development goes on. You have a bunch doing the kernel, doing X, doing Gnome, doing Gimp, doing OOo, etc. All doing little parts of what is going to be the operating system, without having a clue of what the end product even could be. They just make sure that their little piece works fine. And for the software to communicate with each other they use some standard protocols. Microsoft has at least some top management that will define the final look and feel (at least I assume so, any reasonable OS company would do so). So the little parts do not need to know the total, they just need to know what THEY have to do. For example the printer server (like CUPS). They have to make sure they can address all kinds of printers on all kinds of ports, and then produce some interface for other software to talk to the printer server. The printer server people don't need to know the total picture. They just have to make sure their printer server works, and that they can answer requests according to specifications. It seems the problem of Windows development may be that they do NOT work like that. That they want to keep it as a whole, finding interfaces to talk to all different programs in different ways, instead of standardising and creating independent components. Like Linux where you can add the components you need, and depending on the components you have a business work station (include word processor, image viewer, e-mail software), a multimedia station (install Gimp, some video editor, video and music players), or a server (do not install any GUI, instead Postfix, Apache and the rest). The reason all these little programs can talk to each other is that they use certain standards. All open standards, official or not, some may have developed their own standard. But they use standard file formats, standard interfaces (named pipe, sockets, network) that other software also uses, and thus they can be patched together and generally work fine with each other. And then the distro producers (Mandriva, Ubuntu, Debian) test and make sure all works as expected, and optionally add bits of glue or eye candy to the whole. Microsoft could be well off by starting to work like that. Kernel and GUI separate. Split off IE and Media Player. Set some goals for the new version, plan for each part what functionality it has to provide and how it is going to provide this to the outside world (e.g. API), and when the parts are done, glue them together. It may just work. Re: (Score:2) Re: (Score:2) I thought "Snow Crash" was fiction ? Re: (Score:1) Especially when you see so many .net remakes of the same function over and over again, from one namespace to another, exactly doing the same thing, but with a different function name. Re: (Score:2, Informative) Without elaborating what Windows Server service that might be... Are there really that many vulnerable, not firewalled Windows servers connected to the Internet? Or is this a Server function that has no business on a Desktop that is getting infected? The Server service provides file/print sharing in Windows. Technically that means it should only run on servers, but think of the number of Windows boxes (e.g. on home networks) where people use file sharing between machines. You can stop it, though. If you de-select 'File and Print sharing' in the Windows firewall exceptions page, you block access to the Server service. (If memory serves correctly, Windows XP SP2 and Windows Server 2003 SP1 block file/print sharing by default.) they should know better (Score:5, Insightful) so what? (Score:4, Interesting) And above all that I'm skeptic about the "delete all versions" phrase, because BidDefender as a (bloated) AV that it is, is pretty much signature based, and has very weak heuristic detection... could have done with this yesterday... (Score:5, Interesting) We need a removal tool that can be run from a safe Linux environment (ie boot using a live disk etc., then run the tool from a USB drive)... not running it from inside windows where the Conficker is already running Re: (Score:3, Interesting) har, har... that's as pointless as the ubuntu link troll earlier... The laptop runs Vista because of the applications that have to run on it, it those apps ran in Linux, then I wouldn't have had the problem in the first place... Re: (Score:1) Any idea as to how this machine got infected in the first place? Like 99% of infections, user stupidity. Sadly, if these users were using Linux, the same would happen because the security prompt would come up and they'd shove in their password and you're off. With Ubuntu having massive popularity amongst Windows converts, it makes it more and more likely as targetting one distribution is fairly easy. Re: (Score:1, Informative) Then use a live Windows CD such as BartPE or other preinstallation environment, together with the USB drive, and nuke the malware from there. Re:could have done with this yesterday... (Score:5, Informative) We need a removal tool that can be run from a safe Linux environment (ie boot using a live disk etc. ...) Well, the guys at bitdefender do have a rescue cd [bitdefender.com] that can be used to disinfect a windows machine. Re: (Score:3, Interesting) My experience has been that *nix livecd based rescue disks aren't worth spit. The reason given by Kaspersky for discontinuing their linux based rescue cd was that in order to effectively access and safely make changes to the windows data structures. In essence, they had to engineer a mini windows. And given the nature of how av works, it stands to reason that the extent of the emulation have to be very exact for the package to be effective. That's why they switched to a PE based rescue disk. I use ubuntu as one Re: (Score:3, Informative) Here are some more, sorted by last release date: [freedrweb.com] (Dr Web, February 2009) [kaspersky-labs.com] (Kaspersky December 2008) [f-secure.com] (FSecure November 2008) [free-av.de] (Avira, ???) [mwti.net] (MicroWorld, ???) Re: (Score:2) not running it from inside windows where the Conficker is already running Why not? It seems to work allright. Paranoia, the destroyer (Score:1, Troll) It's good to see something involving Romania and security that's positive for a [ic3.gov] change []. Wait, do we know where the authors of Conficker came from? Hmmmm... Romania (Score:5, Funny) [youtube.com] Please tag story as romaniaftw Re: (Score:3) > Please tag story as romaniaftw Bine... foarte bine! Romulans. (Score:4, Funny) Something must be up in the Star Empire. *Appends To Trek Journal* Re: (Score:2) Re: (Score:2) Sadly, I also read it as "Romulans". But I just finished watching a random Star Trek TNG clip on YouTube, so I have an excuse. "Vaccination" (Score:1, Informative) I do not think it means what you think it means. quickscan (Score:1) So confusing! (Score:1, Insightful) How exactly do you prevent this worm? Disable autoplay? Autoplay is a feature though. Disable network sharing? How annoying. The KB958644 patch? Does that protect you, or does it simply prevent one method of catching it? A cold is a cold, and although preventing it from entering your computer is an idea, the goal should be making the computer immune to whatever the vulnerability is. I should have a say on what programs (what a computer virus is) are allowed to run. What's worse is Microsoft's apparent unwillingne Re: (Score:2) You prevent the worm by keeping your system properly updated. Microsoft released a fix way back in October 2008 (See MS08-067, or KB958644 from the MS Knowledgebase). Anyone who ran Windows Update even once since Halloween of last year should be safe from this worm. I had to spend two days updating my network of 700+ workstations to safeguard my employer's computer assets and keep my job, but that's what I am paid to do. Of course, I didn't have to lift a finger to protect my Macintosh or Linux clients. Re: (Score:2) Or just apply Windows XP Service Pack 3, which rolls up everything included in SP2 and all security updates released between the two SP releases. Never heard any problems reported with SP3. Then, after re-booting, you have to run Windows Update again to apply all the other updates (including MS08-067, which fixes Conficker) released post-SP3. Seems like it might be easier just to migrate to Linux. WTF!? Who cares? (Score:1, Troll) "It spreads primarily through a buffer overflow vulnerability in Windows Server Service where it disables the operating system update service, security center, including Windows Defender, and error reporting." I disabled all that shit, myself, intentionally. I'm serious. After I realized that one of the recent "hotfixes" from Microsoft installed a spyware "plugin" in Firefox, off that shit went. For good. Re: (Score:1) I usually disable all those services too, if your at home and only run one computer, you don't need all the network stuff running, making sure all the ntfs files on all computers within the network are indexed, etc.... We should have a full out optimization tool from M$ that goes through each service and asks the obvious question (as in Linux install of mandrake or red hat etc...) This service enables you to run an ftp server, do you want to allow this... This service allows you to share files within a network Re: (Score:2) Kind of surprised I got modded "Troll" for that post. Was it the post title? I was QUITE serious. I use good AV/Firewall software, and the most serious threat to my Windows machine is Microsoft itself, it seems. In order to get anything GOOD from them, in the form of "hotfixes", I have to let them fuck around in my machine. I actually found proof of them fucking around, and the only way to make sure they wouldn't do it again was to sever all ties with their servers. An explanation and fix, for those of you th Sorry to be a pedantic ass but... (Score:1, Offtopic) Is the correct term "cure" for removing a software virus? The first 10 seconds after reading this I was trying to figure out "what's the conficker virus, who is it killing?" etc. I would've thought fix / solution / tool / patch / antivirus routine would be better than 'cure' I could be wrong though, I've been using PC's for 18years now and despite plenty of piracy I've never had a virus, so I've never had to cure one. Well that's all fine and dandy... (Score:1) That's right. The back-up was on dead trees. So now they have put all that data in by hand. Talk about a bipolar country. Nice, but this is Conficker we're talking about. (Score:1) inb4 Conficker evolves to evade and/or destroy this tool. Seriously, there was already a fix pushed out for this. Conficker grew to overcome it, which is why the problem still exists today. There is no way this project is going to be this simple. These Romanians are in for a fight if they truly want to cure the Conficker epidemic. ComboFix anyone? (Score:2, Informative) [bleepingcomputer.com] List of Conficker removal tools (Score:2) Here is a list of Conficker removal programs: BitDefender - Enigma Software - ESET - F-Secure - Kaspersky - McAfee - Microsoft -. Well (Score:1) Re:It can't be helped (Score:5, Funny) Re: (Score:3, Funny) Re: (Score:1) Re: (Score:1, Funny) Dear god... then what was the disease? Oh right. Seventies suburbia. It was worth chewing a leg off. Mod parent up (Score:2) He is currently at 0, Troll. This is clearly mod abuse. Give him at least a 1, underrated to undo the abuse. Re: (Score:1, Flamebait) Does he still pronounce leenooks as leenooks? Re: (Score:1) Re: (Score:2) Re: (Score:2) Uh, yse they did use it. They also re-branded it as something called "Windows Defender."
https://it.slashdot.org/story/09/03/13/0234213/romanians-find-cure-for-conficker?sdsrc=nextbtmprev
CC-MAIN-2016-36
refinedweb
5,390
71.55
hi , I got a little problem , i want the user in my chat programm to be able to type his name , then be able to chat , and chat , till he drops , i tyed to do that with a loop , but its looping the username with it , does the username needs to be in an other loop for this ?cause now it goes like : <username> says : h <username> says i . instead of <username> says : hi ok here it is : thanks.thanks.Code:#include <iostream> using namespace std ; #include <stdlib.h> #pragma hdrstop int main ( int , char** ) { unsigned char x = 4 ; char pname[64] ; unsigned char z = 0 ; unsigned char a = 2; char says[64] ; cout << endl << "username: " ; if ( pname != 0 ) { gets(pname); while ( a != 0 ) { cin >> z ; cout << pname << " says : " << z ; } cin.ignore(); return 0 ; } }
http://cboard.cprogramming.com/cplusplus-programming/62303-some-more-newbie-help-please.html
CC-MAIN-2015-32
refinedweb
134
89.28
Algorithm::Pair::Best - deprecated - use Algorithm::Pair::Best2 version 1.036 use Algorithm::Pair::Best; my $pair = Algorithm::Pair::Best->new( ? options ? ); $pair->add( item, ? item, ... ? ); @pairList = $pair->pick( ? $window ? ); Given a set of user-supplied scoring functions that compare all possible pairs of items, Algorithm::Pair::Best attempts to find the 'best' collective pairings of the entire group of items. After creating an Algorithm::Pair::Best->new object, add a list of items (players) to be paired. add connects the new items into a linked list. The total number of items added to the linked list must consist of an even number of items or you'll get an error when you try to pick the pairs. Pairings are determined partially by the original order items were added, but more importantly, items are paired based on scores which are determined by user supplied functions that provide a score for each item in relation to other items (see scoreSubs below). An info hash is attached to each itme to assist the scoring functions. It may be convenient to add access methods to the Algorithm::Pair::Best package from the main namespace (see the scoreSubs option to new below for an example). Algorithm::Pair::Best->pick explores all combinations of items and returns the pairing with the best (highest). On my system it takes about 2 seconds to pair 12 items (6 pairs), and 20 seconds to pair 14 items (with no 'negative scores only' optimization). Trying to completely pair even 30 items would take too long. Fortunately, there is a way to get pretty good results for large numbers, even if they're not perfect. Instead of trying to pair the whole list at once, Algorithm::Pair::Best->pick pairs a series of smaller groups within a 'window' to get good 'local' results. The list created by add should be moderately sorted so that most reasonable candidates will be within window range of each other. The new method accepts a window option to limit the number of pairs in each window. The window option can also be overridden by calling pick with an explicit window argument: $pair->pick($window); See the description of the window and pick below. Algorithm::Pair::Best is deprecated - use Algorithm::Pair::Best2 Algorithm::Pair::Best - Perl module to select pairings (designed for Go tournaments, but can be used for anything, really). A new Algorithm::Pair::Best object becomes the root of a linked list of Algorithm::Pair::Best objects. This root does not represent an item to be paired. It's just a control point for the collection of items to be paired. Items are added to the Algorithm::Pair::Best list with the <add> method (see below). Sets the default number of pairs in the sliding pairing window during a pick. Can also be set by passing a window argument to pick. Here's how a window value of 5 (pairs) works: first pair items 1 through 10. Keep the pairing for the top two items and then pair items 2 through 12. Keep the top pairing and move down to items 4 through 14. Keep sliding the window down until we reach the last 10 items (which are completed in one iteration). In this way, a tournament with 60 players takes less than 1/4 a minute (again, on my system) to pair with very good results. See the gopair script in Games::Go::AGA for a working example. Default: 5 Enable/disable the 'negative scores only" optimization. If any score greater than 0 is found during sortCandidates, Algorithm::Pair::Best turns this flag off. IMPORTANT: If this flag is turned on and a scoreSub can return a number greater than 0, the resultant pairing may not be optimal, even locally. Default: 1 (enabled) Scoring subroutines are called in array order as: foreach my $s (@{$my->scoreSubs}) { $score += $my->$s($candidate); } Scores are accumulated and pairings are attempted. The pairing with the highest cumulative score is kept as the 'best'. Note: Algorithm::Pair::Best works best with scoring subroutines that return only scores less than or equal to 0 - see the sortCandidates method for more details. The scoring subroutines should be symmetric so that: $a->$scoreSub($b) == $b->$scoreSub($a) Example: Note that the scores below are negative (Algorithm::Pair::Best searches for the highest combined score). 'Negative scores only' allows an optimization that is probably worth keeping in mind - it can reduce pairing time by several orders of magnitude (or allow a larger window). See the sortCandidates method for more information. . . . # create an array of scoring subroutines: our @scoreSubs = ( sub { # difference in rating. my ($my, $candidate, $explain) = @_; # the multiplier here is 1, so that makes this the 'normal' factor my $score = -(abs($my->rating - $candidate->rating)); return sprintf "rating:%5.1f", $score if ($explain); return $score; }, sub { # already played? my ($my, $candidate, $explain) = @_; my $already = 0; foreach (@{$my->{info}{played}}) { $already++ if ($_ == $candidate); # we might have played him several times! } # large penalty for each time we've already played my $score = -16 * $already; return sprintf "played:%3.0f", $score if ($explain); return $score; }, ); # the 'difference in rating' scoring subroutine above needs a 'rating' # accessor method in the Algorithm::Pair::Best namespace: { package Algorithm::Pair::Best; sub rating { # add method to access ratings (used in scoreSubs above) my $my = shift; $my->{info}{rating} = shift if (@_); return $my->{info}{rating}; } } # back to the main namespace . . . In the above example, note that there is an extra optional $explain argument. Algorithm::Pair::Best never sets that argument, but user code can include: my @reasons; foreach my $sSub (@scoreSubs) { push(@reasons, $p1->$sSub($p2, 1)); # explain scoring } printf "%8s vs %-8s %s\n", $id1, $id2, join(', ', @reasons); to explain how $p1 scores when paired with $p2. Default: ref to empty array Accessor methods can read and write the following items: Accessor methods set the appropriate variable if called with a parameter, and return the current (or new) value. Add an item (or several items) to be paired. The item(s) can be any scalar, but it's most useful if it is a reference to a hash that contains some kind of ID and information (like rating and previous opponents) that can be used to score this item relative to the other items. If a single item is added, the return value is a reference to the Algorithm::Pair::Best object created for the item (regardless of calling context). If multiple items are added, the return value is the list of created Algorithm::Pair::Best objects in array context, and a reference to the list in scalar context. Note: the returned pair_items list is not very useful since they have not yet been paired. Returns the score (as calculated by calling the list of user-supplied scoreSubs) of the current pairing item relative to the candidate pairing item. The score is calculated only once, and the cached value is returned thereafter. If new_score is defined, the cached candidate and item scores are set to new_score. Sort each candidate list for each item. This method calls score (above) which caches the score for each candidate in each item. Normally this routine does not need to be called as the pick method calls sortCandidate before it starts picking. However, if you would like to modify candidate scores based on the sorting itself (for example, in the early rounds of a tournament, you may wish to avoid pairing the best matches against each other), you can call sortCandidates, and then make scoring adjustments (use the citems method to get a reference to the sorted list of candidates, then use $item->score($candidate, $new_score) to change the score). After changing the score cache, calling the pick method calls sortCandidates once more which will re-sort based on the new scores cache. Note: during sortCandidates, the scores are checked for non-negative values. If only 0 or negative values are used, the pick method can optimize by skipping branches that already score below the current best pairing. Any scores greater than 0 disable the 'negative scores only' (negOnly) optimization. Returns the best pairing found using the sliding window technique (calling wpick) as discussed in DESCRIPTION above. The size of the window is $windows pairs (2*$windows items). If no window argument is passed, the default window selected in the new call is used. pick returns the list (or a reference to the list in scalar context) of Algorithm::Pair::Best objects in pairing order: item[0] is paired to item[1], item[2] to item[3], etc. pick performs a sanity check on the pairs list, checking that no item is paired twice, and that all items are paired. Each time a pair is finalized in the pick routine above, it checks to see if a subroutine called progress has been defined. If so, pick calls $pair->progress($item0, $item1) where $item0 and $item1 are the most recently added pair of items. progress is not defined in the Algorithm::Pair::Best package. It is meant to be provided by the caller. For example, to print a message as each pair is finalized: . . . { package Algorithm::Pair::Best; sub progress { my ($my, $item0, $item1) = @_; # assuming you have provided an 'id' method that returns a string: print $item0->id, " paired with ", $item1->id, "\n"; } } # back to main:: namespace . . . Normally wpick is only called by the pick method. wpick returns a reference to a list of the best pairing of $window pairs (or 2*$window items) starting from the first unpaired item in the list (as determined by add order). The returned list is in pairing order as described in pick. If there are fewer than 2*$window items remaining to be paired, prints an error and returns the best pairing for the remaining items. If an odd number of items remain, prints an error and returns the best pairing excluding the last item. Note that while the pairing starts from the first item in the add list, the returned pairs list may contain items from outside the first 2*$window items in the add list. This is because each item has its own ordered list of preferred pairs. However, the first unpaired item in the add list will be the first item in the returned list. Similarly, in the 'odd number of items remaining' situation, the discarded item is not neccessarily the last item in the add list. scoreFunc is not defined in the Algorithm::Pair::Best package, but the pick method checks to see if the caller has defined a subroutine by that name. If defined, it is called each time a candidate score is added to the currScore total for a trial pairing. Normally, Algorithm::Pair::Best simply adds the scores and tries for the highest total score. Some pairings may work better with a different total score, for example the sum of the squares of the scores (to reduce the ability of one bad pairing to compensate for a group of good pairings). scoreFunc provides a hook for this modification. If defined, scoreFunc is called as: $score = $item->scoreFunc($candidate, $score); where $item is the current Algorithm::Pair::Best item being paired, $candidate is the current candidate item under consideration, and $score is $candidate's unaltered score (wrt $item). IMPORTANT: Remember to retain negative scores (or disable the negOnly optimization. Example use of scoreFunc: . . . { package Algorithm::Pair::Best; sub scoreFunc { my ($my, $candidate, $score) = @_; # we want to minimize the squares of the scores: return -($score * $score); } } # back to main:: namespace . . . The gopair script from the Games::Go::GoPair package uses Algorithm::Pair::Best to run pairings for a go tournament Reid Augustin, <reid@HelloSix.com> This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself, either Perl version 5.8.5 or, at your option, any later version of Perl 5 you may have available. Reid Augustin <reid@hellosix.com> This software is copyright (c) 2011 by Reid Augustin. This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.
http://search.cpan.org/dist/Algorithm-Pair-Best/lib/Algorithm/Pair/Best.pm
crawl-003
refinedweb
2,027
60.55
Is there already a class that holds a date and not a time or do I have to make one? Using haxe.Date can cause issues with daylight savings time. You can’t just increment by a day by adding 24 hours, since some days are 23 hours and some are 25: See this example. I didn’t understand your problem, because for me your example works exactly as i expected. But there is a datetime library on haxelib: datetime (3.1.4) Maybe you are in a different timezone than me. In East Coast US I get the following output: 11:22:23:953 Sun Nov 04 2018 00:00:00 GMT-0400 (Eastern Daylight Time) 11:22:23:954 Sun Nov 04 2018 23:00:00 GMT-0500 (Eastern Standard Time) datetime library allows you to increment by one day: import datetime.DateTime; class Main { static function main() { var date = DateTime.fromString("2018-11-04 00:00:00"); trace(date); var nextDay = date + Day(1); trace(nextDay); } } Result: $ node bin/test.js src/Main.hx:12: 2018-11-04 00:00:00 src/Main.hx:14: 2018-11-05 00:00:00 1 Like
https://community.haxe.org/t/date-class-without-time/911
CC-MAIN-2022-21
refinedweb
196
74.29
Opened 7 years ago Last modified 6 years ago #12233 closed enhancement Make formatter.suite available to plugins — at Version 8 Description formatter.suite is useful for writing macro test cases, as seen in macros.py. However, from trac.wiki.tests import formatter fails in a plugin when the Trac is not installed in develop ( editable) mode. Change History (9) comment:1 by , 6 years ago comment:2 by , 6 years ago The only way I see to solve this is to either add trac.wiki.tests.formatter directly to the distributed package, or move the code in that file. I considered moving to trac.test, but maybe it would make sense to move to trac.wiki.test: log:rjollos.git:t12233_formatter_test_suite. comment:3 by , 6 years ago Why HelloWorldMacro is moved to trac.wiki.test package? I think WikiTestCase, subclasses of the WikiTestCase and wikisyntax_test_suite() only should be moved. comment:4 by , 6 years ago WikiTestCase uses HelloWorldMacro to create an environment: trunk/trac/wiki/tests/formatter.py@14791:161-164#L143. comment:5 by , 6 years ago I think we should allow to specify components to enable for WikiTestCase and wikisyntax_test_suite. Otherwise, it wouldn't be useful to test for plugins. comment:6 by , 6 years ago comment:7 by , 6 years ago I found we can use Environment.enable_component to enable components in the setup function that is passed to trac.wiki.test.wikisyntax_test_suite. This hadn't worked for me in the past, but the problem was that I specified a component rule rather than a module name (e.g. tractags.* rather than tractags). Proposed changes in log:rjollos.git:t12233_formatter_test_suite.2. See th:#12788 for a patch that uses trac.wiki.test.wikisyntax_test_suite in the TagsPlugin codebase. Edit: Created #12487 for proposed changes.
https://trac.edgewall.org/ticket/12233?version=8
CC-MAIN-2022-40
refinedweb
297
59.9
CvBridgeError: [8SC1] is not a color format. but [mono8] is. The conversion does not make sense [closed] I'm trying to convert a ROS message of class 'sensor_msgs.msg._Image.Image' to an OpenCV image using Python and cv_bridge. The ROS message encoding is "8SC1", which is a single-channel 8-bit (grayscale) format. However, when I go to use cv_bridge's "imgmsg_to_cv2", I receive the following CvBridgeError: [8SC1] is not a color format. but [mono8] is. The conversion does not make sense First of all, this is wrong because mono8 is NOT a color format. I set desired_encoding to "mono8" as this is my desired encoding. I also tried having desired encoding = "passthrough", but since this gave negative pixel values, I am attempting the mono8 conversion. It should be known that my ROS message is raw disparity values in pixels. I have used imgmsg_to_cv2 on another ROS (color) image message with no problems. Relevant Python code is below: import numpy as np import cv2 import rospy import std_msgs from sensor_msgs.msg import Image from cv_bridge import CvBridge cv_bridge_object = CvBridge() def ROS2OpenCV_disp_converter(input): output = cv_bridge_object.imgmsg_to_cv2(input, desired_encoding = "mono8") cv2.imshow('Disparity', output) cv2.waitKey(1) def stereoCameraSubscriber(): rospy.init_node("Stereo_Camera_Subscriber") rospy.Subscriber("/occam/disparity_image0", Image, ROS2OpenCV_disp_converter) rospy.spin() if __name__ == '__main__': try: stereoCameraSubscriber() except rospy.ROSInterruptException: pass I had the same issue and fixed it by specifying the desired output format of the conversion to ROS format: cv_bridge.cv2_to_imgmsg(image, 'bgr8')
https://answers.ros.org/question/224396/cvbridgeerror-8sc1-is-not-a-color-format-but-mono8-is-the-conversion-does-not-make-sense/
CC-MAIN-2021-04
refinedweb
242
51.95
<</font> <tr valign=top> <td> <div align=right><font size=1cc</font></div> <td><font size=1haskell-cafe@haskell.org</font> <tr valign=top> <td> <div align=right><font size=1Subject</font></div> <td><font size=1Re: [Haskell-cafe] monte carlo trouble</font></table> <br> <table> <tr valign=top> <td> <td></table> <br></table> <br> <br> <br><tt><font size=2> > Chad Scherrer wrote:<br> > > There's a problem I've been struggling with for a long time...<br> > ><br> > > I need to build a function<br> > > buildSample :: [A] -> State StdGen [(A,B,C)]<br> > ><br> > > given lookup functions<br> > > f :: A -> [B]<br> > > g :: A -> [C]<br> > ><br> > > The idea is to first draw randomly form the [A], then apply each<br> > > lookup function and draw randomly from the result of each.<br> > ><br> > I don't understand why this returns a list of triples instead of a<br> > single triple. Your description below seems to imply the latter.<br> ><br> > You should probably look at the "Gen" monad in Test.QuickCheck, which is<br> > basically a nice implementation of what you are doing with "State<br> > StdGen" below. Its "elements" function gets a single random element,<br> > and you can combine it with replicateM to get a list of defined length.<br> ><br> > (BTW, are you sure want multiple random samples rather than a shuffle?<br> > A shuffle has each element exactly once whereas multiple random samples<br> > can pick any element an arbitrary number of times. I ask because<br> > shuffles are a more common requirement. For the code below I'll assume<br> > you meant what you said.)<br> ><br> > Using Test.QuickCheck I think you want something like this (which I have<br> > not tested):<br> ><br> > buildSample :: [A] -> Gen (A,B,C)<br> > buildSample xs = do<br> > x <- elements xs<br> > f1 <- elements $ f x<br> > g1 <- elements $ g x<br> > return<br> ><br> > If you want n such samples then I would suggest<br> ><br> > samples <- replicateM n $ buildSample xs<br> > > It's actually slightly more complicated than this, since for the real<br> > > problem I start with type [[A]], and want to map buildSample over<br> > > these, and sample from the results.<br> > ><br> > > There seem to be so many ways to deal with random numbers in Haskell.<br> > ><br> > Indeed.<br> > > After some false starts, I ended up doing something like<br> > ><br> > > sample :: [a] -> State StdGen [a]<br> > > sample [] = return []<br> > > sample xs = do<br> > > g <- get<br> > > let (g', g'') = split g<br> > > bds = (1, length xs)<br> > > xArr = listArray bds xs<br> > > put g''<br> > > return . map (xArr !) $ randomRs bds g'<br> > ><br> > Not bad, although you could instead have a sample function that returns<br> > a single element and then use replicateM to get a list.<br> > > buildSample xs = sample $ do<br> > > x <- xs<br> > > y <- f x<br> > > z <- g x<br> > > return (x,y,z)<br> > ><br> > > This is really bad, since it builds a huge array of all the<br> > > possibilities and then draws from that. Memory is way leaky right now.<br> > > I'd like to be able to just have it apply the lookup functions as<br> > > needed.<br> > ><br> > > Also, I'm still using GHC 6.6, so I don't have<br> > > Control.Monad.State.Strict. Not sure how much difference this makes,<br> > > but I guess I could just copy the source for that module if I need to.<br> > ><br> > Strictness won't help. In fact you would be better with laziness if<br> > that were possible (which it isn't here). The entire array has to be<br> > constructed before you can look up any elements in it. That forces the<br> > entire computation. But compare your implementation of buildSample to<br> > mine.<br> ><br> > Paul.<br> ><br> <br> <br> -- <br> <br> Chad Scherrer<br> <br> "Time flies like an arrow; fruit flies like a banana" -- Groucho Marx>
http://www.haskell.org/pipermail/haskell-cafe/attachments/20070815/94f76245/attachment-0001.htm
CC-MAIN-2014-23
refinedweb
661
62.07
29 October 2012 06:38 [Source: ICIS news] SINGAPORE (ICIS)--?xml:namespace> Sinopec will start supplying Group II base oil grades from its 100,000 tonne/year plant at Jingmen in Most of the November supply will be produced by its subsidiaries Sinopec Jingmen, Sinopec Jinan and Sinopec Beijing Yanshan, the source said. These subsidiaries have Group I base oil plant capacities of 250,000 tonnes/year, 50,000 tonnes/year and 260,000 tonnes/year respectively. Sinopec Jinan has decided to delay the production of on-spec Group II base oils from its new 150,000 tonne/year plant to early November from 24 October, the source said. However, the actual production date has not been unconfirmed. Sinopec sold around 8,000 tonnes of Group I base oils in
http://www.icis.com/Articles/2012/10/29/9608127/chinas-sinopec-to-raise-november-base-oil-supply-by.html
CC-MAIN-2014-52
refinedweb
130
68.91
Abstracts a mask. More... #include <SpatialMask.h> Abstracts a mask. Use SpatialMask when using masks with Nebo. SpatialMasks can be used in Nebo cond. See structured/test/testMask.cpp for examples. Constructing a SpatialMask requires a prototype field and a list of (IntVec) points. The valid ghost cells of the SpatialMask match its prototype field. Points are indexed from the interior of the MemoryWindow (does not include ghost cells). Ghost cells on negative faces therefore have negative indices. Thus, if there is at least one valid ghost on every face, then the point (-1,-1,-1) is valid. The points in the list become the mask points (return true). All valid points not in the list are not mask points (return false). SpatialMask supports Nebo GPU execution. However, every SpatialMask currently must be constructed on the CPU and explicitly copied to the GPU with the add_consumer() method. Definition at line 70 of file SpatialMask.h. Construct a SpatialMask. Definition at line 101 of file SpatialMask.h. Referenced by SpatialOps::SpatialMask< FieldType >::SpatialMask(). Construct a SpatialMask. Definition at line 121 of file SpatialMask.h. Obtain a child field that is reshaped. The memory is the same as the parent field, but windowed differently. Note that a reshaped field is considered read-only and you cannot obtain interior iterators for these fields. Definition at line 259 of file SpatialMask.h.
https://software.crsim.utah.edu/jenkins/job/SpatialOps/doxygen/classSpatialOps_1_1SpatialMask.html
CC-MAIN-2017-51
refinedweb
228
62.34
1 /* crypto/aes/aes.h */ 2 /* ==================================================================== 3 * Copyright (c) 1998-2002 The OpenSSL Project. All rights. All advertising materials mentioning features or use of this 18 * software must display the following acknowledgment: 19 * "This product includes software developed by the OpenSSL Project 20 * for use in the OpenSSL Toolkit. ()" 21 * 22 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 23 * endorse or promote products derived from this software without 24 * prior written permission. For written permission, please contact 25 * openssl-core@openssl.org. 26 * 27 * 5. Products derived from this software may not be called "OpenSSL" 28 * nor may "OpenSSL" appear in their names without prior written 29 * permission of the OpenSSL Project. 30 * 31 * 6. Redistributions of any form whatsoever must retain the following 32 * acknowledgment: 33 * "This product includes software developed by the OpenSSL Project 34 * for use in the OpenSSL Toolkit ()" 35 * 36 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 37 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 38 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 39 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 40 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 41 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 42 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 43 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 44 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 45 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 46 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 47 * OF THE POSSIBILITY OF SUCH DAMAGE. 48 * ==================================================================== 49 * 50 */ 51 52 #ifndef HEADER_AES_LOCL_H 53 # define HEADER_AES_LOCL_H 54 55 # include <openssl/e_os2.h> 56 57 # ifdef OPENSSL_NO_AES 58 # error AES is disabled. 59 # endif 60 61 # include <stdio.h> 62 # include <stdlib.h> 63 # include <string.h> 64 65 # if defined(_MSC_VER) && (defined(_M_IX86) || defined(_M_AMD64) || defined(_M_X64)) 66 # define SWAP(x) (_lrotl(x, 8) & 0x00ff00ff | _lrotr(x, 8) & 0xff00ff00) 67 # define GETU32(p) SWAP(*((u32 *)(p))) 68 # define PUTU32(ct, st) { *((u32 *)(ct)) = SWAP((st)); } 69 # else 70 # define GETU32(pt) (((u32)(pt)[0] << 24) ^ ((u32)(pt)[1] << 16) ^ ((u32)(pt)[2] << 8) ^ ((u32)(pt)[3])) 71 # define PUTU32(ct, st) { (ct)[0] = (u8)((st) >> 24); (ct)[1] = (u8)((st) >> 16); (ct)[2] = (u8)((st) >> 8); (ct)[3] = (u8)(st); } 72 # endif 73 74 # ifdef AES_LONG 75 typedef unsigned long u32; 76 # else 77 typedef unsigned int u32; 78 # endif 79 typedef unsigned short u16; 80 typedef unsigned char u8; 81 82 # define MAXKC (256/32) 83 # define MAXKB (256/8) 84 # define MAXNR 14 85 86 /* This controls loop-unrolling in aes_core.c */ 87 # undef FULL_UNROLL 88 89 #endif /* !HEADER_AES_LOCL_H */
https://fossies.org/linux/openssl/crypto/aes/aes_locl.h
CC-MAIN-2019-09
refinedweb
462
55.07
Facebook Sued For Violating Wiretap Laws samzenpus posted about 2 years ago | from the join-the-club dept. .'" sorry no (4, Funny) Osgeld (1900440) | about 2 years ago | (#37734092) There is no way we can let go of this invaluable resource over a few lawsuits. Clearly the wiretap laws need to be changed or we will not have our greatest resource ... worthless information for dumb fuck advertising! Re:sorry no (0) Anonymous Coward | about 2 years ago | (#37734108) Re:sorry no (2) Cryacin (657549) | more than 2 years ago | (#37734244) Re:sorry no (1) ScrewMaster (602015) | more than 2 years ago | (#37734582) Wonder how many FacePalms there were at FaceBook after this little verdict? There should not have been any. This is not rocket science, from a legal perspective. Either Zuckerberg ignored the advice of his attorneys ... or never bothered to consult them in the first place. Facebook more than deserves any fallout from this because there was no need for it. Re:sorry no (0) Anonymous Coward | more than 2 years ago | (#37734414) There is no way we can let go of this invaluable resource over a few lawsuits. Clearly the wiretap laws need to be changed or we will not have our greatest resource ... worthless information for dumb fuck advertising! Sure you can, I blocked facebook.com and facebookmail.com on the company firewall and mail servers months ago, aside from a minor bit of bitching/teething no one noticed after a week. Re:sorry no (3, Informative) MacGyver2210 (1053110) | more than 2 years ago | (#37734554) With one free plugin it becomes worthless information with no advertising. Or if you're in the entertainment or media business, it can become useful information with no advertising. [adblockplus.com] Re:sorry no (1) Pf0tzenpfritz (1402005) | more than 2 years ago | (#37734756) Dumb Question (4, Interesting) Anonymous Coward | about 2 years ago | (#37734096) Dumb-question guy here: how can a web site gather users' "internet browsing history even when the users were not logged-in to Facebook"? Re:Dumb Question (5, Insightful) Beryllium Sphere(tm) (193358) | about 2 years ago | (#37734138) Put a "Like" button on every page they visit and store the Referrer field when the button gets downloaded. Re:Dumb Question (1) sortadan (786274) | more than 2 years ago | (#37734330) Re:Dumb Question (5, Insightful) Jane Q. Public (1010737) | more than 2 years ago | (#37734500) (0) Anonymous Coward | more than 2 years ago | (#37734698) Absolutely correct. Someone still on dialup internet would see the page loading stall for facebook.com/plugins/like or facebook.com/plugins/likebox or facebook.com/plugins/recommended. If they have cookies enabled, they just got a Facebook cookie, thus they have been tracked. By the way, also do a View Source if the page is http and not https, and chances are good that an opengraphprotocol namespace is being used on that page. Lately, I've noticed that's even the case lately with YouTube--maybe not a like button, but using the opengraphprotocol namespace. Re:Dumb Question (1) maxume (22995) | more than 2 years ago | (#37734702) They stopped with the cookies. Weeks ago. And really, the only reasonable solution is to (try to) educate people so that they understand how gregarious a web page can be and suggest techniques for controlling them. (You say 'script blocker', but RequestPolicy can prevent the http connections, and cookie blockers/managers reduce exposure. I expect the long term solution is to revert to only sharing cookies that the user has explicitly whitelisted for a given domain or whatever) Re:Dumb Question (2) TeamSPAM (166583) | more than 2 years ago | (#37734334) Re:Dumb Question (0) Anonymous Coward | more than 2 years ago | (#37734618) If you're dumb and allow third party cookies. Re:Dumb Question (1) AngryNick (891056) | more than 2 years ago | (#37734338) Re:Dumb Question (4, Informative) Jane Q. Public (1010737) | more than 2 years ago | (#37734520) Re:Dumb Question (1) Anonymous Coward | more than 2 years ago | (#37734634) so....what's the name of the facebook-blocking add-in for Chrome and Firefox? i use two things: adblock software - Firebug, to examine the offending frames, span's or div's within the DOM of the page that has the tracking element. - Ad blocking plug in. You need to find the URLS of annoying buttons browser-wart frames, and then blacklist the sites with the adblock software. I don't work for these companies or OS products. I was very upset when a 'redesign' of a site that I use everyday to get news suddenly made my browser crawl, almost to the point of wedge. I started going after any frame or div that was absolutely placed within the browser, those annoying buttons that stick to the bottom of the page (do you remember seeing them before three months ago?). They are poxxed with the names of pre-IPO companies, darlings of the self-annoited kings of the world. Why a company that has a successful site would want to give their site a pox, with buttons that most people don't know how to remove, baffles me! If I had a major site with a lot of traffic I wouldn't let it be subverted by the snoops and market-manipulators of the corporate brainwash factory. Even if the buttons weren't tracking me I'd still find them offensive. You absolutely can innoculate your browser from these intrusions into your user experience. 1. Install the software of your choice to do the following: manipulate the DOM of a loaded page. (if you don't know what the DOM is, you don't need to know a lot about it to do what I am suggesting) I loaded Firebug and every time I see a wart or pox-button on any page (especially the kind that don't go away or that stick to the browser frame) I do an 'inspect element' using the Firebug extensions. 2. When you see the element that is the offending one, delete it within Firebug (or whatever DOM manipulator that you choose to use). That way you can see if you have really found the correct div or frame that you need to black-list. 3. Using adblocker software blacklist the URL of the offending div or frame (if there is anything loaded you will see it in the code). Usuaslly there is along string of things such as: http:// some site name.com/stuff that looks like jibberish but loads whatever it is that they are trying to load you take the part that is http:// some site name.com/ and delete the jibberish part. put a star wildcard at end of the URL to block everything from that URL. 4. Do a test by reloading the page to see if the adblock is working. If it is doing the trick the annoying frame-warts and pox-buttons will be removed! Your browser will run quicker! You won't be plauged by mal-ware javascript insertions from ad sites (not accusing a reputible company of putting bad-code out there but . . . we all know that . . . uuh. . . stuff . . . happens. Using top from a command shell I was able to verify that CPU processor time of the firefox process returned to a reasonable level. It should be a design rule that an element doesn't stick to the frame of the browser. If they ever do I find the div and delete it with Firebug. Then I use the adblock, with the URL of the offending div or frame and that annoyance if firewalled away. each of those divs that loads down a rouge page from some track-miestr site can be a monolith of bad code and malicious intent. It would only take a hack of any of these ad-monster sites to compromise large swathes of the Internet. They are a security risk of a very high order. It isn't hard to innoculate yourself from broswer-frame warts and pox-buttons. What compelled me to do it was, as I said, the annoyance of a site that I like suddenly being poxed with buttons that don't scroll away. Re:Dumb Question (0) Anonymous Coward | more than 2 years ago | (#37734382) "when the button gets downloaded" Which you *do not have to do*. If you don't want people to hear you, then stop shouting from the rooftops. Sending data to Facebook and then getting mad when they remember it just seems .. insane. Why would you send them something you don't want them to have? Re:Dumb Question (4, Informative) tomhudson (43916) | more than 2 years ago | (#37734422):Dumb Question (0) Anonymous Coward | more than 2 years ago | (#37734536) So setup adblock to not connect to Facebook. I really don't get the big deal. The Facebook "like" button is definitely a privacy invasion... but it's exactly the same as Google Analytics... I just block both of them. Are these states suing Google, too? Who they REALLY need to sue. (1) tomhudson (43916) | more than 2 years ago | (#37734640) Or eventually, we'll come up with "Consumer DRM" - where WE manage our own digital rights. After all, if it's good enough for Sony, it's good enough for you and me :-) Re:Dumb Question (0, Troll) Anonymous Coward | more than 2 years ago | (#37734648) "See the "Like" button?" No, I don't. I've NEVER seen one. Not once. Again, you do not HAVE to request this button. If you don't want it, don't ask for it to be transferred to your computer. It's that simple. "Totally illegal." Sure, whatever. So now sites sending you data that YOUR OWN BROWSER requests is illegal? Would you care to stop knee jerking and think a little bit? Re:Dumb Question (1) tomhudson (43916) | more than 2 years ago | (#37734752) I have a right to assume that the web site will act within the law, same as if I invite you into my home I have a right to expect that you would do the same. The web sites enabling such tracking are violating the law, as simple as that, so instead of YOUR knee-jerk reaction, why not think why people are cheesed off? Web sites simply don't have permission to set ANY cookies without your permission - the fact that they set one if you opt out is also a violation of the law in, for example, Europe. The default should be opt out, not opt in. Re:Dumb Question (0) Anonymous Coward | more than 2 years ago | (#37734778) Re:Dumb Question (1) linatux (63153) | more than 2 years ago | (#37734668) Does this include the "Like" button on this page? Re:Dumb Question (0) Anonymous Coward | about 2 years ago | (#37734150) As I understand these things: Facebook keeps a cookie with a unique identifier that persists after you logout. When you visit a site with an embedded "Like" button, the cookie is accessed and your unique identifier passed on. It's a pretty horrid practice. Re:Dumb Question (1) icebraining (1313345) | about 2 years ago | (#37734174) Actually, they create an ID even if you don't even have an account. Or at least they did until recently. Re:Dumb Question (1) AwesomeMcgee (2437070) | more than 2 years ago | (#37734250) Re:Dumb Question (0) Anonymous Coward | more than 2 years ago | (#37734362) Which is good. Cookies used without at least implicit consent (logging in, and not having logged out) are a problem. The inclusion of a 'like' button on a webpage, which causes the browser to contact Facebook, is opaque to the user and doesn't imply consent, even if the user is also currently logged in to Facebook, though clicking on the button would. And yes, restricting data-mining of logs is also good. Re:Dumb Question (1) mcavic (2007672) | more than 2 years ago | (#37734454) If this suit goes through it basically means you can no longer use cookies and mine your server logs. No, it means you can't track people when they visit someone else's site. Re:Dumb Question (1) fatphil (181876) | more than 2 years ago | (#37734614) Facebook seem the least culpable for this - other websites chose to add the buttons, and users' (unthinkingly) *initiate* communication with facebook. All fb are doing is giving people what is being asked for, and logging that transaction. This seems as badly thought out as the deep linking lawsuits in the past. Blame the browser writers for not defaulting to blocking 3rd-party images before blaming facebook for this. Re:Dumb Question (0) Anonymous Coward | more than 2 years ago | (#37734622) Re:Dumb Question (0) Jane Q. Public (1010737) | more than 2 years ago | (#37734540) Re:Dumb Question (4, Informative) icebraining (1313345) | about 2 years ago | (#37734152) (1) mattventura (1408229) | about 2 years ago | (#37734156) Re:Dumb Question (1, Redundant) loimprevisto (910035) | about 2 years ago | (#37734182) Short answer: mostly by setting cookies in your browser, but with several other tricks as well. Re:Dumb Question (2) the eric conspiracy (20178) | about 2 years ago | (#37734186) By loading a page with a embedded link to Facebook. Like buttons, transparent 1 pixel gifs, etc. Re:Dumb Question (0) Anonymous Coward | more than 2 years ago | (#37734476) By using a site that has the "Like This" button on it. But Privacy Doesn't Matter! (0) Anonymous Coward | about 2 years ago | (#37734170) Unless you earn too much, are a minority, have been raped or abused by an ex-partner, are too young or too old to have good judgment, etc. If privacy isn't a right inherent to all people, then perhaps it is better if we enforce nudism. If we remove all of our clothing for queen and country, it would be much easier to spot any terrorist bombs. Re:But Privacy Doesn't Matter! (1) PyRoNeRd (179292) | more than 2 years ago | (#37734206) If you aren't a criminal you don't need privacy! consent (0) Anonymous Coward | more than 2 years ago | (#37734190) This will be an interesting test of just how onerous terms you can put in your "terms of service" and have them stick, even though everyone knows that practically no one reads those terms. Cookies cannot "unlawfully intercept" anything (2, Interesting) Anonymous Coward | more than 2 years ago | (#37734192):Cookies cannot "unlawfully intercept" anything (0, Flamebait) agm (467017) | more than 2 years ago | (#37734218) Indeed. The user is intentionally using software that sends tracking information (cookies) to Facebook. It's the browser that is at fault, not Facebook. If you don't want tracking information sent to third parties, then stop using software that sends such information (or configure the software to not send it). Re:Cookies cannot "unlawfully intercept" anything (0) Anonymous Coward | more than 2 years ago | (#37734272) "If you don't want tracking information sent to third parties, then stop using software that sends such information (or configure the software to not send it)." Yes - they can only track WHAT YOU SEND THEM - even with the "like" button plastered all over. It's still your computer that sends them the data. If you don't want to, by all means, don't! I don't. But don't expect the crowd here to understand this simple issue that you don't have to send them anything if you don't want to. If you actually *think* here, that puts you well outside the group norm, and you will be modded to oblivion by the group-think. By the way this issue pertains also to google and various other data collection companies. Facebook isn't the only one who wants to track you. I hate facebook. I hate all such tracking. Thus, I do not send them data to track me with. Problem solved. This reminds me of the people who eat at McDonalds every day, get fat, and then sue McDonalds for making them fat. Jesus! Just don't eat there! Nobody is making you do so. Re:Cookies cannot "unlawfully intercept" anything (2, Funny) Anonymous Coward | more than 2 years ago | (#37734304) Yeah! They shouldn't use computers, either. If you don't want bad shit to happen to your computer, then stop using computers. This is your fault. Your fault! The only recourse is to throw your arms up in the air like a Fraggle, bend over, and take it. Not taking it is consent. Re:Cookies cannot "unlawfully intercept" anything (0) Anonymous Coward | more than 2 years ago | (#37734336) "Yeah! They shouldn't use computers, either." Nice straw man. I use computers every single day, and I am not tracked by Facebook. They can only track you *if you send them the data*. If you don't want to be tracked, don't bloody send it! You get to chose what your computer does. It belongs to you. It obeys your commands. That's what it's FOR. If you don't want it doing something, then by all means, don't allow it to do that. Re:Cookies cannot "unlawfully intercept" anything (3, Informative) hedwards (940851) | more than 2 years ago | (#37734498):Cookies cannot "unlawfully intercept" anything (0) Anonymous Coward | more than 2 years ago | (#37734746) "there's no way of avoiding them" That's not true. It is your computer which makes the request for the button. You get to control your own computer, so if you don't want to fetch the "like" button, then don't! Nobody is making you. It seems, well... insane actually, to request something to happen, and then get mad when it happens. If you were going to get mad, why did you ask for it in the first place? Where, exactly, did this simple concept get lost? It's like watching a whole generation of human beings suddenly become chimps, and lose all capacity for even the most basic level of human reasoning. Re:Cookies cannot "unlawfully intercept" anything (0) Anonymous Coward | more than 2 years ago | (#37734726) "I use computers every single day, and I am not tracked by Facebook" You are so obviously stupid you even think you have an argument. Think about this for a moment: what about sites you don't know in advance you don't want to send info to? YES AND BIG YES!!! *Not* sending data to a given site (Facebook, in this case) forces you not only to take *positive action* to prevent it but to know *in advance* you don't want to send info to them. Don't you still see the problem? Re:Cookies cannot "unlawfully intercept" anything (0) Anonymous Coward | more than 2 years ago | (#37734786) "You are so obviously stupid you even think you have an argument." Maybe you should learn to think before calling other people stupid. You don't block every site with the FB button. You block the loading of the FB button itself. You do not have to know in advance which sites embed it - that would be idiotic. Sheesh. Whatever happened to basic rational thought? Re:Cookies cannot "unlawfully intercept" anything (1) martin-boundary (547041) | more than 2 years ago | (#37734350) Facebook are taking information from the browser, knowing full well that the person running the browser is unknowingly being deprived of privacy by his browser. Re:Cookies cannot "unlawfully intercept" anything (1) agm (467017) | more than 2 years ago | (#37734426) This is not like receiving stolen goods. The user (via software they choose to use) is willingly handing Facebook this information. It's a bit odd to willingly hand someone something and then complain later about it. The best option is to stop handing them that information in the first place. Re:Cookies cannot "unlawfully intercept" anything (2) hedwards (940851) | more than 2 years ago | (#37734506) It's not willful if you've logged out in the meantime. Just because I have an account with Google for say email or YouTube, does not mean that I consent to have them tracking me when I'm making posts here, or possibly downloading porn. Re:Cookies cannot "unlawfully intercept" anything (1) agm (467017) | more than 2 years ago | (#37734626) And yet you use software that you know sends this information. Being logged in or not isn't relevant. You've configured your software to send tracking information to any web server you browse to. Re:Cookies cannot "unlawfully intercept" anything (1) fatphil (181876) | more than 2 years ago | (#37734646) If you have given your consent for your browser to load 3rd party images on webpages, you *have* consented to have 3rd party websites tracking your web usage. Re:Cookies cannot "unlawfully intercept" anything (1) Score Whore (32328) | more than 2 years ago | (#37734734) If you don't want google to know you're downloading porn (and exactly what porn you are downloading) (and any warez, etc.) then you'll need to make very sure that you never use a site that uses recapcha. Fucking google. Re:Cookies cannot "unlawfully intercept" anything (1) Narcocide (102829) | more than 2 years ago | (#37734656) While I actually like where the logical conclusion of this argument goes, I just don't see it happening. What you're suggesting is only practical for most users to implement by turning off all cookies and scripting entirely, and Facebook could still trivially sidestep that unless you also turned off all images and all URLs for any embedded resources that are not on the current website's domain. So, personally I'd like to back your argument and agree with you here. If everyone did this it would certainly take the wind out of Facebook's revenue and marketing plans (and many other social networks and news sites, no doubt) but I think we can also both admit here that the suggestion is impractical to the point of being absurd. Re:Cookies cannot "unlawfully intercept" anything (1) agm (467017) | more than 2 years ago | (#37734802) I understand your point, but how does that relate to this law suit? At the end of the day this is not about Facebook taking your private information, it's about you *giving* that information. From a legal point of view that quite a big difference, regardless of how impractical it is to configure your software to stop handing this info to Facebook. There are a few Firefox add-ons that prevent this from happening without disabling cookies altogether. Re:Cookies cannot "unlawfully intercept" anything (0) Anonymous Coward | more than 2 years ago | (#37734430) "Facebook are taking information from the browser," No. They are REQUESTING data from your browser. They cannot make your browser do anything at all. It's more like someone walking up to you on the street and saying, "Hey, gimme $100". Then you say, "OK", and give them $100, and later get mad. Well, why did you give it to them in the first place, if you didn't want to? They aren't "stealing" anything from anybody. That's crazy to even say. Re:Cookies cannot "unlawfully intercept" anything (1) Narcocide (102829) | more than 2 years ago | (#37734700) Well, while the last sentence *might* be true since most browsers typically *do* give out cookies without asking your permission first, your analogy is totally flawed because most people's wallets do *not* automatically default to dispensing $100 by default when someone (usually without you even hearing it happen) asks your wallet (not you) directly for $100. Re:Cookies cannot "unlawfully intercept" anything (0) Anonymous Coward | more than 2 years ago | (#37734800) But that default is *their choice*. If you don't want your wallet giving out $100 to strangers, then simply tell it not to! It does what you ask it to do. That's its entire purpose. If you allow your wallet to do this, and then get mad when it does, you just look like a nutcase. If it bothers you, then don't do it! Re:Cookies cannot "unlawfully intercept" anything (1) cheater512 (783349) | more than 2 years ago | (#37734488) That isn't what the law says though. The law only applies in wiretapping cases. You can try and change the law to include tracking cookies, but you cannot apply the wiretapping law to this case. Re:Cookies cannot "unlawfully intercept" anything (1) ScrewMaster (602015) | more than 2 years ago | (#37734636) That isn't what the law says though. The law only applies in wiretapping cases. You can try and change the law to include tracking cookies, but you cannot apply the wiretapping law to this case. I'll bet they can. "Wiretapping" doesn't necessarily have to involve wire. I'm not a lawyer, and I haven't read the statute in question, but if these States Attorneys didn't feel they had a case I doubt they'd have filed suit. Furthermore, even if the law doesn't sound to applicable to the technical types that populate Slashdot, odds are it can be made to sound that way in court. Just takes a friendly or misinformed judge to allow a twisted interpretation to stand. You just have to look at thirty-odd thousand RIAA copyright infringement cases for any number of stellar examples of how courts can get technical issues dead wrong. Re:Cookies cannot "unlawfully intercept" anything (5, Informative) Jane Q. Public (1010737) | more than 2 years ago | (#37734570) :Cookies cannot "unlawfully intercept" anything (1) agm (467017) | more than 2 years ago | (#37734630) That does not fit the definition of "intentional" Configuring your browser so it sends cookies is intentional. You can change it so it doesn't. Being aware of this, and doing nothing shows that you consent (if you didn't consent, you wouldn't let your software send tracking information). First Facebook, then ... (2) PPH (736903) | more than 2 years ago | (#37734212) What FB is doing has already been done via banner ads provided from a few major ad sites for years (instead of 'Like' buttons). Its possible that Facebook is legally in a different position then the advertisers, since they (FB) can identify their users. But other then that, tracking is tracking. Re:First Facebook, then ... (0) Anonymous Coward | more than 2 years ago | (#37734290) Which is why I do not send them data to track me with. If you do send them the data, they will use it. If not facebook, then someone else. This isn't a problem with a legal fix: it'll just push the tracking into other countries without such laws. The only fix is to not send data you don't want to have tracked, which actually isn't all that hard to do. Re:First Facebook, then ... (0) Anonymous Coward | more than 2 years ago | (#37734438) Its possible that Facebook is legally in a different position then the advertisers, since they (FB) can identify their users. But other then that, tracking is tracking. If you can substitute "then" for "at that particular time" in your phrase as in "First Facebook, at that particular time everyone else", your usage is correct. If you can't, as in "It's possible that Facebook is legally in a different position at that particular time the advertisers, since they (FB) can identify their users. But other at that particular time that, tracking is tracking", then you are a moran :P Re:First Facebook, then ... (2) MacGyver2210 (1053110) | more than 2 years ago | (#37734568) Everyone else? Good. This is invasive and illegal if you correctly read the laws and don't 'interpret' them to suit your donors and benefactors. Hooray for Adblock + Antisocial filter (0) Anonymous Coward | more than 2 years ago | (#37734234) If I wanted to see Facebook crap, I would join Facebook. Re:Hooray for Adblock + Antisocial filter (1) RazorSharp (1418697) | more than 2 years ago | (#37734316) If I wanted to see Facebook crap, I would join Facebook. I've used multiple extensions that claim to block Facebook stuff and they only work half the time. I still haven't found one to stop getting Facebook cookies. I have to delete them all the time even though I've never gone to Facebook's website. I can't go to any commercial website these days (except Google) without getting their crap on my computer. Re:Hooray for Adblock + Antisocial filter (1) fatphil (181876) | more than 2 years ago | (#37734722) If you don't want to be tracked via cookies... (0) Anonymous Coward | more than 2 years ago | (#37734252) ... then don't accept cookies. It's your own fault for using software which sends them information they can track you with. Re:If you don't want to be tracked via cookies... (0) Anonymous Coward | more than 2 years ago | (#37734352) But that requires the ability to perform basic logical reasoning, which is far beyond the ability of most humans. Your solution cannot work for that reason: people are simply too stupid to comprehend it. Congressional Hearing, perhaps? (0) Anonymous Coward | more than 2 years ago | (#37734254) This is more important than Solyndra, the Manhatten Mosque, or any number of other things that received more time in Congress than they warrant from a bathroom toilet stall. There's a reason I'm not a Facebook user, and why I'd be glad if the founders were thrown in jail. Third party cookies? (0) Anonymous Coward | more than 2 years ago | (#37734256) Is this about Third Party Cookies or Global Cookies where when you visit website A it makes a request to website B and website B sets the cookie? And in this case website B is Facebook and every website and their dog is making a request to it? Kind of like what Google is doing with Adsense and of-course so MANY other websites are doing. My question is... I thought there was some RULE ( hehe ;) whereby this Global cookie tracking thing was a no-no. Wasn't there a bunch of hoopla over this type of thing a few years back. Misuse of wiretapping law. (3, Insightful) BitterOak (537666) | more than 2 years ago | (#37734274). (2) frosty_tsm (933163) | more than 2 years ago | (#37734308) What we really need is our laws to be updated to reflect technology rather than using laws created back when telegraph lines were high-tech. Re:Misuse of wiretapping law. (5, Interesting) Nidi62 (1525137) | more than 2 years ago | (#37734326). Re:Misuse of wiretapping law. (2) ILongForDarkness (1134931) | more than 2 years ago | (#37734440) Perhaps a catch all "I know it when I see it" clause is needed for tech. Tech is going to change quicker than legislation can. Streaming video okay? What about streaming from one persons iTunes library to another persons, isn't that just sharing something you own? Who knows. Courts should be able to weigh the case without having to wait 10 years for both houses to figure it out, especially since what they come up with will likely be hugely lobbied by special interests and likely not reflect common sense. In this case as the judge I'd probably have to agree that the wiretappnig laws apply. Sure technically it is your browser talking to Facebook and telling it who you are but the thing is you've logged out, as far as a "reasonable person" would think you are no longer on Facebook but on company Xs website. You didn't chose the banner ad that was presented but if it happens to be one from Facebook they get your info, but if another companies ad happened to be shown your browser won't have "chosen" to send info to Facebook? It doesn't pass the "reasonable person" test since if I really wanted Facebook to know my browsing habits I would have installed something willingly that would talk to Facebook regardless of the ad (we don't go to sites usually because we want to look at their ads but for the content on the page). Re:Misuse of wiretapping law. (1) CastrTroy (595695) | more than 2 years ago | (#37734482) Re:Misuse of wiretapping law. (5, Insightful) Bill Dimm (463823) | more than 2 years ago | (#37734434):Misuse of wiretapping law. (2) fatphil (181876) | more than 2 years ago | (#37734684) The situation is basically no different from the old 1x1px transparent web bugs of old. The tech savvy have known the implications of those for over a decade: the first google hit points to 1999, , but they go back a while before that. Re:Misuse of wiretapping law. (2) Bill Dimm (463823) | more than 2 years ago | (#37734784) Your analogy has nothing in common with the situation in question at all. Nothing at all? Facebook is given access to another website's users for one reason (to supply a "like" button), and it uses the opportunity to do something else (tracks the user). Likewise, the mechanic is given access to my car for one purpose (change oil) and uses the opportunity to do something else (install GPS tracker). The situation is basically no different from the old 1x1px transparent web bugs of old. The tech savvy have known the implications of those for over a decade... Please re-read the post by BitterOak that I was replying to, and you'll see that it is different. BitterOak claimed that it isn't wirefraud because wirefraud involves interception by a third party when neither party consents, and he claims that websites displaying a "like" button have consented. I've never posted a Facebook "like" button on a website, but if Facebook simply provides some HTML code and says "paste this into your website so users can 'like' your page" without explaining that pasting the code in will also allow Facebook to track the website's visitors, how can Facebook claim that the website operator gave consent for that tracking? It's like saying that I consented to a mechanic putting a GPS tracker in my car because I took it in for an oil change. If a website operator puts a 1x1 pixel web bug into his/her page, he/she almost certainly knows that it is being used for tracking -- there isn't much opportunity for him/her to think that it serves some simpler purpose like displaying a "like" button. Re:Misuse of wiretapping law. (1) Anonymous Coward | more than 2 years ago | (#37734708) Is it facebook's fault that when given a piece of embeddable, executable javascript, they were too lazy and inept to see what a technically savvy person could have in 15 seconds? Oh wait, let me guess--you're like my old manager who taught IT at a local community college and thought she was tech smart because she could use Excel macros. And even wrote HTML back in like 1998. Not that she knew a fucking thing about how the protocol worked, how cookies were sent, how CGI worked... it was all just "magic" she pushed over frontpage's FTP. Sure, facebook didn't go out of their way to advertise this, but that's because it's irrelevant to the function they offered. If you're going to load my script, and my image, using my high-speed CDN and bandwidth--I can't help but fucking know about you. And if you've got a cookie--I still know who you are--logged in or not. If you think this is bad, try looking at the little thing called google-analytics and ask yourself what google knows about you! Or maybe comscore--it's right here on *this* page you're reading. Then look at the other CDNs commonly in use that have data sharing arrangements. And then when you're done being inept, think for a split fucking second about the marketing and analytics firms like what I mentioned above. You know, that are also everywhere and /served/ via CDNs? Once again making the vast majority of your access...visible. And hey--it takes a single damned piece of paper in an agreement to aggregate that data and traffic and maybe start sharing it. Is that too dangerously close to a wiretap for you and your general counsel? Okay, I'll serve a randomized beacon via the CDN and have it resolve via ultrafast caching DNS (installed at the ISP because we paid for it to sit there) and it'll forward the report back to me later. Your car analogy fails. When your car automatically and programmaticaly stops at every fucking mcdonalds it happens to drive past because every store includes instructions to it right before the exit (bottom of webpage) it's your fault for not getting a better driver. And this is why car analogies...suck. It's a damned computer. And you're the idiot that thought it would be a good idea to let some random website execute any piece of programming that some underpaid shithead from delhi thought to put on it. In addition to what every psychotic from marketing thought they could add in for a few cents on their next paycheck. In addition to whatever the undermanned IT team thought to include from Google to save time and cost and figured it's just your privacy vs their time and budget. YOU. Made. The. Choice. Not microsoft. Not Google. Not Apple or Adobe. It's your damned computer, and your damned website. And you were too inept, incompetent, or lazy to think for a split second that the 'freeby' might have some other cost, or even to fucking ask someone that knew about it. Yes, I'm ranting. If you're a web developer and you can't talk HTTP natively, you make me sick. Re:Misuse of wiretapping law. (1) Anonymous Coward | more than 2 years ago | (#37734516) I doubt you really understand the level at which these marketting people have tracked everyone on the Internet. The amount of bandwidth needed to do this must be considerable! They basically are tracking people as they click around the pages, logging every site, putting a time stamp on the various page requests. Do you like that they know every site that you go to if you don't do advertisement blocking and ad-site black-listing? You have no idea how far they have taken this. None. They have crossed a line and it sure seems like tapping to me becuase the communication that they tap is the request and order of request for data. You you like everyone knowing every book you pickup in a book store? Do you want everyone to know what rocks and pebbles you examine on a beach? At what level is this an invasion of privacy when my private behavior is fodder for their attempts at hypnosis and brainwashing? How is what they do different from pointing a telescope into someone's living room and watching their keystrokes and mouse moves with a telephoto lens? Ya, of course it is different. What they do is a far easier and more accurate way to get the data. If you really have no problem with them tracking you does the frivilous use of power resources to do all of this not present some kind of environmental concern? Do corporations and the government realy have a need to know all my keystrokes and mouse clicks? If you are not a shill for these web-trackers then you really can't have thought about this for very long. And you probably don't know anything about web-page architecture. Re:Misuse of wiretapping law. (3, Informative) Jane Q. Public (1010737) | more than 2 years ago | (#37734616) :Misuse of wiretapping law. (1) Aighearach (97333) | more than 2 years ago | (#37734672) The wiretapping law is meant to cover interception by a third party of communications between two other non-consenting parties. No, it is often intended to cover cases where any of the parties are non-consenting. Figures they went to that Bilderberger meeting.... (2) sgt_doom (655561) | more than 2 years ago | (#37734322) [amazonaws.com] [flickr.com] No one has pointed out the most shocking fact... (-1) Anonymous Coward | more than 2 years ago | (#37734342) Re:No one has pointed out the most shocking fact.. (0) Anonymous Coward | more than 2 years ago | (#37734486) Well, this is the northern Mississippi federal court which is quite famous for excessive amounts awarded in lawsuits. They're pretty well known in the legal community, even worse than eastern Texas. A lot of this is due to everybody in the area know each other or being related to the person's neighbor or the like. The area is also well known for the amount of insurance fraud and the like. Basically, this is the beginning of someone(s) collecting a nice payday. Re:No one has pointed out the most shocking fact.. (1) Osgeld (1900440) | more than 2 years ago | (#37734550) the south is coming around, I saw a "Books-a-Million" in Alabama! Facebook kind of deserves the scrutiny... (0) Anonymous Coward | more than 2 years ago | (#37734524) The other day, I noticed Yelp managed to show me my facebook friends using Yelp... the only problem is, I deactivated my facebook nearly a year ago. Either yelp is storing my facebook friends in their database (violation of facebook's TOS?) or the facebook API doesn't care if an account is deactivated if there is a (old) session. Either way it feels nefarious... I guess I'll need to reactivate it and perform a manual seppukoo. I'm glad Facebook comes under such severe scrutiny, because they have done a lot of this to themselves. Doing /good/ business sometimes means NOT doing what everyone else is doing and actually being a leader and innovator (two things I personally think facebook lacks). I will admit however many of these concerns would be out the door if people didn't post personal information or 'secrets' to the internet to begin with. The internet is general is only as secure as one makes it. Is there some way... (0) Anonymous Coward | more than 2 years ago | (#37734530) ...to use Facebook's user tracking against them? Send them incorrect data or something? Wouldn't this apply to other tracking mechanisms? (1) Virtucon (127420) | more than 2 years ago | (#37734584) I guess unless you explicitly "opt-in" this could be extended to all tracking mechanisms such as fine grained or coarse grained GPS tracking, Ad-Aware cookies which track which websites you've been on etc. It seems Facebook is being singled out here but I can't honestly think that they're doing much of anything different than what has been happening on the web for years. Disabling Cookies has been mentioned here so I guess like disabling Adoobe Flash Cookies (Storage) and disabling cookies in General, you'll solve some of the tracking issues. Now if Amazon would stop inferring that because one time I bought a Kids PC Game they'd stop sending me Kids PC game announcements. I know, I can opt-out but it's still funny since I bought those games over 15 years ago yet they still hope that some day I'll buy another version of "putt putt." End Result? (0) Anonymous Coward | more than 2 years ago | (#37734592) 1) Slap on the wrist for Facebook. 2) All TOS agreements are rewritten to require full permission given for unlimited* tracking. 3) Contract lawyers buy another yacht from the extra billing. * unlimited in the traditional sense, not the unlimited** as seen in marketing material. ** unlimited up to [insert arbitrary amount here]. Like ... Oh .. WoW Man (-1) Anonymous Coward | more than 2 years ago | (#37734716) So. These are the facts. Obama and his gay and lesbian friends in Dept. of Defense, FBI, IRS, Dept. of State can deny the same when its gay and lesibians from Facebook to do something as dirty as they do. WoW dude. LoL Obama and his gay and lesbian pals suck. Ah hu huu hu ... Hrr hr hrrr hr. So like Obama is a Faggot .. Ahh huuhaaa (-1) Anonymous Coward | more than 2 years ago | (#37734776) Ahh ... ahhy ahhuu ah ahuuu ah hu huuu ... Hrr hrrrrr a hrr hr hrrrr a hrrr ahyrr hrr hrrrr. Dude. Yea. Like Obama is dooling over this while he sits on the roof of the White House and beats off. Ah ahhuu haa haaa ha .... Hrrrrr hr hyr hinrrrr.. So, exactly like Google... But less so (0) Anonymous Coward | more than 2 years ago | (#37734808) Nearly every major site uses google-analytics, which informs google about every link you click on. You don't even have to have a google account, much less be signed in. This case only affects pages which have the "Like this" facebook link on it, which is far less ubiquitous than google-analytics. We should really be focusing on stopping Google's practices right now.
http://beta.slashdot.org/story/159230
CC-MAIN-2014-15
refinedweb
7,485
70.73
Julia for Rubyists: Crunch Those Numbers I worked at a lab at MIT this summer focusing on some research related to compression of information as it travels through the network. A lot of my work was implemented in MATLAB. This wasn’t because of any particular preference on my part; it just happens that a lot of research (especially stuff that’s math heavy) is built on MATLAB. There are a lot of things I like about MATLAB. Anything to do with matrices (a simple example: creating a matrix with a bunch of zeros is just zeros(n, n)) is really easy, the documentation is generally pretty good, and it’s quick to get started with the language. The feature set is awesome and, especially if you’re doing something in computer vision, seeing the results of standard algorithms quickly is incredibly useful. There are also a lot of things I strongly dislike about MATLAB. In general, it feels as if MATLAB is continually trying to stop you from writing clean, readable code. Building abstractions is unnecessarily difficult and the concept of reusable libraries seems foreign to a lot of the MATLAB community. There’s no direct access to threading or any sane, generalizable concurrency framework. Also, I think it’s a pretty bad sign that there’s a website called Undocumented MATLAB that’s dedicated using “hidden” parts of MATLAB. Julia is supposed to take the spot of MATLAB as a language quick to pick up and sketch out some algorithms, but it also feels like a solid language built by computer scientists. Of course, if you’re a Rubyist, you might not care about MATLAB to begin with, so what’s the point? Well, if you’re doing any sort of numerical work, Julia is definitely worth a look: it gives you the feel of a dynamic, interpreted language, with performance close to that of a compiled one. Creating quick visualizations of data is also a breeze. Julia might seem a bit weird at first with its lack of OOP and all, but, with a little bit of effort, it can definitely expand your capabilities. This article won’t really go into a lot of depth into the syntax of Julia, as you can learn that elsewhere pretty quickly. Instead, we’ll focus on the stuff that makes Julia exciting and cool. We’ll whirl through matrices, datasets, plots, and cover a couple of statistical functions. We won’t take a look at each implementation in Ruby, but we’ll try to focus on the difference in the philosophies of the two languages. Installation Thankfully, Julia has a nice downloads page that should point you in the right direction. I use the Juno IDE which is based on Light Table and let’s me do stuff like this: That’s some Julia code that’s being evaluated to show me the results right there, within the editor. When we look at some of the plotting features, having Juno handy will help you see the results of your efforts very quickly. Matrices Matrices are the bread and butter of numerical computing. All sorts of algorithms depend on operations that are typically defined on matrices. A pretty common example is image blurring: blurs are often applied by “convolving” (i.e. using some weird operation) a kernel (i.e. a type of matrix) with an image (another matrix). Basically, we want any numerical language to have very strong support for matrices. There is some decent support for matrices in Ruby. We have the Matrix class which provides us with convenience methods like Matrix.zero(n) to create an n by n matrix of zeros. However, matrix operations in Ruby generally aren’t incredibly fast (especially in comparison to compiled languages). Julia has awesome utility methods for matrices and attains C-like performance. Let’s check out an example. Fire up the Julia REPL (thankfully, it has one of these) and type in the following: x = zeros(10, 10) The output should look like: 10x10 Array{Float64 Just like that, we have a 10 by 10 matrix of zeros. This is pretty similar to calling Matrix.zeros(10, 10), but there’s a very important difference: the output actually looks like a matrix! This might seem like a trivial difference. However, when working with a lot of matrices, it is invaluable to have the matrices formatted nicely when you are trying to see results. Let’s do something a tiny bit more interesting: x = rand(10, 10) That should give us: 10x10 Array{Float64,2}: 0.614455 0.166746 0.933275 … 0.777238 0.662781 0.012962 0.000197243 0.975239 0.0263813 0.784601 0.251306 0.0359492 0.0881394 0.450103 0.895747 0.0219986 0.196202 0.259326 0.256392 0.28074 0.542471 0.830691 0.9528 0.905797 0.536424 0.661746 0.885126 0.261195 0.198792 0.03582 0.28776 0.275747 0.94569 … 0.0970672 0.269422 0.246199 0.953955 0.421148 0.0946357 0.677456 0.796799 0.828503 0.492165 0.481043 0.857201 0.862093 0.0634439 0.97161 0.276454 0.208118 0.313016 0.0972178 0.557233 0.00431404 0.117841 0.891073 0.0320966 0.0487335 0.830744 0.426995 Julia does truncate the output, but it’s clear that we’re seeing a 10 by 10 matrix of pseudorandom numbers between 0 and 1. It’s possible to do this with a little Matrix.build magic in Ruby. Scalar multiplication is pretty common, so it’s really easy in Julia: x = rand(10, 10) * 10 How about multiplying matrices together: x = rand(10, 10) * zeros(10, 10) What if we want to index a certain element of the matrix? Let me hit you with a fact: Julia’s arrays/matrices are indexed by one. Calm down, start breathing. The world won’t end. Yes, your loop conditions will change, Yes, it is generally pretty annoying if you’re coming from a non-MATLAB and non-R background, but it’s pretty easy to get used to. Also, if you’re writing tons of code operating on individual elements of the matrix, you’re probably overlooking some standard matrix operation that will let you accomplish what you’re doing in a much easier fashion (note: I’m not using this as an excuse for Julia’s 1-indexing, but it’s a good thing to keep in mind). So far, so good. We haven’t really introduced that Ruby doesn’t make painless either. But, there is a general feel about Julia that makes it clear that it holds matrices in high regard: the pretty printing, the fact that matrix creation calls are top level functions, etc. However, there’s also plenty that makes Julia pretty unique. Let’s take a look at one feature that Julia has borrowed from R: the NA type. Often times, when doing data analysis, we’ll have some values of data that are invalid for some reason. So, we have our initial dataset with some invalid values and then we perform some operations on the dataset to produce an output. But, after processing the data, we don’t want to consider the results that are based on invalid values. We can fix this problem with the NA type. Anywhere we have invalid data, replace it with an “NA”. Subsequently, anywhere we have a computation involving an NA, we will get an NA in return. In other words, computations on invalid data lead to invalid data. In order to see it in action, we first need to get the “DataArrays” package. Julia has a fantastic package management system backed right into the language. Easily install the package: Pkg.add("DataArrays") Now, construct an array so that we can actually stuff an “NA” into it: using DataArrays x = @data(rand(10, 10)) x[1, 1] = NA Don’t worry too much at the moment about what @data does: it more or less changes the matrix’s type so we can put “NA” values in it. Let’s try a computation: y = x*2 That should give us: NA 0.553053 0.695716 0.284487 … 1.9758 0.761262 0.4869 1.3595 0.0468469 1.31732 1.83256 1.70817 1.43662 0.930509 0.306142 0.286241 0.982634 0.434252 1.94063 1.64462 0.731219 1.88406 1.70816 1.08887 0.234274 1.45693 1.06927 1.60651 0.503428 0.362866 0.335749 1.88895 0.341048 0.0441141 0.951636 0.774465 0.789801 1.23474 0.0640433 … 1.92382 1.20227 1.0657 1.38033 1.46768 1.78678 1.95522 1.53592 0.211695 0.631171 1.09145 1.32949 1.59082 1.52581 1.50151 0.062626 1.02838 0.386194 1.66468 1.37072 0.163497 0.522523 1.24837 0.880371 1.16056 0.496622 0.994359 1.08291 0.866378 0.187132 1.51157 Great! The invalid data resulted in invalid data. A little bit more interesting would be squaring the matrix: x*x That’ll give us: 10x10 DataArray{Float64,2}: NA NA NA NA … NA NA NA NA NA 3.14293 3.53757 2.4257 3.8196 4.36326 2.44844 3.22518 NA 2.36765 2.77693 2.60346 3.25948 2.67558 1.35156 2.13138 NA 2.46748 3.67635 3.47746 3.8359 4.51773 2.33752 2.99455 NA 1.90375 2.17352 1.53465 2.25778 2.68 1.34128 1.9858 NA 1.80034 2.47738 2.62089 … 2.9921 2.76951 1.47433 2.18699 NA 2.9391 3.8815 3.72826 4.45572 5.03061 2.59674 3.34063 NA 2.25157 3.12992 2.76169 3.43634 4.00735 2.01751 2.56007 NA 1.62191 2.51771 2.71106 2.91424 2.76869 1.79907 2.02696 NA 1.96264 2.53315 2.69743 3.19891 3.17627 1.44995 2.4413 Whoa, what just happened? Well, if you remember a bit of your linear algebra, recall the places where the “NA” value would be used in order to compute a position in the x*x matrix. We’ve only scratched the surface of what Julia can do with matrices: there’s a heck of a lot more. Coming from Ruby, the amount of importance Julia places on matrices is pretty weird, at first. After spending a little bit of time working in the fields that Julia is usually applied (think lots of numbers and applied math), it becomes clear why. Data Julia’s borrowed another idea from R: ready-to-go datasets. R comes with a bunch of datasets that you can immediately begin using. Julia provides that to us with the RDatasets package. Let’s get a hold of it: Pkg.add("RDatasets") Start using it too: using RDatasets Here’s a pretty standard dataset called “iris”: dataset("datasets", "iris") 150x5 DataFrame | Row |" | Although having this data might seem a bit useless (I mean, we could always read it from a CSV file in Ruby), having some sample data at your fingertips is incredibly useful when trying to sketch out some ideas in code. Notice that the data is stored in a Julia DataFrame, which is a way to putting data of various types into one “matrix” of sorts. With one package, we now have access to a wide range of datasets. Plotting One area in which Julia really excels is letting you get a feel for data really quickly. To do this, plotting some part of the data is usually a good idea. I haven’t found a lot of solid, usable Ruby libraries for plotting. For the longest time, Scruffy was the leader in the area, but it seems development hasn’t been happening. We’ll take a look at Gadfly, a pretty standard Julia graphing toolkit. It’s based on ideas from A Layered Grammar of Graphics which describes how to build a sensible graphic creation system. The classic “hello world” of statistical plots is the “iris” plot. The “iris” dataset describes some characteristics of a few types of Iris flowers. We’ll take a look at how to make a plot of them. First, we need a plotting library: Pkg.add("Gadfly") Let’s build our first plot: using RDatasets using Gadfly plot(dataset("datasets", "iris"),x="SepalLength", y="SepalWidth", Geom.point) Ok, what the heck is this plot call? It takes a DataFrame as it’s first argument (supplied from RDatasets) and optional parameters for the x and y variable names (which, if you look at the dataset output earlier, are the column names in the DataFrame). Finally, we pass in “Geom.point”, which tells Gadfly that we want to make a point plot. The results look very nice: If you’re using Juno (the Julia IDE), you’ll be able to see your results very quickly. We have a bunch of species of flowers. How about coloring them differently in the graph? Basically, we want the color to be decided by one of the columns of the iris DataFrame: plot(dataset("datasets", "iris"),x="SepalLength", y="SepalWidth", color="Species",Geom.point) We’ve added the color="Species" to associate color with a column. Check it out: Ok, enough with the point plots. What if we wanted to examine the distribution of the sepal lengths for each of the different species? Easy: plot(dataset("datasets", "iris"), x = "Species", y = "SepalLength", Geom.boxplot) The output looks pretty, too: Statistics Of course, if we’re plotting stuff, we’re probably interested in the statistics associated with the data. Fortunately, Julia provides a bunch of nice utility functions to squeeze the information out of the dataset. Coming from a Ruby background, it might seem a bit odd to have these functions in the global namespace. But, that’s a fundamental difference between Ruby and Julia. Ruby is meant as a general purpose language that’s focused on stuff like web development, which requires extensive compartmentalization. On the other hand, Julia is a general purpose language that’s geared toward scientific computing, where the tradition is to have the “most used” stuff front and center. Let’s first call our dataset something reasonable: iris = dataset("datasets", "iris") Probably one of the most useful functions to get a grip on your data is describe. Give it a whirl on iris: describe(iris) The output (truncated) should look something like: SepalLength Min 4.3 1st Qu. 5.1 Median 5.8 Mean 5.843333333333334 3rd Qu. 6.4 Max 7.9 NAs 0 NA% 0.0% That gives you the five number summary and some other information about each column of the dataset. We can access specific columns of the iris DataFrame pretty easily: sepal_lengths = iris[:SepalLength] We can get the specifics about the column pretty easily: mean(sepal_length) #mean std(sepal_length) #standard deviation Wrapping it up Wow, that was fast. So far, we’ve only really taken a glance at some of the stuff that makes Julia awesome to write code in, but even so, the differences with Ruby are clear. Julia is meant, from the ground up, to work with numbers, matrices, and the like. Ruby, on the other hand, wants to make sure that you can do that stuff if you want to, but that isn’t really a top priority. In the next article on Julia, we’ll take a more in depth look at features and also introduce the parallel computing constructs within the language.
https://www.sitepoint.com/julia-rubyists-crunch-numbers/?utm_source=rubyweekly&utm_medium=email
CC-MAIN-2022-40
refinedweb
2,603
70.94
command $] stat <filename> So there's a command stat that gives all info about file. can you tell me please how to use that in my C program? Actually what i want is that my program is receving filename and i want to print its inode no. in my C program also want to print pid's of processes that are using this filename? man popen man pclose man fgets Broken down into practical pointers and step-by-step instructions, the IT Service Excellence Tool Kit delivers expert advice for technology solution providers. Get your free copy now. Check out the stat(2) man page with the command "man -s2 stat". (don't just use "man stat" because that will give you the command-line program). #include <sys/types.h> #include <sys/stat.h> #include <unistd.h> int stat(const char *file_name, struct stat *buf); int fstat(int filedes, struct stat *buf); int lstat(const char *file_name, struct stat *buf); It's pretty easy. Pass the filename to stat in the file_name parameter, along with a struct stat. The OS will stick the information in your struct stat. Note the 'st_ino' field. */ }; I am getting segmentation fault in following code. #include <sys/types.h> #include <sys/stat.h> #include <unistd.h> main() { long int err=0; struct stat *buf; err=stat("/root/install.lo if(err!=0) exit(1); printf("inode no. is =%ld\n",buf->st_ino); } Also how to modify this to find File descriptors and PID of processes that uses the filename given to function stat struct stat buf; err=stat("/root/install.lo Sorry for asking silly thing of not allocating struct stat well. But please can it be possible to modify my program to find File descriptors and PID of processes that uses the filename given to function stat If I remember correctly, you can inspect the file descriptor table in the proc filesystem somewhere under /proc/<PID> ... but that would mean examining the table for each and every process (and you will need root permission for that) and shortlisting the PIDs which have that particular file open ... Also this method is likely to be less portable as proc filesystem is not standard (but fairly common in the Linux world) main() { long int err=0; struct stat buf; err=stat("/root/install.lo if(err!=0) exit(1); printf("inode no. is =%ld\n",buf.st_ino); } If you're into the popen thing, you can use lsof to get a list of all open files for all processes that you have permissions to examine. So if you want to get an exhaustive list, you must run lsof as root. Note that on most distributions of Linux, lsof is in /sbin and not /bin, so you will need to specify the full path when you use popen. To narrow down the results, run lsof like "/sbin/lsof -F f /path/to/your/file". lsof will output multiple lines. If a line starts with "p" then the rest of the line contains a process ID, and all of the lines up to the next "p" will be about this process. If a line starts with "f" then it means that the rest of the line is an fd held by the process identified on the last "p" line. If the fd is numeric, then it is just that: the fd. If it is not, then it will be one of: * cwd: This is the process' current working folder, which (logically enough) will only show up when the file you have in question is a folder. * jld: This process is jailed in this directory (i.e. the / folder from this process' perspective is actually the folder you have asked about). * mem: The file is mapped into memory with a call to mmap(), and therefore has no fd. * mmap: Same as mem, except that the file is a device node. * There are a few others that are too obscure to be worth mentioning here. If you see them, ignore them. So your job amounts to writing code that will parse the output of lsof. If you're only after fds, then this simple pseudo-code should work: popen lsof; while (still have a line) { read the line; a_number = decode number starting at line[1]; switch (first character of line) { case 'p': allocate fd buffer for "process a_number"; case 'f': append "a_number" to the list of fds for the last process; } } Yeah, something like that, I guess. Still wondering /why/ you would ever /want/ this information... and what you plan on /using/ it for... Experts Exchange Solution brought to you by Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.Start your 7-day free trial > I want to know is there any command on LINUX that will do following or I have to write a C program? Then the simple answer is "yes, you can use lsof." The columns /should/ be: * Process name. * Process ID. * Real user. * FD. * File type (file, char special, block special, fifo...). * Major/minor numbers for special nodes. * File size for real files. * Inode. * The filename. Now that was a bit easier than I made it out to be, wasn't it? =)
https://www.experts-exchange.com/questions/21340176/getting-inode-from-filename-and-its-associated-fds.html
CC-MAIN-2018-30
refinedweb
881
73.07
my $cache = 'blah=hi;cat /etc/passwd'; @pairs = split(/&/, $cache); foreach $pair (@pairs) { ($name, $value) = split(/=/, $pair); $value =~ tr/+/ /; $value =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C", hex($1))/eg; if (defined($FORM{$name})){ $FORM{$name}.="\0"; } $FORM{$name} .= &strip($value); } sub strip { my($cheese)= @_; $cheese =~ s/\t/ /g; $cheese =~ s/\|//g; $cheese =~ s/\r//g; # should use this. $cheese =~ s/\n/<P>/g; # should use this. $cheese =~ s/%95/<li>/g; $cheese =~ s/"<P><P>"/<P>/g; return ($cheese); } [download] $directory_size = `du -s $target/$where `; [download] grep> cd pub grep> more beer [download] Desipte your impressions, this set of scripts is written with the older cgi-lib.pl library (as mentioned by grep) and a handrolled form parser (update: and, of course, not the reccommend CGI module). (Why include a library that does something and do it again? Beats me.) More importantly, these scripts contain potentially serious security holes. They often use form input directly from the web browser in forming filenames which are then written to or deleted. This means that through these scripts someone could potentially overwrite or delete any file your script has access to. Even worse, this script will, under some circumstances (update: the hole grep found will probably allow that most of the time. I found another (`echo "$body" | $mail ...`) which would probably not be so common, being dependent on the setting of what mailer to use), include user input as part of a shell command. This means that someone could probably even run arbitrary shell commands on the system (e.g. rm -rf / to remove all files the script can remove). As for the coding style, these scripts are similarly bad. The idention is horribly inconsistent. They don't use warnings and strict, let alone taint checking. They don't check the return value of many system calls (e.g. open, unlink). Variables are "declared" with both local and my -- only one should be used, ideally my, since this script intends to run on perl5 systems (as evidenced by the perl5-only use statement). (because my wasn't introduced till perl5, local was typically used in the same way in perl4 which is at least 8 years out of date.) This program also uses syntax like this for prototypes: sub sendmailer($recipient, $sender, $subject, $message){ [download] update: Elaborating on a point grep made, requiring 777 permissions could also be considered a security flaw: it lets pretty much anyone else on the web server you are using mess with the files this script is managing. In almost any way they want to. Why not try to use that as a basis for your upload script and then get back to us if you have any problems. You might also find it useful to read up on the CGI.pm module. I don't know what server you're on, but if you're on a Cobalt RaQ, set permissions to 755 for the directory instead, it's a lot safer. cLive ;-) ps - in answer to your question about how does it log in, it doesn't. I think you need to read a bit more background info on how CGI works - this is a good book to get you going. You might as well be asking how a web browser logs in to your server to get a web page. Read the explanation of CGI for a bit of background info. In fact, Amazon even have the relevant info online GET [download] /home/sites/mysite/web/some/file [download] Is it .htm or .html? It's a web page, so return appropriate content header and send the page to the browser. Is it executable? Server checks against list of file types it's been told it can run. May be .cgi, may be .pl, may be both or more. If it can run it, it then tries to run it. ".. the browser is retrieving a file, not uploading one, which in my experience all- ways requires an Id and password to log in first." There are several things here I think you're confused about. I think you need to think about the protocols (the ways you are talking to the server). When you upload your web site files to the server, you are using FTP, and your account requires a login and password to upload and download files1. With HTTP, when you are uploading a file, you are essentially sending a page request and attaching a block of data. The upload will only work if you have installed and configured the upload script by FTP1. - ie, you needed a login/password to tell the server you want to use this script (that's the FTP part) and where you want it to dump the file that's uploaded - along with other security checks, like maximum file size (that's the Perl part). You can force users to enter a username/password at upload time, but then you need to store passwords securely, or use .htaccess to control access to the pages - and that's another story. Clear as mud now, eh? :-) From the way you are wording your questions, I think you need to learn quite a bit more before you can safely and securely let yourself loose on an upload script. At the very least, post the code you are going to use at some point and ask people to check whether it's secure or not. But as I said before, read those pages on Amazon, and buy the book if you can afford it - and Learning Perl might be useful too. hth 1 Yes, you can have anonymous FTP, but I'm trying to keep it simple for your example. And let's not get into SSH, Telnet etc... Good luck! My spouse My children My pets My neighbours My fellow monks Wild Animals Anybody Nobody Myself Spies Can't tell (I'm NSA/FBI/HS/...) Others (explain your deviation) Results (49 votes). Check out past polls.
http://www.perlmonks.org/?node_id=135892
CC-MAIN-2016-50
refinedweb
1,002
70.94
Hi, I'm trialing PyCharm, which looks excellent, however I can't get the system environment variables to come through in a debug session. I noticed the "Include parent environment variables" checkbox in the Python Console options, but it doesn't do anything, and it unchecks after I press ok. Any ideas? Cheers, Shane Attachment(s): Environment Variables.jpg Bump...? Is there any way to get the bash environment into PyCharm? If not, it's a show stopper for me. This is not specific to PyCharm at all. If you run PyCharm from bash, it will see the environment variables defined in your bash profile. If you run it from the dock, it will only see the global environment variables defined in environment.plist: Ok, so to avoid setting a global .plist, I thought I'd add the environment variables I wanted to the Run/Debug Configuration -> Environment Variables, however I'm not sure how to append/substitute variable names. e.g. I want to be able to mimic this: export PATH=$PATH:~/SomeNewPath How can I do this? Shane I don't think this is possible at the moment. You're welcome to file a feature request at Also, depending on what you're trying to run, you may be able to write a wrapper script that would configure the environment and then run your original program. Yeah, I agree with the wrapper idea. I'll just make an env.py for debugging purposes only, which sets all the envars, then kicks off the main python class. Thanks anyway, Dmitry. Cheers, Shane If I understand correctly: I still don't really understand why ticking the checkbox "Include system environment variables" inside Run/Debug configurations doesn't allow me to use the environment variables if they are even visible in the list? I would understand if they wouldn't be accessible, but PyCharm even sees them! (screenshot attached). If system environment variables are seen in the run configuration you should be able to use them. What happens when you run: import os; print(os.getenv('<some_variable_name>')) ? Thank you very much for your input Andrey! This worked fine apart from PYTHONPATH, which seems to be overwritten by PyCharm. So I dug a little deeper into it, and found this: Is there any way. of somehow getting around this feature to allow to use the global system variable PYTHONPATH? I would like to use the modules from the different path without having to always set the path this a way. There are checkboxes in run configuration: Have you tried disabling them? Sure. It seems that PyCharm is overwriting PYTHONPATH even when these options are disabled. For import os; print(os.getenv('PYTHONPATH')) I am getting: /Applications/PyCharm.app/Contents/helpers/pycharm_matplotlib_backend:/Applications/PyCharm.app/Contents/helpers/pycharm_display Instead of what PYTHONPATH is actually set to. PyCharm sholudn't overwrite your PYTHONPATH, it's only appending a few interpreter paths. Are you sure it's not "overwritten" by your environment? Which interpreter do you use? Please run python shell with the same interpreter/environment outside of PyCharm and check the value of PYTHONPATH there. Then run python console from PyCharm and do the same there. Compare results.
https://intellij-support.jetbrains.com/hc/en-us/community/posts/206591465-OSX-shell-environment-variables
CC-MAIN-2020-29
refinedweb
534
57.67
Unity 2021.1 2021.1.19: Fixed a corruption in Probe baking when lightmap UVs were not provided. [1337226).19f1 Release Notes Features - Version Control: Added auto sign in when logged into Unity account. Improvements Version Control: Added Checkin and Update confirmation notification. Version Control: Improved load time performance. Changes Burst: Updated the Burst Package to 1.5.6. Please refer to the package changelog online here: HDRP: DoF is now using the min depth of the per-pixel MSAA samples when MSAA is enabled. This removes 1-pixel ringing from in focus objects. (1347291) Version Control: Simplified and decluttered the UI. XR: Updated OpenXR Package to 1.2.8. Please refer to the package changelog online here: Fixes Android: Fixed a crash when using TouchScreenKeyboard with placeholder text. (1347370) Animation: Fixed an issue where the Animator.GetNextAnimatorClipInfo() methods did not return the expected result at the end of a transition. (1317097) Burst: Fixed a compiler error that occurred when calling BurstCompiler.CompileFunctionPointer with a delegate type that was decorated with a custom attribute. Burst: Fixed the "could not find path tempburstlibs" error message that popping up when building for Android and Burst was disabled. Editor: Fixed an issue where there was no support for duplicate component names to UnityEvent selection popup. (1309997) Graphics: Fixed a crash with accessing individual pixels on crunch compressed texture. This should now throw an error instead. (1314831) GraphView: Fixed an issue where GraphView group did not allow drag and drop of nodes when edges were selected. (1348542) HDRP: Fixed an issue where the sky settings were being ignored when using the recorder and path tracing. (1340507) IMGUI: When using a Non-ReorderableList, pressing the Delete key on one of the element deletes it from the array. (1335322) iOS: Fixed a query of Display native resolution issue. (1342424) Physics: Fixed an issue where the Articulation Bodies were not being visualised in the Physics Debugger. (1343929) Physics: Fixed an issue where the Physics Debugger was not reacting to filtering settings as expected. (1319356) Prefabs: Fixed an issue where Prefab were instantiated with a Prefab asset as parent. (1276785) Shadergraph: Fixed an issue where horizontal scrollbars in graph sub windows could not have their lower scroll button used due to being overlapped by the resize handles. (1318614) uGUI: Fixed an issue with selectable (i.e. Button) where it was not shown as selected when it was re-enabled until selection was cleared manually. (1342519) UI Toolkit: Fixed an issue where a TextureId leak that could occur when a Panel was disposed or when the graphics device reloaded. (1336881) Universal Windows Platform: Fixed an issue where C++ source code plugins failing to get copied to output build folder with executable only build type when the plugin is in a package that's referenced in the project. (1353677) URP: Fixed an error where multisampled texture was being bound to a non-multisampled sampler in XR. URP: Fixed an issue with terrain hole shadowing. (1349305) Version Control: Fixed an SSO renew token issue after a password change. Version Control: Fixed an issue wehre view was not switching to workspace after creating an Enterprise Gluon workspace. Version Control: Fixed an issue were the contextual menu was not showing up in project view. Version Control: Fixed some namespace collisions issues with Antlr3. Video: Fixed an issue where VideoPlayback leaked if destroyed while seeking. (1308317) Windows: Fixed an issue where SystemInfo.deviceUniqueIdentifier was not actually being unique on some Windows 7 machines. (1339021) 체인지셋: 5f5eb8bbdc25
https://unity3d.com/kr/unity/whats-new/2021.1.19
CC-MAIN-2022-05
refinedweb
582
57.16
TinyWorld – Part 9 Application life cycle “life cycle management”. The term Application Life Cycle generally describes the processes followed by an administrator to transport, install, deploy, maintain and upgrade applications for productive systems. With SAP HANA and XS Advanced, applications are transported in the form of a (compressed and digitally signed) archive called an MTA archive (MTAR). Deploying an MTA involves deploying each module to its corresponding target runtime. Deploy TinyWorld We will complete this task in two steps: - First, as a developer, we create an MTA archive. - Then, as an administrator, using the xs command-line tool, we will deploy it into another space, possibly on another system. The administrator must have SpaceDeveloper privileges in this space. A. Create the MTA archive Build the modules in the following order (right click each module folder ” > Build”): tinydb, then tinyjs and last tinyui. The ID and version properties in the mta.yaml file uniquely represent the application version in the production environment. For the first version of our application let’s update the value to 1.0.0. Now build the entire project right-click the tinyworld/ project folder and “> Build”. After successful build, you will find the created MTA archive in the root mta_archives/tinyworld/ folder. As you can see, the name of the MTA archive, tinyworld_1.0.0.mtar, is constructed from the MTA ID and version. Download the archive to your local workstation (right-click tinyworld_1.0.0.mtar “Export”). B. Deploy using the xs deploy command As an administrator, use the xs command line tool to login into XS Advanced on the target system, organization and space (see the XS Advanced documentation). In this tutorial we will use Rita as our administrator, myorg as our organization and PROD as our space. You can use this command to verify that Rita‘s privileges are sufficient: xs space-users myorg PROD Rita‘s user name should appear in the users column of the “SpaceDeveloper” row. If not, an administrator with administrative rights should grant Rita the required permissions: xs set-space-role Rita myorg PROD SpaceDeveloper To verify that we are targeting the right space (PROD) run: xs target To switch to the correct space (if not already there) run: xs target -o myorg –s PROD Now navigate to the folder where you placed the MTA archive and run: xs deploy tinyworld_1.0.0.mtar –use-namespaces Wait patiently for the “Process finished” message. That’s it! Some other useful commands so you can confirm that your application is up and running: - List all apps in the target space: xs apps - List all multi-target apps: xs mtas - Display information about a multi-target app: xs mta tinyworld Copy the URL of the tinyui module (xs app tinyworld.tinyui –urls) andand paste it in the browser. You will get the European Countries table on the screen. The table will be empty because we have just deployed this application to a new HDI container, which doesn’t have all the content we added manually earlier in this tutorial.paste it in the browser. You will get the European Countries table on the screen. The table will be empty because we have just deployed this application to a new HDI container, which doesn’t have all the content we added manually earlier in this tutorial. Upgrade TinyWorld to version 2 Now that we successfully deployed the initial version of the tinyworld application, we will add a new feature and then upgrade the production environment. We are going to place a button on the UI to add new countries. For that, we will also create a new form for collecting country information in the tinyui module and pass this information to the tinyjs module via a POST HTTP request, doing it right this time. Next we will update tinyjs module to process this new API. From the Web IDE, fetch the most recent code (right click on tinyworld project “Git > Fetch from upstream” and then “Rebase”) and make the following changes to the project: - Update the file tinyui/resources/index.html with the content below. The new and changed lines are highlighted: we added a new button above the Country table with a callback openFirstDialog that is defined in a new file, Util.js, that we will create next. <!DOCTYPE HTML><head><meta http-equiv=”X-UA-Compatible” content=”IE=Edge” /> <title>DevXdemo</title> <script src=”” id=”sap-ui-bootstrap” data-sap-ui-libs=”sap.ui.commons, sap.ui.table” data-sap-ui-theme=”sap_bluecrystal”> </script> <script src=”./Util.js” > </script> <script> var oModel = new sap.ui.model.odata.ODataModel(“/euro.xsodata”, true); var oTable = new sap.ui.table.Table({ title: “European Countries”, visibleRowCount: 5, id: “tinytab”, toolbar: new sap.ui.commons.Toolbar({items: [ new sap.ui.commons.Button({text: “Add Country”, press:openFirstDialog}) ]})}); oTable.addColumn(new sap.ui.table.Column({ label: “Country Name”, template: “name” })); oTable.setModel(oModel); oTable.bindRows(“/euro”); oTable.placeAt(“content”); </script> </head> <body class=’sapUiBody’> <div id=’content’></div> </body> </html> - Create a new file Util.js in the same tinyui/resources/ folder and copy this code there: var oFirstDialog; function openFirstDialog() { if (oFirstDialog) { oFirstDialog.open(); } else { oFirstDialog = new sap.ui.commons.Dialog({ width: “400px”, // sap.ui.core.CSSSize height: “550px”, // sap.ui.core.CSSSize title: “Country Details”, // string applyContentPadding: true, // boolean modal: true, // boolean content: [new sap.ui.commons.form.SimpleForm({ content: [ new sap.ui.core.Title({ text: “Country Name” }), new sap.ui.commons.Label({ text: “name”}), new sap.ui.commons.TextField({ value: “”, id: “name” }), new sap.ui.commons.Label({ text: “partof” }), new sap.ui.commons.TextField({ value: “”, id: “partof” }) ] })] // sap.ui.core.Control }); oFirstDialog.addButton(new sap.ui.commons.Button({ text: “OK”, press: function() { var name = sap.ui.getCore().byId(“name”).getValue(); var partof = sap.ui.getCore().byId(“partof”).getValue(); var payload = {}; payload.name = name; payload.partof = partof; var insertdata = JSON.stringify(payload); $.ajax({ type: “POST”, url: “country/country.xsjs”, contentType: “application/json”, data: insertdata, dataType: “json”, crossDomain: true, success: function(data) { oFirstDialog.close(); sap.ui.getCore().byId(“tinytab”).getModel().refresh(true); alert(“Data inserted successfully”); }, error: function(data) { var message = JSON.stringify(data); alert(message); } }); } })); oFirstDialog.open(); } } This code creates a small form with two fields and ‘OK’ button where users can enter a new country name and continent. When the user clicks the ‘OK’ button we construct and send the POST request to the server. - To make the request reach the server we need to update xs-app.json with additional route: { welcomeFile”: “index.html”, “authenticationMethod”: “none”, “routes”: [{ “source”: “^/euro.xsodata/.*$”, “destination”: “tinyjs_be” }, { “source”: “.*\\.xsjs”, “destination”: “tinyjs_be” }] } - Now a small change is required in tinyjs/lib/country/country.xsjs. We will fetch country data from the request body instead of URL parameters (as expected by the HTTP POST method) and will return success or failure status at the end (the updated lines are highlighted): function saveCountry(country) { var conn = $.hdb.getConnection(); var output = JSON.stringify(country); var fnCreateCountry = conn.loadProcedure(“tinyworld.tinydb::createCountry”); var result = fnCreateCountry({IM_COUNTRY: country.name, IM_CONTINENT: country.partof}); conn.commit(); conn.close(); if (result && result.EX_ERROR != null) { return {body : result, status: $.net.http.BAD_REQUEST}; } else { return {body : output, status: $.net.http.CREATED}; } } var body = $.request.body.asString(); var country = JSON.parse(body); // validate the inputs here! var output = saveCountry(country); $.response.contentType = “application/json”; $.response.setBody(output.body); $.response.status = output.status; Now you can build your tinydb module, and then run the tinyjs and tinyui modules one by one. If everything went well you will see “Add Country” button in your running application. Press the button, then fill the input fields (Ireland, Europe) in the Country Details form and click “OK”. If you see Ireland in the table, great! You can release the new version. First we will update the version in the mta.yaml file to 2.0.0: Next we will push the changed and newly created files to our remote Git repository. You can find them in the Git pane and like before, you complete the task in three steps: select “Stage All”, provide a Commit Description, and click on “Commit and Push”. Now rebuild the tinyworld modules and project like before, to result in a new MTA archive in the mta_archives/ folder, called tinyworld_2.0.0.mtar, that you can export. In your role as an administrator, you could now deploy the new version with the xs deploy command that we already used for the original installation. However this time let’s configure a lower memory limit for TinyWorld. The default deployment memory allocation is one GB, which is way too much. In the same workstation folder where you placed the MTA archive, use a local editor to create a new file, configv2.mtaext, with the content: _schema-version: “2.0.0” ID: tinyworld.memory.config extends: tinyworld modules: – name: tinyui parameters: memory: 128M – name: tinyjs parameters: memory: 128M We just created an extension descriptor for our MTA archive. It extends the main descriptor that was created and packaged in the Web IDE (by the developer). In this extension file you added a new parameter memory to tinyjs and tinyui modules that will be considered during deployment. Now run the deployment command providing the configv2.mtaext file: xs deploy tinyworld_2.0.0.mtar -e configv2.mtaext –use-namespaces If you now run the xs appsxs apps command, you will see that the memory configurations were applied:command, you will see that the memory configurations were applied: Now take the UI module URL (xs app tinyworld.tinyui –urls) and run it in the browser. If you see the Country table, your work is done.and run it in the browser. If you see the Country table, your work is done. Note: Remember again, like the initial version, we have just deployed this application to a new HDI container, which doesn’t have the content we added manually earlier in this tutorial. Thus, trying to add a country will fail for lack of continents. A real application needs to take care of such details, and programmatically handle changes to database structures as well, when necessary. Summary of part 9 This part of the TinyWorld tutorial described the process of deploying and upgrading your application to production systems. You can continue to explore additional advanced parts of this TinyWorld tutorial, to learn how to add authentication and authorization control to our application: Part 10: Add authentication Part 11: Add authorization Hi Chaim, In configv2.mtaext using the property _schema-version: "2.0.0" as shown above gives error. However, if i remove the double quotes and just put 2.0.0 it work fine. Is this expected? Regards, Anit When we upgrade a MTA application version, could we preserve the HDI container? If it is not possible, how could we preserve the data? Hi Xiao-Yun, did you find out, how we can preserve the HDI container. I was deploying my project to the PROD space and was assumed that I would see it in WebIDE or in the db-Explorer, but there is no PROD space. 🙁 Thanks for your help! I got it, I missed the privileges for my new space. Hi at all, it's me again ... I didn't get the update to version 2.0. The button "add country" appears to my UI and the PopUp. Nevertheless, than I press OK - independent of my input - I get a horrible formatted message which started with like hxehost:12345 says {"readState":4,"responseText" ...... I cannot copy it all. The debugger shows in the console the error Failed to load resource: the server responded with a status of 404 (Not Found) country/country.xsjs I have actually two time country/country.xsjs, once in the lib-folder of my tinyjs and once directly in the tinyjs folder. Do you have any idea, what I miss or how I can fix the bug? Thanks an regards, Stefano Hi Chaim, I am having problem adding the country.The response is always : {"readyState":0,"status":0,"statusText":"error"} and in the console I get this message: " Response to preflight request doesn't pass access control check: No 'Access-Control-Allow-Origin' header is present on the requested resource. " Also can you specifiy what url to use in the ajax url ?
https://blogs.sap.com/2016/03/29/developing-with-xs-advanced-application-life-cycle/
CC-MAIN-2021-31
refinedweb
2,041
50.02
A Particle Photon is a really cool micro-controller to get started with IoT, programming the photon is similar to that of an arduino. With a few extra functions that give it access to the Particle Cloud. The functions can be called using online APIs accessible from the Particle Cloud. The particle photon comes with various shields and one popular shield is the Internet Button, this is a shield with 11 RGB LEDs, 4 Buttons and a Buzzer that can add various features to your project. In today's instructable I'm going to show you how to work with the Particle Photon and the Internet Button, to make a Lamp that notifies you each time you receive and android notification. You can also customize it notify you of various other things such as email, twitter feed, etc Teacher Notes Teachers! Did you use this instructable in your classroom? Add a Teacher Note to share how you incorporated it into your lesson. Step 1: Materials and Components To start of with here is a list of all the components required to get started with the project, you don't have to make separate purchases as all of the below parts is included when you purchase an Internet Button, that also includes the Particle Photon. - Particle Photon - Internet Button - Micro USB Cable With the addition to the above tools you will need a PC to program the photon on and an active internet connection (over WiFi). Step 2: Circuit There is not much of a circuit for this project all you need to do is plug the photon on the Internet Button. If you recently purchased the Internet Button you are most likely to have the newer model with an on board Buzzer. If you purchased it some time ago (like I did), you will have an older model that doesn't have a buzzer on board. It is necessary to know which of the two models you are using because the code varies a bit, for the two models. Step 3: Connecting Photon to the Internet A first time setup requires you to connect the photon to the internet and claim it or link it to your account. This process is really simple all you need to do is download the particle app from the android play store or the IOS app from the apple store. You need to login into your account in the app and then follow the onscreen steps to claim your photon. Make sure your photon is powered on this whole procedure and your phone is connected to the same WiFi network you want your photon to be connected to. After claiming your photon, it should be breathing cyan, indicating a successful connection to the particle cloud. Step 4: Web IDE (Uploading Code) Next, visit open the Particle web IDE, copy and paste the code below. If you are using the newer model of the Internet button upload the code as it is, but if you are using the older model of the Internet button (without the on board buzzer) change the line of code to this b.begin(1); Code #include "InternetButton/InternetButton.h" InternetButton b = InternetButton(); void setup() { b.begin(); Spark.function("setColor", setColor); } void loop(){ } int setColor(String null) { b.allLedsOn(0,100,100); delay(10000); b.allLedsOff(); return 0; } Step 5: IFTTT Now time to setup your IFTTT to turn on the LEDs of the Internet Button each time you receive an android notification. You first need to install the IFTTT app on you android phone, next you need to create an account and then login. After successful login you should see the option to create a new recipe. - For the if part of the statement select the android sms and then select, each time a new sms is received. - For the then part select the particle, it will ask you to login to the particle account. - Then select Call a Function and select the function setColor. - Create Recipe Step 6: Finishing After completing all of the previous steps it is now time to test your project, now send an sms to the phone with the IFTTT app and you should see the Internet Button light all the LEDs for about 10 seconds. You can modify the code or the IFTTT statement to your will and trigger various different events. Participated in the Makerspace Contest Discussions
https://www.instructables.com/id/Particle-Photon-Internet-Button-Notification-Lamp/
CC-MAIN-2019-39
refinedweb
734
67.08
hey guys I am trying to code a template for my main program but I am having a difficult time doing it. I am make a template called Array that manages a 1 dimensional array of contiguously stored lists of objects of type E. The object by default are doubles. When the object is being constructed the Array object receives the number of type E objects in the array. My program also contains these two functions: * unsigned int size() const - an inline query that returns the number of elements in the array. * E& operator[](int i) - an inline subscript operator that returns a reference to element i, where the first element is at index 0. If the value of i is outside array bounds, your operator returns a reference to a dummy element of type E. I think my main problem is when the constructor is being called, but I am not exactly sure. I have included the copy constructor and assignment operator but I haven't coded them yet. If anyone could just help me get on track with this I would really appreciate it. Main program: template:template:Code: #include <iostream> using namespace std; #include "Array.h" int main ( ) { Array<int> x(3); for (int i = 0; i < 3; i++) x[i] = 9 - i; x[-1] = 99; for (int i = 0; i < 6; i++) cout << x[i] << endl; Array<> y(2); y[0] = 2.1; y[1] = 1.1; for (int i = 0; i < 2; i++) cout << y[i] << endl; return 0; } Code: template <class Array = double,int size=50> class E{ E a_[size]; int numb_; public: E(int i){ numb_=i; } unsigned int size() const{ return numb_; } E& operator[](int i){ if (i > numb_ - 1 && i < size) numb_ = i + 1; else i = 0; return a[i]; } ~E(){ delete [] numb_; } E(const E& original){ } const E& operator =(const E& org){ } };
http://cboard.cprogramming.com/cplusplus-programming/143265-problem-coding-template-printable-thread.html
CC-MAIN-2015-32
refinedweb
313
59.03
A. To read all comments associated with this story, please click here. Member since: 2005-12-04 This is a bit of a simplification. Windows lets the thing opening the file decide what access later openers get to have. These are called sharing modes; see CreateFile's dwShareMode parameter. Running executables are a bit of a special case with unique semantics, which do not allow delete but do allow rename. This works on Windows too, because you can rename running executables. The difference between the two is that on Linux a delete will remove the name from the namespace but leave open descriptors to the old inode; on Windows the name remains in the namespace until the last handle is closed. This means on Linux you could delete a file then write a new one while executing the old one, which doesn't work on Windows. But with atomic rename, this point is moot. Note that if updating a running program was truly impossible, Windows Update wouldn't be able to update itself. Pushing the problem to some other lower level component doesn't solve it either (eg. smss can't update itself.)
http://www.osnews.com/permalink?660387
CC-MAIN-2018-43
refinedweb
193
64.2
There have been fourteen new state head-to-head polls taken since my previous analysis of the race between President Barack Obama and Mitt Romney. No big surprises in them. Obama leads Romney in the three classic swing states of Florida, Pennsylvania poll and Ohio (twice). Obama also leads in Virginia and three Wisconsin polls. On the other hand, Nebraska CD 2 has swing slightly in favor of Romney. The previous analysis had Obama leading Romney by an average of 339 to 199 electoral votes. Now, after 100,000 simulated elections, Obama still wins all 100,000 times. Obama receives (on average) 347 to Romney’s 191 electoral votes. Here is the distribution of electoral votes [FAQ] from the simulations: Ten most probable electoral vote outcomes for Obama: - 350 electoral votes with a 6.22% probability - 351 electoral votes with a 5.95% probability - 341 electoral votes with a 5.33% probability - 342 electoral votes with a 5.28% probability - 347 electoral votes with a 3.85% probability - 356 electoral votes with a 3.60% probability - 357 electoral votes with a 3.37% probability - 336 electoral votes with a 3.22% probability - 335 electoral votes with a 3.14% probability - 352 electoral votes with a 3.09% probability After 100,000 simulations: - Obama wins 100.0%, Romney wins 0.0%. - Average (SE) EC votes for Obama: 346.9 (13.6) - Average (SE) EC votes for Romney: 191.1 (13.6) - Median (95% CI) EC votes for Obama: 348 (318, 373) - Median (95% CI) EC votes for Romney: 190 (165, 220). Given that Romney fails the character test, fails the policy test, fails the popularity test, and already had zero chance of beating the incumbent in previous polls, how is it possible for him to do even worse? Stealing it! It is of course possible the voting machines will say the Romney-bot won. They routed Ohio’s votes through Tennessee in 2004 for a reason, after all – but Obama is going to have such an overwhelming lead in all polls (even Rasmussen!) that no one would believe the O’Dell boys if they tried that again. Nice to see all that blue – Wisconsin, S. Carolina, N. Carolina. I’m wondering how the Boeing workers being shifted to S. Carolina factory might change the dynamics of the local political structure there. Boeing thought they could hire everything locally, but over the past two years they have been recruiting heavily among their existing workers in the Puget Sound region to re-locate to Charleston, at least temporarily. What’s badly needed there are the higher-level skills, such as Q.C., electoral and avionics techs, etc. Polls published today showing Romney winning the three primaries scheduled for Tuesday (Wisconsin, Maryland, and D.C.) by comfortable margins. But Gingrich trails in fourth place, behind even Ron Paul, with about 8% of the vote. Romney ahead in Tuesday contests I guess it’s no big suprise, since Newt considered the south-east to be his base, and these are definately NOT considered the south-eastern states. And Newt isn’t even campaigning now, he’s just phoning it in now that he doesn’t have any big-money contributors left. But seriously, how long does Gingrich have to stay in the race before he gets the message that even Republicans don’t want him, and even the Tea Party trusts Romney more than they do Gingrich? My guess is that for Gingrich, it’s all about his ego. He wants either Santorum or Romney to come on bended knee, kissing his ring as he genuflects and humbly askes Newt for his endorsement, at which time Newt will deign to issue his list of demands in return (Vice Presidency? Secty of State? Ambassador to France?) But it seems that neither Santorum nor Romney is willing to do that, preferring to defeat Gingrich in the trenches so they can ignore him later. Romney can probably get away with this, but Santorum will need Gengrich’s delegates at the convention in order to keep Romney from bulldozing his way through to the nomination. I don’t get this Obama 99.99% chance thing. No one has that good of a chance in any election except in dictatorships. Obama is probably going to win no doubt about it. But better than 99,999 in 100,000 Im very certain that is an impossible number. If it is the truth, why is anyone, including Obama himself campaigning. Instead, he could be watching the NBA Playoffs, a full season of White Sox baseball coming up, and as soon as that winds down the NFL season will start up. Given a 99.99% chance of winning, wouldnt that be a better use of time than campaigning? Obama doesnt think so. So my point is, whats up with this 99.99% chance thing in all these simulations?
http://horsesass.org/poll-analysis-obama-strengthens-lead-over-romney/
CC-MAIN-2015-27
refinedweb
815
66.23
I hold my hands up – I am a programmer who doesn’t have a computer science background. My education only skimmed programming and was totally bereft of any architectural considerations. I almost stumbled into my first programming job, and I such I realise I have a lot of to learn about that which I use to earn a crust. One of the things that took me a while to appreciate was the power of interfaces. I specifically remember a conversation I had with my boss in which I said, baffled, “so… they don’t actually *do* anything then??”. And this is kind of true, interfaces don’t really “do” anything. Instead, they’re an enabler for a couple of really useful techniques. Imagine you’re creating a series of sub forms in a Windows application. They’re each supposed to do a similar thing and should always have methods to LoadSettings and SaveSettings. Something like this: <PRE>public class NamePrefs : Form { public void LoadSettings(){} public void SaveSettings(){} }</PRE> However, a new developer jumps in to your project and is instructed to create a new preferences form. They come up with something like this: <PRE>public class HeightPrefs : Form { public void ExportConfigData(){} }</PRE> For starters they’ve forgotten that the form needs to load up existing data and so hasn’t implemented loading functionality. Secondly, they’ve called their save method something different to the save method in all your other preference forms. Interfaces can provide a possible solution: <PRE>public interface IPreferencesForm { void LoadSettings; void SaveSettings; }</PRE> This interface is specifying a contract which implementing classes can adhere. Our initial example would look like: <PRE>public class NamePrefs : Form, IPreferencesForm { …. }</PRE> If our second example also inherited from IPreferencesForm, that implementation would throw compiler errors as neither the LoadSettings or SaveSettings methods specified in the interface contract are present in the HeightPrefs class. Using interfaces only solves one part of the problem – you’ve got to make sure that people do actually inherit from them. That’s an issue which can be solved by enforcing developer policies, or technically, by ensuring only classes which implement the correct interface will get loaded by your main program. However, when interfaces are used in this manner, they can improve consistancy and lead to improved discoverability in your code. Post Footer automatically generated by Add Post Footer Plugin for wordpress. I’d really appreciate feedback (private & public) on this one guys! When I started learning object oriented programming I was enthralled by inheritence. I used it as much as I could, and often when I didn’t need to. Often I would put some behavior in the ancestor that I later found that I didn’t need in its descendants. Then I’d find myself overriding behavior, calling super and making a real mess of things. Interfaces can be a nice alternative in these situations. Allowing you to standardize certain aspects of behavior without going in for full blown inheritence. Good post Colin! It will make for good conversation. I am on the same path Colin. I have no degree, kind of stumbled into programming from web development and learned as I went, no mentor just myself reading books and asking for help in groups. As a result it took me awhile to fully leverage the power of interfaces. After using them for awhile now I don’t see how I got on without them. The best piece advice I can give everyone to help them with interfaces is first, the word “Contract”. It confused me alot at first but it made sense later because all the interface does is assure clients that said class can perform the interface operations. Then to the next step of once you know that a class can do a certain set of methods, you can then swap out classes that otherwise have no relation to each other. If they did, you could use inheritance. A prime example I just coded the other night. I had an interface called IAuthService. The interface has two methods: bool Authenticate(string username, string password); string[] GetGroupMembership(string username); Now, there are two classes that implement this interface, ActiveDirectoryAuthService : IAuthService DatabaseAuthService : IAuthService The consumer method would then be like so: class Consumer { public void DoWork(IAuthService myAuthService) { return myAuthService.Authenticate(“un”, “pw”); } } As you can see, I can now change the classes the consumer is using very easily, because the consumer doesn’t care how the task is achieved, it just wants the task to be done. Therein lies the power, loose coupling. Because no consumer knows about the intimate details of the AuthService class. Only how to interact with it. Hopefully thats not too confusing. An example like that really helped me to see the light with interfaces when I first started using them. Didn’t mean to hijack your thread colin, just wanted to let everyone know what helped me see the light. good post colin! No problem Sean, it can be a tricky topic initially so more examples are good! Jamal: I think your example is pretty much why C# disallows multiple inheritance. Imagine what sort of a mess you could get in then! I’ve used Model View Presenter in the last couple years for my Forms and it can become very hairy fast if you have “base” forms (inheritence). What interfaces allow you to do is ensure the contract is being fulfilled, but the other benefit is mocking. You are able to make your form implement IView for example and mock that and therefore unit test your UI. There are qwerks with doing that in ASP.NET, but the best (reading) example is in the “Agile Patterns, Patterns, and Practices in C#” book by Robert and Micah Martin, Chapter 38 shows the Model View Presenter in action. (beware, they refer to the UI as an interface also, so read carefully) Hope this helps. Great post Colin. I think interfaces can sometimes be hard to wrap your mind around. Once a person has that “aha” moment, they will never turn back. SIDE NOTE: The only thing a degree in our field, unfortunately, will do is get your foot in the door for an interview (usually). If you have a recruiter who actually reads the resumes and sees the the experience listed, everyone has a fighting chance. I personally don’t rate a developer on his education. I base it on experience.
http://lostechies.com/colinramsay/2007/10/01/working-with-interfaces-part-one-contracts/
CC-MAIN-2014-15
refinedweb
1,072
63.19
I have the following code import pandas as pd from sklearn.preprocessing import StandardScaler import numpy as np df.columns=['sepal_len', 'sepal_wid', 'petal_len', 'petal_wid', 'class'] df.dropna(how="all", inplace=True) # drops the empty line at file-end X = df.ix[:,0:4].values y = df.ix[:,4].values X_std = StandardScaler().fit_transform(X) mean_vec = np.mean(X_std, axis=0) [ -4.73695157e-16 -6.63173220e-16 3.31586610e-16 -2.84217094e-16] In practice those values are so close to 0 that you can consider them to be 0. The scaler tries to set the mean to be zero, but due to limitations with numerical representation it can only get the mean really close to 0. Check this question on the precision of floating point arithmetics. Also interesting is the concept of Machine Epsilon and that for a float 64 is something like 2.22e-16
https://codedump.io/share/3seAfZxUuiFD/1/mean-of-data-scaled-with-sklearn-standardscaler-is-not-zero
CC-MAIN-2017-26
refinedweb
145
70.19
I'm trying to write a script which detects my current wifi connection and starts a socks proxy on my local computer. The script itself works fine when I execute it by myself. Since I want everything to be automatically, I was thinking of using crontab. The only problem is that crontob itself doesn't have output or so, therefore the methods return an empty string. Does anyone have a solution for this? My script looks like this: #!/usr/bin/python from subprocess import Popen, PIPE import re, os location = Popen(['networksetup', '-getcurrentlocation'], stdout=PIPE).stdout.read().split('\n')[0] ssid = '' for item in Popen(['/System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport', '-I'], stdout=PIPE).stdout.read().splitlines(): if ' SSID' in item: ssid = item.strip().split(': ')[-1] if location != 'xyz' and ssid == 'abc': # start socks proxy pass elif location == 'xyz' and ssid != 'abc': # kill socks proxy pass print location, '|', ssid I'm working on Mac OS 10.10.1 if somebody wants to know. Actualy Popen should return process output both when you run it manyally and via cron. Try to redirect stderr to stdout inside Popend: stderr=sys.stdout.buffer (python3) and read the output, why command can't be exectued. Probably your script is run as root (if you edited /etc/crontab), try to change line to */10 * * * * Exceen python /Users/Exceen/Scripts/autoproxy.py Try to write full path to networksetup binary. Cron job can have different $PATH, missing /usr/bin/ (or wherever networksetup is)
http://www.dlxedu.com/askdetail/3/bfcddc092657af1e6a32403d1a4eb722.html
CC-MAIN-2018-22
refinedweb
250
60.72
A docstring describes a module, function, class, or method in plain English to help other coders understand the meaning better. You must define the docstring at the beginning of the module, function, class, or method definition. By doing so, the docstring becomes the __doc__ special attribute of that object. You can access the docstring of any Python object by calling its __doc__ attribute. You can find a full tutorial on the docstring on my blog article: What is __ doc __ in Python? Let’s have a short look at a minimal docstring example: s = 'hello world' print(s.__doc__) The output is the following multi-line docstring of the string function object: ''' str(object='') -> str str(bytes_or_buffer[, encoding[, errors]]) -> str Create a new string object from the given object. If encoding or errors is specified, then the object must expose a data buffer that will be decoded using the given encoding and error handler. Otherwise, returns the result of object.__str__() (if defined) or repr(object). encoding defaults to sys.getdefaultencoding(). errors defaults to 'strict'. ''' But how can you define the docstring in a single line of Python code? The docstring can be either defined in multiple lines using the triple quotes or in a single line. One-Line Docstring Per convention, you use one-line docstrings if the function, module, class, or method is obvious enough to warrant a short explanation—but nothing more. You can enclose the one-liner docstring within single quotes, double quotes, or even triple quotes. However, enclosing the one-liner docstring in a triple quote is the most Pythonic way. For example, the following function can be easily understood. Therefore, a one-liner docstring is sufficient to describe its behavior: def add(x, y): '''Add both arguments and returns their sum.''' return x + y print(add.__doc__) # Add both arguments and returns their sum. There are some conventions to consider when writing one-liner docstrings: - Use triple quotes for the one-liner docstring—even if this is not strictly needed. It improves consistency and simplifies later extensions of the docstring. - Place the closing quotes on the same line as the opening quotes for clarity. Otherwise it wouldn’t be a one-liner docstring in the first place. - Don’t use a blank line before or after the docstring. Just start coding right away! - If possible, formulate the docstring as a phrase ending in a period. Why? Because this encourages you to write prescriptive docstrings such as “Do X” or “Return Y” rather than descriptive “Returns X” or “Does Y”. - Don’t use the docstring as a “signature” reiterating the information already given in the function/method definition. So far so good. But if this is a one-liner docstring—how does a multi-line docstring look like? Multi-Line Docstring A multi-line docstring consists of multiple lines of Python code: def add(a=0, b=2): """Add two integers. Keyword arguments: a -- the first argument (default 0) b -- the second argument (default 2) """ if a == 0: return b else: return a + b In this case, the multi-line docstring is more complicated. It first starts with a general description of the function, followed by a list-like explanation of all the arguments. This is a clean and readable way to write docstrings! Try It Yourself: Have a look at the following interactive code shell: Exercise: Print the docstring to the Python shell and run it in your browser! Best Practices There are a couple of best-practices called Docstring Conventions as defined in the official PEP standard. Adhere to them when defining your docstrings. Here are the 7 most important docstring conventions: - All modules, function, methods, and classes should have docstrings. - Always use """triple double quotes"""around your docstrings for consistency reasons. - Use triple quotes even if the docstring fits into a single line. This allows for easy expansion later. - No blank line before or after the docstring—except for classes where you should add one line after the docstring. - Use a phrase that describes what your code is doing such as """Do X and return Y."""ending in a period. Don’t use a description such as """Does X and returns Y.""". - Multi-line docstrings start with a summary line (like the one-liner docstring), followed by a blank line, followed by a closer description such as argument --- name of the person (string)to describe one of the arguments of the function or method. For example, you can use one line per argument. - Start a multi-line docstring immediately in the same line of the opening """triple double strings...rather than starting the text in a new line.!
https://blog.finxter.com/python-one-line-docstring/
CC-MAIN-2020-50
refinedweb
777
65.42
Your keyboard can make sounds! If you've got a Planck, Preonic, or basically any AVR keyboard that allows access to certain PWM-capable pins, you can hook up a simple speaker and make it beep. You can use those beeps to indicate layer transitions, modifiers, special keys, or just to play some funky 8bit tunes. Up to two simultaneous audio voices are supported, one driven by timer 1 and another driven by timer 3. The following pins can be defined as audio outputs in config.h: Timer 1: #define B5_AUDIO #define B6_AUDIO #define B7_AUDIO Timer 3: #define C4_AUDIO #define C5_AUDIO #define C6_AUDIO If you add AUDIO_ENABLE = yes to your rules.mk, there's a couple different sounds that will automatically be enabled without any other configuration: STARTUP_SONG // plays when the keyboard starts up (audio.c)GOODBYE_SONG // plays when you press the RESET key (quantum.c)AG_NORM_SONG // plays when you press AG_NORM (quantum.c)AG_SWAP_SONG // plays when you press AG_SWAP (quantum.c)CG_NORM_SONG // plays when you press CG_NORM (quantum.c)CG_SWAP_SONG // plays when you press CG_SWAP (quantum.c)MUSIC_ON_SONG // plays when music mode is activated (process_music.c)MUSIC_OFF_SONG // plays when music mode is deactivated (process_music.c)CHROMATIC_SONG // plays when the chromatic music mode is selected (process_music.c)GUITAR_SONG // plays when the guitar music mode is selected (process_music.c)VIOLIN_SONG // plays when the violin music mode is selected (process_music.c)MAJOR_SONG // plays when the major music mode is selected (process_music.c) You can override the default songs by doing something like this in your config.h: #ifdef AUDIO_ENABLE#define STARTUP_SONG SONG(STARTUP_SOUND)#endif A full list of sounds can be found in quantum/audio/song_list.h - feel free to add your own to this list! All available notes can be seen in quantum/audio/musical_notes.h. To play a custom sound at a particular time, you can define a song like this (near the top of the file): float my_song[][2] = SONG(QWERTY_SOUND); And then play your song like this: PLAY_SONG(my_song); Alternatively, you can play it in a loop like this: PLAY_LOOP(my_song); It's advised that you wrap all audio features in #ifdef AUDIO_ENABLE / #endif to avoid causing problems when audio isn't built into the keyboard. The available keycodes for audio are: AU_ON - Turn Audio Feature on AU_OFF - Turn Audio Feature off AU_TOG - Toggle Audio Feature state !> These keycodes turn all of the audio functionality on and off. Turning it off means that audio feedback, audio clicky, music mode, etc. are disabled, completely. For ARM devices, you can adjust the DAC sample values. If your board is too loud for you or your coworkers, you can set the max using DAC_SAMPLE_MAX in your config.h: #define DAC_SAMPLE_MAX 65535U The music mode maps your columns to a chromatic scale, and your rows to octaves. This works best with ortholinear keyboards, but can be made to work with others. All keycodes less than 0xFF get blocked, so you won't type while playing notes - if you have special keys/mods, those will still work. A work-around for this is to jump to a different layer with KC_NOs before (or after) enabling music mode. Recording is experimental due to some memory issues - if you experience some weird behavior, unplugging/replugging your keyboard will fix things. Keycodes available: MU_ON - Turn music mode on MU_OFF - Turn music mode off MU_TOG - Toggle music mode MU_MOD - Cycle through the music modes: CHROMATIC_MODE - Chromatic scale, row changes the octave GUITAR_MODE - Chromatic scale, but the row changes the string (+5 st) VIOLIN_MODE - Chromatic scale, but the row changes the string (+7 st) MAJOR_MODE - Major scale In music mode, the following keycodes work differently, and don't pass through: LCTL - start a recording LALT - stop recording/stop playing LGUI - play recording KC_UP - speed-up playback KC_DOWN - slow-down playback The pitch standard ( PITCH_STANDARD_A) is 440.0f by default - to change this, add something like this to your config.h: #define PITCH_STANDARD_A 432.0f You can completely disable Music Mode as well. This is useful, if you're pressed for space on your controller. To disable it, add this to your config.h: #define NO_MUSIC_MODE By default, MUSIC_MASK is set to keycode < 0xFF which means keycodes less than 0xFF are turned into notes, and don't output anything. You can change this by defining this in your config.h like this: #define MUSIC_MASK keycode != KC_NO Which will capture all keycodes - be careful, this will get you stuck in music mode until you restart your keyboard! For a more advanced way to control which keycodes should still be processed, you can use music_mask_kb(keycode) in <keyboard>.c and music_mask_user(keycode) in your keymap.c: bool music_mask_user(uint16_t keycode) {switch (keycode) {case RAISE:case LOWER:return false;default:return true;}} Things that return false are not part of the mask, and are always processed. By default, the Music Mode uses the columns and row to determine the scale for the keys. For a board that uses a rectangular matrix that matches the keyboard layout, this is just fine. However, for boards that use a more complicated matrix (such as the Planck Rev6, or many split keyboards) this would result in a very skewed experience. However, the Music Map option allows you to remap the scaling for the music mode, so it fits the layout, and is more natural. To enable this feature, add #define MUSIC_MAP to your config.h file, and then you will want to add a uint8_t music_map to your keyboard's c file, or your keymap.c. const uint8_t music_map[MATRIX_ROWS][MATRIX_COLS] = LAYOUT_ortho_4x12(36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47,24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35,12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23,0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11); You will want to use whichever LAYOUT macro that your keyboard uses here. This maps it to the correct key location. Start in the bottom left of the keyboard layout, and move to the right, and then upwards. Fill in all the entries until you have a complete matrix. You can look at the Planck Keyboard as an example of how to implement this. This adds a click sound each time you hit a button, to simulate click sounds from the keyboard. And the sounds are slightly different for each keypress, so it doesn't sound like a single long note, if you type rapidly. CK_TOGG - Toggles the status (will play sound if enabled) CK_ON - Turns on Audio Click (plays sound) CK_OFF - Turns off Audio Click (doesn't play sound) CK_RST - Resets the frequency to the default state (plays sound at default frequency) CK_UP - Increases the frequency of the clicks (plays sound at new frequency) CK_DOWN - Decreases the frequency of the clicks (plays sound at new frequency) The feature is disabled by default, to save space. To enable it, add this to your config.h: #define AUDIO_CLICKY You can configure the default, min and max frequencies, the stepping and built in randomness by defining these values: This is still a WIP, but check out quantum/process_keycode/process_midi.c to see what's happening. Enable from the Makefile.
https://beta.docs.qmk.fm/using-qmk/hardware-features/feature_audio
CC-MAIN-2020-29
refinedweb
1,201
62.48
Universally Unique Lexicographically Sortable Identifier Objective-C wrapper of the C++ library Usage Objective-C #import <ULID/ULID.h> NSLog(@"%@", [[ULID new] ulidString]); Swift: import ULID print(ULID().ulidString) Requirements - iOS 8.0+ - watchOS 2.0+ - tvOS 9.0+ - macOS 10.10+ Specification Below is the current specification of ULID as implemented in this repository. Note: the binary format has not been implemented. 01AN4Z07BY 79KA1307SR9X4MV3 |----------| |----------------| Timestamp Randomness 48bits 80bits Installation Carthage To install it, simply add the following line to your Cartfile: github "whitesmith/ulid" Then run carthage update. Follow the current instructions in Carthage’s README for up to date installation instructions. CocoaPods To install it, simply add the following line to your Podfile: pod 'ULID' Then run pod install with CocoaPods 1.0 or newer. Contributing The best way to contribute is by submitting a pull request. We’ll do our best to respond to your patch as soon as possible. You can also submit a new GitHub issue if you find bugs or have questions. Latest podspec { "name": "ULID", "version": "1.1.0", "summary": "Universally Unique Lexicographically Sortable Identifier", "homepage": "", "authors": { "Ricardo Pereira": "[email protected]" }, "license": "MIT", "social_media_url": "", "description": "Universally Unique Lexicographically Sortable Identifier (Objective-C wrapper of the C++ lib).", "source": { "git": "", "tag": "1.1.0" }, "platforms": { "ios": "8.0", "tvos": "9.0", "watchos": "2.0", "osx": "10.10" }, "requires_arc": true, "source_files": [ "ULID/*.{h}", "Source/*.{h,hh,hpp,cpp,m,mm}" ], "public_header_files": [ "ULID/*.{h}", "Source/*.{h}" ], "private_header_files": "Source/*.{hh,hpp}" } Mon, 24 Dec 2018 11:51:11 +0000
https://tryexcept.com/articles/cocoapod/ulid
CC-MAIN-2019-43
refinedweb
252
54.59
Introduction To Developing Fireworks Extensions (They’re Just JavaScript!) - By Dmitriy Fabrikant - June 4th, 2014 - 8 Comments. I learned to develop Fireworks extensions by writing the Specctr plugin1. While working on Specctr, I’ve witnessed Fireworks’ passionate community actively support the app — an app that has been widely overlooked by Adobe. (Sadly, Fireworks CS6 is the last major release23, Aaron Beall4 and Matt Stow5, among others, who have written many indispensable extensions, such as SVG Import6 and SVG Export7 (which add full-featured SVG support to Fireworks), Generate Web Assets8, CSS Professionalzr9 (which extends the features of the CSS Properties10.011), and through extensions, new features and panels can be added. This article is aimed at those interested in developing extensions for Fireworks. We’ll introduce the JavaScript underpinnings of Fireworks and, in the process, write a few JavaScript examples to get you started. This article will cover the following: -. Let’s get started! Do You Speak JavaScript? Fireworks Does! Fireworks speaks JavaScript. It exposes a JavaScript application programming interface12 (API) via Fireworks’ document object model13 (DOM), which represents its constituent parts and functions. That’s a long way of saying that you can write JavaScript to tell Fireworks what to do. Fireworks lets you run the JavaScript in two basic ways: commands and command panels. Commands The first option is to execute JavaScript as commands. Commands are simple text files that contain JavaScript and that are saved with a .jsf extension. To make them available from the “Commands” menu in Fireworks, you must save them in the <Fireworks>/Configuration/Commands/ directory (where <Fireworks> is a stand-in for the installation directory of Adobe Fireworks on your computer — see “A Note on Locations” below). Command Panels The second option is to build a command panel. Command panels are Flash panels powered by ActionScript14, Below are the exact locations of the Commands and Command Panels folders on both Mac and Windows. Mac OS X /Applications/Adobe Fireworks CS6/Configuration/Commands/ /Users/<USERNAME>/Library/Application Support/Adobe/Fireworks CS6/Commands/ /Applications/Adobe Fireworks CS6/Configuration/Command Panels/ /Users/<USERNAME>/Library/Application Support/Adobe/Fireworks CS6/Command Panels/ Windows Windows\ Windows XP: When should you write a command, and when should you write a command panel? Generally, a command is useful for automating some action that requires no or very little user input, such as pasting elements into an existing group15 or quickly collapsing all layers16. A command is also easier to build and test. But if the action you’d like to automate requires a lot of user interaction or if you would like to organize a group of commands in one place for quick access, then you might want to build a command panel instead. For example, the Specctr panel that I made groups together a number of JavaScript commands and can be configured by the user (such as when setting a specification’s color or when setting the amount by which to increase the margins around the canvas to make room for a generated specification). So, opting for a command panel was obvious in this case. Commands panels are more complex and require more time to develop and test. The “Expand Canvas” functionality in Specctr was the inspiration for some of the functionality that we will learn to implement in this article. Regardless of whether you write a command or build a command panel, you will be interacting with Fireworks via JavaScript. Now let’s peek inside Fireworks’ JavaScript heart! Note: How to build a command panel is beyond the scope of this article. We’ll focus instead on the basics of developing a Fireworks extension and how to write your first extension. To learn more about command panels, do check out Trevor McCauley’s excellent article “Creating Fireworks Panels17.” History Panel The<< This History panel entry represents the JavaScript code corresponding to the action you have performed. Next, click the “Copy steps to clipboard” button in the bottom-right corner of the History panel, and paste it in the text element that you’ve just moved (i.e. replacing the “Move Me!” text). Voilà, the code! This is a quick way to see the JavaScript18 that represents the actions you perform through the user interface in Fireworks. If you moved an object 2 pixels to the right (along the x-axis) and 46 pixels down (along the y-axis), this is how the JavaScript code would look: fw.getDocumentDOM().moveSelectionBy({x:2, y:46}, false, false); We can save this code to Fireworks’ “Commands” menu by clicking on the “Save steps as a command” button in the bottom-right corner of the History panel. Once this simple command has been saved to the Commands folder, and y values in the .jsf file that Fireworks saved at the location described earlier in this article. This was a very simple example, but it shows that developing a Fireworks extension is not that hard — at least not in the beginning! Fireworks Console Let3919<< You should see the selected text on the canvas move 10 pixels to the right and 10 pixels down as Fireworks executes the JavaScript in the Console panel. This is a great way to quickly test different commands and to make sure that the code you are working on actually does what it is supposed to do. Console Debugging While building the Specctr panel, I used the JavaScript alert function to check the output of my code at various places in its execution. myCode.jsf … // Check the value of myVariable: alert("my variable:", myVariable); … console into Fireworks’ global namespace. This means that we can use the console object’s log function to log messages out to the Console panel’s output pane, as we’ll see now. myCode.jsf … console.log("myProgramVariable", myVariable); … This doesn’t interrupt the code from executing. Because Fireworks does not provide any way for you to set breakpoints in the code, logging to the console is the method that I would recommend when debugging extensions. Fireworks DOM Just as the console object is a JavaScript representation of Fireworks’ Console panel, the different concepts and functionality that make up Fireworks have JavaScript representations. This organization of JavaScript objects that models Fireworks’ behavior is called the Fireworks DOM. fw Object We can see the DOM being accessed by our “Move” JavaScript code from earlier: fw.getDocumentDOM().moveSelectionBy({x:2, y:46}, false, false); The fw object is a JavaScript object that models or represents Fireworks itself. It contains properties that describe Fireworks’ current state. For example fw.selection is an array that represents all of the currently selected elements on the canvas. We can see this by selecting the text element that we’ve been working with and, in the Console panel, typing fw.selection, then clicking the “Eval” button. Here is the Console panel’s output: [{ … alignment: "justify", face: "GillSans", fontsize: "34pt", … }] In the output window, you should see a JSON20 representation of the fw.selection array containing objects that symbolize each of the selected design elements on the canvas. (JSON is just a human-readable representation of JavaScript objects — in our case, the text element that we selected.) Viewing the DOM When the formatting of the Console’s output gets too long, it leaves something to be desired. So, to see the properties and values of objects (object methods are not shown) in the Fireworks DOM, I use Aaron Beall’s DOM Inspector4021 panel, another indispensable companion in my journey of developing extensions. Install the DOM Inspector panel, and then select the text object that represents the “Move” code (or any text object). Make sure that the drop-down menu at the top of the DOM Inspector panel is set to fw.selection. You should see an expanded [object Text] in the Inspector, along with all of its properties and values. From the drop-down menu, I can select between viewing the contents of four objects: fw.selection An array of currently selected elements on the canvas fw The Fireworks object dom The DOM of the currently active document (which we will discuss next) dom.pngText A property of the currently active document (available for us to write to so that we can save data to the current document and retrieve it even after restarting Fireworks) Document DOM In the DOM Inspector panel, we can switch to the documentDOM and explore its state. We can also access the documentDOM via JavaScript with the getDocumentDOM() method, as we did with the “Move” command: fw.getDocumentDOM().moveSelectionBy({x:10, y:10}, false, false); The Acting on the current selection is a common pattern when developing Fireworks extensions. It mirrors the way that the user selects elements on the canvas with the mouse, before performing some action on that selection. fw.getDocumentDOM().moveSelectionBy({x:10, y:10}, false, false); The document DOM’s moveSelectionBy()22 function takes a JavaScript object as a parameter: {x:10, y:10} Given an origin in the top-left corner, this tells Fireworks to move the selected object by x pixels to the right and by y pixels down. The other two boolean parameters ( false, false) indicate to move (as opposed to copy) the selection and to move the entire element (as opposed to a sub-selection, if any exists). Like the moveSelectionBy() method, many other Document DOM methods23 act on the current selection ( cloneSelection() and flattenSelection(), to name two). Expand Your Horizons (And The Canvas) Using what we have learned so far, let’s write a simple command that will expand the size of our canvas. Canvas Size To increase the size of the canvas, we need to know the current size. Our panel can call the JavaScript below to access the canvas’ current dimensions: var = canvasWidth = fw.getDocumentDOM().width; var = canvasHeight = fw.getDocumentDOM().height; Now, let’s see how to change these dimensions. Setting the Canvas’ Size To set the canvas’ size, we call the setDocumentCanvasSize() method24 of the Document DOM. fw.getDocumentDOM().setDocumentCanvasSize({left:0, top:0, right:200, bottom:200}); The method takes a “bounding rectangle” as a parameter: {left:0, top:0, right:200, bottom:200} The size of the rectangle will determine the new size of the canvas: right - left = 200 bottom - top = 200 Here, the rectangle is bounded by the object; therefore, the canvas is 200 × 200 pixels. Increasing the Canvas’ Size: A Simple Command Let’s create a simple command that will double the canvas’ size automatically. Instead of going through the Modify → Canvas → Canvas Size menu and then figuring out a width and height to input and then pressing “OK” whenever we want to increase the canvas’ size, we can combine the two code samples from above to create a quick shortcut to double the canvas’ size. The code might look something like this: // Double Canvas Size command, v.0.1 :) var newWidth = fw.getDocumentDOM().width * 2; var newHeight = fw.getDocumentDOM().height * 2; fw.getDocumentDOM().setDocumentCanvasSize({left:0, top:0, right: newWidth, bottom: newHeight}); I’m working on a Mac, so to make this command available from the “Commands” menu in Fireworks, I could save the code above as double_size.jsf in the following location: /Users/<MYUSERNAME>/Library/Application Support/Adobe/Fireworks CS6/Commands/double_size.jsf (Check the beginning of the article to see where to save your .jsf commands if you are on a different OS.) I leave it as an exercise for you to write and save a simple command that cuts the canvas’ size in half. Conclusion We. Of course, we’ve just scratched the surface. These are just the basics to help you get started with developing Fireworks extensions. Use the techniques and resources in this article as a springboard to make more sophisticated extensions that will help you in your daily design work. Another great way to learn more about Fireworks extensions is by deconstructing other extensions. Because Fireworks commands are simple JavaScript files, you could learn a lot by studying the code of other developers. I’d especially recommend the extensions created by the following people: (The Project Phoenix30 extensions, recently rebooted by Linus Lim31, are also worth mentioning. They include Font List, Super Nudge, Auto Save, Rename, Transform, Alignment Guides, Perspective Mockups, Retina Scaler, Layer Commands, Used Fonts and many others.) Finally, below you’ll find an incomplete list of resources to help you along the way. If you think I’ve missed something important (or if you have any questions), let me know in the comments. I’d be happy to help. Further Reading - “Extending Fireworks32,” Adobe This is the official guide to developing extensions for Fireworks CS5 and CS6 (including the “Fireworks Object Model33” documentation). - FireworksGuru Forum34 Want to ask John35, Aaron or Matt36 a question37? You’ll probably find them here. - “Adobe Fireworks JavaScript Engine Errata38,” John Dunning Dunning breaks down the quirks of the JavaScript interpreter that ships with Fireworks. Something not working as it should? Check it here. The list is pretty extensive! - Fireworks Console3919, John Dunning This is a must-have if you write Fireworks extensions! - DOM Inspector4021 (panel), Aaron Beall - “Creating Fireworks Panels, Part 1: Introduction to Custom Panels41,” Trevor McCauley This was one of the first tutorials that I read to learn how to develop extensions for Fireworks. McCauley has written many cool extensions for Fireworks, and this article is an excellent read! (al, mb,
http://www.smashingmagazine.com/2014/06/04/introduction-to-developing-fireworks-extensions-theyre-just-javascript/
CC-MAIN-2014-52
refinedweb
2,227
52.8
PDMIn – Record an input PDM audio stream¶ PDMIn can be used to record an input audio signal on a given set of pins. - class audiobusio. PDMIn(clock_pin, data_pin, *, sample_rate=16000, bit_depth=8, mono=True, oversample=64, startup_delay=0.11)¶. Record 8-bit unsigned samples to buffer: import audiobusio import board # Prep a buffer to record into b = bytearray(200) with audiobusio.PDMIn(board.MICROPHONE_CLOCK, board.MICROPHONE_DATA, sample_rate=16000), sample_rate=16000, bit_depth=16) as mic: mic.record(b, len(b)) record(destination, destination_length)¶ Records destination_length bytes of samples to destination. This is blocking. An IOError may be raised when the destination is too slow to record the audio at the given rate. For internal flash, writing all 1s to the file before recording is recommended to speed up writes.
https://circuitpython.readthedocs.io/en/latest/shared-bindings/audiobusio/PDMIn.html
CC-MAIN-2019-51
refinedweb
128
57.77
I'll just comment above the rest because I think I can simplify what I'm saying more based on your feedback as it seems there is still a misunderstanding. Sorry for the unclear assertiveness Gregg. What I'm specifically advocating isn't live objects in the JavaSpace, from that perspective it would be immutable at the field level, and I believe I misunderstood the point you were making before about mutability, but the entry could be overwritten in the space much like a RDBMS record would be. I'm advocating the Entry template and the requirements of it be loosened and describable. If no descriptor is provided, the current requirements for entries could be the default fall back for backward compatibility. A simple JavaBean which could be used in an Entry, not that it is special or uses any complex logic in properties, but for an example, and where its fields could be used for lookup: public class Person { private String firstName; private String lastName; public String getFirstName(){ return firstName; } //..getter here //lastname setter //lastname getter } and then to have some type of meta-data as annotations or some type of a descriptor which would come from the entry level for a Person field used by JavaSpaces to store it as needed. The benefit comes to the programmer who doesn't have to create any other TO object just to use the held data within this bean just to use it in an Entry and match the current entry pattern of use. This doesn't have to change so much the way the server works or what data is stored other than on the JavaSpaces client side and how that data is described to the remote JavaSpaces client which will be requesting and pushing to a server. So instead of: public class PersonTO { public String firstName; public String lastName; } and having to move data in between the bean above and the TO, the developer simply annotates, or in the case of pre annotations, provides a descriptor at the entry level for a given entries fields, and the logic in JavaSpaces can then do what it does now with the data, yet loosen it to allow for private, public, protected, or indifferent fields in realation to templates and entries so that the information used at the client side can actually be encapsulated without a bunch of wrapper logic. The way the server stores the information wouldn't matter so much outside of a standardized descriptor. The spaces client API could handle setting up the data for the server the way it does now, just by using the descriptive information to build it, and this be part of the spaces specification to have that standardized. Is that more clear? The general idea I'm advocating is to reduce the complexity between where the data comes, how it gets into an entry, and out, and the amount of coding done on the developers end just to put the data into and pull it out of the space per the requirements of the entry specification. In this sense the spaces clients would be used with the same sub-systems on different distributed services, or in any manner needed really. So, from the point of view of a description that description/descriptor could even tell the spaces server end which fields should be used for lookup and the client side spaces API how to pull the information out to build the correct entry information for the space server per a specification. That is really all I'm advocating to change, live objects and other JARs and class files should not matter to the spaces server, and the client API can be sure it is OK to instantiate a live object and populate its graph just as JavaBeans encoding/decoding/de(serialization) does now as the spaces server ensures consistent state between what is written and read between different distributed calls. Basically, minor changes from the servers perspective to possibly accept meta information about what it is taking and how to find it, that meta information be created by the spaces client side API from entry annotations or some getDescriptors method, so the client API accept a new form of an Entry class which is annotated or returns some set of descriptors much as the JavaBeans specification does for beans, and that is pretty much it. Really, the server wouldn't even have to necessarily understand the meta-information as the client could use the current specification to build entries/templates on the fly for reading and writing to the server as it does now. I get one could create a simple wrapper API and annotations library to generate Entry classes for them based on BOs or any other information, I'm just thinking along the specification and how information is put into an Entry. Basically it would reduce the logic much like EJB3 persistence and annotations have done for that technology yet would have the annotating done at the Entry level to keep from having to force extra classes from JavaSpaces onto the rest of a given sub-system or design and it be at the specification level versus a bunch of roll your own logic in different providers APIs. Thanks, Wade ----- Original Message ---- > From: Gregg Wonderly <gregg@wonderly.org> > To: river-dev@incubator.apache.org > Sent: Tuesday, September 2, 2008 6:58:54 PM > Subject: Re: Jini, JavaSpaces, JEE, some questions, and some other development issues and ideas. > > Wade Chandler wrote: > >. > > The discussions in the interview detail why the choice was made. Having a > public get/set pair which set a "constant" value is equivalent to having a > public member that you just assign and reference. So they chose to not require > the use of the public get/set method. A subtle but important issue I already > mentioned, is that they did not want to download code and have live objects in > the JavaSpace. That would be required for the get methods to be called. > > Not having live objects is a big deal! It really makes certain things possible > that are otherwise not. It also creates certain limitations. If you need > something with live objects, try out my project. > It's not a production ready system. It does support live objects and > comparisons using method calls. > > If you want everything that JavaSpaces provides, but more, than that's where I > think we are at in this discussion. That "more" requires something different > than what exists today. There are ramifications to the "system" when you make > those changes, and some of those (code versioning of live objects) can create a > problem if you don't do all the design for versioning (serialization issues and > data evolution as well) from the start. > > . > > There is only one level that applies here. There are no live objects. What is > compared is the "Serialized" form of the public objects as view from the Entry > object's public fields values. > > . > > I'm confused by this slightly. Making sense, because an API/system design > requires it, is a given. Making sense because it's not what you want to do, or > what you have to do with another system/API is perhaps an opinion, or at most, a > > point of interest worth discussion such as we are having here right? > > ? > > Again, live code does not exist in the existing JavaSpace, so nothing is > "called" in any Entry object. The serialized form is compared for equality, > that's all the spec requires for the equality check. > > . > > Each system/library has certain limitations and necessities in the use of them. > All we are trying to say is that JavaSpaces has no live code use. So anything > > about "code" in objects, is not touchable. Again, this is why I created my > griddle project. During the development of the JavaSpaces05 spec, there was > this exact kind of discussion. So, I created griddle to give people something > to play with and see how it might be used. Didn't get a lick of interest in > such capabilities really, so I'm not sure how to weigh your assertive arguments > for such things against what the community has historically done. > > . > > My view is that separating a TO from a BO because of a "transfer" systems > requirements, is exactly the right thing to do. Creating a layer of abstraction > > in the application software to keep an external system from impacting the > applications architecture is a good practice is it not? > > For an HTTP web server resident servlet, would you have HTTP Request and > Response objects running around inside your application, or would they only be > visible at a particular interface? > > >One can argue that is good or bad, but the real argument on > >whether something is good or bad should come down to a specific > >use at a specific time within a specific design and not at some > >high level argument of how it is always a good or bad thing. > > Yes, by and large, you can make this kind of assertion. But practically, all > kinds of architectural issues come into play with software because APIs are not > arbitrary. Many have specific requirements for order of operations data types > and behaviors (like hashCode() and equals()). I agree in principal with your > argument about the issues, but I'm not sure why your argument is pulling away > from the facts that exist so that we can focus on the issues that make it hard, > or impossible to do that and still meet the same service level agreements that > exist today with the existing JavaSpaces specification. > > Live code in the JavaSpace would change everything. > > Gregg Wonderly
http://mail-archives.apache.org/mod_mbox/river-dev/200809.mbox/%3C685798.91421.qm@web33807.mail.mud.yahoo.com%3E
CC-MAIN-2019-18
refinedweb
1,607
54.76
found 737969 1.1.32~repack-1 thanks I'd bump up the severity to serious if this weren't a maintainer's / release manager's prerogative. This bug does force me to maintain my own fork of the package. The main problem, I think, is the following hunk: @@ -121,12 +123,14 @@ /* requested but not supported */ #endif } else { +#ifndef OPENSSL_NO_SSL2 if (mode == SSL_MODE_CLIENT) ctx = SSL_CTX_new(SSLv23_client_method()); else if (mode == SSL_MODE_SERVER) ctx = SSL_CTX_new(SSLv23_server_method()); else ctx = SSL_CTX_new(SSLv23_method()); +#endif } if (!ctx) { The SSLv23_* methods in OpenSSL have misleading names. They are the only ones that support more than one protocol version at the time, and must be used in order to support any two or more of SSLv2, SSLv3, TLSv1, TLSv1.1, TLSv1.2. So it's wrong to comment them out if OPENSSL_NO_SSL2 is defined. I'd also encourage the Debian maintainers to ponder whether the rest of the drop_sslv2_support.diff patch is still needed in light of upstream changes to the package. In my own builds I just disable it. __ This is the maintainer address of Debian's Java team <>. Please use debian-j...@lists.debian.org for discussions and questions.
https://www.mail-archive.com/pkg-java-maintainers@lists.alioth.debian.org/msg51343.html
CC-MAIN-2018-47
refinedweb
194
66.54
JSON to XML Converter Online Tool About JSON to XML Converter Online Tool: This online json to xml converter tool helps you to convert raw json format string to xml format string. Comparison of JSON and XML 1. Readability. JSON and XML are comparable in readability. JSON has simple syntax, and XML has a standardized tag form. It is difficult to distinguish between winning and losing. 2. Extensibility. XML is very extensible. However, you cannot find one example that XML can represent but JSON cannot. On the other hand, JSON is very compatible with Javascript and can be stored as Javascript composite objects, which has the advantage that xml is incomparable. 3. Coding Difficulty. XML has a wild range of supported coding tools, such as Dom4j, JDom, etc., JSON also has support tools such as python build-in package JOSN. I believe skilled developers can write the desired xml document and JSON string equally quick, but the xml document requires a bit more structural characters. 4. Parsing Difficulty. In webpages support Javascript, JSON is in the home game and its advantage is far superior to xml. However, if programmer doesn't know its data structure in advance, many programmers will be crying to parsing JSON, XML can be parsed through the document model parsing, for example xmlData.getElementsByTagName("tagName"). Does JSON to XML Converter Online Tool log my data? Absolutely NOT, this JSON to XML Converter to XML Converter: Github: xmltodict: JSON to XML Converter with Python (with package xmltodict): import xmltodict def convert_json_to_xml(input_str): dict = json.loads(input_str) return str(xmltodict.unparse({'root': dict}, pretty=True))
https://coding.tools/json-to-xml
CC-MAIN-2020-40
refinedweb
267
56.15
(Note: the revised conceptual model has been split off into the DocumentMode RevisedConceptualModel, leaving this page open for ThreadMode about arbitrary conceptual model revisions). "In many ways, 'entry' appears to be an action or event that occurs to a resource more so than it is the resource itself." - WhatIsAnEntry This points to the fact that the ConceptualModel--and the EntryModel in particular--is broken. Hence, for example, the RevisedConceptualModel. In the revised conceptual model, events are not entries, entries are very flexible in both what they represent and what they can take as properties, and everything is weblog agnostic. Events are Not Entries! A little more about the problem that started off the conceptual model revision proposal... Since an entry can be published on more than one occasion, it is clear that a publication event is a property of the publishing forum, and not the entry itself. For example, Bob writes an article about pigeons. He has a rough draft on his server at. He then sends out the article for publication by super.blog and pigeonsweekly.blog. super.blog republishes his work as a page on their own site, and pigeonsweekly just point back to Bob's original content. That's quite a mess. Bob may have a feed on his weblog, as may super.blog and pigeonsweekly.blog. Under the revised conceptual model, each weblog would have a publication event corresponding to when the weblog published Bob's article. super.blog might want to include the article in a content encoded element, whereas Bob and pigeonsweekly.blog might both want to point to bob's original. One article, two publication locations, three publication events. [BryantDurrell, RefactorOk] Seems like it complexifies matters from the user's point of view. In particular, GUID namespace problems loom larger. You can't just let your tools generate GUIDs anymore; you need to worry about manually setting GUIDs to account for republished articles, etc., etc. Also, parsing becomes slightly more complex in that you can't just chew through a feed. While it's true that the ConceptualModel as outlined is not general-purpose, the art of specification design is finding a balance between the particular needs of the practices one's trying to define and generality. This strikes me as too general. [PhilWolff, RefactorOk] Is there room in this model for EntryLifeCycle attributes?
http://www.intertwingly.net/wiki/pie/ConceptualModelRevisited?action=highlight&value=PhilWolff
CC-MAIN-2014-15
refinedweb
391
57.47
A program loaded into memory and executing is called a process. In simple, a process is a program in execution.. The function is called from parent process. Both the parent and the child processes continue execution at the instruction after the fork(), the return code for the fork() is zero for the new process, whereas the process identifier of the child is returned to the parent. Fork() system call is situated in <sys/types.h> library. System call getpid() returns the Process ID of the current process and getppid() returns the process ID of the current process’s parent process. Let’s take an example how to create child process using fork() system call. #include <unistd.h> #include <sys/types.h> #include <stdio.h> int main( ){ pid_t child_pid; child_pid = fork (); // Create a new child process; if (child_pid < 0) { printf("fork failed"); return 1; } else if (child_pid == 0) { printf ("child process successfully created!\n"); printf ("child_PID = %d,parent_PID = %d\n", getpid(), getppid( ) ); } else { wait(NULL); printf ("parent process successfully created!\n"); printf ("child_PID = %d, parent_PID = %d", getpid( ), getppid( ) ); } return 0; } child process successfully created! child_PID = 31497, parent_PID = 31496 parent process successfully created! child_PID = 31496, parent_PID = 31491 Here, getppid() in the child process returns the same value as getpid() in the parent process. pid_t is a data type which represents the process ID. It is created for process identification. Each process has a unique ID number. Next, we call the system call fork() which will create a new process from calling process. Parent process is the calling function and a new process is a child process. The system call fork() is returns zero or positive value if the process is successfully created.
https://www.tutorialspoint.com/how-to-create-a-process-in-linux
CC-MAIN-2022-05
refinedweb
280
66.44
Preludes A prelude is a collection of names that are automatically brought into scope of every module in a crate. These prelude names are not part of the module itself, they are implicitly queried during name resolution. For example, even though something like Box is in scope in every module, you cannot refer to it as self::Box because it is not a member of the current module. There are several different preludes: Standard library prelude The standard library prelude includes names from the std::prelude::v1 module. If the no_std attribute is used, then it instead uses the names from the core::prelude::v1 module. Extern prelude External crates imported with extern crate in the root module or provided to the compiler (as with the --extern flag with rustc) are added to the extern prelude. If imported with an alias such alloc, and test, are not automatically included with the --externflag when using Cargo. They must be brought into scope with an extern cratedeclaration, even in the 2018 edition. #![allow(unused)] fn main() { extern crate alloc; use alloc::rc::Rc; } Cargo does bring in proc_macroto the extern prelude for proc-macro crates only. The no_std attribute By default, the standard library is automatically included in the crate root module. The std crate is added to the root, along with an implicit macro_use attribute pulling in all macros exported from std into the macro_use prelude. Both core and std are added to the extern prelude. The standard library prelude includes everything from the std::prelude::v1 module. The no_std attribute may be applied at the crate level to prevent the std crate from being automatically added into scope. It does three things: - Prevents stdfrom being added to the extern prelude. - Uses core::prelude::v1in the standard library prelude instead of std::prelude::v1. - Injects the corecrate into the crate root instead of std, and pulls in all macros exported from corein the macro_useprelude. Note: Using the core prelude over the standard prelude is useful when either the crate is targeting a platform that does not support the standard library or is purposefully not using the capabilities of the standard library. Those capabilities are mainly dynamic memory allocation (e.g. Boxand Vec) and file and network capabilities (e.g. std::fsand std::io). Warning: Using no_std does not prevent the standard library from being linked in. It is still valid to put extern crate std; into the crate and dependencies can also link it in. Language prelude The language prelude includes names of types and attributes that are built-in to the language. The language prelude is always in scope. It includes the following: - Type namespace - Boolean type — bool - Textual types — charand str - Integer types — i8, i16, i32, i64, i128, u8, u16, u32, u64, u128 - Machine-dependent integer types — usizeand isize - floating-point types — f32and f64 - Macro namespace macro_use prelude The macro_use prelude includes macros from external crates that were imported by the macro_use attribute applied to an extern crate. Tool prelude The tool prelude includes tool names for external tools in the type namespace. See the tool attributes section for more details. The no_implicit_prelude attribute The no_implicit_prelude attribute may be applied at the crate level or on a module to indicate that it should not automatically bring the standard library prelude, extern prelude, or tool prelude into scope for that module or any of its descendants. This attribute does not affect the language prelude. Edition Differences: In the 2015 edition, the no_implicit_preludeattribute does not affect the macro_useprelude, and all macros exported from the standard library are still included in the macro_useprelude. Starting in the 2018 edition, it will remove the macro_useprelude.
https://doc.rust-lang.org/stable/reference/names/preludes.html
CC-MAIN-2021-17
refinedweb
611
60.65
We saw some time ago that before invoking a method on an object, the CLR will generate a cmp [ecx], ecx instruction to force a null reference exception to be raised if you are trying to invoke a method on a null reference. But why does the CLR raise a NullReferenceException if the faulting address is almost but not quite zero? class Program { public static unsafe void Main() { byte *addr = (byte*)0x42; byte val = *addr; } } When run, this program raises a NullReferenceException rather than an AccessViolationException. On the other hand, if you change the address to 0x80000000, then you get the expected AccessViolationException. With a little bit of preparation, the CLR optimizes out null pointer checks if it knows that it's going to access the object anyway. For example, if you write class Something { int a, b, c; static int Test(Something s) { return s.c; } } then the CLR doesn't need to perform a null pointer test against s before trying to read c, because the act of reading c will raise an exception if s is a null reference. On the other hand, the offset of c within s is probably not going to be zero, so when the exception is raised by the CPU, the faulting address is not going to be exactly zero but rather some small number. The CLR therefore assumes that all exceptions at addresses close to the null pointer were the result of trying to access a field relative to a null reference. Once you also ensure that the first 64KB of memory is always invalid, this assumption allows the null pointer check optimization. Of course, if you start messing with unmanaged code or unsafe code, then you can trigger access violations near the null pointer that are not the result of null references. That's what happens when you operate outside the rules of the managed memory environment. Mind you, version 1 of the .NET Framework didn't even have an AccessViolationException. In purely managed code, all references are either valid or null, so version 1 of the .NET Framework assumed that any access violation was the result of a null reference. There's even a configuration option you can set to force newer versions of the .NET Framework to treat all access violations as null reference exceptions. Exercise: Respond to the following statement: "Consider a really large class (more than 64KB), and I access a field near the end of the class. In that case, the null pointer optimization won't work because the access will be outside the 64KB range. Aha, I have found a flaw in your design!" Answer: The runtime knows when the optimization is safe. It won't do it if it isn't safe. Remember that it can still check the pointer before indexing. If you have a class larger than 64 KB, you very likely have a serious design problem. You could very easily blow your stack with a single one of these (though granted I think that's only possible in C# with value types like structs, not reference types, but correct me if I'm wrong). Some of the systems I code for use a default stack size of 128 KB for non-main threads, and those systems are only about 7 years old.. Sorry for the double post, I was getting an error page when posting (not a null reference exception, disappointingly) so I assumed my comment did not go through. @The MAZZTer Was it an access violation? >> If you have a class larger than 64 KB, you very likely have a serious design problem. From the lens of the JIT compiler, who cares ? It has to work whether it's good design or not. But of course the JIT compiler knows the size of the bare object, so it would simply skip the optimization in those cases. I guess it was too much trouble to make a common ancestor for NullReferenceException and AccessViolationException. Adam Rosenfield> If you have a class larger than 64 KB, you very likely have a serious design problem. You wouldn't believe some of the constructions in some software. In the software for the System 12 ISDN telephone switches, the largest struct declaration took more than 8300 lines. Printed 72 lines to the page, that would be a book of well above a hundred pages! (I came across this when System 12 was in its earlier stages – it probably grew far beyond that before the software was retired.) Another figure from the same software: One of the linkers used to develop the software crashed because it used a signed 16-bit number to index the table of symbols exported from a module. There was a module that exported more than 32767 symbols. The table structure for handling imported symbols from an arbitrary number of other modules used at 32 bit index, but this was a single module that alone defined >32k global symbols. In MY eyes, both of these cases indicate serious design problems, but the telecommunications people don't agree with me. Appearently, this is standard fare in their part of the world. Perhaps it puts a guard page after the structure that has no read nor write access so traps? Considering that you can't have arrays in a class in the sense that matters here, it'd take a seriously messed up class to get to 64 KB. In the example of using the unsafe pointer, the Runtime in theory could keep track of all the machine-code instructions for which a null pointer exception is possible, and note the difference. I suppose that it is not worth the trouble to do this. I'm curious – does the Runtime use an unhandled exception filter or a vectored exception handler to convert the NT exception into a CLR exception? Myria> I'm curious – does the Runtime use an unhandled exception filter or a vectored exception handler to convert the NT exception into a CLR exception? I'd be shocked if it doesn't! ;) Myria: The runtime absolutely allows arrays within types, although C# only allows them in unsafe contexts (so you rarely see them). I've used them for unmanaged interop before. That said, it's still unlikely to see a 64k class without trying really hard — although maybe there are likely situations where codegen could do it. @Myria, Steve Wolf: I always thought it was handled at catch time when it needs to convert the SEH exception to a .NET type. Well as always, why not try the whole thing? So I used the following python script: import math with open("test.txt", "w") as file: for var in range(int(math.ceil(70 * 1024 / 8))): file.write("public long foo{0};n".format(var)) which just generates a really long list of longs that totals 70kb of class data. Putting that into a class called Foo and calling it like this (to actually get the JIT to run but make sure it doesn't optimize the whole calling out): static void Test() { Random rand = new Random(); for (int i = 0; i < 10000; i++) { try { Foo foo = rand.Next() == 0 ? new Foo() : null; Console.WriteLine(foo.foo8959); } catch (NullReferenceException x) { } } } static void Main(string[] args) { for (int i = 0; i < 1000; i++) { Test(); } } shows that at least with VS2012 in release mode we always get a NullReferenceException and nothing else – so the JIT is clever enough to avoid the problem. If 64KB isn't enough then you can always reserve more. Most Unix systems detect "null" pointers by not mapping memory at address zero, going for some offset. I think 64MB is used in some versions of BSD. Any system with ASLR will also likely detect references well into the address space. But if that isn't good enough, implement it in the CPU. x86 doesn't do this, but I think ARM might: if all of your memory referencing instructions are loads and stores of the form: ld [Rbase + offset],Rdest st Rsrc, [Rbase + offset] where offset may be a constant or a register, then just have a mode where a special exception is taken if Rbase is zero, regardless of what the offset may be. Works for any size class/array/whatever, and doesn't require an MMU. If I make this check: if (s != null) s.c(); …then does the JITter optimize out the intrinsic "cmp" null check? If you have a big class and reference a field at the end of it, then there's a risk of memory corruption if the field is written to. Consider the following: [StructLayout(Size=64*1024*1024)] struct Big {} struct ArbitraryWrite { public Big b; public uint f; } class Program() { static void Main() { ArbitraryWrite aw = null; aw.f = 0x11223344; } } which would compile to: xor eax, eax ; // aw = null; mov [eax + 64*1024*1024], 0x11223344 ; // Boom. This would be equivalent to *(DWORD*)(64+1024+1024) = 0x11223344, which is really bad, and effectively allows someone to jump out of the .NET sandbox (this would be an 0-day in Silverlight, for example). To combat this situation, the runtime says that if you're accessing a field more than 64KB into a field, it'll explicitly check the value first: xor eax, eax; // aw = null cmp eax, [eax]; // this will AV at zero, giving us the a null-reference exception that we wanted mov [eax + 64*1024*1024], 0x11223344 ; // this is now only reachable if we're not at null, i.e. no 0-days here. Huzzah! Huh? 64 KB class is a bad design? Get serious, all my classes I use on daily basis are bigger then 64 KB. Why? Because clients like shiny objects, that's why. Do any of you here live in real life? You got no other choice but to buy a 3rd party framework that's build on top of another 3rd party framework which is inherited from another 3rd party framework (and the chain can go on like in Scheherazade's 1001 nights of names "bin…bin…bin"). Clients want reports so I need a report framework, I don't have time to implement one. So I buy one that can print the undiscovered underground Moon tunnels. Clients want big data, so I need a framework for that too (even if the DB is the totally free and fast PostgreSQL I don't want to waste time creating Users, Events, Passwords etc etc tables so I buy a framework who does that for me). Clients want cloud, want this, want that. Do I implement them all? Hell noooo (otherwise I would still be at implementing Microsoft Windows step). They already exists so I buy then use for my bid, hence the client is satisfied with a lower price and faster delivery. And that means they are all over the 64 KB on daily basis. Over time you get fast using those frameworks, you upgrade from version to version (yes, spend money to gain money) and the overall idea is that you spend your time solving clients problems. People weren't talking about classes whose code is bigger than 64K – they were talking about classes whose instance data is bigger than 64K. In other words, if you add together the sizes of all non-static fields (remembering that references only take the size of a pointer, not the size of the referenced object), and you get a number bigger than 64K, you are definitely doing something wrong. @Danny: I think you're confusing instance size with library size or something. Just because you use dozens of 3rd party frameworks doesn't mean you get large classes. For once most frameworks use classes, which means that a single instance of a gigantic framework still only costs you 4/8 byte. To get a class with more than 64kb you have to have about 8192 longs declared (and no standard arrays won't work as long foo[10000] is only a reference to the data so is again only 4/8 byte long). So no this is extremely rare (unsafe code has shortcuts for this kind of thing, but unsafe code doesn't have to do implicit null pointer checks so the whole point is moot). A class with 64k of data is not too big. I'll povide an example. I have to update a table based on another table. I could read the first table one record at a time and update the destination table. However, that beats the living stuff out of the database. Alternatively, I can read the entire source table into a class, generate the SQL needed to update the destination table, then execute the SQL statements. I do this today in a job that runs each day @ 0400 hours. The source table has around 720k records. My class uses a boatload of space, but it runs FAR faster than handling things one record at a time. On low grade server hardware, it runs around 28 seconds of wall time (not CPU seconds). There are limits to this. I worked on a system 20 years ago that processed 30mm transactions per day. Because of regulatory requirements, we had to keep 7 years of data in the database. The technique of reading an entire table into memory won't work since it would be very difficult to buy that much memory and the system also has to serve the needs of 10,000 interactive users as well as anywhere from 100-1000 concurrent batch jobs. @12BitSlab Unless you're doing something horribly wrong all that data is being pointed to by references and is not part of the actual class in memory. When you create a new instance of the class, it shouldn't be taking up 64K of stack, even if it is using gigs of data on the heap. @Myria: For x86, the CLR pushes a new SEH frame onto the stack (and links it up through fs:[0]) for every managed-unmanaged transition. At least, that was the case in v1.x, I don't know if it's changed in later versions. Source: blogs.msdn.com/…/51524.aspx (scroll down to 'A Single Managed Handler') Other processor architectures, including x64, use table-based exception handling, so RtlInstallFunctionTableCallback is used to tell Windows about the JITted functions. Source: blogs.msdn.com/…/x64-manual-stack-reconstruction-and-stack-walking.aspx ITT: "Programmers" having difficulty understanding the subtlety of 64KB of class data. @voo / @12BitSlab – I am not confusing anything. Example of one shiny object I was talking about – devExpress components to show my clients shiny grids, shiny edits, shiny anything GUI has to offer. Do it yourself they are free trial, go get them and install them on your favorite VS version (mine is 2010) then launch just a small C# test with only one cxGrid and that's it. And then comeback to me and tell me the size of the instantiated class. I bet it's more then 64KB. @Danny: You certainly are confusing the issue at hand. The topic isn't whether an objects generally hold references to more than 64KB worth of data total, which is certainly common as your cxGrid demo proves; the topic is an object holding 64KB worth of data *within itself*; which is the only case where it'd be dereferencing further than 64KB from a single pointer offset. About the only natural objects in .NET that will get that large would be an array; or if you have some brain-damaged code generator tool that spits out a class with tens of thousands of value-typed member fields. The CLR can be loaded dynamically into an existing process. Does it verify that the first 64k are really unmapped? Or is this guaranteed by the OS?
https://blogs.msdn.microsoft.com/oldnewthing/20130809-00/?p=3553
CC-MAIN-2018-30
refinedweb
2,638
69.31
Flying with Griffon New frameworks come and go. They tend to stand and fall based on whether people start experimenting with them. The new Griffon framework is unlikely to fall any time soon, since the large and vibrant Groovy/Grails community has a vested interest in it. However, to do my bit, I'm going to start playing with it myself. The Griffon creators were smart enough to include some samples with their intial distribution and so the first application I've made is a small subset of one of these samples. Though it is small, many of the basic Griffon concepts are touched on and the end result is no different to any other Swing application. It is a JXTree inside a JScrollPane within a JPanel, with a JToolBar containing two buttons that expand/collapse tree nodes containing the text of the nodes in the NetBeans Javadoc: However, I also have an applet (and a JNLP application), created via "griffon run-app", i.e., the same Griffon command that created the above Swing application. The applet behaves identically to the Swing application, so that the 'Collapse all' and 'Expand all' buttons do what you would expect them to do, with the general appearance of the applet being identical to the Swing application: Note: For purposes of this simple example, I didn't implement a TreeSelectionListener, so nothing happens when you click any of the leaf nodes above. Let's first look at all the code, before putting everything together into an application. Since Griffon encourages an MVC structure, the code is going to be split into those three parts. The View We begin with a simple view that does nothing: application( title: "Griffon Demo", size: [250,300], locationByPlatform: true ) { panel( ) { borderLayout() scrollPane( constraints: CENTER ) { jxtree( id: "topics" ) } toolBar( constraints: SOUTH ) { button( ) button( ) } } } The above is the complete content (i.e., there's nothing more than that) in a Groovy file called "GriffonDemoView". Why do we assign an id to the JXTree? So that we can refer to it from the controller! That's where we'll get the content of the JXTree and then pass it into the view. The Groovy code is such that one should be able to read the above with the naked eye and then immediately visualize what the user interface will consist of. However, we want our two buttons to be able to do something. Therefore, we will have a separate Groovy file, in this case called "GriffonDemoActions", where all our actions will be found. Then we'll hook them into the view. Here's the complete content of a separate Groovy file, where all our actions will be defined: actions { action( id: 'collapseAllAction', name: "Collapse all", closure: controller.collapseAll, accelerator: shortcut('C'), mnemonic: 'C', shortDescription: "Collapse all categories", smallIcon: imageIcon("org/tango-project/tango-icon-theme/16x16/actions/go-first.png") ) action( id: 'expandAllAction', name: "Expand all", closure: controller.expandAll, accelerator: shortcut('E'), mnemonic: 'E', shortDescription: "Expand all categories", smallIcon: imageIcon("org/tango-project/tango-icon-theme/16x16/actions/go-last.png") ) } Everything above is how you'd expect it to be, except for each action's "closure" property. There you see a reference to a closure defined in the controller. That's where the real work is done by each action. We'll look at that part when we deal with the controller. For now, we'll hook the actions into the buttons: build(GriffonDemoActions) application( title: "Griffon Demo", size: [250,300], locationByPlatform: true ) { panel( ) { borderLayout() scrollPane( constraints: CENTER ) { jxtree( id: "topics" ) } toolBar( constraints: SOUTH ) { button( action: collapseAllAction ) button( action: expandAllAction ) } } } Take note of line 1 above, which includes the Groovy file "GriffonDemoActions", so that our two buttons can refer to the actions we defined in that file. Currently the Actions file needs to be wired explicitly, but possibly in the future "GroovyDemoActions" would automatically be included, Andres tells me. The Controller Next, the controller. import javax.swing.tree.* class GriffonDemoController { def model def view def expandAll = { evt -> ViewUtils.expandTree( view.topics ) } def collapseAll = { evt -> ViewUtils.collapseTree( view.topics ) } def loadPages() { doOutside { def contents = new DefaultMutableTreeNode("NetBeans Javadoc") def leafNodes = new URL(model.menuUrl).text def lastCategory = null (leafNodes =~ /href="(([a-zA-Z-]+)\/(.+?)\.html)"/).each { match -> def category = new DefaultMutableTreeNode(match[2]) def pageNode = new PageNode( title: match[3] ) if( lastCategory?.toString() == category.toString() ){ lastCategory.add( new DefaultMutableTreeNode(pageNode) ) }else{ lastCategory = category category.add( new DefaultMutableTreeNode(pageNode) ) contents.add( category ) } } doLater { view.topics.model = new DefaultTreeModel(contents) } } } } Let's take a look at what's going on here. Lines 9 and 13 refer to a utility class that I copied, together with the PageNode file (which is a simple POGO) from the GrailsSnoop sample (which is part of the Griffon distribution). I'm hoping the whole ViewUtils class will be part of the API and I've written to Andres about this. Notice how it is wired into the view, via the "topics" id of the JXTree. Similarly, line 34 fills the JXTree's model with the content that is built from line 18 to 32. (Look at line 20 to see a reference to the model, where the URL to the location that will be parsed is set.)And when is the "loadPages()" method called? From one of the lifecycle files that is automatically created when you run "griffon create-app"; this particular one is called "Startup.groovy": def rootController = app.controllers.root rootController.loadPages() Hence, the entry point to your application is in the controller, via the lifecycle files that the "griffon create-app" creates for you. But, how does Griffon know that "app.controllers.root" is "GriffonDemoController"? For that purpose, several configuration files are found in "griffon-app/conf", populated during the running of "griffon create-app". One of these, called "Application.groovy", marks out our generated files as follows: mvcGroups { root { model = 'GriffonDemoModel' view = 'GriffonDemoView' controller = 'GriffonDemoController' } } In other words, not only does Griffon explicitly handle your lifecycle, but it also generates skeletons for the requisite classes for you. The Model Finally, the model. In this case, it's really simple: class GriffonDemoModel { String baseUrl = "" String menuUrl = baseUrl + "allclasses-frame.html" } And that's it! The application is complete. Here's the structure once everything above is put together: Of the files listed above, the ONLY one you had to create manually was "GriffonDemoActions", though even that could be included in the "create-app" script in the future. Now run "griffon run-app" and you'll have a Swing application, an applet, and a JNLP application. As shown at the start of this article, your application will list the content of the NetBeans Javadoc. Pretty cool, I reckon. - Login or register to post comments - 8362 reads - Printer-friendly version (Note: Opinions expressed in this article and its replies are the opinions of their respective authors and not those of DZone, Inc.) mcburke replied on Sat, 2008/09/13 - 10:07am Geertjan, This is an excellent introduction to the architecture of Griffon. Where could I find some more information? The available documentation seems a bit thin. Geertjan Wielenga replied on Mon, 2008/09/15 - 2:59pm
http://java.dzone.com/news/flying-with-griffon
crawl-002
refinedweb
1,187
55.13
ZF-801: Zend_Auth - Implement Singleton Pattern Description. By implementing the Singleton pattern, there is a side benefit of inherently providing global access to the object instance. Instead of: $auth = new Zend_Auth(...); We would have: $auth = Zend_Auth::getInstance(); Posted by Ralph Schindler (ralph) on 2007-02-02T13:42:59.000+0000 Also keep in mind that in addition to binding to different Auth Adapters, it can be bound to different Storage Mechanisms.. With that in mind, if component A and component B really want to maintain different authentication identities (extreme edge case), they can both do so within the same session, simply by using a different namespace in the ZendSession storage type adapter. getInstance (like Zend_Contoller) should be complemented with a resetInstance(). Posted by Darby Felton (darby) on 2007-02-02T14:36:19.000+0000 Also related to storage is [ZF-804] Posted by Darby Felton (darby) on 2007-02-02T14:37:13.000+0000 ...and [ZF-802] Posted by Darby Felton (darby) on 2007-02-14T16:32:55.000+0000 Resolved with SVN r3412.
http://framework.zend.com/issues/browse/ZF-801
CC-MAIN-2014-15
refinedweb
174
57.98
Debugging Ruby Code with Pry Your comprehensive guide to Pry and how to use it . Every programmer has faced a situation where they go to execute their code and get an error message they’re confused by, or even worse, the code runs successfully but nothing is output. This was me, and before I learned about Pry I would do things like combing through my code, line by line, trying to guess where the error could be. I even had a phase of inserting puts statements (puts “The error is here!”) hoping to figure out where the error was originating from. Once I learned about Pry, I never looked back. I truly believe it is one of the most important tools for beginning Ruby programmers. What is Pry? Pry is a REPL (Read, Evaluate, Print, Loop) that pauses your code wherever inserted and allows you to test/debug. When your code gets to the ‘pry’ it will freeze and your terminal will turn into a REPL right in the middle of your program. How do I use Pry? The first step is to make sure you have the pry gem installed by typing the following into your terminal: gem install pry Once it’s installed, you will have to require it at the top of any file you plan on using it in like so: # test.rb require 'pry' Now it's time to actually install a pry break into your code using the following snippet: binding.pry Let’s create a file called ‘practice.rb’ and insert the following code into it: require 'pry' def my_fancy_method inside_method = "We are now inside the method." puts inside_method pry_coming = "We are about to see how pry works!" binding.pry frozen = "Pry froze the program before it got to this point!" puts frozen end my_fancy_method Now, when you call “my_fancy_method” before the code finishes fully executing, it will run into the “binding.pry” and kick out into the REPL before it gets to the end. Inside the REPL, you will have everything that was defined before binding.pry, but not anything afterwards. Your terminal should look something like this: 3: def my_fancy_method 4: inside_method = "We are now inside the method." 5: puts inside_method 6: pry_coming = "We are about to see how pry works!"=> 7: binding.pry8: frozen = "Pry froze the program before it got to this point!" 9: puts frozen 10: end[1] pry(main)> At the bottoms you will see the pry(main)> prompt indicating you are currently inside the pry REPL. Let’s test it out. Since the variable inside_method was defined before binding.pry, it should be known to Pry. [1] pry(main)> inside_method=> "We are now inside the method."[2] pry(main)> It worked!! Now, lets try calling the variable frozen which isn’t defined until after the binding.pry on line 8: [[1] pry(main)> inside_method=> "We are now inside the method."[2] pry(main)> frozenNameError: undefined local variable or method `frozen' for main:Object It doesn’t know what frozen is, because as far as its concerned it hasn’t gotten to that definition yet so it does not exist. Make sense? [3] pry(main)> exitPry froze the program before it got to this point! When you type ‘exit’ to leave Pry, it will continue executing the rest of the code, as seen here. Using Pry to Debug Ok. Now that we understand how to install, and use pry, we’ll see how it helps us debug code. Here are the most common uses of Pry for me so far in my early journey through the coding world. Use Case #1: Checking Variables One common mistake for early coders is improperly assigning values to variables. For example, let's say you had the following code: require 'pry' def simple_cubing_tool(number) number * number * number puts "The answer is #{number}!" end simple_cubing_tool(4) It takes in an integer as an argument and multiplies it times itself 3 times. Then it returns a statement giving you your number cubed. Now in a simple case like this you may see the problem already, but let’s take a look at when we run our method with the input of 4. // ♥ > ruby practice.rb The answer is 4! 4?? But 4 cubed is 64 not 4. Lets see what happened by using Pry: require 'pry' def simple_cubing_tool(number) number * number * number binding.pry puts "The answer is #{number}!" end simple_cubing_tool(4)3: def simple_cubing_tool(number) 4: number * number * number => 5: binding.pry 6: puts "The answer is #{number}!" 7: end[1] pry(main)> number => 4 If we type number into pry, even after line four: (number * number * number) has been executed, we see the value of number is still 4. Oops! we forgot to assign number*number*number value to a variable. How do we fix this? require 'pry' def simple_cubing_tool(number) num_cubed = number * number * number puts "The answer is #{num_cubed}!" end Ok now lets run it again. // ♥ > ruby practice.rb The answer is 64! Perfect! Now you see how to use Pry to check the value of variables at different stages of your program. Use Case #2: Seeing where you are in a nested Hash/Array Let’s say we have an array of hashes (AOH) defined as follows: nested = [ {:fruit => { :apple => 1, :banana => 2, :grape => 6 }, :pets => { :fido => "dog", :whiskers => "cat", :charles => "mouse", :bitey => "snake" }, :teams => { :new_york => { :baseball => ["mets", "yankees"], :basketball =>["knicks", "nets"], :football => ["giants", "jets"], :hockey => ["rangers", "islanders"] }, :los_angeles => { :baseball => ["dodgers", "angels"], :basketball =>["lakers", "clippers"], :football => ["rams", "chargers"], :hockey => ["kings"] }, :chicago => { :baseball => ["cubs"], :basketball => ["bulls"], :football => ["bears"], :hockey => ["blackhawks"] } } } ] Our goal here is to iterate through this hash and return all of the basketball teams for each city in the form of: “The basketball teams for (city name) are (basketball team names).” Now, this may seem complicated, but using our friend Pry, we should be able to take this step by step. def list_basketball_teams_by_city nested.each do |element| element.each do |outer_key, outer_value| binding.pry end end end list_basketball_teams_by_city// ♥ > ruby practice.rbTraceback (most recent call last): 5: from practice.rb:45:in `<main>' 4: from practice.rb:37:in `list_basketball_teams_by_city' 3: from practice.rb:37:in `each' 2: from practice.rb:38:in `block in list_basketball_teams_by_city' 1: from practice.rb:38:in `each'practice.rb:39:in `block (2 levels) in list_basketball_teams_by_city': undefined method `pry' for #<Binding:0x00007faadd86ecc0> (NoMethodError) When we run this code we get a NoMethodError — undefined method ‘pry’… hmm.. Oops! we forgot to require ‘pry’ at the top of our code!!!! (I actually made this mistake while writing this so figured I would keep it in) require 'pry'def list_basketball_teams_by_city nested.each do |element| element.each do |outer_key, outer_value| binding.pry end end end list_basketball_teams_by_city// ♥ > ruby practice.rb From: /Users/sean.laflam/Development/code/mod1/practice.rb:41 Object#list_basketball_teams_by_city: 38: def list_basketball_teams_by_city(array) 39: array.each do |element| 40: element.each do |outer_key, outer_value| => 41: binding.pry 42: end 43: end 44: end[1] pry(main)> Much better!! Now based on our code, we can see we are two levels into our nested hash array, and on the first loop of each. We can confirm this by plugging outer_key and outer_value into our pry terminal: [1] pry(main)> outer_key=> :fruit[2] pry(main)> outer_value=> {:apple=>1, :banana=>2, :grape=>6} Good, but we still need some work. We won’t get to the :teams hash until the 3rd loop of our inner each loop and then we still need to dive in 2 levels deeper to return the array of baseball team names. Let’s keep going and add some logic. (Remember: use “exit!” to back all the way out of PRY) def list_basketball_teams_by_city(array) array.each do |element| element.each do |outer_key, outer_value| if outer_key == :teams outer_value.each do |city, sports_hash| binding.pry end end end end end38: def list_basketball_teams_by_city(array) 39: array.each do |element| 40: element.each do |outer_key, outer_value| 41: if outer_key == :teams 42: outer_value.each do |city, sports_hash| => 43: binding.pry 44: end 45: end 46: end 47: end 48: end We should now be inside of the :teams hash and on the first iteration of our cities hash within :teams which would be :new_york. We can check this again with pry by entering “city” and “sports_hash” into PRY. [1] pry(main)> sports_hash=> {:baseball=>["mets", "yankees"],:basketball=>["knicks", "nets"],:football=>["giants", "jets"],:hockey=>["rangers", "islanders"]}[2] pry(main)> city=> :new_york Looks good! We’re getting close to the desired output! Lets bring it home. require 'pry'def list_basketball_teams_by_city(array) array.each do |element| element.each do |outer_key, outer_value| if outer_key == :teams outer_value.each do |city, sports_hash| sports_hash.each do |sport, team_name_array| if sport == :baseball puts "The basketball teams for #{city} are #{sport}." end end end end end end endlist_basketball_teams_by_city(nested)// ♥ > ruby practice.rbThe basketball teams for New York are baseball.The basketball teams for Los Angeles are baseball.The basketball teams for Chicago are baseball. Oh no!! So close but something is wrong. Lets use pry to figure out what happened. if sport == :baseball binding.pry puts "The basketball teams for #{city} are #{sport}." end38: def list_basketball_teams_by_city(array) 39: array.each do |element| 40: element.each do |outer_key, outer_value| 41: if outer_key == :teams 42: outer_value.each do |city, sports_hash| 43: sports_hash.each do |sport, team_name_array| 44: if sport == :baseball => 45: binding.pry 46: puts "The basketball teams for #{city} are #{sport 47: end 48: end 49: end 50: end 51: end 52: end 53: end[1] pry(main)> sport=> :baseball[2] pry(main)> team_name_array=> ["mets", "yankees"][3] pry(main)> There are a couple of errors here. If we check the sport it returns :baseball, but we’re looking for basketball teams for each city. The error is on line 44 in our if statement, where we say if sport ==:baseball instead of :basketball. Then, we returned the wrong variable in our puts statement. We want to return the array of basketball team names for that city, which is defined as “team_name_array” yet we entered puts “The basketball teams for #{city} are #{sport}.” Here is the final debugged code with these corrections added: require 'pry'def list_basketball_teams_by_city(array) array.each do |element| element.each do |outer_key, outer_value| if outer_key == :teams outer_value.each do |city, sports_hash| sports_hash.each do |sport, team_name_array| if sport == :basketball puts "The basketball teams for #{city} are #{team_name_array}." end end end end end end endlist_basketball_teams_by_city(nested) // ♥ > ruby practice.rbThe basketball teams for New York are ["knicks", "nets"].The basketball teams for Los Angeles are ["lakers", "clippers"].The basketball teams for Chicago are ["bulls"].~/.../code/mod1 // ♥ > You can work on this code even further to make the output “prettier” but as you can see, Pry was extremely helpful in helping us get to the correct output. Use Case #3: Anywhere else you need to debug your Code!!! You can use Pry in any application that you seem fit where you need to debug errors in your code. Now that you’re a Pry wizard get out there and test it on your own!
https://laflamablanc.medium.com/debugging-ruby-code-with-pry-a0bf1f5e97ca?source=post_internal_links---------6----------------------------
CC-MAIN-2021-10
refinedweb
1,834
67.04
Hi, see the links to our travel applications in area overview pages in portal. An example is shown below – note that we have copied standard services into own namespace in this case. Then we created 2 portal roles as shown below. One (ESS) that every portal user has and one (ESS TEM) for travel users only. As a result it only contains the travel workset and iviews: We merged the 2 ESS roles (you might have to read up about role merging but it is pretty simple. Just give both roles/worksets same merge IDs etc.) and if assigned this “add-on” role you get an extra tab in portal as shown below: The one problem we had with the above setup was to hide the homepage framework area service link to Travel and Expenses in the ESS overview page for non-travel users. This is the link: For that we had to create an enhancement to function module HRXSS_SER_GETMENUDATA to dynamically hide this part of overview page based on assigned backend role (the TEM merge role as described at the top is linked to this backend role). This can be done by creating an enhancement like this at the bottom of this function module: This provides us with a nice and flexible setup for gradual rollout of the travel and expense application. If anyone has suggestions of how to avoid the enhancement above please let me know 🙂 I hope this will help someone. Br Jan This will definitely help me a great lot! We will upgrade in about one month from EHP4 / Portal 7.01 to EHP6 / Portal 7.02 and I already saw issues coming concerning the new navigation framework and the old homepage framework. If I come around another possibility than enhancing the HRXSS-FM, I’ll let you know. Thanks a lot for sharing this! 🙂 Cheers, Lukas Yes we’ve kept using the old Homepage Framework for now as we are still using a lot of the old Java based services. LPD_CUST will have to wait for now 🙂 Hello Jan, Thanks for the great blog. We are in the process of planning a roll out for various countries. I just want to know if there are country specific iViews, Roles, Worksets for the T&E shipped by SAP just like we have for Address and other things? Regards Avik Hi Avik, No the iviews for TEM are not country specific like SAP has done in some other areas. That means only one global version of the TEM application exist. In order to differentiate countries you do it through customizing. Br Jan Thanks so much for your help Thomas. Jan, One more question, do you mean SPRO customizing or Portal? Regards Avik SPRO / IMG – using transaction fitvfeld_web Hi Jan, Thanks for the blog. You are really a great en courageous person for the learner like me.
https://blogs.sap.com/2013/03/01/gradual-country-specific-rollout-of-travel-expense-management-tem/
CC-MAIN-2018-47
refinedweb
479
70.73
Drag And Drop FTP Application Orçamento $100-300 USD I need a simple to use application that allows users to drag files or folders onto it. Files / folders are then uploaded via FTP to a webserver. This Windows application (winxp) is for end users of a web application i have developed and is intended for non-technical users to have a fast/easy way to upload files to my webserver. User friendly is the keyword here. Application must be able to remember username/password. Once launched the application must make a request to my webserver to receive a list of directories on the server that the dragged files are uploaded to. I can return XML or any data format from the webserver you need, you tell me, and I will setup the return data. Most likely a name/value list return (Folder Title + Folder path for each). I will develop that part, you just need to be able to read the data. The application must show FTP progress as a progress bar or the equivalent (could show overall progress of all files being uploaded, or each file dragged to the app individually). 12 freelancers estão ofertando em média $217 para este trabalho Hello, Please check the PM for my proposal, Thanks :)
https://www.br.freelancer.com/projects/windows/drag-and-drop-ftp-application/
CC-MAIN-2017-47
refinedweb
211
60.95
/dev/by-dname symlinks based on wwn/wwid Bug Description Currently /dev/disk/by-dname symlinks are not created if a device does not have a partition table or a super block. There needs to be a way to create auto-create by-dname symlinks based on unique wwn/eui identifiers and symlinks via udev rules installed during the deployment stage. Old description: Block devices can be identified by a GPT placed on them. Each partition table contains a UUID which uniquely identifies a device. sudo blkid -o udev -p /dev/nvme0n1 ID_PART_ ID_PART_ gdisk: Command (? for help): p Disk /dev/nvme0n1: 1000215216 sectors, 476.9 GiB Logical sector size: 512 bytes Disk identifier (GUID): 8C5E98A4- We could leverage that for software that needs to create its own partitions after deployment in MAAS for example. In this case there will be no need to create a new partition table post-deployment but there will be no partitions or file systems on a block device which will be ready for any use. Example: Ceph needs to use block devices to create partitions but "zapping" of a partition table is configurable. If a partition table is pre-zapped during the deployment and a new clean one is created ceph-disk can just create partitions on an existing partition table. This may help us workaround this: pad.lv/1604501 Serial numbers are not super reliable as they depend on a block driver while in this case we rely on a superblock written at the deployment time. Even if we have an odd device that doesn't have reliable means of identification we can rely on a persistent UUID we ourselves put onto that device. MAAS needs to grow an ability to configure empty block devices which will get a clean partition table at will too. I think it's worthwhile to create a udev rule for ubuntu server in general: /dev/disk/ Related branches - Server Team CI bot: Approve (continuous-integration) on 2019-02-08 - Chad Smith: Approve on 2019-02-07 - Diff: 116 lines (+49/-12)2 files modifiedcurtin/commands/block_meta.py (+4/-2) tests/unittests/test_make_dname.py (+45/-10) - Server Team CI bot: Approve (continuous-integration) on 2018-12-06 - curtin developers: Pending requested 2018-12-06 - Diff: 3184 lines (+1417/-240)59 files modifiedcurtin/__init__.py (+1/-1) curtin/commands/apt_config.py (+22/-6) curtin/commands/block_meta.py (+157/-49) curtin/swap.py (+9/-3) curtin/udev.py (+37/-0) debian/changelog (+27/-0) doc/topics/apt_source.rst (+57/-0) doc/topics/storage.rst (+45/-2) examples/tests/basic.yaml (+9/-0) examples/tests/basic_scsi.yaml (+27/-0) examples/tests/multipath.yaml (+1/-0) examples/tests/nvme.yaml (+2/-2) examples/tests/nvme_bcache.yaml (+1/-1) examples/tests/simple-storage.yaml (+48/-0) helpers/common (+50/-5) tests/unittests/helpers.py (+7/-0) tests/unittests/test_apt_custom_sources_list.py (+61/-29) tests/unittests/test_commands_block_meta.py (+4/-3) tests/unittests/test_commands_extract.py (+2/-1) tests/unittests/test_make_dname.py (+172/-30) tests/unittests/test_swap.py (+42/-28) tests/unittests/test_udev.py (+68/-0) tests/vmtests/__init__.py (+124/-20) tests/vmtests/releases.py (+6/-0) tests/vmtests/test_apt_config_cmd.py (+11/-2) tests/vmtests/test_apt_source.py (+7/-2) tests/vmtests/test_basic.py (+61/-8) tests/vmtests/test_bcache_basic.py (+6/-0) tests/vmtests/test_bcache_bug1718699.py (+4/-0) tests/vmtests/test_fs_battery.py (+5/-0) tests/vmtests/test_iscsi.py (+6/-0) tests/vmtests/test_journald_reporter.py (+4/-0) tests/vmtests/test_lvm.py (+5/-0) tests/vmtests/test_lvm_iscsi.py (+13/-7) tests/vmtests/test_lvm_raid.py (+16/-8) tests/vmtests/test_lvm_root.py (+2/-0) tests/vmtests/test_mdadm_bcache.py (+42/-0) tests/vmtests/test_mdadm_iscsi.py (+13/-6) tests/vmtests/test_multipath.py (+31/-0) tests/vmtests/test_network.py (+6/-0) tests/vmtests/test_network_alias.py (+6/-0) tests/vmtests/test_network_bonding.py (+6/-0) tests/vmtests/test_network_bridging.py (+7/-0) tests/vmtests/test_network_ipv6.py (+8/-0) tests/vmtests/test_network_ipv6_static.py (+4/-0) tests/vmtests/test_network_ipv6_vlan.py (+4/-0) tests/vmtests/test_network_mtu.py (+9/-0) tests/vmtests/test_network_static.py (+4/-0) tests/vmtests/test_network_static_routes.py (+5/-0) tests/vmtests/test_network_vlan.py (+6/-0) tests/vmtests/test_nvme.py (+17/-4) tests/vmtests/test_old_apt_features.py (+7/-2) tests/vmtests/test_pollinate_useragent.py (+6/-0) tests/vmtests/test_raid5_bcache.py (+15/-7) tests/vmtests/test_simple.py (+67/-1) tests/vmtests/test_ubuntu_core.py (+2/-0) tests/vmtests/test_uefi_basic.py (+17/-7) tests/vmtests/test_zfsroot.py (+10/-0) tools/jenkins-runner (+6/-6) - Scott Moser: Approve on 2018-11-29 - Server Team CI bot: Approve (continuous-integration) on 2018-11-28 - Chad Smith: Pending requested 2018-10-31 - Diff: 974 lines (+484/-63)13 files modifiedcurtin/commands/block_meta.py (+74/-15) curtin/udev.py (+37/-0) doc/topics/storage.rst (+37/-2) examples/tests/basic.yaml (+2/-0) examples/tests/basic_scsi.yaml (+15/-0) examples/tests/nvme.yaml (+2/-2) examples/tests/nvme_bcache.yaml (+1/-1) tests/unittests/helpers.py (+7/-0) tests/unittests/test_make_dname.py (+172/-30) tests/unittests/test_udev.py (+68/-0) tests/vmtests/__init__.py (+55/-5) tests/vmtests/test_basic.py (+8/-4) tests/vmtests/test_nvme.py (+6/-4) The issue with us provding /dev/disk/by-dname/ links based on content inside the disk is that the content can move. Ultimately when we added 'by-dname' links, we were intending it to be "disk name". Ie, the user would provide a name for the disk in maas and then could assume that /dev/disk/ The implementation, however, ended up relying on contents of the disk. The problem with this approach is that the contents can move. Consider: a.) user boots system with disks named 'blue' and 'red' and 'boot'. Red is initially provisioned as empty. b.) user moves data from 'blue' to 'red'. exactly how doesn't matter, but consider 'dd if=/dev/ c.) user reboots d.) user formats /dev/disk/ If the data *on* blue was used to identify it, the user will have just destroyed their data, as /dev/disk/ What we decided was that to work our way out of this issue, we should/would provide a /dev/disk/ Having dnames tied to wwids (/sys/class/ The use-case for that is software (SDS like Ceph, databases etc.) which manages raw block devices and does not expect partition tables or any other superblocks on them and may error out or delete superblocks/ptables that are already present. This happens with charm-based ceph deployments for example - charms error out if they detect a non-pristine device (the one that has some lower LBAs occupied by non-zero values). So pre-creating a partition table to trigger dname logic is not a universal workaround. Juju storage also depends on /dev/disk/by-dname symlink availability as this is the only way to reliably retrieve a persistent device path from MAAS as cloud provider. subscribed ~field-critical Considering https:/ There are two types of NVME devices below SSDPE21K375GA and SSDPE2KX040T7 while they all appear as /dev/nvme< ls -al /dev/disk/by-id/ total 0 drwxr-xr-x 2 root root 1040 Jul 23 09:55 . drwxr-xr-x 8 root root 160 Jul 23 09:55 .._ I may have found a workaround for a very specific case I am working on which may drop this to ~field-high: 1) naming a device in MAAS (e.g. nvme9n1p1 -> optane); 2) creating a whole-disk partition (which results in a partition table with a partition UUID being created); 3) deploying a node. This results in a partition uuid-based symlink (no device symlink though) being created by curtin. $ ls -al /dev/disk/by-dname/ | grep nvme lrwxrwxrwx 1 root root 15 Jul 23 12:08 optane-part1 -> ../../nvme9n1p1 Using this as a workaround may only work for ceph-volume-based charm-ceph-osd deployments where it does not matter if a device special file is a partition or the whole device as LVM is used to slice it into chunks. I will update this bug accordingly if I am able to work with that. I am going to set this to ~field-high now as all-disk partition approach allowed the project affected by this to be moved forward. Based on https:/ by-dname was intended to be "by device name" and ended up to be "by data name" Curtin docs promise disk naming and partition naming: https:/ "If the name key is present, curtin will create a udev rule that makes a symbolic link to the disk with the given name value. This makes it easy to find disks on an installed system. The links are created in /dev/disk/ > "What we decided was that to work our way out of this issue, we should/would provide a /dev/disk/ I think "device name" vs "data name" usage should depend on an application and we need 2 symlink types: * a "devicename" symlink should mean a wwn or serial number symlink for hw devices themselves, for virtual devices (partitions, bcache, md-raid etc.) - a superblock unique ID symlink; * a "dataname" symlink should mean a GPT UUID/MBR disk identifier symlink for hw devices with a partition table, partition UUID symlink for partitions, superblock UUIDs for virtual devices. There are several classes of block devices that I see: 1) hardware block devices with a unique factory identifier (wwn, EUI etc.); lrwxrwxrwx 1 root root 14 Jul 25 16:28 nvme-eui. lrwxrwxrwx 1 root root 9 Jul 25 16:28 wwn-0x5000c5008 2) hardware-level virtual block devices (created by RAID controllers) - WWN stability will depend on the raid controller's implementation but generally a RAID-controller superblock is written to every device in a RAID. journalctl -k | grep -i lsi JUN 08 16:38:57 ubuntu kernel: scsi 0:2:1:0: Direct-Access LSI MR9271-8i 3.46 PQ: 0 ANSI: 5 lspci | grep -i lsi 01:00.0 RAID bus controller: LSI Logic / Symbios Logic MegaRAID SAS 2208 [Thunderbolt] (rev 05) tree /dev/disk/by-id/ | grep sda ├── scsi-3600605b00 └── wwn-0x600605b00 3) virtual block devices. Availability of persistent and unique identifiers depends on hypervisor support and persistent configuration that a hypervisor provides (libvirt domain xml files -> qemu args, VMDK file metadata etc.) For QEMU, IDE and SCSI devices can utilize a wwn passed via qemu command line and virtio devices can utilize a serial number parameter. https:/ https:/ https:/ https:/ virtio: #... -drive file=/var/ cat /sys/class/ a76f8801- (virtio)scsi: virsh dumpxml maas | grep wwn <wwn>5... Marking this as invalid for MAAS provided that: 1. MAAS doesn't create the udev rules matching to disk names. 2. MAAS already sends UUID's to curtin, as to whether curtin uses them/new ones are created, I dont know. That said, can you please explain the problem you are actually hitting? The explanation on the bug reports explains what you are wanting to achieve and why, but doesn't highlight what problem you are currently facing. Also, since I believe you would be using juju, and MAAS already has a UUID attached to a disk which knows which dname it has, why shouldn't juju be using such information to provide you what you need, instead of having to request a uuid being created on the disk. And lastly, since this is a feature request, should this really be tagged as 'field-*' ? IIRC, since this is not a regression or a proper bug, and this is a feature request for functionality that doesn't yet exist, this should be tagged as such. Andres, The problem we have is quite simple: we cannot rely on Juju storage as of today and can only use charm config options which require lists of devices, i.e. osd-devices: /dev/disk/ journal osd-journal: # ... space-separated device symlinks bluestore-wal: # ... space-separated device symlinks bluestore-db: # ... space-separated device symlinks There is a single config string for all units of ceph-osd for a given node type so we have to use logical naming: IDs are unique per-node so by-id links cannot be used directly. Logical names have to be used as we have an all-NVMe setup with 2 device types: "regular" P4500 NVME data devices and P4800x Optane devices. Those devices are not plugged uniformly in terms of slots across machines and /dev/nvme< # 375G Optane device is nvme8n1 but nvme4n1 on a different node lrwxrwxrwx 1 root root 13 Jul 25 16:28 nvme-INTEL_ # 4T P4500 device lrwxrwxrwx 1 root root 13 Jul 25 16:28 nvme-INTEL_ So the following configuration would result in an optane device being used as a data device on some nodes which would silently create an invalid Ceph device configuration: osd-devices: /dev/nvme0n1 /dev/nvme1n1 # ... until /dev/nvme7n1 osd-journal: /dev/nvme8n1 Tags and Juju storage would have solved this problem quite nicely but only if there were no other issues to address. There have been some operational concerns when using Juju storage with MAAS as a provider that got communicated to us from the operations teams and also some current bugs: https:/ https:/ https:/ We currently cannot use partition tags due to the lack of that feature in MAAS https:/ Likewise, we cannot rely on pre-created filesystems in MAAS and fstab fs UUID-based entries as: 1) with ceph encryption configured by charms file systems are created on top of device-mapper block devices that MAAS is not aware of; 2) the new stable ceph backend (bluestore) does not rely on kernel-mounted file systems so file system UUIDs are not usable. I agree that MAAS already exposes relevant information for physical devices and composable devices (md-raid, bcache etc.) to curtin. However, having MAAS to provide serials or WWNs for virtio or virtio-scsi devices would be a MAAS feature request in my view as there is some work involved in rendering proper libvirt domain xml. To better understand the context of this issue, I briefly discussed it with Dmitrii on IRC and we have identified 3 areas: A. Currently, we are relying on charm options to specify which storage devices to use for ceph data and journal or wal/db devices (/dev/disk/ - The work around is to rename the block devices in MAAS (which renames the partition prefix and the dname symlink). - The desired fix is to use Juju storage instead (which is also supported by the ceph-osd charm), which would require solving [2] in MAAS. B. Curtin currently writes symlinks (by-dname) based on GPT partition UUIDs, partition UUIDs and other superblock identifiers. Curtin, however, doesn't create that for clean devices. As such, if curtin were to *also* create symlinks based on WWN or serial ID, it would help with the use cases. This means *this* bug applies for is valid for curtin, but invalid for MAAS. C. MAAS to preseed disk UUIDs for KVM pods VMs, so that when B is solved, disks would have proper symlinks. Requires a new bug to be filed for MAAS. [2]: https:/ This bug is fixed with commit 3f03b1dd to curtin on branch master. To view that commit see the following URL: https:/ Manually checked on a physical node with 1 device after replacing changed curtin files on a MAAS node (the code isn't in -proposed yet at the time of writing), seems to work: ubuntu@redacted:~$ blkid /dev/sda1: LABEL="root" UUID="2b708114- ubuntu@redacted:~$ tree /dev/disk/by-dname/ /dev/disk/by-dname/ ├── sda -> ../../sda ├── sda-part1 -> ../../sda1 └── sdb -> ../../sdb 0 directories, 3 files ubuntu@emere:~$ ls -al /dev/disk/by-id/ | grep sdb lrwxrwxrwx 1 root root 9 Dec 3 14:14 scsi-3600508b10 lrwxrwxrwx 1 root root 9 Dec 3 14:14 wwn-0x600508b10 ubuntu@emere:~$ cat /etc/udev/ # Written by curtin SUBSYSTEM=="block", ACTION= SUBSYSTEM=="block", ACTION= I'll try to get a node with an NVMe device (or create a virtual one) and check there as well. This bug is believed to be fixed in curtin in version 18.2. If this is still a problem for you, please make a comment and set the state back to New Thank you. With this change curtin will error out (resulting in failed deployments in MAAS) if a serial or wwn is not specified on a block device. In my case this failure happened on a VM created manually via virsh (not pods) with block devices that do not have explicit serial or wwn values: Running command ['blkid', '-o', 'export', '/dev/vda'] with allowed return codes [0, 2] (capture=True) Running command ['udevadm', 'info', '--query=property', '/dev/vda'] with allowed return codes [0] (capture=True) An error occured handling 'vda': RuntimeError - Cannot create disk tag udev rule for /dev/vda [id=vda], missing 'serial' or 'wwn' value finish: cmd-install/ TIMED BLOCK_META: 4.837 finish: cmd-install/ Traceback (most recent call last): File "/curtin/ ret = args.func(args) File "/curtin/ return log_time("TIMED %s: " % msg, func, *args, **kwargs) File "/curtin/ return func(*args, **kwargs) File "/curtin/ return meta_custom(args) File "/curtin/ File "/curtin/ File "/curtin/ byid = make_dname_ File "/curtin/ Cannot create disk tag udev rule for /dev/vda [id=vda], missing 'serial' or 'wwn' value Stderr: '' After adding serial numbers curtin still uses the old by-id value (supplied by maas from the db) to try and lookup a device by serial so a recommissioning is needed after serial values are updated: File "/curtin/ raise ValueError("no disk with serial '%s' found" % serial_udev) ValueError: no disk with serial 'drive-scsi0-0-0-1' found no disk with serial 'drive-scsi0-0-0-1' found Adding serial to VMs created via virsh pods was fixed in maas for 2.5: https:/ I think we may break previous MAAS versions though. +1. Curtin should be backward compatible and not exclusively require this. Another thing I noticed is that the udev rule for NVMe namespaces is not based on a wwid of a namespace - it is tied to a serial of a controller. For NVMe devices with a single namespace this is ok but NVMe controllers can create multiple namespaces each with its own unique identifier (e.g. in the NVMeOF use-case). https:/ for i in `ls -1 /dev/vd* /dev/sd* /dev/nvme*n*` ; do echo "Info for device $i" ; cat /etc/udev/ Info for device /dev/nvme0n1 # Written by curtin SUBSYSTEM=="block", ACTION= SUBSYSTEM=="block", ACTION= Unique attribute: ATTR{ ATTRS{ nvme.8086- So, I think we should prefer ID_WWN over ID_SERIAL in general and use ID_SERIAL as a fallback: udevadm info --query=property --name /dev/nvme0n1 DEVLINKS= DEVNAME= DEVPATH= DEVTYPE=disk ID_MODEL=QEMU NVMe Ctrl ID_PATH= ID_PATH_ ID_SERIAL=QEMU NVMe Ctrl_nvmec0 ID_SERIAL_ ID_WWN= MAJOR=259 MINOR=0 SUBSYSTEM=block TAGS=:systemd: USEC_INITIALIZE NVMe spec references: [1] "5.15.2 Identify Namespace data structure Namespace Globally Unique Identifier (NGUID): This field contains a 128-bit value that is globally unique and assigned to the namespace when the namespace is created. This field remains fixed throughout the life of the namespace and is preserved across namespace and controller operations (e.g., controller reset, namespace format, etc.)." A namespace ID is extracted from a controller and exported via sysfs via a wwid node: https:/ https:/ [2] Namespaces also have non-unique (across controllers or NVMe subsystems) numeric namespace identifiers (NSID) that are similar to SCSI LUNs (nvme<controlle “Associated with each controller namespace is a namespace ID, labeled as NSID 1 and NSID 2, that is used by the controller to reference a specific namespace. Andres, more on comment #15: ID_SERIAL and ID_SERIAL_SHORT are generated for SCSI devices if not provided via domain XML but not for virtio-blk. https:/ https:/ I didn't think there was a MAAS released that would provide only path: to disks. This is somewhat surprising since path is just not stable. While we can warn when we attempt to create a dname for a disk without serial/wwn and move on; I do think MAAS should require serial/wwn. No one looks at the curtin log file on successful deploys; so this leaves the node open to unreliable dname if someone modifies the partition table (which is what this change was to fix) or plugs in a USB drive. Should we inject 'unstable' in to the dname value? /dev/disk/ In terms of rule preference; we have some conflicting values. On some scsi disks, we get: ID_SERIAL ID_SERIAL_SHORT ID_WWN ID_WWN_ So, I'd like to see if we can build a reasonable order of preference. My initial thought based on my experience would be to prefer values in this order: ID_WWN_ ID_WWN ID_SERIAL ID_SERIAL_SHORT And lastly, curtin currently will embed as many of these values as are found. DEVTYPE=={disk}, ENV{ID_ I think by combining these values in the rule; we'll ensure we don't misidentify a disk. Dmitrii, Andres, Ryan has provided some options in #18 in order to resolve this (e.g. a warning message or other usage of other values). Consider the following background: a) Prior to https:/ b) curtin introduced a change where dname udev rules include WWN or SERIAL values for disks so that users (and charms) can *trust* that if they set a dname it will be present and persistent c) curtin now raises a RuntimeException when it encounters a device which has requested a dname, but the device does *NOT* include a persistent attribute like a WWN or SERIAL d) The issue with the new behavior is that for some previous MAAS releases there are KVM nodes which do not contain a serial and these nodes, deployment fails as the storage config also includes a dname for the disks Below are three options we see to move this forward: 1) Revert all the changes associated with LP: #1735839, however this is the least desirable outcome; though field may have workaround for this in place already. 2) Log a warning when curtin detects a request for dname on devices that do not have serial. This will allow dnames to continue to be unstable on disks without serial numbers; there is no indication to users or deployments that dname is unstable on certain disks; this seems some what worse in that we have stated that dnames are now stable, but in some cases they are not and the users have no idea until it fails them. 3) Keep the exception in place and release an SRU to previous MAAS so that new KVM pods have serial numbers, and that existing KVM nodes which are already defined have their guest xml updated to include a serial number such that upon deployment, dname becomes stable. Curtin’s preference is for (3) so we can establish a guarantee for dname symlinks. That said we are fine with either (1) or (2) as well but would like Field and MAAS to discuss and come to an agreement on what to do and update bug with the decision. Thanks! From the field engineering perspective, 2 would suffice as it would preserve backwards compatibility and solve the problem for contemporary versions of MAAS. I think (2) could be modified to instead avoid creating symlinks for devices that do not have persistent identifiers. Existing 2.2 to 2.4 installations would still be able to deploy virtual machines but dname symlinks would not be created. Pod VMs have 1 block device and dname symlinks are not generally used with them anyway. This would provide a way to still provision virtual machines but avoid creating symlinks for devices without persistent ids (they must not be used anyway). For physical block devices with valid VPD pages containing serial or wwid there would be no difference as symlinks were not available for them anyway unless a partition table was present. (3) would require 2 SRUs (one for Xenial, one for Bionic) and also specific ordering of updates (MAAS first, then Curtin). This would set us back it terms of getting the newer Curtin version for a while I imagine. Anything against the modified version of (2) I proposed? > (2) could be modified to instead avoid creating symlinks for devices that do not have persistent identifiers. Existing MAAS users 2.2 through 2.4 will upgrade curtin and new deployments of VMs won't have dnames. Is this acceptable? Won't users file that as a bug? That may be acceptable if we have a MAAS version released where dnames are stable (and enforced, though the question remains where to enforce this; in curtin or MAAS)? >. On Wed, Jan 30, 2019 at 6:20 PM Dmitrii Shcherbakov < > >. > If you and MAAS are OK with this; I won't object. I'll just return any bugs to you =) > > >-07 > -block-devices commissioning script: e.g. if '"SERIAL": "drive- > scsi0-0-0-0"' is present, it is clearly not a persistent ID, and a user > should be told that it cannot be relied on for persistent device > symlinks. > >. > Even better to have MAAS prevent users from including 'name' values for disks which don't have a serial attribute. I guess I'm also looking for MAAS to do its part for ensuring that dname is stable by refusing to allow users to create a 'name' on storage devices if the don't have a persistent attribute. > > -- > You received this bug notification because you are subscribed to the bug > https:/ > > Title: > /dev/by-dname symlinks based on wwn/wwid > > To manage notifications about this bug go to: > https:/ > > If you and MAAS are OK with this; I won't object. I'll just return any bugs to you =) I am quite confident in this. Using persistent device links with clean devices is a fairly narrow (but important) use-case - i.e. we use it for Ceph only and we have never done this in VMs so far. Another way to look at it is: there was never a commitment to create by-dname symlinks without a reliable identifier to back them up. So we are fixing a bug which reads as "symlinks get created without a persistent identifier with virtio-blk devices". At the same time, if symlinks do not get created anymore for this case, we are not breaking MAAS in terms of VM deployment, thus fulfilling the promise to MAAS about curtin compatibility. When it comes to Juju storage, it retrieves "by-id" symlinks stored in MAAS for physical or emulated devices so we are not breaking anything here either. I suspect Andres' concern in #15 is more about not being able to deploy, rather than not having symlinks. > Even better to have MAAS prevent users from including 'name' values for disks which don't have a serial attribute. I think this would be valuable to have and I would really like to see this. We should discuss this during the next sprint but it should not be a blocking feature for this lp. My perspective is that if curtin introduced a change of behavior on when to create dnames that's breaking current working software, then curtin needs to handle backwards compatibility. That means that new version of curtin needs to work exactly the same way as it used to for older versions of MAAS. That is, if no serial or wwn's are present for a disk, curtin should fallback to create dnames the way it did before. This bug is fixed with commit 35fd01f0 to curtin on branch master. To view that commit see the following URL: https:/ I've subscribed field-high, this is an active issue for expanding clouds with Optane and Nvme both present. Tested on (master at the time of writing): https:/ LGTM Note: see the attached domain.xml of a test machine sda (root disk) and vda do not have a serial attached. All devices except for sda were renamed in MAAS to <commissioning- maas <profile> machine read xeqrrw # post-deployment (successful without some serials which is expected) https:/ maas maas machine get-curtin-config xeqrrw https:/ ubuntu@ /dev/disk/by-dname/ ├── nvme0n1-renamed -> ../../nvme0n1 ├── nvme1n1-renamed -> ../../nvme1n1 ├── sda -> ../../sda ├── sda-part1 -> ../../sda1 ├── sdb-renamed -> ../../sdb ├── sdc-renamed -> ../../sdc ├── sdd-renamed -> ../../sdd ├── sde-renamed -> ../../sde └── vdb-renamed -> ../../vdb ubuntu@ /dev/nvme0n1 nvmec0 /dev/nvme1n1 nvmec1 ubuntu@ sda Unit serial number VPD page: fetching VPD page failed: Illegal request sdb Unit serial number VPD page: Unit serial number: disk0 sdc Unit serial number VPD page: Unit serial number: disk1 sdd Unit serial number VPD page: Unit serial number: disk4 sde Unit serial number VPD page: Unit serial number: disk5 for i in `ls -1 /dev/vd* | grep -P 'vd[a-z]$'` ; do echo $i ; cat /sys/class/ /dev/vda /dev/vdb disk3 root@maas-vhost6:~# grep "missing 'serial' or 'wwn' value" curtin-install.log Cannot create disk tag udev rule for /dev/vda [id=vda-renamed], missing 'serial' or 'wwn' value Also the resulting udev rules for #28: for i in `ls -d /etc/udev/ /etc/udev/ # Written by curtin SUBSYSTEM=="block", ACTION= SUBSYSTEM=="block", ACTION= /etc/udev/ # Written by curtin SUBSYSTEM=="block", ACTION= SUBSYSTEM=="block", ACTION= /etc/udev/ # Written by curtin SUBSYSTEM=="block", ACTION= /etc/udev/ # Written by curtin SUBSYSTEM=="block", ACTION= SUBSYSTEM=="block", ACTION= SUBSYSTEM=="block", ACTION= /etc/udev/ # Written by curtin SUBSYSTEM=="block", ACTION= SUBSYSTEM=="block", ACTION= /etc/udev/ # Written by curtin SUBSYSTEM=="block", ACTION= SUBSYSTEM=="block", ACTION= /etc/udev/ # Written by curtin SUBSYSTEM=="block", ACTION= SUBSYSTEM=="block", ACTION= Just verified that it works as required on Bionic after updating to the SRU-ed package: https:/ For dname links and regular disk devices it looks like ID_PART_TABLE_UUID is already used: https:/ /bazaar. launchpad. net/~curtin- dev/curtin/ trunk/view/ head:/curtin/ commands/ block_meta. py#L229 rule.append( compose_ udev_equality( 'ENV{DEVTYPE} ', "disk")) rule.append( compose_ udev_equality( 'ENV{ID_ PART_TABLE_ UUID}', ptuuid)) def make_dname(volume, storage_config): ... if vol.get('type') == "disk": For other devices this is not present by default but they have other identification methods. elif vol.get('type') == "bcache": rule.append( compose_ udev_equality( "ENV{DEVNAME} ", path)) Still, this is not usable for disks without partitions from MAAS.
https://bugs.launchpad.net/curtin/+bug/1735839/+index
CC-MAIN-2019-43
refinedweb
4,989
61.46
03 August 2010 13:48 [Source: ICIS news] (Adds chairman comment in paragraphs 1-12) LONDON (ICIS)--DSM is benefiting from its cost-cutting measures and expects 2010 to be a strong year if the current business environment persists, Feike Sijbesma, chairman of DSM's managing board, said on Tuesday following the announcement of the company's second-quarter results. “Most of the markets that are relevant to DSM saw a continued recovery in the second quarter. DSM expects further end-market recovery for the remainder of the year, assuming no major change in the economic conditions,” Sijbesma said. However, the chairman said that the risk of a slowdown in the economic recovery remained. DSM's polymer intermediates business was forecast to have a good full-year 2010, while its Pharma segment’s full-year results were expected to be positive but below those achieved in 2009. In its Performance Materials business, DSM expected overall sales volumes for the second half of 2010 to be lower than in the first half due to seasonality and the diminishing impact of re-stocking, as demand in building and construction markets remained at relatively low levels. DSM singled out ?xml:namespace> “Business conditions in most geographical areas and markets have further improved, partly due to restocking, especially in Sales in Additionally, DSM said it was progressing with the divestment of parts of the company that were no longer its core focus, as part of its strategy to focus on life and material sciences. “We will use those proceeds for acquisitions in our strategic focus and further strengthen our portfolio,” Sijbesma said. The chairman did not disclose the size or type of acquisitions DSM was looking at, or how much it had to spend. However, Sijbesma added that DSM had €1.8bn in cash at the end of the first half of 2010. Earlier, DSM announced that its second-quarter net profit surged to €149m from just $10m in the previous corresponding period, on the back of a 28% jump in sales. Sales for the three months to June stood at €2.27bn from €1.77bn in the same period last year, as revenues in almost all of its business segments recorded double-digit growth,,” Sijbesma said in a statement. Operating profit in the June quarter nearly tripled year on year to €246m from €85m in the same period last year, DSM said. ($1 = €0.76) Additional reporting by Pearl Bantillo For more on DSM
http://www.icis.com/Articles/2010/08/03/9381501/dsm-upbeat-about-full-year-2010-after-q2-results.html
CC-MAIN-2014-52
refinedweb
411
57.91
In a previous post, we discussed how to actually go about combining mockFor() and mockDomain() when it comes to unit test support for .withCriteria. If your code uses the Gorm.createCriteria(), you’ll likely want to switch to .withCriteria to make it unit testable. We promised to cover using HQL as well so let’s do that now. Again, we’re assuming Grails 1.3.7. The approach is unchanged from mocking criteria calls. We still need to use mockFor() to mock the static method usage. In our example, we’re using HQL because it’s easier to read and maintain than the equivalent criteria structure. Whatever your rationale, you should be able to follow along. def defaultJobState = JobState.findAll( "from job_state where job_id = :jobId and default_state = :defaultState", [jobId: jobId, defaultState : defaultState]) def orderedJobStates = JobState.findAll( "from job_state where job_id = :jobId and end_date >= :endDate order by effective_date", [jobId :jobId, endDate : endDate]) ... code for processing returned data To make things interesting, our example shows two different HQL uses and named parameters. We’ll show how to differentiate between multiple uses and this can be applied to the criteria scenario as well. When we adopt our previous approach to HQL usage, we get the following unit test code. ... def testJobs = [defaultJobState, oldJobState, currentJobState] mockFor(JobState, testJobs) def mock = mockFor(JobState) mock.demand.static.findAll(1..5) { hqlString, params -> if (hqlString.contains("default_state")) { testJobs.findAll{ testJob -> testJob.defaultState == params.defaultState } } else if (hqlString.contains("end_date")) { testJobs.findAll{ testJob -> testJob.endDate >= params.endDate } } else { [] } } As you can see, we’re effectively implementing the equivalent to the HQL. We’re making some assumptions about our expected HQL usage – that we are only testing for two usages and that no other usages will be called or can default to no data and that no other uses, if called, will give false matches on our string checks. In your case, you would probably want to make a constant out of the HQL strings and then do exact matches against those values in your test. You might also want to enhance your use to throw an exception in your else block to protect against unexpected uses. Use your testing experience to make sure yours tests are correct and adequate.
http://www.obsidianscheduler.com/blog/tag/grails-2/
CC-MAIN-2020-40
refinedweb
371
58.18
Not. Stupid holidays. PNH, please don’t hit me. And also, PNH: Happy Birthday!) 29 thoughts on “One Last Thought Before I Dive Into Book Writing for Several Hours” I’m less confident that the best television entertainment is the scripted kind. I’m a little conflicted on this. I support the strike, but watching Leno tank also sounds like a lot of fun. Then record it and skip through the commercials. What, you mean, watch it like normal? I’m very disappointed in Steward and Colbert…I figured Leno didn’t care, but those two are actual writers. I’m still hoping for a stunt, like maybe a half hour of silence. I’m recording both tonight (we don’t normally watch them), but I want to see what happens. Next week is the real fun one — Stewart and Colbert return, without writers. And Stewart is the main reason CC has union shows, I’m told. It’s like Churchhill said about democracy: It’s the worst of all possible systems, except for all the rest. Admittedly, the scripted schtick on Leno/Letterman/etc. (except maybe Conan) is often the worst part, but do you really prefer “Survivor” to “Lost”? “Cops” to “Heroes”? Even the critically acclaimed “Amazing Race” has less appeal to me than the thrice-cancelled “Drive”, for which I still await the last two episodes. The only reason I haven’t written blistering critiques of Stewart, Colbert, Leno, and Conan is that they were blackmailed by their networks to return: “We want you back at work by [date]. If you don’t do it, we will lay off n people working on the show, and you will be to blame.” Granted, any rational person would understand that the last is bullshit, and that at worst the on-air folks would share the responsibility. I understand, though, that at least one of them (Conan, I think, but can’t find the link) specifically cited that as the only reason he’s returning. I hope they find a way to stick it to the brass by keeping the WGA’s case in the public eye in a positive way. They may not be the last, best hope, but they’d be great if they did. Is that strike thingy still going on? Does anyone who doesn’t have money in the pot care? I care because it’ll start affecting the production of Battlestar Galactica and Heroes. Of course, if all the well-written shows get replaced with “reality” TV, I’ll have more time to read and do projects around the house, etc. I care and I don ‘t have money in the pot. I know people who do (ie, TV writers), but I’d like to think that, even if I didn’t, I would still care because I hate to see the studios fuck over the writers. That kind of thing pisses me off. You know, if Patrick is as smart as you claim he is, I bet when you told him you’d deliver the thing on “December 24th” (or whatever the hell date that was) he actually wrote that down on his calendar as “January 15th”. Or maybe that’s just the software development manager in me thinking. Tim: I don’t doubt it; even so, I don’t like being late. I care, and I have no financial interest. The strike has already affected production of Battlestar Galactica and Heroes, and many other scripted programs. There’s a big list of them at: The only way production could be affected further is if studios start calling ‘Force majeure’ and canceling shows and development deals because of the strike. I’m more curious to see what Leno does, actually – after all, I know what scripted Letterman is like. And since I’m not a Nielsen family, what I watch won’t affect the ratings. Fair enough. I guess I’m just not enough of a TV watcher to notice. Though, in re:#10, I don’t think screen writers are nearly as oppressed as say, 19th century miners or steelworkers. MFAs getting screwed by MBAs just doesn’t tug at my heart-strings the same way. Well Jeez Brett, just show me where all the 19th century miners are picketing and I’ll bring them all some coffee and donuts. Support you 19th Century Miners!!! Brett L: “MFAs getting screwed by MBAs just doesn’t tug at my heart-strings the same way.” Maybe not, but it doesn’t mean the MFAs should allow themselves to get screwed over financially by the MBAs. And by the way, this strike is definitely costing me money. No new productions are starting up until the thing is over, so I’m out of work. And I still support the writers. I used to work in entertainment and, as I’ve said before, I know TV writers who are marching those damned picket lines every day (one of whom is a strike captain), so I admit, it might be more personal for me. It’s not because I watch a lot of TV, because I don’t. There are maybe three shows I watch with any regularity. Unfortunately, two of those are The Daily Show and The Colbert Report. I am truly torn on this one, but I think I may have to end up boycotting them, even though I know that Comedy Central is behind the forced return (WGA statement, halfway down). Still, Brett L., I get pissed off whenever those in power fuck over those not in power. Possession or type of degree matters not a whit. That’s why I do political stuff in my free time. I would love to virtuajoin ya… but the DIrectv access card in my DVR got fried, so I am stuck with DVDs till the repl arrives. Why can’t the electric compay DO anything about the fakakta lightning!!!? It’ll be even more interesting if the strike continues past March, and all the Heroes actor’s contracts expire, thus leaving them free to do whatever they want. Yikes. JD Blackwell: The electric companies do the best they can, but it is the multitudes of sensitive electronic devices which come off the worst with lightning strikes. That’s why they make surge protectors and UPS (uninterruptible power supplies) — to absorb or shunt the surges. Price of admission to the modern age, I guess. And surge protectors cost a lot less to replace when they take a bullet for the home team. Early PC users got the religion early on for their computers, but I routinely put ‘em on TVs and their associated devices, stereos, answering machines, microwaves, etc. Happened right after I got an answering machine fried four days after I bought it back in 1989. My first answering machine… gone like that… it only took one message, we hardly had time to bond… sorry, I can’t talk about it. Oh, and surge protect your phone lines — and you can get surge protectors for cable TV and external TV antennas (not that they’ll be any good in 13 months — grin). Vigilance – Surgius – Protectus Dr. Phil Dear Dr. Phil, Please to unnerstan… I was fully Surgius Protectada! I am a computer geek by profession, 10 years a PC tech and consultant. I currently work for the a state (of VA) Dept (of Ag) and support multiple makes/models/types of systems PLUS my home wireless/wired LAN etc., etc., ad nauseum… Please believe me, I have Isobar surge protectors on my undershorts!!!!! Hence my chagrin, vexation and the attendant nashing of teeth and manual hair removal, at the loss of this wee simple access card… which I had bonded very strongly with these past months (TV was new, DVR no so much). We did experience a… power “flicker”… earlier that day, but ALL else, technologically speaking, is verifiably OK (mentally speaking, well again in the not-so-much category). The Isobar protecting the DVR and my (new from Santa!!!)(Lord love im and keep im all the yar!) big screen HD TV had not tripped. Yet, alas poor DVR-Access-Card… I knew him Dr. Phil., a fellow of infite channels, most excellent screen quality… JD As I understand it, and I’ll admit to having paid little attention, the major sticking point is that the last union negotiated contract was not negotiated with $39 DVD players in mind. Okay, I get it. But writers are (or tend to be) smart enough, educated enough, and mobile enough to either (a) negotiate a decent contract, or (b) find a better paying gig. If they want to hold out for a 21st century contract, I don’t care. If they don’t, I don’t care. I’m not rooting for the studios, I just don’t find this on my priority list. Which makes me stupid for continuing the thread. …And I’m just gonna stop now. Tim Keating: Shhhhhhhh. Brett L. Why I aughter…… …And I’m just gonna stop now. Personally, I think editor giving any writer with a family a holiday-ensconced deadline is just itching to be disappointed. Soni: To be fair to PNH, I was the one who said I would get it in when I did. I don’t have a television, so the only programming I see is either on DVD or streamed. I am the eyes that this strike is about. So I would like to tell the network doodyheads: MAO
http://whatever.scalzi.com/2008/01/02/one-last-thought-before-i-dive-into-book-writing-for-several-hours/
CC-MAIN-2014-15
refinedweb
1,591
72.16
Sun has released Jack, a new tool written in Java that automatically generates parsers by compiling a high-level grammar specification stored in a text file. This article will serve as an introduction to this new tool. The first part of the article covers a brief introduction to automatic parser generation, and my first experiences with them. Then the article will focus on Jack and how you can use it to generate parsers and applications built with those parsers, based on your high-level grammar. Automatic compiler parser generation. Jack steps up to the plate. Jack (rhymes with yacc) is a parser generator, in the spirit of PCCTS, that Sun has released for free to the Java programming community. Jack is an exceptionally easy tool to describe: Simply put, you give it a set of combined grammatical and lexing rules in the form of a .jack file and run the tool, and it gives you back a Java class that will parse that grammar. What could be easier? Getting ahold of Jack is also quite easy. First you download a copy from the Jack home page. This comes to you in the form of a self-unpacking Java class called install. To install Jack you need to invoke this install class, which, on a Windows 95 machine is done using the command: C:>java install. The command shown above assumes that the java command is in your command path and that the class path has been set up appropriately. If the above command did not work, or if you aren't sure whether or not you have things set up properly, open an MS-DOS window by traversing the Start->Programs->MS-DOS Prompt menu items. If you have the Sun JDK installed, you can type these commands: C:> path C:\java\bin;%path% C:> set CLASSPATH=.;c:\java\lib\classes.zip If Symantec Cafe version 1.2 or later is installed, you can type these commands: C:> path C:\cafe\java\bin;%path% The class path should already be set up in a file called sc.ini in the bin directory of Cafe. Next, type the java install command from above. The install program will ask you what directory you wish to install into, and the Jack subdirectory will be created below that. Using Jack Jack is written entirely in Java, so having the Jack classes means that this tool is instantly available on every platform that supports the Java virtual machine. However, it also means that on Windows boxes you have to run Jack from the command line. Let's say you chose the directory name JavaTools when you installed Jack on your system. To use Jack you will need to add Jack's classes to your class path. You can do this in your autoexec.bat file or in your .cshrc file if you are a Unix user. The critical command is something like the line shown below: C:> set CLASSPATH=.;C:\JavaTools\Jack\java;C:\java\lib\classes.zip Note that Symantec Cafe users can edit the sc.ini file and include the Jack classes there, or they can set CLASSPATH explicitly as shown above. Setting the environment variable as shown above puts the Jack classes in the CLASSPATH between "." (the current directory) and the base system classes for Java. The main class for Jack is COM.sun.labs.jack.Main. Capitalization is important! There are exactly four capital letters in the command ('C', 'O', 'M', and another 'M'). To run Jack manually, type the command: C:> java COM.sun.labs.jack.Main parser-input.jack If you don't have the Jack files in your class path, you can use this command: C:> java -classpath .;C:\JavaTools\Jack\java;c:\java\lib\classes.zip COM.sun.labs.jack.Main parser-input.jack As you can see, this gets a bit long. To minimize typing, I put the invocation into a .bat file named Jack.bat. At some point in the future, a simple C wrapper program will become available, perhaps even as you read this. Check out the Jack home page for the availability of this and other programs. When Jack is run, it creates several files in the current directory that you will later compile into your parser. Most are either prefixed with the name of your parser or are common to all parsers. One of these, however, ASCII_CharStream.java, may collide with other parsers, so it is probably a good idea to start off in a directory containing only the .jack file you are going to use to generate the parser. Once you run Jack, if the generation has gone smoothly you will have a bunch of .java files in the current directory with various interesting names. These are your parsers. I encourage you to open them up with an editor and look them over. When you are ready you can compile them with the command C:> javac -d . ParserName.java where ParserName is the name you gave your parser in the input file. More on that in a bit. If all of the files for your parser don't compile, you can use the brute force method of typing: C:> javac *.java This will compile everything in the directory. At this point your new parser is ready to use. Jack parser descriptions Jack parser description files have the extension .jack and are divided into three basic parts: options and base class; lexical tokens; and non-terminals. Let's look at a simple parser description (this is included in the examples directory that comes with Jack). options { LOOKAHEAD = 1; } PARSER_BEGIN(Simple1) public class Simple1 { public static void main(String args[]) throws ParseError { Simple1 parser = new Simple1(System.in); parser.Input(); } } PARSER_END(Simple1) The first few lines above describe options for the parser; in this case LOOKAHEAD is set to 1. There are other options, such as diagnostics, Java Unicode handling, and so on, that also can be set here. Following the options comes the base class of the parser. The two tags PARSER_BEGIN and PARSER_END bracket the class that becomes the base Java code for the resulting parser. Note that the class name used in the parser specification must be the same in the beginning, middle, and ending part of this section. In the example above, I've put the class name in bold face to make this clear. As you can see in the code above, this class defines a static main method so that the class can be invoked by the Java interpreter on the command line. The main method simply instantiates a new parser with an input stream (in this case System.in) and then invokes the Input method. The Input method is a non-terminal in our grammar, and it is defined in the form of an EBNF element. EBNF stands for Extended Backus-Naur Form. The Backus-Naur form is a method for specifying context-free grammars. The specification consists of a terminal on the left-hand side, a production symbol, which is typically "::=", and one or more productions on the right-hand side. The notation used is typically something like this: Keyword ::= "if" | "then" | "else" This would be read as, "The Keyword terminal is one of the string literals 'if', 'then', or 'else.'" In Jack, this form is extended to allow the left-hand part to be represented by a method, and the alternate expansions may be represented by regular expressions or other non-terminals. Continuing with our simple example, the file contains the following definitions: void Input() : {} { MatchedBraces() "\n" <EOF> } void MatchedBraces() : {} { "{" [ MatchedBraces() ] "}" } This simple parser parses the grammar shown below: I've used italics to show the non-terminals on the right side of the productions and boldface to show literals. As you can see, the grammar simply parses matched sets of brace "{" and "}" characters. There are two productions in the Jack file to describe this grammar. The first terminal, Input, is defined by this definition to be three items in sequence: a MatchedBraces terminal, a newline character, and an end-of-file token. The <EOF> token is defined by Jack so that you don't have to specify it for your platform. When this grammar is generated, the left-hand sides of the productions are turned into methods inside the Simple1 class; when compiled, the Simple1 class reads characters from System.in and verifies that they contain a matching set of braces. This is accomplished by invoking the generated method Input, which is transformed by the generation process into a method that parses an Input non-terminal. If the parse fails, the method throws the exception ParseError, which the main routine can catch and then complain about if it so chooses. Of course there's more. The block delineated by "{" and "}" after the terminal name -- which is empty in this example -- can contain arbitrary Java code that is inserted at the front of the generated method. Then, after each expansion, there is another optional block that can contain arbitrary Java code to be executed when the parser successfully matches that expansion. A more complicated example So how about an example that's a bit more complicated? Consider the following grammar, again broken down into pieces. This grammar is designed to interpret mathematical equations using the four basic operators -- addition, multiplication, subtraction, and division. The source can be found here: options { LOOKAHEAD=1; } PARSER_BEGIN(Calc1) public class Calc1 { public static void main(String args[]) throws ParseError { Calc1 parser = new Calc1(System.in); while (true) { System.out.print("Enter Expression: "); System.out.flush(); try { switch (parser.one_line()) { case -1: System.exit(0); default: break; } } catch (ParseError x) { System.out.println("Exiting."); throw x; } } } } PARSER_END(Calc1) The first part is nearly the same as Simple1, except that the main routine now calls the terminal one_line repeatedly until it fails to parse. Next comes the following code: IGNORE_IN_BNF : {} { " " | "\r" | "\t" } TOKEN : { } { < EOL: "\n" > } TOKEN : /* OPERATORS */ { } { < PLUS: "+" > | < MINUS: "-" > | < MULTIPLY: "*" > | < DIVIDE: "/" > } TOKEN : { } { < CONSTANT: ( <DIGIT> )+ > | < #DIGIT: ["0" - "9"] > } These definitions cover the basic terminals in which the grammar is specified. The first, named IGNORE_IN_BNF, is a special token. Any tokens read by the parser that match the characters defined in an IGNORE_IN_BNF token are silently discarded. As you can see in our example, this causes the parser to ignore space characters, tabs, and carriage return characters in the input.
http://www.javaworld.com/article/2077315/java-app-dev/looking-for-lex-and-yacc-for-java--you-don-t-know-jack.html
CC-MAIN-2016-30
refinedweb
1,728
64.1
SCA BPEL Schema VersionRob Cernich Apr 16, 2012 10:38 AM Hey all, I noticed that the schema used for the BPEL component references an older version of the SCA schema. Is it possible for us to modify the component code to use the BPEL definition provided by the sca-1.1-cd06 version of the SCA specification (i.e. sca-implementation-bpel-1.1-cd03.xsd instead of bpel-v1.xsd)? The only change is the namespace for the implementation.bpel element. (The element definition is essentially the same.) New: Old: Best, Rob 1. Re: SCA BPEL Schema VersionGary Brown Apr 16, 2012 11:17 AM (in response to Rob Cernich) Hi Rob Thats fine with me - do you mind applying the change? Regards Gary 2. Re: SCA BPEL Schema VersionRob Cernich Apr 16, 2012 11:29 AM (in response to Gary Brown) No problem. Will do. Thanks Gary. 3. Re: SCA BPEL Schema VersionTomohisa igarashi Apr 29, 2012 7:50 AM (in response to Rob Cernich) Hi Rob, Did you try that? I wonder the current org.switchyard.config.model.Descriptor may only support just one marshaller for each one namespace, so in order to use other Schemas in SCA namespace, we may need to add marshaller logic into V1CompositeMarshaller in the core repo, or change the namespace and isolate from SCA default. Thanks, Tomo 4. Re: SCA BPEL Schema VersionRob Cernich Apr 29, 2012 1:09 PM (in response to Tomohisa igarashi) Hey Tomo, Good point. I haven't looked into it in that much detail. I think you are correct, which makes me wonder about the best way to deal with this, if at all. Thanks for highlighting the issue. Best, Rob 5. Re: SCA BPEL Schema VersionKeith Babo Apr 30, 2012 2:30 PM (in response to Rob Cernich) Assuming I understand the problem correctly, the quickest and cleanest way to solve this might be to simply acknowledge that multiple marshallers can be registered for a given namespace. Not sure how nicely fits with the current config API though. David and I were actually chatting about the config API the other day. He put a lot of work into it back in the day and it's pretty much just plugged along without major mods for the better part of a year. In that year, we developed a better understanding of what our runtime and components would need from a config standpoint. In fact, I think we are still learning on that front. I sense that there will be one large (and final) refactoring there, and I don't believe we are ready for that yet. My preference would be to sit down with David and others and discuss all the changes at once instead of just updating as we go. So my feeling here would be to go with the least complex solution possible. If that's keeping a distinct namespace for now, let's just do that. If it's trivial to allow multiple handlers per namespace, then we can do that instead and use the standard SCA namespace. IMHO, what we should *not* do is drop 2-3 weeks on this right now when there are so many other important things to get done for 0.5. ~ keith 6. Re: SCA BPEL Schema VersionRob Cernich Apr 30, 2012 2:33 PM (in response to Keith Babo) The simplest is to do nothing now and address it as part of the future refactoring effort. That gets my vote. 7. Re: SCA BPEL Schema VersionKeith Babo Apr 30, 2012 2:33 PM (in response to Keith Babo) This just occurred to me, but yet another option is that all of the standard SCA config support is added inside the config project. Or maybe we split all the SCA config into a distinct module. In any case, the standard SCA stuff would all go there, including things like BPEL. This is all standard stuff and not tied up with component code at all. Now, if a component has an extension to the SCA types that it wants to register, then that goes in the component project module with a distinct namespace. Now that I think about it, I think this is better than the other two ideas I discussed above. 8. Re: SCA BPEL Schema VersionKeith Babo Apr 30, 2012 2:34 PM (in response to Rob Cernich) @Rob : right, none of this has to happen immediately. 9. Re: SCA BPEL Schema VersionDavid Ward May 2, 2012 12:33 PM (in response to Keith Babo) - I like the idea of getting the SCA stuff out of config. - I agree that it would be best for us to get all our config requests/requirements put together instead of messing around as we go. - I would need to go back and research the possibilities/impact/estimate on the multiple namespaces front. It indeed has been plugging right along on it's own now for quite some time, so I'm a bit dusty on what I wrote - LOL. And as Keith said, we already have enough to do for 0.5. 10. Re: SCA BPEL Schema VersionJeff DeLong May 3, 2012 11:48 AM (in response to David Ward) I am not sure what David means but getting the SCA stuff out of the config. Do you mean out of switchyard.xml. Or is this purely an internal discussion? 11. Re: SCA BPEL Schema VersionKeith Babo May 3, 2012 11:54 AM (in response to Jeff DeLong) Purely a Maven and modularity thing. At present, the core config has model classes for SCA elements (composite, component, etc.). We're talking about moving that to a distinct SCA config module in the project structure.
https://community.jboss.org/message/733057
CC-MAIN-2015-48
refinedweb
956
78.69
Write a program that prompts the user to input number of calls. #include <stdio.h> int main() { int calls; float bill; printf("Enter number of calls :"); scanf("%d", &calls); if (calls <= 100) { bill = 200; } else if (calls > 100 && calls <= 150) { calls = calls - 100; bill = 200+(0.60 *calls); } else if (calls > 150 && calls <= 200) { calls = calls - 150; bill = 200+(0.60 *50) + (0.50 *calls); } else { calls = calls - 200; bill = 200 + (0.60 * 50) + (0.50 * 50) + (0.40 * calls); } printf("Your bill is Rs. %0.2f", bill); return 0; } Enter number of calls :350 Your bill is Rs. 315.00
http://cprogrammingnotes.com/question/telephone-bill.html
CC-MAIN-2018-39
refinedweb
101
103.93
Andrew Morton <akpm@osdl.org> writes:>.There is a strict limit to what is user visible, and if it isn't user visiblewe will never need it in a checkpoint. So internal implementation detailsshould not matter.> This may be a show-stopper, in which case maybe we only need to virtualise> pid #1.Except we do need something for pid isolation, and a pid namespace isquite possibly the light weight solution. If you can't see the pid it isclearly isolated from you.> Anyway. Thanks, guys. It sound like most of this work will be nicely> separable so we can think about each bit as it comes along.Yes, and there are enough issues it is significant.Eric-To unsubscribe from this list: send the line "unsubscribe linux-kernel" inthe body of a message to majordomo@vger.kernel.orgMore majordomo info at read the FAQ at
https://lkml.org/lkml/2006/5/19/115
CC-MAIN-2015-40
refinedweb
146
66.54
> Hello, I have been trying to animate a sprite. I have some animations set up, added an animation controller to my object and configured the controller in the animator tab, but when I try to change the value of my State Parameter, the following error shows: NullReferenceException: Object reference not set to an instance of an object Here is the code where I am trying to change the animation: using UnityEngine; using System.Collections; public class PlayerController : MonoBehaviour { Animator animator; public KeyCode left; public KeyCode right; // Use this for initialization void Start () { } void FixedUpdate () { if (Input.GetKey (left)) { animator.SetInteger ("State", 2); } if (Input.GetKey (right)) { animator.SetInteger ("State", 2); } } } I am trying to change the value of State to 2, which should trigger the transition to my "run" animation. Answer by zach-r-d · Jun 20, 2015 at 08:46 PM The Animator animator; variable is never being set, so it's staying at its default value of null, and when a method is called on null it results in a NullReferenceException. Try putting this in the Start() method to set the variable to the Animator attached to the same GameObject: Animator animator; animator = GetComponent<Animator>(); After putting this code in the Start function, it has stopped the errors from showing, but my sprite doesn't change animations. I have double-checked the animator file to make sure the transitions are set up, but nothing happens when I try to change the value of State. Could you post a screenshot of the Parameters tab of the animator controller in question? Thanks for the reply. That stops the errors from showing, but when I write animator.SetInteger ("State", 2);, it does not switch animations. animator.SetInteger ("State", 2); I have double-checked the animator controller file, and it is set to change when State equals 2. In the tutorials I have looked at, this seems to work fine, so I'm not sure what I'm doing wrong. There are a number of things that could be going wrong. Posting a screenshot of the Parameters tab will significantly help with diagnosing the problem. Whoops, just found the problem. It seems like I had misconfigured the animator file and gotten the State values mixed up. Thanks for helping me solve the problem is my Gun Model Only rendering the front bit when the animations are on? 2 Answers How to make Animated GUI element. 1 Answer Setup specific frame of a sprite animation and stop the animation there 0 Answers Please help me with my 2D animations - c# 2 Answers prefab billboard with a transparency texture? 2 Answers
https://answers.unity.com/questions/990256/nullreferenceexception-when-trying-to-animate-spri.html
CC-MAIN-2019-22
refinedweb
437
52.9
Raising Events in the Script Task Applies To: SQL Server 2016 Preview Events provide a way to report errors, warnings, and other information, such as task progress or status, to the containing package. The package provides event handlers for managing event notifications. The Script task can raise events by calling methods on the Events property of the Dts object. For more information about how Integration Services packages handle events, see Integration Services (SSIS) Event Handlers. Events can be logged to any log provider that is enabled in the package. Log providers store information about events in a data store. The Script task can also use the Log method to log information to a log provider without raising an event. For more information about how to use the Log method, see Logging in the Script Task. To raise an event, the Script task calls one of the methods exposed by the Events property. The following table lists the methods exposed by the Events property. The following example demonstrates how to raise events from within the Script task. The example uses a native Windows API function to determine whether an Internet connection is available. If no connection is available, it raises an error. If a potentially volatile modem connection is in use, the example raises a warning. Otherwise, it returns an informational message that an Internet connection has been detected. using System; using System.Data; using Microsoft.SqlServer.Dts.Runtime; using System.Windows.Forms; using System.Runtime.InteropServices; public class ScriptMain { [DllImport("wininet")] private extern static long InternetGetConnectedState(ref long dwFlags, long dwReserved); private enum ConnectedStates { LAN = 0x2, Modem = 0x1, Proxy = 0x4, Offline = connection not available.", String.Empty, 0); } Dts.TaskResult = (int)ScriptResults.Success; } Integration Services (SSIS) Event Handlers Add an Event Handler to a Package
https://technet.microsoft.com/en-us/library/ms136054.aspx
CC-MAIN-2016-30
refinedweb
294
58.58
In 2008, Microsoft welcomed the jQuery framework by elevating its status to a first-class citizen in the Visual Studio world. This adoption accelerated jQuery's popularity and helped interest for .NET, ASP.NET, and Visual Studio developers in learning more about this fluent JavaScript library and framework. jQuery's importance is no different today as it provides developers with an elegant means to manipulate HTML5 elements with ease. In this article, I'll give you a guided tour of jQuery's feature set, to help you experience the jQuery library's simplicity and ease of use. Getting Started with jQuery The first step in unleashing jQuery's power is to download the beast. You can download jQuery here. Just like any other JavaScript library, jQuery needs to be referenced before it is used. You can set up the reference in a page's head section, as in the following example: After referring the library, you are now ready to use it. To understand the workings of the library, we'll start with a very simple application that alerts the type of DIV element on screen. The alert will be invoked when the user clicks the button. The following snippet uses the plain-vanilla JavaScript to accomplish the task. As expected, the alert box in Figure 1 clearly shows that the object is of type HTMLDivElement, which refers to a DIV element in the DOM tree. Next, we'll implement the same scenario using the jQuery library, as shown in the following code sample, and examine how it differs from the previous one. Figure 2 shows the result: The object returned is not of the type HTMLDivElement but an object. By investigating further, you'll realize that the object is of type jQuery. This is where the jQuery library really shines. Instead of returning the type of the DOM element that was requested, the jQuery library returns the jQuery object. The jQuery object contains many different functions and attributes that can be used in different scenarios. This also makes it easy to add custom plug-ins to the jQuery library. jQuery Syntax jQuery uses a combination of XPath and CSS selector syntax to access elements inside the DOM tree. The selector syntax allows jQuery to manipulate the HTML elements as a group or as an individual element. Take a look at the following selectors in jQuery that are most commonly used in an application. Fetching by element ID. The hash (#) sign is used to fetch the element using the element ID. This is the equivalent of using the document.getElementById function. For example: $("#myTextBoxId") // returns the control whose ID is myTextBoxId. Fetching by class name. The period (.) operator is used to retrieve the element by using the class name. For example: $(".greenColorTextBoxes") // returns all the controls whose class name is greenColorTextboxes. Fetching by element type. The element tag name indicates that the element will be fetched by its type. This is equivalent to using the document.getElementsByTagName function. For example: $("p") // returns all the p elements on the page. $("p.display") returns the element with the class display. $("p#display") returns the first element with the ID display. jQuery uses the XPath syntax to select elements using their attributes: - $("[href]") selects all the elements having the href attribute. - $("[href='#']) selects all the elements having the href attribute #. - $("[src='.jpg']") selects all the image elements with the source attribute ending in .jpg. Now that you're familiar with different retrieval strategies using the jQuery library, we'll move on to discussing how to use jQuery effects. Effects in jQuery The jQuery framework comes with several built-in effects. If you need to create more advanced effects, you can do so using the jQuery UI library, which you can download at jqueryui.com. The effects that alter the appearance of elements are mostly UI based. The code in Figure 3 uses the built-in effect to show and hide a div element. Creating animation effects. There are times when jQuery built-in effects are not enough. In such cases, you can use the power of jQuery's animation class, which lets you create custom animations. The animation can be performed on properties consisting of numerical values—for example, width, height, and margin. You can even perform animation on color properties by assigning the color in the color code format. The following example shows how to perform animation on a simple DIV control and change its width property. $(document).ready(function() { $("#btnAnimate").click(function() { $(".block").animate( { width:"100%" } ); }); }); You can even move the DIV across the screen using the marginLeft and marginRight properties, as the following example shows: $(document).ready(function() { $("#btnAnimate").click(function() { $(".block").animate( { marginLeft:"40%" } ); }); }); jQuery can also manipulate color properties of the element if they're used in the form of color codes instead of names, as you can see in the following example. Note that the color animation works only when the jQuery UI reference is added (as mentioned previously). $(document).ready(function() { $("#btnAnimate").click(function() { $(".block").animate( { marginLeft:"40%", backgroundColor:'#ffbfff' } ); }); }); The previous code also demonstrates the use of multiple properties in the animation function. The animation function provides most of the features to create custom animation, but sometimes we need to plug in our custom animation function in the jQuery framework. In the next section, I'll show you how to extend the existing jQuery functions and how to successfully add your own behavior. Creating Custom Effects by Extending jQuery jQuery is an open extension framework that enables developers to easily extend the functionality in the existing the API. For instance, if you're interested in creating a FadeInFadeOut effect, you can easily extend the jQuery.fn class to include new methods and add custom behavior. Take a look at the following code, which demonstrates how to extend jQuery.fn to include FadeInFadeOut effects. jQuery.fn.fadeInFadeOut = function(speed) { return $(this).fadeIn(speed, function() { return $(this).fadeOut(speed); }); } Finally, we can use our new function by employing the following code: $("#divMessage").html("Item has been saved").fadeInFadeOut(3000); This shows how easy it is to leverage the existing jQuery functionality and create new effects. Drag-and-Drop Operations Using jQuery If you've ever written plain old vanilla JavaScript to create drag-and-drop effects, you're aware of the pain you need to go through to make it work. jQuery makes it easy to perform drag-and-drop operations. The drag-and-drop operations are contained in the jQuery.UI framework. The first task in implementing jQuery drag and drop is to create a draggable item. We will be dragging a simple DIV element. The definition of the DIV element is as follows: The DIV uses the style "draggableElement" defined by the following code: .draggedElement { border: 2px solid #0090DF; background-color: #68BFEF; width: 100px; height: 100px; margin: 10px; overflow:auto; padding:1em 1em 1em 1em; z-index:9999; cursor:move; } Next, to make the DIV draggable we need to use the jQuery draggable function. Here's the implementation: And that's it! Now run the application in your browser, and you'll be amazed that by adding a single line of code you can drag the element. Although we are able to drag the DIV element, we're dragging the original element. In most cases you do not want to drag the original element but the clone. Not to worry, since jQuery provides attributes to add this feature. To make a clone of the dragged element, just use the helper attribute, as in the following example: This code creates a clone of the dragged element, which is easily visible because of the opacity. Figure 4 shows the clone of the dragged element. At this point we have implemented only the functionality for the dragged element. But this is only half of the story. The dragged element eventually needs to be dropped. This is where drop zones come into action. A drop zone is an area where a draggable element can be dropped. Creating a drop zone is straightforward, as it can be represented by a simple DIV element: $(".dropZone").droppable(); The .dropZone class is used to decorate the drop zone with styling features: .dropZone { background-color: #e9b96e; border: 3px double #c17d11; width: 300px; height: 300px; margin: 10px; overflow:auto; position:absolute; top: 5px; right: 30%; padding: 1em 0 0 0; } Just as we initialized the draggable element, we need to initialize the drop zone. This is accomplished by using a single line of code: $(".dropZone").droppable(); Although the drop zone has been initialized, we still need to provide it with additional information so that it knows what kinds of elements are accepted in the drop zone. The following code accomplishes this: $(".dropZone").droppable( { accept: '.draggedElement', hoverClass: 'dropZoneHover', drop: function(ev, ui) { } } ); The accept attribute represents the class that is accepted by the drop zone. This means any element having class draggedElement can be dropped into the drop zone. The hoverClass attribute represents the class that will become active once the draggable element hovers over the drop zone. Take a look at Figure 5, which shows the drop zone becoming active once the draggable element hovers over it. Now, let's take a look at the most important feature of the drop zone, the drop function: $(".dropZone").droppable( { accept: '.draggedElement', hoverClass: 'dropZoneHover', drop: function(ev, ui) { var droppedItem = ui.draggable.clone().addClass("droppedItemStyle"); $(this).append(droppedItem); } } ); Inside the droppable function, we have used JavaScript closures to handle the drop event. The $(this) refers to the DIV element that acts as a "DropZone" and is consuming the ".dropZone" class. The dropped item is decorated with droppedItemStyle. Once the dropped element is dropped, it is added to the drop zone element as a child. Figure 6 shows the dropped element added in the drop zone. The jQuery drag-and-drop API is very useful for creating interactive applications. The ease of use of the drag-and-drop framework lets a developer build complicated client-side applications more quickly. jQuery AJAX API jQuery not only provides a strong DOM manipulation library, it also includes a very handy AJAX API. jQuery provides a couple different methods to make an AJAX call, as I'll demonstrate. The $.ajax function is the most flexible of all jQuery AJAX functions, since it allows a developer to indicate the options manually. Here is a small piece of code that invokes the Greetings web service method and returns a message to the user. $(document).ready(function() { $("#btnGreet").click(function() { $.ajax( { type: "POST", contentType: "application/json", data: "{}", dataType: "json", url:"AjaxService.asmx/Greeting", success: function(response) { alert(response.d); } } ); The $.ajax function defined in this code calls the Greeting method contained in the AjaxService.asmx web service. Here's the implementation of the web service: [System.Web.Script.Services.ScriptService] public class AjaxService : System.Web.Services.WebService { [WebMethod] public string Greeting() { return "Hello World"; } } Greeting is a simple method decorated with the [WebMethod] attribute. Another important thing to note about the AjaxService is that it's decorated with the [System.Web.Script.Services.ScriptService] attribute, which allows the web service to be called from the client-side code. Figure 7 shows the result. You can also return XML just by changing the contentType to support XML, as shown by the following: $(document).ready(function() { $("#btnGreet").click(function() { $.ajax( { type: "POST", contentType: "application/xml", data: "", dataType: "xml", url:"AjaxService.asmx/Greeting", success: function(response) { alert(response.childNodes[0].firstChild.textContent); } } ); It's a good idea to return the result as JSON format. JSON makes it easy to parse the object and usually represents the structure similar to the domain model. Sending Parameters Using jQuery's AJAX API In the previous examples, we invoked the methods and returning the results on the client side without sending any input parameters. In real-world applications, our result will depend on the parameters passed to the web method. In the following example, our result will be based on the parameters sent by the client. We'll use the SQL Server Northwind database, since it's available on most machines. A user will be allowed to select a category from the DropDownList. When the category is selected, the related products are fetched using an AJAX request. The following code shows the implementation of the GetProductsByCategoryId. The example uses LINQ to SQL as the data access layer, but you may use whatever data access mechanism you want. [WebMethod] public string GetProductsByCategoryId(int categoryId) { var json = new JavaScriptSerializer(); using(var db = new NorthwindDataContext()) { var products = from p in db.Products where p.CategoryID == categoryId select p; foreach(var p in products) { p.Category = null; // removing the circular reference! } return json.Serialize(products); } } The JavaScriptSerializer object has a limitation in that it cannot detect and ignore the circular references. For this reason, I've manually eliminated the circular references by setting the Category object to null. You can also return an anonymous type with the required properties to the client. Figure 8 shows the implementation of the getProducts function, which is used to fire the AJAX request and create the product list display. In the code in Figure 8, note that the name of the parameters matches exactly with the parameter names of the web method. function getProducts() { var list = document.getElementById('<%= ddlCategories.ClientID %>'); var categoryId = list.options[list.selectedIndex].value; $("#productList").children().remove(); var params = "{'categoryId':'" + categoryId + "'}"; $.ajax( { type: "POST", dataType: "json", data: params, contentType: "application/json", url: "AjaxService.asmx/GetProductsByCategoryId", success: function(response) { var products = $.evalJSON(response.d); for (i = 0; i < products.length; i++) { var product = document.createElement("li"); product.innerHTML = products[i].ProductName; $("#productList").append(product); } } } ); } This means that if the web method parameter is called categoryId, then the AJAX call should specify categoryId as the parameter. Additionally, we've used a jQuery plug-in to evaluate the JSON string as an Object. Figure 9 shows the output. jQuery Support in Visual Studio 2010 The jQuery library is already supported in Visual Studio 2008, but to get the IntelliSense feature working, you need to download a Meta file and place it in a special location. In Visual Studio 2010 jQuery is treated as a first-class citizen, and the IntelliSense support is activated by default. This creates an easy way for developers to discover the jQuery API without having to refer to the documentation. Wrapping Up jQuery is a fascinating JavaScript library that has grown exponentially since its inception in 2006. In 2008 Microsoft embraced the popularity of this powerful library by giving it space in Visual Studio. jQuery's ease of use and advanced UI-manipulation features put it at the top of the stack of your choices of a client-side framework for any web application. Next, Dan Wahlin will provide you with some helpful web development writing tips in "5 Web Development Tips to Improve Your jQuery Coding."
https://www.itprotoday.com/web-application-management/tour-jquery-framework
CC-MAIN-2021-21
refinedweb
2,480
56.66
Suppose you are running a long Selenium test. The test runs fine but fails towards the end as some element was not found or was not clickable. Ideally, you would like to fix the locator and check it immediately. Now you wonder if you can reuse your browser session from the same point where the failure occurred. This post shows you how to do just that! This would help you to debug the locators used quickly, instead of running your whole test again. Extract session_id and _url from driver object We are taking advantage of the fact that Selenium lets you attach a driver to a session id and an URL. You can extract your session id and _url from the driver object as mentioned below Tie it up with your framework In case you are using a framework, you can print out the session id and url in the method where you try to get the element. In an example shown below, I am using a get_element method which would return the DOM element. I am printing the session id and url whenever the find_element method fails Use the session id and url Now you can use the session id and url, in order to debug the locators. Open python command line tool and use the below code Note1: Currently I am able to reuse the session extracted only from Chrome browser. For Firefox there are some Issue. Link 1 and Link 2 Note2: This code is present in our open-sourced Python-Selenium test automation framework based on the page object pattern. We strongly recommend you check it out!. 21 thoughts on “How to reuse existing Selenium browser session” Thank you for this! In my case the webdriver.remote opens a new completely empty window above the existent one. It’s circumvented by sendKeys Alt+F4 and/or AppActivate(“Google Chrome”) Those functions can be found in win32com.client I too observed the empty window opening up. Thanks for letting me know how to find a way around it. Actually, to fix this annoying empty window issue, you should just close browser before you re-set session_id for it: cls.browser = webdriver.Remote(command_executor=session_url, desired_capabilities={}) cls.browser.close() cls.browser.session_id = session_id Is this possible to acheive using java code. Yes, it’s possible to achieve using java code. The following link may help you to achieve it Hi, the code no longer works. I am using selenium 3.9.0 with python, your code ever open new browser. I tested with chromedriver and geckodriver(firefox). Please, inform version of your selenium Hi Jhony, Can you let me know what error you get when you try out the code?. Yes, the code opens a new browser session and you can try the suggestions in some of the above comments to fix that issue. My selenium version is 3.6.0 Because of the version compactability between your selenium and firefox driver it will not work. Try o downgrade your firefox driver the best way to void create a emtpy windows is mock start_session(), the code below: def start_session(self, *args): ”’ mock method, to void create a emtpy chrome page ”’ pass def reuse_driver(url, session_id): webdriver.Remote.start_session = start_session # user mocked method, do nothing driver = webdriver.Remote(command_executor=url) driver.session_id = session_id driver.w3c = None return driver Has anyone tried this when running Selenium on Browserstack?… When launching the new driver, it seems it’s not possible to change the session id. (driver.session_id = session_id ) So the browserstack session gets stuck. Any tips or advice would be really helpful… Gilles Vanermen , we haven’t tried this with browserstack . But this was meant to help debugging tests on local system to save time If the browser session was opened by some other application and we want to perform automation on that browser session, then is it possible? Hi John, We need session_id and Session_url to do this. I don’t know of a way to get this for an already opened session by some other application Was looking for this particular implementation of reusing the browser, but not found in your framework, where is it ? Hi, The posts only gives an example on how you can use session id and url in the framework. In this example we are printing the session id and url whenever the find_element method fails. You can print out the session details in the method where you try to get the element. I hope this information helps !!! Hi nice information, Am I right about this:( in my understanding) your code is that you run fistly run it via python so because of that, you can get the ID of session_url = driver.command_executor._url session_id = driver.session_id but how to use already opened selenium(manual opening or already open by other python script that already stop). Let say we have opened 3 window selenium. How to get the list the session ID of that three ‘session_url’ and ‘session_id’ and so we can control the right one which opened the url. Hi, You could use get.windowshandles() to store all the session ids of the open windows. You could also print store the session_id as soon as the window is spawned. I would suggest using a similar code: I am using SeleniumBasic with VBA for Microsoft Access and have asked this question and can’t get an answer anywhere: Can someone please help me reconnect in vba to an existing selenium webdrover session. I figured out how to get the sessionID, the driver IP and the driverInfo but can’t quite figure out the VBA syntax. Thanks, Andrew Hi Andrew, we majorly use Python with Selenium and the blog details about reusing the browser session with Python. We are unable to extend support in VBA – SeleniumBasic which is your case. You could refer to, and see if you could implement the logic in your language base. Hi, I have a problem. I search to reuse driver (webdriver) for keep the same instance of my browser and not reopen an other browser. In my script, the driver is undefined in my function test. Help me please if someone have a solution. My code with nodeJS (in javascript): var express = require(‘express’); var app = express(); var ip = “localhost” var port = 80; var server = require(“http”).createServer(app); var io = require(‘socket.io’)(server); var webdriver = require(“selenium-webdriver”); app.use(bodyParser.json()); app.use(bodyParser.urlencoded({ extended: true })); app.use(‘/’, express.static(__dirname + ‘/’ + application)); server.listen(port, function() { var driver = new webdriver.Builder().forBrowser(‘firefox’).build(); driver.get(“”); //it’s ok }); io.sockets.on(‘connection’, function(socket) { //call of test function with socket io socket.on(“test”, function(data) { driver.get(“”); //it’s ko => driver is undefined }); }); Hi Jeremy, By reading the script I understood that you have been using Firefox browser. As we have mentioned in our blog to reuse existing selenium browser session works only for Chrome browser. Please refer to the attached link in the blog.
https://qxf2.com/blog/reuse-existing-selenium-browser-session/
CC-MAIN-2021-25
refinedweb
1,171
65.12
Your browser does not seem to support JavaScript. As a result, your viewing experience will be diminished, and you have been placed in read-only mode. Please download a browser that supports JavaScript, or enable it if it's disabled (i.e. NoScript). Hello ! I've wrote a simple function to store some constants in a list, from a string ( because I'm lazy) : def geoTypeList(): geo_constants = "tube,cube,plane" # not the full list geo_types = [("c4d.O" + i) for i in geo_constants.split(",")] return geo_types # return the list I was happy with my solution until I've tried to use it : for i in objs: if i.GetType() in geoTypeList(): print(i.GetName(), "is a", i.GetTypeName(), i.GetRealType()) else: print("Not a geometry object") I've tried many times and many variant until I've realized that I'm trying to check a constant against some strings, so it can't work. But I'm stuck here, I don't know how to pass the list items as constants and not as string. Also before you ask, why I'm not just using ID integers ? Because I would like to keep the code easily readable, and the docs use the constants and symbols. Thank you, Hi @John_Do, thank you for reaching out to us. You could use Python's eval to evaluate the string you do build. Although I do not quite see the point in doing it, since you open the can of worms that is eval with it (if something goes south, it could do do bad things). So I would strongly recommend not to try something like this (although the chances of something going south here are probably slim). Consider yourself warned about the pitfalls of eval eval Cheers, Ferdinand import c4d def geoTypeList(): geo_constants = "tube,cube,plane" # not the full list # Use eval to store the integer repr and not a string repr of the symbol geo_types = [eval("c4d.O" + i) for i in geo_constants.split(",")] return geo_types # return the list i in nodes: if i.GetType() in geoTypeList(): print(i.GetName(), "is a", i.GetTypeName(), i.GetRealType()) else: print(f"Not a geometry object: {i}") # Although I do not quite see the point in doing it like that. This seems to # be much more convenient and more importantly less dangerous: typeSymbols = (c4d.Otube, c4d.Ocube, c4d.Oplane) for i in nodes: if i.GetType() in typeSymbols: print(i.GetName(), "is a", i.GetTypeName(), i.GetRealType()) else: print(f"Not a geometry object: {i}") edit: Here is some context about the pitfalls of eval: my solution was not very good due to the inherent diceyness of eavl. Since you are only interested in an attribute, you could of course use getattr(). Something like attached to the end of the posting. eavl getattr() import c4d def yieldSymbolsFromString(symbolString): """Just gets the attributes from the module. """ for s in symbolString.split(","): val = getattr(c4d, f"O{s}") yield val node in nodes: if node.GetType() in yieldSymbolsFromString("tube,cube,plane"): print(f"{node.GetName()} is a geometry.") else: print(f"{node.GetName()} is not a geometry.") # Will raise an attribute error on Ocar. for s in yieldSymbolsFromString("tube,cube,plane,car"): pass Cube is a geometry. Tube is a geometry. Plane is a geometry. Sphere is not a geometry. Traceback (most recent call last): File "...\scribbles_a.py", line 22, in <module> for s in yieldSymbolsFromString("tube,cube,plane,car"): File "...\scribbles_a.py", line 7, in yieldSymbolsFromString val = getattr(c4d, f"O{s}") AttributeError: module 'c4d' has no attribute 'Ocar' [Finished in 4.1s] Hi @ferdinand, In fact I think I was looking for the eval() method which I know but somewhat have forgotten. Thanks for pointing the fact that using it could be dangerous, but in this particular context I'm not sure to understand why ? I'm not a seasoned coder ( far from it ) but the linked article seems to point security issues in the context of using eval() in conjunction with input(), which is not the case here. I'm doing this mainly to practice Python as much as possible, but I guess it is wasted computing power since these symbols are not changing anytime soon. Anyway, I've learned some things, thank you for the help, much appreciated ! the reason why eval is bad is because you always have to sanitize your inputs (in your case the string). Which might sound trivial to do, but is actually hard when you have to guarantee that nothing can go wrong. eval is of course not as bad as exec, runpy or similar things, but this whole idea of cobbeling code together at runtime often produces more problems than it solves. It can of course be a powerful tool, but there are often more "boring" and safer alternatives. exec runpy If then something goes wrong, finding the bug is usually hard, because you have then to untangle the code created dynamically at runtime. In this case problems are unlikely as I said, but something like this could happen for example: import c4d code = "c4d.Ocone, c4d.Ocube + c4d.Osphere" for token in code.split(","): print(f"{token.strip()}: {eval(token)}") c4d.Ocone: 5162 c4d.Ocube + c4d.Osphere: 10319 So there is nothing which prevents you from accidentally adding two symbols together. Here it is easy to spot, but just hide that bit in 5k lines of code and dynamically build that code string at runtime and it becomes a nightmare to debug. So I would consider this bad practice which is why I was so verbal about my warnings. getattr for example is a much better solution for your problem, because it does not come with these problems. code getattr Thank you for the explanation @ferdinand. The example makes sense even for a beginner like me, that's great
https://plugincafe.maxon.net/topic/13207/from-string-to-constant-to-check-type
CC-MAIN-2021-49
refinedweb
972
65.73
AWS Developer Blog displays a list of Amazon S3 objects from a bucket by using webpack and the AWS SDK for JavaScript. Why Use webpack? Tools such as webpack parse your application code, searching for import or require statements to create bundles that contain all the assets your application needs. Although webpack only knows how to handle JavaScript files by default, can also configure it to handle other types, such as JSON, CSS, and even image files! This makes it great at packaging up your application’s assets so that they can be easily served through a webpage. Using webpack, you can create bundles with only the services you need, and generate bundles that will also run in Node.js! Prerequisites To follow along with this post, you’ll need to have node.js and npm installed (npm comes bundled with node.js). When you have these tools, create a new directory and download the dependencies we’ll need for this project by running npm install x, where x is the following: aws-sdk: the AWS SDK webpack: the webpack CLI and JavaScript module json-loader: a webpack plugin that tells webpack how to load JSON files Setting Up the Application Start by creating a directory to store the project. We’ll name our project aws-webpack. Our application will contain three files that do the following: s3.jsexports a function that accepts a bucketas a string, and a callbackfunction, and returns a list of objects to the callback function. browser.jsimports the s3.jsmodule, calls the listObjectsfunction, and displays the results. index.htmlreferences the JavaScript bundle that webpack creates. Create these files in the project’s root directory, as follows: s3.js Important: We’ve left configuring the credentials to you. // Import the AWS SDK var AWS = require('aws-sdk'); // Set credentials and region, // which can also go directly on the service client AWS.config.update({region: 'REGION', credentials: {/* */}}); var s3 = new AWS.S3({apiVersion: '2006-03-01'}); /** * This function retrieves a list of objects * in a bucket, then triggers the supplied callback * with the received error or data */ function listObjects(bucket, callback) { s3.listObjects({ Bucket: bucket }, callback); } // Export the handler function module.exports = listObjects; browser.js // Import the listObjects function var listObjects = require('./s3'); var bucket = 'BUCKET'; // Call listObjects on the specified bucket listObjects(bucket, function(err, data) { if (err) { alert(err); } else { var listElement = document.getElementById('list'); var content = 'S3 Objects in ' + bucket + ':n'; // Print the Key for each returned Object content += data.Contents.map(function(metadata) { return 'Key: ' + metadata.Key; }).join('n'); listElement.innerText = content; } }); index.html <!DOCTYPE html> <html> <head> <title>AWS SDK with webpack</title> </head> <body> <div id="list"></div> <script src="bundle.js"></script> </body> </html> At this point, we have one JavaScript file that handles making requests to Amazon S3, one JavaScript file that appends a list of S3 object keys to our webpage, and an HTML file that contains a single div tag and script tag. In this last step before our webpage will display data, we’ll use webpack to generate the bundle.js file that the script tag references. Configuring webpack You specify configuration options in webpack by using a plain JavaScript file. By default, webpack looks for a file named webpack.config.js in your project’s root directory. Let’s create our webpack.config.js. webpack.config.js // Import path for resolving file paths var path = require('path'); module.exports = { // Specify the entry point for our app. entry: [ path.join(__dirname, 'browser.js') ], // Specify the output file containing our bundled code output: { path: __dirname, filename: 'bundle.js' }, module: { /** * Tell webpack how to load 'json' files because * by default, webpack only knows how to handle * JavaScript files. * When webpack encounters a 'require()' statement * where a 'json'' file is being imported, it will use * the json-loader. */ loaders: [ { test: /.json$/, loaders: ['json'] } ] } } We specified our entry point as browser.js in webpack.config.js. The entry point is the file webpack uses to start searching for imported modules. We also defined the output as bundle.js. This bundle will contain all the JavaScript our application needs to run. We don’t’ have to specify s3.js as an entry point because webpack already knows to include it because it’s imported by browser.js. Also, webpack knows to include the aws-sdk because it was imported by s3.js! Notice that we specified a loader to tell webpack how to handle importing JSON files, in this case by using the json-loader we installed earlier. By default, webpack only supports JavaScript, but uses loaders to add support for importing other file types as well. The AWS SDK makes heavy use of JSON files, so without this extra configuration, webpack will throw an error when generating the bundle. Running webpack We’re almost ready to build our application! In package.json, add "build": "webpack" to the scripts object. { "name": "aws-webpack", "version": "1.0.0", "description": "", "main": "index.js", "scripts": { "test": "echo "Error: no test specified" && exit 1", "build": "webpack" }, "author": "", "license": "ISC", "dependencies": { "aws-sdk": "^2.6.1" }, "devDependencies": { "json-loader": "^0.5.4", "webpack": "^1.13.2" } } Now run npm run build from the command line and webpack will generate a bundle.js file in your project’s root directory. The results webpack reports should look something like this: Version: webpack 1.13.2 Time: 1442ms Asset Size Chunks Chunk Names bundle.js 2.38 MB 0 [emitted] main [0] multi main 28 bytes {0} [built] [1] ./browser.js 653 bytes {0} [built] [2] ./s3.js 760 bytes {0} [built] + 343 hidden modules At this point, you can open index.html in a browser and see output like that in our example. Give It a Try! In an upcoming post, we’ll explore some other features of using webpack with the AWS SDK for JavaScript. We look forward to hearing what you think of this new support for webpack in the AWS SDK for JavaScript v2.6.1! Try it out and leave your feedback in the comments or on GitHub!
https://aws.amazon.com/ko/blogs/developer/using-webpack-and-the-aws-sdk-for-javascript-to-create-and-bundle-an-application-part-1/
CC-MAIN-2019-18
refinedweb
1,014
66.74
While tech enthusiasts may be drooling over the specs of the BlackBerry Passport screen resolution, I’m sure more than one designer is panicked at the thought of building a UI for another resolution. But fear not! BlackBerry has you covered! Back in May with the beta release of the 10.3 Native SDK, we introduced the concept of design units. And now that the 10.3 gold release of the Native SDK is available, we’d like to give you a quick refresher on how you can use design units to easily and efficiently work with different device screen sizes and resolutions, including the BlackBerry Passport’s awesome 1440 x 1440 resolution. Design units are device-independent values that you use to assign dimensions to components in your UI. A design unit corresponds to a whole number of pixels based on the DPI of the device. At run-time the framework converts the design unit value to a pixel value that’s optimal for the screen density of the current device. The following table describes how design units convert into pixel values for each device. We’ve added the object “ui” to the UIObject base class that can perform conversions from design units to pixels. You can choose to specify your component dimensions using design units (du), or snapped design units (sdu). Design units calculate an exact pixel value, while snapped design units round to the nearest whole pixel. Design units may be specified in both C++ and QML. To use design units in QML you need to import bb.cascades version 1.3 Here is an example of an interface in QML that uses snapped design units to specify the attributes of objects on a page. import bb.cascades 1.3 Page { Container { topPadding: ui.sdu(2) bottomPadding: ui.sdu(2) rightPadding: ui.sdu(2) leftPadding: ui.sdu(2) TextField { hintText: "To:" bottomMargin: ui.sdu(6) } TextField { hintText: "Subject:" bottomMargin: ui.sdu(6) } TextArea { layoutProperties: StackLayoutProperties { spaceQuota: 1 } } } } For more tips on resolution independent design, check out our best practices guide:
http://devblog.blackberry.com/2014/07/got-pixel-pains-try-using-design-units/
CC-MAIN-2014-41
refinedweb
343
58.58
sht3x-i2c (community library) Summary Library for SHT31 I2C sensor This library makes it easy to get temperature and humidity from the SHT31 sensor using I2C. Example Build Testing Device OS Version: This table is generated from an automated build. Success only indicates that the code compiled successfully. Library Read Me This content is provided by the library maintainer and has not been validated or approved. sht3x-i2c Library A library to interface a Particle device to an SHT31 temperature and humidity sensor using I2C Usage The SHT31 has two modes that can be used for reading temperature and humidity: - Single Shot: the Particle device will send a command to the sensor, wait for the measurement to complete, and then read the values. - Periodic: the Particle device will set the sensor to continuously measure temperature and humidity, which will be available to read at any time. Which one should you use? The Single Shot uses less power, as the sensor goes into idle mode while not measuring. However, the disadvantage is that getting a measurement takes longer since there is a wait time that is required between the command and the time the data is available to be retrieved. In Periodic mode, data is available to be read immediately. However, this mode uses more power as the sensor is continuously making measurements. Tracker Connect the TX/RX of the Asset Tracker SOM or the M8 connector on TrackerOne. Note that these pins are multiplexed between the UART and the Wire3 I2C port. Some SHT31 boards already include pull-up resistors on SCL and SDA. If your board doesn't include them, make sure to connect 4.7k pull-up resostors on both I2C lines to 3.3V. If using TrackerOne, the available power is 5V on CAN_5V pin. Since the I/O is not 3.3V compliant, you will need to use a DC to DC converter to connect the power of the SHT31 sensor to 3.3V. See the example in periodic/main.cpp for how to retrieve the temperature and humidity and insert it into the location publish object. This will result in the values being stored in the database along with the location of the Tracker. #include "Particle.h" #include "tracker_config.h" #include "tracker.h" #include "sht3x-i2c.h" SYSTEM_THREAD(ENABLED); SYSTEM_MODE(SEMI_AUTOMATIC); PRODUCT_ID(TRACKER_PRODUCT_ID); }, }); Sht3xi2c sensor(Wire3); void loc_gen_cb(JSONWriter &writer, LocationPoint &point, const void *context) { double temp, humid; if (sensor.get_reading(&temp, &humid) == 0) { writer.name("sh31_temp").value(temp); writer.name("sh31_humid").value(humid); } } void setup() { Tracker::instance().init(); Tracker::instance().location.regLocGenCallback(loc_gen_cb); pinMode(CAN_PWR, OUTPUT); // Turn on 5V output on M8 connector digitalWrite(CAN_PWR, HIGH); // Turn on 5V output on M8 connector delay(500); sensor.begin(CLOCK_SPEED_400KHZ); sensor.start_periodic(); Particle.connect(); } void loop() { Tracker::instance().loop(); } Boron/Argon Connect the I2C bus of both devices (SCL and SDA), as well as 3.3V and GND. Some SHT31 boards already include pull-up resistors on SCL and SDA. If your board doesn't include them, make sure to connect 4.7k pull-up resistors on both I2C lines to 3.3V. See the example in single-shot.ino for how to retrieve the temperature and humidity and print it to the serial port. #include "Particle.h" #include "sht3x-i2c.h" SerialLogHandler logHandler(LOG_LEVEL_INFO); Sht3xi2c sensor(Wire); void setup() { sensor.begin(CLOCK_SPEED_400KHZ); } void loop() { static uint32_t timer = System.uptime(); double temp, humid; if (System.uptime() - timer > 5) { timer = System.uptime(); if (sensor.single_shot(&temp, &humid) == 0) { Log.info("Temperature: %.2f, Humidity: %.2f", temp, humid); } } } Browse Library Files
https://docs.particle.io/cards/libraries/s/sht3x-i2c/
CC-MAIN-2021-21
refinedweb
592
51.24
I have a situation where I have a table listing users and products and associated values: USER PRODUCT VALUE abc xyz 3 def ghi 5 def xyz 7 and I want to pivot this to display it with a column for each product like so: USER ghi xyz abc 3 def 5 7 This means that the columns I have depend on the product list, which changes pretty regularly (at least at certain times) and they also depend on which department you're visiting (each has a different product list). At the moment I use a temporary table: Object lock = null; synchronized (state.tempTables) { // "state" is from the HttpSession if (state.tempTables.get("products") == null) { state.tempTables.put("products",new Object()); } lock = state.tempTables.get("products"); } synchronized (lock) { // start transaction // drop the temporary table if it exists // create the temporary table // select rows from the real table while (res.next()) { // insert into temporary table } // commit transaction // display the temporary table } This is ugly and slow, but I've been unable to come up with a better way. The table is dropped at the start rather than at the end because the user might choose to download it as CSV, so it's left in existence after it's displayed in case it's needed for this purpose. I thought about using a table function, but again the column list is fixed when the function is defined. Does anyone have any ideas what else I could try? Or is there anything in the pipeline for a future version that might be relevant? TIA, -- John English
http://mail-archives.apache.org/mod_mbox/db-derby-user/201211.mbox/%3C50ACE1B3.2030004@gmail.com%3E
CC-MAIN-2016-26
refinedweb
264
59.03
Learn to use Visual Studio, Visual Studio Online, Application Insights and Team Foundation Server to decrease rework, increase transparency into your application and increase the rate at which you can ship high quality software throughout the application lifecycle You asked, and we have listened. Seeing return values for functions is something that many .NET developers wanted, and voted heavily for on the Visual Studio uservoice site. This feature exists already for C++ code and the good news is that with the latest version of Visual Studio, it’s here and you’ll be able to use it for your .NET code too. This new feature allows you to examine the return value of a function when the developer steps over or out of a function during your debugging session. This is especially useful when the returned value is not stored in a local variable. Consider the following nested function example Foo(Bar()); in this example you can now examine the return value(s) from Bar and Foo, when you step over that line. The return value(s) get displayed in the “Autos Windows” (Debug->Windows->Autos) and you can also use the pseudo variable “$ReturnValue” in the Watch and/or Immediate window to fetch the last function’s return value. Here are some steps for you to try it out in action: 1) Create a new C# Console Application 2) Copy the following code to your program.cs 01 class Program 02 { 03 static void Main() 04 { 05 int result = Multiply(Five(), Six()); 06 } 07 08 private static int Multiply(int num1, int num2) 09 { 10 return (num1 * num2); 11 } 12 13 private static int Five() 14 { 15 return(5); 16 } 17 18 private static int Six() 19 { 20 return (6); 21 } 22 } 3) Put a breakpoint in line # 05 – [int result =Multiply(Five(), Six());] and run it 4) Run the program (F5) 5) When the program breaks step-over the function (F10) Observe: 6) As this example was nested functions, you are able to see all the return values in the autos window 7) You can also use the last returned value in your immediate window Note that if a function returns a struct, it will not be displayed in the Autos window with the exceptions of enums and structs that have exactly one field which is the size of a pointer (i.e. structs with the same characteristics as enums). In closing, we are really happy to bring this capability to you and as always your feedback is welcome in the diagnostics forum. Yaniv, your code sample isn't formatted correctly. It looks to have double spacing at the moment. That's awesome! Can we also change the return value? @. Why is variable name is not consistent? In Autos it's called result, in Immediate - $ReturnValue?! For instance, $exception in simplified catch{} block has consistent name across. @abatishchev: The Autos window has a "result" because of the local variable "int result" that is declared in the code sample - it's a real variable, not a pseudo-variable like $ReturnValue or $exception Hi Yaniv, thanks for the great blog post! Say, is there a way to programmatically obtain all the return values and the names of the associated method from a Visual Studio extension? Thanks! Excellent. Thanks VS team for this feature. MS Rocks! It just displays primitives and not classes, so this feature is not as exciting as I thought. @VahidND Thanks for the feedback! Would you mind voting or opening new suggestion items on visualstudio.uservoice.com for the support you feel this feature is lacking? For example, we already have: -support structs: visualstudio.uservoice.com/.../5513053-support-structs-in-the-vs2013-debugger-return-valu -on hover: visualstudio.uservoice.com/.../4832103-provide-return-value-in-debug-when-mousing-over-th Maria Ghiondea Visual Studio Debugger Also - while there is a known limitation that the feature can't support structs with more than one field, it should support classes! If you are not seeing it work - would you mind letting me know when you are seeing that fail? If you prefer - you can email us at vsdbgfb at Microsoft.com @Omer Raviv You can write an extension listening to IDebugReturnValueEvent2 and call IDebugReturnValueEvent2::GetReturnValue() to get the return value. This should work for both native and managed: msdn.microsoft.com/.../bb145591.aspx This doesn't work for me in Visual Studio 2013 Update 2, .NET 4.5.1. Test project [console app] : namespace ConsoleApplication9 { class Program { static void Main() { var data = GetData(); } private static int GetData() return 5; } //place breakpoint here } } Upon hitting the breakpoint $returnValue, $ReturnValue are not recognized neither in a Watch tool window, nor in the Immediate window. In the Autos window it doesn't appear either. Is this shipped and working? I can't seem to find this feature in update 2 either, is there a switch to turn it on somewhere? That's great if you can wait until the Function exits and you're using 2013+. What if you want to examine the return value *before* you exit the function (i.e. so that maybe you could Set Next Statement to earlier in the Function and change some code and/or modify some Variable(s) values to alter the Function result)? If you're using VB.NET, your in luck because for as long as I can remember (from VB through all versions of VB.NET), you can simply query the Function Name. You *should* already know that it "functions" like a Local Variable that's implicitly declared at the start of the Function and that its current value is also used as the Return value whenever the Function exits via non-Return Statement means (i.e. Exit Function or just falling through) and of course, when the Return Statement is used, it is also set to the Return Statement's expression. Just like a Local Variable, its value can be inspected at any point of execution inside the Function (including after the Return Statement is executed). C# doesn't have this and should. That little VB.NET feature (plus the Exit Function Statement which it enables - another feature C# doesn't have and should) is very useful in a from of Defensive Programming I practice where I always initialize the Function Name to the failure/default value as the 1st Statement. Then, at any failure point (which normally occurs much more often than success points), I can simply call the Exit Function Statement (i.e. without having duplicate the failure / default expression or even Variable name).
http://blogs.msdn.com/b/visualstudioalm/archive/2013/06/27/seeing-function-return-values-in-the-debugger-in-visual-studio-2013.aspx
CC-MAIN-2014-52
refinedweb
1,095
60.04
Code. Collaborate. Organize. No Limits. Try it Today. tons of videos, see here, and here for example, screencasts, articles, and blog posts (self-serving Microsoft blog posts mostly) about how much they are opening up. It boils down to the following excerpt from the Microsoft Office 12 introduction white paper: (...). They insist on the fact that, provided you make a valid use of the XML, pretty much changing the content of anything in an existing document can be achieved by sequentially: Let's see if that's true. To reproduce the scenario: The relevant XML in the corresponding part xl/worksheets/sheet1.xml is: <row r="2" spans="3:5"> <c r="C2"> <v>10</v> </c> <c r="D2"> <v>20</v> </c> <c r="E2"> <f>SUM(C2:D2)</f> <v>30</v> </c> </row> Pretty simple XML. Now, say we want to edit cell E2 and set a constant value of 40 in place of a formula. But instead of doing that with Excel 2007 interactively, we are going to do it manually: The corresponding valid (and carefully changed) XML for setting the constant value of 40 in cell E2 is: <row r="2" spans="3:5"> <c r="C2"> <v>10</v> </c> <c r="D2"> <v>20</v> </c> <c r="E2"> <v>40</v> </c> </row> Now open the file in Excel 2007. You get a blocking error message which says: to their dependencies. Suddenly, the little change we would like to make looks way more expensive. Rebuilding the graph of formulas ourselves is what Excel itself does, and sure enough it involves parsing the entire spreadsheet, discovering formulas, and applying formula parsing algorithms to induce a graph of the dependencies. It certainly sounds like we are going to have to rewrite a portion of Excel itself. Not every employer can afford waiting that much...Or perhaps that's Microsoft's way to tell us: you shall not touch this without our approbation. We can perhaps get rid of the calculation chain, if we carefully delete the part and associated relationship. But then, there are three problems: What this shows pretty clearly is that either we lack the tools, or Microsoft does not think we should be doing that in the first place. With that being said, if making a simple change to a cell is too much to ask, then what is this new format good for? The prospect of getting our recipients facing those dreaded message boxes is not exactly a change compared to the well known ugly stories with corrupted binary file formats. Let's play the devil's advocate now and see how far it will take us. Here is the contents of the calculation chain, xl/calcChain.xml: <?xml version="1.0" encoding="UTF-8" standalone="yes"?> <calcChain xmlns=""> <c r="E2" i="1"/> </calcChain> The reference to formula in cell E2 is what seems to be causing the problem. All right, then since it's just XML, let's remove that reference. Edit the calculation chain xl/calcChain.xml so it looks like this: <?xml version="1.0" encoding="UTF-8" standalone="yes"?> <calcChain xmlns=""> </calcChain> After the modification, if we open the file in Excel 2007, it still complains: I particularly like the wording catastrophic failure. Now it looks like a lot of blood is spilling. Well, then let's stop the hemorrhage and remove the contents of this part altogether. Make the update and open the file in Excel 2007, it continues to complain: I guess it's time to take a look at the ECMA 376 documentation. In Part 4, page 2087, it says (emphasis mine): 3.6.2 CalcChain (Calculation Chain Info)> I guess there we have it, we can't have a calculation chain part with no cell reference in it. Excel guts spilling through the specs here, doesn't it? Wait a minute, is this supposed to make into an international standard? Let's do a quick summary: we had Excel 2007 complain that the calculation chain was left with a reference to a formula that did not exist anymore, but in fact Excel 2007 complains even with this manually fixed. The solution is to delete the physical calculation chain part and the relationship it has with the workbook (defined in the workbook relationship part xl/_rels/workbook.rels), and to update some other parts as well. Let's get a visual diff of what it takes to make a "proper" change in a cell: Range("E2").Value = 40 We all take for granted that when we type a value such as 1234.1234 in a cell of a spreadsheet, that's what actually gets stored. Excel has this auto-number format matching capability where it tries to make sense of what is manually entered in order to deduce if that's a string, a number, a boolean, or a date, and applies a number format accordingly, but what's being stored as a value is what is entered. By the way, if you hit Alt+F11 in Excel, and enter something like Range("C3").Value and run the macro, you'll get the entered value in cell C3; if you enter something like Range("C3").Text, you'll get the formatted value in cell C3, where the number format has been applied to the value. Note that the return value takes advantage of the locale and number formatting, which means you may get "1234,1234" (note the comma) instead of "1234.1234". Is this storage neutrality true with the new formats? Here is a screenshot of what you should see at this point: The corresponding XML in the main part xl/worksheets/sheet1.xml is: <sheetData> <row r="2" spans="4:4"> <c r="D2"> <v>123456.123456</v> </c> </row> <row r="3" spans="4:4"> <c r="D3"> <v>12345.123449999999</v> </c> </row> <row r="4" spans="4:4"> <c r="D4"> <v>1234.1233999999999</v> </c> </row> <row r="5" spans="4:4"> <c r="D5"> <v>123.123</v> </c> </row> <row r="6" spans="4:4"> <c r="D6"> <v>12.12</v> </c> </row> </sheetData> The problem is that Excel 2007 does not store what we entered. If we read the XML, we are going to grab numbers that have rounding errors compared to the actual numbers we typed. Let's see how far the problem goes: Not only is there a rounding error, but its order of magnitude changes depending on the value. Ironically enough, if you entered 4321.4321, it would be stored as is, with no rounding error. It is absolutely lost on me how implementers are expected to deal with this mess. The spreadsheet does not reflect the proper values, and you can easily see where it goes. Imagine non-Microsoft applications used in healthcare and critical systems relying on the spreadsheet data. Not the decimal separator), therefore we have to assume this is all US English. If we wrote software in Excel VBA that grabs the value in cells then processes it, there is no way we could migrate our VBA code to work with this XML part without substantial rework. We are left with Excel's own international implementation artifacts, undocumented. Historically, the BIFF file format used in Excel spreadsheets was designed to be small and fast. But this design decision goes all way back to early 90s, when the Pentium CPU did not exist yet. Regular desktop computers we use everyday are at least several orders of magnitude faster and memory-friendly than those early computers were. Yet, Microsoft chose to keep those optimization artifacts as is, with the side effect that they are now exposed to the surface as part of the XML. Among interesting optimizations is Excel's insistence in trying to factor formulas as much as possible. This happens with Excel when you create a formula, then drag the cell to replicate it in other cells. That's shared formulas. Excel chooses to declare the formula itself only once, and then creates a mechanism to infer the formula in other cells (the relative position counts as an offset). Shared formulas are supposed to be transparent for developers. Is this true? <sheetData> <row r="4" spans="3:5"> <c r="C4"> <v>2</v> </c> <c r="D4"> <v>3</v> </c> <c r="E4" s="1"> <f>C4-D4</f> <v>-1</v> </c> </row> <row r="5" spans="3:5"> <c r="C5"> <v>2</v> </c> <c r="D5"> <v>3</v> </c> <c r="E5" s="1"> <f t="shared" ref="E5:E10" si="0">C5-D5</f> <v>-1</v> </c> </row> <row r="6" spans="3:5"> <c r="C6"> <v>2</v> </c> <c r="D6"> <v>3</v> </c> <c r="E6" s="1"> <f t="shared" si="0"/> <v>-1</v> </c> </row> <row r="7" spans="3:5"> <c r="C7"> <v>2</v> </c> <c r="D7"> <v>3</v> </c> <c r="E7" s="1"> <f t="shared" si="0"/> <v>-1</v> </c> </row> <row r="8" spans="3:5"> <c r="C8"> <v>2</v> </c> <c r="D8"> <v>3</v> </c> <c r="E8" s="1"> <f t="shared" si="0"/> <v>-1</v> </c> </row> <row r="9" spans="3:5"> <c r="C9"> <v>2</v> </c> <c r="D9"> <v>3</v> </c> <c r="E9" s="1"> <f t="shared" si="0"/> <v>-1</v> </c> </row> <row r="10" spans="3:5"> <c r="C10"> <v>2</v> </c> <c r="D10"> <v>3</v> </c> <c r="E10" s="1"> <f t="shared" si="0"/> <v>-1</v> </c> </row> </sheetData> In cell E5, we see a "ref" attribute where the shared formula range applies, a "si" attribute which identifies the shared formula range (itself redundant with the "ref" attribute), and the actual formula for that cell. But in cell E6, the cell below E5 in the grid, we see a definition with just a "si" attribute. In other words, cell E6 is linked to cell E5.ched because its "si" attribute now points to nowhere. Note that the situation isn't any better if we merely update the formula; by doing so, cell E5 is fine, but linked cells will reference the new formula, not the old one. So a simple change in cell E5 actually spreads unintentionally. It goes without saying that it's very expensive to make a simple change. That is a direct result of the optimization artifact. Someone willing to make a change cannot proceed without taking care of depending cells if the cell defines a shared formula range. The problem gets only bigger since we have to either remove the shared formula altogether in all cells, or translate the shared formula definition accordingly, which implies parsing the formula (the goal was only to make a change in a cell!) and making a number of offset changes, many of which are left for the user to discover (formula tokens are complex). To remove the shared formula, the actual formula definitions in linked cells have to be built, and that's where an algorithm has to find a way to create these, essentially rolling back Excel's optimization as a preliminary step. We have a case where an optimization artifact becoming an embarrassment, not a feature. Let's see how the situation compares to the old Excel binary file format (BIFF internal format is stored inside an OLE container). Here are the corresponding BIFF records: // BIFF : a shared formula, and cells linked to the shared formula [SHRFMLA 0015] 03 00 08 00 03 03 00 06 0B 00 4C 00 00 FE C0 4C 00 00 FF C0 04 [FORMULA 001B] 04 00 03 00 3E 00 00 00 00 00 00 00 00 40 08 00 05 00 03 FE 05 00 01 03 00 03 00 [FORMULA 001B] 05 00 03 00 3E 00 00 00 00 00 00 00 00 00 08 00 06 00 03 FF 05 00 01 03 00 03 00 [FORMULA 001B] 06 00 03 00 3E 00 00 00 00 00 00 00 F0 BF 08 00 07 00 03 FF 05 00 01 03 00 03 00 [FORMULA 001B] 07 00 03 00 0F 00 00 00 00 00 00 00 F0 3F 08 00 08 00 03 FF 05 00 01 03 00 03 00 [FORMULA 001B] 08 00 03 00 0F 00 00 00 00 00 00 00 00 C0 08 00 03 00 03 FF 05 00 01 03 00 03 00 // BIFF : same than above, made understandable [SHRFMLA 0015] (ref = 03 00 08 00 03 03) (formula = [currentrow][currentcolumn-2]-[currentrow][currentcolumn-1]) [FORMULA 001B] (cell row = 5 col = E) (formula is a link to the shared formula) [FORMULA 001B] (cell row = 6 col = E) (formula is a link to the shared formula) [FORMULA 001B] (cell row = 7 col = E) (formula is a link to the shared formula) [FORMULA 001B] (cell row = 8 col = E) (formula is a link to the shared formula) [FORMULA 001B] (cell row = 9 col = E) (formula is a link to the shared formula) With the Excel binary format, the design is right. The shared formula is defined outside a cell, so you can very simply remove the formula in cell E5 without breaking other cells. From a programming perspective, the new XML format qualifies as a regression compared to the binary file format. Contrary to what the ECMA 376 documentation says in many places, VML drawing parts are not deprecated at all. VML is in fact very pervasive in Word, Excel, and PowerPoint documents, so it's even more a blatant problem. In the ECMA 376 documentation, part 4, page 4343, we learn (emphasis mine): ] Here is a way to create a VML part in a new document: The corresponding XML in the drawing part xl/drawings/vmlDrawing1.vml is: <?xml version="1.0" encoding="UTF-8" standalone="yes"?> :203.25pt;margin-top:37.5pt;width:96pt;height:55.5pt;z-index:1; visibility:hidden" fillcolor="#ffffe1" o: <v:fill <v:shadow <v:path o: <v:textbox <div style="text-align:left"/> </v:textbox> <x:ClientData <x:MoveWithCells/> <x:SizeWithCells/> <x:Anchor> 4, 15, 2, 10, 6, 15, 6, 4</x:Anchor> <x:AutoFill>False</x:AutoFill> <x:Row>3</x:Row> <x:Column>3</x:Column> </x:ClientData> </v:shape> </xml> From a pure markup perspective, it is XML, but there are application-encoded values such as ="m,l,21600r21600,l21600,xe" and 4, 15, 2, 10, 6, 15, 6, 4 which contradict proper XML design,, <f eqn="prod #0 2 1"/> <f eqn="sum 21600 0 @1"/> <f eqn="sum 0 0 @2"/> <f eqn="sum 21600 0 @3"/> <f eqn="if @0 @3 0"/> <f eqn="if @0 21600 @1"/> <f eqn="if @0 0 @2"/> <f eqn="if @0 @4 21600"/> <f eqn="mid @5 @6"/> <f eqn="mid @8 @5"/> <f eqn="mid @7 @8"/> <f eqn="mid @6 @7"/> <f eqn="sum @6 0 @5"/> </formulas> </v:shape> If that is XML, then I propose writing C code the following way: =" int main(int argc, char** argv) { printf("Hello World\n"); return 0; } "/> </formulas> </v:shape> This is XML, right? There are angle brackets, it conforms to the XML W3C recommendation, therefore it's XML. VML also contains application-specific markup, with no documentation associated to it; for instance, in the example above, 4, 15, 2, 10, 6, 15, 6, 4. Because only Microsoft used this markup, there was no need to define it in its own namespace and so on. But now that VML is part of ECMA 376, either ISO accepts a vendor-specific markup, which defies the point of ISO standards in the first place, or it just contradicts ISO standards. The implication for an implementer, or for someone willing to make a change, is that there is no way someone can possibly edit this thing without a proper implementation of the VML library itself. The risk of corruption is extremely high. Obviously, Microsoft expects that VML parts are replaced by other VML parts as a whole, without a finer granularity. The problem is that VML too can contain references to objects and other parts, so that contradicts even a simple template scenario. VML is an old, undocumented library that speaks volumes of the past Microsoft lock-in strategy. Mr. Bill Gates in person sent in 1998 a memo to the Office product group (led by Steven Sinofsky at the time), memo undisclosed to the public thanks to the IOWA consumer. The undocumented VML library shipped in Internet Explorer 5 in 2000, and has been part of Internet Explorer ever since. The DAV protocol (Distributed Authoring and Versioning) is an international cross-platform standard, open to everybody. God only knows why Bill Gates likes so much VML, and dislikes so much DAV... For the record, the ECMA 376 documentation describes the VML markup, but it does not specify it. Much of application-defined behaviors are left for one to guess. The underlying architecture of how Zip entries relate together is called by Microsoft "open packaging conventions". What it means is that Zip entries are not independent, or even related by way of a single master Zip entry which would work as a directory of all Zip entries of relevance. There is a logical tree of entries which uses separate Zip entries to define relations between Zip entries. The logical tree has nothing to do with the physical tree of Zip entries in a package, despite Microsoft continuously using screenshots of Windows XP's built-in Zip folders to mimic a folder hierarchy. The problem with such an architecture is that a part may or may not relate to another and there is no standard way to know. Often, there is a r:id attribute right in the content of some XML part that tells the application that there is a relation, but this is not standard. By the way, Microsoft's PDF fixed format competitor called XPS is also based on the same underlying architecture, except that the team who developed XPS did not quite want to play by the same rules than the Office team. For instance, the XPS main Zip document entry is related to one or more XPS pages with an attribute such as: Source="Pages/1.fpage". In other words, they are not using the r:id attribute, instead relying on their own mechanism. This makes it impossible for a generic library to know which part relates to which part, and it has an unfortunate consequence. to internal chaos, instead of just copying the research from the OpenOffice project, where a central directory is used (OpenOffice Zip initiative predates Microsoft's by at least three years, despite Microsoft stealing the thunder). When you don't know the dependencies of a part, the consequence is obvious, you leave those parts alone. If you do this enough times, it clutters up the package, and soon enough you end up with a package containing any number of parts god only knows why they are there. Add to this, you can add a part of any content type (arbitrary MIME type), and you have a recipe for disaster. Among other things, virus could proliferate. Microsoft's deletePart() function which is available in their System.IO.Packaging library (itself part of .NET) does not solve this problem. We have a case of poor engineering, creating unnecessary problems for others to worry about. deletePart() An important ongoing tension with Office documents is the support for locales. Microsoft historically used a number of mechanisms to address this need, but they kept evolving and Microsoft aggregated all mechanisms to keep compatibility with older versions. What was hidden is being surfaced with the new XML. Anything that gets displayed, calculated, rendered, or stored depends one way or another on a complex and undocumented combination of locale settings including: the Office application language, the Office application language settings (per application), the Office document language settings (per document), the system locale of the Operating System. To save them time, Microsoft chose to store XML using the US English locale regardless of all settings above. This has an unfortunate consequence for implementers or those willing to make a manual change. Indeed, Microsoft is imposing everybody else to adapt to US English locale options (separators, date formats, formula conventions, ...) despite the fact that when using Office interactively, this fact is hidden to the user. The Office application infrastructure manages to abstract it away from users, which is a good thing. Office developers using VBA all over the world are used to working with localized functions, the complexity is hidden to them. But since the XML resurfaces this US English locale, all the complexity is left for one to implement. We are talking two decade worth of internationalization issues, for Office-related locale issues and Windows-related locale issues. To get an idea of how bad the situation is, suffice to say that a Microsoft employee part of the internationalization team in Windows has a blog where he posts daily horror stories. Also, for Excel formulas, it means the formula names are US English formula names, which you'll never see in Excel if you are using a locale version such as French or Brazilian. It's left for one to guess how to map function names one way to another, and of course the ECMA 376 documentation does not provide those localized formula names. If you intend not to implement a mapping to a locale, ideally your customer's locale, it implies you are willing to work with US English function names (plus US English separators, ...). If your company has invested in libraries or developed libraries in-house, they cannot be used anymore. Can it get any worse than that? Unfortunately, yes. Despite Microsoft's insistence to store everything using the US English locale, they still manage to store a number of contradicting country/encoding flags in the XML. Examples of that are DrawingML and VML languages. They store encoding tags for storing text chunks, but text chunks in the document itself does not use any such encoding tag. It is in fact entirely possible that DrawingML and VML are implementations which involve nothing localized itself but which store localized tags in the document, while the rest of languages (WordML, SpreadsheetML, ...) are implemented otherwise: their implementation is chockfull of encoding settings, but they need not store anything in the document itself. In other words, everything gets localized at run-time with WordML, SpreadsheetML, ... except DrawingML and VML. It's clear at this point that the legacy shows...One would have expected Microsoft to fix this once for all, providing a consistent framework. They chose not do so, and as a result, it's left for any implementer or someone willing to make a change to do the heavy lifting. What we are talking about here is entire internationalization implementation stacks which can represent years of work and stabilization. Ironically enough, you will not only have to implement this stuff (reverse engineering since it is not addressed by the ECMA 376 documentation), you will have to implement it in a way that reproduces current Office flaws. No matter how correct your implementation is, you have to retrofit it to work just like Office does. To get a flavor of non-US English within US-English (thereby violating ECMA 376's own rules), all you have to do is insert a chart: Here is an excerpt of the chart part xl/charts/chart1.xml: <c:chartSpace xmlns:c="" xmlns:a="" xmlns: <c:lang <c:chart> <c:title> <c:tx> <c:rich> <a:bodyPr/> <a:lstStyle/> <a:p> <a:pPr> <a:defRPr/> </a:pPr> <a:r> <a:rPr <a:t>Some title</a:t> </a:r> ... A reader of the article also mentions that within a strict US-English stream, you can get localized text formatting. Here is how: I am using a French version of Excel 2007. Here is an excerpt of the chart part xl/worksheets/sheet1.xml: <headerFooter> <oddHeader>&Ctrt&"-,Gras Italique"uiy tuieyrtui</oddHeader> </headerFooter> Gras and Italique are French for Bold and Italic. Just because I am using a French version of Excel 2007, the format produced inserts French localized fragments, therefore anyone willing to read Excel 2007 files in the most general case must be ready to parse non-US English. The ECMA 376 documentation says, in section 3.3.1.36, Part 4, page 1965 (emphasis mine): &. What is can be supposed to mean? Who reviewed this documentation? And where are the localized values to be expected? Reading the documentation, I have the feeling that: The extensiveness of the ECMA 376 documentation, over 6000 pages, is telling how much legacy Microsoft is willing to bring into the future. Taking an example of such legacy clarifies what it takes to implement even a portion of the documentation. The example is text formatting. Any of many ways to do text formatting. By "many ways" is meant different markup, sometimes drastically different: in one, you could have no country/encoding at all, and in another, it's cluttered up with country/encoding markup. If Microsoft were to design a general purpose Office document model (note: ECMA 376 is a description of one specific Office document: Microsoft's), they would have factorized all of this into a single text formatting markup. God only knows why they chose not to do so, keep all the legacy, and try to get away with this mess by making as little publicity as possible about it. Now enter the implementer, or someone willing to make a change to a document. There are three scenarios: The third scenario is just a combination of the others, so there is nothing interesting to say about it. The first scenario is the most simple. To write a document, of a given type, including a given set of objects (from shared languages or not), you only need to write the document in a way that is compatible with the expected XML. In other words, you can use only one text formatting markup model. It's you who decide which one, whether you implement one or more, and so on. So from a writer perspective, you don't suffer the problem very much. Now consider the second scenario. To read a document, you cannot assume what's in that document, therefore you've got to implement all possible combinations of objects that may be part of the document. In particular, you've got to implement all ways to get text formatting markup models because that may well be the XML you face. This is a horrible scenario. To support this scenario, either you are Microsoft, or you have a number of years of work ahead on the subject with plenty of implementation done already. There is no way around, the barrier to entry to this scenario is sky high. Of course, if you read a document, read the markup, and do nothing with it, or nothing of substance with it, it's not quite the same problem. But then, remember that even reading a small chunk of markup can be complicated because of the implicit semantics. You don't need a lot of XML markup to find yourself unable to process it in any meaningful way. To give you an example of how bad the situation is, here are four different Excel text formatting markup chunks, all meant to do the same thing (not entirely accurate here, but you get the idea): <xf numFmtId="0" fontId="2" fillId="0" borderId="0" xfId="0" applyFont="1"/><font><sz val="11"/><color theme="6" tint="-0.249977111117893"/><name val="Calibri"/><family val="2"/><scheme val="minor"/></font> > <c:rich><a:bodyPr/><a:lstStyle/><a:p><a:pPr><a:defRPr/></a:pPr><a:r><a:rPr<a:t>t t</a:t></a:r><a:r><a:rPr<a:solidFill><a:schemeClr<a:lumMod<a:lumOff</a:schemeClr></a:solidFill><a:uFill><a:solidFill><a:schemeClr<a:lumMod<a:lumOff</a:schemeClr></a:solidFill></a:uFill></a:rPr><a:t>ruiry</a:t></a:r><a:r><a:rPr<a:t>t gfgfgfg</a:t></a:r></a:p></c:rich> The beauty about a file format that is impossibly hard to read and update, and is decently easy to write from scratch, is that it fits perfectly in the read-only model that is exactly the reason why Microsoft has a monopoly in Office documents. As a side effect to its proprietary-ness (Office 2007 documents are extensions of ECMA 376 documents), it provides zero interoperability with anything else that exists. From a technical marketing perspective, you can always try to start a project that will support ECMA 376, but your chances to complete the project is exactly zero. You can hear about projects starting here and there, you can hear about programs that write documents that can be opened in Office 2007 (note that the only test that can be possibly be made is whether or not Office 2007 opens it, regardless of the flaws of the said program, regardless of the impedance mismatch between Office 2007 documents and ECMA 376 documents), but that is not evidence of progress in interoperability across applications and platforms, contrary to what the claims are. For instance, to this date, there isn't a computer program that perfectly mimics any of the old Microsoft Office versions 97-2000-XP-2003. It just does not exist. In addition to the impossibility of perfectly mimicking a complex and proprietary software, third parties that would go too far supporting the binary file formats would face the wrath of violating Microsoft intellectual property. Example: VBA macros. With Office 2007, Microsoft is bringing all of this forward for backwards compatibility reasons, therefore "opening up" changes nothing. What was proprietary is still proprietary, and barely referenced in ECMA 376. Microsoft uses all kinds of date types, not just from one Office application to next, but even at an library level, there are differences. Despite storing document metadata properties of type date in an ISO compatible format (metadata properties are, for instance, the creation date of the document), Microsoft insists on using their legacy date types elsewhere. Unfortunately, this has consequences. It's well documented elsewhere that the date type Microsoft uses for spreadsheets is basically flawed for a number of reasons. But what isn't often said is that the date type is actually the OLE date type. Here are the corresponding Windows OLE API functions: internally, and that's exactly the problem. The date type used in Excel, which is that one, is incompatible with everything else out there, platform-dependent, and undocumented (this documentation describes behaviors, but it does not specify the date type). If Windows dates were replaced by ISO dates, a dependency on Windows would be gone. So, to read a cell containing a date in a spreadsheet and make sense of it implies you are using one of these two OLE API function calls. Even better, there is no cell date type. A cell is either a string, a number, ... but a date is a number with no associated type. In fact, the only way to know the cell contains a date is to lookup and parse the number format that may be associated to that cell. And that's where you enter another black hole. Here is an example of number format: <numFmt numFmtId="171" formatCode="_-* #,##0.00\ _F_-;\-* #,##0.00\ _F_-;_-* "-"??\ _F_-;_-@_-"/> And another : <numFmt numFmtId="171" formatCode="[$-40C][Red][>120]_-* #,##0.00\ _F_-;\-* #,##0.00\ _F_-;_-* "-"??\ _F_-;_-@_-"/> The second one is particularly interesting, it says: use the French locale (40C), if the number is greater than 120, apply red, and do formatting as follows, with plenty of padding/layout special characters (described in the ECMA 376 documentation, but not specified). Implementing those undocumented patterns requires north of 10,000 lines of code, all subject to wild guesses and platform interoperability problems. An even more interesting bit is that the XML used in ECMA 376 departs in a number of non-standard ways compared to the XML produced by Excel 2003 (data-only XML). Let's make a comparison. Here is the relevant XML you'll see in xl/worksheets/sheet1.xml: <row r="3" spans="3:3" ht="15" customHeight="1"> <c r="C3" s="1"> <v>36902</v> </c> </row> If you are puzzled by what the value 36902 might be, its Excel's OLE date encoding! It is not possible to infer the cell contains a date. You have to explore the number format attached to style s="1" which in turn is described in another part of the package, xl/styles.xml: <cellXfs count="2"> <xf id="0" numFmtId="0" fontId="0" fillId="0" borderId="0" xfId="0"/> <xf id="1" numFmtId="168" fontId="0" fillId="0" borderId="0" xfId="0" applyNumberFormat="1"/> </cellXfs> In turn, numFmtId is defined in a separate collection of the same part xl/styles.xml: numFmtId <numFmts count="1"> <numFmt numFmtId="168" formatCode="\D\a\t\e\ \:\ d\ mmm\ yyyy"/> </numFmts> If you parse the proprietary encoding in the number format adequately, you might be able to infer it's a date. To compute the actual date involves more effort, obviously. Let's take a look at our Excel-2003 compatible XML: <Row ss: <Cell ss: <Data ss:2001-01-11T00:00:00.000</Data> </Cell> </Row> This old Excel 2003 XML is not nearly as bad as the one in ECMA 376. We can infer it's a date thanks to the ss:Type attribute. And, goodness, the date is encoded using ISO 8601, which is definitely a good thing for interoperability purposes. ss:Type The obvious question: why is the new XML a proprietary encoding, when Microsoft managed to ship Excel 2003 (this Excel 2003 XML can also be generated with Excel 2007) with dates supporting an international standard encoding, and no need to go into proprietary parsing? Why isn't SpreadsheetML an extension to the old Excel 2003 XML following the same good principles? In part 2 of ECMA 376, page 96, we learn: Table H–1. Package model conformance requirements M1.30 The package implementer shall name relationship parts according to the special relationships part naming convention and require that parts with names that conform to this naming convention have the content type for a Relationships part. M1.30 The package implementer shall name relationship parts according to the special relationships part naming convention and require that parts with names that conform to this naming convention have the content type for a Relationships part. In theory, this requirement allows unattended part renaming. But this means in practice that some process in the processing chain may reshuffle an entire package on its own, which may break assumptions from other processes of the processing chain. Interestingly enough, Excel 2007 takes it to heart to do this reshuffling. If you create a package with part names and relationships that perfectly conform to open packaging conventions as defined by ECMA 376 part 2, then this by no means! If you try to unzip it, you'll get an error. When you password-protect any Office 2007 document, it becomes an OLE document. Wait a minute, isn't Microsoft moving to Zip files? Here is a screenshot of what you should see in an OLE document viewer: If you roll-over your mouse on the file in Windows Explorer (note: behavior not tested on Windows Vista), you should get a flying tool-tip with just minimal information that is provided by the disk file system, but not the document metadata (author, subject, title, keywords, last modification date, ...). The OLE container contains a number of OLE streams. The document metadata is not available for consumption, meaning that you cannot retrieve this information either. This is a regression compared to binary file formats. In fact, there are two regressions: the document type changes; the metadata is not accessible. And the password-protection mechanism is undocumented as a whole. Let's see how exactly it compares to an old binary password-protected Excel file. If you roll-over your mouse on the file in Windows Explorer, you should get a flying tool-tip with all the information that is provided by the disk file system plus all the document metadata (author, subject, title, keywords, last modification date, ...) Indeed, if we open the xls file in an OLE document viewer, the file structure is kept intact, only the OLE document stream itself is encrypted (contains the encrypted BIFF content). The stream holding the metadata, ISummaryInformation, is left unencrypted. Here is a screenshot of a password-protected binary Excel file in an OLE document viewer: ISummaryInformation This has unfortunate consequences for Content Management Servers (CMS). By making the metadata of password-protected Office 2007 documents unavailable, existing CMS workflows are arbitrarily broken. By changing the content type of the document, only because it's password-protected, existing CMS workflows have another reason to break. Note: if Microsoft SharePoint Server, or Windows Vista, manages to show the metadata of a password-protected Microsoft Office 2007 document, perhaps it knows something that we don't... sheetProtection sheet Can you think of a worse document security? We have a format that encrypts buffers into OLE containers when it shouldn't, and leaves XML password hashes right in the Zip file in such a way that anyone can manually edit the file and remove it. When you consider the amount of professional spreadsheet workers out there relying on sheet protection to ensure the integrity of their spreadsheets, you have no idea the impact of this flaw when they learn it... There goes another regression with those formats. Note: the Excel binary format had a similar PASSWORD record stored on a per worksheet basis, but the big difference is that none of the target audience is able to edit a binary Excel file. It's binary, therefore it's a form of security by obscurity. And since binary files contain the said BIFF record. BIFF itself is platform-neutral, but of course OLE isn't. Anything stored within BIFF records referencing Windows-specific functions (such as the DEVMODE structure of printer settings) voids any platform-neutral claims. Every Excel release has its own BIFF-specific records. Those set of collective records are called BIFF8 for Excel 97, BIFF9 for Excel 2000, BIFF10 for Excel XP, and BIFF11 for Excel 2003. DEVMODE One of the claims from the introduction is that ECMA 376 documents are moving to Zip and XML exclusively. This implies that BIFF is gone. Let's see if that's true (emphasis mine). From: Doug Mahugh (Microsoft) Sent: August 21, 2006 To: Stephane Rodriguez Stephane,) (...) Doug Mahugh Office 2007 Technical Evangelist 425-707-1182 | MSDN Blog | OpenXmlDeveloper.org The subject of matter? This article. Ironically enough, to this date, the only article shedding a light on BIFF12 available on the internet is this article. Microsoft made no such document available. There is more than meets than eye. Besides the point that BIFF is actually not gone at all, an even bigger shocker is that BIFF12 is a departure from BIFF11. It's not an extension of BIFF11 with new BIFF records, it's a complete rewrite of all BIFF records, a new BIFF record model, and new content encoding. So any person who would have invested in a BIFF library (or grabbed it elsewhere) will have to redo that work from scratch. Where is backwards compatibility gone? According to Microsoft's Excel blog:. It's hard enough to understand that Microsoft Office is moving to XML, and still away from XML at the same time, but the official justification is performance related. Unfortunately, this justification is just a lie since it is already the justification for the extreme awkwardness of the SpreadsheetML XML file format itself. Someone from the Microsoft Office team has this to say about it: There are a number of things we looked into doing to help improve the performance of these files (SpreadsheetML) both using current technology as well as thinking about future approaches. Some of the approaches we took that are easiest to understand are: Reduce the need to fully parse repeating data - In order to cut back on parsing large strings repeated multiple times, or formulas that are repeated down an entire column, SpreadsheetML does a lot of sharing. I already talked about the huge benefits we can get from the shared formulas work in a post last spring. The shared string table can give similar results. Tag size - The size of XML elements actually does directly affect performance times. The more text you have to parse, the longer it will take. Splitting the XML into multiple parts - In SpreadsheetML, we break the XML content out into multiple parts in the Zip (each worksheet, the string table, pivot table data, etc.). This can help a ton with on-demand loading, or even loading multiple pieces at once. For example, it means that if you had a multi-proc machine, you could load each worksheet on a separate thread. It also means that you could decide to only load one sheet and you wouldn't have to parse through all the XML from the other sheets. Relationships stored outside of content - By storing all the relationships from one part to another in separate (and much smaller) files, it makes it really easy to see what other parts you should load when you are loading a particular part of the file. If it weren't for the relationships, you'd actually have to parse through the content of the XML to determine what other resources that part used. For example, if you wanted to just load one slide in a presentation, you can also see what images are used on that slide before you start parsing the XML for the slide. There are a number of things we looked into doing to help improve the performance of these files (SpreadsheetML) both using current technology as well as thinking about future approaches. Some of the approaches we took that are easiest to understand are: At this point, we are left with the obvious question, if the SpreadsheetML is made much more complex than we would have expected only to cope with performance problems, what is the rationale for the binary workbook (.xlsb)? Microsoft won't tell. There are two reasons however: To illustrate the first untold reality, suffice to create a new spreadsheet, and then query external data. As you do this, Excel 2007 creates a part called the connection data source part, where it stores the connection strings in plain text, among other things. It should be clear by now that connection strings contain sensitive information such as server names, login, and passwords. Oops! The quick Microsoft solution to this? Security by obscurity, just turn this stuff into binary records (BIFF12), and the problem goes away in theory. A similar problem with XML parts is that password hashes are stored in plain-text, as we've seen in the previous section, meaning that armed with a simple text editor, both password hashes and connection string passwords can be edited and/or removed. Vulnerabilities by design? The embarrassing fact for ECMA 376 is that since this is supposed to be XML only, the new binary workbook, despite being the official answer to the "plain-text" problem, cannot be part of said documentation otherwise automatically violating the claim that those documents are made with XML. Last but not least, a pseudo-rebuttal was posted to address the lack of availability of the BIFF12 documentation, a minor problem in comparison to the XML violation rules by the way. This pseudo-rebuttal was explaining that the documentation of binary formats can be freely obtained. Here is the corresponding article. In which we learn:. No right to create a competing product. As for whether Microsoft responds at all to any such documentation request, it remains to be seen. Last but not least, whether the documentations contain material that are required even for just analysis or forensic purposes remains to be seen. Microsoft used to distribute those documentations as part of the MSDN Library, until February 1998 (right when Mr. Gates had a pinch for Office documents viewed in Internet Explorer). Those documentations are incomplete, often just descriptive, and full of typos. In fact, just as the ECMA 376 documentation itself. Now enter BIFF11+. Yes, you heard that right! Microsoft created not just one new BIFF file format, it also took the time to extend BIFF11 (i.e., Excel 2003's BIFF file format) to include new BIFF records. What for? The reason is round-tripping of spreadsheets. Imagine you are creating a new Excel 2007 spreadsheet using some of the new features, such as the formatting databar (a bar chart drawn inside cells). Then save this file as. How can the databar show up at all in Excel 2007 since we went through two independent .xls writing phases (one with Excel 2007, one with Excel 97/2000/XP/2003)? You guessed it, new BIFF11+ records are created and preserved. None of that is documented, meaning that this round-trip scenario only works with Microsoft Office. It works as follows : To close up the discussion about BIFF, let's just take a look at an example of BIFF11+, actually just an excerpt from a file (in bold, the new BIFF11+ records): [DIMENSIONS 000E] 01 00 00 00 06 00 00 00 01 00 02 00 00 00 [ROW 0010] 01 00 01 00 02 00 2C 01 00 00 00 00 00 01 0F 00 [ROW 0010] 02 00 01 00 02 00 2C 01 00 00 00 00 00 01 0F 00 [ROW 0010] 03 00 01 00 02 00 2C 01 00 00 00 00 00 01 0F 00 [ROW 0010] 04 00 01 00 02 00 2C 01 00 00 00 00 00 01 0F 00 [ROW 0010] 05 00 01 00 02 00 2C 01 00 00 00 00 00 01 0F 00 [FLOAT 000A] 01 00 01 00 0F 00 00 00 24 40 [FLOAT 000A] 02 00 01 00 0F 00 00 00 34 40 [FLOAT 000A] 03 00 01 00 0F 00 00 00 3E 40 [FLOAT 000A] 04 00 01 00 0F 00 00 00 44 40 [FLOAT 000A] 05 00 01 00 0F 00 00 00 49 40 [DBCELL 000E] AA 00 00 00 50 00 0E 00 0E 00 0E 00 0E 00 [WINDOW2 0012] B6 06 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 [SELECTION 000F] 03 01 00 01 00 00 00 01 00 01 00 05 00 01 01 [00EF 0006] 00 00 37 00 00 00 [0867 0017] 67 08 00 00 00 00 00 00 00 00 00 00 02 00 01 FF FF FF FF 03 44 00 00 [089C 0026] 9C 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3C 33 00 00 00 00 00 00 00 00 [088B 0010] 8B 08 00 00 00 00 00 00 00 00 00 00 00 00 02 00 [0879 0022] 79 08 01 00 01 00 05 00 01 00 01 00 01 00 03 00 01 00 05 00 01 00 01 00 01 00 01 00 05 00 01 00 01 00 [087A 004C] 7A 08 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 01 01 00 03 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2A 00 00 01 0A 5A 02 00 00 00 FF 55 5A FF 00 00 00 00 00 00 00 00 02 00 00 03 00 00 [EOF 0000] We thought BIFF was gone, and in fact now we have BIFF11+ and BIFF12. Great progress on the interoperability front... Here is a simple chart created with Excel 2003. Open it with any of Excel 97/2000/XP/2003, then open it in Excel 2007. Microsoft said they could not change the internal structure of Excel spreadsheets (and other Office document types) because they had to provide 100% full fidelity otherwise their customers would not want it. Is this true? The differences are: <sarcasm>Programs used by hundreds of millions people need no special attention, that goes without saying....</sarcasm> Good luck programming charts. Microsoft provides no documented mapping between the Escher library (pre-Office 2007 era) and the DrawingML+VML libraries (Office 2007 era, before it gets dropped to something else in the future). Is there possibly a reason why? Answer: Microsoft has dropped the existing chart drawing engine in favor of a new library. It is impossible in practice to rewrite a library with new source code, a new agenda (visual candy), and manage to get 100% full fidelity with the past. This results in improper drawing of existing charts. Which means, in other words: Last but not least, ECMA 376 documents just do not exist. The reason why is manifolds: When I wrote this article, I wanted it to focus on Microsoft Office XML formats exclusively, but Microsoft apologists out there running out of arguments to find a justification as to why Microsoft Office XML formats are that bad, turned to the typical rhetoric, started sending piques at the ISO OpenDocument format (ODF). I thought, well, let's do a quick comparison on all the points above. Results are as follows: ODF : 1, ECMA 376 : 0 ODF : 2, ECMA 376 : 0 ODF : 3, ECMA 376 : 0 <office:annotation office:display="true" draw:style-name="gr1" draw:text-style-name="P1" svg:width="2.899cm" svg:height="0.596cm" svg:x="7.374cm" svg:y="0.307cm" draw: <dc:creator>sr</dc:creator> <dc:date>2007-09-02T00:00:00</dc:date> <text:p text:some comment</text:p> </office:annotation> This is proper XML, one value per attribute, the fragment is full in-context in the stream. Plus, you can grab an existing SVG library to make sense of the XML, no need to implement a single vendor's soup. ODF : ODF : 12, ECMA 376 : 2 To better cope with those problems, ECMA 376 will have to be redesigned to something that is pretty much what ODF does. Why isn't Microsoft extending ODF instead of reinventing a bad wheel? Customers would benefit a great deal of a single standard. -Stéphane Rodriguez, August 2007Independent software vendor, file format expertNot affiliated to any pro-MS or anti-MS party/org
http://www.codeproject.com/Articles/20246/Microsoft-Office-XML-formats-Defective-by-design?fid=453420&df=7&mpp=50&noise=1&prof=True&sort=Position&view=Thread&spc=Relaxed&select=2211556
CC-MAIN-2014-15
refinedweb
8,530
58.01
The example given is for number how can i change it to letters? Our assignment is pretty simple but i can't find it on the book. Im stuck “Read” in characters and display the character until the “z” character is entered (“read”) /* Guess a number between 1 and 10 Anderson, Franceschi */ import java.util.Random; import java.util.Scanner; public class GuessANumber { public static void main( String [ ] args ) { Random random = new Random( ); int secretNumber = random.nextInt( 10 ) + 1; Scanner scan = new Scanner( System.in ); System.out.print( "I'm thinking of a number" + " between 1 and 10. What is your guess? " ); int guess = scan.nextInt( ); if ( guess < 1 || guess > 10 ) { System.out.println( "Well, if you're not going to try," + " I'm not playing." ); } else { if ( guess == secretNumber ) System.out.println( "Hoorah. You win!" ); else { System.out.println( "The number was " + secretNumber ); if ( Math.abs( guess - secretNumber ) > 3 ) System.out.println( "You missed it by a mile!" ); else System.out.println( "You were close." ); System.out.println( "Better luck next time." ); } } } }
http://www.javaprogrammingforums.com/java-theory-questions/5160-assignment-display-character.html
CC-MAIN-2013-20
refinedweb
173
62.75
This is the 3rd part in a short series on cryptography in .NET. In the previous 2 articles I covered using Symmetric algorithms like AES and Asymmetric algorithms like RSA. In this section I want to cover random number generation and hashing. This will lead into the final article which will be about combining cryptographic primitives to create hybrid encryption protocols. The primitive I want to discuss is generating cryptographically strong random numbers. This is useful if you want to generate random session keys for AES for example. To generate a random number you use the RNGCryptoServiceProvider class in .NET. Once you have constructed the object you just call GetBytes() and pass in the length in bytes of the random number you want to generate. public class RandomNumberGenerator { public byte[] Generate(int length) { using (RNGCryptoServiceProvider randomNumberGenerator = new RNGCryptoServiceProvider()) { byte[] randomNumber = new byte[length]; randomNumberGenerator.GetBytes(randomNumber); return randomNumber; } } } The other option for generating random numbers is using the Random class which for a lot of purposes is fine, but the quality of pseudo random numbers is not as good as using RNGCryptoServiceProvider, making the latter better for cryptographic purposes, but you do pay a price for performance. As a quick test I created a loop that calls each implementation 10 times. RNGCryptoServiceProvider.GetBytes() took around 2800ms and Random.Next() took around 9ms. The 2nd primitive I want to discuss is that of hashing and SHA-256 in particular. A cryptographic hash function is an algorithm that takes an arbitrary block of data and returns a fixed-size string, the (cryptographic) hash value, such that any (accidental or intentional) change to the data will change the hash value. The data to be encoded. Another way of thinking of a hash function is that of creating a unique fingerprint of a piece of data. Generating a hash digest of a block of data is very easy in .NET. There are various algorithms you can use like MD5, SHA1, SHA256, but for this article I will focus on SHA256 as that is probably the most common one used these days. Just like with the cryptographic random number generation, the code to hash some data is very straight forward. public class SecureHash { public byte[] ComputeHash(byte[] toBeHashed) { using (SHA256 sHA256 = SHA256Managed.Create()) { return sHA256.ComputeHash(toBeHashed); } } } The ComputeHash() method of the SHA256 class simply takes a byte array of your data to be hashed and then outputs another byte array with the hash (or unique finger print). If you was to change even just a single bit of the data being passed into the ComputeHash() method then the calculated digest would be different. A common use for a hash is to check the integrity of data being passed over a network. Before sending some data you calculate and send a hash. Then when the recipient receives the data you recalculate the hass on the received data and make sure it matched the original hash. If it doesn’t then the data was changed or corrupted on transit. Hashes are also commonly used for storing passwords in databases. Instead of storing the actual text of a password you store a hash instead. Then any application that wants to authenticate a password just has to calculate the password has first and then compare it to that stored in the database. That concludes this article on generating random numbers and calculating hashes. In the next instalment I shall discuss using these different cryptographic primitives to create what is known as a hybrid encryption algorithm. Cheers Steven 🙂 I knew the random generator was there, but I couldn’t find the docs, my previous code or the saved book marks I had, then your article popped up on the first page of my Google results… Shawty Glad it was useful 🙂 I explain a lot of this in more detail in my book for Syncfusion which should hopefully be out within the next 2 to 3 weeks.
https://stephenhaunts.com/2013/05/12/cryptography-in-net-random-numbers-and-hashes/?shared=email&msg=fail
CC-MAIN-2021-43
refinedweb
657
52.29
A Vue component to display tabs Last week my company released a vue-tabs-component, a quality Vue component to easily display tabs. You can view a demo of the component here. In this post I’d like to tell you all about it. Why we created it If you’re just want to know what the component does, skip to the next section. Nearly all projects we deliver are powered by Blender, our Laravel application template. Blender has an admin section where users can manage content. For every content type it provides a crud interface. Nothing special there. But sometimes those content type can be pretty complex and have many many fields. Instead of displaying all the fields at once we put fields that belong in their own tap. So their might be a tab “Content” with some general fields, a tab “Media” with everything regarding images and uploads, … This tab behaviour is provided by some custom JavaScript. Currently the JavaScript used in Blender is a bit of a patchwork. Because we nowadays use quite a bit of Vue in client projects we decided to make Vue a first class citizen in the admin section as well. We’re currently searching an building Vue components to use in Blender. The tabs component is the first one that we finished building. Though it’s a bit opinionated towards our use case, the component was generic enough to open source. Introducing vue-tabs-component If haven’t already done so, head over to the demo page to get a feel of what the component can do. If you can registered the component globally like this: //in your app.js or similar file import Vue from 'vue'; import {Tabs, Tab} from 'vue-tabs-component'; Vue.component('tabs', Tabs); Vue.component('tab', Tab); you can use this piece of html to render the tabs like they are displayed on the demo page. <tabs> <tab name="First tab"> This is the content of the first tab </tab> <tab name="Second tab"> This is the content of the second tab </tab> <tab id="oh-hi-mark" name="Custom fragment"> The fragment that is appended to the url can be customised </tab> <tab prefix="<span class='glyphicon glyphicon-star'></span> " name="Prefix and suffix" suffix=" <span class='badge'>4</span>"> A prefix and a suffix can be added </tab> </tabs> Easy right? The component doesn’t come with any styling. If you like the pretty looks of our the demo, you can snatch the css used on GitHub. Some nice features The component will use the fragment of the url to choose which tab to open. So clicking navigating to will display the contents of the tab named Second tab. The component will also remember which tab was opened previously. If you reload without fragment the tab that is currently active will receive focus again. You’ll find more about this feature on Github. The rendered output of the component adheres to the ARIA specification. Aria stand for “Accessible Rich Internet Applications” and describes which attributes html nodes should have in order to make the component accessible to people with disabilities Testing the component If you look at the source code of the projects you’ll notice that has a test suite to make sure it works properly. Want to know more about how those tests are set up? Then head over the dedicated blogpost on those tests. In closing Head over the repo on GitHub to learn more about the component. Though our focus in open source is more creating on Laravel and PHP framework agnostic stuff, take a look at these other JavaScript packages we’ve previously made.
https://medium.com/@freekmurze/a-vue-component-to-display-tabs-dc48375f2088
CC-MAIN-2018-22
refinedweb
614
71.55
Using the internet archive to crawl a website If a website is offline or restricts how quickly it can be crawled then downloading from someone else’s cache can be necessary. In previous posts I discussed using Google Translate and Google Cache to help crawl a website. Another useful source is the Wayback Machine at archive.org, which has been crawling and caching webpages since 1998. Here are the list of downloads available for a single webpage, amazon.com: Or to download the webpage at a certain date: The webscraping library includes a function to download webpages from the Wayback Machine. Here is an example: from webscraping import download, xpath D = download.Download() url = '' html1 = D.get(url) html2 = D.archive_get(url) for html in (html1, html2): print xpath.get(html, '//title') This example downloads the same webpage directly and via the Wayback Machine. Then it parses the title to show the same webpage has been downloaded. The output when run is: Amazon.com: Online Shopping for Electronics, Apparel, Computers, Books, DVDs & more Amazon.com: Online Shopping for Electronics, Apparel, Computers, Books, DVDs & more
https://webscraping.com/blog/Using-the-internet-archive-to-crawl-a-website/
CC-MAIN-2019-18
refinedweb
184
59.8
Background If you know me, then you know that I’m an avid tester. It could even be argued that I test too extensively as part of my day-to-day development, but that’s a post for another day. On a recent project, a particular view started failing with the error: AttributeError: 'ContextList' object has no attribute 'get' I wasn’t happy with just changing the tests to work again, so I dug down into why they started failing. TL;DR To get a value from a Context object returned by the Django Test Client, then it’s better to use the [] operator than the get method. For example: # In a test, after doing response = self.client.get(reverse('home')) # ... then it's better to use [] to test the context self.assertEqual(response.context['name'], 'Homer') # ...than to use get self.assertEqual(response.context.get('name'), 'Homer') Reason It turns out that the problem was to do with a developer on the project changing how the template for the view was generated. They changed a view that was using a single template, to a couple of templates using Django’s template inheritance and the extends template tag. This then effects how Django’s test client returns the Context object for inspection. To test this I prepared the following test: from django.core.urlresolvers import reverse from django.test import TestCase class Tests(TestCase): def test_get(self): response = self.client.get(reverse('home')) self.assertEqual(response.context.get('name'), 'Homer') def test_operator(self): response = self.client.get(reverse('home')) self.assertEqual(response.context['name'], 'Homer') The home view was just a simple template renderer: from django.shortcuts import render def home(request): return render(request, 'home.html', {'name': 'Homer', }) Simple works When the ‘home.html’ template is a simple template with no inheritance (it can be completely empty), then both tests pass. ‘home.html’ template code: <p>Hello World</p> Test run: ./manage.py test Creating test database for alias 'default'... .. ---------------------------------------------------------------------- Ran 2 tests in 0.027s OK Destroying test database for alias 'default'... Template inheritance fails with get Now adjust ‘home.html’ to extend another template ‘base.html’ which has arbitrary contents. New ‘home.html’ template code: {% extends 'base.html' %} <p>Hello World</p> Test run: ./manage.py test Creating test database for alias 'default'... E. ====================================================================== ERROR: test_get (mini.tests.Tests) ---------------------------------------------------------------------- Traceback (most recent call last): File "/home/james/active/mini/mmm/mini/tests.py", line 9, in test_get self.assertEqual(response.context.get('name'), 'Homer') AttributeError: 'ContextList' object has no attribute 'get' ---------------------------------------------------------------------- Ran 2 tests in 0.029s FAILED (errors=1) Destroying test database for alias 'default'... So the test_get case, which was using get failed.
http://jamescooke.info/django-contexts-and-get.html
CC-MAIN-2017-39
refinedweb
448
60.41
This is the first article in the series How to Write a Custom Powershell Cmdlet. I will try to keep these articles to the point without missing any important details. I will elaborate on things that are not very clear in the Microsoft documentation or may be missing. For most part, Microsoft has done a wonderful job of documentation for the programmer's SDK for PowerShell programming. The first step in writing a PowerShell cmdlet is to pick what you want your cmdlet to do. What is the value that this cmdlet is going to add? Microsoft has already provided a lot of cmdlets that facilitate system management and administration. As you will use PowerShell more and more, you will find out that there are a lot of other things that you can do with the PowerShell piping architecture. I will not go into the details of the uses of PowerShell, other than system management or administration, in this article. That will be the discussion for another day. In this article, I will explains the steps that you will need to put together to write a PowerShell cmdlet. I am writing a cmdlet to automate the testing of a search engine API. And, in the process of writing the test automation for the API, I realized that I can use this cmdlet to perform a lot of searches just by using PowerShell instead of using the GUI. And, taking advantage of the Where-Object cmdlet, I can pipe the results of my cmdlet to it and filter the results. See how easy it is to put together a quick Use Case of a custom PowerShell cmdlet and use it to ease a lot of tasks. Well, I can't publish the cmdlet that I am developing for my search engine. But I thought I will write a cmdlet to search Amazon.com from PowerShell. So, I will develop my cmdlet on top of my C# API for Amazon.com. The first step is to write a class that will implement the heart of your cmdlet. For this basic article and cmdlet, I will not go into the details of if you should be deriving your class from Cmdlet or PSCmdlet. For most cases, you will be deriving your class from Cmdlet unless you are developing a cmdlet that requires access to the PowerShell runtime or need to perform some complex tasks related to the runtime. Picking the name of your cmdlet is very important. Your class name comprises of two parts: Verb and Noun. The Verb defines the action that this cmdlet will perform, and the Noun defines the object on which the Verb acts. For example, for my cmdlet, I want to search books in Amazon.com. So, the Verb for my class is "Search" or "Get", and the Noun is "Book". So I have created a class named GetBookCommand. You must be asking why I did not call it GetBooksCommand. As per Microsoft naming guidelines, to keep names consistent, avoid the use of plurals on nouns. Cmdlet PSCmdlet GetBookCommand GetBooksCommand public class GetBookCommand : Cmdlet {...} If your cmdlet can perform its action without using any input parameters, there is nothing that you need to do. But, if you need input parameters, then, you need to define the properties in your class for those parameters. And, the most important part of defining properties is naming them. Microsoft has provided some guidelines for naming the properties so that your cmdlet is consistent with all other cmdlets. See the Cmdlet Parameter Names guideline by Microsoft for more details. One thing you need to decide is what parameters are mandatory and what are optional for the execution of your cmdlet. This is where the use of the Parameter attribute on your property will be important. This attribute class has properties that you can use to fine tune the use of a parameter. For example, if you want to mark your parameter to be mandatory, you can set the Mandatory property of the attribute. I will demonstrate this with the use of this attribute in my cmdlet. For the operation of my Get-Book cmdlet, it is absolutely mandatory that the user provides the following four command line parameters: Parameter Mandatory Get-Book AssociateTag AccessKey SearchTerm Count So, I defined properties in my cmdlet class for these values, and put attributes on them to mark them as mandatory. The following code snippet shows the definition of the AssociateTag property. [Parameter(Mandatory = true, HelpMessage="Specify associate tag issued by Amazon.com")] [ValidateNotNullOrEmpty] public string AssociateTag { get { return _associateTag; } set{ _associateTag = value;} } Notice the use of the Manadatory and HelpMessage properties on the attribute. Also notice the use of the ValidationNotNullOrEmpty attribute. You can use validation attributes to allow the PowerShell runtime to validate a user's input. Manadatory HelpMessage ValidationNotNullOrEmpty There are four methods that you can override to execute your cmdlet: BeginProcessing, ProcessRecord, EndProcessing, and StopProcessing. Most cmdlet implementations only need to worry about the ProcessRecord method. This is where you will manipulate your input objects and write them to the output. But, if your cmdlet requires some pre-processing or needs some initialization, you can override the BeforeProcessing method and do your work there. For example, if you are implementing a cmdlet that needs to open connections with a database before taking any action, you can do that in BeginProcessing. And, if you need to do some clean up after record(s) are processed, you can implement the EndProcessing method and do your clean up there. For example, if you have opened a database connection in your cmdlet, you can always implement the clean up in EndProcessing. The implementation of StopProcessing will be important if you have some resources open in your cmdlet that need clean up. If for some reason, the user decides to cancel or stop your cmdlet, then this method will give you a chance to clean up. Otherwise, you will have leaked resources. The following code snippet shows how I did an override on the BeginProcessing method to perform search. In the actual implementation, I have put a method to check if the target location of the search data is available of not. If the target URL is down, there is no need to go any further. BeginProcessing ProcessRecord EndProcessing StopProcessing BeforeProcessing protected override void BeginProcessing() { base.BeginProcessing(); CreateDataAPI(); ExecuteSearch(); } The PowerShell runtime will call the ProcessRecord method of your cmdlet to allow you to send objects of your cmdlet to the output. This is the place where you can put together an implementation to gather records that you need to display and then call WriteObject to send them to the output. There are other ways to send to the output as well. But, for this article, I will keep the implementation simple and call the WriteObject method to allow the PowerShell runtime to take care of the rendering of my record. WriteObject protected override void ProcessRecord() { base.ProcessRecord(); foreach (Book book in _books) { WriteObject(book); } } That is the end of the implementation of your cmdlet. You can see how easy it is. I will write about how to register your cmdlet with PowerShell and other good stuff in my next article. In the mean time, you can download the whole implementation of this cmdlet from the following.
http://www.codeproject.com/Articles/32999/How-to-Write-a-Custom-PowerShell-Cmdlet-Part-I
CC-MAIN-2016-26
refinedweb
1,219
62.48
might be a disk storing someone's /home that's in trouble. But usually it's just some USB device (phone, Mp3-player, camera) pretending to be a disk (often rather less than successfully). Quite often the user plugged it in just to recharge its batteries, and isn't even interested in transferring data. (That raises other issues. Linux may auto-mount it. Does the subsequent un-plug without dismount create any significant risk of data-corruption, ot just annoyingly logged errors? ) Anyway, when logging an error, it woud be a godsend if instead or as well it could tag the message with something like the device model and serial number (as revealed by smartctl -i), or at the very least say that it's attached to USB port x or SATA port n or whatever. It was actually easier when disks were usually hdx and USB devices sdx! User-friendly disk names Posted Jun 23, 2011 12:01 UTC (Thu) by jengelh (subscriber, #33263) [Link] Udev to the rescue, see /dev/disk/by-path! (Because that is what hdx reflected in a way.) Posted Jun 23, 2011 23:43 UTC (Thu) by giraffedata (subscriber, #1954) [Link] But we're talking about kernel device names, not names of device special files. When the kernel warns about errors on a disk device, it identifies it by kernel device name and udev is irrelevant. Except with at least some of these proposals, where udev could give the kernel a more meaningful name to use in communicating with the user. The "sdaq" naming is really just a waste of a namespace. The kernel might as well talk to you in major/minor numbers. Posted Jun 30, 2011 8:32 UTC (Thu) by zdzichu (subscriber, #17118) [Link] # ls -lR /dev/disk/by-* | grep sdc1 lrwxrwxrwx. 1 root root 10 06-22 09:36 ata-ST3250820AS_6QE0XHAV-part1 -> ../../sdc1 lrwxrwxrwx. 1 root root 10 06-22 09:36 scsi-SATA_ST3250820AS_6QE0XHAV-part1 -> ../../sdc1 lrwxrwxrwx. 1 root root 10 06-22 09:36 pci-0000:00:1f.2-scsi-3:0:0:0-part1 -> ../../sdc1 lrwxrwxrwx. 1 root root 10 06-22 09:36 4e11c761-2597-4b20-8e86-b9eac0a665d0 -> ../../sdc1 I'm sure there is some "udevadm info" invocation which will do the same and even provice more info. Posted Nov 13, 2011 14:26 UTC (Sun) by Baylink (subscriber, #755) [Link] This planning treads much the same ground as the best writeup I found on the topic:... and indeed, that gent's userspace approach may well belie the arguments of those who say this needs to be kernel-side, all by itself. Posted Jun 23, 2011 12:30 UTC (Thu) by cladisch (✭ supporter ✭, #50193) [Link] Data corruption happens only when some cached data was not completely (i.e., partially or not at all) written to the device. As long as the user (or his desktop environment) did not actually try to write anything, everything should be fine. Furthermore, all these devices use FAT(32), and that FS is so simple that a partially written file usually does not affect the data structures of other files. Linux is a registered trademark of Linus Torvalds
http://lwn.net/Articles/448922/
CC-MAIN-2013-20
refinedweb
526
62.78
GameFromScratch.com In the previous tutorial part we looked at working with a single Sprite. Reality is, very few games are composed of singular sprites. UI’s are made up of a number of different sprites, animations are composed of several different frames, each composed of a single image. Loading hundreds of individual textures is not good for performance. A very common solution is to use a texture atlas ( or sprite sheet ). Fortunately Xcode make it extremely easy. We are going to use the same sprite we did in the previous tutorial, you can download it here. As you can see, it’s actually a zip file containing a number of png images: Extract the zip file and rename it jet.atlas. Now in Xcode, in Project Navigator, right click your project and select Add to Project Select the directory ( not the files ) and click add. Defaults should be ok, but make sure it’s set to copy. And you are done. The following code: import SpriteKit class GameScene: SKScene { override func didMoveToView(view: SKView) { var sprite = SKSpriteNode(imageNamed:"sprite4") sprite.xScale = 4 sprite.yScale = 4 sprite.position = CGPoint(x:0,y:0) view.scene!.anchorPoint = CGPoint(x: 0.5,y: 0.5) self.addChild(sprite) } } Will load the sprite from the Atlas that had the file name “sprite4.png”. NOTE HOWEVER, if you add an image named sprite4 to your project, it will be loaded instead of the Texture Atlas. So, what exactly did Xcode do? We behind the scenes, it went ahead an combined all of your images together into a single OpenGL optimized image, and created a reference file telling SpriteKit how to access it. Let’s take a look at the results. First, build your game. Select Product->Build For->Running You should now have a Products folder in your project. Right click the .app file for your project and select Show in Finder: Now right click the .app file and select Show Package Contents: Navigate into contents->resources->jet.atlasc and you will see two files, one is an image, the other a plist. Let’s look at the image first: That’s out images smash together in a power of 2 friendly texture that your GPU can handle efficiently. The plist file: This plist shows SpriteKit how to access each individual image within the larger image. To you however the process is pretty transparent. Basically group all common images together in a directory. Give the directory a .atlas name and add it to your project, then access each image as you would normally. Sometimes however you may want to access the TextureAtlas itself. You can do that as well, let’s take a look at how: let textureAtlas = SKTextureAtlas(named:"jet.atlas") var currentTexture:Int = 1; let sprite=SKSpriteNode(texture:textureAtlas.textureNamed("sprite1")) sprite.xScale = 8 sprite.yScale = 8 override func keyDown(theEvent: NSEvent!) { // On any key press move to the next texture var sprite = self.scene.children[0] asSKSpriteNode switch currentTexture { case 1: sprite.texture = textureAtlas.textureNamed("sprite2") case 2: sprite.texture = textureAtlas.textureNamed("sprite3") case 3: sprite.texture = textureAtlas.textureNamed("sprite1") default: break } ++currentTexture if(currentTexture > 3) { currentTexture = 1 Now run it, and each time you press a key it will advance to the next frame. First let me stop right here and make one thing perfectly clear… THIS IS NOT HOW YOU DO ANIMATION! :) We will cover animation later. This was just a small code segment to illustrate how to access a TextureAtlas directly. As you can see, it’s as simple a matter as creating an SKTextureAtlas and passing in the file name. You can then access each individual SKTexture within the atlas using textureNamed passing in the file name you used for the original image in the atlas directory. As you can see, you do not need to pass in the file extension. Here we see a Swift switch statement in action. Switch statements are important to Swift and quite capable. You can switch on Ints like we have done here, but you can also use strings. It is tempting to use the sprite name here, but an important thing to realize is the SKSprite name is NOT the same as the SKTexture name. Unless you manually name the sprite, it will be nil. Unlike C++, case statements in Swift do not fall through, so you do not need to provide a break statement for each case. However, there are two caveats to be aware of. First, every single possible value must be handled. If you don’t want to handle every possible value you can provide a default handler which will catch everything else. However each case ( even default ) must contain at least one executable statement, thus the break in default. This only scratches the surface of switch… you can also specify multiple values in a case using commas, provide ranges using the .. and … operators, etc. That’s it for TextureAtlases, on to the next part! iOS, 2D, Engine
http://www.gamefromscratch.com/post/2014/06/16/Game-development-tutorial-Swift-and-SpriteKit-Part-3-Texture-Atlases.aspx
CC-MAIN-2017-26
refinedweb
831
67.55
in reply to Checking Wrong Condition The regex you used are not matching, are your if statements in a subroutine? If not why use a 'return' However, the code below could guide you: use warnings; use strict; die "Enter proper CLI arugments: ......." unless @ARGV == 2; ## check your arguments passed from CLI my ( $num1, $num2 ) = show_now(@ARGV); print $num1, "\t", $num2, $/; sub show_now { my ( $inp1, $inp2 ) = @_; print "inp1 is $inp1 inp2 is $inp2\n"; my ( $opt1, $value1, $opt2, $value2 ) = ""; if ( $inp1 =~ /rel=.+?/i ) { ## changed the regex ( $opt1, $value1 ) = split( /=/, $inp1 ); } if ( $inp2 =~ /file=.?+/i ) { ## changed the regex ( $opt2, $value2 ) = split( /=/, $inp2 ); } if ( $inp1 !~ /rel=.+?/i or $inp2 !~ /file=.+?/i ) { print "\n[Error] - Wrongly passed the parameter.\n"; print " Please use correct format as below\n"; print "\n[Example] - <scriptname> rel=<release> file=<file_name>(\$script_na +me rel=102b file= ccmsg.1)\n\n"; #exit; ## not really needed } return ( $value1, $value2 ) if wantarray(); } [download] Hope this helps.
http://www.perlmonks.org/?node_id=967025
CC-MAIN-2017-26
refinedweb
155
64.41
Initializes the random number generator state with a seed. The random number generator is not truly random but produces numbers in a preset sequence (the values in the sequence "jump" around the range in such a way that they appear random for most purposes). The point in the sequence where a particular run of pseudo-random values begins is selected using an integer called the seed value. The seed is normally set from some arbitrary value like the system clock before the random number functions are used. This prevents the same run of values from occurring each time a game is played and thus avoids predictable gameplay. However, it is sometimes useful to produce the same run of pseudo-random values on demand by setting the seed yourself. You might set your own seed, for example, when you generate a game level procedurally. You can use randomly-chosen elements to make the Scene look arbitrary and natural but set the seed to a preset value before generating. This will make sure that the same "random" pattern is produced each time the game is played. This can often be an effective way to reduce a game's storage requirements - you can generate as many levels as you like procedurally and store each one using nothing more than an integer seed value. using UnityEngine; using System.Collections; public class ExampleClass : MonoBehaviour { private float[] noiseValues; void Start() { Random.InitState(42); noiseValues = new float[10]; for (int i = 0; i < noiseValues.Length; i++) { noiseValues[i] = Random.value; Debug.Log(noiseValues[i]); } } } Did you find this page useful? Please give it a rating:
https://docs.unity3d.com/ScriptReference/Random.InitState.html
CC-MAIN-2019-09
refinedweb
268
55.34
The Right MovesTips and tricks for using the Popfly Game Creator Evolution Platform Developer Build (Build: 5.6.50428.7875)2008-05-02T11:30:00ZPopfly Game Engine updated to run on Windows Phone 7 Series<p><a href=""><img style="border-bottom: 0px; border-left: 0px; display: block; float: none; margin-left: auto; border-top: 0px; margin-right: auto; border-right: 0px" title="KillThePeas-WindowsPhone7Series" border="0" alt="KillThePeas-WindowsPhone7Series" src="" width="125" height="244" /></a> </p> <p>It’s been a while since my last post as the new projects I’m working on are still not publicly released.  However, last night I spent some time updating the Popfly Game Engine project on codeplex to get Popfly games running on Windows Phone 7 Series:</p> <p><a href=""></a></p> <p>It took about two hours from downloading the <a href="">tools</a> released at <a href="">MIX</a> to having <em>Kill the Peas! </em>up and running on the included emulator (see above).  That includes some time spent reading documentation, digging up the game code for Kill the Peas and figuring out conditional compilation in C# (I’m a C++ guy - #if?? #ifdef all the way).  </p> <p>So, what did it take?  The answer is: not much.  They really did include essentially the full Silverlight runtime minus the browser / scripting integration classes.  So strictly speaking, the only real change I had to make was to create a new project, include the files and replace some includes of the System.Windows.Browser namespace with System.Net to get HttpUtility.UrlDecode (used in reading some of the xml files) and remove the attributes used to interact with an HTML page.  However, I wanted things a bit cleaner than that.</p> <p>I wanted to keep using the same code as much as possible for both the standard Silverlight web app version of the project as well as the WP7S version.  To do this, I created a second project “WindowsPhoneGameEngine” at the same level as the original “GameEngine” solution.  I then added an additional conditional compilation symbol “Phone” to the WindowsPhoneGameEngine and use #if statements to deal with any required differences.  This allowed the same files to compile in either project.  I did run into a few snafus.</p> <p>If you’re familiar with how the XAML/CS files interplay with each other, there are some intermediate “.g.cs” files generated to init your objects from the XAML.  Unfortunately, when you create two projects in the same solution in the same directory, the both end up using the same intermediate and output directores “obj\debug|release” and “bin\debug|release” which can end up confusing compilation.  In order to deal with this, it’s fairly easy to specify in the project properties via the IDE to use a different bin directory – just right click the project, select properties, choose the build tab and change the Output path.  </p> <p>However, there’s not a nice way in the IDE to change the intermediate “obj” directory.  Thankfully, this <a href="">post</a> from Jason Olson, along with this helpful <a href="">comment</a> from Pradeep Prabhakar, explained how to edit the .csproj file to set the intermediate directory.  With those changes, the project built an ran just fine.</p> <p>Well, not quite.  I did make one additional change, but I’m not sure it was strictly necessary.  It’s bugged me since we released this project that it required a couple binary only dependencies.  Rather than try to figure out whether the 0.4 DLR works on Windows Phone 7 Series and dig up the two binary dependencies we weren’t able to release as MsPL, I decided to remove support for “Custom Code” behaviors.  At first this might seem somewhat onerous, but I believe any remaining developers working on this project are probably comfortable enough with C# and XML that they’d be able to rewrite any old custom behaviors in C# and add them to the project as built-in behaviors.  Then, all you need to do is replace your old custom code behaviors in your default.game file with your new built in behavior and your game should be working just as before, only faster and with a smaller binary since we no longer need to include any scripting components.  </p> <p>Just to make things clear, I don’t have any connection to the Windows Phone team, and I only learned about the development story with the rest of you watching the talks at <a href=""></a> on Monday.  I downloaded the tools with the rest of you from <a href=""></a> and had Kill the Peas up and running with about an hour’s worth of effort after installing the tools.  I don’t have hardware to try this out, but it was running great in debug mode in the emulator on my single-core 1.3Ghz Core 2 Solo almost-netbook.  Congrats to the Windows Phone team.  This stuff is awesome!</p> <p> </p> <p>Links below</p> <p>Download the tools: <a title="" href=""></a> this is all you need if you just want to load the phone csproj.  </p> <p>Download the VS 2010 RC if you want to load the full solution and build both the Silverlight Web App and Phone App (until RTM is available.  I updated the project to VS 2010): <a href=""></a>.  Install VS 2010, then the tools from above to get phone support.</p> <p>Download TFS from the above link if you want to connect via source control to Codeplex (or use their support for Subversion, the Codeplex Client or Teamprise Explorer)</p> <p>Download the code: <a href=""></a></p> <p>Let me know in the comments if you have any questions!</p><img src="" width="1" height="1">andersbe Parting Present<p><a href=""></a> closed.  </p> <p!  </p> <p>When you check out the code, there’s a few steps described in the readme on obtaining some dependencies and game data files.  If you used the <a href="">Popfly Game Downloader</a> we released a few weeks back to grab your games, there’s also instructions on how to crack them open and grab the data files.</p> <p>With that, check out the Ms-PL licensed code at <a href="" target="_blank">Codeplex</a>!</p> <p><a href=""><img style="border-bottom: 0px; border-left: 0px; display: block; float: none; margin-left: auto; border-top: 0px; margin-right: auto; border-right: 0px" title="codeplex" border="0" alt="codeplex" src="" width="244" height="185" /></a></p><img src="" width="1" height="1">andersbe Bye Popfly<p>By now you’ve probably heard the sad news that come August, <a href=""></a> will be shutting down.  You can read more about the details <a href="">here</a>.  While we’ll miss the site and working on it, the team has moved on to new and exciting projects which you’ll hear more about (here and elsewhere) as we get ready to talk about them.  </p> <p, <a href="">Adam</a> and I spent some time thinking about what could be done for game projects and <a href="">this</a> is what we came up with:</p> <p><a href=""><img style="border-bottom: 0px; border-left: 0px; display: inline; border-top: 0px; border-right: 0px" title="image_22[1]" border="0" alt="image_22[1]" src="" width="504" height="334" /></a> </p> <p>Basically, this app connects to popfly.com, downloads your game and creates a Silverlight XAP you can use to run your game locally on your own machine.  There’s also an option to download all your shared games at once.  Details can be found <a href="">here</a>.  </p> <p.”  </p> <p>Happy Downloading!</p><img src="" width="1" height="1">andersbe References no More<p.  </p> <p>When I was looking around for tooling to help identify these leaks (they’re not always easy to find, even through thorough code inspection and best practices like eliminating closures as event handlers), I came across this IE8 whitepaper:</p> <p><a title="" href=""></a></p> <p>Not sure if the fix includes only DOM object relate leaks or fixes COM references more generally.  Will try to find out and post an update if I find an answer.</p> <p.</p><img src="" width="1" height="1">andersbe the Popfly Game Creator engine from Silverlight 1 to 2<p>In our most recent <a href="" target="_blank" mce_href="">Popfly</a> update, we shipped the project I’ve been working on for the last couple months (along with Patrick Wong, Tim Rice and help from the rest of the team), which is a fully backwards compatible game engine, completely rewritten from browser based JavaScript rendering using <a href="" mce_href="">Silverlight</a> 1 to a C# based engine using Silverlight 2. As noted <a href="" target="_blank" mce_href="">elsewhere</a>,. </p> <p>That is largely thanks to Patrick’s efforts. In order to keep custom code working, what we did was take the current version of the Silverlight version of the <a href="" target="_blank" mce_href="">DLR</a> ).</p> <p. </p> <p>If you’d like to hear more about Silverlight 2, working with the DLR, the port, or the engine, let me know in the comments and I can go into more details on the areas that interest you.</p><img src="" width="1" height="1">andersbe Tips (Part 2)<p>Yesterday we began our discussion of performance optimizations in <a href="" target="_blank"><a href="" target="_blank">Popfly Game Creator</a>.</a>  In <a href="">that post</a> we discussed how collision detection impacts performance as you add actors and ways to mitigate that impact.  Today I’d like to talk a bit about the other bottleneck people hit and that is <a href="">Silverlight</a> drawing perf. along with some best practices in creating and using your actors to keep your games snappy.  Today’s article contains discussion and techniques that are fairly advanced, so if you feel a little over your head, definitely try the tips outlined in <a href="">Part 1</a> first.</p> <p.  </p> <p>So what does that mean for all you budding <a href="" target="_blank">Popfly</a> <a href="">Paint.Net</a>), fill in the background with transparency, then save the image as a png of the appropriate size and replace the actor’s appearance with the static image.  Particularly with a scrolling viewport, this can save a lot of cycles.  </p> <p <a href="" target="_blank">here</a>. :</p> <p><a href=""><img title="Editing XAML using Expression Blend" style="border-right: 0px; border-top: 0px; display: block; float: none; margin-left: auto; border-left: 0px; margin-right: auto; border-bottom: 0px" height="272" alt="Editing XAML using Expression Blend" src="" width="504" border="0" /></a></p> <p>Hopefully these articles will help out those of you who have been running into performance barriers when creating your games.  To discuss these tips and tricks, to share your own tips or to get additional help, checkout the Popfly Game Creator <a href="" target="_blank">forums</a>.  You can also check back at this blog for future tips and tricks.  </p><img src="" width="1" height="1">andersbe Feed Gadget<p>I started playing around with Twitter recently and have been having a lot of fun.  Some of you may have noticed that I added a Twitter gadget to the blog sidebar here which allows readers to see my feed.  The block was created using the <a href="" target="_blank"><a href="" target="_blank">Popfly Mashup Creator</a></a> by simply connecting the Twitter block to a list display block.  </p> <p><a href=""><img title="twitter" style="border-right: 0px; border-top: 0px; display: block; float: none; margin-left: auto; border-left: 0px; margin-right: auto; border-bottom: 0px" height="283" alt="twitter" src="" width="550" border="0" /></a> </p> <p!).  </p><img src="" width="1" height="1">andersbe Tips (Part 1)<P>While we’re constantly working to improve the performance of the <A href="" target=_blank<A href="" target=_blankPopfly Game Creator</A>,</A> there are a number of tweaks you can make to your games right now to improve your users’ frame rate.</P> <P>Right now, there are two main bottlenecks for games created using <A href="" target=_blankPopfly</A> and depending on the characteristics of your game, one or the other can probably help you.</P> <P>Today we’ll talk about the biggest perf. hit for most games, which is collision detection between a large number of actors. There are a number of ways to address this. </P> <P>The easiest trick is to make as many actors as possible non-solid:</P> <P><A href="" mce_href=""><IMG title=non-solid</A> </P> <P>This is a per state property, so if your actor has multiple states, make sure you set it for each one. When an actor is non-solid, it’s collision bounds will be drawn in blue instead of red. </P> <P. </P> <P>The next approach is to limit the number of actors you use on any scene. While this can lead to a less compelling game, but if your game is bottlenecked on collision checking, it is guaranteed to increase performance. </P> <P>If neither of the above is desirable, you can also increase performance by limiting the motion of your actors. When an actor has not moved, it often allows us to skip testing it in parts of our collision detection. This also improves <A href="" target=_blankSilverlight</A> drawing performance (which we’ll talk more about tomorrow) since we will not have to update the Silverlight plugin and Silverlight will not have to re-render the actor in its new position. </P> <P>Finally, if you are spawning new actors throughout the course of your game (through shoot behaviors, Appear behaviors, effects etc) there are a couple of things you can do to keep things snappy. </P> <P. </P> <P <A href="" target=_blankforums</A> where other users and members of the Popfly team can help.</P> <P>Tomorrow I’ll follow up with Part 2 where I will provide some tips for creating actors that are easy for Silverlight to draw and also help keep Popfly’s game engine running fast. Stay tuned.</P><img src="" width="1" height="1">andersbe September Update<P <A href="" mce_href="">Popfly</A>. <A href="" mce_href="">here</A> on the team blog or check them out yourself at <A href="" mce_href=""></A>! </P><img src="" width="1" height="1">andersbe To: Create Lander<p>At PAX, one part of my presentation/demo on Popfly was creating the game <a href="">Lander<.  </p> <p>So if you weren’t able to attend the presentation at PAX, or just want to check out Popfly and learn how to create a game from one of the developers, check out the video below!<:6ce89db6-fc95-410b-ae70-edff75ff87c9" class="wlWriterSmartContent"> <div style="padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px" id="22d35c5c-7001-4c84-97dc-fd7d2be4dcc2"> <div><embed height="344" type="application/x-shockwave-flash" width="425" src="" allowfullscreen="true" allowscriptaccess="always" /></div> </div> </div><img src="" width="1" height="1">andersbe Game Creator at PAX<p>For those of you in the Seattle area this coming weekend for <a href="">PAX</a>,.  </p> <p></p> <p>For a schedule of other MS demos, check out the full listing at Gamerscoreblog: <a title="" href=""></a></p> <p><a href=""><img title="pax" style="border-right: 0px; border-top: 0px; border-left: 0px; border-bottom: 0px" height="141" alt="pax" src="" width="244" border="0" /></a></p><img src="" width="1" height="1">andersbe Features Since Launch<p>We’ve been hard at work on new features for the Popfly Game Creator since first launching this May.  I took some time to demo new features in the following540460e-bf77-43d0-8e99-0a99d928ed63" class="wlWriterEditableSmartContent"><div id="05b25170-25e5-42fd-8b82-d20032534f39" style="margin: 0px; padding: 0px; display: inline;"><div><a href="" target="_new"><img src="" style="border-style: none" galleryimg="no" onload="var downlevelDiv = document.getElementById('05b25170-25e5-42fd-8b82-d20032534f39'); downlevelDiv.<param name=\"movie\" value=\"\"><\/param><embed src=\"\" type=\"application/x-shockwave-flash\" width=\"425\" height=\"355\"><\/embed><\/object><\/div>";" alt=""></a></div></div></div> <p></p> <p>You can also check out Adam’s blog for more info <a href="">here</a> and <a href="">here</a>, find games you haven’t played <a href="">here</a> (requires sign-in so we know what games you’ve played), and of course, check out <a href="">Popfly</a> to see things for yourself!</p><img src="" width="1" height="1">andersbe Mother's Day! (Games for Mom)<p>Look Mom, I made you something:</p> <p><iframe style="width: 100%; height: 400px" src="" frameborder="no" allowtransparency="allowtransparency"></iframe></p> <p>Happy Mother's Day!</p> <p>For those of you who are not my mom, the above game is my take on Plato's Allegory of the Cave (my Mom is a Philosophy and Religious Studies professor at the <a href="">University of Idaho</a>).  I made the game using <a href="">Popfly Game Creator</a>,:</p> <p><iframe style="width: 100%; height: 400px" src="" frameborder="no" allowtransparency="allowtransparency"></iframe></p> <p>And another game to learn the animals: </p> <p><iframe style="width: 100%; height: 400px" src="" frameborder="no" allowtransparency="allowtransparency"></iframe></p> <p>It's great to be able to do something creative for Mother's Day again.  Love you Mom!</p> <p>(For those of you interested in how these games were made, just click the tweak button and you can see them in Popfly for yourself!  Next week I'll post some tips and tricks on the special effects I did in the <em>Allegory of the Cave</em> so that others can incorporate them into their own games).</p><img src="" width="1" height="1">andersbe week of Popfly Game Creator<p>It’s now been one week since we first released Popfly Game Creator to the public at <a href="" mce_href="">Maker Faire</a> and on the web on May 2nd.  I thought I’d take today to point out some of the cool games that people have made.  </p> <p>User zbuff001 made this challenging set of minigames:</p> <p><em>[removed...]</em></p> <p>while <a href="" mce_href="">Adam</a> made a pseudo-rhythm game “Type Type Revolution:</p> <p><em>[removed...]</em></p> <p>Raden managed to make “Badly Built Wall” very difficult: <a href=""></a></p> <p>Moo777 had a great game – Bellyjish Adventure with multiple stages: <a href=""></a></p> <p>Here’s an interesting one a bit along the lines of the old "Scorched Earth" type games that someone came up with at Maker Faire:</p> <p><em>[removed...]</em> </p> <p.  </p> <p>I’m sure there are plenty of great games that I missed.  If you have something you’d like to share, feel free to link it in the comments!</p> <p mce_keep="true"> </p> <p><em>5/10/08 Update:<strong>  </strong></em>Bellyjish Adventure is back up, removed the embedded "Badly Built Wall" update since the sounds were annoying :).</p> <p><em>5/10/08 Update:<strong>  </strong></em>Also removed the embedded Bellyjish Adventure since its sounds also were annoying :).  Both are linked instead.</p> <p><em>9/01/09 Update:  </em>Removed embeds now that <a href="">popfly.com is down</a>, I’ve removed the embedded games.  If you <a href="">downloaded your games</a> before the shutdown, you can still host them on your own.</p><img src="" width="1" height="1">andersbe Duckies - Great post on creating games with grandchildren<P <A class="" title="Making games with a grandchild" href="" mce_href="">making them</A>. </P><div style="clear:both;"></div><img src="" width="1" height="1">andersbe your actor’s speed<p.  </p> <p align="center"><img src="" /> </p> <p <a href="">not</a> a <a href="">word</a> that <a href="">means</a> <a href="">fast</a> – but dude, English is a living language] due to all the math.</p> <p.</p> <p <a href="">Badly Built Wall</a>, that over time, the contribution from various behaviors and collisions will add up to making you go really fast.  </p> <p>How do you overcome this?  Why with a custom behavior of course!  Adding a custom behavior with the following code should do the trick:</p> <blockquote> <div style="font-size: 10pt; font-family: monospace; background-color: #d5d5d5"><span style="color: blue">var</span><span style="color: black"> maxSpeed = 200; <br /></span><span style="color: blue">var</span><span style="color: black"> maxSpeedSquared = maxSpeed * maxSpeed; <br /> <br /></span>">var</span><span style="color: black"> velocity = {X: velX, Y: velY}; <br /></span><span style="color: blue">var</span><span style="color: black"> speedSquared = Vector2.MagnitudeSquared(velocity); <br /> <br /></span><span style="color: blue">if</span><span style="color: black"> (speedSquared > maxSpeedSquared) <br />{ </span><span style="color: black"> <br />    </span><span style="color: blue">var</span><span style="color: black"> normalizedVelocity = Vector2.Normalize(velocity); <br />    </span><span style="color: blue">this</span><span style="color: black">.SetValue(</span><span style="color: #a31515">"XVelocity"</span><span style="color: black">, normalizedVelocity.X * maxSpeed); <br />    </span><span style="color: blue">this</span><span style="color: black">.SetValue(</span><span style="color: #a31515">"YVelocity"</span><span style="color: black">, normalizedVelocity.Y * maxSpeed); <br />}</span> </div> </blockquote> <p. <em> [Note:</em>  All the *Squared values are used as a programmer’s trick to avoid the square root operation (Math.sqrt) which is fairly costly in terms of processing time.<em>] </em> For even simpler code, check out the following from Badly Built Wall:</p> <blockquote> <div style="font-size: 10pt; font-family: monospace; background-color: #d5d5d5">">if</span><span style="color: black"> (velX > 201) </span><span style="color: blue">this</span><span style="color: black">.SetValue(</span><span style="color: #a31515">"XVelocity"</span><span style="color: black">, 200); <br /></span><span style="color: blue">if</span><span style="color: black"> (velY > 201) </span><span style="color: blue">this</span><span style="color: black">.SetValue(</span><span style="color: #a31515">"YVelocity"</span><span style="color: black">, 200);</span> </div> </blockquote> <p).  </p> <p>Happy creating!</p><img src="" width="1" height="1">andersbe: Even Easier Music<p align="center"><img src="" /> </p> <p>Reader <a href="">Michael Sterling</a> pointed out today (or rather late last night) a <a href="">neat tool</a> that lets you create music even more easily than with Finale:</p> <blockquote> <p>For people who want even easier music creation so are willing to give up some of the nuance that Finale offers, they could try JamStudio.com. It's kind of like GarageBand for the mac (I'm sure there's a non-apple analogy), but even a bit simpler. You just choose the instruments you want to use and then assign chords to each measure. They want you to sign up, and there's a little tutorial video that plays when you first start, but you can skip it and don't have to sign up (although you might need to if you want to export the music, I'm not sure)."</p> </blockquote> <p.  </p><img src="" width="1" height="1">andersbe Music for Popfly Game Creator<P align=center><IMG src="" mce_src=""> </P> <P>Sound and music is probably one of the most overlooked areas of new hobbyist game developers. Just adding a cheesy soundtrack and cute hopping and squishing noises subtly changes a boring, simple game into one that feels <A href="" mce_href="">professional and complete</A>. The funny thing is that usually this process is completely subliminal with most people not realizing the difference sound makes. Even great games can be vastly improved through the use of audio as anyone who has completed <A href="" mce_href="">Portal</A> can tell you. </P> <P>PGC allows you to upload your own music and sounds as .WMA or .MP3 files to use in your games. You can find a “How To” explaining the process of uploading and playing back audio on the Popfly wiki <A href="" mce_href="">here</A>. There are many programs which allow you to record audio on your computer from very basic programs (Windows Sound Recorder) to very advanced interface/software packages such as <A href="" mce_href="">Pro Tools</A>. However, this all assumes you are in possession of musical instruments, recording equipment and are musically capable or willing to invest the time to become so. That’s a lot of commitment for most folks.</P> <P>While I can’t help you with the becoming musically capable part, I recently dug up a free program called <A href="" mce_href="">Finale Notepad</A>. </P> <P <A href="" mce_href="">CDex</A>. There might be an easier way to do this – if so, let us know in the comments. </P><img src="" width="1" height="1">andersbe the appearance of Actors, Scenes etc…<P align=center><IMG src="" mce_src=""> </P> <P) <A href="" mce_href="">here</A>. There are other tools available such as Visual C# Express 2008, (heck, XAML is text based XML, so even Notepad will work, although if you’re working with anything aside from simple shapes, a graphical editor is probably useful :)), but at the moment my preference is Blend. </P> <P:</P> <P> <OBJECT height=355 width=425><PARAM NAME="movie" VALUE=""><PARAM NAME="wmode" VALUE="transparent"> <embed src="" mce_src="" type="application/x-shockwave-flash" wmode="transparent" width="425" height="355"></embed></OBJECT></P><img src="" width="1" height="1">andersbe Game Creator Alpha Goes Live!<p align="center"><img src="" mce_src="" /> </p> <p>Today we went live with the Popfly Game Creator Alpha!  What’s the Popfly Game Creator?  It’s an online tool for creating web based games similar to the casual games you’ve probably wasted hours playing when you should have been studying/working/eating/sleeping.  Well now you can waste hours making them as well!  You should be able to make any simple 2D game without too much trouble.  The Popfly Game Creator (hereafter referred to as “PGC”) is aimed at anyone who’s advanced enough with computers to write an email, so don’t be scared.  You can start off tweaking existing games or create your very own from a blank slate.  We’ve created lots of <a href="" mce_href="">“How To’s”</a> and <a href="" mce_href="">video introductions</a> to get you started. For an overview and links to more help content, click <a href="" mce_href="">here</a>.  </p> <p>While I joke about wasting time, even though pretty much anyone can learn how to use PGC in a couple hours, that doesn’t mean your time is wasted!  One of the great things about Popfly is that you’re secretly learning to program while using it!  Once you get advanced, you’ll probably find there are some things you’d like to do that the built in behaviors don’t allow.  That’s where we get you.  What you haven’t realized is that now you know a whole bunch of concepts that us programmers use to make computers go.  So when you hit this point, just hit the little “Custom Code” button on your behavior screen and your behavior will pop up a little code window with the implementation of the behavior in JavaScript.  You can then tweak the JavaScript or replace it entirely.  Just hit the preview button to see your results.  There are lots of <a href="" mce_href="">JavaScript tutorials</a> available on the web to help you get started, otherwise you may be able to do what you want just by trial and error using the code you see on screen as a guide.  If you really get going, you might want to check out our <a href="" mce_href="">API documentation</a>.</p> <p>The PGC is the latest piece of Popfly to go live.  Already on the Popfly site (<a href="" mce_href=""></a>) is the Popfly Mashup Editor – to which many improvements also went live today – and web page editor.  Since it’s Popfly, there are all sorts of ways you can share your games and interact with your friends.  Like mashups, Popfly games can be shared as Facebook applications or embedded just about anywhere so you can post your creations in your blog, on your Facebook profile, pretty much anywhere you can embed things.  Once you share a game, your friends can tweak it, create their own version and share it back.  </p> <p>We provide you with a gallery of actors, backgrounds effects and sounds to make your games, which you can then tweak, or even create your own.  Everything is Silverlight based and we allow you to tweak the XAML, so you can do all sorts of fun things to modify existing actors or create new ones (including animating them!).  Since it’s XAML, most actors are vector based and can be resized however you want without getting pixel-y.  There are many editors available for working with XAML, including exporters for products like Adobe Illustrator and several free ones.  Check out the <a href="" mce_href="">Expression Blend 2.5 Preview</a> and <a href="" mce_href="">Visual C# Express 2008</a> both of which are free (while the Blend preview lasts anyway) and can give you a nice split view showing the XAML below the graphical editor.  Note that the current version of VS Express only supports WPF XAML, not Silverlight, but it should mostly work if you’re just tweaking existing XAML.</p> <p>A huge thanks goes out to DanC from <a href="" mce_href="">lostgarden.com</a> for some great XAML based artwork which is available in the PGC.  Check out his site for a great resource on game design as well as more free game art.  More thanks go out to <a href="" mce_href="">Adam</a>’s wife, “Princess Linz” for her contributions and the Expression team for their contributions as well.  </p> <p>This is our “Alpha” release.  What that means is that it’s even earlier than “Beta”!  Basically, there are lots of features that aren’t available yet, and you’ll probably run into some bugs.  Hopefully not too many :).  We’re putting this out for you guys to try to get your feedback, so let us know what you think and what directions you’d like to see us go – that will help us prioritize what to focus on next.  As Adam says on <a href="" mce_href="">his post</a>, we’ve got a lot of ideas and we’re sure you do too!</p> <p><em>Edit:  Fixed youtube embeds.</em><>PS: Over the next few days I’ll be posting some advanced PGC tips and tricks, so stay tuned…</p> <p><em>[Update 9/01/2009: Removed popfly.com embed]</em></p><img src="" width="1" height="1">andersbe<P align=center><IMG title="At Tikal - recognize this from Star Wars?" alt="At Tikal - recognize this from Star Wars?" src="" mce_src=""></P> <P>Hi, I’m Ben Anderson, a developer on the Microsoft Non-Professional Tools team. I recently joined the team to work on the newly released <A href="" mce_href="">Popfly Game Creator</A>. Prior to that I worked on the <A href="" mce_href="">Visual C++ team</A> and before that, I went to <A href="" mce_href="">Carleton College</A>. If you want to learn more about me, you can check out my <A href="" mce_href="">old college site</A> (I no longer have access to the site and I’m not sure if it will be up forever, so don’t be surprised if it disappears, or they give some other student my old username and it gets replaced), my <A href="" mce_href="">blog posts</A> on VCBlog, or some of the <A href="" mce_href="">research</A> <A href="" mce_href="">papers</A> I worked on.</P> <P>I’ll be posting here to share into, tips and tricks for using the Popfly Game Creator. Stay tuned for more info on PGC!</P><img src="" width="1" height="1">andersbe
http://blogs.msdn.com/b/ben_anderson/atom.aspx
CC-MAIN-2015-14
refinedweb
5,415
59.03
Description Using the MoinMoin Desktop Engine running as moin.exe in servermode (on Xp, 2000, 2003, all three tested) Client logged in as an User with German Chars, for example Müller, and have a computername like this, stops the Page modify Logging of the Moin-"server". This problem is not MMDE specific. As umlauts shouldn't be in DNS, it is not even a bug. But we can handle it easily (and avoid further problems) by falling back to host ip in such a case. Steps to reproduce - Edit the wikiserverconfig.py for using as an server like this: from __main__ import DefaultConfig class Config(DefaultConfig): port=8080 interface="" - Start the moin.exe on a computer ("server") with Unicodesupport (Windows 2000, Server 2003, XP) - rename your own computer ("client") e.g. as "Thöne", use a loginaccount "Thöne" Connect to the server via browser - (you might install the german Help files, but will be no differnce) Edit a Page, even the Frontpage. After Saving, MoinMoin seems to log the Changes with your Username (or Computername, don't know) The server reports the bug "UnicodeDecodeError" to your browser. The error doesn't appear if using the MMDE only in Desktop mode. Example Details This is a snip from the detailed Error, you find the Example with "thöne" as 'TH\xd6NE' after the Line "'ascii' codec can't decode byte 0xd6 in position 2: ordinal not in range(128)" C:\Programme\MoinMoinDesktopEngine\MoinMoin\PageEditor.pyo in acquire (self=<MoinMoin.PageEditor.PageLock instance>) C:\Programme\MoinMoinDesktopEngine\MoinMoin\PageEditor.pyo in _writeLockFile (self=<MoinMoin.PageEditor.PageLock instance>) C:\Programme\MoinMoinDesktopEngine\MoinMoin\logfile\editlog.pyo in add (self=<MoinMoin.logfile.editlog.EditLog instance>, request=<MoinMoin.request.RequestStandAlone object>, mtime=1142845811000000L, rev=0, action='LOCK', pagename=u'Was soll ich im Wiki speichern', host='10.0.54.3', extra=u'', comment=u'') UnicodeDecodeError 'ascii' codec can't decode byte 0xd6 in position 2: ordinal not in range(128) * args = ('ascii', 'TH\xd6NE', 2, 3, 'ordinal not in range(128)') * encoding = 'ascii' * end = 3 * object = 'TH\xd6NE' * reason = 'ordinal not in range(128)' * start = 2 System Details * Date: Mon, 20 Mar 2006 09:10:11 +0000 * Platform: win32 (nt) * Python: Python 2.4.2 (C:\Programme\MoinMoinDesktopEngine\moin.exe) * MoinMoin: Release 1.5.2rc1 (patch-433; DesktopEdition Release 1.5.2-1) Next time please attach html of the error page. Workaround Try this patch: --- orig/MoinMoin/logfile/editlog.py +++ mod/MoinMoin/logfile/editlog.py @@ -150,7 +150,8 @@ try: hostname = socket.gethostbyaddr(host)[0] - except socket.error: + hostname = unicode(hostname, config.charset) + except (socket.error, UnicodeError), err: hostname = host remap_chars = {u'\t': u' ', u'\r': u' ', u'\n': u' ',} Discussion Therefore umlauts should be avoided. I doubt host names with umlauts are allowed in DNS. Plan - Priority: - Assigned to: Thomas Waldmann - Status: workaround committed as moin--main--1.5--patch-491
http://www.moinmo.in/MoinMoinBugs/UnicodeDecodeErrorGermanChars
crawl-003
refinedweb
474
50.73
MIRC 2.x/3.x/4.x/5.x - Nick Buffer Overflow // source:. A excessively long nickname (200+) is capable of overwriting stack variables. This may be exploited by a malicious server. This issue is also exploitable via a webpage that can instruct the client to launch and to make a connection to the malicious server. This may lead to a full compromise of the host running the client software on some Windows systems. /* Mirc buffer nickname buffer overflow proof of concept exploit. Author: James Martin Email: me@uuuppz.com Website: This code is purely to demonstrate the risk posed by this flaw. It should not be used for malicious purposes. I do not accept any responsibility for any dammage it may cause due to it use. This code compiles in Borland C++ 5.5 command line tools. Run it, and type /server 127.0.0.1 2680 (in mirc that is :P). This exploit could be modified to work on many editions of mirc running on all variants of windows. However due to the messing around that is required to place the return address on the stack It will work on: For the following do not #define EXPLOIT_2K Windows 98SE running Mirc 5.91 Windows 98 running Mirc 5.91 Windows ME running Mirc 5.91 With exploit 2K defined it will exploit Windows 2K The basic concept of this overflow is as follows In memory mirc stores the following variables [Primarynick(100chars)][Alternativenick(100chars)][WhichNick[dword]] There is no length checking on the nickname returned to nick by the server. There are two ways to exploit this a) Send the msg ":OLDCLIENTNICK NICK NEWCLIENTNICK" b) Send ":testserver 001 NEWNICKNAME :blah blah" I found method a) on the 24/10/2001 and reported this problem to the author. Method b) was published by eSDee of hoepelkoe 23/10/2001 (completely unknown to me!) very coincidental really. From debugging the code, it seems that this buffer is copied in several places. So there maybe more places to exploit this than are currently known. I spent quite a bit of time analysing the hole, in the end I found the way to do it was, to overright WhichNick with a value, that would cause the currentnickname to reference the stack, then send another nick name containing the new version of EIP to be overwritten on the stack. For this we need a magick number to be placed in currentnickname, this number must satisfy the equation (magicknumber*100)+offset = location of pushed eip. Also this magick number must not contain any zero bytes or spaces (value of 32). This works by exploiting the integer overflow concept. The following is the code which appears in mirc. imul ecx, WhichNick, 64h add ecx, offset PrimaryNick Unfortuantly the location of the stack varies between different versions of windows. NT, Win2k, XP all have the stack in very similar positions but it does move slightly. Win98,Win98SE, WinME all have the stack in EXACTLY the same position. Windows 95 is different again. Hence having to do a #define for the os you wish to exploit. This may seem like quite a large mitigating factor but in reality this is very easy to overcome if you couple this exploit with a HTTP server which sends out a page to cause mirc to load and attempt to connect to our evil server. As Internet explorer, is nice enough to tell us exactly what OS is running! I think we can blame MS for that one, talk about giving us a helping hand! */ #include<stdio.h> #include<windows.h> #include<winsock2.h> #define SOCKADDRCAST struct sockaddr_in * // This fuction binds a listenig socket SOCKET openlistensocket(void) { SOCKET s; struct sockaddr_in SockAdr; // Get a new socket s = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); // Set the ip add ress we are going to bind to memset(&SockAdr, 0, sizeof(SockAdr)); SockAdr.sin_addr.s_addr = inet_addr("0.0.0.0") ; SockAdr.sin_family=AF_INET; SockAdr.sin_port=htons(2680); printf("2: Starting\n"); // Attempt to bind socket if(bind(s, (SOCKADDRCAST)&SockAdr, sizeof(SockAdr))) { // Failed free socket and return -1 printf("Failed to open, %u\n",WSAGetLastError()); closesocket(s); return(-1); } else // Success listen on socket if(listen(s, 10)!=SOCKET_ERROR) return(s); else { printf("Failed to open listen socket (listen, %u)\n",WSAGetLastError()); closesocket(s); return(-1); } } // Shell code, this just launches an executable // specifid following the shell code. Currently // it does not clean up properly, so mirc will // crash. char shellcode[44] = { 0x6A,0x01,0xB8,0xBF, 0x74,0x55,0x44,0xC1, 0xE0,0x08,0xC1,0xE8, 0x08,0x50,0xB8,0x50, 0x90,0x54,0x44,0xC1, 0xE0,0x08,0xC1,0xE8, 0x08,0xFF,0xd0,0x33, 0xDB,0x53,0xB8,0x10, 0x8e,0x54,0x44,0xc1, 0xe0,0x08,0xc1,0xe8, 0x08,0xff,0xd0,0x00}; #define EXPLOI_9x #define MAGICNUMBER_NT 0x28eb207 #define MAGICNUMBER_2K 0x28eb205 #define MAGICNUMBER_XP 0x28eb205 #define MAGICNUMBER_9x 0x28Fc909 #define OFFSET_NT 20 #define OFFSET_2K 84 #define OFFSET_XP 12 #define OFFSET_9x 180 #define OFFSET_95 184 #ifdef EXPLOIT_NT #define MAGICNUMBER MAGICNUMBER_NT #define OFFSET OFFSET_NT #else #ifdef EXPLOIT_2K #define MAGICNUMBER MAGICNUMBER_2K #define OFFSET OFFSET_2K #else #ifdef EXPLOIT_XP #define MAGICNUMBER MAGICNUMBER_XP #define OFFSET OFFSET_XP #else #define MAGICNUMBER MAGICNUMBER_9x #ifdef EXPLOIT_95 #define OFFSET OFFSET_95 #else #define OFFSET OFFSET_9x #endif #endif #endif #endif // Our main function void main() { SOCKET s,client; char buf1[300], buf2[190], buf3[1500]; /* Perform winsock startup */ WORD wVersionRequested; WSADATA wsaData; HANDLE h; int wsErr; int len, *i; struct sockaddr_in SockAdr; wVersionRequested = MAKEWORD( 1, 1 ); wsErr = WSAStartup( wVersionRequested, &wsaData ); printf("1: Initialising %u\n",wsErr); if ( wsErr != 0 ) { /* Tell the user that we couldn't find a usable */ /* WinSock DLL. */ printf("Failed to start winsock exiting\n"); return; } // Open Listen Socket s = openlistensocket(); // Accept a connection len = sizeof(SockAdr); client = accept(s, &SockAdr, &len); printf("Accepted\n"); // Init the two exploit buffers. memset(buf1, 'X', sizeof(buf1)); memset(buf2, 'Y', sizeof(buf1)); buf1[204] = 0; buf2[OFFSET+3] = 0; // Set the return address to be poped onto the stack buf2[OFFSET] = 0x94; buf2[OFFSET+1] = 0x74; buf2[OFFSET+2] = 0x55; // Set our little magic number i = (int *)(buf1+200); *i = MAGICNUMBER; // Build the exploit string sprintf(buf3, ":testserver 001 %s%scalc.exe :ddd\n:testserver 001 %s :x\n:testserver 001 test :x\n", buf1,shellcode,buf2); // Send it send(client, buf3, strlen(buf3),0); // Wait printf("Waiting\n"); Sleep(10000); // Cleanup closesocket(client); closesocket(s); }
https://www.exploit-db.com/exploits/21274
CC-MAIN-2021-21
refinedweb
1,049
51.58
A Python plugin for OMERO.web Project description OMERO.parade An OMERO.web app for filtering Data in OMERO.web centre panel. For full details see SUPPORT.md. Requirements - OMERO 5.6.0 or newer - Python 3.6 or newer Installing from PyPI This section assumes that an OMERO.web is already installed. Install the app using pip: $ pip install -U omero-parade Add parade custom app to your installed web apps: $ bin/omero config append omero.web.apps '"omero_parade"' Display parade in the centre of the webclient: $ bin/omero config append omero.web.ui.center_plugins \ '["Parade", "omero_parade/init.js.html", "omero_parade"]' Now restart OMERO.web as normal. Build In order to build you need: - npm version equal or greater to 3.0! npm version equal or greater than 5.2 is recommended! $ npm install To build an uncompressed version and automatically rebuild when source files change, run: $ npm run watch To build an uncompressed version, run: $ npm run build-dev To build a compressed, minified version for production, run: $ npm run build Custom Filtering Users can customize the filtering options available by adding their own python modules to the setting: omero.web.parade.filters The current default setting lists the omero_parade app itself and two other modules that are in the same directory and are therefore expected to be on the PYTHONPATH when the app is installed. '["omero_parade", "omero_parade.annotation_filters", "omero_parade.table_filters"]' Each of these modules contains an omero_filters.py which is expected to implement 2 methods: get_filters and get_script. The get_filters method is used to compile the list of filters returned by the URL /omero_parade/filters/. Some examples of get_filters # Return a list of filter names. def get_filters(request, conn): return ["Rating", "Comment", "Tag"] The request may include plate or dataset ID if we only want to support the filter for certain data types. In this example we could even check whether an OMERO.table exists on the plate. def get_filters(request, conn): if request.GET.get('plate', None) is not None: return ["Table"] return [] The get_script function for a named filter should return a JsonResponse that includes a list of parameters for the user input to the filter and a JavaScript filter function. The JavaScript function will be called for each image to filter and will also be passed in a params object with the user input. # Return a JS function to filter images by various params. def get_script(request, script_name, conn): dataset_id = request.GET.get('dataset') // OR... plate_id = request.GET.get('plate') if script_name == "Rating": # Load rating data for images in Dataset or Wells in Plate... # ... # var ratings = {imageId: rating} for all images var js_object_attr = 'id'; # or 'wellId' if filtering Wells # Return a JS function that will be passed an object # e.g. {id: 1} for Image or {id: 1, wellId:2} for Image in Well. # and should return true or false f = """(function filter(data, params) { var ratings = %s; var match = ratings[data.%s] == params.rating; return (params.rating === '-' || match); }) """ % (json.dumps(ratings), js_object_attr) filter_params = [{'name': 'rating', 'type': 'text', 'values': ['-', '1', '2', '3', '4', '5'], 'default': '-', }] return JsonResponse( { 'f': f, 'params': filter_params, }) Custom Data Providers Custom data providers return numerical data for Images that can be shown in a table for sorting, or plotted in a graph. NB: Even if data applies to Wells, you need to map this to Image ID, since that is the common denominator that is used to identify images in the various list, grid or plot layouts. Using the same setup as for filtering above, each module listed in the omero.web.parade.filters setting can also contain a data_providers.py file that implements two methods get_dataproviders and get_data. Examples for omero_parade/data_providers.py def get_dataproviders(request, conn): return ["ROI_count"] def get_data(request, data_name, conn): """Return data for images in a Dataset or Plate.""" dataset_id = request.GET.get('dataset') plate_id = request.GET.get('plate') field_id = request.GET.get('field') # ... get img_ids for container, then... if data_name == "ROI_count": # Want to get ROI count for images params = ParametersI() params.addIds(img_ids) query = "select roi.image.id, count(roi.id) from Roi roi "\ "where roi.image.id in (:ids) group by roi.image" p = query_service.projection(query, params, conn.SERVICE_OPTS) roi_counts = {} for i in p: roi_counts[i[0].val] = i[1].val return roi_counts. 2019-2020, The Open Microscopy Environment Project details Release history Release notifications Download files Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
https://pypi.org/project/omero-parade/0.2.0/
CC-MAIN-2020-10
refinedweb
744
60.01
En savoir plus à propos de l'abonnement Scribd Découvrez tout ce que Scribd a à offrir, dont les livres et les livres audio des principaux éditeurs. Cellular phones have shown a dramatic improvement in their functionality to a point where it is now possible to have cellular phones execute Java programs. As a result, cellular users throughout Japan are now able to read and write e-mail,.. ADVANTAGESThis kind of environment can be used in the software industry to communicate between system connected within the LAN. 1.2.1 DISADVANTAGES There is no portability in the existing system. No security. This kind of environment does not enhance portability. Such kind of concept does not ensure security too. PROPOSED SYSTEMIn our proposed system we can access that the remote computer using that the Java enabled Mobile phones. In this system we use a cellular phones with internet connectivity and a personal computed. The desktop of the PC can be viewed on the mobile phone depending on the resolution of the mobile PC on the mobile. We can perform many operations such as viewing that Desktop of the PC, Accessing Applications in the PC, etc. ADVANTAGES. 1.4 VNCVNC stands for Virtual Network Computing. It is, in essence, a remote display system which allows you to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. Fig 1 time considering portability and generality, we propose a VNC based architecture. VNC is an implementation of a remote display system based on a Remote Frame Buffer (RFB) protocol. StructureIt consists of VNC servers running on one or more remote computers, a Smart VNC (SVNC) proxy, and a SVNC viewer on a cellular phone. A VNC server sends a remote desktop display as bitmap images in RFB protocol. A SVNC proxy converts (crops, shrinks and resamples) the display image and then transfers the converted image to a SVNC viewer in response to a user request that was received from that SVNC viewer. The transfer is performed in our own Compact RFB (CRFB), our simplified RFB protocol. Then, the SVNC viewer displays the transferred images. Key events received by the SVNC viewer are transmitted to a SVNC proxy that coverts them and sends them to the server. When the user first tries to connect to a remote computer, he must specify his user name and password for authentication as well as the host name of the computer that is running a VNC server. If authentication succeeds, the SVNC proxy establishes a session with the VNC server and the SVNC viewer starts user services. To suppress network traffic, encoding is changed depending on contexts. Usually, colored display images are transferred from the SVNC proxy to the SVNC viewer. However, while the user is manipulating the remote desktop, such as scrolling and moving the pointing device, the display images are gray-scaled to reduce the number of bytes required to encode the image. Convert different devices: A cellular phone is physically limited. The typical size ofthe screen is 2.2 inches with 120x130 pixels. SVNC viewer on a emulator accessing the desktop of a remote Linux about sixteen keys. In contrast, current desktops are manipulated with keyboards that have over 100 keys and pointing devices such as a mouse. 4 Suppress computational resource use: CPU performance and memory size arelimited on a cellular phone to achieve portability and to lower power consumption. Applications of VNCVV. The core Enterprise Edition features, common across all supported platforms, are as follows.. Thin Client - As VNC is Thin Client software it is possible for an older, poorly-specified PC to connect to a better-specified serverPCandremotely run software that would not have been possible on the lesser PC, either due to memory, harddrive or power restrictions. However, although it is possible to connect from multiple machines, all these machines will only be able to monitor/control the one Windows desktop - ie, VNC does not turn a server into a true multi-user server in the way that the Citrix products can. The X-based VNC server is more flexible in this respect. shared leaves open any existing server connections so the desktop can be shared with other users. For security reasons this is usually not possible, but this command overrides the default setting. 8bit any colour depths are usually allowed, with translation to lower bits automatically carried out as required. This overrides the default, so making it useful for lower-speed lines (such as modem dial-ups). emulate3 emulates three buttons on a two-button mouse (simultaneously clicking both buttons emulates the third). fullscreen causes the viewer to start in full-screen mode instead of windowed. listen with this set, the server can initiate connections to the viewer. in video conferences and interact with multimedia Web sites and similar applications using mobile handheld devices as well as notebook computers. GPRS is based on Global System for Mobile (GSM) communication and complements existing services such circuitswitched cellular phone connections and the Short Message Service (SMS).). GPRS uses a packet-mode technique to transfer high-speed and low-speed data and signalling in an efficient manner over GSM radio networks. GPRS data speeds are expected to reach theoretical data speeds of up to 171.2 Kbps. By implementing GPRS, the following objectives can be met: give support for bursty traffic use efficiently network and radio resources provide flexible services at relatively low costs possibility for connectivity to the Internet provide fast access time to have and support flexible co-existence with GSM voice : JAVA(Gel editor). Traditional computer programs have far too much access to your system to be downloaded and executed willy-nilly. Although you generally trust the maintainers of various ftp archives and bulletin boards to do basic virus checking and not to post destructive software, a lot still slips through the cracks. Even more dangerous software would be promulgated if any web page you visited could run programs on your system. You have no way of checking these programs for bugs or for out-and-out malicious behavior before downloading and running them. for application development.. A Windows program will not run on a computer that only runs DOS. A Mac application can't run on a Unix workstation. VMS code can't be executed on an IBM mainframe, and so on. Therefore major commercial applications like Microsoft Word or Netscape have to be written almost independently for all the different platforms they run on. Netscape is one of the most cross-platform of major applications, and it still only runs on a minority of platforms. 10 Java solves the problem of platform-independence by using byte code. The Java compiler does not produce native executable code for a particular machine like a C compiler would. Instead it produces a special format called byte code. Java byte code written in hexadecimal, byte by byte,. All these pieces, the javac compiler, the java interpreter, the Java programming language, and more are collectively referred to as Java.. Despite its simplicity Java has considerably more functionality than C, primarily because of the large class library. Because Java is simple, it is easy to read and write. Obfuscated Java isn't nearly as common as obfuscated C. There aren't a lot of special cases or tricks that will confuse beginners. 11. The language is interpreted so the compile-run-link cycle is much shorter. is the catch phrase of computer programming in the 1990's. Although object oriented programming has been around in one form or another since the Simula language was invented in the 1960's, it's really begun to take is run messages are passed back and forth between objects. When an object receives a message it responds accordingly as defined by its methods. Object oriented programming is alleged to have a number of advantages including: Simpler, easier to read programs More efficient reuse of code Faster time to market More robust, error-free code 12 that is needed is to port the interpreter and some of the library routines. Even the compiler is written in Java. The byte codes are precisely defined, and remain the same on all platforms. The second important part of making Java cross-platform is the elimination of undefined., and 13 an applet can do to a host system is bring down the runtime environment. It cannot bring down the entire system.. However the biggest security problem is not hackers. It's not viruses. is inherently multi-threaded. A single Java program can have many different threads executing independently and continuously. Three Java applets on the same page 14 can run together with each getting equal time from the CPU with very little extra effort on the part of the programmer. This makes Java very responsive to user input. It also helps to contribute to Java's robustness and provides a mechanism whereby the Java environment can ensure that a malicious applet doesn't steal all of the host's CPU cycles. in the semester, non-public classes and inner classes). The compiler searches the current directory and directories specified in the CLASSPATH environment variable to find other classes explicitly referenced by name in each source code file. If the file you're compiling. 15 Furthermore, Java .class files tend to be quite small, a few kilobytes at most. It is not necessary to link in large runtime libraries to produce a (non-native) executable. Instead the necessary classes are loaded from the user's CLASSPATH. You do not. The exact algorithm used for garbage collection varies from one virtual machine to the next. The most common approach in modern VMs is generational garbage collection for short-lived objects, followed by mark and sweep for longer lived objects. I have never encountered a Java VM that used reference counting. 2.2.2 ABOUT VNC SERVER The main server program needs to be run on the host machine so viewers have something to connect to. The server is currently available for X (Unix), Windows and PPC Macintosh. There is also a version called RFB counter, which is a simple server produced with the aim of demonstrating that things other than desktops can be displayed. Under Windows, the server can be run as an application or service, but for various reasons it is recommended to run it as a service (for example, a user doesnt then need to be logged into the server machine before a viewer can access it). Once installed, the server can be set up to allow viewers to access it. I will use the Windows version as an example. In this case, all the default settings can be used for an easy test startup, and the only thing that you will need to do is enter a password for viewer access. Failure to do so will result in a dialog box with a security warning message which then takes you back to the Properties page, so forcing a password to be entered. Besides the options available via the Properties page, various command-line options are also available. It is prohibitive to list them all here, so instead I have listed a few examples: 16 Install- installs the WinVNC Service Kill - kills a running copy of WinVNC about shows the About box It is also possible to run WinVNC from the command line with multiple options, so combining commands on one line. Quite a number of advanced settings are also available under WinVNC, but these are somewhat more fiddly to configure because the registry needs to be edited. Ways of simplifying this process are currently being looked into for implementation into future revisions. 2.2.3 ABOUT VNC VIEWER The viewer is run on the remote machine that will be connecting to the server. The viewer is currently available for X (Unix), Windows, Java, Macintosh (requires MacOS 7.1 or greater plus Open Transport 1.1.1 or greater) and WindowsCE (requiresWindows CE 2.0 or later). The following information covers the use of the Windows VNC viewer. No installation or configuration is necessary - the executable is simply run from hard drive or floppy disk, either by double-clicking the icon or typing in the name of the VNC executable via the command line. Once started, a dialog box is displayed prompting for the name or IP address of the server . After that, the user is prompted for the session password (as previously configured via the server software). Successful authentication brings up a virtual display of the servers desktop. An Options button is available - clicking on this displays the options. Out of all the available options, View Only is the one that is the most interesting, since it allows the viewer to view activity on the server without the server being controlled in any way by the viewer. This is especially useful for monitoring purposes (monitoring a backup program running on a server, for example) or for spying purposes ie, keeping tabs on how users are utilising their machines. This latter use would no doubt create some controversy in some circles - after all, no-one likes to be spied on - but it does have a valid use in certain circumstances. Once connected to the server, the viewer can control it as if the user was sitting at the remote machine. I found the speed to be good on a 10Mbits/second LAN. Various options are available via a pull-down menuwhich allows the user to change certain functions once connected. If started via the command-line then various options can be input at that stage without the need for making menu selections. In 17 use I found that blocks of pixels sometimes appeared on the screen as a new area was being drawn, but these were erased by the program once the display had finished updating itself. Because of bandwidth restrictions it is obviously not recommended to run programs on the server that constantly move a lot of graphics around (games, for example), but that shouldnt present a problem as that isnt what the program was designed for. It is a remote control and monitoring tool - not a means of remotely playing games. ABOUT J2MESun Microsystems defines J2ME as "a highly optimized Java run-time environment targeting a wide range of consumer products, including pagers, cellular phones, screenphones, digital set-top boxes and car navigation systems." Announced in June 1999 at the Java One Developer Conference, J2ME brings the cross-platform functionality of the Java language to smaller devices, allowing mobile wireless devices to share applications. With J2ME, Sun has adapted the Java platform for consumer products that incorporate or are based on small computing device allowing applications to be dynamically downloaded over a network. 18 CONFIGURATIONS OVERVIEW 19 The configuration defines the basic run-time environment as a set of core classes and a specific JVM that run on specific types of devices. Currently, two configurations exist for J2ME, though others may be defined in the future, CLDC & CDC. J2ME PROFILETwo. MIDLET:A MIDlet is a Java class that extends the javax.microedition.midlet.MIDlet abstract class. It implements the startApp(), pauseApp(), and destroyApp() methods . In addition to the primary MIDlet class that extends javax.microedition.midlet.MIDlet, an MIDP application usually includes other classes, which can be packaged as jar files along with their resources this is known as a MIDlet suite. J2ME 20. The Java Development Kit (JDK) Install the JDK as directed in its accompanying documentation. You can choose the default directory or specify another if you prefer. If you choose to do the latter, make a note of where you install the JDK. During installation of the Wireless Toolkit, the software will attempt to locate the Java Virtual Machine (JVM); if it is unable to do so, you will be prompted for the JDK installation path. The Wireless Toolkit is contained within a single executable file, which you downloaded in the previous panel. Run this file to begin the installation. We suggest that you use the default installation directory. However, if you do not use the suggested directory, make sure the path you select does not include any spaces. STARTING KTOOLBARStart the WTK by locating and running KToolbar. You should see a display similar to the figure below. CREATING PROJECTLet's begin by creating a new project within the WTK. Click the New Project icon. Enter the Project Name and MIDlet Class Name shown in the figure below, then click Create Project to finish this step. 21 Required attributes.There is a total of seven attributes that you must specify when creating a MIDlet suite. These attributes are divided among the JAR manifest file and Java Application Descriptor (JAD) file. For our purpose, clarifying the breakdown of properties within the files is not of importance. One of the benefits of using an IDE is that we can leave the details to the implementation and concentrate our efforts on application development. The WTK creates default values for each attribute, as illustrated in the figure below; we'll use these default values for our MIDlet. 22 Optional attributes.These attributes are not required when creating a MIDlet suite; however, they are available if your application has to provide additional information beyond that in the required attributes. User-defined attributes. As a developer, you can create your own attributes. Forexample, as your application evolves, you will more than likely go through many iterations of your JAD file. As such, it may be handy to place a version number inside the file MIDlet attributes. Here is where we specify attributes for the MIDlet(s) stored in thesuite. By default, the WTK will fill in all the fields for MIDlet-1 based on the Project Name and MIDlet Class Name that we entered when creating the project. To provide for better organization, we'll place the icon for our MIDlet in the images directory. To do that, change the entry for the Icon property to that shown in the figure below. We'll see the icon momentarily. Push registry attributes. With the release of MIDP 2.0, MIDlets can listen for aconnection from a remote resource; this process is often referred to as pushing data. Permission attributes. Under the MIDP 1.0 spec, a MIDlet could only access thelibraries (APIs) that were packaged inside the MIDlet suite; this was commonly called the sandbox model. Under this model, a MIDlet could not query information from the device, or otherwise interact outside the scope of the suite. MIDP 2.0 introduces the concept of trusted applications, allowing access beyond the sandbox. In this section, you can add properties to specify which APIs are accessible. Attributes specified in MIDlet-Permissions are those that are required in order for the MIDlet to run. Those specified in MIDletPermissions-opt are optional. 23 An over-the-sir (OTA) provisioning demo: Emulated devices support network delivery of applications, according to the recommended practice for the Mobile Information Device Profile. New KToolBar features: One of the features is the ability to use external class libraries. Palm OS Emulator integration: You can use the Palm Os Emulator from Palm, Inc. together with the J2ME Wireless Toolkit to develop applications for the Palm OS devices. Souce-level debugging: The toolkit enables souce-level debugging of MIDlets within an IDE such as the Forte for Java IDE, using the Java Debugging Wired Protocol (JDWP). This support allows you to more easily inspect your software at runtime and locate sources of bugs. Command-line interface: The toolkit can be used from a command prompt. Where possible, the toolkit commands use the same command-line syntax as the tools from the Java 2 SDK, Standard Edition. The command-line interface facilities the integration of the J2ME Wireless Toolkit with an IDE. New emulated devices: Two additional device definitions, for the Motorola i85s telephone and the Research In Motion pager, are included. Although these device definitions resemble real devices, they are not accurate representations of them.. Java Application Manager (JAM): A Java Application Manager (JAM) is a piece of software on a device that, among other things, manages the dynamic download and installation of MIDlets, and provides the interface to their execution on the device. The example JAM included with the toolkit allows you to demonstrate how a user would download, install, and execute an application on a device. HTTP networking over SSL (HTTPS): MIDlets running in the toolkit can open a secure communication channel with a server using HTTPS. MIDlets using HTTPS and MIDlets using HTTP make the same calls to the HTTP networking APIs; the only difference between them is that a MIDlets using HTTPS uses URLs that begin with https: 24 Exact compacting garbage collector: The garbage collector in the virtual machine used by the Emulator in the J2ME Wireless Toolkit allows MIDlets to run continuously without risk of fragmenting the memory heap. Scaled display: This experimental feature allows you to enlarge the image of the emulated device on your screen. The wirelesstoolkit provides the error code 3. DESIGN3.1 MODULESThere are three modules for proposed system they are namely Server Connecting Module Desktop Viewer Module Mouse pointer and key access Module 25 VNC CLIENT SERVER DESKTOP SERVER WAN VNC SERVER Mobile CLIENT SERVER DESKTOP 26 s e rve r c o n n c e t io n R e q u e s t (u s in g IP a d d re s ) P C (V N C s e rve r ) A u t h e n t ic a t io n M o b i le U S E R RFB CRFB D e s k t o p V ie w e r P ro x y s e rve r A c c e s s C o n t ro l 27 CLASS DIAGRAM Mobile US ER Viewing Desktop Accesing Desktop Connection Request() Key A c cess() Screen Mode() P roxy Nam e Fig 4 28 SEQUENCE DIAGRAM VN S VER C ER PR X OY M B EU O IL SER C FB R KEY Acce ss Acce ssin T e D cu e ts g h o mn Sh td w u o n 29 ACTIVITY DIAGRAM Serv er Proxy Mobile USER Start Connection Requirement VNC server Start RFB Creating & Open Documents Connection False Refresh CRFB Desktop View VNC Proxy Mouse Pointer Shutdown Key Access END state Fig 6 30 COMPONENT DIAGRAM VNC VNC S e rve r M o b ile USER C o n n e c t io n E s t a b lis h A u t h e n t ic a t i o n C o n ve rt F ra m e P ro x y M o d i fi c a t i o n D o n e K ey A ccess D e s k t o p V ie w S t o r e R e c e n t ly A c c e s s In t e r f a c e b / w S e r v e r & U s e rFig 7 COLLABORATION DIAGRAM31 2: Check IP Address 3: Given Connection 5: CRFB 1: Connection Request 6: KEY Access 7: Accessing The Documents 8: Shutdown MOBILE USER Fig 8 DEPLOYMENT DIAGRAM 32 VNC server Mobile(USER) Fig 9 33 PlatformThe SVNC proxy was implemented by modifying the Java version of the VNC viewer released by AT&T Laboratories, Cambridge. The proxy runs as a servlet on an HTTP server with the servlet API. We are currently using Apache Tomcat 4.02 as the HTTP server. We have installed the proxy on a PC with a Windows 2000 workstation operating system. The SVNC viewer has been implemented using the J2ME Wireless SDK released by NTT DoCoMo. The code of the SVNC viewer has been placed on the HTTP server of the SVNC proxy and is downloaded in response to requests from the cellular phone. We have tested our viewer using a real cellular phone and have successfully accessed remote computers. proxy. When the user assigns an area to a key, the current size and position of the viewport and the zoom level of the viewport are saved. When the user uses a shortcut, the key is sent to the proxy and the proxy sends the viewport information with its image back to the viewer. VNC.javapackage tk.wetnet.j2me.vnc; import java.io.*; import java.util.Vector; 35 implements CommandListener, Runnable { protected void incConnectionStatus() { conD++; connectionDisplay.setValue(conD); } public void run() { if(url.getString() == null || url.getString() != null && url.getString().length() < 1) if(host.indexOf(":") >= 0) { try { { host.length())); if(port < 5900) port += 5900; } else { host.length())); } try } incConnectionStatus(); log("Connection Open"); } byte tmp[] = password.getString().getBytes(); incConnectionStatus(); public void commandAction(Command c, Displayable d) { con = (StreamConnection)Connector.open("socket://" + host + ":" + port, 3); port = Integer.parseInt(host.substring(host.indexOf(":") + 2, if(host.charAt(host.indexOf(":") + 1) != ':') port = Integer.parseInt(host.substring(host.indexOf(":") + 1, 36 if(c == connect) me.setCurrent(connectingForm); (new Thread(this)).start(); } if(c == add) { try { String tmp = url.getString() + "|" + password.getString(); HostCommand cm = new HostCommand(url.getString(), 8, 10, rs.addRecord(tmp.getBytes(), 0, tmp.length())); hostCmds.addElement(cm); connectionForm.addCommand(cm); } if(c == manage) { Form manageForm = new Form("Manage Hosts"); hosts = new ChoiceGroup("Host:", 1); try { int size = hostCmds.size(); } if(c == delete) { String removes = hosts.getString(hosts.getSelectedIndex()); int remove = Integer.parseInt(removes.substring(0, removes.indexOf(" "))); hosts.delete(hosts.getSelectedIndex()); try { rs.deleteRecord(remove); } catch(Throwable t) 37 for(int i = hostCmds.size() - 1; i >= 0; i } try { if(c1.getResponseCode() != 200) { s = c1.getResponseCode() + " : " + c1.getResponseMessage(); } else { int len = (int)c1.getLength(); { int ch; for(s = new String(); (ch = is.read()) != -1; s = s + (char)ch); } } } if(os != null) try { os.close(); } catch(Exception e1) { } if(c != null) try { c1.close(); } catch(Exception e1) { } if(is != null) try { 38 is.close(); } if(c != null) try { c1.close(); } catch(Exception e1) { } if(c == back) me.setCurrent(connectionForm); else } public VNC() { rs = null; options = null; hostCmds = new Vector(); log = new Command("Log", 4, 0); uploadLog = new Command("Upload", 4, 0); backLog = new Command("Back", 4, 0); backDisplayable = null; connectionForm = new Form("VNC"); connectingForm = new Form("VNC - Connecting"); url = new TextField("Host", "", 25, 0); setProxy = new Command("Set HTTP Proxy", 8, 2); hosts = null; host = ""; port = 5900; httpProxy = new TextBox("HTTP Proxy:", "", 255, 4); connectionDisplay = new Gauge("Connecting", false, 5, 0); shared = new ChoiceGroup("", 2); 39 conD = 0; aboutImage = null; rid = 0; me = Display.getDisplay(this); shared.append("Share Desktop", null); shared.append("NCM", null); shared.append("Use HTTP Proxy", null); try { rs = RecordStore.openRecordStore("hosts", true); RecordEnumeration re; HostCommand cm; for(re = rs.enumerateRecords(null, null, false); re.hasNextElement(); hostCmds.addElement(cm)) { int id = re.nextRecordId(); String current = new String(rs.getRecord(id)); String title = current; if(current.indexOf("|") > 0) title = current.substring(0, current.indexOf("|")); cm = new HostCommand(title, 8, 10, id); } options = RecordStore.openRecordStore("options", true); re = options.enumerateRecords(null, null, false); if(re.hasNextElement()) { rid = re.nextRecordId(); byte opts[] = options.getRecord(rid); if(opts != null && opts.length > 0) { shared.setSelectedIndex(0, (opts[0] & 1) == 1); 40 shared.setSelectedIndex(1, (opts[0] & 2) == 2); if(opts.length > 1) httpProxy.setString(new String(opts, 1, opts.length - 1)); } } else { rid = -100; } aboutImage = Image.createImage("/VNC.png"); connectingForm.setCommandListener(this); connectingForm.append(aboutImage); connectingForm.append(connectionDisplay); } catch(Throwable t) { System.err.println("VNC() : t " + t.toString()); t.printStackTrace(); } } protected void destroyApp(boolean parm1) throws MIDletStateChangeException { System.out.println(b[0]); if(rid != -100) { options.setRecord(rid, b, 0, b.length); System.out.println("hi"); } else { options.addRecord(b, 0, b.length); } 41 rs.closeRecordStore(); options.closeRecordStore(); } private RecordStore options; private Vector hostCmds; protected Display me; protected VNCCanvas canvas; protected RFBProto rfb; private StreamConnection con; private Thread run; Command log; Exception e; private Command uploadLog; case 67: // 'C' send = 65481; break; case 111: // 'o' default: send = s.charAt(i); break; } } switch(cmd) { case 33: // '!' midlet.rfb.key(send, true); midlet.rfb.key(send, false); break; case 60: // '<' midlet.rfb.key(send, true); break; 42 } } else if(s.charAt(i) == 'm') { VNC.log("Move Move: Going: " + s); mouseX = Integer.parseInt(s.substring(i + 1, i + 5)); VNC.log("Move Move: mouseY: " + s.substring(i + 6, i + 10)); if(mouseX > midlet.rfb.y) mouseX = midlet.rfb.y; VNC.log("Move Move: " + mouseX + "x" + mouseY); midlet.rfb.mouse(mouseX, mouseY, 0); i = 9; } else if(s.charAt(i) == 'M') { VNC.log("Move Screen: Going: " + s); int mX = Integer.parseInt(s.substring(i + 1, i + 5)); VNC.log("Move Screen: " + mX + "x" + mY); incUpdate = false; offx = mX; offy = mY; i = 9; } else } private VNC midlet; private Timer timer; private boolean ctrl; private String viewModes[] = { "Normal", "Full Screen" }; private String inputModes[] = { 43 "Navigation", "Mouse Mode" }; private char keys[][] = { { '*' } }; private int divx; private int divy; } HTTPSocket.javapackage tk.wetnet.j2me.httpsocket; import java.io.*; import javax.microedition.io.*; import tk.wetnet.util.Queue; public class HTTPSocket extends InputStream implements StreamConnection { pc = 0; length = 0; buffer = new byte[255]; this.host = host; this.proxy = proxy; outputs.push(new OutputQueueEntry()); } private void request() throws IOException { HttpConnection c = (HttpConnection)Connector.open(proxy + "?t=" + ticket + "&G=255"); HttpConnection _tmp = c; 44 c.close(); } public void close() throws IOException { if(closed) { throw new IOException("Closed Stream"); } else { closed = true; return; } } private boolean closed; private OutputStream os; public String proxy; private String ticket; } DesCipher.javapackage tk.wetnet.vnc; public class DesCipher { public DesCipher(byte key[]) { encryptKeys = new int[32]; decryptKeys = new int[32]; tempInts = new int[2]; setKey(key); } 45 public static void squashBytesToInts(byte inBytes[], int inOff, int outInts[], int outOff, int intLen) } }; private static int SP1[] = { 0x1010400, 0, 0x10000, 0x1010404, 0x1010004, 0x10404, 4, 0x10000, 0x10404, 0x1000000, 0x10000, 0x1010404, 4, 0x1010000, 0x1010400, 0x1000000, 0x1000000, 1024, 0x1010004, 0x10000, 0x10400, 0x1000004, 1024, 4, 0x1000404, 0x10404, 0x1010404, 0x10004, 0x1010000, 0x1000404, 0x1000004, 1028, 0x10404, 0x1010400, 1028, 0x1000400, 0x1000400, 0, 0x10004, 0x10400, 0, 0x1010004 }; RFBProto.javapackage tk.wetnet.vnc; import java.io.DataInputStream; import java.io.OutputStream; import tk.wetnet.j2me.vnc.VNC; import tk.wetnet.util.Queue; public class RFBProto implements Runnable { private class Event extends tk.wetnet.util.Queue.QueueEntry { private byte buffer[]; private int size; private int pc; private Event() { buffer = new byte[10]; size = 0; 46 pc = 0; } } switch(c) { case 1: // '\001' VNC.log("NO_AUTH"); break; case 2: // '\002' VNC.log("NORMAL_AUTH"); byte fc[] = new byte[16]; sout.write(fc); sout.flush(); int authResult = readCard32(); break; default: byte reason[] = new byte[readCard32()]; readFully(reason); String string = new String(reason); VNC.log("Connection Refused\n" + string); drawOnMe.error("Connection Refused\n" + string); return false; } } private int readCard8() throws Throwable { return (byte)sin.read() & 0xff; } private int returnDataExpected; private Queue eventQueue; 47 public volatile boolean running; private Thread me; private static final int AS_SUB_ENCODING = 8; private static final int SC_SUB_ENCODING = 16; } 48 5. SCREEN SHOTS 49 50 51 52 53 54 55 56 57 58 59 6. CONCLUSIONVNC is a very impressive product, especially considering that its free. Quite apart from that, its main advantage over its commercial competitors is that it is open source, so anyone with programming skills can contribute towards it and so make it an even better, more flexible product. Even in its current form, its remote control applications are almost limitless, and it will no doubt find many uses and supporters in a typical support environment. This project is designed as per the current requirement to the industry. Using this project we can view the remote desktop using a mobile with GPRS connectivity. 7. FUTURE ENHANCEMENTSWe have proposed a system to remotely access a computer desktop using only a cellular phone, despite the physical and bandwidth limitations of cellular phones. The system has a VNC-based architecture for accessing a remote desktop from the cellular phone. A proxy is placed to convert different devices, to suppress network traffic, and to support recovery from an unscheduled disconnection. To increase user-friendliness and to solve the problem of the small screen, several functions are provided on the cellular viewer. Frequently used screen areas of the desktop can be registered and quickly restored quickly by using a Shortcut assignment. The Guidance function can be used to show the Shortcut assignments. Two areas of the desktop display can be viewed simultaneously using the Twin view function. We have implemented a prototype of this system using Java, and checked the operation on a Java-enabled cellular phone emulator. Currently, we are extending our implementation to support incremental updating of the SVNC viewer image, to speed up the frame rate and to incorporate more intelligent navigation. We are also trying to provide integrated panning and zooming of the viewport to simplify these basic operations, by applying speed-dependent automatic zooming. 60 8. BIBILOGRAPHY [1] http:/ [2] http:/ [3] http:/ [4] James Keogh, Complete Reference J2ME, TataMcGraw-Hill,2004, New Delhi. [5]. 61 Bien plus que des documents. Découvrez tout ce que Scribd a à offrir, dont les livres et les livres audio des principaux éditeurs.Annulez à tout moment.
https://fr.scribd.com/doc/88838997/remote-system
CC-MAIN-2019-51
refinedweb
5,525
55.44
Change beanstalkd default TTR I am running beanstalkd as a service using standard /etc/default/beanstalkd . Sometimes my code throws an error NOT_FOUND when trying to delete a job because it was released due to TTR exceeded. I would like to increase the TTR for all jobs that are inserted into the tubes. Is there a way to set the default TTR for beanstalkd jobs? I guess I can change this somewhere in / etc / default / beanstalkd, but I couldn't find it in the beanstalkd docs. source to share It is not possible to set a global default in / etc / default / beanstalkd or elsewhere, but it is enough to simply set up a function / wrapper class so that all jobs are carried over to then be inserted into a queue that will set the TTR (parameter to the PUT command). unless specifically set. In beanstalkc that will replace / replace the function put . def put(self, body, priority=DEFAULT_PRIORITY, delay=0, ttr=DEFAULT_TTR): source to share It seems to me that you have followed the protocol incorrectly. You need to process DEADLINE_SOON and do TOUCH . What does DEADLINE_SOON mean? DEADLINE_SOON is a response to a backup command indicating that you have a reserved job that is due to expire soon (current safety margin is approximately 1 second). If you get errors DEADLINE_SOON in the reserve frequently , you should probably consider increasing the TTR on your assignments, as this usually means you haven't finished them over time. It could also be that you are not deleting tasks when you complete them. For details, see the mailing list mailing list . How does TTR work? TTR applies only to the job at the time it was saved. In this case, the timer (called "time-left" in the job statistics) starts counting from the jobs TTR . - If the timer reaches zero, the job is returned to the ready queue. - If a job is hidden, deleted, or released before the timer expires, the timer ceases to exist. - If a job is pressed before the timer reaches zero, the timer will start counting from TTR. "Touch" command Allows a worker to request more time to work on an assignment. This is useful for jobs that can be time consuming, but you still want the benefits of TTR pushing the job away from the unresponsive worker. The worker can periodically inform the server that he is still alive and processing work (for example, he can do it on DEADLINE_SOON ). The command postpones the auto release of the reserved job until TTR seconds after issuing the command. source to share
https://daily-blog.netlify.app/questions/2163293/index.html
CC-MAIN-2021-21
refinedweb
432
71.85
XML code shared by various Subversion libraries. More... #include <apr.h> #include <apr_pools.h> #include <apr_hash.h> #include "svn_types.h" #include "svn_string.h" Go to the source code of this file. Used as style argument to svn_xml_make_open_tag() and friends. Definition at line 40 of file svn_xml.h. Create an attribute hash from va_list ap. The contents of ap are alternating char * keys and char * vals, terminated by a final NULL falling on an even index (zero-based). Create or append in *outstr an xml-escaped version of string, suitable for output as an attribute value. If *outstr is NULL, set *outstr to a new stringbuf allocated in pool, else append to the existing stringbuf there. Create or append in *outstr an xml-escaped version of string, suitable for output as character data. If *outstr is NULL, set *outstr to a new stringbuf allocated in pool, else append to the existing stringbuf there. Return UTF-8 string string if it contains no characters that are unrepresentable in XML. Else, return a copy of string, allocated in pool, with each unrepresentable character replaced by "?\uuu", where "uuu" is the three-digit unsigned decimal value of that character. Neither the input nor the output need be valid XML; however, the output can always be safely XML-escaped. Return the value associated with name in expat attribute array atts, else return NULL. (There could never be a NULL attribute value in the XML, although the empty string is possible.) atts is an array of c-strings: even-numbered indexes are names, odd-numbers hold values. If all is right, it should end on an even-numbered index pointing to NULL. Determine if a string of character data of length len is a safe bet for use with the svn_xml_escape_* functions found in this header. Return TRUE if it is, FALSE otherwise. Essentially, this function exists to determine whether or not simply running a string of bytes through the Subversion XML escape routines will produce legitimate XML. It should only be necessary for data which might contain bytes that cannot be safely encoded into XML (certain control characters, for example). Create a hash that corresponds to Expat xml attribute list atts. The hash's keys and values are char *'s. atts may be NULL, in which case you just get an empty hash back (this makes life more convenient for some callers). Store an xml close tag tagname in str. If *str is NULL, set *str to a new stringbuf allocated in pool, else append to the existing stringbuf there. Create an XML header and return it in *str. Fully-formed XML documents should start out with a header, something like <?xml version="1.0" encoding="utf-8"?> This function returns such a header. *str must either be NULL, in which case a new string is created, or it must point to an existing string to be appended to. Store a new xml tag tagname in *str. If *str is NULL, set *str to a new stringbuf allocated in pool, else append to the existing stringbuf there. Take the tag's attributes from varargs, a NULL-terminated list of alternating char * key and char * val. Do xml-escaping on each val. style is one of the enumerated styles in svn_xml_open_tag_style. Like svn_xml_make_open_tag(), but takes a hash table of attributes ( char * keys mapping to char * values). You might ask, why not just provide svn_xml_make_tag_atts()? The reason is that a hash table is the most natural interface to an attribute list; the fact that Expat uses char ** atts instead is certainly a defensible implementation decision, but since we'd have to have special code to support such lists throughout Subversion anyway, we might as well write that code for the natural interface (hashes) and then convert in the few cases where conversion is needed. Someday it might even be nice to change expat-lite to work with apr hashes. See conversion functions svn_xml_make_att_hash() and svn_xml_make_att_hash_overlaying(). Callers should use those to convert Expat attr lists into hashes when necessary. Push len bytes of xml data in buf at svn_parser. If this is the final push, is_final must be set. An error will be returned if there was a syntax problem in the XML, or if any of the callbacks set an error using svn_xml_signal_bailout(). If an error is returned, the svn_xml_parser_t will have been freed automatically, so the caller should not call svn_xml_free_parser(). The way to officially bail out of xml parsing. Store error in svn_parser and set all expat callbacks to NULL.
http://subversion.apache.org/docs/api/1.6/svn__xml_8h.html
CC-MAIN-2018-05
refinedweb
755
65.73
From: Victor A. Wagner, Jr. (vawjr_at_[hidden]) Date: 2004-02-19 17:08:47 1) I like the idea 2) I shouldn't do this (read tech emails when my blood sugar is low... my brain tends to wander and I come up with oddball ideas, to wit:) Your solution to the problem is elegant. I've always enjoyed enhancements that required NO behavior changes on those who didn't want the enhancement. Then my brain went off in "that" direction and I considered the implementation of your solution. I was reminded of back the "good old days"(lol, they weren't all that good) and programming in Basic. In very early Basic one could call subroutines, but there wasn't any argument passing mechanism available so we'd do things like: a3 = 100; a4 = 7; gosub 999; Later, I started working with _real_ languages and discovered the joys of arguments to functions: MYSIN = SIN(X) for those of you who have never had the experience, that was FORTRAN (note the 6 leading spaces in the source. At any rate...then my mind wandered over "this way" and I thought..Hmmmmm #define BOOST_TUPLE_MAX_ARITY 25 #include "boost/tuple_basic.hpp" It brought back all those bad old days (some were rather grim) of writing code when we didn't have an argument passing protocol for functions. It seems that we have exactly the same situation now with respect to header files. OK, there it is. Anyone have any thoughts on "passing arguments to header files"? This, of course, isn't a formal proposal to add any such system, but I'd be interested to hear from others on the topic. BTW, here's a _possible_ syntax to deal with the above. #include "boost/tuple_basic.hpp<25>" Capturing the argument(s) inside the header file isn't being addressed here. ok, the Gatorade got my blood sugar back up... so it's back to work instead of all this daydreaming. At Sunday 2004-02-15 19:43, you wrote:
https://lists.boost.org/Archives/boost/2004/02/61421.php
CC-MAIN-2019-47
refinedweb
336
72.87
UFDC Home | Florida Newspapers myUFDC Home | The Weekly Floridian ( July 2, 1872 ) Item menu Print Send Add Description Standard View MARC View Metadata Usage Statistics All Volumes Downloads Map It! Thumbnails Page Images Standard Zoomable Search Citation Permanent Link: Material Information Title: The Weekly Floridian Alternate title: Semi=weekly Floridian Alternate title: Floridian Place of Publication: Tallahassee Fla Publisher: Dyke & Sparhawk Creation Date: July 2, 1872 Publication Date: 1867- Frequency: Weekly regular Language::. One of its more prominent owners, Charles E Dyke, bought interest in the paper in 1847 while working as a printer in the newspaper office. Dyke sold shares to several partners over the years and eventually sold the paper to Dorr & Bowen in 1883. Later that year, Bowen became sole proprietor after Dorr retired. The paper prided itself on being "a faithful worker in the interests of Florida" that would "inform and instruct the masses." Throughout the 1880s and 1890s, it reported local, statewide, and national news. It included extensive coverage of politics, especially the 1880 presidential election, reprinted news from other national newspapers, and published Supreme Court decisions. The Floridian contained numerous advertisements for both local and national brands of the time, reported on railroad developments and advances in farming and agriculture. It also covered the cigar industry and immigration. Other features of the paper included notices for land sales and a "personal" section about local goings on. Tallahassee, founded in 1824 in Leon County, Florida, is the state capital. The territorial government of Florida specifically called for the creation of the city as a new capital so that the legislature and governor could be located approximately mid-way between the major population centers of Pensacola in the Panhandle and St. Augustine/Jacksonville on the Atlantic Coast. The capitol building, now known as the "old Capitol", opened in 1845, the same year Florida became a state. In the antebellum era, the town flourished as the center of the region's cotton-based slave holding economy. In 1834, the Tallahassee Railroad Company was chartered by Florida's territorial legislature. The line was the third-oldest railroad in the US. Operational by 1837, merchants shipped cotton along the twenty-two-mile route to St. Marks and out to the Gulf of Mexico. These mule-drawn lines on wooden rails were replaced with steel rails and steam trains in 1856. In the 1840s, the Great Florida Mail route was established, connecting the city via steamboat and stagecoaches to Apalachicola, Pensacola, and Mobile, Alabama on the west and St. Augustine, Brunswick, Georgia and Charleston, South Carolina on the east. During the antebellum period, slave-based cotton and tobacco plantations continued to flourish contributing to the population growth of Tallahassee, making it the most populated region in the state at the time. Tallahassee was the only Confederate state capital east of Mississippi that was not captured by the Union. When Florida seceded from the Union in 1861, there were more slaves in Leon County than any other county in the state. In the post-war years, economic focus in the area shifted initially to cotton and tobacco and later to citrus, cattle ranching, timber, naval stores, and tourism. Efforts at Reconstruction, and especially the distribution of land to freed slaves, faltered in the late 1860s and ended altogether in the 1870s. Institutions of higher education were introduced in the city in the mid-1800s. In 1857, Tallahassee welcomed its first institution for higher education, the West Florida Seminary. In later years, the site also hosted Florida State College for Women, which became Florida State University in 1947. The State Normal College for Colored Students opened in 1887, offering classes to African Americans. It was established as a land grant university in 1891 and changed its name to the State Normal and Industrial College for Colored Students. It is now known as the Florida Agricultural and Mechanical University (FAMU), the state's largest, and only public, historically black institution of higher education.60565 ( ALEPH ) 08821943 ( OCLC ) AKP8651 ( NOTIS ) sn 82015289 ( LCCN ) Related Items Related Item: Daily Floridian Preceded by: Semi-weekly Floridian UFDC Membership Aggregations: Florida Digital Newspaper Library University of Florida Downloads This item has the following downloads: 00567.txt 00568.txt E20090427_AAABPU_xml.txt 00569.txt 00566.txt Full Text :: : -: - 1 _ __ -,----.- ..41 - ---- _. -- __ .. u. __. __ .u --. -. --. -. __ ___ __ _ - 1 :: .. - :: I ELabe cI1ejetdifl C-/ ) ( j.Ot'LJb) iiit' iV . - - - -- - ; I'r DY ,rE.S. .N.--------- T ASSl li I i.fJt;\ LY'i i . AIM. All I' ,' 1 IS7L NKW S !KIICS..VnL.: I 7.:.. r'd)) 48. '-- : ---- _ ..voUti"lfl.] .nn "ii-'i'iilininl and \i'id, Th. \ I I .oiiK' into the Dei" '.,' *- pint.; )hilt' ,"ly ononriition ih'U i. msi-n .Me, I then tin-re i N it" iw f CKIIIE: I .\1'\', IhI I' I tiiiiinuf., '. 11,1., nr II' 1\- Diiii'iin'i. ,. ttltl Ioribhtn. hud protlnni 1 ,il 1 lit.I. 'V irpi I cc. If lliririiilnil| ,' that I II,' 1 Dinim) 'matte paiiy ">uld. niuiiiI'esl I lo llilt'ni.iieul" nil lust' let the Hirer! emil votimct'tlur T I' nil. 'hit nm m Mi. i 'ml h limn n h"IIII., ei >i u l I h I'l il 01 '' i-\i. lit nn I I I i Ii i II.H; I >i I bin.ling nit") it* tI .Uumve dead u m > Im h lii linn tin 'I.! t u' I tI , t ti m ' In t llf toiholnr. ihlsnlinli1red I MlfllcleulMri'ngih' I tu nm t tin i Ii"hl ;lutprinnplc till MH Hi, D ,.i" i > 'ii.vi In tin1 (lion er I"nrnl. II I m nn uul rum II hu io tin 11'IIIIII"r1I111""I i ph it'u I..III.I.! I nil-. i ,MM, ,i.. i i I ii, tii.us. I Ii i"i' i-i I .., .. p..ty "'i-inti'inn pulici a 1111'11' Hint |1'1 I and If Hn t ,n> 'inpt! n 'is 11I.,1 Ii v.lmilvd I li'i"<,, I W"' hnte iltl-i'i ""n 1 I to d I. It. ..r II.I "l ii'| Id..",limit, f*,. i.i > .. S, n tin i ,ill i, i .iu" -" 'i u i,,i.llmt. ; \oi ti.iil llii'in'-. > i .I' .h" i in IT if l M H rur ," trill d.- but ____ __-_ _- sTL"ESDA1" II reason > ''i"! \treme j il,h'o. I In lilt I i- i rmn.r.rt <.ei) ,nr \" If at now ft- lon xra utterly 11 the illsMti- by opinion III W h\ git tu IK' Innlor-, and" miii .tt.t", III".il lie I'Xl.iblli d h II 1"1, ,".i .1 i ,in .', lit Il.-i ttili r. ill. it' , \ Time MIIBII. RcpnMican the tibcml-wlmi I whIch 1 have alludeil tin1 Hepiiiilicans could not .m,; thieve und H m1IeaIs t.SUOPhr I Inuionmiiiteagtinsi A. I nl l I i ,-t rvpuiMttH I HV t'l" writA[ |>- Jtf.. 2. I cjll the I I t ill-i'I ibr."iili" ;I ,01!, -i, I I Sen Voik' iii'ltln'1 aiildt'. I ( patriotic RepBbllc.n -tonnltf with Ih" fmN. be expected liijmnn u lm i !I. "it iVmocrary. Well I *il MHI uruniiients I Irl i wen l m).r f 11 riM M M 'I! pi rulplr r i | ,- I < iii 'Ii', n |ii''t_, lure work -- -- -- : , rscj- And, whyt Becaf %upon that thlry what was to ba dom' Sniielhlng wa. to be tiring allot at, in el1nI I would inutn him l hel l lIt Cl'jr: I I1 aSh .mttiiii! I'linii .ill tin 'u pnbln' build, The dislinginshdl n'umrii 1.1 *mi, li'iil vill tut strs--| they would lie required\ to put a party In power clone.Va, lime wh '. im 'to, tie altrrrllllerlll'Wa. on tins |1.11. but I till llruii; only at erring Inns liitmiliuting, 11th'ltr.'% ..l' .",.m.t..I" I IVnl-, inwomen's ,t 'ui liini niijlit ((Jcni'iiil iri'iiil.Tiioinli-man tth..il l t il. nii'i h'ni i 'i'm-i l ln.ntt-ut i ; Knurr, In place 1 hi l I 1' ,. who proclaimed beforehand that ll win their centralism W no mT \Vasthegeneralgovcrnmont (Vliiids, "n'II'.on, the 'bottom olniy heart I call rlothc nail In flrilii I lint.i-il their this lent ol fl.lelltr hn.l 1 tt ::1 ii| pluf" niii the 'itnn ol the propln tbeif purpose to evctythlur that had been done, still to couimue ,IL* ipprewionf Day t ) Circcley ., ch itrfrDin and even though they might deprecate much by day thctei oulragis on miud I' bo multiplied. niRliier and applauso.) Let U4 all go together aaliitcd. my cum, n hen I 1'"II'r(,' h Ihe duiucou, Di'tnorrntic n lient, and ho flute riiin( Imllsirri zenlm wvni de that had been d'ne. much that they had done; They paused \'balU i uled 'ike bijonet bill, In and let us all c\IullCrllle together and If there la nns tlK1, nlillCrahlo jillor. 'illlC.1011 ought the true I> the tins going to never in cense tlicir ill-timed clamoring Ibomac\el yet the process of undoing they fear. lis iecond edition Th :u fime the Ku-Klut any fighting to be done, lot us all fight together lo feel Itonnred ?hccws: toi m'cnpt 'idling ,m i ers out WHI miHTtN I, tnlll on not Inck until with kick In the name tI> ttmtl.thgh's. they shell do- \ another revolution, and where bill : then came the authority to suspend the and II there Is any dying to bo done let tu all dly In wl.k'll I hail prrpnre.1' In rhnln lcff, I 111'1"-- and vatiint penitrm.m quarrel hue Slates them he [AppMuv;.] but I I will ADVERTISING BATES the process of undoing \ollllld., nobody could writ ol AnAriM ferjmi a tune ol pouco., What wo together. [Applanw] Nov thIs IJust what I I Iw I replied to him .' I do r".J I honor,'d, and. ll i nn' I II gain for hi* own CAM: nnd lieneflf., smlgctutt I If i 1 ; tireless o'Uriger i-f cvjryililntr. Uiey nd-- It for to bo done* It was h'W. for tho tint lime do. had lined ( arc always, know dy tliu. fluent facility tell. was Impossible IhIF'fol. tholtepnblicani sug.gl.ell ant you to i ioni ill him rtciinmul' n.uild bate humid nn t thn, | >lpoiu' chiilklng diviion or to unite will thin tImid that por,ion of the ) I I n hiutrI, .." [Applause ",, ., ol hi* I W III, ) ll they llcnnUllCt! tVCrb! )'mC'Tr upon 11t'I'UbllclIlI/'Rrt/ t'O.tIT IIU.TIMOIIR. !. ; ) ''II n"1 Mr.I h..hiltu Itt', fi.\ly di> -, I think he. ttill ilu.l in o'r dissiitUrlcd wllli 'ihe Iliorgli | rohlior, fnol, who nil! not bn n* indi- and M ask In It nufiitinnntf .\liiaiin| was' to i as .i nben, plll lslllc 11(1 manifoit their and their 'I.'II'II\.cltI1'n, If It were not for II critHlu run- | pusslotiH itt' Ihn e lit ks In tbalk, and th< t will In1 MI u.II I mid dcstruillie: as h llii'inm'UcVhiit a THE WEEKLY FLORIDIAN to On the government sincerity l Intliimcd its I never 1\\' tin Oel'lve. m n'linni! but' utterlt was Impttiithe| for the party otur Faith to principle, i.nd by llr t thumnlvca epv son w hicli pel'hups you "III'c In the Iimgre I pieIt wiw Him, Uml Ilil, mm: ll.unce; 'unt Ilirrlit;pen. Indllliri'iil I | ltr] vitul i .' we hiil lout night of thlrtcs, and rob- blnI.1 IemOrlll of (lift argument I, would end lliUiiddn1** llglil laiiglilirnnif aplilauso | ll be will unit and Hadlcilii mini1 iii lull ehiunsemi and TAU.AHASSEK: :, FLOIUDA. e\er say 'hf lheo ( nconstruction ruling from the purt to w hicli they belonged; .1. tIed I hi. |pit' h> ulom. mail tt emit ,to I llnlimimd\, In IK 'In t lii' kii tip| , king I would not enter (he dl lim of fur now "ii procc even a and upon hlmhitsttuflc nf Im , mm It Illlng nov of their It were Is and a and dared part "cn'li. were Just were right orgnnl/c UII 11. was tieeoim tim -mett nl tliii m.u, md ri li. bum , II. will It. find ih ' that ucstlon still iH'lilnd. a* I'' n lull nomination I tusk-i tik: > Mr They wcic not they were not uow remeniliered Limit it was jint tried in Missouri. <| did do\ II (Urral umit.' r It,'. tag M ) Oreelcy they 91111 ) ammo.tug' the --' just will nvnii'ldi'r f. &.U.It iniHw, In that Sla c the Democrats Itiilliuiore" ought to make liule\er, muy l he my I Int-niHi' lilt rumht ri'-olio nnd ,, ( I II tlii' r gontlenien little urn tlinii nn were not right, was | ihlu for that I were opprcMcd II nmnhOiHl nl ihc, moral ''I man' It e\ I Il he job. III lii.' individil.il opiiiion IIIHIII h hut siibleet, I want ).tll110Iln.I.I,11I1Ihlllll it lint *n tib-union II. he n ill i jiust tut linncti ItS true and wee. nut them- 'l this extret of the the Democratic 1 aud w Inbits " ills :5 portion ol party In Itcpubliciin party tli lib} I II hmumir.il W hj oni I Ii irate I tlic 1\'ln : lie Its htltietu ,ttith'rs with | tiKilnm i nnd Intciuj : P me rourngcof a n unit lirnu Ilron | n Im to t-iitu' for Mr. (irrclry If : : : Southern Stales ever to dixhonor w as In n, Curl Schurz and the gfiitlemuu, 'be ,01.1II.. = power i i unlit Ihen11Ivl I admit I Is and I I mnru I unlniil. who, seeing (Uie,, .'migtulitutu train ,' I - nuy opinion am going stImuli no decide. I toll them liluir; wrong Niy, Frank made what tunic, such Uencral tall the Ih.II1II..11) iJrutt n n ctlClol at that. (_\ppilua] hownow you tthn I, 'ihiuilOKd! il llm I..'" toward l ' coalition. Tho I republican: in Mlisoiiri w itll It iltiiuori' [Appliiuso ) I shiiU 11..1,1'I1IV I I ) lie biuiniidii I lull siccd| wittily Milling toolny, Iliu bins nf tlio land ; It vas linpouiblo to elements party or- wn* iiinlmliil' noiild I ' r. -h:1I hits bring inmmlmlouVhy.lnj hlm cll T .300 :t5 ..600flO, f 13 00 for iv common piirjiotc, together tI8e ganied n|>on su alanti illy the same |xisition to Judgment ill 1' nKuluiil' h the whole. pan) Wb"II'1 I ; \ filemU" dnii'i tun s. ,< the va-t diilVrI 1 on. the Inn, k, throw ld, tail in I, mitt ut htiuls to i ti> iipcrite null alt who are will U.nllclll puwid 2 tiO 900i! n oo tn ooS3 ;1(0( 00 teally wl-h to accomplish which 1 have al.uded, and they dethroned lIme set out with hut mote 1'lgIII"'III11111111'8' agn. (lod j dice 1.1\1"11111. ttt.i i ilr.nit ,did thul Ph.gnttuiii.l tt Illi his twit feet, unit rrMora Im'ul Stal* government nml eotiall- 1'111 I us n oil!.IIhcr. tM'lloned ' a I II 00 l 1.1 00 i iin 20 00) 00 40 00 common mel the old ; that I w jOl. Itudicul party of Missouri. They found Ibo Suite knon ti..r.'n' not the Mitnllnit crctice In in)' 1'111'1" "t- Ih. ,ui.lili.m, mi) nhiili LctiMirn'tldind I liicflci .in t, il tlmt I 11 u ailerons and coti II ill himutluttu upon I the Federal power, nml I 1100 ooA 8300SI 80 00 I 48 00 there Is a 1110. ) Is a way 0.111 true in politics lu fetters and IIlli'lIerl'.I", nnd'enfranchlned the heart that eiml.l ImrlMir pitrixwe lu do anything I Ih'lh, t I11..1 t In be ilislUllH'd I oil the iiume I I- nm ug.iinst: him he tin ild 'ill, If M t IH' willing toititnpl nay honorable :.j 1:1 00 \ 00 00 I 40 00 60 00 as In other thing" Here \:as a solution of tho Democrats and m.id.' .Missouri tho most Demn bucontribute nil my huinbli' power" \\01l1.1I|ier- t tlnnt, a its nll.I.ii r u snlrmn, pledge in The Ins,tun I jUnnt Innjthtci | i if most itig Ilio wrongs under nliicli we 6 fl04) 20 00 :io oono SO 00 70 00 whole matter The DenuxratU party ant tIme collie State In the Union Tho suirgextion then nut to devise "mime i henic l h)' w hit h tbe I D" nm- Ucn. I.i'e. I lie ttoiild hl\'e: limit hilt in his\pmiccl hulli chtllki'il I. ) ensit' that nnlmal, be \t.i is i iitnl to secure c<|iril rights to tIme Southern 200 4-1 00'' ooM 10000 mil"1 pirly. uinli-r in tIn color, under Its on n I i I Illcm-nisl i lum.'hlcr | I In I the mini pcopl" In the I rninn constitute I 13 'V00 * j ,1 In lid that luctc lt"publlc should soldier ( mjaged move were not was or '\ /" In l nr as 4 il I In had, nut done it Hut .\Ir.I hrmtli ' III 4000 500': 00 1H10013.00' IWloml. admit that either limo amendments the nation UI",1111I8| Chub Idea and if they could M nd, rdl,' rpriiiiildpitiitlolor 1 > | .\(11'11101'// lrcl'l.111111) ghm II nn plnlini, I" jilT Ditls nur Incinl mild 'he ttould! us lilt 't trtlloi, a fool aii.l it robinr. ilien the great I His 'I fl00O I 70 00 7.O01UUO0!1 tiO 00 I mnv nni'irk her. m PIH.IIIL'. lhat I I I I.Mr i inet lileiiMllc mlc |itt (he ih'lilot John lllDll ll'n tin' huiggI tool .miii! tin- worst robber or the reconstruction |1"111', In lulminnri' or Inform I successfully o-k'iinl70' nxm| that |>ositlnn, m lie lie was a volunlnrt ,net I III I I.* act nan not, i dune' I ncfore he tumid lolcfoi cither i.e. lid that the Democrntle! would Viihlmitthlmjhiiitfltmsisvu'itseil: t In c ma monllut. for Shim. 01' eitherlili'eliy 01 ( ,ulnnd belnp1 you to night [Very w etc \ right lint they wits party route purpose redeeming'' II pledge' 1,1110 I linn hnrmnnlniislt men' Ideas A I'.U lion* Inch lni pwe: It Mnsrep make tool, did agree to admit. that they were accomplished to their snpiioit. Very well a call wee luudothnt for u ri'iisoii, applicable to li-orila.' Knowing I illiislrati1 il jnimiple. ( ApplniiM1 | I with i llnlr aiilaiist-1| | I limitS would be taken .'.'1111111"lrth'H ing uncniisriniisly Howl I I On his linn. of In nmn. Adtrrtlrrnicntii Intrrtw (fin thin one month,(t.00 diets lllght or wrong the thing hud, licen done the Itepublicniis entertaining this purpi', ste|>s by \ lo I tit$ not snylng i i-r I thliig\ In pninunui- mnl hale, 1 think llm detd fm tIme lii'Klnniri nl P hIt ramiu 1 enter prr squire| far rl. .n4 IH rrat for Mrk .n".qnOt In and, right or wrong, time thing hud II remain I and willing lo cut loose front time ruling ihymmatty, endeavor I In secure another rerotmil. rtit'tlntt ol hue IUIII.'jtJ/.n. It r. llrcib.i 1 but i I like iudepciulcmc" .Inlm, hiuism tm'gh.i''t I'm' \lie I'lenidi'lit -'hiiiii'lr.iiu'o nifilinl, flubs Intolrrnnt nmtury, StAt by letting aside Ihe l'I..lIfllI.lf II should l/'o m tin1 rrrltull dODO until the the cxcrciitcofthi'lruwn should me t at CinclnnaU on the let or May, and tohiruImtlit sonic" luu.itterI I Ilk.ii Im Ilic bc-,1 griillcinciilio liiilulK In Illiiuc no unno-ompiuilcil the CASH Hill not sovereign pmJle.ln rcco\cr suDlcient virtue orgunl/e upon thnt bams. One of Use moM dmtlnguHied Dunm-rallc situ hltY put mywll lu |IKi'ilon! weoiinteruct I limn mutt i.s.t ii'ldmg. I Unit .delcr to the, npmlmis l tell In kit On In ould nomin.iii, | fi hhuu'uits.-Iu'i's, iliry liouM, nt lenil re Ad".I.rm.al ifcroiinpplnit'e | Hint Hue to undo pwer.in mite peaceable onilors In time UnIon took tIme lead this movementand us lame as the of othtrs but when nur pom | the rlmrai'ler. iii our |K'oplo nml time grvrlty u , ftttcnllon. f , ionics 1"11'1.' mnuhixkl dcd .eh.I the moony oacn.ducn pot corer the ngmtxro! Wa'. This was the only (ol"llon COI.llltlolOI any and. going into lImo dillcrcnt purls of the West Slnlc] bus satlifaclorv been cuuuiruuet flentlenen the! result, evcrywhora hiSS been than entirely thin Illd that I like to II 11111111 net ,it* becomes' still South Inin r, bus until lain 1 non can led kinm hi eta ol nn mid lower loss I.HIIC. aiul aliiuulon the ugly if noi rrlmf will a 1 lew nnmbtrof member of the Democratic party c>er proposed and coming as lilT South lu Nashville, in ado u filth That I llornec (Jinlii I. IIIIK done in Inntthnht sate Ihc, dominions nl t la"'lun. friend's t lime, nr.r. I b la.me to 1'\lk' ( To concede that, u fat exists, by no siiceclie* In favor of the move; and, they were pcoplo are wndlng In lip shouts hands. that This wo have tin1government bisloiy. Tin re Is no 1'.11; heal 1'1 it.ll'h.11I dale | Sciismlnii and I nur nppl,HIM' | tavnritc I If Ihe I \MiTIIHI tttu".IN rita O-orRHATION.. our on n truly is nn i dn. nr two ropltw. only of the paper will h.oal lo >d- i means implies or cOIIO1Ihol i ought lo exist.\ grand orations Hill of patriotism. llul soon occasion fir, r'11111'iIljC.llllt' let It be reiiiernbi'rcd this, I iidiint. but I am .|usl iritlng Uio rcusoiittb man'* cnniluhlc, Hhould hi1 i'hu-ted, I ICilY .- ri'rusiipu wliv I AID wilhuij tosupuuit t It dOs not make I for Its exist the move' seemed to wane, and Iho"u" ho ) Iliu, S.iutlicin mini ,is not iiicmi-isteiit, t ( ii II thin llnlllinore Convention ilmll unIty, .rl"'r. nnlrM an c.t&1 l l nuwmrnl lo ttic cnntrory If )01 tint this, result l I- not attributable!, In thn least in muy tilt tutu place In tb,il udiiiliilntiutloii made ence. Hut what the eOlel.lol to be made I looked to il witli hope, n.s the tiicaus ol redumption degree to our iillni frlemU On h thpconlrnrv.the1 M>li' I fci I I Horaci I 0"., I hi's Nil k mil, indeed1 I Kiel, out New \'ink, i nlo, HlicMiiiHc of the South, by uch Adtrrtliiuni'iiU not .ko with Ibo utnatic,or tiraciII by tho Republican who were duwolisficd with from Iho oppression then existing, began' togro result Imvo bwii accoinplistia, % l, not lIlly I t am willing lo cooperate, tilth tlds Clm innntl Kjli'nu'u, I Indliimi-nil HID, Stun but I I, dlFcr to t tho North tlio hlghovl |Kw iblc III! be until turbid. accordingly. their own party f Why, they were absolutely to \ lalnt and, just at tbl critical period of limo Ithonl their aid, but in tpilool their unfortunate ni'ivmteul" for mini. her rl'' IIII. n tutu IK, for, Kick i nut I I Heiidrliks, and I 1'cmllctnn, ami of our sincere desire to mil sectional contnct ID.ee er0 amonnt of .par. and quit their party-to ollndol 1 In the zenith nf monte, largo nuuilierof the Republicans] of New lolly. If these gentlemen wblluok extremn I the good Ihut I lulifto ll will accomplish usl innnr, ami I (oilman, nnd Ad.mis and nil anil tiavo n cordial rc-iinlon. It lint, here- \1 a.ll.WbO Its power, to abandon II onlrl of the government York, with Horace Urcely at the head, came out cv1,1'11I'I'II h)' lImo K"1"' I that' II Inn been dilllcult for Iliu Northern length of time an by rale, nqolred ( positions hnd, I IM-CII concurred with you would, I t.lnm'mtiiy ucI lili-lnnu leaden of Iho Dninocr.itic, piutf, people lo to conflne their he alI to ."U.own b bnmneniaulf" and unite their fortunes with tho Democratic nod joined Uie mo\'cment. [Applause.J to-night w Idle t be under, tin1 Hdininistnt-" I complinhcd., NOM Ii llott cili/i'iis I I I1'11I1' I fin all I Inn't Intlci-lmin, in (i.iou. glut. \\crutiiucre In laying clonu our grnn a..t.IOllrt party for the purpose turning out their f>toil the Cooier| Institute nieetini was culled 1.\'I'IIk.\ your intention I In I the (fact t Hint 1111.1 rl' move Jtidl'i Sti-plieni last a wiagreed chteifully to the ' iiiglit nth."I. lion of the I{ I '. with Ihillock t for InKi'd) t'it. itt einaneipn- oUpul.t. former comrades( [ ]: ]J. and they were and then for Ihu flr olpau. per IJincrimr. and bonds, like thiinib iiiiHirlnrit| thing",. excited htutlii'thi'ttritlii' in repudiate'Mr. i ii l tho negm. It has beoto Impumlblo lor tIme Icctly willing to tlio. 11e Democracy open I what Miall llaltiinore du Shall < nniplislied u 11111\ lI.n. lot Ihc -al.e nl iliittn ti-fMldcii Sntilli, Cur ratio (xiriy to iniplru title! newlwl confl- 'I'.rm. of Nub..rlpton. ; simply I Ignore all i ut upon Ihl rm'- Literals. U wont on swelling dully. 11 grew into she w i tim say l'llImllullti..r sli.ill Klir nouiinulo :i,i tIdily. Tint llepublli ,m p.ul, hud' lefuwil,I loPUSH I tthile 'niilli ( 'iii thus beisell, mtli the liccnusi' lliat pnrty wIlt rhnrgnl with ., \ IVr Anuuia, ((10 a.ac.) $300 construction policy, put U back, whero yon put lurgo proiiorlions. One of the most' Patriotic ticket go Fellon-clli/eu", Icunluw lo 'ou imittukhethat a I llm bill, removing the, diNiibdllie, from i the I mous tone l nl i liei coiitciitloii, imploruH nlunit MTruion, nml willi n ileslru to , six Month*. : : tho war of seessl"n. ad timings of Iho i"ul. unite contentions of our history awcniblcd nt Cincinnati > I Soulhtin people nt all. I Il I bud j .0 h'l trouble como lip I""it loncs Imidei,' t llnin I the clnhk of hit all the resilient Ihr uiir.iiml Ilicexlrime this question gi\'olllllllltl'lIi I Ido iluiiis m i iilr l Thre Monlbi. .: 0 together In the living present to make it gloriousfuture. tile first day of May lust. They organl/ed not disguise it I do not know that i nnd, oti'r ngiiiii. l'hte) h'id minugul In vnlii "I'j ( luelcy tth Ihennlt, Impc fir bci iclii f '-'* iiilrriiiiicd of n li'W Southern I' Hilule t'upy, 10 [rApplauiol Well] these IcIII'm11 of. not thn nlMtfonii which Iliev ftitolltf'il cmboiliett I, lion for solution has !II'I'II sulmiil'cil lilY anyiui's mind' dott n. (Iteel'.t hud .limits. udtoralud. Win tliUHi.i-.iie iinpliini"'. | Ml u I'lHimbs' bus been [ Imvn ikiihtl i tlm Hailunls! In I their IIIIH| ICI- __ L the Kcpublh-an party were Jr..lly wlin to In a large degree Ibo principles ol the UcinoiTiil- to w hit h I hive, fiheu more aerions and earm st IbI'l'III'll1nulll'I1I1\'l'lItI I I inn mel' 1111,11"1..1.i .." did In asmlviHiii Im .1 xtimghi I louis-ru h ( til I Duinocr ilic uicvrily cu I lime qute'tl lot,., -- --- do. thl laud| to luiOIh parly Ic p.lrty. They put in A lew woidn tbat contain ooiiKiderution. I have cudcat orcil to look nt It I lutioni 11'IIIIIIIIIIIA', t 11.1111,1111'1111".1"1)-I I a t lint I> 11 I lint Mi \ uttului .' Suite tlndiaiin) liua I nlremly cxplninuil to juu tho origin, and THE POLITICAL CRISIS. for tlicnti 01 only that Iho a little paper and vinegar but they were slight. in every light possible. I have endeavored toexerrbw tutu Mini' wnubl In) j"III"III\H'1I\ that mfhjccl, p lti-y I kill lln.'il' h her i nut i-nllnn.in Ihc must | (ml purposo of to hut in called tin: ties Democratic \party should h.1 that il "w as capable Nobody dreamed Hint Mr. Orecley would become HK| >II it clear cool, dlspasslonulo reason I I promptly pnd Uic bill tint ilms disnlillineiwere i I in in-inner, lor, I Cincltnmll, ,, I einloisem, < nt, I''ma s Tlmt inoMiinnt Imil tIme warm ap- organizing upon ..hl'1101, 'for, if the time nominee of Iho party, because n revenue miprircinlnj my f.'olhitgs for I i-onfew If I Iallowed reumauu'l, fiom 11111'111' |li'\\i nt nm Smith Vi.uli. es blmu'll ttlll nbidc Ihc dci inion ol nil h the inont ptominvnt Northern Uein- t t. 8PKEOII Democratic party, In "' orgimbo up tariff n* expected: bo a plank and It was preudicei.| !and I'eellngH loyoti take ern pmnli* I Iliunic toil he is, mid attn has been, hi unil I ua liiikn. il by nil I i thu Norilifrn, mi on that position should go ti i pieces, or ofcourse considered barrier Mr.( Oren my my M\.I . to UIlIlI'III.h".IIH"II,1.11,1\ , OF lli. an Insujicrablo I niehl hits In1wus tine ( onVi iiUuiiB It bail no > hut lu there be inducement 1 '''slolI uf my judgment' would, every hour Iniin.n m in, tutu u palrinl. [ ApplniiHc.j |Intl|tuner prc- .olid no' lur Lib ley's nonilimilon. lint wise and patriotic men Inn tn niitlaw, and llmt ItI ''IN un 1111111111111 Snot is til'' I' inako I'rexl'luutml of (fo.llo the Pu UK' ibclilon riI Haltlmoru I lius In m'utmue'nm.o-y M limIt ' lifl'.r.y nu in I day (hat Hon. B. H. HILL. eral'Itcpublicans to unite with o.I\I.ledII'I'I. great caun will not ]let small things stand In I could my Rutlicr\ thin whole spuro record of reconstruction I so II Ii llnriiiu. !inn'ley nys ill| mi "murage ){ di'n.I by the I 11'liiiK-nille peoplebrf.irp multi| their uun Hue borne by t their own racy thaI) I bleve. and I \til any ( tIme way of success. Therefore It wait proo| ..d Infiimy Into onu hull and make one great tmnflrnof Ilonio'Dnil', ) h..i- :11It., -..lid, '(' |r.\ '' ,\' I lueils, nnd ttbi'lln r you like it or not, ll ts benren, nml, n larno number of Liberal prominent leading mlmh"r ol that this 'question of tho lima", should bo rclerrcd I The niiiiiliiitiiiii, bus -irli'I.cii, Uie fitter 'Irmn mv dill In inmnr.HI nero willing I') co-opernto with the it Hut hush I bush I I'fllI utah 1 huve been ) UellTered by Reqaeiit the Mail ofHepreBCBtaflre tho,Delorale ham II t) In Ihl X orll'r Mates be buck lo time people 'and let thn people si.Ilio lime laugh! by Lit'thm'r ctpeiieniu to submit I..m 11I1111) II.libTin* leeli'in. nl' ll'irnri'I I tI,. lev ttlllsi i thill i-ti-n if Ilic I Demnci.ilic) p-iilt ns flu y mi Dili b tmi'. II 5 lie puny rnuKl onran-, ., .tllanln Friday this position. Icl.rlUc t ) COIO initiative to question to suit ,themselves. This removed the thing !lmt were not ugri'eablpand, we m..}' ha.i' I iR 'luilillcrH liom. .I'llun.1"11I'1111( '| ii" (k'tm cniild elect u slr.ilghl:. h Detiiocrullc lielu'i ti ( it. There ut in no coin. nl-Iti),, it'ii l mnvlu June lllli. move. Wh Yllulllghlmolo In difllculty and Mr. Irceley a timely BllpIO.II'r.WIIR to submit In many nion1. We .must hay the I.nvVe I liuiii''ii, | Applinisc J division* now mutill'csi, sticccvs on I thul h I il'lc. Tln'iu, Han oirlf_ ihc :iilinl -icn nf the Eye.ID. 1"1" le'nuO mln the nominated( ami (lutZ Brown onu ot thom \ must' obey 1\ hat I tie courts divlnrc to br I the Aii'itbii u'n.iil ildng, that this itirn n tin;, ,mt '"11plih"III' tl'iilM be impnu-llilc, And Intel I ttl-hl I I a hlvli, ri rlil or w i on if. h'id ixx'irruil. 'I 1 herr North ho was supposed hI tin last one who original move is, who stiurk the uimcklt* .Iromtho l I tin- 1'1"| |'i.. ni'isf dniigrTons lull, lu thus Soiiili u trouble In h tie Nortb Hill , mv nmi uulortilii'iti'ly' ln\v.' impriv | oin p Inch: , VVnlitueno-lifht lumti I < u would bo oiirjudjiuriit ns nm ' ol LvRiKfl AND GENTI.EMEN In early suspected possible liilldelity to the Democruls of ;ila..Jtlrl.11.. put, up us Iho opinion\ en i'r """-11I1'1.1 for llm | pith hit? , my pniiiosi-nf Iciitn youth Democratic lttti tim' '"\)' ''nntIur.l..r I onr iicllon' whl'lIlI.rIII ecu miglil In ll Is lids Tin. IIMIH- I u|uum ti ucis i, auint iun\cini''it WUH I impressed! upon my inlncl the vitni thought tllt Democrat purl u a \emOul. ruined I second nun.' [Appluu: ] ItO, i' >r n it.t Thi'nfore. I 11111I pertifllyilllni; np' lnll/iig'| the Ai I.u'ne,1I1I'rlllilonl., I* kIll'" II n ms I nl llchiul I Democmls In Ur1 .Ninth ti liii It at Hi" Koitili, nml. It it palulVil to mill, paition) the greatest fo 01 good and incapable ofttmty the prmclplci With this niovi'inent (Cincinnati S tlm I Di'ino- bull-ii i ill.'d lite F.iriu Hill "--ho' Hi) nm I mnl ufllim lImit iblefreuMiii ) ill dfOlOl" lens 'niniier' | seo''eshmtti| the nnd' reeiinatriiciltin one uhvllic , rijfht rel". TK elected] the f 5.imluleoc or purt'of ho the Democratic parly but I critic, party had no arlivu! lonuucliou. It is Iwo III <,11' triune bundle, t of St i liifmny ftC and bun' them IIi I. liy tt hlch the Federal I "goicimnent, irntlc puny i us kipi, Iliu minority In ihn lliew u'li-runp it "ri' niwrly r*Ufut anil 01 passion' In t&i0.. FLUb U Inexact patriot as was Clle forward to make IhlD1'eilent thai a great many uipullii/ed with it. it is true out of lint p through il' own nlllccrs! takes ehiirgo nf t h the dmtl.m -- mnl m IHI! Noribi In h.uUM is IICIHIIMI nl its evlili, ni'e that the I I'm emu rhlmC puny vm. 1 confidently believe will night my reason brings 'mo lo thecutiliuion t- proportion th8 suc that u large portion of tIme DL'tnocratN dcclurid I pHN' 'iiicls uf tho country ,throughout I the ulirm-ms it ii.nrri'' I lu t ii aUI"lpn ( thai the Hultlniore Convention nntion. nl (lie Honii', nli.ch hale ine I' i'I'taI inutcniml lo correct golutlo* of tin Pel.eI ceed [great applause], with the sole purpose of that it the Convention at Cincinnati I should ought awl I llii tiny sty of eil 1 wise succeed will: mtiitiiy tins miiiMi'c I 11 mudua mid me rcpinc,| in licit ,' with thu.Lmtuu'rith', til lu'nt 'ne extremes men in tho natioo, ua 1.) '*0,flm Who bo laving attention the country. Now, fJowellzcns. I call in adopting n sensible) pUtlorm; they would 1 Clnelnniill iitvompllsh movement.mORt gal by[codperatitnwlththe Appi.un el If h I l I loa; to Nett Y"lkI'r.|' In 'beg the pmpli' -MIS., i They uppliud t'"i,in I 1.1 scnson lefiMing nnd I, tIme country.. : Tim mr.'es! I'. ore fmuiit.u! ; tho fact , lieve that 'h* femillt four to > ; L'pnn pending thlt tbll recommend their the. iiiitlinKlli: u of Now mOVlI1ItDllio to IIlIIko ito nomination YOlk wlell, tho party ilim . I the ineor aiuS alum itittity in m wis: oanY8 could Imvo bad the construction, uf the pU'furm' leiniiHtruclioii polict by i patriotic :n)0ii for I'resideut Ibo whole coutlnuiu're of not tlio .1hIOl eoncliol of principle on but uuilu will) ilium lu defeating a common ene I ul II ItS flr l ''tlteiiipled\ III Hint Slnle. III stnl I his tt yniit '.e, tint here mite liiu Nortb 1 Jio of thu made 1 wonM I liuva madf I It In smno respcctn dlllercnt. IN mi i siiry In Have your i iiuniv nl 119 ua- nal theory of American government .I lep nds. part party. I nolh- my. ..' ... .... .... aUl It. tutu, II tt.n th" phsnago of Unit ,' r'l'j *Jniiin lint Ing In thu world but 4 l IM| IH ..lMMM nt Ilifl fiAttrll n iibnnt onr consent, .mil hi_ Inn u ni ninny ll P P the -iniraLreiturc'parlv ; There are wise men In the Boutli, and many of ihu concession 111.hlstoiicaTfacl. '_- ___.." "V"'TIO'f. df.tiia. I ,','r'"II1Jv' wOIIIIIII"I I ',* t.t'xfit' fltji I ,,. fllilitrnt IIU oils", llT Illf, u'JII'UWM.' .1,1,1", l.pn..U.1..I t '10.1.I (i.liililloil,I nils' M'rninc nn e : air ,, & ,,,, & 't'lt.- .',ntii t at it,,, I lniifl thum who believe that upon the roulUof this O.v.' Z.I lt..based.. .. tUI"flnn ''to. .. in *every J' I Now, 11'11101'III'n.., you havo In n few words! > I. 'If thu I D'iiiocrailo pnrty, :'could,;i; tmtslnmll; ;; ; F i line ,.I I HIM. IH"tI li'inrtiirf; | ;: tvhen,;:,; tlial;; I iiii'iisnrnnosiiliHsed 1u .ilcuiriiiicnf| t nl' Uiu goveniiiicnf iiceomplishcd I wus di'li'nti'il ami thus ren lered un contest ImnR ilostlnii"the abut] minorml the., tnorni SouthernStatPS. uml department, would recognize and administer i tIme origin tIme mciiniii, limit purpose and tIe 1,1,1., ItslorC's.I' might |lit' willing I.) seoihcni mukonn If hen, nnlv npplied. fn n fmv Ifirgfl, mnl itt I,ui-ta Ih'1 tunittui ittti's Lii. ,t |II| tim ri'i'uum,' Iv hit-ut) Hiiiithrrn uileidiiew, to orgui.izi1, political. Whether these.f Stole shall continue lie<.o auiendincuts, right or wrong; that there lohophy of what some hnrc Klylud I thu New 1 lie-I i in.I'I.I'"I"1I1 noiiilnnllriii, I wish II could Im hll\ 1"111.11 jrant h rind I Ilic i''I"'rllll'111 I of i>nfiirclng Miibuul In tin m .Votv, lur us of ih", I rt y on Ibis niuvrnient and (untie' tti') ruiv lobe of ] himtrttmrtI[.\pllallll'.JIul; ilia brim full of done, iud done -.in' a"Illf Hint inoaKiiio upon New' \ twit ..Mvowiiopliiimi 1 inclsl Unit I h It'I I I Itt-hr Dug nldi'd f to bo Insulted whether shall WI no right appeal to auv higher ponir (hat p.itrloliatii rcsslnlly, it nhnll turnout ) / lu'ttuuui'rlms It- pullt t xhall, uu'; imn by Slut >;liubliCHn oppressed they Supremo Court of the Vnltcd Suites would fiom im- original inccptinn tu this hum, I I Hint it can be done. no mun tt ill I rejnlcii 1II00rel'nra'MIlV was smith i Ihe opinion nf Ihe lending, tin- |.<'ii'ht| on n pl'iiPum, uml null cut I n'uli't dnmagogiieii, nt hum I.nrlh ic ill continue to bo whether mere vassals] elinll to the bo Federal loosed from gov iiil to give any relief against thlm. upon the Mow the question is what will time Domncint-, : thiin thIs 01'11. Hut I ttlll proceed to Denim' t rns! a u", t hut i if New" Yoik submitted/ to plidgi'd to lienl Ilio nmendmenls ns i iililn, to innkii tin' people helli'to that: Mr.t their crlml'nt.lettert or and allowed they to restore their [ruiind that they were unconstitutional, dcilar- Ic party diV Thnt in tho qitectlon I cnmo hereto gito my reasons why I think nc had ltd her en- I 1 Ihut lu'erfrrence, with u Slutt iliTlions (Mint I tin, dimply In Insist that tlm llennx inlic t pnrly will nullify nil Iho result* of the war Onpr.pe.lly discuss with to'night. Tliu Rull- tilth Cinclnnutl. lli'piiblicun parly would enlarge. itt (HiweM, und iLsill '- -, Tin In thHr the lug thcuipoUliculmeusuiestobodiicldod by Con- you regular operate subject ID the i haigo ol tilt I) ing tiutj blavirv people of thin South own Mi guts believe to way dependent, ate questions this gr'; nnll beyond tho poncrofthe to review cal, thorough-brod iciitrulmng, pally huvo sinM WilY TIIK HOUIH Kinai.i) C'HI'KIIAtK111 'CIIKIMI.NNAU by I nould 'huvo a bill I piiiuiid vthirh would mclil, 'il'illsnfH infdm courlH, und of n inagiiaiiiiniiv wlilih must excite tlm canvass.ninny U docs seriu b mo that In upon view of Tlmt being tho eli. there \COlr otherallcrnalive assembled nl Philu leliliia| niadii II platform In (' MuttMK.NT.Mr. aillhori/n' lien." Cruiit to take conliolol nil Ihn get potter only, in undo nil the n-sulnof hhlti nl I the woihl, tutu oiler conclusive evi- und di'clari' left by to light that direct t untngonisiu with time platform al Cincinnati proclni'lH lImo "I'lrcllon: he pli'imed. even lu thu t'XIenl I of ui's I of their w illlngiiesii lo give shmu to policyex rn-exUibliHliiiig up cry, this fact to ourselves to children I I shivery bus duly our llredcy Mild ami dona sura In , |H70 duty Ihingi anoiigh ) and 1$ , 7111n I duty to the high trust committed to us by those cept to appeal to the people, and the pcojile at having nominated their candidates and. ask which I need not tell many bill iimenditory every law resulting Imm form uml P negrn his pout teal and civil rIg lt' uttmtlu'r Y"IIIdo nut WH' inirodnceil und, . who have before us requires that we should Ihll tme. it was blevel, were not in (ollltlnl your support. Tbo Isiuo joined between these do not approvebut Mr. npprovu yon passed enlaiglng tlmiwwemof iiHiiri.ilioii In bill u nullity, then tvciylhing anti to liuva |M>rnmnent |>eiite and con gone , enter tho Investigation of the queolinng involved to IPIKol, therfur they WIT simply two parlies. They ore getting ready] I lor lImo buttlo. been III favor of mio Ireelcy linn ulwuys l thou 1'n-sldenl uHin| that Slilo/-I./ und Mini m'i'cs.sloii Is u nullify ; und I lo nqnirii ( n basis of uluivuim cal equality belneen I the upon hlch relieves the jKilicy last session, w of during of ( me allowed U Is to bo contest for Vingii's. u I In with coolness with dis- to pass by nOi treated at a liberty. It Is to boa of time DiIIIIK ratio i parly to upprovenr refuln t Ibis of lImo I'lilon, and of civil cnprcinacy and vital I am not clmne here wlh address UcU ; and I cal your attention to ouo distinct contest against ellll'lro. It Is to bo a cOllleatbet'ccn He ono ha-s most objections' ) to his etthmport- troduced to five tlio President, nuthorltv 'fo lakoM is n burden Slimy ciinnot bear, before Iliu Ni ) by supixirling time Ciniliiiinli run- passionate enemies rClSI. here to-nljht iiut. I wish you to understand theie WItS no Ibo of tbo glorious writ of never at any thuo npproveit III tlio-e, | 1 selon ol election pnvlnct I In'tha I'nl- peopln In then present lempci, nnd muni If tlm Northern pcoplo do not renpond am to odious fi' doubtless difluriiig; with us, IIldrC friends omo and member of the Democeallo party North or hnbtnt corpu [Applause.] It is to bo a contest disfhini"blued aturea Iho ol the virtue reconstruction und policy whlt-h led t41111 1II. I How was that move deleiiti'd ? It stantly I IIIHIIIO u their ,ilefeut uml miikn p tin) n iiiagiianimouH ,nnd patriotic Iccling of Uie '. I shall not employ 8t1, frolds.. ionth, evcrdrcnmed.nnder any eircittnstunt'esofCtmteCliJt4 asfuiust Jo'etlerlliboyonet supervision ot Stale boutli and intelligence of limo Wits' not altogether deleuli'il h ; n Inird mitt uigghui unsuiul mid utsitt'hat Intuit mu' It'huti'ht Wocompliilu P tutu let Ilinn blumn theniselvcs if discord toanl \ elections. It I is \for enlntm hiscd tim" Ignorance' and vine It was lI.o.IIII..lllIlIllhll. !. most of its odious . to bo the the Contest the thciifom, a of do , which have and the ) justice or righteousness tlio equality of UK South. 'Iliey, not auk us to empiru coine) they provoked punishinint 1.1 (Applause. ) lie has llkou "'IIIurtiWl'TI Mrlckcti npprovu Itllodlll' out and Iho I construction volley Every Iliu tho Southern States and the Southern people. now I Presi iinly to bury reconstruction, with tim,, , they justly deserve. [ ] Rasellol 'Irom tic A HNM IIRAHON Aplllul1 contrary is a slander liii-Ii bring the I[Great applause.] Tho wager ofballlo ban been man beginning and protected ugaliibl dent Inslend. of' hit 11' right 'In arrest tutu Imprison nml Hcciiminii, witli the dead miutul \ ,, OIIGIS, HISTORY AM 0. "TiE NK1VDEPARTCRE. ihihh nt'hhiimR to all who havo uttered fAn- given ;jIbe tocsin ofcontlicl! tiltS been sounded, every one nl' these odious features Slut rccon- Void*, without I Iho I privilege of luihtnt mrimt, luwi ns h tin-lourl.s nnd authorities i Itoh ilcdiln I obey lust ri'UH'iu I H pi'iify, lo-night t, for Mng II slruetlnii jatiIt.: Von know that tha main n n- till Ot, licit I Inn Is over him' but In out Itlaint Mr. llrueliy, il Iho Iliiltlnioru There m' ve. and tbceo 1 rlghl simply 1llu'.1| was no purjKwe in "'0 gallant men- ani courageous enough ns the only way to stop I the, ever t Thil1 may understand clearly and distinctly Divot .uolludo with what U called Ibo Radical to cull them gallant-these men who quit their eon it lit' I never could] 1 m'ver can and 1 never to allow nn'n to go IUHIIII"k"lI nml inuko report. ofu revolution which Hccesslon, madly Increasing Iltitt shall mi del idi1, IN, I that as his do'tlou will w lulu Mod given mo to remember, tlmt I Hint, ttn* begun ] probublo thuu that of n Democratic tic ket present situation will allow lu native the zenith grace Hy coalition thl plte you me party power. Uu the contrary, the mowed party In of Its who surrendered I IIIIIIIH'"III\.II"II..I'\ width rceonsliucllon: witli greater 1 briefly to (if the events In the preceding underlying purpose was' to organize the patriots the offices that were tOl\'er. gill and am u Southern man and a with In man approve I by u Ii' I i "'' and I Mberul 1 CutOut determined, shall never end. Ami I I proHpcet for our dellveriuii from federal months which have this tlic these 1I1I."lIn..I.II'IIIISO l they clfutl my honor, Kepublli'uim That victory wan and that I in our locul ulluira, Uirough that dcc-- wrought situation. of country In order to turn that party out of organised a new party for thin great buttle in- wpn you,, my Southern Inends iihtui.uit iiuit , , The termination of the war left both sec [ ] Higher, nobler more TIll your co operation. [AIIluUJio.1'hllt's\ tilL because they ask the Southern people to glvu lniciiily| wan deluitud, and that 1 consider outmit Ihu iiiitv di'pnrtme ns will ton I Uio Cincinnati, platform Ii more hopeful lions, to a ]largo extent under tho domination of riotic A\plauso.j\ entered the bosoms of pa. Now the Democratic party bus to do one of two thai pi'lny validity by tlulr own conxeni ; ask of the greatest vIclorieH won. Fellotv cili/.eim othui plntlorm at I llullimnrn you h i muy Tha 1 you I I Ill bo more uuhiet'uly| And), after nil, my 1 passions engendered by that war. That war itself len of this .ouulryln any period ot Us history any things. It must cither nominate at lialtlmore a tliem to. .01111I'111 In a |x>llcy which degraded Ihn, I congratulate you. I Ills I chlif machinery, hum hulher with or w ilhoiit Cinclnnutl ill ru country mrn, this U tlio greulol reason having been preceded by a long heated. sectlonul r Applause] ] Convention after convention of tho ticket of its o\l'n. or It must support the Clnnin- \t bite men ol Iho Houtli by cousoiiting Unit time great I njtlnit which WHS to bo put I In I luau hands ldi) I tlm ( nnvn.frt with Southern ulliulsnls, w We have bill I liltlo Interest in what be- master* should' lie put In chains while their tlavoH of (ii'O. (I flint -- tiI tho redernl giivemiiiunt, if cannot Jcmocratlc during hits election we controversy necessarily null U'lidlng called need engendered passions party was at the North and movement. not answer another alternative l- by ns you hcurd I In'ro lud hIgh t- us t their ' of unusual bet and animosity during lu It t, only bl'UI. unfortunately, opposition In Iho1'llyllllwl propounded by Judgo Stephens lust should II tic tinfuttcrnd llo rob thorn. [Applausnj j which bo would (liii I'liabled to control I It, hut und I r"ircHciilulivcM'ntiincntji| Wbctln- keep control ml'muon own State govern- and unfortunate. circumstance Thai t n by I never could and never can endorso haunt defeiited by lImit For wiven } eum wo huvo suffered under the occurred made lie management by nlghU suld I the com llrown Suppose Convention pro'rC. extent as to de- : at Baltimore !- tutu or straight out nomine bo II which wr greatly calculated lo In. In t sulln to should nominate Urant. I don't Uml lit,II. .t As I still before In I till? toil, In IMS bination, by tIme coalition if you pknse, of thn iliduliis will Ilic &' It hutch no, oilier pi'oplo ever liutl lo viniiil c'l capacity organize Uiey alY party suppose when nil of you concnrrod with nm I do not and, (Jrwi-Icy men and I Democrali nn nhnt von lull I us I thu. We have been Insulted and nibbed , so engendered" Tho result with ail its, forces upon that any inch foolish thing. | laughter and I dli, In tha Inge (if New I Depiiituiuplutfoim. They nil! was that the administration of the governmentHas bo saddest view of tho fact I Is that 1.lllhrllnol, oppiwlsilion pluuse.J What I guptioHO is that the Democratic an- did not 1 propose( to resist tIme L'nltod Status nor such H hell nt t, such u tloiloim triilh, how I could In abide mid tu obcv, lu good fulfil pledge (loverly und weakness, by strangers, vaga absolutely taken (logsession of by time passions came in bitter! terms and cliiolly from the 1"lly1'111 cither UOIII nato n ticket of i Uu anythln., they might do, I said all that then and. look n hIm utter ixjnuiiiiil) upon thn jioor crcaluiii amendment nnd all Ilio laws verities, till and negroes, under the protection of thn on OI\'U. us until of the hour Itself triUll1.VO! / it but I iiid that when that, bventi like could I Imyonet. Our luws havo been deranged statesmanship Congress back , States, which go into Uiu tar , Ilcme 8mlheru \et to ho ch'.ty belli' a plutlorin of Its own, or It will co-operate with re- people in n b'gul ttuy ahnll I I choowi, to to tin' child and went o iiside of tile constiliitlon to curds of this tiuruly/.ed, uud society deiuorulUed, mere creature of that Tho good the Cincinnati I move-one or the otimir and whatever opinem the patriot nnd dig ill) atumimo llttlo t thing p them, ( Stir Northern lilendn , movement - sions. Tho flatl which had entered that war nun-that I bhull to it shall do It Is going to do Koutliiiiipenplc' nlii'ii' the members of that body lo obji (.1; lo. I feel that this move has accomplished ly ol ihohu complain, and j iiili'llectuul und virtuouH men forbidden, Inn 1 go my as a party ll I Id ronipluln, ultra Southcin and cnniu 01 unsuccessful, 1'lg prostrate, ov ing-that true I patriotic and noblv M.ite gr\'o iniin' puhi to do by lU organization, and it Is not, go trnmpl' 01 I I haiti| llnlr own oul his In" gtailly their much Ii''roim and me. Now 1 don't buliev iii tiny tin nisi Iven, tu i utter contrary Hcntlim men- h pcimltlen of felony, to employ their lielng parl'zell. were lo an extent tho lu an hour of IboughtCslUI. and wlthuoexeclalion ing lo disband and. turn all loose to feelingvengeunee against tin: Southern peo the Democratic |panty could huve done tbul, Ihuonli tnia ilcmmrncy To lint to bring about order, security and action of limPeR passions and Iljndl"8. und it > of blug or lo take ihu uiiyw litre you want to go. Now I admit this stray Is 1.101111" H-ked limo Southern (teoplo to viva vllnl- brcuin-o Orant WIIM willing to resiul tu thu lust U htniuisuuis mm tel Urn chnrgctito whiih get | For live years, thousand*of our best would not he very rxlravagnnt! say Ihlt they XMition I to him-our former I'renldenl, n question upon which Democrats "i'i', it u. tlon I by theIr consent, I said to len, that tmrly alone but (li'ii, (I Irani and bis puny the I Di mm title Uforu they Imve slept without ease und waked with- snHcrcd during Iho four yean that succeeded the lehVtton Davis [applause), in the Stnin ol (le diner whether, shall In favor may of honestly Independent Jrnnt uul, I till loOen; I'opo anlll 1 thank llni) !i could not naict time (Irenlcy nnd I Clm Inniili C you go an reamiim hutch u creuleM the of the that I I lit, tlmt 1 would lako united 5 tbo, fruits of toil havo. been taken tl'rmlnllol war, wrongs and 1101 his Cil.; at this juncture, unfortunately mid that he nomination hether under i any tiling, death, in thin WOIK, think our 11. or cessiiy, n- time clr"I1I11"lnucell they ol . adopting Stun I ' If con h u 'nn 'mtili' I I -tuiuikltug anil law I robber, 'h'imvuuma- si matyrdotn. but -ruling ceeding Infamy not lu |otet$ nil accepted uoihtng, -unlorlunuti'ly' tumId tti limo pc<* you w ill bo most useful to the coun onnxcnt (III' Tho third tiling In which I alluded USIIKHIII- pint/in/ m m and nomlnccHI'Mlni (lie. ( of the war lUelf This thing could plo ..limo South that Ihdl cuuno uuuldillrl. try by co-operating with the Cincinnati that In' i mi''.I 1I11'ri! I(IAI'plllll8AI.j j Now, Mr I Oreo I I plluliisl by Ilils uiovu Is llilh Voil lemeiiilH I o been iiin-hli'd wilhoul us itt riot p, Hied not last ulwajs, and two )'clr. ago this etittu of impli.. These were ciuighl up by the ment. It Is a question on which Ibo Democruls) move : Icy en n '" our miel' on that (mint. Though that ul the lu-it MW.IIIII oh| Congress. n bill so itolas'd IMTir ri.lllllrttl tM) ITs l-nilin. luw, and ciitiu'uuuiitii! ilhoiit guilt, only things became pI'nt t tlio wise men ol tho nlscrublo creatures hanging iirouml him ,hoe the run honestly differ' and acting "''Ii, the I Itcniibllcan purty' he front the authorizing tint Miijx'nslim of lnilnn Mill unoilicr, riuinon lot i t o) oiicnitlng w illi I i Iuiiium In potter- I tin1 slriunjcri 1 uud' thietes country, men log rid of the .IOUllllul mrpoHoof mlsrepresentiim him The 1 ) weiecirulatcj be allowed to differ, and on on which whIch they do ought dillcr.to 1 beglm prnli slid ug,tins! tin.u' features nf thulHllt / '/., and limo bill was ID be In Ion o till Situ,a'Ijiumit n>u r- ('Inniili, ie ulU Irum the nlie jtlnl tinted. If wiiliout aiithorily and iilundi-ri'd, they Dciliti'lath ,, of passion, began U> reflect. The party power throughout the North and heralded its The matter IH becoming warm, an'll | } I Hurt," lore, I don't nnr h"IIr.1"" viola mi ntnl the( present suasion. I'l lor to tho adjourn pniIt t ttin Ui cnlir the rat: e nn I I I'liinpiinclion, Kven now n lnl I *\\H't seemed loud Ito cud of what might bo justly evldenco 10 the Jx-'oplo 1 of the North thnt 'the ly deprecate the fueling that In being exceeding: : Unit prim' 'iile{ 'uf l.onor tbul I we ever hold, munt, limit |'mrly, tho Itepublu brought plutl'iim ol HUM, mid .limb Ihelr on n uiirtuu iill/eim ol u liilgliburlug Male termed m118ur ctficclally as applicable to 3emocrnlle people of time Mouth wouhl never In some quarters. We aro all friends engendered, wo" desire dear, l.t. supiKirlmg, Mr. Urcnluv, Thnt I put forward n move for thin purpose limit of ty continuing, mid ni us i ii In get mi in-luul mujniity) ot Ihu. vi on-inm i I lu.'u. ii n desolate, but t still -mint what tlier to foieinnii ,itt the Urst reiuton I 111m It u In Hut oil they would ullll mil si euie tu Norlluiu Oil. term the "lielicl come Into this movement not even recognising the same end. why willing m lo Shunt in t In ford-, and It was a most tlip PII-.OIH mv connir.t ' dnngcroim ,. Mates. They not only passed n hit were called the amendments historical lucu, or make any No enemy It engaged lu thin move. I lull vote fir I 1.un There is another reason tvhr I like I blow HI the imlut-rt his ol the ix'oplc ics .VsiiL-iiinsl I DemoLrui') on thom pluil'orm us I In lieve the din nf out liviTunii1, It- the reconstruction act, by which tIme governmentsof concessions at all, but were" uliujj/ rebellious friend, "hll sfxiko, hiht night so eloquently my )Zr. (01.i I I't IIu liui never bl'l'lI'hllt' I. Kveil: thu buyutiLt (bill would be shorn u nl this aim'udinents are nullities, I It Is believed I f.i'l us hope the time lot us to begin to ten of the Btatd were alMuluU-ly ,nbverieil mill. I'nfortuniucly other disUnguuhvd], gentleuli'ii wait' Is engaged this move who Is opposed no to a (purti I m. mid nnlndi'M'ndcnt| thinker, I elllll'// of lit pun'era by the defeat of I lie 'union some of ruling party would and could, ) hold, the '. in neiii Wi'iirv wut<'lur* lor rclurnlnii and otbcr goTeminoiits .rel.1 by congressIonal Indulged lu very extreme utterances" upon State rights. Tbo only dlflurenco between us Is hits tic' IM I'' mitt honnsty I pity lLti y uinn /uo/Mta on'pis hut w'hcn tutu i I'rmldent suspi, hud Ibnilghl im m by lorfi' nnd would be suslulned by t tin'' Mill'-ridden pliiinn i ti' Ihu huulli. Hike, power orgnnlted In I nee i" nmn itct Morn' audience. Norilii.in people n iii itS, iiHUguiiist the hi It si'i'HIM to 1 IleB'1 They not only this lubject. Some, I have, no Idea ever inti"'lidedwhat ( what Is time most clleulvo policy to recover tho up an tutu f ho CrimeS A voter, right at the polls, and ImI I nm uni nUililiijj tin IIIJH ) amendmenti to about 'mil.lint. up v Vou mnsl I nml c iinlidulCH ol the Ubcial Itepublli moms so htar in Ihe IJi.l, Bidding jiabsed to preserve was attributed to tliMn, but they were the lost rlghlll oflblllt,1cILI'I'IIIIIIII.I.J[ J Home party iiso |je uly i prlsou him until after' thin election nlnil I \on lo n ittutI tho fruits of the war, said to 1IC00 mplisb, a gout Vou yon sea curing n majority nl' tin-i \ntrn, iliet i ttoiild || | | lli'lhli'lieiii tthrru I a they but they undiiri>tuud u uuauuiM Ihs tUu buulhuru iwopluw think our moat cflectlvo course would be by puriKM inns! act tha iiiiM'inicni IM would be \\elf tim v Iriends, | is Kirn, not n nun. continued, after then imendment. tod I go liarnion, i icl al tim tour but when I tluro I'i inuko such nn Htu-mpi i I Ditini'i'iinceiillon. for were Idopt. u n another war l'nful'tllnlllely then another ing, with Cincinnati Well If think so } pnrly, iconics | whi'ii the Iti'publlcnns (nought forward time bill a ni'W IIOJH' lucnl to cxcrciM.ooDereMionalpowen 1 great and good man. Mr Stcpheun commenced ought to go there home' think you wo can succeed, yon to tin i'li',' I I'1' indi'lH-udeiit. l'IIe'IM.UtI"lIrl'' | of to prolong hits l power, ngaln Iho I Demoerats nnd I And i Ijchold here unnlhci I llliMlnitlon ol h I minI roimlltiitionat limitations constitution and absolutely] startling In their editing a puier[ an J tale' paper was full of state. more clfucticly by nominating a straight ticket though' ,01 I (Ii irnimiy In uelloii is Un' IrisiiiesH nf Unclcy' men linllinl. ami ilcfi'iilnd II tint thus lo dungiMiif 1'Xlnme I I v humus a mnl Int'ilermil | iiottfr, us huh iiieanx redeinpilon character," and xAlmlTclr o." war nature. I' menu that 'these iimcmlinents, should 1 lie treated at linltiuioru.' W"II.lf that bo no, thank Uud no all II I li. i-u"i I ,lie In pnrly movements Now, InUio I this move) I It I la owing Unit you und i 1 to dnv-InInw tx'ra How I long I Soiilhcrn P people, must you lit alt' lor I 11i1 nation mi'l good n III b> lei bitter Force i Mrncrlcnrp . wet power to thIs hi- mrv of Mr (Jr..Iey'WII i before ton luau it t the t elloe govern atm nullities and whim time Di'inocnitic': camliduto man Is more witllnir to take that course than time ititit tillii iii iii.t-'Iiir.'fl5 iilflr liii lu. country la very jot ] 1 ii'iiicnilH'r t IxTorv tint be .dcfleil. IUMIIII that iinllacnel Sum huts, mutt P rot huh by only hod was elected, that lie was to proclaim them as one who uddrevses you. I ,admit that I It la nur his bisbien thri'ili'iied upon I Hits Suite s( veral it IMHMIH i : AM I> WIIFIIP 'rui-v I at t' IC these amendments( been r-d. but the dominant Buch. Why, these men were represented as the question that hal two side*. It in a question that a pnrtv m I tin very hour of Im liiuullcimii! und lime, ''n It h u 1 been> rimlly. i nion. e.l In N lint It nloii,,, muy do morn lo dntrny him,' vnisu they I'AUIilPlJ I' '. who passed them them boldlj 'I I. I >r"l. Unit If tbe Snih<' vocatc llnin nil Ilic potti-i of Ihu iiiosi' ' party by representative men of tho Koutli-a. controlling ought to be in |> opli .Ie'| Cnroilna und lit hoiith, Carbllnu calmly dipunkiouuulj' diMmstfud Tim riu/en liuvlntr il'-i.n' altu'tl force Into tho constitution, put a construction the South-and without the South itlrud t m'i'Ii', I liny had, the I light P W..ilo so liiivr cni'iuy, cnnld, do" What liiv. yi.u in, .1 it u pump the DUIIIOratlc ontll I bfiin ptotest agamm the spirit which, d. ', m cliuiiiH I In tittmiii' with tlili i iso yi'itenU l.i wi. I I willii upon those Imlndment which gave absolute : lIlInc' 11.1) 'I'! tin', C'litlcinun, nlV'r the |l'ctt liwt -indnib red Irmn HIIS ti my tyli I .In ) tt.is g l hit |111I'1)18 |I51Wrbe anti Uierelurv time all who wiirhigun rtl ,'iidrd. will nii und not go in a c nmn dlrpcllui as trot | martln-d oil' to Norlh'i.i | C'incinti.ili n. .i < n n', nil tti< guod the la I ,llm. dcin In ilit iiiiplin-nnr"ft" I. > power general government, a eailem < !i. wnr. Tllllt", any ling, n i construction the : pr Sluteto .' t at orUI. loeling that Ihu at tors. (Allans J Wi all f> .1Oljcc' pIlviuH 4 for liiipilsonui'iil t Tliurik i (|ii iii| Ibis ll . the party am unio< rnw In Ml( i anun : ) IIIIIF! itt reinIn limn nediin > Ihu peopl'' 'i. n I i m.1 >|il ( pi ll Illct, centralizing to the ,01,11 I ; hu'nuu ' government the m I i.rH-liy nm txlent ol houiu I waa unjubt lu them, 'they lost piriis, title move sitU we all waul lo get back to ihu lionciiily htou4ht lomrtr !I. Ornnl luis no mnrn, hauler in huukiu I ti Ibllntti'l, u 111. !i IIlllKi1' P In.Mer- obliterating State constitutions., Where the thai i idi I t rn Slutihuf! -iii i4; us Putt bislniy .ntmt u Lconl il* true . end ' ln'CuuiL i rlgla I In 'IC they ludiffeient a and saul if the Canaan HC( -< thu "I > hberli'1 , booth local State itt of thin ' uud ay by tim ; I li.-f opln U. | rih" t governmim Couslitii suohuutuuuut| .u i ii. I pn'iu .filii.n1- to he I ' was could tell. i Vnlh KHf 'hat Hie nn mon Tholeateteofuilugiuahtrmued1 I will Itui v n I 1' waged 1 war nnvlioiv und n npLini'i "i the sUtn> . no , accept movemeut blclt will relieve tlotiiil I limit nl lie ol MKHH itiuiw Federal vi fit , upon tin-psi l Ii un ton i and 1 h ive, < i lIMO the power.p| Un. ,i.'J 1 1 lay III > ol III Hi vi.ui I ( | term thin ( i uUo Oft"'lf" M'r. epi4i proper atato of hem, If they will not : : war why Ctnupro uliu things alarmed and justly! ncr on patriotic ground, plautc ] 'II" only dilfeienco i It, soup 1'1| onr j Jiiini-i i .,111iIo, Wijll I und I Hi-it glurlo'iM' rt stilt ,r nurfbutnlilr, tu the uitit'tO| Fesiioy iluii i'r',' lu, ui all limit alinllilnti ilt'ir piiwnl emi'i'iiiui' I Iti.i ti i i I. ) tutu- of let 1 why thu South The : IJI'IJt.llolrhI'f'I'NlI"i.' ' lies.and i isnl al.nld many le go. Indifference at the I'riend went in :rl in tlm hand ol Canaan nl one | oinbliiniloii of I ilic Jmumfuuruihi) and llm (Jrci, Icy clellit' nftlw ttnihl i Vd lion tbi-y liuu- ii h v'. i-it I in.-i'lmvc-' men of | North thus Hnd' ,i i it 0 'ii III) other Knillemeui IIJ'IMMlICc I Unit ni|s'utl was ' produced caused this ci"< I H"IItlil'lll | Ili that move to I full hound'I. mid route liesiutto because Ihu lied boa i iibllcniH f Applnusn | Now, timise aro lImo liilhi I I lor any uiummu< io n !0 ''n "oli lc.ni-'kmp! They \ n hicli they Time Ik-miHTacv don, mi m 1\ 'Inn' Jut Hutu' M.cedul avowed liiUiem nl limit t'tglmtii oh ii me.8Ir. adopted, wa defeutcd hi nearly all till and the wu' neiit I 1\ tilt j tbric is " wildurncM lhliigv--i'iiinoity limit are to be crossed! in'xllllnaion ol' tlm ht"'t'iuti'ti I fin In i-tln X'Mitj' iiKniK I In a moment of paaslon' and which they Mate elections [jabS fall licutluineu Ibu S i"i' tlirn yli Ihe HUI I Il'lllulI'| ': j mnl every Snulhein titan who di I nut ithil' II U bitoiiitblll tholll mamma 01 I am willliitf totruterw time wilderness and | S urd 1 SItu rcnUiration of Hie writ of I lud ton. Di.r.nir 1 th" nlu.li' u Hint after . were necessary the war eudml tI'l'' uuldeiit portions of the hl. Ihl. \i ,t "il ton qiiurrel, wllblr (Iriuley lor il, uml upHiil| I Ihu Ii' 1Y Hint 4ii*uilned iu. of hi\uniriiut. IelO b uny' country :real| even a Minding war, If It only cnu lead mo TliCM t Ibric tilings atone uiu HOI III and repented fiU iltnomicedu, uiiMiiiml repeated until it seemed the that Uim gout with Mist' nii-l on sliviry, uml I not tit I ho you pnwcrllHt me for party >e u brought (orwurd Ibid buck to Ihe Cincinnati, lnv- Inteudea move Caunllll.I,1t some d.i Ura Uiey never movcincnl h, and aiocnuugb In Intilrc be Imslcd Hi I IlliUnry wildly d'nfii? u di'i.liva'ld i;! 1 Jmumve diii'- | to subrcrlItepnb-) ment wore blundered Hi unworiliy of our trust Intend 10 leu Ibo Ihu I .lIll1le''III.' I would I g>> Hith il again. nndtr | I lie great and noble by iH'oiilu ' and Institute u bondage of Kgypl union, iboy with grHilmdo for tbouutunplnilimeiit will but tiilmr In ami t in.r lull .5.u man (\tcmm8'tui It Ctluln. dl"- and confldence The great and noble man, Vat- can rcutll the promnMid land at bound.'. Well lit MIIII urcunuit.inu. [l'I'l'loIlI'IIIbllvu| \ ol ii. [AIIUUIK-J| ) | 1 Theruloru, adjiidgu tlmt it Inn no lull 1 nn liinnlilcr, cstlimin, ni n'y nbililii', ili-m potil itn null, '" tukt buck nor lo l/.c fin nnpiip.iii'd aud in puwiuii mi I i miilon, < Efficient number of& tlieraw.i .indigham.was' declared to IM no Democrat, was mv opinion U tint they will die and IK burled lu n- njinlo 1 ( Umn| as tills imn b good iuu already been dune, 1 argue sItu Ihc When I luuuvti sit oil. n sei'ii MI clearly a lii ) patriotic The movement ttliiib 'i I time men In the leclarml' to be a traitor lo his that "iitijTi' only dllfcrence between .iis 1 Is, from that ) I .. correci tbU! puny lie wiu KhTPtLaughter( and applause] That Is t Hint Hindi other good muy bu done, i's il coining, nxin| ) on, and remnnUr to vU i i of thu Jtat ,.If by 11) min' livid up by men ho were iieopolytca III Unit Uplll lIl. my (thai 1 I., happened to be nil that Id" and I on and will IK done Mill power Hniilh in I iiiiriit'i'rttlulitii' 1 I.me IK'CII In aw I 11 it, 1 Ucl uumbltf . ii 1 thom ( tojeUier..leratlicn iri> tu Mae) and uu true. thin That U all. Hut Mi. Oicclcy us "iigainut There Is yet I mDiemcni nj ulmirubly mudo to i UfortllDalel.r the Well who anoUicr reiiMjii why I uulPiu'uiiut) Hi.t full I Iii . now th \II i lu aeule ihii quiMUon r_ am willing toupjiort { > oui u i.inip'ele' Southern , WI IlatO le.w>, sIte1)tsmm4.tio | imn "aa not Idluw eU to ted hill rludlcatiou. 1Uu. Whim U to determine H bother Uie fleniocrittlc Ibo n I li"le 1"1.1'11011 time subjinl nf (I"'''' 'i lure tho CiiiLluuuti iiiuvmiient il ihu Ilulilluoni euro IndiprinU-iue mid piomnlu t-iit ut an en I We iniibt u In lU'nlu. And purty a ) uiuasuni nt to bii doubllewi LU win r" day of the war that be wus tint llIIlIg Oonveiitlon unit (Kiwcr, und, eviry mau vtho tuuld I not al proud and ooblo will ahall I ao order It and I cnmiiiUslon with party go with ClnnlinaU or jn by llaelff thai Is ) me an ta Ii hh-cI Ilerewualar/reporUiinof/ Kepublium pained to >ilaie' : the of prove a It was deiinuiiced' a. tiitllor to bum s spirit more by tile elandcn of Who is ii'V upon itihjert |ieace, on 'terms this Tlmt Mr. hud wellI'bo to determine lit When M.-nds riifftr Oretley no cxiMftullon of bu u lender, I tt mild tusk no uljier or partyadally becoming moro and hum ible lo Lolli H tlon I IliUcrv I w ill dei lure w hen all tho fuel IDcIDg. more were not worthy to loose tbe latchets of i punii* alarmed bis shoes, there ought to Iw an 'umpire. We ba without tho iJumiicraUo VOKM ; ( lliuu lo had you Irom pnvnty UICMI conTluucd encraacuiuaou than Ills got no liiii'l' > as a vlndiciifo but ll U knotrn, that ihc internal, diiwonaliini r>'nleil wa body by the bullet which > man ; nut' Iruu. and took court tu apH.'al wbo u Orculiiy nhould bu elrctwl, that tlec- wealth. Imm defl'iil bulk In aud away | toi Can determine It. suii.o hilt Cr the conttituiiuu and thu right Was J., 1 ill i I" mind, tbul the mrri'l' kept up wllli their side by hie. | AiplauBB.]] c "> my at OliO Ume, when the tint will ij own Deniourala into house UII | aweiublcd carry the of IbiS und sorrow buck lu llulllmura Kejirenonliitlve happlnct of tbe Stale Ui,_ ddcj ll waa lu will dulei- Co .ft !, rule iovcrmmut wnl tomuiUtnonersan liuguished men In Ihu Confedeiucy, did mure bHee. would b aoOutont to cnl\.tr. evil Till cmrrv'nTi NlVItI-in 'II"IIIt"TO' DilDO It, and you and I oni'ht to go with them in' 1 '', Canada to open negotiations with A majority of Dcmorrats and When you Imvo bring on southern d'-fuut and buiiilliutlon ( [litmuS applause.] in that "out o the party ,uo disposed MCO OIUECT whatever they determine. [Great applanae.! ] W' tnt DcmocruU our touimuuil'incrs, were got 1'resident la body a majority of DumocraU the all the armies of (Irani and Hlicnmin Vet ( TOO II HHKtrOl.S: TUB BfhKt II liSt CU.I.K pwe tDcrohinl Hut Diejueatlisn Hut I mual baileii on. What now wan to be I Well said my distinguish friend Uat ulgbt, Uio aud *o far ai I know or believe or re/- fdcncral powtrlvaH lo do barm war was imuiu by ('oufuhiraleK nil thu TIIIIIK: i iitrHH You TIIK M'EAKEH ( was, how cl ef- done Hut bclure 1 pan from I do- Will agree to abIde by Baltimore, provided iinl1 mother, horace Orutley was Ihu July ( iumiuubs-'l'iuamt's a strong poiru j I erato government avowcdl> m Ui" uumu ol | tin 1r4)uIbIN mldn'Mi was IIIOM fec'ed 1 Colt norpoao.- I b alro to call your attcntio'i l1t1a\IOIO'\ uui 1 more Hill decide a/coiduig to my idots.t ._ the Nnitb, Democrat or Republican My friend justly says U is strong |Hiiut, II Is erti und cycry litmus vth" unllcd lu giving < ruteived and upnluudud, lieneriil mit It to .could any purptK ntCf. ub Uiought It ho been chivied u an outrage ( Uughter J JVeil 1 ercryfiody a right to agree; Sloe ''inraga to go to Cauadit and have U11I111"J haiLtutu that lImo ulono U itorththne\Mrlincnt I | lit-itt mid unmurmuring npHirt| to our leadeis suvirul lluiismaiide approval during higher, nobler, or mere patriotic ? How could] that a ftw hundred tboiu'ud Hepublkaoi. at La provided Baltimore will decide the principle/ as and honorable, communication wllli our Again,hnd ludiciitions from Dumomtlt vcllonalitwly the field and In thou i-nbliiul were deiMinni-ed and nl the cundutilnu being tailed laettt different elemonw. agreeing In puiprae, most. kliouU require the wboj. Democratic |ir- understands It, and every man U a party by [Apinuuke.j trIll the IklollCrall-.rvuu the show very clearly thul thn itrenl tho onemii'K ol liberty, seeking to unbiblmli u and t'4'l' ::1] greelng in ty, with IU reported three vm blni:'lf. W bat U to become of u* f 1 put body ol the Party U di'i.uludly m favor ul M thaI-| dc iUmlu principle, equally alarmd, exrnojiy \on. of & to I it to D in'4.niU of tho Jiortb-rufiucd lu entertain itary *|> board remit of the most eloquent, uuo ul patrIOttch0w could they be cblue Into one come over to them, mite*". Vfc* hundred able your for candor I put I It to your reason, la I it reason- I ]iro|"*ltloni from us, or t tim treat with us. lloraMdrwIi'T rating tern hut wllli little the t'inciimaU uioveiiinnl.und 1 It have mat- lImo iiumo aluviry, slavery won ] .'si uddreuic* that you w ill m bear In bat might solid, coeipact orctulzaaon iiunxiMi of thousand Itllpubllcant rolr.1I Mtn IIItithal 1 II one nun for two men, for throe inn, ( was the only man that defied. .. now n you would In tbo name of lnileM'nilem| Southcru |* (intuItlie is rmitutic'd Id limO Ibanki malunf cppodttua to party f The I Compared a tvg-faoai jc-Hylnfc a big tllII1roer lor I Lol'neb.I M about all [great laughter] tu party, and acted upon bu conscience a. preferred We canuul. lr wo arrcut lhlcurrent. donou was dfsiri> e.h. In tbu nuiue of rrauc party bad fwO ww 1110 )bor.Vfll stand up betorv tbo Democracy ol this a tift"rlut. Of thirteen HtuUw, wbii have up to ami twutbeni ddeat ,mid humiliation In platform) of 16 let mo try you '!he country and went there ready to uutor Uao Serums of right, tloqiient and lmirt'ssive| I am against and Situ lima huh! conventions and delegate " all tbe : of l'mirreM( tlt ongtrmi ballet was that! iliMolU'pulillrmu would say they will agree with the party provided rx'aee .om.Uu.-nt H ith the honor of both neuiona. appointed wrooglit. And thU amne fell ii'urltnl' us. but ul Ihu Dainu lime )oil haste gut the ply the (>rty win with oral tu Ifullimorv, only mo tome Imttrucled |let igte! them Well if on the bMU'if preserving* L'oloruIAItpusumse.[ .f uiirounnmng, unyielding, Intolerant, aelfi CUM on lilt kldu, uud 1 Call fur tuno | delegate to insist on what Iii ctuhitl a lrniKlit and I immaculate egotism antI /i'iil i fur t mist Mr Hill" . - r- .M I . , -- -- .- - - ' V . ? - -- . _. -- -- -- -- -:--: = =_ _-:: - -- -- -- humS tin I'lngrr TII.IOII.U..C: : Nl'.MM AIM-. -T1M-0| fV9; yenr old was shockingly mulihtcdby l>r. IIHI'K Pill.. ttil' ribitn.1; < Pnrt) Ite.pnn.hl.ihlly. Mr. .Jrrrlrj'. Cnn4Idnc. Central Park lately. i'n pnrely '' "'iirotlon for , bileendeavoring 11'nr.lln k- , Thttrnda.v, , t '!! That n political pnrlj. U 1 r011Iolh1'| for hit The tvnttr.'l lliliik" tlmt If any onl had told us The Jacksonvllli (niolt The convicts In Ihe Auburn (tf. Vi) Stale il cit m I wii i ion anil ill itifln< th ?> lo nhow that time N V. Tnimnt, IncAlllnglhlll" Mlsf El. tern of all lint .1 ., ,tll| ii fr, . FOtA. Hire , Imricli nnd ulln of n State nnd three months, nun (thai we would support threatened revolt last < (fnvrrnmrnl JIr.nle PrU-on a on Thllla- siiMUun. then.ti.r, tbV,- ,, , Imtm onl good hail result- The ronsohd itiou of Ihe. Internal Revenue dis LIi'r iq,111 S -" -='--' hitii1titittiat, ration: \hkl Ilnllgmll..npl..rlOI.llnllol Oreclry I the mocrallc candidate for l'rC- hit ) Nine hundred, ninny of them armed with tool, net and Kldno-, to ,a ticilHifiil at-thu.| wi.mm,,,' mit r: L I. "II 1 A t8 10: : I ) nnd should IK' no Kid, \e .un not Idcnt, ,' we ,\11 have tithed llm a' fool Wel. Avenue I/ Cnufercnce llelnnlt, movement was "badly, fVotn sold,"the put Flllh Its (tlcll the In new soon law In take This place will under legislate tho the provisionsof I'r' enl moved about the yard for some (time, refusing to tem same time they bmrc iml IntUnntp t th, wt.,1, ? think with lioitcnlul, Vor tlor time no is no new for } III1.to inn rcnton I thing / obey orders They were finally quieted by the --- "- i i'rl'r. f,\ct flint ring and cjlcjnrs "prlnjup meet lmroik'itiuiims| looking, lo conciliation and n.conclusion. .. own f jot In II nud burnt itt own flngen badly.I .- supervision of Georgia and Florida out of ofce. of and\ one and six hioMit, GA., ,I5tiiltir) I I I .1 n.Y.. .11'''' 1'\7'\ "Ilm\.llt lint time Trtiunt look Ito cue from will probably added the districtcomprising Appearance troops buote Pr. I m.//. T"z w lib |io\er mifllclpnl lo lmpc polii )control A. early a< IfOT, this piiH| >r held represents when the sentiment of Georgia North rind South b Carolina t anti Florlh of the ringleaders placed In eoe rtmrlcrs| \here Dear Sir.-IIiivliiB nsrd your I.hvtr, Mils iii, ,j , '. l.dlC"r.1 Its nctlnn and sway IM trcncth at 1 ) dlnntilth nut Ibe olive brnneh In I the opposition I I t i propnnd IIP lr.t Ilfy'llro'etlnl they will hit kept for sonic time nnd fed on bread{ hug mimic tlmitt hay.' dotie amy wife mil nr s'''t n K. IHKK "r., I. c for Orecley ; the Alabama district genii. I wnuld like to know If lli.v' tn . r. It. t)\ KE, Jr., .,..10', dlCnr, Hint rrfHii| "ll>llit)' 19, tin. <-I/hl'\| t I. "rirIt n union nf tin' good ilemetits, of ull par the (uuflenreD ( and water well 1 North' as here. I Intend( uolnif .s'llth s ouij .t ::- -_ .. I t i j- in rc. for i the snfdj' of )i'i\ininirnl> 'ind I tie In recon.lrn.tIJ/, gn\irnmcnl nnd c.llhe hit tlmt the next day)' (Ihl Conference nommatndn The release of Dr Hotmrd has been ordered by A sodii water generator cxplodi at Boston iml If they will bare the .nine ir-rt as li la ii.M,, ' the proHpirli))of l wplc'., tlml pirllr. nx purlin I I.h.ul iirrenco nl" emery pencrnl election since, it ha* new ]'rolllllnl ticket and utterly repudiated the Spanish! /ovrmmrnl This government last Thursday, killing one man and blow Init / mute.Hoping I want to heir lo from take them)ou soon on with, me licMilrUllynccntinlftbli' for (lie. fillurit I n\oweui il< wlllingiiew '0" hasp bunds'. f for, thin, he Cincinnati platform.I Oreclcy and Ilrown, In however, had to waive the claim nf American leg off of another remain Sour ohi'tt iprv'l b and, he following resolution," *e. And thereupon I citizenship at first t wl up nnd accept the) release HE.NHTA, . of UK mriinse of purifying the State Oovprnmrnt In an address. at Saint IIII.I.( corruptions 0lllnl'lr111In' 11,11 the effect thn I .( THinif of on tho of ft friendly Arcllb.hop Purel. _ Art smart the to eonrtesy that I morallrcth Ih M an ' of they culntilinli( nod IAillaln. Inllll,11015, OKmbllr compelling the Innniruratlon a power c'(01 Francis College nt ClnclnRt on Thursday Dfl TITT'8 flAIR n l NOT CTv \ cfncers, are to Ix-ar 01"11 the rr'OI.lhlly| hotild dl'Rrolhe thieves nndlllain4" from ? should not hlfe shouted before it waa out of government evening animadverted severely upon the recent TIlE UMN. th TVfl.wnstyle' A itcam( lighter exploded at New London, of their ncls without nfvnnii to the p.irly to onsiderution and iidmlnlMor the commonwc-Hllh \Olll-bu tllhe strikes, and denounced the destructive and .O'tI A ( I'rll.UlbM".s but the writer of Ihe loot week killing Iwo and badly PLAIN QfESTIOX Foil _ Tins l flics Now everbody paragraph Conn perrons ISVLIIH, l , which they owe llnir |1011111', Ihrre \ollole In the Intrrefl uf Ih'* pople. our IIR"I demoralising Influence of Internationalism. He Iho routine nicdielncsuf the ( .\ I" R.r.ln A4.,1I0'.G1Ito 1n4 ""u""lpll" i hit little ( heck tiMin| tin Ir offii Inl conduct, and n wi abundantly lmnw wo advise the .'lli. lo the: r/iitf/i alKivo cited, knows that the 'I Oolhnj several others said that If eight hours were to now, no good r Are yon dlsrnnnRed prnrm.ions,nd ml.or done, /7f Vnu . for tbi Li otbtt. nd''''01"0.4 ''' ''pll.ro.o.., Fifth Avenue ConfonrrA' not pxlended, 1.I A York paper says lhat since the beginning accee so, test this prop-rtks of the new SpViniUr. them NII VeOtsble patty In (lit majority might remain In pwcvion em' t i for Walker ,.. IUu"o- lo.morrw and thai II adjourned, nnittu of Ihc labor strike, right weckl ao, O'.OOO Vlnfinr Bliteri, single day \ aireadi K.xiflrt/M rl.Tu.d 81"nI0, toq. of tin1 government lot all time \ii simple rhAnl1 But there i is A philosophy In this later broader rend a there would be no limit to such arrogance and famous as the fincit Invlconnl, corrective antI l JiUoHTUIt F1n-Cntritt1 Durw, Eq nf 11 inch, returning movement which, (UK* Sfntinrt' doea not com pr. on the nIgh of Ihl 80th 11l, after B wv men have partlclpaied Of lhe e 00,000 are workIng dictation. No government could exist under ter Uveth ever seen the 1IKI, hyspe1the in' (UMIIIMA, ft .Urn L PrTMAmrttbftrhwirr cnnllllo lion of Home hours continuance, without having eight hours, are unemployed, and, 10- Ttereons of bilious habit 'boald keep ii within * .Rriilr B party !lie permitted, lo enrnpp ill jutl re- icnd That paper| rnnnot lift itself above the 2,0 such ft Ilem. The next cry would bo for a division if tiiev Faimo, health amid ease. resi ., Fmirt" O fmirn,nppatillnn) Offlrn decisive measures either fur or (HK) have! resumed on time old system. adopted any Ilnach" "IKHiKilulilv )l ) 'the oil recited plea that Its reprr- ilpaorhe "Ioov/and fishes: the real ground I of properly-every loafer and drunkard WhAT EVERY hiOlt8EfA WANT8.o'td - nnmlmts. Division of the Mont cf Temperance , the swell against the Cincinnati The ..oncii.lion The National cheap and reliable Llnlmt'n,. ."nIAtlnsll office have proved rrcnnt lo their underlying popular threatening a new nub-division every Saturday, ueh sn article Is fIr FLORIDIAN? rtt.l" nnd bi'trnyrd, their cointilutnls," there (10 engulf the "old fog)'ism" of the dead past l, 1 wan reached from the Inlvldul expression nt Chicago, adopted 1 resolution remitting. night.requiring The remedy for these evils was Illtcral Tobi'For Lameness'enettamt, Cuts horse, (tails Liniment., Cohienmis Pint bott1e Ii I of Ihc members thai the united sense of the Conference tIme ciii'ilinn of colored people to the Craud; Divisions ( &e., 'car of ranted TIE I collie one of those holcMuno alioli- Clr the South I I. concerned, It Is Incapable education. totter than any other. 8ihj ftbu IIhlll\r utrtmgglst. \ The of the Hotilh decidedly In f'ivor of (Ireeleyanil The object la to review and control the Depot, 10 Park l'hace, cw York. nnd of position to-ilay mOt abiiMS To of January. 1873, t.I"f r.I.rl rnrruptionsOilih npprchrnding. ,1 The New York a leading article BntNETT'8 \ rllo COCOAIXF.-A Brown opposition to Ihn nomlnallonorny matter at the next annual session. eompound of ia\e no oOcn fntind for the pre. none worthy of all ndinlrntinn. laying nride tImepassions nl,111 will be boll Nut Oil to FOR ONE DOLLAR. hell necessary says It docs not 1lve ( a' : cos- Ae., for th. hair, has Mubllshed ervntlon nf bbrrly nnd the rllllr.II\I"llnle and prndl.c of ye lerll}', she rises other candidate A very destructive fire occurred al Grccntboro, At rate It will not support ft bolt, If Mr Gree- world-wide rrpuiailon., Its natural adaption, agree> f 1 The true Idea wi' hold rquul to the, II upon her I'RlroilRI for one Jlt the nell day, the ZlsU a baker's, down of N. C un the 2 Itli ult, burning the court.house, any should be nominated al Baltimore' ableness, and freeness from all Injurious or tollne THE Grout Politicnl in ( llllal 1'p"hl"RI about sixteen In number, nil Culdwcll's bank the Southern Hotel Mcnden Icy properties toRMher with Us ehenpnew In rmmt ; Campaign sore-heads , lift hose mini, concentrated effort of the virtuous bolting lo Jurahlllty to Ihll tinpirty: I Iliroiigh \ 111J in- rrnnd, people Forney's Prtm publishes a statement(, showing ( and size of Until render It niiVmnl which the roiintrty is now nliout to on- Ilmm.iii ,- pinstiliitionHof If poMcrnnd public nppreaion" of tin1 country lo rl'111 the ship of Slate from told, under tho I leadership of Judge Wiillo-who Hull, Staple's law ofllcc, and other buildings, the thai In Iwcnly-scvcn counties of that State, Buck- Sale led bKy V7J other preparation tn the world! K?. aim . introduced, 'Hid which her, like a shying horse, Is a Ixjltcr by constitutional, loss amounting to $: or more. There was by druggist. . he storm ,0 1 of ft character BO tire supported : l'rulllgl.l. vt seriously Imperil Snfctyiand Democratic candidate for Governor will MAGIC gage; wil. imjiortntit Blew, OF THE MOUTH.-Odlferont the ind .nfli, Ilir her, Into the haven of Infllrmity, mind, in season nnd out of CCHMIU, w Ith to luhurancu except f. ,10 on Porter' drug So7.mtit, r 1 renders time in its rcfitlu (in to enlist the deep inter Il'l'h"IIII..1 .Iill 01191qiirnn pilot peace, equality, gain more than 11,000 over (the ordinary poll. mouth enchanting, eompornl nt rare, "- ol Mich, KI>VI' titiettiiil, roinhn, I The ustlcc and liberty, from which she has been provocation and w llhoul provocation: bfll"hen blur The courthouse was Ibo finest In theSlateand antiseptic herbs, it Imparts whIteness to time tceib pft (>f '\cry citizen ; ami,] in order, to niJ ilamc lor mill'adnuniximiioii. or m thfgmcrnment lonl. vt unjustly' ,and an Injuriously l\clleJ.-s ever the slightest opportunity offers for (te, In, was worth about '30,0.) The records from Judge time Davis presidential has written candidature A letter of withdrawing the working a Serves doitelous Intact dower, from-like youth crows to pge to ,the tbe breath leeib., tad nr" a* far us l possible in enlightening the I. not hi !people, ti8 to the 10&10 to be Fettled by bo l"re than equally shuretl by Ihnt iolllical oranl7nlion leader nf the movement, her choice might have lame building occupied by the Conference the the fire is unknown.It The State Democratic Convention of Virginia from using nnsafe oils, than from Btcambouu nod before nominated candidates for time Presidency is understood that Mr. Chamberlain, I'rcsi railroodt combined. Over 200,000( ) families comma.. the Election, TiE FLOBIDIAS will l lie ; to wMcl Ilicy arc nlludiod, tool lo illicit In other. place Hut personal hontllitics day I Instructed time delegates lo Baltimore lo vote for to burn Pratfs Astral Oil. and no accidents bnv which they arc Indebted 1 for 111.11 priftrmcnt. and antagonisms (.f the past will nol liter her and Vice Presidency, neither of whom dent of time Columbus Convention, has officially and Brown Every In tIme State occurred directly or Indirectly from burning, nor ftrni,) hell until tIll 1st January 1873, And (Unit pnrlyliiih continues to confer the from ronlributing HIP support which is needed to Will accept Iho proffered \onor. and passed a notified Judge Davis and J. Parker of their nomination Oreelcy county InFlbnd4iSfJl 1770,(Now> York Old house r (;l"IT> i, F. fur OXE DOLLAR. We call upon our "iliiceo williin Its gift iiKin| men of known unfitICM ensure its SIC'C Ilcsldca, the promises lor the tiring of ,windy resolutions, 1"'ooC wl.lel repudiating for President and Vice President by, the wits A represented tremendous hall storm occciirrud al Cleveland A BEAUTIFUL WhITE, soft smooth tnd ciMu l ftirml in all parts of the State to make -men of doubtful probity of character, lucre future are encouraging mind enticing. Victory both Oracle) and, Grant arc paraded exultantly labor reformers A conference Is lo be held In Ohio on Friduy. A number of houses skin Id"produced by W. O. Lslrd't Bloom ol ntorlopcrs and actuated solely by to her, and justice which Is nil the Union.Thus New York early In the present month.A youth. It remover tan. freckles sunburnt, tnd a.lvenhl'n. guarantees , effort extend the peace iin to circulation of ) I were struck by lightning and several women all other decelerations from the skin, heaving time cotrupt motives old seeking alone tbu gratiflcalon she auks, but which she 18 hoped for in vain nee that the action of Iho Fifth Ave. dispatch from Pueblo Col., dated June 33, killed complexion brilliant and beautiful. Bold br all the paper. The price is placed, nt so of selfliili desires-nnd which, sulTm rings under the administration nue Conference 1 far a It wcnl was highly favorable says that Iho Denver mind Rio Grande Narrow droKgltti. This preparation It entirely free from l'rCldonOrnl The citizens of Wutcrlow, iN. Y.) gave ft any material delrlmenlnl to health.JCBT . low 1 figure as to put it within the all Holies' of ambitions demagogues to rule It Mr Crcclcy'i construction of the Cincinnati platform to Oreelcy and time only repudiation Guago Railway, was completed to this place list! grand reception and ball to the Southern editorial THE REMEDY NKEDED.-Tb.nks reach of almost everybody to Mibscribe with u word ns nllb a audI," must ultimately as set forth In his letter acceptance, Is n done was by a little neat of Irresponsible evening time lost rail having been laid at 7 P. 31 excursionists ou Friday night Time Southern Mrs. Inslow't. Soothing Syrup, we have for year lu for Address Irive all honetl itttzens from lla support and good she could desire. All the great evils malcontent whose vocation It Is to grumble, Freight and passengers for New Mexico will now boon relieved from sleepless nights of rtlufu' 1 copy. n party left next morning for Boston to attend the watching with poor, inffcrlng, teethIng children. UOH beneath the If and who ready at moment to find fault railroad via Denver to Pueblo saving over soon go n tem|>oiliioti& \RVC which afflict her nnd threaten to Invade the arc any I go by volt DYSPEPSIA ., DiE & SON: PtUisu'( popular condemnation Slates of the North, arc now discountenanced by I with anything lhat hits been done since time I. one hundred miles of transportation by wagon Jubilee A of Friday the ( and general debility Indigestion In their,various depression forms i iplrllt AVt have liccn led lo these rtllccliona by an nritle lilm. lie flvorA decentralization of power, condemns Flood. Il would appear (then thai the Tribune In or coach. Another hundred miles of the road Washington dispatch says alto, as a preventive again Fever and agne, and Secretary of War annOunces lhal after Sunday, other Intermittent fcvcrt. Time Ferro OALL FOR A STATE CONVENTION In the Jucksouvillu n.wI of ( Saturday)', on the Hiisprnslon of that sacred lalumun, : detailing the proceedings ot the only session ol southward will lie soon under cou.ct Arrangements last) the Frcedmcu's Bureau will cease, and the Elixir of Calltay, made by Cuwell, hazard 1'boipbonled t tu time subject of limo forthcoming Ilepublican Con the writ of button eorpni, bayonet election ] the Fifth Avenue Conference," was ,'el "out are being perfected for Its speedy completion New York, and told by all druggists, It tIme bci- opp. I when and did not EI Paso Texas where It will with business bo wound up by the Adjutant General tonic, and as a tonic for patients recovering frcui r: and Its candidates Tho Union (|Uolcs law supports and a rigidadherence of the woods so engaged, to connect By virtue of authority conferred by resolution vcnlol I of (Ihc United States army, who will settle accounts fever and sickness, U bat no equalRISLEY'8 adopted 1870, n Stale Convention, composed ofContervatlve wilI Rp/rvl the admonitions to the |icoplu cm- to civil service reform, and we believe raise its shout of triumph a day to soon. And a narrow guago railroad to bo built through time and claims connected therewith.A GENUINE GOLDEN BELL C'O and 111 friends of Ueform who are brleel, Conservative call for a Convention, will faithfully and honestly carry out the wholesome all this tho I'nfonvcry well knew while elating Mexican Stales of Chihuahua, Durango and Zucutecas LOGNE WATEIl according to the original formula ready to loin hand In (trapping and solving the and freely Idulls thlt admtulBtrutlon nf our measures to which he stands fully committed I the contrary, bill Ihcn-" thal's the ( ', to the city uf Mexico, forming a continuous ragged newsboy of New York, who sells i'rcvosl, ParIs, so long anti favorably known to living and Impending IIIC of the present, and I t papers before and after school hours, has been Iho customer of llavllnud, Ilarral and Kltlcy and who advocate equal juol lawi, fullhfiilly and Mate government during the pant three years has \ What more could the South wish What 8Iyle. narrow gunge line of about two ihoirsand adjudged their branches for lu One permanent fragrance In time best qualified onl of nine applicants -- now made by JI. W. Kiielv and trade supplied Impartially administered, and an honest and eco been a falurl and that 1 change Is Imperatively more does she need? mll' bis by .V Wbolctule for A naval successors Morgan Kltcly, Drug nomlCI.dmlnlslrton of our fIMcOVrrnmpnt (If M hlch w c think no one \III even attempt If the Baltimore Convention puts no third lETTER I-IIOM TIlE IHT.ha : Alllt thirty gentlemen, claiming to bu Demo cadclshlp. gills, New York.TIICRSTON'S. I The benefit for Gil more by time Boston Jubilee ! clr met In the to deny., Hut the Union will not allow crate, held a \conference" al Long Branch N. !VO".Y PEARL TOOTH POttDER. . candidate in the field Mr. Is Khali lIe Uorrrnor as good as ' the 14fA Au. Gretlcy last 80NVl.LE day of Saturday night was a great success a great Tbo (best mitt known fur cleansing and Itn1 mdc this failure to be to the Republican' J., ou limo 20th June The was called I It Mcssn.Editors that nominee of meeting alriblte elected. The Xentirul feels and Is therefore luke , 187. I tl., tie many more persons attending limn al any lime preserving time teeth, mi eunit. Sold by all DrugKlBla. the Convention In lo nominate party, nellhcr t ls principles, nor its policy nut a little 'orlet that the Conservative press the Conservative party of ..Florld"1) b the for time purpose of placing a strict aud-Dcmo- before. All the elements Including the Pricc'> and t 5t< c.>nt* |t't'r hnttlc. F. C. Well candidate fu Governor, Lieutenant Governor, TliKse, according to the I'aim, are of such a nature here should,have boldness to favor him In advance Governor of Iho Slate Iremimmminaryquestion oral on Ihe Baltimore ticket, repudiating any indorsement popular & Co., New York.CARBOLIC . Member of and anvil chorus were on time Gilmore's Conr. Presidential Electors, as would Insure Ilia whitest, best, most economical nominated needsto of Horace by the Baltimore programme. SALVE incUtlled as a Hoolllu; and to action on luck othermatteti It would havens to nurse our wrath and Who shall b f only Grecley own hand of fifty pieces played Stradella," overture Coroponnd. rbflcbns recommend It the most I the welfare ol the State may require and beneficial administration ever known remain stiff-necked, unyielding and uncompromising b answered Locomotion has carried mo Convention, and, In limo event of the Indorsement mind three other demanded wonderful remedy ever known. Bold cverywbcrtat popular pieces were For sake of Inlfonly. the Committee respectfully to a Republic, prol'ldc.lmen could be found able that It might complete our ruin But it through a largo jmrtion of the State. I have of Horace Greeley at Baltimore, this Committee 25 ccntt. John r. Ileory, sole Proprietor, ChcmIII - of them which received their due of applause. New York.CflIIISTADORO'S. , , itiggeit tblt lletnll. for the to comprehend and to execute tin'm. We think such for heard limo duclaralloni of have seen Ihe will call a meeting of Democrats for the purpose anticipate no pleasurable pastime many old DYE.-Tblt purpose of appointing In the ned Gilmoro was presented with ft floral harp, and ILMR magnificent .verl on &i delejate., Sdy f Anfii'l tllhy this tune the people of this State understand future relish. We have had enough of it. If correspondence of others living wide apart, and of holding a National convention in time West Baldwin superintendent of the orchestra, with ft compound It beyond contingency, the natal and cnte. well tho of tbe Republican and Democratic ticket. The meet molt reliable Dye In existence ; never fulling to Impart - pretty pole} and wiNO l counsels prevail at Ilaltlmorcou have not, until within a few days, heard another nominating a R prudent fine watch by members from other cities. Forty to tbo hair, of color, nourlahmcnt Each county will be entitled to twice the number mrly[ amid kapw to their sorrow that men hOle next Tuesday the !South will be redeemed name mentioned hut that of William D. Bloxhatn ing Is said to have been In the Interest of Charles members of the Southern Press Association were and elasticity. Factory uniformity 64 Maiden Lane, New York of In the Convention It votes han Iteprcsentn- not liccii wanting ho were both able to compre- fur the So was this time w ill Francis Adams BVAPNIA Is outs sickening rind live* In the lower branch of the and .18nlhmlcl, and those loaves and fishes 10111101. general and complimented with Dixie by Opium rmriflod The Importance of the Lglllallr. send and willing to execute that Illey" fully which arc ever uppermost In our nelhbor'lIholghls of the party-so spontaneous seemed the currentol Horatio Seymour lint been made Sachem' nl present Gilmore's, band were, poisonous producing headache qualities.or It constipation Is a perfect of anodyne bowels, is not U the present year to the Interests Rod" .I rare of and fcarlcxsly.. And no ole ID better acquaintedwith will perhaps para beyond IU reach and favor-thai I looked upon him a time man of Tammany A Indian lo bo brcwlug The the case with other preparations of opium. John war seems the people of this Slate. cannot bo overestimated Oils fuel than the editor of time '", under leave a penniless pensioner the of .manifest destiny." Nor have I reason to doubt Peter Cooper| condemn the striken. He has big Farr, Chemist, New York. Ju'y-Im. To no or portion of the Is this i nlol bounty Klotkas, Arapahoes, Chcycnncs, Camnnchcs,Na- community and for know In his ea. ,'hO very 101( aught we thlleon'lcUol of the mosses contributed nothing In their behalf, to the hnritablc nnd Christian reports limited, who feel that Florida Is their a ( and held councils during blt al own olllcc) thai "i hungry horde of schemers and ) II Is true that General E. Hopkins and C. II.Smith notwithstanding vnjoes Apaches frequent ) home and their IIC I Is linked w 1th the ---- Esq. are recommended to the consideration contrary the winter to endeavor to dissipate nil It prosperity of arc equally con tra.II'1 for olllec"-Dial ring of men unfit for A coroner's jury his Utah the lulu terrible past .3tv th'aticrnnt. 8IRh. | NOT A }KAII HE.-We notice thai I good many of tIme Convention by the partiality nffin Icct.o tribal prejudices and ffcct ft combination for a r. cerned. That a change policy which has an) thing bill "I'ollicl| ] Intrigue and politicaldishonesty the Stutiiul. 'nils. Both lliose are all that their catastrophe on Grld Trunk Railroad marked the administration of our government R'I"hlcRI plllrl.llcldlng| represent geutemel general Indian war. It Is nol known whether - Slat -tlmt clique of demagogues \Illi trie-nils claim for doubt, duly tipprcclulu in purely Thu track In the pant i Is essential, all minds the recent Filth Avenue asn 1.1 CUlaIR.1 lecdellll - Cnlferelcu" succeeded but recent minders and robberies must atlmit. Without It must out any higher Idea of political science than the every Illh 1111feotlUoI of Imrually. was In good condition, Ild cngluccer was a they I Ieasr.. 4fl rmaes,Gravel,DlatieIJ' , wo hopo We have and read thai vainly w c rllhlU. suppubo s' lint both know that loo hangs In New Mexico, Arfconu mind Texas furnish cvidcncu vntinence ot. - for Improvement In our private public science of manipulating coim ntioiin, of \III onnvuu/Ti \ sober, efilclcnt amid careful officer, and died al Ida o alflll. us much concerning It of these"'Journals issue nf Ihu permit them lo be purth Extensive and uholt R any of their hostile intentions. To this all conservative clumcnw he now affects to In holy, horror, have for of disaster I efl1t change b to any rivalry thai inuy dinlmriunni/eor cool time victims the nro dy. and Is that fn" from Its our opinion so 10&1.ddilonil and In to the future \llgII" combined apprehended a depmcdmmtioums are seriutualy Rplriliookllg three that "policy" ardor nf a single precinct. They realize, . years slmix-d .Icclol good of the not governed by Individual 1"llblell ml ruble. lU/.le, It accomplished just exactly Inldlly.JII. I to ollle.lnd carried It their admirers we huvo to meet a in time sparsely settled portions of Colorado and UT imi relating 155) and Ihn 5 out Republican beuog desires lor promotion .Hhln' the effort b r'prel'llc.llnd l..e il was called fur. The object of the Conference discIplined uud comiuicl An'lhH' 04 inir> .l Plait, los been renomlnatcd for Con- New Mexico The authorities are 15oa. th.155U1Ui mi. $14 to secure a result \ al us proles principles which have well nigh ruined. thupcoi.lu two-fold. First., to nurcrum( from men, ""')' would in eel these solid antagonism! at gresn, ny a n,.-> (",.nI/R| nf the Second government mm-s _ mao . was : .. . Mr. Illoxlmm fleshed District of held 4m ii mhiv tan to break up the movement mlrh to d.lr. and 1 bankrupted the ritulu-nhlchlmvodeliberately great disadvanlngu. Congressional Virginia, on thin - With an ,lmllltrlon In sympathy. with I homiissca swindled the nut of I their well known aud nwpoimiulu, sources the trite politeal I nmlden sword In hue cnrcascs of the carpet. Ill 25th ult. al Va A New Yoik special 01 oniuiua ...,- tt.,, 1 Corn for Sale.OEVERAL . ot the looking to llivir goodas |M'iipu fueling In dilfcri'tit, States. 11,1, especiallythe nud the but a low weeks Porlsuloull. committee from time Boston Peace Jubilee arrived gems though \\10 ago Hoot Jc Frank's dry goods store at Milwuuklc HUNDRED BUSHELS robbed their first p'flr. duly, n now era would clUllolR. IMille.1 tIm In their ehummucler, strength of any real maid sulistantial opposition heard the notes of ,110', they knew that Tie here today to wall upon Horace Grcelcy and O FLORIDA CORN, In good condition duwn upon and with It would coma a them ot their stihstuni, and .saddled uximi thom to Sir. Oreelcy. If upon consultation had! won Ole fight proclamation of his WIA., wits struck by lightning on time 25th ult. cxtcud an Invitation trout lImo International Jubilee For sato chcip. Apply to l'Old. fh-sh ImpulM energies of thn urnpln, and a legacy of debt to hit bequeathed lo their chil know success sent a thrIll of confident hone and solid and totally destroyed. 1,08(125.0. July 2 A. HOPKINS with limo invited, amid others lu executive committee and city of Boston to _ ilnvs gentlemen hole I friends the of Inith that the n 1 through pleasure Inspiration ht.l.'r woul dren's children Where does thu Union prnpoie \ bly. ia A letter received Washington fromMnj. Gcu.Schofkld . nt IUlul.III. 'sympulliy was found possible to unite alln u.mllllody and who voted for him host more visit that city. The committee have received an "'II i I I ii nllh these ohjr'CIII view thai the 1'onvcntlim to Ktlnih tIme rflKpoiiHtblllty of this adiultted nf nun /new ticket, then that are RI friends now -nrc sure thai if ho Is againrun dated May SOUi, reports the Klowas assurance from Mr. Grceley thai ho will ncccpl The Daniel Pratt Cotton Gins called 'of the administration vVould It \01 for tho uu a raid in Texas, lo release] Sautanta and Big now to o'lh0111; wu trust failure con- and that higher position \oY'lor, Ilckl.t was lo bo presented by Ibo Conference, their Invitation, and ho will, this cvcUog, designate RE THE BEST IN 1'SR. E\try Oln warranted I hut in the hcnliuieiils of thin hwill Ida election la fuel the sun A tlucuug lUiik', mid abuses incident to Oils"fuiluro' us TIre Hhown tutu rcNlorallon of \. centratu Illho Il imibubly upon Ihu basin of time Missouri platform, rise on the of fell I Islhn. wi an early day next week fur hU visit. Orders left at U. A. BILL'S Store will rcci-lv 'nel.IIII""Y day (Onv. RoedV (Or would llgrncloimly A dispatch fioiu dated Junu 23lh, prompt sttrntlon. of heeling, preservation, ol rights, protection upon and with the hope] at least, of Us having a fall From my intercourse with the East, I can confidently Clotunlt FOREIOS. July S 4 -tf JOHN CAKDY, Agent I ufiM-rsonsund p.perIY.juht enlorreiui |"nnit the cubtncl ofllccrs lo equall/e the chance of rnliflcation, nl Haltimore Some say thai this section as such geographically states that Grbbeck'l freols have no idea ho of tin laws, economical adminlHtnition of the ri'sponnlhillly" with the Chiif Mugiatrntuy i I in of }'ree 10 nr us I political subdivision! of the Stale, will allow tIme use of mime t embarrass the A fearful stoini prevailed in England on time Invitations Issued the officers the government, and tho, 1111rly of tho people o if kind linlrad.' Thcsu, although limmim sly were makes no "tcllll" for /uhcroilorlil can lialtlraoic Convention. 24th ult, which a cable dispatch of time 23th ult. WANTED ! olm'n. Trade of New Yom ( ho considered the and of the thin lelhng'oh League (1 didate. "1'0 many gentlemen among says was most severe In Die middle and northern alluH. niiint bear the KcolfH and of timeommtrttgmtI The State Dcmocralic Convention as Jeots .: C'onion'nilvc Puny of Floriiit.'liirning : e ecllive. Jeers noiulnatlon of Mr. Grculcy)' a bluntC)ualng abut us who have all the cldol lenls fitting men to Oeorlll counties where at some points time fury of the G..KEEN-BACK SCRIP, Un in tbu uu last Four , from the. pant to the future with I those people whll parly majority ( uf them, i-enator Schnrsoma 40 and the bn Governors, or to hold nny other olllco In the 11'lhlell \llnll Wednesday. STATE olijecls' in V ,'\ al or our 1111enR.? whatever limy 1'gMllul'e. Its lings nud cliques' poncrlul mid 6 Democislic of and lead'mfDcmocralic gin of limo party no "demand" limit been umdo hundred amid ten delegates were preHotal but jcmpest was without precedent. Time storm was WARRANTS Issued 1873, Congress have been puny heretofoio, ; Us leaden 11,1 InstructorH of the mel"ef through any recognized organ, county nr district leu counties being represented.. Lamar, ofUbU'C particularly destructive In Stafford county. In JUROR WITNESS CERTIFICATES i. with us, contribute their cf eOllrlhll editors who desired new ticket that tost Florida have Ole honor I LEON COl'HTT SCRIP. I , mectiug agreeing may) \el nud Un of ballot .hll was chosen President the town of Stafford, the station of time London form to Nortue, them. to thin end, we feeamured !ik t. mlllllllol If pnuticnble, almul 10(1( of them. These were of lurnUthlng the cln ltllo Go 'cruor, solur I some July 8 48-ir JAMIK: ii. utMiu.r:. IIOM'H, Us utfihtes nomlimteiluHin < discussion time Hen. Hill delegation from and Northwestern Railway, and a number of Unit the (Con.t'rvulvo Party will c'I..r' ; 11'lmIK'ltlurrollty reul lo pioiulnent men all over' the country that as I have 8'1. Generlylu of EastSotith ; Grcclcy fully iinltu \lih 01\llng ro.opi'mle fin theIr! | the i I'loiniiiriKlalions. and iltmmmls of thcsu8UIUH Florida I In""dc ; the I co\.bYI,1 Fultou county was admitted over the Slephenl'BOlrbn other buildings were unroofed by the wInd and lull nud of opinion' might anmnmuiit 8. WAUCr.ll.I'll : a Inlclgcltnlrt''lol of that section astonished wrecked. and uiul : continued by this Ilar contestants. Resolutions were adopted completely Many buildings trees 'n Canncrnitltv Ktnle Centiut/ //il'... rings 11.11".111 bu' haul AII I wal ohllluOI "1"1 Ihe cull of anybody but tho viilonons Bloxhnm is thought COTTON GINS ! ( >d Democratic at other points were struck by lightning In (that lluonghfrauil Die ctfecl llmt time ot liglslatlvo nmjoril.viblaiiit' lo snme parly Georgia TALI.AIIASHVK, June S3, 1873 Milieu tumid hhnnc'd plainly tlmt change of Iron ot as their choice. Tho young mel of the onn- -- ---- and I Irn Ktr>', nud iu whole corrupt and prolllguto then would only Inure to Cirnnt's 1 iK'ncflt. The try exhibit an ardor uhF Llm It would bo Mauds upon tIme principle of time Democratic portion of time country lying between the towns plum!)' / mimt PUKS without bhiuic or re- cold and dangerous lo breast II Is Iho operation| of nn part of the Union, bringing Into special prominence of Stafford and Wolverhampton, the crops were A UIIKAT $IKielI.-Ve un our l/wll' was nut lobo print \ 1I0111111lrolu 1 - 11II'RI' I Kill thanks to tint intelligence of the lot.O occult principle which leaches men of about the to time prostrated and destroyed. lA.doy this, full text of HIP Hpeecli of the I proaehl stirred again, and so the Conference had no name ago to each other, but natural a applicable present extraordinary) hint nil) their, Illt R old The London Times commenting un the strikes know to mmreu woes condition of the the doctrine delivered Alliuitu they 1 alternative (lo the situation anti the force of gravitation. To lu country, unchangeable I I Ornrgia, In t on tilt Icupll. I'llicr' hit accept mighty as come 1 I 11.J"I We frlnnls, HI old I should INI Ifl'cII. and time 1'niait I I conflict with U is a dealh.sklng experiment ; that this Is a union ol Stales, and that the of various building craftsmen, (some twenty AM STILL ACTING AGENT FOR TilE FOb nime. hope our ndjonrn 1th whole II of It carefully mind utti'ntlvely.I It rf'llllle Is one may rot nKsurcd, that the 111"bleall'lrty, Us -- -.----- and lu this instance' time collision ould be sought Indeslrucliblllly of equality w ilh each olher Is an thousand) says time inevitable result of trade disputes lowing well known anti long tried Cotton hilt of the must able and ponuiful arguments in fo Irlldll".lllla |policy, \11111 \lllllrit',1 JiM uu wu Iloil'lcd. time action ol Ihu Rupubhcun withouI 1, for reason one, am for allowing those we havo IndUpi usable part of our political ,)'stCO; that will be BU Incredible Increase In the prices Taylor's Gins, of the Cinrluimtl. oomlnll' tutu Inn jet I IM.TI gave II Iho IC\ chttitimm-dttg: so large III deep Shuts Kxeciilivu C'ommitteu recently In sesHOU throw u Into time deadly breach In order to rescue In time approaching clO.too the Democratic party of products with which England supplies time male K\vn: lioli TiMimlw, time hotte liourhoi, ths 1111 tlmt .lllll nor tmdl'r rings nor | lu Ibis city, requiring both IMulRlrllld nl our parly from obll'lln. and to place our Stato Inv lies cv etj boy to co-operate wit I In a zealous world, and that the consequent loss to England Gullet Steel Brush Gins nl ballol-boxe'S In the hands of amid honest toguide will make coal and Iron dear and thai in consequence nor In the Himtb, was compelled to acknowledge-e ItitrrngtU 111"1'| Mlulr",1 nuinipuliitorg termites to the Republican Conveltli to Ibo enough di'iermlnalion lo change time present usurpingand will bo ublu lo their burial and gover.to enter lu and enjoy somehrultmu will lose the ndv of her Brown's Iron Frame Gins returns, lu England nntagc: anil ellrI for thieve Ih..r' for Mr. 1m. prevent \ assemble here on the 7th of time coming mouth, t of and sacrifices it was not coirupl \dmlllotrUol by placing power , /lUutl Ike >i cb palii-ntly, aiul th"II'O if In time But fur this same (Hillcy, \hich bus U>eu 8 to bu I citizens of (the county hlch they colmwr.prcAI'nl" time Intention of Iho party to put them out R men who lie true to principles of Constitutional rcsouiccs and products( ((3Ogo6OSmasa.. event of tIme f'I'OrR"1' action of the linllimor Hicccwiflilly carried tint nnd 1 hlch of courno the bus fallen, like a bombshell li lucre feelers to lest Its lullrlll strength or asstpptng.stones Government, and faithlul and economical Administrators By dispatch from Matuiuoias of limo 2oth ult, l'n.. thinks needs no I hnnge," the funeral pagennt Union' U for lore poltcans of tiflulrs that, In our we luaru that Trev-iuo, time rebel leader, U entrenching These Gins arc too Well known In Ibis cnniinuini* Convention, you can not, with Mr. Hill, accept J"ti'al CII1be ccpcciidly grlevously The Implied pledge' they should p""le opinion to need prolnlug. Some of the above make bane air aId In biN elmcthmim.Ve of the party and ill'rilcilcaolh havepuwil I out complains bitterly ofwhmmtt i itdeclares Ibe deh'glle to the LUUimoro Convention should at Monterey, with four thousand men, Oreclry), ali f"11 put alll utllccs it lliev won OleD ought to bo kupt; and been In use for over FIITEBN TIIRS sud now Join.- tliore are a fen among us who prefrr lo renml hvfuru Ihl! lhleuze c>lghlc' >n mouth to be an nssuniptUm of authority on time where they }have beol illegally IOt wrongfully go utmtrimmmmumtled by instructions, nnd should act while eight thousand Government troops arc up- good, nut, and clean work. They ore WUIIUM I> in Egypt: but tint vast bomI)' of the piiiplo mire ago nnd the Slulei to day cOI'rllh' 1 hi)' olllceril of Committee The Union( protests will kept out ot such enjoyment and fit fur higher with all the lights before them, as they deem preaching. A decisive battle Is exiicctcd to bo inferior lo none.t9Mamplt . T;. w"rlul of Us bondage and| |iruKw| to luke tip the l'volle'll hol< e and IIMIII| tIme high road to Iorlollhe vchelcneo against the action of the ('ow- same official iHwltioua, let hut its they honor have them eminently with displayed Ihe best tor time good of the party, and for the wd fare II la staled tlml the negotiations fur the com >M to lie ecn at roy'Btnr'1 Hi'l" the line of march in'runs I the Red 1 Sen mid (liming peaci 1111 'nHTily| Will this ever bu, \hilu mitleo whkhlt pronounces a ''fraud upon Ihpurty IIJ'lfbhncb means, time and talent ofthme otmuutry. Very few Grueley men are among plete evacuation of French territory liy Gcruinn left early will l is ph""\ ;uii-nrtc( < to, I i the Wlhli'nil as to thO I.iinil/ (if Cauimn, wll'n' the I H"lblr'al part, with Us boasted 1irhmmeipltt ," and lu no degree binding. In Ihu absence to Ibo good of the State the duleg teii to Baltimore, though a laorilyof troops have been brought lo a favorable conclusion , ulllllp"K""IIII'Jllrllr) | | tin nit mis.p : and its 1"lli'( umnagch nud umnlpulates the of a quorum, time I'nion' contends, the (Conitnltlec(( Uy nil nmeans--fmy the sacrifice nf every personal time delegation are w tiling to take him ]lstI ti i t u - hint rs nf the IUI'I'IIII'II. .lellll'II,1 controls Imd no authority to act, and all Its proceeding and sectional prclcrneoIcl us bll'l uuuulmous I lesort Time arrangements for tIme release of Dr. Houard INDIA RUSSEll BELIIXd, assorted wldlhtMETALIC , llHTUI--111 i : liibulur. sinti'ini I pu"I"I.d" Its at'lion. 11llh"I., \ I, n mean all, despicable therefore mo merely ricommendatory' mind cm Our Mate must 1111 rescued one particular from the nomination. harpieslaslened John Evans, .\11 Attorney General Wilh havo been completed between the Spanish TP'PFn V "f tAClNGS,4'and5 ti,'\ >>. I the ddi'Knii'S then elected to halt itfl.rv nlotnl oil> I failures v Wu do not bellc\ It, nor do time peoplu, pillion Only SI'I'CI members I appears wore ell 'lol.lld we put in nval candidates before charged \huh robbing a prominent Southern lady the (;itirlcy \\ lift ('& Unit who ha i- lull tiered Irom lit nnd Its the Convention; lur Congress, if such compliments - question, I I put > mid limo to coutati- in Hold in Baltimore weeks ' Iriudh. present, eighth ole necessary are conceived to bu ut importance ; but 11llun1 some Dutcher's Lightning Fly-killer .'luil'I'' eight us IW""IIr"lln go t'I.III..q1hi I 1 i utility !for nearly. four )'1'11 01,1 111 propose Into I quorum! was liupru\Ucil lu limo pcrnon 01 utir Stale government must lu rest'tied from eluktruclion ago, 01 n large amount\ of diamond jewelry and EXCURSIONTR1uNTO -> i4H miHliiko Thc iltiegim ItS '. lliU hint lo lontinuu% longir. under its foul domination. Mr. J. C. Ulblw, who conwntcd toncrvc aiproi)' anti degradation''! And that can h I"udl svv-ceps (them off and clears the house speedily neither, Instructed nor n I ( fejir but that tlic done by the utmost nud uiiltv Try It. Sold by dealers where. 2m - 11'1' 'olll"Ilelln 11' 'Ih. //I't.1111 rsptitmsibmh. far some nlmvut member All ol \hit h Ihe { only harmony 01 A WiiHlniigtou dispatch of the 20th ull. says every _ vor any particular ruiulltlute nr line of pollcj tly I the emimmietled "Ialure" of the udmiulhtra jim protects, tu be Illegal, revolutionary)' mid alto our candidate for Governor. lNI'Y.f' that J. H Edwards: of Florida, was lo-day ft war- . ... hut cro left |x>rleelly frc'C', uiul iiulmniiiieled to lion will bo placed ful square ti|>ou the Republican gt'ther without thu authority of precedent del llu, Elton prize fur Greek lu the Columbian act 04 \' l t lor thu lull.rents of time where It and *thcrul .\ billllaot Oreclry uud demonstration pcnt jotit. thr.\ 11''II.IIK"l party belongs I A* way)' 1'"llr this and In Ihe inter \ 11011 olhge of lhal District.A . I ludle. comitiy lilt I I iiiiili'rsliKKl. lm% f\ir, Unit I n m.jority will n'IUII Ult Us coirupl orgunl/ulion slial cst of ""harmony lu the party" the editor of theI'limn too''! placeIn .. Virginia lust .1 of I lie drlcgiiti hit nr the tliiIiitMmiiit'iit 1'1 have I II'I out of HID rncouls of (lie I time who would like to boa me tuber of the Wednesday night I The J1'llol was two lluliu Bratton, of South Carolina, says recently tot Lidniippcd Midsummer Muladlen. SAVANNAH ! the ClnUnmili iiiiininoi'i at llalliiniui', an I,11 hmc-t and only' remembered for Us wholesale robin'rle (:OII'lllol, but who d ot being Ole uu mile long Itonflres, w.re Ighh'd, guns fired, from the Dominion by Federal officers, The hot solar rays thai ripen time harvest generate action I thill tun U' tktIl! 11..1(hi- pt' > x>ni t ..1"11'hil. and wicked npprtHnionn tier tIme \regulation requiring\alr delegates'inn flrcvv 01 ko II"phl'e.l. and thi' w llJest enthusiasm has turn restored to the Canadian jurisdiction mutiny distressing diseases. If the Liver bo at ullpreJlepoied . .. c''I,1111, uf 11111" lo bv clli/.ens of tho county whic! I'revlil'd. Among lImo IrOINJllrcneh'l home by and In now In Toronto to irregularities, this Is the sutton In .- I lu'\Zll'S, IN l'I'S.\\I.-TII' cltl/rni uf alerullt.t the torchlight the whUu bilious altitcki bo HERE will be sn Excursion from Tulluli th IIU'toill II may anticipated. A weak T limo i 1.to ln h I they claim to recommends that ale 01" The Connecticut Legislature; has repealed limo I'lilniini baranaaa /Ilhuo"Conl'I'lllnl h II couiily) 1 iihout regard U> color or po reprcI'ul" following Inscription, Indicative of this spirit of stomach, too, It weakest In the iunim months, onAUGUST 1011. ("IH'r)| InlM of ulikh m iliu Itulllinoro IhiIiul Pm uchiv mlii's.II'1 I public) meeting at I'll \ deal be Ile Committee, aiueiub) the Greiley Il0\'eleUllu Virginia.: uiiry law, uf Iwo hundred yean standing, fixing and time loss of vitality through too poret by excel- 12th, 1872. spi'imks an "Thu In one middle uf last month and ctlccleinn again with a lufUcleul complement of members. .' Uu rate Interest Hi six per cent per annum. "/t ] [luw. hllhllj hlkllllK'ullhe Tie Him and Or T, In time live perspiration b to great, that a wholesome ton and rrtururcaaouablo iii f th" 1'-1' of tho kind, In (bo country, and nrguul/atlou," fur Ihu county. Jul. U. Roblnsou repudiate their hate action, and Untie I new, legal Strike No locnl" hl.dui.i.r from. ora1.shore to there I \\1\ II Wle-ge-lawltne-8slnthoTildcnBc slB ic, couiblulog alto the properties of i diffuilvt ttlinulant This l Is good terms.opportunity U> go Alien all llu contemplated iirriin i'iiKiiU lor the \11 selected ns the pcrmaunit hulrnmn and i pieipercull for I Cou\cullou> I iihout any; Ttm yumruui o"e buuih O.furertr" Mercascal New York, which was suddenly and gentle cxlillaraol, It In mosey cases necetttry I'nre for She Hound Trip, $3.0O. ' cnnveuieiicc of tint delegate'* are "''IJIUI1 it anti Juntes' Hurl as Die pernmticnl Scircturyo unnecessary and Immpenug restrictions. The demonstration along tho streets was the di-.intlmied. by the withdrawal of the plaintiff, to ueullu, anti under no circumstance should PresIdent ARMSTRONG B. , will Iw found in every rl' III.t lullall. fil the the organl/utluu, \hlch U to bo know u as The In hut way only I U contended can luiimony grandest ever seen in Hchul'UIThe crowd T-- .Irrchle"for perjury at Baltimore on the 28thuli bt ditpcDtvd with by time sickly and debilitated Jails BiitPPiao, Trcwuror. grand conclave of, 'limo .Nulioinil 1 .'IIIC.tlll II Cunscrvatlte urgani/utlou ol l'Ulll1 count)... be restored to parly," and lu this way ouly 1'lblellll (the theater \hI was handsomely 'ilt held In time sum uC $1,000>, Of all time preparation intended thins to refresh, 8. \\AtKtis, Secretary (.1 one m1S.- '( is helloed that >aniplu II'COlllld'II"1' nillbiAjrubiheU I >Iixr .', I. 1 Piuicy) t.; huarlug. A. JlcC'lute, 11 I U may be Rdlul, cuu time editor t>f the 1'iuai and profusely d..ornl'1h llllel States tings, I i i i., ulle.looo at Cincinnati as certain, thai sustain, and fortify the human frame, there U none for at leaH 6,0 jieuple, ami, bceidulliU 11. TciiBdalc, ami\ A (I. Wright were dlnhl'l a I and oilier nmnuglug memters of tho Ring stand Iho flags of Italy, Germany, .'rancr.lrclnl. and Mi: ''I.-hl''k wi respect lime decision of the that will compare with Iloitetur't Celebrated Stomach MONEY CANNOT BUY I every fiielllly \Iii he utforded In thl) \ny nfRouinilllec the Kxciutht CoininllliH' ; the Oiauge' county a shadow of I chance ofgettitugtime much coveted a mmitxT of oilier 'foreign cUI"I'ml. where Pciiot rte National Convention; and wilt not of Outers. They soil have been weighed In the balance for Night is I'rlcclrn not found experience have beourecomuuniluil wanting ' and, reception rooms I U iiilcnJi.il f'SI.lutollI'r endorsed Comcntiun wire seals In the llll'I'ulIIII. sn>cchi>i etulo lug Ihe ('lleluloll movement ant,s'ouU- by accepting the nomination made from (the Brat at gmtl medicinal But the Diamond Spectacle will Preierve to di-coratc thu building In an nppioprlutv limn' IIJolll"III) I be held (one at Ilhllklanlllulhrr ---- '( made by Judge F. R. Furrar, lloverly HIw Yoik. or by any other nomination made ipeclllc, not at a beverage, and In spite of interested tier and \I arc 1111.1 that nothing I H bo lift at TiX'ol, to (' operate w Uh lttiLmty) Sptakiug uf Mr. Oreele-y's 1 popularity aiuotijr Iiongliikg, 31r. Walker of WI'llwn'lolll, and out l U of the regular Dcmocralic Convention opposition from Innumerable quarters, stand, after ,undone to make buildine. atlrarllt e its w1 for the "O"IIllol of 1111.lllc! for the LcgUlu the, Irish, thc liuh 7>< 11/ says }'rllh e. othn prominent c1 ell. Every mention of Mr A Mr I Loomis, from the East, While 1 lecturing a twenty yean trial, at time lead) of all proprietary as comfiirluble,' lure, timid either alll"l taken to secure the thorough preKsloim uf opinion thai appear In time column (ircylt-) 'a flume plhll'et the \Jest cheering. aga<' t woman suffrage al San FioucUco last medicines Intended for the prevention sod care of . j -.- oiKuiii/.atlon ol the t'UUciiH for |ikilitleRl| of the newspapers which reach us Irom cvcfyparl The meeting was prolonged two o'clock in Wedi! o.djy, was lulrrplcl by hisses Jecrj all ordinary complaints of tho stomach, Iho liver, ETF-SIGHT nut BUI JOUR |IMj'flj{ In the W.rll >huggeblvl tlmt Mr purpose., Other cuill'would do we 11 lo follow of the Vulou-.iroui limo four points of the the morning and adjourned amid the greatest from the leading leDllo sutlragists I were time bowels, and time nerves. In time uubealtby district IF YOU VALUE- (Io..y l, if elet leI, 11 his C'ublni't ullh tie ckiunplu of 1'utuam They eauuul commence compiuik-U would appear that, in view 01 l time cuthuslusm. 1'h. kume day the Cou .nali\e I P"'in1: Hou I.aviii Meeker insisted that the ( bordering the great rivers of California, 1105totter's LENSES ! U"lorlla. the .Vi"'uri Ji'"Uill' ckcimmimmmaiire the w.rk of the 1'101'11 too' coming residential. campalgo, tho slimmost I uni State Comoutiuii relh'et (that I the delegates to off; 1m; vvutucu be compelled to leave time hall.M Btonitch Blttor may be classed si the stan PERFECT WMLM. WO never 'lo hear of I grand, patiiolic Blrug- "HIIlul versaloleo of Irish dard one far every specIes of lutormUlcnl or remittent GUOUHD riou uniuTC CBIITAJ when I move U umdo the co.I'emliul' .f every citizenship Is lu favor of Iwltluiorc should ( and Emily Stereos, owlC of the Jmoimsshit r. Diamond gus to save Ole country \Illiout this ndticrublu cll"el shoul bo Invited and solicited Horace (;rl 'h' Ho may now be wild to be united support to \'lgorll.llrleut Orccley n ticket, rrajiist i: lill organ, drew a pistol on him and fever. Tim peoplo *ho Inhabit those dutrlelt, on Melted soeouut together of tUr and ltau derive their atd name.lirtUi.SeY.' TtIL' , dickering In regard to the ofllcei 1 So fur cmi we place tIme most Implicit confidence In tIme preparation < are - ludltoU county, too, wu arc glad lo know, emphatically' ( favorite candidate of most t IrUh nomlimtea at as holding foitu the (U'hiauiKd an but was forced to put time will last many years without Cbittii kuott, the Democrats Uu not, and will not, Inslal l"llduual alllog' -a Confidence tlml li Increased every year by ranted superior to all others la us* ? bus the work of orgaul/utiun and llll/CIK" fairest allayIng the of time |1,1"llu' : her pocket the tkal ,1mnofs'ttottoiPMiV ' on a ledge that the t bo b.10UIII clllielce 1'Jlb plOl1 blllllen the remit of iu operation. .ifiummtfumicSurid bji Ma @s&'I0 .4 nor Cabiwlahll(yin Democratic Tho the COldervlh'ol arc tOW markhalliig their for Judge ( '"tcr of 8outU 1--Carolina, speaking \1.reviving real peace wIthlu brlel re The drawIng of the jury ia the Blokes.Fik At bitten, 10-called, of time moil pernicious char .'fW' r OlrugKtno. part of the bilf country will Inxiiit era and putting everythIng la ship bhupo for the uf the carpetbaggers|'lrp of his State .are storing Inl'grll'lo the public service,WtaulUhtng cue \8 completed last Tuesday and the trial acter, ore springing tip like fungi on every side, the CAUTION-None Genuine unless stami** wluI coining aciloo. We expect to good things says they the States lu their leglibjute PMCedcd with. il our trade mark. tiic ..i. hC lo the puLUo hereby furcgrf tl .agtluit time dramshopsaudi throughout Mr. tinning his\ Cabinet suit lilt considered the oil spring and si Uw of Judas CcloU For sale by genti ; upon t from Uadlbon in we know her hell } mioni. rcsrK and Glo 1o'ol\r t writ The Democratic State t Convention of Ask for Uo blitert, ace hut the tLAiK: Jeweler Georgia Union. S rlews M 10 ached peoplu will do Uutr. In laboring lilt l nriot; the father'i Me, sad\ utirrfrntlnp 'ederIIYllom.lt.eriog IDlat to get (or auaimufla 8oIe ACCI lJall ttusllugII 0 lh label Optician is o ( the etc., we correct retne her tbtl too genuine j Republic the nomination of officers beeneallcd O Fed ' V obiamtd. I Ibo triumph of C'oDifrvall-w l&lj frm Stat they be t olmuy whom cia ore ahln rompetMit, ux D Ihh'rol time| mnlljer'i" "c. From d alI dUJlml (r tle (( to meet In Atlanta I this if July article li never sold .a bulks, hint In bottle Inly-only la hers empl(7ItI fJutme 05-If I S , a 4, - - , ,- - ., . ........ ___ 1If'O' .-, \) -- .... .. i - 9 -.-. .. - , .. .__ __ _ ._ ----I__ ___ i-=--..--- I ---.' -- --- -_ 6 - ,- - ' -- : hl Io- recent 1 located with l I it lh<* Mtnn of (Irontlwar tnJliltli 'IsIS." UK hundriil! 1 U'lcctr.l 'mil, tho owoud abandoned Ufiictory to liimwlf, baring" CITY ADVERTISEMENTS.I . I'j IOu mmo wIth the cborii These , : street in Now York 'ttyhere of V\I' f,1 the loribian. I liitcntlon, of removing tlie etshhIhment to l'ml.. \'rn' qnil mil rich 'ui( IrhIKrl )- time weunit - t !! |vr'''ni vi i \ ry .IA TV tm.I anff' l main land. li ) Hut whcl the oin't! < Vt> I u> nnn l hv HIP 1\1 the 12th ,,, r.1| I I' li ,ITnon :Invnty tin n mid with the tat' ihounand iii. nlU on -.-- .llLY 2. 1 iI. 2 ult I'en\cl It cOII hud her t.ra anuii.il race of re, fifteen mlhtl' l betwecn ,, And now ('om. I ho Florida 'sn iln? colored! 'I mcl, me in iwo Iho lien organ bells with rang IN, and ttnnu the oC anoml ' T.t.L.ttr.tFJ.! joiuivl ; ) ilc 1 11 rlnnll. JII.&CO.( ( I ) ( \ WILSOIN'\ ) toil nail boats i lu.1 a rowing match 1.1"" ttflvtt ort nAI.I) makes nur' nn the State Republican not in mng'e! hot In Imttrrtra .hl,1 ( boat The weather was elennt i au.l a CiHitmillet) for lu nfn action \alnl a Con- emplia.is to the song; mini when flnnlly the auilienee , row TI nlion. There w<\, no iuomm present accciil- lirnidc (Itwlf with the glory i ,. IhIIS. Leon Lodge No. 5,1.0. 0. ? fine time .rrjnyfil, [ >T anal their cokes 10 the rent- Id lImo .Qso-Mr. Gllil* had nn ri to net I .upmty JOllied .\ >on.lenl of tl" J...k,nvi:!.. '",.,'. .'. i jug b rrmed 1 If the tho anme of "bl hU11 voice I corrc 'i'0 | the river Ue.i. j mini' the call AI"nl to n"lhlll. Tin cuulil i"rform, niul human 1..1 me. lm.i.I AIT nn'v ftii'ivinif iniitluv. I liiui': t t. ,'k .! :Z.? Mrotlirrn uroi rl11ill.lc.I "," writing frum Welalmoa! 1',11'4 Sue says, ho\'rr. lliat the pvrty wxv aM.I., to been fairly, reached The II.hl' lit iii i ; Ih,'''' will I* B (iiUr Meeting t tI n' Ed hopkinS for the next Oovc.lwrV.; D. Riot-: j the to niii't in I' invention nn tim.. Till against fir ilrnni of t tun tn. ll 1,11\\-| . I : I.OW.E.: Nn 1. SI theirM (o haiti for, Lieutenant Governor mid, I II H. Hg r'ICI Simon which lime whirling' harmon e' .,0".110 ''lhRl ,V",\IIflJ. Hi "o' I. ROT I) J1A U. N 0. for Congress. nor w III they ,',!le hay the rile hit! down !by the "Illl.,. I ol fie toi!,.i un.:: Mllh ;i'* ,p.... ''!'',1; i- '!. A. .MtSK' .....'..'a'v A little ihitghtcr of Ui'n \m. Uirney, ofUalnenvil I': CuintnittciI'lnrlM 1.1 I ''iv mil'ie DRY GOODS . nike lit* other : MIOM: !''. ( on n garden j -"RIY1,1. \ tA"Anlml.TF Iltl,1 Port wu- muhlonM l WllllntulUlIirock -. . Ocklocknee'Lodge; No. 12 LO.O.F. hay one 1" TI re- 1 dRY. <1\11; the IroDl4 nearly)' thrill\! ii | on the tin ult. on bonnl HIP tug Kllitit : I'rn,,Illltiol i-rit i 1.00',. mi, ,'li '.. lll' .ofbl ;f'.h"lvtn 1-1. -0- her, :ooi. vvb'cuprodiii'cd 1'1k jti*, (rom wliiih n, June in -The itter.il ufl Vet, I tKliiitttin a ,I MI, i .\.1.1;' ,ilniiut\ mMtiliilv . In Franklin In dill view . Port ,, Irl'.IEI. ( of ''br Ll7 Jorw.n county nrrnred. Wmt i n c..u' l Brethren arc reminded In the t Hall( of 101 ' ; r she tiled In two dny H..I.r..IIII\c. \\liiiOi, In . of the Sheriff: ''lhllhirtr n oilier met, ho stood L""I"I I 1"1 I In MIII\ 1 "I ld 1."I.'b. ConIII..D. 'itidln--, C"u.h. CI"II. -- 1 ciiiwihJ I I um is'< f. : hIt thm will be S Ri-cntar Mfftlng ofj That of the Waldo branch ol the FlorIda "no n'r 1.11.11 Oirtlni'in, 8 ,':.!::' _4 ': j'RI.OrRl.7.1: IX>r>OB. No It, si thdrDoom. portion perfectly paralyfeil with frljrM! or IniliiTon-nco, cliowii tem| ,rally iliulnuun h'I\'r Curl ,, liil TvilIn (ho Mouth Klilnun Au t irks, ' 'P.I.j. I.od n.tt PrliU; Krnln(, II *o'clockCHA8. Railroad lylnrf In .Alai-bu county was to until tIme, niurO'Tf entered a small boat ntul got Sihnr/its rend. In whlrh he .n'grcts tnmthhli- l"n of ins Ili'trl, Depm .|oa of Fplrtu. or the 1M ; E. OTRB. J* ?t. IIB have len fold by the Shctlff at Oalnr-vllle on loo for down lhi rlvrrtu' lie AccordIng tv In alen.1 Ho ,ilmite to nklrt'-'s hi* ciilllti-. Beautiful of Prints Percales Cambrics Lawns liluui: soil i hiiniirnl other Tmtitonm, for wbicbmliitiNat' of McDowell O\'rnflrn. taking! part In the cNnwhirc. Styles Lit. Kit KF.litl.ATOK Is the b.t remi-- .: ; Tanl_ MwnmP .__-.ttIrJ._ -' yesterday to satisfy an celllnllin favor to time ( HI. tin1 killing "tt a deliberate' h.nl.. IH.fro Convention has his l'nlpaljl Iln .hes il. that bn run IE" 11410\IRID tl ,.I mildly, Aucilla Enoampment, No.2, I. 0. 0. F. .\Callahfin. tuurilor. IIUcOk., after quarreling with Fort In its elTorti to 111' against tlrsntlmn all tho ,1&menl tftertnilljr do no,unit) helnl'n SImple quantitIes.ntllblo hit rnmpo1od.en It mj .. -0- The Gainesville ,nupgcin that pcr "" em- Ind Inviting nMior to lI.b which lie declined North The o could, tao unll.1 IIt'ni1ue'I' huRl Hrown lf>- J Miwtings) It ls n"VU5,In every ., It bu been servants a certificate of boarded Uir Ella, hatchet and! by lunnirlng eon.lou nl of a common nationality used for "?" 'UR4.8 hunitri l or the InOI.ntl".L remind- ploying sholl.l require up < :;ii PATBIAUCIH arc IIS and duties, and to accomplish from the wilt cd tbat there "HI be s Riynltr Meeting of "*tAfCILLA _"p character. A good thing where the 1'lrlc are buried It In ForlV head knocking him ov\rboarl this it Is neccosary rlghl to lirrak Irudltionsl itarrit ri. I 1"1.11"111\ I(;n.\1 4--I l, 7-S, mul t I :8-.1 I '.hilliljN. f tho al"1'1 and ne'country TTun ' KNCAJIPVENT,No. I. tl their Lodlt') Room not known 11 l Is practiced 11101111vell1yln t and killing him mtomly The nil Three cheers were given for SrlnirVentworih / tturTOM) uf Liver Lomplalo' uc iinr.\ !nr<* l'Arte4ere \ moved Hint the Con- I I l.ino I l.uilio mill I Miiw* Kitli-li lltwifry, and pain In the tide. Sometimes the polo m In the 'rll, " : twit ThDTHiSy errnlnff >t o'clock. the North. white men. Irll> rl1 I't ) shoulder, tnt' I I. nilnlnken for rbcumiuiam., The FBtSK B. PAPY. 0 P In tha iilwrnco of the editor of the (UkeCltyAniMwhich Florid mndi'nt of the uvsnnuli, /'i- Hllnllt"1011e.1 hunt A. 'wn nppoln-; ,tomsoli i I. It''et.1 with i.o" or irrxriTK and nick A c. rer | the of the ir Convention meseVevtat itutil l 11.1 "lnlll. I ItuttoiiH : l , COAl E.lu.Jn.R.'rl. .oul'f I"'AI tor thirl" neil bowels In g'urnl "f.lonvilmen 1lona. / ( happened last 'el.kIho) reporter ftnUifan write to that paper a4 i follow "I am tlng wIth lit Tno iltian toabre| with p , for the cannot furnish the usual local not tiitlly pl'SKcd' with tIme political statin nf The l'hon.t, platform wns unnnimoii lyndnplcd. I dull, hf."> e"n"ldo"hlr.I"M of .u".I"n. ! Si i t memor.Acr'"I""I.,1 a 1'11'1' ,the ( luciiin.iil ('on- : h TI'illill 11.1 1.lil H"IIII ,. " LOCAL AFFAIRS. items!" '. Hut perhaps the editor 'the KErrnL'i Albeit, I will taku tIme }Ih 1,1. alI 1.lnlll : clrlolll vnttntiiuthi.. : In' 'it i uttin-i:i-m I It then lol"n .lmolblna onght to hates born done 1101 n'IKrtel are one and! I the stone perwu. clmncc, under the conviction Unit time mid clrcunmtaiKV 1,1)"rll..IIO) ,.1 I o'd'M'k Ol.n i '1'1"1 .1.1 enknen, dibllltjind low -- Tin Fot'RTII-We- lirar of no arrangements To be prewnted with a thirty.eight p'lll1, all, bring at together agnin. I wi The,' lllU.tfllr. (. Cnn\i cleited i-ia tai'it met it the l cliinr->1'I:1 i : ,".tIme"ilm, ,me., m.nr other of the lime shove Tory rymptomailtrml few ofliom. the r Ulinora und time devil Ills \lcl wn tetiiHiiury| i OLsirSTlIS OIT' I In, tin- I.IMR i1 th" most being m dc for any klml of rclebrttlon of the tcrmclon Is ufllscll a glorious thing Support| nOlllllol. I He advised 1 com : FULL encrally organ Glorious Old Fourtli. Tbo wcnthcr II hot and have i it conic from I bcautil\il and I ll"rllQ take thin li>' "rut, Unit nil! not. All your subscribers ID 111'ik union with another, (\.n"III'1 u l"I.kll/ menu iti.l'nhie", II. 1 ., p'r (ii'iikii h i-n' l0- mall postageti busincM In dull,and we suppose people dou't feel% young lady la perfectly over"hehlling. 1rfl In I iw 1 pun' of Kloriiia aN for frfr.I. II'IIIIEI.I. June :7-TI.I.lkml'r..lh'l'lu I Plaid Muslins, Jacouot Cambrics, Swiss Muslins, Victoria ,pnld. !.. |I'r, I, ".1. ,i. ulv I r -i-i In 'bottletl VISt week.Hro. Hi a I i ia to elect I Ihmocrat 1' l mill' i a'< t lur d ,nl) l">v much like doing any thing. The boy will\ |wr- Hapy was served jml that way lout believing i Impossible a ID\Ifd. . r to, vole Croelev: and .1. ii.iii.i: > A Imp pop a few crackers if they ate to be Lad.- Pratt, of the Palalka / .", no longer receives and th it the election (Jrwlcy by the IVmocruts The Consultation 1II Inll Committco Ih'l Jm\I Mix-nil Lawns. Organdies Soft Finish Jaconets. Mil: II. lilt Ihrl,, ,' 4'4.bll off will tfinoenitiit him ; and! It )' Convention received Tho memIMM Foil $.(i.E $,t.L Mil ni.l, ;>1!! The excursion to Life Oak will\ carry n good cow tails for but be, knows 'i"1' ,a rupturou'ly \ lubwcrilliolB. .lane 1 I. muller' Mncen him and the had eats the ptatrorm.,. 13.1) little taco ninny of our colored IricniH of a party at Toco! w by the w hole- KpiiNifiin. Liberal I Convention I'oimulttee agreed CESTCRT: PLAST.--- --We,-understand- tlmt then dih.and 8 calls on the cattle dealers tu fetch in At a nii-eliiif' of time nlocklioMers, of the St.. upon Tht Kiprcr' for loyernnr anal, Chni. Hlnek for A LARGE STOCK OF C( rss: ou: .\IUTCc\< >< their tall, which of COUJ lucy rlo win-never John's Kiiilroad, (running from Torol on tlio river l.t. (loMTiior, 11111! full Stat Ill'kelll. follows : In a Century Plant on Mr. John Craig's place they come to town. to St. Angiuline.)held at .Taik*>nvlllo'boil week MheniN' -Oorrnmr, Secretary of $1:1t.: and about a mile north of town which Is expected to ." lenernl la'auntramts1.t.. SPRING WATER bloom soon. The centre stem lias already attained Henry ll'ksbl'lr. the murderer nf Ir. ('. H. the new lollrd ofDirclou was clioavn.. :. Auditor"MI.\: Tr"R lf'r. and, Clerk of time Oonrnlr.Supreme 14J DI ES, MISSUS &CJL1LD1JKN SHOES I ( ) , .1. Daniel \ J. Hkl.lmoiT John who (from II. P. Wottrou. . CourtThe - 0. In ... Long county escaped a height! twenty-dye& feet, with a number Jlek"l It and Manning New Jerjey.- tlicn niarcliod Info the : " collusion Day jail a short time since through the supposed laulca."f h'rllCIII 111111 NfcVK of short branches, loaded with buds. These of the has been captured,! In I.au- The Illr.then ekrtcll. .'Ihlllor.: I'rrol- DcllliH, r:"IR' t'on\'nlllllllII,1( \lldeHt I'lilhUsiuim WllL1 I \ : AIM.: ori-KuiM.( vin I: I: LOW> V-H I 1'1'1."I i 'ONiiHtnc 11.\ii:I: I-'II1: I and said to jailor, fcilo i buds will bloom In a short time are hl'r.l'Iller. of lor ul Urll 1'r \ ,' Lhol.llr.nl ) tprill di'til! C'ol John ( remain In flower for from'11'0 to three months. reni county Georgia, and lodged In Jail In await W''lcol. telUral SUlril'I.1c"1 ('III"'IIIII.llllily eudnrwd limo '0111 ,11. 1.:1.: . tie requisition of tlie Governor of lull Stale.Thn and Knirineer: Alim. R. Piiy, th< joint ctnlitro and joined hiindn' wIth' the It Is well worth a ,14il to the place even now to "I ire the plant. Anft'nrf days that another nample of the aud J. J. DIIIe.Treasurer The 1'nhn Mith.it n"I'lrt,Illhri'.lIpIM.rl.IIlwlh| 111..\lrl. Ni I\) !I. TiE I : TIMK TOP the amp meeting it to Improve ( 'olmit.' tov. \a.11"1,1 IM.I'nl Our JSttOOlS. -,--- civility which New Yorkers receive In Jacksonville a ho ilesh-eJ lo meet oJ CATtRI'ILLAII.-WC were treated last weekto wan seen In the knocking inwiisihlo of a time truck by relaying! It a1118111\111 IL lImo Clmiiman" of the IIK'rl1'plhlh'lll 1,1 ('IIVCI' N the disagreeable sight of score-or so of genuine man named DePuy by couple ofrufllans the with Iron, whIch work in I to lx COOI'elrl'dlh.- tutu in the spirit in \ l.y I" ", 11.1 AJ:: cotton cattcrplllars, tho product of Tom other day.Vho saw It 1 f The nun who out any unncccssiiry ilul.iy. Locomotives suitable like Ilul. forget the things IhalllO iM-hiud - lie has Wi" to the road: me to be purchased >o tlmt by Hiili him in common cause. Art FENCES.Wli.ilei " Roberts' plantation. generally more or knocked Insensible certainly "couldn't! see it, thn Chairmen of the Coinentlonn iiiUanccil andclasped GROCERJEB & . lens of them every year but we are told that ho the connucncfinont of the full and winter travel another scene nf w'lid excitement I Here's the way the Key West Ouiinlian put tho rood will be In duo condition. 11111. .f UtNISIIK:*. i ill by no means alone this year as the pests have 11 cheering finutlcnlly for 01/1 l'\I'TI I! \ It' I I we arc not to support Mr. Grecley because en411I. mliiutei Thu the electoral AS USUAL IS :FULL1JnnlnirX IIIUSIIKrt, .l\. for tie ,, appeared on several farms lu the vicinity of Centre Uncle Tom, of I'oltiinbiu 1 till \'ffl N.I'I""lf . principles he once advocated, and! which county :)' ticket WM .referred to l'entrl( CnmmlUeea inch I It 4 J. .*. ., ..... vlllo.\ The wet weather has stimulated them, you who wish to keep dry iniisl hoist your |>,irunols and the Conventions have been forever settled, how tho devil can we adjourned and if it continues we may expect to hear of and keep out of leaky hound, for the dry ' and then a I L'htimhu ( XX \ X X follow Mr. Stephens who was a whig : , dcdoodles of them all over the county. Some once n Union man and aCerwanU( aIcClonlsl' weather has tukeu iw exit for Long Drani.li, and! I front Ohio.C'IEM.M 11'111 A NEW STOCK -..# of the farmers on Lake Jiickum report lice Inv demrt clouds in leaky conditions, are dally floating over, I >, Juno 2(1.( -Jinny Julegatu toTlauuaualmmy's (lirAIIIII..I., : Cnixlicil niul I 11'\1 Siiiir( , their cotton. all Jismoli!I hug all out-iloors which II will bo eOlvelllll. already II'f', arc alniontuuaninumi -UK , -' The supply of Ice In Pemsaoola gave out last likely to continue to. do, until tIme days and night : tr fLlcalon |tr tho Cincinnati I I I ( h TrH, (i lir-t a 1"lIlil i ty ,, DKATR or FRENCH lit MTORi'.MT.-M. Joseph 1111,1 (1'1 | telegraphed! to Mobile It in Photo ticket will Ice week and the Company Domilaloli blevCI Old! Hoi 1 make lit Saddles Bridles Harness balance thulr uccoiiDta Whips : , , I Monot died lust Wednesday at the plantation of hours afterwards' In. but eleclorl ticket postponed , Mr. Oco. O. Eagle, of congestion of the bruin for 1 car 101. Tandy that four it would be sent for appcaruncu on the other lido of tlio line, unlrw till nlV'r' the adjournment of time Ilaltlmora l'ol'null"h. ( lin ""I Siuij'i"' Kultrr { Critck.i'ii, Mill. \'Iil.! &o. cfeO. reply was Tho Liberal , liull favorablo \ Republican State I. ! I limo rainy prove more 'l'llml 23. He unlive of the of preocnt 8'all aged Will a Department fall dottnri a ton I The wholesale price at Pen- than its prcclcccpson, of the last decade. Committee are IIITO for, consultation, and manv' Smhi: I Cr.vkrr11: ( '1"111 ( 'rurkeiv, .liunlilriN..-tlir"f nrfliiiron ',.,./ -AI si- I here in France and came to this country in tho Is fl5 per ton. Tho Mail long for an opportunity prominent Lllwralu arc also) present. They will laola Daily slioHcm and cool nlghta on cotton, after a 4.tl.L' tmd Mil NlLlW.h'ATE'1' , latter part of 1871. He wan a well educated, no- I cmoeruiic Convention the . the Mo- urge Illho postponeof I I llainn I I I'lvnklV-t l I ' retaliate 1l ' to : I : iri'Kt . her, Industrious young man, and a member ofthr. billnm. ohorbilurooflhl drouth ol forty-lour dayi ol Intensely hot weather a State t ticket till after.the llalllmoro I Convpiilion. 11 ,11, l'i : I.E 1':0, Roman Catholic Faith His remains were In like throwing ooM water Into a hot |Pot.-| ll.ihIE4: l.1.t'FIIER.si.i . Wen t be In terrible condition.Hero's .- June 27 The Liberal Stale Key mu a The damngc water ill rutt Iron l1KnusI brought to town by Mr. Eagle and :Mr. F. F. 1'801'Ilible ; ClmIIU bad another meeting. Ono DUtrlcl : r.l: s-ill ': Simeon, and on Friday morning, after solemn of what the and tiuartlian other animals says: The annoyance tbo or steel and that or something ell is ruMting wits unrepresented. Leaning' PumoeraMexpniHed 83: Wu! will soil our Stock of Drcst Goods; at .In.1( rceelveit! annul! for ilf hvmoh I. mass by the Rvr. Father Hugon, they were conveyed goats roaming Columbia county cotton-unt bud ad jet, but time a denim lo uouccdo ihu bupreuiu, J'IIII : streets,is as nothing to the wmel carrion which symptom arc unfuvorable. or Sccictary ol Stale, but Ibo( ounnuuttuo dl'lledajlll.t 12 O. :1\. hLtI.1.EitATo . to the city cemetery, and after the final ceremonies of his church,committed to the grave. rests l Is like desecrated!a fog over with the city.the noisome Even the stench glo'Yllr.l of The Grant and Wils"l .1"lolslrllul! hud utJacksonville tluln.llonpl.any; ;,lrLillon of wero Ibo, Slato piosent' lickut'I'h.Orenle I. prices to suit the times. M Ittijiiittrat in 1'1/<<. juiiio dajssiucc, and of which great > hunt ( ol' llu cruu.l. ('ui. .1. M' -.- filthy slaughter'puns while the heavens are darkened things were- expected by tho Idulluil nmimijem, Toil,I was temporary chairman I llu said, they I. O. O. F. Lt-on No. hint Tuesday .. Whew I IIi had mel Inauguraln Mm Lodge, 5, on with blzzlll ridiculous, -! to-day tn a new 1'1'111 turned out ufior all to be a most J evening elected the following officers for 1 reported that. Harry E 11'1, fan inerly ure. 1"1 tlinn a hundred darkies asacmbkd after fI political Literal men history could of. mutual thu .Slate upon und If''lt'.I"llnl'r.couuiiy. All Cal Early! (itt't:"""' lfnrffain; Th'e Phantom Toilet Powder the ensuing term : of Ocala, Marlon county where was at onetime much drumming! at SI.J.II I'IJII, ,lIlt thu Inovitublo prufalion' nf, t the platform. - Clnclult ., 5.' N. 0.-Clmrlei C. PeurceV engaged in tolerable decent employment Knight us were lao piiticipul t I'- -s were mmulu, t Conxeiillon nljolr P t 18 i at uiint of the, Toll" ." 'IICO tlmt no I tiily wII.r.lllo . G. .Sec.-James E. Purdy.Rec. G. Damon.. but fell Into bad company and 1 got to swindling feILur.., IId chicll\okclll Ibel will fuw lookers, cd(to CI.KVP.IAM 2 o'clix k., June 27.--The Convention wan' I). C. \ IIOisill.. &/ Co. on "\i>nf recliitu.the (nrpn It w'Klni I 111!I ; "col''d.ly,0< "r'I"nl, i niLemeil brllllnmy - -Henry the colored people(Rr which several indictment omu dreary njHierhilyiiig mid HOIIIO dismal howlIng 2} ii'Ci'N k this afternoon. I Hon. I Hugh J. 1u.t.smit-tir, Jnnc'J'i, 1 H70ASSORTED mil. benuty It >..-. to U ha 'Oiiipli'x'mi.'' No P. 8.-Hugh A. 'orley. ..... ... cnl1'I'IL I laily' uliniilil, Dkl In try IU an. Mtuicai. latraimlorinlnir were found against latin by the Grand Jury) and (from the colored ,irim" < fc .a.1 mo en- ol ninniiins, nns :'eleetcil' poiiiuincnl II. ,1"cl I' Treai.-Samuel Qunllc. finally got elected Chief Clerk of th4.t lira ,Icnwn.lr'llon. At nl"h 1 torch-llht; procession rreHldenl. A 1 lolegrtm was rcnhcd ''roU than. C & :::,.. ,.,, ., ol benitly em-en unit' tit,huiTelhiaes.' A"slnuln> ;' .--trial iniuoo willprove lllmolH They will be regularly Installed! thin evening 1. ouot and killed In Nebraska, whither liemigrated was attempted, but the nuinliers.cre few DeiiuH'rniiu of Illinoin State Convention tutu I siiyliiff theDeiuiKTaty Its ffrait nuperlurllv ...In oilier fii"di'rniiu by the Grand LOlIge.Oeklockonee some time lint greet 1"I'H'rot'yof" klml. K.r milo ut Ilia Iliui Sloro, | year. Iho pine-knots\\OIJII'l burn 11,1110 rain wouldpour Instruct, her delegates tn o\ Lodge No. 12, of the same order, The Jacksonville CUIria thinks there U something down, and so the p..xes.111. speedily disappeared 11110.111,1 and striko hands with\'olf all l.llwiral I .April-:TO -----; l.l.ltii.l.- : .. selected the following officers! to nerve the ensuing rotten about the Post-ofllce In that city, as lu the murky air and tho congenial Itepublicans, A nply, WR sent rl'cprOIIIIj' .1111w 1 872. the and saying I II LEONAHD4 term on Friday night : Ila papers are constantly being cither utoleii, ,mislaid darkness, and that was Limo last of the find and! In otto grueling lImo largest Conventions ever held lu 2rll Xcwstadt. , N. G.-Bcrthold 1 or .!destroyed. It threatens to resort t the likely to bo the only Grant demonstration In the Slate adopted a resolution aQlrmlug the Cincinnati V. 0.-ThoniM B. Archer. Courts If the PoHtmiirttor don't play honest lu fit- Florida.On platform, and n":<|Uc'tmg thn 1'h'gal"llo Rec. 8cc.-Felix E.: Blmcon.Trcas. Ilaltimoio: to volo for Greelcy and, Drown, Tho .flcrmou F. Damon. fure. COle, Cheney, don't carry your political Saturday Ilt1 Attorney General Kmmous, following nominations were made: For Secretary .5. TAILOR and DRAPER opposition so fll.W.I. on behalf of of time Internal Improvement of SlaUien.. Aiiilla Wiley of , | ; Judge .. These will\ be Installed! at the next regular filed 1 bill J. tho a new against , hint. hoIsted the Grant ling' of 1'11"\ Supremo Court J. 8. Grnnn ; at t meeting of the Lodge. Dockray 11'01 1'. & M, ami Florida CVntrall Itailrondft, and to "''llllorll10., / A ? dcIIIII', I I hlg. -,--- campaign over his office In Jacksonville Tho Judge! appointed, J. Grceloy Receiver and M. DoughertyIn I i SO'JtTv.-A of tlio Mr. the Central Hoa makes Chilol \ _' ) respectfully announce lo the . MEDICAL majority practi Courier having questioned Dockray on certain to This time tutu appointment STOCK OF "I 1111.I -.5.- Y his urrlvil of slog Physicians of Leon county held a meeting subjects, ho replies through the Union, for of a Ilccclvcr as follows: J. C. Receiver ol the J. 1'. Irka.uis.. Orcelcy appointed 111'101' in this city on Wednesday last, and organlrcd a public Information that ho was never engaged! " 'County Medical Society by the election of Jns. directly or Indirectly in the slave trade! and that &(11. li.Railroad 1'apy ,appointed by Judge Oil -ith of the Circuit.J., 1 I'. \Vn find time follotting latter lu the Ntmm'a'mui it.I . : H. Randolph! as President and M. H Nash, !Secretary ; ho In opposed to the amalgamation id l the ritces. M. HIiroad. by Judge Whll2 Clrcllit Aiiftf of Tuesday. It makes a startling ex|>ositloii Dry Goods & SUMMER I and Treasurer. After the appointment of We wonder t J. Florida of the slate of affairs In Arkansas undercut SPItNG Coutrl Railroad, bv Judge Wlicaton-4th pet bagger rule, mid details a moat committee and Constitution ' a to prepare report a Tho Pcnsacolii terprtm desires I fusion of all rCllrlablo'riellf .: and By-Laws to tho next meeting the Society parties In Kscambta county In the election of J. M. linker, appointed River of the J.. P. arrangement" for keeping Ihel tidven- ., adjourned to meet_ngaia on the 10th of July, State Senator and members of thin Amenably this &.M. Railroad, by Judge 3J Circuit.: till' rs 'in (KIWI'r lu that uuforluualo( Slate.I'ocAHONTAH N -- when Ills hoped! thai those physicians w ho have fall A commendable desire I friend Row. C. tlrceley, appointed Receiver of the Florida Randolph! Co., Ark., I (IOI very Juno fith ','. Central Railroad Whmoaton4thCircuit.Jiwkaonrdle 18? | by Judge I not joined n ill attend and 1 allow their namesto " I yet Icy, and H Is to be hoped that you may thin year Union, 23 be enrolled. succeed In sending over a good, honest representation Tho Union Is mistaken u to the hut appoint millea Groceries t The physicians of each county are earnestly to the Legislature. I ment. Our Information Is that Mr. Grceley was ILL late cull your attention 10 time hcctiutt 4Cimimsist requested to organize County Societies as early of Arkansas. Her laivs, slnco recousliuition as practicable, so that a Slate organization may Judging from (Ihe frequency with which than appointed! Receiver for .the wholo line of _road! make limo Governor thlIIO ho ap- 'log "hlr1 I ,' Lake City n.ral attributes qlolatool from the from Jacksonville to ChattahoocLccTin points and removes registrars! at 111 , be perfected and! a representation secured In Die \ I editorial columns of tho Tribune to Mr. Grccley -- -- .. In- i an sit any registration aside alter! having been JUST RECEIVED BYw. .;I1' next meeting of the Medical Association of the mini', he refuse to accept time result of thu .\ ,.. ell , we suppose that the editors are not aware ol the Peace * United Slates. 10"0. .blee. cl< < lion lu any county wheru the judges of election Great good can und 110 doubt will\ be accomplished fact that Mr. Orcoloy retired from the editorial A correnpondent of Iho I' control of that paper soon after his nomination Ilerelelrll shaking amiunt of the grand Is lit fit was trainlulciit.. His registrars , by bringing the physicians) of Iho State 11'0 re R. 1wii4arr. tcrrillc hulliilmlliK In tIme } at Cincinnati, and! has since had nothing whatever 01 great ala,.utaiabio to no tribunal' save himself tor wioiigUoiiih' : $ together, encouraging au interchange of opinion, lolleul huldlug. .. Tin-no registrars appoint' limo Judges and , do with and increasing their knowledge of the topography to its conduct.Mr. low harmony sweet melody can result cl-! iki election. Ho county liidg- Ami the limit liihrlcM tint world con boilt'which I , of the different sections of the Slate and the J. C. Miller, of Lake City, was fined! ft frol clanhtng itrpkei of in hundred anvl <.- mil they district afll'llll1 they ITea. mn' |iri',|>areil. .. to make up In nnler at tbt mom and costs last week the time braying of trmplB salvos of from Il.rt'gistnumri can act or not net nn suits (them .,. ' diseases! peculiar lo each. by Mayor of that ; 4 ? } ' I'WI w hole human voices shouting .1 i IH wholly tu .JJ for the hatLep. \ tliey may register _ " rlul H' -- using following threatening language to a like lain, concatenation of cymbals, torn ,. ui\ 1 a 14. / . Take Simmons' Liver Regulator regularly enjoy small colored boy 1 ho had been setting dogs on I loins, and every other diabolical contrivance ever 1 la- rejihleratdl( .-rcllou.! rcfl.lul whom they htSiS4h: HIM: l'ill4'Iit.: health yourself and! give gratification tliimu his hogs: "You Infernal little scamp; If youdont invented! to male a oOl I more than this lover p.i I It I I cili/el$ (eels a ha, /has the about you. I will wllh.I I of sweet cal comprhend How 'the gi.ti' >.'lit' privilege' of apwuling| direct lo thin Hupi.ii I.-, hogs stop beating my whip you mighty! sounds of the j : . ear > Court of time Stain which holiU I.' 1 two You will have cause to bll'll8lhe day you heard. lu an Inch of life' Tho treasury uiunt Imvo with wit- IIt'iOOflS.; - your blow_ well bo . realized however Limit In - stfong may si a i- i year at SI'ltf government, whero, his Illi.rUluu (guarul..d DVITV 11.31" i i.. nf Simmons' Liver Regulator.NTATI1 been very empty and somebody suflurluif. and the only 'onde is that all of Ule human i !0'' might be reached In twenty-ono yean! lull Hi, he.l workmen ,1I drums "II"yed; were entirely stove In eternal Mtei" ihu rolls are' taken the ui regls- registrars' Thu Key \Vu.l DiiMUh buys : "lile.allolIn. Icuniess Ibo result. Il. an privately and Ithout nolloe. strike Angola "'llllol (a tic is' Fhiinol: fur, NmjiurrV" <>nr,) ITEYH4.fr : .! watermelons aro the leading! : lt Now let tho Heathen Chlnro throw up the inmimo' ) )they choono ; and there l I. . daily! auctions. Thousands change hands everyday sK>ugo lu favor of tills Boston"I Jamboree and 1"1.' in 101''llhel' I or to make IhelufmhJ If Full Lino 1,1 1)oiiPula.hito I Jllark 't Aliwni| ((1/111'1 I / t I initial,) -- .- - forever hold . The Qiianiiiin IK out and out for hi pR on the racket" 'iiucatlon (Ihi"- wtu"l only mtiauhlanuuchtisn th"" II,, - tho former 12 Grecley.A : averaging and! the latter 2o Hut let Dr. ) : a, I t ,i',\s on ltd 'luce, Inleudi'd( to bit i.fllll' I ha"sly and Drawer l L IOU, (immnfurturud,I eta|>n>Nhly l fur (..iirpijii1' : "').) Greelcy club has been organized at Key cents. Also that the "Sponge ve&M-ls arc returning 1'hl wildcat joy scl.lo prevai, at a man i 11., Ihl: tIII1uM! still give U.h'vllt< / 1:11\ West. Into port with full cargoes. The season slowly the wClldl bows his to limo way waving and, au'ending lr"! u .V:,.r($ )llujlrly. Truly yount. New Stylo JJliick ami) Wliito llltl DIII''null'H.' : I h:ive eiireil the I.t Ir. ol &tlnd shouting midirnce. - Gov. Reed! addressed! the citizens ofOuilll'8YI b been unusually Quo for this business, which His J. H!UI. on lust Saturday. addH not a small Item t our commercial. proi<|>erA JOIIAh.N BTIAt1 -.. Snkli, I Hat utiil. 'riullilll 1 Kililxnm 1 (from | incl to 7 i inclirit' wi Ily." the w altz-klug. lie U to direct one of his most A romuiiiii" : nmrrlugo occurred ut Clevelaiul, .. r .' Chan. Varnum son of Adj. den. Varnum, has JncksonvUllan named Weston Invited beautiful productions: "On the blue ) (''itt''', lint weik, the jusartlia LI which had never; ) Dialling, Lace alit, 1'earl iJmtoni, Jllll'n'wk' (Jauntli'is,, p graduated at West Point, standing 13 In a class of recently When the clamor has subsIded ho takes up" ti 'I' tu' li other until/ au hour heforu time cvremoi An 01"0 wull-kuoHu Muri.'liiini'-Tulliirof"iW"'elm), 59 Miles Price and Joe Haddock lo a conference violin and time muslo begins. Wo all kuow look This novel alUIr I and Colored Milks Now who be foiinilnt | this )\ plate was luoutM' Ihe1 fanning Styli I JrcHH) elll itlwnjm my Hmrv |g-ucpatuaih|' ( at his house to arrange a mailer.- waltz, with lu lls iii.uiii. i by proprietor of a tashiuemihailmlisimnmmaum. IIIU"II Hon. 0. B.Hart I Is proposed u money coy Il'alurc 11'llng, sentimental 1 I lures his, 'n u mi'ruin 'll'lcud 'uuil IVjriin-r |I'"LI'IU. , Republican candidate During the negotiations the parties to quarreling strains, and a of mad tu M lioiu the W"III IpplNllur (It, and who p loous i tutu ('orNPtH, other arliclcH ton inr>n1iioii, _.' <' > "i for Governor. Nominations are still In aud the guests led the house, S pleasure. Hut noaucmmn conceive how It njundi ulvIIHr I ,h t" marry flIO workmen who 1\le Illnl'rOll110 r1haammi.rsul for put i I In"I, I lior', 'lj ,r- order 1IIII'ro with Strauss leading. Hu I is lull of uiiignutism, \\ 'n /matrimonially Inclined limit leo wait attention to hu.|ii I ''.,rit iiiiilinii.iuru! ii r : ceeded but a short distance when Weston fired full of vitality. Now ho stands! taco to tlio auili- I iik-; i In twenty niinulellhry wcro engaged, I Waldo! boasts having had fine ripe peacheson both barrels of a shot-tun at them slightly dice, drawing his how ovir the mIlan In u crisp' i -id,I t ,ithln one tl'lr, from limo tlnm iho woman -. . | " the first of June. We didn't have I peaches wounding Mr. Price la the thigh. lie was ax- nuiuner, amid In tlio same movement he lil'l} 'entered, the Mlnr., the twain were 1'1' --- IlhUII'lh'III'U"I. then, but we had! dewbcrriei. rented a charge of assault with Intent whirled aiound Ilal time with how extcndid -S- ,' ,, : : on murder , t like, a sword In orlle'IM. adds I'lnplmns by I\Inhigan' it short limit ago, as couplo who UoI I During the' last Ova months Mr. Crowell ot and! bound ., over I-I. swiiiKing his flddle up down his luau, b-in lauly divortiil flout at a railway sin- April. ( 1 Jacksonville! Las shipped to Boston one thousand Ocala has been thrown Into great consternation hand, aud at last t brings oUt breath by holding >\loii ,111 that woman tried to indium tutu man tnink (; ROCIIMIS.Fulton ; ; -- bow across and thus time Whilo nlwlwot I II" . four rcfusid hundred and ninety alligator nklus. keeping wstih- r.lil.I. oln.I'III. on account of tho re.ptlo by one of the townsmen lug him the waltz has slid Into a new measure, a and, he tho r/a'"r.' the 'I'i UUHIllL'I'CLOTIIXG Crooking the pregnant hinges of the Liull of a letter one of those Jew York and thcie he U again Jdllflic away \llerlyIr 'a'N and. the both went Iheii way 01 and lift plut- Maikct fleet, Slgfrolro.Sniokfil HIT!', . that thrift may follow farming.!" triumphantly) cheats who sells sawd'ost for queer. Banner loudly, or In short crU|> token 11,1, I BAZAAII\ exclnimi the / raid. Wonder that's. Jay r calls lustily for the de\cIIVe'I Shucks, man, I Jerked up /iHiint ol his bow admonishing thu ft ..6' .._ ___ i I'icklnd Trijio Itologna haiiKti o, Su/. 'ir-ciiri'd I H.IIIK: . T ell lrl. .then hunting hi. body In the fT,rm a ;-?TDr Pl re(>'-, Golden Medient plirovpry! A colored man named Jacob Lowe was recently scores of them wore received In this vicinity I ic-noii waltzing ; anil once omen roun.j. .<|hi l not ratio time tul\l. but I It will 'bnnellt and, liorinudu Onions, Lvrnoim, CrHrki-rx, Sllill'H.: . bound over to the Circuit Court by a Key yean ago, and so much has been lid and 1 written and twinging time almighty bow up whlULj' as the, ''luauthu livniu; tCr IIIOV'COlIhI, Throat f''cll West Justice for severely beating his son.Hardee country about was the thoroughly humbug that advised we thought of lu Ibo nature.whole sentiment"ma man,of 1 the Itli music 1lglsl reiiulres side hUkcri( He and I.mous handH an>l HrojK 'hial ,I.: I IC' iii t>>pial.ed I'hints' and XXX Flour' Hacol Sldon, and, Hlloul.lcrl, Ltin!, *o., l ., k('. Spring and Summer Goods. thinks the Capital of Florida should . tache clipped Ind a pleatuut German countcuance --- be at Jacksonville. Can't he I Hurry up and 1 build yon' railroad and then 10Uwon'l The ( . work up hit "con- greatest rapture 'nn vibibltcd at 1..IP.TIP)0 i Ctamr Invalid readir, If sout" --- ,- - cu' on" so as to remove the OapiWl down! he so far behInd.Thu the concluilon .I waltz, and [Poll' on Ilalof ''III vnoiigli /put yourseltoutmmtde of any ------_-_- .- --- --- - I forced lls ofilie mark buttes h1t'itKlhiSf I. )Just from New York with .1 applause '' colored of Lake rcx'iition| ) It enifd If guuisnloed tocoutaiu dlf. J thereAfter young men City hart organized D ,. time excitement would bunt. all bounds Hut.lo 'i.i'. ,ive Ilhlulall" you will inevitably lo p lirgd total a1 li-k'tleJ tock ul . swindling a colored man out ol I a debuting club. Th first aclec lion oft bore are the red.shlrtcd Urvmen phtslciaua If CIO liquid |\), (to to nc any prepa raise which: ho had to mortgage his little property subject was very happy one at follows :- anvib Wonderfully correct, with immense pow. 1111. destitute of itlmulallng l.rlllrll., In THE GEM PRESERVING JAR AND JELLY TUMBLERS I Ready-Made Clothing ! ,! "the Gypsies have taken their departure i I Which Is the mot ullaet, tine Lawyeror I II ad mighty rverbratoOI. IhuOIUSD worthy' of all the name of a tonic lie will tell you. (hOODS I Iou.I.lill Shun such I the Carpenter of the meetIng A>TIL CHOHlH no. nauseous catthixmolos. PLANTATION OFFERED AT : : lmCI (from Jacionhlie'There rrildol1 Urmim, limo uiubt wholcsomelnvlgurant I.OVS'r being a carpenter by trade declared that the I produced as two years ago,0/1110 no much greater lu the world, owes the with rnJF (' lat l.o. J'lolb. of I Colon fui'tlol. , and ball rapidity . Ia to be a grand plc-nlc at the volume as twenty voices whll ike.lu are .fellow what pushes the plane am Ui, moatwtUKniUisiiit. greater II the dborli-rsxl, sod Illulloo.I..ln"l. upper SuwanoM: Springs oa Thursday pest, 4th ." A 'ipertauoa would douLk than rand.ten Tho At sounds the repetition U was IndCfbLly ellc to the 1"'lUlh agent which L conveys 111.Lere llu' Order lu Ilif ..ul... Ml irs. I seemed - - Ito ( to ---fl- -- - Inat Th. whole of Lake and City surrounding lets in their rebate. tine columns and beat against the ot-Uinc l iu mcdieinal ingredients tu the seat of Lho complaint. - country b expected to participate. I Iprov'thel 8 111 while the people shook in the blast of aD waUl T kit agent U Unit spirit of the sugar cane 4e The Guardian of Key Want says thai lbs colored : Pm.The century plant taken Nona from Jacksonville melody.rendition of Not the less strong. but far 1111"8 the' the ties most of alcohoL nutrlUoiis The amid mudkinat agreesiuhu! iugrodicau of all line of varl-the r.To my ciixtoiiierii !le the [mblio generally I woulJ! nay lliut my Stotk Hill Gentemen's Furnishing Goods ! men of that !Band, though somewhat divided by.W. 8. Dodge tome time sloe had not "no Hitters, valuable as Ihuy are, would b comparatively '.ti'. Ac.. in sentiment at present, will no doubt vote blml at hut account Tho stem lied attain 'came the it TUK conclusion WITXKM In oy one oCI"LoTh' of food They'would ustlew hrmenl without and this d"lrbuLv,bl-u always coni.ar, favorably" with any Ito1 in the market tn VARIETY, qtTAMTV la Ile.1 varlely .mud In scary Ilyle l wUlib la sill for Brown. unanimously Grecley and k height of (Jit. wliu wo I j t.1 bO fur health, of the horrible compounds 0'O SELL CHEAP FOR CASH, c 1ln'ymDI t.enty.lv el ana The publication of the Owinttanwlll be continuo ', branches from t.elv&eighteen thJy and MiBEJJ MT you, TO THEE." [drags In 1 state of fermentation which humbug CUEPNE. Ai r clatiDg ftilly tbe ptuto of thin poopl I iliall always ail to d at Key' Wrst. tbt proprietor for reason< sat2kJ- four thon n April.', ""1-11 I I'HKIth1 \ .c' __ _, _ : < ):': < - -, r. - - - --- , l. : l t.1', I -_ ? a ...... . -- , 11 r ' . II ... "'-- -- . --- - -iii I---- '- _J _- 1..1' :: d L. rii---: :=r ( --1' f -- . -- -- = -- -= -' = ----- - ' -- : ::' Railroads Steamships &c Miscellaneous. City Advertisements.NOT . JACKSONVILLE ADVERTISEMENT. Miscellaneous ( I Miscellaneous. I .. __ V. .-' -:-_"::: '- ::='- =..- ...._- -. . WHOLESALE AND RETAIL MEROHANTS. .f A*. K I'.HOOlIf( ; J Ro. IIF FLOKIPA.jtrfnrmf' Jacksonville ?Pensacola! & Mobile MYERS & GORMANAre RECONSTRUCTED I IrpnE I' Rs R. R. , : CNnF.nMONEn I H not racily -' -. MALLOY, VAN OLEEF & CO RAIL ROAD CO. sos opening large and well assorted< of lCee-on."n.J. VoXSTJtlTltD lVnthr blrasclf,.but, i'loretc. I ho, R&A RADWAY'S READY RELIEF ' "ur"rTl'nr.n' A"I' IVronTPn' 0' < ItEM: Till MOUNT, , rsi., WATCHES nt shortest notice ARE YOU SUFFICIENTLY SUPPLIED WITH DRY GOODS ? Hats Caps Furs Straw GoudsUmbrellas s M.... "f Uf"tlbop In the Tclcirrapb- OIUcc.U. In from l)n.. to .I." rnlr 1'n.t' : N. Ill HIIU ''. O ANt AFTER IIC DAT. JI'NE 1.1.. I HT2, Fin.o ro'VVoJ.ry, kuii-ft:! IFtIJAMES Trains will run as follows NOT ONE HOUR & Parasols. -- - IVscngnr Train East\ (daily for Savannah : ANDFANCY After rending: I iv J [ J. YOKU[ mem need II" nnd ISO II rood nay, .%rw ork.r. with ant one tuff. , THE FIRM OFFURCIIGOTT and ..fsukflonvillp.LtaveChMuhoochre pal 11. It! AH'U .d) ilillef( |Ic (t a.0 n. 11141.\.01', 'J >*'i'-irr.f. i w V..HOTI TOI GOODS forest) f-.1111 H tile first and : 1 1.11P.M. BOOK-BINDER dee 19, 'TllyTHOS. Lca\e Onlniy'H', : ; ". Is the Only "Pain Renedy"IN 'fallahamet. K11 > off old and ShIvSr BENEDICT & C() Leave riONSISTIND "',,. .:"p'i'.tiliMIiEI' : ",... 1.t.nonU'.cllo.. .......... .. .. U.W \J Watches of English, Swiss, -AI'D-! .iiis instantly lnflamtoatlonsand stole the,most "Irllelllllnl: i .ill' .. Leave ) ., P.III": and American tuunuluciure. Blank Book Manufacturer mr"l"'III1r'II; ,is "h, cli.: H. DROOME, Arlve.18av.nnllb.. .... ... .. .. 10.00 A. M. I, IMndenme ctt" of Conl and lout Jewclrv for er or the Lungs, Stoin..h lIowel., nr nUwr stand, OFFER AT THEIR TRADE PALACE, BAY STREET, I U lit Savannah, 430P.M.LcavcUkeClty I. Ladles and Mls<*. -- or orjall', b1 Otis sp3Ilcstl'rn.IN \ \ . nrnr.txi .. 4MA.M. I' L.dles4id Chataloln and Opera Chalna.Uents ; KULEiTTOANT: PATTERN. JOCR- FROM ONE TO TWiST1l'U I Lnve Baldwin..:. ..... Sit? .' Gold Vest Chains. PAPER \; :$ A. M. BININGER & Books Books and No Cash CO. Ledger, Day matter how violent Great Inducements and Positive Bargains Arrive% Jacksonville.... too Gold Sleeyc Button and Studs, Intent Ktylc" Dockets made to order. Music BOOKS and Mag*. RUKfMATIU: Bed-rldden or Mcrnrlailor, loOrm. till Biln'' tho \f''OIIU.\ .nouuLI! IALrJlJ i Seal Kinjcs, Ladles lUngs( (with handsome Delta) Ser. .. .Piusonger Train West for Savanhali and Coin Rlnira. tinea bound In any style tons, Nenralglr, or prostrated with disuse, may style.PartlcnlarattentlonnlventorcpalrlngPhotonaph suffer --- ---- ies WMskies Ks Gins &e and Cbftttalioochcc. Oold I'lf'<'tocltll and Eye Cllan. . ran ( ; Oold Necklaces, Lockets, Charms, Collar Buttons n/ n'\"AW'" RE.tDW ; WI' |>ow minimal ftcilitieii' in the tmrclia-c of jpvK ntid run tlirroforc !cellcorwpontlingly Ltite J.f kionrlllc.. /All P. V.LcareBoldwlB f. Gold Thimbles, Vest Hooks, Bosom Pins, Office In Claw "riot-Minn" Hnlldlnir.Teb. nELUF: IS Hfmrrr Htrrtt, ::01. I'. 787 Bade| Pins Far Rings, Oold Pens and Pencils, .95, 186'. 30IEIIC.tI. WILL AFFORD INSTANT EASE low. ..I J BOLE PROpniF.TORS! IMPOUTERS OF BI.VI.V. l. aveLakeClty. V.ltQ Gents Bosom Pins, Belts of Genuine Shell Jewelry Inflammation. cube Kidneys, Arrive tevannta! ..... .... .. .... 10 .. I.ER'S OLD U' IOS DOCK GIN. and Bracelets Jet and Horn setta, l'urI8IcoT' Buttons : : : OTK'K.: Indamw.Uon of the B1.dd.. -- -- No, Z'I,'71 11-1, Leave ". 430 P. M. and Sltui. InflammatIon of the Bowe, leavc /SWA.( I. -0- .lIol1 LA.TE AR.R.XV ALa Leave Montieello.... .... .... ...... .. 74J Sore Throat, Difficult BrcaVh.. Orlllr Ll1nJf. I IntllPU rl'l1WA'I. AL! IL r.n'JaVOR.' leave Tallabaaaee... ... ...... ....... n.U >' Silver Ware.Table Drs. J, H. & A. L. RANDOLPH Palpitation of tiDe I'laidlaah Ribbon only r ic. i I Choice Maraelllr* only I !!9,25 i and :H.V. Leave '. ll.M the Heart, Splendid 4-4 Cambric Shirting only 1P,<, 1 ..ullftJll.h1ht; Summer 811k only We.i JOSEPH FINEGAN & CO, Arrive at Chattahoocher. .. .. 13.87 and Dessert Forki and A HE ASSOCIATED! IN TilE PRACTICE OF hysterIcs, Croup, Diphtheria' , Loadsdale 4 4 Bleached Shlrtinf only II"*. Fine Cheeked Summer Silk only A..... Spoons, Medicine. *'*"*' Iufluc", i . Holland Colored Lawns only ISe. Flowered Grenadines only lOc. COTTON FACTORS Trnin to St. Marks, (Tltf'litl/lJ'II./ Thnrs- Tea Spoonii, Butter Knives, Napkin Rings( r.frOrrlu In the Monroe House. He.lacueTootnacue; , Fine 4 4 Fircslr oily 18 and BOo-brtl. Bilk Striped Grenadines, only% tff.Coal's Cups,Salt and Milliard Spoon' Cake Knives, Cl Neuralgia, Rbellll1'U.1II. nnulne Plait Trench Lawns only anr. Bi..t Cotton fonr 11>001. fur'J.V. -AID- days! and Satnnln.vs./ ) Pie Knives, Pickle Knives and Forki, July Cold Cbll.. .Agusdtllla.; Si.lndld 4 4 Grass Linen only 28c.ralr Finest Summer Kids ont II.M. and tl.oO. Leave Tallabarscr . .. .. . .... \I toO A. Al. Cream Udlcs, Jelly end Sugar Spoons, Ai:, The application of the READY RELIEF to iL Quality Iron Grenadine only Si.... Mos<|iilln Ncti, U bile 'A:\.,; Blue 1.>r, Pink tl.4WI) COMMISSION MERCHANTS Arrive at St. ,. 11.20 Dr. John S. Bond part or parts where the pain or diOlculty niSI will Rral Fine lUk.lron Grenadine, only ILOO. 4-4 Banddy (*hlrtinif only 101 ,-. Leave 8t. .. ISO P. M. Silver Plated Ware. afford ease and comfort. Mn down Llnea Towels only Ll2. 1 Brown and F.nrI.lnrn only Cfl, *> And :>... hay ftlrref, Nnranssnli, tin, Arrlvr at Talhniuwrf . .. .. .... .. 3.50 contlnne the practice of Medicine In Tal. Twenty drop in half tumbler of waterwill In ino Fine Damask Towels! only! M' 00. Latent siIf! of Laer ('oIInr. only 1O.Chambrs"y Juno 11 F. It. Receiver. WILL I a fow moments cure CRAMPS, SPASMS!!, SOUR ---0----- BAPr his I and rlclnltr. onici- "' Turkey Krd 84 Table Damask .. Tallin and Donocrt Spoons, residence only 'l.V. > A nreJ| Collar; only Ilk STOMACH HEARTBURN SICK IIBAftACIlF I),ma.k IHlIGly(0.: I Searsnekcr Plrlpca, from Iflc. LIBERAL: ADVANCES MADE ON PP.ODUCK: -- -- ---- Forks and Tea Spoons, in rear of the old Post Olficc.NOT. DIARRHOEA DYBENTERy: WIND W up.tVOrlcn to us or to nnr correspondent In Atlantic and Gulf Rail Road. Salt and Mustard Spoons, 111, lG: #). 18 THE BOWELS: and all INTERNAL PAINS; . : win receive New York or Liverpool Butler Knives, Castors, --- -- prompt attention fionds nrrrtlinit Ten lolhr* Kill)> forwinlril frfr Travelers should always carry: bottle of Undo Samples "'nt. C.UaI* lh popular TRADE: PAI.ACP -ALSO- -- Waltera Cake Baskets DAvID S. VAI.KEB. noi.l.iNO< nAlir.1I. way'* Heady nellrf with them. A few Airrnlo for HIP Celelinted: Brown Cotton, Gin' Butter Dishes,Cur8. IUI8.h WALKER & BAKER drops' In water will prevent sickness or pains' from FURCHGOTT BENEDICT & CO. lirdcm. for the. above (tin 11'11rerrl\ ,prompt nltentlnn. CHANGE OF SCHEDULE. chanao of water. It Is better than French Brandy Hcpt' I'J 6-fimJAVE4 ,\'.ATTOIOI'.IM: : "" COI': !HRI.I.OIINAT "" or Hitters on "olllllulonl.FEVER . Junrll) Rrld. : ew Hrlrk ...oe-". nn.r "Htrrfl" ..""....on'Illf'. fin j6i... ;:.c Table and Pocket Cutlery. .. %"', ( AND AGUE.FEVER ; . ' "11<. n. 010. 'II'. WOTT. f.F.SF.RAL stTIRINTE:<1DENT'S OFFICE, \lu1' on baud tt well assorted TALLAHASSEE FLORIDA. ATLANTIC A GULF B B. VSATANlUn AND< AGUE: cured for fifty cents. ThenIs - COMPANY Mock of Pocket --.- genuine English , "1 KIRKSEY & SCOTTr JUUOIJ,1S7A ) tullcry' ( Woetcoholn'1'and TILL practice In the Seth rol and Supreme! not a remedial agent; In this world that will cure W Conns and, In all other Courts In Uku rulrf.IAted Fever and I ; Agne, and all other Malarious, BilIous / \N and ,... ; Passenger .: their servIces be required. [Sov 2", 71-1, CITY ADVERTISEMENTS. Kfttrj'f Block, Bar .t savannah, 0.. \Jt>n this road 11'11rUII.I\ follows --- may SrarlrlbTlphOld. Yellow, and other Fevers (aIded AL80Talileaud -- -- --- - - FILLS) so quick es RADWAY'D FACTORS EXPRESS PASSENGER. Dcs.crt Knl'vcn,(with nnil wIthout forks, A I. TEBLIB. OEO. P. HA! ET.IMII.IR READY RELIEF. Fifty cents per bottle. ==-==- ) .. ... .. .... . .. ---- Leavefevannah... .. .. .1>::1111 nt.. i.lWP. M. Scissors and Shears.Musical. AND GENERAL COMMISSION Arrive "_np.... .. . 7.40 : : A., n.r.: . FR SHSARIENt Arrive UBalnbridge.Arrive .. .. .. 7.15 A. M. Attorney nt l.nw, -AKD- at Albany.... ... ... .. 905 Instruments. TALLAHASSEE FLA. HEALTHMJEAUTYllStrong r I ! Arrive at Live Oak.. .. ... .. .. .. 8.50 .. SHIPPING MERCHANTS. Leave Live Oak......... .. II ... 11.80P.M. Ouilnri, Violins, Banjos Tnmbourlnca PROMPT ATTENTION GIVEN TO BUSINESS: and Pure Rich Blood-Increase nf Flesh a't, f 0WE 1.cave Albany... .... .. .. 0'' .... C..SO '. Flutes, Flfca, Flageolets Music Supreme and Circuit; Courts of Ibo State Weight-Clear Skin and Beautiful Complexion respectfully solicit consignments of Cotton Leave Balnbrldge.... ... .. .. .. OM Hoioa. Violin Bows, Pcgi, '. and< In the U. 8. Circuit and District Courts; for the secured to all. and Produce either for Immediate or future r.eA\'eJu.OI1p...... ... . .s .. .. 0 SO A. M. Bridges Rosin, &c. Nortlcrn District of Florida.Kjr . tale-nuking liberal cull advances so tbe eame. Arrive Savannah..... .... .. 10.00 A largo assortment of very Sac Guitar and v In Ofllce on first floor State Batik. SEEDl .:Returns promptly made. w* VC.. 'f ..i-, *,. Connect Live Oak with trains on the Jacksonville Strings. March 14, 1871 !'i-tf) Dr. RADWAY'SSARSAPARILUAN : ----- --- --- --- - Birtaa TO-The Merchant National) &&k., The I I'cnstcola & Mobile Railroad for Jacksonvilleand Savannah!! Bank and Trust Company. Tallaliaasee.;: Guns and Pistols.Laminated HAMI: "ii. J. OIGLAM; INSOLVENT ! Anll/ll: .4-8m No change of con between Savannah and AIII.n,. Attorney at Lnw. '- .---- --- - Close connection at Albany with train on Month Steel and Stnbh TIlL PRACTICE IN TilE CIRCVIT: AND SIT- Has made the most astonishing cares; so quick so ----- extern Railroad. WILL Court of the State and In the Federal rapid ore the changes; the body undergoes THEtgIUITABtE Bleeping car on this train. GUNS Conrt. Office In the Marino Bank Building. under the Influence of this truly Passengers for Brunswick take this ',aln. Pistol .>f every variety, Cnrtrlik'e/ *, TAIXABAMIZ, Nov.:S4, ''tw.: 103Vt. wonderful Medicine,thu 'VVarrantec.1: : Qi'cwt1.' or 1O7 MACON PASSENGER. flame Sage, English and Aiucrlcanl I'terjr: nay an lairrraM !. Srl..h a.d Powder Klaska ,. r ( ( / \ Leave Savannah (Snndays exeepteil)..., 4 (10 A. M. Wad, Olin Tnbea and, Wrenches Pouelics, Kley'e Flask and CapJ.Ouo l'nuchSprings : : S. ELB.XN "Weight Meets amd .'el&. Arrive nt Jesup' (Sundays excepted).. .. 7IX: Ram Rod Heads and Screws, Gun Ilaranirrs THE GREAT BLOOD PURIFIER.Every .-... Arrive at Macon (Sundays excepted).... /5.90: P. M. Coromandcl Rods and all kinds of Una ma.Serial. AUCTIONEER, . Leave Macon (Sundays excepted).... .. 8.M: A. M. . IN LIFEASSURANCE I Leave Jesnp (Sundays ....... tl.OO P. 11. Tallahassee Florida drop of the 8ARSAPARILLIAN! RESOL excepted) ACCORDANCE WITH MT USUAL Cr8TOMAT THIS SEASON OF THE TEAR, HAVE THE VENT communicates through; the Blood Sweat, " Arrive& BaTaonah! 11.80 pleasure ofoflcrlng to mj friends! rIa.toman.1Id the public rrnerally, n supplv of GARDEN SEED for (Sundays excepted: ) OFFERS his services to the pnblle. floods con Urine and other fluids and Juices of the system Ibo Pall Planting, comprising Connect Macon with trains on Macon and We.tcrn ,FANCY GOODS to him will\ be sold to the best ndvantngo vigor of life, for It repairs lbs wastes of the body part SOCIETY and South Western Railroads. ] and prompt set&lotnentsmatlo. Jan 3U-tf with new und sound material Scrofula, Syphilis, ___ _ Consumption' Glandular disease" Ulcers: In the 50 lbs. American Rnta Baga Turnip Seed Iy Freight Accommodation will leave Savannah Work Boxes, Work Baekcts Bridal and Party Faui, "CHARLES throat Mouth. Tumors, Nodes In the Glands and 20 lbs. Red OF TilE Mondays Wednesdays and Fridays at 7.85 A. M.; Fine Russia Leather Porte-Monaics, Meer. P. COOPER, other parts of Ibo system, Sore Eyes, Strumorous p Top Strap Leaf.U arrive same days at (0.40 P. M. schanm PIpes.Bobemlan Toilet Setts discharges from the Ears.snd:: the worst forms of U II. B. IIAINE8. and Vases Walking;C.ool.lll1r ATTORNEY AT LAW Skin diseases, Eruptions, Fever Sores, Scald Head, 40 Ibs. Large White Norfolk UNITED STATES. Juno 3.1 General Superintendent., Brushes, Tooth Brushes OFFICE IN LEDWITU'S BLOCK, Ring Worm, Salt Khcum, Erysipelas, Acne Black .. Dressing; Combs Mirrors iu Ibo Flesh, Tumors,Cancers In the 25. Ibs. Large Hat Dutch Karora,Strops, BAY STREET JACKSONVILLE; FLORIDA. 8Pol.LWorlD., weakcnln: aDd painful discharges, >- FLORDA RAIL ROAD. I &c., Ito., otc. p Night Sweats, Loss of Sperm and all wastes of the Larg Late Drumhead Cabbage life principle are within the curative range of this WM. ALEXANDER ... ..... ... .PHMIDINT.IIEXKY .. 'u' ....-.. ....._....... .. AI.NO! NOI.F., .U..aTIiIlu :: WILL,practice{Circuit In Ibo the Circuit Slate Courts Supremo of tho Court 4tu wonder of Modem Chemistry, and s few days' use Large Late Flat Dutch .. of these Cabbage < --- will to aiiv using It for cither : II. IIYDE..Vlr. Pn 8ii>rnT.JEN. I IG and Ibo U. 8. District end Circuit Courts for) the prove person thIs city for the sale of tho CELEBRATED Northern District of i'lorliln.October forms of disease Its potent power to cure them. Long.Blood Beet, CHANGE OF SCHEDULE. 8c ArJ'B.C'.IK SPECTACI.KS and En GLASSIS.WalchOM 4, 1STO. 9 Not only doc* tl.c biR..ipABiUjm RBSOLTIXT excel all known remedial agents; In the cure ol I: Long Orange Carrot, &o., &c., &c. -DOn nnd Jewelry carefully repairedand -- -- Chronic Scrofulous, Constitutional and Skin dl.. ( .1. J. DICKIBON A; GEO. R FOSTER Egg., warranted.t3y wTa M. DAVIS eases, but It Is the only positive care for The leaion fur their towing l In now nearly at band, and at I sonic eaooDl run abort of nine varieties, noru or Jicmosviiaj! FLA., and utter Monday July 3, 1671, We still maintain the reputation of keeping Kidney and IlladderComplnl.t., I would odrUie partite to lay In their supply 1 onr Have been appointed General Apents for the State' rr X RAIX8 as follows WILL RUN DAILYellnd..1. excepted, FIKST-CLA! GOODS. Every article we suit I. ATTORNEY AT LAW, t'rlnaryand Womb diseases.Gravel, Diabetes. Drop of Florida, and will cqnducl tbe business under Ibo WARRANTED as represented. Stoppage' of Water Incontinence"' of Urine Alburnlnuriu )- M. LIVELY Druggist. firm union and style of UICKIIIOH & Ftnrin. Their GOING NOI'Tllt flT The above goods we offer AS LOW It mica JACKSONVILLE FLA. Brlght's!( Disease, cud In all cases wb'TC ofllce will be In Jacksonville where they will be Leave Fern 10.00 A. M. as the same article In quality can be sold by WILL attend the V. S. Courts, State! Supreme there are brick-dust dcponlla. Price, one dollar glad" to hear from good and efficient any and sucb of lliu Slate Circuit Courtsas per bottle. ---- -- -- '- .- -- Ijien desiring; Arrive 1I.ld. '''. 110 p. N. other bouse In this section. to act asmil or Nvefcfl, A'jmli, In any part of the Leave 1.30 .. he may be specially' retained for. Also will\ argue Dr. RADWAY'S Htate.It Leave Grilneavllln. KOA ** pyThankful for past favors, we respectfully canes In the U. 8. Supreme Court If required. Is our di" lre and our hope lo curry! (lIu benefit! Arrive Cedar Ke)s. S.40 ..._nI /.bo&U15.MEl&S Oct 10, '71 10-If.tllorney PERFECT PURGATIVE PILLSPerfc..U NEW GOODS NEW of Lift. Insurance Into liouso. --- -- - GOODS every A (WOH.HA : OEO. !!.' ntTRnah"OIee. Fin: GOI.G" on"'II.Lr"I'U s TAI.LAUASDBI Oct 31, '71 13-ly AIAEZl; I ; ,,..........,... tasteless elegantly\ coated with .111'.111110, Cedar . M. II. YIcY1tIIA: : 8.45A.M. A 4'oiiiixfllor ui Law, purge "" -''Iu.nc. puriry, oit-misn. and strengthen./ Leave 1.0 I'. M. JUd way's Pills for tie cure of all disorders of the owl 13 : }-4t Noulhcrn laDa"4'r Arrive 5.00 >' MO.NT1CELLO: FLORIDA. Stomach, Liver Bowcla, Kidneys Bladder Nervous NOW ARRIVING AT >,":.- -- Leave .. 11.20 NOW ONEXHIBIT-ION I ftf Practlc' In all the Courts efthc State Diseases Headache Constipation, Costiveness In ilL , ** .-f Arrive al Fernandlna . .. ... H.S5 .' feb 21, IMP) digestion Dyspepsia, Biliousness, Bllous Fever Inflauitnution . IDMOT ANn "RLlXGTOX I J. )r. HOOP, Ocn'l Snp't. __h___ __ __._ or the Bowels, Piles, and all Derangements Furuundina, 4 '71 48 tf of the Internal Vlaccra. warranted lo shod July - T. H. RANDOLPH'S.DOLLY LIFE INSURANCE COMPANY .. HAWKINS & oa a positive cure. Purely Vegetable II --- ------ AND FOR SALE AT THE !\ containing nomercury ONLYTlRECT minerals, or deleterious drugs. OF VIUOINIA.V. I LINE TO FLORIDAI 1 A few doses of KADWAY'S PILLS will\ free the COTTON FACTORS system from all the above named disorders. Price., I STI\I\'t.U. MODERN JEWELRY STORE !II II Ij 25 cents Icr, box. SOLD BY DKUGGISTS. VARDEN PRINTB! newstjiei.. \ I'LA1ASU\ PLAIN OHNABL'Klifi, \ l. C'AHRINOTON. .. President. Florida and Gulf [Line -AND- READ "FALSE AND TKUK." Send one letter 104 Sureting. Blou'hed and Brown, Ciiltouuili'i, P. ('. Cotton, Llnrn Toft els, JNO. t:. IWW AI/S... . . .Vice President. Steamship stamp to RADWAY CO., No. 32 Warrren Street I II. J. 1IAUT8UUK....t.....8errelor,. General Commission Merchants Now York. Information worth thousands will be Ulrachrd. ) and Itrown Shirting, all grades.Denim's Clothing, Shoes Straw Uaii new, st)l., J.J..; WrKJ 8..f.1..i.; ,. .Ass'tBeeretay.. sent to you. f July 11,71 4tf-ly IIIrkorl.Ilrlrra Ticking, ( cut's FiirnlhliliiKutHi, \ \ ninplrtn' oii'tfltv; .. >o. 13 West Lombard $.., A88ETH! and InvOHtments over.... .'''.lIc fJOOONo. CARRIAGE AND WAGON MAKING ALSO A CHOICE STOCK OF FAMILY GROCERIES; J.08SCS of Policies by dola Issued r.141n hid same yean period.15HXJ! .$7....eo.t .rf Ut\JI'Ulon.i '1"0 AND REPAIRING! 'i " ,I" : ...\ Jtllrrv.U-.u.l. tANII, 4iI( PAINTING and TRIMMING lW':: ,,\il ( I".I. .",111 nt /"., ';"/ PfirtK for Ciu-li& "r ( 'iniiitrr. I'rodnco.! NO.onueceeaary roalriLllons' on rcsldem, Uuit occupiitton. FOR ALL WILL make liberal CASU ADVANrns on consign Blacksmithing & Horse-shoeing ! POINTS IN FLORIDA ! No extra rile on feniult HVI-H, and .1'1'rla11.rClIt'e- "either In Store or upon Bills of!Lading; :- r" H..I. rlulI.kul',. C.Ui. E) ) HAMS ut Iti: (PIIt lion, l ti tiinrrli'd women mil' (hlldrcn iinilVr, I the CONNECTING: WITH THE t-W"Special attention given to the rurchaalng of All done In first-class style atBerry's ,. 1'J"' chart supplies.' [April 3ft-a.u. .I.. ,.. This tnm"onll.llIr. every description i>f policies. Florid II. II.. Stir J. P. A. !tt. II. II., mirt I Shop. - known to Life Insurance, upon imiiunl, or NUN< par- klvanim uu (lie SI. John NiCer, " / lli'lpaiinKpUns! CUll HVHTICW.Unlliinry Fur ",'rnnndl"", l.ilncsvlllo, Cedar! Kcjs TKIIIJMHiy ', j - _: : 'V'E\II: annual po'nlenll-an'l Lifo Policies' eiiilownineni NON-roHrEiTiiii.ie pollclw after after IKO Putt, Jacksonvlllr, Montlcello, Tilliliii.fee ,< I I : n. :R' WOULD ,, \ our payment. : juliicy, 1'ciibuiul.i, A'ihftilciilii |'" iJ Inform my rc.r.nIlYX. C onlj Company .......orl.p.l lo dollii.lnri. the! Chultulioocliuv! ..( OOOB l IIc1ICl1l1i1., that I have Blacksmith Shop in .0nUIJe' .* In TlorldntAUKNTS nod flint Iliv're.14teaiurra .(BREEt lion wllu my Carriage and Wagon Shop, and feel DRUGGISTAND iI : FOIL, FLOHIDAJVaDKnTftHnr. confident that they can bo accommodated at my T. M. PAf.MFK. ASHLAND und MtUt'tDIT.1'al'I'A Shop uow by having their work done on the 7WI,, IWH-H. A. tllIIS t:. New York and fern* ,dlu every Saturday. SHOrGUNcp Nborlffot :.Kotlre and t'hf'ftl..r limn OMlNey-W. It MALONK.: Order) Goods shipped via Fernandlna from Pier itt/ \ EIaehere: I N. It. New York. J.nlt fondy.KV-Uen.IHml Mulixm.1. 1. FISLRT.<\>.-Ot F.BFMIt+ Through, ; Bills Lading and Low &1.... Insurance ) I havu good stock of Iron and Steel on hand mil : I i J c .'i.. Aagiiatli.rlAlli' ) Dl'NIIAM.llatnni'UIr I. hub 5 ai jIB. Wall Street, Now York. ; : Shops' ready toMTDESPATCII --- . ---- -- - JICUI1! MAJ W, I II. M MILTON I Agent I |I''ni \Vi-i, i Kloiiil.i,, it New York and Charleston New WORK PROMPTLY. York Office M.irlnnnu.Special 27 BEEZMAN ST. I also have a Lirue, lot of good icady-uiade Floss ".1' APOTHECARY : : AKCIII.; I I. OAKI.KY.llrnnrh Jim 1)), '73-1)SODA- all kinds, Holts Rods, Clevises: ,t,.., which 1 nlil .: 'ii. OIU,> lor Florida emil "' 0. 'sili.luiI.: : i.i-\i: sill cheap! ... 'J" ........: li4' t..... 133: 1-4 lIce) HI.. ...ousnn.1.. Thanking,, my cu.tomcrs (for thud very liberal 1 |1.1I'OIIl'U : CiiiMTlnlrndi'iil' ,' ol'Accncli-s, K. \\' l.'KNdl.K.::< : OF' FIRST II.ASM! \t.i.. t.\)). \ iu the |mst, I very "'.l'eellulllIOUdl a runtliitiuiiceof I HKNItY ELLllir: \ I icniTal AKi'lit. (IJ.II\I-If\ I iho "Mime. AT THE OLD ESTABLISHED DRUG STAND 'c. SIDE-WHEEL STEAMSHIPS WATER II. II. lliillll: .Ir. Insure in the Strongest Company Taliiiltacscc" April I''. l'J-ly Monroe street, Tallahassee, Florida, Hailing\ from each Purt every Alnuysou baud with : ti IPItl1EIt: I LIVERPOOL mm & GLOBE[ T Tuesday, Thursday and Saturday, Delightful Fruit Syrups THE DEXTER Drugs. Medicines Paints Oils, Varnishes Painters Brushes, INSURANCE COMPANY. AT THE I DRUG: STOKE LIVERY' STABLES and Brushes of all descriptions. .. : i1- i'/iYJtTocnrf.ox: OFM. LIVELY. ---- <\ . --- -- Aro now fully equipped and< furnished with I l'r ii|>I iii'tirv/! (?oooX Fanrjniul Toill.trl l l.I le., :SJ: '&lIIge., I I'uro Cliomicnlii/ :tiiul i Cash Assets of the Company, ,t.oiict'aied Wood) "'" over $21,000,000, Gold. ill a HORSES, k CHOICE PERFUMERY. Assets in tho U. S. in the hands of American For saddle or b.rue..ollll and two-horse haggle. Manhattan, South Carolina, ICE PITCHER and two-horse carriages Pastcugcn taken to any AUo [jrq.nrwii. HOXCKNTUATED): } KSSKXCK: ,.I.I1tTIL1 Directors $3,300,000, Gold. Champion Charleston i iqrn part of the surroandm cfmutry on short nolle ,'Ik'R/u11411 1'1 alto }jvrtonaUu Italic for s'C ", The proprietor still continues to flU all orders for A1\LIAXOA: G-XNGEEt.: fI/lIII'l"V'' V1(1 (* of fit Company, Georgia, Jas. Adger. LUMBER, ::SHiNGLES POSTS Ac., die. --..- from bis yard near the ilables.RT . PI.ICIIUKiLI the propf rllc-a Juuialea (iiuurr In a concaulrutrd form which I Is hlghl: !ri'cniniui'iideil, for ,' Through: TlrUvli lo .lew Vrk TEISYIM: C'''' H II. the cure of lsp.piila' N'crvnus, and llj'iiiichnnilrlitciil' Atrvctliins, Headache, : and (CIIdlInt'lIlorrbn'.lh'"- J Ol\l\ElI bv ( IIICAGOFIRE; LITTLE\ I'SDF.K Office ncl !Stable! two soutb.eesifruits . rral llfbllltl, I'ollc. Nausra. \ePUES01UPTIONS j .M.aoo.uoo. May be obtained of the Agents, of the Florida Steam squares Tha l HirDl'IO" In Now York are PQ'luel.d11 tho IV-kiit: Compel y at JACKSONVILLE, Feruandlna, ..bore engraving llluiitmcs Intcutlua the Capitol' T'llabax'ce, FUC1IAS. , a new Home HourJ to draw on London fur luo "bole loin, St. Augustine, iVlatkaand Enterprise: > ; also ol Ibo TilE: in Ecu pircniH maunAictnrcd under Let. F. AVKBY. I I and not disturb tho Pursen of the Florida Steamers. tt"THE Amelrllllul'.IIII.III. ters Piiicnt. Tho Interior being of wood, hermeti! April), 71 a -Iy All louses will be I.hlill Chicago! at .lht|; and |1"-> All Inforniailnn as to the Sailing hours ol cally > al!.4 by a covering\ of white metal., forma a ___ _n' ... --- without discount. Ib,'..Steamers will ho furnished CHEAl"BLOOD: PlIRlrIER. the undersigned prepared: ullh "accuracy, fidelity and Uln|>uli'U, fur whirl '.t a full nud by ; sollil-<.ilrj! pltcber: the wood glvea. It strength and piirpi nnnpli'ti' niiMjrliiii'iil of This Company! lies nutucribrd TIN Tuofsmu (>IMHAL AUIMT for the Slate or Florida, who wIll\ durability. \, and troduce* the most 1'10'powerful iOYlllOl'llua Magazines &c. a uericcl non-cou- Stationery POLLAHII to Ibo Chicago Kcllcf Fund. Issue \IkOIIucliru sum rooms In advance and dnctor , No doubt attend of Lest. .,:[tI]: .':f.f: : ::1 \.' I II'J:!I I PURE OHEMIOALS AND GENUINE DRUGS can enter the mind of any one InnurluK, \ Kcutrully to the business of the Hue.GEOJUiK Th. iJianliigri possessed by this Pitcher till lu this, UKKiT OourtM, to the ) new .... . us I'urrorllmwllnll C GIBII3 It. These Itittew ) art: purlly. beauty, llghtnesa.: cheapness, du.... pooIl..I lD'aluaLIo us --- Will ,h kij'l cnuiiantljr on .udluJ"lh, |; ,>r with a Kl'l.l. ST()( K of I III' that In Pollclc cau juuMu atTurd occur.them amidst any confluKnttlou/( -JUrcbJ1.--8l-lf- Jacksonville- Fla.B.C.Lewis&Son. bility, ''the solid wall resisting a blow whIch, wonld 1'i fl .tI.'i U.1 'fI: :f IIJ.IH'J I-" ---- Indent tIc hollow TIBBITS. \ or oir-cbatubcr and Us S. L. J. Eo JOHNSTON A CO., Ice-rrt,. rilngquiilllloa. Pttcberj. 'lbo,p&tru, the" ."DI, sal will CIllO OeJ.ebra'tec.1.: xroDctrzLt1Q11BOF' : 1"I'.rll.- .. Mirlng flcucral Insurance Agrnta lu Savannah the above, r I'oui-!a I rueilloi.The Mlo.. I and illustrated Is made In three kiln_mull, lilt)'i-'JJf: : ;',It I':r.f II')JI:1111.",II POST-OFFICE: , HKKl: : ), l'HJHICIIIm': / iwny with ten ascertain their former how Agent.to obtain It by communionting I BANKERS turned, ..>. r and with large-plum the Arctic )Finish engraved, 'II bleb and 1 l i.cnglne-so; ..1"Erol'l Remittent ani Inumutuat ttnn, HAS TilE FINEST STOCK IN TOWN OF NovU 14-tf JAME80. GAMBLE. popular. ParUcalaralteutlod Is called tfiJIMlilK: ) Vn-Blt'\ .;iH.l.'ilJO] '1 InthikMorlmcntof 1 whli'h I would oil ih. I'pfH'I.I.lIftllli) 1I 01! l.h'-I..II.I. generally." -- - -- -- :".11.1''', as II moots demand not heretoMre . --- -----" I'aaIIahsaswee, I'lorldn. IUI) ; lied for a l light "'"n eI1ICbL Plicaer, to be lAd an a pnveoUrt of Chills sad French Initial Paper, Envelopes, 'l'rIlU.lni' M. ..., Li.a.: C. SCHWERDTFEGER. 'iT taken to | rlvate rooms or sleeping apartments and mf1 ll.TailJll.ljtfMilM.M! !: : : ] ,.J: 4 ILL LOAN MONEYS for till r) son It Is also I"'rU'i'"rlV" > \ kefrab/c/ for AU and every descriptIon: of .. I I KKCEIVE: Bt'\, A DEPOSITS SELL! KXCIIANOK, 1101.-1.. 11 l f 1f11.! !Ill'I1 FWd'|];; .to! than;<;1.Ji/.H.V.powerful I/ I )| { tttoacy.| .H|I Mn[I) I I Writing I'iiperudJingCarddI'Ortt0tI0e. I" I GUANO II COIN STOCKS -a. zss4&aLMiot.tothasg.ot WaKrauJ tint.t Work-boxes,Writing Peeks, Morocco BRINLEYS; PLOWS r BONDS Ink and I t II) : :"'''.' Portc-monnaics Fancy AND OTIIBn SECVRITIEB! ';1 11IJII 'IIII.II'1: "'HII.jJ0 1.80 a supply 'of( 'IIII'Y.; Mill. & Ha'rdy's Im Aud< wake Collniluns In Talbhmee tlIa wasted l Ink Dottles, Ilulen.and a large A and Scsi.,DD4 \ vicinity. ceases all AT REDUCED PRICES0 proved I' ow.. Also Agents for tbn &]((;11. ......ml.... and Dealer In Guns, l.1.l O/lle0-8THI, )DANK 8t'hLtilSt JUST assortment of rOOd bluR KEAFER the beat luachlno In use We loll, Amm.Illom, Ac RECEIVED, .; If 111f 1 In"till::1.:111; :1'1'1:II.... Also all and Weekly New lark rapert. the Dally Oct I worked one on last Oat hii-h 10. 71-ly . Crop, 'II be / cuu . srcn at Will ) otbCITY - 4.7 any time ut White Hull. Alto on baud< and fur tain Burglar!: and Fire-proof -- It tihxin1\0 the sick.soS together with all the Popular Mapalyeaaod 18 I. \'. (iii!II lit! .t CO.. FASHIONABLEMILLINERY A Large Assortment of r j:1 I 'J :.'.'j II:1t'J"=- U... [ SAFES I -- --- - uieh S-lm Hue) mile North of TulUliiu.ee O N' /hand and for salt)al ..limes\ ,I good supply, ofWII.COS.GIBBSACO.'a hs_|raa4 t>uw. tog all the Ills M w:.. With Drama, llramashoop and Comhlnittiou Locks. - the lain. ) tiu|>ro\euieni, and abend. of all other TRY. .ONE BOTTLE HOTEL '' I B. B. roBT. \ Ihot.41fK\: HritDlM) M\ H*< V !*.I.AMD! .bu j'kt retained from\ SILA'ER WAKE - f NANIP\'LATEDOVANO, .. .. A....M.. .. .IlOIIJiy.POST .. h7f.tork- where .>>, purchased M clenat TUB' t3S3rit t'UThICILIS flEKE, : ll'ANO'PEltl"1AN : i Stuck ut Millinery Dress Patterna, *e., uAptil hlell ulanassi Ci J'roa' PIKENU ( GUANO, BTOFor its PcR now 01''" for till inspection 01 ladles. n Fa( & llie and th Tallahassee , JUANO SALT AND PIASTER! COMPOUND, HOBBY Sale or Rent. publloll8fleraJ,. BITTERSJt'liAZj% TBE2lt1ILITVyearorrj , .' I..AU iii..01 BRIDAL! ii cdIIrAc4J2p . ._& i / 1'0. NWlllerJ Ike44doasIi"'Ordcrs PRESENTS MARY S. AECHEE Proprietreis.rpUlS At lowest rasb prices, by General Commission MerchantsNEW UTE WUJ.IIELL 0& RUT ON UBERAt wllb lIOalo.4 dllllL b; ,Haffle,1\IAcT1c. ,_ 1 U Y. GIBBS i; CO., I I' terms Ibe residence of CoL E. 1101' from a dlta.cros.i1)I7' ; IU.1w to."A&cOtfurtbeROVElt 'ue suiifla, Urn DiU g rei.I14 n 'forll, In 'fallahee, Via. ire HOTEL, having been thoronjUIi At White ) mile North' of TrJIslwe.I ORLEANS, I.A. now occupied '>.quslls4 Pad kave ilhlit ope uJ U.II. l'onu\'rr l'o.se.utoe If\\,.. II onl'e. & efta fcM .1. and refitted beta* Turnlab Uiraicaoaentirely : ; 1. BAKER IlEWISU 0.. &c. &c. Of U>' reCtI' l'nUR.t as'lrg his. new furullure.U nuwopenfor . I March ft-4m NOT 17, 'I)% ;il) I lIe IS-If RANEf. A&enle.\ MX\'II\St-the: \" '\.. \bt'I. to Ibr lIIorkcl. ,. V T.R.VAON.NQYTL lion of the public. No pains wlfir be .pared to I'f'Dr : ' 'iIC I. "' 4S-& I IAMB U. K. t I.AIIIt. der guests voutfortable f IMsy. 31, 'W \, ..-tIt. ,. ..L. a . "'" ,, -_... : ... '" ,, \ -.." . ..... . Full Text xml version 1.0 xml-stylesheet type textxsl href daitss_report_xhtml.xsl REPORT xsi:schemaLocation 'http: http:' xmlns:xsi 'http:' xmlns 'http:' DISSEMINATION IEID 'E20090427_AAABPU' PACKAGE 'UF00086643_00225' INGEST_TIME '2009-04-27T06:39:48-04:00' AGREEMENT_INFO ACCOUNT 'UF' PROJECT 'UFDC' REQUEST_EVENTS TITLE Disseminate Event REQUEST_EVENT NAME 'disseminate request placed' TIME '2018-12-20T13:19:32-05:00' NOTE 'request id: 343541; E20090427_AAABPU' AGENT 'UF73' finished' '2018-12-20T13:20:27-05:00' '' 'SYSTEM' FILES FILE SIZE '1172099' DFID 'info:fdaE20090427_AAABPUfileF20090427_AABUYO' ORIGIN 'DEPOSITOR' PATH 'sip-files00566.jp2' MESSAGE_DIGEST ALGORITHM 'MD5' d306dd4ce8f5968cec47806023ddd623 'SHA-1' d1d7d5b7f83578324c08387f65ac4bd0b36675ca EVENT '2018-12-20T13:20:02-05:00' OUTCOME 'success' PROCEDURE describe '396023' 'info:fdaE20090427_AAABPUfileF20090427_AABUYP' 'sip-files00566.jpg' dbb4723116be63cf4cbbd0e2d413d9c9 cb5b316d5c258d7260e48bf8aed0753d4464f9e1 '2018-12-20T13:19:42-05:00' describe '42227' 'info:fdaE20090427_AAABPUfileF20090427_AABUYQ' 'sip-files00566.QC.jpg' a7183d047fc4f3811ca7aee4dee63055 818397342b398b32089fcc420280322f0962071e '2018-12-20T13:19:49-05:00' describe '9376581' 'info:fdaE20090427_AAABPUfileF20090427_AABUYR' 'sip-files00566.tif' c41325377a7d59f846cbc7aaab2a01f4 073d5b8dad5b032fe712d53101cd9c370ce9e549 describe Value offset not word-aligned: 293 WARNING CODE 'Daitss::Anomaly' Value offset not word-aligned '173092' 'info:fdaE20090427_AAABPUfileF20090427_AABUYS' 'sip-files00566.txt' d34acd3674d69a3c5f5697903def352d 0efb4f919bb435ee9845ddfed2248448d382a3da '2018-12-20T13:19:41-05:00' describe Invalid character Not valid first byte of UTF-8 encoding Invalid character Not valid first byte of UTF-8 encoding '9215' 'info:fdaE20090427_AAABPUfileF20090427_AABUYT' 'sip-files00566thm.jpg' eb8bb68f1a4eb9630df98706954d812c e845b4ac34a6630baf1de1d106cc12b7c9e42b8d '2018-12-20T13:19:51-05:00' describe '1205832' 'info:fdaE20090427_AAABPUfileF20090427_AABUYU' 'sip-files00567.jp2' 33ca4f30bef8fd6a7fe020c463a57aad 9909ddb7d54cd6a5d81c34065aea04362164fc8b '2018-12-20T13:19:55-05:00' describe '412078' 'info:fdaE20090427_AAABPUfileF20090427_AABUYV' 'sip-files00567.jpg' b93e0e6c92345dd3c61c0dc9d3244478 89637a28814d6301f20ad43e3379d353a679a416 '2018-12-20T13:19:40-05:00' describe '43282' 'info:fdaE20090427_AAABPUfileF20090427_AABUYW' 'sip-files00567.QC.jpg' 8a53044f42dcdfa547529239b25ca891 9def17f2cb53eda543c641511a33724fe6023fb0 '2018-12-20T13:19:53-05:00' describe '9635883' 'info:fdaE20090427_AAABPUfileF20090427_AABUYX' 'sip-files00567.tif' b724ee4f6df89ca887c4ee6c4dc8ddad f8622afdc06a7dea3fe0f8b873617a8708da7a1a describe Value offset not word-aligned: 293 Value offset not word-aligned '131771' 'info:fdaE20090427_AAABPUfileF20090427_AABUYY' 'sip-files00567.txt' 94360c5048eda9dc1b9253bf4c08cd08 bf0edb68029cdfea50099611fe762229e1c6214e '2018-12-20T13:19:45-05:00' describe Invalid character Not valid first byte of UTF-8 encoding Invalid character Not valid first byte of UTF-8 encoding '9061' 'info:fdaE20090427_AAABPUfileF20090427_AABUYZ' 'sip-files00567thm.jpg' 1d25748af91940a83c18f3c26be731b4 235a2595e189fe9440f71ed614d47815d03bfca7 '2018-12-20T13:19:56-05:00' describe '1166672' 'info:fdaE20090427_AAABPUfileF20090427_AABUZA' 'sip-files00568.jp2' fdd16d7d8a6f4aa13da6169ca376b7e6 c5f1feda8681e126940c20c1f9c072b4613cf24c describe '360771' 'info:fdaE20090427_AAABPUfileF20090427_AABUZB' 'sip-files00568.jpg' 34ebe15d2fa80022dd9dbb07ec0c1ab9 c0f6effa106eecde829b1b60e62b3fe154feecdd describe '43380' 'info:fdaE20090427_AAABPUfileF20090427_AABUZC' 'sip-files00568.QC.jpg' c6c8a592a804d87e8ea2ff0bdc7a33e9 4dbcb250affe926c775b2fa45c51c1f2661247b2 '2018-12-20T13:19:44-05:00' describe '9327479' 'info:fdaE20090427_AAABPUfileF20090427_AABUZD' 'sip-files00568.tif' 5e7d52e2a9bfa80c326ea3501dda78f6 aaa606e3588d399790ab362f4e46a592c9612a9e '2018-12-20T13:19:50-05:00' describe Value offset not word-aligned: 293 Value offset not word-aligned '99432' 'info:fdaE20090427_AAABPUfileF20090427_AABUZE' 'sip-files00568.txt' befae9cc969533f1dbdd6e73715b967e 9339ad9682995db2b9ae389562aa02be502c15d1 describe Invalid character Not valid first byte of UTF-8 encoding Invalid character Not valid first byte of UTF-8 encoding '9758' 'info:fdaE20090427_AAABPUfileF20090427_AABUZF' 'sip-files00568thm.jpg' 2d128e2cf87991692259d122e97a83b5 49758789137430b501f959377e928e91c9e25c63 describe '1183007' 'info:fdaE20090427_AAABPUfileF20090427_AABUZG' 'sip-files00569.jp2' f0b9f4cfc08be2661684b30d5a0a8ea5 4fb90e405aa6cf35ccf4cc960283b48bf3f0d041 '2018-12-20T13:19:58-05:00' describe '384624' 'info:fdaE20090427_AAABPUfileF20090427_AABUZH' 'sip-files00569.jpg' 2d2b96ad93ddad24bab998460388f5da aa8136352560fabfacb6e90126e44eef4f7467df describe '48551' 'info:fdaE20090427_AAABPUfileF20090427_AABUZI' 'sip-files00569.QC.jpg' be237387e37fcc990a9da3c37e300ba3 1774815fbb017e6bf8361d2fde108b0f383232fc describe '9463725' 'info:fdaE20090427_AAABPUfileF20090427_AABUZJ' 'sip-files00569.tif' 9703a6fa785ad648dc08ed2c476954b3 ed9e90d9f05b23550698f48e73c41ffc4dadce08 '2018-12-20T13:20:00-05:00' describe Value offset not word-aligned: 293 Value offset not word-aligned '103340' 'info:fdaE20090427_AAABPUfileF20090427_AABUZK' 'sip-files00569.txt' 39483d2f8cf5fac2000b4da15559788f 91c4b897d616fb7e4f1a6b91b43fe96e8da24a75 describe Invalid character Not valid first byte of UTF-8 encoding Invalid character Not valid first byte of UTF-8 encoding '11587' 'info:fdaE20090427_AAABPUfileF20090427_AABUZL' 'sip-files00569thm.jpg' 20c2a74e768481bd11f9cf2467db2d71 6dfb7af231e13d8cf22f95710bb2e55073759693 '2018-12-20T13:19:59-05:00' describe '10169' 'info:fdaE20090427_AAABPUfileF20090427_AABUZM' 'sip-files1872070201.xml' fafaddd13c3ce386c38c4f916cb0cfb4 9a749e44f93e9215f3a2d151160fa3d6b6f83b75 describe The element type "div" must be terminated by the matching end-tag " ". '2018-12-20T13:20:03-05:00' 'mixed' xml resolution BROKEN_LINK schema The element type "div" must be terminated by the matching end-tag "". '11732' 'info:fdaE20090427_AAABPUfileF20090427_AABUZP' 'sip-filesUF00086643_00225.mets' 721da57c5d3ad8bfbdc690a296cd5adb cf673389f6673eea3bde6ab1bec2dcbdcf597c6e '2018-12-20T13:19:43-05:00' describe SaxParseException: TargetNamespace.1: Expecting namespace '', but the target namespace of the schema document is ''. xml resolution SaxParseException: TargetNamespace.1: Expecting namespace '', but the target namespace of the schema document is ''. '11486' 'info:fdaE20090427_AAABPUfileF20090427_AABUZS' 'sip-filesUF00086643_00225.xml' b18ad639bb247a38230df11a50214be4 2c3a4b3c865c466d889a828e12e0cd5b29deede5 describe xml resolution
https://ufdc.ufl.edu/UF00086643/00225
CC-MAIN-2021-17
refinedweb
35,294
67.25
za. zaart is in early development stage, use it at your own risk, you probably face some nasty bugs here an there. #> pub global activate zaart type in the command bellow in console to start a new site #> zaart init --name [MY_SITE_NAME] for more information type in: #> zaart -h or #> zaart --help see TODO.md file for a list of missing features ## 0.1.0 ### New Features there is no new fiex, the code is stable enough so i decided to bump the version number You can install the package from the command line: $ pub global activate zaart The package has the following executables: $ zaart Add this to your package's pubspec.yaml file: dependencies: zaart: ^0.1.0 You can install packages from the command line: with pub: $ pub get Alternatively, your editor might support pub get. Check the docs for your editor to learn more. Now in your Dart code, you can use: import 'package:zaart/zaart.dart'; We analyzed this package on Aug 16, 2019, and provided a score, details, and suggestions below. Analysis was completed with status completed using: Detected platforms: other Primary library: package:zaart/zaart.dartwith components: io, mirrors. Fix lib/cmd_build.dart. (-1 points) Analysis of lib/cmd_build.dart reported 2 hints: line 78 col 31: Use isNotEmpty instead of length line 92 col 22: Use isNotEmpty instead of length Fix lib/cmd_page.dart. (-1 points) Analysis of lib/cmd_page.dart reported 2 hints: line 97 col 8: Don't explicitly initialize variables to null. line 98 col 8: Don't explicitly initialize variables to null. Fix lib/config.dart. (-0.50 points) Analysis of lib/config.dart reported 1 hint: line 17 col 7: Don't explicitly initialize variables to null. Fix lib/zaart.dart. (-0.50 points) Analysis of lib/zaart.dart reported 1 hint: line 51 col 9: Use isNotEmpty instead of length Support latest dependencies. (-10 points) The version constraint in pubspec.yaml does not support the latest published versions for 1 dependency ( html). Maintain an example. (-10 points) Create a short demo in the example/ directory to show how to use this package. Common filename patterns include main.dart, example.dart, and zaart.dart. Packages with multiple examples should provide example/README.md. For more information see the pub package layout conventions.
https://pub.dev/packages/zaart
CC-MAIN-2019-35
refinedweb
384
58.99
There are so many ways to convert a alpha or character value to numeric or decimal. You can use various built-in funtion provided by the system for Version V5R2 and above releases. You can pass character strings to the %DEC, %DECH, %INT, %INTH, %UNS, %UNSH, and %FLOAT built-in functions. If the character string contains invalid data, the system generates an exception with status code 105. Usage: %DEC(expression:digits:decimals) D Stringdata s 50 D Number s 15p 2 /free monitor; Number = %dec(Stringdata:15:2); on-error 105; // Error handling logic goes here endmon; /end-free The(%XLATE('$*,':' ':Amount) :15 :. I wrote this program long time back, works like a charm all the time. d $alpha s 50 d $numeric s 15 5 d i s 3 0 d #div s 10 0 d dec s 1 d neg s 1 d arr s 1 dim(50) c *entry plist c parm $alpha c parm $numeric c movea $alpha arr c move 'N' dec c move 'N' neg c eval $numeric = *zeros c 1 do 50 i c select c when arr(i) = '.' c move 'Y' dec c z-add 10 #div c when arr(i) = '-' c move 'Y' neg c when arr(i)<>' ' and dec <> 'Y' c if arr(i) >= '0' and arr(i) <= '9' c move arr(i) n 1 0 c 10 mult $numeric $numeric c add n $numeric c endif c when arr(i)<>' ' and dec = 'Y' c if arr(i) >= '0' and arr(i) <= '9' c move arr(i) n 1 0 c #div mult $numeric $numeric c add n $numeric c $numeric div(h) #div $numeric c 10 mult #div #div c endif c endsl c enddo c if neg = 'Y' c eval $numeric = $numeric * -1 c endif c eval *inlr = *on c return NO JUNK, Please try to keep this clean and related to the topic at hand. Comments are for users to ask questions, collaborate or improve on existing.
https://www.mysamplecode.com/2011/04/rpgle-convert-alpha-string-to-numeric.html
CC-MAIN-2019-39
refinedweb
330
53.89
Initialize, finalize, and query the global MPI session. More... #include <Teuchos_GlobalMPISession.hpp> Initialize, finalize, and query the global MPI session. This class insulates basic main() program type of code from having to know if MPI is enabled or not. The typical use case is to replace an explicit call to MPI_Init() in your main() routine with creation of a GlobalMPISession instance. The instance's destructor (which in this case will be called at the end of main()) then calls MPI_Finalize(). So, instead of writing: int main () { (void) MPI_Init (&argc, &argv); // Your code goes here ... (void) MPI_Finalize (); return 0; } you would write: #include <Teuchos_GlobalMPISession.hpp> int main () { Teuchos::GlobalMPISession (&argc, &argv, NULL); // Your code goes here ... return 0; } This saves you from needing to remember to call MPI_Init() or MPI_Finalize(). GlobalMPISession cleverly checks whether MPI has been initialized already before calling MPI_Init(), so you can use it in your libraries without needing to know whether users have called MPI_Init() yet. This class even works if you have not built Trilinos with MPI support. In that case, it behaves as if MPI_COMM_WORLD had one process, which is always the calling process. Thus, you can use this class to insulate your code from needing to know about MPI. You don't even have to include mpi.h, as long as your code doesn't directly use MPI routines or types. Teuchos implements wrappers for MPI communicators (see Comm and its subclasses) which allow you to use a subset of MPI functionality without needing to include mpi.h or depend on MPI in any way. ArrayRCP_test.cpp, CommandLineProcessor/cxx_main.cpp, FancyOutputting_test.cpp, and test/MemoryManagement/RCP_test.cpp. Definition at line 96 of file Teuchos_GlobalMPISession.hpp. Calls MPI_Init() if MPI is enabled. If the option --teuchos-suppress-startup-banner is found, the this option will be removed from argv[] before being passed to MPI_Init(...) and the startup output message to *out will be suppressed. If Teuchos was not built with MPI support, the constructor just prints a startup banner (unless the banner was suppressed -- see previous paragraph). You can always use this class, whether or not Teuchos was built with MPI. *outand an std::exception will be thrown! Definition at line 60 of file Teuchos_GlobalMPISession.cpp. Call MPI_Finalize() if MPI is enabled. Definition at line 121 of file Teuchos_GlobalMPISession.cpp. Return whether MPI was initialized. Definition at line 135 of file Teuchos_GlobalMPISession.cpp. Return whether MPI was already finalized. Definition at line 141 of file Teuchos_GlobalMPISession.cpp. Returns the process rank relative to MPI_COMM_WORLD Returns 0 if MPI is not enabled. Note, this function can be called even if the above constructor was never called so it is safe to use no matter how MPI_Init() got called (but it must have been called somewhere). Definition at line 146 of file Teuchos_GlobalMPISession.cpp. Returns the number of processors relative to MPI_COMM_WORLD Returns 1 if MPI is not enabled. Note, this function can be called even if the above constructor was never called so it is safe to use no matter how MPI_Init() got called (but it must have been called somewhere). Definition at line 153 of file Teuchos_GlobalMPISession.cpp.
http://trilinos.sandia.gov/packages/docs/r11.2/packages/teuchos/doc/html/classTeuchos_1_1GlobalMPISession.html
CC-MAIN-2014-10
refinedweb
523
58.18
Draft Point The This code creates Next: ShapeString Description The Draft Point tool creates a simple point in the current work plane, handy to serve as reference for placing lines, wires, or other objects later. It uses the Draft Linestyle (only the color) set on the Draft Tray. A single point placed on the working plane Usage - Press the Draft Point button, or press P then T keys. - Click a point on the 3D view, or type a coordinate and press the add point button. point tool will restart after you place a point, allowing you to place another one without pressing the tool button again. - Press Esc or the Close button to abort the current command. Properties - DataX: the X coordinate of the point. - DataY: the Y coordinate of the point. - DataZ: the Z coordinate of the point. Scripting See also: Draft API and FreeCAD Scripting Basics. The Point tool can be used in macros and from the [[Python|]Python] console by using the following function: Point = makePoint(X=0, Y=0, Z=0, color=None, name="Point", point_size=5) Point = makePoint(point, Y=0, Z=0, color=None, name="Point", point_size=5) - Creates a Pointobject in the specified X, Yand Zcoordinates, with units in millimeters. If no coordinates are given the point is created at the origin (0,0,0). - If Xis a pointdefined by a FreeCAD.Vector, it is used. coloris a tuple (R, G, B)that indicates the color of the point in the RGB scale; each value in the tuple should be in the range from 0to 1. nameis the name of the object. point_sizeis the size of the object in pixels, if the graphical user interface is loaded. Example: import FreeCAD import Draft Point1 = Draft.makePoint(1600, 1400, 0) p2 = FreeCAD.Vector(-3200, 1800, 0) Point2 = Draft.makePoint(p2, color=(0.5, 0.3, 0.6), point_size=10) FreeCAD.ActiveDocument.recompute() Example: This code creates N random points within a square of side 2L. It makes a loop creating N points, that may appear anywhere from -L to +L on both X and Y; it also chooses a random color and size for each point. Change N to change the number of points, and change L to change the area covered by the points. import random import FreeCAD import Draft L = 1000 centered = FreeCAD.Placement(FreeCAD.Vector(-L, -L, 0), FreeCAD.Rotation()) Rectangle = Draft.makeRectangle(2*L, 2*L, placement=centered) N = 10 for i in range(N): x = 2*L*random.random() - L y = 2*L*random.random() - L z = 0 r = random.random() g = random.random() b = random.random() size = 15*random.random() + 5 Draft.makePoint(x, y, z, color=(r, g, b), point_size=size) FreeCAD.ActiveDocument.recompute() Next: ShapeString
https://wiki.freecadweb.org/index.php?title=Draft_Point&oldid=623516
CC-MAIN-2020-16
refinedweb
458
68.67
Boolean Variables and Relational Operators in Java: Video Lecture 6 A boolean variable is capable of holding either “true” or “false.” A computer program may use one bit only to store the status “true” or “false.” You might already know that the smallest memory unit of the computer is a “bit.” Therefore, a boolean variable uses as little memory as possible to store the information “true” or “false.” Generally, “true” is stored as “1.” “False” is stored as zero (“0”). Anyway, in programming, there are situations when you will want your program to remember some binary decisions (yes/no decisions.) At that time, binary variables become handy. The conclusion whether a number is greater than another number, or smaller than another number, so and so forth can be stored in a boolean variable. Comparisons between numbers or variables are frequent in programming. That is, you will face situations where you will need to check if one number is smaller than another number, or if a number is equal to or not equal to another number, so and so forth. In mathematics, such comparisons are called logical conditions. In Java, there are six logical operators to work with logical conditions or to compare variables. The video lecture below provides further details with easy-to-follow programming examples. Contents - 1 The Video: Boolean Variables and Relational Operators in Java - 2 The Program Used in the Video - 3 Exercises - 4 Additional Resource - 5 Comment - 6 Transcription of the Audio of the Video - 6.1 Logical conditions (to be used with relational operators) - 6.2 Relational operators - 6.3 Equality comparison - 6.4 Boolean variables to store the results of relational operations - 6.5 Starting of the code - 6.6 Running the program - 6.7 Changing the code with equality (==) - 6.8 Running the code - 6.9 Concluding remarks regarding boolean variables and relational operators The Video: Boolean Variables and Relational Operators in Java The video explains boolean variables and logical conditions (relational operators). The examples we used in the video are suitable for beginners. Overall, the video will help a beginner to study boolean variables as well as relations operators. The Program Used in the Video We wrote the following program in the video. Please save the content in a file named BoolTest.java before compiling and running it. Although we are providing the code here as a reference, we suggest that you type the program yourself while watching the video. The process of programming involves typing and thinking about the problem simultaneously. This is why it is best if you write the code yourself. import java.util.Scanner; class BoolTest{ public static void main(String[] args){ boolean b; int x; int y; Scanner scan = new Scanner (System.in); System.out.println("Enter the 1st number"); x=scan.nextInt(); System.out.println("Enter the 2nd number"); y=scan.nextInt(); b= (x==y); System.out.println(b); } } Exercises Please do not hesitate to send us your code via the comments section below. We will be happy to provide you feedback. - Write a program that can say whether it is a hot day or not. Ask the user for the temperature (in Ferenhite) of the day. Print “true” if the temperature the user provides is higher than or equal to 90-degree Ferenhite. Print “false”, otherwise. Please do not use if-then-else for this program. - Write a program that can say whether a number is odd or even. Ask for an integer from the user. Print “true” if the user enters an even number and “false” if the user enters an odd number. Please do not use if-then-else for this program. Hint: You will need to use the remainder (%) arithmetic operator. Additional Resource The following Java documentation covers relational and conditional operators. It uses if-then-else, which we have not covered yet in our videos. As a result, the link below might not make a whole lot of sense at this point. Still, we are providing it here as a standard reference because it is a part of Oracle Java documentation. The content of the following link will make sense after a few more video lectures. Equality, Relational, and Conditional Operators Comment We will come back soon with the next topic. To stay in touch, please subscribe to Computing4All.com and subscribe to our YouTube channel. Enjoy! Transcription of the Audio of the Video Hi, I am Dr. Shahriar Hossain. Today, I am going to explain the concept of Boolean variables. Boolean variables are capable of holding conditions. In a computer, a condition or a status is either “true” or false. Logical conditions (to be used with relational operators) A “condition” in Java refers to logical conditions of mathematics. For example, 10>5, or 6<10. Other than the “greater than” or the “smaller than” symbol, there are several other logical conditions. For example, equal to (==), not equal to (!=) greater than or equal to (>=), smaller than or equal to (<=) . Relational operators Here is a complete list of logical conditions [Show on screen] • a < b (a is Less than b) • a <= b (a is Less than or equal to b) • a > b (a is greater than b) • a >= b (a is greater than or equal to b) • a == b (a is equal to b) • a != b (a is not equal to b) [End of- Show on screen] Equality comparison Java recognizes equality comparison of two variables with two equals symbol (==). If you provide one equal symbol, it is considered as an assignment. Again, one equal symbol means assignment, that is, the right side of the assignment will be copied to the variable in the left side. Two consecutive equal symbols refer to “equality comparison” between two variables or numbers. Each of these logical conditions results in either “true” or “false”. As a result, a Boolean variable is capable of remembering or holding the result of each of these logical conditions. Boolean variables to store the results of relational operations As I said earlier, a Boolean variable is a variable that can hold either true or false. In a computer, “true” refers to 1, and “false” refers to zero. In an earlier video, we explained data types and mentioned the ranges of number variables like integer, double, byte, so and so forth. The range of a Boolean variable is just zero and one, nothing else. Boolean is a data type that requires the smallest memory size, just one small bit. As a result, it can only hold either one or zero, in a small bit size. Today we will see how we can declare a Boolean variable and what we can do with it. In this video, we are learning logical conditions as well. Logical conditions are comparisons. Comparisons will help us when we will learn conditional statements like if-then-else in a later video. I will share my screen with you in a moment. Starting of the code My class name is BoolTest.java. I am writing my main methods, inside which I have declared a boolean variable named b. I also declare two more variables, x, and y, of integer type. I will ask the user to enter two numbers for x, and y. Therefore, I prepare my Scanner object named scan. I write code to get input for x. I also write code to get input for y. At this point, I want to keep the information if x is greater than y in the boolean variable. Notice that the answer “if x is greater than y” is either yes, or now. Therefore, for the answer, you just need a Boolean variable because the Boolean variable has the capability to hold true or false, which is “yes” or “no” in this case. If I type x>y the value is either true or false. If the content in x is greater than the content in y, then the value will be true, otherwise, the value will be false. I assign the value in the right side of the assignment operator to the variable I have on the left side. The variable I have on the left side is b, which is a Boolean variable. Now let us print the status of the Boolean variable b, using a System.out.println statement. Save the file, compile, and run it. The program ask for the first number. The user enters 10. The program asks for the second number, the user enters 20. The program immediately answers false. Notice that the program only answers if the first number if greater than the second number the user has entered. Since 10 is less than 20, the statement “the first number is greater than the second number” is false. The program has printed false. Running the program Let us run the program again. The program asks for the first number. The user enters 50. The program asks for the second number. The user enters 10. Notice that the first number is greater than the second number. The program should now say true. This is because the first number is greater than the second number, and the program is checking if the first number, x, is greater than the second number, y. Let us do another check now. Let us change the greater than symbol to smaller than. That is the program should output true if the first number is smaller than the second number. Save the file, compile it, and run it. The user enters 20 and 25 as the first and the second number. Since the first number, 20 which is x, is smaller than the second number, 25, which is y, the program outputs “true” now. That is, the program now checks if the first number is smaller than the second number. I am quickly showing another example. Where you can see that the first number is 30 and the second number the user entered is 10. The program outputs false because the first number 30 is not smaller than the second number 10. Changing the code with equality (==) Now, we are going to examine another comparison operation, which is whether the content of two variables are equal or not. As I said earlier, the equality comparison between two variables is accomplished by two equal symbols. Therefore, if we write x two equals (==) y, the right side of the assignment operator should be true only when x is equal to y, otherwise, it should be false. That is, b will be true if x and y are equal. b will be false if x and y are unequal. Sometimes, my students get confused because this particular line looks a bit weird due to three equals symbol. To reduce the confusion you can put parentheses on the right side of the assignment operator. The parentheses will not change anything. You can put them for clarity. I will skip them in my code. Let us save the file, compile it, and run it. Running the code 10 and 20 are not equal. Therefore, the program outputs false. 20 and 10 are not equal. Thus, the program outputs false. The user enters 10 and 10 as the first and the second number. The program outputs true now, which you expected because you used equality comparison in your code. Let me quickly show you that putting those parentheses will not change the correctness of the program. Notice that my program prints the same output, which is “true”, for equal inputs. Concluding remarks regarding boolean variables and relational operators The main idea of the video today is to familiarize you with the concept of Boolean variables and logical conditions. Over time, we will see more complex logical conditions, as well as conditional statements. their backgrounds. Please start from the beginning of this lecture series if you are entirely a new learner. See you in a few days in the next video lecture. Meantime, please do not hesitate to send us any question you may have, through the comments section below, or via the contact us form on our website Computing4All.com. Thank you very much for watching the video.
https://computing4all.com/boolean-variables-and-relational-operators-in-java/
CC-MAIN-2022-40
refinedweb
2,022
66.54
Google Cloud Big Data and Machine Learning Blog Innovation in data processing and machine learning technology Support for Python on Cloud Dataflow is going beta The universe of people and companies that can easily process data at scale is larger today, thanks to support for Python on Google Cloud Dataflow, now open to the public in beta. Along with beta support comes v0.4.0 of the Cloud Dataflow SDK for Python. This release is a distribution of Apache Beam, an exciting project under the Apache Incubator that evolved from Dataflow as described in our January announcement as well as the May update entitled Why Apache Beam. Beam unifies batch and streaming through portable SDKs for a variety of execution engines. This SDK release supports execution on Cloud Dataflow and locally. It includes connectors to BigQuery and text files in Cloud Storage, and a new source/sink API extends the SDK to any other source or sink. This paves the way for eventual feature parity between the Python and Java SDKs. We’ve been overwhelmed by the volume and variety of interest in Python support, a top requested feature of Cloud Dataflow, and thrilled by what those in our alpha program have accomplished. Consider Veolia, a French multinational environmental services company. With equipment all over the world generating data, a team of developers used Python on Cloud Dataflow to amass industrial operational data in a data lake based on Google Cloud Storage and Google BigQuery. They run regular Cloud Dataflow pipelines that join tens of thousands of files at a time into structured tables in BigQuery. Now, all questions about factory data are an SQL query away from an answer. Or look at Namshi, a leading fashion e-commerce retailer based in Dubai and backed by Rocket Internet. Using Python on Cloud Dataflow, Namshi automated complex retail-specific analytics and metrics over raw Google Analytics and operational data sitting in BigQuery. "It strikes a good balance between being ‘Pythonic’ and being consistent with the Beam model,” said Hisham Zarka, Namshi co-founder. “The resulting code is exceptionally clear and concise owing to the strength of the Beam programming model and the convenience of the Cloud Dataflow execution engine." Among Cloud Dataflow alpha testers, the most common uses for Cloud Dataflow are loading data into, or performing complex analyses on, analytical databases like BigQuery; pre-processing data for machine learning, and scientific or statistical analysis. They chose Cloud Dataflow because it’s a fully managed service that doesn’t require any cluster configuration or management, freeing up data engineering or science teams to write and monitor pipelines, rather than clusters. “I am so excited to no longer baby-sit a cluster,” said one alpha tester. They also love how Python Cloud Dataflow is: data stays in Python data structures for straightforward debugging, and the Cloud Dataflow SDK for Python supports all the libraries and dependencies they’re used to, including NumPy, SciPy and Pandas. Cloud Dataflow Python SDK is available in PyPI via pip install, making getting started easier than ever. From your command line or Cloud Shell type: pip install google-cloud-dataflow --user Then, once you have the SDK, enter interactive mode with: python Within interactive mode, the next four lines (1) import Beam, (2) instantiate a pipeline, (3) add steps to the pipeline and (4) close the with statement with an empty line. import apache_beam as beam with beam.Pipeline() as p: p | beam.Create(['hello', 'world']) | beam.io.Write(beam.io.TextFileSink('./test')) After closing the with statement, the console should print a line indicating the pipeline executed. Let’s (1) exit interactive mode and (2) take a peek at what was written! exit() more ./test* Now it’s your turn. Head over to the Python Quickstart to create your own pipeline and learn the arguments for execution on Cloud Dataflow. Then change the world. Tweet me at @ericmander with your accomplishments.
https://cloud.google.com/blog/big-data/2016/07/support-for-python-on-cloud-dataflow-is-going-beta
CC-MAIN-2017-43
refinedweb
655
59.94
#include <lqr.h> In order to overcome this effect, an option is given to automatically switch the favoured side during rescaling, at the cost of a slightly worse performance. The function lqr_carver_set_side_switch_frequency sets the side switch frequency to switch_frequency for the LqrCarver object pointed to by carver. This will have the effect that, for each rescale operation, the favoured side will be switched switch_frequency times (or as much times as the number of pixels to rescale). The default value for newly created LqrCarver objects is 0. As for the final result, a very small value (e.g. 1 to 4) will normally suffice to balance the left and right side of the image (or the top and the boddom sides for vertical rescalings), without noticeable computational costs. However, in order to obtain a smoother behaviour for the visibiliy map, i.e. for the intermediate steps, higher values may be required. lqr_carver_set_enl_step(3), lqr_carver_set_resize_order(3), lqr_carver_set_dump_vmaps(3), lqr_carver_set_progress(3), lqr_carver_set_preserve_input_image(3), lqr_carver_set_use_cache(3)
http://www.makelinux.net/man/3/L/lqr_carver_set_side_switch_frequency
CC-MAIN-2016-40
refinedweb
162
54.22
import "github.com/mjibson/go-dsp/dsputils" Package dsputils provides functions useful in digital signal processing. compare.go dsputils.go matrix.go func ComplexEqual(a, b complex128) bool ComplexEqual returns true if a and b are very close, else false. Float64Equal returns true if a and b are very close, else false. IsPowerOf2 returns true if x is a power of 2, else false. NextPowerOf2 returns the next power of 2 >= x. PrettyClose returns true if the slices a and b are very close, else false. func PrettyClose2(a, b [][]complex128) bool PrettyClose2 returns true if the matrixes a and b are very close, else false. PrettyClose2F returns true if the matrixes a and b are very close, else false. func PrettyCloseC(a, b []complex128) bool PrettyCloseC returns true if the slices a and b are very close, else false. func Segment(x []complex128, segs int, noverlap float64) [][]complex128 Segment returns segs equal-length slices that are segments of x with noverlap% of overlap. The returned slices are not copies of x, but slices into it. Trailing entries in x that connot be included in the equal-length segments are discarded. noverlap is a percentage, thus 0 <= noverlap <= 1, and noverlap = 0.5 is 50% overlap. func ToComplex(x []float64) []complex128 ToComplex returns the complex equivalent of the real-valued slice. func ToComplex2(x [][]float64) [][]complex128 ToComplex2 returns the complex equivalent of the real-valued matrix. func ZeroPad(x []complex128, length int) []complex128 ZeroPad returns x with zeros appended to the end to the specified length. If len(x) >= length, x is returned, otherwise a new array is returned. func ZeroPad2(x []complex128) []complex128 ZeroPad2 returns ZeroPad of x, with the length as the next power of 2 >= len(x). ZeroPadF returns x with zeros appended to the end to the specified length. If len(x) >= length, x is returned, otherwise a new array is returned. Matrix is a multidimensional matrix of arbitrary size and dimension. It cannot be resized after creation. Arrays in any axis can be set or fetched. MakeEmptyMatrix creates an empty Matrix with given dimensions. func MakeMatrix(x []complex128, dims []int) *Matrix MakeMatrix returns a new Matrix populated with x having dimensions dims. For example, to create a 3-dimensional Matrix with 2 components, 3 rows, and 4 columns: MakeMatrix([]complex128 { 1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 4, 3, 2, 1}, []int {2, 3, 4}) func MakeMatrix2(x [][]complex128) *Matrix MakeMatrix2 is a helper function to convert a 2-d array to a matrix. Copy returns a new copy of m. func (s *Matrix) Dim(dims []int) []complex128 Dim returns the array of any given index of the Matrix. Exactly one value in dims must be -1. This is the array dimension returned. For example, using the Matrix documented in MakeMatrix: m.Dim([]int {1, 0, -1}) = []complex128 {3, 4, 5, 6} m.Dim([]int {0, -1, 2}) = []complex128 {3, 7, 1} m.Dim([]int {-1, 1, 3}) = []complex128 {8, 0} Dimensions returns the dimension array of the Matrix. PrettyClose returns true if the Matrixes are very close, else false. Comparison done using dsputils.PrettyCloseC(). func (m *Matrix) SetDim(x []complex128, dims []int) func (s *Matrix) SetValue(x complex128, dims []int) SetValue sets the value at the given index. m.SetValue(10, []int {1, 2, 3, 4}) is equivalent to m[1][2][3][4] = 10. func (m *Matrix) To2D() [][]complex128 To2D returns the 2-D array equivalent of the Matrix. Only works on Matrixes of 2 dimensions. func (s *Matrix) Value(dims []int) complex128 Value returns the value at the given index. m.Value([]int {1, 2, 3, 4}) is equivalent to m[1][2][3][4]. Package dsputils imports 1 packages (graph) and is imported by 9 packages. Updated 2016-07-18. Refresh now. Tools for package owners.
https://godoc.org/github.com/mjibson/go-dsp/dsputils
CC-MAIN-2020-34
refinedweb
648
66.54
You need /some/ way to discriminate. If you want elegant, rather than hack, then I think that means "Message Selection" (chapter 3.8 in the JMS 1.1 standard.) There are 3 namespaces here. 1) Property names which don't begin with "JMS": I would suggest an application-specific property name such as this but that's for sure a custom field. 2) Property names that begin with "JMS" but not with "JMSX" i.e. standard headers and 3) "JMSX" property name prefix (reserved for JMS-defined properties, existence of which is up to the JMS provider). Again, you could argue that this is a custom field. With AMQ, if a JMSX property is acceptable to you, you could set the JMXGroupID string, and discriminate on that. E.g. your app can sign its messages by setting this string to "App1". (See table 3.3 in chap 3.5.9 of the JMS 1.1 standard) Hope this helps, Mick Hayes ----- Michael Hayes B.Sc. (NUI), M.Sc. (DCU), SCSA SCNA -- View this message in context: Sent from the ActiveMQ - User mailing list archive at Nabble.com.
http://mail-archives.apache.org/mod_mbox/activemq-users/201107.mbox/%3C1310457076904-3661676.post@n4.nabble.com%3E
CC-MAIN-2019-13
refinedweb
187
76.72
Extended primitives Small objects are expensive in Java. There is a memory cost of 8 bytes per object plus 8-byte alignment in HotSpot. This makes, for example, a Vector3f (float x,y,z) consume 24 bytes of memory in Java (8 + 4 + 4 + 4 + 4(padding)) where it would only consume 12 bytes in C/C++. There is also a related performance cost. If you allocate, for example, a Triangle with 3 Vector3f's, you have to do 4 new's (one for the Triangle and 3 for the Vector3f's) and new's can be particularly expensive (not so much on single processor machines, but definitely on multi-processor machines). One solution to this is Java primitives (int, byte, float, etc.) Primitives have their lifetimes bound to their containing object or stack frame and therefore require no overhead memory-wise for the garbage collector. They also cannot have references made to them and so introduce no additional work for the garbage collector. What I am asking for is an "extended primitive". That is, something that acts in every way like a primitive, but that can have user-defined fields within it. Such extended primitives would not be part of any object hierarchy, there would be no way to get a reference to them, they would be passed and copied by value. They would be used something like this: extprim vector3f { float x; float y; float z; } class Triangle { vector3f v0; vector3f v1; vector3f v2; } This would allow the types of small objects that didn't quite make the "primitive cut" to not incur the huge penalties that they currently do. For example, a Complex object with float real and imaginary fields should consume 8 bytes; it currently occupies 16 bytes. The "double" primitive on the other hand consumes just 8 bytes as it should. This feature is slightly more restricted than full-blown structs. I don't want references to extended primitives and I don't want them to be part of an inheritance hierarchy. I just want the other small objects to get the same treatment as primitives. I have been think more about extended primitives and I think it would be possible to implement a fairly restricted form of them by modifying a compiler to automatically inline classes (ie class-erasure in analogy to the type-erasure of Java's generics implementation). With the closing of the multiple-return-values request, it is clear that Sun currently is mostly interested small syntatic tweaks for ease of programming, and not language changes for improved performance or memory efficiency. We need more hard data to convince them otherwise. The modified compiler could recognize certain classes (eg subclasses of a special JavaExtendedPrimitive class) and inline them out of existence at compile time. With enough restrictions on how they can be used, it may even be possible to guarantee that the modified programs will compile and run both using standard java compiler and using the modified compiler. This would allow performance comparisons and mean you could still run your modified code even if the special compiler went away. I took a compiler course in grad school, but I'm not a compiler expert. I'm looking for a compiler or similar tool (or code refactoring engine?) that I could modify to force it to inline classes at compile time. I looked at the source for javac, but since it is largely undocumented, I haven't been able to understand it enough to modify it. The apt tool does not seem appropriate since the source of every class that uses/references an extended primitive has to be modified. Is there some other compiler or tool out there that I should look at? Or maybe a compiler enthusiast/student who would be interested in such a project? > We need more hard data to convince them otherwise. You might want to rephrase that slightly, lest someone reads it as "I have made up my mind, and will now cook up some evidence to support it" :-) Check out existing research, such as (google will find more of the same; the magic words are "escape analysis"). > (eg subclasses of a special JavaExtendedPrimitive class) Such an approach quickly comes inconvenient, as you start to need PrimitiveStringBuffer, PrimitiveInteger, PrimitiveLinkedList, ... And not having the "object header" breaks things like polymorphism. > I looked at the source for javac, ... This isn't much of a javac issue, it's more of a JIT/dynamic compiler thing. You'd need to dive deep into Hotstpot. Good luck with that... Inventing new language structures for this is probably (and hopefully) not going to happen. There is a much much much better way to do most of "small quick structs" in a way that doesn't break a lot of the language, and makes it better than any "fairly restricted" hack. And that way may be one of the flying cars in Mustang: Thanks for the pointers, definitely some interesting reading. I hope that escape analysis does become a standard part of the JVMs. But even if that happens, it won't solve the most of the problem that I'd like to see solved through extended primitives. What I most want is to be able to create more complex objects by composing smaller entities (objects or extended primitives) without suffering the memory overheads currently associated with small objects. These complex objects are mostly long lived, (ie they escape any reasonable scope), so escape analysis is not a solution. What I primarily want is the direct embeding of extended primitives inside objects, not stack allocation of objects, which is just a nice side-benefit. For example, a triangle object might contain three vertices (Vector3f) and a color. That is four extra/unnecessary object references and headers (4X(4+8) = 48 bytes) of extra memory overhead if I use object composition. If I have millions of triangles, this quickly adds up to a very large overhead. If I inline the data fields directly into the triangle object, I can save all that space, but I lose much of the abstraction, end up duplicating code, and make the code harder to read and maintain. I understand from a pure ease-of-programming point of view, it is convenient if you can make everything an object (if all the world looks like a nail, then a hammer in the only tool you will ever need), but there is a cost to this approach (otherwise Java would never have had primitives in the first place). It would be nice to give programmers another tool to use in cases when they think the object overhead is too high. Since Java already has primitives, it is not a radical change to the language to support extended ones, though not a trivial one either. I take some offense at the suggestion that I might be suspected of cooking up data to support my position. I do believe that I'm right, but I am willing to be proven wrong (or more likely ignored unless I can show more evidence). There is some preliminary supporting data already in this thread for extended primitives, but clearly it has not convinced many people. It would be much more convincing if extended primitives could be tested in a more realistic program and not just a microbenchmark. Hence my suggestion to create a modified compiler to do just that. For my two pence worth, I think a lot of the requirement for adding new primitives comes from games developers, who feel the pain of vector churn in an environment that forces them to make every complex scalar type a class. With regards to your idea of creating a modified compiler, I see no need. You can benchmark the use of Vector3f as a class against Vector3f as a struct by using C#, which has supported the struct construct since its inception. I would be very interested to see such a comparison. Extended primitives is a great idea. It's also been called "lightweight objects". Kava: A Java dialect with a uniform object model for lightweight classes (2001) Kava even sports generics. Without autoboxing. Were this a perfect world, Kava would have become JDK 1.5 "Tiger". Versus whatever it is we have now. (Shout out to Gilad Bracha! Thanks buddy! Good job!) A language construct for tuples is also very useful. It would enable all those Java Grande applications. Adding Tuples to Java: a Study in Lightweight Data Structures (2002) Just quick word on stack allocated objects: Don't! IBM and others have been refining escape analysis techniques. That's when the JIT figures out that an object can be safely allocated on the stack (vs the heap) by determining that there are no external references to that instance. It's a bit like the automatic removal of unnecessary synchronization. As with automatic garbage collection, the computer can usually do a much better job of it than you can. It's sad, really, that Microsoft added that feature to C#. Probably just to be "different". Very smart people have already thought through all this stuff. It'd be to our advantage to learn from their efforts. You can also download the Pattern Enforcing Compiler (PEC) Particularly the compile API: As the name suggests a PEC enforces patterns. The relevant patterns are Immutable:... Value: and ImmutableValueConversions:... You can also write your own patterns. I think you are missing the point of extended primitives. They are not objects and have somewhat different semantics (eg pass-by-reference vs pass-by-value). What they gain is efficiency, not base functionality. Anything that can be done with extended primitives can be done with objects instead; its just often slower and requires more memory. Escape analysis can be used to gain this efficiency in certain limited cases, but is not possible in many others. The differences in semantics and memory organization can only be hidden by the compiler when they are limited to a very small scope (eg, provably only used within one method and thread). The immutables in the pattern enforcing compiler (PEC) are designed to enable a JVM to eliminate the memory overhead, see: The immutable classes are marked as immutable by implementing the interface Immutable therefore if the JVM wants to inline them it can (provided the class is also final or effectively final). When it inlines them the JVM: 1. Doesn't need the pointer to them - it has inlined them whether this be on a stack, inside a structure, or in an array 2. Doesn't need the extra word associated with garbage collection and synchronization since it is inlined and also immutable and therefore no point in implementing synchnization or garbage collection for them 3. Doesn't need the extra word associated with method dispatch because the class is final or effectively final and therefore the JVM can inline method calls Therefore the immutable as implemented by the PEC can be inlined by the JVM. However I have only written the compiler I haven't written a modified JVM that inlines. Its true that that at least in some cases a compiler can inline immutables, though there are a number of tricky cases such as: - atomicity of update (true when swapping a reference to an immutable objects, not true when updating a compound extended primitive) - the immutable class must be final. Part of extended primitives efficiency comes because the compiler always staticly know their type unlike objects. If an subclass of complex number might be assigned to a complex number reference, then inlining cannot be used even if the classes are immutable - arrays, collections etc. Immutable objects can be put in object arrays and collections while extended primitives cannot. I guess it might be made to look somewhat like autoboxing, but I'd much prefer arrays of extended primitives to look like primitive arrays, not arrays of objects (ie without the extra indirection and object overhead). - I'll have to think more to see if there are other problem cases The other problem of course is that if the JVM does not aggressively inline them, then using immutables actually make the object creation overhead and efficiency much worse. The immutable pattern is definitely useful and can really help in code readability and thread robustness. But its not clear to me that its a path to gaining the performance and efficiency gains that extended primitives would achieve. It sounds almost like you want tuples of primitives. I think that, properly implemented, tuples provide exactly what you're talking about. Picture the following: [code] // Initializing tuples. (int,int) point = (0, 0); (float,float) e_to_i = (0.54, 0.84); (int,String) address = (7165, "Pandora Street"); // Doing some geometry on points. (double,double) p1 = (7.8, 5.5); (double,double) p2 = (10.2,13.1); double distance = hypotenuse(p1, p2); double direction = atan2(p1, p2); // Tuple assignment, just like in Python. // norm_theta returns a (double,double) tuple. double dis, dir; (dis, dir) = norm_theta(p1, p2); [/code] After using Prolog, Haskell, and Python, I got pretty attached to tuples and tuple-notation. It's one of the things that I really miss when I use Java. Looking at your code I am not sure this warrants a new language construct, it seems. Surely a Tuple class with generics support would come quite close to this (though admittedly with a bit more verbosity) [pre] // Initializing tuples. Tuple Tuple Tuple // Doing some geometry on points. Tuple Tuple double distance = hypotenuse(p1, p2); double direction = atan2(p1, p2); double dis, dir; Tuple dis = tup.get(0); dir = tup.get(1); [/pre] J. > Looking at your code I am not sure this warrants a > new language construct, it seems. Surely a Tuple > class with generics support would come quite close to > this (though admittedly with a bit more verbosity) a) A generic-class implementation of tuples doesn't improve on space or speed at all. It would just be syntactic sugar. b) A generic-class implementation is impossible, because you can't have a variable number of parameters. I actually have some classes like this, called Pair and Triplet respectively. They're great for testing. By using a factory, they don't even need to have their parameters specified -- the generic inference system does it all for you. They're awesome, but still no substitute for real Tuples. The idea behind a Tuple is that it's a primitive -- and is passed by value, can be easily made immutable with the final keyword, and so on. The difference between a primitive Tuple and my Pair/Triplet classes is analogous to the difference between an array of ints and an ArrayList of Integers. You can see why this would be good. A quick look at the ridiculous number of packages that have been developed to provide implementations of the Collections API for primitive types demonstrates how important a robust set of primitives is. And Tuples would extend the power and flexibility of the existing Java primitives substantially. See the tuple request for enhancement for a discussion of tuples: In particular take a look at the proposed Tuple API suggested in that discussion that does enable primitives and also look at what people are saying about using tuples in public interfaces. To summarize the against position: 1. You can use a Tuple API 2. Do you really want (double, double) instead of Complex? The following compiler allows immutable types: and does not involve any new syntax. A JVM that recognised the immutable types could inline them. Therefore I think this feature can be added without major changes to Java. Immutables seems like an orthogonal idea to extended primitives to me. Immutables could be auto-inlined, but that is only a good idea if they are not widely shared (many references to the same immutable). Extended primitives are designed to make small entities (like complex numbers) as efficient as primitives (like int or float) are now. Immutable (final) ints are sometimes useful but frequently it is better to allow them to be modifiable. The Pattern Enforcing Compiler (PEC) enforces patterns as the name suggests. The relevant patterns are Immutable:... Value: and ImmutableValueConversions:... You can use these three patterns to achieve extended primitives, see integer example:... Particularly section that begins "A typical development cycle". A problem with allowing anyone to extend primitives is how they will interact with each other, i.e. will your double work well with my complex. This issue is addressed by the multiple dispatch pattern:... Particularly the "Numeric Example" section. Perhaps it might help the discussion if we looked at what would have to be changed in Java (compiler and/or JVM) to support extended primitives. Suppose we declared complex numbers as an extended primitive as follows extended_primitive ComplexNumber { double realPart; double imaginaryPart; public void add(Complex toAdd) { realPart += toAdd.realPart; imaginaryPart += toAdd.imaginaryPart; } ... } and some object that contains a complex number such as: class WaveFunction { ComplexNumber phase; ... } Directly embedding the ComplexNumber into WaveFunction could be handled by the compiler substituting two double fields into the WaveFunction object (phase_realPart and phase_imaginaryPart). Similarly extended primitives as function arguments (such as ComplexNumber.add()) could be handled by substituting the extended primitives constituent fields (internally add would take two arguments of type double). However there are other common uses that are not so simple such as: 1) [u]Returning an extended-primitive from a function[/u]. Currently Java has no clean way to return multiple values from a function (though many would like it to, as shown by RFE #4222792). It could be accomplished by allocating a hidden class to encapsulate the values until a better way is added or found. 2) [u]Arrays of extended-primitives[/u]. ComplexNumbers could be handled because they contain only one primitive type (double) and so could use a double array as backing store, but extended-primitives containing more than one type would be more difficult. They could be handled using ByteBuffer as long as they do not contain object references. 3) [u]Type equivalence[/u]. Although they could be thought of as simply tuples, we may want stronger typing. For example, we probably want a ComplexNumber to be a different type than a 2D point even if both consist of two doubles. 4) [u]Autoboxing/unboxing[/u]. While I'm not personally a fan of this, now that it has been added to the language, programmers will probably expect it. Unfortunately this means that every extended-primitive will also have to implicitly declare a corresponding Object class with the same fields. 5) [u]Reflection[/u]. Once added extended primitives would have to be supported in reflection which would certainly mean added some new methods (and likely classes) to support them. I think these are the major issues that would have to be addressed, though there may be others that I'm not remembering at the moment. However I think all of these issues could be addressed and extended primitives added without having to change the language very much. no way. You're destroying the entire OO concept, turning Java into C (which seems to be what a lot of the things here seem to want, probably thinking that Java should be C). Let's also declare a List, Map, Array, and a lot of other things all as primitives. Maybe introduce pointers so you can change the memory address that a method parameter refers to. Maybe I'd like to do something like void somemethod(SomeStruct* s) { SomeStruct* t; s = t; } and have the memory address s refers to change outside the function.... Not untill you add an emulsifier such as auto-boxiing ;) I think that there should be a mechanisum in place to extend "primitives". To bad that primitives are exposed as primitives otherwise it might make this easier. Should this support be a change in the langauge or could there be native support for it (JNI perhaps???) Hi, I've started a thread over at javalobby to discuss the different possible implementations of structs/extprims to find some common ground between the different proposals I've seen. I think structs are important and it would be good to get things moving by uniting all developers interested in structs/extprims for Java in a single thread. I'm inviting other developers that have suggested similar implemantions to participate too. Thanks, Sebastian Ferreyra Unfortunately the JavaLobby thread demonstrates the general confusion about what extended primitives are and are not. They are NOT: - A solution for easily reading/writing structured hunks of memory for communicating with code outside of Java (eg, Javolutions Union/Struct, CAS's "structs" as proposed in RFE #4820062, or java.nio.ByteBuffers). This would require the primitive's components to reside at prespecified memory offsets, which is not a good idea. The JVM should be free choose their layout in memory to optimize for platform specific alignment issues. - A solution for stack allocation of objects. Although extended primitives would be stack allocated when used as local variables just as primitives are now, extended primitives are not Objects (ie not subclasses of java.lang.Object). You cannot get a reference to one and they do not inherit Objects methods (eg, no wait(), hashCode(), or finalize()). Stack allocation of Objects requires escape analysis which may be added someday, but is a completely separate issue. They are: - A solution for entities. I've made some benchmarks: public class/struct Complex { private double re; private double im; public Complex(double re, double im) {...} public Complex add(Complex c2) { return new Complex(re + c2.re, im + c2.im); } ... } Complex[] c = new Complex[len]; for (int i = 0; i < len; i++) c[i] = new Complex(i, i); for (int i = 0; i < len; i++) c[i] = c[i].add(c[len -1 - i]); Testet with Java (class) and C# (struct): Java 800ms, C# 160ms C# with class: 900-1000ms Compare the "manual" version: double[] re = new double[len]; double[] im = new double[len]; for (int i = 0; i < len; i++) { re[i] = i; im[i] = i; } for (int i = 0; i < len; i++) { re[i] = re[i] + re[len -1 - i]; im[i] = im[i] + im[len -1 - i]; } C# and Java: 100-150ms I think structs can increase perfomance! Many C++ implementations will also pad a structure to a multiple of 8 bytes (e.g. 16). Then if you are allocating them separately on the heap the default new/malloc will add further header words (typically another 2), so we are now up to 24 bytes which is the same as Java. It is only when you want a large array of these objects that the difference is significant. Then you do get down to 16 bytes per element vs 28 for Java (including a word for the reference). Someone else suggested flattening these cases to something like: float[] x; float[] y; float[] z; While this achieves the efficiency the cost in maintenance is significant. Instead of just writing Complex.add(Complex a), we also have ComplexVector.add(Complex a), ComplexMatrix.add(Complex a), and many more combinations that require individual implementation (and extra opportunities for error). However, if a lightweight class system was implemented, it would also be very desireable to allow generics to be used with them (which would require code expansion rather than erasure). > new's can be particularly expensive (not so much > on single processor machines, but definitely on > multi-processor machines). What makes you think that allocation on multi-processors is more expensive? The HotSpot virtual machine has thread-local allocation regions so there's no locking required for allocations (except the ones that refill the thread-local regions, and we have heuristics to make that rare). Both allocation and synchronization were more expensive on multiprocessors at least under 1.4.2. See the discussion at:;acti... If you scroll down to my third post on that thread, you will see some benchmark numbers for single vs. dual processors. I haven't rechecked under 1.5, so this may have changed in 1.5. But saving some allocation is only a minor side-benefit of extended primitives. The real benefit is the ability to directly embed them in larger objects without the memory overhead of the extra object headers and references, and without the performance overhead of the extra indirection. Lacking the standard object header, which contains the class pointer and data for the object's lock, an extended primitive's type must be statically known at compile time, they cannot have virtual methods, and you cannot call wait() on one (i.e. they behave more like a primitive than like an subclass of Object). But the memory and performance savings would be well worth it for many things that would otherwise have to be represented as small objects. I like the idea of having some sort of downgraded struct. If you consider ints, longs etc. as a chunk of bytes (4,8 etc.), why not allow primitive types that are larger chunks of bytes. It boils down to having a byte[] with structured access (a bit like gather/scatter from NIO) Nice idea, reall! I don't understand why you need them. Ok, you save a few bytes here and there, but nothing big. You can easily create an array class for Vector3f: class Vector3fArray { private float[] x; private float[] y; private float[] z; ... } So, I don't buy the memory argument. As for performance I'm not sure there would even be a performance increase. Do you have any benchmarks that backs up your claims? Sorry, but class Vector3fArray { private float[] x; private float[] y; private float[] z; ... } Is very ugly and not OO. Consider Vector3f[] v = new Vector3f[1000]; The array would consume 1000 * 12 ~ 12K + array_overhead if Vector3f is a extended primitive. If Vector is a class Vector3f[] v = new Vector3f[1000]; for (int i = 0; i < 1000; i++) v[i] = new Vector3f(); would consume 4 * 1000 + 24 * 10000 ~ 28K!!! Another point: If you design a class, you have to decide if you make it mutable or immutable. If the class is mutable, you have good performance (maybe), but higher risk of errors. If you make it immutable, you have to create a new object if you do a change. > Sorry, but > > class Vector3fArray { > private float[] x; > private float[] y; > private float[] z; > ... > } > > Is very ugly and not OO. Why? You go on to show us an example with Vector3f[] why is an array of vectors more OO than a specialized Vector3f object? The proposed implementation Vector3fArray with its private arrays has the advantage of allowing varios implementations. For example you could use sparse arrays or some compacting technique to store your arrays if they were large. Whereas Vector3f[], even if a primitive would not have this advantage. A good library could solve the Vector problem. In fact you could use the envelope/letter idiom (See Coplien's Advanced C++) to implement this. How? You write cool classes that give you all the operations you like with a reasonable interface. But between each other these vector classes represent the vectors as simple 3d arrays. So in fact, your Vector3fArray stores an array of arrays of size 3, not the whole Vector3f object. Isn't this similar to the concept of a flyweight? I believe such a technique could give you even better space characteristic (maybe even performance) than a boxed up extprim feature. ::) With Complex[] you can multiply every element by some value using code like: Complex[] v; for (int i=0; i Now what happens if you have a ComplexVector? You either re-implement multiply to achieve efficiency or you extract a Complex value and then replace it with the result which will be slower. So why can't we have the simplicity of a single implementation of multiply without losing performance? This could almost be done entirely by the compiler, without changes to the VM. The compiler could just "inline" extended primitives into their constituent parts (e.g. if you have a "vector3f foo" field, the compiler could turn it into "float foo_x, foo_y, foo_z". I think there are only two problems with this approach. One is overloaded methods (i.e. if you have two methods foo(vector2f) and foo(complex2f), they would be turned into foo(float x, float y) and foo(float real, float imaginary), causing a conflict). This could be fixed by simply disallowing overloading methods such that this happens. The more serious problem arises from returning extended primitives. Since only one value can be returned, you'd have to encapsulate the extended primitive in a temporary object. Unless the VM can special-case these type of returns, you might have serious performance implications. For this reason, I think adding a "return multiple values" feature that is actually handled at the VM level would be a good idea. This sounds a lot like stack-based objects. Why not just allow some new sort of object construction that places the object on the stack? If it has finalizers, the allocator would set a flag in the stack indicating that finalizes must be run before the stack exited: Foo foo1 = new Foo("Heap"); Foo foo2 = new.local Foo("Stack"); It is different from stack allocated objects - you can put extprim structure inside heap allocated object. You can probably also make array of such structures. > It is different from stack allocated objects - you > can put extprim structure inside heap allocated > object. You can probably also make array of such > structures. But that sounds like an arbitrary constraint. Some memory constraint? Who said objects have to be large? Small objects can fit on the stack equally well. Suppose I had a Vector class I used all over and it had three float members. Now, to put it on the stack in your world, I've have to extract it to an 'extprim' because 1st-class objects can't be on the stack. So do I write adapter methods to go to/from the extprim represenation? Do I duplicate all of the logic in the methods of Vector? I just don't follow your reasoning to so narrowly defined what can be on the stack. Original idea here is to allow light-weight structures, to allow embedding substructures inside objects without using separate objects. Please forget about stack and reread original suggestion again. Basic points are passing by value, embedding directly into objects without being separate object, having 1000 element array of vector3f to be 1 objects instead of 1001 objects. Allocating on stack is just a one small feature which can be done by the way for free (as extprims would be probably mapped to number of primitive fields, so they would just fit in number of local variables on stack). What about methods for ext primitives ? As I understand the current proposal, they would not be able to modify variables of 'structure' ? In following example extprim vector3f { float x; float y; float z; void localNormalize() { float d = (float)Math.sqrt(x*x + y*y + z*z); x /= d; y /= d; z /= d; } vector3f normalize() { float d = (float)Math.sqrt(x*x + y*y + z*z); return vector3f(x/d,y/d,z/d); } } Would it be possible to have method localNormalize ? If yes, how it is supposed to work without pointer to 'this' - structure it is supposed to work on ? What about arrays of ext primitives ? Mapping of ext primitives to java.nio.ByteBuffer (to allow communicating with native structures, like opengl/network data) ? Reading through this, it looks ideal. It's not overly ambitious like Kava, and would fit in well with the existing language. If there was a page to vote for new features, C. Van Reeuwijk's proposal would get my vote.
https://www.java.net/node/643630
CC-MAIN-2015-27
refinedweb
5,295
62.78
Polymorphism means to view an object as several different things. Here's a simple example: A Fararri Enzo is a Fararri, which is a car, which is an automobile, which is a vehicle, which is an object. Depending on what you need to do with the object, you can view it in many different ways. In the above example, you don't really need to know all to much about the Fararri Enzo itself to drive it (err, I think. I've never actually driven one). In programming, polymorphism arises from inheritance/interface implementation. In the above example, the Fararri Enzo is some descendant of all the other objects. However, it's not possible to go the other way. A vehicle is not necessarily an automobile, it could be an airplane. However, if you really do have an automobile, you can by definition view the vehicle as an automobile. So why would we want this in programming? The key idea here is abstraction. When you're operating a Fararri Enzo, it's slightly important to know some of the features specific to that object, but in general it's just like driving any other car, so why not view it as just a car? It would make coding a lot easier. Also, the idea of polymorphism helps with code re-use. Code re-use was the original reason Java was developed. Instead of creating code for a robot to drive a Fararri Enzo, and then creating more code for the robot to drive a Porshe 911 etc., you can create code code for the robot to drive a car and be done. There are some important notices that come about when using polymorphism: Say you had 3 classes: Shape, rectangle, and circle. Rectangle and circle both are children of shape, shape has an area method, and rectangle and circle both implement it. public Shape { public double area() { return 0; } } public Rectangle extends Shape { double width, int height; public Rectangle(double width, double height) { this.width = width; this.height = height; } public double area() { return width * height; } } public class Circle extends Shape { double radius; public Circle(double radius) { this.radius = radius; } public double area() { return radius*radius*Math.PI; } } What should happen when you try to do this? public static void main(String[] args) { Shape shape = new Rectangle(5.0,3.5); System.out.println(shape.area()); shape = new Circle(3.4); System.out.println(shape.area()); } Hopefully you can see that it will first print out the area of that rectangle, then print out the area of the circle. It's using the child's methods instead of the class's methods that we are viewing it as! Doesn't this seem silly? We're viewing it as a shape, but it's using the Rectangle's/Circle's method! On closer examination, it becomes clear why this is the case: Even though you are viewing the Rectangle/Circle as a Shape, in reality they are still Rectangles/Circles, and thus their area must be computed in a specific way for each object. However, Shape tells us that for any given Shape/Shape sub-class, we can find the area using the .area() method. This is the case when driving cars: You turn the wheel to steer, press the pedal to accelerate, and press the brake to stop. However, how much you turn the wheel and how hard you press on the pedals depends on the type of car you're in, and these details are within that specific model's declaration. Happy coding
http://www.javaprogrammingforums.com/content/31-gen_cs_polymorphism.html
CC-MAIN-2017-47
refinedweb
593
64.1