text stringlengths 454 608k | url stringlengths 17 896 | dump stringclasses 91 values | source stringclasses 1 value | word_count int64 101 114k | flesch_reading_ease float64 50 104 |
|---|---|---|---|---|---|
DECUS C LANGUAGE SYSTEM Runtime Support Library Reference ManualDECUS C LANGUAGE SYSTEM Runtime Support Library Reference Manual
DECUS C LANGUAGE SYSTEM
Runtime Support Library
Reference Manual
by
Martin Minow
Edited by
Robert B. Denny
This document describes the RSX/VMS/RSTS/RT11 DECUS C language
system runtime support library.
DECUS Structured Languages SIG
Version of 11-Nov-83
NOTE
This software is made available without any support
whatsoever. The person responsible for an
implementation of this system should expect to have to
understand and modify the source code if any problems
are encountered in implementing or maintaining the
compiler or its run-time library. The DECUS
'Structured Languages Special Interest Group' is the
primary focus for communication among users of this
software.
UNIX is a trademark of Bell Telephone Laboratories. RSX,
RSTS/E, RT11 and VMS are trademarks of Digital Equipment
Corporation.
CHAPTER 1
INTRODUCTION
The C support library contains three major groups of functions:
o Functions called by the compiler to perform certain
mathematical operations (such as floating-point multiply
or function entrance) that are not performed in-line.
o Functions that may be called by C programs to perform
operations, such as copying a string, that are more
efficiently performed by optimized assembly language
subroutines.
o An implementation of (most of) the Unix Standard I/O
library.
CHAPTER 2
THE STANDARD LIBRARY
The RSX standard run-time library is in LB:[1,1]C.OLB. The RT11
standard run-time library is in C:CLIB.OBJ.
WARNING
This version of the library is somewhat incompatible
with previous versions of the Decus C compiler. This
incompatibility allows greater compatibility with Unix
Version 7, and the capability of generating global
references and definitions containing the radix-50 '$'
and '.' characters.
The standard I/O interface header file is in C:STDIO.H, or
LB:[1,1]STDIO.H and should be included in all C programs as
follows:
#include <stdio.h>
2.1 INTRODUCTION TO UNIX-STYLE STREAM I/O
This section presents an overview of the 'standard' I/O
interface for C programs. These routines have proven easy to
use and, while they do not provide the full functionality of RSX
or RMS, they give the programer essentially all that is needed
for everyday use. The discussion includes the following:
- Opening and closing files
- Reading data from files
- Writing data to files
Note that this file system is limited: files are sequential
with only a limited amount of random-access capability. Also,
little of the power of RMS/FCS is available. On the other hand,
the limitations make C programs easily transportable to other
C Runtime Support Library
Page 2-2
Reference Manual
operating systems.
When a C program is started, three files are predefined and
opened:
stdin The 'standard' input file
stdout The 'standard' output file
stderr The 'standard' error file
Stderr is always assigned to the command terminal. Stdin and
stdout are normally assigned to the command terminal, but may be
reassigned or closed when the program starts.
2.2 OPENING AND CLOSING FILES
The fopen and fclose functions control access to files. They
are normally used as follows:
#include <stdio.h> /* Define standard I/O */
FILE *ioptr; /* Pointer to file area */
...
if ((ioptr = fopen("filename", "mode")) == NULL)
error("Can't open file");
All information about an open file is stored in a buffer whose
address is returned by fopen(). The buffer is dynamically
allocated when the file is opened and deallocated when the file
is closed. Its format is described under the heading IOV. The
mode string contains flags defining how the file is to be
accessed:
r Read only
w Write new file
a Append to existing file (or write new)
(Doesn't work on RT11 modes).
It also defines some record-control information:
n No newlines mode ('binary' files)
u RSX: The user program allocates record buffers
RT11: Console output is done using .ttyout
If mode 'n' is specified, the RSX I/O routines do not interpret
the end of a RMS logical record as defining the end of a
human-readable line. This is necessary to process 'binary'
information. On RT11, the I/O routines do not remove
carriage-returns from input files, nor do they insert
carriage-returns when newlines are output.
Mode 'u' is treated differently on RSX and RT11. If specified
on RSX the user maintains the file's record buffer. The program
may only call the fget() and fput() routines. Each such call
will be translated directly to an RMS/FCS GET$ or PUT$ call.
C Runtime Support Library
Page 2-3
Reference Manual
(In RT11 mode, fput() may be used to write binary records which
are subsequently read by fget(). The file should be opened with
'n' mode.)
If mode 'u' is specified on RT11 mode when opening the console
terminal, single character output will be performed (using the
RT11 monitor routine .ttyout). If not specified, output will be
one line at a time (using the monitor routine .print). The
library initialization process opens stderr in mode 'u' and
stdout in normal mode. This means that mixing I/O to both units
will result in synchronization problems. To obtain
single-character output on stdout, the program need simply
execute:
if (freopen("tt:", "wu", stdout) == NULL) error("");
The program calls fclose(ioptr) to terminate processing on a
file. This closes the file and reclaims system-controlled
buffer space. fmkdl(ioptr) may be called to close and delete an
open file.
2.3 READING DATA FROM A FILE
The simplest way to read a file is to call the getchar() or
getc() routines which read the next character from a file. For
example, the following program counts the number of characters
in a file:
#include <stdio.h>
main()
{
register int ccount;
register int lcount;
register int c;
FILE *ioptr;
if ((ioptr = fopen("foo.bar", "r")) == NULL)
error("Cannot open file");
ccount = 0;
lcount = 0;
while ((c = getc(ioptr)) != EOF) {
count++;
if (c == '\n') lcount++;
}
printf("%d characters, %d lines.\n",
ccount, lcount);
}
Other input routines include:
gets Read a line from the standard input
fgets Read a line from a file
fgetss Read a line from a file, remove terminator
C Runtime Support Library
Page 2-4
Reference Manual
ungetc Push one character back on a file
fseek Position the file to a specific record
These routines are used together with the ferr() and feof()
functions which allow testing for error and end of file
conditions, respectively. The package assumes that all error
conditions are lethal and force end of file.
2.4 WRITING DATA TO A FILE
There are several routines for data output which are directly
analagous to the data input routines:
putchar Write a character to standard output
putc Write a character to a specified file
puts Write a string to the standard outpt
fputs Write a string to a specified file
fputss Write a record to a specified file
ftell Return record location (for fseek)
In addition, the printf() or fprintf() routine is used to format
and print data (as was shown in the previous example). Printf()
is flexible, powerful, and easy to use; and is perhaps the
single most important routine in the file system.
2.5 INTERACTION WITH THE OPERATING SYSTEM
The support library attempts to provide a consistant operating
system interface on several implementations of quite different
operating systems. The possiblities include:
o Native RT11
o Native RSX-11M or IAS
o RT11 emulated on RSTS/E
o RSX-11M emulated on RSTS/E
o RSX-11M emulated on VAX/VMS
This section mentions the inconsistencies and random bugs that
are more or less intentionally present.
2.5.1 Logical Unit Numbers
RT11, RSTS/E, and RSX-11M use small integers to number all I/O
channels. Unfortunately, the numbering is not consistent and
channel usage differs among the various systems. This has
resulted in several quirks:
C Runtime Support Library
Page 2-5
Reference Manual
o On RT11, console terminal interaction uses the .ttyout
and .print monitor functions. While no device is opened
by the fopen() function, an channel number is reserved.
o On RSX-11M, a channel must be allocated to the console
terminal. When a C program starts, the 'command
terminal' is opened on logical unit 1 and assigned to
stderr. This is not done using the fopen() routine
(although the stderr IOV structure is defined as if
fopen() were called). Also, fclose() cannot close
stderr.
In addition to the standard I/O routines, there are two
routines, msg() and regdmp(), that direct output to
logical unit 1. These routines were used to debug the
library, and are otherwise useful for disasters. Note
that, on RT11, msg() and regdmp() use the .print monitor
function.
o On both systems, the first true files are stdin and
stdout. These are opened on logical units 0 and 1
(RT11) or 2 and 3 (RSX). Code in fclose() double-checks
that the logical unit number of the file being closed
corresponds to the proper slot in the logical unit
table.
o Since the standard I/O routines know little about the
operating system, they do not deal with certain special
features.
For example, on RT11, the 'user service routine' (USR)
is used to open files. The file open routine does not
attempt to locate IOV areas so that the USR does not
swap over them. This can be a problem for very large
programs.
On RSX, logical unit numbers are assigned dynamically.
This means that 'LUN assignment' cannot be reliably
performed by task-build control files (or task
initiation).
2.5.2 Wild-Card Files
The fwild() and fnext() routines can be used to process
'wild-card' files.
On RSX-11M and VMS/RSX emulation, the file name, extension,
and/or file version may be expressed as '*' to indicate
wild-card support. Due to restrictions in the RSX-11 Files-11
structure (ODS1), the ' ', ';0' and ';-1' version numbers will
NOT function properly on native RSX-11. This means that '*.MAC'
C Runtime Support Library
Page 2-6
Reference Manual
will not work, for instance. The algorithm in fwild() depends
on the directory being sorted, as it is in the ODS2 file
structure used on VAX/VMS. If you sort the directory to be used
in an fwild() operation (use the SRD program available from
DECUS with the /WB switch) in order of decreasing file version
numbers, then the " ", ";0", and ";-1" versions will work.
Wild-card devices, units, or UIC codes are not supported. Note
that, on RSX11 emulated on VMS, the ';-1' (earliest version)
requires special processing by the user program, as noted in the
description of fwild().
On RSX-11M emulated on RSTS/E, the file name and/or extension
may contain '*' or '?' wild-cards. Wild-card devices, units, or
UIC (PPN) codes are not supported.
On RT-11, the file name and/or extension may contain '*', '%' or
'?' wild cards. The '?' wild-card is synonymous with '%'.
Wild-card devices, or units are not supported. Since wild-card
support is not an RT-11 system service, the filespec parsing and
directory operations are handled by the C library fwild() and
fnext() functions. The fwild/fnext module requires about 480
words of storage. Also, a file opened by wild-card uses a 1024
byte buffer, twice the normal size, which is shared between data
and directory operations.
2.5.3 Memory allocation
Memory is allocated using the malloc() function. It works
correctly on all operating systems, expanding memory on RSX and
RT11/RSTS. On 'native' RT11, all available memory is allocated
by invoking the monitor .settop function with a '-2' argument.
Neither library supports extended memory (PLAS) directives.
The sbreak() routine may be used for permanent allocation of
memory. Once memory has been allocated using sbreak(), it
cannot be freed.
CHAPTER 3
LIBRARY FUNCTION DESCRIPTIONS
This chapter contains descriptions of each of the C-callable
runtime library functions.
In most cases the I/O functions match those of UNIX V7 closely,
with differences normally called out. For more information,
consult "The C Programming Language" by Brian Kernighan and
Dennis Ritchie (Englewood Cliffs, NJ: Prentice-Hall,
ISBN 0-13-110163-3).
abs Integer absolute value
abs(val)
int val;
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project | https://manualzz.com/doc/19806570/decus-c-language-system-runtime-support-library-reference... | CC-MAIN-2021-17 | refinedweb | 2,053 | 53.51 |
Snowplow JavaScript Tracker 2.4.0 released
We are pleased to announce the release of version 2.4.0 of the Snowplow JavaScript Tracker! This release adds support for cross-domain tracking and a new method to track timing events.
Read on for more information:
- Tracking users cross-domain
- Tracking timings
- Dynamic handling of single-page apps
- Improved PerformanceTiming context
- Other improvements
- Upgrading
- Documentation and help
1. Tracking users cross-domain
Version 2.4.0 of the JavaScript Tracker adds support for tracking users cross-domain. When a user clicks on one of the links you have specified (or navigates to that link using the keyboard), the Tracker adds the user’s domain user ID together with a timestamp for the click to the querystring of that link in an “_sp=…” querystring field. If the JavaScript Tracker is also present on the destination page, it will send the URL of the page - including the new querystring field - with all events.
Snowplow r63 (coming soon), will add new
refr_domain_userid and
refr_dvce_tstamp fields to the
atomic.events table, which will then be populated based on the “_sp” field.
You can control which links should be decorated using a filter function. For each link element on the page, the function will be called with that link as its argument. If the function returns
true, event listeners will be added to the link and will decorate it when the user navigates to it.
To enable cross-domain tracking, add this function to the tracker constructor argmap with the key “crossDomainLinker”.
For example, this function would only decorate those links whose destination is “” or whose HTML id is “crossDomainLink”:
snowplow('newTracker', 'cf', 'd3rkrsqld9gmqf.cloudfront.net', { crossDomainLinker: function (linkElement) { return (linkElement.href === "" || linkElement.id === "crossDomainLink"); } });
If you want to decorate every link to the domain github.com:
snowplow('newTracker', 'cf', 'd3rkrsqld9gmqf.cloudfront.net', { crossDomainLinker: function (linkElement) { return /^https:\/\/github\.com/.test(linkElement.href); } });
If you want to decorate every link, regardless of its destination:
snowplow('newTracker', 'cf', 'd3rkrsqld9gmqf.cloudfront.net', { crossDomainLinker: function (linkElement) { return true; } });
If new links are added to the page after the tracker is initialized, you can enable decoration for them using the
crossDomainLinker tracker method:
snowplow('crossDomainLinker', function (linkElement) { return (linkElement.href === "" || linkElement.id === "crossDomainLink"); })
2. Tracking timings
The new
trackTiming method can be used to track user timing information. This example uses the method to send a
timing event describing how long it took a map to load:
snowplow( 'trackTiming', 'load', // Category of the timing variable 'map_loaded', // Variable being recorded 50, // Milliseconds taken 'Map loading time' // Optional label );
You can see the JSON schema for the event that the method generates here.
3. Dynamic handling of single-page apps
Previous versions of the JavaScript Tracker would retrieve the page’s URL and referrer’s URL on page load and never update them. This was problematic for single-page applications (SPAs), with Snowplow users resorting to manually setting a custom page/referrer URLs whenever the URL changed inside the SPA.
Version 2.4.0 of the Tracker automatically detects when the page URL changes and updates the page URL and referrer accordingly. The referrer is replaced by the old page URL. Note that you must send at least one event each time the URL changes, because the Tracker will not notice a skipped URL. This means that if the user navigates from
page1 to
page2 to
page3, but no events are fired while on
page3, the referrer reported for all events fired on
page3 will stil be
page1.
When you use the
setCustomUrl, the page URL reported by the Tracker will “stick” at the supplied value until the JavaScript Tracker is reloaded - unless of course you call
setCustomUrl again. Setting the referrer URL using
setReferrerUrl is similarly sticky.
4. Improved PerformanceTiming context
We recently added the ability to add a context containing data from the Navigation Timing API to all events. At the time the context gets constructed, some of the timing metrics (typically
loadEventEnd,
loadEventStart, and
domComplete) are usually not yet available.
With this releaes, the context is recalculated with every event instead of being cached, so missing timing metrics will be added to subsequent events as soon as those metrics become available.
5. Other improvements
We have also:
- Started adding common contexts (including the
PerformanceTimingcontext) to
form_change,
form_submit, and
link_clickevents, the only event types to which they were not already automatically added if enabled #340
- Increased the reliability of the JavaScript Tracker’s document size detection #334
- Started randomly generating the ngrok subdomain used for our integration tests to prevent clashes when the tests are run more than once simultaneously #333
- Updated the Vagrant setup to work with the latest version of Peru #336
6. Upgrading
The upgraded minified tracker is available here:
http(s)://d1fc8wv8zag5ca.cloudfront.net/2.4.0/sp.js
This release is fully backward-compatible.
7. Documentation and help
- The setup guide
- The full API documentation
The v2.4.0 release page on GitHub has the full list of changes made in this version.
Finally, if you run into any issues or have any questions, please raise an issue or get in touch with us via the usual channels. | https://snowplowanalytics.com/blog/2015/03/15/snowplow-javascript-tracker-2.4.0-released/ | CC-MAIN-2019-18 | refinedweb | 863 | 51.89 |
Problem with adding our plugin to execute run_tests.sh
Hi, I want to write unit test cases and test them using run_tests script. We have installed openstack with devstack. We are able to run openvswitch tests using run_tests.sh. This was the command we used. ./run_tests.sh -N neutron.tests.unit.openvswitch
Also, we are able to run brocade and plumgrid test cases using the similar command as above.
Now, we have added our plugin code at neutron/plugins/. and unit test code at neutron/tests/unit/.
But when tried the similar command for our plugin, we are facing issues.
import errors0neutron.tests.unit.my_plugin.test_my_plugin\xc9\xf1\xdaj', stderr=None error: testr failed (3) running=OS_STDOUT_CAPTURE=1 OS_STDERR_CAPTURE=1 OS_LOG_CAPTURE=1 ${PYTHON:-python} -m subunit.run discover -t ./ neutron/tests --list
I have few doubts,
when i added my test code, the tests for other plugins are also failing. When I run "python setup.py build" it is not picking my plugin. And in neutron.egg-info/SOURCES.txt my plugin files list is not there.
Any help is appreciated. | https://ask.openstack.org/en/question/14270/problem-with-adding-our-plugin-to-execute-run_testssh/ | CC-MAIN-2020-45 | refinedweb | 181 | 62.95 |
Open source C/C++ unit testing tools, Part 3
Get to know CppTest
Content series:
This content is part # of # in the series: Open source C/C++ unit testing tools, Part 3
This content is part of the series:Open source C/C++ unit testing tools, Part 3
Stay tuned for additional content in this series.
This article, the last in a series on open source tools for unit testing, takes a detailed
look into
CppTest, a powerful framework by Niklas Lundell.
CppTest's greatest asset is that it's simple to understand
and easy to adapt and use. Learn how to create unit tests and test suites using
CppTest, test fixture design, and customize regression
log formatting while becoming familiar with several useful
CppTest-provided macros. If you're a more advanced user,
this article also provides a comparison between the
CppUnit
and
CppTest frameworks.
Installation and usage
CppTest is available as a free download from Sourceforge
(see Related topics) under the GNU Lesser General Public
License (GPL). Building the sources follows the usual open source configure-make
format. The result is a static library named libcpptest. The client code
must include the header file cppTest.h, which is part of the downloaded sources,
as well as a link against the static library libcpptest.a. This article is based on
CppTest version 1.1.0.
What is a test suite?
Unit testing is meant to test specific sections of the source code. In its simplest form,
this testing involves a collection of
C/C++ functions
testing other
C/C++ code.
CppTest
defines a class called
Suite within the
Test namespace that provides the basic test suite
functions. User-defined test suites are required to extend this functionality
by defining functions that work as actual unit tests. Listing 1
defines a class named
myTest that has two functions,
each of which tests a piece of source code.
TEST_ADD
is a macro meant to register the tests.
Listing 1. Extending the basic Test::Suite class
#include “cppTest.h” class myTest : public Test::Suite { void function1_to_test_some_code( ); void function2_to_test_some_code( ); myTest( ) { TEST_ADD (myTest::function1_to_test_some_code); TEST_ADD (myTest::function2_to_test_some_code); } };
Extending the test suite
You can easily extend the test suite's functionality to create a hierarchy of test suites. The need for doing something like this stems from the fact that each test suite might test some specific code area—for example, a test suite for parsing, code generation, code optimization—for a compiler, and the hierarchy makes for better management over time. Listing 2 shows how you can create such a hierarchy.
Listing 2. Creating a unit test hierarchy
#include “cppTest.h” class unitTestSuite1 : public Test::Suite { … } class unitTestSuite2 : public Test::Suite { … } class myTest : public Test::Suite { myTest( ) { add (std::auto_ptr<Test::Suite>(new unitTestSuite1( ))); add (std::auto_ptr<Test::Suite>(new unitTestSuite2( ))); } };
The
add method belongs to the
Suite
class. Listing 3 shows its prototype (sourced from the header
cpptest-suite.h).
Listing 3. The Suite::add method declaration
class Suite { public: … void add(std::auto_ptr<Suite> suite); ... } ;
Running the first test
The
run method of the
Suite
class is responsible for the execution of the tests. Listing 4
shows the test run.
Listing 4. Running a test suite in verbose mode
#include “cppTest.h” class myTest : public Test::Suite { void function1_to_test_some_code( ) { … }; void function2_to_test_some_code( ) { … }; myTest( ) { TEST_ADD (myTest::function1_to_test_some_code); TEST_ADD (myTest::function2_to_test_some_code); } }; int main ( ) { myTest tests; Test::TextOutput output(Test::TextOutput::Verbose); return tests.run(output); }
The
run method returns a Boolean value that is
set to True only if all the individual unit tests were successful. The argument
to the
run method is an object of type
TextOutput. The
TextOutput
class handles printing the test log. By default, the log is dumped onto the screen.
In addition to verbose mode, there's terse mode. The difference between these two modes is that verbose mode prints line number/file name information for assertion fails in individual tests, while terse mode only provides a count of the tests that passed or failed.
Continuing after failure
So, what happens if a single test fails? The decision on whether to continue rests
solely with the client code. The default behavior is to continue executing the
other tests. Listing 5 shows the prototype for the
run method.
Listing 5. Prototype for the run method
bool Test::Suite::run( Output & output, bool cont_after_fail = true );
The second argument to the
run method needs to
be False for situations in which the regression must exit after detection of
the first fail. It might not be obvious when the second flag should be set to
False, however. Assume that the client code is trying to write information
to a disk that is 100% full: The code will fail, and all further tests in that
suite that have similar behavior will fail, too. It makes sense to stop
regressions immediately in this situation.
Understanding output formatters
The idea behind output formatters is that you may need to have the regression run
report in different formats: text, HTML, and so on. Hence, the
run
method itself does not dump the results, but accepts an object of type
Output, which is responsible for displaying the results.
Three different kinds of output formatters are available in
CppTest:
Test::TextOutput. This is the simplest of all output handlers. The display mode could be either verbose or terse.
Test::CompilerOutput. The output is generated in a manner resembling a compiler build log.
Test::HtmlOutput. Fancy HTML output.
By default, all three formatters dump their output on
std::cout.
The constructors for the first two formatters accept an argument of type
std::ostream, which is indicative of where the
output should be dumped—in a file for future perusal, for example. You
may also choose to create a customized version of the output formatter. To do so,
the only requirement is that the user-defined formatter be derived from
Test::Output. To understand the different output
formats, consider the code in Listing 6.
Listing 6. Running the TEST_FAIL macro in terse mode
#include “cppTest.h” class failTest1 : public Test::Suite { void always_fail( ) { TEST_FAIL (“This always fails!\n”); } public: failTest1( ) { TEST_ADD(failTest1::always_fail); } }; int main ( ) { failTest1 test1; Test::TextOutput output(Test::TextOutput::Terse); return test1.run(output) ? 1 : 0; }
Note that
TEST_FAIL is a predefined macro in cppTest.h
that causes an assertion fail. (More on this later.) Listing 7
shows the output.
Listing 7. Terse output showing only the fail count
failTest1: 1/1, 0% correct in 0.000000 seconds Total: 1 tests, 0% correct in 0.000000 seconds
Listing 8 shows the output when you run the same code in the verbose mode.
Listing 8. Verbose output showing file/line information, the message, test suite information, and so on
failTest1: 1/1, 0% correct in 0.000000 seconds Test: always_fail Suite: failTest1 File: /home/arpan/test/mytest.cpp Line: 5 Message: "This always fails!\n" Total: 1 tests, 0% correct in 0.000000 seconds
Next, the code for using the compiler style formatting is shown in Listing 9.
Listing 9. Running the TEST_FAIL macro with compiler-style output formatting
#include “cppTest.h” class failTest1 : public Test::Suite { void always_fail( ) { TEST_FAIL (“This always fails!\n”); } public: failTest1( ) { TEST_ADD(failTest1::always_fail); } }; int main ( ) { failTest1 test1; Test::CompilerOutput output; return test1.run(output) ? 1 : 0; }
Note the similarity in syntax with the GNU Compiler Collection (GCC)-generated compile log shown in Listing 10.
Listing 10. Terse output showing only the fail count
/home/arpan/test/mytest.cpp:5: “This always fails!\n”
By default, the compiler-formatted output is the GCC-style build log. However, it is possible to get the output in Microsoft® Visual C++® and Borland compiler formats, too. Listing 11 generates the Visual C++-style log that is dumped into an output file.
Listing 11. Running the TEST_FAIL macro with compiler-style output formatting
#include <ostream> int main ( ) { failTest1 test1; std::ofstream ofile; ofile.open("test.log"); Test::CompilerOutput output( Test::CompilerOutput::MSVC, ofile); return test1.run(output) ? 1 : 0; }
Listing 12 shows the content of the file test.log after the execution of the code in Listing 11.
Listing 12. Virtual C++-style compiler output
/home/arpan/test/mytest.cpp (5) : “This always fails!\n”
Finally, here goes the fanciest of them all: the code for
HtmlOutput
usage. Note that the HTML formatter does not accept a file handle in the
constructor, but instead relies on the
generate
method. The first argument to the
generate method
is an object of type
std::ostream with default
value
std::cout (see the source header file
cpptest-htmloutput.h for details). You may use a file handle to redirect the
log elsewhere. Listing 13 provides an example.
Listing 13. HTML-style formatting
#include *<ostream> int main ( ) { failTest1 test1; std::ofstream ofile; ofile.open("test.log"); Test::HtmlOutput output( ); test1.run(output); output.generate(ofile); return 0; }
Listing 14 shows part of the HTML output generated in test.log.
Listing 14. Snippet from the generated HTML output
… <table summary="Test Failure" class="table_result"> <tr> <td style="width:15%" class="tablecell_title">Test</td> <td class="tablecell_success">failTest1::always_fail</td> </tr> <tr> <td style="width:15%" class="tablecell_title">File</td> <td class="tablecell_success">/home/arpan/test/mytest.cpp:18</td> </tr> <tr> <td style="width:15%" class="tablecell_title">Message</td> <td class="tablecell_success">"This always fails!\n"</td> </tr> </table> …
All about test fixtures
Unit tests that form part of the same test suite often have the same set of
initialization requirements: You must create objects with certain parameters,
open file handles/operating system ports, and so on. Instead of repeating the same
code in each class method, a better way of approaching this issue is to use some
common initialization and exit routines that are called for each test. You must
define the setup and tear-down methods as part of his test suite.
Listing 15 defines the test suite
myTestWithFixtures, which uses fixtures.
Listing 15. Creating a test suite with fixtures
#include “cppTest.h” class myTestWithFixtures : public Test::Suite { void function1_to_test_some_code( ); void function2_to_test_some_code( ); public: myTest( ) { TEST_ADD (function1_to_test_some_code); TEST_ADD (function2_to_test_some_code); } protected: virtual void setup( ) { … }; virtual void tear_down( ) { … }; };
Note that you don't need to make any explicit calls to the setup and tear-down
methods. These routines don't need to be declared virtual unless you have plans
to extend the test suite at a later time. Both routines must be of return type
void and accept no arguments.
Learning the macros in CppTest
CppTest provides several useful macros that you use in
the actual methods that test the client source code. These macros are internally
defined in cpptest-assert.h, which cpptest.h includes. Some of the macros and
their potential use cases are described next. Note that unless otherwise stated,
the output shown is provided using verbose mode.
TEST_FAIL (message)
This macro, shown in Listing 16, is meant to imply
unconditional failure. A typical situation in which you could use this macro
is handling the results of a client function. If the result does not tally
with any of the expected results, then an exception along with the message
is thrown. When the
TEST_FAIL macro gets hit,
no further code in that specific unit test is executed.
Listing 16. Client code using the TEST_FAIL macro
void myTestSuite::unitTest1 ( ) { int result = usercode( ); switch (result) { case 0: // Do Something case 1: // Do Something … default: TEST_FAIL (“Invalid result\n”); } }
TEST_ASSERT (expression)
This macro is similar to the
C assert library routine,
except that
TEST_ASSERT works both in debug and
release builds. If the expression is verified to be False, then an error is flagged.
Listing 17 shows the internal implementation for this macro.
Listing 17. TEST_ASSERT macro implementation
#define TEST_ASSERT(expr) \ { \ if (!(expr)) \ { \ assertment(::Test::Source(__FILE__, __LINE__, #expr)); \ if (!continue_after_failure()) return; \ } \ }
TEST_ASSERT_MSG (expression, message)
This macro is similar to
TEST_ASSERT except that
when the assertion fails, the message shows up in lieu of the expression
in the output. Here's an assertion with and without the message.
TEST_ASSERT (1 + 1 == 0); TEST_ASSERT (1 + 1 == 0, “Invalid expression”);
Listing 18 shows the output when this assertion is hit.
Listing 18. Output from the TEST_ASSERT and TEST_ASSERT_MSG macros
Test: compare Suite: CompareTestSuite File: /home/arpan/test/mytest.cpp Line: 91 Message: 1 + 1 == 0 Test: compare Suite: CompareTestSuite File: /home/arpan/test/mytest.cpp Line: 92 Message: Invalid Expression
TEST_ASSERT_DELTA (expression1, expression2, delta)
An exception is thrown if the difference between expression1 and expression2 exceeds delta. This macro is particularly useful when expression1 and expression2 are floating-point numbers—for example, depending on how the rounding off is actually done, 4.3 may be stored as 4.299999 or 4.300001, and as such, a delta is needed for the comparison to work. Yet another example is testing the code for operating system I/O: The time it takes to open a file can't be the same every time, but it has to be within a certain range.
TEST_ASSERT_DELTA_MSG (expression, message)
This macro is similar to the
TEST_ASSERT_DELTA
macro, except that when the assertion fails, a message is also issued.
TEST_THROWS (expression, exception)
This macro verifies the expression and expects an exception. An assertion is triggered if no exception is caught. Note that the actual value of the expression is not put to any test: It is the exception that is being tested. Consider the code in Listing 19.
Listing 19. Handling integer exceptions
class myTest1 : public Test::Suite { … void func1( ) { TEST_THROWS (userCode( ), int); } public: myTest1( ) { TEST_ADD(myTest1::func1); } }; void userCode( ) throws(int) { … throw int; }
Note that the return type of the
userCode routine
is immaterial: It might as well be a double or an integer. Because
userCode is throwing an exception of type
int unconditionally here, the test will pass fine.
TEST_THROWS_ANYTHING (expression)
Sometimes, the client routine throws different kinds of exceptions depending on
the situation. To handle this situation, you have the
TEST_THROWS_ANYTHING macro, which does not
specify an expected exception type. As long as some exception is caught after
execution of the client code, the assertion will not be fired.
TEST_THROWS_MSG (expression, exception, message)
This macro is similar to
TEST_THROWS, except that in
this case, the message is printed, not the expression. Consider the following
code:
TEST_THROWS(userCode( ), int); TEST_THROWS(userCode( ), int, “No expected exception of type int”);
Listing 20 displays the output when these assertions fail.
Listing 20. Output from the TEST_THROWS and TEST_THROWS_MSG macros
Test: func1 Suite: myTest1 File: /home/arpan/test/mytest.cpp Line: 24 Message: userCode() Test: func2 Suite: myTest1 File: /home/arpan/test/mytest.cpp Line: 32 Message: No expected exception of type int
Comparison between CppUnit and CppTest
Part 2 of this
series dealt with
CppUnit, the other popular choice
of open source unit testing frameworks.
CppTest is a
much simpler framework than
CppUnit, but it gets the
job done. Here's a quick comparison of how these two powerful tools match up
against one another:
- Ease of creating a unit test and test suite. Both
CppUnitand
CppTestcreate unit tests of class methods, with the class itself derived from some tool-provided
Testclass. The syntax for
CppTestis slightly simpler, though, with the test registration happening inside the class constructor. In the case of
CppUnit, the additional macros
CPPUNIT_TEST_SUITEand
CPPUNIT_TEST_SUITE_ENDSare needed.
- Running the tests.
CppTestsimply calls the
runmethod on the test suite, while
CppUnituses a separate
TestRunnerclass whose
runmethod is invoked for running the tests.
- Extending the testing hierarchy. In the case of
CppTest, it is always possible to extend the previous test suite by creating a new class that inherits from the old one. The new class will define some additional functions that add to the unit test pool. You simply invoke the
runmethod on the object of the new class type.
CppUnit, in contrast, requires that you use the macro
CPPUNIT_TEST_SUB_SUITEalong with class inheritance to achieve the same effect.
- Generating formatted output. Both
CppTestand
CppUnithave the ability to customize the output. However, although
CppTesthas a useful, predefined HTML output formatter,
CppUnitdoes not. However,
CppUnitexclusively supports XML formatting. Both support text and compiler style formats.
- Creating test fixtures. To use test fixtures,
CppUnitrequires that the test class be derived from
CppUnit::TestFixture. You must provide definitions for the setup and tear-down routines. In the case of
CppTest, you need to provide definitions only for the setup and tear-down routines. This is definitely a better solution, as it keeps the client code simple.
- Predefined utility macro support. Both
CppTestand
CppUnithave a comparable set of macros for asserts, handling floats, and so on.
- Header files.
CppTestrequires that you include a single header file, while
CppUnitclient code must include multiple headers, like HelperMacros.h and TextTestRunner.h, depending on the features used.
Conclusion
Unit testing is fundamental to how you develop today's software, and
CppTest
is yet another tool in the
C/C++ developer's arsenal to
tackle code testing, thereby avoiding maintenance hassles. It is interesting to note
that all three tools covered in this three-part series—the Boost testing
framework,
CppUnit, and
CppTest—use
the same basic concepts, such as fixtures, macros for assertions, and output
formatters. Each tool being open source, you could easily further customize the
code for your needs (for example, an XML outputter for
CppTest).
What are you waiting for?
Downloadable resources
Related topics
CppTest: Visit the project page at Sourceforge.net.
- "Open source C/C++ unit testing tools, Part 1: Get to know the Boost unit test framework" (developerWorks, December 2009): This article explains the Boost unit testing framework for C/C++-based products.
- "Open source C/C++ unit testing tools, Part 2: Get to know CppUnit" (developerWorks, January 2010): Read this article to get more information on CppUnit, the C++ port of the JUnit test framework.
- Download
CppTest: Get the latest version of
CppTest.
- IBM product evaluation versions: Get your hands on application development tools and middleware products from DB2®, Lotus®, Rational®, Tivoli®, and WebSphere®. | https://www.ibm.com/developerworks/aix/library/au-ctools3_ccptest/index.html | CC-MAIN-2017-17 | refinedweb | 2,978 | 56.15 |
Reproductive capacity of free-roaming domestic cats and kitten survival rate.
ABSTRACT To determine reproductive capacity of naturally breeding free-roaming domestic cats and kitten survival rate.
Prospective cohort and retrospective cross-sectional study.
2,332 female cats brought to a trap-neuter-return clinic for neutering and 71 female cats and 171 kittens comprising 50 litters from a cohort study of feral cats in managed colonies..
Results illustrate the high reproductive capacity of free-roaming domestic cats. Realistic estimates of the reproductive capacity of female cats may be useful in assessing the effectiveness of population control strategies.
Article: Evaluation of animal control measures on pet demographics in Santa Clara County, California, 1993-2006.[show abstract] [hide abstract].PeerJ. 01/2013; 1:e18.
Article: Costs and Benefits of Trap-Neuter-Release and Euthanasia for Removal of Urban Cats in Oahu, Hawaii.[show abstract] [hide abstract]
ABSTRACT:.Conservation Biology 09/2012; · 4.36 Impact Factor
Article: Mortality in Kittens is Associated with a Shift in Ileum Mucosa-Associated Enteroccoci from E. hirae to Biofilm-Forming E. faecalis and Adherent E. coli.[show abstract] [hide abstract]
ABSTRACT: Approximately ∼15% of foster kittens die before 8-wks of age with most of these kittens demonstrating clinical signs or post-mortem evidence of enteritis. While a specific cause of enteritis is not determined in most cases; these kittens are often empirically administered probiotics that contain enterococci. The enterococci are members of the commensal intestinal microbiota but can also function as opportunistic pathogens. Given the complicated role of enterococci in health and disease, it would be valuable to better understand what constitutes a "healthy" enterococcal community in these kittens and how this microbiota is impacted by severe illness. In this study, we characterize the ileum mucosa-associated enterococcal community of 50 apparently healthy and 50 terminally ill foster kittens. In healthy kittens, E. hirae was the most common species of ileum mucosa-associated enterococci and was often observed to adhere extensively to the small intestinal epithelium. These E. hirae isolates generally lacked virulence traits. In contrast, non-E. hirae enterococci, notably E. faecalis, were more commonly isolated from the ileum mucosa of kittens with terminal illness. Isolates of E. faecalis had numerous virulence traits and multiple antimicrobial resistance. Moreover, attachment of E. coli to the intestinal epithelium was significantly associated with terminal illness and was not observed in any kitten with adherent E. hirae. These findings identify a significant difference in species of enterococci cultured from the ileum mucosa of kittens with terminal illness compared to healthy kittens. In contrast to prior case studies that associate enteroadherent E. hirae with diarrhea in young animals, these controlled studies identified E. hirae as more often isolated from healthy kittens and adherence of E. hirae as more common and extensive in healthy compared to sick kittens.Journal of clinical microbiology 08/2013; · 4.16 Impact Factor
Page 1
T
free-roaming cats is considered to be an important
problem because of concerns about animal welfare,
wildlife predation, and zoonotic disease transmission.1
Methods for controlling populations of free-roaming
cats are controversial, in large part because of a lack of
data needed to assess the various options.1-3Domestic
cats are considered to be prolific breeders, with
females capable of bearing their first litter before 1
year of age and able to have multiple litters each year
thereafter.4,aHowever, estimates of the reproductive
he size of the free-roaming cat population in the
United States is unknown, but overpopulation of
capacity of female cats and the consequences of
unabated reproduction are often extrapolated beyond
scientific reliability, as they typically fail to use realis-
tic litter sizes or ignore kitten mortality rates.5,6The
purpose of this study was to determine reproductive
parameters of naturally breeding free-roaming cats.
For purposes of the present study, free-roaming cats
were considered to be cats that were not confined
when outdoors. Feral cats were considered to be a
subset of free-roaming cats.
Materials and Methods
Data for the study were collected from 2 sources.
Between May 1998 and October 2000, data were collected
on 71 sexually intact female cats in 9 managed feral cat
colonies in Randolph County, NC. The cats were being mon-
itored to assess the impact of a trap-neuter-return (TNR)
program on feral cat colony population dynamics. As each
colony was enrolled in the population dynamics study, all
cats in the colony were captured and pregnancy, lactation,
and estrus statuses of the female cats were determined.
Colonies were included in the study only if they had an
established caretaker who provided food and water on a reg-
ular basis and either owned the land on which the colony
resided or had the permission of the landowner to tend to
the cats; cats in the colony had access to adequate shelter,
such as a barn, storage shed, carport, basement, or crawl
space; the colony consisted of at least 10 adult cats (ie, cats
> 6 months old), with at least 3 adult male cats; the colony
was located in a rural or suburban residential area at least 1
km from the nearest 4-lane road; and the colony caretaker
agreed to random assignment of the colony to a treatment
group (control vs surgical sterilization), ear-tipping of all
cats for permanent identification, and regular visits to the
colony by the investigators for data collection. At the time of
inclusion in the study, cats in the colony were live trapped
and anesthetized with an IM injection of ketamine, tileta-
mine, zolazepam, and xylazine.7Female cats in 6 colonies (n
= 44) were surgically neutered. Female cats in the remaining
3 colonies (n = 27) were not surgically neutered. All cats in
all colonies were vaccinated against rhinotracheitis, pan-
leukopenia, calicivirus infection, FeLV infection, and rabies
and treated with ivermectin. Food and water were provided
daily. Cats were returned to their colony sites and monitored
for a 2-year follow-up period. During that time, census data
were collected on the colonies at least twice weekly by the
caretakers or principal investigator. Data collected included
parity, birth dates, litter sizes, and outcome of kittens. Parity
was estimated on the basis of whether the caretaker had
observed the cat to have been pregnant, lactating, or caring
for a litter previously and the reproductive status of the cat
at the time of enrollment in the study. Kittens that survived
to 6 months of age were trapped and enrolled in the popula-
tion dynamics study but were not enrolled in the present
study. Litter size data were collected on 61 litters produced
by the 27 control females during the 2-year study period.
Data were available on time of birth for all 61 litters, on lit-
ter-specific mortality rates for 59 litters, and on litter size for
50 litters. All cats were trapped, neutered, and vaccinated at
JAVMA, Vol 225, No. 9, November 1, 2004 Scientific Reports: Original Study1399
SMALL ANIMALS
Reproductive capacity of free-roaming
domestic cats and kitten survival rate
Felicia B. Nutter, DVM; Jay F . Levine, DVM, MPH; Michael K. Stoskopf, DVM, PhD, DACZM
Objective—To determine reproductive capacity of
naturally breeding free-roaming domestic cats and kit-
ten survival rate.
Design—Prospective cohort and retrospective cross-
sectional study.
Animals—2,332 female cats brought to a trap-neuter-
return clinic for neutering and 71 female cats and 171
kittens comprising 50 litters from a cohort study of
feral cats in managed colonies.
Procedure—Data collected for all cats included preg-
nancy, lactation, and estrus status and number of
fetuses for pregnant cats. Additional data collected for
feral cats in managed colonies included numbers of
litters per year and kittens per litter, date of birth, kit-
ten survival rate, and causes of death.
Results.
Conclusions and Clinical Relevance—Results illus-
trate the high reproductive capacity of free-roaming
domestic cats. Realistic estimates of the reproductive
capacity of female cats may be useful in assessing the
effectiveness of population control strategies. (J Am Vet
Med Assoc 2004;225:1399–1402)
From the Environmental Medicine Consortium (Nutter, Levine,
Stoskopf) and the Departments of Clinical Sciences (Nutter,
Stoskopf) and Population Health and Pathobiology (Levine),
College of Veterinary Medicine, North Carolina State University,
Raleigh, NC 27606.
Supported by the Morris Animal Foundation, the William and
Charlotte Parks Foundation, the College of Veterinary Medicine at
North Carolina State University, the Randolph County Humane
Society, and the North Carolina Zoological Society.
The authors thank Beth Chittick, Richard Ford, Michael Loomis,
Roger Powell, Kurt Sladky, and Chris Whittier for contributions to
the study design.
Address correspondence to Dr. Stoskopf.
Page 2
the end of the population dynamics study
and again returned to their colony sites.
Data were also collected on a conve-
nience sample of 2,332 free-roaming female
cats trapped and brought by their caretakers to
a monthly TNR clinic in Raleigh, NC,b
between February 1996 and December 2001.
Information on living conditions of these cats
was not available; however, data on pregnancy
status (ie, identification of embryos or fetuses
visible without magnification), number of
fetuses per pregnancy, lactation status (ie, abil-
ity to express milk from teats), and estrus sta-
tus (ie, ovarian follicle development and uter-
ine status) were collected by veterinary techni-
cians and assistants at the time of neutering
and recorded on a standardized recording
sheet. Pregnancy status was recorded for 2,281
of the 2,332 cats, and 608 cats were confirmed
to be pregnant on the basis of identification of
embryos or fetuses in the uterus. Fetus counts
were recorded for 317 of the 608 pregnancies.
Lactation status was recorded for 2,205 cats,
and estrus status was recorded for 2,227.
Data from the population dynamics study
were used to determine litter sizes, litters per
year, kitten survival rate, and causes of death
for kittens that died. Descriptive statistics were
calculated, and associations between parity, litter size, kitten
survival rate, and litter order (first, second, or third per year)
were assessed with z tests. Commercial softwarecwas used for
all calculations; values of P < 0.05 were considered significant.
Distributions of fetus counts and litter sizes from live births
were significantly different (P = 0.008; Kolmogorov-Smirnov
test); thus, analyses were performed separately for each. Fetus
counts and litter size were compared with the Mann Whitney
U test. Distributions of pregnancy, lactation, and estrus status-
es were not significantly different between cats in the popula-
tion dynamics study and cats examined in the TNR program.
Therefore, data were pooled for further analysis.
Survival time for 169 kittens was evaluated by means of
the Kaplan-Meier product-limit estimate of the survivor
function.8Observations were right-censored at the end of 6
months (180 days). Survival times were compared by parity
of the queen, litter size, and litter order with the Peto and
Peto generalized Wilcoxon test for k samples with censored
data8; values of P < 0.05 were considered significant.
Results
Six hundred twenty-five cats in the study (608 in the
TNR program and 17 in the population dynamics study)
were pregnant. Pregnancies were observed in all months
of the year, but the percentage of cats found to be preg-
nant was highest in March, April, and May and lowest in
November (Figure 1). Distributions of the percentages of
cats in estrus and the percentages of cats lactating had
similar pattens, with the peak in percentage of cats in
estrus preceding the peak in percentage of cats found to
be pregnant and the peak in percentage of cats lactating
following. Overall, 149 of 2,276 cats (131/2,205 cats in
the TNR program and 18 of 71 cats in the population
dynamics study) were reported to be lactating, and 295 of
2,298 cats (277/2,227 cats in the TNR program and 18 of
71 cats in the population dynamics study) were in estrus.
Information on fetus count was available for 317
cats in the TNR program and 17 cats in the population
dynamics study (1,401 total fetuses), and information
on litter size was available for 50 litters produced by
cats in the population dynamics study (171 total kit-
tens). Fetus count (median, 4; interquartile range [25th
to 75th percentile], 2 to 6; range, 1 to 10) was signifi-
cantly (P < 0.001) higher than litter size (median, 3;
interquartile range, 2 to 4; range, 1 to 6). Cats in the
population dynamics study produced a mean of 1.4 lit-
ters/y, with a maximum of 3 litters/y.
Survival data were available for 169 kittens.
Overall, 127 of the 169 (75%) kittens died (n = 87) or
disappeared (40) before 6 months of age. Median litter-
specific mortality rate was 75% (interquartile range,
20% to 100%; range, 0% to 100%). Kitten mortality
rate was not significantly associated with maternal par-
ity (P = 0.19), litter size (P = 0.10), or litter order (P =
0.38). Eighty-one of the 169 (48%) kittens died or dis-
appeared before they were 100 days old (Figure 2).
Median survival time was 113 days (10th to 90th per-
centile range, 24 to 180 days). Survival time was not
significantly associated with maternal parity (P = 0.12),
1400 Scientific Reports: Original Study JAVMA, Vol 225, No. 9, November 1, 2004
SMALL ANIMALS
Figure 1—Percentages of free-roaming cats found to be pregnant, lactating, or in
estrus as a function of month of examination. Data are based on 2,332 free-roaming
female cats brought to a trap-neuter-return clinic for neutering and 71 female cats in
managed feral cat colonies.
Figure 2—Kaplan-Meier survival curve for 169 kittens born to
free-roaming cats. Kittens were observed for 180 days after birth.
Page 3
litter size (P = 0.11), or litter order (P = 0.58). Causes
of death were determined for 41 of the 87 (47%) kit-
tens reported to have died. Thirty-seven of the 41
(90%) died as a result of trauma, with attacks by stray
and owned dogs (n = 18) and motor vehicle accident
(10) being the most common types of trauma. Other
types of trauma that resulted in > 1 death included falls
from haylofts (n = 2), being stepped on by horses or
people (3), and a suspected episode of infanticide (3).
Cause of death was not determined for 46 of the 87
(53%) kittens reported to have died, but many report-
edly had signs of disease, including upper respiratory
tract disease and diarrhea, prior to death.
For 10 female kittens born into control feral cat
colonies, ages at which they produced their first litters
were recorded. Median age at first parity was 10.5
months (interquartile range, 8 to 12 months; range, 6
to 15 months).
Discussion
Results of the present study reinforce concerns
about the high reproductive capacity of free-roaming
domestic cats. Although cats are considered to be sea-
sonally polyestrous with a defined anestrus period
associated with day length,9,10pregnant cats were iden-
tified during all months of the year in the present
study, and similar findings have been reported previ-
ously.11However, only 15 pregnancies were identified
outside the spring and summer breeding season during
the 6 years of the present study. This would support a
hypothesis that seasonal births are dependent on opti-
mal environmental conditions.4
In the present study, the proportion of pregnant
cats peaked during the spring and late summer, which
is consistent with reported patterns in Florida,12
Australia,13and South Africa.14Proportions of the
queen population in estrus and lactation followed sim-
ilar seasonal patterns, with the percentage in estrus
peaking prior to the peak in the percentage that were
pregnant and the percentage lactating peaking after, as
expected. The proportions of the queen population in
estrus and lactation were lower than would be expect-
ed given the reported percentage that were pregnant,
most likely because of the difficulty of identifying
estrus and lactation, compared with identifying preg-
nancy. Also, estrus lasts a shorter time than either preg-
nancy or lactation, which would add to a bias for
detecting pregnancy during monthly TNR clinics.
Reported values for mean litter sizes for free-roam-
ing, laboratory-raised, and cattery cats vary from 2.1 to
5 kittens/litter, with ranges from 1 to 10 kittens/litter
having been reported,11,14-22and litter sizes in the pre-
sent study were consistent with these values. Litter size
was significantly smaller than fetus count in the pre-
sent study, which may be an indication of late gesta-
tional or early neonatal losses that were not directly
observed. Litters of kittens could not always be located
immediately after birth, and kittens were typically first
counted at 3 to 4 weeks of age, when they began to
visit the colony feeding site. This has been the only
method used by some researchers to determine litter
sizes18and, on the basis of our findings, results in con-
servative estimates of actual reproduction.
On average, cats in the present study gave birth to
1.4 litters/y, although 2 cats had 3 litters in a single
year. Production of multiple litters a year has been neg-
atively associated with survival of kittens in the first
litter in other studies,23,24but we did not find a clear
association between those variables in our data.
However, the 2 females that each produced 3 litters in
a single year did have 100% mortality rates for at least
1 of the first 2 litters in that year. This association
makes intuitive sense but requires a larger data set to
appropriately interpret the relationship. Of 10 female
cats born into control feral cat colonies and closely fol-
lowed to determine age at first parity, 9 produced their
first litters at < 1 year of age, with 1 cat giving birth at
6 months of age. This young age at first reproduction
combined with the potential to produce multiple litters
a year contributes to the perception of cats as prolific
breeders.4,a
High neonatal and juvenile mortality rates are
widely reported for domestic cats. Reported percent-
ages of kittens that die in the early neonatal period (ie,
up to 6 or 8 weeks of age) range from 12.8% to
48%.22,25,26In 1 study,26up to 90% of kittens died before
6 months of age. Similarly, 81 of 169 (48%) kittens in
the present study had died or disappeared before they
were 100 days old, and 127 (75%) had died or disap-
peared before they were 6 months old. Trauma
accounted for the death of most kittens for which
cause of death was confirmed. Causes of kitten death
may be highly dependent on a variety of environmen-
tal variables, and considerable variation in these data
should be expected between study sites, making gener-
alization difficult. Variations are also likely within
causes of death. For example, single or multiple stray
dogs were responsible for deaths of kittens in 2
colonies in the present study, whereas a caretaker’s
dogs were responsible for the deaths of multiple kittens
in a third colony. It is likely that both motor vehicle
accidents and dog attacks were overrepresented as
causes of death in the present study because the noise
or graphic visual evidence associated with these causes
of death is likely to draw attention. Cats that become
debilitated often seek hiding places, making it less like-
ly that cats that die of illness or disease will be identi-
fied. Predation of kittens by other animals, such as rap-
tors, foxes, and coyotes, likely resulted in the disap-
pearance of some kittens in the present study but was
not recorded as a cause of death, likely because the car-
casses were consumed. Causes of kitten death and the
relative rank of contribution to the overall mortality
rate were reported in a study24of farm cats in Ithaca,
NY; however, relative rankings were different from
rankings in the present study, likely because of differ-
ences in study design and environmental conditions of
the kittens, such as human population density, road
density, road proximity, and climatic conditions.
Examined out of context, our data would tend to
reinforce the popular notion that kittens born to free-
roaming cats live a marginal existence and that their
mortality rate is unreasonably high. However, reported
kitten mortality rate was consistent with reported rates
for similarly sized wild carnivores,27,28suggesting that
the living conditions of free-roaming cats are compara-
JAVMA, Vol 225, No. 9, November 1, 2004 Scientific Reports: Original Study 1401
SMALL ANIMALS
Page 4
ble to those of other wildlife. It also suggests that the
assessment and management of feral cat colonies with
methods developed for studying other small wild car-
nivores are appropriate. Results of the present study
provide information needed to develop reliable esti-
mates of the impact of reproduction by sexually intact
free-roaming domestic cats in rural and suburban
regions of the southeastern United States.
aLiberg O. Predation and social behavior in a population of domestic
cats: an evolutionary perspective. PhD dissertation, Department of
Animal Ecology, University of Lund, Lund, Sweden, 1981.
bOperation Catnip Inc, Raleigh, NC.
cStatView 5, SAS Institute Inc, Cary, NC.
References
1. Patronek GJ. Free-roaming and feral cats—their impact on
wildlife and human beings. J Am Vet Med Assoc 1998;212:218–226.
2. Mahlow JC, Slater MR. Current issues in the control of stray
and feral cats. J Am Vet Med Assoc 1996;209:2016–2020.
3. Slater MR. Community approaches to feral cats: problems, alterna-
tives, and recommendations. Washington, DC: Humane Society Press, 2002.
4. Deag JM, Manning A, Lawrence CE. Factors influencing the
mother-kitten relationship. In: Turner DC, Bateson P , eds. The domestic
cat: the biology of its behavior. Cambridge, UK: Cambridge University
Press, 2000;23–46.
5. Olson PN, Johnson SD. New developments in small animal
population control. J Am Vet Med Assoc 1993;202:904–909.
6. Luoma J. Catfight. Audobon 1997;Jul–Aug:84–91.
7. Williams LS, Levy JK, Robertson SA, et al. Use of the anes-
thetic combination of tiletamine, zolazepam, ketamine, and xylazine
for neutering feral cats. J Am Vet Med Assoc 2002;220:1491–1495.
8. Lee ET, Lee ETT, Wang JW. Statistical methods for survival
data analysis. 3rd ed. New York: John Wiley & Sons, 2003.
9. Hurni H. Daylength and breeding in the domestic cat. Lab
Anim 1981;15:229–231.
10. Scott PP , Lloyd-Jacob MA. Reduction in the anestrous period
of laboratory cats by increased illumination. Nature 1959;184(suppl
26):2022.
11. Prescott CW. Reproduction patterns in the domestic cat.
Aust Vet J 1973;49:126–129.
12. Scott KK, Levy JK, Crawford CP . Characteristics of free-roam-
ing cats evaluated in a trap-neuter-return program. J Am Vet Med Assoc
2002;221:1136–1138.
13. Jones E, Coman BJ. Ecology of the feral cat, Felis catus (L),
in South Eastern Australia. II. Reproduction. Aust Wild Res 1982;9:
111–119.
14. van Aarde RJ. Reproduction and population ecology in the
feral house cat, Felis catus, on Marion Island. Carnivore Genetics
Newsletter 1978;3:288–316.
15. Ekstrand C, Linde-Forsberg C. Dystocia in the cat: a retro-
spective case study of 155 cases. J Small Anim Pract 1994;35:
459–464.
16. Kane E, Allard RE, Douglass GM. The influence of litter size
on weight change during feline gestation and lactation. Feline Pract
1990;18(1):6–10.
17. Lawler DF , Monti KF . Morbidity and mortality in neonatal
kittens. Am J Vet Res 1984;45:1455–1459.
18. Mirmovitch V. Spatial organization of urban feral cats (Felis
catus) in Jerusalem. Wildl Res 1995;22:299–310.
19. Povey RC. Reproduction in the pedigree female cat. A sur-
vey of breeders. Can Vet J 1978;19:207–213.
20. Robinson R, Cox HW. Reproductive performance in a cat
colony over a 10-year period. Lab Anim 1970;4:99–112.
21. Root M, Johnston SD, Olson PN. Estrous length, pregnancy
rate, gestation and parturition lengths, litter size and juvenile mor-
tality in the domestic cat. J Am Anim Hosp Assoc 1995;31:
429–433.
22. Scott FW, Geissinger C, Peltz R. Kitten mortality survey.
Feline Pract 1978;8(1):31–34.
23. Ewer RF . The carnivores. London: Weidenfeld & Nicholson,
1973.
24. Wolski TR. The life of the barnyard cat. Feline Health Perspect
1981;3:1–3.
25. Jemmett JE, Evans JM. A survey of sexual behavior and
reproduction in female cats. J Small Anim Pract 1977;18:31–37.
26. van Aarde RJ. Population biology and the control of feral
cats on Marion Island. Acta Zool Fennica 1984;172:107–110.
27. Cypher BL, Warrick GD, Otten MRM, et al. Population
dynamics of San Joaquin kit foxes at the Naval Petroleum Reserves
in California. Wildl Monthly 2000;145:1–43.
28. Fritts SH, Sealander JA. Reproductive biology and popula-
tion characteristics of bobcats (Lynx rufus) in Arkansas. J Mammal
1978;59:347–353.
1402 Scientific Reports: Original Study JAVMA, Vol 225, No. 9, November 1, 2004
SMALL ANIMALS | http://www.researchgate.net/publication/8175636_Reproductive_capacity_of_free-roaming_domestic_cats_and_kitten_survival_rate | CC-MAIN-2014-15 | refinedweb | 4,173 | 55.03 |
Have you heard about rootless containers, but don't really know what they are? Do you wonder what prevents processes in one container from interacting with processes in another container? Would you like to learn how to scan container images with OpenSCAP?
If you answered yes to any of these questions, I've recently published a series of videos on containers and Podman that might help.
Rootless containers using Podman
Watch two videos covering running containers unprivileged, or "rootless" using Podman.
The first video is an overview of the options you have when choosing which user account to use to run Podman and which account to run processes as within container images. The video includes a demo of these various options in action.
The second video dives deep into how user namespaces work in rootless Podman, and demos the following topics:
- Run a container with rootless Podman.
- View user namespaces with the
lsnscommand.
- Use the
/etc/subuidfile, which defines subordinate UID ranges.
- Use the
/proc uid_mapfile, which shows the UID map for processes.
- Calculate the UID number that a process runs as on the host.
- Use the
podman topcommand to view the user mapping between the container and the host.
- Use the
podman unsharecommand to run a command within a container user namespace.
Overview of PID namespaces
The next video, Overview of How Containers Use PID Namespaces to Provide Process Isolation, takes an in-depth look at how PID namespaces work. Namespaces, including PID namespaces, are one of the key technologies that enable containers to run in isolated environments.
PID namespaces also allow containers to have the same PID number running in each container (this is how every container running on a system can have their own PID #1). PID namespaces map the PID numbers between the container and the host, so a process running in your container will have a different PID number from the container's point of view versus the host's point of view, which is explained in the video.
After watching this video, you should have a solid understanding of how PID namespaces work and the benefits they provide.
Security compliance by scanning container images with OpenSCAP
The last video is named Scanning Containers for Vulnerabilities on RHEL 8.2 With OpenSCAP and Podman. In this video, I cover the new feature in RHEL 8.2 that allows container images to be scanned with OpenSCAP using the
oscap-podman command. This video covers the following topics:
- Scan container images for vulnerabilities with the
oscap-podmancommand.
- Assess a container image's security compliance with the PCI-DSS baseline by using the
oscap-podmancommand.
- Use Buildah to create a new image with one of the OpenSCAP findings remediated.
Running a container inside a container (Podman in Podman)
This video covers an overview of Podman in Podman, or in other words, running a container within a container. This is a technology preview feature in Red Hat Enterprise Linux (RHEL) 8.3.
The video covers an overview of:
- From the RHEL 8.3 host, starting a container using the registry.redhat.io/rhel8/
podman container image (with the --privileged option)
- Within that container, building a new container image using podman build
- Running a container (while in a container) using the newly created container image (Podman in Podman)
Please note that Podman in Podman functionality is currently only available when starting the container as root.
Conclusion
I hope you find these videos useful and educational. I want to make several more Red Hat Container Tools-related videos in the future, so keep an eye on the Enable Sysadmin blog and the Red Hat Videos YouTube channel!
[ Free book: Building modern apps with Linux containers. ] | https://www.redhat.com/sysadmin/container-video-series | CC-MAIN-2021-31 | refinedweb | 614 | 53.71 |
Join devRant
Search - "fake dev"
-
-.9
-* ...20
-
-?25
-".
- So we're making a desktop app using Electron and I got super excited when I ran the quick start thinking, "Wow, I'm actually going to develop a desktop app!"
But then the reality hit me that I'm still technically working with HTML and all and that I should be ashamed of calling myself a dev over this so how I'm cry-studying it's documentation while testing different stuff.4
-
- From a close friend on Messenger: Flutter development and Android Studio are not mutually exclusive you dumb fuck! No! Shut up! SHUT UP! You're so full of bad takes my God why are you being stupid on purpose!
Okay time to uninstall Messenger too don't get much spam, but when I do, I rant about how badly those mails are crafted.
I mean, yeah, for non-devs or typical old people, those badly made Google fake mails (that use the old Google logo, the logo in Times New Roman or something) or ISP / phone company mails with malicious attachments may look good enough.
But, seriously, if I were a dev paid to create spam mails, they would look like the real deal, if I may say so myself, as I would actually put some effort in them.
What do you think? Wouldn't spam made by real developers like us be "better"?
Maybe send some examples from inside your junk box 🤔
- (mostly !dev) Fuck humans! Really: what a scum bag race. All that shit talk about human dignity, the highest values are just sugar coating the low base motives we mostly live by. Like people have such fine antennas for your income, social status, the power or lack thereof you exert over other. They know it before you open your mouth, that they can pick on you, harass you, because you're the one on the receiving end, the one that bows away. The bullies feel that. On an overcrowded chicken yard you'll find more dignity than in human society.
Everybody drooling over that polished photoshop life on facetubeinsta: materialistic, consumeristic, masturbatic wastage. At least we now say it openly: that if we were the winners, we'd also take it all, live that empty luxury, life of fame. But 99,99% of us, we aren't in that position, just working off our arse to only keep afloat. And for the stars, those fake images, we're just rats to click on ads to better train Google.
No wonder that software, as a picture of human communication is such a shitfest of arbitrary, entropic conventions and endemic epidemic of quirks, bugs and evil trap doors. As a whole: an insults to reason, a challenge to sanity. (...Conway's law)
And I'm still a bit pissed at our profession, that, you know, as engineers, scientists, physicists, we still see us in the lineage of that "great" age of enlightenment and reason,.. while it's all just a cover up. Sure science and their ideas are nice as long as you serve a purpose or make some money. Sure democracy and free speech are great achievements, but in the end some elites and monopolies rule the world at their gusto - and will not stop destroying the world unless we're already one feet in the abyss (like 1962, be we ain't had enough of that shit, hadn't we?)9
- Someone posted a rant about pseudo HTML devs (I’m not gonna say who... @Alice). While she’s right I think there are two worse groups: Batch and Visual Basic wannabe devs30
- Dev walks in carrying a 2-liter bottle of Mt. Dew..
Dev: “Check it out, I forgot to bring my Mr. Dew from home, so I stopped at the gas station to up a bottle and they wanted $1.50, but they had 2-liters for $1.89. Much better deal. I’m all about saving money”
Me: “Um, $1.89 for a 2-liter isn’t a deal. Last week I bought several 2-liters for 69 cents each.”
Dev: “Pfftt…for the fake stuff. I want real Mt. Dew.”
Me: “Hy-Vee has all their Pepsi products on sale for 69 cents. How much do you pay for those 16oz bottles?”
Dev: "Only around $5 for a 6-pack. It's a much better deal when I buy in bulk."
Me: "I can buy 6 bottles of 2-liters cheaper than you buy a 6 pack of 16oz bottles. Buying a 6 pack at a time isn't buying in bulk."
Dev: "I hate 2-liter bottles. It goes flat before I drink it all and the soda tastes different."
Other Dev: "Um..what's that on your desk?"
- laughter all around -
Dev: "You -bleep-holes.
- How to tell if someone is a software/hardware engineer with real talent or an incompetent tool:
[Walk up to person] whatcha doing there? You do any development or just playing around?
{
init <punchline.c>
include namespace #meme
//My syntax is gonna be bad since I can only read (not write in any way) C type languages and still need to learn Go and Python. I just do hardware and implementation for infosec things right now
If(answer) is "I code a bunch. If you need any programming, I'm your guy;"
cout "tool" ;
If(answer) is "Hell if I know. Watch the terminal output while I pour another espresso and tell me if anything weird happens;"
cout "dev" ;
return 0;
}
- The best part of dev-rant is that it's completely free of fake profiles ... Because the rant is so high!!!1
-
-.
-)3
Top Tags | https://devrant.com/search?term=fake+dev | CC-MAIN-2020-05 | refinedweb | 952 | 81.12 |
Hello. I am having trouble with building the libraries for my Juce audio plugin (I am using MacOSX/xcode). I am attempting to use OpenCV in my project, and need to include three OpenCV libraries in my Juce project. Below is what I currently have as input to each category in the introjucer.
Extra Linker Flags:
-lopencv_core -lopencv_highgui -lopencv_imgproc
Header Search Paths:
/usr/local/include
Extra Library Search Paths:
/usr/local/lib
Both of the search paths are set for the Release and the Debug builds. My c++ code has the following line:
#include <opencv2/core/core.hpp> . This produces an error saying
'opencv2/core/core.hpp' file not found.
I have tried many different configurations without success (including changing the
#include statement to things such as
#include <opencv2/core.hpp> and
#include <core.hpp> in an attempt to see if that was the issue).
Any help would be greatly appreciated.
Thanks! | https://forum.juce.com/t/juce-linking-trouble-with-opencv-macosx/18891 | CC-MAIN-2018-34 | refinedweb | 152 | 67.25 |
makes me want to tableflip. Though when and next line are modified to import novaclient.v2 instead of novaclient.v1_1 it seems to work (at least duplicity works with hubic). Without this you can't import pyrax, as novaclient doesn't have v1_1 dir anymore.
Search Criteria
Package Details: python2-pyrax 1.9.4-1
Dependencies (7)
- python2-keyring
- python2-mock
- python2-requests (python2-requests-git, python2-requests-2.13.0)
- python2-six
- python2-rackspace-novaclient>=1.3
- python2-novaclient>=2.13.0
- python2-setuptools (make)
Not working for me either :-(
Traceback (most recent call last):
File "pyrax-setup.py", line 3, in <module>
import pyrax
File "/usr/lib/python2.7/site-packages/pyrax/__init__.py", line 60, in <module>
from novaclient.v1_1 import client as _cs_client
ImportError: No module named v1_1
Please please please fix - I hate pip!!!! | https://aur.archlinux.org/packages/python2-pyrax/ | CC-MAIN-2018-26 | refinedweb | 139 | 62.95 |
Using the new Evergreen append buffers appears to be exactly the same as a UAV. The catch is the hinden counter is persistant ... so if I append .. then read from the host, I need a way to reset the hidden counter for that UAV slot before I call the next kernel.
I am able to query the counter with a kernel of the sort attached. Inc and Dec of the counter are similar. So for reseting, I resort to a query, then an appropriate loop of inc or dec kernels ... (would be faster to put into one kernel, but things started to get strange with alloc+consume in a loop).
So my question is: Is there a better way to do this? The ISA seems to show it is GDS where the append buffer counter is located ... it would be great if I could get at this directly. I.E. resetting the counter should not need to be done by steps of 1.
il_cs_2_0 dcl_num_thread_per_group 64 dcl_literal l0, 0xffffffff, 0xffffffff, 0xffffffff, 0xffffffff dcl_literal l1, 0x000000ff, 0x000000ff, 0x000000ff, 0x000000ff dcl_literal l2, 0x00000001, 0x00000001, 0x00000001, 0x00000001 dcl_literal l3, 0x00000000, 0x00000004, 0x00000008, 0x0000000C dcl_literal l4, 0x00000002, 0x00000004, 0x00000008, 0x0000000C dcl_raw_uav_id(0) ; consume then alloc ; am I thread 0? ieq r1.x, vaTid.x, l3.x if_logicalnz r1.x ;append_buf_consume_id(0) r0.x append_buf_alloc_id(0) r0.x append_buf_consume_id(0) r1.x ; output counter uav_raw_store_id(0) mem.x, l3.x, r0.x endif end | https://community.amd.com/t5/archives-discussions/il-append-buffers-query-and-reset-counter/m-p/51682 | CC-MAIN-2021-43 | refinedweb | 239 | 84.98 |
Hey there!
I've written a program and outside of that program I want to make a new python program which generates lists (or in some cases maybe dictionaries) from certain directories and the files in them.
I've puzzled around with the os.path(), os.chdir(), os.getcwd() functions, the glob.glob() function and I've tried to see how os.walk() would work.
Say I have the following file structure:
I have a folder named "Library", with the subfolders "Detached", "Semi_Detached" and "Appartments".
In each subfolder it then has a certain amount of files like:
"1_simple.max", "1_detailed.max", "1.csv", "2_simple.max", "2_detailed.max", "2.csv" and "x_simple.max", "x_detailed.max", "x.csv",
Library
Detached
1_simple.max
1_detailed.max
1.csv
2_simple.max
2_detailed.max
2.csv
Semi_Detached
1_simple.max
1_detailed.max
1.csv
2_simple.max
2_detailed.max
2.csv
Appartments
1_simple.max
1_detailed.max
1.csv
2_simple.max
2_detailed.max
2.csv
I want to create lists like:
living_types =
and from the folder Detached I want different lists of:
max_simple =
max_detailed =
csv =
This needs to be done for the other subfolders too. Somehow I also wanna know to which subfolder each max_simple list belongs (maybe this is just a matter of naming or there are better ways)
All these lists should later be used in the first written program to do operations on.
Here's some code I came up with but for now I'm not sure which tactic I should use because I'm fairly new to working with directories and files in Python.
import os, os.path, glob # where are we? cwd = os.getcwd() print "1", cwd # go up os.chdir(os.pardir) print "2", os.getcwd() # go to Library os.chdir("Library") print "3", os.getcwd() print glob.glob("*.*") for root, dirs, files in os.walk("G:\Afstuderen\Library"): print "root =", root if len(dirs) > 0: print "dirs =", dirs if len(files) > 0: print "files =", files if len(dirs) > 0: type_list = dirs type_list.sort() print type_list type_dict = {} for i in range(len(type_list)): type_dict[i+1] = type_list[i] print type_dict for key in type_dict: print key, type_dict[key]
I get this kind of output now, not what I really want :P:
1 G:\Afstuderen\Python 2 G:\Afstuderen 3 G:\Afstuderen\Library root = G:\Afstuderen\Library dirs = ['1_Vrijstaand', '4_Appartementen', '2_Twee-onder-een kap', '3_Rij'] files = ['info over typen.doc', 'properties_templates.xls', 'render_vrijstaand.max', 'render.max'] root = G:\Afstuderen\Library\1_Vrijstaand files = ['1.csv', '1.max', '2.csv', '2.max', '3.csv', '3.max', '4.csv', '4.max', 'kavel.max', 'render_back.jpg', 'render_front.jpg', 'vrijstaand.txt', '1_small.csv'] root = G:\Afstuderen\Library\4_Appartementen root = G:\Afstuderen\Library\2_Twee-onder-een kap files = ['1.csv', '1.max', '2.csv', '2.max', '3.csv', '3.max', '4.csv', '4.max', '5.csv', '5.max', 'render_back.jpg', 'render_front.jpg', 'render_twee-onder-een kap.max', 'twee-onder-een kap.txt'] root = G:\Afstuderen\Library\3_Rij files = ['1.csv', '1.max', '2.csv', '2.max', '3.csv', '3.max', '4.csv', '4.max', 'render_back.jpg', 'render_front.jpg', 'render_rijtjeswoning.max', 'rijtjes.txt', 'Thumbs.db'] ['1_Vrijstaand', '2_Twee-onder-een kap', '3_Rij', '4_Appartementen'] {1: '1_Vrijstaand', 2: '2_Twee-onder-een kap', 3: '3_Rij', 4: '4_Appartementen'} 1 1_Vrijstaand 2 2_Twee-onder-een kap 3 3_Rij 4 4_Appartementen
Don't mind the other files in the files output of the subfolders.
I'm hoping my question is clear enough and some of you can give me some pointers. Or even a place to start learning more about working with directories / files in Python on a fairly easy level.
Thanks in advance :) | https://www.daniweb.com/programming/software-development/threads/181186/create-lists-of-directories-and-files | CC-MAIN-2018-26 | refinedweb | 597 | 57.47 |
When it comes to measuring the time of execution for a piece of Python code, we have many ideas. How about simply using the time module and saving the time before and after the execution of the program? This sounds easy and good but it isn’t.
Table of Contents
Python timeit
When a program is executing, many background processes also run to make that code executable. The time module doesn’t take those processes into account. If you need precise time performance measurements,
timeit is the module to go for.
The
timeit module runs a piece of code 1 million times (default value) and takes into account the minimum amount of time it took to run that piece of code. Let’s see the module in action here!
Finding Execution time of Python code
There are many ways to use the
timeit module. One of the easiest way is to use it directly on Python CLI. We will be doing this in our first example before moving into some more examples.
Python timeit Example
We will start by using the
timeit module directly from the Python CLI. When CLI is used, we will notice that the module otself decides the number of repetitions performed for the same piece of code. Here is sample commands we executed for different expressions:
$ python -m timeit '"-".join(str(n) for n in range(100))' $ python -m timeit '"-".join([str(n) for n in range(100)])' $ python -m timeit '"-".join(map(str, range(100)))'
Let’s see the output for this program:
In some later sections, we will see how we can control the number of repetitions performed to find the best time for the execution of expressions.
Timing a piece of code
The best thing with the
timeit module is that we can decide the exact code snippet for which we want to measure performance for. We will define the setup code and the code for performance test separately. The setup code is run just once whereas the main code is run 1 million times:
import timeit # setup code is executed just once mysetup = "from math import sqrt" # main code snippet for performance check mycode = ''' def example(): mylist = [] for x in range(100): mylist.append(sqrt(x)) ''' # timeit statement print(timeit.timeit(setup = mysetup, stmt = mycode, number = 10000))
Let’s see the output for this program:
With this code, we also demonstrated how we can control the number of times the code should be repeated for performance check.
Note that it is best to keep the import statements in setup code itself so that no alterations are made while executing the main code.
Record time for multi-line code from CLI
If making a script is not feasible for you and you want to quickly look at a code for its performance, using the code directly from CLI is also an option:
$ python3 -m timeit -s \ > "jd = {}" \ > "for idx in range(1000):" \ > " jd[str(idx)] = idx"
Let’s see the output for this program:
Generally comparing two blocks of code
If you only want really simple idea by comparing two pieces of code about how fast one run form another, there is a pretty simple way of doing this:
import timeit start_time = timeit.default_timer() func1() print(timeit.default_timer() - start_time) start_time = timeit.default_timer() func2() print(timeit.default_timer() - start_time)
Just use the
default_timer() function to start the times and again to find a difference for it. This is the easiest way you can use the module to find the performance of code. This also forces you to make your code in the form of functions, which are modular entities.
Another way of doing the same thing, without touching the original script, say
test.py which contains functions like:
def RadixSort(): ... def TimSort(): ...
Use timeit module like this:
$ python -m timeit -s 'import test' 'test.RadixSort()' $ python -m timeit -s 'import test' 'test.TimSort()'
Pretty easy, right?
Conclusion
In this lesson, we saw how we can measure the performance of small pieces of Python code using the
timeit module using CLI and scripts as well. | https://www.journaldev.com/20549/python-timeit-module | CC-MAIN-2019-39 | refinedweb | 679 | 70.23 |
These days I'm very much in the market for anything will cut down on manual typing. Thus I'm dictating more of what I write (using speech recognition), and today I began to explore CodeRush: a highly extensible Visual Studio plug-in
Being very smart marketers, DevExpress offers a free version: CodeRush Express, which is a somewhat stripped down, but fully useful product, and they offer a 30 day trial of the full CodeRush product. The trial, however, allows you to install both the trial of CodeRush and the free CodeRush Express. Of course, trying out CodeRush is like driving the turbo enhanced model of the car you want. Once you do, it’s mighty hard to go back to four unassisted cylinders, and I suspect it will be mighty hard to step down to CodeRush Express. But stay tuned.
Some of what CodeRush does is not immediately intuitive (at least not late at night), but the documentation is excellent, and includes some surprisingly useful animations. My biggest complaint is that while they tell you how to do many things, they don't always tell you why you might want to (hey, does that sound familiar?) A classic example of this is that you can have "Smart paste" where, for example, you copy “a < b” and when you paste you get “a = b.” This to me was not obviously useful, but I tried it out and the light bulb lit:
if ( theValue < minValue ){ theValue = minValue;}
You can of course create your own Smart paste constructs; which I suspect I’ll do quite a bit.
What moved me to write this brief review before fully exploring this product, however, was the following wicked cool experience. In a bit of sample code I wrote:
public class foo{ int age; public foo() { }}
With one click, this initialized the member variable “age” to zero.
[highlighting added]
That was really nice, I could see doing that.
I have chosen the option of having a value next to each method indicating its relative complexity (the pale red 5 to the right of the method name) and I’ve asked it to display the architecture of the program by drawing faint lines between connected braces.
CodeRush then indicated that there was more that could be done with the member variable age (you may be way ahead of me)
The three blue dots under the member varaible “age” Eare CodeRush's equivalent to a smart tag (this like everything else is configurable) and notice that the re-factor dialog offers two CodeRush refactor options as well as three Visual Studio modifications.
As you would guess, with one click you are able to encapsulate the member variable into a field. What I find particularly nice is that before committing to the change, CodeRush shows you what it's going to do:
Note that I've done no drawing on this image; everything shown here appears inside the Visual Studio editor, complete with the arrows indicating that the member age will be replaced by the property, etc.
The graphical preview is enormously useful for making sure that the changes your expect are what you'll get, and also for learning about new technology (e.g., switching back and forth between anonymous methods and lambda expressions) and for instructing others.
Immediately upon accepting this change, a blue "hint" indicator appeared, letting me know that CodeRush felt the code could still be improved. Hovering on the hint opened a box that told me what the issue was, and offered a one click solution
Once again, the change was graphically displayed before I committed to it:
Clicking on the link implements:
It was all much faster to do then to explain. It was also an entirely pleasant experience, without any opportunity for confusion.
It's early days, but this software looks like a keeper. | http://geekswithblogs.net/SilverlightGeek/archive/2009/09/09/mini-review-of-code-rush.aspx | CC-MAIN-2014-52 | refinedweb | 642 | 60.69 |
Registered users can ask their own questions, contribute to discussions, and be part of the Community!
Registered users can ask their own questions, contribute to discussions, and be part of the Community!
Hi all,
Currently, when I am trying to write data (residing on S3) to SQL Server using sync recipe, it is taking appx 60 minutes for writing 1.8 million rows. Is there any way to optimize it and reduce time?
Thanks!
Hi,
Unfortunately, there is no specific capability in DSS that would allow you to significantly enhance this speed. Inserting data in SQL Server takes time.
If possible, we would recommend processing your data on S3 in order to reduce it, so as to only load the minimal amount of data in SQL Server.
If you are OK working with Python and SQL, you may be able to develop a process in which the data is first written out of S3 to a local text file and then loaded into SQL Server using a bulk load approach.
We have developed this sort of process for loading data into Netezza (where inserts are particularly slow and costly) and we do see a pretty big speed improvement.
Let me know if you are interested and I can share more information.
Marlan
OK here's what we are doing. I can't say what sort of speed improvement you'd see but for us it was quite substantial. The speedup came from shifting from line by line inserts of the data into the SQL table to using Netezza's bulk load functionality.
The approach involves two steps. The first step writes the source data to a text file in a DSS managed folder. How this is done depends on the where the source data is stored. Given that yours is stored in S3 I'd think you could use a download recipe to do this.
The second step executes bulk load from the text file into the SQL database. This step is handled by a Python recipe.
Note that this approach will only work if the SQL Server instance you are writing to is able to access the text file you downloaded in the first step. The easiest case is if the SQL Server instance can access the DSS managed folder -- this is what is assumed in Python script given below. If not, you might be able to copy that file to a location that the SQL Server instance can access.
The following Python script shows how we have done this using Netezza's bulk load statement. The input for the recipe would the managed folder that contains the text file (stored there in the first step) and the output would be the destination table in SQL Server. You would need to adjust the SQL part of this recipe to use SQL Server's bulk load statement.
import dataiku from dataiku.core.sql import SQLExecutor2 # # Get input folder/file details # input_folder = dataiku.Folder('Output_Files') input_folder_path = input_folder.get_path() input_path_and_name = os.path.join(input_folder_path, 'output.csv') # # Specify SQL statements that will execute data load # # Get SQL table name of output dataset output_dataset = dataiku.Dataset('OUTPUT') sql_table_name = output_dataset.get_location_info()['info']['table'] # projectKey already resolved # Load SQL statements including dropping and recreating table pre_queries = """ DROP TABLE {sql_table_name} IF EXISTS; COMMIT; CREATE TABLE {sql_table_name} AS SELECT COL1, COL2, COL3 FROM EXTERNAL '{input_path_and_name}' (COL1 INTEGER, COL2 DATE, COL3 INTEGER) USING ( DELIM 9 -- tab character QUOTEDVALUE DOUBLE REMOTESOURCE 'JDBC'); COMMIT -- required in Netezza so above statements are executed and not rolled back """ # Replace variables pre_queries = pre_queries.format(sql_table_name=sql_table_name, input_path_and_name=input_path_and_name) print(pre_queries) # Pre queries must be a list (convert to one statement per list item) pre_queries = pre_queries.split(';') # # Specify final query (must always have one) # # Use final query to check that all records got loaded query = "SELECT COUNT(*) AS REC_CNT FROM {sql_table_name}".format(sql_table_name=sql_table_name) print(query) # # Execute queries # executor = SQLExecutor2(dataset='OUTPUT') result_df = executor.query_to_df(query, pre_queries=pre_queries) print(result_df.at[0, 'REC_CNT'])
While this approach adds an extra step of downloading the source data to a managed folder, the additional speed resulting from the use of a bulk load more than makes up for that extra step.
Let me know if you have questions.
Marlan
Thanks a lot for your solution. Really appreciated, but I am getting error at first step only. The error is "
We don't use S3 so unfortunately I'm not going to be very much help with this step. You should be able to get help on this step (as it's a standard DSS recipe) either here on the community or perhaps by opening a ticket with DSS support.
That said, looks like the files that are compressed. Not too surprising but it does mean that we'd need to add in a step to decompress them before the SQL Server bulk load step could be used. This can be be done within Python of course with the right package. I don't see any reason why this wouldn't work but it'll be some additional work to put this together.
Marlan
One thing to note is that if there is no schema information available, string columns will be defaulted by DSS to be NVARCHAR(MAX) which is slow and chews up storage - if you have definitive data sizes for your string columns, you should set them on the schema. The length is stored in the schema of the dataset. Please go to the "Schema" tab of the dataset settings, select your column, and in the right part of the screen, update the "max length". | https://community.dataiku.com/t5/Using-Dataiku/Optimize-SQL-Server-uploads/td-p/16643 | CC-MAIN-2022-40 | refinedweb | 928 | 62.07 |
bwrap (1) - Linux Man Pages
bwrap: container setup utility
NAMEbwrap - container setup utility
SYNOPSIS
- bwrap [OPTION...] [COMMAND]
DESCRIPTION
bwrap
It works by creating a new, completely empty, filesystem namespace where the root is on a tmpfs that is invisible from the host, and which will be automatically cleaned up when the last process exists. You can then use commandline options to construct the root filesystem and process environment for the command to run in the namespace.
By default, bwrap creates a new mount namespace for the sandbox. Optionally it also sets up new user, ipc, pid, network and uts namespaces (but note the user namespace is required if bwrap is not installed setuid root). The application in the sandbox can be made to run with a different UID and GID.
If needed (e.g. when using a PID namespace) bwrap is running a minimal pid 1 process in the sandbox that is responsible for reaping zombies. It also detects when the initial application process (pid 2) dies and reports its exit status back to the original spawner. The pid 1 process exits to clean up the sandbox when there are no other processes in the sandbox left.
OPTIONS
When options are used multiple times, the last option wins, unless otherwise specified.
General options:
- Print help and exit
--version
- Print version
--args FD
- Parse nul-separated arguments from the given file descriptor. This option can be used multiple times to parse options from multiple sources.
Options related to kernel namespaces:
--unshare-user
- Create a new user namespace
--unshare-user-try
- Create a new user namespace if possible else skip it
--unshare-ipc
- Create a new ipc namespace
--unshare-pid
- Create a new pid namespace
--unshare-net
- Create a new network namespace
--unshare-uts
- Create a new uts namespace
--unshare-cgroup
- Create a new cgroup namespace
--unshare-cgroup-try
- Create a new cgroup namespace if possible else skip it
--unshare-all
- Unshare all possible namespaces. Currently equivalent with: --unshare-user-try --unshare-ipc --unshare-pid --unshare-net --unshare-uts --unshare-cgroup-try
--uid UID
- Use a custom user id in the sandbox (requires --unshare-user)
--gid GID
- Use a custom group id in the sandbox (requires --unshare-user)
--hostname HOSTNAME
- Use a custom hostname in the sandbox (requires --unshare-uts)
Options about environment setup:
--chdir DIR
- Change directory to DIR
--setenv VAR VALUE
- Set an environment variable
--unsetenv VAR
- Unset an environment variable
Options for monitoring the sandbox from the outside:
--lock-file DEST
- Take a lock on DEST while the sandbox is running. This option can be used multiple times to take locks on multiple files.
--sync-fd FD
- Keep this file descriptor open while the sandbox is running
Filesystem related options. These are all operations that modify the filesystem directly, or mounts stuff in the filesystem. These are applied in the order they are given as arguments. Any missing parent directories that are required to create a specified destination are automatically created as needed.
--bind SRC DEST
- Bind mount the host path SRC on DEST
--dev-bind SRC DEST
- Bind mount the host path SRC on DEST, allowing device access
--ro-bind SRC DEST
- Bind mount the host path SRC readonly on DEST
--remount-ro DEST
- Remount the path DEST as readonly. It works only on the specified mount point, without changing any other mount point under the specified path
--proc DEST
- Mount procfs on DEST
--dev DEST
- Mount new devtmpfs on DEST
--tmpfs DEST
- Mount new tmpfs on DEST
--mqueue DEST
- Mount new mqueue on DEST
--dir DEST
- Create a directory at DEST
--file FD DEST
- Copy from the file descriptor FD to DEST
--bind-data FD DEST
- Copy from the file descriptor FD to a file which is bind-mounted on DEST
--ro-bind-data FD DEST
- Copy from the file descriptor FD to a file which is bind-mounted readonly on DEST
--symlink SRC DEST
- Create a symlink at DEST with target SRC
Lockdown options:
--seccomp FD
- Load and use seccomp rules from FD. The rules need to be in the form of a compiled eBPF program, as generated by seccomp_export_bpf.
--exec-label LABEL
- Exec Label from the sandbox. On an SELinux system you can specify the SELinux context for the sandbox process(s).
--file-label LABEL
- File label for temporary sandbox content. On an SELinux system you can specify the SELinux context for the sandbox content.
--block-fd FD
- Block the sandbox on reading from FD until some data is available.
--userns-block-fd FD
- Do not initialize the user namespace but wait on FD until it is ready. This allow external processes (like newuidmap/newgidmap) to setup the user namespace before it is used by the sandbox process.
--info-fd FD
- Write information in JSON format about the sandbox to FD.
--new-session
- Create a new terminal session for the sandbox (calls setsid()). This disconnects the sandbox from the controlling terminal which means the sandbox can't for instance inject input into the terminal.
Note: In a general sandbox, if you don't use --new-session, it is recommended to use seccomp to disallow the TIOCSTI ioctl, otherwise the application can feed keyboard input to the terminal.
--die-with-parent
- Ensures child process (COMMAND) dies when bwrap's parent dies. Kills (SIGKILL) all bwrap sandbox processes in sequence from parent to child including COMMAND process when bwrap or bwrap's parent dies. See prctl, PR_SET_PDEATHSIG.
--as-pid-1
- Do not create a process with PID=1 in the sandbox to reap child processes.
--cap-add CAP
- Add the specified capability when running as privileged user. It accepts the special value ALL to add all the permitted caps.
--cap-drop CAP
- Drop the specified capability when running as privileged user. It accepts the special value ALL to drop all the caps. By default no caps are left in the sandboxed process. The --cap-add and --cap-drop options are processed in the order they are specified on the command line. Please be careful to the order they are specified.
ENVIRONMENT
- Used as the cwd in the sandbox if --cwd has not been explicitly specified and the current cwd is not present inside the sandbox. The --setenv option can be used to override the value that is used here.
EXIT STATUS
The bwrap command returns the exit status of the initial application process (pid 2 in the sandbox).
Linux man pages generated by: SysTutorials | https://www.systutorials.com/docs/linux/man/1-bwrap/ | CC-MAIN-2019-47 | refinedweb | 1,067 | 59.03 |
introduction of the O'Reilly book Google Hacks
tells us that the filetype: query qualifier restricts
your Google search to files whose names end with a particular
extension. The book's first example of this is
homeschooling filetype:pdf, a query that searches for the word
"homeschooling" in Adobe Acrobat files. The second example,
"leading economic indicators" filetype:ppt, looks for the
phrase "leading economic indicators" in Microsoft PowerPoint
presentations. (Of course, Google checks the file extension and
not the actual format; if an Excel spreadsheet with a "ppt" file
extension is in Google's index, the second search will look for
the target phrase there, and if a PowerPoint presentation with an
extension of "pres" is in the index, the same search will ignore
it.)
Being an XML geek, I had to run immediately to Google's
homepage to try searching XML files with this trick. Simply
entering filetype:xml
as a Google query returns nothing, so I entered filetype:xml
test to search for XML files with the word "test" in them, and
Google reported 329,000 hits. (All "hits" figures listed here will
evolve by the time you read this.) The query filetype:xml
-test, which searches for files with an extension of "xml"
that don't have the word "test" in their contents, gave me
1,080,000 hits. So my rough guess puts 1.4 million files with an
extension of "xml" in Google's index.
Of course, it's a very rough guess. As you read about my
further experiments in searching only XML files of particular
document types, such as DocBook files and TEI files, as well as my
Google searches through RSS, FOAF and other RDF files, remember
that I based it all on hunches and guesswork. The
technical-sounding term for this exploration into Google
capabilities is "reverse engineering," but the most appropriate
term is the one that gave the name to the popular O'Reilly series:
hacks.
Running my test/-test pair of searches for files with an
extension of "xhtml" showed about half a million in Google's
index. This is useful to the many XML developers who know that
these HTML files are much more likely to be properly well-formed,
and maybe even valid against a DTD or schema, than files with
extensions of "html" or "htm".
Many XHTML files have an extension of "xml" as well, and
these present a problem when searching for XML documents of other
document types besides XHTML. For example, a search (filetype:xml
docbook) for files with an extension of "xml" that mention DocBook, a DTD popular for
technical writing and computer books since SGML days, will find
XHTML files that discuss DocBook as well as actual DocBook
files.
Let's look at some strategies for locating DocBook files
and then return to this issue of XHTML files that discuss
DocBook. Technically, DocBook has no namespace URI associated with
it, but when mixing DocBook elements with elements from other
namespaces, many people want to assign a namespace URI to those
elements, and "" seems to be
popular. As the ancestor directory for many DocBook DTD files,
this URL shows up in the SYSTEM parameter of a lot of DOCTYPE
declarations. A
search for files with an extension of "xml" that contain this
string turns up about 1,170 hits, many of which are and many
of which aren't DocBook files.
The context phrases that Google search results show around these
hits often show tags from the DocBook DTD, making it easier to see
which ones are really DocBook documents. A search of XML files for
the quoted phrase
"oasis dtd docbook xml" gets about 1,560 hits because Google,
which ignores punctuation, often finds that phrase in a public
identifier string like "-//OASIS//DTD DocBook XML V4.2//EN". Some
of these files are actually HTML representations of complete
DocBook files, perhaps with numbers to show them as the "source
code" for some project.
I tried adding the quoted string "doctype article" to
that last search and found some
surprising results. While Google supposedly doesn't index tag
names or the contents of DOCTYPE declarations, it apparently does
in certain circumstances. (Again: guesswork! Reverse engineering!
Hacks!) Several results for this query show a document "title"
(for HTML files, the part in the head
element's title element) that begin like this:
"<html> <head> </head><body><pre>".
Following
one of these links shows no such HTML tags. Following the
corresponding
link to the Google cache shows that the document was
"converted" to HTML for Google's cache by mapping all less-than
signs to < entity references and then wrapping the whole
document in the appropriate HTML tags to make it one big
HTML pre element.
This is good news for two reasons: first, while a Google
search for XML files of a particular document type may show you
plenty of XHTML documents that discuss that document type, as
opposed to actually being documents of that type, don't let a
string of HTML tags in Google's result listing discourage you --
the file might be a document of the type you're interested in
after all. Second, when Google does this, it apparently indexes
the entire DocBook document as the contents of an
HTML pre element, putting tag names and attribute values
in the index as well, because it just considers them to be
more pre content. When element and attribute names,
attribute values, and other markup metadata are in the index, you
can use them as search terms, which is why I got DocBook hits from
a search for "doctype article".
Another DTD that's been popular since SGML days is the
one developed by the Text Encoding
Initiative, a non-profit group that has worked to make it
easier to encode literary and linguistic texts since 1987. I had
disappointing results with a search of filetype:xml
"TEI DTD" ("TEI DTD" being a phrase in its public identifier),
but eventually figured out that "tei" is a more popular extension
for these files than "xml". For example, a search for
filetype:tei tei gave me 2,630 hits.
XHTML and TEI files aren't the only XML documents that
often don't have extensions of "xml". Running my test/-test pair
of searches for files with an extension of "rss" showed about
116,000 files in Google's index. Of course, they're not
necessarily all well-formed XML; specialized RSS search engines do
exist, but the ability to search them with Google means that you
can use all the other search techniques described here and in the
"Google Hacks" book to search RSS files. For example, a search
of
filetype:rss looks for files with an
"rss" extension that include the namespace URL for RSS 1.0 in
their content, resulting in 10,800 hits. Searching for the same
URL in files with an "rdf" extension (
filetype:rdf) gave me 34,500 hits.
To search in both filetypes at once, use Google's OR
operator. (Remember to enter it in upper-case.) The search
filetype:rdf OR filetype:rss gave me
47,200 hits, and a more specific search for the term "XForms" in
RSS 1.0 files with an extension of "rdf" or "rss" (
filetype:rdf OR filetype:rss xforms)
found 21 files. Remember that all the found documents aren't
necessarily RSS 1.0, but odds are that most files with an
extension of "rss" or "rdf" that have the string
"" in them are RSS 1.0 files.
RDF is used for more than RSS. FOAF, or Friend Of A
Friend, files are an experiment in the RDF community to store
personal metadata -- where people live and work, what their
interests are, and who their friends are. A typical FOAF file (mine, for example)
doesn't list all of a person's friends, but only those who
have FOAF files themselves; the growing collection of FOAF-to-FOAF
links provide sample data for various RDF experiments.
There are conventions for FOAF filenames, but no set
rules, so to search for FOAF files in Google, instead
of filetype: I used the inurl: qualifier. This
searches for URLs that have the specified string in them. Just
entering inurl:foaf
as a search term gave me 37,200 hits, but that included the FOAF
specs, articles about it, and associated software. Adding the FOAF
namespace URL to create a search query of
inurl:foaf gave me 1,090 hits, with
a much higher percentage of hits on the first Google result page
being actual FOAF RDF files. You can add search terms to this to
search within those files for a specific term -- for example, to
see how many of those FOAF files specify a value for the
FOAF workplacehomepage property, enter
inurl:foaf workplacehomepage.
FOAF files and RSS 1.0 are the two most popular uses of
RDF that I know of. The OWL Web Ontology
Language provides infrastructure for the ontology part of the
Semantic Web. How popular is this set of RDF properties? A check
for filetype:rdf
owl showed 456 hits; repeated checks over time will give clues
about the progress of its popularity. Once the number of hits gets
into four figures, Semantic Web experiments are going to get
easier and easier.
What kind of experiments can we do with the RDF out
there? I've started playing a bit to answer this related
question: what else do people use RDF for besides FOAF and RSS
1.0? By searching for files that have an extension of "rdf" but
don't mention FOAF or RSS, I hope to find out. A Google query
of
filetype:rdf -rss -foaf ("show me files with a filetype of
'rdf' that don't have the strings 'rss' or 'foaf' in them") gave
me 150,000 hits. Of course, many turn out to be RSS or FOAF files
anyway, but this particular query reduces their percentage. Using
the Google API and a
simple Perl script described in "Google Hacks," I can pull down
URLs for some of these RDF files, and then a batch file that uses
the wget
utility can pull down the files themselves.
files into a single RDF triple store will create an interesting
collection of RDF to play with. I certainly can't assume that all
the files will contain good RDF, but using rdflib
and Python's exception handling ability, the following short
script rejects any RDF files that it can't parse, reads the rest
into a single triple store, and at the end saves it all as a
single XML/RDF file:
#! /usr/bin/python
from rdflib.TripleStore import TripleStore
store = TripleStore()
# Try to read files data/1.rdf, data/2.rdf ... data/34.rdf into a
# TripleStore directory, then save that as test.rdf.
for i in range(1,35):
filename = "data/" + str(i) + ".rdf"
try:
store.load(filename)
except:
print "bad XML: " + filename
store.save("test.rdf")
It's only an experiment, and it's just a start, but I'm
confident that as I scale it up, analysis of the results will
reveal valuable information about how people use RDF. Repeating
the same experiment every six or eight months is bound to be
interesting as well, showing increases and decreases in the
popularity of various aspects of RDF.
Whether you're interested in RDF or any other kinds of
XML, the presence of this freely accessible, constantly updated,
massive index of XML files known as Google is quite a
resource. Combining the techniques shown here with others in the
book "Google Hacks" gives you a lot to play with. You've seen one
of my ideas for future research to take advantage of this
resource. I look forward to seeing yours.
© , O’Reilly Media, Inc.
(707) 827-7019
(800) 889-8969
All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners. | http://www.xml.com/pub/a/2004/02/11/googlexml.html | CC-MAIN-2016-40 | refinedweb | 1,996 | 65.66 |
Notifications
You’re not receiving notifications from this thread.
Checking for expired documents and sending email reminders
Hi,
I've got a system where users upload documents with expiry dates. I want to send the user an email reminder 1 month and 1 week before expiration to remind them to upload a new document.
What's the best way to do this?
Thanks in advance.
Steve
Hey Stephen,
Since you'll be storing the expiration date on a Document model (along with the reference to the file), you can always verify the document hasn't expired before linking to the file and you can use that same attribute to send the emails.
I would use a Date column to store the expiration.
In this situation, what's easiest is to write two scopes, one for the month, one for the week reminder.
scope :expires_in_one_month, ->{ where(expires_at: 1.month.from_now.to_date) } scope :expires_in_one_week, ->{ where(expires_at: 1.week.from_now.to_date) }
Now you have two queries that let you find documents that expire in a month and a week.
You can build a cron job that runs once per day and grabs all the documents for each of those expirations and emails the users.
def email_reminders Document.expires_in_one_month.each do |document| UserMailer.upload_new_reminder(document) end Document.expires_in_one_week.each do |document| UserMailer.upload_new_reminder(document) end end
At a high level, that's all there is to it. I'm sure there will be plenty of smaller details you'll need to implement, but this should get you started..
The downside of scheduling jobs is that they're very hard to cancel and manage if you need to ever do that. I find that generally outweighs a nightly cron by a lot and almost never go with the jobs route for a situation like this.
Personally, I think cron jobs are a great solution for only one server deployments. it keeps things simple to start for sure.
Cron jobs are good for multi-server setups too. Just have one server run cron jobs and your background jobs. They'll all share the same database anyways so there's nothing server-specific.
Whats the best way to tackle cron jobs on Heroku as the whenever gem isn't supported?
I'm not a fan of cron because it's fragile when worker nodes die. For years now I've been using a delayed_job that runs once a minute. Upon waking up, it has two tasks:
- Schedule for immediate execution any tasks whose time has come, and
- Reschedule itself for the start of the next minute.
This was originally built for timed workflow transitions, but (1) also includes scheduling jobs that handle other one-shot events, such as sending notifications that are due but not yet marked as sent. This scheme also avoids having to perform cleanup when the schedule changes. | https://gorails.com/forum/checking-for-expired-documents-and-sending-email-reminders | CC-MAIN-2022-21 | refinedweb | 474 | 65.52 |
SHGetFileInfo function
Retrieves information about an object in the file system, such as a file, folder, directory, or drive root.
Syntax
Parameters
- pszPath [in]
Type: LPCTSTR
A pointer to a null-terminated string of maximum length MAX_PATH that contains the path and file name. Both absolute and relative paths are valid.
If the uFlags parameter includes the SHGFI_PIDL flag, this parameter must be the address of an ITEMIDLIST (PIDL) structure that contains the list of item identifiers that uniquely identifies the file within the Shell's namespace. The PIDL must be a fully qualified PIDL. Relative PIDLs are not allowed.
If the uFlags parameter includes the SHGFI_USEFILEATTRIBUTES flag, this parameter does not have to be a valid file name. The function will proceed as if the file exists with the specified name and with the file attributes passed in the dwFileAttributes parameter. This allows you to obtain information about a file type by passing just the extension for pszPath and passing FILE_ATTRIBUTE_NORMAL in dwFileAttributes.
This string can use either short (the 8.3 form) or long file names.
- dwFileAttributes
Type: DWORD
A combination of one or more file attribute flags (FILE_ATTRIBUTE_ values as defined in Winnt.h). If uFlags does not include the SHGFI_USEFILEATTRIBUTES flag, this parameter is ignored.
- psfi [in, out]
Type: SHFILEINFO*
Pointer to a SHFILEINFO structure to receive the file information.
- cbFileInfo
Type: UINT
The size, in bytes, of the SHFILEINFO structure pointed to by the psfi parameter.
- uFlags
Type: UINT
The flags that specify the file information to retrieve. This parameter can be a combination of the following values.
SHGFI_ADDOVERLAYS (0x000000020)
Version 5.0. Apply the appropriate overlays to the file's icon. The SHGFI_ICON flag must also be set.
SHGFI_ATTR_SPECIFIED (0x000020000)
Modify SHGFI_ATTRIBUTES to indicate that the dwAttributes member of the SHFILEINFO structure at psfi contains the specific attributes that are desired. These attributes are passed to IShellFolder::GetAttributesOf. If this flag is not specified, 0xFFFFFFFF is passed to IShellFolder::GetAttributesOf, requesting all attributes. This flag cannot be specified with the SHGFI_ICON flag.
SHGFI_ATTRIBUTES (0x000000800)
Retrieve the item attributes. The attributes are copied to the dwAttributes member of the structure specified in the psfi parameter. These are the same attributes that are obtained from IShellFolder::GetAttributesOf.
SHGFI_DISPLAYNAME (0x000000200)
Retrieve the display name for the file, which is the name as it appears in Windows Explorer. The name is copied to the szDisplayName member of the structure specified in psfi. The returned display name uses the long file name, if there is one, rather than the 8.3 form of the file name. Note that the display name can be affected by settings such as whether extensions are shown.
SHGFI_EXETYPE (0x000002000)
Retrieve the type of the executable file if pszPath identifies an executable file. The information is packed into the return value. This flag cannot be specified with any other flags.
-
Retrieve the handle to the icon that represents the file and the index of the icon within the system image list. The handle is copied to the hIcon member of the structure specified by psfi, and the index is copied to the iIcon member.
SHGFI_ICONLOCATION (0x000001000)
Retrieve the name of the file that contains the icon representing the file specified by pszPath, as returned by the IExtractIcon::GetIconLocation method of the file's icon handler. Also retrieve the icon index within that file. The name of the file containing the icon is copied to the szDisplayName member of the structure specified by psfi. The icon's index is copied to that structure's iIcon member.
SHGFI_LARGEICON (0x000000000)
Modify SHGFI_ICON, causing the function to retrieve the file's large icon. The SHGFI_ICON flag must also be set.
SHGFI_LINKOVERLAY (0x000008000)
Modify SHGFI_ICON, causing the function to add the link overlay to the file's icon. The SHGFI_ICON flag must also be set.
SHGFI_OPENICON (0x000000002)
Modify SHGFI_ICON, causing the function to retrieve the file's open icon. Also used to modify SHGFI_SYSICONINDEX, causing the function to return the handle to the system image list that contains the file's small open icon. A container object displays an open icon to indicate that the container is open. The SHGFI_ICON and/or SHGFI_SYSICONINDEX flag must also be set.
SHGFI_OVERLAYINDEX (0x000000040)
Version 5.0. Return the index of the overlay icon. The value of the overlay index is returned in the upper eight bits of the iIcon member of the structure specified by psfi. This flag requires that the SHGFI_ICON be set as well.
-
Indicate that pszPath is the address of an ITEMIDLIST structure rather than a path name.
SHGFI_SELECTED (0x000010000)
Modify SHGFI_ICON, causing the function to blend the file's icon with the system highlight color. The SHGFI_ICON flag must also be set.
SHGFI_SHELLICONSIZE (0x000000004)
Modify SHGFI_ICON, causing the function to retrieve a Shell-sized icon. If this flag is not specified the function sizes the icon according to the system metric values. The SHGFI_ICON flag must also be set.
SHGFI_SMALLICON (0x000000001)
Modify SHGFI_ICON, causing the function to retrieve the file's small icon. Also used to modify SHGFI_SYSICONINDEX, causing the function to return the handle to the system image list that contains small icon images. The SHGFI_ICON and/or SHGFI_SYSICONINDEX flag must also be set.
SHGFI_SYSICONINDEX (0x000004000)
Retrieve the index of a system image list icon. If successful, the index is copied to the iIcon member of psfi. The return value is a handle to the system image list. Only those images whose indices are successfully copied to iIcon are valid. Attempting to access other images in the system image list will result in undefined behavior.
SHGFI_TYPENAME (0x000000400)
Retrieve the string that describes the file's type. The string is copied to the szTypeName member of the structure specified in psfi.
SHGFI_USEFILEATTRIBUTES (0x000000010)
Indicates that the function should not attempt to access the file specified by pszPath. Rather, it should act as if the file specified by pszPath exists with the file attributes passed in dwFileAttributes. This flag cannot be combined with the SHGFI_ATTRIBUTES, SHGFI_EXETYPE, or SHGFI_PIDL flags.
Return value
Type: DWORD_PTR
Returns a value whose meaning depends on the uFlags parameter.
If uFlags does not contain SHGFI_EXETYPE or SHGFI_SYSICONINDEX, the return value is nonzero if successful, or zero otherwise.
If uFlags contains the SHGFI_EXETYPE flag, the return value specifies the type of the executable file. It will be one of the following values.
Remarks
You should call this function from a background thread. Failure to do so could cause the UI to stop responding.
If SHGetFileInfo returns an icon handle in the hIcon member of the SHFILEINFO structure pointed to by psfi, you are responsible for freeing it with DestroyIcon when you no longer need it.
Note Once you have a handle to a system image list, you can use the Image List API to manipulate it like any other image list. Because system image lists are created on a per-process basis, you should treat them as read-only objects. Writing to a system image list may overwrite or delete one of the system images, making it unavailable or incorrect for the remainder of the process.
You must initialize Component Object Model (COM) with CoInitialize or OleInitialize prior to calling SHGetFileInfo.
When you use the SHGFI_EXETYPE flag with a Windows application, the Windows version of the executable is given in the HIWORD of the return value. This version is returned as a hexadecimal value. For details on equating this value with a specific Windows version, see Using the Windows Headers.
Examples
The following code example uses SHGetFileInfo to retrieve the display name of the Recycle Bin, identified by its PIDL.
LPITEMIDLIST pidl = NULL; hr = SHGetFolderLocation(NULL, CSIDL_BITBUCKET, NULL, 0, &pidl); if (SUCCEEDED(hr)) { SHFILEINFOW sfi = {0}; hr = SHGetFileInfo((LPCTSTR)pidl, -1, &sfi, sizeof(sfi), SHGFI_PIDL | SHGFI_DISPLAYNAME) if (SUCCEEDED(hr)) { // The display name is now held in sfi.szDisplayName. } } ILFree(pidl);
Requirements
See also | http://msdn.microsoft.com/en-us/library/bb762179.aspx | CC-MAIN-2014-35 | refinedweb | 1,306 | 56.96 |
Form based authentication class resides within "System.web.security"Namespace . There are two technique which used to authenticate the user manually by following ways.
- By the hard code value
- By the web.config file
1.) By the hard code value:- In this user can verify (authenticate) the web form (login.aspx) by specifying the user name and password from hard code value.
2.) By web.config file:-In this user can authenticate (verify ) the web form (login.aspx page) by specifying the user name and password from web.config file.
Note:- We can authenticate the user name and password from database also.
Where we can use this Authentication:-
Suppose you have limited employee in your organization(ex.200 employee).if you want to host your asp.net website on server to provide the relevant information to your employee. if you want ,only company 's member can access the asp.net website then you will have to generate user name and password manually and save in web.config file or in hard code values.If you want to share secure information on your asp.net website so that only company's members can access them,then you will have to provide user name and password to each employee which you have mentioned in web.config file or hard code values.If any employee want to see the information send by the manager of company then they will have to verify your user name and password which is provide by the organization(manager). When any employee open the website then login page (login.aspx) will be opened first, after authenticate the login page with user name and password employee will be redirected to home page (main page) of the website.After access the application you have to Logout .Other wise any anonymous user can login as your name with the help of browser cookie(persistence or Non persistence) data.It can be more harmful for an organization(company).
There are some attribute and element which we can use in web.config file (under authentication and authorization section).
There are some attribute and element which we can use in web.config file (under authentication and authorization section).
- name:-It is a optional attribute.It specifies the HTTP Cookie to use for authentication.If you are running multiple application on server then you will be required a unique cookie name in each web.config file for each application. ASPXAUTH is a default name where cookie data is stored.
- loginUrl :- It is a optional attribute that specifies the URL to which the request is redirected for logon.In this application ,i have set login.aspx page for logon. If no valid cookie is found for authentication then it will automatically redirected to login.aspx page.
- defaultUrl :- It is a optional attribute .It defines the default URL that is used for redirection after authentication.I have already set defaultUrl = "home.aspx" in my application.
- Protection:- It specifies the type of encryption if any to use for cookie.This option usages the configuration data validation algorithm such as DES and Triple DES If it is available.
- Path:- It specifies the path cookies that are used by the application.Most of Browsers at this time are case sensitive.If there is a path case mismatch then it don't send cookies back to the application.
- requiredSSL :- It specifies whether an SSL connection is required to transmit the authentication cookie.In my application ,i have used requiredSSL ="false".
- Timeout:- It is a time in minute after which the cookie of browser will be expired.By default it is 30 minute.
- slidingExpiration:- It specifies whether sliding Expiration is enabled,sliding Expiration resets the active authentication time for a cookie to expire on each request during single session.
- credentials:- It allow user name and password credentials within configuration file.We can easily create custom user name and password scheme to use an external source for authentication of web page like database.
- Authentication:- It is a parent element of web.config file.It is used to identify the users who view an asp.net application.
There are some steps to implement this concepts on asp.net application.
Step 1:- First open your visual studio-->File -->New -->Website-->Select asp.net Empty website -->OK-->Open solution Explorer -->Add a Web Form (login.aspx)-->Drag and drop Label ,Text Box and Button control from the tool Box as shown below:-
Step 2:- Now add another web form (home.aspx) in your project-->Drag and drop Button and Label control as shown below:-
Step 3:- Now open web.config file -->writes the following codes as given below:-
<configuration> <system.web> <authentication mode="Forms"> <forms name=".ASPXAUTH" loginUrl="login.aspx" defaultUrl="home.aspx" protection="All" path="/" requireSSL="false" timeout="20" slidingExpiration="true "> <credentials passwordFormat="Clear"> <!--<credentials passwordFormat="SHA1">--> <!--<credentials passwordFormat="MD5">--> <user name="ram" password="ram123"/> <user name="shayam" password="shayam123"/> <user name="neha" password="neha123"/> </credentials> </forms> </authentication> <authorization> <deny users="?"/> <allow users="*"/> </authorization> <compilation debug="true"/> </system.web> </configuration>Note:- Here, i have created some user name and password manually in web.config file.Only these users can be able to authenticate the login.aspx page.
Step 4:- Open login.aspx page --> Write the following c# codes for each button codes(login.aspx.cs ) as given below:-
using System; using System.Web; using System.Web.UI; using System.Web.UI.WebControls; using System.Web.Security; public partial class login : System.Web.UI.Page { protected void Page_Load(object sender, EventArgs e) { Session["id"] = TextBox1.Text; } protected void Button1_Click(object sender, EventArgs e) { bool validformlogin = false; validformlogin = Authenticate_user(TextBox1.Text.Trim(), TextBox2.Text.Trim()); if (validformlogin) { FormsAuthentication.RedirectFromLoginPage(TextBox1.Text.Trim(), false); } else { Response.Write("invalid login ..try again"); } } private bool Authenticate_user(string user_name, string password) { if (user_name == "admin" && password == "admin123") { return true; } else if(user_name == "neha" && password == "neha123") { return true; } else if (user_name == "sanjay" && password == "sanjay123") { return true; } else { return false; } } protected void Button2_Click1(object sender, EventArgs e) { if (FormsAuthentication.Authenticate(TextBox1.Text, TextBox2.Text)) { FormsAuthentication.RedirectFromLoginPage(TextBox1.Text, false); } else { Response.Write("invalid user ...try again"); } } }
Description:- In button 1 and button 2 clicks,i have written a common function which is given below:-
- RedirectLoginPage Function:-> This function takes two parameter, one is for user name for whom cookie is created and second one is Boolean value to specify whether cookie is persistence or Non Persistence. This function checks the URL of login page,if it return the URL specify in web.config then user will be redirected to that web page and it checks web.config file for defaultUrl .It specify, user is redired to that web page but it not specify,user will be redirected to defaultUrl page.
- Password Format Attribute:-> This attribute is used in format ,in which, password value is given in web.config file.If this attribute value is clear ,it means password value is store in plane text format.If this attribute value is in MD5 or SHA1 ,it means Password is stored in encrypted form By using MD5 or SHA1 . To set the encrypted values of some plane text we can call "HashPasswordForStoringIn ConfigFile" class.it takes two parameter
2.) Value for name of algorithm
Example:- If you are using password format MD5 or SH1 then you can use below c# codes:-
protected void Page_Load(object sender, EventArgs e) { Response.Write(FormsAuthentication.HashPasswordForStoringInConfigFile("filename", "SHA1")); }
- If there are some resources which have to access by all the users then we can specify that tag by using location tag in web.config file.I have already used location tag in windows authentication tutorials.
Step 5:- Now open home.aspx page -->write the c# codes in home.aspx.cs file as given below:-
using System; using System.Web; using System.Web.UI; using System.Web.UI.WebControls; public partial class home : System.Web.UI.Page { protected void Page_Load(object sender, EventArgs e) { try { Label1.Text = Session["id"].ToString(); } catch { Response.Redirect("login.aspx"); } } protected void Button1_Click(object sender, EventArgs e) { Session.RemoveAll(); Response.Redirect("login.aspx"); } }
Step 6:- Now Run the application (press F5)--> Filled the required field values (user name and password) for hard code value authentication-->press Login through hard code button.
Step 7:- Now Run the application again --> Verify (authenticate) the web page(login.aspx ) by user name and password fields from web.config file as shown below:-
Step 8:- If you don't enter correct details (user name or password ) which specify in hard code or web.config file the it will give following error as shown below:
Step 9:- If you save the password in browser cookie -->then you can login without user name and password.But it is harmful ,if any other user access your computer.-->so press Logout Button before exit the application.
Note:- In coming tutorial will put full security features in existing login control Using Administrative Tool property of visual studio 2010.
For More.....
- How to connect any database through OleDb connection
- How to use different connection string in asp.net application
- How to edit delete insert update and print operation in Data List control
- Data mining in asp.net
- Session state in asp.net
- Joins in Sql server 2008
- How to send mail from asp.net application free
- Web Form control in asp.net
- How to host asp.net website on server free
- Stored procedure in sql server
- Take print receipt in windows forms application
- Data Integrity in sql server 2008
Download
thanks , you really saved my time ..
Having no Master page currently but facing this problem "A page can have only one server-side Form tag." after clicking "Hard code" button.
Any help?
Dear Needing, .NET is a programming framework created by Microsoft that developers can use to create applications more easily. As commenter dwroth aptly put it, "a framework is just a bunch of code that the programmer can call without having to write it explicitly." In a perfect world, you wouldn't need .NET Framework
Thanks...its very helpful.. | http://www.msdotnet.co.in/2014/02/how-to-implement-form-based.html | CC-MAIN-2017-26 | refinedweb | 1,663 | 50.94 |
Date: 1995/12/06
+>:
+>::
+>::I have recently compiled version 1.3.35 on my Linux
+>:: box. When running under 1.2.12 all network function work fine. Under
+>:: 1.3.35 I can not even ping 127.0.0.1 (localhost). The route command
+>:: always returns 'SIOCADDRT: Invalid argument'. I double checked and
+>:: re-compiled insuring that I enable Networking support and TCP/IP
+>:: support although I did not enable gatewaying, multicasting, firewalling,
+>:: accounting, or tunneling (don't ever remember enable such in 1.2.xx
+>:: kernels). Do I need to any of these in order to get my networking/route working
+>:: again.
+>
+>: Please type "ifconfig" to check local-loop and
+>: ethernet cards.
+>:
+>: ---- Chiang.
+>
+>"ifconfig" returns exactly the same thing under kernel 1.2.x and
+>1.3.x. It shows valid I.P. addresses for both the localhost
+>(127.0.0.1) and the ethernet cards. Running route under 1.2.x returns
+>valid routes and under 1.3.x returns no routes. Trying to add a route
+>(as is done on boot up or manually) is when the SIOCADDRT error is
+>returned.
+>
I had exact same problem, and after tracing it down I am surprized that not
everybody does :-(
The problem is in /sbin/route being old (almost 2 years old :-)
and issuing ioctl of SIOCADDRTOLD, to which 1.2.x kernels replied with
Warning: obsolete routing request made.
and the 1.3.x (x == 35 for Richard, x == 42 for me) kernels reply -EINVAL.
To verify that this is indeed your problem, execute:
strace -o /tmp/trace.out /sbin/route add -net 127.0.0.0
and look for 'ioctl' call in /tmp/trace.out.
The line probably looks like this:
ioctl(4, 0x8940, 0xbffffab0) = -1 (Invalid argument)
where 0x8940 == SIOCADDRTOLD.
I tried to find newer /sbin/route on sunsite or tsx-11, but didn't find one.
There is tsx-11.mit.edu:/pub/linux/sources/system/route.c, that wouldn't
even compile (at least not with libc-5.2.18).
Here is a patch that makes it to compile and add the route:
(compile with 'cc -o route route.c')
*** route.c.old Mon Feb 14 00:00:00 1994
--- route.c Sat Dec 23 23:55:43 1995
***************
*** 28,45 ****
#include <unistd.h>
#include <ctype.h>
/* Pathnames of the PROCfs files used by NET. */
#define _PATH_PROCNET_ROUTE "/proc/net/route"
- #ifdef SIOCADDRTOLD
#define mask_in_addr(x) (((struct sockaddr_in *)&((x).rt_genmask))->sin_addr.s_addr)
#define full_mask(x) (x)
- #else
- #define mask_in_addr(x) ((x).rt_genmask)
- #define full_mask(x) (((struct sockaddr_in *)&(x))->sin_addr.s_addr)
- #endif
char * getsock(char *bufp, struct sockaddr * sap)
{
--- 28,42 ----
#include <unistd.h>
#include <ctype.h>
+ #include <net/if_route.h>
+
/* Pathnames of the PROCfs files used by NET. */
#define _PATH_PROCNET_ROUTE "/proc/net/route"
#define mask_in_addr(x) (((struct sockaddr_in *)&((x).rt_genmask))->sin_addr.s_addr)
#define full_mask(x) (x)
char * getsock(char *bufp, struct sockaddr * sap)
{ | http://www.verycomputer.com/169_6a16edd6b98e7ef9_1.htm | CC-MAIN-2022-27 | refinedweb | 478 | 70.9 |
Java Advanced WordCount application
hi,
I've worked on doing an application to read a txt file, then print back the number of characters, words and the number of lines in the text file. Once thats been done the application must then be able to output the number of occurences of each word in the text file and on how many lines each word is:
e.g
the quick brow fox jumped over the
lazy dog
This would give:
2 occurences of "the"
1 line contains "the"
I'm new to java and i've managed to get the number of lines to report back but i'm not sure on how to get the rest done. I've explored using the StringTokenizer mthod to achieve my results but i'm finding it very difficult to code. If anyone has a chance to take a look here's the code i've been able to do:
import java.io.*;
import java.util.*;
class WordCounter {
// Main
public static void main (String[] args) {
WordCounter t = new WordCounter();
t.fileRead();
}
// Read the file and output
void fileRead() {
String record = null;
int numLines = 0;
int numWords = 0;
int numChars = 0;
try {
FileReader fr = new FileReader("test.txt");
BufferedReader br = new BufferedReader(fr);
record = new String();
while ((record = br.readLine()) != null) {
numLines++;
}
// Output values
System.out.println("Number of lines:" + numLines);
System.out.println("Number of words:" + numWords);
System.out.println("Number of chars:" + numChars);
} catch (IOException e) {
// Catch possible io errors from readLine()
System.out.println("IOException error!");
e.printStackTrace();
}
} // End of fileRead
} // End of class
Thanks if anyone can help me with this it's been annoying me now for a long time.
Chris.
To count the words:
StringTokenizer parser = new StringTokenizer(text);
int count = 0;
while (parser.hasMoreTokens()) {
String word = parser.nextToken();
count++;
} | https://www.java.net/node/646187 | CC-MAIN-2014-15 | refinedweb | 301 | 70.23 |
(the widget and its graphical representation)
Widgets don’t have a draw() method. This is done on purpose: The idea is to allow you to create your own graphical representation outside the widget class. Obviously you can still use all the available properties to do that, so that your representation properly reflects the widget’s current state. Every widget has its own
Canvasthat it is inside the axis-aligned bounding box defined by the widget’s position and size. If a simple AABB is not sufficient, you can override the method to perform the collision checks with more complex shapes, e.g. a polygon. You can also check if a widget collides with another widget with
Widget.collide_widget().
We also have some default values and behaviors that you should be aware of:
- A
Widgetis not a
Layout: it will not change the position or the size of its children. If you want control over positioning or sizing, use a
Layout.
- The default size of a widget is (100, 100). This is only changed if the parent is a
Layout. For example, if you add a
Labelis a
StringPropertyand defaults to ‘’.
If you want to be notified when the pos attribute changes, i.e. when the widget moves, you can bind your own callback function like this:
def callback_pos(instance, value): print('The widget', instance, 'moved to', value) wid = Widget() wid.bind(pos=callback_pos)
Read more about propogated. In Kivy, events bubble up from the most recently added widget and then backwards through its children (from the most recently added back to the first child). This order is the same for the on_touch_move and on_touch_up events.
If you want to reverse this order, you can raise events in the children before the parent by using the super command. For example:
class MyWidget(Widget): def on_touch_down(self, touch): super(MyWidget, self).on_touch_down(touch) # Do stuff here
In general, this would seldom be the best approach as every event bubbles all the way through event time and there is no way of determining if it has been handled. In order to stop this event bubbling, one of these methods must return True. At this point, Kivy assumes the event has been handled and the propogation stops.
This means that the recommended approach is to let the event bubble naturally but swallow the event if it has been handled. For example:
class MyWidget(Widget): def on_touch_down(self, touch): If <some_condition>: # Do stuff here and kill the event return True else: # Continue normal event bubbling return super(MyWidget, self).on_touch_down(touch)
This approach gives you good control over exactly how events are dispatched
and managed. Sometimes, however, you may wish to let the event be completely
propogated before taking action. You can use the
Clock to help you here:
class MyLabel(Label): def on_touch_down(self, touch, after=False): if after: print "Fired after the event has been dispatched!" else: Clock.schedule_once(lambda dt: self.on_touch_down(touch, True)) return super(MyLabel, contructing a simple class without subclassing
Widget.
Changed in version 1.5.0: The constructor now accepts on_* arguments to automatically bind callbacks to properties or events, as in the Kv language.
add_widget(widget, index=0, canvas=None)[source]¶
Add a new widget as a child of this widget.
>>> from kivy.uix.button import Button >>> from kivy.uix.slider import Slider >>> root = Widget() >>> root.add_widget(Button()) >>> slider = Slider() >>> root.add_widget(slider)
canvas= None¶
Canvas of the widget.
The canvas is a graphics object that contains all the drawing instructions for the graphical representation of the widget.
There are no general properties for the Widget class, such as background color, to keep the design simple and lean. Some derived classes, such as Button, do add such convenience properties but generally the developer is responsible for implementing the graphics representation for a custom widget from the ground up. See the derived widget classes for patterns to follow and extend.
See
Canvasfor
- Child Widgets, when added to a disabled widget, will be disabled automatically.
- Disabling/enabling a parent disables/enables all of its children.
New in version 1.8.0.
disabledis a
BooleanPropertyand defaults to False.
export_to_png(filename, *args)) {}
on_touch_move(touch)[source]¶
Receive a touch move event. The touch is in parent coordinates.
See
on_touch_down()for more information.
on_touch_up(touch)[source]¶
Receive a touch up event. The touch is in parent coordinates.
See
on_touch_down()for more information.
opacity¶
Opacity of the widget and all its children.
New in version 1.4.1.
The opacity attribute controls the opacity of the widget and its children. Be careful, it’s a cumulative attribute: the value is multiplied by the current global opacity and the result is applied to the current context color.
For example, if the parent has an opacity of 0.5 and a child has an opacity of 0.2, the real opacity of the child will be 0.5 * 0.2 = 0.1.
Then, the opacity is applied by the shader as:
frag_color = color * vec4(1.0, 1.0, 1.0, opacity);
opacity. | http://kivy.org/docs/api-kivy.uix.widget.html?highlight=collide_point | CC-MAIN-2015-48 | refinedweb | 836 | 57.98 |
In this blog post, we will learn how to set up a web server using flask.
Introduction
Flask is a Python web framework built with a small core and easy-to-extend philosophy.
Getting started
Before getting started, let us make sure we have python3 installed in our system.
Follow Python download link to get python installed in your system. Once the python installation is completed, let start with creating a server.
Before proceeding with the setup, let us create a folder named flask-app. Run the below command to make a folder.
$ mkdir flask-app
Now cd into the newly created
flask-app folder.
$ cd flask-app
Now let us set up a virtual environment using
python3 for the app. To set up a virtual environment, let us run the below command.
$ python3 -m venv env
After creating a virtual environment, we need to activate the environment.
$ source env/bin/activate
Now, finally, we can start with creating a web server using a flask.
Setting up flask
As python Flask is an external module, to start working on it, we need to install it.
$ pip install Flask
Now, let us create a file called
app.py in the root directory of our project. You can use the terminal or code editor of your choice.
$ touch app.py
Once the file is created, let us add the following lines of code in the file.
from flask import Flask app = Flask(__name__) @app.route("/") def hello_world(): return "<p>Hello world</p>"
Running flask server
To run the application, use the flask command or
python -m flask. Before you can do that, you need to tell your terminal the application to work with by exporting the
FLASK_APP environment variable:
export FLASK_APP=app $ flask run * Running on
Finally, our server is running on
Port 5000. Go to your browser and open localhost:5000. You should see Hello World in the browser. How cool is that? Amazing right?
If you check the flask code
@app.route("/") def hello_world(): return "<p>Hello world</p>"
We are saying in the code above that if anyone hits
/ in the browser. Then the flask app will run the
hello_word function. Since we were returning
<p>Hello world</p>, this gets rendered in the browser.
Rendering index.html and CSS using flask
So far, we returned a string from the server. In this section, let us try to return HTML, CSS, Javascript files when we hit
/in the browser. To do that, we need to create two folders named
static and
templates
$ mkdir static $ mkdir templates
We will place all the views file, HTML files in the template folder; js and CSS files inside the static folder.
Let's create an
index.html file inside the
template folder and add the snippet.
index.html
<!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8" /> <meta http- <title>Document</title> <link rel="stylesheet" type="text/css" href="static/index.css" /> <link rel="shortcut icon" href="{{ url_for('static', filename='favicon.ico') }}" /> </head> <body> <div> <p>Pratap</p> </div> <script src="static/index.js"></script> </body> </html>
Also
css and
js file inside
static folder.
index.css
body { background-color: red; }
index.js
console.log("I am running");
If you check the
index.html file
<!-- Loading the css file using this line --> <link rel="stylesheet" type="text/css" href="static/index.css" /> <!-- Linking the javascript file using this line --> <script src="static/index.js"></script>
Now let's update our
app.py file and some more code there.
from flask import Flask, render_template app = Flask( __name__, template_folder="./templates", static_folder="./static", ) @app.route("/") def hello_world(): return render_template('index.html')
If you observe the code above. We have updated the
Flask function. We let the flask know where it should load the
templates and
static files.
app = Flask( __name__, template_folder="./templates", static_folder="./static", )
By default Flask will look for
templateand
staticfolders.
And then, we also updated the
/ route we return
render_template(index.html). So, the flask app will load the
index.html file and pass it to the
render_template function.
@app.route("/") def hello_world(): return render_template('index.html')
Re-run the flask app and hit localhost:5000 from the browser. Alas! The HTML file is now loading. Amazing!
I hope you are going well.
Working with JSON
Until now, we are only working on HTML snippets. In this section, let's return a JSON object.
from flask import Flask, render_template, jsonify app = Flask( __name__, template_folder="./templates", static_folder="./static", ) @app.route("/") def hello_world(): return render_template('index.html') @app.route("/json") def json_response(): response = {"name": "Pratap", "age": 24} return jsonify([response])
So if look
json_response() function carefully we are now returning a
dictionary. We than pass it to
jsonify() function which we imported from
Flask
@app.route("/json") def json_response(): response = {"name": "Pratap", "age": 24} return jsonify([response])
If you re-run the application and hit localhost:5000/json from the browser. You will see a JSON object being displayed in the browser.
Turning on auto-reload
Until now, after making each change, you need to restart the app. We can also tell the
flask app to restart after we make any changes. We need to update the
app.py and add the following snippet at the bottom of the file. We have added a condition that if we are running the file directly, add
debug=True. This will make sure to run the app in debug mode
if __name__ == "__main__": app.run(debug=True)
Now, when running the app, we can run the app by running it in the terminal.
$ python app.py
We can also mention which port to run on. Currently, it's running on 5000 port by default.
if __name__ == "__main__": app.run(port=8000, debug=True)
Folder strucure
Things to remember
- To build a python web application, we need to import the Flask module.
- We need to pass the name of the current module, i.e., name, as an argument into the Flask constructor.
- The
route()function of the class defines the URL mapping of the associated function.
-
app.run()method is used to run our Flask Application.
To sum it up
This is it from this article. I hope I'm able to give you an overview of how the Flask application work. You can find the source code here.
💌 If you'd like to receive more tutorials in your inbox, you can sign up for the newsletter here.
Please don't hesitate to drop a comment here if I miss anything. Also, let me know if I can make the post better.
Discussion (2)
Nice pratap, keep them coming 😊
Thanks Shiva | https://practicaldev-herokuapp-com.global.ssl.fastly.net/pratap2210/beginners-guide-to-setting-up-and-running-flask-web-server-1710 | CC-MAIN-2021-31 | refinedweb | 1,102 | 68.26 |
41 /* This module contains the external function pcre_maketables(), which builds 42 character tables for PCRE in the current locale. The file is compiled on its 43 own as part of the PCRE library. However, it is also included in the 44 compilation of dftables.c, in which case the macro DFTABLES is defined. */ 45 46 47 #ifndef DFTABLES 48 # ifdef HAVE_CONFIG_H 49 # include "config.h" 50 # endif 51 # include "pcre_internal.h" 52 #endif 53 54 55 /************************************************* 56 * Create PCRE character tables * 57 *************************************************/ 58 59 /* This function builds a set of character tables for use by PCRE and returns 60 a pointer to them. They are build using the ctype functions, and consequently 61 their contents will depend upon the current locale setting. When compiled as 62 part of the library, the store is obtained via PUBL(malloc)(), but when 63 compiled inside dftables, use malloc(). 64 65 Arguments: none 66 Returns: pointer to the contiguous block of data 67 */ 68 69 #if defined COMPILE_PCRE8 70 const unsigned char * 71 pcre_maketables(void) 72 #elif defined COMPILE_PCRE16 73 const unsigned char * 74 pcre16_maketables(void) 75 #elif defined COMPILE_PCRE32 76 const unsigned char * 77 pcre32_maketables(void) 78 #endif 79 { 80 unsigned char *yield, *p; 81 int i; 82 83 #ifndef DFTABLES 84 yield = (unsigned char*)(PUBL(malloc))(tables_length); 85 #else 86 yield = (unsigned char*)malloc(tables_length); 87 #endif 88 89 if (yield == NULL) return NULL; 90 p = yield; 91 92 /* First comes the lower casing table */ 93 94 for (i = 0; i < 256; i++) *p++ = tolower(i); 95 96 /* Next the case-flipping table */ 97 98 for (i = 0; i < 256; i++) *p++ = islower(i)? toupper(i) : tolower(i); 99 100 /* Then the character class tables. Don't try to be clever and save effort on 101 exclusive ones - in some locales things may be different. 102 103 Note that the table for "space" includes everything "isspace" gives, including 104 VT in the default locale. This makes it work for the POSIX class [:space:]. 105 From release 8.34 is is also correct for Perl space, because Perl added VT at 106 release 5.18. 107 108 Note also that it is possible for a character to be alnum or alpha without 109 being lower or upper, such as "male and female ordinals" (\xAA and \xBA) in the 110 fr_FR locale (at least under Debian Linux's locales as of 12/2005). So we must 111 test for alnum specially. */ 112 113 memset(p, 0, cbit_length); 114 for (i = 0; i < 256; i++) 115 { 116 if (isdigit(i)) p[cbit_digit + i/8] |= 1 << (i&7); 117 if (isupper(i)) p[cbit_upper + i/8] |= 1 << (i&7); 118 if (islower(i)) p[cbit_lower + i/8] |= 1 << (i&7); 119 if (isalnum(i)) p[cbit_word + i/8] |= 1 << (i&7); 120 if (i == '_') p[cbit_word + i/8] |= 1 << (i&7); 121 if (isspace(i)) p[cbit_space + i/8] |= 1 << (i&7); 122 if (isxdigit(i))p[cbit_xdigit + i/8] |= 1 << (i&7); 123 if (isgraph(i)) p[cbit_graph + i/8] |= 1 << (i&7); 124 if (isprint(i)) p[cbit_print + i/8] |= 1 << (i&7); 125 if (ispunct(i)) p[cbit_punct + i/8] |= 1 << (i&7); 126 if (iscntrl(i)) p[cbit_cntrl + i/8] |= 1 << (i&7); 127 } 128 p += cbit_length; 129 130 /* Finally, the character type table. In this, we used to exclude VT from the 131 white space chars, because Perl didn't recognize it as such for \s and for 132 comments within regexes. However, Perl changed at release 5.18, so PCRE changed 133 at release 8.34. */ 134 135 for (i = 0; i < 256; i++) 136 { 137 int x = 0; 138 if (isspace(i)) x += ctype_space; 139 if (isalpha(i)) x += ctype_letter; 140 if (isdigit(i)) x += ctype_digit; 141 if (isxdigit(i)) x += ctype_xdigit; 142 if (isalnum(i) || i == '_') x += ctype_word; 143 144 /* Note: strchr includes the terminating zero in the characters it considers. 145 In this instance, that is ok because we want binary zero to be flagged as a 146 meta-character, which in this sense is any character that terminates a run 147 of data characters. */ 148 149 if (strchr("\\*+?{^.$|()[", i) != 0) x += ctype_meta; 150 *p++ = x; 151 } 152 153 return yield; 154 } 155 156 /* End of pcre_maketables.c */ | https://fossies.org/linux/pcre/pcre_maketables.c | CC-MAIN-2019-18 | refinedweb | 713 | 63.53 |
True Binary Serialization and
Compression of DataSets
By Peter
A. Bromberg, Ph.D.
Printer - Friendly
Version
N.B. There is a newer updated article with up-to-date source code that readers should visit after reading this article, which may be found here.
The DataSet, found in the System.Data namespace, is an amazing animal. DataSets store data in a disconnected cache. The structure of a DataSet is similar to that of a relational database; it exposes a hierarchical object model of tables, rows, and columns. In addition, it can contain constraints and relationships that have been defined for the DataSet .
An ADO.NET DataSet is one view -- a relational view -- of data that can be represented in XML. In Visual Studio and the .NET Framework, XML is the format for storing and transmitting data of all kinds. This relationship between DataSets and XML enables us to take advantage of the following features of DataSets:
The DataTable is a central object in the ADO.NET library, and contains DataRows, Constraints, and many other properties and methods that enable it to work together with other DataTables and the containing DataSet as a disconnected "in - memory database". There are methods to filter, search and sort data, and even to perform computations on data, all self-contained within these classes. The DataSet and the DataTable are the only ADO.NET objects that can be serialized and remoted. In addition, one can work with the disconnected DataSet and its tables, adding, changing or deleting rows in memory on a completely disconnected basis, call the GetChanges method, and send the modified DataSet in Diffgram Document format back to the database where it can be "hooked up" with a new DataAdapter on the server to automatically perform all the updates, inserts and deletes to the database and its underlying tables.
Both the DataRow and DataTable classes also have AcceptChanges methods. Calling AcceptChanges at the DataTable level causes the AcceptChanges method for each DataRow to be called. Similarly, invoking AcceptChanges on the DataSet causes AcceptChanges to be called on each table within the DataSet. In this manner, we have multiple levels at which the method can be invoked. Calling AcceptChanges on the DataSet enables us to invoke the method on all subordinate objects (for example, tables and rows) with a single call.
When we call AcceptChanges on the DataSet , any DataRow objects that are still in edit-mode successfully end their edits. The RowState property of each DataRow also changes; Added and Modified rows become Unchanged, and Deleted rows are removed. We now have a complete, in-memory representation of our "current database", and we can then persist the DataSet and when we subsequently load it back from our persistence medium, it will act as a kind of "mini database" so that we can always have a disconnected, complete representation of all our current working data. The DataSet and DataTable classes also support an ExtendedProperties collection in which it is possible to store, for example, a timestamp, or even a connection string.
There is one glaring drawback to both the DataSet and the DataTable that Microsoft kind of "left out" of ADO.NET: The .NET Framework has a powerful set of classes to perform serialization of objects. One of these, the BinaryFormatter, produces a very compact byte stream from virtually any .NET class or object. However, when we apply BinaryFormatter serialization to a DataSet, what we get, instead, is a byte stream filled with a huge amount of textual XML that looks just like the XML we would get by calling the WriteXml method on the DataSet. This is not good for remoting, or for storing DataSets in some sort of persistence medium (a file on the hard drive, for example) because these files take up a lot of space and/or bandwidth "over the wire".
The ADO.NET objects that are serializable through formatters -- the DataTable and DataSet classes -- correctly implement the ISerializable interface, which makes them responsible for providing the data to be serialized. The ISerializable interface consists of a single method, GetObjectData, whose output the formatter takes and writes into the output stream.
However, the problem is that the DataTable and DataSet classes were engineered to describe themselves to serializers -- using XML! The binary formatter, which is of course oblivious to this inefficiency, takes this particularly long string of XML and proceeds to append it to the output stream. Unfortunately, if we are looking for a compact binary representation of a DataSet, the ordinary .NET Framework runtime serialization available for ADO.NET objects will therefore prove quite disappointing.
A number of more advanced developers have been acutely aware of this problem, as can be seen from the many newsgroup posts complaining about the lack of binary serialization support in the DataSet. Dino Esposito wrote an article for MSDN in which he shows a way to create a "Ghost Serializer" which will allow Binary Serialization. And even Microsoft, responding to many requests I am sure, published a Knowledge Base article, KB82970 in which Ravinder Vuppula provides what is called a DataSetSurrogate class - basically a wrapper class that accepts a DataSet in the constructor, and goes through every object in it, converting them mostly to ArrayLists (which go through the BinaryFormatter as byte streams, not XML -- just fine, thank you) and when we are done, we have a reasonably compact "DataSetSurrogate" that can be remoted and can be reconstituted by calling the BinaryFormatter's Deserialize method, and then we can call the Surrogate's "ConvertToDataSet" method to get back to "First Base", as it were. There are other approaches as well, not the least of which is creating custom ISurrogateSelector implementations. However, they are not for the faint of heart. In the domain of custom approaches to binary serialization of objects, there are at least two other offerings I have looked at; Richard Lowe's Fast Binary Serialization and Dominic Cooney's Pickle. Each has its benefits and drawbacks in terms of what they are best at, and how easy they are to use.
My approach goes a lot farther than just performing custom binary serialization of the DataSet -- much farther. The BinaryFormatter is great, but Angelo Scotto has developed what he calls the CompactFormatter. This is not BinaryFormatter compatible, but since there is no BinaryFormatter at all in the .NET Compact Framework, it certainly becomes a welcome addition. And of course, it can be compiled and used on the regular .NET Framework. I played and studied with Angelo's marvelous creation quite a bit and helped him spotlight some bugs which, I am pleased to report, he has completely fixed as of Version 11.2. One of the biggest advantages of CompactFormatter, besides its promise to provide Binary Serialization for the Compact Framework, is the fact that it can create an even more compact byte stream from a DataSet than does the Native BinaryFormatter. While there remains a bit more work to get this all to compile and run as a true Compact Framework application, we are not very far off at this point.
Now for the good part -- in addition to creating a compact byte stream from a full DataSet (or DataTable) and being able to deserialize it at the other end back into a fully populated, live DataSet, I've added another dimension to the whole picture. I added in Mike Krueger's ICSharpCode SharpZiplib in-memory Zip compression and decompression to the resultant byte stream. To give us some example of what can be done with this, let's take a test case:
I have a US Zip Code database that consists of all 42,698 current US Zip codes - it has the City name, State abbreviation, 5 digit Zip, and Telephone Area Code. If this is stored in an MS Access Database and freshly compacted to reduce bloat, the file size will be 4,516 KB. If I create a DataSet consisting of all 42,698 rows in the table, and ask the DataSet to render itself as XML, it will produce an XML document of 5,445 KB - ouch!
Now if I run this DataSet through the BinaryFormatter, I'll get a binary file of 6,064 KB. But it will just be a binary file containing a huge amount of textual XML. That's the problem with the DataSet and the BinaryFormatter. However, if I choose instead to run this through Mr. Scotto's Compact Formatter, I'll get a file of only 1,161 KB - an 80% space savings over the BinaryFormatter. Then, if I further compress this resultant byte stream with Zip compression, my entire DataSet will take up just 278,650 bytes! That is a byte array that represents just 4.6 percent of the size of the best serialization available to me previously. With this vastly reduced, compact footprint of my DataSet, it now becomes quite feasible to, for example, store my entire "database" as an embedded resource directly inside my assembly, or to save it to disk to be loaded "on demand" by my application so that no "real" database is ever necessary to run my app, or to send it over the wire through Remoting or via a WebService (ASP.NET WebServices automatically handle byte arrays very nicely, as Base64 encoded strings) to be updated with a DataAdapter as one normally would do with any DataSet into the middle tier.
With my custom DataSet Binary Serialization / Compression scheme, I can now create, for example, a self - contained web - based application where users can add, edit and delete data, and when they press the "Save" button, I simply send my in-memory DataSet through the CompressDataSet method of my class library, and save it to the hard drive, like this:
// Where "comp" is my compressed DataSet byte array:
string thePath =System.Environment.CurrentDirectory + "\\" + "ds.dat";
BinaryWriter bw= new BinaryWriter( File.Open(thePath,FileMode.Create));
bw.Write(comp,0,comp.Length);
bw.Close();
Of course, loading it and reconstituting the compressed DataSet is as simple as this:
string thePath =System.Environment.CurrentDirectory + "\\" + "ds.dat";
FileInfo f = new FileInfo(thePath);
BinaryReader br= new BinaryReader( File.OpenRead(thePath));
byte[] comp1= br.ReadBytes((int)f.Length );
br.Close();
PAB.CompressDataSet.Wrapper ww = new PAB.CompressDataSet.Wrapper();
DataSet dsl = ww.DecompressDataSet(comp1);
The above process, by the way, using the 42,698 row Zip Code database ("DataSet") described above, takes just about exactly one second on a moderately fast Pentium class machine. Serialization and compression can take a little longer - 1.338 seconds at a compression ratio of 5 (eventual size, 285,648 bytes) up to 3.21 seconds at a compression ratio of 9 (the max), resulting in a file size of 278,650 bytes.
The finished class library weighs in at just 84K, and I am making my CompressDataSet class library available free for non-commercial use at the download below. However, since I have several potential products based on this new technology, I'm not releasing any source code for it at this time. Feel free to download and try it out, and let me know if you have any custom uses for this that you would like me to help on.
Known Issues: Serialization and Compression of very large DataSets (over 20,000 rows) may fail at compression levels below 5. Workaround: use compression levels of 5 or higher. If no compression level is specified, the maximum (9) is assumed by the library. There are no other issues discovered at this time; the library can be considered to be production-ready.
Articles
Submit Article
Message Board
Software Downloads
Videos
Rant & Rave | http://www.eggheadcafe.com/articles/20031219.asp | crawl-002 | refinedweb | 1,936 | 50.06 |
Plots the cumulative distribution of the shortest path lengths of Graph. The implementation is based on ANF (Approximate Neighborhood Function). The function creates three new files: 1) hop.<FNmPref>.plt (the commands used to create the plot), 2) hop.<FNPref>.png (the plot), and 3) hop.<FNmPref>.tab (the plotting data).
Parameters:
A Snap.py graph or a network.
A string representing the preferred output file name.
Description of the graph. The string should be non-empty.
Whether the input graph is directed or not.
Number of ANF approximations, must be a multiple of eight. The larger this value is, the more accurate the distribution is.
Return value:
The following example shows how to plot the cumulative distribution of shortest path lengths for graphs of types TNGraph, TUNGraph, and TNEANet:
import snap Graph = snap.GenRndGnm(snap.PNGraph, 100, 1000) snap.PlotHops(Graph, "example", "Directed graph - hops", True, 1024) UGraph = snap.GenRndGnm(snap.PUNGraph, 100, 1000) snap.PlotHops(UGraph, "example", "Undirected graph - hops", False, 1024) Network = snap.GenRndGnm(snap.PNEANet, 100, 1000) snap.PlotHops(Network, "example", "Network - hops", True, 1024) | http://snap.stanford.edu/snappy/doc/reference/PlotHops.html | CC-MAIN-2018-39 | refinedweb | 179 | 55.5 |
une41 Related Items Related Items: Weekly news (Pensacola, Fla.) Succeeded by: Pensacola evening news Full Text S N . -. . ,-, . -Jf-l ;\. : THE DAILY NEW 1v J, -_ . -. --- 3 -- _ - .- -- -- --- , -- - _- -- .- --_-- E ? --- ' { VOL. 31. PENSACOLA FLORIDA, WEDNESDAY AFTERNOON, JUNE 8, 1900. NO. 6. t + -- :: = ---- --= --_ ___ -=- __ _-._ =_ _-_ __ __ -=- .-. - PENSACOLA has a Depth of 33 Feet of Water in the Channel at the Entrance of the Harbor. H ' : - - - column w-en piacwi were hurried In the to rronr the assistance part 5r tae of I DEMOCRATS MEET IN CHARGES OF i I r PRETORIA.f the mounted infantry. The gum were Mr. Pttttxretr ' ! supported by Stevenson's! bn a/lo of J.. nient-Hatiiit ": ' Pue-Crewe! division and after a few rounds drove the enemy from their posi- STATEJMENTIONIndiana WAiH'jGTOV, June 5.- : tion. i of a speech on the , HAS FALLEN f "The Boors then attempted to turn senate Mr. Bacon of : f onr flank, in which they were a alrfoiled Will Indorse BryanFor WM profoundly Surprised r by the mounted infantry and :ye*> manry suppo gd by Maxwell's brigadeof President.GUBERNATORIAL ment nude a few days ago Turker'ai1iu As however they tigrew tba the Cramps : : -- -- !still kept pressing our left rear I sent Philadelphia, had ) War Practically Ended by word to Hamilton who was advancing CONTESTThree to the Republican 8 miles t British Occupation of the and till up the gap between the two i would be recouped by eolumua. They finally checked th.nlmy. Cundidalcs'lu the Field-West building of had + !! Transvaal Capital.GALLANT regarded I ( who were driven bask toward Virginia Democracylll Name Holt flit'He it as a ! Pretoria. I hoped we would have been able statement and -. ! For (o\"l'I'lIor-lUl.kl'rr I* Choice of ! DEFENSE able to follow th"ui up, but the days are the fact th tJ.lr. Hauua ! SIDE very short and after two hours' marching Jllsour'unveutton.. intimately5\ we had to bivuuac on the ground; paign, were'ia_ the chair' 1 INMAXAPOIJS June J. all of -Nearly the statement. .' >urr<'Uii'lcl Pity and Korrrtl gained. : ; ; III "The jruard's bridle quiten.'ar the the candidates IlU.lll large part of the I' Instantly Mr. Hanua ' th' I! '*r< Bark Lord ICoberts' Ke. southerrnoa fort, by wh\oU Pretoria n delegates have arrived for the Democratic "If," said he harply, I prl i tattle l'rr\lou to the OiniWlll defended not 4 miles from town. state convention. The absorbing dertake to reply to all I .. "French, with the Third and Fourthcavalry made on,this floor it - / holloxv/ is tho I HIBS Itecrlptl topic contest over the gubernatorial - ; brigades; and HattouV. New time of the senate than '\' I \l It l III L.i"Iin. South Wal.'n mounted nfloi is! north of nomination. There are three candidates from li'eo! jia (1O t3. ; j ! Pretoria."L'rluulwaxl'a. now in the fit-Id-John W. Kern. the state'iieut and c n- I luuThe war (,:lice has , notice I brigade IS betweenFronch'a Frank a Burke and Nelson) J. Bozarth. \\'ol'tl1yof and : I (r '.1 Lord lloln-its at 1'reto- aud Hauulum's columns and nify it by n denial. I Gordon is wtte hiII the nght Bank of An element of uncertainty is the likelihood "1 hail nothing to do I the main force, not tar from the tailway of Shively entering the race at thelast piignof I'.f.', but I ( , iw 111 |H>ssesiioii of 1'nto- and I must ' story bridge atIreusteruwhich \destroyed moment and in that case au effort sins : ffi."ul made thin decidedly, that I elie\o i entry was by the enemy."Ourcaualtie. may bt mad to stampede the convention - So far olwh nllnsions 4 u cite:k. +, I hope,are very few. in his favor. as eampmgu of IS'H, I desire Mr. Shively was the Democratic nominee BOER ENVOYS IN CHICAGO. in is'W'! and promises wero maile. no ; ; -.Ilmn.ttight ni'iiif hs wadefeated by GovIrnnr , were offered to any () 4 >;< :irtrntiou of war, Lord li-jb- Mount. poration for CHjiitniiutiuas! I! Delegate KUcuor M.ite That Flght- There is 'sentimentagainst ! apparently no -nil Pretoria. While the Mr. Carter warmly I ? ah \ 1Viltolltlrue.CtitcAro ' Iii Bryan and 41 probable that ht in-rhuf uf thrcateatarmy will be pmper U-so) of money" l : i I ; June5.--Tut Boer envoys indorsed for the nomination for faUe as any statement lams ever put in the field was of the president. nihde. [ arrived here at noon. The new ---- were ! II the IJI""Ui3e h'} muse to the fall of the Transvaal capital was received HOLT WILL NOMINATED. Mr. IVtigrew (!( : : lend them foils that Cramps had told it Hlicmfoute'.n. t.i r ---- - r almost it calmly indifferently appeared , apltal ('f the TraiiDVaal. Eng Will lIe I'ut I'p by the West Virginia gave: (11",000( ( in IS1. and but this was eipUiued by Mr. }'Fischer: properly fcj-nt VM '*l..bratiui? the event with who Mid" : Democrat! Mr. Pettigrew then v "' u-laaju. Throughout tha length "The news does not rom to us as asurprivi. 1 P.ti:KaRTauaoV.. Vo., June a.- nority report of the c *u . '. Mayor Harrison headed the reception I state oonvtntioii to indicate that the charges against $.- Bi I 'D the recollection! of recent committee, !but h<) was momentarily put I read from it at length. Judge John II. Holt of Huntington ii in y :run war, when the oi-cupation oft in the hack ground by an enthusiastic Mr. Hanna briefly .. ,- ) man who, almost unknown to the com the lead fr the gubernatorial nomination and hIUT'. capital signified the end of ctiuipniKii, > i i "t: .tii*. Lord holrti" terse telegram; imttoe. ru>ht>d up the steps of the car with Judge Lewis N. Ta\enner of an attempt "made by ' ,... ?kn to nit.an the practical finish from which the Afrikanders were about Pllrkt'rbnr.t.'t.I.I.. Low-is and Vlour- traitorous Republicans : ; : rte war, which has toed Great Bntt to alizht. nay have our formally withdraw, like!: from South Dakota," who : unitary resources as they were "On behalf of the Democracy which otnera heretofore in the race, but their defeat the nominee of t. 'rr tried lefure. I have supported for 37 years" he said headquarters show uo such activity as 1..J'1) for "enllt"r.PENSION . I: !loii'lon the Mansion House ani "I bid you welcome to Chicago." thorn of Ho't alJtlT \'t'uuer. "' ear iifllco almost instuntaneonsly l The envoys were somewhat surprised. Ever since the! arrival of John T. MoGraw COURT OF i '.. the cuter. fur jubilant thrones.FAX but were MM in at eae: when the who is a pronounced Dt.nm'.eratiecaudidat' ai'l"'#r.rl 11 s if by magic' an.l traffic mayor after turning the intruder over for senntor against Elkins, Mr. lurner speaks on t t.l 1'< di rrtetthrughuthcrstreet5' to a policeman, accompanied the partyto there has h.H>n a boom fur Holt. Their Opposes .\. 1','.'..* and e >atleKS men and boys! rant the Auditorium annex. friends announce that they have pooled WASHINGTON-, June 5.-.\ .r ".lr. the city allays to M J fur them- thnr is.>aes for governor and !senator. of today's session of the . >. ... built'tins nnn< iuicin the news RADICAL VICTORY IN ITALY. It is ttuted that the! Holt slate include lain in his invocation . i_ tin !MK to join in the cheers or addv ----- James II. Miller, llibcrt Armstrong.John , Government Is 'fh.llhly Kmbarrnsscdby : W. D.ivis, Hurter 11 McKinley, bon-avement of former ' v M to the joyful throng singing; ! i it MV> the Queen." Hats hoiitedf the K".i.lt of the Klectloiis.ROME 1.\. X. Vtml.ldll'flll W. G. Benuott for maa in tho death of his T :.. .,.Nind i>t li-wls wire wavtnl in i Juno 5.-While the ministry I the rest of the ticket.irjM.iM'hIMIliie! !: Mr. Turner of 'Va..hil1 : 'r, !....' mils and yhinimrred like a > npp.ireatly was .tustuined in the elec- ,I I --'- a bill on which he nr'rks. The bill was to '.. Policy.CHUTAMXHA ( I i' I'Ui-Bua.! Other men on top I twi*, the result was rl'!.!ly a rid,cal'n c- ot pt:11"i iini appeals, ',-. s and aldermen from the I June 5.-The Xews said he had introduced .' vr, i-, 'f.,.,the crowds MaiiiHii to still House further enTf tory.The majority of th-> f..r'r j.irtyas publishes a letter from \V. J. Bryan in ago at the rojut-st of the i .* whii-'i li.- :ives his estimate of the anti- 'l.tl.Ilt.'flll'tlt'r>l from rn / wdll\.i its turn"'r prl."i.l'ut, Co'omb, of the Tennessee l>' G. A. It. in support of the Houe.'I cure report| of the fall ..f the r;l>aiisioii phal moeruiic - crib -nten, Sixnor; Colombo losing his \\ Turner mans attack I" r. .'. '.,.:..nil did not tate the etlg-. pliu'oiiii: recently adopted at an ' MiLin. 4' e..1a'bn. Lird lloUrt; &iII. \ M nt at :Nashville 11<. .s.ivs. that the plank is agement:: of the pension .I"I !. ; .u dispatch! wlI.lulrIlI'l'riulttl The advhiiced parties hauilll.tl ;X u.1! as far; a- it goes. !but that it does )Ir. Tarner discussed! rue u'y0! : !) seats and tho north will be op. wry question before (" ; fur enough. Mr. Urvuii \ t'r*> b.-fiire the union jack of not go s-aysthat " l">>ed to the pwernniPiit Tho { tI"I'I'U. action had not ticeii taken ' .r slice- was hauled up and the he tIC.1'S an iiutue.itr dwlar.ition of : meat will not timid itself obliged to act gress should not adjourn ,,, in the '.?' wajuitsed from mouth to'Prt the nation' purpose Philippines 'o against the oppmitiou which has \Icx-ome .,''. fo-ia u occupied ,i acid hire! ] ili'-r advocated in the letter is important 1I11'urI'Sn'n' I ..e \\ ho had had n hance to read still imre powerful dissolve parluineut first to e-tablish a -'able government; upoi-including! this bill for a Inns time and govern by d vrw, or relief! of soldiers. !, Tt.t'iifixmnt! of tl.u resi..taucuuntend second, to give the Filipinos their mdepi i linal'y' the Pelloux ministry will have to - . were at that moment comiiuitf udei without anvlody being able to : COTTON THIEVES resign mi the im-Uiliihty of a tierce trot outside lutt'rfereiico. Mr. Bryanconcludes I . how the be replaced. SIH can ministry : ,:.i Ix-forn the city was iMvupied and : "I dn not anticipate any $ Are Wanted In Huth ( ! : i nlfniij at the li.a-ry cjbihties| to DEATH WARRANTS J ISSUED trout from the protection suggested". Anderson Bull" i-ueh determined st ud when Oar projection of the South Aaaeriranrcpubhe.lliie ) h t..r.a was hemmed in on all sides Four Men to Hun;( In North Carolina been a great help to them GRE \'IJ.t.F., S. C., I r.c pp wire of General French north For Murder. aidery little expuse to us liar state of affairs has < i tt '111' ItiH.r capital came as a urpiiid I gard to the extensive ) mil: ipliiins, Roberts' telegram.Itners R.U.F.Pin.<< Jane 5.-The supreme court New York Demorruoy. Kljlit lr'|>fruti-ly. decisions in four murder caes have btenl'.rtilit.J New YORK:, June ;5.-The New York took several: about negroesaruund 13 bales ; It wd'.cudint L'rJ ll<>berts delayed to by Governor Russell and the I I'mllt'mlc stat,' conventi m is in session from people in ( (\ I ttku : until all his columns wereholy d-mth warr.ints is>ned as follows: ill the Academy of :Music. Prior to aud Laureos counties. I! toed oi".rote, but even when Lord ThouiAS; Jones, negro for murdering the lllt'l'tillIf: the convention every arrested some of them I It'turii. wired last night there s('omtxiretie Four of these negroes are I ; :: and burning a woman and her five children. precaution WAS taken by the leaders to juMMbllity of some fighting, so county for stealing two i I to be hanged at Raleigh Aug. :31 &\'uitlsuy appearance of friction in the ulh ; ; } ' the t'h A W. n next rui\l1ll'ntllllll.li"l1 witsg'trn this end h from McD-avid I proceeding. To there (1bt.n Archibald Kinsauls, for murder, to lw offense the first out it came as a surprise.Julinuir warrant hanged at Clinton Aug. 3 William prepared a resolution providingthat I ; from Lord IVilxrts phni- .. was iisued. Following , all resolutions offered delegate Edward, negro for ambushing and as- by any I "." ''Y the occupation of Prt'tllriiwa" not were made out in ' convention shall be to the referred Nusiuating a lJUlicernlln. to be hanged at : tMiiupauied by any less of life. What Judge Buchanan signed j rejolntion without the to committee on ti liAppi'ninl to the Boer forces which Concord. Sept. 3; Chanucvy Davis, negro I recting the sheriff of .\ '' : , : debate. It is that Bryan will for burning the residence of Mrs. apparent I .... : "H il the HritHh can only be snrbi the to dehver the four negroes : ...i). Hut it is presumable they have Rattle, to be hanged at Tarboro, Sept be indorsed by instructing delegatesto of Greenville county life l II-.t this the Ka'1'1all'ity contention for him. 11. One was in fire. C < array for the present at any rate.The official went to Anderson : : -- ----- latest hspatches from Pretoria, The governor will be asked to commute WlIIlle Initructed For 111'011. found them under bond dtel JUllt' 3. quote (teticral Botha as Jones !enteneo on the ground of county.As : 1I'1IIl insanity. __. __ __ JAKAMIE Wy.. June 5.-The state Greenville has a '.I ":',. ions us we can still count on our RACE PROBLEM DISCUSSED. Democratic convention for the election negro* s, the action of the : th! nsirids of willing men we must not -- of six delegates and sis alternates to the cials raises a unique I talk: of treaty or throwing away our in- ItlennUI l'ongresu of Women's Club national convention will meet here to law. I , -- -- -- - :" , j iin v Mrs. Lowers Address.MILWAUKEE. morrow. A candidate for conjrre.vs' :: and heeler to lie a l 1I.'hll. it is added annulled the reiroUH..IK - three elector will also bonominated. i: presidential June Nothing could npptiintinx a peclal comnntreet" WASIHNOION, June 5. The indications that " ... nrdt have, been auspicious than the are f (* r\e cubxtitutuiK Ifuhtary'tnt,1 more the delegates will b>' sent to Kansas City tion of General Joseph I \ for that of the nmmnitte.II '. formal opening of the biennial convention ; infracted to vote for Bryan and the re- brigadier general in the "'ti.Tal! 1.11"11"'t'r, addre' ed the > of (Jeivral Federation of "'.>lnrll'" affirmation of the Chicago platform. will be sent to the ; t'ir.'hfron the I church j-onare' nr :ins General Otis' , ti.! -ni a.l to und fa>t. Although theirS clubs. The .\lhuubrdub was filled to promotion Dm-kery For Governor. -- - > '.II' w, n. I'mfallfUIII..., it evident its duori. Following the addresses of after eatin i Bloating ; then f. \\' fait hful IG...r p.'w nls workeilr welcome by David S. nose, mayor- of K.VN\sCirY: JaneS.-Th* :Missouri) flatulence or water : I '!' el\' IlIt.1.:-t\ < stet the o\rrwhelmin Milwaukee: Mrs. James i.lnpyPII'k., Democratic state convention, called to quickly corrected I I'r 'W. 1.1' .nf.irr.mtioi that one of the and Mrs. Arthur C. Neville fort met here today in a large tent strengthens digestion ( tr: >, T.'anhan' bv Jjord Kolx-rts after state, Mrs. Lowe, the Federation platform On the state ticket: there regulates the bowels. in Shelley park. '"I. didjvervd her biennial ad- I upi'mn ot t'r taint wa> t'l ihn-i-t presid-nt, that nah Bros. Congressman ex h. '1'1 t 'r"I' HIM: 1,1 riluxe the Briti,!ii'.r ilr'vThe OTsinpss of the convention seems no question : --- A. M. Uockery will bo named fur - ]1"1' i..iiiilii.il \V.iter\al.. has begun in earnest, tl1"'tll.lr! is.nol accLimatiou. KOVeruor (111I' I\SUit: ' by < ,' ing esj "cisUy proniiu" m the deKite. : : Many a man tins BOERS ARE DRiVEN BACK. a ain-t Bright'dieae. : i i - In \nniiul ('tJlln'uti" j > other dangerous ' livers ' iii. iiriit Nrnr Pretorl.r-Ilrltkh The DutyThe , Cir< tOO, Jnne.V-Thfourth! :.::m111 cent bottle of ; I;. III itr t 'llte \ Irtorj. ' cirnvtiitiil of the Park and ( )uh 1 oar Art liver has two duties to perform CrRE.V.. A. .\ : L't0'.6, June ;>.-The war oftiiv ihUnuTrij --- -- -- n;. iH-urion is in s:',, IKH m Fuller hall at -cleanse the blood and produce tUl'CA I i ; issue the fullt'vmig du.mtcb blip You may know it i is working; tilt Art institute. The meeting will beconcluded The winter and spring 1 trti less R..ln- if troubled with con- , rt at Six Mile Spruit.w lizily you are Thursday evening with of : a Literary department stip.'ition! bilion-ne and dyspepsia t.trt.1 thi. rnornina: ilt clIJbrc.uk jorit s e.iouof the associati and the iness College: will clove throw its dzzine! 1. It is trying to nisi t nurt-'ii .1 aU;! lo mile to M\ Mile"ruil. Architectural lo-agueof Autricafor the work other"organs.. Hotet- June t.. The summer I >! Uili baukiiu which welt* otvtti divniviioii of muuicipal improvement.The t..r' Stomach upon Hitter will stop! tin*. June 11, and continue ; | ' i i ''. 'Viminv.. The Hnry S. and dole-pates were welcomed to the city It make* the liver do its duty and mi==ion. Ni.'ht and J'; !."oe.n1 by Mayor Harrison, President Charles The patronage the ( infantry.nth \\'t.,1.\. thu. the! totuch.bowels an.i i nor' e- - :0. ,. M. I of Minneapolis re.spoudug. ii i solicited i ! .j! "u .* .. _ '} tjUKkiy di-1."in'il; them fr.,:n l'legueot; Stamped Out. pnueMamp: covers the utck't tin Headquarter--for- 22 . - ;uih tarn: and pni.u.sl th..tlIul'lrly " '1'\.. when They rand themselves HOUSTON, June 5.-Dr. Massie i city bottle. ware-the Willis . .1 heavy tie\- ft.,KI guns \\ hu-h the. health fiber, has returiK-d from Sanrrauciwu. CURES Hostetter'sMALARIA A choice assortment : .limit.I vl3.\l m a will c.ul'l.r..1 He >-sacs it i- his belief that Stomach pictures, oil and water p.itiou.ilravc the bubonic: plague is not stamped out FEVER fraines, just received at ..._' .mlliry pins which of had the natal pnrpose.lv uud in Sin Fraacisco.: : AND AGUE Bitters er's Bargain Furniture I t ,< :tl'l * ). *#JI - t. IIt ? ' j. 1- *, jr- ..4 j. S. :+F4k :. . . . , 2 THE DAILY NEWS: PENSACOLA, FLORIDA, WEDNESDAY, JUNE 6,1900. .. _____ _ u.--- -- ----- -- -- -- n _ i o1LlIIoMASTATEhOODNext{ :\: : Save box Your Tutt's Money.One Pills wi1lsa'"e. i To begin Took with A he's Co.tt'ap."a good. fellow." E. PETEESEN fhat's a phrase easier understood by PROPRIETOR OK- many dollars in dcrtors billsThey'willsurelycureall'diseases I:Den than by woaieu. It generally! :means-well. It means hl"sIn all round I CRONieS SKLOONDEALEK : Session May Put Another I : (1(1i good sort In the male line. I Star In the Flag.TO fthe stomach }liver or bow'b.I Saturday afternoon be was feeling! IS-o I pretty good. lIe had btea quite: thirsty No Reckless! AssertionFor ; I[If what he had taken: was to bo ju.ls' Illporte old Domestic) \flfiDes, Liiiiiors ;ti I f" ' iEir.TEiMiMn: : r.v Tiir.cr.Nsus: is a ('riterl,)!}. And the l.latioas: lift Ever w man loves to think cf the sick headache, dyspepsia, ;him In a thoroughly 'good humor na't JUG TRADE A SPECIALTY. tL-.e: ",,. :.sn a soft late: bicy, all her ' malaria, constipation antI bilio. I ItIsness. 'he felt at peace with! the v.orM. (!r'rner n"lmOl't and De-1I"r-! :"." PENT: \t t .1 r. jtle in her I..cm. L.iy t : which I.es in It'li Mioiva! a Pop tlatlnn of Four In this dcKgl.tfal iu< it-il a:: 1 pLy. sa i? .e ycam.sg million endorse a people th- f' 'ery g, d w xaa. But Hnudrrd Thousand. There A1(1( He j lent state le bethought him of a frundcf ) , 'U a'sI yet there! !Is a black cloud hovering TUTFS Liver PILLS ,- his iu Pro\ldeuee :1111 ho f'iril.i: r i' iki .t ti! e pre".y p.attire ia her r:!nd .tdiced i thought that he would tall!! up ti..t! ---- w' i f' -. herh! t rr.r.: Toe !: i particular; friend cn the! t< lfihoue.So . dratf'! .. cisrth takes away rr.-Ji WA"KII."O.Inni' (..- I ISiirial.: I THE: DRESS MODEL. he went to a 1'road Muvt h-rtfl. 1k o! t, : .7 cf r.'Jtl--raood. And yet it Tin s...At sisiuu of this CJurL.,.-. !...- i told the yo'in woman there who had) IICE ++ re"a n ,t M So). Forromefnethere: I.iJj j o.'ii: :: ru.:litd \'. ith n.i: >;. iat-i-- A bullet of gold tipped w.th a tiny i charge of the iephone: that he wanted lee. In'1 has .'_: t.; .1 the! :"-.arketW .I-:.na t and Tcrorndej by pnysiciar.s. a urea: that have I I. n tututtl alnx.a and french biilimt: : i> out of the novelties in i to speak to Mr. So-aud-s-o ia Providence s Ltor ( l.n ..;et ,.a.tdMover's whU-ii: 1'lIth'alJt','.. ,:ity h::-' 1'1.I"II'"U- expensive dress> butt un:!. i aud wouldn't she kindly call up i-d! iu this >i>.stiou. uay titLo ui and i I I'at-tcl colors in every delicate tint anil tie party. , ? Friend jil-s .1 UHn.ureLi"- i Lao lint I I..u : tone are conspicuous limon:; tie! ucwctsueile : The girl did as she was bade. . c\fii iin-uii'ncd dnrhu tinl l"nse>- nail place kid :10H't' i "Party's on the "phone," she said CeT-Q mod. ,'!l.ch makes. childbinh: as simple and iou. 1 refer to the bill allowing Oklahuuia Cluny laces and insertions. are againthe and, the man went Into the U'lephone of -Lion. decorate easy as nature bended it. It is a to forui a state rovelmuent I height fa They summer lin- box sat down and put the receiver to strengthening penetrating liniment: and timiMiii] to tint'nion.{ H.Cut't' both gerie. summer gowns and his car. Thompson, Olsen & Co. , whch! the skIn readily absorbs. It this cunjrn'v .wlI' wotiM nut !". >urlin.siii'4 | And then he calmly and sweetly Lace overskirts blouses vests, dresses , gives the muscles elasticity: and vigor to Mauotbtr Mar on the flj; I fichus laces in every possible form i dropped off to sleep. 2d21V. Intendencia: Street. ; prevents sore breasts morning sickness and tinforty-:i\ti state out of the -will lee worn during the summer witha When he woke up. he owed the tclis , and the loss cf the girlish figure ' sNters which havi- gout bcfort' Noth- notably lavish: disregard: of excuse.:: phone company $::".tMI. An tntf IliVent mother in Butler. Pa. .aya1t --,,,1 ttnc d5hther's1ritnd; dug has lfcii done about! the admission White taffeta silk parasols i>t handsome lie said he wouldn't pay it, but be : i .Iii:'in, I would uhtain V bottlv" li 1 had 'of new states :t thN{ s -:.:.ion because Itwas quality, but with no !sort of decoration ( did.-Philadelpha! Press. As M. AVERY I to f*y $3 per bottle for it. kuuwu to !,,' absolutely iiM'les will lie the prevailing fashion for , Get Mother'* Friend at the drug Hart. $I per bottle. The powers that I lie gave an early Indication { general use with light; summer powns. nird and Man. BMCUUOT U .AttTf Q Wooirola,) THE BfUDflCLD RECIUTOR CO., that territories need not apply I Iund. i There is now a demand fur scarf finishinKS The early! bird nor' catch the worm ' AUanLt. Ga. on summer dress hats the fronts j:i All right, al n,;ht; but, uy IMPORTER AND JOBBER OP Itt-jiiuil the iuiroduction of bills, of surplice bodices, fichus collarettes, i| Slice you noticed trot the nun who cell 3 Writ* tat oar free alustrattdbook,Before nothing{ has been duue. But there will Tu \\crk about mi,ItUylio , lace eil etl in 4 lUhy "Uor... Ttons and even on ;; lingerie 'tr lie a diflVient a";-wt to the CUMat the empire style. \\About o|.'na UU up after lets iltak ten. along :Iardvrareiron: short sesslon. The ceiiMK will have . The rose tinted shades ill'i..lets and IB tile one who carries home the moet , Urn foiniiletiHl! and kalioina.! if it velvet pansies are the most favored in Uf (lut LKh djzzlfj mentlurabo ? Naila Axes Shovels Saw Mill and Hteamboat Hn ' uc- ( . , come up to the claims of its friends the season' purple millinery. The flowcrs Times Herald.Rrnrflt , lifelike in shape, and the and Heating Stoves Paint Oils and Window Gin - will show a imputation of 4ii'iiMNj people are very R and there will be no It-ptiiuate Coloring is beautiful.A Performance. A atc aud Tinware and IousefHrnisliIn ( ood i reason for denying territory: of that handsome quality of crepe tie chine Mrs. I U-iDs- hear your entertainment " size and one which cannot be ela.ssedas is used for elegant evening toilet. *. 1"1'- in aid of the invalid aunts of Kug- Gang Pistols and Fishing Tackle. f tions of bridal gowns and entire dresses |fish soldiers was a crest success. -- - l a iiiushnMiia "settleinent but a strictly for graduating college; girls. Lace and Mrs. 1tu ::gins-Yes: we very nearly airrii-ultural and home ixoplithe soft bilk: sashes with deeply tinged; ends paid eJpt'uSl's.-I'hiladellbia: Record. AGENT for Birmingham Rolling Mills Company. I. u , rights; of iuaity; with other states. are accessories for these gowns. Stitched Belting, Northampton Emery Wheel Company Lafl' A -, , ' A Quarter of a :Million. The rulltlFM of It. 1 Elbow sleeves are added not only tu THK Powder Company Johnson's Kalaomlne, Iron Ring and I I. To the liulirlilual ith $:iI'.ttlc ;.IItOO one Tlii-u there will be i',iliiis In it. many of the afternoon gowns of foulard CI.KANs.INGAMJIIKL1NG CATARRH and Ranges Wm Coups & Co.'. Raw Hifia Lace I, ubt'f. Y IlLh' ,, ' :2i cent piece I* a quarter of a mil Thfiv has been iu the ndiuissiou of all i muslin, tiarege, china silk TI.iiUetl'., Made Railroad Colon. lion.{ If you tlu not seethe |K>iut 1mroedialcly. the states of the I'uloii, so far as I but they appear niwn sm'art little Trench FYS walking and ",I'r"s of suiuiner CVUBFOK { think{ it o\er-it's there..Viieniro .- have been able to see. In the ante- cloth English jackets; serge! cheviot and simi1 C AIN BRIM Masonic Temple, Pensacola, Fla. '' News. twllum days states were admitted in : toi 1 tar wool fabrics. CATARRKs ..... !'pairs! one free and one !ola\'t'. If the The neshalli'll in dress sleeves are . Only onre In their history as a nation party complexion! of ('ulrgT4'S wa the 'fEYEq i basis cf lesion. The foundation or mast > v Y. C BREXT. W.I. H KN'VUKS: w. JIn r'K.: lit - Lave tile fiianish achieved a navalvictory. same as the prolmble party lean'n' ;:.: of of the popular styles is a trim shape, incasing tEll's / . President. \ ice-President 'Hill ' That was at the battle of a territory. It WII" cieated a state, but the arm like a long, tihtI..t" Cream Balm i' I/'panto In 1ij1.brn., with the all it I is a too well tablished fact to Heed'any either flat and snug, if the arm is plump Ka: 'y anti pleasant of Venetians and Onot-se, they auto argument. Party questionsne\ or wrinkled its whole length, if over- to use. Contains v'.( 45 &lend'r.eW York Post. injunnusdruc. ( First National hl1:1tt'tl the Turkish! fleet 'serveil to keep out ..trizuuaetv .Mexico It l t<!. l.lvti < f " anti { "N HEAD Oklahoma sometimes because THE ROYAL BOX. at r COLD The prpatest troubles In life are they were likely to go emocratie, but I It opons and clran-cs the Nasiil rassijj t those which do not happen. mainly liecau they were almost sure Queen Victoria took with her from Ireland AIIu\A InlUuiiuation. lleaN tm -- > \1diiliruiie. If: .tores tlie henstof Tui-te PENSACOLA. FLA. rl to add to the !siher strength In the senate a collection of specimens of Irish ' and Sinrll. Large size JKK;. Ht I ruggl- or by La Grippe SuceeMlully Treated. admission has been po!'tik>ued. Under illuminating work of great value. mall, roil bize lOo by mail I IKLY i ZZR: EOTOR I 111 "I have just recovered from the Mr. t Cleveland when all branchesof The Princess of Wales has adopted 'Iall,1 I 56 \l arren street IUUITIIEK, N t w.York. WM H. KNOWLES W. A. BLOUNT. F. C. BRENT W. K H \ f.k ;: second attack of U grippe this year.' I the ;:,,\'I'I'III11"lIt'rt' Iteniocratic. It the reigning; fashionable fad of fencing! D. O. BRENT says Mr. Jas. A. Jones, publisher of was well known that the silver 11111'I' has acquired great skill with the'toils. , the litter Leader case, Mexia I used. Texas.Chamberlain'sCough "In the lux action of twill the:: territories taken looking prvvente' to the any ad- :! between An. eyewitness says that the Princess meeting:; Jl]os. Q U/atsoi? 0 QD. rord ana Domnti EZ 4U At i : considerable Remedy(success, and only I think being with: In mi-ii-idU of new states. The corning; and the the Prince king of and Denmark after cfWales REAL ESTATE : : 1 ou a t bed a little over two days againstten election may ha\e :t I bearing upon the the attack on tbe prince at HnisscU was 1 days for the former attack. The matter for if the territories accept the one of the most touching sights he ever Rental and Insurance second attack I am satisfied would present politics ot the Ki'puMicau party itiicssed. The old king; Wild deeply agi a:/ 'We draw our own Bills of Exchange; on Ornat liritii 1 i-, ' hare t>een equally as bad as the flr.t gold standard and air. they will tated. AGENTS, Germany France Austria, Italy Holland, Spain, Belgian I Itu '. . but for the uof thi remedy I hate a claim upon that party which{ The suit of the czar of Russia consistsof way, Sweden Denmark and other European countries.VTensel3 : had to jro to hid in about six' hours cannot with good reason IK- denied: especially 173 persons. of whom 15 are membersof Corner Garden and Palafox htreeta.PESSA'uLA -------- -- -- t after being stuck' with it, while in If the census shows a JKiptlla- the imperial family 17 are princes FLA. Diabnrsad upon the Most Favorable Term and : . the first fa"e I was able to attend to who are not of imperial birth 17 are Obligations Taken Payable at Port of Destination Tea or Kifteeii VII bui>iui>s about two days before gettinir thin iu their favor. If some of the silver counts 0 are barons, anti the remaining We furnish you below a brief list of de- after Vessel Arrives: there. state"! as Republicans now rhino, 115 noblemen of loner rank. 'down.: For sale by Hannah arc Only tirnblo dwellings hitch is subject to week -- ----- I Bros, and all medicine deal rs. should swiii;; into line for the Hepulihcan 12S are Russians, the rest being Ger- change only: CVSafety Deposit Boxes for Rent In Connection -- party, there would be no reasonto mans. Films. Poles Circassians, Greeks: >o. 111. West Cervantes sti-et 7 rooms. i with which we have a Private Apartment for the Use and Roumanians. . KIM: POULTRY bdieve that .\ri/.I.lla and New Mexico tory.lJ5.t i.Xo. 117.. North Spring street 7 rooms 1 of Renter with less interest than Montana. story $:!I1.1I0. At C. Corner' Poultry Yard. Idaho and Colorado iu the silver: 'Iu"| ,:- PEN, CHISEL AND BRUSH. No.9'7WefctCh8'-eslriet.7rooms.l-stjr> . I am now ready to sell eggs for setting turn are likely to have their |>oitics; affected t:!IIUII.No. JSf, North Keun btreet 1 III rooms :' from the following breeds of by the white metal. .'1iu' territories Carolus Duran will not paint a portrait story,.: I.UO. THE ORIGINAL * chickenlark Brahma. l' Itrid?e for less than $1UUO. No. :i" w'eetlltght Hreet. 7 rooms. . be heard from I are > uie to beforetbt 1 . slor:0.'*' Cochin-, Light llrahma*, \S'hite ,1. Gerome. the distinguished French close of this ca.iiujiiizii. Nn.:1sNouttiAlcanlzstrret: 7 rooms. 1 Cochins Plymouth Hock?, Brow sculptor. Las Urn authoiized to design; story. $:!IJ..,. Leghorn, Wyudotta. My fowls are "Order of thr Cnrnntlon." n monument to be placed on the field ot No. !">, A etrlght strert.e round 1 T. LU mf. ! from the very l>ti s-trains to b.- It has. lieci'i'tc Known sdl tuer the Wateiloo.! It will l>e the first Trench story=,...,11'5.'|:1. "East:'. Gregory street, 7 room1 HJ f r {I'uud.ltnlll invite thus ] ublie to call I ni' d Slates h W ,.1I:1\!' I'resident! monument on the battlefield. 'I"r)'. U'I.. ; 1ys and fte my ouluy 'tHJ-abuut 7H' MKinley! i I.: {Iu tl.t n-atter! of n.fusinsail William I lean IIowclls is a believer in No. :::I. \-tt.o\ernmBDt street ;j ruoni-. IllBEER. . .IorII! >1' fine fon |I.i I'll hard. t-Mtir 2- d IS :IJ?!lrilt soliKlI.iliU' that hrtVold. the stole.: philosophy end said recently I No.117. west> Ijovernraent sln-vl. ', rouniI -. fl i S I ejrci* fur :$$1."A Lot IECU1.l.IS: ':. >. :,ud manj siuries are f:oiicnround : that the o'lly ju-t conclusion conceruin s'ory, ti-I.! f. ) 4 C yr ';a tf Manager.t the question of life and dt'lth'IIS to rebuke No. 411. > n't Government strei-t. r ,'-intur . al.oi.t hi- wa; of tiiruuuui\ I > .fll"i.No. . [wople{ anti refusing their leijuests and to met brawly whatficr came. !I I'. Kakt Cioverr.ment Street ."' rmn-. iHffi::I t'IE 1:0:0' .V ('(1. Carl ll.iag: the veteran artist whose 1'tory. llz. ii. . i I AllWTCall 1..c1dF'ENa. lnikiiiLthvtti 1'tI vt.'y etemfortabltitalt untie Las been s-o long associated with :\o.4LWrst Ei.Imonl ttrcet 7 100111tor -, -- : if. one of Uu stories about > l.9''. Q"M i the nrt of water color painting, has jntcelc'brafcJ No. .s t.\ :North IWllliers street, S room-? . \Vash.ifl: I that I're'*ititnt McKinKy 1 his eightieth birthday an*! 'tory-! "Hif In' ? I :1st' (" 'Ii\rnUan. L.*,; crcdtisj the "Order uf the Car- the jubilee of his connectiinrith tin :No. iil'4.. Ea-t <.adsden slrttt, !.' v ! full for a !Still* iMtiKK""Mic rnnvrutifH lo nation.." "Those wh, 1'eloiiz to it are P.ritMj Roya! Society of Painters in Water doellinifi.No.noWr-t r.wiu4.1 LnliUii I -ryl7.Sti..tlst. .| ro. in'- K":: J. HIDflu[ Sole Wholesalei K, 1.. Mat Jai-ioouvi.ir, Fa., Tu<-sany..1 ur > tat ii wl.o have :;"nI" the \Vhiie Colors._ 'lory. <....... i ? ._ 1. Ya , . 1-'. lwrTu' NIL _I..EII.tll.l..l.c.I.c.It.r.: I : 1 . 1' 11I. . __ _ oIHltOr.ta- |>..rt> of th- slutrofFlor- Ileu-e ftr ",.u.- iKinicuhir.i.iiriN and -.r'- i : -- - ld\i.-oii:. ill 'In ru,:.<.1"..lHy i ..laiii Junri'i.atuuuufurttetue nr.nunnntJarkson- are balked! In p-ttuiK it. lint t-ome away SEASONABLE TIPS. Auar.imb.r't.1.itl.'i! i .. .... I.IIrl.-. with a bright:: rt'll1II\\'t r IMUI| the liHluf | off II'HI-.r H" etc a 1. ili'urn. ., 5 Its litne from toeiir drinking sn=- , In T Ilic. t-liooM.nut'T OrleKal-1! (l.mc.crnrlc,. rreU rin\mll lie slate to their; Boat". TLe presi'icnt ;always safnis tea.-1'lairsvHle! Courier.Uei byrt1I'gxt"! 'i"" \/ Wt r1 Parrl JanC3 an1 EGno SprInl3; CilebraF'd 1: [ : uake hi- \i-ter. ful at home, and rx h-Ideti CbI.C'0r.lo"Jury 4 1.Iito tin :'" nail oil remlv.lioys . your P'I guns : r.otui'iAit- UiiUic* It>r iLt ultlf. (.1 hi.\. will ,' i-hnrn.i 1 !: fRY A B3m! Of f GHlH 10' 5 1.1 'r. our Ju-th'r. ..! Ih Sujirt-inc IVurt.Fn 11 i grant a re>ino!' t he N : ft r mind .Time !is the month of wed- JOHN McDAVJD, .. , a rrlnrv of Stale. .1trt'rcry-hrnnrel said to pbiek' : from his own (snit i carnatiuen. dngs.-Ilenvir: Tal.! Roiiew.Tiau' tAtf'! .. (,HOSE 1 ,". : : : I' f) n I' -.": t ouiitroll:r Tr-'.-tiirT. hupcriutrixipnto' REAL ESTATE AND BROKERAGE. a y whli-h ln ii-'tta'.ly wears and rOIl''M''n 8n9rs. Lawn fetes are -'- i'ulioC lc atrba"u.nomiuu'nrr if \yn- iJUG & :FAMILY TRADE SOLICITED i'Ultur- Ita'lined I'nnrt"i-\.nf'r fur the plates" it in the liunonLole of his visItorV imi'ne-nt. Strav.-lieiry sbortcuko is rii; <'. i . of four "arlour l'r....clt-ntnil II CITY PROPERTV.FARMINO ; 1'. r JI. I v- 't t. 0\\ tA" : N tote hammock trnu vturt eoat with some iii.-v 4.\pics and roar .IU.rna'. *. to !>< voted form "4 for tirxl rrt>lartnp rlrrtinn. and ti which leaves the njiplicjini{ without ClDf\nblmr.H rl'aid. AND TIM HER LANDS ... c.ord..rl left H- Pot' I3.: '.. \irtuiAMii! r ' tsi.t. 1-ucii Mihi-r i l.usiiH-i u> inaj come eau.- fur eompLtitiT. It i II' nulersfood FOR SALE. atteudrd'oMcMillan l..-f..rf the rnntriitu>n.Ibe A WhUtler !Story."A . dllTerent counties lu the state will that 1111'11h" Itrouie moiiilKTs of ('ull1mllmmll:1alr -,- ': tremely !Loans Placed at Reasonable: Rates M-ud dfleuHlen to the u\viitluu Up<,a tbrfmlow the "Oriler of the Carnation" are those Is-isol nintlon! < d.Megate mll1klan.OIif' wl'o! was cettlnsvp: ale uiU r'|T.K : i-.e . fi.r each ere h'jrdrrtlote. r..-t r'f who never set nl.'thiu.; at the White art nailery, went \\7drtlcrsstudho! in 21! Eat (iovcrnaient S r-ft , 1.'I1I1I\1nl..ol the tae llcki-t uborcrltrtlthe .. House and Hi-l words except ir< a pettytiulwtr. hl.;bfrt niuiiler. of tolrsal tin the iuIla 15.isays Vance Thomp- ruvinl i it-e'ion.1 < sndnn.roncn'nei In the ci ursc of ::u administration sin {iu hU Paris: It tttr to The Saturday; Bros. Co.Coppersmiths tote for ttilrani..u in t'ce's tirrf) there are Umiil t<. be a great . hru It ainounii to !:fly <>r i.ion- fhrommlllee > ; i\enins Post "!II! pAiattil! casuallyat h.. him nllowcu rdlttlonal rp many tat n who join this order but the pictures! oa the walissynijeionit ] 1 THE[ f FVOR1TEPlace rrerntatinnabPre the tote wss lnoreh-r>cal they are not likely: to say ranch about It. * the Ifftioti of !'t. In any county foi 's in rose anil gold in blue and ray. I .la'e ofU-! .-i.. I b.* count*s under tbi rah. ft re>-fonr Arnra .\;o. iu brown and gri-en.; (4\\ ; will t>., tulltltxl it-prti-rnution ui lollo William I'itt Kfll.iss. of Ijmislaua. " a: IInw much: for the lute he askedwith who is ::gin:: to :tIt-11.1 his r1"-vt'n hi national .. the confidence of who AlailiuaHradford 14 I.eon. n one ownsgold General Metal Workers.! Ii Levy 4 (coH\entu, 1I1t"l delegate, receixwl '- mir.e For Pensacola :; taster :! Liberty .. I the . Rrrjatdfalbouu & t.nal", .. a cin-nlar other day inviting him "Tour inilllni 'aid1l1..Ucr.. :J Madison I C' I... present at a celi-bration at lilouiuUl .. Whatr Buyers to Buy uaIafattners; of ad Barters: for tfct fttrutCU : Marion V e5nk Iutu. :_ of the t.t the anniversary ' ? 4 Monroe ... 4 '.My i"0sthumou< prk! *s! And the Tulutubia. ._ 6 \a..au.- 4 Lr-t Uepubhcan (olin ntilln Ltld in Illinois " ( . added. :"t,11110I":1in painter l>aJe 4 44ranae May _I: 1'0.-.t;. Co\ruor KelIOSK :: Stilll on 1.-.10 I. O-ce-01. .I'II Choice FamilyGROCERIES Celebrated McMillan Seamless Turpentine Dunl.. 22 ......0. ..._ : was one of the delegates to that KkcanibiaUadtJru: II Poik .. .. .. ... 4s The "on. of C\rrzrmrn. , rouuutiou. of which there 'r.nkUD z ..t. John .. on are now but Ito Candale. the distinguishe! *! French > Cmpleii Oitfits alnyt ca band, ud repairing drat la lii . 7 Putnam . H 1:4 survnor. "I rode across tle ('(Inn- ..... saaut. "aUtt. the sons of miuUtershave Hamilton. 4 Muta Rosa 3 :try net mlU-s" said Governor Kellocz."iu . Htruaodo Numier .. 4 contributed! to science more eminent MOBILE ALA. Hllliboro .?> uaannrr... K attend' that vuvention and l cast the , men than has other cla . any : s i Holmes Hi>lorToluna J entireote of tin'lo Jatk.'n V S my ('lIuuty.nttu!: lie might! have :added too that they .on 14 WakuU.l.afa'tU" & survivors are tlrf.aaoios of General -IS AT- - have al"o swelled the rauka of the a Walton 4Jrfler John M. Palruer It uinn with a remarkable - l.&k* 7 W..bloltoo S r/Kftis, theologians and not a few of Ix- :! : and l Ions: public t'lJ'll'r.notl1l'r the heroes of tbe The Well-Known military pist.St.urd3J" - I Th'countie* wiii .elct tbir del*gatei: In l.s John (:. Nicolay, who WI1'". chow- Evtning{ Post odna buraDt ad Co18 alm by goy Ibe manor people acting bleb may tbrnugb be considered the party pratt or- to rivsident Llneola daring: the: civil Up-to-Date Store HIW I , laaliauon at rrcognliod by the last state war and who collaborated with the QUICK IIEL1EK ton ASTHMA.! 1 eon participate.ention. ID All the democrat eltiou! are of invited delegate too present semtary of Ftatt' .in a life of Miss Maude Dickens. Parsons. lbrio Including tho- wbo hare become Lincoln which !Is considered one cf the Kans., writes : "I <>ut!<>red eight -QFnENTZ *Everything New and Clean.- qualified to vote Since" tbe last election. with asthma in its worst form. Tbecbalrman and of most authentic histories of the ;;neat years convention held for secretary the Burpai each of electing county president written. Governor K lie;:; I bad everat attacks during the )lat & GO Regular Mealrrrv \ I > Entire City. Attractive In the delegate* to tbe stun convention are was unable to be prevent at the RloouiInffton year and was not expected to live The Most reqnetted intend to H m. W. A. .. Itat- Bawl. through them. I plan uain FoLKY'S and Short Orders Served at all hours. rpeclalVr kly tllalrm.n.Tall.b.uee. ria. a written or reunion much to his regret. "I of the HUSKY AND TAR and it ha*: prlalMicopy pro lng* of such " wax a then. be oald. man coooty co ,.nUoD.I4>ether with a lat or very young never failed to rIve immediate re tbe aamHof the county executlT commit "and it was stirring! times. Those were lief., W. D'Alpmh rtp. -120.122-@ A. E. BAKER & CO. Proprietors , tee. in which should be dmtfnated the j the days when we made hl ." , tory.BTBt'B hairmaa and secretary of loch rommitiee. I J. I. Street . bas W. A. RAWta. .\ W. Dtxx.Try Stephens a large a-!ort- E. Government J.C.CooriR. Chairman. I ment of Solid Burling Filvr and! 14 EiST GOV. BWMESr STREET.it . tcffreIsr7 TH Yawn Want i Rogers Knives, Forks and Spoon TELEPHONE 261. Column.'k. ...... s .. .. .< . .' '*' 'AP _ v ? lrQ.1'i. ". , .. .v ..- v- -.. ... .. - 1 1 THE DAILY NEWS: PEN8ACOLA FLORIRDA WEDNESDAY JUNE 1900 3 ; ' t DR. MOFFEH'S 1AU!! Irrlfltlol! ] KEEP: aoorzI: ifI.i.WtU 1eWd T EEPHINATeethinj I Makes Strengthens RtjuiiUi( this Cuy.., , uJf f. ( Powders) J. 1 TEET1UNARcikvesthcBot.o" i AS" Troubles of Children of . I I ,. I Costs only 25 cents at Druggists, ANY AGE. : 1; tom Ortla1l he.bIeC.J.MOFFETT.M.D..ST.LOUIS.MO. . Last Year as an inducement for the more general use of Ice Tickets in 6, 10 or 25c denominations ,I O.has B. Turner, we gave with each $1.00 worth, for STRICTLY Y CASH, a numbered coupon entitling ; every Purchaser of Tickets a chance to secure Free of Cost a Refrigerator, (which was won by I i! .*ARCHITECT= Capt. A. Ferguson ) i i -AND- I II I General Contractor. TQis Year we will do Still B QQ r by Qiuii Jfyree f fon priz Q sl Ruildinjj, Repairing, Mantel and Grato Setting, Plumbing, Steam, Water and Gas Fitting. ( same general conditions as last year.) A Complete Plumbing Department under the I II I Management of E. B. Morey.jflPArtiti3 . 1st. A 2-gallon Porcelain Water Cooler, to be awarded July 31. L ( Deigns; Ktimate*. Plans and Specifications for build ing of All Kinds, Prepared on Short Notice.gjFA. . 2d. Free Supply of Ice during month of August not to exceed Larsje and Carefully faceted Stock of Fine Mantels, Orate, Tiliu of All Kind, bath Tub, Clo<,et and Household Appliances, Steam, Pounds to be awarded in Fifty Daily, August. Hot Water and Oa Fixtures. alt 3d. A First-Class Refrigerator of 50 Pounds Capacity, to be1 No. 19 S. Palafox St. :: Telephone No. 345. awarded September 30 --TH ';-- Corresponding numbers drawing either of above will be deposited at Citizens National Bank. Citizens National DankOF TUB i l ABOVE OFFER is OPEN TO EVERY CONSUMER OF ICE. PEXSACOLA.; a Commence Buying Tickets at once. The more coupons you get the greater your chance of securing one or more of the above prizes. The only limitation being, Tickets must be L. HILTON GREEN JOHN F. PFEIFFER, PKKSIDENT.T. CASHIER. PAID FOR WHEN DELIVERED.Mail E. WELLES, R. M. BUSHNELL, VICE-PRESIDENT. ASST. CASHIER. Orders to P. 0. Box 136 or Telephone to Nos. 69, 259 or 232 or send by the Ice Man. DlCTOidlitI I IT. E. WELLES. WM. FISHER. RIX M. ROBINSON n i of E. E. Saunders & Co. K. J. WHITMIRE.; JOH F. PFEIFFER, MORRIS BEAR, PEMCOLi ICE DELIVERY CO. L. HILTON GREEN. i A General Banking Business Transacted. """ " I i Vessels' Accounts Handled on Favorable Terms ExChange - -- ----------- ---- I I , NOTED ANAGRAMS. I Bought and Sold, Collections JUiilmm joljiison & Son. I Ingenious Transmutation of the Promptly_Attended To. Names of 'V.U Known Pmon. -- - Anagrams; : that transmute the names o}T_i_js ? r_ $_____ o of well known men and women are ACCOUNTS SOLICITED. often startlingly appropriate. What , ---- -- - - could he better (in thN way than theseannouncemetts. ,i - Do You Want a Buggy ? evolved from two S great statesmen's names when the . reins of power changed hands: Glad 1hi Star Laundry .n: 11.\\'ANOTHKU CARLOAD ON THE WAY AND WANT TO CLEAN OUT OUR DEPOSITORYFOR : I stone "!, leads not" IMsradi. "1 lead, THE NEXT FIVE DAY WE WILL SELL A VEHICLE ON HAND I II sIr!" Quite as happy Is the commenton , ( SAT A VERY LOW PRICE !N : I I on Nightinzale., the cheering devoted who-f angel.nurMns"name Among of yields Florence those"Flit i THF f PW EER l LAUNDRY r OE f WEST I FLORIDA! I that are most often quoted we may ce Ir I / mention Horatio Nelson "Honor est , r a Xilo;" ('harlcs James Stuart "ClaimsArthur's Collecting and Deliv- :Seat:" Pilate! question. 1 "Quid est \eritas" (" \hat Is truth?"), 1 l. y 1.l. answered by "IM Vir qul adeM. ("It ering Laundry Work I Is the man here pn's"lIt.I; :Sw.-dNh! XlShtinw'!; ''Sing; high! sweet Linda;" a zt is always done promptly to your l ... ..j.v I David I.i\ins-.tonc.; "I). V., go and visit r order, and you never get other peo Nile;" the Marquess of Kipon (who resigned pie's linen iu.-lead of your own. We s I the grand mastership of Freemasons are cartful in both handling and I when: he liecatae a Romanist) laundering your shirts, collars, cufl, 1I I "R. I. 1'? quoth Freemasons;" Charles =_ etc., and send them home looking Prince of Wales ".\II France calls ' as good as new. Our laundry work Oh. help! Sir Roger Charles Doughty Tichborne, baronet. 'Yon horrid butcher fs. beyond rivalry and i is peerless in Ortnn. biggest; rascal hl.'re.n,1 1 its exquisite! color and finish ; 4q many shorter specimens, such as tele- graph, "great help;" astronomers, ..n\) I IF \ WANT A STYLISH STICK :SEAT DRIVING WAGON, WITH OR WITHOUT RUBBER more stars" and "moou btarers;" one ALL WORK C. O. D. TIRES, OR ANY SORT OF A TO1' OR OPPEN BUGGY bug "enough; ;" (editors "so tired;" tournament "to run at men;" penitentiary TELEPHONE 114. 27 E. GARDEN S?' $ "We Have It f "nay. I repent:" old England "golden land;" revolution, "to love "' OOOD8 CALLED FOR AND DELIVERED FREE._ ruin fashionable, "one-half bias," I :: ::::::: ; II I WALKER INQRAHAM, Manager. Uwyers! "sly ware; midshipman, I "mind his map; poorhouse, "Ob. sour ,L------ ---- - -- ----- --- iij01011rit1 hope;" Presbyterian, "best In prayer;" !sweetheart: .'there1..' sat;" matrimony i ESTABLISHED 1863. "into my arm."-Chambers' Journal - .- ____ H __ ____ ! McKENZIE OEETING & CO. The Pia. !>.<.!rIn*. Robert of ttmh In the Hone 'ia* proper Ouw lo prepare: an ndvw , '' !Mritt-ao Mi-raid naa: "The IH.ixA I "Utah-Hrlghara II. Roberts:" sang I Th. SlmpllPltr of Affinity.. tiring: campaign in now. li* ready-Bo. true. Ofclarrd l>y President I>las out the clerk. Hobrrts. pale but self Pauline--Georgians has such depressing !- ton Iieral4. I 0 -DIALRK8 tit- 0i I ,* which met with re- sscsse.i. walked down the aisle to- ideas about frieudhhip! vars > age III i I'.nelopl'-Wbat does she say? For two years Ira W. Kelley ofIansfll.'ld i and General Hardware "l"e: euthuclasm lu 11tillw.'rll'a.. ward the speaker's chair. At the end j t I Ship Chandlery 1'aullne She says halt our friends are Pa., was in poor healthon , v eta> substantially that not only of the aisle Roberts stood with his' the people we tolerate and the other half account of kidney trouble. HP I 't''lttcd to gain hands resting upon the two desks at are people! who tolerate ns.-Indianapolis consulted several physicians and 80S AND 605 S. PAUVKOX STREET. .'sotnT foothold on the territory of the bis right and left Journal. spent considerable money for medicines , I A.GENOY - e-'v "..rlj. but that gradually Europe "How neat and clean he looks," without obtaining: relief until : . ,t withdraw from all" Interference whi!'i>ered a woman In the gallery. : Lllr' Little Pang he tried FOLEY'S KIDNEY CURE REVERE, COPPER COMPANY JOHN A. ROEBLINO'S HO H CO.'SGALVANIZED ' ,.' t', iiilnii In this hemisphere. Na- "lIe ought to," replied her comjwnj j \Vben gnawing Jim was pain young, he iuSered from. keen and and now writes. "I desire to add my WIRE ROPE, A. RUHHEL A HON'S- PUMPS. ., .i'!! OUT South AmtTlca cordially lon "with three wives to keep binitidy. BMIIW* he could net war a lot o! witch claims of testimony aiding other that it."may W.be A.the D'Alem-cause: Canes Cardap Dots!' Oil:, lictiesl iBitrsmtiit, Chris, iiehri, Cltlit a ', ." Times Ilerald. i on a cluin. J to the utteraiiii' cif the prcsl- -Chicago I i ' ' T berte. I ()OMP11uCq. I/X1N. I' U) I."bl'b ua a Jlstln'tI -- --- --- how be la older, and of coune be euffcrj till the "' fii tl.1..0": ... doctrine. The A. Ournlni 'oal lIn.. !. \>blle. Do you play golf If not why' not? C McKenzie Oerting Collecting Agent for IUr Pilots Benevolent Aso M. > in |. '\II,11' liy their! .|>li-mlld trade! The "burninc umuntain" of Montrt.in For. though hs ran tx ee gewgaws buy, thfy'va All sorts of golf goods::! at the Willis::! elation. ' -' n.l committed to the strongestf A\cjron. francs, \\hith is often mistaken long gone cut of fct>le. Record. Hardware Co.'s. ______ ___ _____ __..U c -- - for active volrur.u. Lt''ala ] Thicipo an -- ---- > the Monroe uoctrine. In fact to pillar "f rloiul ri..>S from it by day and i ia I --- ACADEMY CF , IIM trine. This natiuu bill pillar of tire by night; i ie. in reality, aveal J Price eight.1prompt ) THE HEINE MUSIC ANTALrMID '- \r'lwll.l..s with its 1.111.(1.l1d inino \\hi' h has been burning tvt I I quality, 1UQ W?&E BR QLJ J.'o.8 :North TulafoT !'t rji..t. "i \uiiTica 1 U in sympathy with several years. 'i delivery and polite I I MISS EVELENE M. HEINE, Principal. These tiny Capsules sre superior \! Suhjrrt.Teaohor 1 attention guaranteed at MISS IDA PIAGGIO, Assistant. to Balsam of Copaiba ' The The n..nll'"nt.---.-of l/ .... -How Only dare you laugh at me. H Mailer's, 400 South I Voice f'ultur".IQ'ID !an' I'lann, I.elp iu C beta and Injections 8 . I ; ; GENERAL INSURANCE "yltem; also ;Ut'H. Canto 1\11,1 Mandolin.DRINK They cure in 48 hours the r. xi1; i. dot-sift the great you you !; ram1? Palafox street. Phone No. ',, lauhior same diseases: without anyinoonCURE - "If living till you with nne I (Churns nf l'ul.ila-B w" not - at \)11. sir. 21 a.IHOPJLBE. ; WrlJ'I1U' .;JtDBVA1tDRUGGISTSj -UiII )- ... W. ii, to tell joii the hnccM Te.uherVIU then. I on't know { LION BEER ! I ,!I" .,:i. \\!iit to wear iNUher me \\hilt .'|I'ot' there is to l.i'it; at.-LooJun i >. .i.i,>tiling el!+...-Iudi&na;>- 1 t-nt !I Real Estate Agents, YOURSELF! al.tumnirr ! : t'r I J JT W for unnatural f It always makes a man mad to hare Lia Jsy 'I.hlr IU4aln.L11 0.. Time V>n|{. 1I1'w"pllwr.1 I PENSACOL.FLA., ,r1$" t t mt.tt. tf U> *Tttkltftt a his niN >elltIn r name >i a I. rn..r if nl u n' itlir. . sot : iirf.Sold I ''I 'r.'< -.mm r time; lni\iu.-f he 1'IiI'H'S'fJ'bo.ly ought to CtiHESE' LAUNDRY. I rM Pn..au e. 'tJ w. Pain' .., en : n ., a.trla..s t 'i .1.! . dry all g I.uetN '4ildgCdta n7 P II\ '" fs> ...letn".li it know his name.-Atchl&on ttlobe. I by Ilrsrai.ta, REPRESENT TWE TY.TWO OF THE "1 I. >,.lm in de .eUt r.s.a. nr rant in plain rtrp r. JFECIALTISS: Shirts Ccllm! and \ LEADING FIRE LIFE MARINE 1 r *' It. f No man is absolutely perfect, but on j I ACCIDENT, FIDELITY PLATE ( '' > P "tf.I.! who acknowledges: his faults Is more Cliffs I GLASS AND STEAM EOILER INSURANCE a 'Inui.r st os r-quell ' L '. '" <!*t awkn than half way up the IItl.Jer.hicao I COMPANIES .. -:-"', '- . : ''n in Jc cell* -- ,. _... -- ------ -- - Sews. I IIl ALL WORK WASHED BY HAND i , Trad".Mark.: tlHKS ... Endorsed by nil Physicians as the j 'al', tale! me he Ml lif te 1J..cbl T ATAL mistak are mad by AND FINISHED RY MODERN I I General felts of tHe EpitaM t only R"tr ab-oltitely tree from adulj j! '' TOOTHACHE, EARACHE i . 1 >.'t r.10.! sun tie patch ? those who do not bredti earlier teration.Geo.. .J I In .,,! him ia Jc h:llG -ymptom of kidney or bidder MACHINERY. Lire Assmice Society of the |' ud NEURALGIA " trouble that oft?n end in Rrizhf I Pfeiffer Agent, 1 k ID a Inmate ill drogtlitl oil ( .,.wt: t..n'. il ie *e or diab.taa. When K" EV'S Hi States The TI-U MrJIcrlCo.'' : 17 West Government Street _ t. "....rm.itenet tt VIIlo'm., ,--s. KIDNEY CUBE mites the kidney* I PEN>ACOLA. !! t, r* anadw.rrw YOrk. > , Office, PINSACOLA.: FLA well how foolish it is to DELAY. Opposite Kipress A. dt brut tcr rat! Try It 01 faj at all SalJou! 8-D'l fur Booklet. \V. .\. D'Alemberte. Office 31 South Palafoi St. OOIUIE8PONDENCE 8OL1CTTED. i i s. 1 1I .. : r Mi1Il1.-.._ .Constitution.. : I ____...... ____ ___01tYX tl. 1 4a t t .e . I.i .... < .. "...1'h.:. .."--1."' ''''!t"",, =..."' F. ..,.,..r.J". .".1><-.I.; ,., Il ,.: .-,-...-+" _,,,''l "' =-Je -7"* ""'<, <:"" ..... - . , 4 THE DAILY NEWS: PEN8ACOLA, FLORIDA, WEDNESDAY, JUNE 8, 1SOO. . - -- THE DAILY NEWS : I ence in favor of Pensacola of,$-1,680-1 f I BOAllD OF PUBLIC SAFE1Y. .. 389. For the second period Dtfffy'sMalt vltbtA 1'I SiPiCiL STALE:; Charges Against Officer Ynelstrami UlI ; IBOYS' I Ir ' Entered at the Port Office at Fenucola, 0; eleven months ending May 31, JOO, (a ..eed. Fla., U econd-cla matter. I I I Mobile's exports footed up $12- !' 6 Pure 1>, At the regular weekly meeting of Orrtci:: Pitt lIulldlnlt.:U! Booth Pala- '1615.21)0, and Pensacola's $13;80- ; ' ox iireet, up-italrs. I 18S: a difference in favor of Pensa- the board of public safety this morning - the marshal submitted his report r AND r YOUTHS' P1THLHHKI> RYTHE | cold of f76o,03S. Now, doubtless, Z L'4.o COT1flNG SEWS PUBLISHING CO. the secretary discovered-just what \0 hart Oli.The number for May of arrests, showing made that was the 329: total of the reader of the foregoing has done- World's; Famous which 12:l white and in Advanco.One were 2m; colj Terms-lnvarlably that difference In favor of Mobile Year hy Mail . .. -.._f.\ 1'Mix could not be computed from such Medicinal Whiskey ored ; 2yi were citizei.s and 39 foreigners O-I3-V-OJUilliam Month .. ''' 4&d1tilaLUe.f Pure malt / : ; 63 were dNcharired, convicted -* Thr*" Months M .. 1.'. figure*, K he resorts to a device pieviouly .3r-r> nil iii .' *-Ii..t.:1-: ;i b 'ilKJfY +w o 2b'5: turned over to the county . One M..nlb" : .. 1-I 1' + I :'7* ,. .- '' ILII h. : used him in : I'tn authorities f. misleading by : sentence* Oat) Week, by Carrier, payable Monday laTHE au-pended the Mobile papers, and lumps thatport's The total fines ae" ;Fd amounted to 3oljnsou A- Son. : : I:' $:!.:t2.rM; collected SI 204. WEEKLY NEWS: exports and imports together; : /MALI WLS'tiri .;,).. iaicstcr, :N.V Chief Baker al-o presented his report - calling; the result "Mobile's foreign of fires and fire alarms for PoUlthvd every Friday at 'I.IXI per year '{ _- ._-.. themonth Poitait fret bU5in 5 "-not foreign export bu"i- of May. - - ness-and reaching thereby an aggregate THK CHAUT com cnm. The application of M. J. Herrin TELEPHONE NO. 118. for employment on the police force'lITE over which he could crow. Now fellows Fue Fatlioniri of "'a't>r HAVE JUST RECEIVED: : LARGE STOCK t"! was referred to Chief Wilde. I\ Youths' Pen-acola has claimed to do I) on IVnsacol.i liar. :' and Children'-Clotl.me which we Parchaii \\ . uever A for the of sheets Advertising Rates Furnished on application. request purcha-p 11 Below the Market Value and are now in a po-uion to "!', . an importing business, and no one Secretary Thos. C. Watson of the and pillow cases for the lire depart- ers Some Rare Bargain in these good-. l+ r knows it better than the secretary ; Peusacola board of trade received ment was referred to the chairman UNION( LA cL hence it is hardly fair for him, in yesterday a letter from Acting and Mayor clerk Hilliard with power of the to special act. committee Lull.I 1 200 suits good wool Cassimere knee order to figure out results against i Superintendent Andrew Braid of the on water main extension in pants sizes 4 to 17, worth $2.50to Pensacola, to assemble Mobile's Coast and Geodetic Survey, thanKing the plot western of the part same of, which the city after reporteda some $3.00; this sale. . . . . $l.n-) This paper Is on file with the exports and imports together and him for information suppliedand debate, was referred back to the t BANNING ADVERTISING CO, compare the aggregate to the sum of accompanied by copies of a cor-t,: committee. I Lot 2 50 fine light weight Flannel and Cassl- Endlectt Building. St. Paul. Minn., when Pensacola'e exports.j rected chart of the Pensacola har- On motion the chairman and fire '. mere suits, sizes 8 to 15 worth tvbtcribcn adTertisert and other may j I Another feature of the statements bor showing the depth of 5 fathoms 1 chief were instructed to make an ia- , rxamlne it and where estimate will be gi-rra j headed vestigation of the circumstances of $3.50. . . . . .-. .. . . . . $o.7o upon apace fur GENERAL ADVERTISINGFEN8AOOLA quoted Is this: The items across the bar. The correction- the fire of Tuesday, and report their h JUNE 6, 1900. "exports" may include not only exports s i from fathom?,appearing in former findings to the board. Lot3.LoH.I 50 elegant all wool blue Serge suits to foreign ports, but those charts-is the direct result of the recent The chief of police preferred ' made coastwise; if they do, the ;j visit of the warships New York, charges against Officers Parker, Cre- handsomely trimmed, sizes 8 to DEMOCRATIC NOMINEES. : comparison is still more unfair, since Texas and Machias to this harbor, dille and Yniestra; the two first 15, worth $5.00. . . . . . . . S3 85 named being postponed to thb next the figures given for Pensacola in-I the reports of their officers and of regular meeting, and those " For Congress: Commandant : against I 300 pairs wash pants sizes 4 to !. : Reisinger concerning >>, good elude none but foreign exports. I Officer Yniestra dismissed after hear- VIH!(T WHTKirr-s.. BPARKMAX.M I' 1 the conditions existing, and the correspondence Cheviots fast colors well made evidence. .":-- l'I TlUCT-K. W. UAV1S. The fact has not been and cannot which ensued between ing , For Representatives to legislature: i be denied that Mobile's importing (SecretaryVat on and the officers of Habitual constipation is the door 25, 30 and 35c pair, white duck, r MORENO JONF8. | business largely exceeds that of the survey on the subject. through which many of the serious blue and brown linen. . . 4Lot :,,. The letter referred also , J.EMMhTWuUE.KorHierlff Pensacola; and that its export business 1- to request ills of the body are admitted. The I : I. is rapidly growing is very evident the continued Watson in assistance maintaining of the Secretary cor-- occasional use of PRICKLY ASH : 5. 25 youths' long pants suits, sizes 14 to GEORGE E. HMITII. : ; but that it has not, in foreign rectness of the official charts and ;,. distressing BITTER" will condition.remove and Sold cure by Han-this 20. good wool Cassimere, worth For Circuit Clerk: exports "outstripped" Pensacola is time effecting to (time necessary, giving corrections directions from for : tiah Bros. $8.00, at. . . . . . . . . S4.S ANGUS M. MCMILLAN. 'equally evident. When it does, -------- For Tas Collector: none will more readily admit it than the work reports.and suitable forms for periodical Ready mixed paints of all shades L Lot t I! 15 fine all wool serge suits sizes and colors at the Willis Hardware .1 TUB NEW Every reader of this will l |U. 14 to 20 worth $10 at A.H.D'ALEMBERTE. readily Co's. . .. . $o 5I> realize the vast benefits and impor- ' For Tax Alle lor.: What a Dreadful Thing it is to wakeup tance of the service performed inPensacola's C031[>LDIB T'\HY RECEPTION Lot t 15 elegant all wool Cassimere 4 W. W. RICHARDS.For in the nightsurleriug from chol- behalf by (Secretary suits, sizes 14 to 20, worth $9, at $5.8f > County Treasurer: era morbus, and yet oases of this i Watson. By common consent he At 1'rocrcbnCluli to Mr. and Mrs JOHN PRATER. kind are very common. The trouble, was entrusted with the direct man. Max li. Kahn, agement of the entire matter, and , however, will never become serious . For County Judge: if you keep a bottle of P AI -.KlLl.EKI his success shows the value and effectiveness The spacious parlors of the Pro- J. M. HILLIARD & CO. THOMAS R. MCCL'LLAOH. at hand, for it is a remedy that nev- of his efforts. The officers gress club were brilliantly illumin- , For School Superintendent: erfails to cure cholera, cramps, diarrhea in charge of the harbor improvements ated and artistically decorated last or dysentery. Avoid substitutes the Bar Pilots' association, the occasion night, being a compli- COOK. N. 4 there is but one Pain-Killer, Commandant Reisinger, the city and Mr. and Wagon For Clerk Criminal Court: Perry Davis'. Price 25c. and 6Oc.I press, the dredging the contractors and mentary Max L. Kahu reception, who to recently arrived Mrs. CapPiage factory. superintendents ship masters, M.P. BON FAY. I here from an extended wedding tour. MAKING PENSACOLA FAMOUS. and others, will doubtless gladly I For Justice of the Peace 2d; District: At midnight/ a grand march, led : contribute to make Secretary Wat-1 A Splendid Line of Choice Buggies, right from the faro . I. R. LAN DRUM. i eon's accurate and [ by Mr. and Mrs. Max L. Kahn, was car-load Lots JAMES Steve Allen and Charlie Lellaron Are reports timely, at Factory Price I and the of Pensacola formed and the guests were ushered For Constable 3d; District: 1 Pushing Toward That End. people may feel assured that no further misin- I into' the banquet hill, where an elegant Repairing Attended to Promptly. ) CHARLES P. BOBE. When Steve Allen and Charlie Le- formation concerning the depth of supper was served. Fir County Surveyor: Baron established the first steam water on our bar will appear in the Among those present were Mr. and 30 EAST GARDEN ST. : : : : : PENSAl""! * Mrs. Max L. Kahn, Mrs. S. Kahn, W.C. BECK. bakery in Pensacola, they set the published charts of the Coast aud Geodetic "urve '. Mrs. Alex.. L. Kahn of. New York, For Member* School Board: pace that other bakers had to followto I Mr. and Mrs. 1'. Stone, Mr. and Mrs. A.V.CUTHBS. avert falling by the wayside. The key to health is in the kidneysand A. Greenhut, Mr. and Mrs. Dave "BUT " THE i A. \ BI.OUNT, Ja., Their success with this industry liver. Keep these organs active Dannheisser, Mr.and Mrs. Sol Calm BEST. E. WAKD. Mr. and Mrs. Laz Jacoby Mr. and caused them to put their heads together and cheerful you nave health PRICKLY, strength and Mrs. A. Lischkoif Mr. and Mrs. I. spirits. ASH BIT- and plan for other fields of Mr. and Mrs. B. Hirsch Gugenheim, efforts of is stimulant for -IT'S ECONOMY THKorun the untiring TERS a the kidneys, ! I conquest, which quickly came in a regulates the liver stomach man :Mr. and Mrs. Dave I ugeman. . and Senator; Morgan the Nicaragua steam ice cream factory and a coffee bowels. A golden household Mrs. V. J. Vidal Misses Cora (Soldstuker. . canal bill has been made the special I roasting and blending plant, all of edy. For sale by Hannah Bro-rem- Sarah L. Kahn Hanna order for December 10. The Hay which have added to their fame and Hirschman, L')ui-e Kahn, Stella Our REFRIGERATORS are Guaranteed to Keep I. I the fame of the city. Roienau, Ray Goldstuker, Mel Le"Y.IHa , TUB OIL BUSINESS. I Pauncetotetreaty goes over to the Yet they were not satisfied With ) Roenau: Daisy Cohen Gertie and take a lower temperature than any other ou the nmket ; short !wesoion with resolution pend keen business foresight they saw Union Oil Co). Succeeds the "'arcIOII Hir;::chman, Frances Goldstuker They have an Absolute DRY AIR PROVISION: CIlAMKI K .1, i . ing declaring the abrogation of the i that Pensacola was destined to be- Co. Theresa Stone, Pauline Rehfield. .t Monroe doctrine. come a great manufacturing city, Florie Lehman of Greenville Ala., Warranted Absolutely Odorless. , -- ---- and they determined to get on the Notice is hereby given that we Lillie Cohen of Sin Antonio, Tex ; 1 1 A WASHINGTON! dispatch to the ground floor. Result: The Allen have sold our business and good Me" rs. Herman Greenhut. Ed Gold- i Times-Union and Citizeu speculatesupon [ Candy Manufacturing Co. will to the Tnion Oil Co., I.. Reden- stoker, Jake Be.ir, Phil Klein, Ike -Our Ice Cream Freezers !, ; ' 80 of that sure were they success back, proprietor. Hir-chman, Sidney Kahn, Lep the i-sues of the current ceusu 1 in the earldavs' of the business Hirschinan, M. J. Brett, Leon Gun- WARD Ott Co. WARRANTED TO FREEZE IN :{', MINI I rUS' > aud concludes that Florida's in- they advertised that "Allen's Candies BW.. H. Hn;}{,.;. dercheiiner, lien Forcheim, A. L will entitle the will Pensacola famous." And Ilo-nn-tein, :Max L. Bear. N. n. For- in population crease I in this prediction is coming to pa!!!'. Go In this stock are a lot of new ira.- cheiiner, S. M. Krenkle. N. C oldriD Price,* no Higher i than for Inferior make-. COIIM :. ; Plate to one more congressman, 1 where you will, in town or out of oline stoves which we will sell at and )/r. Hairi;ou of Luke City.A plain them to you. , which event th duty will devolve town and you will find a steady sacrifice puces less than it co-t to upon the legi-lature; of liiil to reJis- growingdemand forIIt'n's candies. make them. Cant of Th.inkt. Following their brilliant suece"-e", }; B CERSON: - trict the "tate. We solicit the patronage of the I with totiy that I feel under lion. Russell. Pen Alger came to i : public for illuminating and lubricating lasting obligations for what Cham- sacola and his trained bu"! SlM.ri.AKLV enough, the republican mind took, in the situation alan uei the h : oil and ,a-oliue, delivered to b..rlain'Cougn Remedy has done 107 South Palafox. any portion of the city. lor our f.lllliI'e ha\e used it in by the enactment of f eongrpi"; same line of renoning.: He saw thesame ojlm I'MOA (Mr. (.' ; the goldtaud ltd law, paved the brilliant future for 1'ens.icoln _. ----- troiiblt and \thiM> h, anti\ for the leturu to the democraticrank that Allen and Lr) aron did. He- pni'cou; B. WRIGHT COOIPANYI THi: way MOItr.llS UIIAITY: it has; always givi-n the mo-t p -rf . -alt : American Car Company's im- ' -' ii f the "gold democrats." .\ : Thrive food and --iti-farti'in, we fe.-l greatly indebted 7'11VI. on good sun-hinr- inei:se work and other Alter; syndi1 . rent'.irlnaieioftheChiet: platform 1 .ite Industrie to be e-t.ibli-.hed with plenty of exercise in the 'Pitt to tl.! mwnLletur..rs. of thilemedy I ,\M I V' i ; IIIK: A\ ,i'l: I I t. I and wi i-li. them to please! accept j here air. Her f.vrm glows with health "in its entirety" by the democraticconvention r 1 Now Alder's carwill :help Allen's and her fice blooms with it* beamy.Ir our hearty thankHo"pec!- -'-- - will bit like a lap in the her fully :'011$. S. PoTV, lies :'01 IIi lieI', ; LUMBER LATHScITITJ" candies in unking; Pen- act'li f.imout. : ?y'tein need* ih<' cMii>-inaction , t face to t'\"I'Q'lIn" of them, and equivalent of a 1 ix-itive: remedy shetist: Io\va. For -al" by Hannah Bros., to ti.Iliag them that they are And it is "ure to follow\ that other the gentle and ;pleasant! :Syrup: <.f 21) S. Palafovtreet.- .. i. SAWED CYPl ES3 LES"Kn;! -Da, : . not wetted in the pirty ranks. Cant i cipitai-ts! will lie attracted by the FI,'-, made by the California I'if ; : . If wi-h: iu the t the deiiucratic party alTord to dotlli enterprise: and !-nc>..e.of the Alk-- Syrup Co.- 'only.. --- ,if kiteh yo-i.-n fiiriii anything-!inig;good*, so way to .. 1'1-\-\1'01.\:i FI.Atllll" | Leluiou syndicate and the .\ItrSullh'all - *? ; ROSS it CO.'S the \Vili! < Hardware Co's.NAVAL . syndicate, and other industrial _u_ _ -- utrl'ri"e; will rom in WIXDOW :SCREENS. !- ('nru\('tit loll ItnlexEach COFFEE DRINKERS Mlsh'.ullll:: 5'l IIK'S.fpcrttary _. STOUKS M.\UKK7.ltejM . --- quick :-s-ucce--ion until l'"acllah"com. delegate mn=t purcha-e a 'fI.t' of the Mobilo chamber ..; one of the ,;r..at..t iiianu- :\011-1- rte l laity far The New hjMessrs. fistelatiek,-t ffiin the llii'-I of Attention : of commerce has cotn to the f.lcturin-l'itit.s in the South. VOT are cordially invited to end A. '1. :Mow & Co. start tag to place of IIIl'l'Iill:1t the * .\ wave: of iad't-tri.11' activity i is ..i"Ve and l the tinn- your old cloths to h the tinmott regular rite it sine fi uijiii with front >me new ure?, ROHtN. Commencing f/tJII"] ' sweeping over the city. modern and from the ticket agent; a c rtiflcate. - uptodateptocese.SS'e procure which he furnishes to the Register WW..f'.' i"i H ...._.-.....__n t.;> of will repair and return them tn WO_... :', H.-. 1 .>"> -howlnr ouch payment May 14, we will i mi /' ' decoying that honorable and! accurate A Thousand Ton;:iirH you by our special delivery. X ..._..._._._....... 2 iti K ._...._..._. _. I ill full fart a, a dplq atp. and the mt- in cadifound journal into the publication of Could not the of :I--.......__.... _..... I'" K ... I I:. l) which return tirktt will IKde- certificate I. e\pre-s rapture Pants sponged and.. rTP"-ted ." ;jc. K .... _._...........l ti U_. .. ._ I inI th ticket Moclm The sire "- the following; : Antis K. hprinper, of lli'i llowurd Vests ...i..c.Coats : ...... n 1 5.1IOIIKI fired. return n / of our n Wbra tli (. '.laud :Xnilmlle: Kiul- ,.trl'ct. Philadelphn: Pa., wfuMthe. h cue. SerazrsTuari-vltva-4; 0":11. procured on tlie-e certificatefioin Java co I fee, tear! (nn /- / found that Dr. New Di the ticket offices at Jacksonville.J. . King'.s -cov- Suits cleaned and pressed by road trau-fi-rrfJ It. businri < (company rem Mulillt to Pen aeuht rxport n (ru )ears!- ery for Consumption had completely the latent process. .. .. ...U.i.111 > Tin: u\\rN;' I'. ('11'1/,1:*. :>:ecret:iry.Jackonville. dred (100 cn-tijh-< < ago us lug to failure to obtain curtain truckaflUlirt cured her of a hacking cough that \ other work rra-unably cheap.! A startling: incident of which Mr. April y >. entitle the mid'IT tu . ( hcrr, tb..re.n IiunieJmtfly a for manu<; had made life a bur )1en' suits to order from $10 60 up. John on"H! of Philidc-lphia;; tb.. beautiful Ice ritchn 1' To tho-e who drink whl.kfor great Iticrctts e in lVi-coU'. toi.ign trallJe.Ia" den. All other remedies and doc- Men's pant to order, from #tU41 up. subject, i is narrated by him as follows tor could her no help) but she flea-tire) ; HARPER WIIi-key adds! ; !le Plate. / thai liuiinrxi st.ll in n coiisulrrnblt- give 11(1DELTtlLORNrCu., : "i WHS in ': most dre:1dfll 1 ICOliditit)11. T1ieaianrjatersguUF'fatce ' item, but Mobile liai gone ahead, despite says of this Royal Cure-"it soon removed Ill South Palafox street. My skin wi; alml)-t ye ze-t to exi-tence. To tho-e who it to laxt .' drink hi-kev for health's sake that great curporrttioii'j action, and has the pain in my chest and I ff"Dton! u* a card and we will low, f ..>s sunken tongue;: coat'J. : ; I : makes life noirovertskrnPen'atutain this line and can now sleep soundly, something I feud for your clothes. pain continually in hack and sides. HARPER Whi-key yellr.willi. wli'inuiValued / a i uut.trlppt'd| !her bit record of tin fiscal )....arrndlog can scarcely remt'tnberdotngbrfore. -- no appetite-gradually growing worth 1 living. at $,>.fJ(). )1&). ldri, I feel like pounding its praises In its advanced and chronic forma weaker day by day. Three phy;;i- SOLD BY throughout; the Universe.: So will cold in tile head known as Na al cia had Fortunately JAX. M'linillProp. . All examination, of the figures, liS given me up. 1I.\S\IJJ-h: : 'tlI: BUO' . every one who tries Dr. King's Xw Catarrh and is i therecosruJzed sourceof I a friend advi-ed trying Electric however, dhcluthe fact that thesecretary's Di-co\ery trouble of the J'ell-acol.1. Fla.JoeWeilind. O./irocerif! ( <; any other disea;:: s. Having! stood the Kilter: and to my ;great joy and statement;* are fallacious.He Throat. Che-t or Lncgg. Price E0c. test of continued succe*fill u-c>, surprise the fir-t bottle made a de- Coffee Jioaxtin (l ,'''IIf'''!": 1! says: and $1 00. Trial bottle: free at \V.A. Ely's Cream Balm is recognized, a* a cidfd impriMHiient. 1 continued Ht".Openesl. ', D'Alemberte's Drugstore; every cpecifli for inembranHl diseases in their fur three weeks, and am M0t>ili' foreign bu+me!> for the eleven use merchant tailor 131: I I montbsrndtnq May SI. Ist1, III coruPHl'tt bottle guaranteed.. the na-al passage*, and you should now a well man. I know they ..ivedmy Kj-t Inteudeneit-treat, announce Just Think of It : I ------ ----- wltb like Pt'rl..I..II""'..iho". tbebitudsuinrinertas resort to this treatment your own life and robbed the gave of another in hi" friends that he has re-opened i *of$.*>.'-!|).;jM. H' follows: J will repair your watches and cae.: It is not drying, does not pro- victim." No one should fail IIK tailoring establishment mid! dyehottap. ( 'Irll"lu.tl I''i iII'Sl1)111Ps.' 'I . 1 HM'iiurs. |jewelry in first-class; style. J, I. duce sneezitiir.! Price SO cents at to try them. Only ;ti) cents per bottle and is ready to fill al! urd'H8for t May 31. 1'*:1\1-11 inontbs ..... .._i *>.I>2.3>| Stephens.We drug-ki-ts or by mail. Ely brothers, atV.. A. D D'Alemberte's Drug fine olotliitiu': repairs cleaning enrolled (.Jwrril''. t Mayai,19a1-Ilmouths .. .. It.IIntrrait' \.\."'" ;Warren street, New York. One :; etc. 12mlm i will launder your spreads for up prejudice and try it. dyeing cruslied slninlicrriis ill In rxporti for the 11IUOIIIII. A -pfoci > ct-nt'll'ach and make them look --------- .. ..... .....Iin I1I.ll'WI: - No. E-cambia those elegant like new. Star Laundry. BLISS is Till: ".\X. A Lodge Have you seen W.T firmi &; IV for '. POUTS. 13, F. & A. M., Wednesday, j May$1.I5t-IItuouui9. .. ..... st.Sel! 1 Golf goods, lawn mowers, ice Chas. H. Bite is the man who ad- Juiif (; at ho'tlock. Work Rattan Rockers at cents. lh. linost flamr. .. May 81, li "-ll montbsInerra :.1\1.1,111/11= cream freezers hammocks and all vertises Pensacola. He does it right iu the E A delrrt'e."i-it.iJ Marston' S$' Finch's/ (" for tb! 11 month .. 11.107,475 sorts of seasonable goods: at the and deserves! your support. ? brethren fraternally invited -- _._- of pui o fruit iuir('%. !Ir1' The total foreign business for tbe eleven Willis Hardware Co's. to attend. Hammock of all ftyle* at all !sorts month foots up ii.ios.wti.: ting $l. 77itiigratr The best lawn mowers at reasonable By order W. M. of price, at the Willis Hardware cream soda and ice crfiiin' man that of Peu.aoola for the same price, at the Willis Hardware L. C. BEXXETT: Co.'s. at J 10() cents.Mackerel. lim. Easy to Take Co.'s. Secretary.If u. -- -- -- Let us analyze. Mobile's exportsfor want the best char on the Fox River butter. green ROSS & CO.'S you the period first itatel1-eleven Easy to OperateBecause market ask for Annie Held Krueger and roasted coffee and whole codfi'h. mouths ending May 31, 1S99-were FLY SCREENS. & Kugleman, Agents. _. a21tf:! everything kept in an up- Fulton Market coined ._ purely veeetable-yet thor- -- beef and mince meat at H.Mnller'e . valued at |S. 02.A>4 ; the value of ough,prompt healthful satistactol'JHood's RADER has a small Cleaning ladies skirts and waists to-date grocery at H. Mul- Pensacola's foreign exports for tbe place, but Oh My He i Is one of our specialties. Star Laun- ler's, 400 South Palafox 400 South Pala- fame period was |1:!.&:!,593, a differ- Pills sells cheap dry. street. Phone 2 13- fox street. Phone 2 13. a . . t1 itP THE DAILY NEWS:, PENSACOLA, FLORIDA, WEDNESDAY- JUNE 6 1900. 5 I ._ - -- - -- -- ------ -------------- -- ----- -- -- - -- rll' .will be played there this after and political friend of United States I ; NEWS nOTES 'noon. Senator Mallory I S. J. Fo-bee of Brewton and M. Mr. L. M. Davis and daughter, R Ha.iciExtraordinary Lind-ey Morri"ton, both prominent i- I Miss Mattie, left la't night for Los I, timber and lumber dealers, arrived Angeles on a pleasure visit. . and I iu the after- rtetntteharatay city yesterday r r fnaacola ; Dr. W. A. Mills of Milton is in the frtth 'OJIt noon. ( I city to-dav on official bu-inws; connected _ "". frl.prratareratrrduy, Bamuel Pasco Jr., has gone to attend with the pension board. .. ., lll"ffr., ;.i. It..t the wedding of his! sister Mis The meeting of the A. O. H. called ! ., I i- BOW night clerk Emily Pasco to Mr. George N. COLrad. :; for to-night ha? been postponed on Bargains which will take place there to- i i j .1. account of the entertainment at theopera .... .tender Laurel i'|': nistit.Ed. Craven* will pitch a room III I:, school.house by the pupils of the Convent Not Until You Have Personally Inspected These Exceptional BargainsCan \\ !1.Irf.: II x family tent at Grande and j ' Bayou II The many friend of Cameron (I. You Realize Their Intrinsic Values. hiui>elf aLl! family will ; nJ\ sumo ! Molino is .p I among Dow will be pleased to know that h* today.i. I mer outing where they can enjoy the is convalescent at the home of r} gulf: breeze. ..t.Uiii of Dunham.tuuruiu;;Ala.. i i ioJurchurch Tty! Epwcrth and Lea the ufo Christian of the Meth-En- ;I Hon.has with been a Wm.severe confin"d E.carbuncle.Anderson for ,some where time he Sale of lite\ Skirt' \S\Taistst\ I Sale of Black Sllirtr\ aists.AllourU.2JWhitehirtWait . :In Joutnignnof in the city portvtd latVrin ,i will ; of the I l're lIytforian excursion church I The Forbes; Store has a new ad- ; : ,; at. .... .. .. .. >J' .\\llonrUJ"IR1ack-hirt l : at. .. .. .. .... K>cAll :i jointly give a bay veiti-eiBent ii this issue offering: All H.';' Black shirt Waists; at. ... .. .. ..$1.15 I Friday tvtniiig. our J200: White Shirt Wai-ts at. .. ... . .. ..*:.; our ' special on muslin underwear .lllourRlack Shirt Waists at..U.\ : will met-t at I A. II. D'Alemberte and wife left for Thursday prices Friday and :Saturday.Ask All our to\\tineShirt 4Cat-t-.t.. .. ... ... .. .#1.7., All our t.VJi:: : Black Shirt Waists! at. .. .. .. .... ..$:!.';'5I ) i, J-r..,' tomorrowi yesterday for Buffalo N. Y., where for tickets! with every purchaseand All our ?3.75; White :Shirt \Vaitat... . .. .. .. ..$2 !I'', i !27-All our Colored Shirt: Waists to Close; Out at ,1 Mr. D'Alemberte goes: to attend the you may draw a handsome All,our $1.75;; White Shirt Waists at. .. .. .. .. ..$o i'5;: About Cost and Less than Cos-t. t... .. u Kutton and children meeting of the supreme lodge, prize. -- --- -- '*;\ !it' rummer inuuth at Knights of Honor. The fire department was caMed out ;THE ABOVE ARE ALL OF THIS: SEASON'S MAKES. INCLUDING ALL THE LATEST STYLES. '" !. ; FRENCH BACKS DRESS CUFFS TUCKED HEMSTITCHED, ETC., AND ARE RAKE BARGAINS: , Remember the concert and dance, about 11 :K5 this morning to box 15, ii A mu-ic by Wyer's band, at Kupfrian's corner of Zrrago and JJaylen t MrCa-killof Freeportwas Cambric Underwear ! Ladies' h t, : night's arrivals at the park tomorrow night. Ad- street, where a small house occupied - : mi"ion to grounds, with privilegeof by Smith Campbell on East .1't.: dancing 15 cents. Zarragosa street was on fire. l'he A very Large Assortment ; all Reliable Q islities: Full Cut ; Superior Shape We welcome Closest Inspection - on the flames with of Every Garment. We offer goods of i"Hit and at prices that make them txctptlonal'alue*. t fj- iiu-; '* great "port ThePalafox were soon extinguished these beautiful street Methodist only slight loss. I; wiurvt-4 church Sunday school picnic at Magnolia f. Percales, Calicoes, Etc.c 1 :: r utghte./ . Bluff was largely! attended yesterday Mrs. W. B. FerrU and little daughter ( Yarhrough arrived in the and a delightful day was and Miss! Lottie Pitt returned I "' i. \V.1-1 uight from Delta and regis-, spent at that ideal spot. home yesterday! afternoon from All our 3G-inch ]!':J'C Percale! now.... .:.. :. .. lOc I ]Yards Cotton for ... ...... .... .. .... ...... .. .. roc ';: Lewis house. Nashville, accompanied by Miss All our best Standard Calicoes including Simp ..... ..... ... fAll . 1,11 i ".I J The store recently vacated by P. Nina Mae Ferris Mrs Ferris midMiss son'-1, at. : .. 5c I 12 Yards 4-4 Extra Fine Cotton for Sl.tX) _1 >l> K V Jone i M quite ill at the Stone the clothier, is being remodeled j Nina Fern will spend a few our best Shirting Prints at... .... .. .. ... .. .. 4c : 11 Yards 4.! Cambric for..... ...... ...... ...... .. $1.00 ' iii-r mother Mrs A. E. in an up-to-date style. When weeks at Kavpu Orande at Mrs. l'ontalpe's .f ,. .. Alex. Lischkotf, the pawn broker. Decided Reductions in all our Colored Wash Goods. : -J Jl ,' .. }:iris :Stulbs of DeFuniak I Htate Health Officer Joseph Y. Pore ..'. ,:- armed in the city lat night The contractors are making steady ter and the members of the state ) ''; the Lewis house.tt on the new Commandancia board of health here HALLIDAY i? CO. .;1.t..r..ll at progress are expected 'TELEPHONE Be.!. \.. :P\LAFOX8T.. ].; , street wharf and warehouse for the to-night and a special mtetmgof the . W. Milliard Nicol of 'J ar.l the this morn- L. Jc N. When this new wharf is board will be held here tomorrow to X. B.-Just Received Sew Line of Straight Front Corset (the correct thing.) New Line of Boys' Cam- : ! '.r"IIIU"II/C\,..U ".. the ;5 o'clock train. completed there will be a boom in I consider the question .>f paying Es- bi'ic Wai;. New Line of Ladies', Lib.Ttv Silk! Tie. Sew Line of Denim and Khaki Cloth for Skirts. .. foreign export cambio county and the city of Pen- --- -- --- --- -- -- -- -- - * \1 IIteiiM and daughter urul I sacola for the Santa Roa quarantine ; PfeilTrr hnve tot The regular monthly meeting oq i I plant for act of the THE DEATH OF THE WORLD. A Ie i visit MM. Ueidel's gone parfeiiiht the Chamber of Commerce will be legislature.as provided by I W. S. GARPIELD & CO. , held 7 o'clock ' at to-morrow night. Ij SolrnlUti Fall to A erf" a. to troy Matters of importance are to be di>- ; List: fall I sprained my left hip the KnJ Will Come I| W. S. GARFIELD, President; R. H. TURNER, Treasurer; C. H. TURNER, Secretary. .. . ' schooner Ariel I II is cued and H full attendance of numbers while handling boxes. I , some heavy ' I'alafox wharf taking on is desired.Mr. i The doctor I called on said at first Scientists seem to agree that the j Ice and Cold Storage. : merchandi-e for earth some day Is to be destroyed by a : if general and Mrs. Philip KeYfs Yonge it was a slight strain and would soon ' .: .\ Irl'.II. have issued invitations to the wedding be well, but it grew worse and the gigantic; the cataclysm"!Jow." I but>r. Henry fall to Smith agree We will Continue to Sell lea at 25 Cents per (tOO Pounds. :f doctor then said I had rheumatim.It upon aid Mr+. j 1111. (i. Wood re- of their daughter, Miss Archie , i yesterday ulternoon from Louise Yon e. to Mr. Peter Amos continued to grow worse and I Williams, in writing In Harper'sMonthly OFFICE AND WORKS, COR HAYNE AND WRIGHT STREETS. t .t.lr! after attending the Con- Buck at Christ's church Wednesday could hardly get around to work. I on "Some Unsolved Scientific ' air reunion.H evening June 20at 8:30o'clock.Four went to a drug store and the druggist Problems," says: TELEPHONE 88. ..r.:. recommended me to Cham- --- -- -- - try --- ' "If so much uncertainty attends - J Mackey left this morning cases, two continued and one berlain's Pain Balm. I tried it and :! these fundamental to theearth' I' ir of the various towns along discharged was the police court record one-half of a Mi-cent bottle cured cie questions as the interest this morning. John Anderson !! past and present, it is not DRINK I 1'tt A. road in of entirely. I now recommend it to all u ItusinessCullege. who was arrested on the front gallery my friends.-F. A. BABCOCK Erie, strange that open problems as to her trW brick building, corner of of Mr. Kelly's house was Pa. It is for sale by Hannah Bros., future are still more numerous. We '... .' turned over to the county authori 21 S. Palafox street.A have seen how, according to Professor " 'j''I-"a mid Baylen streets. to bM ; by the Klondyke rt- tau- ties.The ; Darwin's computatIons the moon ..;.. musicale given under the auspices Different Kind of Stan. threatens to come back: to earth with '" i I" teadily JrnIU.t: up. i: of the Mission Circle of the A school Inspector up Westchester destructive force some day. Yet Professor I :t teanier: fits of Tampa wasd Universalist church at the Heine Tray was making his rounds one day Darwin himself! urges that thereare ' from ItrueeV dry dock Academy of Music. last night was and visited a school not a thousand elmtuts of fallibility In tbe data ; jilternooii und re.suuifd : greatly enjoyed by all who attended, miles from Mamnroneck. Among the Involved that rob the computation of .ur run this morning.f musical and : ( , a splendid literary ' ? program questions he asked the children was, 1' - ell certainty. : >f lVu+acula' rrackajacks being presented.Hon. "What Is a pilgrim TOne : "Much the sam thing! H I true of perhaps I ; :: 1 ;W dayttrgontheQuincy base H. H. McCreary, editor of child "A who salt man conies all the estimates that have bleu : : : the Gainesville j and they are doing good Daily Sun and state : I to America to be religious. i -t 1 ,,,y are Oliver, Sanchez and senator from Alachua county Fla., made as to the earth ultimate fate. : 1.. II. the g:tme at (uihcy yv*- i* in Washington as the guest of Another wild, "A Person who travels Tim's It has boon sug;p'sied<< that. euMi '. . Uj a ', J lok-onvilleV! team I Capt. J. Ed. O'Brien, president of from place to place""Well should the sun's heat: not forsake us. .. 'i '44 victorious by a score of i the National Pilots', Association. I do that," said the Inspector. our day will booouie inoatli long and 'L -",'uud game of till Se- I Mr. McCreary I is a warm personal "Am I a pilgrim?" then year long; : that all the water of t "011, no," said tbe boy quickly. "I i the globe Mutt ultimately filter Into its IMr meant a very good man."-New York depths and all the air ty! off into .1.'I Commercial Advertiser. | space: leaving our earth a.s dry and as Yt ; , devoid! of atmo-sphere as the moon and, Handihaklnir. finally that: ether friction, if it esMs. a In the days of knighthood every man or. in default: <.f that. tue'.corUfrc'ion.; . carried a sword and was ready to Plash must Utiivatcly bring! ; the earth back Y his neighbor) upon the slightest pretext. to the sun. HIGHEST AWARD FOR i PuRiTY. :1; When friends met, they grasped one ) "i'.i.t In all these i.iojuo.tiatii: >us : another by the right hand thereby indieatin - there pos-iWo : :.stiag factors : are cc : pi !' !; peaceable Intentions, as each / thititiali: tu! .-liU!?tI.!8 iial leave ,r one thus gave up to the other his fighting tinexatt: nsnltin dorl-t. Tit last LEWIS BEAR & CO. Sole Agents. , arm. That I is why we shake with , tt"!1'.1 .>f file fosa/-: 5'1t IK-' <>f our ..11. #,r the right hanJ.-Ladies' Hume Jour . nal. tii> i I. a pro uh! :.,(':. of evil-if annihila- ALSO 'QTt. told ti'n: In- au 1'\ n. li.t it is loft for the Stylish bed 1'007nwul/JaT'- Quaker Hunter and Parole Rye Whiskeys. , t. i.-.iv t>{ r.-i-tli i i'r.1tt.1I to point , III.. laurv clear!.: t...- exact tt-rius iu ' lor furniture at low prices, \\ hu-h the iifojdii'cy is luoat likely to ::$Chesterfield Bcurton \Vhiskey.& cash or instalmentlair, it IK fulfilled. .1 1 Afarston) Finch' to I ' $ 'in l'ie J!.>,ii".' L'r. A r r.."k i.f l.lKlilnlnu. r"t; : r.,1111:1 thensd !! IUr/-! t., t'. ', -T -tlf !.'_!:!!iii I ? \1"< ", fi'i'a: strange feat ,4;: RADER All Iri" I.ru wiw vs out of work , has exclusive I' ' CHl'IDI'ES = i iii-ar:! INC. i la I'a. during the rwent 2"t'.enlb'rto y-aiil ao'l that ia . vent III was Abu s ji> I- ii I j ( : II?" sale on he greatest patent, I 1.1 : ." '. s-iys the: Oil Pity lieri. .. the !1..rr ai.l: astt'! ilu-! captain if lie ' swing in tho world. It is, !! V hjI I"J, .. ". xt F' : .: r" \ .1 uis 1 l.e i.. Thri'ir.in':; <- curl 1 I;)) 11:11'I k! m the sliJji."U'tll. .. rr: zion-ni snioratic and anti- I rth-n' .. f v: :.icr h.i i ;ht'I'u turm-d out to pasture : :1L S the at the same , : captain Gut j'1 !"r.' i rid 1 Liutki , x vuue. 5 S5 WILL ; tartiou're r ;: :: $: : in a :;i-M UI -,hii-h the new ;grass I is alr - I zuasigoatable. ti.ic Lauding tin- Ir::,hi.ian: a piece of "\ i,,,,..1.1,: u. ..." 1 i I ". Muitc !Iiigli. ami when the shower . , i y ! Ice cream freezers; that fre--- the! n.u"if! yn t-:!n tied! three ends to" I Den t tl." t: in .. '", t.: ..- v.: 'n ""iuLa'I' : 1':r.,,- "a they sat'ii-red! toKi'tlu-r: In one I tL.il! l n> >" shall! Iiav(' some work. .. \ PENSACOLA ., ; yon tru.n H '! .rt, FAMOUS cream quick, at the ViiliUaidw.i.v I' . tmdi-r voiintrt'is. There i is .1 ' t. rl: r I'n. s. Tilr>!,!:.:iu ;: >t lioM of the rope Who fair, '-I'!'l.! : .. ;' y...I. -tr( '" ..,01 t".r..uili.! if l ::a.1. showing it t.. the captain, sai'l."That's I: ". It ..."u.1 tjKtfn; } *.'..rt." I ', ire fence rutth: : .:t close by the fpnt I ------- -- ou cml. y >iilii.n.ir.; ." Then he I nhu. warn you're "na' jn.i mnnut write ju;t : where they! tare standing; and a bolt Ii J . tool kohl fir the .it! >l nnd. show-'! as you think you lnul.j, I cf IF:!htI'I! : g ws attracted to It and ran 9rml it'r en Will tune you up tur l>-tur U1If". with, "Tlat's liiir it i 1-> the .-..;tram: ns tu-fore. f.aH I what 1 ctii goou': tiling the !'It1I'r wires until the cows :":, I "The Forbes Storeo \ill 1 list's two ends, your honor." wen reached whm It Elani-nl off t% Or when you paint i picture that is gang; in every and : all ' the anlmaU kilUn. : 'H" :1. ta'zlng; hol.l of lath' ends of the I Irllp tort striking ;? r !fJ ,', l.e third ''t overboard satin;, I Will make you think the dan! is gnat by siy- three instantly ' ",\nl I faith tit-r-Js) another end t,> it, trig, "Xovr, tlafs art:" I I.t ' I, lie lies, but it's in charity, if lying err was, Story r.r Pupa. yn.ir lio.-ior. &u, re's hu Iw..itb, fur, thuu;;li hi lit, bt'i There is a moral in this little storyof ' l He was immi'ttlaMy; tanas''!,.-London honest ,hen lie duct ' FOR m r mm r tm 8TllflD1YI r r"f Kin::. -nittimure Amen a j. :1.lrllIItI child: Tfe." askrl little -year-oh! I l. Li.uiF.. Waibel Pli.iJ., St. LouiMo. -, lIl'IIf'n'r a inottn-r's attention is I'rwMIe, ":11'1' we going t<> Lea i en some .. wr-te: I i.ave rec-otutnendej railed to her chiMron she malts alive layV'i: 'I KKTIIISA when the d"ct"r- aye nt them and wipes their: no cs.- I ':\ *, I'-ar, I hope so," wI'Ilhc reply. , up the child and it tifrt-c! ot Inc-, Atchison fllolie. " 1 wish (':JI'a could KO, too, continued -: : ) jJ:1 jjJl !f 'JJJ'f-'rJ1JI11'JYJJjJ SJJl jI Save money h\ innkiiu ytinr ict'l s There Is i-omfthin wrong with the the little fellow."Well ' 81ll"n't think Le will? huine. 'I he o.t. you .- _' \ ) cream at quick I npl'l'tite of a small lay who can wait - at the Willis ](::1rlt'.are a")"C'tlhls mother. freezers patiently for his dinner.-Chicago' l) i t U. I NDhIt\\'FA1t IS 01'7 OF SKJ1IT IS NO REASON WHY AH MUCH PIUDK Co'.*. News. "Oil1<>," replied I'redillc; "1,0 could U 01 t-i, in it !1- M Outer , I' ii., t-k : : 'i ut ui th..d.'I.ft Ire-s. \\\llItt., "pIll'ndt'rwf'artntli.'epartlcularwomt'lI. The best refrigerator for Iitor'n Audi) I'iight. >w tilt l ""> nderwe.ir: may b" bought her for th" Price of ;Muslins.Wo . ; Cheap Looking !' the the least money at Ala rston I F. M. Higgins, Editor Seneca, <>es man who worries about jFinch's.. ('UN., ) News, was afflicted for years himself e\er think that lit! Is worrying Sell the Well Known Home Made" Brand with Piles that no doctor or remedy alllIt a thing\ of which the world -- -- helped until IIP tried IJacklen's Arnica makes little note-St. Louis Star. Salve.I He writes two boxes M-idt of Fine Cambric. Long Cloth and Soft Nainsook. I ; wholly cured him. It's the surest Cycling has iti ups utul downs. Each i Pile cure on earth and the b.--t salve! After the downs, u>f BA.N.NKI bears Silk Label garment a with the words "Home Made" thereon. in the world. Cure crnarant"ad. f+ALvi: if you're cut or bruised. It Only 2f cents. Sold by W. A. D'Al- heals the hurt quickly. W. A. (:emberte, druggist.Largeconaignmentof. D'Alemberte. :;SPECIAL Skirt*. $1 23; Value, this sale $1 I oo. Some of these have En- - ---- broidered Hurtle; some have Plain Lawn RuHIs Hemmed. I elegant cane : AT MKUlUKTHKU'd.While ; . NIGHT GOWS -1'u'kl'd Yokes and Embroidered .... ...... .. .. WeLA rocker late+t art designs, m (). M. .I others PQ'ur' Bargain Furniture I are complaining I)IKS': ; DRAWERS-Plaiuand: Embroidered ..... ... ... .. .. .. 5Cc you.e.CA.BTOnX. i i hard times and low .sale*, Merl- CORSET COVERMade of Nainsook Long Cloth. 35, 60 .61, 75.We ; .. I wither bucket i is as busy as a bee in a tar- I ,, $1.(1 1 () and..... ...... ...... ...... ..... ...-.. ...t.. ..... ;..... .. .|1.EO I I Bah LnJ fag A'yp ErzHAnger'g getting in new stock and sending out to hu : I n.any customers; r t Is trTh(> Workmanship is Good and the Style H Dainty. ; rL: ; the u-nahluantit.of choice {roods in ; 'hh' line at living price Resells 1 4 ,; is! A'' 'Chemise, Specials," 73c;; and Jl 00 each. I i i low because his t-xpen-es are tnoderat t K 1. Golden Seal Nudela's | He does not have to pay high i I L I I ( rent to be added to his price. je CHILDREN'S APRONS 40, 50 and 75c;; each, with or without Bibbs. !I broad and fine at !:j' serves his cust'>mr with E LADIES' APRONS, :!5. 40,50 and 75c;; each. : H. Muller's 400 South ne*" und ctrPlnd has no trouble prompt-in "Of coot e it's the Rest We sell !I . : Palafoxstret.: Phone213Iron II III holding tbfin after they have once T.ADIES'.EST an Exceptional Value, lOc each. only the IJ. -t in Everything in. :. __ dealt with Mm. Give him your next Drug, Chemical, etc. order, and see for yourself: bedsteads, in great variety, in Jj-iw Years J. W. T. Green & Co white enamel and mahogany, brass -- - - Truly W. & B. FORBES. trimmed elegant designs; at O. M.fryer's Hammocks in all styles at 37 H. Pa Il fox. Furniture ' Bargain House. Marston $ Finch $. s' " i. ,: -- I I. "*" .- F o THE DAILY NEWS: PENSACOLA FLORIDA, WEDNESDAY, JUNE B, 1900 I f greatly loosened by the aUsfraotion - ol tae WINE OF CARDUIA < '. pold, but it had been pulled pot by the I I BEE BUZZES. robbers Into a sort of loop upon the left 1 J side and this loop had caught upon the Curing honey simply means! a proper .t r i evaporation of the water it contains.It . stump of a stout limb or shrub which SURE MEDICINE.. had probably been broken off by the falling is best not to handle bl'l's'ry early of some other victim. in the morning or late ia the evening.To . At length he'struggled 1 and by following handle L<'I'>with the most satisfaction 1 w the shrubbery that found root in the select a bright rather warm day I ascending figures, he finally reached the Dividing the bees into too many divisions HAXOSOX VA.. Dec. Bt. loAel rock at the end of the pass. early in the season is often ruin I have bean suffering from female wrtk- Andrea's mules were pone and his rich ous.In merchandise had t.'I'n taken with them selecting: combs for the colony! to tees for four year Iud have taken many and he had also been rubbed occupy in the new location for Infants a medicioea, but Wine of Cardui and BId:- of his sold, get a good and Children.The . he thanked God for his supply of brood. Draught hare done more for me than may- yet life, and the WIll **. &t !bought of onee more seeing! his dear wife If the fertile workers are discovered: Kind You Have Always Bought:; has borne the !MTIM. MBS. CAROUSE EVA. 8. = ;:4 care him more joy than could! have cone when they first make their appearance ture of Chas. II. Fletcher, and has peen made under t t 7- rrom recovered gold. lie reached his before any of the drone Ian':"- is seen Ins + ionic in safety where the joy of Marie scattered about they will often accept personal uperrisiou for over 30 't'ars.llnw lit) MI,' was equal to his own upon beholding him a queen cell or fertile queen without dif to deceive you in this. Counterfeits Imitations ami I IIt -live :1 n.1plI.. ficulty. "Just-as.good" are but Experiments, and endanger: cu! > "n'f f Car II The clothier made \known the facts of The impoitame of spacin? frames in a health of Cliildren-Experience against Experiment. his discovery to the nnthoritieti, taking hive should nut be overl.mked. If ten care that a knowledge thereof was spread( much space is given, the bees will huil.11the I The Kind You Have Always Is a mistake to take any and e>ery kind cal medicine when you are unions: the people. .\ strong body of soldiers combs 'o thick that it will! I... necessary BoughtBears siclc. There is dancer! in it. Most of the so-called cures for female went to the castle and arrested the to shave them down to proper thickness the Signature of eikncss" do nothing mure than deaden the pain temporarily and Yo hen wi:kcal count and) his associates! and lodgel ) with a sharp kIIi:,.. the effect wears away the patient is weaker and sicker than before It is I them in prison. They were tried conicted Wax is not gathered from flowers or never wise to take c\nces.! You have only one life, and that is dear and \ and credited.Andrea i from any other soiir. c by \"-\--,. brit is a precious. If you hat e any pain, ache disorder or weakness in the femi- Carlini not only regained the: natural M-creti'tn of their own and t is only nine organs nothing will! help you like Wine of CirduL It helps do money and the merchandise of which he prodtu-ed by heavy feeding "r Burin av.aywith morning sickness during the early stages of prenancyand had been n>bld.. but he recehrl the honey' Hows.! It can readily: b- discovered - modifies the pains of childbirth; recovery is rapid and future health is beno'.iitions and blessings cf a gntefnl in the tines on the underside; of the , assured. The Wine is purely vegetable people.( The mountain passage co long body.-St. Louis: Kepublic. In Use For Over 30 Years. being nude: Of herbs whose known as the I>eath Track ceaMil to ben ----- UOIES' ADVISOIT IPAITIIHIT, ....... . . medicinal act t scene of terror travelers! and a rewnine Is eUTlv. eo. n "vue ar.ttr TO.. e'er properties directly THE For a'lvUv In nun r ]umne uporrtir &! DOMINIE. ....... upon the organs; of wOl11Jnh ')j. +i:riont...mrc.o.-- _ U4W 4l , > . r;ttop'l fk.l atrha006a -- - It is a ling-tried remedy..nd his ,run 1t.Or. iwiunaoA.. Tina.Li which it tear to this day-"CarliniaPtlss' The state iVpnrttnpnt fit the tente.l'Statcs : - many years of success behind it. It Xew York News.Itaudicappedi RII\CInnunt s'prinN $i ). .tbonl'eteoty nn rpt'.. i.rnily 1cii - ( is sure. Why take :a chance: medicine when ycu can get a sure medicine: ? flip( a ronr to ptiti-'t Auifrica laiwion- "I want pget i .1 i i''L. ,(_"vSC.iJ the i'il! lad;. |p'"tat? >H a.* ..I'.Minuui Druggists sell Large Bottles for $1.00. I arks The in First foreign laml.- I t uf thi'iian'i.j-iv. wm io r GUS.Importers tt.iptist tIberraele of Cincinnati . " t Y.b, ina'aKl. rej.I.e! the .!, al'r. "hi.w j is to !to aiiinm.il 1-y tclfplmii" " -c ]hh do yni earn t with siii'h . of its inrii.lHT is urs-.re ti> r "U'hy. in t too !.i-ii a:1: 1 lI.t t. .> Ion hear th, Sfiiniin iiinl kcniireMthout and II. a, ]I wart one tl.at'li l.eep my h..tI-..- just IfUimi their Jn . >m > " ,right this Mimner. -'I'll1lo'lphia i'ris". Bishop 1'utter ret+'nt'y witnessed. a the-i -- Chinese and Japanese Correcting a :Ml.apprehn lon. I I ntikMl |1"'I''IIHn"f' in Nrw Yo:1;, and "Tin.- JuMots are going: around claimingtiny !! CARLINFSPASS. according; to Liown st.itri.icnt, it was .\ Greet I ii mice. I *Fancy Goods. f uuldu'l secure [passage to the Paris the first time: I'c had l iUcn.ol; U New "I in parr run will:! miss the baseball $ e3:11: ,, i:i..u." York theater He explaiueil that lie had this stimt" i.'t'i", I FINE CHINA TEAS. "So I heard. That's the reason I Kimt no objection t.. tlxater going and hall "Yes, aii>\ erej the man with a coH. the agents cf fivo rival steamship Hues i j i Assist i i {j" a Final: sawn in the duchy) cf ., :> merely refrained fr.,uj it LiniM-lf because I unsympathetic rye, "we'll miss it. It'll :\... at ttimlh r.i.ii| .I. .... up to we thi-tu today."-C.cveland! Plain I_ Pjnilrt-i. nithin the! Sate ref the! Church "What's the matter CHI? You look he thought that it was wiser ou his part. be a scat chance :in take up the paper ! \vorrieil." every day an I nut seeVa hington's i Laundry ()fllc \ i'h\-t > ! Dealer. mid MftatiM at the toot of. the Apennines. I'.islidpVilliiiiu Tijlor who\ is now I 'Tin trying to dance a two step, and name trjins to pt i u the bottom ot the1'OIumn.Wn.hington | The Croat Orator' Plalih.lie Antony te! irl'Lituts of A'ssiii i toss RrlotLiir on tintui.er.iiint.ite ; iiEiiud Andrea Carlini who was )'\'l' jot too many legs."-New Yoik K|> .-,.ul'.ll diiiivli. has hail a most (Star. I went to rullrRf, took the prize =GOLA (:r Journal. eventful career. I'n-ucnis to his retiienunt ' For oratory, amitVn kisoMti t > Lair atf'iiiiitliitiHl! 1 much property. The Irum people tea in platform the land.B tailed to iTi 1'aily: iu the firxiiH-r after the The Acme -of- -Ilnpptnee.-- had preached from adjlit.efntiiiiiuii.. four>ly fur years:T&, ago 5:ears he. HEINBERO f BROS. Z CO. Grist and Corn Meal M's.lt1. ;; . And tune he misted the honor that mountain torrents lad: subsided, lie had Jljppmtvs is ftumttiinri |iorlr irdlly lie has worked in Afi'n-u. Australia India - IUJ er-tutuli' l,,'cn to di.MrDark tx-eusi i..:n t'i ':'> to :-;'x- nt. The dis-tance the man oho has reached tie top South Ameiiea, Asia and in of , And then it to most F. GONZALEZ & CO PMSDUfSft again cornea man , : You may hoar him taping till; by the monutaiu mute was not great, the i islands of the moth Pll'itic. ; Who is "Beit" in t barber shop. Ilea auctlrtnttr.Chicago. .. . ROW an Times.Herald. but the way wa beset by t.langf'\'s, and Chicago Nf..i WHOLE At GrL R fi . t.e! px'd wife Mat i. begged; ; that her bns- --- ----- Medic t'Itctny. Aitrmlon. i CIIOlCt'IK\LA"OHI'lltt tti'it 1p A. :Mont Girl Ito b.nd would take the loner; and safer There will be a regular matins of I STOCK H.F.It: : '' "Ijura bays that book is interesting route by way <-f th! >o+tt'on! Millt-y.! Palafox Street Patronize Home Imti.-' . from start to fiiii-.li." I "Xo. no." 1 he i.id.i "That \.ould cost KIDNEY DISEASESare the Peusacrla Medical Horiftty at I every reason you should : \ a , ."Yes that' the way she reads a book CIP A' four days' j mrney.:' lie Board of Health "fflc' !it f Pensacola Florida. I for htiifk teed from the II"I ' ttc first I ",kt," ITXC..1 Marie! "think! of the terrible o'clock | by MO doing you en.nC. , : chapter and the last. -Philadelphia p. an. Tuesday. Juue I 12 and I try. Your money n left . DulletJn. dent'i' track: on lie wi.l\\ pio'intaiu. -- and you ID turn arc lo.l"'- the most fatal of all dis 26. -- I You Hill} not go over the! inj-Jtlaiu. Andrea In fostering the home inu 'Neontrihutelotheeau.et ill faitini' p"y;iclal1" are cordial , The ririt " Show. e- ? eases.FOLEY'S. it tii;d to attend It to ihororuinumty 1111 . LODGE DIRECTOHY i .N' fan oM! Circus, umt old land: "You nTPinnxinux. >.!ariiAn.1 betook which contnbutfB loi..! t|I', : D. . fame old u..du.t. tame old stand I \V. McMlLLAV D.. his vny over the la-iui.tam! d.| itrthe KIDNEY CURE Is Ieoaraniiid fame old bass and same parade; PrtorlAnt - same old panuls. same Irmcnade.J entreaiien of IIM! \viV.Andrea E. F. F.RUCE M. J)., KNIGHTS OF PYTHIAS. PROfESSIONAL: 4 forth with: six Remedy ! : Mme old clo..n. and aanie old jest; *et nriles InJ.'n ;ecret.try 25nlt -- . same old Broad with IrjnJ new irst.Chicago with tlo'liin?. and, itli"rt h'lrm. heeroiMd _. --- --- - t'i Uccord. the Apeiinined reaching; tie! city refunded. Contains HMriiOYMKNT: : OKUK.. I'ennacola bulge No. 3. K oP1' : marcellus f fl> eear: ; . -- of Noec-rn Ions Ix-fore titfit! where hedispiisid or money meets every Monday evening Jj A nrOnltlon. "f his ei.tlre: st-x$! at exMl'-i remedies recognized by eminent I RiuC! tip SS2 or call lit the officI'. In Hutchinson at H 'at Ca"ll4 hell W""I Hall . lo'rffl.y-I'ull. when do they call a woman pri,- '*. r.esi.rln! > ,dries ice had) pirchaiHl for 11 North falafox street when in k Int"ndncia itreni."liltin Physician>i ni Stirs \ "an old ben?" I : lc had parr L'IMu 1\ ns in K'M.whii'ti physicians as the best need of a carpenter. B. I). Hoffman, ? brethren cordiallywelcomed. The PntcnialYhen she Incomes hope- he eirel'uily! sr,.I".I| in a stoat Kidney and Bladder troUbleS. Business Aa"nt of the Carpenter's ..'c Residence. Mule. I. . -. JfDlVIM . !1f'.py! kct In her -New and Joiner*' Union, will a: I PtK.n.Office ways my sou. furniliyoii rr leather 1..1 beneath his . H. ;: ; -! HO";L R. C. C D'Alvmbert Kui, i - York P'ess. Oars thin And.vn piutieiil.irly! notie.,,l PRICE 50c. and $1.00.W. with the desired help on short notion. : K. K. it a I 1'alnfux: Street I'Da. A. D'ALEMUERTE.. n2Stf s !.il. ta Hackacheshould PP\ er ) r."elfotetl. I He'ewe cf tivu t...'nT'i: 'y .eisied w o. w. I r -- -- -- --- -- -- WM. It II">HI+ kiiln"T rl"r tlianz:: upon his sei>s aid a.-re near at C. DE-WEEKLY. which, if allowed t', run too long:, t hand when he!: rrciitiil 1.:11\: .'. At irst Live Oak Camp Vi 1 R'axtman of the may result in ]Jri>!rlit's disca-tp, dia- he wo:: lJ"tp othereriom= und often fatal Ions Ix1 was I.roiixht to tb. qnietin? avMirasi.e Mei-ti fir.t and third r'ridny night IDmrii RE8IDENOE-400 1. j oi'inilain r-m.hv's KIIISKVCtJKKmakes : THE LEVY-PO" CO. month "IIUOIC wvi-rrigin cordi- E ,face'4 ' that tl.ey oily iutn;:ht to b"J:. invited allv W. W. WATBO.N , thpI( llllewell.. Take Andrea felt jnatef for tl.) s'li-ees, <.( It.TiiAMrbClnrk L.C.Indigestion . nothing ele.V.. A. D'Alemberte. his niT.i.iii.i ai.l he was thaukfr! thus to Dr. Wilmer S. Hall. -. -. -- (le eniiximed tl.at the! rain::;;' oij' sK''t: ':: 4 to Lf"": so le npeiii-l I Ill; \-i-l ,I.:i! .11"\' f t fern t lo leatiuT salt! a j.i..... 'f -,: .''I] I DENTAL SURGEON. rr t oust:: 0 er..w:.., wiU'! i ': I... ?v.e to tiesnppi , ralellttilrr, xe' -iint.*. who i.i: tenon ritti: n d aUin I Masonic iin: I le. Fhaia 354. .iit'n! n iiiul t'ii: II ":.1 yule a '.v. LOOKING We challenge the worldto .\, "':lily :t; pi'siblu ui the' sivi: .1 d:'>' .!'ic. luthier staMed l.K Lni-i". II:' retirn produced remedy equalto DR. C. RAY MITCHELL. . i"{>i.i? f ent.. the nionrtiiiii lx I fee nil.tfall. only' one .J;::t'IJt! P'I. .II' re- the Matchless Mineral inn'ncd.! and! this was only! dUn-nlt on Dentist Surgeon nilunt' f the wild terror. of the plaee. Water for the cure of Indigestion - And this pa' .!i;" was K\\n as the ? 'a1'dt Ii-ath Track. Not o,'(>r a rumt'i pn>- Dyspepsia and i 28', South Palafox Street.WEEKLY . 4 t, Y <'ill iis! Andiei's! passage a p-uty of 12 nYO nierchnn'x. "'ii thvir'vey frr.tnIKrta; to FOE all forms of Stomach, Bowel - IVmpi.i. 1 111.1 fallen! fro'll this pus". The'leeIies . NCIIEUI LL had Men (.,::11.1 in the vale, >h inII'IIII1r.d.11.: l, FOR STEAM DITI4ION > T? B had L'd ore of 1 his: mitles I overthe eases. Guaranteed to cure SSACOJ.A ILEGTItICTtItMIltb: .V.fW.Vv other vh'-n 1".0l<'n. habited in black or money refunded. Cost I leave r>n acola for th- Httvnu. Pilnuttto H*>ach, Warring, *.s" froik aid Lose with Mark mas\s ;; UR A WIr @r drawn over their! !:lM'''. <;>rau njion him t only S cents a day to use it. Yard..sna.and m. Fort arrive Harrancat at tort Harranca 1 from h. hi nIl a pri>je..tit: ; mss: < "f rock In:,.) .. m.arrl" at tort liarraDc. ,.11. and f..li! >d him to the earth. The blowrendered THIN One dollar bottle last twenty 1:30 1:"i p.m. arrive at Kort Karraneai t: . p.m. arrive at Fort Hnrrancasatp.m.arrly.atFort - him renrly JMVIM less, but it ftarraocai e May objVck to jrittiu' up did not deprive him of his ""* 11:<"'". days. '8:110 p m. arrive at Fort rlarraacix fc . I I Train. lea,. Fort Barraocai for "'.:;.1' and "Off with JiU b.'lt: staid buililm' the fire in money one. cola at For sale all "Xo. nn," re ;pi ndeil 1 the oilier; "let's I by druggists T:*) a. m. arrive at fentarola a It the morniti'. but if youommt'nce rip it open where it is. Cite me your I llUp. m. arrive at Feonaoola t j. 11lfXI \ knife." also if T. Green # Co. J' : : p. m. arrive at P,n *cola f o5'flO III with her al 71 p m arrive at Pvnuitcola !m The dothier \knew thotc voices. The 7oo p. m. arrlre atPenaaeolaspa once you may be able to di*;gnietd robliors were the self Mire S. Palafox Street.OR *a4S p. m. arrive feniaoola. a s P B overkum this prejoodiss. seeming monks who had hang upon hixSteps THINGS ADDRESS 'Malard'Y.ODI1. In effect l>fc. lit, 1499.8C5DAT . at Xoeera! i I regret to ob"an'e that I "Ue careful art not out the fWh: lOHIOrDILeav , didn't commence arl> eonimanded n third !speaker who at that 1\ \\\TILIINSON\\ { I *9 Peniacola.a. m. Lv Fort ID liar a 10 r.aou moment came upon the scene with a 'I 11.. m. I) m lt( nuff. * It was dozen companions. 1 p. m. p BI . 9 4' rather cold moruin whet Andrea Carlini heard it all-he heard :i Every other man you meet sp-at's about the Greenville. Ala. I p p. m m r Ip pm m the voice of the Count Marco I'Uaiii. and 4 p. m Il- I fait rr'rMed the idet he saw the count's faet but he made no weather in that helpless "letit-go-at-th.il"; oivu- TiNiiiniinil Kniin Judge: G./lI..n. Ip.m .p mIp.m 'p nFABR to Bd-y. Iwsn'tw, \llrectivitl siffn. lie felt! hU niorn-y l"-lt ripped open as )if he could get no relief from his di>nln nrt. a Kr.r:.x-iI.i.r. Aln Aoz 10. 1**. II | pea WH I.ATK ant felt the w..iht; of ;gold taken: from rake I erect pi"mur in r"rilfvmjio: the 1..n.I.! to "Fat fi:.rr .nu anll '. .:. and I found 1 him, and then he heard the order given ,, What we want to do is to educate men up to the point aunty, <- Mineral and the Wnlcr.merits Tinmturnl Wilkinson'niin Matrhlf >ritl- <: HcunHCola to lacy 1 and and if '' inyrelf !.ijin' on the tlooiprettystuddtnt. for throwing hit over the precipice! f saying; "I am dressed for comfort; hot \\'catht'rdors'nt tonic, tn .mr personal knowledge. M IHKOD ,i fnneaoola to Palmetto H""cb and * This! cau>e.l him: t'i start nul stru::',., (runt H u .Jllhr..p toilet *nt of rMenvlie.. teat rea eta DaTFansanniato + it but ere he ei>\ld ulT.'r! ..!:tuna resistance bother me. This store pays particular attcn- in have the.ref fiHct ibis condition water used In which with it wondrful'in 11 sold. II I' .).t Harracc.t 'sa't I thought I'd and 1 he was lifttnl from the I.... !ky shelf! and tion Summer Hor. \Vea hr J-'hirtP 'cf-, fur dy"r.'p'<"". Indimrktion sore t I'd an1! retarnP"n.annla . frit to Clothing : . tip hurled over into t'o: di-ep ,'hJ"PI. .\ 1''C.. nnd for ...rUIIIId.'..'...irft oriand -. to P lm t'o H r- a.fnr . t'ild the tiri1 :l1yq'If.- sharp cry ..t l.oiror Lnrst fron his, lip< straw Hats; Etc. Things that contribute in a great ill -r-ii|.oil.s.,. timn trouble neil. HiiimiiU.l ... not A'I\bf'irre r.iiirrKtr its No freight r "r.... d fri-r I'o n when he found himself M-.t-jM-iidi-l in mid- ,IIII..XI-t- It n biiblt iVrttMi u; NV.rJ. measure to the comfort of men. > reenmmendedby ' air with the Pinrir-, !bi-isjiiir torrent inMBiL-iiiQi for a fluatoer uf diea.e.. . wl1; build ti-! lire; if ytiive dashing ovc-r i it.s awful bed rf jayeedrocks ; ',{ Prohaic Court Z r.L1.iiutlnrAlnlutm i.AsTJudit' lounty."". l-'ub"'I"II,.. to .... I' \ r far III.Jnhjm: but in a I'.ttie: while! *. nrISY :,: lu.r:1 1 .\S KANOE.ind ; Itl IP :t wi-t-k. I he din enl that 1.U that} wa lield, by anti! Good All-Wool Blue : you ( iti le-p Serge a strorc support and he toek l'UllrI;=e breakfast i.< remlv. }h''oj'l. KI Ii I-< and hope and set aliout w..tittbz. tleepd i I half: hourni| : ':-. a. tli. tr: t II h. sto: t :.. -!'"...; !t hnd 'lain not only Coats and Vests 83.50 KREUGER & EUGELMAN , t-t\rt'J in"talll.\ i'niitr; "Irit.- *-W"Ot -: r E.LE GROCERS match aiivl your fire i j.< in full rifer A fat.il |pull y I= tn tie.- actrfe Good All-Wool Blue Serge The or oh-r MJJII of bidi.ev's 't ,11',1.- .\:\ EXTIURLV FHF.H11); NKW rVTOCK; Oh) .1GH 1- \ '.1 ill on! Sffond, d.iy 1'1' 1'hlit' i an ; Pants $250 '(, :HII-: :. CANNED: : SOODS A -PJ-.Cl.-\I.'III - time in the year.: robst; KlIlVFY CfHK: I i.. 'i -11' a a e . "p'Ply for T"i.r'-! ....>-'. .'. Try Our Golclon. Fleece I'loiar."aleroom . >It.., aid ?:iv1. XV. A 1*'AI-n All-Linen Blue Suits. Zephyr ,. 1-W-13J E. (;o.rlJtI"'lttrp..t.. O 'el'JOO Ran e.s now in i -ltt. \Var>.Iots-c.!, t'. r. Tarrj::ntid iid I - Use in Pensacola. C A.STOn.A. Weight a e 85 00 Telephone 151Plumber '. Ita U1 1)ht li ro\H+ ; C' .c.t1Ie "y :;JB "'I; .n." '.'.''. //r- Better Serges if you want them 'if H. H. WICKE , Ranges Set on Trial. .. I // /--.r.N if need thtn1.THIE / L/!: Cheaper Serges you . eAS R3hGES $13. Ccirtctei.FrcPeso1i .lrflttin1.' thtit arc ('heap V Gas and Steam Fitter , : Gas Co end at the fame time oj : LFVY-PCS CD. No. S South Palafox Street. j roil, durable quality, atMarston A.U Ki-d3 n. Plnnbinaaod! Oi Fitting MatsrisU Kept r. HlELlil'HOXE 1 :NO. 3 S. PALAFOX ST., j- Finch's. ; 609.511.Bouth Palafox Street., TAS. '> lSAUOUA. t'LA. .. - " ( . tL 1f a t R t DAILY NEWS: PENSACOLA, FLORIDA, WEDNESDAY, JUNE 6, 1900. 7 ; . - -- - Muscles It (was'arnt'tlcFlr"t due to Thomas Investment A. Scott thst | ,. f ill f U-- tAi is MorSIOMS Andrew Carnegie:: made IIi>! first inventment '. oNSTJPATIO -ten shares of stock in the AdanHKsjiress c Nerves, he::did :with f:'...IIlJluny.tIIl..J ciuiiMerabte| trepMation.ct S."i I\'cs.; It brings in iTS tram bodilu evils'! had lalmred hard for the money he had nv n which pains access to the blood} through failure of the proper S I lif ileiis Join I s. ",1'f'lI:1) vhile he had worked as a telegrafhtr. that slowly! but surely destroy health, It of railroad hi-tory ifart cheerfulness : the rstrenoih and I j -eep system clear of all morbid effete matter. This poison how he later fell in with the inventor of TAKE the TO REMOVE THIS CONDITION ,a trough general circulation i?deposited in the joints, muscles ami nerves, causing the most intenrepain. ... the slw-pios the aj- L .t"'t ear sale enormous . fc Rheumatism may attack with such suddenness and \erity as to make within a few days a healthy : vantag: 'i which that launnor of travel e person helpless and l.ed.ridknith !torted limbs and shattered nerv : ')r it nn'y be low in r'1't.': I' l,-,'ei4ltug: with "siujht wandering pains, \' : enough to make one ftel uncomfortable the ten. held "'It, to psssi-nscrs and prom-"ters. , I't7K finally and hoar he iiiterv>ted others in the invention : ..l r n such: casts is to grow worse, and become chronic PR1KEYlTTER I IIi of Woodruff.. This '. ! ttl m- rot e.shortly' t . Lite other bl>x>l diseases I Rheumatism is often inherited, ar.d exposure to damp or colt, want of proper fr after hi< nttirn from Wahinstna. : - .' s t'-.d!. niMifucienl clothing nr an't1nnd,1cutated to impair the health will frt'i; -ently cause it to develop when! the problems of translortatk n .t. : !in early life brit more ')it. n not -ntil middle age; or later. In what: .-er form.hutht r acute or chronic still . mere upiieiniu( In his mind.Ile ' c"'re<! (IT isamareeleussystcmeleans&randregularor.! + rw ;nherted Rheism&tSsm is Strictly Blcod Disease was n.on the road to success! and J n ' wealth! as ho then pictured; earthly: posmjssiens. PcrnjenentKj CURES a constipated tab!!, in 1 no liniment or other external treatment can reach the trou1.lr.citb r >!..thri": 'rations cf potash The oilfields .J ./i .!nd mercury, and the various mineral s<.lts. which the doctors always present cure Rheumatism but yielded large; returns Penirylvania: when Carnegie corrects trcub'e! in.the ci1e: 1I011. Purifies j. r.ia the digestion and break 110\\a the constitution. and others turned their euergies:: in the the blood strengthens the kidneys.4 t4PCTs ;. A remedy; which builds up the general health and at the same time rids the system of the poison is direction of the newly discovered terri Iii< SYSUM PIRUCT GROtR., ; r .t tie: only safe and certain cure for Rheumatism. S. S. S., made of roots, herbs and Larks of wonderful tory. In one year Liiid piirtlii" M for SOLD AT DRUGGISTS.ricel: . 'iJtrtiattad.s the disease in the right way and in the right r.1acetbe blood and fiuickly neutralizes $tllIH)) iutrrasi-d in \alne, so that it paid ? 4 t : \.s a'.l puaonniis deposits, stimulates and reintorces the overworked worn-out organs, and dears the system a dividend tf $1OU\.,OOO.-ltl'\"Il'w of Ke- , ra iLitii.r.s S S S. cures permanently and thoroughly, and keepst. views. I ,4 !Jo'idth state. ) e jV lunMrtrl T.an: tpnlis.Ind.fnreighteemmnnthswalsotarihlyafilicted; The first coffee house in London was "- vinMe to trt'I..r| dress himvlf. IXKtur haul h's caw was hopelex'He had opened 15>o2 by the Greek servant: of ZI l1 Vi.T..3I J3n.OIl3.. Speoinl .A IOUt8. i i..thai friends had guru him. without the RlitfMfl relirf A few hottksof sss -- -- - .'!-jtK eml he bo ueer had a rheumatic pain since This was five years ago a Turkey merchant. tIt I :" .. otr -.jK-cUI lyink on Rheumatism which should be in the hands y i tu-! '"rtunng ditiei-.e. Our physicians liar a made blood and skin i requires three years before many ... , .n.1l; mite you any information or advice wanted, so write them rpecies of birds acquire their mature t "..; your (a>eVe make no charge whatever for this service Address SWift SPECIFIC CO. Atlanta Ga. Ill pluinage.: __ / 1 J tJrHealt h -d ------ --- ---- -- --- '-- For Over 1'iffean.: . Mt In niT r.a\tp. and oven the :great; tIRQ. WI\MLOW'I SOOTHISO SYRPP haft j/ff is affected for good or ill by , c -S IN A FEW LINES.i CASK IS NEVER'EMPTY ?: been used for over fifty years by million ol steamship hues are Inconvenienced. --- --- mothers for their children while teetbioi.. every substance that finds .;J f i has a 127:.-}car-old I .\rt':;.eial silks: arc made of wood fiber For Yean VIne I* Drawn From It softens with perfect the gums success.,allays It ail soothes call,cures the child wind its way into the stomach .: 1.aint 1. rtlu it to cellulose by the action of tu Celebrate Great E\ent colic, en 118 the beat remedy for DiArrbtra. add. This! is dissolved to a pluelikccfin All excellent is the It will relieve the poor little sufferer immediately. I I: : really champagne 'rIr., : : : is to I l.: an e!tlI"1 Bold hy DrueKists: : In rvery ; a r .1111 Aiixirali.i. "istinry. ft.rce.l through holes In result of judicious\ blending. Time part of the world. Twenty-five cents n ho' : t s and drawn out Into threads when each tie. Ko lure and ask for -'Mrs. Wixkion'g . jra' was big; vineyard owner n Turkey ell< at !3 PITi.is k otblng C: :rap." and take no other kl id.At 'j hint atii to f3'). vrlili-b dry and harden In the air just Lad his own cellar and his own brand. I ; .9 Cap nutnnioliile! ('!III'i In as those of tie silkworm or spider do. Hut it has been found advantageous; to C. \'. Thompson's.Crane's 1 ABC1 . XVa oii hill at Ladysmlih. takes: Its sell the raw wine to dealers who make I'u-lr' (i':ubiuf MI uirnilier- : Ladies' Note Paper and T name from the j K.'iiliir formation! of a one district supply what another lacks.Hut Envelopes to match. OHFMIJAW (lump of trees on the tap which so there are still a ((provincial Cambridge Linen and Envelopes. 1 -n 1 -iiiijN>d from Algiers! "King of ill Bottled Beers"is losoly resembles a wagon at a little establishments that cling to the old Hnrd's Parchment. : k tlii'il the 4l famous for its on \u.'ne across purity and distance as to tl"f't'Inn 'llOd but auexi ways-crowning! :; with a wreath of flowers Invitation Paper and Envelopes. C I 'rt. The hill extends for about a the first tubful of ripe grapes :t 11,1kpl'plug Linen Tablet ,S general excellence. It re"r; "*> of cru.li' nM\>er to this mile In length;:: and\ is about 5m feetJiisli. "the bride of the cellar" full Frott'd"hun and Envelope .i freshes-nourishes-.induces f , i tu tin last :bl. years liiJMT I from to EnrlMi Note; HatinVove; Ti-fne! : year year. Paper Penni-on's Ftc., with health i is finer fl'ISt.: The bride be it understood. Is a special ; Crepe ; incomparably .tt Not only I N it to healthy yawn | a gt'IHrall\i8ortmt'llt of stationery. '.X: (-!j'rh lacteal of haud- wine cask tilled with the first running in qualities than other '4 ,f !'ny'lu Trench physician "but artificial| C. V. THOMI-SOX.: L any : rt> acre Introduced In ail yn\Miin; st..ul.lllr'sortN! to in cas.'sot of the press. More accurately It No. 30 South Palafox (t"treet.CASTORIA. Il and in fact the foremost : . lla :-f'W"rk. holds the juice which drips away before ' sore throat buzzing of the ears ('(1- U farm nar I'nrt PiMlpo, ( Is applied. Wine family beer everywhere. I: any pressure tnrrh and like trouble. It is said to Lea ... ,' ducks. sold, but used Order from .: re r'.IHly im) from it Is never uponhigh -1:1' elhcacious In its thethroat ; way as gargling tint |11II11I1'i! i of (..'rn tla1l). with which process It ; becombined. j days and holidays, passed aboutas V. ,1. YIDAL. : In SlIx-iU!! alone the new rail- a gift or devoted to the comfort of For Infants and Children. I.rhi illr agricultural and the sick and the -- ' ;( poor. ; There Is now living in hale! old use The Kind You Have Always BoughtBears bride exists In 1.iury in the Tultcd 1 $dates.t'ouatanttlagde : Something akin to the " the Mr. Ceorse;:: Croall tif 17 London street the German free cities. Each of them -11f l IIIIIK'S TVIll IMmbnrcb.: who was present at the annual taeSignature TIME TABLE. ; ; and each cellarthere the sultan has forbidden all Las a wine cellar, Iu : theatrical fund dinner In 1827, of 0.: i wine is cask always yielding . ir- .lli..N l<> Halt the Vans txf : a ' when Sir Walter Scott IJrodalmNlllltu- but never empty. LOUISVILLE AND NASHVILLE RAILROAD. J self the author ." lIe distinctly arulucl *> one 'iiTinao line I..>- rememiiers ofVaverloy.the enthusiasm -- Any burgher is entitled demand a IN: EKKKCT JANUARY 57, 1WO. : .-t. great bottle of its contents when he marries .tI. .tI. .tI. . (ilauuburg mud .New York In 1M'J ed that occasion. t..i' arvui on > I first is christened and when his son .' tn! amines/ uf the previous is benreDmek a. No. 2. No 1. So. c. .. .i'.i'So. I also when the son Is 21. If the son . 1lg.JMNl malls. Gladstone'. I.evlly. 12:15 Bonn ttht lpm Leave I'rn a-ola..Arrive 1i5 p1l1 I'iooam adventurous or the burgher himself %:15 p 01 12unl ht Arnvr..F'Iomaton..Arrivr 2:45 p 01 %:JS'J: am' '!?',!rc r>f the colonial office are While Mr. Gladstone Interested: bis I, bottle 4Ipm :\11'8111 Arrive .._._ Muhme ...Arrl"8 1oI\IIOl'D UIIniht! ' 'atl11 initial root to the rounH'l.uni. audiences Immensely lij' his endless for that tatter he gets another ,::5'plU : jau..m Ar"\.1\8w..rl..Br. ...Arrh.1' 75 am I'' jliplll: ? , from the cask when be comes home r.IOpm i r.III..m Arl'l"I'\lhn'lom".Arnn.: JI:5)ain \IP1l1 ,. : ChainU-rlaln's flow of animated rl'warksllnd brilliant HATS VALISES I .- SHOES eMlaiJi Taupin Arrn'ra-IIvIllr Arrtte 2:21ain 11:1latll) .i I countries.But H I' ..-.'n.uryl" f 5.1"iS historical criticisms! he tailed altogether from far 1'IIII"n' 2::l11111 Arrlvl' Louirvdlr..Arrive .:I"pm: 2:5Aarn it : there Is nn official speclaUychnrJl't1 ,tinm! joti..m! ..rr..rh..I..t....". : 1'i:4iI.rn JImpm "; . 'f :Swcdi-n UT touches a f'.. convey to them the sense of crtatuehs. :: to see that whenever a bottlo- A m SIOCK OF CHOC!&[ CHOIHIKG.Men's '.tlt.'' ' Kvcry one left his society pleas- BE1'WtEN PIBASACOLAAND JACKSONVILLE ' kh12 f IMuluin has shot t'I' t- <> :: ful I Is drawn out another bottleful of #t'"I \ Ms I If and ti! .- siiltnn oft e.l. amused perhaps delighted. Red I . P. ; the quality at I ... i cannot imagine anybody quitting! :: K Impressed BS near ES possible same Furnishings. ..0.' .0. No. oj_. No.1lSi .... '.i > l lnr to her a gun. once goes in. And thus it happens that night j:UI11\ ...... .. ... Pensacola .. 11:1.' p 111 1\:1111 p ml'tMni ,' . with reverence. There was in- bt TMant Milton )1' toplum : : 1'if'PIII . wo ..dlll..lIt \cgft.nrians.:: the cask !is never empty.-Boston ( .l<-ed a levity sometimes observable city 4:1131m ti.i 1III leF'unMk Springs wmt 1 p /11 2ep' 111 i;. ' gi-titilt> (''MI \\ hlch grows Globe. 9 Having removed to the Corner s9uani nSeams .. ( hlplt s 55pnt 157piii 'I > . f-Iti's Mirfiiv. and the otliil about him which was very antagonistic of Palafox and Intcndencia''' 7a"" \ 11:1/\ III 1a.ruUlIII\ .. 1II p/ll 1II15oooul '* .. wlii.'li al" \,-. to reverence.l I. Diamond Cnttrri sad; Their Work. streets, we have some Rare Bargainsin sl5ant.. lcinoon Itl.r Junction. LlO p IU llJ'lJ ain ' prows > I:11pm ialiahas 5lapin .... .... .. { HiI'utisill! Who SUM'S UlotlI'arK Martlneau himself told me how Not only is diamond cutting; not .a Every Line, that we are anxious jI: P III /\"II\\'III. il:2U am.... 1'iI, . .Idl HsapjKiiiiti-d he was when, meeting speciaCy highly paid wcunatlon, but I It to dispose of quick at Removal . prize I.I5tesas 1."l..n. ' tain after his great return to power, I Is one Involving a most humiliating Prices. I lljuilriirc fir IVfincu heaid to him. "Wliat an opportunity system espionage to the worker. THE ORIGINAL' I \\ ,tit IoI\JiI'kiflll lo hit ('ol- H. HAMMERMAN joi hate fir the great work before Each man has to strictly account for sl I' nitie! f msolidatiitt of the empire!" the stones he receives on going to workin PABST yfif !- .' :1:111111 1:1'1I11I\311:.: has Mr. /I I:.tI...tone shru;:?ed his shoulders the morning and the count has to be MANAGER.Vliy Kinlu kJ aml Rnn fct u-t.. fur t&. 1..1t'1I1 flC hi" and >a'.l"Oli.. I dnnt know abnm that. carefully taken when the unfinished BOTTLE .* > I'U'llllOII licit 1.1- ll.HBxt The clerks in the /-f.loni.Tl oll".i-- ha\e BEERHEALTHFUL : work 4s handed at night;;:: to be iookcd IOUNT AIN MINT !1..11 HM inlli-i of I.<. (If . got tint i.uich to elk alreadyd'cabuhlwa up [In a safe against: the return of the S. A. FRIEDMAN .t' , ery It'c.! t.Ilired '. workmen the next day. The possibilities ,r> San Lt l.irUiri cnunty. i _______ of theft are great, though: a dNhonrt THE BEST TONIC! . i ''unl fur ilu Whole ii* the Prrm Ceniwr. I workman knows that an attempt tn -Proprietor.For it n ain 2.!Mal :ions are The avirare taau I is usually . newspaper) .1i.pU'"t: of nn unfinished stone would l I ' .Ir! M.-,41|I. tin* lulu-try.in- about a- quick wilted!.' the nex.ttnl' : bring suspicion plat, him wherever the' \ feel ill and irrita11h"l\ n A ri . h..tI'lofotlll'ain: Mint TVui--will _'Ni t irnipr ( Tlals:1S prt'tty well llluttratedwhen i atterrpt was made. make well High-Grade Liquors. : andtrotig and i- '....rful m T tin i- J the Chicago Record was placim; i ,___ you ' liriulit and cheerful: > to the twit il Statifi f its foreign oorreypoudcnts. CeorgeAde Slot) m\\\Hh.: 'ttto.'flue r"1IItaillIill' I'urf" indigestionirrt AND :-'tln.r Crank, Private Stock. Lien v- .' '. il for tin- year was I was sent abroad by Victor 1I: WSOII : d'lVfavay th .t f.'<-lin;.! <>f lauitiinr BEFRESNIh1TRY Ida: : \l11l Sour Ma-h, Very Fine ; -i-ta* .11 .ut'n..se' ..t ,. ,3- fur that iuriMjM- Ado dW all right; readers this pap/r/ will bi in s-mr.tiif I ilinan's Celebrated Old/ 1'ri- .,,1.'r 1-'t. I until Ire got into Senlii. There he ondrealdl 1'1'a,1 to/ie.rn diMthat that there is at lea-i\ It tine* up tlu- pntil'\ Fy tent and! v.it *;trek;, 12 fears Old ; Old .. UI i full! >' In the i found all the newspaper mm in jail I hat .'etc abkto cute; i i.: all it'siae-cicnci: -. givi::: one a' iunrou: aj-petite.; :Silk, V"lvet, Kmtucky's 1'erfec- rt \\ ,L of the rzar of for iHKtlcal: offenses. lie was In a imi that is catarrh. Hall's I'at.irr' It l I'ani-hesnauel and make: life "'.in "f Purity, and Lots of Other I[ worth li\ inv. u H.. '0' whieb pacu. w ill lint pl r- ; .t I '!I4'wlol.' 11 hi.p- I quandary| so he cabled to Mr. I.aw.--on: ; Tun is the! only poi-itnf cure nut', to i Mountain Mint Tonic has mule II' mention. i its -rrM U a elo s* \t; papr men all in jail. Press I 1"II<\vn to the medical fratt rnity. : so I (' mall}' Pen-U'olian-well! :un! -trotig: Tm t. .I''f't :andIlitSelieted'tnckI \ ; ''.w'1 dianwinl.i.Irltr en.>r very strict"lLwsnn :"atat'll.I'ill a c 1II1titlllitlllal dfMr , I < hat it hu bec'inic a hou-eliold ne- ,'I! IJottleVhiky; and Wim ? ,. - promptly n-quires a om-titutiojial treat cabled bark ( > : Is a U'lie*or ioi c.-il\ for I".e.Trn . 'iicut. Hull's Catarrh fun'Itakn. I'jniily I I Male: censor .correspondent"And : I With : " I >t IIbOt'1i. U"H l"Ui- press; Mountain Mint in the hou-e \. guar sews waikin: i\< \.Ie .It-Inland I'rinVr. b'ootinml internally: \ ,inucdc.sirfaVe acting-ditectly upon'i of thsystri tin! <[ illnt'-i, rare. Jliu IkM h Ulii Z Lldm ctLiCil') . It hover fail:. It I i-; Nature' 'lreelaofJwrliacar-I : . tI..trc.\'iwth. fomi' . I n:I Ida left ttaud. j jn I .: ITItIlSC; Hl'MOIaI'iuq'e. dati!"i' (it.thereby the ili. and Diving; tin ablest u<-i-tliut.rnd and well.it does its W'trkthrrnuz'.Iy A CASE .."AI'J-iiKe. \e Hf.-r.. ni for Free the I.I Knnioup I ,"i-ry 10 I'uh't I st ly Part:0111't.-i. Ht' inhabitant: !LI paticrr: strength by building! ::: up th. un-l'ity. Try it itch be c-ni.virc'-il. -A I I.. hs: there were Cured hy II. IV K.-Iiottle ("unntItUIionat&t.n; i'tillr. nature ii I !' 'i Uul H .1 I--i: nil*' Ii:'. II For en ilt/ > tat HlId'th: IIro. : 0' u.d in 1W tint 10'lIIH'falh.m. ;'.- I I Fret In Sufferers. doing! its work., Th. proprietormue 1'ESMAFOL.t: F'i.A.ibIEiN ;J co much faith in rt< curative i >'' March, Does your skin! Itch and Hum? powers, that they o tie-rOue HundredDoll.iri f''" ". ; fur any ca-e that it fails to . 'I.fd'r rIser m'L you feel a-jiained to l-p s->en in coinji.uiy cure. :Send for 1 li-tof tiMimonial.-I NEW t 't clotlM" and 11h't. I ? Dusfilx an.l Scales (wind tni Addre-s.. J. CIIEXW: <''o jjg ' i *\. 1m uithor.t; r.nat the Skin. Hair or Scalp? Have you Tol do. O. , '" tg I;.elr cl..:hcs Kezeina:' I'kinnrp and Crad'ed? SoM by DrursNts.T..c.Hall's EVERY[ DAY ..'i :sea the 1U1111f' Ua-h form fill the skii. Prickling Family Pills are the bt>t. 'ytAenie ; ; . Pain in the Skin? K-jilc? Fiiiipl;? Hone I'.iiu-? Swo'leii: JointKailinsr c STOFLY1h.. o-.A.T-o .' "i :,' eels feai'inof: Hair? All Hun Down Skin Pak-'.' Bean the *Ito K.H1: Von Haw Always Pac 2I"' .' '00IU/ : tle! f.irfit-r Old SoreIvitin: Sorts I'lcertr? t S " ..i'!' .i'l tnw the! (w.: try. AM the-e are yl1lpt"mlC Kizemaind tuzefl"" -#' HALL &KLEIN'S'Maffimoth I : Impurities and Pni-ons the v: >!' hilt III \1I1.I'!! < Itlood. To cure to stay cured take , tin- land ! :<) ll'y are Tor Time. Hy 15. II. L'. ( Hofinic Hlood n..lm'whkh .. makes: the hlor.d pure and Messrs.: 5. K. Ross & C.)., No. 11 X. Retail . rmncnt has .1111..1.I.d rich. I 1. 1 15.: I', will (,:1U'" the! sorest }'..lflJx street, have perfected arrangements Grocery , < ;.H 11.11.hl'r i ii ; I i /heal itching of eczema to stop :: for the manufacture of ,_. e5ch1'h',- right:: forever, the kill to become cleiT the best window screen ever placed 502-504 SOUTH PALAFOX ST- I"IH- fir llitIMTUM, Iran the breath sweet. It. H 15. is upon this market. They claim for Beer. , :e 1 !"r tin- .-n\iTlti5 ju-t the remedy you have bt't'lIlook. it the following desirable features: TeleI:>bono 330. Ins; for. Thoroughly tested for ;;0 It can be removed and stored \'"arOur reader are advised to away at the end of the fly season '' .. 'y slue Metropolitanlinv try 15. II. 15. For sale by druggists without the u;;e of tools ; the blind THE BEST BEER SOLD IN *'Patrons, New and Old. are Cordially Invited to Vtit and Inspect! .:' i has 2,4 mill1 at'l their J turner se Htock.UtAND . pr large bottles LIt y.-.ir mrrlfd on them ment.)) f.;. Complete directions with handled from the in-ide without interference 1-'. n.-ITS. or about half i each bottle. So sufferers may tet I or trouble from the screen ; ( EXCUIWION Dove brand ., '41 l on all of the stentn i it. Address BLOOD HALM'CO it is !simple in construction and the Dannheisser Bros., hams and ultod ta.h'l. I Atlanta, Ja. Describe your trouble price iso low as to be within the breakfast bacon Dulds & "i The \\Y.UTU KKrtri- and Free personal medical advice i reach of all. Call and examine it, AGENTS. Swift's butterine. Wil. given. and leave your order for any number Iiams' and Charbonnean's .1 is 1 m>u to lie vrectetlf > .> the Avenue de la from one to one hundred. A'so' Sold by M. Perry ui >Am, Yates. jellies and preserves at H. + Paris to the memory SVUF BATHING.For Add to the beauty of your i\ Mailer's 400 South Pala. t'.<. automobile. wish to take a trip to the Gnlf Beach, home by buying a few To Selma Saturday nhrht. Jane 16, Bubcribe ;. r..en! has been estabi the yacht Privateer la company of those handsome, neatly Our Specialty.: leaving Union depot at 10:30, on' cents per week.to THE NEWS only 10 i.. regular passenger train. Fare for Itrlll. o ; Kongo Free framed clures atMarston with the Dreamland will yacht City round trip: Pensacola to rielma, i It. .,an government It Prompt Delivery and Satisfaction CIUCIUSTR'S leave Palafox wharf every Sunday 9Finch's.- f2. O from Cantonment as'' Dr LNGlItM ., Kw :sanlons.! and It I __ Guaranteed. ; same NNYRQ at 7 and II a. m. and 3 p. m.; tare for Give yourorders to the Pensacola ; from Jlllton, r.O cents ex-! AL PILLS I i-irtant to the rub- IJ I tra. Purchase ticket at ticket office. urlai. ..A U.Ir ca./.s d! (! round trip 25 cents. You can stay drivers Dannheisser Bros. aArE. A .n .mu.M Wls.a , !Industries.In cr phone 213 for "Tickets Rood for o days to return (I S tor CHIt .u-"nwlo \GLiill> Wy .i { eninmorce andt all day or return at any time. anything in the grocery on any regular passenger train. I.' nhll. ._.l ...... -oDIc ...... _...1 t'na.i 111' -'.- has placed !i i CHAS. BARTON 401 South Palafox St., For further information apply to l70 II..(,.n_ ".T.h..tOt..,I .U_. ...... arbtaI .. '" t the1MI Itm-lm Master. line Prompt delivery. H. II..... ,. .... .. 1THE \ .' ,. I ROBT. KING I jr H "no.. .. ... .eo.- t t -nc .in It.\'. (.( wHors j I. ; Pens-cola. f ....11.11. luuup ._._ww..... y !' Try THE NEWS Want Column. foz atleet. Phone 213. Railroad Exchange, Phone 268. 1 MAFTIN PATTERSON, Milton. J Ia1M.....i all..1..nf...ti"L.II..r.. 1 .aaw.ti........c.t'.UL.A.o.....s.4. CLN .ar _.."' ;f. ..-- .x,.. u..,.,....,.. c ... ...., ':' _: '- ....., ,{ -.". ... -- .}. ;..' .-. "" : .. "'...,. >'.". . -- + '.... ._. "', ..J. _ -h-' -- "' a. r f't ..\"" .- ., ;' "'r"k':;C'-f."L:: < . I THE DAILY NEWS: PENSACOLA FLORIDA WEDNESDAY ; .8 JUNE 8, 19001 -- - A2ICIAL- hTATEMKM I MARITIME. TO CHECK INFLUX- Of --i, - Of the Board of Public Inalinccion 'urXunlh Ending April 71. b.19OO.PI. CR.. I i 1 I I i SAILED. FOREIGN LABORERS BIRGIII SlbE ! Br II Ivydena Bmallei. New Orleans March 8-To balance on 1 Hannah M Bell. Barnard. Antwerp band .... ___ 3 54:3: l ur urn M Klrrlemoor. Lasceile: LiverpoolIt I 1 March certificate t-To cub from_ ._record ...... 4 14 I bk t-roipero. Mlglori PalermoCLIAHID. : Immigration Question Is Dis March I -Co) cash ironif I Hoiueaud s.ringf I "o aco a .. 5,03110-1568: 41Clt. ', cussed by Workingmen. I o AT _ AMoelWIon I Am ich ecoti.Si1. 1>."((1. by Skinner Mfg 0 8" WAHK4ST PAID. Co for Matanzas, ,,iih 40-J t ft lumber I 1;!(U. Miss Hlella Lowrll.teacher's I valued lit 5.W .adcltiin for I I I Ii ul.ry. :!5 11 ul valued at I Lh''rpoo..I'I.Pt3' ft lawn e , i Bro, lii uraoceonwrbooi I I I9. KuowlM 11.187Span I building Vivira iidditlonal cargo for Llv-i! I >ok .77 and M H ,I erpool)0! .k, c a mod 49 uhdi leaf tobacco Suggest That Immigrants Be Landed F. E. BRAWNER'S. Cook, rp.nsebin - 1SS1. N.B. .upl slrtjMJ lb. spelter. lid slrl wood shutil' e SJl,4a. ..... _ binck1. I bit houiebold l"I'd3i6 pet at Southern Ports, Where Laborer IIli" , K K : XI' lIav..s.13.'U'1 ft oak lumber. 10. ' K VII teacher'Mary Are In Demand .) valued $ JOOOOOOoou.* lumber, IJ.mn a ft poplar lumber at IIUU'IO i :I>; Juo u brndiey.! up- pile school No M .. :2 5U | Hannah M Bell, additional c.roi i iBrs ally Taken Abroad by Aliens. I I - irss. > JS Cook sups .a i for Antwerpr0IghalPacottouii500 a itlumbervatuelat3'I 20 Dozen Ladies' Sleeveless Vest, 23 Dozen Men's French Neck Balbri o\-inch Solid and Whit . ar1___... .. .- jiw 00 NEW YoRK June Delegates ol l II.. 1231. A Millar. Janitor lor | S I! Li"I, Thread our price 25c each or -gan Undershirts cents each ; our price . . . school N_'J and II .. .. U aU I central labor bodies: who are appointedto $2.75 dozen. Drawers to match. . 12217. &Dd.rwn IVirr. In- ;, AT QC4EAMISE.: I 1 Yard-Wide Sea Island t . araac,. ..CBOoU >'c. 4, '! Port bit Laurenha. sty. Mauauo,Oporto to I I corridor the question of immigrationheld 12 Dozen Men's: Fancy silk Front : Dozen Men's Fancy or 'ololed at. . . . . . Ie. I1.:M.... 1 i <*> I B."r.lluo1ll'lKIy.t i'o a conference in this city last night.A Bosom Shirts, our price &)c. each : | Satin Front Undershirts at 25 centsi 1 Yard-Wide FitchMlle H, . IJSt, X C W''UII A ( u. in- It bit Micbele, il ), Nichols, Uenoa to I all sizes. each Drawers match. laranca oa tctioo I >o* 1 I Roa co Hroa letter was received from S. Dabois: i ; to f'd. nude by J."u?.f.d. \ and lib_ Mil; It thip Uullia R, l:."C, Rollove, Marseille who suggested as a solution of the question 20 Dozen Fancy and White Silk ''I 30 Dozen Men's French :Neck Kilbriffgan while it la.tsft . . . IJ;4I'. H M kite, printing I to KoeRftCO Br.. for tupt ofltm __ tU.t1. W ; Tort bk. Della Forme;osa. :M, Trlcdale. ., that all immigrants be landed in Pleated Bosom Shirt, our price $l.OO; or Fancy Undershirt nice ) Pieces Latest Calico at W X Forbet, all *ies.We quality at 45 cents each Drawers to J 4 Tarn to Haar, l>un"">>dy A CoI ; chain. .cbo>"l Not: _._ 20 I I Krbk Her Juteph. 57-*. Roller, Ht Kuzare southern ports at New Orleans and Mobile carry the lar/e) line of Men's I match. 1.e.ia Pahlbun's tiiiu; : . WarrantedJu . . . I:.u. ltkwa rVBUglllMiCo order !'! to instead of iu New York where and Boys'Colored Shirts in the City 10 Dozen Men's HeavyV'eight , prim IIIK M-bixji notice , 1 fietra.ft"' SlersizetlaNarseillesto: . anaBnaurulilatemeoi'.. 1! ;M' Kola co Bros there was a congestion of population. it the Lowest Prices. I Balbrljrpaa Undershirts at ooceat- : >t received- a full I lid! - ISM.: Wra Jouuwio .t *...n..upph..1 l It bk Gaetano Ca5sb<>%1s.I'f.'tl. Fit art, Genoa The fare to these port, he !said would 3*-inci! Spring Percale, our Drawers to match. and Shirt Wai ist? ; tur ;j.t ; , :.e. TJ QI I.r)J ach.i&h... ? 0., 7 :S 10 order 1 be $10 more than to New York and that price .. .. .. . .. .. .. Oc IK Dozen Ladies' Sl>evele; Vet- lowest.l'ar.tul. Ui4. A nD'Alrmbrrteset :i would deter poor for. iju. rs from com. 33-inch Very Sheer White Lawn, 'at old price 6 for 25 cents, or i'tcdozen !: and t'uihu: ;ll.i.: ,, - turned pall Uiet .. 2 WCO TIlE SUIPl'LVG. ing. Again said DuboiA, an influx oi our .! ; embroidered neck. #1.wand12:,. 1C unneryfurauptulnra.*>, C \ llioiiip.on. ta-. .. l I; i immigrants: would arouse the south tc 2 .inch Check Naiiis-ouk. our 1,: Dozen Ladies' Mines'and Ladies lirule-cei.t l'r. . 1C45. A I. W,bo. wcd for : VE8SXLS ts POST renewed activity.William I i: . ... . . 5c Children fcMeevelers: Vest. vdth latest shades at $\j; and s:.r: . cboolNofr 4 W4i tT ._ .. 'I H. Allen of district assembly i0inchVhite:: and t olored! Tare Neck 3 for 25c! or .Oc doz'ti. All th, latent t\'I"oI iu, 1 1. . Lt'achrr'a IS". Mr .Ian'\ II IbVma.. 't) Br Cb.UItIl.I: '. 4. Hill to taari, Danwody 49, said that the aliens: who came, hero Pique, our price . . . lOc 25 Dozen Ladie SleevleVet ., Children's tr.w': Hat- .u : - u.IIJ li IVIvr.on, _oodtur i 4 toI and worked awhile and then returned U SJ-inch. White Corded I>.'lue.oiur with !ilk Tape Neck 2 for :;c or also &o rolls :New Spri. : Mat . .rbiK>l,.Nu.. :; ..... ._- 1S I I I Br ("me DO. 2;) dozen. li!!... lo and 2t'c. per v' .r ' 122SO, J M *. ttatiouerylor wody Co I I I .up( office .. 4 OS Br Ulenmorven. ma, Potti. to Gall Traa- :!. '}() I hataotht'r11'birdsnssss I 12212 J M Hull. repairing :;It to bined with : I WBlrr clo.n. .cbo..l N .4t 400 Nor Hath 223-: >, UUIiesea. to Burs DUOwodv&ro took swelled the ago" amount to 1.2&S.p.ymrbtotnote T C w.t.tm for* bor-Co.. t'rRObet Harroa 1ng.12TJ. JefTerj. to Gall I, about $100,00 away),00() annually. He went Remembsr the Place 7C} (E. 105 S. Palafox Street ... money .. ..... 3,0138ii : Transit CoNor j on to say that as it %\ oald be impOMibln ::::: It Wn-k repairing lUuma, 1I.i.1. Martensen to B.tar. to secure direct legislation to restrict i Meter i>ipe*,.ctiool.No, 1 f Punwody d Co I :land 7u .... .. ..... ..0! It !an t.otardo. laN ParoJi. to order ;. immigration, he would suggest some in- YDURS BARGAINS FROM NOW DN l:?lu.C K Setterrepainng lr andtitld, 1LVI. Cawa, to UytrBrosNor direct way to secure this: cud; and ho ; FDR ; alzr..cb"JI 2 1 :.' leie'on. tilts, Chrnteisen, to Eaar!. ; tfT' red a resolution that the puveruinenJwithdraw 1211.. Jan Scott. jinltur. DJII\\'OCy.t Co !'Clio tl No I. lei 41l ) BA&ZI. gold from circulation and ! l1a. >il,. .1 A )'rll".. I substitute free silver and irredeemably teschrr'.alary .. 4.1: uo It ilberto. tC, Casarano. to Rnaato r.rol Thi he belie\ed F E paper currency. ERA wNER'SI lllt-I. \Yilii: ik hrnuhrtun I It Alfred", !tC>. Mainatdl: to U Terra repair* itchool No l ....... 10 (0 i I 'or K.lila sit, HaaKimoa, toV & Key- j would especially discourage Italians ! 1214.1. JrfferMm Jonas. janitor sera Co from coming here. I fur touool N'i>,. 2 and Ku, Cble:tats, i5. yesslinz.: chi for When asked whether he did not thiul: 74 M ;r) Eusport 121:,. Ml-. Maggie Ray sardurlpta,111SCybargci1! for Methll 1 that other nation would retaliate fur tvacuer'n Mary ... llJO) D'>eh : such radical changes! in the currency i ONE -PRIOE CASH HOUSE.SfEQIlL . 1 I&o. IJ .hnidjfll. teach Nor Kmn.lliM. I nud.tI, to order i system here, Mr. Allen thought that I er'. salary :)) 10 It Mome A. i.s. Kondonue. to order I KlXt.: A A Marlin teacuer'. Saed Maria Mariaretha, 711 Jotiaussen.: i americans did not credit whatever other --- -- J ...1.1')' ..... _.. So) COifi i to rengaculit Lu'n"HrCoi i 1 nations: did, and that the Astors and LbluJ A tsoblrr. itKCLci'iaJary .. to : feUsafOla, >'.:, SmuiiuneUl, Co Kosasoo I money I ( ftOTICES "_-- -- _.._.. I in Europe would come Kick and spendit - 1.'lIu.t: K I all. teacher..al- Eros i ..1"1 It Roebele: P. .'l. Ta..;o. eld for Genoa here. Delegate John F. Henry of the I I MKS. 8AIUH KKIRYK-Manufacturer A forlorn Material lard aIllole a 'nl>. denier In Hair Good. Hats Toilet 12111. Mr. Clara Sunday, (ier Rialto. lit!. M ullt'r. to order I Central Federation union \"hoVas in I -- Articles. Hair Oil etc.,35IV.. Government I' for MiuJinipiTj .. Itacbi-r'i glary 4ij I.' Nor t.ld"nll: ;1I1.' Ard-raen. to orderNor r 12117. Mr. J AbdolkaJt-r, I Hlurtb.i't. :*;.>. Wdlle. eld for Locdo | the chair, thought teat this plait was OpE CELT WOID.V 1 Street. j Steel \\liul >S J lIKIi'Ii>' l I' , tracbrr'.alar! 4') w < Nor Va uta. V.P.J, 'i Itlhtn. to orderBAKIKNT1XIS. visionary to laY the least. He would i I I J ferial t'.at' is i:>ul a< a.'. - J.'IOI, .Mix M I J Jordan : i he said make a compendium of all the I2UUCAT1ONA.L. tvachvr'i nalary .. 10 u) I I MimlpiiiNT. It iii cm-ill",!I .1! LI4'.Jno Atiibwn. tearher'aaalAry. Br Athena *\ Com! to Jno A )[trrlt' plans and suggestions which had been ) TO LEND. I : . I ASH FEMALE HCHOUL. NW. ' :: : .1".1 thread of 't. -.1.I \I' .. t'I0) A: Co I sent in, together with the conclusion oi MALE[ Cliaeand Ce\allo& street Jlr'!. I I I'Wl' K Ke.ioo leacb12I the to," lh' -'r like wixil. err '.'" > . ItfH.IOSItKi.I conference, and i-ubmit them to the '1IHAP' M05KV-On for college or buiineia. J. H. 1".10' / : Improved real l *sV pares .r' eutarr_ .. __........... 5u W Blanch. ?;7 U"'ln"Y.toorlt r Coutil1l'ntallabor bodies. _' tale run tw obtained In any amount dell, principal. Slrfbl term b.-glllIICI ft.KLOWEK4 111.1 filtTS of the f.ll.i i ir ;1 t'.iacb', !IIr."r. )talary. U .Krnton. ....., a-1 1)0ij ) I. Am lrtentennal.7S.David Baird McLtu ij, isli-r jhlen.,to to S Jno S L To A --- irons_ _Win. rtsber. __ ___ u Ja.f I : known as rMTl'lor l.'lui. Mr. ..11.. Tboinai, : Meriltt JiCo CAR WRECKED: BY DYNAMITE CUT FIA)1YEhI'UT the! stivl wet i- . ivtcbrr't .... oo ,1 OSEY TO LOAN OX 1'kKWVALproperty taiary -- - - -- - \:=*, V 11 lUusbnw. one I Am KI>H A Barlen.' 2;5J.. Pennon. to nuuI..rI i : M Apply to .-\.A. Fisher Fisher '- cab Horal I-e.ignsV liner the tiTii'ct: of it Iii I- .: '. . Orient .' 'IUIh'r'. lni.-rr.ion Qut 4n) ;I Br Prince,Frederick UM. K"h-rt.. M,to.!'cotl.order to order Two Men Are lightly Injured-Crowd Building, Palafox tr!!ee. JrtUIOASH ,' specs design* ordered for cuitomer ':!r...-r tl't: tIC mar- -' : -> Boil. It. mw.ari. tracilerialary I Am Berhdna.4.1R- J"rlIIf'oCUU.t (barged by I'D lire. i I Ml.s Vuilttte Moreno, t3 West Gregory; . p.\u< I i w.-i.l Ti.. c-te.1 .. .J! ,- " . ji UO i. 11N111t1l'lu"S'cll'ot' =- :t.\ AT LOWEST RATES OK 1 phone \ ;, liavi-s. cidf>r Man' n csAm l.'il. JIll.' AI.11I..011..., btrlia. 31, uttetiburg too.dir Sr. Lon, June 5.-A special car that .' CAV ALWAYS BE OBIAINEH 11:1 '!.:::{es ""uuinllJ e :1.' ;I'Tllt' I:trarlir'IJII. Vi M J munry r.tI.I..ch.r.'. fl uu | carried Company H of the posse oornitatns ItY PARTIES BY CALLINd HtVIMtUOOU8ECUKITIE8 OX WILLIAM I ...lIn'.I.nl... :;' are IllUl'tllia; I::,.- I' salary ;M ()) Ill'. CLtARKU: AND 8AILKD FOR PICiN I| : from the barracks on Washington KlSHER, 2Wi: SOUTH 1'ALAfOXI ton liiltii ;. hut Miinll-r , l.'I 1a. Mu. iillian Ka> 1 MACOL.A. I !lImBr.: /LOWKRS FOR FUNERAL tumiihidI 1 tracbcr't >ni,iry to u) : avenue started over the Chateau avenue I I promptly hnaquetanrapecisldesigns I steel V.ooL loo-w-ljr (1:1| :, , 1K.V J uo L V. ataul tracQ- araaraarPA line. I I I Mis Vl.ilelte Moreno, 3il West Ureioryphono I r.dled iu paper and ..,...:. ' t>r'. ...1." Si W lAreo. Hr. I'.T, Mcbola! sU fable Cay 11. YOU WANT TO BORKOW MO> EY SIMlnit I.'li*. Mr I. aibUiloii, Maya I The car was! wrecked; by the explosion J Invest money, insure your property pro- .til. a patl.ug' |'iL.ii's, l.;. II.. , t 'aetlr.1M.tar)' 40 1M) i Aldersit: Br, lis:, yic'aoU-n, ar at Rot- of dynamite cartridges placed on the cureabitnu'tfof titlM. buy or i..ll real vitare. two or three tunics la dii.Madi1 .. Iu..C1. Patrcblidlearb- i terduin Aptli It i rent property of any description, have track at Fifteenth and . tr' ...Dry .. :31 ;j) !IAtrttr4. U". :lid, Brackenbur'Z: ar Table street Washington I ante collected or your lato. attend to, BURTON CRUSHED TO DEATH r 1:1 mrioi!* ileirre:: , P M rnitlirtl. teacher I Bay Mcli !* avenue and at Twenty-second ; rnll on or address 'Clluc. C. Walton Co. I I . 121JV. II"'' l.I.' | w..1 Is! Ilia tl> IU salary .. 4J ,.) I, HernlcwRr.21.lianlbur; .\..rU li< and Chateau avenue The explosion I I." Reel F.etateand Insurance iigenti. Pensacoia. 1'ouuMan )lest. Krlglitf-.it l> atlmt '' I:I"'. Mrrt II ,'..1110.,. lor City of tiliiuce-i-f, Mr, U7J, Mrlburn ar- lifted the car 3 feet in the air and threw ; Klit. (t'harge m"dt ral... fo everyonei ">'s. the, liner ni>oJ. for JM . rivd Bremen M i who buys A lot from uc we Mill lend moneywith llto.bu r,. I' . Janitor toliiHit NIJ17. :7. 2'/) 'v 4Lxeriiutium i! I aild hlrtal. ail'l the rust. . the occupants to the floor. Fifty-four wliich to build u bou*". *l-lf I Mr* B II ..I'III fur tr, I''H Neeiove" London _ i BllIIIGIIAlh1. June 5. JIH Ikir- Jlnltur.rhud No.:7 .. .. 201 I May.1 ,, tlll'UVl'rt: on the car. Two of them F.Fleischman I hil:.; tl'.nui p.iiiit: and i ,; i.Iit'it . 12184. .Mi<. 1.. Wilimuu, Ru-ksro"pan, 1571, L rrina !'. too met a horrible death at Blosoburu! i used iiu !.|,,,'i:11 I'.11'- I2i5 t''chrr'. w TMaiunaa.lracu-. ."1.1. :)) CO .'811..April of Invenanid. Br. Iit: :. Hull March is were slightly injured. .\ crowd lIth.I wh..rp11 wurkinv at tho l'UkIWI'U i while, f..r "\aml' I'. II!] 11..' I Mi'! ? t>r'. .. .', .... :; INIIINL F'rancl-ca.i"pau. !;,.- ArnDi arrived HavniiH erod which was charged by the police .".OH RtSTI.II"l1e.w: Brick W..reboii plaut of the Slos Sh-ffieM Steel andIron l I oCt ijoor a man HI '::1,1! n*.. -:t' .', MAY H : .e on Railroad SUI'''!. Apply to Son ..111" and in few inmates i; Ilppu. a was diuIerscd t.-.tb..''. ...1.r. :i) ot I H udd..r. lt'ld. Kr. 18il!, Roblavon tireai Yar Tlioi. Hmin.-ih. jlMid-tf cuoiiany. Burton \v.w in charge with u Mock "-..-t'tt It. f.-. t.ilHH . 1II""lhln\.1 (I, ..el' .,,! n'' 1212&: Mill U W..Olworlh.I"acb..r' Iu wlllol.llh"! rt w. ..r.r". .. :1, oo 1 kmoor.Ir.. _. at **outs Mth'ds.4prli I; AniendedUeniundeTurned Ilu+v'n... t1011d TI) RE\T nn iWr'1 IClt-lIll..ncl. of u statiuimry l'lI-'lI! uvd 1:1 drawing .... .. ' i tealmourt nr. J213. \ leeuzbnr.Br.'re.Rubli.JUat IA an'2w "Ltrries" fur theroal th.' coke Into tie! cre\ 4 ;1..1 l .I'> I-, MIim." Cody, : 1I118s.Ii..0.pral ST. irn"t.polv to 1' \hlo' ") : moving to Lnns June ;;.-W. J. Stone, attorney , / .,. ,. Kulterdaui irr. ubii- < : \ I. tat'Ier.a.a.j 5 oOU ovens. The enjriin failed t<> pull and to ;: '; 1"I. U..311'0 K la lbi>uu*. April li for the strikers has presented! : )1: In\lT-flll' h'iu-e at depot . fill-. / without bhnttin;: off his steam Burton :tv dun! with .-t"1,1 f.n i if I tracb.l'.I.ry iji I well uifcl for hoarding hmi-e. Ii ' Ill I:". C Mt'a'.rt. Ira..bier's F.urcdireReln'r.ntaansai April I I the amended demand of tie! men to tht!! ,| \ppl.rooms. at Ice Factory, W. to. uurrtfld. began an ill\'f' ti atirJJ. He rlI1liu ly and quickly| thai w.fl '-ii-i: ; alary .. .. .. II iU I..vb LluEhe, Hus 120;", sid Table Bay April I officials 12127.: I ..I...., t"b..r'* :!a I and it threw him iuto the whtrli.which I . .alary .. 31 ;50 BABKg.: | delftVniker promptly tnrm d them ;I 1.' :I.y KI'KSISHKII It.I".u.nI cog <*Kul.ir aid small snrfif ' I crushed him iu horriblemamter. j > down. I slowly a I2l! i. )t r1'1 U Cviliitr.txacfin't \merlka.Xnr.TM. std Hamburg May 1 North S h.1I1'pIIU". -'ni-tf I carved work.Pestdr.t . .alarl! 17 >) Ada. Seed. All. at Table, Bay Feb U I I One I.WIiS/ crushed off and I steel Wfnl tl I - the ' ' ljai. Mr OoIlUM, H..nranJ.o'.Mt.. lId Leer March 10 Appeal to the (io\prnor. )11 RKVT-Vew" room ('nil".*. one the ofhtr horribly mangled, while the . 12:7.furultt'r.ehuul Mr. a tt I'oilius>'J ;i._, : ooMI !. Culutnbalt,5.4HevreApril 21 v Sr. Lon,. June 3.-A ronimittee of ;:-J\J 1 II til,ic k from cur hnftcmt Malaen flesh on hiii body and limbs was fear-1 I 'it.ir---er rn\lI'rlnll'C rl'.ean.." I > 1I0"r..1\o0r. 7W kid hbarpnesa May ,, +q'arr. New citynolv la Lawrence laor.rated. od hiiI 1 sh.itlu, wlil'-h i- Inl| rout ' rant for .rlOt.1 rO"1110.. Kritreo. It. aid Tunis Dec : prominent business mm of this city have :, Hnwe.nparahnu.'h'nbhn. tmtx'lrR fully . Tl ... 01 in tnhing olT old ' p. ilulm 1C, It, 1171. lid Marseille March IN !I -- uses its 32.E.:: MU. M K Bii' ftt.Uaflivr' just sent a communication to Governor !Ii . Kente.jern.Nor.; old ljlucUadt Mardi i RENT-Thrrrfurnt.bed room *uitl Donner Mansion Horned.NEW varnish! and Iu llllishlnl! wmi-l f kali.rr :r.I1.' i I'nzla.ltalG73, .HambifK April ?4 Stephens! a!ie for light honekeepmg2West; I I : 12271: Ml..I U>aia. II! tell- Marcella, It,sld Hamburg NOT t !I 1, Belmont street matt I YORK June 5.-The large manson painting! and it U used ou 11.\11111. ..,'. .. ary12JJI. :"1 25 militia to re->torj order in :St.: Louis. I : Ml*< Ml.im lippiu of .\. J. Donner of the American Sn-1 I leys aud on floors for vniuotli.iKcleaning > leaeher'aa&a/y ... 17254J A car-lend of couking-stovpi and FOR AI.l';, !' them. CARRIED TO SCENE OF CRIME Refining company, :3 miles from gar . 111. :Mi* ..n. taiuprj', up-to-date ruegas, at 0, M. Pryor's I I II --- Sandpaper rloin In use steel: , --- ttackvr'i balary. u) 'I----- Newark X. J.. was bnruel this mornI ! li.1! :. .. .It A :M Hollilau, Bargain; Furniture House. I I Askew lrotpU UU Innovenee Hud II' I.'OKH\LE-T' miloh irowj. very I with all its contents. LI"-i about breaks: doss n. Th wool I III root ' M: ,.) P eentlennd in loiKl condition: .ln one fog, (II Irabrr'a.ahary ! | the fnd'r Returned to .lull. used with glut Pli to keep of ) James Wlldnm."ho I Mss 4 t uatau. flne b"ifr thaI will mtlvomnul the 12th ;73o'i. "s. w M Mrt. t1I1f.llI"'b. Apolyto It. M. Roche. corner Keus and ;I I.' burned before ho eonld I 111'I rea- Sun. .r'. .a..r 1 .. ..... :1:; u) i M.IHT of III Plctnmqne Pealnre elIbr IIalldsd ur), Mm, took the negro Askew j Chase. I 1 I I ' Hj .I.uC'l :571 Oil Pail Are Gone. from the Mississippi City jail late last: : cued. A :lia Dlttrwrmrr.Kecdrtrk . -217 i1. ;: 11--0:1.1-; ill Cbo: ino louder tie beautiful night awl carried him iu a wagon to the I, \\T\ > A O C the IT (book HcivKri.rr II"ft ace; 10 cents ilver n-ad Daly Referred. I C1\ lio for two moot! I' ;';; "=-= =--.-=- New Kla.i been Iilud'lug'rI'Dcll831.. > " , pruiaid. O. Box 1.11. Smyrna I MarrhM balance i 17101 river It o-jcrf was. It tlowivl ia mnjM-: home of WinWrstcin near Biloxi where i i aimut: Hew!'on-Yoiins: Mr. Dudley wag in 1 can write a good letter in Ki- ' U tic l'un."tIllt sweejH tlironsli: a limitless 1 the Wintersteia child was outraged and -. I today to ask for our daujhter's; hand In rrrtify tbtt lllI .1..1\,01 IIlI..mllnt cmrrcl.ai i . ). .Qi>...u by tin% inlaulv aDd trcasreport. : lIlI'iI.11'h: glory of that riverin '. murdered. CJe>irge Winterstem, the 1.'I't HVLK-T..n fond mile1 cos. house marriage. !lOW.SuttonU'm u.r'. >. H. Cn'K.Cou'ity the: harbarlc spl"tulur of an autumn father, was called out and all went tu I I" furnishing C>"<1*. *'1' "" II -eount of Mrs. I1ew !on-What did you say? Is that so? W- II to \1 r-.I.I i Bromberi, Superlntrndebt.Saar leaving city. Apply be able to write a good let'-- ls where the crime may day was: heyonJ d.'e Tiptioa. Hoh..1 the woo was com I Weil IntenileiioU .rt+"t. I'.4 chance i Hewson-I told him you were In 1,0 French but I don't believe <", mitted. SSmSw y from the Alle,Lauies to the llississippl: dairy niun. I charge of the flnnnees of the family.Thiladelphia .- , tfatbloc n.,. Th re the n"vgw; was put through an ----- --- write a letter In good French.-< -' n | In her jjorgi'ovs: fabric of maple anti :North American. I with the 1 "Olt :4.-\I.E-A nitf..--'*-.l .rot.r.-hou-.ror In fonie anks there U: a regular ordeal intention of forcing a L Transcript i!i; sycaraore. which evcry\vlien. drooiicilliu confession.He I! P sltteen! dollar*-.iiie !uas>1. Tho I 'uladl1 every month usually at the Hmif 11'tuolu"bpQ a clerk be d to the stately "..,..I. shimnering. was fruug; np by a rope and later McMillan. In K.'"HmM. County Circuit ourt. Fist Hannah jnim ale <<,eni4 f"r iWees' i- may seenbent htndiug: In her cour.e w":tit caasldi'rnte: fire seems tll have tn't'n used, for the re- 11WIt 1\ \ .K-lh.. User r.d"II'-" OH East Jul dab lilttnot. State of florid It-1>111 Cniizh Cure, Diarrhn-I.- . iitrr a tub no.l rubbing real money for Divorce.Robert ' and majestic dignity A trip on orn of port is that ".\ k'w is badly burned." iadsi en utreel. Apply; to K. K L. PAY and'I'l'h HH7.,1.1: \ <-. I awl down washboard. The., 4alfi.'OK )1. Wallace . up .1 Danlell.arot. guarantee all three of the pr' ; the Iirishtly! paiate.1! steam'.MxUs' was The negro continued however, to protest v-. duly jrro.ulmrki that have bwn saved : Wal'e' thins! and will cheerfully ri-f UM! ' Hn Meta hi innorence. returned . the milt of a lifetime. There was abut was to SALE-Tb<- mn-t rte.irabllot In . up for a mouth are soaped and nib- ; tl'b"r I .l Me'ii \\'a'lace.- Pad i money to any on* who, u-" ' 1 the jail at 5 o'clock. Mayor Sash has : I '11. cry on e" r terms by the The rt'l'n "i't. > i'i 1>ffi JBM: like Imndkcrchlffs and socks: : a ,!:;;nity In the .sttMnihwM. They diil telegraphed to all points for suspects tc Real tIt.ttgency.; 3 f1', south Painfoxdirect. t.. Hpp.itr Ti' thin bill fli..ft n/'nn't 1--r !I-r. ; without tjeiiij; -neltfd. "1'I... , . nut pact and, rani, liho! a LNxrtv.! l aim i iIn. <.nerdaItieilterulhdvu..1. ; ':r.A. (" Hit* each.See . and art ruu throuEh a wriuifT before be .,.. )'I.Ihlorder. nor w.'rl' they >;ii'tit !ii:!;.' a:a ocesn: hl'1d.'I .1 bt-luj |l'ltJut to dry. The paper currency h-ollht of Him. tohepuhnbell4 run lit IVN ti'aiuer. 'i h.' loll::. 1:1:1' steam cylinders I'Oi lTISSTJ.U.: : w< a n "paper pulili-b in aid Iranihl .*- those wind we fI" < limy lie handled soinovvhntrouclily. that and .. .. ,, .' . Papa-Are ab " you sure you I ----- --- ---- -- < "untv. nnc me i r 4(4! with delllM-ratio aa-I a std I t Jllnrfitnn. I>'n loss ft ' nil It d' ca not tear bei'ausetberr mamma thought of me while you were : 'NIIiKE'rl'Elt: and ..t"'InnaDh..r 0". c..II-"cllli"" .k.. i 'i I t:0'11! pervailinz: MHW!. hl"\v hue ) .. 1.1. A. M. MrMiM.\". I ferr-d. l h. In it a great deal of silk sal away 1Grllcel'r8. ) 'rp ltion. lumht-r arm. pr Clerk L'lreL.i court.I'.y . tloi'.ils of steam iiilo the ar. Tln river! Exnnene'1. Refer.-ntesgn rn. h. T.J. Iint'tI.Ch'r the nutM have been We heard a man kickIng Po. H. KI-PTOV, stenniers ""I'.! the! :\rIt.: (':\I'h of the! J 't\ !""nuiTn. rk. Thos. j'aM-d through: the wringer; th 'y are viorM. Iwrw..t tcin! carried up a great row about his breakfastat --- -- J..r..I.| ., Florda.April 17'f-. : Pebley, 1:1"1" hung ..11 a line stteteheij !u the bankilrrkit' the hotel and mamma said -That's wA rI'1'n. "'JIt.-oII' .i-imitaient. S.iM: 011I' elrritthe : its ,'iw.t'nwnt, pr ife-sslonal KiinMiT Just like .. ....-----------.-------- ---- er.i of \\lion had "huwil' 1:1 his papa ATTORNEY-AT-LAW i a \TKI:/> \ :DI vu \! H'I s-: Inf''T- >tb r ;1) 1 wash aUr.t 10. notes ) : I InesmbiA: Courts Circuit rour'. Inr -\pry ini'tith. and when I'm done you I limit !";:. Tin-si1 men. tUI"II.t traveled That Trobliinc Headache 1 1-(c'" 'tre..t. 'I r.. l:. t.. I'-I.,," tl.e round. Mwcvn l'itt ,-nn fcanllr! tell tLeni [runt' sew nu-ney. year Would quickly leave you. if you L' liT \11"" Hi I'lSi-e slenofiraphT tr H 1 I .\Iatte Tiilotson: ' and Ne'v t'rlesus. tlei-ciiv! 'REAL The \ia>!ilnc stronr'n: a* will as Il' in'narrdill used Dr. KinsNew Life fill. V'104betty. AIIJre,5URCe.cerCDCIL1' vV .. ESTATE ACENT. payli's: ; a pen-entaui1 to the cap- N W". :)si-tt \ A.Tlllotson. ' deacs t.e ntes.-l'hi.itMnha; liveorJ. Thousands of uilerrs Imve proved . !t.n-I'! 1'.1 i Olh> r A fain! *. their natcheme! it furick aadNervous AST.n--lll k.Ddi Of empty quart i Pens July :. A. n. iKir lit- def-. iii.I .-. w. :..c t I sod,! ien..u t . .-. y Tl.e Ohio I U a null river yet. tjo-i! Hea'',icli..*. They make 11 whisky bottl-.. H.novfctf A. FBIEJXAlC. I hut T.I"I-lIn.l! tt>rd .....iti"t rr'iulrnl bun h PAI'er' \\ her In. winding trOll fi>n*>t deudi Liils. jiure Ij'.oixi mid -iroas nervand 1 hiird>-r I' !... pu'ili-'iml. rCa<-'' I hu.." 1'i.li'li.B! 1"1' fur -a.. i tarry v\het na a iv.lhnau car !Is The orchards anti cornfields: are at- build ui jour rilth.. Ea"(1 take. ASTY.D-OIO beer battlesatl'ranite.'. ?"k fur four r<'ii," ;iiT'x-i: W.--- :n '| i ElA'i.v awl iujiie liouI : Try thi ti;. Only 2.i: cent*. Money \ terBroi.A lyttf I Newa neaspeper puuli-hMd in. mad < t pap-r. You ,1.III.lt M-"' the pa- tracthc.: It uri'inl.'itl ouci' to bemnip said K'Camblacouijty. ' cu\fu-il \\"ill1lrull andstcrl. hick it nutur">rd!. Sold! by ,AV. a. --- A. M V< M.tl. N !Money: to Loen rn i Icp-w.: - I IH'r I'lciiiM- I I.s the Khlnc in Ain-janK but tilt'! rtl"'s ' D'-\Iemb..rt. truglut 51'ia)1)11l'.I1'I'I:. 4' 1'k 0 The Uhly of the w heel is a Mock were sniitU'n; with a ru"t11l<'h <!..- -, -. -- !;.BU) Nf'rn Estate e'ur1ty! of paper aSint four Inches thlrk.ro *lri>y)> Try THS NEWS Want Column : it > lirimK u. I.Jrkaro <'.n) at ji Ea-' 'rs ji a a) .\ :ml this !I" a rim of ste'l mcasur- abandoned. It will never 1-e will pay vou. lir..'. lvireetandse them I.m.t( ilIa'" 00; 1-Stars, Gtir Ca'inLa fro '. In; from two Itu-Vs to three Inchv drowned with feudal castles in ruins, It !s this steel rh l. of Course, whUhtiinis but the groves will be replanted and in wiiart w itli the mils. The another century end will see it once rd's: etc t-wvereJ with circular iron more the "iM-autlful rl\'cr.-Chicago 1'Lue. 1...Jti'd t>u.You Interlcr. Hairl can- .we- *none if by oM nrs'o EabaOatlre.An : !'!'\11dlt'r Jivi.led. his sermon Creole Will Restore those Gray ; seeing Marion j' Finch before int. tvii I'ltu'ir't., all tie thing 1 iu ii" te\t: and. second ell do things a sin buying furniture or i de text; and.- r>drcn. wp'wrastJ t'I Perfect and Restorer. Price $1.00. house furnishing goods. I wide seB'Jl part fust."-Harlem. Life. La Creole" Hair Restorer is a Dressing "" . \ N. .' .i , t 1t" ''' ................ ... >:' -.aje. .. . v. & i"' T 9< n'W Contact Us | Permissions | Preferences | Technical Aspects | Statistics | Internal | Privacy Policy © 2004 - 2011 University of Florida George A. Smathers Libraries.All rights reserved. Acceptable Use, Copyright, and Disclaimer Statement Powered by SobekCM | http://ufdc.ufl.edu/UF00075893/00041 | CC-MAIN-2014-15 | refinedweb | 30,214 | 79.36 |
modifier
#base #full #xmlns
#base,
#full, or
#xmlns are used to modify the interpretation of element
names in element rule headers, and when inquiring about the element context.
These namespace modifiers are intended for use in programs that process XML documents that use XML namespaces.
Such documents use qualified element names: ordinary XML names with an optional namespace prefix. The prefix is
separated from the remainder of the name with a colon. For instance, in:
<author:name xmlns: Herman Melville </author:name>the element name
author:nameis a qualified name.
authoris the namespace prefix and
nameis the local (or base) part of the element name. An element name like
namehas a base part of
name, and no prefix.
A complete description of XML namespaces is published by the W3C.
The
#base,
#xmlns, and
#full namespace modifiers control whether the
entire element name from the input document must match, or whether only the base part of the element name will
be considered.
If none of these namespace modifiers is given, the default is that specified by the
markup-identification declaration. If there is no
markup-identification declaration,
then the default is
#full.
Element names in
element rule headers may be prefixed with either
#base or
#full.
#xmlns is not permitted in this context.
When the element name is prefixed by
#full, the rule will only fire when the element name in
the start tag matches in its entirety.
For example, the rule
element #full "name" output "%c"will fire when the start tag is
<name>, but not when the start tag is
<author:name>.
When the element name is prefixed by
#base, the rule will fire whenever the base part of the
element name in the start tag matches. For instance, the rule
element #base "name" output "%c"will fire when the start tag is
<name>as well as when the start tag is
<author:name>. It ignores any namespace prefix when determining whether the rule matches.
#full,
#base, or
#xmlns may precede an element name when testing an
element's identity.
For example,
when element is #full "name" will succeed if the name of the current element in the
input document is
name, but not if the current element is
author:name.
when element #base "name" will succeed if the name of the current element in the input document
is
name, or if the base part of the name of the current element is
name (such as
author:name).
For some tests,
#xmlns may be used to modify the element name.
#xmlns is a more
restricted form of
#base. For example,
when parent is #xmlns "author" succeeds when
the base part of the element name of the parent element is
author and when the parent element is
in the same local namespace as the current element. An element is in the same local namespace as the current
element if all open elements between the current element and the element being tested have the same namespace
name as the current element.
For instance,
<x:a xmlns: <y:b> <x:c> <z:d> <z:e> </z:e> </z:d> </x:c> </y:b> </x:a>if
z:eis the current element, then
x:cand
z:dare in its local namespace, because they both have the same local namespace (
bar.org). It does not matter that they use different prefixes.
y:bis in a different namespace (
foo.org).
x:ais in the same namespace, but it is not local any more because
y:bchanged the namespace.
In the example above, the following are
true:
open element is #xmlns "e"
open element is #xmlns "d"
open element is #xmlns "c"
false:
open element is #xmlns "b"
open element is #xmlns "a"
#full,
#base, or
#xmlns may also be used when identifying an element
whose properties are being referenced. For example, you can retrieve the name of an ancestor element whose
base part is
a with
output name of open element #base "a"
The
#xmlns namespace modifier cannot be used in:
elementrules,
element istests,
previous istests,
last content istests, and
last subelement istests. | http://developers.omnimark.com/docs/html/keyword/1684.htm | CC-MAIN-2018-05 | refinedweb | 678 | 58.82 |
When working with unit tests there are many objects that cannot be unit tested. A prime example is the Request and Response objects. They both contains a lot of HTTP data that can only be accessed when running a web application.
You can implement what is known as mocking, using a 3rd party framework such as Moq you can configure these objects with very specific data such as the URL, Cookie and Session data.
A very effective and simple way to overcome this issue is to detect in code when its being accessed by a unit test and update the logic as necessary. See the example below which handles a http session UserID object.
public class GlobalHelperMethods { /// <summary> /// Detects if the current code is being executed from a unit test. /// </summary> /// <returns></returns> public static bool Detect_IsUnitTestRunningLogic() { string testAssemblyName = "Microsoft.VisualStudio.QualityTools.UnitTestFramework"; return AppDomain.CurrentDomain.GetAssemblies() .Any(a => a.FullName.StartsWith(testAssemblyName)); } }
This can be use like so...
int UserID = 0; // get the userID from the Session if (!GlobalHelperMethods.Detect_IsUnitTestRunningLogic()) { UserID = _UnitTestUserIDVal; } else { // Get the UserID from the Session if (Session["UserID"] != null) { UserID = Convert.ToInt32(Session["UserID"]); } } // continue logic...
Hacky? Yes but very simple and effective. | https://www.intermittentbug.com/article/articlepage/detect-when-a-unit-test-is-running/2038 | CC-MAIN-2019-13 | refinedweb | 198 | 50.63 |
I can’t help repeating myself: JUnit Rules are among the best, maybe the best, feature of JUnit. I even gave a talk at Devoxx about Junit Rules.
The great thing about Rules compared to other options to solve similar problems like TestRunners or common super classes is that you can combine multiple Rules. One favorite example why you want to do this are Parameterized Tests they are nice, but what if you want to parameterize Tests build on the base of the Spring JUnit Test Runner. It doesn’t work, because you can have only one Test Runner.
The problem with this example is: There aren’t replacements (as far as I know) for the two runners with Rules. The Spring Runner should be replaceable in principle, but it seems to be not as easy as one might think.
But when I was preparing my Devoxx talk it occurred to me that you can actually do Parameterized Tests using Rules! And I think the usage is actually more intuitive then Parameterized tests with its custom annotations and stuff.
It looks like this:
public class SimpleExampleTest { @Rule public Generator<String> params = new ListGenerator(asList("alpha", "beta", "gamma")); @Test public void testSomething() throws Exception { assertTrue(params.value().length() >= 4); } }
You just specify a ListGenerator rule, with all the values you want to run your tests with. Each test in the class gets executed once for each parameter value provided, and it can access the parameter value using the value() method of the rule. I think with the current feature set available for Java and JUnit it doesn’t get much easier to read and write.
The rule itself uses an ErrorCollector to gather test failures so if tests fail you’ll see all the failures not just the last one or something.
The code for Parameterized JUnit Tests with Rules is available at GitHub. Just keep in mind, it is an experiment and demonstration of concept I hacked together at Devoxx.
{{ parent.title || parent.header.title}}
{{ parent.tldr }}
{{ parent.linkDescription }}{{ parent.urlSource.name }} | https://dzone.com/articles/writing-parameterized-tests | CC-MAIN-2017-13 | refinedweb | 342 | 59.33 |
currency and other utilities
Project description
denarius
currency and other utilities
If you don’t find a way to make money while you sleep, you will work until you die. – Warren Buffett
introduction
denarius is a project, not a finished product. It features various utilities for collating cryptocurrency, mining, financial and other data, for plotting data and for accessing bank accounts. It features analyses of data for systematic descriptions, for predictions, for arbitrage etc.
setup
sudo apt-get install sqlite wget tar -xvzf geckodriver-v0.19.1-linux64.tar.gz rm geckodriver-v0.19.1-linux64.tar.gz chmod +x geckodriver sudo cp geckodriver /usr/local/bin/ sudo pip install denarius
Bitcoin values
The function ticker_Bitcoin returns data of the following form:
{'volume': 2050.1665002833397, 'last': 992.2553834529656, 'timestamp': 1487551580.0, 'bid': 991.8303740083114, 'vwap': 993.3415187004156, 'high': 1002.9278428409522, 'low': 981.3656970154892, 'ask': 992.2553834529656, 'open': 993.3887419720438}
It accesses data from Bitstamp.
The function data_historical_Bitcoin returns by default data of the following form:
{'bpi': {'2017-02-17': 992.1077, '2017-02-16': 969.2414, '2017-02-15': 952.6512, '2017-02-14': 954.1432, '2017-02-13': 940.7982, '2017-02-12': 940.1764, '2017-02-11': 949.3397, '2017-02-10': 933.4325, '2017-02-19': 991.254, '2017-02-18': 997.0854}, 'time': {'updated': 'Feb 20, 2017 00:20:08 UTC', 'updatedISO': '2017-02-20T00:20:08+00:00'}, 'disclaimer': 'This data was produced from the CoinDesk Bitcoin Price Index. BPI value data returned as EUR.'}
With the option return_list, it returns data of the following form:
[['2017-02-10', 933.4325], ['2017-02-11', 949.3397], ['2017-02-12', 940.1764], ['2017-02-13', 940.7982], ['2017-02-14', 954.1432], ['2017-02-15', 952.6512], ['2017-02-16', 969.2414], ['2017-02-17', 992.1077], ['2017-02-18', 997.0854], ['2017-02-19', 991.254]]
With the option return_UNIX_times, it returns data of the following form:
[[1486684800, 933.4325], [1486771200, 949.3397], [1486857600, 940.1764], [1486944000, 940.7982], [1487030400, 954.1432], [1487116800, 952.6512], [1487203200, 969.2414], [1487289600, 992.1077], [1487376000, 997.0854], [1487462400, 991.254]]
LocalBitcoins
LocalBitcoins data is available via its API. For example, the following URL gives data on current trades in GBP available by national bank transfer:
The data returned by the API is of a form like this.
The function values_Bitcoin_LocalBitcoin returns the price values returned by calling the API in this way.
import denarius denarius.values_Bitcoin_LocalBitcoin()
The script loop_save_LocalBitcoins_values_to_database.py loop records LocalBitcoins data to database. To address closed gateways arising from repeat calls, the script could be used in a way like the following:
while true; do loop_save_LocalBitcoins_values_to_database.py --timeperiod=3600 sleep 5400 done
databases
A database of Bitcoin values can be saved in the following ways:
import denarius denarius.save_database_Bitcoin(filename = "database.db")
import denarius denarius.save_database_Bitcoin(filename = "database_Bitcoin_EUR.db", currency = "EUR") denarius.save_database_Bitcoin(filename = "database_Bitcoin_GBP.db", currency = "GBP")
graphs
The function save_graph_Bitcoin creates a graph of Bitcoin historical values over a specified time. The function save_graph_LocalBitcoins creates a graph of LocalBitcoins Bitcoin lowest prices in GBP as recorded in a database by the script loop_save_LocalBitcoins_values_to_database.py.
denarius_graph_Bitcoin
The script denarius_graph_Bitcoin.py displays a PyQt GUI with a graph of the last Bitcoin values.
denarius_graph_Bitcoin.py --help
denarius_graph_Bitcoin.py
denarius_graph_Bitcoin.py --currency=EUR --days=100
LocalBitcoins
A graph can be generated of Bitcoin GBP value versus LocalBitcoins GBP lowest value:
import denarius denarius.save_graph_Bitcoin_LocalBitcoins()
A graph can be generated of Bitcoin GBP value versus LocalBitcoins GBP lowest 5 values:
import denarius denarius.save_graphs_Bitcoin_LocalBitcoins()
A graph can be generated of LocalBitcoins normalized prices over days:
A graph can be generated of LocalBitcoins normalized prices over weeks:
A graph can be generated of LocalBitcoins non-normalized prices over weeks:
Bollinger bands
KanoPool
KanoPool records for addresses can be recorded to CSV in a way like the following:
denarius_loop_save_KanoPool.py --help denarius_loop_save_KanoPool.py --addresses=1Miner7R28PKcTRbEDwQt4ykMinunhTehs --interval=10
The CSV data can be analysed using the Jupyter Notebook KanoPool.ipynb.
Nanopool
Nanopool records for addresses can be recorded to CSV in a way like the following:
denarius_loop_save_Nanopool.py --help denarius_loop_save_Nanopool.py --addresses=0xbd3f1126d4c20f72a77e38dfda18622a6d663cd0
The CSV fields are, in order, as follows:
- datetime
- account
- balance
- earnings_per_day_BTC
- earnings_per_day_ETH
- earnings_per_day_EUR
- earnings_per_hour_BTC
- earnings_per_hour_ETH
- earnings_per_hour_EUR
- earnings_per_minute_BTC
- earnings_per_minute_ETH
- earnings_per_minute_EUR
- earnings_per_month_BTC
- earnings_per_month_ETH
- earnings_per_month_EUR
- earnings_per_week_BTC
- earnings_per_week_ETH
- earnings_per_week_EUR
- hashrate
- hashrate12hr
- hashrate1hr
- hashrate24hr
- hashrate3hr
- hashrate6hr
- hashrate_pool
- pool_miners
- pool_workers
Slush Pool
Slush Pool records for an address can be recorded to CSV in a way like the following:
denarius_loop_save_SlushPool.py --help denarius_loop_save_SlushPool.py --addresses=1Miner7R28PKcTRbEDwQt4ykMinunhTehs --interval=60 --alarm=11800000 --slushloginname=user --slushworkername=worker1
The CSV fields are, in order, as follows:
- address
- hash rate
- shares
- UNIX timestamp
- unconfirmed reward in Bitcoin
- confirmed reward in Bitcoin
- total reward (confirmed + unconfirmed) in Bitcoin
- total payout since script launch in Bitcoin
- number of blocks found since script launch
The CSV data can be analysed using the Jupyter Notebook SlushPool.ipynb.
banks
The banks module provides utilities for getting transactions of a bank account (Monzo or RBS) using the Monzo API and the Teller API. To use this module, credentials files should be created.
Access the Monzo developers portal and create a new OAuth confidential client. Set the redirect URL for the client to. Create a URL of the following form using the client ID string:<YOUR_CLIENT_ID>
Access this URL and authorize the client application. The confirmation e-mail sent contains a URL of the following form:<YOUR_AUTH_CODE>&state=
Copy the authorization code from this URL and then access the URL to authorize the client application.
Launch an interactive Python session and, using the client credentials and the pymonzo API interface, generate an access token and a refresh token.
client_id = "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx" client_secret = "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx" auth_code = "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx" from pymonzo import MonzoAPI monzo = MonzoAPI( client_id = client_id, client_secret = client_secret, auth_code = auth_code )
This saves an authorization that lasts 48 hours to the file ~/.pymonzo-token, which contains a dictionary of the following form:
{ "access_token": "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", "client_id": "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", "client_secret": "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", "expires_at": 1517106306.8881364, "expires_in": 172799, "refresh_token": "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", "token_type": "Bearer", "user_id": "xxxxxxxxxxxxxxxxxxxxxxxxxxx" }
Now, API access can be tested by calling the monzopy Monzo API interface without any arguments (such that it loads tokens from the file ~/.pymonzo-token and manages token refreshes).
from pymonzo import MonzoAPI monzo = MonzoAPI() print(monzo.accounts()) print(monzo.balance()) print(monzo.transactions())
For RBS, the credentials file (by default ~/.rbs) should have content of the following form:
token_teller = "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX" account_code_teller = "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"
Pandas DataFrames of transactions can be retrieved in ways like the following:
import denarius.banks df = denarius.banks.transactions_DataFrame_Monzo() df = denarius.banks.transactions_DataFrame_RBS()
A payment can be searched for in ways like the following:
denarius.banks.payment_in_transactions_Monzo(reference = "271828182", amount = 314) denarius.banks.payment_in_transactions_RBS(reference = "271828182", amount = 314)
These functions search the “counterparty_reference” and “description” fields of a DataFrame of bank account transactions for a specified reference. If the reference is found, the specified amount of the payment is compared to the sum of amounts found for the specified reference in the “amount” field. They return a dictionary of the following form:
{ "reference_found": bool, # True if reference found "amount_correct": bool, # True if sum of amounts found is amount specified "valid": bool, # True if reference found and amount correct "transactions" DataFrame, # DataFrame of matches "amount_difference": float # difference between amount specified and sum of amounts found }
So, these functions could be used in a straightforward boolean way to check if a payment has been made:
denarius.banks.payment_in_transactions_Monzo(reference = "271828182", amount = 314)["valid"]
They also could be used in a more involved way to account for occasions in which a payment is found but has an incorrect amount and a further payment with the same reference must be requested.
Both the transactions_DataFrame and payment_in_transactions functions have the option print_table which can print to terminal a table of the transactions under consideration:
df = denarius.banks.transactions_DataFrame_Monzo(print_table = True)
The script print_table_bank_account.py uses this functionality to print to terminal a table of transactions from a specified bank.
RBS
The RBS module provides utilities for getting the balance and recent transactions of an RBS account using the RBS banking web interface, Selenium and Firefox. For convenience, account details can be stored in a credentials file, which is assumed by default to be ~/.rbs. The account code is an alphanumeric code extracted from the web interface. The content of a credentials file is of the following form, which is Python code:
customer_number = "XXXXXXXXXX" PIN = "XXXXXX" passcode = "XXXXXXXXXXXXXXXXXXXX" account_code = "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"
A dictionary of the current balance and a pandas DataFrame of recent transactions is returned by the function RBS.account_status.
import denarius.RBS status = RBS.account_status() balance = status["balance"] df = status["transactions"]
The DataFrame features the fields date, description and amount. A transaction containing a certain reference or description could be selected in the following way:
df[df["description"].str.contains("transaction reference 123")]
The existence of a transaction can be tested in a way like the following:
if df[df["description"].str.contains("transaction reference 123")].values.any(): print("transaction found") else: print("transaction not found")
The script get_account_balance_RBS.py is available to open an RBS account web interface and to display the current balance and recent transactions in the terminal, optionally in a loop.
get_account_balance_RBS.py --loop
The script detect_transaction_RBS.py is available to search for a transaction or transactions with a specified reference.
detect_transaction_RBS.py --reference=123
The script loop_save_RBS_to_CSV.py is available to loop save RBS transactions and balance to CSV, merging with recorded CSV data to avoid recording duplicates.
Santander
The Santander module provides utilities for getting recent transactions using the Santander banking web interface, Selenium and Firefox. Account details are stored in a credentials file, which is assumed by default to be ~/.santander. The content of a credentials file is of the following form, which is Python code:
customer_number = "XXXXXXXX" customer_PIN = "XXXXX" security_question_answer = "XXXXXXXX"
A DataFrame of recent transactions is returned by the function Santander.transactions_DataFrame. The script loop_save_Santander_to_CSV.py saves transactions to CSV in a continuous loop. The function Santander.payment_in_transactions_CSV can search in transactions recorded in CSV for a specified transaction reference together with a specified value and returns a boolean to indicate whether the transaction was detected.
arbitrage
The script loop_save_arbitrage_data_Kraken_LocalBitcoins_UK.py records data for arbitrage between Kraken and LocalBitcoins UK.
The script loop_display_arbitrage_data.py is available for display of recorded data and current prices for arbitrage between Kraken and LocalBitcoins UK.
paper wallets for Bitcoin, QR codes of keys
The script create_QR_codes_of_public_and_private_keys.py creates a QR code for a specified public key and private key and enables optional specification of the size of the resulting PNG images. It loads the keys from a Python file (keys.py by default) which defines the string variables key_public and key_private.
The script create_paper_wallet.py creates a QR code for a specified public key and private key. It then creates an image of a Bitcoin paper wallet. It loads the keys from a Python file (keys.py by default) which defines the string variables key_public and key_private.
Faster Payments Service
- 2018-01-14 participants
- Barclays
- Citi
- Clear Bank
- Clydesdale Bank
- The Co-operative Bank
- HSBC
- Lloyds Bank
- Metro Bank
- Monzo
- Nationwide
- NatWest
- Northern Bank
- Raphaels Bank
- Royal Bank of Scotland
- Santander
- Starling Bank
- Turkish Bank UK
SEPA Instant
- 2018-01-14 participants
- Austria
- Belgium
- Bulgaria
- Estonia
- France
- Germany
- Italy
- Latvia
- Lithuania
- Malta
- Netherlands
- Spain
Project details
Release history Release notifications
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages. | https://pypi.org/project/denarius/2018.1.26.310/ | CC-MAIN-2018-51 | refinedweb | 1,895 | 50.33 |
Agenda
See also: IRC log
<fsasaki> checking attendance
<fsasaki> scribe: daveL
<fsasaki>
<fsasaki>
felix; there is no apparent slot that works. felix willl distribute a weekly alternating proposal
<fsasaki> scribe: fsasaki
dave: haven't updated the mapping
page a lot
... there is more work to be done to formalize the mapping
... and come up with examples
... I think we won't to focus on XLIFF 1.2 mapping first
... we were hoping that XLIFF 2 would be stable, but there is a delay
... focus on XLIFF 1.2 also helps with putting a demonstrator together
yves: dave summarized everythign
right
... in okapi we implemented ITS mapping on what we have
... it is partially implemented, ongoing
dave: we will come back shortly
on that
... wrt to interop between solas and CMS lion, also using okapi
... with the preparation for rome
phil: it is now on our critical
path for our implementation
... david said he would have a prototype a few weeks ago
... even if there is nothing final
... even if we would have a rough direction
... e.g. yves said that with xliff 1.2, he would use mrk markup
... even if we had directions what is easily acceptable
... otherwise it could hold up my implemetnation
yves: the xliff 1.2 mapping is
what we used for implementations
... most of the time it made sense
... we have tackled some of the standoff stuff
... it is also in the git repository (for okapi, scribe assumes)?
<Yves_> yes
phil: provenance and loc quality issue, rating are relevant for us here
<Yves_> Location:
phil: Yves' page for 1.2. we can certainly use that as our direction
dave: will talk to david tomorrow about that
phil: tx
<daveL> scribe: daveL
felix: asks if anyone has further thoughts, or supported for this new type
felix: no respeonses yet
shaun: no update on this
<fsasaki> ACTION: shaun to work on regex for validating regex subset proposal [recorded in]
<trackbot> Created ACTION-385 - Work on regex for validating regex subset proposal [on Shaun McCance - due 2013-01-23].
felix: has been discussed in
response to christian comment
... any further comments
marcis: what is the goal?
felix: christian suggested
merging term and disambig data categories
... but response was that both had distinct use cases, that could merge by are valid individually
marcis: would not want to drop
data category, term is easier to implement and purpose is
clear
... not so clear on disambiguation category, in terms of what is possible to do with this
... for example there may be other types that might be useful in the disambiguation use case
... and doing term management with disambig would make it very heavy
... so there might need to be more atribute specifically for named entity
... referencing input form W3C india recvied today
tadej: motivation for separate
data category was because it covered some use cases that fell
out of the scope of terminology
... by providing some additional context
... but do see that there is some commonality
... Also term must remain to keep compatibility with named entity 1
correction, > with terminology in ITS1
jörg: still in favour of having the two data categories
scribe: since dismabiguation can
cover many other tasks in content or NLP processing
... whereas term is more specific
pedro: the sort of text we mark up is different in both cases so it makes sense to keep the distinction
tadej; agree granularities are quite limiting, or should we have more identifiers to support this
scribe: but this might be more comlicating
jorge: yes this would be more complicated, clearer as it is
<fsasaki>
felix: christian will dial in to
f2f to discuss this and resolve the topic next week
... we also need to consider number of implementations, which are not so many, when considering any possible merger
Des: agree with jorge, keep them separate as they are distinct use cases
jorge: clarified, attributes as defined currently are clearer than making them more fine grained
felix: reminds that W3C process requires responding which involves some work
<Yves_> could we talk about annotorsRef a bit during this call?
felix: replying to a question from Dave: the current number of comments received is good
yves: for two data categories,
proc and locqualiss, can have information from multiple
annotators, but we have no way of doing this for
annotatorRef
... for current implementation, we assume the most recent annotator is the correct one, but this is not ideal
... provenance especially has multiple items and requires annotationRef
<fsasaki> daveL: will look into this thread
<scribe> scribe: daveL
phil: lets talk about the ordering of proveance
<Yves_> provenance data category
<fsasaki>
<Arle_> I am back on the call.
<fsasaki>
<fsasaki>
felix: this was a discussion of whether there was any implication between ordering and time of record
<fsasaki>
<fsasaki> (mails related to the discussion)
phil: asks whether there should be a lack of date stamp
<fsasaki> daveL: a date stamp was discussed
<fsasaki> .. there is two aspects:
<fsasaki> .. a lot of original requirements didn't have a strong need for a time stamp
<fsasaki> .. the original requirement was about identifying rich enough so that we can differentiate
<fsasaki> .. see e.g. "agent provenance" that used to include taht
<fsasaki> .. the 2nd aspect:
<fsasaki> .. we discussed whether the order of the proveancen records are added is significant
<fsasaki> .. but from an implementation point of view it is again compliciated
<fsasaki> .. and there hadn't be much a call for this during requirements gathering
<fsasaki> .. "time" also has various aspects: start of a translation, finish, duration, ...
<fsasaki> .. it is also a point that the provenance wg in w3c had addressed
<fsasaki> .. so we just provide identifiers of who made the translation and revision
<fsasaki> .. for knowing more there is a the provenance model
<fsasaki> .. more = more about time
<fsasaki> .. so in summary, there was no big requirement to have a time stamp
<fsasaki> .. and *if* you want to do that, you can use the w3c prov model
<fsasaki> .. I'll reply to that mail thread
<fsasaki> pablo: I think provenance can stay as is
<fsasaki> .. adding a time stamp can be useful and interesint - if every implementer is fine with that i'm fine too
<scribe> scribe: daveL
felix: adding tiestamp is a substantive change and would require another call, plus tests etc
<fsasaki>
felix: from this week on be aware that people should stop using the google docs and they update the test suite master themselves
<fsasaki>
felix: we need still some input on tests still related to assertion (MUSTs0 which need suggestion for test for them
<fsasaki>
<fsasaki>
felix: thanks to jirka for organising this
<fsasaki>
jirka: is you are not yet register, please do so asap. Numbers of people need to be known for wifi etc.
felix: also need to know in advance when people want to dial in for organising the agenda
<fsasaki>
felix: going through objectives
<fsasaki>
felix: in particular the relationship between the different posters and links to where people can access them and update high level summary, adding any new use cases
<fsasaki> daveL: some time to discuss preparing EU project review?
felix: also brainstorm on
activities for rest of year and new projects and synergy
between them
... the Rome preparation should cover that.
<fsasaki> scribe: fsasaki
<omstefanov> as I will not be able to take part in the f2f Prague, but definitely intend to come to Rome, so please make sure preps for Rome are recording in writing
david: phil asked on that, we got
good comments from xyz
... status of xliff mapping - only written piece is xliff mapping wiki
<dF>
david: will work on this today,
yesterday / today was EC deadline
... we should publish this as a note / PC
... what is the editorial setup for such a note?
... we will need an additional namespace itsx
felix: update on implementation prototype?
david: solas is consuming ITS2
categories
... like OKAPI does
... that is being tested as part of the test suite
... that is consumed by various components of solas architecture
... one is an MT broker
... works with different MT systems
... depends on the MT systems whether they can deal with ITS metadata
... moravia is contributing to that
... m4loc can be used as middleware
... in our current prototype the mt services exposes the m4loc service
... from the deliverable - open source xliff roundtripp
... the okapi filter interprets the ITS decoration
... then the mapping in the wiki is used
... it is consumed by middle ware open source component
felix: would be good to see a demo
david: will do, in prague and in rome
ankit: we are waiting for some sort of data from cocomore
felix: what data?
ankit: we said that cocomore would provide us with annotated data
ankit will provide module by prague f2f
pedro: will have annotated data
from spanish client
... client is the spanish gov tax office
... they will annotate with ITS metadata for this show case
... spanish content in HTML5
... we will generate english content
... and annotate it in the output of the real time system
felix: so ankit could later use the data to test the module?
ankit: training data is as much as you can get
pedro: annotated data from
cocomore is html content
... we will generate content in chinese and french
... so ankit can take that into account chinese, french, german in his system
... and spanish
... this will be german to english, german to french, german to chinese, german to spanish
<Pedro> Showcase WP3 (Cocomore-Linguaserve) is German to Chinese and German to French
<Clemens> right!
<Pedro> Showcase WP4 (Linguaserve-Lucy-DCU) is the full demo Spanish to English, and partial demo Spanish to French and Spanish to German
thanks for everybody for staying longer, meeting adjourned | http://www.w3.org/2013/01/16-mlw-lt-minutes.html | CC-MAIN-2015-32 | refinedweb | 1,612 | 62.88 |
Get the highlights in your inbox every week.
Practice coding in Java by writing a game | Opensource.com
Practice coding in Java by writing a game
Writing simple games is a fun way to learn a new programming language. Put that principle to work to get started with Java.
Subscribe now
My article about learning different programming languages lists five things you need to understand when starting a new language. An important part of learning a language, of course, is knowing what you intend to do with it.I've found that simple games are both fun to write and useful in exploring a language's abilities. In this article, I demonstrate how to create a simple guessing game in Java.
Install Java
To do this exercise, you must have Java installed. If you don't have it, check out these links to install Java on Linux, macOS, or Windows.
After installing it, run this Java command in a terminal to confirm the version you installed:
$ java -version
Guess the number
This "guess the number" program exercises several concepts in programming languages: how to assign values to variables, how to write statements, and how to perform conditional evaluation and loops. It's a great practical experiment for learning a new programming language.
Here's my Java implementation:
package com.example.guess;
import java.util.Random;
import java.util.Scanner;
class Main {
private static final Random r = new Random();
private static final int NUMBER = r.nextInt(100) + 1;
private static int guess = 0;
public static void main(String[] args) {
Scanner player = new Scanner(System.in);
System.out.println("number is " + String.valueOf(NUMBER)); //DEBUG
while ( guess != NUMBER ) {
// prompt player for guess
System.out.println("Guess a number between 1 and 100");
guess = player.nextInt();
if ( guess > NUMBER ) {
System.out.println("Too high");
} else if ( guess < NUMBER ) {
System.out.println("Too low");
} else {
System.out.println("That's right!");
System.exit(0);
}
}
}
}
That's about 20 lines of code, excluding whitespace and trailing braces. Structurally, however, there's a lot going on, which I'll break down here.
Package declaration
The first line,
package com.example.guess, is not strictly necessary in a simple one-file application like this, but it's a good habit to get into. Java is a big language, and new Java is written every day, so every Java project needs to have a unique identifier to help programmers tell one library from another.
When writing Java code, you should declare a
package it belongs to. The format for this is usually a reverse domain name, such as
com.opensource.guess or
org.slf4j.Logger. As usual for Java, this line is terminated by a semicolon.
Import statements
The next lines of the code are import statements, which tell the Java compiler what libraries to load when building the executable application. The libraries I use here are distributed along with OpenJDK, so you don't need to download them yourself. Because they're not strictly a part of the core language, you do need to list them for the compiler.
The Random library provides access to pseudo-random number generation, and the Scanner library lets you read user input in a terminal.
Java class
The next part creates a Java class. Java is an object-oriented programming language, so its quintessential construct is a class. There are some very specific code ideas suggested by a class, and if you're new to programming, you'll pick up on them with practice. For now, think of a class as a box into which you place variables and code instructions, almost as if you were building a machine. The parts you place into the class are unique to that class, and because they're contained in a box, they can't be seen by other classes. More importantly, since there is only one class in this sample game, a class is self-sufficient: It contains everything it needs to perform its particular task. In this case, its task is the whole game, but in larger applications, classes often work together in a sort of daisy-chain to produce complex jobs.
In Java, each file generally contains one class. The class in this file is called
Main to signify that it's the entry-point for this application. In a single-file application such as this, the significance of a main class is difficult to appreciate, but in a larger Java project with dozens of classes and source files, marking one
Main is helpful. And anyway, it's easy to package up an application for distribution with a main class defined.
Java fields
In Java, as in C and C++, you must declare variables before using them. You can define "fields" at the top of a Java class. The word "field" is just a fancy term for a variable, but it specifically refers to a variable assigned to a class rather than one embedded somewhere in a function.
This game creates three fields: Two to generate a pseudo-random number, and one to establish an initial (and always incorrect) guess. The long string of keywords (
private static final) leading up to each field may look confusing (especially when starting out with Java), but using a good IDE like Netbeans or Eclipse can help you navigate the best choice.
It's important to understand them, too. A private field is one that's available only to its own class. If another class tries to access a private field, the field may as well not exist. In a one-class application such as this one, it makes sense to use private fields.
A static field belongs to the class itself and not to a class instance. This doesn't make much difference in a small demo app like this because only one instance of the class exists. In a larger application, you may have a reason to define or redefine a variable each time a class instance is spawned.
A final field cannot have its value changed. This application demonstrates this perfectly: The random number never changes during the game (a moving target wouldn't be very fair), while the player's guess must change or the game wouldn't be winnable. For that reason, the random number established at the beginning of the game is final, but the guess is not.
Pseudo-random numbers
Two fields create the random number that serves as the player's target. The first creates an instance of the
Random class. This is essentially a random seed from which you can draw a pretty unpredictable number. To do this, list the class you're invoking followed by a variable name of your choice, which you set to a new instance of the class:
Random r = new Random();. Like other Java statements, this terminates with a semicolon.
To draw a number, you must create another variable using the
nextInt() method of Java. The syntax looks a little different, but it's similar: You list the kind of variable you're creating, you provide a name of your choice, and then you set it to the results of some action:
int NUMBER = r.nextInt(100) + 1;. You can (and should) look at the documentation for specific methods, like
nextInt(), to learn how they work, but in this case, the integer drawn from the
r random seed is limited up to 100 (that is, a maximum of 99). Adding 1 to the result ensures that a number is never 0 and the functional maximum is 100.
Obviously, the decision to disqualify any number outside of the 1 to 100 range is a purely arbitrary design decision, but it's important to know these constraints before sitting down to program. Without them, it's difficult to know what you're coding toward. If possible, work with a person whose job it is to define the application you're coding. If you have no one to work with, make sure to list your targets first—and only then put on your "coder hat."
Main method
By default, Java looks for a
main method (or "function," as they're called in many other languages) to run in a class. Not all classes need a main method, but this demo app only has one method, so it may as well be the main one. Methods, like fields, can be made public or private and static or non-static, but the main method must be public and static for the Java compiler to recognize and utilize it.
Application logic
For this application to work as a game, it must continue to run while the player takes guesses at a secret pseudo-random number. Were the application to stop after each guess, the player would only have one guess and would very rarely win. It's also part of the game's design that the computer provides hints to guide the player's next guess.
A
while loop with embedded
if statements achieves this design target. A
while loop inherently continues to run until a specific condition is met. (In this case, the
guess variable must equal the
NUMBER variable.) Each guess can be compared to the target
NUMBER to prompt helpful hints.
Syntax
The main method starts by creating a new
Scanner instance. This is the same principle as the
Random instance used as a pseudo-random seed: You cite the class you want to use as a template, provide a variable name (I use
player to represent the person entering guesses), and then set that variable to the results of running the class' main method. Again, if you were coding this on your own, you'd look at the class' documentation to get the syntax when using it.
This sample code includes a debugging statement that reveals the target
NUMBER. That makes the game moot, but it's useful to prove to yourself that it's working correctly. Even this small debugging statement reveals some important Java tips:
System.out.println is a print statement, and the
valueOf() method converts the integer
NUMBER to a string to print it as part of a sentence rather than an element of math.
The
while statement begins next, with the sole condition that the player's
guess is not equal to the target
NUMBER. This is an infinite loop that can end only when it's false that
guess does not equal
NUMBER.
In this loop, the player is prompted for a number. The Scanner object, called
player, takes any valid integer entered by the player and puts its value into the
guess field.
The
if statement compares
guess to
NUMBER and responds with
System.out.println print statements to provide feedback to the human player.
If
guess is neither greater than nor less than
NUMBER, then it must be equal to it. At this point, the game prints a congratulatory message and exits. As usual with POSIX application design, this game exits with a 0 status to indicate success.
Run the game
To test your game, save the sample code as
Guess.java and use the Java command to run it:
$ java ./Guess.java
number is 38
Guess a number between 1 and 100
1
Too low
Guess a number between 1 and 100
39
Too high
Guess a number between 1 and 100
38
That's right!
$
Just as expected!
Package the game
While it isn't as impressive on a single-file application like this as it is on a complex project, Java makes packaging very easy. For the best results, structure your project directory to include a place for your source code, a place for your compiled class, and a manifest file. In practice, this is somewhat flexible, and using an IDE does most of the work for you. It's useful to do it by hand once in a while, though.
Create a project folder if you haven't already. Then create one directory called
src to hold your source files. Save the sample code in this article as
src/Guess.java:
$ mkdir src
$ mv sample.java src/Guess.java
Now, create a directory tree that mirrors the name of your Java package, which appears at the very top of your code:
$ head -n1 src/Guess.java
package com.example.guess;
$ mkdir -p com/example/guess
Create a new file called
Manifest.txt with just one line of text in it:
$ echo "Manifest-Version: 1.0" > Manifest.txt
Next, compile your game into a Java class. This produces a file called
Main.class in
com/example/guess:
$ javac src/Guess.java -d com/example/guess
$ ls com/example/guess/
Main.class
You're all set to package your application into a JAR (Java archive). The
jar command is a lot like the tar command, so many of the options may look familiar:
$ jar cfme Guess.jar \
Manifest.txt \
com.example.guess.Main \
com/example/guess/Main.class
From the syntax of the command, you may surmise that it creates a new JAR file called
Guess.jar with its required manifest data located in
Manifest.txt. Its main class is defined as an extension of the package name, and the class is
com/example/guess/Main.class.
You can view the contents of the JAR file:
$ jar tvf Guess.jar
0 Wed Nov 25 10:33:10 NZDT 2020 META-INF/
96 Wed Nov 25 10:33:10 NZDT 2020 META-INF/MANIFEST.MF
1572 Wed Nov 25 09:42:08 NZDT 2020 com/example/guess/Main.class
And you can even extract it with the
xvf options.
Run your JAR file with the
java command:
$ java -jar Guess.jar
Copy your JAR file from Linux to a macOS or Windows computer and try running it. Without recompiling, it runs as expected. This may seem normal if your basis of comparison is, say, a simple Python script that happens to run anywhere, but imagine a complex project with several multimedia libraries and other dependencies. With Java, those dependencies are packaged along with your application, and it all runs on any platform. Welcome to the wonderful world of Java!
2 Comments, Register or Log in to post a comment.
If you are introducing Java to younger children an alternative to consider is using the block based Alice () from Carnegie Mellon Uni
That's a great tip, Peter. I've heard of Alice but I haven't tried it yet. I remember enjoying Greenfoot (greenfoot.org) too.
Thanks for this comment, it gives me something to experiment with over the holiday break! | https://opensource.com/article/20/12/learn-java | CC-MAIN-2021-21 | refinedweb | 2,427 | 63.8 |
I386_VM86(2) MidnightBSD System Calls Manual I386_VM86(2)
NAME
i386_vm86 — control vm86-related functions
LIBRARY
Standard C Library (libc, −lc)
SYNOPSIS
#include <sys/types.h>
#include <machine/sysarch.h>
#include <machine/vm86.h>
int
i386_vm86(int function, void *data);
DESCRIPTION
The i386_vm86() system call is used to call various vm86 related functions. The function argument can be one of the following values:
VM86_INIT
This will initialize the kernel’s vm86 parameter area for the process, and permit the process to make vm86 calls. The data argument points to the following structure:
struct vm86_init_args
{
int debug;
int cpu_type;
u_char int_map[32];
};
The debug argument is used to turn on debugging code. The cpu_type argument controls the type of CPU being emulated, and is currently unimplemented. The int_map argument is a bitmap which determines whether vm86 interrupts should be handled in vm86 mode, or reflected back to the process. If the Nth bit is set, the interrupt will be reflected to the process, otherwise it will be dispatched by the vm86 interrupt table.
VM86_INTCALL
This allows calls to be made to vm86 interrupt handlers by the process. It effectively simulates an INT instruction. data should point to the following structure:
struct vm86_intcall_args {
};
intnum specifies the operand of INT for the simulated call. A value of 0x10, for example, would often be used to call into the VGA BIOS. vmf is used to initialize CPU registers according to the calling convention for the interrupt handler.
VM86_GET_VME
This is used to retrieve the current state of the Pentium(r) processor’s VME (Virtual-8086 Mode Extensions) flag, which is bit 0 of CR4. data should be initialized to point to the following:
struct vm86_vme_args {
};
state will contain the state of the VME flag on return.
vm86 mode is entered by calling sigreturn(2) with the correct machine context for vm86, and with the PSL_VM bit set. Control returns to the process upon delivery of a signal.
RETURN VALUES
The i386_vm86() function returns the value 0 if successful; otherwise the value −1 is returned and the global variable errno is set to indicate the error.
ERRORS
The i386_vm86() system call will fail if:
[EINVAL]
The kernel does not have vm86 support, or an invalid function was specified.
[ENOMEM]
There is not enough memory to initialize the kernel data structures.
AUTHORS
This man page was written by Jonathan Lemon, and updated by Bruce M Simpson.
MidnightBSD 0.3 July 27, 1998 MidnightBSD 0.3 | http://www.midnightbsd.org/documentation/man/i386_vm86.2.html | CC-MAIN-2015-06 | refinedweb | 408 | 62.68 |
How To Get Current Date Time or Now In Python?
Date and time is important part of the applications development. We generally need to set, get and change some data time information to our records. In this tutorial we will examine the python date time now functions and use cases with examples. For more information about Python date time functions can be get from following tutorial.
Python Date Time Functions With Examples
Python Date Time Operations
Import datetime
In order to use datetime functionalities weshould import the module named
datetime . We can import
datetime module like below.
datetime.now() Function
After importing
datetime module we can use provided class and functions. The simplest and most basic way to get current date and time is using
datetime.now() function. This resides inside
datetime module which means we should use following code in order to get current date and time.
Convert Now To String
While using
now() function returned data will be a datetime object. But in some situations we may need to convert date time into string to use string variable or print to the console. We can use
str() functions which will convert current date time to string.
Print Now with GM Time
We can use
gmtime() function which will print current GM time. GM time is the current time in Greenwich where the world time starts and ends. We should
import time module in order to use
gmtime() function.
Print Specific Part Of Current Time
In this part we will print only specific part of the current time. We will use specifiers in order to print only required part of the time. We assume we have get the current time into variable named
now like below.
Print Current Second
We can print current second like below.
Print Current Minute
We can print current minute like below.
Print Current Hour
We can print current hour like below.
Print Current Day of Month
We can print current day of month like below.
Print Current Month
We can print current month like below.
Print Current Year
We can print current year like below.
2 thoughts on “How To Get Current Date Time or Now In Python?”. | https://www.poftut.com/get-current-date-time-or-now-in-python/ | CC-MAIN-2019-18 | refinedweb | 364 | 74.29 |
How do I add 'e-mail this article to a friend' functionality to my Web site?
Continue Reading This Article
Enjoy this article as well as all of our content, including E-Guides, news, tips and more.
By submitting you agree to receive email communications from TechTarget and its partners. Privacy Policy Terms of Use.
You have to use the System.Web.Mail namespace, which contains the MailMessage and SmtpMail classes to do the work.
MailMessage mail = new MailMessage(); mail.To = "dcazzulino@users.sf.net"; mail.From = "satisfiedreader@happycompany.net"; mail.Subject = "Thanks for your answers!"; mail.Body = "[Flattering phrases to get faster answers next time...]"; SmtpMail.SmtpServer = "smtp.happycompany.net"; SmtpMail.Send(mail); | http://searchwindevelopment.techtarget.com/answer/How-do-I-add-e-mail-this-article-to-a-friend-functionality-to-my-Web-site | CC-MAIN-2014-42 | refinedweb | 114 | 52.15 |
Jonathan Rees, 27 March 2012
This territory is like a pinball machine - hitting any part of the problem always leads quickly to other parts, in a very confusing way. It is important that we have a clear view of the structure of the problem, which is complex. Here are some points I would like us to be in agreement on - let's go through them carefully.
I assume you have read the issue description and know what has been asked of us.
The community has asked us for help, the problem is in the TAG's court, and the TAG has to either solve the problem or get the heck out of the way so someone else is empowered to solve the problem.
In doing so it is possible we may decide to hold the resolution of the issue hostage to new work. For example, we might decide that we can't address ISSUE-57 unless we answer some broader questions about web architecture or linked data architecture. We should be explicit in justifying decisions that might delay resolution of the issue.
We have reasons to try to get out of the way sooner rather than later: lack of time among TAG members, lack of interest among TAG members, perhaps lack of consensus in the TAG.
On the other hand, it is not obvious that if the TAG dropped the ball, that anyone else would pick it up. In any case I think "dropping the ball" has to be done in conjunction with issuing at least some minimal statement on the matter.
ISSUE-57 as stated is not asking for a reexamination of the way linked data abstraction works for hash URIs or 303 URIs. It is asking for incremental change.
We can accept the way linked data works, with all of its faults (which we are not being asked to address), and proceed to address the problem on its own terms - as a mechanical question about performance and deployment, not semantics. Or we can decide to reexamine the fundamentals, and question the entire approach.
We could take time to review how linked data actually works in practice, or how it might work in an ideal world. We could talk about what meaning, reference, and "identification" are, where it comes from, how it is coordinated, context sensitivity, the ideal of a global namespace, how RDF works, and so on. This would take quite a bit of time.
The justification is that (1) "identification" is a central idea in Web architecture, (2) URI reference in RDF should be harmonious with "identification" in webarch, (3) straightening out "identification" issues is the TAG's job.
We could take time to debate this. I think this point is not obvious and adequate discussion could take hours. We may have to decide based on preference or taste, rather than reason.
If ISSUE-57 is about RDF, and not Web architecture, then we should move its consideration out of the TAG. It would be really nice to be able to say goodbye to ISSUE-57 by putting it on someone else's plate. Maybe the TAG, by putting itself in a position of authority, is only being an impediment to progress on issues the linked data community wants to take care of itself.
We are trying to set expectations among those writing RDF and those reading RDF (and any declarative language that uses URIs in a similar way). These expectations will never be universally met, so this is not an empirical or descriptive exercise, it is prescriptive. The question is what someone is "empowered" to do when expectations are not met - whether we add our weight (whatever that might be) to requests to meet the expectation. If we (or W3C, if through review it agrees with us) say something is "good practice" or "in spec" we're in effect saying that it's socially OK (with the TAG or W3C) for someone to ask a party at variance to change their behavior.
In any case it's obvious that RDF you find in the wild won't necessarily conform, no matter what advice is given. Those writing RDF have plausible deniability: I never agreed to that agreement, so why are you complaining to me?
This present situation is especially tricky because there is no place to put anything like a "version indicator" that would signal an intent to conform to new advice (as there was none for our previous advice). A version indicator would give additional "ammunition" for those noticing variance to exert social pressure since it is a statement of an intent to conform.
Nevertheless it would be useful to give a name to any kind of recommendation or advice (supposing someone issues one). Then people can replace "what you're doing is bad practice" with "what you're doing doesn't conform to recommendation ZWX-9931" which at least will be objectively true. A name is also useful so that statements of intended conformance can be placed out of band.
I'll talk generically here in reference both to change proposals submitted in response to the call and other proposals that have been discussed.
Those that do not address ISSUE-57.
Those that are not about hashless http: URIs.
For example, proposals to create a new URI scheme, or proposals that using hashless http: URIs in RDF is not a good idea.
We need to consider these ideas, but my guess is that there will not be TAG agreement to pursue any of them.
We probably ought to prepare a thoughtful response to any change proposal(s) along these lines (either a sunk cost argument, or a reinforcement of the linked data principles, or a hung jury).
Proposals that are compatible with httpRange-14(a).
Although these approaches (MGET, 209, .well-known, "punning", etc.) have been discussed over the years, I don't think any such change proposal was submitted. I found this interesting.
Proposals that give new guidance in the retrieval (200) case.
This is the case I want to look at more closely since it has received the most attention.
The phrasing of httpRange-14(a) has caused untold suffering. People hyperfocus on the "what is an information resource and why would it matter" question.
Can we agree that this is the wrong question to ask? The right question is, is the retrieved representation content of the referenced resource, or a description of it? (Or maybe both, or neither.)
I use the word "instance" instead of "content" but the idea is the same. It's not that the resource is the content, it's that there is some similarity or generic/specific or document-representation relationship between the two which is very different from a 'describes' relationship.
The TAG needs to make this change in public, prominently, or people will just keep bickering pointlessly about it. But how we change it interacts with our attitude toward the 200-based solutions to ISSUE-57, so we need to look at that next.
Any design for the use of 200 (or more abstractly: "retrieval-enabled URIs") needs to tell agents how to interpret a GET response, as ostention or as description (or both or neither or unspecified).
Those generating RDF are then implicitly advised to write whatever will be interpreted as they intend, according to the agreed design. If a particular hashless http: URI doesn't express what they want to say, they write something else - a different URI, a blank node (see what I said about a "hasInstanceUri" predicate), or whatever.
ISSUE-57 is often couched as a problem for those publishing linked data, but if what is written can't be understood that's of little help.
So the job of any ISSUE-57 design that involves 200 responses is to actionably answer the question: for a given hashless URI and HTTP 200 response (to a GET of that URI), is the response (by agreement) related to the identified resource as
I would like for those submitting change proposals to address this clearly. That I didn't ask this explicitly in the first place was probably a mistake.
It is easy to write proposals that do not answer this question in actionable form, i.e. without requiring case by case human judgment. For example, one could answer that the response is a description if it looks like description, or if it contains RDF, or if it talks about what the URI refers to, and that it is mere content in other cases. These criteria are not actionable, and therefore do not help much in preventing miscommunication (i.e. in promoting communication).
httpRange-14(a) as stated did not do the trick, as the Flickr example shows, but its stronger variant, that what you get is always content, is actionable.
An example of an actionable criterion would be: if the response's media type is application/rdf+xml, then it is description, otherwise it is content. Whether this is a good rule or not is another question, but at least it is actionable.
The question of whether the httpRange-14(a) rule - or rather the stronger proposition that a retrieved representation is content/instance of the identified resource - is or was justified, may never be settled. It appears to be either valid or unproblematic for many URIs, and it is useful when writing RDF. It may be what some of the designers of the Web and Web architecture intended. It is clearly what the Resource Description Framework originally intended. And it may be what the 2005 TAG wanted. But whether it logically follows from RFC 2616 or 3986, or even from AWWW, is not clear, and probably never will be. It is shocking, given the centrality of "identification" in the architecture, that none of the canonical specifications tell you anything about what the identified resource is or what its properties are. Advancing the idea through consensus process (for some class of hashless URIs) might gain it broader acceptance, but then it becomes a new thing to be opted into.
Roy Fielding is the major theorist of "representation", but I have had a hard time understanding his attitude. I've tried to push him into taking a stand on whether he means for "representation" to be a term of art, or just an ordinary language word, and this could bear on whether there is something special about things that are identified by hashless http: URIs, according to HTTPbis. If "representation" is by fiat (as opposed to by ordinary-language), as in one obscure interpretation HTTPbis, then there could actually be something to this "information resource" business, since only special kinds of things would have representations by fiat, but this is very much a long shot. I await his response.
In the absence of an actionable consensus rule, or in the presence of nonconformance that can't be made to go away, there ought to be a way for someone who writes RDF to make their meaning clear. This is the idea behind the 'hasInstanceUri' property that lets you say that you're using the URI in the representations-are-content sense (opt-in); it can also be used to talk about Web content without using a URI referentially (in <>) at all.
There could be a parallel predicate saying that a URI or term refers to what is described (opt-in the other way).
My two cents: If the TAG agrees with the way I have laid out the problem, I think it should just say so and let some other group hammer out the details. If it's just about a rule classifying 200 responses as description or content to the taste of the linked data community, then the problem no longer seems like "architecture" and the TAG may not need to have much of a role. I am open to other suggestions, but this approach has the advantage of expediency (for us at least).
Avoid the word "resource" as it raises unanwerable questions. TBL and JAR prefer "thing" because in RDF (as in logic) a term can refer to anything, and whether something exists is unrelated to whether or how we talk about it (URIs). If we use the word "resource" we'll just have to argue, probably fruitlessly, about what it means.
Don't argue about whether X "is a representation of" Y. There is just no way to answer that question. It's pretty safe to talk about "retrieved representations", and we can repeat RFC 2616's line about GET U [nominally] yielding a representation of what U identifies, as long as we don't read any meaning into it that we don't find in 2616. TimBL has proposed "content" and JAR has proposed "instance" for the more specific relationship between a document, image, etc. (in the abstract) and the bits you get when GET.
Just give up on "information resource". Repeated attempts to clarify this have failed, and the audience has not been forgiving. To the extent we need something in its place we might consider "generic resource" or a new term.
Be very careful about "X identifies Y". "Reference" is better understood - it has a good philosophical pedigree, it is clearly a social construction, it is clearly context dependent, and it relates to what a speaker intends and what a listener understands. There is not as good a theory of "identification" in Web architecture. "Identification" in Web architecture seems to be related to the ideal of bringing about a global namespace. If "identification" is seen as invariant across context, it seems to assume that global consistency has been achieved, which is not evident.
Part of what is confusing about RDF is that the same notation has been put to several different purposes. It has been used as a Resource Description Format, as a so-called "knowledge representation" language, and as a data format.
RDF originally evolved out of PICS (which itself evolved into POWDER), and it was meant to be used to describe Web resources, i.e for metadata - thus Resource Description Format. Early RDF statements had URIs as subjects, and they said things about the content retrieved from those URIs.
RDF as it came to be specified is a form of first-order logic, and therefore a language for expressing propositions ("representing knowledge"). Natural languages are also for expressing propositions (among other things), so the two bear many similarities. For example, parts of RDF statements refer to things, just as phrases in natural language statements refer to things. RDF can be precise or imprecise, true or false (or neither), understood or not understood, just as natural language propositions can be. There is inference in RDF just as there is inference in natural language. In both cases meaning is a social construction and therefore depends on context (including time). We might attempt to talk objectively about whether some phrase refers to some thing, but such claims have to be understood as statements about how some population of communicators behaves.
The use of URIs as logical symbols in RDF was meant to align RDF with the "identification" idea in the contemporaneous URI specification. But not everything in an "RDF universe" has to have an understood URI, just as not everything in the world has a devoted term or proper name.
Sometimes people use the word "concept" in talking about RDF. Just as not all phrases in natural language refer to "concepts" - some refer to cars, or earthquakes, or relationships - similarly, not all phrases in RDF refer to "concepts". In fact they rarely do - it is much more common to talk about Paris, than the concept of Paris (whatever that might be). We have ideas about what the properties of Paris are; the properties of concepts are much more mysterious. Try to get the word "concept" out of your mind. Also try not to confuse expression (such as a statement or URI) with what is expressed (such as a proposition or the referent of a phrase).
There is another view, that RDF is just another data format that can be used as an alternative to, say, XML. It dispenses with the "knowledge representation" pretension and "reference" to arbitrary things. There is just data and it is linked. This view is popular because very few people understand or care about language and logic well enough to be able to get any value out of the knowledge representation formulation.
The data format view does not make semantics go away, it just makes it harder to figure out. | http://www.w3.org/2001/tag/2012/04/57guide.html | CC-MAIN-2016-50 | refinedweb | 2,755 | 59.13 |
Logbook query program
Started: Monday, January 14; Due: Friday, January 18, at 9:00 am
Overview
This is your first graded lab. You will work on this lab together with a partner, being sure that it accomplishes all of the tasks that I set forth below. You should decide on your teams and inform me on Monday. In grading this lab, I will check for correctness, robustness, documentation, and that you make good usage of procedures. Obviously, your code should compile without warnings.
Your programming tasks
We used to have monitors in our MCS computer lab. When the lab monitors worked, a ``logbook'' program would record the
times they worked. That program was the final project for one programming team in MC39 (now MCS270,
Object-oriented Software Development) a few years ago. They actually wrote a collection of several related
programs, one for logging in and out, one for printing out the records, etc. The interface between these programs
was certain file formats that conveyed data between them. In this programming, you will write an additional program
that would allow an MCS lab monitor to determine how many hours he or she has worked so far this month.
There is a file that contains all the data from the month, with one line per monitoring shift. Each line contains three numbers with colons between them. The first is the user identification number, or
uid, of the
monitor; the second is the starting time; and the third is the ending time. The times are measured in seconds
since an uninteresting reference point. So, for example, the line
9041:3000:6600would indicate that the monitor with
uid9041 worked a shift that lasted for 3600 seconds, i.e., exactly one hour, starting at time 3000 and ending at time 6600.
What you need to do is read these lines in one by one, until end of file is reached, and for each check whether the
uidis the one you are looking for. If so, the difference between the start and end times should be added to a running sum. At the end, this running sum can be divided by 3600.0 to get the number of hours the monitor worked, and this can be output.
As described in the book, you can check for end of file by testing when the input operation, such as
cin >> uid, has a false value. Since the times are quite large, the
uidand start and end times should be input into variables of type
long, and a
longshould also be used for the running total time.
One detail is how to know what the
uidof the monitor running the program is; what you can do is put the line
#include <unistd.h>at the top of your program file and then use the
getuid()procedure to get the
uidof the user running the program. (It'd be most efficient to do this only once, rather than for each line.)
You can download a sample data file
logbook.data.
Assuming your program is called
myHoursand that you are running it in the directory containing the data, you can use the
<feature of the shell, as in
./myHours < logbook.datawhich runs the myHours program with its standard input coming from
logbook.data. Since this is an MCS lab logbook file that does not contain any of your
uids, you are going to have to figure out what your
uidis and insert it at several places in the datafile. How many hours did you work? (Be sure to also test your program with inputs simple enough for you to easily check the answer.)
One thing I will be looking for in your program is that it does appropriate checks for valid input. By this, I mean that it checks for the following:
- Each input line is of the specified format, with no extraneous space
- Each starting time precedes the corresponding ending time
It's best to send errors to
cerrrather than
cout:
cerr << "Line 2412: Missing colon\n";The test input file has no errors; be sure to introduce errors in your short test file to be sure your program is handling errors properly.
Text.
Helpful commands
A few commands will help you do error checking:
- You can peek at the next character without reading it in
char c = cin.peek().
- You can find out if a character is a digit using
isdigit(c). (You need to
#include <ctype.h>
- A newline is the character
'\n'. (Single quotes denote characters, double quotes are strings.)
- You can read (and skip over) the colons by using
cin.get(c).
- You can detect end of file by first peeking past the end of file and then checking if
cin.eof()returns true.
- Lazy evaluation of
andand
oron page 114 will help keep your code clean.
In the
gdbdebugger you can type
(gdb) run < logbook.datato make
gdbredirect input from file
logbook.data.
PostScript
Incidentally, once you've successfully completed this problem, the only minor detail standing in the way of it
being a useful addition to the logbook system is getting it to automatically access the real data file, rather
than needing input fed to it with
<. Although we haven't dealt with this yet, it is a very simple
matter. So, this problem is a good example of the fact that even a minor amount of custom programming can be
useful to someone, particularly when used together with other existing programs.
Submitting your code
Use Eclipse to export your project directory to a
zip file of the same name as your project (I will
go over this in class, and you are welcome to ask me for help on this). Then email me that
zip | http://homepages.gac.edu/~mc38/2013J/labs/lab7.php | CC-MAIN-2015-48 | refinedweb | 953 | 69.21 |
Generic Method
It is possible to declare a generic method that uses one or more type parameters of its own. Furthermore, it is possible to create a generic method that is enclosed within a non-generic class. For example, in the following program declares a non-generic class called ShowDataType and a generic method within that class called showType( ). The showType( ) method shows which type object passed to it. It can be used with any type of object. Notice how showType( ) is declared :
The type parameters are declared before the return type of the method.
Program
Program Source
class ShowDataType { <T> void showType(T ob) { System.out.println("T Type : "+ob.getClass().getName()); } } public class Javaapp { public static void main(String[] args) { ShowDataType sd = new ShowDataType(); sd.showType(50); sd.showType("Fifty"); } } | http://hajsoftutorial.com/java-generic-method/ | CC-MAIN-2017-09 | refinedweb | 132 | 58.08 |
Tel: 702.220.4346
FREQUENTLY ASKED QUESTIONS (FAQS)
Below are some of the most frequently asked
questions by our customers. If you have a
question that is not answered here, please
send us an email and we will respond with an
answer.
Do you accept telephone orders?
All orders should be submitted by fax, mail
or e-mail copy.
What type of promotional products does
your company offer? Obviously
there are thousands of different promotional
products to choose from. We specialize in
three areas:
- Personalized stuffed animals with printed
t-shirts and accessories
- Custom colored sports balls including
basketballs, footballs, soccer balls,
baseballs and softballs
- Logo clocks, tin signs and bar accessories
Where are the warehouses located for
each product line?
Stuffed Animals are shipped from New York.
Sports Balls are shipped from Los Angeles.
Clocks are shipped from Ohio.
What are the lead-times for
manufacturing? Assembly and
printing times are mentioned below.
Lead-time for stuffed animals with printed
t-shirts is 14 days.
Lead-time for sports balls made overseas is
45 days.
Lead-time for assembly and printing of logo
clocks is 21 days.
Do you accept orders from outside the
United States? Yes. We service the
needs of customers worldwide. Please email
us your shipping address for a freight
quote. You are responsible for all duty and
import fees. We can ship using your
Purolator, UPS number or FedEx number. We do
not ship using our UPS number. Please
contact UPS or your freight carrier to
determine the amount of fees charged by your
country.
Which forms of payment do you accept?
The terms are prepaid. You can submit
payment by check, direct deposit, PayPal,
VISA, MasterCard or American Express (AMEX).
If you prefer to pay by credit card, please
complete a Credit Card Authorization Form
and fax it to us. All credit card payments
require this form. All your information is
kept private and secure. We do not share
your information with any company or person.
How much are the set-up charges?
Set-up charges apply in order to create the
printing screens or moulds.
T-Shirt Bears: A set-up charge of $25
applies to every order. Red, blue, black and
white colored are included. Other colors
will incur a $50 Pantone color matching
charge.
Sports Balls: A set-up charge of $59 applies
to each initial order. Reorders do not incur
a set-up charge. More set-up charges will
apply for additional unique logo panels.
Color imprint is included with the set-up
charge. Opposite side printing of the same
logo is free.
Clocks: An initial set-up charge of $65
applies to most orders. There are no set-up
charges for reorders.
Do you accept returns? Since
all orders are customized according to your
specifications, we only replace defective
items or products that we have damaged. We
cannot accept returns for items that you no
longer need. All claims must be made within
10 days from the receipt of the shipment. | http://www.giftco.com/questions.php/ | CC-MAIN-2019-13 | refinedweb | 502 | 69.07 |
BondWorks
Only one word is needed to characterize Friday's action in the long end of the Treasury market: UGLY - as in capital U, capital G, capital L and capital Y, U-G-L-Y. Bond friendly payroll data far below any "official" predictions got the bond rally going, but before long bonds turned around and ended plunging, closing on the lows of the day, forming a technical pattern known as a key-reversal day. In the short term the market has been severely wounded. I believe that a follow through to a 10 year yield past 4% will open the door to a minimum 4.25%. So all you little fundamental traders out there, don't fret about the soft-patch becoming a "rough-patch", just consider more important events such as another chief bond bear (Stephen Roach of Morgan Stanley fame) actually joining the bullish crowd of such notables as Bill - the Bond King - Gross and David - there is no inflation my Darlings - Rosenberg. While supply is not an issue in a bull market, after seeing such adverse reaction to solidly bullish numbers on Friday, the next test of the short-term health of the bond market will most likely be the 5 and 10 year Treasury note auctions on Wednesday and Thursday. That said, this weekend we have goldbugs, taxi drivers, real estate agents, more Wall Street strategists - the cream of the contrarian indicator crop - all advising us to sell bonds. In the short term I can't help but nervously agree with them. Longer term I am just not prepared to declare the bond bull quite dead yet.
NOTEWORTHY: Last week just confirmed what we have been harping on for weeks: this economy ain't going nowhere but down. Sure you could argue that Consumer Confidence is bouncing back, but that is a bull trap that mirrors the stock market action. On the other hand we have ISM Manufacturing continuing to plunge - and now within spitting distance of the magic 50 level, Weekly Claims are now up to 350k - a healthy 25k bounce from the previous week, and the payroll data was an unmitigated disaster that has been widely advertised. One detail that I have not noticed in the media coverage is that without the business birth/death plug factor the Non-Farm Payrolls would have read -129k... let's just call it an unmitigated disaster and be done with it. The week ahead will be fairly quiet on the economic calendar. The Trade data released next Friday will be of some interest and Master Greenspan's comments in front of the Congress are expected to potentially have some market moving effects on Thursday.
INFLUENCES: Fixed income portfolio managers have been steady bearish. (RT survey was down 1 point over the latest week. This metric is somewhat bullish from a contrarian perspective.) The 'smart money' commercials are long 116k contracts (a slight increase from last week's 105k). This number is definitively neutral for bonds. Seasonals are strongly positive in June. On the technical front, we traded to 3.8% on the US 10 year notes on Friday morning, but closed the day 17 basis points higher at 3.97%. The market has breached the 4% level substantially, but it remains to be seen if it can stay under on a lasting basis without some compelling fundamental evidence.
RATES: US Long Bond futures closed at 117-27, up close to $1.5 on the week, while the yield on the US 10-year note was 10 basis points lower at 3.97%. My bias is negative in the very short term - for the next week or two. The Canada - US 10 year spread was wider by 2 to -11 basis points. We are officially neutral on this spread at this point, but leaning towards selling Canada to buy US bonds. Dec05 BA futures closed the week 98 basis points through Dec05 EuroDollar futures, which was out 2 basis points from last week's close. At 62 it was an official trade recommendation to buy EDZ5 to sell BAZ5. This trade is a waste of time, we will be looking to exit gracefully. The belly of the Canadian curve underperformed the wings by 3 basis points last week. Selling Canada 3.25% 12/2006 and Canada 5.75% 6/2033 to buy Canada 5.25% 6/2012 was at a pick-up of 47 basis points. Assuming an unchanged curve, considering a 3-month time horizon, the total return (including roll-down) for the Canada bond maturing in 2012 is the best value on the curve. In the long end, the Canada 8% bonds maturing on June 1, 2023 are cheap.
CORPORATES: Corporate bond spreads were tighter last week. Long TransCanada Pipeline bonds were unchanged at 127, while long Ontario bonds were in 1.5 to 48.5. A starter short in TRAPs was recommended at 102 back.
BOTTOM LINE: Neutral continues to be the operative word on bonds. A trading short is recommended for aggressive short term oriented accounts again this week. If the US 10 year note does not trade above 4% by Thursday at the latest, cover your short positions. Clients who are long the bond market (still few and very far between), should consider selling to get closer to a neutral position, shorts are advised to cover on dips to 4.25%..
TweetTweet | http://www.safehaven.com/article/3222/bondworks | CC-MAIN-2016-40 | refinedweb | 900 | 70.13 |
Thanks! I'm going to look for it.
Regards.
Thanks! I'm going to look for it.
Regards.
Hi symbianyucca,
Is there any way to launch the uninstallation of a package from an app?
This should do the work.
Regards.
Hi symbianyucca,
That's the problem. One of the packages of my .sis (is a multipackage) has changed the UID. This package is made by a third party, so I can't change the UID.
regards.
I was looking for a way to do it automatically from the new .sis instead of doing it manually from App Manager.
Hi,
I was wondering if there is any way to uninstal a previously installed package from an installabe .sis.
Before installing the new .sis I would like to uninstall the previous. I can't upgrade...
Hi,
I'm writing an app in py60 (1.4.5) and I'm preventing the user from closing the app using this method:...
Hi,
Is there any way to get the size of a graphics.Image in bytes or a sizeof() like function in py60?
The size() method shows the resolution.
I've been googling with no luck.
Best regards.
Thanks wizard_hu,
The wizard generates a file with this lines:
[extensions_text]
1.2.826.0.1.1796587.1.1.1.1=004400912782637,311940035172446,353117065569133 <---- some IMEIS...
Hi savaj,
I've a publisher ID and I can request devcerts using the Nokia wizard with multiple IMEIs. I need to do it using an script and Open SSL in Linux from command line, not using any wizard....
Hi!
I'm using the procedure shown in this website to generate certificate requests:
It seems to work fine when I want to sign an app for only one IMEI...
I've been making some more tryings. It's a bit rare.
The phone opens a communication every minute with urllib.urlopen() and it works fine. Some hours after, one communication fails. it don't return...
I found a possible solution here:
It uses a code like this to force a timeout:
import signal
def alarmHandler(*args):
...
Hi symbianyucca,
Thanks for the clue. I've just found an example in phyton.
Regards.
Hi,
Is there any way in a Symbian 3rdFP1 mobile to put an icon in the phone menu who launch the browser to open a predefined web page?
I've been googling but I can't find any clue on this.
...
I'm working with 1.4.5. I'm going to try with 1.9.5.
EDIT:
Just tried, but my app won't start with the new runtime. I use some extensions that propably are no compatible.
Best regards.
Hi!
I'm developing an application that makes an http connection every minute. It seems to work fine, but when it's working for a while, it stop to make connections. In the app log, I can see that...
Hi,
I'm developing an app that connects to a web server using urllib. The program works right when running in the emulator, but when I try to connect from the device, it always return an error:...
Hi!
I'm developing an extension that uses a 3dr party DLL. If I use a devcert to sign it without extra capabilities, it works right.
The problem is that I need some extra capabilities now in my...
We have bought the library, but the provider only gave us the DLL and the .h files to use it.
I don´t know if this is the habitual behavior since I´m new to symbian.
I guess we have to ask the...
Hi wizard_hu,
It's a python module, and python return this error:
File "c:\resource\DMdecoder.py", line 5, in ?
_dmdecoder=imp.load_dynamic('_dmdecoder', 'c:\\sys\\bin\\_dmdecoder.pyd')
Hi!
I'm trying to sign an application who uses a 3rd party DLL (actually a python module). If i sign it using a developer certificate, it works right, but when I try to use Express Signed, it...
Hi,
I recently got a PublisherID. Now I'd like to use it with my Symbian signed account, but I'm not able. In the official documentation, I saw that there were a form to upload it, but I'm not...
Thanks Kiran and Skumar,
Since I'm new to Symbian, it's very useful for me :-)
Regards.
Thanks kiran10182, will try.
A little example on using the class would be great :-)
Regards.
Will try. Anyway it seems to be similar code.
I don't know if there is any way to clean CTelephony status or anything similar.
Regards. | http://developer.nokia.com/community/discussion/search.php?s=a205be5b151f1ac8b554a0033b9f1063&searchid=2062035 | CC-MAIN-2014-15 | refinedweb | 765 | 77.23 |
%load_ext autoreload %autoreload 2 %matplotlib inline %config InlineBackend.figure_format = 'retina'
Gradient-Based Optimization
Implicit in what you were doing was something we formally call "gradient-based optimization". This is a very important point to understand. If you get this for a linear model, you will understand how this works for more complex models. Hence, we are going to go into a small crash-course detour on what gradient-based optimization is.
Derivatives
At the risk of ticking off mathematicians for a sloppy definition, for this book's purposes, a useful way of defining the derivative is:
How much our output changes as we take a small step on the inputs, taken in the limit of going to very small steps.
If we have a function:
What is the derivative of f(x) with respect to w? From first-year undergraduate calculus, we should be able to calculate this:
As a matter of style, we will use the apostrophe marks to indicate derivatives. 1 apostrophe mark means first derivative, 2nd apostrophe mark means 2nd derivative, and so on.
Minimizing f(w) Analytically
What is the value of w that minimizes f(w)? Again, from undergraduate calculus, we know that at a minima of a function (whether it is a global or local), the first derivative will be equal to zero, i.e. f'(w) = 0. By taking advantage of this property, we can analytically solve for the value of w at the minima.
Hence,
To check whether the value of w at the place where f'(w) = 0 is a minima or maxima, we can use another piece of knowledge from 1st year undergraduate calculus: The sign of the second derivative will tell us whether this is a minima or maxima.
- If the second derivative is positive regardless of the value of w, then the point is a minima. (Smiley faces are positive!)
- If the second derivative is negative regardless of the value of w, then the point is a maxima. (Frowning faces are negative!)
Hence,
We can see that f''(w) > 0 for all w, hence the stationary point we find is going to be a local minima.
Minimizing f(w) Computationally
An alternative way of looking at this is to take advantage of f'(w), the gradient, evaluated at a particular w. A known property of the gradient is that if you take steps in the negative direction of the gradient, you will eventually reach a function's minima. If you take small steps in the positive direction of the gradient, you will reach a function's maxima (if it exists).
Exercise: Implement gradient functions by hand
Let's implement this using the function f(w), done using NumPy.
Firstly, implement the aforementioned function f below.
# Exercise: Write f(w) as a function. def f(w): """Your answer here.""" return None from dl_workshop.answers import f f(2.5)
.)
8.75
This function is the objective function that we wish to optimize, where "optimization" means finding the minima or maxima.
Now, implement the gradient function \frac{df}{dw} below in the function
df:
# Exercise: Write df(w) as a function. def df(w): """Your answer here""" return None from dl_workshop.answers import df df(2.5)
8.0
This function is the gradient of the objective w.r.t. the parameter of interest. It will help us find out the direction in which to change the parameter w in order to optimize the objective function.
Now, pick a number at random to start with. You can specify a number explicitly, or use a random number generator to draw a number.
# Exercise: Pick a number to start w at. w = 10.0 # start with a float
This gives us a starting point for optimization.
Finally, write an "optimization loop", in which you adjust the value of w in the negative direction of the gradient of f w.r.t. w (i.e. \frac{df}{dw}).
# Now, adjust the value of w 1000 times, taking small steps in the negative direction of the gradient. for i in range(1000): w = w - df(w) * 0.01 # 0.01 is the size of the step taken. print(w)
-1.4999999806458753
Congratulations, you have just implemented gradient descent!
Gradient descent is an optimization routine: a way of programming a computer to do optimization for you so that you don't have to do it by hand.
Minimizing f(w) with
jax
jax is a Python package for automatically computing gradients;
it provides what is known as an "automatic differentiation" system
on top of the NumPy API.
This way, we do not have to specify the gradient function by hand-calculating it;
rather,
jax will know how to automatically take the derivative of a Python function
w.r.t. the first argument,
leveraging the chain rule to help calculate gradients.
With
jax, our example above is modified in only a slightly different way:
from jax import grad import jax from tqdm.autonotebook import tqdm # This is what changes: we use autograd's `grad` function to automatically return a gradient function. df = grad(f) # Exercise: Pick a number to start w at. w = -10.0 # Now, adjust the value of w 1000 times, taking small steps in the negative direction of the gradient. for i in range(1000): w = w - df(w) * 0.01 # 0.01 is the size of the step taken. print(w)
-1.5000029
Summary
In this section, we saw one way to program a computer to automatically leverage gradients to find the optima of a polynomial function. This builds our knowledge and intuition for the next section, in which we find the optimal point of a linear regression loss function. | https://ericmjl.github.io/dl-workshop/01-differential-programming/02-gradient-optimization.html | CC-MAIN-2022-33 | refinedweb | 948 | 55.13 |
PHP Security Expert Resigns 386."
Couple thoughts (Score:2, Insightful)
Second, it's PHP. Add another API or something.
Re: (Score:2)
It's wide open for monkey patching, good luck if you want to:
I'd advise to switch to a language designed by a human, not a zombie.
Re: (Score:3, Insightful)
Hahaha! Awesome! I'd suggest a few more functions in the global namespace as well. Maybe stop_hacking_attempts() and stop_hacking_attempts_l33t()
PHP Security Expert (Score:5, Funny)
Isn't that an oxymoron?
Uh-huh, riiiiiiiiight... (Score:2)
Re: (Score:2)
For instance, if after to a break-in you notice somebody tried to ssh in 500 times unsuccessfully, perhaps the 501th one worked.
In the PHP case, it's very likely the apache logs would have something interesting.?
Re: (Score:3, Insightful)
But...
There is something that the language people can do to stop it, not by changign the language, but by changing the standard libraries. If there was no library API which handed an abritrary string to SQL interpreter for one step parsing and execution, it would discourage the prac
Re: (Score:3, Insightful)
Re: (Score:2, Insightful)
Obviously someone is NOT able to send spam though a machine JUST because they have PHP installed, the problem was with software that was installed on top of PHP.
As some one who "takes utmost care over security" questions you should have ask were:
- What version of PHP were you running
- What version of Mambo were you running
- Were you running any third party modules (mos
Re: (Score:3, Funny)
I know exactly nothing about PHP...
... I take the utmost care over security and this was the first ever breakin.
Would you call blindly installing a server side scripting language of which you know nothing 'taking utmost care over security'?
On second thought... (Score:5, Insightful)
just have a look [milw0rm.com]
Re: (Score:2)
Re: (Score:2)
On second thought I would have to agree that the majority of PHP flaws are due to unskilled programming.
exactly. yet the flamy blurb seems to be contradicting itself:
Basic security issues are not addressed sufficiently by the developers. Zeev Suraski, Zend's CTO of course disagrees and points his finger at inexperienced programmers. But given the number of remote code execution holes in PHP apps this year, Esser might have a point. And he plans to continue his quest for security holes in PHP.
so it's
Re: (Score:2)
Well, maybe you should be. C is a horrible language to use for writing an entire application with. Plenty of safe, higher-level languages with simple to use FFIs exist that are much better suited to such things.
Re: (Score:3, Insightful)
Well, maybe you should be. C is a horrible language to use for writing an entire application with. Plenty of safe, higher-level languages with simple to use FFIs exist that are much better suited to such things.you keep telling yourself that. meanwhile, in the real world, C/C++ will remain the workhorse of the IT industry.
Re: (Score:3, Insightful)
The blame for the PHP security mess should be shared between the language design, which makes it a hassle to write secure code, and the language popularity, which means that PHP i
Re:Question from a .NET developer trying to go OSS (Score: (Score:2, Informative)
Bullshit [rubyonrails.org]
I am hesitant to try any framework whose partisans routinely bash other frameworks. I'm used to getting this from Python; it's refreshing to see a Perl guy screaming at the wind.
Re:Question from a .NET developer trying to go OSS (Score:4, Insightful): (Score:3, Funny)
Re: (Score:3, Funny)
The only Rails guy I see routinely mouthing off is DHH. Most of his invective (that I've read) is aimed at Java, though, which is a mitigating factor. J2EE is easy to bash because you'll be right most of the time.
Re: (Score:2)
I agree that PHP has problems that make it easy for non-experts to leave their scripts wide open, and create terrible, kludgey code; but that does not somehow make it impossible to write good code in PHP.
It's a flexible language compared to Java (this has its benefits too of course), and it has a lot of exposure to people who can't program, but that doesn't mean that good code somehow cannot be written in it.
Re: (Score:2)
Use Django then, it does.
Re:Question from a .NET developer trying to go OSS (Score:2, Informative)
languages: there's java, there's python, there's perl, and there are more. each of the first three is (IMHO) a lot better than php (as I know it, up to about v. 4) for building web applications.
servers: Apache, with either mod_perl or mod_python access to the APIs is very good. Of course, there's the plenty of java web servers and ways to run those with or without Apache.
platforms: look at the Apache foundation's site for java, perl and python modules.
develo
Re: (Score:2)
I'll second that having come from the other direction - I'm a professional Java programmer and sometime hobbiest C# programmer. While I certainly wouldn't claim to be an expert and I've not done anything I'd consider particularly complicated (a couple of fairly noddy webapps and a couple of basic D3D things), C# was incredibly easy to pick up.
Re: (Score:3, Interesting)
Re:Question from a .NET developer trying to go OSS (Score:2)
If you are interested in something different, would do like others have suggested, and look at Ruby/Rails, Catalyst or Java JSP/J2EE. Java will be the clos
Re: (Score:2)
Moving from C#/ASP.NET (and presumably SQL Server) to PHP/MySQL is like chopping your hands off. You can do much better than that.
DB-wise, PostgreSQL is as powerful as SQL Server in most ways, and more powerful in many.
Language-wise, you have Python, Ruby, Java and even Perl. Perl is baroque and dated and I'm not sure I could recommend using it now. Java brings with it the whole Java stack and accompanying XML hell and performance issues (yeah, I know, they don't really exist and it's all a conspiracy).
Re: (Score:2)
It should also have fixed classes for encoding / decoding HTML. Every PHP project out there has its own weird and badly written way of cleaning entered HTML. Personally, I'd like to see the best of those aggregated into know PHP functions.
I've got a b2evo site running on PHP and any changes I make to it
Re: (Score:2)
Oh yeah, magic_quotes worked sooo well didn't it?
Re: (Score.
Re: (Score:2)
<html><body><h1>HTML page</h1>
<? echo("<p>Hello!</p>"); ?>
<% Response.write("<p>foo</p>"); %>
</body></html>
embedded-code-via-fancy-tag business.
(And, well, so much for logic/presentation separation...)
Re: (Score:2)
That has been the demise of ASP, in my opinion. ASP, by design, is supposed to be the "glue" between COMs, not actualy be used as the language itself, like PHP. Tons of ASP apps have been written using the PHP architecture, because it is "possible", and it simply doesn't work well there. Fortunately, ASP.NET fixed that...almost. Now we have all the noobs writting all their logic in the code behind instead
Re: (Score:2)
Yes, I know is possible to separate the application logic from the view on ASP and PHP, but most of the time people just cram the pages with code, making it illegible. Also, bad PHP and ASP programmers tend to use global variables for everything, making you wonder where that little guy named connSQL3_spaz4 came from.
A friend of mine told me once that: "PHP is the VisualBasic of OpenSource"... I couldn't agree more.
Open source is the issue (Score:3, Funny)
Re: (Score:2)
As I finished typing this I realized I'm probably feeding the troll ("patent lawyer", right) but oh well...
Re: (Score:2)
Maybe there are flaws waiting to be discovered, but it doesn't change the point I was making, which is that the original post I responded to claimed that Apache hasn't had security fla
Re: (Score:2)
Hmm... (Score:2)
Re: (Score:3, Insightful)
Let's lock this person in a room with the OpenBSD developers.
Not a bad troll though.
Re: (Score:2, Informative)"
Re: (Score:3, Interesting)
I'm not surprised. If you read the article, you come across this gem:
That's right, the PHP team think that dedicating a month to finding...
MOD PARENT UP (Score:2)
So long, I am currently switching most of my PHP projects to python (which is a PITA if you are used to php's mysql-handling and regexp-support..., but a major step towards a more reliable webserver enviroment). Unfortunately, clients tend to persist on PHP ("Build it, we'll find a 15-year-old scriptkiddy to do the support and extensions...")
Re: (Score:3, Interesting)
Then a php to python coverter, and then we could start to forget about magic_quotes and safe mode.
Re: (Score:2)
Re: (Score:3, Informative)
Re: (Score:2)
A sanitized (in the meaning of "made mor
Re: (Score:2)
Re: (Score.
Re: (Score:3, Insightful)
Just to offer the alternate case:
If you run this, ruby will not segfault, but the interpreter will raise an Exception, so, you could do this:
Just for the record, recursion is a basic tool of programming, as basic as a reference type, and certain languages, like Haskell or Scheme]
Re: (Score:2)
The "news" is that Stefan Esser unsubscribed from the security@php.net mailing list.
That may be how Suraski is describing it, but if you read you'll find a slightly different story. [php-security.org]
Re: (Score:2)
How can anyone possibly think that disclosing and exposing security holes in an open source project is a bad thing and against the best interests of the language ?
PHP is essentially the lingua franca of web development but the rise of Rails and Django simply highligh
Re: (Score:2): (Score:2, Interesting)
Re: (Score:2, Offtopic)
Re: (Score:2): (Score:3, Insightful)
It's impossible to write secure code elegantly in PHP. PHP is an inflexible language in which security features have been added using various options and functions. Any secure PHP code is going to be overly-difficult to read, and this can lead to insecurity via coding errors.
This inflexibility of the PHP code language is partially solved by the use of numerous extensions (There are gaps: For example, none of the extensions can parse HTML in a natural way). The more API functions and extensions required to..
Re: (Score:2)
Re: (Score:3, Informative)
The last one should get a fix in PHP 5.2.1 for data-URIs.
... htmlentities() ... htmlspecialchars() ... strip_slashes()
Input checking is difficult:
Which of these functions
Re: (Score:3, Informative)
Correct, the semantics of == are different in PHP than in most other C-like languages. The operator you are looking for is === [php.net]. As a further note, I usually explicitly cast values to int if expect them to be integers, so random strings just become zero.
PHP security is a disaster by design (Score:2, Interesting)
Woops! Languages that have a permissive syntax make it easy for bugs to hide. And security flaws are just a particular subset of bugs. At a higher level, we have problems such as widespread use of di
Re: (Score:2)
There is a section of the manual which describes the behaviour to expect when types are mixed.
See... Type juggling [php.net]
You should always be developing with error_reporting(E_ALL|E_STRICT);
This would throw a Notice warning about the use of an undeclared variable when the code tries to access it.
Error reporting should more than likely be disabled for your production enviroment however.
(E_STRICT is PHP5, E_ALL on its own will still
Re: (Score:2, Insightful)
Here's an eye-catcher (Score:5, Insightful)
If that's accurate, and if there wasn't some unimaginable compelling reason, any security person would be unhappy.)
Apologies to Douglas R. Hofstadter
If PGP... (Score:4, Funny)
Re: (Score:2, Interesting)
Huge problem is "default" installs - everyone knows where your sample scripts are. Delete those first thing then move/rename the active libraries.
Now, where's that Ruby book?
Re: (Score:3, Funny) no life. Choose no career. Choose no family.
Choose a fucking big computer, choose disk arrays the
size of washing machines, modem racks, CD-ROM writers,
and electrical coffee makers. Choose no sleep, high
caffeine and mental insura.
Re: (Score:3, Insightful)
This reminds me a lot of the fundamental principle of politics:
In software, people with their feet so I bet this principle applies equally to this field.
Simon.: (Score:3, Insightful).
Re:If people used my butt to the extent they use p (Score:2)
Something which is used extensively gets more flaws discovered than something that is used less. Get this in your heads.
That's assuming that the flaws exist in the first place. It's true that incredibly popular pieces of software a subject to more scrutiny and exploitation, but how much can go wrong is a characteristic unique to the design of the software itself, something that would be the same regardless of how many people used it. It would be rather obtuse to entertain the idea that all pieces of so
Re: (Score:3, Interesting)
Oh wait, it hasn't has it. It is also why Apache had so many more security issues than IIS4 because Apache was used... oh hang on that one doesn't work either.
Maybe if you used you mouth rather than your butt for speaking you might make more sense.
As a PHP developer, I disagree (Score:3, Insightful)
Re: (Score:3, Insightful)
Quite often a quick-patch to slam a door is only a few lines. It may not be compatible with everything in the system, but it will do for some people. These patches never make it into the php right now and your ass is still uncovered for the skilled. It's interesting that you feel more comfortable wit
Re: (Score:3, Insightful)
The sorry fact is that those assholes *have* to be forced. You *have* to beat sense into them, since apparently they are not accesiible to reason.
So full disclos | https://developers.slashdot.org/story/06/12/14/0410240/php-security-expert-resigns | CC-MAIN-2016-40 | refinedweb | 2,433 | 62.68 |
It's a common story: you're working on a project and have need for a very simple class, one that you assume is part of the library you're using. You search the library and discover that the class is not there. You're then faced with a choice, you can "roll your own" class or use a third party implementation (if you can find one). It's not surprising that in most cases we choose the former. Creating your own bread and butter class that you know will come in handy in the future can be satisfying.
The class in question is a Deque (pronounced "deck") class. The deque is a data structure that allows you to add and remove elements at both ends of a queue. I was working on my state machine toolkit and needed a Deque collection class. I checked the System.Collections namespace to see if it had one. Unfortunately, it didn't. I did a cursory search for a Deque class here at CodeProject and found this article for a "Dequeue" class. I have not looked at the code, but decided anyway that it wasn't exactly what I was looking for, and admittedly, I had already made up my mind to write my own Deque class.
Deque
System.Collections
The queue data structure represents functionality for adding elements to the end (or back) of the queue and removing elements from the beginning (or front) of the queue. Think of a line of people waiting to buy a ticket at a movie theater. The first person in line is the first person to buy a ticket. This approach is called "first in, first out" (FIFO).
Sometimes you need the ability to add and remove elements at both the beginning and end of the queue. The deque data structure fits the bill. It is a "double-ended-queue" in which you can add and remove elements at the front and back of the queue.
First and foremost, I wanted my Deque class to look like a class in the System.Collections namespace. Had I found the Deque class when I was searching the System.Collections namespace, this is what it would look like. I took a close look at the Queue class and modeled my class after it. To this end, the Deque class implements the same interfaces, ICollection, IEnumerable, and ICloneable.
Queue
ICollection
IEnumerable
ICloneable
In addition to the methods and properties in those interfaces, the Deque class also has several methods found in the Queue class.
Clear
Contains
ToArray
Synchronized
The Queue class also provide a Peek method. This method lets you peek at the element at the front of the Queue without removing it. Following its lead, the Deque class provides PeekFront and PeekBack methods for peeking at the elements at the front and back of the Deque respectively.
Peek
PeekFront
PeekBack
The PushFront and PushBack methods allow you to add elements to the front and back of the Deque respectively, and their counterparts, the PopFront and PopBack methods, allow you to remove elements from the front and back of the Deque respectively.
PushFront
PushBack
PopFront
PopBack
The Deque class uses a doubly-linked list to implement its collection of elements. The links in the list are represented by a private Node class. Since elements can be added to the front and back of the Deque, it was necessary to have front and back nodes to keep track of the front and back of the Deque.
Node
There is a custom DequeEnumerator private class for implementing the IEnumerator interface returned by the GetEnumerator method for enumerating over the Deque from front to back. I've written custom enumerators before, and it really isn't hard, it's just that you have to make sure that your implementation conforms to the IEnumerator specification.
DequeEnumerator
IEnumerator
GetEnumerator
Because I needed the Deque to be thread safe, I implemented a static Synchronized method (following the lead of the collections in the System.Collections namespace). It returns a thread safe wrapper around a Deque object. To implement this, I first made each of the methods and properties in the Deque class virtual. I then derived a private class from the Deque class called SynchronizedDeque in which each of the Deque's methods and properties are overridden.
virtual
SynchronizedDeque
When a SynchronizedDeque is created, it is given a Deque object. It achieves thread safety by locking access to its Deque object in each of its overridden methods and properties and delegating calls to the Deque object. The Synchronized method creates a SynchronizedDeque object and returns a Deque reference to it, so it looks and acts just like a regular Deque object.
Deque<T>
I decided it was time to create a new version of the Deque class that supports generics. Converting the original Deque class to a generic version was fairly straightforward. I copied the code from the original and changed all references to the items in the Deque from type object to type T. I made Deque<T> class implement the IEnumerator<T> interface. What is interesting here is that IEnumerator<T> implements IDisposable, so I had to modify my private enumerator class to provide IDisposable functionality. All of this was rather easy to do.
object
T
IEnumerator<T>
IDisposable
The original Deque is still there, unaltered, if you need it.
The Deque class resides in the Sanford.Collections namespace (this used to be the LSCollections namespace; I felt it needed renaming). And the Deque<T> class resides in the Sanford.Collections.Generics namespace. The zipped source code contains several files: the original Deque.cs file, the files implementing the new Deque<T> class, and the Tester.cs and GenericTester.cs files. The Tester.cs file represents a console application class that tests the functionality of both the Deque and Deque<T> classes.
Sanford.Collections
LSCollections
Sanford.Collections.Generics
Well, this article has been a change of pace. My last contribution here at CodeProject was a series of articles presenting a toolkit I had spent months working on and researching. In contrast, the Deque class along with this article was for the most part simple to write. But sometimes the simplest things can be the most useful. At least that's what I'm hoping I've accomplished here. Thanks for your time, and as always comments and suggestions. | http://www.codeproject.com/script/Articles/View.aspx?aid=11754 | CC-MAIN-2014-49 | refinedweb | 1,064 | 63.39 |
Contents
Strategy Library
Short-Term Reversal Strategy in Stocks
Abstract
This strategy is called Short-Term Reversal Strategy which is discussed in detail in the paper written by Wilma de Groot, Joop Huij and Weili Zhou (2011) titled "Another look at trading costs and short-term reversal profits". The standard reversal strategy takes the whole universe of stocks into consideration, while this paper limits the stock universe only to large cap stocks so that trading costs could be significantly reduced.
One simple version of this strategy could be described like this: The investment universe consists of 100 biggest companies by market capitalization. We go long on the 10% stocks which have the lowest performances in the last month while going short on the 10% stocks with the highest ones. The portfolio is rebalanced weekly. In the paper, however, strategies with different investment universes and different rebalancing frequencies are all backtested. The results show that, the larger the size of the investment universe, the larger the trading costs caused by extensively trading in small cap stocks which are less liquid; and trading costs become substantially lower when the rebalancing frequency is decreased from daily to weekly, but so do gross returns. In this tutorial, we only use 100 stocks with weekly rebalancing for illustration.
Method
The strategy code mainly consists of three parts: Initialization, Warm Up, and Weekly Rebalancing.
Step 1: Initialization
In the Initialize function, we set up look-back period, beginning cash balance, the size of the investment universe, the number of traded stocks, etc. We use self._numOfWeeks to count?the number of weeks that have passed since the start date, and self._LastDay to indicate whether it is a new week. self._ifWarmUp is true when the self._numOfWeeks is 3, which means as long as next week's data come, we can make our investment decisions.??self._stocks is a list containing all the symbols of the 100 stocks that are taken into consideration. self._values is a dictionary with keys the stock symbols and values the lists containing the prices of stock each week since 4 weeks ago.
def Initialize(self): self.SetStartDate(2005, 1, 1) self.SetEndDate(2017, 5, 10) self.SetCash(1000000) self.UniverseSettings.Resolution = Resolution.Daily self.AddUniverse(self.CoarseSelectionFunction) self._numberOfSymbols = 100 self._numberOfTradings = int(0.1 * self._numberOfSymbols) self._numOfWeeks = 0 self._LastDay = -1 self._ifWarmUp = False self._stocks = [] self._values = {}
Also, we need to use?CoarseSelectionFunction to select 100 qualified stocks from the total stock universe. Here, we sort the total stock universe by each stock's DollarVolume in decreasing order. Then, we select the first 100 stocks that have the largest DollarVolume among all the stocks in the universe.
def CoarseSelectionFunction(self, coarse): sortedByDollarVolume = sorted(coarse, key=lambda x: x.DollarVolume, reverse=True) top100 = sortedByDollarVolume[:self._numberOfSymbols] return [i.Symbol for i in top100]
Step 2:Warm Up
Before we are able to make our investment decisions, we must have at least 4 weeks' data to calculate the performance, i.e. the monthly return, of each stock. Hence, we need a warm up period as long as 3 weeks to accumulate price series, so that once the fourth week's data come we can calculate?the return of the whole month.
self._stocks = [] self.uni_symbol = None symbols = self.UniverseManager.Keys for i in symbols: if str(i.Value) == "QC-UNIVERSE-COARSE-USA": self.uni_symbol = i for i in self.UniverseManager[self.uni_symbol].Members: self._stocks.append(i.Value.Symbol) self._values[i.Value.Symbol] = [self.Securities[i.Value.Symbol].Price]
We get all the symbols of qualified stocks from UniverseManager and keep them in self._stocks which is a list. Then we create for each key in the dictionary self._values a list where its first week's price is stored. And every time new data come, we append the new price to the end of the list of each stock.
for stock in self._stocks: self._values[stock].append(self.Securities[stock].Price)
Step 3:Weekly Rebalancing
After the warm-up period, we calculate monthly returns every week and based on the returns, we make our investment decisions.
returns = {} for stock in self._stocks: newPrice = self.Securities[stock].Price oldPrice = self._values[stock].pop(0) self._values[stock].append(newPrice) returns[stock] = newPrice/oldPrice
Every week when new data come, we use them along with the data four weeks ago to calculate the monthly returns. At the same time, we remove the oldest data from our lists. This step is essential to prevent memory size exceeding the limit.
newArr = [(v,k) for k,v in returns.items()] newArr.sort() for ret, stock in newArr[self._numberOfTradings:-self._numberOfTradings]: self.SetHoldings(stock, 0) for ret, stock in newArr[0:self._numberOfTradings]: self.SetHoldings(stock, 0.5/self._numberOfTradings) for ret, stock in newArr[-self._numberOfTradings:]: self.SetHoldings(stock, -0.5/self._numberOfTradings)
Finally, we sort the returns in increasing order. For the stocks whose monthly returns fall into the first 10% (performed badly in last month), we long them; For those fall into the last 10% (performed well in last month), we short them. Others (between 10% and 90%) will be set to 0.
Summary
In the paper, the look-back period is from 1990 to 2009. However, we want to test whether the strategy is still profitable in the new time period. Hence we use different look-back periods instead. If we begin from 2005 and end in 2017, there will be a total return of 131.50%. Although to some extent the performance of this strategy is dependent on different market situations,?nevertheless, in either situation mentioned above, this strategy could significantly beat the S&P 500 benchmark. Further research and backtesting could be done on different look-back periods, rebalancing frequencies, investment universes, numbers of traded stocks, etc.
References
- Groot, Wilma (2011). Another look at trading costs and short-term reversal profit, page 1,? Online Copy
You can also see our Documentation and Videos. You can also get in touch with us via Chat.
Did you find this page helpful? | https://www.quantconnect.com/tutorials/strategy-library/short-term-reversal-strategy-in-stocks | CC-MAIN-2020-16 | refinedweb | 1,015 | 50.63 |
Project ERROR: Unknown module(s) in QT: location
I have installed and am running Qt Creator 4.3.1 based on Qt 5.9.1 on Ubuntu 18.04. I have QML file says:
import QtLocation 5.6
import QtPositioning 5.6
When I build, it give me this "Unknown module(s) in QT: location" error. I cannot google finding any help talking about this error.
- jsulm Lifetime Qt Champion last edited by
@sjcoder Which Qt version do you use (please note that "based on" in "About QtCreator" dialog only says which version was used to build QtCreator).
Also, did you add QT += location in your pro file?
Yes, I have QT+=location in the pro file.
Hi and welcome to devnet,
What version of Qt are you using to build your application ?
What you showed is the about Qt Creator dialog content which is completely unrelated to the Kit you are using to build your application.
From "About Qt Creator" in Help menu, it says Qt Creator 4.3.1 based on Qt 5.9.1(GCC 5.3.120160406(Red Hat 5.3.1-6), 64 bit) . Built on Jun 20 2017.
Now the error message is :: module "QtLocation" version 5.6 is not installed
import QtLocation 5.6
Am I getting wrong version QtCreator to match for QtLocation 5.6? How to install the right version of QtLocation for my creator?
As already said twice, once by @jsulm and the other one by me, what is shown in this about box is completely irrelevant to the version of Qt you are using to build your application.
As just requested, give the information about the Kit you are currently using to build your application.
From the Build & Run Kits, it show Desktop Qt 5.9.1 64bit(default).
/home/qchen2/Qt5.9.1/5.9.1/gcc_64/bin/qmake
Looks like it's the 5.3 version that comes with your Qt 5.9.1.
Change to 5.3 eliminate that error. However there are new issue came up:
Here is my .qml file imported:
import QtQuick 2.0
import QtQuick.Window 2.0
import QtLocation 5.3
import QtPositioning 5.3
The new error is kind confusing to. | https://forum.qt.io/topic/112956/project-error-unknown-module-s-in-qt-location | CC-MAIN-2022-27 | refinedweb | 371 | 70.29 |
Agenda
See also: IRC log
<trackbot> Date: 07 July 2009
/invite Zakim #xmlsec
<Cynthia> Meeting: XML Security WG Teleconference
Date: 07 July 2009
<Cynthia> Chair: Frederick Hirsch
<Cynthia> Scribe: Cynthia Martin
<Cynthia> Agenda:
<Cynthia> ScribeNick: Cynthia
<fjh>
<fjh> Candidate Recommendation of Widgets 1.0: Digital Signatures.
<scribe> Agenda:
Fredrick: Meeting next week, Brad will scribe next week
<fjh> TPAC registration open
<fjh> Please register:
<fjh> XML Security Thursday and Friday 5-6 November as originally planned.
<fjh>
Fredrick: RNG Schema, we need to identify some people to review/help with work on the Widgets 1.0 conformance testing- do we need to do this or only demonstrate interoperability?
<fjh> Candidate Recommendation of Widgets 1.0: Digital Signatures
<fjh>
Fredrick: Can we help them if they need it?
<fjh> NIST "Transitions" presentation
<fjh>
APPROVE minutes
<fjh>
RESOLUTION: 23 June 2009 minutes approved
<fjh> ACTION-142?
<trackbot> ACTION-142 -- Brian LaMacchia to come up with identifiers and add to the algs doc for the new DSA algorithms -- due 2009-01-20 -- PENDINGREVIEW
<trackbot>
<fjh>
<fjh> noted not defining 224
Brian: One additional identifier,
with explanatory text, optional to implement
... No key length for RSA or DSA in the identifiers
Fredrick: ID in the Interoperability file name for testing instead
Thomas: Comment- Update to algorithm
<fjh>
Brian: ... 3b) XML Signature 1.1, Section 6.3.1 to resolve ACTION-320, Brian
ACTION-320
<fjh> ACTION-320?
<trackbot> ACTION-320 -- Brian LaMacchia to draft language for HMAC section, 6.3.1 -- due 2009-06-23 -- PENDINGREVIEW
<trackbot>
<klanz> Is this a constraint on verifiers as well
<klanz> what is the escalation
<fjh>
Konrad: Clarify the language on the constraints
<fjh> Brian notes were undefined in 1.1
<fjh> Brian hence it does not impact conformance
Brian: We didn't specify what conformance would be in that case (in 1.1)
Thomas: Is this a problem where the fix is worse than the problem?
<klanz> That was my language:
<klanz> In the spirit of RFC2104 [HMAC]
<klanz> :
<klanz> > Applications
<klanz> > of HMAC can choose to truncate the output of HMAC by outputting the t
<klanz> > leftmost bits of the HMAC computation for some parameter t (namely,
<klanz> > the computation is carried in the normal way as defined in section 2
<klanz> > above but the end result is truncated to t bits).
Brian: If you zero pad, is the padding at the beginning or the end?
<klanz>
Konrad: Deal with differentiation.
<klanz> <klanz> Issue 105 and action 297 are actually now on Brian to follow up on
Fredrick: Information not found in minutes, Brian did what WG wanted
<klanz>
Fredrick: May need to consolidate some of the actions
Konrad: Would have preferred that it be in increments of 8
Brian: Under the old specification, we did not have this defined
<fjh> Brian notes original spec was not interoperable because padding was not clearly defined
Brian: You cannot ignore a partial byte, need to verify the bits in the truncation
Konrad: No strong opinion on this
Fredrick: Let's not spend
additional time, send it on the list if it is important
... If there is serious objection, it must be on the list
ACTION-319?
<trackbot> ACTION-319 -- Kelvin Yiu to and Brian to update DH & ECDH sections to take advantage of new KDF section -- due 2009-06-23 -- PENDINGREVIEW
<trackbot>
<fjh> action-319?
<trackbot> ACTION-319 -- Kelvin Yiu to and Brian to update DH & ECDH sections to take advantage of new KDF section -- due 2009-06-23 -- PENDINGREVIEW
<trackbot>
Brian: Sent information on list, but it was later in the day
<fjh>
Brian: Refactor the section to handle KDF
<fjh>
Brian:This is updated in revision
1.30: DH key agreement section now split into new and legacy
KDF sections.
... Absence or presence of KA-Nonce is the trigger between the two options.
... Require this for interoperability to support new and legacy KDF
Fredrick: Is there no way to do this without a nonce?
Brian: That is correct
... Should be looking at the XML Encryption Schema
<fjh>
Brian: The nonce and digest
method were under the any
... You have to know the key agreement algorithm before you know anything else
... I had back conversations with Kelvin, came up with this to distinguish between new and legacy
Fredrick: What about using an attribute?
Brian: No, we don't want to mess with the schema
<fjh> Scott: could use two different algorithm URIs
Kelvin: If you define a new URI (DH with mode), it would benefit this
Fredrick: Rather to be more specific
<scantor> don't feel strongly. but I think a second URI is slightly cleaner
Fredrick: If we create a new URI, we are splitting it and maintain the old one for backward compatibility
Kelvin: Benefit of new URI, better for new applications
Brian: Could be restructured, the
old ID must use the legacy KDF and the new would not
... This would not be a huge change, it would be ok
Fredrick:We don't have to find the nonce
Brian: Would still have to
support both (any)
... Happy to make that change, and define new KDF for that
<fjh>Continued discussion to use new URI for new KDF dh so that not rely on presence of nonce to determine approach
<fjh> benefit that old implementation won't break on new form when nonce is not present, yet URI the same
<fjh> I believe it is better to be explicit where we can
<Cynthia> ACTION: Brian to update ACTION 319 for explicit URI [recorded in]
<trackbot> Created ACTION-326 - Update ACTION 319 for explicit URI [on Brian LaMacchia - due 2009-07-14].
ACTION-283?
<trackbot> ACTION-283 -- Thomas Roessler to update algorithm xref draft to note new status of sha-1 -- due 2009-05-19 -- OPEN
<trackbot>
<fjh> action-283?
<trackbot> ACTION-283 -- Thomas Roessler to update algorithm xref draft to note new status of sha-1 -- due 2009-05-19 -- OPEN
<trackbot>
<fjh> action-283 closed
<trackbot> ACTION-283 Update algorithm xref draft to note new status of sha-1 closed
<fjh> notes on using XMLSpec tool
<fjh>
<klanz> did you add it to the members page?
<klanz> the xmlspec intro
<fjh>
Fredrick: Brian updated the DSS security warning, Cynthia sent out comments
<fjh> Add "bits" in two places in "defined to be 1024, 2048 or 3072 and
<fjh> the corresponding DSA q value is defined to be 160, 224/256 and 256
<fjh> respectively" yielding "defined to be 1024, 2048 or 3072 bits, and the
<fjh> corresponding DSA q value is defined to be 160, 224/256 and 256 bits
<fjh> respectively
<fjh> in 2nd paragraph change "required" to "requires"
RESOLUTION: Accept changes for Action 283
<Cynthia> ACTION: Update Action 283 [recorded in]
<trackbot> Sorry, couldn't find user - Update
ACTION-325?
<trackbot> ACTION-325 -- Cynthia Martin to propose changes to Signature references -- due 2009-06-30 -- OPEN
<trackbot>
Cynthia: Yes, I am still working on it, I hope it will be done today
<fjh> ACTION: bal to update DSS security warning [recorded in]
<trackbot> Created ACTION-327 - Update DSS security warning [on Brian LaMacchia - due 2009-07-14].
ACTION-324?
<trackbot> ACTION-324 -- Cynthia Martin to review for normative and informative -- due 2009-06-30 -- CLOSED
<trackbot>
<fjh> update references in XML Encryption 1.1
Fredrick: Cynthia sent out comments to the list
<fjh>
<fjh>
<fjh> move RIPEMD-160 reference to normative section , used in 5.8.5
<fjh> Move MIME reference to normative section, used for MimeType value definitions
Fredrick: Accept this and put it in draft
Cynthia: Comments are mostly related to RFC and link changes, no problems
<fjh>
RESOLUTION: Accept updates and recommended changes to XML Encryption 1.1 references
<fjh> ACTION: fjh to update xml signature references [recorded in]
<trackbot> Created ACTION-328 - Update xml signature references [on Frederick Hirsch - due 2009-07-14].
Fredrick: Would like to publish at next call
Cynthia: Will have it done this week
Review and update XML Signature and XML Encryption explain documents
Fredrick: started to update the explanation documents, need to work
Cynthia: I can look at reviewing this and help you out
<fjh> ACTION: fjh review and update explain documents for xml signature and encryption [recorded in]
<trackbot> Created ACTION-329 - Review and update explain documents for xml signature and encryption [on Frederick Hirsch - due 2009-07-14].
<fjh> ACTION: tlr to update algorithms doc per [recorded in]
<trackbot> Created ACTION-330 - Update algorithms doc per [on Thomas Roessler - due 2009-07-14].
<klanz> Re ACTION-320:
Updated since last published: XML Signature 1.1, XML Encryption 1.1,XML Security Algorithms Note, XML Security Generic Hybrid Ciphers (FPWD), Best Practices,XML Signature Transform Simplification: Requirements and Design
Fredrick: Where are we with the
Security Generic Hybrid Ciphers (FPWD)
... Want to get this out of the way, finish it up
Brian: Put a second working draft out, should not be a final doc
Fredrick: This is dated, need to be clear on the public page
<fjh>
Fredrick: Need to look at roadmap
to check publication dates
... Still open issues with this- may have to defer it and wait for comments
... agree to publish this next week, get it out for comments
Cynthia: Yes, sounds reasonable
<fjh>
Fredrick: Sent comments to the list
Pratik: Review of draft, Canonical XML Version 2.0 is a major rewrite of Canonical XML Version 1.1 to address issues around performance, streaming, hardware implementation, robustness, minimizing attack surface, determining what is signed and more. It also folds the 2.0 version of Exclusive Canonicalization into same document
<fjh> I had a few questions and comments:
Pratik:Discussion on section 1.4.1 Performance
<fjh> comment - might want to mention qnames in context explicitly in requirements section
Pratik:Discussion on section 2.1 Data Model
<scantor> comment - I would add Simplicity to the title of the bullet on Robustness
Pratik:Discussion on section 2.2
Parameters
Instead of separate algorithms for each variant of canonicalization, this specification goes with the approach of a single algorithm, which does slightly different things depending on the parameters.
<fjh> Pratik notes that trimwhitespace could list nodes to trim, but now is simply true false
Pratik:Discussion on section 2.2
Parameters: prefixRewrite- how to assign values to prefix
... 2.2 Parameters: expandEntities- globabally define entities
... 2.2 Parameters: next four parameters- how to deal with special attributes
<Zakim> Thomas, you wanted to note that xml:id must not be inherited
Thomas: Emulate existing spec as a requirement
<klanz> how do you assure subtree and list of exclusion elements and attributes are so disjoint that there aren't any re-inclusions
Discussion on xml:id requirement- drop or not to drop
<tlr> +1 to the meta comment
Fredrick: prefer to drop it
Konrad: may not want to re-sign large data
Fredrick: don't want to have to re-calculate/re-sign
<fjh> proposal to drop xmlIdAncestors parameter
<fjh> Scott notes prefixRewrite could be dropped
<fjh> or asks why it was needed
<fjh> Pratik notes utility for java object conversions
Brian: Have to go through normalization of prefixes, not required
<fjh> Issue: is normalization of prefixes a goal for 2.0 c14n
<trackbot> Created ISSUE-136 - Is normalization of prefixes a goal for 2.0 c14n ; please complete additional details at .
Brian: Robustness issues- simplicity/interoperability
Fredrick: Profile this down, is that correct?
Pratik: yes
<fjh> Scott proposes simplification here
<fjh> +1 from tlr
Thomas: Worried if we have a large number of options/features, it may be a headache later
<fjh> Scott also notes more to test, try to reduce it all
Thomas: If we can ID parameters that are likely to be used in practice, make choice on parameters
<fjh> +1 to simplification
<fjh> klanz notes options needed for implementations that want certain features
Fredrick: Go through all possibilities on list and try to get things simpler
<fjh> Pratik notes qnames in content use case for full inclusive
Pratik: Full inclusive canonicalization, way of avoiding the problem, inclusive- don't have to think about it
<Gerald-e> WS-i Basic security profile specification uses "Exclusive C14N without comments for canonicalization"
Fredrick: Go on now
<fjh> Scott notes xsiTypeAware can be orthogonal to prefix rewriting
<fjh>Discussion on section 2.3.5
Pratik: 2.3.5 Other ideas
considered
... 2.3.5- Have another parameter listing other element / attribute names that can have qnames, besides xsi:type. Or simply search all text content for qname.
... 2.3.5- Significant white space: Have a parameters listing elements in which whitespace is significant. Instead of listing individual element names, and entire target namespace URI can be specified, e.g. in many elements in xhtml namespace whitespace is significant
<klanz> I say: .... is say a prefix ?
Fredrick: Scanning for :
Pratik: This is difficult, may be prefix or data/text
<fjh> Hal notes could be URI
Konrad: There is a paper regarding this issue, can be solved, but not easily
Cynthia: Can we get a link/reference to this paper?
Thomas: A major rework of XML is complex and would take a long time.
<klanz>
Pratik: Finished with parameters, make a list of supported parameters
<klanz> sure, but if one does not complain there is never a change
<tlr> s/a long time/a very, very, very long time/
Fredrick: Do we need backward compatability to v1.0? Is it acceptable to break this?
Brian: Goal is functional parity not backward compatibility?
Fredrick: Will it be handled the same way- handle different cases differently
Pratik: Not difficult to support
v1.0, may just ignore it (additional items)
... 2.3 Processing Model for DOM- string parser
<fjh> Pratik considering adding section for streaming but do not have standard for streaming to base on
Pratik:Discussion on section 2.3 Processing Model- The basic canonicalization process consist of traversing the tree and outputting octets for each node. The algorithm here is presented in pseudo code using a recursive function to traverse the tree.
<fjh> q_
<klanz> how do you assure subtree and list of exclusion elements and attributes are so disjoint that there aren't any re-inclusions ?
Pratik: Go through the processing
models at a high level
... Section 3.1, 3.2
... Section 2.3.3- Added information, DOM concept
... Section 2.3.3 Namespace context- Hash table
... 2.3.4 Output rules
Fredrick: 2 questions- streaming use case, difficult to add to document as there is no standard to base it on
Pratik: Not sure how to put it in
Fredrick:Is this a problem or straightforward, it is an important use case
<klanz> what about SAX/Stax events agnostic of push pull
Pratik: Not a problem
Fredrick: Original spec was written in a straight forward model (procedures), are people ok with pseudo-code?
Scott: In favor of it but people will complain if it doesn't work
<scantor> that was scantor, not Brian, sorry
Frederick: Need to be clear on behavior
Fredrick: Using the xpath model, ,makes it somewhat more confusing
Thomas: Worried that if we only have pseudo-code, mixing implementation behavior with specification
Scott: Not against the idea, but may have issues, hard to find the text around the pseudo-code
Pratik: Most of the code will have reference, the information will remain exactly the same
Fredrick: When we have an example
of an algorithm, you want wording (warning) to show intent not
exact implementation
... next step- signature example
Brian: Is this a stand alone document? May be an issue
<klanz> If you read the bottom of you can see that declarative can be horrible as well
Konrad: In favor of pseudo-code approach, in the past there were few examples there the text was contradicting itself
<fjh> i think pseudo-code can be very useful for being clear as long as not taken as implementation
<fjh> klanz +1 to pseudo-code
<fjh> klanz need to decide what is normative
Cynthia: We need to add the warning text up front
<tlr> +1 to that structuring
Fredrick: Get down what we want now, look at the choices, then determine what we want
<fjh> let us take this work forward with what we have, look at pieces, then review normative language approach
Proposed New E07 for ISSUE110, "visibly utilizes"
Fredrick: When can this be worked?
Pratik: Next week
<klanz> how do you assure subtree and list of exclusion elements and attributes are so disjoint that there aren't any re-inclusions ?
Konrad: One comment on proposal, nodes of sub-trees, exclusion of attributes- sub-tree handling
Pratik: Have a solution (2.3.3.)
<fjh> request to Pratik to clarify constraints and behavior on inappropriate subtree inclusion
<fjh> E02
<fjh>
<fjh> E07
<fjh>
Scott: Someone needs to look at the language[
<fjh> ACTION: Konrad to review E07 and E02 for Exclusive C14n [recorded in]
<trackbot> Created ACTION-331 - Review E07 and E02 for Exclusive C14n [on Konrad Lanz - due 2009-07-14].
<Cynthia> ACTION: Konrad review wording [recorded in]
<trackbot> Created ACTION-332 - Review wording [on Konrad Lanz - due 2009-07-14].
<fjh> issue-7?
<trackbot> ISSUE-7 -- Can exi be used by xmlsec wg as part of solution -- OPEN
<trackbot>
<fjh> issue-9?
<trackbot> ISSUE-9 -- Review WS-I BSP constraints on DSig -- OPEN
<trackbot>
<fjh> issue-7 closed
<trackbot> ISSUE-7 Can exi be used by xmlsec wg as part of solution closed
<fjh> addressed in C14n 2.0 draft parameter
<fjh>
<fjh> Scott notes work around for backward compatibility by providing library to map old APIs to new APIs
<fjh>
Scribe; Cynthia
<Cynthia> Scribe: Cynthia
<klanz> ran out of voip credit ... will stay on the chat
<klanz> do you want me to dial in again
Cynthia: Correct
Fredrick: Thomas: XML Security
library?
... Believe we covered almost everything
<fjh>
Fredrick: did we forget anything?
<fjh> issue-134?
<trackbot> ISSUE-134 -- Camellia algorithm for section of 5.2 Block Encryption Algorithm and 5.6 Symmetric Key Wrap -- OPEN
<trackbot>
Cynthia: Correct, it should be closed
<fjh> issue-134 closed
<trackbot> ISSUE-134 Camellia algorithm for section of 5.2 Block Encryption Algorithm and 5.6 Symmetric Key Wrap closed
<fjh> added to algorithms document
Fredrick: Time to stop call | http://www.w3.org/2009/07/07-xmlsec-minutes.html | CC-MAIN-2016-26 | refinedweb | 3,025 | 52.73 |
Read/write command history from/to a file. More...
#include <stdbool.h>
#include <stdlib lib.h.
Type to differentiate different histories.
Saved lists of recently-used:
Definition at line 46 of file lib.h.
Add a string to a history.
Definition at line 486.
Free all the history lists.
Definition at line 441 of file history.c.
Create a set of empty History ring buffers.
This just creates empty histories. To fill them, call mutt_hist_read_file().
Definition at line 468.
Read the History from a file.
The file
$history_file is read and parsed into separate History ring buffers.
Definition at line 599 of file history.c.
Move the 'current' position to the end of the History.
After calling mutt_hist_next() and mutt_hist_prev(), this function resets the current position ('cur' pointer).
Definition at line 585 of file history.c.
Save a temporary string to the History.
Write a 'scratch' string into the History's current position. This is useful to preserver a user's edits.
Definition at line 669 of file history.c.
Find matches in a history list.
Definition at line 412 of file history.c.
Select an item from a history list.
Definition at line 123 of file dlghistory.c. | https://neomutt.org/code/history_2lib_8h.html | CC-MAIN-2021-49 | refinedweb | 199 | 64.27 |
Add or modify a dictionary entry using shareable strings
#include <sys/strm.h>
strm_dict_t* strm_dict_set_rstr(strm_dict_t *dict, strm_string_t *key, strm_string_t *value)
This function creates a new dictionary that is an exact replica of the one specified by dict, except that the entry specified by key is added or modified. The entry's value is set to value.
The shareable string handles in the key and value arguments are consumed by the call, meaning you should not destroy them later because the dictionary will do so at the appropriate time. The original dictionary handle is destroyed on success but preserved on failure.
This function is equivalent to strm_dict_set(), except that it may be more efficient, especially if you use clones of the same key or value repeatedly.
On success, a handle to the new dictionary. On failure, a null pointer (if you provided an out-of-range index, errno is set to ESRCH). | https://www.qnx.com/developers/docs/7.1/com.qnx.doc.libstrm/topic/strm_dict_set_rstr.html | CC-MAIN-2022-27 | refinedweb | 152 | 52.9 |
I'm just tarting with wxPythjon. I wrote this simple program to get some experience with panels.. It wants to open a frame and add a number of euivalent panels, each with an inactive button. And it does seem to do tht (the sizing is fixed because it's only a toy). The problem I see [working within PythonWin, inside Parallels on a Mac) is that if I instantiate the frame with more than one panel, the X button doen't close the frame and, if I click anyplace withing the frame, the frame and the PythonWin app both close. Help appreciated
<CODE>
#!/usr/bin/env python
import wx
""" Create many panels with a button
However, with more than one panel the frams doesn't close properly"""
class FrameWithButton(wx.Frame):
def __init__(self, number_of_panels=1):
wx.Frame.__init__(self,None,-1,"Frame subclass",size=(500,500))
self.panels=[]
for i in range(0, number_of_panels):
self.panels.append(wx.Panel(self, -1,size=(90,90),pos=(90*i,90*i)))
self.buttons=[]
for i in range(0, number_of_panels):
self.buttons.append( wx.Button(self.panels,-1,"Ignore me"))
class App(wx.App):
def OnInit(self):
self.frame = FrameWithButton(2) #Here's where the frame gets instantiaded
self.frame.Show()
self.SetTopWindow(self.frame)
return True
if "__main__" == __name__:
app = App()
app.MainLoop()
</CODE> | https://www.daniweb.com/programming/software-development/threads/164474/wxpython-multiple-pal-nels-in-one-frame | CC-MAIN-2017-30 | refinedweb | 223 | 52.36 |
Code Effects solution comes with rich client functionality that can be used in client-centric web applications. Aside from the server-side code that helps it process business rules, the Rule Editor is written as a client-side class that encapsulates a lot of functionality, and expresses it through a relatively small number of public functions available to any other client code. Code Effects client script declares only two global (public) variables, $rule and $ce, and keeps everything else inside the scope of its instance. This makes it safe to add Rule Editor to any markup with any kind of client code.
Rule Editor is a self-contained library. It doesn't depend on any client or server frameworks or libraries. It is compatible with all modern versions of all major browsers.
The main JS file that declares Rule Editor is available here in .txt format. Refer to our demo projects for details on how to reference and use this script on each .NET web platform.
Global Shortcuts
var codeeffects = $ce("divRuleEditor");
This is a global shortcut to the $rule.Context.getControl() function that can be used to get an instance of a Rule Editor by the client id of its hosting DIV element.
This global shortcut is declared to make the footprint of CodeEffects namespace smaller.
Call this function once after the current DOM is loaded. Calling this function creates a brand new instance of Rule Editor. It throws an Error object with the value of CL85 in its message if an instance of Rule Editor with the same DIV.id already exists in the current context. Use the $ce shortcut instead if you need to get a reference to an existing instance of Rule Editor. Download related demo project to see implementation details of this function.
var codeeffects = $ce("divRuleEditor");
codeeffects.onBlur( function () { alert("The Rule Area is blurred"); } );
Gets invoked when the Rule Area lost its focus (i.e. the first mouse click or touch gesture on any DOM element of the current document that is not a child node of the main DIV container of the Rule Area while it is focused). Subscribe to the blur event of the Rule Area by caling this handler and passing it a callback function as its only parameter. Unsubscribe by calling this handler without passing it any parameters or passing a null as its only parameter.
var codeeffects = $ce("divRuleEditor");
codeeffects.onFocus( function (el) { alert("The Rule Area is focused. Target element: " + el.id); } );
Gets invoked when the Rule Area received focus (i.e. the first mouse click or touch gesture on any child node of the main DIV container of the Rule Area while it is not focused). Subscribe to the focus event of the Rule Area by caling this handler and passing it a callback function as its only parameter. Unsubscribe by calling this handler without passing it any parameters or passing a null as its only parameter.
Removes all elements of the current rule from the Rule Area.
Calling this function after deleting a rule is necessary in order to remove that rule from the Rules and context menus. See the related demo project for details on managing rules in Rule Editor.
Removes ability to add new rules or modify the rule currently loaded in the Rule Area.
Disposes all resources used by Rule Editor and removes it from the current context.
Restores ability to add new rules or modify the rule currently loaded in the Rule Area.
Returns a JSON string that contains the current rule, and whether or not it’s valid. Returns an empty object if the Rule Area is empty.
Returns True if the user altered either an existing rule after it has been loaded into the Rule Area or a new rule after its creation has been initiated. Otherwise, returns False.
Returns True if the Rule Area currently contains no rule elements. Otherwise, returns False.
Returns True if the loaded rule is of the evaluation type, or if the rule author selected the New evaluation type rule option from the Rules menu of the Toolbar. This function does not check what kind of rule elements the rule author has added to the Rule Area so far.
Returns the string ID of the current rule assigned by Rule Editor. The editor calls .NET's System.Guid.NewGuid().ToString() to get new IDs for rules. Returns null if no rules have been loaded into the Rule Editor yet, or if Rule Editor hasn't assigned an ID to the current rule yet, or if the Rule Area is empty.
Call this function to load data of the invalid rule into the Rule Editor.
Call this function to load a rule into the Rule Editor.
Call this function to load Rule Editor client settings. You also need to call this function every time the rule author requests a change in any of the Rule Editor settings such as Help String visibility and so on.
Calling this function after saving a new rule or updating an existing one is necessary in order to refresh the Rules and context menus with the new or updated values. Download related demo project to see for details on saving rules.
Call this function while initializing your page to tell Rule Editor which functions to call when rule author wants to load, delete, or save a rule. Don't call it if Toolbar is disabled. | https://codeeffects.com/Doc/Business-Rule-Ajax-Api | CC-MAIN-2021-31 | refinedweb | 905 | 64.3 |
This page contains an archived post to the Java Answers Forum made prior to February 25, 2002.
If you wish to participate in discussions, please visit the new
Artima Forums.
Java doesn't give you all system properties
Posted by Kishori Sharan on November 02, 2000 at 10:03 AM
Hi Anuj Run Test.java attached file to get some of the things you wanted. I have sent you a DLL and .java file using which you can get other things like Drive Label, Disk free space etc.
ThanxKishori
/////////////////Test.javaimport java.io.* ;import java.net.* ;
public class Test { public static void main ( String[] args ) { // To get all drives on your computer File f[] = File.listRoots ( ) ;
for ( int i = 0 ; i < f.length ; i++ ) { System.out.println ( f[i] ) ; }
// To get labels of drives and file system /* You can't get it just using java. Write your own platform specific program I have sent you the DLL which uses JNI to get all these things on windows */ // To get Free system memory only. However, to get free disk space, call // the native method in DLL long freeMemory = Runtime.getRuntime().freeMemory ( ) ; System.out.println ( " Free Memory:" + freeMemory ) ; //To get the computer name try { String computerName = InetAddress.getLocalHost( ).getHostName ( ) ; System.out.println ( "Computer Name: " + computerName ) ; } catch ( Exception e ) { System.out.println ( " Cannot get computer name" ) ; } } } | https://www.artima.com/legacy/answers/Nov2000/messages/13.html | CC-MAIN-2018-26 | refinedweb | 223 | 66.23 |
Description
Gigel has a strange “balance” and he wants to poise it. Actually, the device is different from any other ordinary balance.
It orders two arms of negligible weight and each arm’s length is 15. Some hooks are attached to these arms and Gigel wants to hang up some weights from his collection of G weights (1 <= G <= 20) knowing that these weights have distinct values in the range 1..25. Gigel may droop any weight of any hook but he is forced to use all the weights.
Finally, Gigel managed to balance the device using the experience he gained at the National Olympiad in Informatics. Now he would like to know in how many ways the device can be balanced.
Knowing the repartition of the hooks and the set of the weights write a program that calculates the number of possibilities to balance the device.
It is guaranteed that will exist at least one solution for each test case at the evaluation.
Input
The input has the following structure:
• the first line contains the number C (2 <= C <= 20) and the number G (2 <= G <= 20);
• the next line contains C integer numbers (these numbers are also distinct and sorted in ascending order) in the range -15..15 representing the repartition of the hooks; each number represents the position relative to the center of the balance on the X axis (when no weights are attached the device is balanced and lined up to the X axis; the absolute value of the distances represents the distance between the hook and the balance center and the sign of the numbers determines the arm of the balance to which the hook is attached: ‘-’ for the left arm and ‘+’ for the right arm);
• on the next line there are G natural, distinct and sorted in ascending order numbers in the range 1..25 representing the weights’ values.
Output
The output contains the number M representing the number of possibilities to poise the balance.
Sample Input
2 4
-2 3
3 4 5 8
Sample Output
2
Solution
力矩:力和力臂的乘积。
科科
#include <iostream> #include <memory.h> #include <stdio.h> using namespace std; int cost[30], weight[30]; int dp[25][15001]; int n, m; int main(){ while(~scanf("%d %d", &n, &m)){ memset(dp, 0, sizeof(dp)); for(int i = 1; i <= n; i++) scanf("%d", &cost[i]); for(int i = 1; i <= m; i++) scanf("%d", &weight[i]); dp[0][7500] = 1; for(int i = 1; i <= m; i++) for(int j = 0; j <= 15000; j++) if(dp[i-1][j]) for(int k = 1; k <= n; k++) dp[i][j+weight[i] * cost[k]] += dp[i-1][j]; printf("%d", dp[m][7500]); } return 0; } | https://blog.csdn.net/LeongHouHeng/article/details/52349075 | CC-MAIN-2018-30 | refinedweb | 454 | 62.21 |
container management platform like Kubernetes.
What is a container management platform?
Imagine you have a nice, modern application based on microservices, and you have decided to deploy each microservice into a separate container. Thus your entire application deployment will consist of a relatively large number, maybe more than hundred, individual containers. Each of these containers needs to be deployed, configured and monitored. You need to make sure that if a container goes down, it is restarted and traffic is diverted to a second instance. You need to distribute your load evenly. You need to figure out which container should run on which virtual or physical machine. When you upgrade or deploy, you need to take dependencies into account. If traffic reaches a certain threshold, you would like to scale, either vertically or horizontally. And so forth…
Thus managing a large number of containers in a production-grade environment requires quite some effort. It would be nice to have a platform that is able to
- Offer loadbalancing, so that incoming traffic is automatically routed to several instances of a service
- Easily set up container-level networks
- Scale out automatically if load increases
- Monitor running services and restart them if needed
- Distribute containers evenly across all nodes in your network
- Spin up new nodes or shut down nodes depending on the traffic
- Manage your volumes and storage
- Offer mechanisms to upgrade your application and the platform and / or rollback upgrades
In other words, you need a container management platform. In this post – and in a few following posts – I will focus on Kubernetes, which is emerging as a de facto standard for container management platforms. Kubernetes is now the underlying platform for industry grade products like RedHat OpenShift or Rancher, but can of course be used stand-alone as well. In addition, all major cloud providers like Amazon (EKS), Google (GKE), Azure (AKS) and IBM ( IBM Cloud Kubernetes Service) offer Kubernetes as a service on their respective platforms.
Basic Kubernetes concepts
When you first get in touch with the world of Kubernetes, the terminology can be a bit daunting – there are pods, clusters, services, containers, namespaces, deployments, and many other terms that will be thrown at you. Time to explain some of the basic concepts very high level – we will get in closer contact with most of them over the next few posts.
The first object we need to understand is a Kubernetes node. Essentially, a node is a compute ressource, i.e. some sort of physical or virtual host on which Kubernetes can run things. In a Kubernetes cluster, there are two types of nodes. A master node is a node on which the Kubernetes components itself are running. A worker node is a node on which application workloads are running.
On each worker node, Kubernetes will start several agents, for instance the kubelet which is the primary agent responsible for controlling a node. In addition to the agent, there are of course the application workloads. One might suspect that these workloads are managed on a container basis, however, this is not quite the case. Instead, Kubernetes groups containers into objects called pods. A pod is the smallest unit handled by Kubernetes. It encompasses one or more containers that share resources like storage volumes, network namespaces and the same lifecycle. It is quite common to see pods with only one application container, but one might also decide to put, for instance, a microservice and a database into one pod. In this case, when the pod is started, both containers (the container containing the microservice and the container containing the database) are brought up on the same node, can see each other in the network under “localhost” and can access the same volumes. In a certain sense, a pod is therefore a sort of logical host on which our application containers run. Kubernets assigns IP addresses to pods, and applications running in different pods need to use these IP addresses to communicate via the network.
When a user asks Kubernetes to run a pod, a Kubernetes component called the scheduler identifies a node on which the pod is then brought up. If the pod dies and needs to be restarted, it might be that the pod is restarted on a different node. The same applies if the node goes down, in this case Kubernetes will restart pods running on this container on a different node. There are also other situations in which a pod can be migrated from one node to a different node, for instance for the purpose of scaling. Thus, a pod is a volatile entity, and an application needs to be prepared for this.
Pods themselves are relatively dumb objects. A large part of the logic to handle pods is located in componentes called controllers. As the name suggests, these are components that control and manage pods. There are, for instance, special controllers that are able to autoscale the number of pods or to run a certain number of instances of the same pod – called replicas. In general, pods are not started directly by a Kubernetes user, but controllers are defined that manage the pods life cycle.
In Kubernetes, a volume is also defined in the context of a pod. When the pod ceases to exist, so does the volume. However, a volume can of course be backed by persistent storage, in which case the data on the volume will outlive the pod. On AWS, we could for instance mount an EBS volume as a Kubernetes volume, in which case the data will persist even if we delete the pod, or we could use local storage, in which case the data will be lost when either the pod or the host on which the pod is running (an AWS virtual machine) is terminated.
There are many other objects that are important in Kubernetes that we have not yet discussed – networks, services, policies, secrets and so forth. This post is the first in a series which will cover most of these topics in detail. My current plans are to discuss
- Creating and maintaining Kubernetes clusters using Python (part I, part II)
- Working with pods and deployments
- Exposing services to the outside world – services and load balancers
- A deep dive into Kubernetes networking
- Ingress rules and Ingress controllers
- Kubernetes storage concepts
- Stateful sets
- Custom resource definitions
- Custom controllers
Thus, in the next post, we will learn how to set up and configure AWS EKS to see some pods in action (I will start with EKS for the time being, but also cover other platforms like DigitalOcean later on).
3 thoughts on “Kubernetes – an overview” | https://leftasexercise.com/2019/03/18/kubernetes-an-overview/ | CC-MAIN-2021-31 | refinedweb | 1,103 | 58.11 |
In my last article DateValidator using SNTP, I showed how to use the Simple Network Time Protocol (SNTP) to get the date and time from a server rather than relying on the local system time to check that the expiry date of an application hadn't been exceeded. The partial implementation of the protocol in that article was sufficient because of the low precision needed, but I felt I had 'cheated' a little, so this article puts that right by presenting a full implementation of an SNTP client, with the exception of the optional (and apart from in special circumstances, not needed) Key Identifier and Message Digest fields, plus I'm only considering unicast mode of operation (not anycast or multicast).
I have attached source code in both C# and VB. The C# code has been pretty extensively tested and should be bug free - let me know if it's not!
I'm not a VBer, so the VB code should be treated as a starting point only, but it seems to work OK and hasn't crashed for me yet. The Components project must be compiled with Remove integer overflow checks: On. If you find any problems and have a fix, let me know and I'll update the code accordingly, but please understand I am not supporting the VB version. It is here for your convenience only!
SNTP, as its name implies, is a protocol for transferring date and time information. The main purpose is for time synchronization. For example, Windows uses this (occasionally!) to keep your computer's clock updated, but it could be used on a LAN with one machine acting as a server, to make sure all client machines are perfectly 'synced' with the server, and therefore each other, in time critical applications. It can also be used for validating times as I did in my aforementioned article. In fact, any application that uses dates and/or times could find a use for SNTP. It uses UTC (Coordinated Universal Time) for all its data, and .NET conveniently provides methods to easily convert between UTC and local time. It uses UDP on port 123, but there are some (non standard servers) that operate using TCP/HTTP on different ports. As they are non standard, they are ignored here.
If you're not interested in the nitty-gritty, deep and dirty of SNTP, skip the rest of this section and move on.
SNTP is a simple system (in the normal unicast mode) that consists of one packet of bytes being sent by a client, and one packet then being received. Each packet consists of 48 bytes (68 if Key Identifier and Message Digest are used). The list below explains each byte's meaning.
NB: The RFCs list these in Big Endian format, whereas I'm using Little Endian as they are when we read them from .NET.
The Stratum, or how far we are away from the primary reference source.
The value 0 is unspecified (this is the actual clock source). 16 to 255 are reserved for future use. A stratum of 1 is considered a primary source such as an atomic clock, GPS, radio etc. If a server synchronizes itself with a stratum 1 server, it is a stratum 2 as it's one step more away. This carries on all the way up to 15.
Poll Interval, the time in seconds between the server re-syncing with its source.
To stop servers being overrun with constant requests, polling is recommended to be carried out infrequently. We need to remember this for our own clients and should probably not check the same server more than every 64 seconds (the recommended 'default' value). The actual time is calculated by 2 ^ value.
Precision, the precision of the server's clock. This is calculated by 2 ^ value.
Root Delay, the round trip delay to the primary reference source (in stratum 1, if it's not already a stratum 1 server) from the server, and back again. This is a 32 bit fixed point value, 16 for the integer part and 16 for the fractional part giving fine precision.
Root Dispersion, the nominal error relative to the primary reference source. 32 bits as in Root Delay above.
Reference Identifier, this identifies the reference in a variety of ways depending on the version being used and the stratum. If it's a stratum 1 source, this is 4 characters identifying the type of clock. If it's a stratum 2 to 15 (secondary), then:
Reference Timestamp, the time at which the server's clock was last corrected. This is a 64 bit fixed point value, 32 for the integer part and 32 for the fractional part giving extremely fine precision. In fact, this precision is far greater than can be handled in .NET which can be accurate to 10 nanoseconds at best.
Originate Timestamp, the time at which the request departed the client for the server. We don't set this in the client. Instead, we use the transmit timestamp, and the server copies this into the originate timestamp in its reply. 64 bits as in reference timestamp.
Receive Timestamp, the time at which the request arrived at the server. 64 bits as in reference timestamp.
Transmit Timestamp, the time at which the reply departed the server for the client, or the request departed the client for the server. 64 bits as in reference timestamp.
Here is a graphical version of all that!
| Byte + 3 | Byte + 2 | Byte + 1 | Byte + 0 |
7 6 5 4 3 2 1 0 7 6 5 4 3 2 1 0 7 6 5 4 3 2 1 0 7 6 5 4 3 2 1 0
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Precision | Poll | Stratum |LI | VN |Mode | 0 - 3
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Root Delay | 4 - 7
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Root Dispersion | 8 - 11
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reference Identifier | 12 - 15
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Reference Timestamp (64) | 16 - 23
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Originate Timestamp (64) | 24 - 31
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Receive Timestamp (64) | 32 - 39
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Transmit Timestamp (64) | 40 - 47
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Key Identifier (optional) (32) | 48 - 51
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| |
| Message Digest (optional) (128) | 52 - 68
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
There is one further timestamp that is relevant but not stored in the packet, although I have created a property for this in the SNTPData class.
SNTPData
The RFCs give the formulae for delay calculation as:
There are also properties for these in the SNTPData class.
The SNTPClient class/component is in the DaveyM69.Components namespace, and all the related classes are in DaveyM69.Components.SNTP. This compiles to Components.dll, which you will find in the Release directory in the download if you don't want to build it yourself. It uses .NET framework v2.
SNTPClient
DaveyM69.Components
DaveyM69.Components.SNTP
The SNTPClient has a few properties to control how it behaves. You can set whether to update the local time, the NTP/SNTP version to use, and of course, the remote server to query along with a timeout value. The QueryServerAsync method is what starts the ball rolling. This creates a new worker thread which calls the private QueryServer method where the real work gets done.
QueryServerAsync
QueryServer
private QueryServerCompletedEventArgs QueryServer()
{
QueryServerCompletedEventArgs result =
new QueryServerCompletedEventArgs();
Initialize();
UdpClient client = null;
try
{
// Configure and connect the socket.
client = new UdpClient();
IPEndPoint ipEndPoint = RemoteSNTPServer.GetIPEndPoint();
client.Client.SendTimeout = Timeout;
client.Client.ReceiveTimeout = Timeout;
client.Connect(ipEndPoint);
// Send and receive the data, and save the completion DateTime.
SNTPData request = SNTPData.GetClientRequestPacket(VersionNumber);
client.Send(request, request.Length);
result.Data = client.Receive(ref ipEndPoint);
result.Data.DestinationDateTime = DateTime.Now.ToUniversalTime();
// Check the data
if (result.Data.Mode == Mode.Server)
{
result.Succeeded = true;
// Call other method(s) if needed
if (UpdateLocalDateTime)
{
UpdateTime(result.Data.LocalClockOffset);
result.LocalDateTimeUpdated = true;
}
}
else
{
result.ErrorData = new ErrorData(
"The response from the server was invalid.");
}
return result;
}
catch (Exception ex)
{
result.ErrorData = new ErrorData(ex);
return result;
}
finally
{
// Close the socket
if (client != null)
client.Close();
}
}
First of all, we initialize the client, then connect to the server. We then send a request packet and wait for a response and save the time at which it was received. We then validate the data by simply checking the 3 bits of byte 0 to make sure it's set to server (4). If all is OK and the local date and time are to be updated, we call the necessary method. As you can see, all the results of the query, including any errors/exceptions (apart from threading exceptions which are allowed to escalate to the host application), are stored in a QueryServerCompletedEventArgs instance. This is passed back to the original thread and the QueryServerCompleted event is raised along with these arguments.
QueryServerCompletedEventArgs
QueryServerCompleted
Here is the same method in VB:
Private Function QueryServer() As QueryServerCompletedEventArgs
Dim result As QueryServerCompletedEventArgs = _
New QueryServerCompletedEventArgs()
Initialize()
Dim client As UdpClient = Nothing
Try
' Configure and connect the socket.
client = New UdpClient()
Dim ipEndPoint As IPEndPoint = RemoteSNTPServer.GetIPEndPoint()
client.Client.SendTimeout = Timeout
client.Client.ReceiveTimeout = Timeout
client.Connect(ipEndPoint)
' Send and receive the data, and save the completion DateTime.
Dim request As SNTPData = SNTPData.GetClientRequestPacket(VersionNumber)
client.Send(request, request.Length)
result.Data = client.Receive(ipEndPoint)
result.Data.DestinationDateTime = DateTime.Now.ToUniversalTime()
' Check the data
If result.Data.Mode = Mode.Server Then
result.Succeeded = True
' Call other method(s) if needed
If (UpdateLocalDateTime) Then
UpdateTime(result.Data.LocalClockOffset)
result.LocalDateTimeUpdated = True
End If
Else
result.ErrorData = _
New ErrorData("The response from the server was invalid.")
End If
Return result
Catch ex As Exception
result.ErrorData = New ErrorData(ex)
Return result
Finally
If client IsNot Nothing Then
' Close the socket
client.Close()
End If
End Try
End Function
In addition to the above, there is a static property Now (and the overloaded GetNow methods) which retrieves the current date and time from the server synchronously.
Now
GetNow
This class is very simple and essentially just holds the host name and port of a server. I have included many servers in there as static readonly so they can easily be used in your code. You should ideally pick a server that is geographically close to you, and preferably stratum 1 or 2, although as all timestamps along the path are logged and delays are calculated accordingly to produce an offset, it shouldn't really make much difference.
This class represents the 48 (possibly 68) byte packet I covered above. Because it is really just a byte array, I have implemented conversion operators accordingly. Most of this class's operations are self explanatory. The only slightly complicated part was converting the 64 bit fixed point timestamps to System.DateTime and back again. I have to thank Luc Pattyn for his assistance with this! Once the problem was solved, the resulting methods are, in reality, pretty trivial. The code for these two methods is below, and should keep roughly 1 tick (0.00000001 second) accuracy, but obviously rounding errors, and the time it takes the system to perform time updates etc., make this precision unachievable, but it should be OK to within a few microseconds.
System.DateTime
private DateTime TimestampToDateTime(int startIndex)
{
UInt64 seconds = 0;
for (int i = 0; i <= 3; i++)
seconds = (seconds << 8) | data[startIndex + i];
UInt64 fractions = 0;
for (int i = 4; i <= 7; i++)
fractions = (fractions << 8) | data[startIndex + i];
UInt64 ticks = (seconds * TicksPerSecond) +
((fractions * TicksPerSecond) / 0x100000000L);
return Epoch + TimeSpan.FromTicks((Int64)ticks);
}
private void DateTimeToTimestamp(DateTime dateTime, int startIndex)
{
UInt64 ticks = (UInt64)(dateTime - Epoch).Ticks;
UInt64 seconds = ticks / TicksPerSecond;
UInt64 fractions = ((ticks % TicksPerSecond) * 0x100000000L) / TicksPerSecond;
for (int i = 3; i >= 0; i--)
{
data[startIndex + i] = (byte)seconds;
seconds = seconds >> 8;
}
for (int i = 7; i >= 4; i--)
{
data[startIndex + i] = (byte)fractions;
fractions = fractions >> 8;
}
}
One method that is important in this class is the static GetClientRequestPacket. This method creates a new SNTPData instance, sets the mode and version number bits, and places the current system time (converted to UTC) in the transmit timestamp.
GetClientRequestPacket
internal static SNTPData GetClientRequestPacket(VersionNumber versionNumber)
{
SNTPData packet = new SNTPData();
packet.Mode = Mode.Client;
packet.VersionNumber = versionNumber;
packet.TransmitDateTime = DateTime.Now.ToUniversalTime();
return packet;
}
Here is a class diagram showing the public parts of the classes above that would typically be used by your application (to keep this compact, not everything is shown here).
I've tried to make sure this is as easy to use as possible. Instantiate a SNTPClient in your code (or drop one onto a Form as it also derives from System.Component), subscribe to the QueryServerCompleted event if you want to make sure it succeeds, or examine any of the data, and call QueryServerAsync. That is all you need to query the default server and update your system's date and time! I've included a demonstration application to show what I've included in the article, and a few other things that I haven't.
Form
System.Component
I think I've covered SNTP from the client's perspective, and I hope you find the SNTPClient useful. For my next article, I plan to create an NTP/SNTP server to complement this client.
Valer BOCAN has already done an article, SNTP Client in C#. Although his article has high ratings, I felt that there was little by way of explanation in his article, and I found a few problems in his code. Therefore, in my opinion, a more complete/in depth article and code was in order. His code was used to help me understand some of the vagueness in the RFCs by studying his implementation, and obviously there are some similarities as we are implementing the same protocol, but there is no plagiar. | https://www.codeproject.com/articles/38276/an-sntp-client-for-c-and-vb-net?fid=1544014&df=90&mpp=10&sort=position&spc=none&tid=3243693 | CC-MAIN-2017-13 | refinedweb | 2,247 | 54.83 |
package com.as400samplecode; import java.io.BufferedWriter; import java.io.File; import java.io.FileWriter; import java.io.IOException; public class FileBufferedWriter { public static void main(String[] args) { BufferedWriter bufferedWriter = null; try { File file = new File("data/newFile.txt"); //to append more data to the existing file change the line to //File file = new File("data/newFile.txt",true); //if file doesn't exists, then create it if(!file.exists()){ file.createNewFile(); } FileWriter fileWriter = new FileWriter(file); bufferedWriter = new BufferedWriter(fileWriter); bufferedWriter.write("My first line!"); bufferedWriter.newLine(); bufferedWriter.write("My second line "); bufferedWriter.write("keeps going on..."); bufferedWriter.newLine(); } catch (IOException e) { e.printStackTrace(); } finally { try { if (bufferedWriter != null){ bufferedWriter.close(); } } catch (IOException ex) { ex.printStackTrace(); } } } }
All one can think and do in a short time is to think what one already knows and to do as one has always done!
Java write to file using BufferedWriter example
BufferedWriter provides efficient method of writing single characters, arrays, and strings. You can specify a buffer size but.
NO JUNK, Please try to keep this clean and related to the topic at hand.
Comments are for users to ask questions, collaborate or improve on existing. | https://www.mysamplecode.com/2012/05/java-write-to-file-example.html | CC-MAIN-2019-39 | refinedweb | 194 | 54.49 |
.
The control panel of this X-Y recorder is very simple. It is not surprising that the input controls look like those of an oscilloscope. In a sense, an X-Y recorder functions very similar to an oscilloscope in its X-Y mode. The input sensitivity for the 7044A ranges from 0.5mV/inch all the way to 10V/inch in 10 steps and a calibration potentiometer on each channel can be used to fine-tune the sensitivity within each range.
Because the input impedance for each channel is very high (at 1 MΩ), the “check” momentary push button is used to short out the inputs when setting the zero location of the head. Without shorting the inputs, the electromagnetic interference from the environment would cause the servo motors to vibrate violently when the input sensitivity is less than 50mV/inch.
The electronics can be accessed by removing the bottom panel. The circuit roughly divides into two portions. The left half is primarily the power supply circuit and the right half houses the two identical channels, one for driving the X axis and one for driving the Y axis.
There is a D-SUB connector at the rear panel, which can be used to supply X/Y inputs and control the recording.
Here is a close-up picture of the power transformer and some digital circuitry. I am not entirely sure what this circuit board does however. The 74L121 is a multivibrator chip so it is doing some sort of timing job. Although there is a “timebase” sticker on the recorder panel, it doesn’t seem to have any controls on the panel. Maybe it is used to generate the timing signal for the servo motors.
I couldn’t find any service manual or schematics for the HP 7044A. But since HP 7015B is roughly from the same era, the core circuitry should be pretty close.
The picture to the left below is the power supply board for positive and negative regulated DC voltages used in the rest of the system. If you look closer, you will see two voltage doublers towards the middle of the board. These voltage doublers are for the autogrip function. They supply roughly ±400V or so high voltage to the metal plates beneath the plotter surface so when energized the electrostatic force holds the paper in place. The two red high voltage wires can be seen from the picture to the right below.
The picture to the left below shows the X channel driver board, the Y channel board is identical. And the picture to the right shows one of the complementary output stages (2N3054 and 2N5956) that drives the servo motor.
Here is a close-up showing the OpAmps used on the driver board (MLM201AG). And the picture to the right shows the grounding point of the channel.
Here is a picture showing the pen-down solenoid. The X axis motor can also be seen.
To test the recorder, I wrote a simple program using Arduino Due that generates a Lorenz attractor. The min/max boundaries for each axis were obtained prior and they are used to map the curve to the first quadrant since 7044A can only plot signals within a single quadrant at a time. Arduino Due is convenient because it has two 12bit DAC outputs which can be used to drive the X and Y channel.
Unlike using an oscilloscope, the recorder cannot record data that changes faster than a few Hertz. To slow down the output, you can either decrease the time interval (I chose 0.001) or add in additional delays. I used serial output to slow things down a bit, this is convenient as I could use the data when debugging the program as well.
Here is the code listing for generating the Lorenz Attractor using Arduino Due:
double x = 0.1; double y = 0.0; double z = 0.0; double a = 10.0; double b = 28.0; double c = 8.0/3.0; double t = 0.001; double minX = -20.0745; double maxX = 21.5292; double minY = -26.8399; double maxY = 29.4550; double minZ = 0.0; double maxZ = 54.3201; double xt, yt, zt; double mappedX, mappedY, mappedZ; int Map(double x, double inMin, double inMax, double outMin, double outMax) { double temp = (x - inMin) * (outMax - outMin) / (inMax - inMin) + outMin; return (int) (temp + 0.5); } void setup() { Serial.begin(115200); analogWriteResolution(12); } void loop() { xt = x + t * a * (y - x); yt = y + t * (x * (b - z) - y); zt = z + t * (x * y - c * z); x = xt; y = yt; z = zt; mappedX = Map(x, minX, maxX, 0, 4095); mappedY = Map(y, minY, maxY, 0, 4095); mappedZ = Map(z, minZ, maxZ, 0, 4095); Serial.print(mappedX);Serial.print(" "); Serial.print(mappedY);Serial.print(" "); Serial.print(mappedZ);Serial.println(); analogWrite(DAC0, mappedX); analogWrite(DAC1, mappedZ); }
And finally, you can watch a video of the teardown and experiment below:
[…] these devices to the curb, but they’re easily found, cheap, and it’s worth a look under the hood to see what made these things […]
[…] acquisition pushed these devices to the curb, but they’re easily found, cheap, and it’s worth a look under the hood to see what made these things […] | http://www.kerrywong.com/2017/04/30/hp-7044a-x-y-recorder-teardown-lorenz-attractor/ | CC-MAIN-2017-47 | refinedweb | 872 | 72.76 |
Well about 3 weeks ago I decided to learn a programming language.
I started off with C++ for a week but after reading some articles I found out that Java was going to be easier for someone that has never programmed before (I only know HTML & CSS).
So for 2 weeks I've been learning Java but I have found it quite hard. I get the jist of it but it does baffle me at times trying to do even the simplest of things.
public class Demo { public static void main(String []args) { int myFirstNumber = 1; int mySecondNumber = 5; if(myFirstNumber == mySecondNumber) { System.out.println("The numbers match!"); } else { System.out.println("Unfortunately the numbers don't match"); } } }
The above Java code I can easily manage however that is about as far as it goes. So although the above is simple I don't understand anything more complex than that.
So I was wondering...
Should I stick with Java and just keep re-reading the same tutorial/s until I understand it or should I switch to ruby which at a quick first glance seems simple?
OR, should I change to ActionScript as I do have Adobe CS3 Flash, it's just I'm not good in any aspect of Flash from AS to drawing.
If it makes any difference, I want to be able to make online games with it.
P.S. Please don't say a game will take you ages to make and I'm setting my goals far too high. That's my goal and I want to complete it - I just don't know down which path to go.
This post has been edited by Kingbradley6: 16 August 2008 - 08:07 AM | http://www.dreamincode.net/forums/topic/60828-should-i-change-to-ruby/page__p__401946 | CC-MAIN-2013-20 | refinedweb | 287 | 70.43 |
So I need a little help on this, What this program is supposed to do is have the user input there checkbook.txt into the program which looks like this
deposit:July 7:-:300 416:July 8:Albertsons:15.85 417:7/9:Checker Auto:19.95 418:7/10:Super Target:47.50 419:Dec 5:Home Depot:47.89
Once the users enters there data into the program it outputs the text but removes the colons and adds spaces so it looks nice. I would like it to look like this.
-------------------------------------------------------------------- deposit July 7 - $ 300.00 416 July 8 Albertsons $ 15.85 417 7/9 Checker Auto $ 19.95 418 7/10 Super Target $ 47.50 419 Dec 5 Home Depot $ 47.89 -------------------------------------------------------------------- Balance: $168.81
So how do I go about making the items alligned witheachother from reading the txt file?
Also how would I go about getting the balance? Any help would be appreciated thank you. Here is my code this far.
#include <iostream> #include <fstream> #include <iomanip> using namespace std; int main(){ char filename[1000]; cout << "Please Enter Your Checkbook Text: "; cin.getline(filename, 1000); ifstream input(filename); cout << "--------------------------------------------------------------------" << endl; if(! input.good()){ cerr << "Unable to open " << filename << " for reading" << endl; exit(1); } while (! input.eof()){ char c; input.get(c); switch (c){ case ':' : cout << left << setw(2) << "\t" << right << setw(6); break; default : cout << c; break; } } return 0; } | https://www.daniweb.com/programming/software-development/threads/442067/checkbook-problem | CC-MAIN-2021-31 | refinedweb | 234 | 79.46 |
#include "clang/AST/ASTDiagnostic.h"
#include "clang/AST/ASTContext.h"
#include "clang/AST/ASTLambda.h"
#include "clang/AST/Attr.h"
#include "clang/AST/DeclObjC.h"
#include "clang/AST/DeclTemplate.h"
#include "clang/AST/ExprCXX.h"
#include "clang/AST/TemplateBase.h"
#include "clang/AST/Type.h"
#include "llvm/Support/raw_ostream.h"
#include "clang/AST/TypeNodes.def"
Go to the source code of this file.
Convert the given type to a string suitable for printing as part of a diagnostic.
There are four main criteria when determining whether we should have an a.k.a. clause when pretty-printing a type:
1) Some types provide very minimal sugar that doesn't impede the user's understanding — for example, elaborated type specifiers. If this is all the sugar we see, we don't want an a.k.a. clause. 2) Some types are technically sugared but are much more familiar when seen in their sugared form — for example, va_list, vector types, and the magic Objective C types. We don't want to desugar these, even if we do produce an a.k.a. clause. 3) Some types may have already been desugared previously in this diagnostic. if this is the case, doing another "aka" would just be clutter. 4) Two different types within the same diagnostic have the same output string. In this case, force an a.k.a with the desugared type when doing so will provide additional information.
Definition at line 227 of file ASTDiagnostic.cpp.
Definition at line 28 of file ASTDiagnostic.cpp.
Referenced by handleObjCGCTypeAttr().
FormatTemplateTypeDiff - A helper static function to start the template diff and return the properly formatted string.
Returns true if the diff is successful.
Definition at line 2054 of file ASTDiagnostic.cpp. | https://clang.llvm.org/doxygen/ASTDiagnostic_8cpp.html | CC-MAIN-2019-09 | refinedweb | 287 | 54.39 |
Posted Dec 20, 2007
By James Koopmann
Gaining an understanding of internal Oracle structures is
essential to becoming better DBAs and servicing our end user community.
Oracle's library cache is one such internal structure that, after learning about,
can help eliminate some very nasty denial of service requests originating from
application users.
Oracle's. When applications run and reference code, Oracle). There are various criteria
as to whether code being requested actually matches code already in the library
cache but that is beyond the scope of this article. Just be aware that a
configured library cache area, since it is allocated a specific amount of
memory, can actively only hold so much code before it must age out some to make
room for code that is required by applications. This is not necessarily a bad
thing but we must be aware of the size of our library cache as well as how many
misses or hard parses that are occurring. If there are too many, we may need to
increase the amount of memory allocated to the library cache.
To monitor and gain an understanding of how your current
library cache has performed since your last startup of the Oracle database you
can issue the following SQL. Obviously if you are experiencing immediate
performance problems, you will want
The way to look at these results is to first look at how
many times a particular namespace was executed (PINS), then take a look at how
many times something tried to execute but wasn't in the library cache
(RELOADS). Another very important statistic is the number of INVALIDATIONS that
have occurred for a particular namespace. INVALIDATIONS are those pieces of
code that for some reason, typically through a DDL operation, have become
invalid and required a reparse. All of this can be summarized in the hit ratio
(PINHITRATIO). So, in our example SQL above we can see that our particular
library cache seems to be doing quite well and our applications are reusing SQL
quite effectively.
It is easy to say, when code is required by an
application, just put the code in the library cache. It is another
thing to actually have it done. There are internal locking mechanisms that must
be adhered to for all this to happen. All in the name of making sure that the
queries and code that are executed are actually valid and are referencing valid
objects. In a nutshell, those locks, and subsequent wait events, are the
following:.
Library cache pin
The library cache pin event is responsible for concurrent
access within the library cache. The acquisition of a library cache pin is
required to load an object's heap to be loaded into memory. In addition, if someone acquiring a lock on the handle of an
object, if the process actually wants to examine or modify the object then it
must acquire a pin on the object. The pinning of an object results in the
objects heap being loaded into memory if it is not already there. Both locks
and pins are required if compilation or parsing of code is ever going to
happenall for the purpose of making sure that no changes to an object's
definition occurs. Therefore, for any type of code that needs to be loaded into
the library cache, the session must first acquire a library cache lock on the
objects being queried. After the library cache lock the session must acquire a
library cache pin to pin the object heap into the library cache.
The monitoring of Oracle's library cache is essential to
making sure that objects and SQL code are executing efficiently and available
for subsequent applications to execute. The library cache could be under stress
if specific wait events are occurring and limiting the concurrent access to
code. Most of the problems that occur in the library cache are application or
user inducedbut that will be addressed next time. Until then, run the
fore-mentioned SQL and get an idea of the overall and general health of your
library cache. Next time we will look at where an issue can exist, how to find
them, and obviously offer solutions to fixing them.
»
See All Articles by Columnist James Koopmann
Oracle Archives
Please enable Javascript in your browser, before you post the comment! Now Javascript is disabled.
Your name/nickname
Your email
Subject
(Maximum characters: 1200). You have characters left. | https://www.databasejournal.com/features/oracle/article.php/3717001/Oracle-Library-Cache151Part-I.htm | CC-MAIN-2018-13 | refinedweb | 737 | 58.21 |
Unsure why this got voted down there is no other answer to this question on Stack.
- All other example use sets and this is the only method on here that shows how to identify that the same int is in the same location in another list.
Thanks MegaBytes for the answer:
x = [3,5,6,7]
y = [3,5,7,9]
compare_order = [1 if i==j else 0 for i, j in zip(x,y)]
#returns [1,1,0,0]
roll = random.sample(range(1,9), 4)
r1 = roll[0:1]
r2 = roll[1:2]
r3 = roll[2:3]
r4 = roll[3:4]
choice = int(1243)
SliceChoice = [int(x) for x in str(choice)]
d1 = SliceChoice[0:1]
d2 = SliceChoice[1:2]
d3 = SliceChoice[2:3]
d4 = SliceChoice[3:4]
x = []
if d1 == r1:
print ('got one')
x = x + 1
if d2 == r2:
print ('got one')
x = x + 1
if d3 == r3:
print ('got one')
x = x + 1
if d4 == r4:
print ('got one')
x =x + 1
if x == (4):
print('well done')
import random
def start():
""" this function is used to initialise the users interaction with the game
Primarily this functions allows the user to see the rules of the game or play the game"""
print ('Mastermind, what would you like to do now?\n')
print ('Type 1 for rules')
print ('Type 2 to play')
path = input('Type your selection 1 or 2: ')
if path == '1':
print ('Great lets look at the rules')
rules()
elif path == '2':
print('Great lets play some Mastermind!\n')
begingame()
start()
else:
print('that was not a valid response there is only one hidden option that is not a 1 or a 2')
start()
def rules():
"""This just prints out the rules to the user."""
print ('The rules are as follows:\n')
print ('1)Mastermind will craft you a 4 digit number that will contain all unique numbers from 1-9, there is no 0s.\n')
print ('2)You will have 12 attempts to guess the correct number.\n')
print ('3)Whites represent a correct number that is not in the correct order\n')
print ('4)Reds represent a correct number in the correct order.\n')
print ('5)If you enter a single number or the same number during a guess it will consume 1 of your 12 guesses.\n')
print ('6)to WIN you must guess the 4 numbers in the correct order.\n')
print ('7)If you run out of guesses the game will end and you lose.\n')
print ('8)if you make a guess that has letters or more than 4 digits you will lose a turn.')
start()
def makeRandomWhenGameStarts():
"""A random 4 digit number is required this is created as its own
variable that can be passed in at the start of the game, this allows the user
to guess multiple times against the one number."""
#generate a 4 digit number
num = random.sample(range(1,9), 4)
#roll is the random 4 digit number as an int supplied to the other functions
roll = int(''.join(map(str,num)))
return roll
def begingame():
"""This is the main game function. primarily using the while loop, the makeRandomWhenGameStarts variable is
passed in anbd then an exception handling text input is used to ask the user for their guees """
print ('please select 4 numbers')
#bring in the random generated number for the user to guess.
roll = makeRandomWhenGameStarts()
whiteResults = []
redResults = []
collectScore = []
guessNo = 0
#setup the while loop to end eventually with 12 guesses finishing on the 0th guess.
guesses = 12
while (guesses > 0 ):
guessNo = guessNo + 1
try:
#choice = int(2468) #int(input("4 digit number"))
choice = int(input("Please try a 4 digit number: "))
if not (1000 <= choice <= 9999):
raise ValueError()
pass
except ValueError:
print('That was not a valid number, you lost a turn anyway!')
pass
else:
print ( "Your choice is", choice)
#Use for loops to transform the random number and player guess into lists
SliceChoice = [int(x) for x in str(choice)]
ranRoll = [int(x) for x in str(roll)]
#Take the individual digits and assign them a variable as an identifier of what order they exist in.
d1Guess = SliceChoice[0:1]
d2Guess = SliceChoice[1:2]
d3Guess = SliceChoice[2:3]
d4Guess = SliceChoice[3:4]
#combine the sliced elements into a list
playGuess = (d1Guess+d2Guess+d3Guess+d4Guess)
#Set reds and whites to zero for while loop turns
nRed = 0
nWhite = 0
#For debugging use these print statements to compare the guess from the random roll
# print(playGuess, 'player guess')
# print(ranRoll,'random roll')
#Use for loops to count the white pegs and red pegs
nWhitePegs = len([i for i in playGuess if i in ranRoll])
nRedPegs = sum([1 if i==j else 0 for i, j in zip(playGuess,ranRoll)])
print ('Oh Mastermind that was a good try! ')
#Take the results of redpegs and package as turnResultsRed
TurnResultsRed = (nRedPegs)
#Take the results of whitepegs and remove duplication (-RedPegs) package as TurnResultsWhite
TurnResultsWhite = ( nWhitePegs - nRedPegs) #nWhite-nRed
#Create a unified list with the first element being the guess number
# using guessNo as an index and storing the players choice and results to feedback at the end
totalResults = ( guessNo,choice , TurnResultsWhite ,TurnResultsRed)
# collectScore = collectScore + totalResults for each turn build a list of results for the 12 guesses
collectScore.append(totalResults)
#End the while loop if the player has success with 4 reds
if nRed == (4):
print('Congratulations you are a Mastermind!')
break
#Return the results of the guess to the user
print ('You got:',TurnResultsWhite,'Whites and',TurnResultsRed,'Red\n')
#remove 1 value from guesses so the guess counter "counts down"
guesses = guesses -1
print ('You have', guesses, "guesses left!")
#First action outside the while loop tell the player the answer and advise them Game Over
print('Game Over!')
print('The answer was', roll)
#At the end of the game give the player back their results as a list
for x in collectScore:
print ('Guess',x[0],'was',x[1],':','you got', x[2],'Red','and', x[3],'Whites')
if __name__ == '__main__':
start()
Try This one:
x = [3,5,6,7] y = [5, 7, 9] compare_order = [1 if i==j else 0 for i, j in zip(x,y)] | https://codedump.io/share/550uoa7HkVan/1/python-compare-two-lists-and-return-matches-of-same-number-in-same-order-in-a-more-pythonic-way | CC-MAIN-2018-13 | refinedweb | 1,025 | 54.49 |
I have recently bought the two books Apress put out about BizTalk 2006, "Pro BizTalk 2006" and "BizTalk 2006 Recipes", and started by reading the first. After the first hundred pages, I can say that this is possibly the most in-depth BizTalk book I've read (versions 2000/2002 included :-)), with several details about the insides of BizTalk Server and little tips that can be helpful, and I highly recommend it as a medium/advanced book for developers and architects.
There are some aspects of what I've read so far that I dislike, however, and where I think the authors could have selected different approaches:
- Naming Conventions: the book includes a set of BizTalk naming conventions, essential in BizTalk development, but what I think is unnecessary is (table 2.3, p.61) the definition of prefix/identifier-based conventions for the names of shapes in Orchestrations.
Example: If the graphical shape itself represents a Send, why have its name be "Snd_MessageName" and instead of simply "MessageName"? That's 4 characters wasted in a shape whose size does not grow to accomodate its name. Plus, if the names of the shapes are not identifiers (as variable or message names are), using underscores and casing instead of spaces and readable text is a loss of legibility.
- Code Examples in VB.NET: I have never met a BizTalk 2004/2006 developer that uses VB.NET, C# is the language of choice. VB.NET might be a good selection if this was a beginner's book, but this not being the case, I personally think this is was a poor option.
There are obviously personal preferences in this issue, but the fact that expressions are written in C#-like code, and that the code generated by the ODX cross-compiler is C#, might have been good objective reasons to a difference choice.
- Factoring of Visual Studio projects: this is a topic that is more important than it seems, and frequently ignored both in published documentation and examples. The traditional wisdom, when doing BizTalk development, is to factor developments into projects named for example Project.Orchestrations, Project.Schemas, Project.Pipelines, etc., i.e., grouping by type of artifact. This book, unfortunately, makes similar recommendations.
The problem of this type of recommendation is that it doesn't take in consideration operational issues, especially when long-running processes are involved: imagine you have 2 orchestrations and 2 schemas, and you factor these into a MyProject.Orchestrations and MyProject.Schemas projects. One of the orchestrations waits for a confirmation from a user, and is typically long-running, the other is short-lived. You deploy these into production environments, and all is well. Some time later, there is a need to update the schema used in the short-lived orchestration. What happens? To replace the schemas assembly you have to replace the orchestration assembly as well, and this terminates the long-running processes, which is not good. Having given some importance to the versioning issues, which can indeed help avoid this problem, the authors could have gone for a more refined approach in this factoring issue.
I typically use two approaches: first, factor together artifacts that are versioned simultaneously (example: if a schema changes, it is very likely that any maps using it will also change). This is, by the way, the solution recommended in a Microsoft Webcast done by a couple of BizTalk Rangers a while back. Second, use Domain Driven Design techniques (and here I am referring to Allen's book with this title) and factor together semantically related artifacts. This also helps when teams of several developers are working in a BizTalk solution.
Factoring BizTalk artifacts into projects is not a simple issue, but these techniques can help guide you in your developments.
- Schema versioning: the authors correctly recommend using the namespaces of schemas to do schema-versioning. What I dislike is the usage of .Net-like version numbers instead of schema change/publish date. In page 55, a suggestion is made to use, where I think something like should be used instead. You do lose the immediate connection to the .Net version, but if schemas are to be published outside your organization or department, this shouldn't be exposed. Also note that using the date is frequent both in internal BizTalk schemas and W3C recommendations.
Also note that, in page 16, it should read "Windows SharePoint Services (v2.0)" instead of "SharePoint Portal Server".
Even with these issues, like I said at the start, I highly recommend this book. Buy it, you won't be disappointed. The only thing that is missing is Adapter development. | http://blog.joaopedromartins.net/2006/11/ | CC-MAIN-2018-39 | refinedweb | 772 | 52.8 |
So far design and development have been considered separate disciplines. Recently tooling has begun to appear to bridge this gap.
To understand more about the topic, I am interviewing Travis Arnold, the author of Unicon..
Unicon is a set of tools to help designers and developers sync SVGs from their favorite design tool to their codebase.
Unicon is split up into multiple packages to allow various use cases. I'll explain the main packages below:
The unicon package, the core of the solution, is responsible for sourcing SVGs from any design tool. Right now there are tighter integrations for Figma and Sketch, and then an option to read a folder of SVGs for use with any other backbone of Unicon.
unicon is responsible for sourcing SVGs from any design tool. Right now there are tighter integrations for Figma and Sketch, and then an option to read a folder of SVGs for use with any other tool like Adobe Illustrator or any tool that can export SVG. In the future, I would like to have options for any design tool that has an available API that Unicon can integrate with.
In a simple use case, we can import one of three functions and gather raw SVG strings from our design tool of choice. Take a look at the following:
import { getSvgsFromSketch } from "unicon"; getSvgsFromSketch("./path/to/illustrations.sketch").then(svgs => { // Now we can do whatever we want with the raw SVG data });
Each function adheres to the same style and signature, with some extras needed for some instances like the Figma API needing authentication.
Next, we have a CLI tool to help automate sourcing the SVG data and creating a file of exports. A typical script could look like the following:
{ "scripts": { "icons": "unicon figma 5X...2ge --name icons --transformer json" } }
In this case, we are sourcing SVG data from a Figma file. We also pass a few options to specify the name of the generated file as well as how the data is transformed using the
unicon-transformer-json package.
Finally, the
unicon-react package allows rendering SVGs universally in React and React Native with the same component. It understands the JSON chunks created by the
unicon-cli tool.
import Graphic from "unicon-react"; import { Archive } from "./icons"; export default () => <Graphic source={Archive} scale={4} />;
Like other solutions, Unicon works with exported SVGs. It does this by using the
getSvgsFromFolder function, but I also wanted to support directly exporting from the tool itself if possible. Using the provided APIs from Figma and Sketch, Unicon can keep a small feedback loop between design and development.
I was initially inspired by what Github does to manage their icon set. I liked the approach of using Figma's API to power an icon system and keep it in sync. I had previously made a webpack loader for Sketch, so I wanted to see if I could create something better that was more flexible and included all design tools.
An official docs site is next on the list. I want to create as many real-world examples to make sure Unicon can fit multiple use cases. Eventually, I'd like to create an Electron app, so it's easier for people not as familiar with the CLI to manage their icon sets. Lastly, with the release of Github actions, I want to look into how Unicon workflows can be more automated.
In the future, I'd like Unicon to have even better support with design tools and possibly package management for illustrations. There seems to be a trend of design tools popping up right now with everyone racing to be the next tool that exports directly to production code. In the end, I think everyone is bringing great innovation to this space, and I couldn't be more excited to be a part of it.
Always be experimenting and trying out new projects. Web development is one of the best fields to be in, with such a low barrier to entry, you can make your opportunities. I highly recommend contributing to open source if you have the time. I've learned more than I could have ever imagined since I started sharing and collaborating more. It's also pretty fun getting feedback and working with people all over the world!
Brent Jackson. I'm always impressed and inspired by the work he puts out.
Thank you for this interview! I'm excited about the future of design tooling. I can't wait to see it continue to grow and get better.
Thanks for the interview Travis! I expect to see a lot of action in the space as developers and designers figure out how to collaborate better.
To learn more about Unicon, head to GitHub. | https://survivejs.com/blog/unicon-interview/ | CC-MAIN-2020-40 | refinedweb | 791 | 62.68 |
I'm working on a "Reminders" application on Android using Phonegap[Cordova 2.2].
The user enters a specific date for his reminder and I'm supposed to notify him on time.
I used this plugin to Just show a notification in the status bar & they are working fine.
But I want the notifications to show at specific times. Is there some method to do it ?
I found this plugin that's supposed to do what I want but it's not working, it shows errors at :
import com.phonegap.api.Plugin;
import com.phonegap.api.PluginResult;
The import com.phonegap.api.Plugin cannot be resolved
So, how can I fix this error ? I know it might be easy, but I never made native Android Apps before so I'm kind of confused.
Thanks
Looks like a difference between 2.0.0 and 2.2.0, and like the plugin needs updating.
import org.apache.cordova.api.CordovaPlugin; import org.apache.cordova.api.PluginResult;
This should give you a jumping off point:
For the new Phonegap Release you must also change some stuff:
ctx = this.cordova.getActivity();and give it the ...AlarmHelper(ctx) | http://m.dlxedu.com/m/askdetail/3/f564156d017f335f6d995b290a447c71.html | CC-MAIN-2018-22 | refinedweb | 193 | 61.22 |
Produce the highest quality screenshots with the least amount of effort! Use Window Clippings. part 4 of the Windows Vista for Developers series,Although 0, // process attributes 0, // thread attributes FALSE, // don't inherit handles 0, // flags 0, // inherit environment 0, //One• Medium• High• SystemStandard levelsY break; } case SECURITY_MANDATORY_MEDIUM_RID: { // Medium integrity process break; } case SECURITY_MANDATORY_HIGH_RID: { // High integrity process break; } case SECURITY_MANDATORY_SYSTEM_RID: { // System integrity level break; } Security 0, // process attributes 0, // thread attributes FALSE, // don't inherit handles 0, // flags 0, // inherit environment 0, // levelsT 0, // group 0, // dacl acl L"runas", L"C:\\Windows\\Notepad.exe", 0, // params 0, // directory SWIfRememberThat.The download for this article include some helpful class templates and functions that you may find helpful.
Read part 5 now: Getting Started With Server Core
Have you tried Window Clippings yet?
© 2006 Kenny Kerr
The "download" is not working...
Ch.
Sorry, my fault - someone changed the proxy security settings and disabled the download... sigh.
Vista: UAC Internals
Hi,
How do I call the ShellExecute runas verb via managed code, i.e. c#?
Do I p/invoke under .NET 2.0?
Oh, apologies, the property .Verb on ProcessInfo does the trick - sorry!
David:
using (Process process = new Process()){ process.StartInfo.FileName = // app path process.StartInfo.Verb = "runas";
process.Start();}
quote from article:
"As developers we have a responsibility to embrace it so that the applications we develop don’t annoy and desensitize our users with needless prompts."
As implementers of new functionality, if their new functionality is going to cause so many "needless prompts" then they should have some sort of legacy support in place. It's ridiculous to expect everyone to re-write all their apps. Most importantly, any company that does a re-write will likely put the new functionality in a new version and require users to buy a new version. Now, what happens to all those people with existing versions? They still get those "needless prompts" don't they?
Please not, I am not arguing pro or con about UAC. I've specifically left out my personal opinion about it because that's not my point. I am specifically commenting on how implementing a new feature in such a way to cause "needless prompts" and then pushing the responsibility onto other developers is not a good thing. What about the responsibility of the UAC developers? If we have a "responsibility" to "avoid needless prompt" what is the responsibility of the UAC developers? Shouldn't it be similar?
Peter: thanks for sharing your thoughts. To be clear, legacy apps will not necessarily have any elevation prompts. If they rely on functionality that requires the full administrator token, then they must run as an administrator requiring one prompt to launch after which there will be no further prompts since the app is running with an unrestricted administrator token. The UAC virtualization layer also goes to great lengths to ensure that many legacy apps will continue to work without prompts and without requiring elevation. This obviously doesn’t work 100% of the time. As far as legacy apps go, I personally think the “UAC developers” have done a lot of work to helper application developers. I did not however focus on all the features of UAC that are provided for legacy apps as the focus of my series is on development for Vista, whether new apps or new versions of existing applications.
At the end of the day, the same guidelines apply as for older versions of Windows. If you have operations in your application that require greater than normal permissions they should typically be partitioned in a separate process, typically running as a service, while the majority of your application can continue to run as a normal user. Another common strategy is to gracefully fail or limit the operations of an application when it is not run as an administrator. None of this is new to Vista. Elevation through UAC is of course now an alternative but one that should be used with care as with any security feature.
i tried to build my application in VS2005 on Vista, it doesn't work well (it doesn't creates the specified output file in the program files folder) but if you give some other directory name or if i switch off UAC then it ll work fine.
What changes i need to do now?
Nanu: not knowing much about your app it’s hard to say specifically but one thing’s for sure: don’t write to the Program Files directory. You should never assume you have write access to this location unless you’re an installer.
The next article (part 6) in the series deals with known “special” folders and should help in figuring out where to store app-specific data.
This is a "must" for us. (This is chicken and egg problem... we cannot write HKCU)
I have a C# application that may be run as an administrator and if that application creates a new process the process inherits the elevation. I need to run the new process as user; is there a simple way to do this under .NET?
As a solution to my question just posted, I have modified the solution at to a DLL and call the DLL function from C#. This works fine but should be easier to achieve in .NET.
Hi, I have an application to create namespace extension under my computer and which is running well under XP,
but if i try the same in Vista its not working properly, no syncronization between treeview and list view. i used the COM objects to view the contents of namespace in Explorer using interfaces like IShellView and IShellFolder etc.
what do you think, its problem in COM DLL registration(i am not modified any code as you sujjested in this article) or the interface derivation(because as i know there are new interfaces in vista).
please help in this regard,
Thanks
Nanu
I need to create an elevated process, but I can't seem to use ShellExecute because I need the CREATE_SUSPENDED flag (create the process suspended). Any clues on how to solve this ?
Thanks in advance,
Michiel.
Michiel: Normally a parent process has control over a child process but since UAC uses a process broker to create the child process and the new process is running at a higher integrity level it would break the UAC security promise if the logical “parent” process were allowed to control the elevated process, so unfortunately CREATE_SUSPENDED is not a supported option in this scenario. Consider if you were able to create the process suspended: you would have no way of resuming it.
Kenny, thanks for the very useful articles!
I thought you may want to know about a function of mine: RunAsStdUser(). It can be used to start a truely non-elevated process (rather than a process with restricted rights and privileges). It does that by tricking Vista Task Scheduler into starting a non-elevated task, and it works even when called from an elevated process. The source code and a demo application are here:
Cheers!
Big thanks to Andrei since his method produces really non-elevated process rather then a restricted one. For example, if you run taskmgr.exe as a restricted process, it is unable to re-run itself elevated when you click the "show processes for all users" button.
I launch 2 DOS box on Vista, one with "Run as Administrator". The mapped drives (by net use) created on above 2 DOX box can not be shared with each other.
Now, I have a app which is embeded a manifest file to make it always run with administrator token, I hope it can create a process with "standard user token" to access those mapped drived create by "standard user token", could you please let me know how to create this kind of process?
I heard by using the service, we can start an elevated privilage application (runas administrator type) without UAC prompt in the user account session. I am working on it but don't see any light in avoiding the prompt. I could launch the process with Administrator but it is on System session desktop (which is even worse). Am I hitting my head on wall or is there any hope?
Kenny,
Do you know of any way to have Vista run my .NET app under Low integrity by default? It'd be very nice, since my app doesn't need even Medium integrity, so it shouldn't have it.
Ben: good question, but this is unnecessary for managed code. Managed apps can take advantage of Code Access Security and partial trust to provide an even stronger sandbox than UAC provides by itself. In this case UAC simply provides an additional layer of defense.
Do you have a good link to an article explaining how to use CAS to reduce the privilidges of my app? For example, only allow it to read/write to certain directories and connect to certain websites? All I can ever find is articles on how to demand *more* permissions.
I have a legacy application, which creates/writes files in ProgramFiles. To support it on Vista, I am writing a sample dll and test driver that uses low level security API to detect the rights programmatically. I have tried to disable the Virualization for the current process using SetTokenInformation. But still, I am not able to write to the folders. But if I use 'Run as Administrator' on the right-click menu, it works perfectly. So I tried to elevate the current process using SetTokenInformation as
{
DWORD dwElevationEnabled = 1;
SetTokenInformation(hToken, (TOKEN_INFORMATION_CLASS)20, (LPVOID)&dwElevationEnabled, 4) ; }
This call is failing. How can I elevate this process to admin level??
Can someone help me please?
Thanks,
Kumar
Kumar: You cannot elevate an existing process. This is not the same as thread impersonation. To elevate you need to launch a new process as I described in the article. Also, virtualization cannot be turned on and off within a process. You need to provide a manifest, again as I described in the article.
And as I’ve said before, unless you’re writing a setup program you should not be writing to the Program Files directory. If this is something you need to do to support your legacy app then take advantage of virtualization rather than trying to turn it off.
The "download" is not AddMandatoryAce fuc....
How can I elevate my process to admin level?? and then use CreateProcessAsUser to run a .exe driver application?
In windows XP/2003 I used like that:
if ( CreateProcess( gbAppInCmdLine ? NULL: glpAppPath, // lpszImageName
glpCmdLine, // lpszCommandLine
0, // lpsaProcess
0, // lpsaThread
FALSE, // fInheritHandles
DETACHED_PROCESS, // fdwCreate
0, // lpvEnvironment
0, // lpszCurDir
&startupInfo, // lpsiStartupInfo
&processInfor // lppiProcInfo
))
{
if(processInfor.hProcess != NULL)
{
WaitForSingleObject( processInfor.hProcess, INFINITE);
// CloseHandle(processInfor.hProcess);
}
// GetExitCodeProcess( processInformation.hProcess, &dwExitCode );
::PostMessage(hwnd,WM_DRIVER,0,1);
}
else
{
::PostMessage(hwnd,WM_DRIVER,-1,1);
How can I do in vista?
Every so often I need to view an application’s manifest, for example to debug application dependencies | http://weblogs.asp.net/kennykerr/archive/2006/09/29/Windows-Vista-for-Developers-_1320_-Part-4-_1320_-User-Account-Control.aspx | crawl-001 | refinedweb | 1,838 | 54.83 |
Backport #3938
Ruby incorrectly compares the length of Array elements of Enumerable objects to the arity of Methods given as blocks to Enumerable methods
Description
=begin
Given an Enumerable object that has an element which is an Array, when an Enumerable method which takes a block (#map, #detect, etc) is called on that object and given a Method as its block, Ruby will incorrectly compare the length of the Array to the arity of the Method.
def Object.onearg(arg)
arg
end
amethod = Object.method(:onearg)
aproc = proc{|arg| arg}
amethod and aproc both have arity of 1. they should generally behave the same. but, they behave differently when given as a block to Enumerable methods, with amethod behaving incorrectly when the Enumerable in question contains an array:
[[1, 2]].detect(&amethod)
ArgumentError: wrong number of arguments (2 for 1)
this seems to incorrectly compare the length of the element [1, 2] to the arity of amethod, even though it's passing one argument (the array [1, 2]) to amethod.
the Proc behaves correctly:
[[1, 2]].detect(&aproc)
=> [1, 2]
this does not compare the element's length to the arity of aproc, and so works fine.
Giving the Method as a block works fine when the arity happens to be the same as the length of the element which is an array:
[[1]].detect(&amethod)
=> [1]
Even though it is passed the whole array (seen in the return value), and not the element of the array.
File is attached to minimally reproduce, and its output is:
[1, 2]
[1]
methodarity.rb:10:in
onearg': wrong number of arguments (2 for 1) (ArgumentError)to_proc'
from methodarity.rb:10:in
from methodarity.rb:7:in
detect'each'
from methodarity.rb:10:in
from methodarity.rb:10:in `detect'
from methodarity.rb:10
Tested on:
ruby 1.8.6 (2009-06-08 patchlevel 369) [universal-darwin9.0]
ruby 1.8.6 (2010-02-05 patchlevel 399) [i686-darwin9.8.0]
ruby 1.8.7 (2009-06-12 patchlevel 174) [i686-darwin9.8.0]
ruby 1.8.7 (2010-06-23 patchlevel 299) [i686-darwin9.8.0]
ruby 1.8.6 (2007-09-24 patchlevel 111) [i386-mswin32]
ruby 1.8.6 (2010-02-04 patchlevel 398) [i386-mingw32]
ruby 1.8.7 (2010-01-10 patchlevel 249) [i386-mingw32]
Behaves correctly in ruby 1.9.*.
=end
Files
Updated by shyouhei (Shyouhei Urabe) over 9 years ago
- Status changed from Open to Feedback
=begin
Designed behaviour. This is how an assignment works for 1.8.
But yes, it turned out to be odd. So we changed it to be more natural in 1.9. So your correct way is to switch to 1.9. If you need this backported to 1.8, tell us why. Beware that we are not for that because of backward compatibilities.
=end
Updated by jeremyevans0 (Jeremy Evans) 7 months ago
Also available in: Atom PDF | https://bugs.ruby-lang.org/issues/3938 | CC-MAIN-2020-10 | refinedweb | 487 | 60.31 |
The weak current for the production of one (pseudo)-vector meson.
More...
#include <VectorMesonCurrent.h>
The weak current for the production of one (pseudo)-vector meson.
In this case the current is given by
where
Definition at line 31 of file VectorMesonCurrent.h.
Accept the decay.
Checks the meson against the list
Implements Herwig::WeakDecayCurrent.
Make a simple clone of this object.
Implements ThePEG::InterfacedBase.
Definition at line 145 of file VectorMesonCurrent.h.
Complete the construction of the decay mode for integration.
This version just adds the meson as the daughter of the last resonance in the phase space channel.
Hadronic current.
This version returns the hadronic current described above.
Output the setup information for the particle database.
Reimplemented from Herwig::WeakDecayCurrent.
Return the decay mode number for a given set of particles in the current.
Initialize this object after the setup phase before saving and EventGenerator to disk.
Reimplemented from ThePEG::InterfacedBase.
Make a clone of this object, possibly modifying the cloned object to make it sane.
Definition at line 151 of file VectorMesonCurrent.h.
The particles produced by the current.
This just returns the pseudoscalar meson.
Function used to read in object persistently.
Function used to write out object persistently. | https://herwig.hepforge.org/doxygen/classHerwig_1_1VectorMesonCurrent.html | CC-MAIN-2019-04 | refinedweb | 202 | 53.78 |
Hiya. One might consider... <element xml="example"> <start><tag name="p" /><tag name="p" /><tag name="b" /></start> <content /> <end><tag name="p" /><tag name="p" /><tag name="b" /></end> </element> ...although in the example you cite, the end tags can be infered. I noted well the advice that you not use XML for config files. At the end of the day it's a matter of personal taste, but have found that if one pays attention to extensible ways of expressing config, rather than literal notation in XML format, XML configs work well. Why for the example you give do you not simply.... <template:element <p> <p> <b><template:content /></b> </p> </p> </template:element> If you use namespaces it clears up a lot of anxiety about confusing the model of the config from expression of the content. One might also question why you are not simply relying upon XSL to know how to represent and "example", given that the config I expressed above is only a hop, skip and a jump from XSL anyway. <xsl:template <p> <p> <b> <xsl:value-of </b> </p> </p> </xsl:template> XSLT is very good at mapping from one data model to another. Why reinvent the wheel? So in short: I like XML for config descriptions. Concentrate on expressing your data, not literally notating it... think in terms of "what do I *need* to know to process this?", and exclude the rest. If I've misunderstood your intent or requirements please correct me. Cheers Guy. -----Original Message----- From: Stephan Tolksdorf [mailto:andorxor@gmx.de] Sent: 9 November 2000 12:33 To: xml-sig@python.org Subject: [XML-SIG] XML appropiate for config files of a xml processor? Hello,> The processor should now transform "<example>test</example>" into "<p><b>test</b></p>". Obviously you have to use a special XML-Editor to edit these type of config files. So, would you say this is an acceptable drawback in comparison to the flexibility and ease of use of xml as the config file format? Or would you say one should use a custom format for these config files? Maybe you could point me to a config file format actually in use with such type of processor? I'd be thankful for your answers. Best Regards, Stephan Tolksdorf _______________________________________________ XML-SIG maillist - XML-SIG@python.org | https://mail.python.org/pipermail/xml-sig/2000-November/003732.html | CC-MAIN-2014-15 | refinedweb | 392 | 65.62 |
Plotting election (and other county-level) data with Python Basemap
After my arduous search for open 2016 election data by county, as a first test I wanted one of those red-blue-purple charts of how Democratic or Republican each county's vote was.
I used the Basemap package for plotting. It used to be part of matplotlib, but it's been split off into its own toolkit, grouped under mpl_toolkits: on Debian, it's available as python-mpltoolkits.basemap, or you can find Basemap on GitHub.
It's easiest to start with the fillstates.py example that shows how to draw a US map with different states colored differently. You'll need the three shapefiles (because of ESRI's silly shapefile format): st99_d00.dbf, st99_d00.shp and st99_d00.shx, available in the same examples directory.
Of course, to plot counties, you need county shapefiles as well. The US Census has county shapefiles at several different resolutions (I used the 500k version). Then you can plot state and counties outlines like this:
from mpl_toolkits.basemap import Basemap import matplotlib.pyplot as plt def draw_us_map(): # Set the lower left and upper right limits of the bounding box: lllon = -119 urlon = -64 lllat = 22.0 urlat = 50.5 # and calculate a centerpoint, needed for the projection: centerlon = float(lllon + urlon) / 2.0 centerlat = float(lllat + urlat) / 2.0 m = Basemap(resolution='i', # crude, low, intermediate, high, full llcrnrlon = lllon, urcrnrlon = urlon, lon_0 = centerlon, llcrnrlat = lllat, urcrnrlat = urlat, lat_0 = centerlat, projection='tmerc') # Read state boundaries. shp_info = m.readshapefile('st99_d00', 'states', drawbounds=True, color='lightgrey') # Read county boundaries shp_info = m.readshapefile('cb_2015_us_county_500k', 'counties', drawbounds=True) if __name__ == "__main__": draw_us_map() plt.title('US Counties') # Get rid of some of the extraneous whitespace matplotlib loves to use. plt.tight_layout(pad=0, w_pad=0, h_pad=0) plt.show()
Accessing the state and county data after reading shapefiles
Great. Now that we've plotted all the states and counties, how do we get a list of them, so that when I read out "Santa Clara, CA" from the data I'm trying to plot, I know which map object to color?
After calling readshapefile('st99_d00', 'states'), m has two new members, both lists: m.states and m.states_info.
m.states_info[] is a list of dicts mirroring what was in the shapefile. For the Census state list, the useful keys are NAME, AREA, and PERIMETER. There's also STATE, which is an integer (not restricted to 1 through 50) but I'll get to that.
If you want the shape for, say, California,
iterate through m.states_info[] looking for the one where
m.states_info[i]["NAME"] == "California".
Note i; the shape coordinates will be in
m.states[i]n
(in basemap map coordinates, not latitude/longitude).
Correlating states and counties in Census shapefiles
County data is similar, with county names in
m.counties_info[i]["NAME"].
Remember that STATE integer? Each county has a STATEFP,
m.counties_info[i]["STATEFP"] that matches some state's
m.states_info[i]["STATE"].
But doing that search every time would be slow. So right after calling readshapefile for the states, I make a table of states. Empirically, STATE in the state list goes up to 72. Why 72? Shrug.
MAXSTATEFP = 73 states = [None] * MAXSTATEFP for state in m.states_info: statefp = int(state["STATE"]) # Many states have multiple entries in m.states (because of islands). # Only add it once. if not states[statefp]: states[statefp] = state["NAME"]
That'll make it easy to look up a county's state name quickly when we're looping through all the counties.
Calculating colors for each county
Time to figure out the colors from the Deleetdk election results CSV file. Reading lines from the CSV file into a dictionary is superficially easy enough:
fp = open("tidy_data.csv") reader = csv.DictReader(fp) # Make a dictionary of all "county, state" and their colors. county_colors = {} for county in reader: # What color is this county? pop = float(county["votes"]) blue = float(county["results.clintonh"])/pop red = float(county["Total.Population"])/pop county_colors["%s, %s" % (county["name"], county["State"])] \ = (red, 0, blue)
But in practice, that wasn't good enough, because the county names in the Deleetdk names didn't always match the official Census county names.
Fuzzy matches
For instance, the CSV file had no results for Alaska or Puerto Rico, so I had to skip those. Non-ASCII characters were a problem: "Doña Ana" county in the census data was "Dona Ana" in the CSV. I had to strip off " County", " Borough" and similar terms: "St Louis" in the census data was "St. Louis County" in the CSV. Some names were capitalized differently, like PLYMOUTH vs. Plymouth, or Lac Qui Parle vs. Lac qui Parle. And some names were just different, like "Jeff Davis" vs. "Jefferson Davis".
To get around that I used SequenceMatcher to look for fuzzy matches when I couldn't find an exact match:
def fuzzy_find(s, slist): '''Try to find a fuzzy match for s in slist. ''' best_ratio = -1 best_match = None ls = s.lower() for ss in slist: r = SequenceMatcher(None, ls, ss.lower()).ratio() if r > best_ratio: best_ratio = r best_match = ss if best_ratio > .75: return best_match return None
Correlate the county names from the two datasets
It's finally time to loop through the counties in the map to color and plot them.
Remember STATE vs. STATEFP? It turns out there are a few counties in the census county shapefile with a STATEFP that doesn't match any STATE in the state shapefile. Mostly they're in the Virgin Islands and I don't have election data for them anyway, so I skipped them for now. I also skipped Puerto Rico and Alaska (no results in the election data) and counties that had no corresponding state: I'll omit that code here, but you can see it in the final script, linked at the end.
for i, county in enumerate(m.counties_info): countyname = county["NAME"] try: statename = states[int(county["STATEFP"])] except IndexError: print countyname, "has out-of-index statefp of", county["STATEFP"] continue countystate = "%s, %s" % (countyname, statename) try: ccolor = county_colors[countystate] except KeyError: # No exact match; try for a fuzzy match fuzzyname = fuzzy_find(countystate, county_colors.keys()) if fuzzyname: ccolor = county_colors[fuzzyname] county_colors[countystate] = ccolor else: print "No match for", countystate continue countyseg = m.counties[i] poly = Polygon(countyseg, facecolor=ccolor) # edgecolor="white" ax.add_patch(poly)
Moving Hawaii
Finally, although the CSV didn't have results for Alaska, it did have Hawaii. To display it, you can move it when creating the patches:
countyseg = m.counties[i] if statename == 'Hawaii': countyseg = list(map(lambda (x,y): (x + 5750000, y-1400000), countyseg)) poly = Polygon(countyseg, facecolor=countycolor) ax.add_patch(poly)The offsets are in map coordinates and are empirical; I fiddled with them until Hawaii showed up at a reasonable place.
Well, that was a much longer article than I intended. Turns out it takes a fair amount of code to correlate several datasets and turn them into a map. But a lot of the work will be applicable to other datasets.
Full script on GitHub: Blue-red map using Census county shapefile
[ 15:10 Jan 14, 2017 More programming | permalink to this entry | ] | https://shallowsky.com/blog/programming/plotting-election-data-basemap.html | CC-MAIN-2022-33 | refinedweb | 1,197 | 58.38 |
perl5005d".
There have been a large number of changes in the internals to support the new features in this release.
An ANSI C compiler is now required to build perl. See INSTALL.("@",GV_ADD) should be used instead of directly accessing perl globals as
GvSV(errgv).
The API call is backward compatible with existing perls and provides source compatibility with threading is enabled.::Deparse can be used to demystify perl code,
and understand how perl optimizes certain constructs.
B::Xref generates cross reference reports of all definition and use of variables,
subroutines and formats in a program.
B::Showlex show the lexical variables used by a subroutine or file at a glance.
perlcc is a simple frontend for compiling perl.
See
ext/B/README,
B,
and the respective compiler modules.
Perl's regular expression engine has been seriously overhauled, and many new constructs are supported. Several bugs have been fixed.
Here is an itemized summary: banner at the beginning of
malloc.c for details...
%.
exists $Foo::{Bar::}tests existence of a package
It was impossible to test for the existence of a package without actually creating it before. Now
exists $Foo::{Bar::} can be used to test if the
Foo::Bar namespace has been created.
See perllocale.. perlvar..
Win32 support has been vastly enhanced. Support for Perl Object, a C++ encapsulation of Perl. GCC and EGCS are now supported on Win32. See suites. and related utilities have been vastly overhauled.
perlcc, a new experimental front end for the compiler is available.
The crude GNU
configure emulator is now called
configure.gnu to avoid trampling on
Configure under case-insensitive filesystems.
perldoc used to be rather slow. The slower features are now optional. In particular, case-insensitive searches need the
-i switch, and recursive searches need
-r. You can set these switches in the
PERLDOC environment variable to get the old behavior.
Config.pm now has a glossary of variables.
Porting/patching.pod has detailed instructions on how to create and submit patches for perl.
perlport specifies guidelines on how to write portably.
perlmodinstall describes how to fetch and install modules from
CPAN sites. "(?{ code })" in perlre, and perlsec.
(F) A regular expression contained the
(?{ ... }) zero-width assertion, but that construct is only allowed when the
use re 'eval' pragma is in effect. See "(?{ code })" in perlre.
perllocale.
>. | http://search.cpan.org/~jesse/perl-5.12.1/pod/perl5005delta.pod | CC-MAIN-2018-22 | refinedweb | 386 | 60.51 |
Ecto is fantastic tool that provides us with a great degree of flexibility. In this blog post we’ll look at how we can dynamically build our Ecto queries and sanitize our input data at the same time.
Let’s plan to approach our composition in 3 steps:
- Create the base query we’ll build upon
- Compose our query from input criteria
- Execute our final query
For our example we’ll be working with everyone’s favorite example project: a blog! Before we begin, take a peek at the schema we’ll be building our code to interface with:
Query base
To keep things clean we’ll create a new module to contain the functionality for accessing the underlying schema data. Let’s move ahead with creating our module and addressing the first step above: the base query.
defmodule Posts do import Ecto.Query defp base_query do from p in Post end end
Simple enough.
When
base_query/0 is called we’ll create the initial query that will serve as the base for our criteria.
At this point our query is analogous to
SELECT * FROM posts.
Applying our criteria
Next we’ll need to build upon
base_query/0 by applying our criteria, this is where the magic of our query composition shines!
There’s a good chance the resulting query we want won’t just be simple
== comparisons.
Let’s consider how we might look up a blog post by title.
It’s unlikely we’ll want to search by exact title, so instead of
p.title == "Repo" we want
p.title ILIKE "%Repo%".
With that in mind it’s easy to understand why the following is not only a bad idea, because it doesn’t filter the criteria, but the resulting queries are basic
== comparisons:
defp build_query(query, criteria) do expr = Enum.into(criteria, []) where(query, [], expr) end
So how might we approach this problem instead?
Before we discuss the new approach let’s decide on some business rules for Post look up, see them applied in our approach, and then walk through it. For our example we will assume the following are always true:
- Searches for
titleare expected to be
ILIKE "%title%"
- Including
tagsrequires at least one.
- Simple comparison is available for
draftand
id
- All other values are discarded
Now that we know the rules around looking up a Post let’s see them applied with query composition: where(query, [p], ^{String.to_atom(key), value}) end defp compose_query(_unsupported_param, query) do query end
Bringing it all together
With
base_query/0 and
build_query/2 in place, let’s define our public
all/1 function.
There’s nothing special to running our query so we can setup our new function as a pipeline ending in
Repo.all/1:
def all(criteria) do base_query() |> build_query(criteria) |> Repo.all() end
The result is public function, our module’s API, that is concise and to a degree self documenting: “Get the base query, build the query with the criteria, and get all records”.
When we bring it all together and begin to leverage the flexiblity we’ve provided, we begin to see the true power provided to us through Ecto:
defmodule Posts do import Ecto.Query def all(criteria) do base_query() |> build_query(criteria) |> Repo.all() end def drafts, do: all(%{"draft" => true}) def get(id) do %{"id" => id} |> all() |> handle_get() end defp base_query do from p in Post end field = String.to_atom(key) where(query, [p], ^{field, value}) end defp compose_query(_unsupported_param, query) do query end defp handle_get([]), do: {:error, "not found"} defp handle_get([post]), do: {:ok, post} end
Here we have a module that encapsulates the logic around our data retrieval, separating our presentation and data layers, while providing a clean interface into our data.
If we’re using Phoenix, than our controller might look something like this:
defmodule Web.PostController do use Web, :controller def index(conn, params) do params |> Posts.all() |> render_result(conn) end def show(conn, %{"id" => id}) do id |> Posts.get() |> render_result(conn) end defp render_result({:ok, post}, conn) do render(conn, "show.json", post: post) end defp render_result({:error, reason}, conn) do render(conn, ErrorView, "error.json", reason: reason) end defp render_result(posts, conn) when is_list(posts) do render(conn, "index.json", posts: posts) end end
The controller is concise and does little more than present the data — as it should.
What do you think of this approach? How are you composing your Ecto queries? We’d love to hear your thoughts and suggestions! | https://elixirschool.com/blog/ecto-query-composition/ | CC-MAIN-2019-51 | refinedweb | 747 | 61.97 |
by typing appwiz.cpl on a command prompt and then selecting "Turn features on or off " from the left side
From the features select World Wide Web Servicesand make sure that you select the following
Click OK and let the Windows install IIS and FastCGI for you.
Step 2: VERIFY THAT IIS IS WORKING
Once installed you can verify that the IIS is installed by going towhyCAUTION:.
To verify that the website is working, copy the IISSTART.HTM and the welcome.png files into the RoRIIS7 directory. Then navigate to should see a page similar to step 2.
NOTE: When you generate the Rails app, make sure that you use -D option. -D option generated the dispatchersfor CGI and FastCGI
Luanch CMD prompt as administrator cd C:\inetpub\RoRIIS7rails -D MyAppcd MyAppruby script\generate Controller Test Index
Step 11 Generate a RAILS APP
Modify the app\controllers\test_controller.rb like belowThis will enable it to display some test when we navigate to this URL class TestController < ApplicationController def index render :text=>"The index action" end def about render :text=>"The about action" endend
Modify the app\controllers\test_controller.rb like belowThis will enable it to display some test when we navigate to this URL
class TestController < ApplicationController def index render :text=>"The index action" end def about render :text=>"The about action" endend
Step 12 Hook up IIS to Rubythis is the command line config tool
Download SQLITE-3.6.15 ZIP file and place the exe in the Ruby\Bin directorythis is the command line config tool
Download SQLITEDLL-3.6.15 ZIP and place the dll in the system32 directory.This is the engine for SQLITE.
Download SQLITEDLL-3.6.15 ZIP and place the dll in the system32 directory.This is the engine for SQLITE.
Now we need to install the GEM has the tip on getting this donegem install --version 1.2.3 sqlite3-ruby
Now we need to install the GEM has the tip on getting this donegem install --version 1.2.3 sqlite3-ruby
gem install --version 1.2.3 sqlite3-ruby
Step 14 COMPLETE!!!
Now you navigate to and you should see There you go ladies and gentlemen, I give you Ruby On Rails with IIS7
Now you navigate to
and you should see
There you go ladies and gentlemen, I give you Ruby On Rails with IIS7
These days, I am spending quite a bit of time with Ruby, Ruby On Rails and RAKE. I am not into the Ruby religion yet,and not drinking the ruby Kool-aid that much. Just a little.
I needed to integrate the TeamBuild (Team System) with Ruby/RAKE. So in other words, I needed to call RAKE from MSBUILD. It turned out to be slightly harder than I expected. I am new to MSBUILD, Ruby and RAKE, so I had to figure out quite a few of things.
I ended up writing a custom task. From the custom task, I called Rake and captured the output. Definitely not rocket science, but getting everything working properly is not easy either.
So here it is.
First the custom task.
Here is the entire code file
using System;using System.Collections.Generic;using System.Linq;using System.Text;using Microsoft.Build.Framework;using System.Diagnostics;using System.IO;namespace RubyIntegration{ public class RunRake : ITask { private IBuildEngine engine; public IBuildEngine BuildEngine { get { return engine; } set { engine = value; } }
private ITaskHost host; public ITaskHost HostObject { get { return host; } set { host = value; } }
private string RakeFileDir; [Required] public string RakeFileDirectory { get { return RakeFileDir; } set { RakeFileDir = value; } }
private string RubyInstallDir; [Required] public string RubyInstallDirectory { get { return RubyInstallDir; } set { RubyInstallDir = value; } } private string RakeTargetName; [Required] public string RakeTarget { get { return RakeTargetName; } set { RakeTargetName = value; } }
private string strOutput; [Output] public string RakeOutput { get { return strOutput; } set { strOutput = value; } }
private void LogMessage(string message, MessageImportance imp) { BuildMessageEventArgs args = new BuildMessageEventArgs( message, string.Empty, "RubyIntegration.RunRake", MessageImportance.Normal); engine.LogMessageEvent(args); }
public bool Execute() { bool result = false; try { LogMessage("***** MSBUILD <--> RAKE ********", MessageImportance.Normal); LogMessage("Preparing to invoke Rake", MessageImportance.Normal); LogMessage("*** INPUTS", MessageImportance.Normal); LogMessage("Ruby Install Directory " + RubyInstallDir, MessageImportance.Normal); LogMessage("Rake File Directory " + RakeFileDirectory, MessageImportance.Normal); LogMessage("RakeTargetName " + RakeTargetName, MessageImportance.Normal); LogMessage("***", MessageImportance.Normal);
LogMessage("*** CHEKING PARAMETERS", MessageImportance.Normal); if (Directory.Exists(RubyInstallDir)){ LogMessage("Ruby Install Directory " + RubyInstallDir + " exists.", MessageImportance.Normal); } else{ LogMessage("Ruby Install Directory " + RubyInstallDir + " does not exist - exiting task.", MessageImportance.High); } string RubyPath = Path.Combine(RubyInstallDir, "ruby.exe"); if (File.Exists(RubyPath)) { LogMessage("Ruby.exe is found at " + RubyPath, MessageImportance.Normal); } else { LogMessage("Ruby.exe is not found at path" + RubyPath + " . - exiting task.", MessageImportance.High); } string RakePath = Path.Combine(RubyInstallDir, "rake"); if (File.Exists(RakePath)) { LogMessage("rake file (rake ruby code) is found at " + RakePath, MessageImportance.Normal); } else { LogMessage("rake file (rake ruby code) is is not found at path" + RakePath + ". - exiting task.", MessageImportance.High); }
LogMessage("***", MessageImportance.Normal); ProcessStartInfo info = new ProcessStartInfo(); info.RedirectStandardOutput = true; info.UseShellExecute = false; info.FileName = RubyPath; info.Arguments = RakePath + " " + RakeTargetName; info.WorkingDirectory = RakeFileDirectory; Process p = Process.Start(info); strOutput = p.StandardOutput.ReadToEnd(); p.WaitForExit(); result = true; } catch (Exception ex) { LogMessage(ex.ToString(), MessageImportance.High); } return result; } }}
Here is the MSBUILD FILE
<?xml version="1.0" encoding="utf-8"?><Project xmlns=""> <UsingTask AssemblyFile="RunRake.dll" TaskName="RubyIntegration.RunRake" /> <Target Name="default" > <RunRake RubyInstallDirectory ="C:\ruby\bin" RakeFileDirectory="$(MSbuildProjectDirectory)\ruby\edgeserver" RakeTarget="alcoholic:getSmashed"> <Output TaskParameter="RakeOutput" PropertyName="RakeOutput"/> </RunRake> <Message Text="The output from Rake is... $(RakeOutput)" /> </Target></Project>
NOTES
Fist I attempted to creating a RAKE process by trying to call rake. (pass rake as the file name to the process start info).The process failed to start saying that the file not found.Then I tried with rake.bat (pass rake.bat as the file name to the process start info).The problem seems to be that RAKE.BAT does some manipulation and calls ruby.exe and passes the file "rake" to ruby.exe. Normally it would end up something like[ruby.exe c:\ruby\bin\rake ..].However The path to rake is getting resolved incorrectly when I pass the rake.bat as the program name. It is using the working directory and ending up with
[ruby.exe <MY WORKING DIR>\rake...]Obviously there is no file called "rake" in my working directory. I need to resolve this, but for now this should get me going.
The installation for for Ruby could be possibly obtained by resolving the file extension .rb to an executable. That is another task that can be added to eliminate the need to send the ruby install directory as a parameter.
A while back in the C++ days, there were class libraries doing things like sending mail, opening/reading cert store, event log writing reading, etc. These were written in C++ to encapsulate some of the pain associated with routine tasks. Great Idea!!
MFC's CReg CSocket and a bumch of classes started with C made things easier. If you need to do stuff you would use one of those reusable libraries or you would write one of those reusable classes.
Then came COM. Once again there are COM components that did read/write registry, read/write to event log.you can see the ATL's incarnation of Registry classes as an example.
Then came ASP/VbScript. You need to read write the file system and registry from ASP files. Enter the Scripting.FileSystemObjectand its cousins. Due the popularity of ASP and web development, great amount of functionality needed to be cast through IDispatch interfaces to make it available for VBScript programmers.
Human beings want to make progress. So .NET arrived. So there are new way to read / write registryand read write event log and read write files. OK
What about powershell? The world then needs to be packaged in Cmdlets to be consumed from the powershell. great.
Well how about MSBuild? How can I read write registry from MSBUILD? Of course you need to have the MSBuild tasks. Custom or not custom, you need to view the world through the MSBUILD Tasks. There are community libraries that help you read registry and do great things like send mail, etc.
I wonder. How many ways do we need to read/write the registry?
I..
In Rosario Team Foundation Server, significant new functionality is added for liking work item types,Baseand with a “Is Produced By “directional is simple. You create a link and add it to the collection, then save the work item
WorkItem wiFeatureGroup = WIStore.GetWorkItem(9999);
WorkItemLink wiLink = new WorkItemLink(WIStore.WorkItemLinkTypes["Is Produced By"], 9999, 8888);
wiFeatureGroup.WorkItemLinks.Add(wiLink);
wiFeatureGroup.Save();
WorkItemLink wiLink = new WorkItemLink(WIStore.WorkItemLinkTypes["Is Produced By"], 9999, 8888);
wiFeatureGroup.WorkItemLinks.Add(wiLink);
wiFeatureGroup.Save();
Deleting a link
To delete a link, you would need to identity the link you want to delete and call the Remove() method on that. Note that you need to save the WorkItem to persist the changes.
WorkItem wiFeatureGroup = WIStore.GetWorkItem(642););
if (wiDeliverable.Id == 887)
{
wiFeatureGroup.WorkItemLinks.Remove(wiLink);
wiFeatureGroup.Save();
break;
}
}
}
}
WorkItem wiFeatureGroup = WIStore.GetWorkItem(642);
if (wiDeliverable.Id == 887)
{
wiFeatureGroup.WorkItemLinks.Remove(wiLink);
wiFeatureGroup.Save();
break;
}
}.
So I moved from the networking group to Visual Studio Team System Test. Recently, I was investigating an issue where the client, controller and agent are not working together when in a workgroup topology. In other words, the machines that are running the client, controller service, and agent service are *non* domain joined and are part of a workgroup. In this situation, the client is simply failing to connect to the controller. The client gets the message"The server rejected the client's credentials - Log on failed".
For this discussion let’s say I have Machine CLEINT with user Tony. The machine that is running controller (lets say CONTROLLER) has the same user and password Tony.
I started investigating this issue by enabling the security audit in the security policy. In examining the security audit log, I found that the user on the client machine was rejected. The message goes like "Bad user name or password, user Tony, Domain CLIENT". On the first thought it kind of makes sense that the user CLIENT\Tony will be unknown to CONTROLLER. However, the windows workgroup security needs to enable this scenario since there is no central domain controller. So CLIENT\Tony should be able to authenticate to CONTROLLER as CONTROLLER\Tony. This scenario should work. So what gives?
The next thing I tried is to simply map a network share from CLIENT to CONTROLLER, something like \\controller\c$. Since both CLIENT and CONTROLLER have Tony as the interactive user, this file share mapping should work. (I already enabled the firewall for this). What I got is a dialog box asking me for credentials. The strange thing is that the user box is grayed out and says CONTROLLER\Guest. I wondered why it is forcing me to login as guest. A quick call to the security team gave me the clue.
For Windows XP, in a workgroup situation, there is a setting that forces all NETWORK logins as GUEST. Which means that even if you are trying to authenticate with a legitimate user and password credentials, it will force you to login as GUEST. Clearly, this is failing because I am trying to login as Tony and not as Guest.
The fix is to edit the registry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\ForceGuest and set the value to 0. This will remove the restriction of forcing the network logins as "Guest". Once I set this value to 0 on *all* the machines (client, controller and agent) and rebooted the machines, it all worked perfectly.
To recap,
1. Windows XP "ForceGuest" is on by default in a workgroup scenario, which means all network logins are allowed as Guest only..
2. Set the registry key to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\ForceGuest to 0 to remove this restriction
3. Reboot after applying the security setting
I will post a more detailed article on the controller, agent and client setup, users and permissions shortly.
These.
Some people have asked me how to get the SubnetMask for the network interfafce. The subnet mask is valid only for IPv4. The solution may not jump at you since there is no property called SubnetMask,however there is a property called IPv4Mask. Here is the code to get the subnet mask for each IPv4 address on the box
using System;using System.Net.NetworkInformation;
public class test{ public static void Main() { NetworkInterface[] Interfaces = NetworkInterface.GetAllNetworkInterfaces(); foreach(NetworkInterface Interface in Interfaces) { if(Interface.NetworkInterfaceType == NetworkInterfaceType.Loopback) continue; Console.WriteLine(Interface.Description); UnicastIPAddressInformationCollection UnicastIPInfoCol = Interface.GetIPProperties().UnicastAddresses; foreach(UnicastIPAddressInformation UnicatIPInfo in UnicastIPInfoCol) { Console.WriteLine("\tIP Address is {0}", UnicatIPInfo.Address); Console.WriteLine("\tSubnet Mask is {0}", UnicatIPInfo.IPv4Mask); } } }}
In Whidbey (.NET Framework 2.0) System.Net has a new feature called Tracing. This uses the builtin CLR Tracing functionality. What is interesting about the System.Net Tracing is thatYou can easily see the data that is being sent or received without having to use the NETMON. If you have used Network Monitor tools like NETMON/Ethereal you will find that there is so much noise that you need to weed through. This can be partially addressed through capture filters and display filters. But then looking at a frame in the capture you can'teasily determine which process issued that request. Similarly if there are multiple threads, you can't easily determine which thread issued that request. One more thing is that if the client and server are on the same machine you can;t capture the loop back traffic. Perhaps the most limiting of all is that if the application is using SSL (https or FTP with SSL) then it is not possible to look at the traffic. You can at most see the TCP frames with encrypted payload. Not much of use. Right?With System.Net, we addressed all these issues. System.Net tracing is 1) Per process2) Shows threads 3) Works for SSL 4) Works for Loopback.5) You don't need to recompile the codeWith all these advantages I find the System.Net tracing a very compelling feature that will not be able to live without. Lets look at some examples. 1. Consider the following code //JScript.Netimport System;import System.Net;(new WebClient()).DownloadString();
I wrote the above JScript.Net code. You can compile the code with Jsc <filename>What if you really want to see the trace for that code and see what is going on the wire?You can use the following configuration file. Save this file as app.exe.config file. <?xml version="1.0" encoding="UTF-8" ?><configuration> <system.diagnostics> <trace autoflush="true" /> ></configuration>
<!--You can use these two attributes on the Trace Sourcestracemode="protocolonly"maxdatasize="1024"-->
<!--You can choose from 4 sources
<source name="System.Net" maxdatasize="1024"> <listeners> <add name="MyTraceFile"/> </listeners></source>
<source name="System.Net.Sockets"> <listeners> <add name="MyTraceFile"/> </listeners></source> <source name="System.Net.Cache"> <listeners> <add name="MyTraceFile"/> </listeners></source><source name="System.Net.HttpListener"> <listeners> <add name="MyTraceFile"/> </listeners></source> -->Now when you run the application you will find the log file as System.Net.Trace.Log file
System.Net Information: 0 : [3560] HttpWebRequest#33736294 - Request: GET /office HTTP/1.1
System.Net Information: 0 : [3560] ConnectStream#31914638 - Sending headers{Host:: Keep-Alive}.System.Net Information: 0 : [3560] Connection#48285313 - Received status line: Version=1.1, StatusCode=301, StatusDescription=Moved Permanently.System.Net Information: 0 : [3560] Connection#48285313 - Received headers{Connection: Keep-AliveProxy-Connection: Keep-AliveContent-Length: 155Content-Type: text/htmlDate: Mon, 12 Sep 2005 21:51:00 GMTLocation:: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"Server: Microsoft-IIS/6.0Via: 1.1 MSCORPGATE12X-Powered-By: ASP.NET}.
You can see that the log file shows what is being sent on the wire and what headers are being received. You don't need to use NETMON any more to see what traffic is being sent on the wire. Very good indeed. You can also see that we show the objects and hash codes for each object so you can follow an object using this log file. You can also see [3560]as the thread id of the thread that is issuing the request. 2.What about SSL? What about Local Host?Lets consider the following code
using System;using System.Collections.Generic;using System.Text;using System.Net;using System.IO;using System.Net.Security;using System.Security.Policy;using System.Security.Cryptography.X509Certificates;using System.Security.Cryptography;class Program{ static void Main(string[] args) { Stream s = null; StreamReader sr = null; HttpWebResponse res = null; try{ //Hook a callback to verify the remote certificate ServicePointManager.ServerCertificateValidationCallback = new RemoteCertificateValidationCallback(MyCertValidationCb);
HttpWebRequest req = (HttpWebRequest) WebRequest.Create("");
req.Proxy = null;
res = req.GetResponse() as HttpWebResponse; s = res.GetResponseStream(); sr = new StreamReader(s, Encoding.UTF8); Console.WriteLine(sr.ReadToEnd()); } catch(Exception ex){ Console.WriteLine(ex); } finally{ if(res != null) res.Close(); if(s != null) s.Close(); if(sr != null) sr.Close(); } }
public static bool MyCertValidationCb( object sender, X509Certificate certificate, X509Chain chain, SslPolicyErrors sslPolicyErrors) { if ((sslPolicyErrors & SslPolicyErrors.RemoteCertificateChainErrors) == SslPolicyErrors.RemoteCertificateChainErrors) { return false; } else if ((sslPolicyErrors & SslPolicyErrors.RemoteCertificateNameMismatch) == SslPolicyErrors.RemoteCertificateNameMismatch) { Zone z; z = Zone.CreateFromUrl(((HttpWebRequest)sender).RequestUri.ToString()); if (z.SecurityZone == System.Security.SecurityZone.Intranet || z.SecurityZone == System.Security.SecurityZone.MyComputer) { return true; } return false; } return false; } }This code is trying to make an SSL request to the local host. You will also find that the RemoteCertificationCallback sample. You can enable both the Sockets and System.Net sources with the following config file <?xml version="1.0" encoding="UTF-8" ?><configuration> ="System.Net.trace.log" /> </sharedListeners> <switches> <add name="System.Net" value="Verbose" /> <add name="System.Net.Sockets" value="Verbose" /> </switches> </system.diagnostics></configuration>Here is the log file produced
System.Net Verbose: 0 : [3848] WebRequest::Create()System.Net Verbose: 0 : [3848] HttpWebRequest#33574638::HttpWebRequest()System.Net Verbose: 0 : [3848] Exiting HttpWebRequest#33574638::HttpWebRequest() System.Net Verbose: 0 : [3848] Exiting WebRequest::Create() -> HttpWebRequest#33574638System.Net Information: 0 : [3848] Associating HttpWebRequest#33574638 with ServicePoint#33736294System.Net Verbose: 0 : [3848] HttpWebRequest#33574638::GetResponse()System.Net Information: 0 : [3848] Associating Connection#35191196 with HttpWebRequest#33574638System.Net.Sockets Verbose: 0 : [3848] Socket#48285313::Socket(InterNetwork#2)System.Net.Sockets Verbose: 0 : [3848] Exiting Socket#48285313::Socket() System.Net.Sockets Verbose: 0 : [3848] Socket#48285313::Connect(1:443#16777668)System.Net.Sockets Verbose: 0 : [3848] Exiting Socket#48285313::Connect() System.Net Information: 0 : [3848] TlsStream#31914638::.ctor(host=localhost, #certs=0)System.Net Information: 0 : [3848] Associating HttpWebRequest#33574638 with ConnectStream#18796293System.Net Information: 0 : [3848] HttpWebRequest#33574638 - Request: GET /SecureNoClientCerts/test.htm HTTP/1.1
System.Net Information: 0 : [3848] SecureChannel#34948909::.ctor(hostname=localhost, #clientCertificates=0)System.Net Information: 0 : [3848] Enumerating security packages:System.Net Information: 0 : [3848] NegotiateSystem.Net Information: 0 : [3848] KerberosSystem.Net Information: 0 : [3848] NTLMSystem.Net Information: 0 : [3848] Microsoft Unified Security Protocol ProviderSystem.Net Information: 0 : [3848] SchannelSystem.Net Information: 0 : [3848] WDigestSystem.Net Information: 0 : [3848] DPASystem.Net Information: 0 : [3848] DigestSystem.Net Information: 0 : [3848] MSNSystem.Net Information: 0 : [3848] SecureChannel#34948909 - Left with 0 client certificates to choose from.System.Net Information: 0 : [3848] AcquireCredentialsHandle(package = Microsoft Unified Security Protocol Provider, intent = Outbound, scc = System.Net.SecureCredential)System.Net Information: 0 : [3848] InitializeSecurityContext(credential = System.Net.SafeFreeCredential_SECURITY, context = (null), targetName = localhost, inFlags = ReplayDetect, SequenceDetect, Confidentiality, AllocateMemory, InitManualCredValidation)System.Net Information: 0 : [3848] InitializeSecurityContext(In-Buffer length=0, Out-Buffer length=70, returned code=ContinueNeeded).System.Net.Sockets Verbose: 0 : [3848] Socket#48285313::Send()System.Net.Sockets Verbose: 0 : [3848] Data from Socket#48285313::SendSystem.Net.Sockets Verbose: 0 : [3848] 00000000 : 16 03 00 00 41 01 00 00-3D 03 00 43 26 02 90 83 : ....A...=..C&...System.Net.Sockets Verbose: 0 : [3848] 00000010 : 33 F1 48 D6 4B 74 DB E2-47 6E 7A 3D 55 D2 43 E2 : 3.H.Kt..Gnz=U.C.System.Net.Sockets Verbose: 0 : [3848] 00000020 : FC 02 CF 0B AF D4 E0 83-40 59 33 00 00 16 00 04 : ........@Y3.....System.Net.Sockets Verbose: 0 : [3848] 00000030 : 00 05 00 0A 00 09 00 64-00 62 00 03 00 06 00 13 : .......d.b......System.Net.Sockets Verbose: 0 : [3848] 00000040 : 00 12 00 63 01 00 : ...c..System.Net.Sockets Verbose: 0 : [3848] Exiting Socket#48285313::Send() -> 70#70System.Net.Sockets Verbose: 0 : [3848] Socket#48285313::Receive()System.Net.Sockets Verbose: 0 : [3848] Data from Socket#48285313::ReceiveSystem.Net.Sockets Verbose: 0 : [3848] 00000000 : 16 03 00 06 09 : ....] (printing 1024 out of 1545)System.Net.Sockets Verbose: 0 : [3848] 00000005 : 02 00 00 46 03 00 43 26-02 90 92 8B 0F 1A 72 76 : ...F..C&......rvSystem.Net.Sockets Verbose: 0 : [3848] 00000015 : A2 48 A6 F3 3D 43 22 ED-D5 63 15 8E E3 BD 4F AD : .H..=C"..c....O.System.Net.Sockets Verbose: 0 : [3848] 00000025 : DD 5A F4 42 B3 72 20 2B-0D 00 00 A7 86 54 E0 9B : .Z.B.r +.....T..System.Net.Sockets Verbose: 0 : [3848] 00000035 : C7 9A 00 FB 5D 3C AC DD-3E D9 50 FC 08 D8 AD 9F : ....]<..>.P.....System.Net.Sockets Verbose: 0 : [3848] 00000045 : 14 C7 97 AB 56 98 D4 00-04 00 0B 00 05 B7 00 05 : ....V...........System.Net.Sockets Verbose: 0 : [3848] 00000055 : B4 00 05 B1 30 82 05 AD-30 82 04 95 A0 03 02 01 : ....0...0.......System.Net.Sockets Verbose: 0 : [3848] 00000065 : 02 02 0A 34 74 D0 6D 00-02 00 00 01 2B 30 0D 06 : ...4t.m.....+0..System.Net.Sockets Verbose: 0 : [3848] 00000075 : 09 2A 86 48 86 F7 0D 01-01 05 05 00 30 77 31 13 : .*.H........0w1.System.Net.Sockets Verbose: 0 : [3848] 00000085 : 30 11 06 0A 09 92 26 89-93 F2 2C 64 01 19 16 03 : 0.....&...,d....System.Net.Sockets Verbose: 0 : [3848] 00000095 : 63 6F 6D 31 19 30 17 06-0A 09 92 26 89 93 F2 2C : com1.0.....&...,System.Net.Sockets Verbose: 0 : [3848] 000000A5 : 64 01 19 16 09 6D 69 63-72 6F 73 6F 66 74 31 14 : d....microsoft1.System.Net.Sockets Verbose: 0 : [3848] 000000B5 : 30 12 06 0A 09 92 26 89-93 F2 2C 64 01 19 16 04 : 0.....&...,d....System.Net.Sockets Verbose: 0 : [3848] 000000C5 : 63 6F 72 70 31 17 30 15-06 0A 09 92 26 89 93 F2 : corp1.0.....&...System.Net.Sockets Verbose: 0 : [3848] 000000D5 : 2C 64 01 19 16 07 72 65-64 6D 6F 6E 64 31 16 30 : ,d....redmond1.0System.Net.Sockets Verbose: 0 : [3848] 000000E5 : 14 06 03 55 04 03 13 0D-4E 43 4C 43 45 52 54 53 : ...U....NCLCERTSSystem.Net.Sockets Verbose: 0 : [3848] 000000F5 : 45 52 56 45 52 30 1E 17-0D 30 35 30 38 32 31 30 : ERVER0...0508210System.Net.Sockets Verbose: 0 : [3848] 00000105 : 30 33 30 32 35 5A 17 0D-30 36 30 38 32 31 30 30 : 03025Z..06082100System.Net.Sockets Verbose: 0 : [3848] 00000115 : 34 30 32 35 5A 30 2E 31-2C 30 2A 06 03 55 04 03 : 4025Z0.1,0*..U..System.Net.Sockets Verbose: 0 : [3848] 00000125 : 13 23 64 67 6F 72 74 69-6C 74 2E 72 65 64 6D 6F : .#dgortilt.redmoSystem.Net.Sockets Verbose: 0 : [3848] 00000135 : 6E 64 2E 63 6F 72 70 2E-6D 69 63 72 6F 73 6F 66 : nd.corp.microsofSystem.Net.Sockets Verbose: 0 : [3848] 00000145 : 74 2E 63 6F 6D 30 81 9F-30 0D 06 09 2A 86 48 86 : t.com0..0...*.H.System.Net.Sockets Verbose: 0 : [3848] 00000155 : F7 0D 01 01 01 05 00 03-81 8D 00 30 81 89 02 81 : ...........0....System.Net.Sockets Verbose: 0 : [3848] 00000165 : 81 00 CF E2 93 87 AF 2A-19 56 47 CF E0 2F E3 13 : .......*.VG../..System.Net.Sockets Verbose: 0 : [3848] 00000175 : B8 4F B7 20 C7 FA 1A 55-5F B0 3E 6E B6 4B 9B DC : .O. ...U_.>n.K..System.Net.Sockets Verbose: 0 : [3848] 00000185 : 50 1F 7E A7 5A 13 49 6D-8B 4A B1 27 50 91 47 51 : P.~.Z.Im.J.'P.GQSystem.Net.Sockets Verbose: 0 : [3848] 00000195 : 6A 8D 21 D1 DC 6C C2 AD-1D 38 E2 20 8A 1A 75 24 : j.!..l...8. ..u$System.Net.Sockets Verbose: 0 : [3848] 000001A5 : F3 8F 51 E9 BD E7 F9 FE-8D 11 C9 3A 9E 88 B4 D0 : ..Q........:....System.Net.Sockets Verbose: 0 : [3848] 000001B5 : A3 A9 C7 A6 7B C0 91 D9-1D 10 AE 00 38 C6 A9 8E : ....{.......8...System.Net.Sockets Verbose: 0 : [3848] 000001C5 : 27 52 A5 48 5D DD DF 4B-BF F8 D0 43 AE 43 11 0F : 'R.H]..K...C.C..System.Net.Sockets Verbose: 0 : [3848] 000001D5 : 0D A5 5E 2C A6 0A 37 9C-EF 9B 5A 30 FC D3 8A 54 : ..^,..7...Z0...TSystem.Net.Sockets Verbose: 0 : [3848] 000001E5 : 55 33 02 03 01 00 01 A3-82 03 06 30 82 03 02 30 : U3.........0...0System.Net.Sockets Verbose: 0 : [3848] 000001F5 : 0E 06 03 55 1D 0F 01 01-FF 04 04 03 02 04 F0 30 : ...U...........0System.Net.Sockets Verbose: 0 : [3848] 00000205 : 44 06 09 2A 86 48 86 F7-0D 01 09 0F 04 37 30 35 : D..*.H.......705System.Net.Sockets Verbose: 0 : [3848] 00000215 : 30 0E 06 08 2A 86 48 86-F7 0D 03 02 02 02 00 80 : 0...*.H.........System.Net.Sockets Verbose: 0 : [3848] 00000225 : 30 0E 06 08 2A 86 48 86-F7 0D 03 04 02 02 00 80 : 0...*.H.........System.Net.Sockets Verbose: 0 : [3848] 00000235 : 30 07 06 05 2B 0E 03 02-07 30 0A 06 08 2A 86 48 : 0...+....0...*.HSystem.Net.Sockets Verbose: 0 : [3848] 00000245 : 86 F7 0D 03 07 30 1D 06-03 55 1D 0E 04 16 04 14 : .....0...U......System.Net.Sockets Verbose: 0 : [3848] 00000255 : 25 9C 39 A7 F3 81 B2 20-79 95 22 C4 BD E3 2E A3 : %.9.... y.".....System.Net.Sockets Verbose: 0 : [3848] 00000265 : 01 98 E6 AF 30 13 06 03-55 1D 25 04 0C 30 0A 06 : ....0...U.%..0..System.Net.Sockets Verbose: 0 : [3848] 00000275 : 08 2B 06 01 05 05 07 03-01 30 1F 06 03 55 1D 23 : .+.......0...U.#System.Net.Sockets Verbose: 0 : [3848] 00000285 : 04 18 30 16 80 14 53 FA-E2 5F A8 9E B1 10 55 65 : ..0...S.._....UeSystem.Net.Sockets Verbose: 0 : [3848] 00000295 : E3 53 13 1B 9E EF 2B 23-D8 F5 30 82 01 56 06 03 : .S....+#..0..V..System.Net.Sockets Verbose: 0 : [3848] 000002A5 : 55 1D 1F 04 82 01 4D 30-82 01 49 30 82 01 45 A0 : U.....M0..I0..E.System.Net.Sockets Verbose: 0 : [3848] 000002B5 : 82 01 41 A0 82 01 3D 86-81 A8 6C 64 61 70 3A 2F : ..A...=...ldap:/System.Net.Sockets Verbose: 0 : [3848] 000002C5 : 2F 2F 43 4E 3D 4E 43 4C-43 45 52 54 53 45 52 56 : //CN=NCLCERTSERVSystem.Net.Sockets Verbose: 0 : [3848] 000002D5 : 45 52 28 32 29 2C 43 4E-3D 77 69 74 34 2C 43 4E : ER(2),CN=wit4,CNSystem.Net.Sockets Verbose: 0 : [3848] 000002E5 : 3D 43 44 50 2C 43 4E 3D-50 75 62 6C 69 63 25 32 : =CDP,CN=Public%2System.Net.Sockets Verbose: 0 : [3848] 000002F5 : 30 4B 65 79 25 32 30 53-65 72 76 69 63 65 73 2C : 0Key%20Services,System.Net.Sockets Verbose: 0 : [3848] 00000305 : 43 4E 3D 53 65 72 76 69-63 65 73 2C 44 43 3D 55 : CN=Services,DC=USystem.Net.Sockets Verbose: 0 : [3848] 00000315 : 6E 61 76 61 69 6C 61 62-6C 65 43 6F 6E 66 69 67 : navailableConfigSystem.Net.Sockets Verbose: 0 : [3848] 00000325 : 44 4E 3F 63 65 72 74 69-66 69 63 61 74 65 52 65 : DN?certificateReSystem.Net.Sockets Verbose: 0 : [3848] 00000335 : 76 6F 63 61 74 69 6F 6E-4C 69 73 74 3F 62 61 73 : vocationList?basSystem.Net.Sockets Verbose: 0 : [3848] 00000345 : 65 3F 6F 62 6A 65 63 74-43 6C 61 73 73 3D 63 52 : e?objectClass=cRSystem.Net.Sockets Verbose: 0 : [3848] 00000355 : 4C 44 69 73 74 72 69 62-75 74 69 6F 6E 50 6F 69 : LDistributionPoiSystem.Net.Sockets Verbose: 0 : [3848] 00000365 : 6E 74 86 48 66 69 6C 65-3A 2F 2F 5C 5C 77 69 74 : nt.Hfile://\\witSystem.Net.Sockets Verbose: 0 : [3848] 00000375 : 34 2E 72 65 64 6D 6F 6E-64 2E 63 6F 72 70 2E 6D : 4.redmond.corp.mSystem.Net.Sockets Verbose: 0 : [3848] 00000385 : 69 63 72 6F 73 6F 66 74-2E 63 6F 6D 5C 43 65 72 : icrosoft.com\CerSystem.Net.Sockets Verbose: 0 : [3848] 00000395 : 74 45 6E 72 6F 6C 6C 5C-4E 43 4C 43 45 52 54 53 : tEnroll\NCLCERTSSystem.Net.Sockets Verbose: 0 : [3848] 000003A5 : 45 52 56 45 52 28 32 29-2E 63 72 6C 86 46 68 74 : ERVER(2).crl.FhtSystem.Net.Sockets Verbose: 0 : [3848] 000003B5 : 74 70 3A 2F 2F 77 69 74-34 2E 72 65 64 6D 6F 6E : tp://wit4.redmonSystem.Net.Sockets Verbose: 0 : [3848] 000003C5 : 64 2E 63 6F 72 70 2E 6D-69 63 72 6F 73 6F 66 74 : d.corp.microsoftSystem.Net.Sockets Verbose: 0 : [3848] 000003D5 : 2E 63 6F 6D 2F 43 65 72-74 45 6E 72 6F 6C 6C 2F : .com/CertEnroll/System.Net.Sockets Verbose: 0 : [3848] 000003E5 : 4E 43 4C 43 45 52 54 53-45 52 56 45 52 28 32 29 : NCLCERTSERVER(2)System.Net.Sockets Verbose: 0 : [3848] 000003F5 : 2E 63 72 6C 30 81 FA 06-08 2B 06 01 05 05 07 01 : .crl0....+......System.Net.Sockets Verbose: 0 : [3848] Exiting Socket#48285313::Receive() -> 1545#1545=1550, Out-Buffer length=204, returned code=ContinueNeeded).System.Net.Sockets Verbose: 0 : [3848] Socket#48285313::Send()System.Net.Sockets Verbose: 0 : [3848] Data from Socket#48285313::SendSystem.Net.Sockets Verbose: 0 : [3848] 00000000 : 16 03 00 00 84 10 00 00-80 32 CB FC 3B 3B A6 67 : .........2..;;.gSystem.Net.Sockets Verbose: 0 : [3848] 00000010 : BF F8 89 3F 40 CE 20 E4-79 92 4C 9C 8D 84 4C 77 : ...?@. .y.L...LwSystem.Net.Sockets Verbose: 0 : [3848] 00000020 : E6 BC 1D EA 59 95 F5 FA-E6 7B 35 40 68 EA 97 23 : ....Y....{5@h..#System.Net.Sockets Verbose: 0 : [3848] 00000030 : 89 20 DD A5 E1 DD 2C 48-98 2F 2E C5 C3 4B 87 59 : . ....,H./...K.YSystem.Net.Sockets Verbose: 0 : [3848] 00000040 : C8 86 7F BA 85 CF BC B0-5C 26 1C E7 AA A6 C3 54 : ........\&.....TSystem.Net.Sockets Verbose: 0 : [3848] 00000050 : 55 59 AE B3 3B 04 24 40-18 D5 B3 C8 57 02 83 E2 : UY..;.$@....W...System.Net.Sockets Verbose: 0 : [3848] 00000060 : 46 2E 2B EA 1B C1 8E 6D-4A 3C E5 C7 5E 2E 47 24 : F.+....mJ<..^.G$System.Net.Sockets Verbose: 0 : [3848] 00000070 : 13 DB 03 30 76 CB C4 19-FA D1 85 11 BD 5B AC A6 : ...0v........[..System.Net.Sockets Verbose: 0 : [3848] 00000080 : 0D 60 9D E4 FB 6A BA 33-CB 14 03 00 00 01 01 16 : .`...j.3........System.Net.Sockets Verbose: 0 : [3848] 00000090 : 03 00 00 38 B9 4C CA CF-CD C2 FF 20 61 43 8E 02 : ...8.L..... aC..System.Net.Sockets Verbose: 0 : [3848] 000000A0 : 54 03 55 7D 6F 84 BE F9-B2 5D 44 31 1D FF B1 1F : T.U}o....]D1....System.Net.Sockets Verbose: 0 : [3848] 000000B0 : 0F 45 04 81 ED 09 3A 2E-72 44 3E 37 B1 F6 CE 56 : .E....:.rD>7...VSystem.Net.Sockets Verbose: 0 : [3848] 000000C0 : DB 67 11 8A E8 CE 35 23-DF 0B F5 3E : .g....5#...>System.Net.Sockets Verbose: 0 : [3848] Exiting Socket#48285313::Send() -> 204#204System.Net.Sockets Verbose: 0 : [3848] Socket#48285313::Receive()System.Net.Sockets Verbose: 0 : [3848] Data from Socket#48285313::ReceiveSystem.Net.Sockets Verbose: 0 : [3848] 00000000 : 14 03 00 00 01 : .... : 01 : .System.Net.Sockets Verbose: 0 : [3848] Exiting Socket#48285313::Receive() -> 1#1=6, Out-Buffer length=0, returned code=ContinueNeeded).System.Net.Sockets Verbose: 0 : [3848] Socket#48285313::Receive()System.Net.Sockets Verbose: 0 : [3848] Data from Socket#48285313::ReceiveSystem.Net.Sockets Verbose: 0 : [3848] 00000000 : 16 03 00 00 38 : ....8System : 51 35 A8 FC 48 38 37 66-51 6D A3 A7 0C 10 95 93 : Q5..H87fQm......System.Net.Sockets Verbose: 0 : [3848] 00000015 : 6B FF 8A 41 00 38 42 F4-B8 AA 0F C9 DB 71 16 46 : k..A.8B......q.FSystem.Net.Sockets Verbose: 0 : [3848] 00000025 : 67 CA 04 20 F4 EF EB 31-EE BB C7 AD E8 7E B5 76 : g.. ...1.....~.vSystem.Net.Sockets Verbose: 0 : [3848] 00000035 : 8D 63 96 99 96 63 53 3C- : .c...cS<System.Net.Sockets Verbose: 0 : [3848] Exiting Socket#48285313::Receive() -> 56#56=61, Out-Buffer length=0, returned code=OK).System.Net Information: 0 : [3848] Remote certificate: [Version] V3
[Subject] CN=dgortilt.redmond.corp.microsoft.com Simple Name: dgortilt.redmond.corp.microsoft.com DNS Name: dgortilt.redmond.corp.microsoft.com
[Issuer] CN=NCLCERTSERVER, DC=redmond, DC=corp, DC=microsoft, DC=com Simple Name: NCLCERTSERVER DNS Name: NCLCERTSERVER
[Serial Number] 3474D06D00020000012B
[Not Before] 8/20/2005 5:30:25 PM
[Not After] 8/20/2006 5:40:25 PM
[Thumbprint] 19E34D7F445E49ACBD5EEECFF606F10197098F16
[Signature Algorithm] sha1RSA(1.2.840.113549.1.1.5)
[Public Key] Algorithm: RSA Length: 1024 Key Blob: 30 81 89 02 81 81 00 cf e2 93 87 af 2a 19 56 47 cf e0 2f e3 13 b8 4f b7 20 c7 fa 1a 55 5f b0 3e 6e b6 4b 9b dc 50 1f 7e a7 5a 13 49 6d 8b 4a b1 27 50 91 47 51 6a 8d 21 d1 dc 6c c2 ad 1d 38 e2 20 8a 1a 75 24 f3 8f 51 e9 bd e7 f9 fe 8d 11 c9 3a 9e 88 b4 d0 a3 a9 c7 a6 7b c0 91 d9 1d 10 ae 00 38 c6 a9 8e 27 52 a5 48 5d dd df 4b bf f8 d0 43 ae 43 11 0f 0d a5 5e 2c a6 0a 37 9c ef 9b 5a 30 fc d3 8a 54 55 33 02 03 01 ....System.Net Information: 0 : [3848] SecureChannel#34948909 - Remote certificate has errors:System.Net Information: 0 : [3848] SecureChannel#34948909 - Certificate name mismatch.System.Net Information: 0 : [3848] SecureChannel#34948909 - Remote certificate was verified as valid by the user.System.Net.Sockets Verbose: 0 : [3848] Socket#48285313::Send()System.Net.Sockets Verbose: 0 : [3848] Data from Socket#48285313::SendSystem.Net.Sockets Verbose: 0 : [3848] 00000000 : 17 03 00 00 67 79 FD 10-7F A4 92 38 C5 80 38 EE : ....gy.....8..8.System.Net.Sockets Verbose: 0 : [3848] 00000010 : 3A 6C 66 B7 0C CC C7 29-0C EC 3C 3B 88 D0 BE 94 : :lf....)..<;....System.Net.Sockets Verbose: 0 : [3848] 00000020 : 6E C6 0D 7D B4 12 29 BD-ED 86 05 8C 17 CA 1B 9D : n..}..).........System.Net.Sockets Verbose: 0 : [3848] 00000030 : D6 1A D7 65 D9 77 AD 5A-7C 17 E7 1A 78 69 90 B0 : ...e.w.Z|...xi..System.Net.Sockets Verbose: 0 : [3848] 00000040 : DB 68 89 D8 F3 56 C2 D4-F8 52 CF EB 4B 1E 38 4B : .h...V...R..K.8KSystem.Net.Sockets Verbose: 0 : [3848] 00000050 : D4 0D AA 5A 5C A4 C4 15-E8 AF F2 79 93 E0 06 37 : ...Z\......y...7System.Net.Sockets Verbose: 0 : [3848] 00000060 : 10 CA 42 A9 49 8C B2 AC-33 85 68 80 : ..B.I...3.h.System.Net.Sockets Verbose: 0 : [3848] Exiting Socket#48285313::Send() -> 108#108System.Net Information: 0 : [3848] ConnectStream#18796293 - Sending headers{Host: localhostConnection: Keep-Alive}.You can see clearly that
1) The Remote Certificate is being clearly presented in the log file. 2) Any errors in the remote certificate are logged.3) In this case we are returning true for NAME MISMATCH if the server is local or intranet [Please see the remore certificate validation callback code]4) The fact that we accepted the certificate is also logged.5) Then at the sockets level you can see encrypted data being sent6) At the System.Net level (application level) you can see the decrypted data.You can see now how easy it is to debug SSL apps using the system.Net tracing. Let me know your comments Durgaprasad GortiTest LeadSystem.NetMicrosoft
Lets say that you are invoking a web service from another web service. Both are on the same box. You might be making authenticated1. When you make authenticated calls, the client is closing connections. And when you are making authenticated calls repeatedly to the same server, you are making and closing connections repeatedly2. - TCPtWhat this does is to give you a chance to choose the local end point for the connection that is being made.SeeiDurgaprasad.Gorti@microsoft.com.dontspamTest LeadSystem.Net
I.
If
When using System.Net or Web Services, you might want to receive or send cookies, perhaps for session statemaintenance or in some rare situations for proxy authentication. The first thing we are tempted to do is to access WebResponse.Cookies collection. But then it returns no cookies. Why?It turns out that unless you assign a CookieContainer to the WebRequest, you won't be able to get the WebResponse.Cookies. It is not very intuitive. Why would I need to create a cookie container to get cookies?Notice that you need to create a cookie container but then you get cookie collection from WebResponse.Here is some sample code
CookieContainer CC = new CookieContainer();HttpWebRequest Req = (HttpWebRequest) WebRequest.Create("");Req.Proxy = null;Req.UseDefaultCredentials = true;//YOU MUST ASSIGN A COOKIE CONTAINER FOR THE REQUEST TO PULL THE COOKIESReq.CookieContainer = CC;Res = (HttpWebResponse)Req.GetResponse();//DUMP THE COOKIESConsole.WriteLine("----- COOKIES -----"); if(Res.Cookies != null && Res.Cookies.Count != 0){ foreach(Cookie c in Res.Cookies) { Console.WriteLine("\t" + c.ToString()); }}else{ Console.WriteLine("No Cookies");|}
OK fine you might say - but what is the difference between CookieCollection and a CookieContainer?They kind of look the same. The difference is that the CookieCollection is the cookies obtained for the SPECIFIC request. CookieContainer is designed to be a store of all the cookies for one more requests. To that extent, the CookieContainer is designed to be a hashtable of "domain - CookieCollection" pairs. What this means is that for the next requests you create, you can safely assign the cookiecontainer from the previous request. But then you might be wondering whether we send the cookies that we are not supposed to. Fear not. The CookieContainer is designed to be safe. When the second request is sent the we look at the URI and the path you are using and send only those cookies that we can safely send as per the RFC.
Here is the complete sample for Cookies
using System;using System.Threading;using System.Net;using System.Text;using System.IO;
public class Test{
public static void Main(string[] args) { Stream s = null; StreamReader sr = null; HttpWebResponse Res = null; CookieContainer CC = new CookieContainer(); try { //---------------------------------------------------- //FIRST REQUEST //---------------------------------------------------- HttpWebRequest Req = (HttpWebRequest) WebRequest.Create(""); Req.Proxy = null; Req.UseDefaultCredentials = true; //YOU MUST ASSIGN A COOKIE CONTAINER FOR THE REQUEST TO PULL THE COOKIES());
//---------------------------------------------------- //SECOND REQUEST //----------------------------------------------------
Req = (HttpWebRequest) WebRequest.Create(""); Req.Proxy = null; Req.UseDefaultCredentials = true; //TO TRANSFER COOKIES TO THE NEXT PAGE()); } catch(Exception ex) { Console.WriteLine(ex); } finally { if(sr != null) sr.Close(); if(s != null) s.Close(); } }}
Hope you find this useful. Let me know your commentsAlso let me know what other topics you want me to blog about.
Just a note that I will be speaking at the PDC 2005 doing a Tips and Trickssession on System.Net 2.0. I will be covering Tracing, X509 Certificates, Kerberos auth, SMTP with embedded resources, etc. If there is a particular topic that if interest to youlet me know. Durgaprasad GortiTest Lead System.Net | http://blogs.msdn.com/dgorti/ | crawl-002 | refinedweb | 6,781 | 58.48 |
- Advertisement
titanandrewsMember
Content count18
Joined
Last visited
Community Reputation122 Neutral
About titanandrews
- RankMember
Using template class across libraries.
titanandrews replied to titanandrews's topic in General and Gameplay ProgrammingAh! You're right! Silly me. I'm not used to templates yet, but I'm learning. Thanks Guys!
Using template class across libraries.
titanandrews replied to titanandrews's topic in General and Gameplay ProgrammingSo to be clear, these are linker errors not compiler errors. I have this header in project A that will create my lib. #ifndef FOO_H #define FOO_H #include "templatelib_global.h" template <typename T> class TEMPLATELIB_EXPORT Foo { public: void setValue(T value) { _value = value; } T getValue() const { return _value; } private: T _value; }; #endif // FOO_H I have this cpp file in project B that will create an exe. #include "foo.h" int main(int argc, char *argv[]) { Foo<int> f; f.setValue(1); int i = f.getValue(); } The linker errors are: error LNK2019: unresolved external symbol "__declspec(dllimport) public: int __thiscall Foo<int>::getValue(void)const " (__imp_?getValue@?$Foo@H@@QBEHXZ) referenced in function _main main.obj error LNK2019: unresolved external symbol "__declspec(dllimport) public: void __thiscall Foo<int>::setValue(int)" (__imp_?setValue@?$Foo@H@@QAEXH@Z) referenced in function _main main.obj If I create a cpp file in project A. #include "foo.h"; void func() { Foo<int> f; f.setValue(1); f.getValue(); } the linker errors go away. thanks, B
Using template class across libraries.
titanandrews posted a topic in General and Gameplay ProgrammingHi All, I have a template class in a header file in lib A. Now I want to test it using CppUnit in exe B. Since the actual class of type T never gets created unless a client instantiates one, the code is never compiled in lib A. Since the symbols are never exported from lib A, I get linkage errors when exe B tries to link. I understand there are several ways to handle this. One way is to create a dummy class in lib A that instantiates classes of type T. ( however many T's you need ) The template classes would be created and symbols exported solving the linker problem. How do others handle this sort of thing? Is there some design pattern? many thanks, B
- Quote:We wrote LUA scripts to exercise different actions Were these actions that you could repeat over and over again in a loop or did the logic on the server prevent this? I would think to gather statistical data you would need to perform actions several times on each game instance. For actions that you can only do once during the game, I suppose you have to reset the state back to a point where you can repeat the test? How did you handle this? -B
- Thanks for the replies guys! So I guess what I was thinking was some sort of tool that could "simulate" game play for n number of virtual players. Basically you could describe the protocol to this tool as well as define certain other parameters and the tool could automagically run through all sorts of scenarios. Perhaps there would have to be some sort of AI involved in this. From what you guys are saying, such a tool does not exist and pretty much load testing is done with real users in beta testing scenario. Maybe a tool I am thinking of is just inconceivable? -B
MMO load testing
titanandrews posted a topic in Networking and MultiplayerHi, Does anyone know what tools are used in the industry to do load testing for MMO games? I googled "MMO load testing" and it didn't turn up anything useful. I'm sure companies must perform load testing on their servers so they can know how many users they can support. Does anyone have any insight into this side of the industry? many thanks, B
Some help with collision detection
titanandrews replied to titanandrews's topic in For Beginners's ForumCould this have something to do with how the perspective is set up and nothing at all to do with collision detection? I really am at a loss. Can anyone please help? thanks, B
Some help with collision detection
titanandrews posted a topic in For Beginners's ForumHi All, I am having a lot of difficulty with collision detection. Actually, I'm not certain if it's a problem with collision detection specifically or something I just don't understand about OpenGL. :) I have adapted Oleg Dopertchouk's example from "Simple Bounding-Sphere Collision Detection" for a Java game using JOGL. ( Thanks to Oleg! ) Here is my method: boolean sphereTest(AbstractGameObject obj1, AbstractGameObject obj2) { // Relative velocity Vector3D dv = Vector3D.substract(obj2.getVelocity(),obj1.getVelocity()); // Relative position Vector3D dp = Vector3D.substract(obj2.getPosition(),obj1.getPosition()); //Minimal distance squared float r = (obj1.getWidth() / 2) + (obj2.getWidth() / 2); //dP^2-r^2 float pp = dp.x * dp.x + dp.y * dp.y + dp.z * dp.z - r*r; //(1)Check if the spheres are already intersecting if ( pp < 0 ) return true; //dP*dV float pv = dp.x * dv.x + dp.y * dv.y + dp.z * dv.z; //(2)Check if the spheres are moving away from each other if ( pv >= 0 ) return false; //dV^2 float vv = dv.x * dv.x + dv.y * dv.y + dv.z * dv.z; //(3)Check if the spheres can intersect within 1 frame if ( (pv + vv) <= 0 && (vv + 2 * pv + pp) >= 0 ) return false; / ); } Now this works like a charm if obj2 is sitting at 0.0f,0.0f,0.0f, but the further down on the screen obj2 is ( for example -.5f on the y axis ) obj1 collides sooner. Way to soon. And the further down it is the sooner it collides. If obj2 is further up the screen from the center ( for example .5f on the y axis ) then the collision happens way too late. It's very odd to me. The output of my tracing is: Ball 0.0,-0.57959735,0.0 w=0.06 h=0.06 collided with TestBlocker 0.0,-0.5,0.0 w=0.1 h=0.05 Unless I am missing something, the above output looks correct, however the 2 objects are miles from each other. Can anyone give me hints as to what the problem might be? Many thanks! -B
Free wavefront.obj files?
titanandrews posted a topic in For Beginners's ForumHi All, For someone like me who wants to experiment with 3D games but who is not an artist, are there any web sites where one could get free wavefront.obj files? I can draw things that are cube based like a table or chair, but for things like a human-like body or a tree, I have no idea. If I had a sample .obj human-like body that someone else has done, I could import it into something like wings3D, modify it, export it, and use it an OpenGL game. Is there any such free 3D artwork available? many thanks! B
3D modeling software, bitmaps and OpenGL
titanandrews replied to titanandrews's topic in For Beginners's ForumThat is quite impressive!
3D modeling software, bitmaps and OpenGL
titanandrews replied to titanandrews's topic in For Beginners's Forumawesome! Thanks for the replies!
3D modeling software, bitmaps and OpenGL
titanandrews posted a topic in For Beginners's ForumHi All, Since I have googled for a couple of hours on this and cannot find an answer, it is probably a stupid question that everyone knows. But here goes anyway. :) In Chapter 6 of Beginning OpenGL Game Programming, it talks about using bitmaps for 2D objects in a game. Well... if I want to use 3D modeling software like K3D or Wings3D to create a 3D game character, how do I go about using the character in the game. For example, in K3D you can export your 3D object as a tiff. But isn't that going to be a 2D image? If I load the image into an OpenGL program, will I be able to rotate the object around and see it's backside? I guess what I am asking here is this. I see how drawing objects with polygons in OpenGL works and how you can rotate them and such. But how does 3D modeling software fit into this picture? Obviously if someone wanted to create a game they would not try to do everything with OpenGL code or it would take forever. many many thanks for your help! -Barry
Wanted: SlickEdit v8 or higher for Linux
titanandrews posted a topic in Your AnnouncementsHi, Does anyone have SlickEdit v8 or higher for Linux that they don't use anymore and would be willing to sell to me? thanks, B
algorithm for creating a circle.
titanandrews replied to titanandrews's topic in Graphics and GPU ProgrammingAh Ha!! I figured out my problem with the code you posted and a little trial and error. Thanks! I was making some calls like this, gluPerspective(52.0f,(GLfloat)width/(GLfloat)height,1.0f,1000.0f); and gluLookAt(0.0, 10.0, 0.1, 0.0, 0.0, 0.0, 0.0, 1.0, 0.0); These were left over from Chapter 3 examples in "Beginning OpenGL". It is unclear what these functions are actually doing. The book has not explained them yet, but just by commenting them, I can draw the circle. I did read the API docs for these functions, and I guess they will make more sense to me later. For now the light bulb is still off for me. thanks guys!
algorithm for creating a circle.
titanandrews replied to titanandrews's topic in Graphics and GPU ProgrammingThanks for the replies! Yes, I assumed it was an int ( without thinking of course ). So I changed it to a float, but I still get the same problem, a straight line in the middle of the screen. I do a cout just to make sure there is no weird rounding problem going on. What else can I check? This really has me stumped. GLint circle_points = 100; glBegin(GL_LINE_LOOP); for (float i = 0; i < circle_points; i++) { float angle = TWO_PI*i/circle_points; char buffer[20]; sprintf(buffer,"%f",angle); cout << buffer << endl; glVertex2f(cos(angle), sin(angle)); } glEnd();
- Advertisement | https://www.gamedev.net/profile/103901-titanandrews/ | CC-MAIN-2018-39 | refinedweb | 1,705 | 65.32 |
Get day and night global geometry and dumps to a GeoJSON file. Builded on top of Matplotlib Basemap Toolkit Library.
Description
Get day and night global geometry and dumps to a GeoJSON file.
Builded on top of Matplotlib Basemap Toolkit Library. Geojson and Shapely libraries are used to deal with geometries.
Output Coordinate Reference System (CRS): EPSG 4326
Requirements
- Geojson Python library (>= 1.0.9).
- Shapely Python library (>= 1.4).
- Matplotlib Basemap Toolkit Python library (>= 1.0.7).
See requirements of above libraries (Numpy, Matplotlib, GEOS, etc.).
Installing
If you want to install from pip and you do not have installed Basemap:
pip install daynight2geojson –allow-external basemap –allow-unverified basemap
Usage
Basic usage:
from datetime import datetime from daynight2geojson import DayNight2Geojson # Filepath to output GeoJSON filepath = '/tmp/day_night.geojson' # input_date = None is for UTC now date # For others input date: datetime object must be passed # datetime(year, month, day, hour, minute) input_date = datetime(2015, 1, 15, 00, 00) dn = DayNight2Geojson(filepath, input_date=input_date) dn.getDayNight()
Test script: - test/daynighttesting.py
License
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
Download Files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages. | https://pypi.org/project/daynight2geojson/ | CC-MAIN-2017-43 | refinedweb | 235 | 56.76 |
In the first part of this tutorial, we looked at the bare basics for creating, publishing and calling a module. The module we created didn’t really do much, so now it’s time to look at expaning the functionality using some of Play’s features.
1. (steve@objectify.be) */ (steve@objectify.be) */ public class LogMeAction extends Action<LogMe> { (steve@objectify.be) */ public class LogMeAction extends Action<LogMe> {.
15 thoughts on “Writing modules for Play 2, part 2: Interceptors”
Thanks for the guide so far!
Thanks for the great intro!
Just one question: Is there a difference between a module and a plugin in Play, or is it just a matter of naming? And if there is any difference, when should one opt for the former or the later?
A plugin is just a class that extends Play’s Plugin class. You can have plugins in your main code base or in modules.
Modules are externalised, generic libraries that are specific to Play, but don’t implement any specific classes or interfaces.
Hi Steve,
That’s a great manual, thanks! I’m now trying to walk through, however getting an error in
@With(LogMeAction.class)
saying that types are incompatible:
[info] Compiling 1 Scala source and 2 Java sources to /home/sskrobot/dev/stork-admin/target/scala-2.9.1/classes...
[error] /home/sskrobot/dev/stork-admin/app/actions/RenderWith.java:16: incompatible types
[error] found : java.lang.Class
[error] required: java.lang.Class<? extends play.mvc.Action>
[error] @With(LogMeAction.class)
[error] ^
[error] 1 error
Did you see this? What’s the signature of the @With annotation you are using?
@Sergey – hmm, that’s odd. Did you check the example implementation at ?
Steve, I was inspired by your post and wrote my own on using “interceptors” to implement basic auth: Basic Authentication in the Play Framework Using A Custom Action Annotation
@Shane – very nicely done…and it’s always nice to read that I’ve inspired something 🙂
@sergey @steve the only thing wrong with the post is that LogAction.java class definition should go from
public class LogMeAction extends Action
to
public class LogMeAction extends Action
otherwise so good so far
Thanks Nick – your comment got a bit mangled, for exactly the same the original post did (using angled brackets instead of <, etc) but I got the point. The post has now been corrected.
Important tip for speed up your module development:
Instead of using your local repository (need to republish every time you do a change in your module) you could use dependsOn in your sample Build.scala.
Take a look at this site for a detailed example
Shane, you shuld updte your code to Play FW 2.2
F.Promise and
return F.Promise.pure((SimpleResult) unauthorized());
/Erik | http://www.objectify.be/wordpress/2012/03/19/writing-modules-for-play-2-part-2-interceptors/ | CC-MAIN-2017-22 | refinedweb | 461 | 56.76 |
Arnd,
On 03.03.06, Arnd Baecker wrote:
> > > To be more precise: I used a subclass of ``pyx.graph.graphxy`` with
> > > self.domethods = [ self.dolayout, self.dobackground, self.dodata,
> > > self.doaxes, self.dokey,
> > > self.somefurther_routine]
> > >
> > > What is now the preferred way of changing the order or adding
> > > routines? Is overriding ``finish`` the way to go?
> >
> > Exactly. But that should not be a problem, that's exactly what
> > an object-oriented system is good for, isn't it?
>
> Absolutely - I just wanted to be sure that I don't change
> things back and forth in my code ;-).
Well, than I'm sorry to have to tell you, that the domethods list is
gone in CVS head. The simple reason is, that it's the wrong concept.
We wanted a more flexible dependancy description. An example are
linked axes between graphs in a circular way as in the following
example:
from pyx import *
c = canvas.canvas()
g1 = c.insert(graph.graphxy(width=8,
x=graph.axis.linear(min=0, max=1),
x2=graph.axis.linkedaxis()))
g2 = c.insert(graph.graphxy(width=8, ypos=g1.height+0.5,
x=graph.axis.linkedaxis(),
x2=graph.axis.log(min=1, max=1000)))
g1.axes["x2"].setlinkedaxis(g2.axes["x2"])
g2.axes["x"].setlinkedaxis(g1.axes["x"])
g1.plot(graph.data.function("y(x)=2*exp(-30*x)-exp(-3*x)"))
g2.plot(graph.data.function("y(x)=cos(20*x)*exp(-2*x)"))
c.writeEPSfile("link")
c.writePDFfile("link")
(This runs on CVS head only, not in PyX 0.8.x!)
What happens here, is that to finish the one graph, an axis of the
other graph needs to be layouted and we have an cyclic inter-graph
depenancy. In the old version, this would not be possible, since non
of the layouts of the two graphs can be done before the other, but
for the axes this is of course not the case. So the do-methods can now
also have arguments and there dependancies can be much more
complicated. In the end the finish method becomes much simpler -- it's
just a call to the do-methods needed to paint the parts of the graph
and everything else works like expected (i.e. the other dependancies
are resolved as needed).
So for you ... well, it makes a difference whether we're talking about
PyX 0.8.x and the upcoming PyX versions. I'm sorry. Still, I very much
think that the new code brings a lot of improvements.
André
--
by _ _ _ Dr. André Wobst
/ \ \ / ) wobsta@...,
/ _ \ \/\/ / PyX - High quality PostScript and PDF figures
(_/ \_)_/\_/ with Python & TeX: visit
Hi Ryan,
On 03.03.06, Ryan Krauss wrote:
> If it helps, here is an example of the input to the flow program:
> Right
> Box 5 3
> Call \lstinline!EigError!($j\omega$)
> in an implied for loop
> to get Characteristic
> Determinant($\omega$)
> Box 5 3
> Plot Characteristic
> Determinant vs. $\omega$
> to find good initial
> guesses for numerical
> search
> Box 5 3
> Call \lstinline!FindEig!(guess)
> for each guess taken
> from the plot of
> Characteristic
> Determinant vs. $\omega$
> Skip 0 0 1 1
> SetTrack none
> Down 0.7
> TxtPos [l] [l]
> Text 5 5
> \lstinline!FindEig! calls either \lstinline!newton!
> to find the root of the
> characteristic determinant
> or \lstinline!fmin! to find the local
> minimum of the absolute
> value of the characteristic
> determinant. In both cases,
> \lstinline!EigError! is the cost function.
>
> and the output is attached.
Nice. But I'm sorry I have to say that we don't yet have a solution
in the PyX core at the moment. In the end I want to have "boxes" in
PyX, which are like canvases, but have additional features like
- a border
- connectors between boxes
- alignment functions
- clip the content (maybe optionally only)
While you'll find the concept of boxes and connectors within PyX
already, they are not end-user friendly yet. It might be an option to
use what we already have or write some small own functions (or classes
or similar) to simplify the task you want to do to some simple
function calls.
André
--
by _ _ _ Dr. André Wobst
/ \ \ / ) wobsta@...,
/ _ \ \/\/ / PyX - High quality PostScript and PDF figures
(_/ \_)_/\_/ with Python & TeX: visit | https://sourceforge.net/p/pyx/mailman/pyx-user/?viewmonth=200603&viewday=5 | CC-MAIN-2018-26 | refinedweb | 713 | 66.94 |
VanDev 2009-10-16T22:37:19+00:00 Chris Van Pelt vanpelt@gmail.com MongoDB Fancy Ass Grouping 2009-10-16T00:00:00+00:00 <p>So lately I’ve been playing with <a href=''>Mongodb</a> for <a href=''>CrowdFlower</a>. We need to calculate statistics from the information that we gather. Mongo provides support for this but has little documentation. I thought it would be appropriate to describe how I got some of the fancier group statements working. Let’s take this document format as an example:</p> <div> <pre> <code class='javascript'>{ "state": "finished", "data": { "everythings_good": "yes" } }</code> </pre> </div> <p>The key property alone of the group function can not be used because our key is in an embedded member. We have to use the keyf property of the <a href=''>group</a> command. I’m using the Mongo ruby library and it currently doesn’t support the use of this property. Instead I issue the raw db_command:</p> <div> <pre> <code class='ruby'>db = Mongo::Connection.new.db('docs') db.db_command({ "group" => { "ns" => "ratings", "$reduce" => Mongo::Code.new(<<-JS), function(obj,prev){ prev.count++; } JS "$keyf" => Mongo::Code.new(<<-JS), function(obj){ var g = {} g[obj.data.everythings_good] = true return g } JS "cond" => {}, "initial" => {:count => 0} } })</code> </pre> </div> <p>This command returns the following value:</p> <div> <pre> <code class='ruby'>{ "retval"=>[ {"yes"=>1.0, "count"=>17355.0}, {"no"=>1.0, "count"=>6395.0} ], "count"=>23750.0, "keys"=>2, "ok"=>1.0 }</code> </pre> </div> <p><strong>Note:</strong> the keyf property was not working properly until version 1.1.0 of mongodb</p> Fancy Zoom Mootools time 2008-09-16T00:00:00+00:00 <script src='' type='text/javascript' /><script type='text/javascript'> /* <![CDATA[ */ document.addEvent('domready', function(){ new FancyZoom($('hot_thumb'), {scaleImg:true, directory:'/images'}) }) /* ]]> */ </script> <p>So I stumbled upon this <a href=''>project</a> on github.com… If you browse the archives of this blog you might see I have an affinity for Mootools over Prototype or JQuery <em>(Although JQuery is hot, and the new FX stuff is tempting me to stop being a rebel)</em>. Regardless, Fancy Zoom for Mootools is <a href=''>born</a>. It’s a pretty straight forward port. The main performance gain is that the effects are only initialized once no matter how many FancyZoom instances there are on a page. Click on the thumbnail below to see it in action.</p> <a href='#hot' id='hot_thumb'> <img src='' /></a><div id='hot'> <img src='' /> </div> <p>In unrelated news the image you just clicked on is of me speaking at the local <a href=''>San Francisco JavaScript meetup</a> a couple weeks ago. I attempted to give a tutorial of Mootools called <a href=''>Instimage</a>. If you do a search for <a href=''>“sf js”</a> my <a href=''>slides</a> are the first result for some reason… Pagerank is the end all. Peace.</p> JSAwesome 2008-04-22T00:00:00+00:00 <p>Here is a sample call to JSAwesome:</p> <div> <pre> <code class='javascript'()</code> </pre> </div> <p>This generates this form (_choose <code>awesome</code>, than <code>crazy</code>, than <code>Indeed</code> from the set of select boxes at the bottom of the form to have your mind blown_)</p> <div id='an_id' /><script src='/js/jsawesome.js' type='text/javascript' charset='utf-8' /><script type='text/javascript'> /* <![CDATA[ */() /* ]]> */ </script> <p>With this markup:</p> <div> <pre> <code class='html'><div id="an_id"> <div class="error text_field"> <label for="an_id_text_field">Text field</label> <input id="an_id_text_field" class="text_field" type="text" name="an_id[text_field]" /> </div> <div class="error text_area"> <label for="an_id_text_area">Text area</label> <textarea id="an_id_text_area" class="text_area" name="an_id[text_area]"></textarea> </div> <div class="error hidden_input"> <input id="an_id_hidden_input" class="hidden_input" type="hidden" name="an_id[hidden_input]" value="i_am_invisible" /> </div> <div class="error radios"> <fieldset> <legend>Radios</legend> <label for="an_id_radios"> <input id="" class="radios" type="radio" name="an_id[radios]" value="nice"> So</label> <label for="an_id_radios"> <input id="" class="radios" type="radio" name="an_id[radios]" value="many"> Many</label> <label for="an_id_radios"> <input id="" class="radios" type="radio" name="an_id[radios]" value="boxes"> Radio</label> <label for="an_id_radios"> <input id="" class="radios" type="radio" name="an_id[radios]" value="yeah"> Yeah</label> </fieldset> </div> <div class="error row_5"> <div style="float: left; margin-right: 5px;"> <label for="an_id_checkbox"> <span> <input id="an_id_real_cool" class="real_cool" type="checkbox" name="an_id[checkbox]" value="true"> <input id="an_id_real_cool" class="real_cool" type="hidden" name="an_id[checkbox]" value="false"> </span> Checkbox</label> </div> <div style="float: left; margin-right: 5px;"> <label for="an_id_not"> <span> <input id="an_id_not" class="not" type="checkbox" name="an_id[not]" value="true"> <input id="an_id_not" class="not" type="hidden" name="an_id[not]" value="false"> </span> Not</label> </div><br style="clear: left;"> </div> <div class="error choices"> <fieldset> <legend>Choices</legend> <label for="an_id_one"> <span> <input id="an_id_one" class="one" type="checkbox" name="an_id[one]" value="true"> <input id="an_id_one" class="one" type="hidden" name="an_id[one]" value="false"> </span> Choice 1</label> <label for="an_id_two"> <span> <input id="an_id_two" class="two" type="checkbox" name="an_id[two]" value="true"> <input id="an_id_two" class="two" type="hidden" name="an_id[two]" value="false"> </span> Choice 2</label> <label for="an_id_three"> <span> <input id="an_id_three" class="three" type="checkbox" name="an_id[three]" value="true"> <input id="an_id_three" class="three" type="hidden" name="an_id[three]" value="false"> </span> Choice 3</label> </fieldset> </div> <div class="error single_select"> <label for="an_id_single_select">Single select</label> <select id="an_id_single_select" class="single_select" name="an_id[single_select]"> <option value="">Choose Category</option> <option value="boo">boo</option> <option value="yah">yah</option> </select> </div> <div class="error nested_select"> <label for="an_id_nested_select">Sub cats</label> <select id="an_id_nested_select" class="nested_select" name="an_id[nested_select]"> <option value=""> Choose Category </option> <option value="rad"> rad </option> <option value="awesome"> awesome </option> </select> <select id="an_id_nested_select_1" class="nested_select_1" name="an_id[nested_select_1]"> <option value=""> Choose Subcategory </option> </select> </div> </div></code> </pre> </div> <p>Wow, lot’s of HTML from a little JSON. Let’s do an overview of the parameters.</p> <ol> <li>The first parameter to JSAwesome is an id of an element already in the DOM. It also acts as a namespace for the names and id’s of form elements to allow for multiple JSAwesome forms on a page. Looking at the html you can see you have plenty of classes added as well to style your generated form to your hearts content.</li> <li>The second parameter is an array of tuples specifying the form elements in order. The tuples can create the following elements using these rules: * <strong>textfield</strong> - the first element is the name with no special character and the second element is a string with the default value * <strong>textarea</strong> - the first element is the name beginning with a <code>#</code> and the second element is a string with the default value * <strong>hidden</strong> - the first element is the name beginning with a <code>_</code> and the second element is the value * <strong>radio</strong> - the first element is the legend of a fieldset / name of the radio buttons beginning with a <code>*</code> and the second element is an array of names. Optionally you can specify label / name pairs separated by the <code>|</code> character. * <strong>checkbox</strong> - the first element is the name and label of a checkbox beginning with a <code>^</code> character. If a second element is present, the checkbox will be checked. The example above also demonstrates the ability to group fields together on the same line. If you use an array of tuples, <em>or in this case checkboxes can be specfied with a single string if the you don’t want it checked</em>, those elements will be wrapped in div’s with the style set to ‘float:left’. Optionally label / name pairs work the same as radio’s. * <strong>checkbox group</strong> - the first element is the legend of a fieldset and the second is an array of checkboxes as described above * <strong>single select</strong> - the first element is the name of the select and the second is an array of options. Optionally the options can specify name / value pairs separated by the <code>|</code> character. You can also use the ’~’ character to specify a custom input. When this option is selected a textfield will appear to allow the user to enter a custom value. * <strong>nested select</strong> - the first element is the name of the select. The second element is a hash with the keys being the options and the values being hashes or arrays of the child selects. Optionally name / value pairs and custom inputs work the same as single selects.</li> </ol> <p>But there’s more. JSAwesome takes a third parameter which gives you custom labels and validations. This use case might look like this:</p> <div> <pre> <code class='javascript'()</code> </pre> </div> <p>Which generates this form:</p> <form action='#' id='form'><div id='validated' /><br /><input type='submit' value='Test validation' /></form><script type='text/javascript'> /* <![CDATA[ */() $('form').addEvent('submit', function(e) { e.stop() if(test.validate()) alert('Passed validation') }) /* ]]> */ </script> <p><strong>Bam</strong>, is your mind completely blown yet? Here’s an overview of the 3rd parameter:</p> <ul> <li> <p>The keys to the hash are either names of elements in the form (_without the special characters_) or one of two special global names <code>~</code> or <code>{}</code>.</p> </li> <li> <p>The values of the hash are either a string or another hash. If it’s a string, it represents the label for the element specifed. If it’s a hash you can specify all or one of the following:</p> <ul> <li><strong>required</strong> - a boolean specifying whether the field is required. <em>if it is used for a radio or checkbox group it will require atleast one radio button to be clicked</em>. It can also be used alongside of <strong>validation</strong> to make a text input field both required and validated</li> <li><strong>validation</strong> - a tuple with the first element being a javascript RegEx string. The second is a message to be displayed on failure</li> <li><strong>label</strong> - the label, just as if you had given only a string, but can be used alongside required and validation</li> </ul> </li> <li> <p>If the key is <code>~</code> this specifies the value to be used in custom fields as opposed to the default ‘Custom…’ (_choose ‘yah’ from the select box above_)</p> </li> <li> <p>If the key is <code>{}</code> the value is a tuple with the first element being the default value for the root select element, and the optional second parameter being the default for any sub-selects.</p> </li> </ul> <p>So there you have it. JSAwesome in a nutshell. We use this library over at <a href=''>Dolores Labs</a> for easily creating dynamic forms for all of our <a href=''>experiments</a>. It beats the crap out of writing HTML forms manually and makes our tasks load a lot faster. We also get validation for free. It currently requires mootools 1.2b, which is packed with the <a href=''>project</a>. Fork away!</p> 6.5 months... not bad 2007-10-30T00:00:00+00:00 <p>Hmmm, well I don’t know what to say. This will have to do until I come up with something…</p> <p><img src='' alt='Dance baby dance' /></p> Inside the Croppr frontend 2007-04-16T00:00:00+00:00 <p>I learned allot creating <a href=''>croppr</a>. It’s pretty intersting what you can do with the DOM and some CSS. Let’s take a peek under the hood.</p> <p>The first thing croppr does upon instantiation is create a bunch of DOM elements. Here’s what that looks like.</p> <a href='#' id='toggle_styles'>Toggle Styles</a><div id='the_styles'> <div> <pre> <code class='html'>></code> </pre> </div> </div><script type='text/javascript' charset='utf-8'> /* <![CDATA[ */ $('toggle_styles').addEvent('click', toggleStyles); function toggleStyles(event) { $$('span.style', 'the_styles').each(function(e) { var fade = new Fx.Tween(e, {duration:1000, onComplete:function(e){ if(this.to[0].value == 0) { e.setStyle('display','none'); new Element('span', {html:'...'}).inject(e,'before'); } }, onStart: function(e){ e.setStyle('display','inline'); if(this.from[0].value == 0) e.getPrevious().destroy(); } }); e.style.visibility == "hidden" ? fade.start( 'opacity', [0,1]) : fade.start( 'opacity', [1,0]); }); event.stop(); } window.addEvent('domready', function(){ $('second_toggle').addEvent('click', toggleStyles); toggleStyles({ stop: function(){} }) }); /* ]]> */ </script><a href='#the_styles' id='second_toggle'>Toggle</a> <p>The next element is our container for all the fun goodies we’re about to add (_container_). It serves three purposes.</p> <ol> <li><em>Makes cleanup easy.</em> By deleting this element, all the others will disappear.</li> <li><em>Namespaces the rest of our elements.</em> You can target <code>#croppr .exit</code> in your CSS without effecting other elements with the class of <code>exit</code>.</li> <li><em>Get’s rid of vertical and horizontal scroll bars.</em> By setting <code>overflow:hidden</code> when the image we are cropping goes outside of the window, the browser doesn’t add scrollbars and screw up our math.</li> </ol> <p>The transparent box is not placed in this div because we want a nice fade back into the original environment after we have deleted all of the cropping tools. More on this in a little bit.</p> <p. <code>overflow:hidden</code> is set on the mask as well, making the parts outside of it invisible. Both the mask and the ghost are positioned absolutely and have <code>top</code> and <code>left</code> attributes set to 50%. We then give them negative <code>top</code> and <code>left</code>:</p> <div> <pre> <code class='javascript');</code> </pre> </div> <p.</p> <div> <pre> <code class='javascript') });</code> </pre> </div> <p>Mootool’s awesome <a href=''>Drag</a>.</p> <p.</p> <p>When we’re done using croppr, cleanup is as easy as:</p> <div> <pre> <code class='javascript'>this.container.remove(); new Fx.Style(this.trans, 'opacity', {duration: 1000, onComplete: this.trans.remove}).start(0.8, 0);</code> </pre> </div> <p>And that’s that, bending the DOM to do your dirty work turns out not to be so bad…</p> Croppr, ready for primetime 2007-04-11T00:00:00+00:00 <p>It’s been a long time coming… Croppr has grown out of it’s infancy. Sparked recently by the release of <a href=''>Gravatar 2.0</a> and the Ruby on Rails podcast <a href=''>Camping II</a>, I dove back into the code and cleaned it up. Croppr now adheres to the minimalistic principles of <a href=''>Camping</a>. RMagick was thrown out in favor of <a href=''>ImageScience</a>. The javascript was tweaked for performance and readability using the ever so light and powerfull <a href=''>MooTools</a>. The magic is really in the javascript, I encourage you to check <a href=''>it</a> out. All the pieces come together as a living tutorial of how to implement Croppr on your own. Go <a href=''>play</a> with my vain demo! If you want to get sneaky and upload your own image tag <code>/new</code> to the end of the URL, but keep it clean… Here’s an overview on how to get her up and running on your own machine:</p> <div> <pre> <code class='javascript'</code> </pre> </div> <p.</p> Mootools and my sidebar, doing it 2007-03-11T00:00:00+00:00 <p>This afternoon I was perusing the web and ended up mining <a href=''>Yelp</a> for something to do in this new and foreign <a href=''>city</a>. I noticed a slick <a href=''>effect</a> that was used to keep the map in the view port as you scrolled. I had done this before with the <code>position:fixed</code> css directive, but it’s rather limited especially in a centered layout. You also can’t choose your easing equation or delay the effect… Thanks <a href=''>Moo</a>, let’s do it.</p> <p>I added a set of links which link to targets on this <a href=''>page</a> in my sidebar entitled “On this page…”. I want the links to scroll the page to the targeted element, and I also want the links to follow me there so I can click on another one if I need to. 8 lines of javascript with the aid of Mootools gets her done.</p> <div> <pre> <code class='javascript'>var slideEffect = new Fx.Style('sidenav', 'margin-top', {wait:false, duration:800, transition:Fx.Transitions.circOut}); window.addEvent('load', function() { var top = $('sidenav').getPosition().y - 10; window.addEvent('scroll', function(){ slideEffect.start.delay(600, slideEffect, Math.max(0, document.documentElement.scrollTop - top)); }); new SmoothScroll({duration:700, transition:Fx.Transitions.circOut}); });</code> </pre> </div> <p>Let’s analyze the crap out of this code. I first create a new Fx.Style specifying <code>wait:false</code> (_so If I start scrolling down the page and than suddenly switch direction, the effect will simply start over in that new direction_). I’m modifying the <code>margin-top</code> property of the <code>sidenav</code> element. I also specify a custom transition <code>circOut</code> which starts fast and than slows to a stop. Using <code>window.addEvent('load'</code>, I wait for the document to load because the position of my div is relative to the image of my face. You could use the <code>domready</code> event if the position of the div you will be scrolling is not relative to an image… Next I get the position of the top of my div and subtract 10 from it to give it some padding.</p> <p>Now for the magic. I listen for the <code>scroll</code> event and when it happens I fire the recently created <code>slideEffect</code>. However, because the delay is cool and if I don’t delay the effect will look really jumpy, I delay the start of the effect. Moo provides a delay method which can be called on any function. You have to call it on the function, not on the thing the function returns: e.g. <code>myFunction.delay(100)</code> or <code>function(){return 'rad'}.delay(300)</code> instead of <code>myFunction('awesome').delay(30)</code>. The second attribute to delay is an object that will become <code>this</code> in the function delay is being called on. In this case we want <code>this</code> to be the effect itself. The third attribute is the attribute(s) that will be passed into the function. For us, this is an integer representing the new margin. We calculate this as the maximum of either 0 or the difference of the current viewport offset and the original offset of the image.</p> <p>The last thing to do is make a call to <code>SmoothScroll</code>, making all links that point to a target scroll to the element with that targets id (this was detailed in my <a href='#article_2140'>last</a> post). So there it is, a detailed description of how my sidebar and mootools did it.</p> Mootools, a silly Fx tutorial 2007-02-28T00:00:00+00:00 <p>I’ve been loving <a href=''>mootools</a> lately so I figured I would demonstrate some of it’s awesomeness by explaining a few of the effects generated on this very page.</p> <h3 id='awesome_bouncy_nav_tabs__upper_right_funny_creative_projects_'>Awesome bouncy nav tabs (_upper right, funny creative projects_)</h3> <div> <pre> <code class='javascript'>$$('#header ul li a').each(function(el) { var bounce = new Fx.Style(el, 'top', {duration:700, transition: Fx.Transitions.elasticOut}); var colors = new Fx.Styles(el, {wait:false}); el.addEvent('mouseover', function(){ el.setStyle('background-color', '#d5e88f'); bounce.start(15,0); colors.start({ color: '35342e' }); }); el.addEvent('mouseout', function(){ colors.start({ 'background-color': '35342e', color: 'd5e88f' }); }); });</code> </pre> </div> <p>Allright, so moo gives us a DOM selector much like prototypes. I use it to grab all the <code>a</code> tags in my nav list, and then I iterate over them. Moo has three generic Fx classes, <a href=''>Style</a>, <a href=''>Styles</a>, and <a href=''>Elements</a>. I don’t use Fx.Elements here, but you can read about it via moos excellent <a href=''>documentation</a>. If you are familiar with the scriptaculous Morph effect, these will come natuarlly. They let you tween a list of css attributes, leaving the door of possibilities for amazing custom effects wide open.</p> <p>First I create two effects. One to deal with the motion, <em>bounce</em>, and the other to deal with font and background color, <em>colors</em>. Moo supplies an <a href=''>optional</a> set of robust transitions based on Robert Penner’s <a href=''>easing</a> equations (_the easing demo is extremely helpful_). I specify the elasticOut transition upon instantiation of the <em>bounce</em> effect to make it, well bouncy. Setting <code>wait</code> to false in the Fx.Styles call tells the effect to go ahead and run even if there is another effect just like it already running. This let’s the tab fade back to normal if I mouseout before it’s finished.</p> <p>After the effects are created, all that’s left is attaching them to an event. Voila, crazy cool bouncy tabs.</p> <h3 id='a_silly_unobtrusive_smooth_scrolling_effect__click_its_not_what_you_think_next_to_the_vd_logo_'>A silly unobtrusive smooth scrolling effect (_click “it’s not what you think” next to the VD logo_)</h3> <div> <pre> <code class='javascript'>new SmoothScroll({duration:1000});</code> </pre> </div> <p>Another <a href=''>optional</a> effect (thank you kickass building tool), is <a href=''>SmoothScroll</a>. Upon instantiation she finds all of the targets (aka anything with an id) and adds an event to all the <code>a</code> tags referencing that target (aka href=”#name_of_target”), which scrolls the window to that element… just click it.</p> <h3 id='opaque_image_rollover__what_the_flick_'>Opaque image rollover (_what the flick_)</h3> <div> <pre> <code class='javascript'>$$('div#flickr img').each(function(e){ var fade = new Fx.Style(e, 'opacity', {wait:false}); fade.set(.5); e.addEvent('mouseover', function(){ fade.start(1); }); e.addEvent('mouseout', function(){ fade.start(.5); }); });</code> </pre> </div> <p>This uses the same techniques as the first effect. The set method allows you to set the initial position of the effect. In this case it makes all of the images 50% opaque when the page loads.</p> <p>So there you have it. Mootools is silly powerful and fun. It puts the control in your hands, and does so in a lightweight and extremely sexy manner.</p> Really awesome, I mean really awesome 2007-02-12T00:00:00+00:00 <p>So back on the 15th of December friend and fellow rubyist, <a href=''>Kevin Clark</a>, forwarded me a job description from <a href=''>Powerset</a>. Well, I applied to said job and long story short I’m starting tomorrow! I drove a Budget rental truck up to San Francisco from San Diego on Friday. I don’t have a place yet… a slight problem which will hopefully be remedied very soon. Anyway, we had an awesome <a href=''>party</a> last night to celebrate the series A funding, and I’m excited to get started and settle into San Francisco.</p> A mephisto tag cloud 2007-02-07T00:00:00+00:00 <p>As I continue to customize my new <a href=''>mephisto</a> installation, I wanted a tag cloud for the Folksonomy section at the bottom of the page. At first I thought I would use a mephisto plugin… after further consideration I decided that was a little overkill. JavaScript kicks ass, especially with the recent <a href=''>release</a> of <a href=''>mootools</a> version 1.0, so I decided to let it do the work. I created a small class called Overcast which makes tag clouds easy peasy japaneasy. So, just how easy is it to get a tag cloud in mephisto? Here’s a snipet from my layout.liquid</p> <div> <pre> <code class='html'>mootools overcast </head> <div id="overcast"> </div> <script type="text/javascript"> /* <![CDATA[ */ over = new Overcast({min: 1, fuzz: 2, overlay: "/images/gloss.png"}); /* ]]> */ </script></code> </pre> </div> <p>A couple sexy things to note are the cool transparent overlays ontop of each tag, and the ability to fuzz tags when your weights aren’t very diverse. Also, if you’ve got <a href=''>Firebug</a> you can type <em>over.update(“amazing”,4)</em> in the console to add a new tag to the cloud with that weight, or <em>over.update(“javascript”, 3)</em> to change the weight of an existing tag. All of the functionality is documented in the source.</p> <p>Grab the <a href=''>source</a> from the include in this page. I’ll put it under version control soon.</p> Mephisto is finally up and running 2007-01-12T00:00:00+00:00 <p>Dang, procrastination is a terrible terrible thing. I had been doing allot of traveling prior to the Holidays and just didn’t have the motivation needed to put the time into setting up <a href=''>Mephisto</a>. I finnaly got around to doing it, and it went pretty well. The Typo conversion didn’t happen as smoothly as I had hoped and I had to hack the Flickr plugin a bit to get her up and going, but she’s finally here. This time around I shouldn’t rank as #1 on Google for a series of absurdly explicit terms describing grotesque sexual actions… Thank you <a href=''>Akismet</a>. I also decided to drop the blog from blog.vandev.com. From now on, this is vandev.com.</p> <p>I’ve got a couple new little projects that I’ll release in the near future. <a href=''>Merb</a> has entertained me as of late, as well as <a href=''>MooTools</a>. Anyway, I’ll get them up and I’ll finish polishing the site. Polishing it until it shines.</p> The title says it all 2007-01-06T00:00:00+00:00 <p>The title’s kinda funny right? I’m working on it, something real funny will be here soon!</p> MaxMind GeoLite on Rails with PostGIS 2006-10-15T00:00:00+00:00 <p>Ughhhh, many hours of frustration have been spent trying to push the MaxMind GeoLite City CSV <a href=''>files</a> into a database configured with <a href=''>PostGIS</a>. Anyway, I figured I would document the process that I went through incase someone else wants some free IP based geocoding in there Rails app.</p> <p>MaxMind gives you two CSV files for the city database. One has an assload (2,783,434) of IP blocks that map to the id of a row in the other table containing location data. The location data is pretty rich. It contains a postal code, area code, dma code, country, region (state in US), and a latitude and longitude. Because I wanted to be cool and more efficient, I decided to store the lat / lon as a point in PostGIS format. Using PostGIS along with Guilhem Vellut’s Spatial Adaptor <a href=''>plugin</a> for Rails, makes doing geo-spatial operations sexier and easier than ever. You can use the Spatial Adaptor with MySQL, but you’ll never be as cool as the guy using it with PostgreSQL.</p> <p>First off I had to create my tables.</p> <div> <pre> <code class='ruby'>create_table "geo_ip_locations" do |t| t.column "country", :string, :limit => 2 t.column "region", :string, :limit => 2 t.column "city", :string t.column "postal_code", :string, :limit => 7 t.column "dma_code", :integer, :limit => 3 t.column "area_code", :integer, :limit => 3 t.column "geom", :point, :null => false, :srid => 4269, :with_z => false end add_index :geo_ip_locations, :geom, :spatial => true create_table "geo_ips" do |t| t.column "start_ip", :integer, :limit => 10 t.column "end_ip", :integer, :limit => 10 t.column "geo_ip_location_id", :integer end add_index :gep_ips, :start_ip add_index :geo_ips, :end_ip add_index :geo_ips, :geo_ip_location_id</code> </pre> </div> <p>A few things to note:</p> <ul> <li>The geom column has the srid set to 4269, this threw me for a loop for way too long. Make sure you have the <code>spatial_ref_sys</code> table populated. I’m also assuming that the MaxMind data is mapped to the WGS 84 standard.</li> <li>The limit’s on the start and end ip’s are set to 10. This creates bigint columns in my DB. I’m not sure what version of Rails started doing this (I’m on Edge), but the columns have to be bigints for the IP block information to be imported.</li> <li>Remember to create a couple models for the tables</li> <li>You may want to add an index on postal_code or anything else you’ll be using in a SQL WHERE clause</li> </ul> <p>Now because the CSV file with the blocks of IP addresses in it is so large I went with an importing tool to get it into the table. I was going to use PostgreSQL’s COPY command, but it doesn’t seem to support CSV’s with double quotes. I went with <a href=''>Navicat</a> and took advantage of my 30 day trial. The CSV with the locations in it is another story. We need to convert the lat / lon pairs into points for PostGIS. Not only that, but if we want to be really cool we need to convert the city names into UTF-8. The file that MaxMind gives us has ISO-8859-1 encoding. <a href=''>Iconv</a> comes to the rescue. You can either convert the entire file from the command line, or just use the ruby library to do it in the import script below.</p> <div> <pre> <code class='ruby'>require "#{File.dirname(__FILE__)}/../../config/environment" require 'fastercsv' require 'iconv' ICONV = Iconv.new( 'UTF-8', 'ISO-8859-1' ) FasterCSV::HeaderConverters[:underscore] = lambda { |h| h.underscore } FasterCSV.foreach('geo_ip_locations.csv', {:headers => :first_row, :col_sep => ",", :header_converters => :underscore}) do |row| begin row['id'] = row.delete('loc_id')[1] row['geom'] = Point.from_x_y(row.delete('longitude')[1].to_f, row.delete('latitude')[1].to_f, 4326) row['city'] = ICONV.iconv(row['city']) cool = GeoIpLocation.new(row.to_hash) cool.id = row['id'] cool.save! $stdout.print '.' rescue puts $!.message $stdout.print 'f' end $stdout.flush end</code> </pre> </div> <p>Things to note:</p> <ul> <li>You need FasterCSV for this to work <code>gem install fastercsv</code></li> <li>You need to delete the first line (_with the copyright info in it_) in the CSV for this script to work.</li> <li>If you converted the file from the command line, comment out the three lines referencing iconv to improve performance.</li> <li>I created a directory called <code>transform</code> in my <code>db</code> directory, renamed and moved the location CSV there, and created a file with the above code in it.</li> <li>Always remember to put the srid in the <code>Point.from_x_y</code> call, otherwise you’ll be very very frustrated.</li> <li>You’ll need to specify <code>encoding: unicode</code> <em>Postgres</em>, <code>encoding: utf8</code> <em>MySQL</em> in database.yml to use UTF-8 with the DB. See the Rails <a href=''>wiki</a></li> <li>The id is set this way to preserve it.</li> </ul> <p>That’s it! There you have it, the possibilities are now endless. As I said before, I set this up on PostgreSQL, but this should work the same on MySQL. The one main difference will be the srid’s. MySQL doesn’t support them, so you don’t need to specify them. Goodluck!</p> QuickPresent 2006-10-06T00:00:00+00:00 <p>I threw together a quick and simple way to make a presentation on a mac using <a href=''>Quicksilver</a> and <a href=''>Camping</a> a while back. Well, I finally got around to refining it and putting it into a both tiny and awesome package. This puppy is made of two files, and makes presenting dead simple. You just outline your thoughts in a text file, and QuickPresent smacks it onto your screen using Quicksilver’s <em>largetype</em> feature. Not only that, but it also gives you a slick little web interface to show you what you’ve said, and what you’re about to say. Let me show you…</p> <img title='QuickPresent preview' src='' width='600' /> <p>A few other slick features include automatically opening URL’s and Files from your hard drive. All you need is Camping and Quicksilver (with the <em>command line tool (qs)</em> plugin installed). Just type <code>camping quickpresent.rb</code> from the command line and your up running. If you want to try something cheaper than Keynote or Powerpoint, play with QuickPresent. Let me know what you think.</p> <p>Get it from my SVN Repo: <a href=''></a></p> Croppr podcast... a little late 2006-09-22T00:00:00+00:00 <p>The SDRuby <a href=''>podcast site</a> is filling up with great episodes. One of which being my little talk on camping and <a href=''>Croppr</a> (Episode 002 on the bottom). The thing has been up for a couple of monthes now, but my posting consistency has been miserable lately. I’ve had more <a href=''>pressing issues</a>, but today is a new day. My next project will be pushing this thing over to <a href=''>Mephisto</a>. I should also spend some time fixing the Rails date_select helper, but that’s another post all together. The next time I speak, the entire back end of this puppy will be different… totally awesome.</p> Croppr is born... perhaps pre-mature 2006-07-05T00:00:00+00:00 <p>So, I finally got around to testing TextMate’s new blogging bundle. It’s dead simple… Anywho, I figured I would use it to give a sneak peek of my newest invention <em>Croppr</em>, which I will be revealing in it’s full glory tomorrow night at <a href=''>SDruby</a>.</p> <p>All right, so Croppr was born out of a desire to make a better way to crop images online. Specifically the need came from my buddy <a href=''>Tom Werner’s</a> pet project, <a href=''>Gravatar</a>. The inspiration came from iChat’s avatar cropper:</p> <p><img src='' alt='iChat Cropper' /></p> <p>After days of arduous JavaScript hacking with the help of <a href=''>Prototype</a> and eventually Prototype Lite with <a href=''>moo.fx</a> I had a lightweight browser equivalent. Have a <a href=''>peek</a> and play around.</p> <p>What good is a lightweight JavaScript cropper without a lightweight back end to actually do the cropping? Enter <a href=''>camping</a>. In just 225 lines of <a href=''>sexy Ruby code</a> I have a fully functional image cropping machine. I hope to have a running demo available in the near future. As far as licensing goes, I’m still working on it so hold your shorts. Until than, come to the SDruby meetup (start driving now if you have to) and see all the awesomeness that is Croppr!</p> EDGE and a UFO Satellite 2006-06-27T00:00:00+00:00 <p>I have just witnessed quite the spectacle. About 15 minutes ago, I saw something strange outside of the Encinitas Ca Starbucks on the 101. In the twilight sky over the vast Pacific a UFO appeared. Screaming up from the horizon the strange object slowed abruptly and than continued on it’s path South-Southeast. At the place where it slowed a large smoke plume appeared which seemed to get brighter as the sky darkened. Fortunately I had my new W600i camera phone. I snapped 8 pics and used the phones wireless modem feature to link up to the EDGE network and send <a href=''>them</a> to Flickr.</p> <pre class='markdown-html-error' style='border: solid 3px red; background-color: pink'>REXML could not parse this XML/HTML: <typo:flickr</pre> <p>I watched as the object seemed to emit some type of vapor sporadically as it trailed off. This was definitely not a comet and had to have been something engineered… <em>upon further review it must have been a satellite being launched from somewhere in the Pacific</em> I’m very curious to see if there were any other sightings. As far as the validity of these photos go, I know the quality is poor but check out the upload timestamps on Flickr. If there were other sightings, this could easily be verified. Crazy stuff.</p> <p><strong>Update</strong> __________________________________</p> <p>It is now confirmed that this was no UFO, nay it was a Delta IV rocket launching a NROL-22 reconnaissance satellite into orbit. Here’s the <a href=''>press release</a>.</p> <p>It was launched from <a href=''>Vandenburg AFB</a> just north of Santa Barbara. I’m glad it wasn’t aliens or the Koreans…</p> RMagick on Mac OS X 10.4 Tiger 2006-06-06T00:00:00+00:00 <p>Recently I needed Rmagick installed on my Mac OS X 10.4 system. This turned out to be nearly impossible, until I got down and dirty and just went for a fresh compile from source. Actually it became more impossible until I found enlightenment on the long and arduous journey. The following is a pretty bare-bones install. It leaves out excess functionality like exporting to <a href=''>TIFF</a>, working with <a href=''>PostScript or PDF</a> files, <a href=''>color management</a>, <a href=''>EXIF</a> headers, <a href=''>SVG</a> images, or <a href=''>MSWord</a> documents. All of this functionality can be added by downloading the source from the links above, and compiling them before you run <code>./configure</code> for ImageMagick. You can also install GraphicsMagick if you like, it shouldn’t make a difference which one you use.</p> <p>The following instructions will have you up and running in no time (actually about 30 minutes depending on the speed of your system <em>ImageMagick takes forever</em>). These instructions assume you have installed Ruby according to the instructions at <a href=''>HiveLogic</a>. If you have not, make sure you atleast follow the steps up to the point of installing ruby. This makes sure your path is correct and your build environment is in place.</p> <p>X11:</p> <ol> <li>4 Tiger install DVD or</li> </ol> <p>Freetype2:</p> <div> <pre> <code class='bash'>curl -O tar zxvf freetype-2.2.1.tar.gz cd freetype-2.2.1 ./configure && make && sudo make install cd ..</code> </pre> </div> <p>Jpeg:</p> <div> <pre> <code class='bash'>curl -O tar zxvf jpegsrc.v6b.tar.gz cd jpeg-6b ln -s `which glibtool` ./libtool export MACOSX_DEPLOYMENT_TARGET=10.4 ./configure --enable-shared && make && sudo make install cd ..</code> </pre> </div> <p>PNG:</p> <div> <pre> <code class='bash'>curl -O tar zxvf libpng-1.2.10-no-config.tar.gz cd libpng-1.2.10 cp scripts/makefile.darwin Makefile make && sudo make install cd ..</code> </pre> </div> <p>ImageMagick:</p> <div> <pre> <code class='bash'>curl -O tar zxvf ImageMagick-6.2.8-0.tar.gz cd ImageMagick-6.2.8 ./configure && make && sudo make install cd ..</code> </pre> </div> <p>RMagick (finally and thankfully):</p> <div> <pre> <code class='bash'>sudo gem install rmagick</code> </pre> </div> <p>That’s it, goto <a href=''>RMagick</a>’s web site for information on using RMagick in your apps. Be on the look out for an incredible little <a href=''>Camping</a> app that uses the power of RMagick to appear on VD soon!</p> Why do online banking websites blow? 2006-05-13T00:00:00+00:00 <p>Recently my health insurance changed from a high deductible plan to a more reasonable PPO. Anyway I still have an HSA from my previous plan. I thought it might be a good idea to transfer my HSA money into my IRA… wow more acronyms than the w3c. After finding the <a href=''>website</a> of my HSA provider, I decide to sign up for an account. This is what I got:</p> <p><img src='' alt='Leesports Signup Page' /></p> <p>First off, the logo and the layout are simply stunning. Secondly, if you haven’t already, take a closer look at the requirements for both the user id and the password. Why the H are they requiring such a random user id? It’s requirements are way higher than that of the passords. Why only 4 characters of headway? How are you supposed to create anything even remotely meaningful? After 3 - 5 minutes of deep thought I was able to come up with something amusing, but I’m a power user, I doubt there demographic is even capable of figuring out how to make a user id… If they really need this crap to be that random, why not just hand out a random id?</p> <p>As if this weren’t enough, I was prompted to use there advanced forgotten password system before I could continue. Take a look:</p> <p><img src='' alt='Leesports Forgotten Password System' /></p> <p>Boy, they were right on the money with this one. For starters, they opened up a new window for me, thanks Leesport, can’t get enough windows. And the questions… “my favorite president?”, who has a favorite president? You’ve gotta love the assumption that all of Leesport’s customers have pets and love sports, why wouldn’t they?</p> <p>Finally after getting into this valuable service that Leesport is offering it’s customers, I found it to be utterly worthless. There was a transfers tab, but of course this did nothing. How can such a high profile site blow so hardcore? The friggin thing looks like a highschool project.</p> <p>I can honestly say that <a href=''>Leesport</a>’s service is by far the worst experience I have had with online banking. <a href=''>HSBC</a> comes in at a close second. Fortunately, I found someone that cares about design and functionality in <a href=''>Bank of America</a>.</p> Introducing AjaxSpy 2006-05-04T00:00:00+00:00 <p>While playing with the new RJS templates in rails, I found it difficult to know what was actually being returned from my requests. Thus, AjaxSpy was born. It’s a simple JavaScript and CSS file. All you need to do is include the js file in the header of your document, the css is automagically included (must be in the stylesheets directory). The script relies on Prototype 1.5.0rc0, and for it to be sexy you need the Scriptaculous effects library. You can include it conditionaly based on params in the query string, or do some fancy session stuff. That’s all up to you. This is what I’ve been doing</p> <div> <pre> <code class='ruby'><%= javascript_include_tag "prototype", "effects" %> <%= javascript_include_tag "debugger" if params["debug"] %></code> </pre> </div> <p>The script is currently only working with Firefox and Safari, I’ll work on the bastard child that is IE down the road. Here’s what it looks like, syntax highlighting and all:</p> <a href='' title='AjaxSpy Preview'><img src='' alt='AjaxSpy Preview' width='640px' /></a> <p>I present to you, AjaxSpy:</p> <ul> <li><a href=''>debugger.js</a></li> <li><a href=''>debug.css</a></li> </ul> <p>Again, to install simply include the js in the layout, it automagically includes the css (as long as it’s in a directory named “stylesheets” relative to the site route). Let me know if you have any problems.</p> A new beginning 2006-05-04T00:00:00+00:00 <p>So, a little over a year ago, I started. It was my first experience blogging, and I didn’t really know what I wanted. Well, I have a better idea now. The problem with VanBlog was that it was either too personal or too tech for different audiences. Enter, VanDev. This is my effort to take the tech out of VanBlog. I also needed a place to put projects that I’m working on a place to thrive… I don’t even know what that means.</p> <p>I’ll take this time to address questions:</p> <ol> <li>Why VanDev?</li> </ol> <ul> <li>Last name = Van Pelt, it’s both dutch and awesome.</li> </ul> <ol> <li>What’s VanBlog?</li> </ol> <ul> <li>That would be my personal blog now, where I talk about things like my feelings and changes occuring in my body.</li> </ul> <ol> <li>VD?</li> </ol> <ul> <li>VanDev, it’s not what you think.</li> </ul> <ol> <li>What’s with these old entries?</li> </ol> <ul> <li>They were brought over from VanBlog.</li> </ul> <ol> <li>Do you where size 12 shoes?</li> </ol> <ul> <li>Yes, as a matter of fact I do.</li> </ul> <p>So, there it is. I’ll post something awesome soon about the design of this blog. Oh, you just wait.</p> Adelphia, getting a taste of its own medicine 2005-07-25T00:00:00+00:00 <p ‘F’ it and bought an external WIFI antenna for my laptop. That’s when the fun started.</p> <p>Things were going swimmingly until my neighbor caught on. One day the connection was WEP’ed. Fortunately I was able to hop on to another neighbors. It didn’t last long until they WAP’ed theirs (I have no idea how they knew I was on, probably bandwidth). Anyway, that was my last option. I ground my teeth, and called Adelphia to set up an appointment. That was when the unbelievable happened. I came home from work today, desperate for Internet, and I decided to try and plug my cable modem into the wall. I had thought about it before, but wrote off the possibility of the modem just hopping onto the network. Well, I’ve waisted the past month without Internet, when I could have had it for free. I’m cruising now, will Adelphia find out?</p> Your own personal Geocoder... for FREE 2005-07-18T00:00:00+00:00 <p>After the release of the google maps <a href=''>api</a>, I began working on custom applications. Because google doesn’t allow address lookups in its api, you have to generate a latitude and longitude yourself for a given address. The immediate problem was the need for geocoding, preferably geocoding within php. This is where the <a href=''>US Census</a> comes in. The easiest solution is to download a mysql dump of all the zips with there corresponding lat/longs. That mysql dump can be found <a href=''>here</a></p> <p>Well, this is great, but it’s not detailed enough. I needed to geocode to the street level. <a href=''>geocoder.us</a> offers a free web service for doing this but you can only make one request every 15 seconds. I have a database of 3500 addresses, so that wasn’t going to work. geocoder.us uses the US census’s <a href=''>Tiger Data</a>, and the perl <a href=''>Geo::Coder::US</a> module. The problem with this solution is the amount of time it would take compile. You have to download every zip file from every state, and than compile it. I’m not patient enough. Thats when I found <a href=''>Dan Egnor</a>. Dan won the 2002 Google Programing contest with a program that does just what I needed it to. Read on to do it yourself.</p> <p>Ok, so the biggest issue is skipping out of the compile process. <a href=''>Dan</a> offers a free <a href=''>download</a> of a bz2’ed version (~300mb) of the compiled address location data (by the way, the README on his site is good reading material). Dans program does more than I needed it to, so I simplified his source code (Thanks Dan) to do simply what needs to be down. It can be downloaded <a href=''>here</a>. Simply download my source, <code>bunzip2</code> the map data from Dans site (assuming Linux here), and tar -jxvf the source, run make on the source and issue a command like <code>./geo-coder (location of the map data ex. ../../all-map) '(the address you want to find)'</code>. This returns either SUCCESS or FAILURE. Some simple php code will execute and return the address within your web app:</p> <pre class='markdown-html-error' style='border: solid 3px red; background-color: pink'>REXML could not parse this XML/HTML: <typo:code $progress = array(); exec("./geo-coder ../all-map '$address'", $progress); if(substr($progress[0],0,7) == "SUCCESS"){ //The below returns an array with, $ll[0] = longitude and $ll[1] = latitude from Dan's program $ll = explode(", ",trim(substr(strstr($progress[3], '@'),1))); }else{ //use a zipcode (from the query or DB table in my case) to find the lat/long in the mysql zip database $zips =& $db->query('SELECT latitude, longitude FROM zipcodes WHEREarticle</a> on slashdot. It had to do with third party uses of google maps, and google cutting down on them. There turns out to be some amazing stuff being done google maps and third party software. As mentioned earlier, there was the gps in the car use but these applications are just too cool. My favorite was a tool that took craigslist rental listings and displayed them in your area dependent upon price. There is also a site that points out sites to see from the satellite imagery.</p> <p>In order of coolnees:</p> <ul> <li><a href=''>Housing Maps</a></li> <li><a href=''>Google Siteseeing</a></li> <li><a href=''>Chicago Crime</a></li> <li><a href=''>Cheap Gas</a></li> </ul> <p>Who knows what will pop up next???</p> WiFi in your car? 2005-04-20T00:00:00+00:00 <p>I found this article in slashdot about wifi in your car. In all actuality I’m writing this article on the 28th, but I’ve been thinking about this idea for a while and it needs to be written down. I was un-aware of the ability to supply WiFi over the cell network at high speeds and a reasonable price until this was brought to my attention. Tor Amundson has a <a href=''>site</a> detailing the process of creating a WiFi access point for your car using an EVDO pcmcia card. EVDO can deliver around 300kbs in it’s major supported areas (big cities), 100kbs in normal digital service areas (smaller cities), and 5kbs in remote areas (the sticks). The best part is, it is a flat fee of $80 a month for unlimited access.</p> <p>Tor uses his device for some pretty cool stuff. He hooked up a GPS unit to the router and it syncs with <a href=''>Google Maps Standalone</a> on a server else where. This allows for a web application that displays the exact location of a given vehicle as long as it has Internet. The cellphone networks are key here. There is Internet offered via satellite, but the satellites are too small a target to hit in motion. The first application of this that came to mind was in the RV market. Because my father deals allot with RV’s, and I generally deal with the technical end, I saw this as a great fit. Imagine the possibilities. Anyone in the coach could hook up to the WiFi and be surfing the net, going down the road. The server could be synced with the coach systems. In particular the engine heater and thermometers so you could check the temp of the coach from your house, or Japan for that matter. Security is also a big plus in this area. You could have web cams and the works, right there at your finger tips.</p> <p>Beyond the RV market, my next thought was Emergency Vehicles. The possibilities are endless. You have the Internet in your vehicle now, out of this world. I hope to be thinking about this idea further and hopefully applying it soon. I should be moving back to Iowa mid summer. I will soon be immersed once again in the RV world. Look out world, here comes the Internet!</p> Mi Casa... Google Maps 2005-04-11T00:00:00+00:00 <a href='maps.google.com'>Google maps</a><a href=''>Try</a> Bad things have happened 2005-04-02T00:00:00+00:00 <p>The blog was down for over a day. With all of the traffic I’ve been getting this is a huge deal… Actually, I had a few other larger projects on the server that were down as well. After around 3 hours on the phone with my father, it’s all up and running again.</p> <p>The downtime was due to a faulty cat5 cable, we believe. It was ridiculous. At first we figured it was the router so we bought a new one. After playing with cat5 configurations we discovered it wasn’t the router. Our next step was to reboot the server. I was biting my teeth. The server had been running for 216 consecutive days (Debian!). It booted smoothly and we’re up and running now!</p> <p>The experience will definitely force me to make more backups more often. It’s really difficult living in California and having your personal server in Iowa. I’m blessed to have a father with time and patience.</p> Seperating presentation and application logic 2005-03-23T00:00:00+00:00 <p>I was browsing around for different web application development solutions. I’m well acquainted with PHP and I have done some separation of logic with <a href=''>Smarty</a>. Smarty only does so much, and basically is just a cleaner way of presenting data. Almost a hybrid PHP. After a few articles dealing with J2EE and struts I found some php solutions for making a Model View Controller based web app. I also learned a little about Java based web design, which is interesting as well.</p> <p>As far as the Java solution goes there are really two decent ways of doing it from what I understand. You could use <a href=''>Struts</a> or <a href=''> Tapestry</a>. Struts functions as a controller object for the web application realm. If you want to know more about the Model View Controller paradigm <a href=''>check out</a> wikipedia’s answer. Basically through the use of an XML configuration file you tell struts what to do with actions from the UI. The view and model stay the same as any web application would. In this case the view is generally written in JSP and the model done with servlets. I am by know means an expert so if you want to know more check out there website.</p> <p>After surfing around for a little while I found allot of complaint about the learning curve for Struts. I also read some complaints about the functionality. There was an interesting <a href=''>explanation</a> of Tapestry on slashdot. Tapestry gives a level of abstraction to the web application. You know longer refer to URI’s or add query parameters, you think of everything in terms of objects, methods, and parameters. This seems like a very helpful way of programming a large project. It is just one more step in making a web application more like a desktop app.</p> <p>Well, I’m a PHP guy, and I don’t see my self migrating to Java anytime soon. There are two good solutions out there that I know of currently: <a href=''>WACT</a> and <a href=''>PHPTAL</a>. Both seem like good solutions. WACT looks a little more feature rich, but PHPTAL is based on <a href=''>Zope</a>. Zope a very mature application server. It too is an option for a large scale project. I’ll be sure to experiment with the PHP implementations in all of my free time. I’m just looking for the cleanest and most extensible way to create a web application. At the very least looking at all of these techniques gets the mind into learning mode.</p> | http://feeds.feedburner.com/vandev | CC-MAIN-2013-20 | refinedweb | 9,491 | 64.91 |
Edit Article
How to Write the Hello World Program in CPP
The best way to learn programming is by writing the programs. Hello World! is the first program most programmers have to write before they start the lesson. If you want to learn CPP, and you don't know how to write Hello World yet, read on.
Steps
- 1Get a CPP compiler. If you're using Windows OS, I'd suggest you to get the latest Microsoft Visual CPP. If you're running a linux distribution or Mac OS, get Code::Blocks or Bloodshed Dev CPP. You can obviously get them on windows too and use whichever you feel most comfortable with.
- 2Open a new project file, and choose "console application" on your compiler. This means your "Hello World!" application would be running on the console and not your operating system.
- 3If your compiler is a Microsoft Visual CPP, then first enter the following on the first line - #Insert "stdafx.h". Ignore this step if your compiler is not a Microsoft Visual CPP.
- 4On the next line (if you've entered the previous statement, otherwise this would be the first line), enter #include <iostream> . This statement declares that the terms we are going to use to write the program are included in the CPP library known as "iostream".
- 5Go to the next line to enter your function, the set of instructions that defines the structure of your program and tells the compiler what to do, in this case to display the message "Hello World!" from your console. Type "int main ()" .
- 6Go to the next line and use a flower bracket "{", to mark the beginning of this main () function.
- 7On the next line, you have to write statements, the group of which is the function. First statement in this program is - using namespace std;.
- 8Each statements inside a function ends with a semi-colon ";". The last statement ends with "endl" and semi-colon. Now go to the next line and type cout << "Hello World!" endl;
- 9Go to the next line and declare the return value of this function - return 0;
- 10Go to the next line and use the ending flower bracket "}" to denote the end of your main function. While complicated programs would include numerous functions, this is the simplest program possible and your first program ever so it just contains the main function.
- 11Press "F7" or click on the compile icon or option from the drop down menu to compile your program.
- 12Press "CTRL" and "F5" together to run your program.
Community Q&A
Ask a Question
If this question (or a similar one) is answered twice in this section, please click here to let us know.
Tips
- Make sure you type in all the characters mentioned correctly, otherwise the program won't function at all!
- Use "//" anywhere in the program to place comments or notes to remind yourself later of what the codes mean. Anything you type after the two slashes won't be calculated by a compiler as they are regarded as comments.
- Online tutorials on CPP are available, which offers fluid step by step lessons which you can take to master the language.
Warnings
- Do not compile random instructions that you don't know about and run it, it could harm your system!
Things You'll Need
- A computer.
- A CPP compiler.
Article Info
Categories: C Programming Languages
Thanks to all authors for creating a page that has been read 3,273 times.
Did this article help you?
About this wikiHow | http://www.wikihow.com/Write-the-Hello-World-Program-in-CPP | CC-MAIN-2016-44 | refinedweb | 584 | 73.17 |
a Structure
Go back to the Control Panel chapter 9 on Dynamic Data Lists.
![ Figure 3.1: You can access the Manage Structures interface by clicking
Manage → Structures from the Web Content page of the Control Panel.]()
Figure 3.1: You can access the Manage Structures interface by clicking *Manage* → *Structures* from the Web Content page of the Control Panel. Checkbox element under the Form Controls tab and drag it onto the structure. You can do the same with any of the elements. To remove it from the structure, simply select the Delete icon (black circle with X) in the upper right corner of the element. Take a moment to add, delete and rearrange different elements.
Figure 3.2: Structure Elements
Liferay supports the following elements in structures:
FORM FIELDS
Text Field: Used for items such a titles and headings.
Text Box: Used for the body of your content or long descriptions.
Text Area (HTML): An area that uses a WYSIWYG editor to enhance the content.
Checkbox: Allows you to add a checkbox onto your structure. Template developers can use this as a display rule.
Selection List: Allows you to add a select box onto your structure.
Multi-selection List: Allows you to add a multi-selection list onto your structure.
APPLICATION FIELDS
Image Uploader: Allows you to add the upload image application into your structure.
Documents and Media: Allows you to add the Documents and Media folder hierarchy to your structure.
MISCELLANEOUS
Link to Page: Inserts a link to another page in the same site.
Selection Break: Inserts a break in the content.
These form elements the form elements.
Editing Form Elements Text Area (HTML) which has the Field Label Instructions. If we
wanted to give it the variable name
Steps, we can do it very easily: at the
bottom of every form element is a Variable Name field. Replace the generated
name with the name you want to use. Now your template writer has a variable by
which he or she can refer to this field.
Below each field is a button labeled Edit Options. This contains several other ways to configure your fields:
Field Type: changes the field type, in case you dragged the wrong field type to this location in the form. Field Label: changes the displayed label for the field.
Index Type: Choose how you want Liferay to index your field for search. You can have it indexed by keyword, which filters out common words such as and, but, the, and so on, or you can have it index the full text of the field. By default, indexing is turned off..
Instructions for the User: Check this box and type a description of what the field is for to display it as a tooltip for the user.
Repeatable: If you want this field to be a repeatable element, check this box. Your users can then add as many copies of this field as they like. For example, if you’re creating a structure for articles, you might want a repeatable Author field in case you have multiple authors for a particular article.
Required: Check the box to mark the field required. If a field is required, users must enter a value for it in order to submit content using this structure.
For the Nose-ster structure, type something in the Instructions for the User field that helps users know what to put into the Body element (example: this is an HTML Text area for the body of your content). Also enable the Display as Tooltip box. Now, when users hover over the Help icon near your title, your instructions. There are two ways to edit structure default values: creating a new structure or editing an existing structure.
For a new structure, you must first create the structure before editing its default values. Navigate to Web Content in the Control Panel and click the Structures tab, then select the Add Structure button. Under the XML Schema Definition section of the new structure form, use the Add Row button to create different types of fields for the structure. Or you can use the editor to create the structure manually: the Launch Editor button allows you to edit the XML for the structure if you wish to do it via code. When you are done, click Save and Continue to go to the Structure Default Values form.
![ Figure 3.3: You can create fields for structure default values via the XML
Schema Definition section of the new structure
form.]()
Figure 3.3: You can create fields for structure default values via the XML Schema Definition section of the new structure form.
To edit an existing structure, go to Web Content in the Control Panel and click the Structures tab to see the structures list. Find the Actions button for the desired structure and select Edit Default Values from the menu to view a window like the one below. This form allows you to manage the structure settings.
Figure 3.4: You can edit default values via the Actions button of the structure form.
Every new web content you create with this structure is preloaded with the data you inserted._2<<
Figure 3.5: View Permission for a Structure. Without a template, the portal has no idea how to display content which has been created using a custom structure.
Let’s look more closely at the types of templates Liferay supports.
Template Types (VM, XSL, FTL and CSS)
Liferay supports templates written in four different templating languages, to support the skill sets of the largest number of developers. This increases the chances you can jump right in and use whichever one you’ve already used before. If you haven’t yet been exposed to any of them, your best bet is Velocity or Freemarker, as they are less “chatty” than XSL and extremely simple to understand.
VM (Velocity Macro): Velocity is a scripting language that lets you mix logic with HTML. This is similar to other scripting languages, such as PHP, though Velocity is much simpler. Because it’s been in the product the longest, it is probably the most widely used language for templates in Liferay WCM. If you haven’t used any of the template languages before, we recommend using Velocity: you’ll get up to speed the fastest..
FTL (FreeMarker Template Language): Freemarker is a templating language which could be considered a successor to Velocity, though it is not yet as popular. It has some advantages over Velocity for which it sacrifices some simplicity, yet it is still easy to use.
CSS (Cascading Style Sheets): You can use CSS if your structure is very straightforward and modifications are simple (colors, fonts, layouts, etc.). If your structure is more complex, however, you’ll need to use one of the other options.
Adding Templates
Liferay WCM makes it easy to create structures, templates and content from the same interface. Let’s go through the entire flow of how you’d create a structure, link it to a template and then create content using them both. We’ll use Velocity for our template and we’ll lay out the structure fields systematically to go along with the format we’ve defined for our content.
Figure 3.6: Adding Template Interface
Go back to the Web Content section of the Control Panel and click Add → Basic Web Content.
Click Select next to the Structures heading to access the Manage Structures interface.
Click on the Add button.
Add the following fields:
Name the structure News Article and click Save.
Back on the Manage Structures interface, click Actions → Manage Templates next to the News Article structure that you created.
Click Add.
Enter the name News Article and add a description.
Uncheck the Cacheable checkbox.
Make sure Velocity is selected as the script language (it’s the default).
If you’ve written the script beforehand, you can select Browse to upload it from your machine. Otherwise, you can click Launch Editor to type the script directly into the small editor window that appears.
Click Save.
Click Back.
Select the News Article structure. Velocity:
#set ($renderUrlMax = $request.get("render-url-maximized")) #set ($namespace = $request.get("portlet-namespace")) #set($readmore = $request.get("parameters").get("read_more")) <h1>$title.getData()</h1> #if ($readmore) <p>$abstract.getData()</p> <p>$body.getData()</p> #else <p> <img src="${image.getData()}" border="0" align="right"> $abstract.getData()</p> <a href="${renderUrlMax}&${namespace}read_more=true">Read More</a> #end
This template is pretty small but it actually does quite a bit..7: Initial View
Figure 3.8: After Clicking "Read More"
Now that you’ve created a handsome template, it’s time to decide who the lucky people are that get to use it. the template by selecting from the Viewable By select box beneath the Permissions tab. By default the Anyone (Guest Role) is selected.
You’ll also want to determine how users can interact with the template. You can do this by selecting the More link.
From the More link, you can use Liferay to manage multiple sites. | https://help.liferay.com/hc/es/articles/360017873232-Advanced-Content-with-Structures-and-Templates | CC-MAIN-2022-27 | refinedweb | 1,508 | 64.3 |
Sometimes we have to convert String to the character array in java programs or convert a string to char from specific index.
String to char Java
String class has three methods related to char. Let’s look at them before we look at a java program to convert string to char array.
char[] toCharArray(): This method converts string to character array. The char array size is same as the length of the string.
char charAt(int index): This method returns character at specific index of string. This method throws
StringIndexOutOfBoundsExceptionif the index argument value is negative or greater than the length of the string.
getChars(int srcBegin, int srcEnd, char dst[], int dstBegin): This is a very useful method when you want to convert part of string to character array. First two parameters define the start and end index of the string; the last character to be copied is at index srcEnd-1. The characters are copied into the char array starting at index dstBegin and ending at dstBegin + (srcEnd-srcBegin) – 1.
Let’s look at a simple string to char array java program example.
package com.journaldev.string; public class StringToCharJava { public static void main(String[] args) { String str = "journaldev"; //string to char array char[] chars = str.toCharArray(); System.out.println(chars.length); //char at specific index char c = str.charAt(2); System.out.println(c); //Copy string characters to char array char[] chars1 = new char[7]; str.getChars(0, 7, chars1, 0); System.out.println(chars1); } }
In above program,
toCharArray and
charAt usage is very simple and clear.
In
getChars example, first 7 characters of str will be copied to chars1 starting from its index 0.
That’s all for converting string to char array and string to char java program.
Why is it that if i convert a string with a space between words, it only recognizes the first word and converts that to a char array. Is there a way around it?
Not sure what is your issue, but it works fine with a space in the string.
what are the member of class ?
Is methods and data variable are the member of a class?
If a String value is “10”, toCharArray returns value 01 instead of the 10…any reason for this?
Can you share your code? Here it is from jshell and it looks perfect.
…
//Copy string characters to char array
str.getChars(chars1, 0);
This overloaded method might just work as well?
Does the last of character array is a null or not?
I just looked the String interview questions, I am getting soo interesting to study the hole tutorial. Its Nice. | https://www.journaldev.com/794/string-char-array-java | CC-MAIN-2021-04 | refinedweb | 439 | 74.49 |
Radio: Preparing WAV files for cloud-based radio benefits were clear: no skips, no repeated songs, no "dead air" and for music directors, a way to plan and strategize their music curation.
If you remember, the 1990s was the decade of Microsoft Windows. Everyone was making Windows applications, and therefore, most of the high-end broadcast software was built on Windows using
wav as their default file format.
For the most part,
wav format is fantastic. It's like the perfect wrapper for storing music regardless of its encoding. For example, if you've ever worked with a
zip file,
wav is very similar to that. You can do much more with wav than just package a song.
The only problem is that
wav is terrible for internet distribution. There are two apparent problems. The first is that
wav files are generally uncompressed and therefore large. A 3-minute song can average 40Mb. The second problem is that WAV isn't designed to store metadata information. So there's no way no add song title, composer, genre, year, and all of those other goodies –unless you start getting unnecessarily creative [1].
Going back to my team, as we begin exploring the idea of building a "cloud-based radio station," we thought it would be essential to learn how to convert our existing catalog into a new system that better prepares us for the future.
The goal was to convert
wav to another uncompressed, lossless format, that is still high-quality, yet capable of handling ID3 data and open source.
The rest of this article will explain:
- How we converted
wavfile to
flac
- How we automated the process of finding metadata using our source material.
- How we injected that metadata into
flac.
- How we created Mp4 renditions.
Hello FLAC
FLAC is a technology that offers most of our key benefits, including:
- Lossless audio compression.
- Slightly smaller file sizes.
- ID3 metadata is a first-class citizen.
- License-free
- Mac and PC friendly
- Supported by a robust open-source community
- An excellent suite of command-line tools
Step 1 - Creating a Process
From WAV to FLAC, a love story
One of my first tasks is figuring out how to convert data from WAV to FLAC. Thankfully, there are many options available, but I chose a tool that would allow me to create a scriptable, automation-friendly process.
As a starting point, I'm going to use
ffmpeg to convert my WAV file to FLAC format.
The only problem is that beets don't do well with WAV files. Therefore, our first step is to use
ffmpeg to convert a WAV file to FLAC. Unfortunately, there is very little WAV support on beets, so we'll need to run this command on its own.
Once you have a FLAC file, you can run some fingerprinting.
Since I'm on a Mac, I installed
ffmpeg command-line through Homebrew package manager to help with the conversion.
In order to use the script below, you must first have Rake and Homebrew installed.
Create a file titled
Rakefile and paste this code.
namespace :audio do desc %Q{ Install ffmpeg encoder. } task :install do # sh %{ brew install ffmpeg boost taglib } end desc %Q{ Encode WAV to FLAC } task :convert, [:input, :output] do |task, args| input = args.input output = args.output sh %{ ffmpeg -i #{input} -c:a flac #{output} } end end
Download and install
ffmpeg.
rake ffmpeg:install
Convert a WAV file to FLAC.
rake ffmpeg:convert[/path/to/file.wav,/path/to/file.flac]
Here are a few other examples showing you how to convert files to different sample rates
Step 2 - Injecting ID3 data
Now that my WAV files are in FLAC format, I now want to figure out a way to find the metadata and inject it into the file.
Considering that I have 60k files, the only plausible way to automate this is to use the type of fingerprinting technology you see on products like Shazam.
Ideally, I also want to scour the Internet somehow and find the album art for each song. Here's how we can do both using beets.
Getting Started
So here's the deal, Music Fingerprinting is a fantastic technology with incredible benefits, but it requires a little bit of configuration.
Since I work on radio, it totally makes sense for me to learn the intricacies of creating a Shazam-like tool, but for most people, the barrier might be a little too high. Therefore, I've created a script that automatically installs the necessary software for you.
You can choose to install the necessary libraries yourself by visiting the docs
Add these new namespaces to your
Rakefile.
namespace :fingerprint do desc %Q{ Start Fingerprinting } task :install => [:dependencies] do puts "Great! We're ready to get started." end desc %Q{ Install Fingerprinting Dependencies. } task :dependencies do # Install Chromaprint's tool fpcalc Rake::Task["fpcalc:install"].invoke("~/Desktop/fpcalc.tar.gz") # Install flac library sh %{ brew install flac } # Install pyacoustic so that we can interact with fpcalc from pythong sh %{ pip install pyacoustid } # Install beets sh %{ pip install beets[chroma] } end end namespace :fpcalc do desc %Q{ Download fpcalc. } task :download do |task, args| source = "" dest = args.dest # Remove any previous downloads sh %{ rm -f #{dest} } # Download it as a new filename sh %{ curl -L #{source} -o #{dest} } end desc %Q{ Install fpcalc. } task :install, [:dest] => [:download] do |task, args| dest = args.dest # Unpack store the executable in /usr/local/bin sh %{ tar -xzvf #{dest} -C #{Dir.home}/Desktop --strip-components=1 } # Move fpcalc to /usr/loca/bin sh %{ mv fpcalc /usr/local/bin/fpcalc } # Double check your work. sh %{ which fpcalc } # Remove the desktop download sh %{ rm -f #{dest} } end end
Now all you have to do is open up
Terminal and run this command.
The command will install
flac,
pyacoustid, and
fpcalc.
rake fingerprint:install
fpcalcis an open-source fingerprinting technology is available within a command-line package called fpcalc. If you're on a mac, download fpcalc library and copy the executable file to your
/usr/local/bin.
- We need
pyacoustidpackage to interact with the Chromaprint library from Python.
beetsis a command-line tool for python that can automatically catalog your collection, transcode audio files, check for duplicates and help you fingerprint songs through chromaprint. We are also including
chromaplugin.
Configuring Beets
Now that we've installed all the necessary packages, we now need to configure the
beets application.
You will first need to configure beets so that you can install plugins.
Create a new
config.yaml.
beet config -e
Here is an example of a config file. The file is located in
~/.config/beets/config.yaml.
# Copy cleaned-up music into that empty folder using beets’ directory: ~/Desktop/my_beets_app/my_music_folder # Location of Beets music database library: ~/Desktop/musiclib.blb import: # If no data is available, just move on quiet_fallback: skip # Do not copy songs to another directory copy: no # Inject ID3 data into the song if found. write: yes # Use the Chroma plugin plugins: chroma chroma: # When you type beets import, the auto fingerprinting will begin. auto: yes # You can do multiple processes at once. This is somewhat CPU intensive. threaded: yes # Show the command line verbose: yes
Download a WAV file
For this example, let's use a Creative Commons WAV file from Nine Inch Nails titled "999,999".
Music Fingerprinting - Finding a Song's info based on it's "sound."
Now that our development environment is ready. Let's try and fingerprint a WAV file that contains no metadata.
Acoustic fingerprinting is a technique for identifying songs from the way they –sound– rather from their existing metadata.
Step - Import Music
Singletrack
Import a single track and include a log file.
beet import -A -C -s -l my_log_file.txt my_music_folder/album/02.flac
-Ado not auto-tag anything, just import the files.
-Cdo not copy files to a new directory.
-sis the singleton method we should use when we're trying to access a single file.
Entire Albums
Import a single track and include a log file.
beet import -A -C -l my_log_file.txt my_music_folder/album/02.flac
Step - Beet Queries
List out the music you've imported.
beet list
Resources
-
-
Acoustic ID is a web service that serves as a companion to chromaprint.
-
FFMpeg compilation guide.
-
-
-
- | https://www.chrisjmendez.com/2018/02/12/radio-preparing-wav-files-for-cloud-based-radio/ | CC-MAIN-2020-24 | refinedweb | 1,381 | 56.25 |
/PSP
In directory sc8-pr-cvs1:/tmp/cvs-serv29753/PSP
Modified Files:
ServletWriter.py
Log Message:
Modifying PSP/ServletWriter.py to use mkstemp() instead of mktemp().
mkstemp() was added in Python 2.3 for improved security over mktemp().
Making MiscUtils/Funcs.py simply pull the mktemp and mkstemp from Python
if the version is 2.3 or greater. Otherwise, we define our own versions
of those functions. Note that our mkstemp is not as secure as the one
that comes with Python 2.3.
Index: ServletWriter.py
===================================================================
RCS file: /cvsroot/webware/Webware/PSP/ServletWriter.py,v
retrieving revision 1.12
retrieving revision 1.13
diff -C2 -d -r1.12 -r1.13
*** ServletWriter.py 20 Jan 2003 07:17:34 -0000 1.12
--- ServletWriter.py 30 Jan 2003 21:17:58 -0000 1.13
***************
*** 26,30 ****
from Context import *
! from MiscUtils.Funcs import mktemp
import string, os, sys, tempfile
--- 26,30 ----
from Context import *
! from MiscUtils.Funcs import mkstemp
import string, os, sys, tempfile
***************
*** 39,44 ****
def __init__(self,ctxt):
self._pyfilename = ctxt.getPythonFileName()
! self._temp = mktemp('tmp', dir=os.path.dirname(self._pyfilename))
! self._filehandle = open(self._temp,'w+')
self._tabcnt = 0
self._blockcount = 0 # a hack to handle nested blocks of python code
--- 39,44 ----
def __init__(self,ctxt):
self._pyfilename = ctxt.getPythonFileName()
! fd, self._temp = mkstemp('tmp', dir=os.path.dirname(self._pyfilename))
! self._filehandle = os.fdopen(fd, 'w')
self._tabcnt = 0
self._blockcount = 0 # a hack to handle nested blocks of python code
I agree to receive quotes, newsletters and other information from sourceforge.net and its partners regarding IT services and products. I understand that I can withdraw my consent at any time. Please refer to our Privacy Policy or Contact Us for more details | https://sourceforge.net/p/webware/mailman/message/4464344/ | CC-MAIN-2016-44 | refinedweb | 289 | 55.2 |
Bummer! This is just a preview. You need to be signed in with a Basic account to view the entire video.
Displaying Validation Messages7:20 with Chris Ramacciotti
As the final piece of our form validation discussion, in this video we cover how to make validation results available to Thymeleaf templates, as well as how to use Thymeleaf to display validation messages if there are any present.
Git Command to Sync Your Code to the Start of this Video
git checkout -f s4v.
Validation Messages in Your Annotations
One approach to customizing error messages is to use the validation annotation's
message element to specify exactly the message you'd like to use. For example:
@Size(min = 5, max = 12, message = "The category name must be {min} to {max} characters in length.") private String name;
If validation fails on the
name field, the message above will be interpolated as "The category name must be 5 to 12 characters in length."
Externalizing Validation Messages
If you want to get validation messages completely out of your source code (and you should), you have some options. A useful option is to include a file named messages.properties on the classpath (in src/main/resources works nicely). In this file, you'll add a property key for each validation message you wish to define. Then, as the value for each key, you'll type the same message as you would have used in the annotation. Here is an example of using a properties file to do the equivalent of the above annotation:
messages.properties
category.name.size = The category name must be {min} to {max} characters in length.
Category.java
@Size(min = 5, max = 12, message = "{category.name.size}") private String name;
In order to configure Spring to use your messages.properties file as the source of validation messages, you'll need to update your
AppConfig (or other
@Configuration class) to extend
WebMvcConfigurerAdapter, and include the following (unrelated code omitted for brevity):
AppConfig.java
public class AppConfig extends WebMvcConfigurerAdapter{ @Bean public MessageSource messageSource() { ReloadableResourceBundleMessageSource bean = new ReloadableResourceBundleMessageSource(); bean.setBasename("classpath:messages"); bean.setDefaultEncoding("UTF-8"); return bean; } @Bean public LocalValidatorFactoryBean validator() { LocalValidatorFactoryBean bean = new LocalValidatorFactoryBean(); bean.setValidationMessageSource(messageSource()); return bean; } @Override public Validator getValidator() { return validator(); } }
- 0:00
To keep our users fully informed of what's happening when they try to add a category
- 0:04
and we redisplay the form, let's add some form validation messages.
- 0:08
Here we'll once again utilize the redirect attributes object to pass
- 0:12
on validation results to the form upon redirection.
- 0:16
This is where in my opinion,
- 0:18
as of the recording of this video, Spring falls a bit short on data validation.
- 0:23
Though this solution that I'm going to give you works wonderfully,
- 0:26
it isn't one that's overly apparent, so here it is.
- 0:31
If the binding result reveals that we do have errors upon validation, we want
- 0:36
to include those validation errors for redirects, so we'll do that right here.
- 0:40
We will include validation errors upon redirect,
- 0:47
so to do that we say redirectAttributes.addFlashAttribute,
- 0:51
that's not new that's what we did with the categories.
- 0:54
So that the data that the user entered for a category will
- 0:57
be included when the form is redisplayed, it'll pre-populate the form.
- 1:01
Now up here, here's the name of the class that we need to add.
- 1:05
It's a fully qualified class name
- 1:10
org.springframework.validation.BindingRes- ults.Category.
- 1:20
And then we will add the binding result object under that
- 1:25
attribute name right there.
- 1:28
Notice that we are going to use the fully qualified name
- 1:31
of the binding result class, and then we will use .category.
- 1:35
In the Thymeleaf template, Thymeleaf will be able to combine
- 1:41
the data that's stored in that category, that is this model attribute,
- 1:46
it will be able to combine that data with this validation data here.
- 1:52
So then, Thymeleaf will have access to the binding result in a way that it expects.
- 1:56
And speaking of Thymeleaf, let's head there now and make the necessary changes.
- 2:00
So I want to go to the category's form view.
- 2:03
Now that this template will have access to the binding result,
- 2:07
what we can do is add markup to display when there are errors for any given field.
- 2:12
Let me show you an example.
- 2:14
I'll start with the category name so I'll add some markup after this input element.
- 2:19
I'll add a div with the class name of error-message.
- 2:24
The contents of this div will contain the actual error message,
- 2:28
should validation errors be present.
- 2:30
So that to make sure that this div is only displayed when validation errors
- 2:34
are present, we'll use a th:if attribute and here's how that looks.
- 2:40
With a dollar sign in a pair of curly braces inside we will say
- 2:45
fields.hasErrors and we will check the name field.
- 2:51
And the text we want to display in this div will come from some default error
- 2:57
message and get all referenced in just a second, but to make sure that we have
- 3:00
access to that error messaging instead of using a th:text we'll use a th:errors.
- 3:07
And as the value for that we will reference the bound objects name property.
- 3:14
So what's going on here is that we're using this fields object,
- 3:18
which allows us to query validation errors with the hasErrors method.
- 3:23
And referencing the currently bound object, as I mentioned, which is category,
- 3:28
we are referencing its name property.
- 3:33
So what is happening here is this method call right here, fields.hasErrors,
- 3:38
is querying that binding result object that we added with
- 3:42
org.springframework.validation.bindingres- ult.Category.
- 3:46
And this right here references the errors of the currently bound object,
- 3:52
specifically, its name property.
- 3:54
And if it has errors, then the text that will be displayed comes from default
- 3:59
messaging and we want that default messaging to be related to the validation
- 4:04
that's present on the name field of the category entity.
- 4:10
And now while we're at it, let's do the same for the color code.
- 4:14
What I'm going to do is I'm going to copy that div and paste it for
- 4:20
the color code and simply change the field names.
- 4:25
So I will paste that right here and
- 4:29
i'll change this to colorCode and this to colorCode.
- 4:36
That is the property that I am validating,
- 4:39
which is part of the currently bound object, the category object.
- 4:44
Now so that the CSS I included for error messages catches in the browser,
- 4:48
I'm going to add the error class to the enclosing div that is this div right here.
- 4:57
As well as this div, I wanna add the error class
- 5:00
if errors are present on those respective fields, and here is how that looks.
- 5:05
You can take whatever classes are present in the static HTML and
- 5:08
you can use the th:classappend attribute.
- 5:13
So I'll drop in here a quick condition, and I'll return to this in a second such
- 5:17
that when that condition is true I want to append the class name of error.
- 5:22
Otherwise I want to append a blank class name to that,
- 5:27
that is, append nothing to these class names right here.
- 5:31
And what do I put in here?
- 5:33
Well, I can put the same expression that I used in here to display the div
- 5:39
only if the name field has validation errors, I'll drop that right in there.
- 5:44
And then I'll do the same for the div down below.
- 5:46
And so that I don't have to retype all that, I will copy that, I will paste it
- 5:51
in here, and I'll make sure to change the field name to colorCode.
- 5:57
Great. Now we've got all the pieces in place to
- 6:01
display form validation messages, so let's reboot our app and check it out.
- 6:06
Mine is still running, so I will go ahead and kill my last instance.
- 6:11
And let's reboot that.
- 6:14
My code is currently compiling and now my Spring app is booting.
- 6:19
If all goes wel,l the application will start successfully,
- 6:22
it looks like it did so.
- 6:23
Now with that started, let's switch to Chrome and
- 6:26
try to add a category without entering any data.
- 6:31
So I will try to add a category, I won't add any data and great, there they are.
- 6:37
Now you might be wondering where does the text for
- 6:40
each of these error messages come from?
- 6:42
Currently, we're seeing default messages that come with those validation
- 6:45
annotations, but there are a couple ways to customize those so
- 6:50
check the teacher's notes for options.
- 6:52
An important feature to note and
- 6:54
demonstrate here is what I've already mentioned.
- 6:57
And that is that the flash attributes added to the redirect attributes object
- 7:01
are present only for one redirect.
- 7:05
So this means that our next request won't contain this data, so
- 7:09
if I refresh, they're gone.
- 7:14
Next, we'll talk about a different kind of messaging that lets users know about
- 7:18
the actions they've just taken. | https://teamtreehouse.com/library/displaying-validation-messages | CC-MAIN-2018-13 | refinedweb | 1,734 | 59.64 |
great!
Post your Comment 3.2 MVC Hello World Example
In this section, you will learn about Hello World example in Spring 3.2. "
Spring 3.2 MVC Hibernate Example
In this section, you will learn to integrate Spring 3.2 MVC with Hibernate
Spring 3.2 MVC Form Handling
In this example, you will learn about handling forms in Spring 3.2 MVC
EJB Hello world example
EJB Hello world example
... example we are going to show you, how to
create your first hello world example in EJB and testing it.
You can also create a hello world example to test your("
Java Hello World code example
Java Hello World code example Hi,
Here is my code of Hello World program in Java:
public class HelloWorld {
public static void main(String[] args) {
System.out.println("Hello, World
Hello World in servlet
Hello World in servlet Hello World example in servlet ?
..., IOException
{
PrintWriter out = res.getWriter();
out.println("Hello World!");
out.close
pring Hello World Application
Spring Hello World Application
Hello World Example using Spring, The tutorial given below describes you the way to make a spring web
application that displays Hello World
ZF Hello World
with "Hello World" program. This tutorial is not an
exception... by the web server. Since
this framework is based on MVC design pattern, it separates... a fully functional MVC based project. Now type
the following command which
jQuery Hello World
jQuery Hello World example
... page.
Hello World Example(HelloWorld.html)
<html>
<head>... application called
"Hello World jQuery". This application will simply display
"Hello World" example in Wicket
"Hello World" example in Wicket
Hello World example is everybody's...;Hello World!" message. Full code of HelloWorld.java
EJB Hello world example
EJB Hello world example
... example we are going to show you, how to
create your first hello world example in EJB and testing it.
You can also create a hello world example to test your
World example program in Eclipse IDE.
In this video tutorial I will teach you how to develop 'Hello World'
application in Struts 2 framework.SF Hello World
classes etc.
Steps to create JSF Hello World Example:
1. Go to your project...
JSF Hello World
In this example, we will be developing JSF Hello in Echo3 framework
Hello World in Echo3 framework
Since "Hello World" example is everyone's... with
the "Hello World" example in Echo3. We have illustrated the first
Servlet hello world example
Servlet hello world example
This tutorial will help you to understand... hello world in Servlet. Let us explain this by a hello
world example using Servlet.
Example : Hello world example in Servlet
import java.io.*;
import
Core Java Hello World Example
Create Java Hello World Program
This tutorial explains you how to create a simple core Java "Hello World"
application. The Hello World application will print the text "Hello World" at
the console. This example
TIBCO Designer Tutorial - Hello World
you how to create a process definition that writes the words "Hello, World... output "Hello, World!" into the file. This task requires knowledge of the file... and text content of "Hello, World!" into the activity configuration. Then you're
Spring Hello World prog - Spring
Spring Hello World prog I used running the helloworld prog code mentioned in
I'm... visit the following link:
Hope
Smarty Hello World Program
;//enable the caching
$smarty->assign ('name', 'hello world...How to write "Hello World" program?
In any smarty program we need... folder and store the tpl files inside the templates folder.
First example:
i
Simple Procedure to display Hello World
that helps you
to display 'Hello World'. In this Example, we create a procedure...
Simple Procedure to display Hello World
...
you the 'Hello,World' ,whenever a procedure 'abc' is invoked.
Create
Hello WorldPaulo March 12, 2013 at 6:13 PM
great!
Post your Comment | http://roseindia.net/discussion/47398-Spring-3.2-MVC-Hello-World-Example.html | CC-MAIN-2014-42 | refinedweb | 636 | 59.8 |
Send SMS Messages with Node.js and Express using the Vonage SMS API
The Vonage SMS API allows you to send and receive a high volume of SMS messages (now Vonage)Prerequisites
Before starting this tutorial, make sure you.
Using the Vonage Server SDK for Node.jsUsing the Vonage Server SDK for Node.js
First, run
npm init in your project folder, then use npm to install
@vonage/server-sdk, the Server SDK for Node.js in your working directory:
$ npm install @vonage/server-sdk --save
Add
"type": "module" to your
package.json file to be able to use import statements.
Create a
.js file, let’s call it
index.js, and in the file, initialize a
Vonage instance with your credentials. Find your API key and secret in your Vonage Dashboard.
import Vonage from "@vonage/server-sdk"; const vonage = new Vonage({ apiKey: VONAGE_API_KEY, apiSecret: VONAGE_API_SECRET, });
There are also optional params you can use. Find out more in the SMS API Reference.
Send an SMS Message with Node.js and the Vonage SMS APISend an SMS Message with Node.js and the Vonage SMS API
To send a message, use the
vonage.message.sendSms function and pass your virtual number you are sending the message from, a recipient number, and the message to be sent.
Also, you can pass optional params, and a callback.
Let's hard-code the phone number (which should start with a country code, e.g. "15105551234") and a message for now to try the API. Replace
YOUR_VIRTUAL_NUMBER with one of your Vonage numbers.
vonage.message.sendSms( "YOUR_VIRTUAL_NUMBER", "15105551234", "yo", (err, responseData) => { if (err) { console.log(err); } else { if (responseData.messages[0]["status"] === "0") { console.dir(responseData); } else { console.log( `Message failed with error: ${responseData.messages[0]["error-text"]}` ); } } } );
Let's run this, and see if you get an SMS to your mobile phone.
$ node index.js
I hope it worked! You have learned how to send an SMS message with the Vonage Node.js SDK.
You can stop right here, or proceed to play with Express.js to be able to take the queries dynamically from POST requests!
Building a Bare Minimal SMS App with Express.jsBuilding a Bare Minimal SMS App with Express.js
Let’s write a very simple app using Express to send an SMS.
Install Express as a dependency:
$ npm install express --save
In index.js, add the following code to start a server that listens on port 3000 for connections:
import express from "express"; const { json, urlencoded } = express; const app = express(); app.use(json()); app.use( urlencoded({ extended: true, }) ); app.listen(3000, () => { console.log("Server listening at"); });
Now, wrap
vonage.message.sendSms() with the Express
post route method. Let’s set the
type to
'unicode' so you can send some emojis too! Also, print out the response in the callback.
app.post('/send', (req, res) => { // Send SMS vonage.message.sendSms(YOUR_VIRTUAL_NUMBER, req.body.toNumber, req.body.message, {type: 'unicode'}, (err, responseData) => { if (err) { console.log(err); } else { if(responseData.messages[0]['status'] === "0") { console.dir(responseData); } else { console.log(`Message failed with error: ${responseData.messages[0]['error-text']}`); } } }) });
Now, you can try sending an SMS to any mobile phone number (including Google Voice numbers) using your app.
In this tutorial, we are not going to create the HTML with the form UI where a user can fill out a phone number and message (I will write a full tutorial including the front-end code in the future!), so let’s pretend we are sending data from a web interface by using Postman to make requests to your app. Postman is a good tool to have when you develop apps with REST APIs!
- Launch Postman and Select POST, and enter.
- At Headers, Set Content-Type: application/json
- At Body, type a valid JSON with "toNumber" and its value (use your mobile phone number! To receive an SMS message!), also “message” and its value.
- Press the blue Send button
Once you made a successful POST request to your app, you will get a text message to your phone from the virtual number!
Also, you will see the response printed in your terminal.
{ 'message-count': '1', messages: [ { to: '15105551234', 'message-id': '13000001EBFD617E', status: '0', 'remaining-balance': '5.03151152', 'message-price': '0.03330000', network: 'US_VIRTUAL_BANDWIDTH' } ] }
You can view the code sample used in this tutorial on GitHub.
In the next tutorial, you will learn how to receive SMS messages to your virtual number. Stay tuned! | https://learn.vonage.com/blog/2016/10/19/how-to-send-sms-messages-with-node-js-and-express-dr/ | CC-MAIN-2021-39 | refinedweb | 741 | 68.87 |
WTForm is an extension to the django newforms library allowing the developer, in a very flexible way, to layout the form fields using fieldsets and columns
WTForm was built with the well-documented YUI Grid CSS in mind when rendering the columns and fields. This should make it easy to implement WTForm in your own applications.
Here is an image of an example form rendered with WTForm.
- Author:
- chrj
- Posted:
- May 3, 2007
- Language:
- Python
- columns css fieldset form grid html layout newforms rendering yui
- Score:
- 23 (after 23 ratings)
Thank you, this is very nice! However, it doesn't seem to work with form_for_model or form_for_instance... the resulting class doesn't have any goodies in it:
#
You're right. I will try to look into this.
Regards,
#
Do you have a URL to a page showing this code in action?
#
jmohr, your issue has now been resolved. The WTForm class now descends directly form BaseForm and that solved the problem.
Thank you.
#
simon, I have added a screenshot to the description.
#
With recent django svn (r5830) I'm seeing a couple of problems:
Without either deriving from forms.Form or adding a
__metaclass__ = django.newforms.forms.DeclarativeFieldsMetaclass"to the class I see an error about base_fields being missing on the WTForm class when I try to use it.
There are some new arguments in the BaseForm class, omitting them seems to break errors, changing the
__init__to this fixes it:
def __init__(self, *args, **kwargs): super(WTForm, self).__init__(*args, **kwargs)
(sorry, can't seem to get indentation working right)
#
the tabindex needs to be set if you use 2 columns... is there a way to automate this?
#
object has no attribute 'base_fields'
I want to clarify mickwomey's comment because I glossed over the first part of what he said and had to do my own debugging.
The WTForm class must be updated to match the following
Note that DeclarativeFieldMetaclass must be imported from django.newforms.forms and NOT django.newforms
I have tested this with django r6063
#
WTForm fails silently with no output
I ran into another problem (user error) when trying to use this great module. I guess I need to start reading more carefully because the answer is in the documentation.
For clarification the layout variable must be a tuple or other iterable object, meaning it has a getitem method.
What annoyed me, was that if you fail to make to do so, there is no warning. The modules just fails silently. It took me close to an hour of debugging to figure out where I had gone wrong.
Example:
This fails silently
This does not
The difference being the comma between the last two parenthesis.
Solution: To avoid this minor detail snagging me again I added a assert statement to the WTForm init method, to ensure that layout is iterable.
I have reprinted the entire method for clarity. Please note that my sample includes the changes first pointed out by micktwomey that are required to make this module compatible with current versions of django.
I have tested this with django r6063
#
Crying shame this isn't maintained.
#
Was able to make it work as of March 08.
#
^ append
Got this working with a lot of hassle made short thanks to the advice of mthorley above. Good work!
One thing you will also have to do is....
from django.utils import safestring
and then for as_div....
return safestring.mark_safe(prefix + errors + output)
#
@subsume:
CAn you explain hox you did it working ? I always have this error: Could not resolve form field 'name'.
My function:
and my Page model:
thanks if you could help me.
#
HI,
#
very nice article. evden eve nakliyat [url= ]ankara nakliyat[/url] ankara taşımacılık hizmetleri ankara nakliyat [url= ]ankara nakliyat[/url] ankara evden eve nakliye ankara nakliyat ankara taşımacılık şirketi ,ankara nakliyat firmaları
#
ankara nakliyat
#
There seems to be a 1.0 version tarball at
#
WTForm versions up to 1.0 are not compatible with Django 1.0 (they use newforms instead of forms). There's a Django 1.0 compatible branch available in github.
#
Oh my, I discareded my version, also in django snippets (which is quiet similar as this approach) long time ago because this damn well should be in django already!
Thumbs up for maintaining! If we could get this to be part of Django distribution (contrib or something), then I for one could try to make django admin use this. I hate the way Django admin does fieldsets.
#
Everyone! I opened thread to make this (the maintained version) to be part of Django, support the cause please, to make it fly!
# | http://www.djangosnippets.org/snippets/214/ | crawl-002 | refinedweb | 772 | 73.37 |
Section (3) drand48
Name
drand48, erand48, lrand48, nrand48, mrand48, jrand48, srand48, seed48, lcong48 — generate uniformly distributed pseudo-random numbers
Synopsis
#include <stdlib.h>
DESCRIPTION
These
[−2^31,: functions
erand48(),
nrand48() and
jrand48() require the calling program to
provide storage for the successive
Xi values in the array argument
xsubi. The functions are
initialized−2] specify
Xi,
param[3−5] specify
a, and
param[6] specifies
c. After
lcong48() has been called, a subsequent
call to either
srand48() or
seed48() will restore the
standard values of
a and
c.
ATTRIBUTES
For an explanation of the terms used in this section, see attributes(7).
The above functions record global state information for the random number generator, so they are not thread-safe. | https://manpages.net/detail.php?name=drand48 | CC-MAIN-2022-21 | refinedweb | 120 | 52.7 |
XML and Java CAPS
I came across a problem the other day that had I thought I'd share. The problem was that I needed a generic XML transformer and identifier. Normally I would build an otd based on the XML schema or DTD, but in this case, a generic option was required.
To get around the problem, I ended up using the DOM parser within java. Java CAPS as its name suggests has Java underneath it all, so everything available to Java is available in Java CAPS.
Below is some sample code (Outside of Java CAPS) that will take in an XML message, identify the first node and return it as a string. The code can be easily modified to be implemented within Java CAPS.
package sun.XMLProcessing;
/**
*
* @author hpaffrath
*/
import java.io.FileInputStream;
import javax.xml.parsers.DocumentBuilderFactory;
import javax.xml.parsers.DocumentBuilder;
import java.io.ByteArrayInputStream;
import java.io.InputStream;
import org.w3c.dom.Document;
import org.w3c.dom.Node;
import org.w3c.dom.*;
public class XMLTest2 {
public XMLTest2() {
}
public static void main(String args[]) throws Throwable {
System.out.println("Inside XML Test");
String xmlfile = readFile("c:/DATA/input.xml");
//System.out.println("[" + xmlfile + "]");
System.out.println("XML Message Type = [" + messageType(xmlfile) + "]");
}
public static String readFile(String filename) throws Exception {
try {
FileInputStream fis = new FileInputStream(filename);
byte[] b = new byte[fis.available()];
fis.read(b);
return (new String(b));
} catch (Exception e) {
throw new Exception("File could not be read");
}
}
public static String messageType(String xmlMessage) throws Exception {
ByteArrayInputStream bais = new ByteArrayInputStream(xmlMessage.getBytes());
// Create a Dom Parser
DocumentBuilder db = DocumentBuilderFactory.newInstance().newDocumentBuilder();
Document doc = db.parse((InputStream) bais);
Node n = doc.getFirstChild();
return (n.getNodeName());
}
}
With the implementation, I could have happily used other parsers such as xerces or other XML technologies such as XML Beans or JDOM. You don't get the pretty graphics (Well, you do with XML Beans as the class is rendered in the GUI) .
Posted at 03:22PM May 13, 2008 by Holger Paffrath in Sun | Comments[0] | http://blogs.sun.com/jcapsuser/entry/xml_and_java_caps | crawl-002 | refinedweb | 337 | 52.46 |
More Articles
Generic methods may also be overridden by descendant classes. In fact, generic methods introduce surprisingly few new facets when it comes when overriding methods. The syntax for overriding generic methods follows the same pattern as non-generic methods where the overriding method must match, precisely, the parameters of the parent method. With a generic method, the only difference is that the parameters can be expressed as type parameters. Here's a simple example:
[VB code]
Public Class Person(Of T, U)
Public Overridable Sub Foo1(Of I)(ByVal val1 As T)
End Sub
Public Overridable Sub Foo1(Of I)(ByVal val1 As Int32)
End Sub
Public Overridable Sub Foo2(Of I, J)(ByVal val1 As U)
End Sub
Public Overridable Sub Foo3(Of I, U)(ByVal val1 As I, ByVal val2 As U)
End Sub
Public Overridable Sub Foo4(Of D, E, F)(ByVal val1 As D, ByVal val2 As E)
End Sub
Public Overridable Function Foo5(Of I As IComparable)
(ByVal val1 As I) As I
End FunctionEnd ClassPublic Class Employee(Of T, U)
Inherits Person(Of String, U)
'Error: can't verify this is unique for all permutations
Public Overrides Sub Foo1(Of I)(ByVal val1 As Int32)
End Sub
Public Overrides Sub Foo2(Of I, J)(ByVal val1 As U)
End Sub
Public Overrides Sub Foo3(Of I, U)(ByVal val1 As I, ByVal val2 As U)
End Sub
Public Overrides Sub Foo4(Of A, B, C)(ByVal val1 As A, ByVal val2 As B)
End Sub
End Class
[C# code]
public class Person<T, U> {
public virtual void Foo1<I>(T val1) {}
public virtual void Foo1<I>(int val1) {}
public virtual void Foo2<I, J>(U val1) {}
public virtual void Foo3<I, U>(I val1, U val2) {}
public virtual void Foo4<D, E, F>(D val1, E val2) {}
public virtual I Foo5<I>(I val1) where I : IComparable {
return default(I);
}
}public class Employee<T, U> : Person<string, U> {
public override void Foo1<I>(int val1) {}
public override void Foo2<I, J>(U val1) {}
public override void Foo3<I, U>(I val1, U val2) {}
public override void Foo4<A, B, C>(A val1, B val2) {}
}
A series of examples are shown in this section, each of which attempts to override a generic method. The goal here is to provide a sampling of permutations so you can have a better feel for what's possible. This example sets things up by declaring a generic class, Person, and creating a descendant generic Employee class that overrides a handful of its parent's virtual, generic methods.
Person
Employee
Most of the overrides, at this stage, are just as you would expect. The overriding method simply matches the signature of its parent. You should pay particular attention the role type parameters play in this example. In some instances, the type parameters of the surrounding class are referenced and, in others, the generic methods reference their own type parameters. The Foo2() method, for example, accepts type parameters of I and J and references the U type parameter that is part of the class declaration.
Foo2()
I
J
U
The other method here that offers a slight twist is Foo4(). This method matches the parent's signature but uses entirely different type parameter names. This is only meant to demonstrate that — even in an overriding scenario — the names of the type parameters are still just placeholders. The fact that these names are different in the base class does not prevent you from successfully overriding it with alternate type parameter names.
Foo4()
This first example (and those that follow) demonstrates a few areas where VB and C# diverge in their approach to overriding generic methods. In this first set of examples, C# compiles both of these classes successfully. However, VB throws an error on the Foo1() here. It preemptively determines that there are instances where the type for the T parameter can make overloaded versions of Foo1() that collide.
Foo1()
T
The next example takes this a little further and adds another class that changes the inheritance scheme. The following generic Customer class also extends the Person class and overrides two of its generic methods:
Customer
[VB code]
Public Class Customer(Of T, U)
Inherits Person(Of T, U)
'Error: can't verify this is unique for all permutations
Public Overrides Sub Foo1(Of I)(ByVal val1 As T)
End Sub
Public Overrides Function Foo5(Of I As IComparable)
(ByVal val1 As I) As I
End Function
End Class
[C# code]
public class Customer<T, U> : Person<T, U> {
public override void Foo1<I>(T val1) {}
public override I Foo5<I>(I val1) {
return default(I);
}
}
In contrast with the previous example, this class uses the T and U type parameters in its inheritance declaration. By referencing the same type parameter for T in both the base and descendant class, you are able to override the Foo1() method that references the T parameter in the base class. This is only possible because the T in both classes is guaranteed to reference the same type. Of course, Foo1() fails in the VB example again for the same reasons discovered in the previous example.
The other override here, the Foo5() method, demonstrates how constraints factor into the signature of a generic method that's being overridden. Here, you might think that Foo5() would not successfully override the declaration in its parent, because the Person class included a constraint as part of its declaration. For C#, the inclusion of the matching constraint would actually generate a compile-time error here. When constraints are part of the base class in C#, the overriding method always inherits the constraints and cannot alter them. The opposite is true in VB, where the overriding method is required to include the constraint as part of the method's signature. The rationale behind this inconsistency is not clear.
Foo5()
There's one final scenario worth exploring. You'll notice that the Person class actually includes an overloaded method, Foo1(). This method has one version that accepts a T type parameter and the other accepts an integer. Now, consider this example where the T type argument supplied to the parent is an integer:
integer
[VB code]
Public Class Vendor(Of T, U)
Inherits Person(Of Int32, U)
Public Overrides Sub Foo1(Of I)(ByVal val1 As Int32)
End Sub
End Class
[C# code]
public class Vendor<T, U> : Person<int, U> {
public override void Foo1<I>(int val1) {}
}
This class would seem to be valid. Its declaration of the Foo1() method certainly matches that of the parent class. The problem here isn't that the method doesn't match — it's that two methods from the Person class both match this signature. This issue is caused by the use of an integer in its inheritance from the Person class. That integer causes that the Foo1(T val1) method to collide with the other Foo1() declaration.
Foo1(T val1)
As noted earlier, this is one area where VB and C# vary in their handling of the Foo1() method. VB identifies this error at the point of declaration, whereas C# won't throw the error until a type argument is supplied that creates a situation where the signatures of the overloaded methods collide. | http://www.wrox.com/WileyCDA/Section/Using-Generic-Methods-Page-3.id-291719.html | CC-MAIN-2018-30 | refinedweb | 1,210 | 52.02 |
Technote (troubleshooting)
Problem(Abstract)
A test case consisting of a small program written in C/C++/Fortran can often be used to demonstrate a compiler defect. Generating a small, concise test case is very important to the fast turnaround time for its fix. This document will take you through some of the more common reduction techniques to help you reduce your test case.
Resolving the problem
The most effective way to demonstrate a compiler defect to IBM is through a small, self-contained program or a test case. An ideal test case contains only the code necessary to reproduce the error. It typically has fewer than 100 lines of code in a single file without any dependencies on third-party code. This small test case helps IBM developers to quickly determine the cause of failure and thereby provide a faster fix or explanation to the customer.
Most users, depending on their experience level and code familiarity, will be able to make educated guesstimates on which sections of the code to omit without damaging the integrity of the problem itself. However, there are certain program characteristics you may focus on to make this reduction process a faster and easier one. You may find most of these techniques can be used interchangeably between C/C++ and Fortran test cases.
Common Test Case Reduction Techniques
1. Remove Compiler Options
Start by removing as many options as possible. More often than not, you should have no options or have found a bug in the use of an option. Best options to remove first are the optimization related options (that is, -O, -O4, etc.). Unless the problem involves incorrect code generation at high optimization levels, in which case the optimization options will be required to reproduce the problem. Next options you should be looking to eliminate are the preprocessing related options (for example, -D, -U). Modify the source so that these options will not be needed. This step should be re-visited as more source is removed from the test case to have the fewest options possible.
This step is relatively easy and will often allow you to gain valuable information about the problem. If the problem is option related, this step will allow the IBM developers to quickly track down the defected area.
2. Remove #include Files
Once the test case is reduced down to one or a few files, eliminate the headers. A one line source file that includes a single Standard Template Library header file actually represents anywhere from 2000 to 8000 lines of code for the developer to work through.
Removing header files may be more tricky with a large include hierarchy. Taking away header files may just make the problem disappear. You have two methods you can apply at this point: 1) Trace through the hierarchy and decide which files can be eliminated while still keeping the problem; or 2) Produce a preprocessed file ( <filename>.i ) by using the -P option. The latter may be easier for a large include hierarchy. The -P option will pull in all the source code in the header files and combine them into one preprocessed file (.i). The reduction process can be then continued with this file. This method also makes backup easier as you will only have to backup one file instead of all the header files. It is a good idea to save your work every few steps as you may hit a dead-end and have to reverse previous steps.
3. Remove Source Code
By this point, your test case should contain a single file with no includes. Each tested removal, in your judgement, should have a good chance of reproducing the original compiler defect. Attempting a reduction that introduces a syntax error will almost guarantee a failure to reproduce the original defect. An excellent knowledge of the programming language will be very useful here.
With C/C++ problems, you may find inserting #if 0 ... #endif tags useful for testing the removal of large blocks of code. The block commenting (/* ... */) can also be used but you may run into problems when comments are still in the source. Start removal attempts at the bottom of the file. It is more natural for people to code in order and we should use this characteristic to our advantage. With ordered code, declarations at the end of the file cannot have any references to them further down, so they will be easier to remove. If the reduced file successfully reproduces the original symptom, delete the commented out code and repeat the process. Remember to always save your work after every few steps.
If you find a piece of code that is critical to reproducing the problem, try simplifying it before going back to remove other blocks of code from above it. The reason for this is that the fewer references the piece of critical code makes to the code above, the easier it will be to remove that code. For example, if removing this template class makes the problem go away:
template <class T, class U=, int i = A::i> class C:public D<U,T> {
void f(int i, float ff, B<T> bb);
... // many more member functions
... // many data members
};
try simplifying the template class C by using all of the items in the list below. If removing one of these seemingly harmless C++ structures makes the problem disappear, you have found potentially very useful information.
Remove extra code in the following order. This order will get rid of most code as quickly as possible and helps focus in on the code related to the problem.
Tips in reducing a C/C++ test case:
- Function bodies. If necessary, keep the function declaration until all the calls to the function are removed. The only function body that is needed is the one that produces the problem. All other functions should be reduced as much as possible.
- Unused user defined data types (enums, typedefs, classes, etc.). These should be removed continually. You may find it helpful to turn typedefs into the underlying base type. Only keep typedefs that improve the readability of the test case, which helps in the reduction process.
- Class access control. Turn classes into structs and take out all the public/protected/private labels. Friend declarations can also be removed here.
- Base classes. Try to reduce the size of the class hierarchy. Start with the most derived class, which should be the primary class you are working with anyway, and remove as many base classes as you can.
- Unused struct members. Remove all the unused data members and function members, unless the layout needs to be kept to identify a runtime problem. If the problem is related to virtual functions, you may need to keep one virtual function to get the vft.
- Templates. Convert the remaining templates into structs. By this time you should only have one or two small template classes that are only instantiated for a single type. If the problem is template-related, reduce the number of template parameters. If not, convert the templates to structs.
- Default initializers. Remove these from all function and template parameters. Change call and instantiation areas so that they are supplied explicitly.
Tips in reducing a Fortran test case:
- If module variables are used, remove the declaration from the module and declare the variables in the scoping unit that the variables are used.
- If derived types are used, remove the irrelevant components. If there is only one component left, try to replace the derived type by an object that has the intrinsic type of the component.
- If module procedures are used, move the procedure definition out of the module and declare it as an external procedure.
- If external/internal procedures are referenced, inline the procedures as much as possible.
- If statement functions are used, replace the references by the corresponding expressions.
- If comment form directives are used, remove the directives provided that the original symptom is reproducible.
4. Simplify Identifiers
Identifiers should be approximately scaled with project size. In a large project, descriptive identifiers are needed to distinguish between similar but different things. However, these long identifiers are less meaningful when the test case is reduced down to a small size. Rename the identifiers.
Symptom Specific Test Case Reduction Techniques
Test case reduction can also be categorized and handled according to their symptoms. The three main categories of defect symptoms are:
1) Invalid message
2) Internal compiler error (ICE) or infinite loop generation
3) Bad code generation (program execution fails) or unexpected runtime output
Invalid Message
This type of problems are usually the easiest. The compiler tells you which line(s) in the source file that is causing the problem. Use step 3 (above) to remove the irrelevant code.
Internal Compiler Error (ICE) or Infinite Loop Generation
An ICE occurs when the compiler hits an unexpected problem and crashes. The error message generated for this type of problem is not useful in identifying the problem at all. Since you probably have no idea where in the source is causing the failure, you will have to use the trial-and-error method. Eliminate code (using the techniques mentioned earlier) until you have found the problem area. And you should be able to remove the irrelevant code at a much faster rate after this.
Bad Code Generation (program execution fails) or Unexpected Runtime Output
By the time you have noticed this problem, you should have already identified the object file(s) that is generating incorrect code. Apply the removal techniques to reduce the rest of the program. Then find some way to produce the correct code. This may be done by using compilers at different maintenance level (PTF level) or compiling the code under different optimization levels (for example, use -O2 instead of -O4). This information is potentially useful to the IBM developers.
For problems with runtime output, it is often a good idea to start reducing from the main of the program. After reducing the size of the main, eliminating the rest of the project should be much easier. | https://www-304.ibm.com/support/docview.wss?uid=swg21084174 | CC-MAIN-2015-14 | refinedweb | 1,674 | 63.39 |
Red Hat Bugzilla – Bug 972689
neutron doesn't remove namespace after removing router same for network
Last modified: 2016-04-26 12:34:55 EDT
Created attachment 759164 [details]
logs
Description of problem:
quantum doesn't remove namespace after removing router
Upon router create netns is created , when router is removed netns is not being removed.
Since netns name reflect router ID, the netns will not be used again
See attached log
Version-Release number of selected component (if applicable):
How reproducible:
Steps to Reproduce:
1.create router and add interface
2.check netns list on the L3 host
3.delete interface from router and remove router
4.check netns list on the L3 host , qrouter still there
I didn't check if it is same case with network created
Actual results:
Expected results:
Additional info:
I tested it for network and it is the same issue
network and subnet create qdhcp-<NET-UUID> netns.
After removing the subnet and network , the netns is not removed
Still reproduces in rhos 4.0 on rhel 6.5 with 2013-11-08.1 puddle, reporting this bug upstream.
Closing this one per oblaut request. | https://bugzilla.redhat.com/show_bug.cgi?id=972689 | CC-MAIN-2018-43 | refinedweb | 192 | 64 |
Agenda
See also: IRC log
<trackbot> Date: 30 October 2014
<timeless> scribe: timeless
<paulc> F2F topics:
paulc: i'll be like the Baptist
minister: "why are there no people in the front three
pews?"
... can people move in
... we have a polycom, on this side
... please move in
... we're waiting for darobin
<tantek> good morning #html-wg - lurking here in IRC while in the AB meeting in person a few doors down.
paulc: good morning
... i'm Paul Cotton, cochair WG
MikeSmith: Michael Smith, W3C
Josh_Soref: Josh Soref, BlackBerry, Scribe, Observer
Cyril: Cyril Concolato, Institut Telecom, interested in the Media TF work
kurosawa: Takeshi Kurosawa, Mitsue-Links
CCC: ccc
DDD: ddd
darobin: Robin Berjon, W3C
zcorpan: Simon Pieters, Opera Software
plh: PLH
rubys: Sam Ruby, cochair
FFF: fff
GGG: ggg
HHH: hhh
III: iii
JJJ: jjj
MMM: mmm
NNN: nnn
paulc: we're on #html-wg
... Josh_Soref is scribing, thank you josh
<Santabarbara>
paulc: first item, First Screen
Paint in Advance
... discussed in Web Perf WG on Tuesday
... there's an email on public-html
<zcorpan_> <>
paulc: because proponents would
like to have a remote participant from China
... and we're 15 hours behind China
... i'm proposing to do that at 5pm today
... that's 8am tomorrow morning
... we can't do it tomorrow, since that's Saturday in China
<rubys>
paulc: that's locked
... fair amount of discussion in WebApps on Intentions (2 hours)
... i don't know if anyone here wants to discuss that
... Canvas TF, assume we'd want an update
... Media TF requested Friday morning
... i've stretched that through 1pm
... i've talked about starting at 8:30am tomorrow
... Charter schedule tells us we do HTML5.1 and Canvas 2D level 2
... there was at least a breakout session on After HTML5
... darobin started a discussion on public-html@ probably over a month ago
... chairs suggest doing it first
... i expect we should do it first, and also think about how much time we need for it
<SteveF> +1 to paul on doing first
paulc: i included a link to
outstanding HTML5 bugs
... 288 of them
... that's just searching bugzilla for the component
... and it isn't obvious to me that that simple search is even right
... in the press briefings on Monday
... 40,000 emails
... lots of formal objections
... i didn't tell the press about outstanding bugs
... --
... 3 topics on Accessibility
... the first is locked to this morning
... it isn't obvious to me that we'll know how many accessibility people will be here to discuss
... i went to the SVG meeting @9am this morning
... to discuss this first topic after the break
... -- the item about PFWG
... Digital Publishing
... they asked for a slot 4-5pm today
... and we have a DOM4 status update: test failures
... not sure about how long/how much time
... Agenda...
... we're in "Unconference"
<darobin_> darobin has joined #html-wg
paulc: we have a 10:45-11:15
Coffee break -- technically, coffee is over at 11am
... I put our start inside the window,
... first item, Accessibility topics Part 1 (11:15-1am)
... slots 3 and 4 after lunch are open
... Tomorrow
... i've made some modifications already
... I sent Media TF a list of EME bugs
... I've suggested 3 slots for EME
... so many things outstanding
... w/ TAG's input we went from 19 to 26/27 bugs
... and in last two weeks, we've closed only 2
... we need to do MSE CR status/test suite review
... we need to decide
... where to put items
... anyone object to lockdown?
... plh ?
plh: glazou wanted to be around
for HTML5 discussion
... but he's blocked until 11am
... and he's leaving today
... i'm guessing we won't be able to accommodate him
paulc: say we start After HTML5
discussion at 9:30am
... would we need a second block?
plh: probably
paulc: people could discuss over
break/lunch
... and we could do a second slot after lunch, and glazou could come to that
... adrianba, is ben still here?
adrianba: he's left
darobin: without ben, it will be hard
paulc: it's going to be
short
... put that item at 2pm for 15 mins today
... and maybe darobin can find the webapps minutes?
... Canvas TF, maybe 15 mins after that?
rubys: make sense to slice Accessibility slot to cover Canvas ?
paulc: not the first slot
... so add that to the 4-5pm slot today
[ hober spills coffee ]
hober: i'll remain anonymous for now
paulc: 2pm slot this afternoon,
Editing TF
... plh, can we do DOM4 status in <15 mins?
darobin: if we want to discuss bugs, we need more
paulc: what about the 45 mins
darobin: we'd like to do DOM4 tomorrow to have time to run more tests
paulc: ok... look down for
tomorrow
... paulc ddorwin , MarkS , others, can we start 8:30 tomorrow morning?
... everyone put up their hand if they'll be at tomorrow morning
... noon, 1pm, 2pm, 3pm
... 4pm
... that seems to say we can go pretty deep
... but since ddorwin is editor of EME
... and w/ children who want to go out for Halloween
... and people rant about Halloween -- TPAC
... change 09:00 to 8:30
... ddorwin leaves at 1pm
... do lunch until 2pm
... Session 11 - 2pm-3pm
... that can be DOM4
... (test failures)
... start EME bugs Part 1 at 8:30am tomorrow
hober: Ted O Connor, Apple
paulc: ddorwin did you confirm
that acolwell
... move the MSE CR status to 12:30AM-1PM
... and expand Part to 11:00-12:30PM
... 4 hours of EME tomorrow morning
... break for lunch
... come back for DOM4
[ Agenda reloads ]
paulc: move back to Day 1
... I think we can shrink Editing TF to 2pm-2:30pm
... Session 4 should be After HTML5 part 2 2:30-3:30pm
... if Editing TF ends early, we'll segway straight to After HTML5
... what have we missed?
... Canvas2D level 2 -> after html5
... accessibility part one partly covered
... accessibility part 2 isn't covered
... did we know how we were going to cover this?
... SteveF ?
... name computation, access key, captcha ?
... was I overly zealous by adding this to the wiki?
SteveF: I can see, but I have no idea
paulc: since we'll see PF at
11:15am today
... we'll have to ask them what they want to do w/ A11Y-part2
... I know footnotes, roles, validation have to be today
... add A11y-part2 to 30min slot after DOM4 tomorrow
... session 12
... other comments on topics?
... i suspect tantek is interested in After HTML5 on maintenance
hober: AC meeting starts at 11am?
[ yes ]
Travis: did we want to discuss extension specs?
paulc: good point
... Longdesc from A11y
... Canvas if you want to treat it
... EME
... MSE
... i can give you an oral report on longdesc
... right now
travis: any other submissions to
glance over
... we have a wiki of extensions
<rubys>
paulc: move A11y topic to after
Coffee (Session 13)
... and do status rundown of all extension specs tomorrow (session 12 before coffee)
... if a11y people don't want to meet tomorrow
... and we don't have overflow topics
... we might adjourn at coffee tomorrow
[ Refreshes Agenda ]
paulc: we could do URL (webapps)
in Extensions
... other topics?
... ok, i think we have an agenda
paulc: darobin, shall i give you
the floor?
... assume 1/2 the people know what you're talking about
darobin: hey, we finished HTML5, by the way
MikeSmith: Yay
<rubys>
[ Applause ]
darobin: what's next, do we go
home, and sip margaritas
... or do we keep doing some work
... not sure how much detail i should go
... maybe highlights, and then deeper w/ Qs
... rubys suggested "The best way to get the right answer on the Internet is not to ask a question, it's to post the wrong answer."
... if you don't like it and don't speak up, it will become a decision
... it would be wonderful to increase participation
... the people who built the kittens... namely web developers
... we built the technology
... we should meet somewhere
... editors would agree that the way we managed publication of HTML5 was painful
... maybe learn from world of software development
... Nightly version, stabilize
... features
... try to avoid 120,000 lines of code in a single file
... orthoganalize features to make progress independently
... cut spec into smaller parts
... ship them
... focus on the bits
... adopt classic open source process
... pull request
... so people can join in
... not revolution
... try to rationalize
... no vibe of outrage at this point
paulc: some discussion here
... WG would have to come to a decision about what it does
... so, start w/ Qs
... 1. what do we do w/ the 300 outstanding bugs?
darobin: good Q. triage
them
... i suspect quite a few have been fixed, but we haven't closed the bug yet
... figure out which ones can be closed as Errata to HTML5
... small bugs
... maybe a shame to do Errata once we publish REC
... but we have to, it's cycle of life
... last batch, new work, new modules
... for them, push to modules and focus on that
... in some cases highlight what to work on
travis: under previous
process
... editors generated new content
... fixed bugs in our component
... we'd have bugs fixed by whatwg component
... a large portion of our job was to synchronize
... from shared source and push into our branch
... under this after5 plan
... what is the plan/philosophy to keep in sync/not-in-sync
darobin: you're an editor, what do you think?
travis: i'd love to see
... probably not realistic
... i'd love contributors from whatwg to participate in our process
... pull requests
... approved
... short of that, i don't really know
... i know we need to be sensisitive to their desires
... if they're ok w/ pulling relevant content across or not
plh: call a cat a cat
... hixie has said he wanted w3c to stop copying his work
... we agreed for the purpose of shipping html5
... we looked at whatwg as submission to html5 spec
... html5 spec shipped
... what do we do, he wants us to stop copying his work
MarkVickers: i don't have an
answer to that Q
... i think, the idea that this would be modular, able to react to submissions
... is a much better way of going forward
... i think a large document approach is difficult for people to track inside/outside
... DataQ is hard
... it doesn't mean anything, quite arbitrary
... much better if you could look up where it is based on Tests/Implementation
... i think better by
... whatwg
... I think the whatwg doesn't like the current structure
... they did it to keep in sync
... perhaps we should have a joint conversation
rubys: comment on the way i
work
... i don't work well on abstract things
... you mentioned DataQ
... what needs to be addressed in 3, 10, 12, 15 months
... maybe it makes sense to work on small things
... DataQ
... and we look at a resync w/ whatwg in 2-5 years
paulc: darobin, your original
proposal said break up this 1300 page document into
modules
... but as rubys implied, that's fairly abstract
... can we talk about how we'd do that
... rubys took MarkVickers 's suggestion
... all the things we took out of for CR
... "almost there"
... but if we told Editorial staff to break it up into modules, what would you do?
darobin: 2 things
... saner: focus on either things we cut out for CR / moved to 5.1
... or things that need updates
... SteveF's Area mapping
... that would make sense to keep progressing
SteveF: ARIA Roles ...
... i can't remember the number, ARIA native semantic buttons
... map ARIA Roles of abstract mapping tool
... that section
... but there's a number of other sections
... another, the alt= guidance
... in a more general sense, conformance requirements, + authoring advice
... but that covers a lot of the spec in discrete parts
... i don't see how that would be excised out
paulc: ARIA Roles
... containable
... 3rd Guidance, spread through document
... alt= guidance
... TextPP has work that's about to be published as a note
... is that containable?
SteveF: yes, that's containable, in a single section
paulc: the first two are
examples
... modules
... but the third one?
darobin: i don't know about
it...
... we'd have to discuss
... MikeSmith mentioned interleaving authoring conformance might not be a good idea
... perhaps have a separate document
SteveF: i agree
... it's unclear what the best path forward for it is
... but we need to work out that path
Travis: rubys got me thinking a
bit about a more practical route
... thanks rubys
... as i look back over those bugs
... i recall one that jumped out at me
... implement a true tri-state checkbox
... not dual indeterminate
... that sounds like a great thing to be as a module
... hook it up
... then i thought, if you do that w/ bugs
... why not review what's in 5.1
... diff against 5.0
... look at things that are unique
... review, see if they could be moved out as modules
<plh>
Travis: not spend the effort to
rip the document apart
... but work on the parts we want to progress
darobin: i think that makes
sense
... we had a session yesterday as a breakout
... rubys suggested a continuously maintained
... 5.0.1 spec
... that shrinks as things move into modules
... we don't need to cut everything out
... maybe we don't need a new spec for <p/>
... <form>s are a mess
paulc: are they as bad as
<ruby> ?
... scale of 1..<ruby>, how bad are <form>s?
darobin: <form>s are
bad
... most new types are unusable
... developers scream, like <select multiple>
paulc: i wanted to ask
question
... stemming from Travis's Q about linkage to WHATWG
... but link to Qs here
... we have ~300 bugs
... looking at those
... talked about modularization
... where we want to do work/where there is work
... Q-- Hixie said don't copy my work
... what items are different in WHATWG spec
... than 5.0/5.1ED ?
<plh>
paulc: enumerate places where we
could find modules
... what are similar things in WHATWG that Hixie wouldn't want us to copy?
<rubys>
Travis: looking at this document
would help
... canvas-proxy
... move canvas controller to WebWorker
... and drive from off thread
darobin: we have that in 5.1
Travis: but what is in WHATWG
that aren't in 5.1?
... 3 months of work
darobin: mostly bug fixes
paulc: so, bug fixes
... some might correlate w/ 288 bugs we have
... some might not correlate, things that Hixie has already fixed
... Hixie might have done new novel work on things in 5.1 or not
... maybe he moved canvas-proxy on substantially?
... then decide "do we want to work on canvas-proxy, or not?"
Travis: do we grandfather in things in 5.1 as "already copied?"
paulc: something WG has to
decide, valid Q
... specs is like any software engineering project, we have to triage
rubys: we can walk through doc, or after 5
paulc: can you show me in Landscape
plh: click "2."
rubys: first bullet isn't
workitem, second isn't, third isn't, fourth isn't
... fifth is
paulc: "Different ARIA role
constraints"
... but SteveF already mentioned
[ Looser ]
darobin: not a work item
... it's done
paulc: longdesc, we know what's
happening, extension spec
... tables, not a work item
... <main> element
... - not a workitem
darobin: table-border, please let us not work on that
paulc: chairs would agree
... SHOULD on <h..>
darobin: work item
... but...
... a lot of those are authoring document conformance things
... perhaps as a module
paulc: task to put in front of ourselves
<tantek> hello #html-wg - sitting in second U-ring behind rubys
paulc: take this content, have WG decide work on/isn't
rubys: precursor, i think this
list needs an update
... last updated June
... update list, triage list, publish
SteveF: starting to get somewhat of a clearer idea
<darobin> ACTION: Robin to triage new WHATWG updates, HTML bugs, Landscape document in order to list priority content for modules [recorded in]
<trackbot> Created ACTION-249 - Triage new whatwg updates, html bugs, landscape document in order to list priority content for modules [on Robin Berjon - due 2014-11-06].
SteveF: not really
... we have shipped HTML5.0
... we'll work on that
... in Errata
... that just includes non-normative bug fixes?
rubys: everything's open for
discussion
... you could make that as a proposal
SteveF: we've got that document,
do we maintain it
... or let it go?
paulc: i'll answer that (maybe
w3meme)
... Tuesday memed speaking for directory
... now memed for CEO?
... at AC meeting he said how we maintain stuff
... how we do that, it's up to us
SteveF: part of maintenance is to
continue to pull in fixes from whatwg source
... not features. but bug fixes
paulc: rubys can you find the text from Process document?
<tantek> hello #html-wg - sitting in second U-ring behind rubys
timeless: the Process document
has an inconsistent set of topics
... for what updates are
... (Errata)
... there's work for Process 2015/2016
... but you're on an older Process
SteveF: we have 5.0, and
5.1
... we have a plan to ship 5.1 at some point
... why not see 5.1 as maintenance of 5.0
... pull things out of 5.1 as modules
... but continue to keep stuff current in 5.1
... that's currently in there
... but new work independently
darobin: several aspects
... i would not want to work off current 5.1 document
... if we can avoid it
... it has a million things we want to split out as modules
... a million things that will never be implemented
... i think it'd be saner to work from CR branch
... re: what we take in as Errata
... up to whoever does the work, how deep we go
... suggest we not spend too much time on non-normative
... focus on solid bugs
<tantek> +1 on focus on *normative* maintenance
darobin: make Errata for them and
release that
... make job simpler by dropping entire Canvas from source document
... we aren't producing that, Canvas TF doesn't generate from that branch anyway
... and similar
... -- one thing i've been keeping in mind
<tantek> +1 to darobin points about 5.1 has too much in it. Saner to work from CR branch.
darobin: we can no longer merge
from WHATWG/master -- too far away
... but might want to be notified about bug fixes
... various ways to be notified
... we can apply a similar fix
rubys: several people nodded
darobin: editors nodding (maybe falling asleep?)
<tantek> strong agreement with darobin's proposals
MarkVickers: "do not copy whatwg
work" comment concerns me
... i see great opportunity
... but at some point, things have to come together as one spec
... in order to have one web
... it seems we have two specs, and we're splitting the web
... what i saw in what darobin wrote
... is very small modules
... software depo level, each numbered section is a small file
... add a new file for new number representing a new project
... instead saying what we think is 5.1
... and working
... instead have a clock-based
... what things have reached agreed upon threshold
... say 2 implementations
... say "April 1" release
... is those things
... have those things w/ same force of IP commitments
... just more clock driven
... each piece working independently
... some work by whatwg, some by groups in w3c
... but that would imply that they'd come back together as a document
<Zakim> tantek, you wanted to formally propose "maintenance" release should only be bug fixes, and thus a 5.0.1. Anything anyone wants to keep in 5.1 which is new from 5.0 should be split
tantek: Tantek Celik,
Mozilla
... darobin covered what i wanted to say
... very reasonable
... maybe i should go back to AB meeting
... which is simultaneously discussing Errata Process
... apparent size
darobin: Differences or Landscape?
tantek: yes, Landscape
[ Projects Landscape ]
tantek: the more that can be
shrunk by whatever means
... normative differences/purely informative differences
... the better
... look forward to features being added to HTML Spec via Extension
... preferably CC-by
darobin: we can
tantek: i'm expressing my preference
<tantek> given that CC-by is the most liberal option we have
rubys: we got a request to
not-copy
... we have content under CC-0
... people are working out if that makes sense or not
... like people here
... if someone says "we should copy" "we should not copy"
<tantek> obviously I'd rather have CC0 but we're not there yet, and I'm actively working on trying to make that a possibility at the AB level
MarkVickers: i thought i was
making concrete proposal
... if things are in small enough units
... we'd hopefully get to the point where people are two different groups working on checkouts from the same github
... and at some point it would be copied, and brought back in
<SteveF> +1 to tantek on CC0
MarkVickers: you'd have one build at the end
rubys: thanks, you said work together and copy
<tantek> Thank you SteveF - that's useful input for the AB.
rubys: another was work together and point
MarkVickers: work together
... at some point we want to be able to say "this is work recommended by W3C as HTML"
... implementer or using it
... whether you point or not
<SteveF> whatever tantek was referring to :-)
MarkVickers: the user needs the
output
... all documents should be together at one place
... i don't want confusion
<paulc> Paul wants to point to
rubys: thanks
[ Projects TR/html5 ]
paulc: plh and i discussed this
before the meeting
... we have dated version, latest version
... latest version of html
... different from normal recs
... 1) we aren't the only WG working on Extensions to HTML5
... we have EME, MSE, longdesc, ...
... but WebPerf WG is doing extensions
... much of WebApps at API level are Extensions
... one thing we could do
... click on "latest version of html"
... instead of a single document
... take you to a page listing various modules
<plh> -q?
paulc: both from HTML WG and other places
<Cyril> +1, that's what CSS does
paulc: I have a terrible time
speaking of what HTML5 is
... people think it's the Web Platform
darobin: lost battle
... we should admit defeat
paulc: thank you
... maybe HTML could take you to a list of modules, extension specs, whatever you'd want to work to
<glazou> glazou: as I said yesterday, you won’t change journalists on that
paulc: could even point to things
that whatwg were working on that we agreed that we weren't
working on
... maybe the problem is that we don't have a definitive list
... to define what we're working on/what they're working on
... it's an idea that plh and I just talked about
... but maybe plh should speak to this
... maybe it was an insurance policy
plh: 2 years ago, one of the
problems i was facing
... was "what does CSS3 mean?"
... my boss, jeff came in and said
... "i've been talking about CSS3 for a long time, but where is our CSS3 spec?"
... we don't have a CSS3 spec
<tantek> I note that glazou doesn't appear to be in the room. ;)
plh: and CSS WG knows what
they're talking about
... problem is that the web doesn't understand
... If i said "CSS3 doesn't exist", people would look at me and say "what do you mean?"
... HTML, I thought, we'll have the same problem down the road
... i thought if we had a thing
... CSS had a CSS snapshot 2007, 2010
... it didn't really work
... not really interested in publishing a new snapshot
... I did Extensible Web Summit in September
... one of CSS Editors said
... I'd take the HTML spec and modularize
... and every time we updated a module
... i'd
... say "this is the module they should look at"
... that's why i said to darobin
... i don't know what it would look like
... but let's have a link
... and figure out what to put on that page later on
... i don't think it will point you to a W3C REC
... but to a ToC
<paulc> Response to plh:
plh: that tells you "this is what we know about HTML"
paulc: click on link to /TR/
[ Projects /TR/ ]
paulc: this page,
... was done at the last time the /TR/ page was reoganized
... and click on "HTML"
... you get this page
rubys: some relevant, some not as much
paulc: curious how this is
similar/different to what you're proposing
... notice it's just a #frag off /TR/
[ /TR/#tr_HTML ]
plh: different
... i'm proposing a ToC
... some [here] are relevant, some are not
... if the group has one answer/how to have the best answer possible
<tantek> paulc: shows
plh: this group should be the
best answer
... and if someone asks what should it be
paulc: if you click on CSS
... that wasn't the answer to jeff's Q
... this was a reengineering of /TR/
... i tried to keep it up to date, it's a pain
darobin: back to MarkVickers 's
point
... you mentioned collaboration
... and i'm in favor
... but collaboration takes two sides
... we can't say "hey, let's collaborate"
<tantek> would it be useful to comment on evolution of notions of CSS3 -> CSS Module Level 3 -> CSS Module Level 1 ?
darobin: my thinking is
... let's do this right
... if collaboration works, great
... if not, at least, we're doing things the way it should be done
... and maybe people will say "hey, they're doing the right thing"
... "and we should talk"
... hopefully we can remove as much friction as possible
... but it isn't something we can decree by fiat
... small modules, clock-based, i like both
... reluctant to split spec into lots of small modules
... no matter how good it would be in long term
... i'd rather do this organically
... anytime someone wants to work on the spec
... "sure, let me extract it, fork it, submit patches"
... some sections, may never touch
... <p>, <i>, <b>, <div>
[ grimaces ]
[ laughter ]
darobin: some will never be
touched any-time soon
... clock based
... ties into One Web
... another fundamental is One-Test-Suite
... if you have two specs, how do you ...
... but Test-Suite is closer to metal
... informs you how implementers are making progress
... we've been pretty good at managing our test suite
... Test group pretty impressive given its utter lack of resources
... every year, run test suite, whatever passes sufficiently
<tantek> I see glazou running through the room!
darobin: say ~90% of very
complete test suite
... anything passes test, goes to REC
... do every year
<MarkVickers> +1
darobin: instead of multi-year
plans
... and specs that takes years to go to rec
SteveF: ok
... i like modularization
... i hate multiple amounts of boilerplate
... boilerplate **** that i don't want to read
... harder to understand
... using new features of HTML5/5.0
... <details>
... to make spec more usable
... not hugely popular
... an important audience of spec
... is developer audience
... people who use it
... primary audience appears to be browser vendors
... but everyone keeps telling us that they don't look at W3C spec
... if they don't
... (and it's not exactly true, it depends on which bits)
... if that's a separate audience, we should focus on making the spec good for the other audience
... other point
... idea of collaboration
... i don't see any collaboration
... i'd like to have it in the future
... but as long as we continue to work on HTML, i see the possibility is very small
... i'd like to work on it
... i see lots of people
... but we're not very engaging
... there needs to be some engaging
... i've tried many times
... but we need to continue
... we need to work something out
... we can't pretend things are working, because they're not
Cyril: i like the idea of
/TR/html/ that points to modules/extensions
... TT WG is considering the same for TTML
... should be clear what "published versions" means
... because it isn't clear to public what it means
... might be helpful to clarify "latest published, latest version"
rubys: 1) we talked about a new
landing for /TR/html/
... i didn't hear talk about versioning of that
... would we version it?
... last year, this year
... process for updating it?
... does WG come to consensus
... point to stuff outside WG
... 2) darobin, SteveF
... collaboration
... we need to figure out what we want to do
... SteveF pointed out difficulties w/ working w/ whatwg
... I work in IETF
... i'm trying w/ URL
... i'm going where work is
... in theory it's open
... if i can disprove that, it's useful knowledge
... if it's open, we'll learn from that
glazou: Daniel Glazman, Cochair CSS WG
<tantek> publishing snapshots and maintaining that was too hard
glazou: we tried publishing CSS
snapshot page
... via REC track
... was too hard
<tantek> is now maintained semi-manually
glazou: looking at dev.w3.org
wgs
... to help doing that
... there are new publishing tools that whatwg is preparing
... plh mentioned single click to publish
... to publish WD
... in CSSWG we decided to base on WG consensus
... some Editors in the Group wanted to be able to publish at their own discretion
... there's some reluctance in the WG
... we prefer consensus
... discussion, review if needed, then reply
... 2) testsuites mentioned by darobin
... we have 60 docs on the radar in CSS WG
... that's a lot
... it's really good, not everyone is interested in every part
... each implementer is different
... some aren't browser vendors
... there's a batch-processor vendor
... they don't care about animations
... that modularization implies specifilization
... test suites are per spec
... we don't have a single suite
... darobin i don't think what you want is doable because of collisions
... one single light spec about replaced-elements in html
... don't care about collisions
... because otherwise, you'll have ETA of 2032
... it is not feasibile
... 3) fast track process in CSSWG
<tantek> replaced elements and not care about collisions? what about <input type=image> ?
glazou: when we have a module
that does not progress fast enough
... but one or two features in the module are evolving faster than the rest
... w/ consensus of the group, that can be extracted from the document
... fast track that
... progress faster, and get it to the public
... you can say it creates another document, wrong, bad
... but it works really well
... even w/ large number of documents
... we have 30-40 active contributors
... this could help the HTML WG
paulc: time check
... 30 mins for coffee break
... i'll seek PF members from SVG WG
... we'll continue in second slot this afternoon
... maybe darobin we could try to make a scratchpad list of things we talked about doing
... sketch, figure out if we could assign to editorial team/chairs
... rubys "let's get practical"
... Josh_Soref 's notes are pretty good here
... things to do
<tantek> Aside: I'm happy to help provide history, guidance, answer questions about CSS modularization experience, as I'm sure glazou is as well. If you're curious how CSSWG has done modularization, please find either of us and ask us, happy to share publicly. Thank you.
paulc: let's build a plan
here
... even if items aren't double-clickable
... thanks Josh_Soref as usual
[ Applause ]
[ Break until 11:15 am ]
<rubys> zalim, who is on the phone?
paulc: wiki has Part 1
... Joint w/ PF + SVG
... request for 60 mins
... taxonomy for 30-6 mins pref not on thu afternoon
... Part 2
... name computation and the like
janina: we don't have a need for that (drop)
paulc: accesskey improvements
(shane)
... captcha wd update (janina)
janina: no
... drop mine
... not sure about shane
paulc: doesn't surprise me
... so i believe Fri Afternoon for A11y part 2 after Coffee gets dropped
janina: i believe so
paulc: third area
... joint PF w/ DpugID and CSS WG
... we've scheduled that for 4pm this afternoon
janina: we need that
paulc: we've added an update to
that item an update on where the <canvas> TF is
... we were expecting that to be reasonably short
... we wanted the PF / A11y experts to be in the room
... that means we're on topic
... so, now to A11y Part 1
... 11:15am-1pm
... then we break to lunch until two
janina: thank you paulc, and html
wg
... for PF
... our meeting w/ Dig, we'll meet in their space
... i don't know which cities in this hall
... we meet @2pm in their space
... SVG
Rich__: joint TF between SVG and
PF
... i'll be chairing w/ Fred Esch
... we're creating API interop specs
... for HTML and SVG
... and name computation
... going
... moving to map semantics across both languages to A11y service layers
... and create taxonomy better suited for graphics
... A11y/ARIA has <widget>s
... <region>s, <landmark>s
... but we don't have a good way to describe graphics
... it hasn't been given attention in years
... do it right this time
... charts, STEM graphics
... also, Connector spec
... between different objects, a Flow diagram
... doing this for SVG
... also applicable to HTML5 <canvas>
... also developers create drawings w/ CSS+js on HTML
... taxonomy applicable to that area as well
... if UCs that we have for HTML that we haven't addressed, we'd like to hear about them
... also, Connector spec in SVG
... Connector between two objects
... explicitly declared for SVG
... not sure how to do for HTML
... also affects Navigation
... keyboard navigation in HTML tabindex=
... <tab>
... but sometimes you need to give users options of where to go
... we'll explore
... it's largely for SVG
... but how to apply to html
fred: ARIA flowto=
Rich__: <connector> in
html?
... dual purpose
... author gets things for free?
... is that something to look to in HTML?
... in future versions
... or limit to SVG?
... bring up spec/drop link?
katie: Katie Haritos-Shea
... could that be used in context for 3D/navigation?
[ groans ]
Rich__: 3D is around WebGL
... it isn't declarative
... i know Google is using WebGL for maps.google.com
... another exploration area
paulc: lots of words, you need to
give us pointers
... have you started discussing public-html@
Rich__: no, we just started discussing today w/ CSS
paulc: you had a meeting before this meeting
Rich__: Q1. specific semantics to
include in taxonomy that people use in HTML today?
... Q2. create <connector> in HTML?
... or just focus on SVG?
... taking task for HTML
... specs are becoming closer and closer aligned
paulc: to Q1
... for what?
shepazu: Doug Sheppers, W3C, a
Staff Contact for SVG
... i'm a were-- err, no i'm a simple villager
... look at a Bar chart
... axes, legend, bars (indicate values)
... other data visualizations have similar things
... breaking those things to constituent parts
Rich__: ARIA has Grid, Checkbox, Tree
shepazu: checkbox has element
that is checkbox, mark for checkbox, label
... you can describe those in ARIA
... if you make your own checkbox rather than <input type=checkbox>
... similarly, if you make a barchart, you'd be able to identify tick-marks, ranges, in ARIA
... a taxonomy of data visualizations
... SVG can draw anything, but we're talking about a taxonomy
SteveF: comment to
SVG/PF/...
... when we're discussing this stuff
... if this is brought to html wg
... i'd ask this be discussed on public-html@w3.org
... rather than the TF list
... the TF is a subset
... but we want to draw as many experts as possible
<shepazu> Connectors are here... and
SteveF: but we want to draw people to it
janina: HTML A11y TF is not a TF
at play
... this is a new TF between PF+SVG
... if we take all discussion to HTML list
... if that's what you're discussing
SteveF: just use public-html@ not a11y list when you bring things to HTML
Travis: we had a great meeting
now that HTML5 is a REC
... 1. taking a more modular approach
... we welcome these contributions to the HTML family of language
... but we probably wouldn't be in the core document
... HTML's SVG is exclusively in the parser
... the rest of it probably wouldn't have a relation to the document
shepazu: there's another aspect
of SVG/A11y
... larger, how we integrate <SVG> in <HTML>
... you can reference external an external .svg file w/ <img src= >
... <SVG> is like <HTML> but for graphics
... you might have <path>, <circle>, <rect>
... it's markup
... just like <html>
... you can now include it inline in <html>
... right now, <svg> is treated as something very separate
... and <html> in <svg> has to be included in a wrapper called <foreignObject>
... we'd like to see <html> inside <svg> w/ a closer relation
... many people who use HTML and SVG together would like to see that
... SVG is often used w/ D3
<inserted> Data-Driven Documents
paulc: where is that joining defined?
shepazu: sort of defined
... it doesn't cover sizings
... but it needs more definition
paulc: where would that be done?
<Cyril>
shepazu: we have a document
called SVG Integration
... <object>, <iframe>, <img>, css background:()
... i used to have <embed>
... it doesn't have <html:svg>
paulc: scroll up to top
... FPWD from April
... what impact does this have on HTML spec?
shepazu: exclusively talking
about SVG and its context
... we're proposing that it would also cover inline svg
dirk: it doesn't right now
paulc: at that point, it would interact more w/ the current hook
shepazu: the current parser
hook
... we'd like to first class citizen <html>
... rather than have <foreignObject>
... we'd like to have an <html> element in SVG
... which would be an html root
... inside that you could put html content
... good idea? bad idea?
... possibly having <html:circle> merging HTML/SVG
paulc: if you're adding taxonomy
to SVG
... and create more increasing link
... you'll inherit that
shepazu: yes
zcorpan_: Simon, KKW
... bring up a point Travis mentioned
<scribe> ... new attribute/element affects parser
UNKNOWN_SPEAKER: but it only
applies if it has uppercase
... if it's just lowercase, it doesn't affect the parser
shepazu: and we will not use
Uppercase
... we'll lowercase everything from now on
... we swear
[ he's lying ]
[ he's a werwolf ]
richardschwerdtfeger: we have
declarative tabindex
... sharing
... more seemless
... we have <iframe>
shepazu: i don't remember current status
ed: i think we do have that
... we have a topic for SVG WG agenda to discuss that integration
... Eric Dahlstrom, SVG cochair
<gitbot> [13html] 15darobin pushed 2 new commits to 06whatwg: 02
<gitbot> 13html/06whatwg 1409c8c7a 15Ian Hickson: [e] (0) typo in :matches() argument...
<gitbot> 13html/06whatwg 1445d6286 15Robin Berjon: Merge remote branch 'origin/master' into whatwg
richardschwerdtfeger: let's try
to coordinate
... we're doing it for A11y, but...
paulc: i've heard noone answer
"Do we have a taxonomy?"
... i'll say "we don't"
shepazu: we know you don't have
one
... we're wondering if you guys are open to the idea of merging <svg> elements into <html>
paulc: if we did that, we'd inherit that taxonomy
shepazu: taxonomy would be in
ARIA
... you could do taxonomy w/ a barchart using divs/canvas
... flash
... silverlight
richardschwerdtfeger:
taxonomy
... <connector>
... more specific to svg
... it'd be nice to have it as an element in <html>
<Santabarbara>
shepazu: a connector is a thing
that connects two things
... it's a graph
[ Applause ]
shepazu: thank you, i appreciate
that, i'll be here all week
... it says "i am the connection between A and B"
... say you have an org chart/genealogy tree
... each would be a new connector between different elements
paulc: a) you're getting
<rect>/<circle> more intimately into html
... b) you're also offering <connector> to connect a textbox to a list
shepazu: personally i think it's
challenging
... one is visual
... there are ports
... also, when you move shapes around, the connector keeps those things connected
... there's also logical navigation
... there's also an opportunity to describe the nature of the connection
paulc: are there
primitives?
... child?
shepazu: i don't think we should drill into that at this point
paulc: if we said "blow our
minds"
... continue your work on inline-svg
... we'd get connectors for free
... using them with html could be a separate question
shepazu: also a bit on focusable:
richardschwerdtfeger: a number of
discussions in PF
... on tabindex=
janina: another topic
richardschwerdtfeger: we'll run
into this tomorrow
... CSS has flexbox
... changes flow of page
... tabindex doesn't follow that
... not sure if today/now
... big can of worms
paulc: taxonomy for
graphics
... expanded to inline-<svg>
... expanded that to expanding set of objects in svg to include <connector>
... and told us we might be able to use it in HTML
... also event handler
SteveF: wrt
<connector>
... how would it help
... what are UCs for <html>
... from looking at it
... it appears to be mainly accessibility info?
shepazu: no
... if you've seen a meme w/ a flow chart
... anyone would be able to use it
... navigation for sighted people as well
SteveF: advantage of this over
additional attributes?
... rather than adding an element
shepazu: you don't want
title=/label=
... you want it to be in different languages
... connector can have description as a child
... deeper information
SteveF: <div
att=connector>
... a lot easier to add attributes than elements to html
shepazu: yes
... i'm not proposing <connector>s for html
richardschwerdtfeger:
<connector> gives semantic and drawing
... two boxes drawn in html
... and then i can draw the actual connector
SteveF: i thought we were talking about HTML
shepazu: i'd rather you see the proposal + UCs first
cyns: Cynthia Shelly,
Microsoft
... we have connectors in Visio - i worked on them
... they're pretty complex
... they'd be hard to do w/ attributes
paulc: have we done what you
wanted to do?
... some talk of doing work w/o changing html
... sounds like you do things as long as you do it in lowercase, you just do your thing
shepazu: yes
paulc: when would you have a doc for review?
shepazu: 4 months?
[ Nods ]
paulc: WG Draft for review?
shepazu: yes
paulc: chairs make sure we're
aware of document
... helps to identify what parts of document to look at
... or know what you've broken
... think you might break
... ask if other changes are needed
... asking us to just look at a dead cat
... "it's a dead cat"
shepazu: we'll try to avoid felinicide
paulc: -> Agenda
... we've covered graphics/taxonomy
richardschwerdtfeger: we met w/
WebApps earlier in the week
... we're proposing reflected attributes
... roles
... on elements
... getComputedRole()/getComputedLabel()
... when we get to CSS discussion
... CSS injects content into the page
... name computation gets more involved
... for test/tools, we need the computed name/role of object
... we can't depend on the dom any longer
paulc: these are things in the
dom
... which part of WebApps scope is impacted here?
richardschwerdtfeger: we went to
WebApps
... chaals said submit it here
paulc: where in their family of specs would it land
richardschwerdtfeger: it would be on a DOM element
paulc: that's where i was
going
... who owns DOM?
... you'd like additional methods on Elements
richardschwerdtfeger: yes
... not just for HTML, same things for SVG
paulc: best way to handle
this
... when we talk about After HTML5
... we should add a sub-element
... sub-item
... that HTML WG had assigned to it DOM4
... has to clearly define its future for DOM
... chaals gave you a very good answer
... i gave the Indie-UI the same answer
... do the work, we'll figure out where it belongs
... i'm trying to give the same sentiment
richardschwerdtfeger: i wanted to give a headsup
janina: this seemed like the time
<SteveF> Element.getComputedRole() thread on PF list
janina: you've said no in the
past
... maybe things have changed
... we understand you can get an enumeration of
... what's registered for each particular element platform by platform for particular element
... or with a plugin
... i'd like to ask Jon Gunderson to talk about it
jon: Jon Gunderson
janina: is shane in the room (to point to past requests)
jon: useful for a11y, in
evaluation tools
... if someone has assigned a role=widget to an Element
... you expect keyboard/click handlers related to the role
... w/ Testing Tools, we need to look for things related to that node/its parent
... we need a special api for a particular browser
... or if we're on a server w/ HTMLUnit
... we need an extension
... maybe we just want to know "is there a keyup/keydown/mouseevent?"
... "are there mouseevents on this <div>?"
... then "this is something interactive"
... "are you using an ARIA role=?"
... "ARIA role=widget, is there a keyboard handler?"
... for Indie-UI
... "we're seeing key handlers, maybe you should use Indie-UI events"
... problem for me as a developer of an evaluation UI
... i develop specific test cases
... i can't use the DOM to get that event info
... in my unit test, i basically skip anything related to event handlers
... i can't build test pages that automatically test themselves
paulc: so you want a way to enumerate all event handlers?
jon: no, just are there any for a
given type on a given node
... boolean is enough
... i don't know what it will do, just know that it will listen
paulc: anyone in the room receiving/sending side
janina: there was resistance to doing this in a standardized way
<SteveF> Report on event listener investigation
janina: easier to build MITM attacks
paulc: oh, you'd know an element
had a particular event
... possibly a DoS? by using event over and over again
Travis: some event handlers are
known already, onfoo
... what's the difference between that and addEventListener
jongund: rarely are inline events
used
... it's pretty rare that people use onclick= on elements
SteveF: there's an email Shane
did
... on event listener registration
... PF discussion
... background
adrianba: Adrian Bateman,
Microsoft
... a bit confused about specific UC
... this might be helpful for those few times where you have an event handler attached to a specific element
... increasingly, control libraries developed
... event handlers tend to be on different elements
... events captured somewhere else
... seems it'd be hard to discern anything about how interactive an element is based on presence of an event handler
Cyril: not sure if it's
sufficient for you
... you could overload addEventListener
... and setAttribute
... i've done it in an application
paulc: i've seen nods
... have you tried jongund ?
<adrianba> +1 to cyril - we do this for similar purposes
jongund: we have a sidebar in
Firefox
... if you open the sidebar after you've loaded the page, you don't have a chance to overload
... also in a browser, there's no guarantee when your overload gets into the process
... for parent/child relationship
... we do look at all parent elements
... and child elements
... not definitive
... if i see there are mouse handlers, but no roles
... i don't know for sure, but i can probably tell him that you need to look at what you're doing
... maybe add ARIA
... and if you do add them, and i don't see keyboard, i can tell them they still aren't fulfilling ARIA
... people build a page
... they read spec, they add aria role=menu
... they add that all over
... look at aria evaluation
... it doesn't work because there aren't event handlers
... not supporting keyboard/managing focus
... i can use hooks to tell people that they need it
Travis: i have a resistance to a
general purpose feature in the language
... i see it's a valid UC for testing/a11y
... when you want to prod it
... testing at load time is a small portion, if you don't exercise event handlers
... have you thought about asking the Web Driver folks to get it added there?
Josh_Soref: +1
jongund: I haven't looked into
that
... we haven't looked in PF either
paulc: Web Driver is more
recent
... more comprehensive testing than the last time PF/A11y asked for this
... UC is very Test oriented
... and as Travis said, we should figure out how to test these features post pageload
... maybe that's a possible route
cyns: UAAG WG was asking for a
similar feature
... to track events/change input method of them
... MS said it wasn't feasible
... you didn't know if you got all the events
... I think Web Driver would work
... In a11y, we're often trying to change the input method
... i wonder if there's anything we could do to make it feasible
paulc: even if you collect some
of them
... others could come up later
<Zakim> cyns, you wanted to say that UAAG was asking for a similar feature. I gave them feedback that it wasn't feasible to do this because the events could be bound at any time, and
paulc: potentially an infinite
number
... i heard two implicit action items
... a11y should go look at Web Driver
... partial fix for the problem
... i didn't hear anyone speak to old reason
... i'll believe that's still a valid pushback
... maybe less so in testing case as Travis said
... and shepazu took an action item to make sure HTML WG progresses to a particular stage
... and include question in a review request
... include me in the to: field for public-html@ (technical) or public-html-admin@ (non-technical)
... if you send review request with technical review, use the former, if you don't have questions, use the latter list
... shepazu, you're invited to split the request into two
... questions in subject field
... we have another slot this afternoon
... 4pm for notes, footnotes, roles/validation for digital processing
... we have a hard stop at 5pm
... another agenda item, someone calling in from China
janina: that's fine
paulc: cyns, that's the slot you wanted?
cyns: mine was about events
paulc: confirming that we're dropping name computation, access key, captcha
shepazu: we in SVG ... in an
obsolete version of SVG
... we have a focusable= attribute
... this serves the purpose
... most stuff in SVG isn't focusable
... we're thinking of re-adding that for SVG2
... we also have tabindex=
... we want to talk about that relationship
<Cyril>
paulc: i'd recommend you divide
it down to technical topic
... xpost to svg@ +public-html@
zcorpan_: tabindex=
... it's not necessary to have focusable, tabindex=0 means this is focusable
shepazu: we'll have a longer discussion someplace else
<Zakim> timeless, you wanted to note on Process TF is encouraging review requests to identify the areas which would be interesting to reviewers
<Zakim> timeless_2, you wanted to ask shepazu about css for focussable
paulc: recess for lunch
... back at 2pm
[ lunch until 2pm ]
paulc: this item was meant to
give us an update on the joint Editing TF
... not just HTML+WebApps, but lots of other people
... i'm not trying to replay the hours of discussion from earlier in the week
... i think it's important to make the HTML WG aware of that discussion
... after that is a Coffee Break
... and then After HTML5 discussion
... concrete, look at scribbled notes
... 4pm with PF WG and DpugIG + CSS
... also folded Canvas TF report -- probably first
... i may have had a request to do it first
... i haven't confirmed, i just sent an email to China
... it's 5am (China time) now
... planning to do 5:00-5:30pm on WebPerf proposal
... we still don't have anything after Coffee tomorrow
... I'm reordering EME bits
... I had a request about Bug 26332
... currently anchored @ 10am
... and a general pointer to EME bugs on first item
... still talking to TF participants about order
... darobin, under DOM4 test results, i just picked up pointers to documents we attempted to use for CfC and are ready to use for TransReq
... I think that's all the changes
... darobin ?
darobin: editing, contentEditable
are major pains to everyone
... a few months ago we gathered people together
... we set up a TF
... there's a lot to fix, a lot of moving parts
... we tried to split into manageable chunks
... even if we don't solve editing, just improve a part
... it makes life easier for people
... we have several things in parallel
... 1. collaboration w/ Indie-UI -- Intention Events
... instead of having to intercept cmd-z + ctrl-z + ctrl-u (some locale) + shaking phone
... UA does transformation for you
... undo might not be part of the first batch
... text insertion, deletion, newlines, selections
... that's meant to abstract on top of what's going on
Travis: worth noting
... these are actions... Intentions... confused me
... these Intentions come after the classic device-events are fired
... you'd still, if copying/undoing via ctrl-z
... you'd get keydowns, etc
... if after all of that, nothing was done to upset the browser's intention for undo
... it falls at the end of the pipeline
rniwa: re: Intention, clear
aspects of Selection
... there's IE getSelection(), but no spec
... trying to write a small spec to document what's implemented by browser
... some aspects are lacking
... e.g. in github
... caret positioning is underspec'd
... selection at end of previous line/beginning of next line
... if text wraps via soft-wrapping
... you can't tell from DOM if caret is at the end of the line, or after the line break
... or you can't tell if the caret is before/after text direction transitions
... some browsers render the caret in different locations
... knowing where the caret is enables you to position a toolbar correctly
darobin: there's also
caret-direction
... which might influence selection
rniwa: ... in Firefox
darobin: it needs to be interoperable
rniwa: based on UCs
darobin: .contentEditable is
problematic
... = true, you get a huge bags of behaviors
... browser starts handling bold, underline, undo
... first thing you do is stop browser from doing everything
... so we're working on X.contentEditable = "typing"
... when you set that on, you get the events related to editing, but the browser doesn't respond to the events
... this is a primitive people can use to build editors on top of
rniwa: the key point of
X.contentEditable = "typing"
... is that it allows browsers to handle IME / spellcheck
... in some cases, if you have a round of CJK
... and you want to convert the text back to composing state
... you could
... the application specific logic would be handled by the app
darobin: it's more complicated
than IME/spellcheck
... we'll also do compositing
... 'e -> é
... deadkeys, hebrew punctuation
paulc: it's one thing to scribe
puns
... but another to scribe editing instructions into irc
darobin: editing options
... possibility to insert a Shadow DOM with the text before IME/compositing is done
rniwa: one aspect of
Editing
... that i'm not sure of
... is selection, the way to serialize selection
... if you do getSelection().toString()
... you get the plain text of the selected content
... you get .innerText
... which isn't spec'd anywhere
... do we block the spec on this?
glazou: you can also say it's the .textContent
darobin: you don't want
that
... because it gives you hidden text
... Travis has an action item on it
... "text events and keyboard events are *easy*"
rniwa: CSS generated content, i
don't think any browser lets you select individual characters
of a generated run
... i think there's a desire to be able to select it
darobin: i'd like to select
generated content
... i want to get the numbers from generated list
glazou: it'd be impossible for the time being
paulc: seems like this is a
module
... a direction for this TF
... i made that comment during the WebApps meeting
... i'll make the same recommendation to the TF
... probably much easier
darobin: welcome benjamp
... thanks for showing up
... contentEditable makes sense as an HTML module, even if it's a 5 line module
... it could be a good test
... makes for good practice
paulc: darobin, you said, your
preference
... "not rip the spec apart, just to rip the spec apart"
... "just to create modules when we need them"
... maybe that's where it is
darobin: definitely one of the first ones
rniwa: helps that we're a small
group of people
... html-wg has a lot of people
... maybe there are other parts of the spec that people can work on
darobin: i agree
... we started on public-webapps@
... a couple of people contacted me saying 1/2 the content was Editing
... please go to your own list
... and webapps is high traffic
benjamp: you were talking about
X.contentEditable = "typing"
... there's a corollary
... WebKit has X.contentEditable = "plaintext"
... which is actually that
... it's 10 years old
rniwa: "plaintext" is slightly
more complicated than "typing"
... it supports insertion/deletion
darobin: it's a textarea?
rniwa: that's what we internally use to implement it
darobin: when you find out how
browsers work
... you wonder how the web holds together
[ "with crazy glue" ]
paulc: are there minutes from WebApps?
darobin: yes
... i'll find that
<rniwa> Editing minutes from HTML WG:
<rniwa> Editing from WebApps WG meeting
s|Editing minutes from HTML WG:-> "selection, editing and user interactions" from WebApps WG meeting|
<darobin> let's use an Etherpad:
paulc: rubys and darobin went to the AC meeting to discuss this topic
<darobin>
s|-> "HTML Modularisation" slides|
darobin: overall positive
... questions about "how does this interact w/ PP"
... "what was your paper trail"
... no interesting questions
[ Cunningham's Law ]
[ Magic & Innovation ]
rubys: tantek challenged that (Extensible Web Manifesto)
[ Tooling & Agility ]
rubys: rat hole on github
... not actions here
... i characterized as WIP
[ Software Development ]
rubys: some challenged bleeding
is only
... i don't think any wanted only old
... plenty in middle
[ The Unix Philosophy ]
[ Modularisation ]
rubys: perceived as a ding
... two people defended work they did
... XHTML modularization let you picked one of part A and one of part B
... hypothetically, if you split <table> out to a different document
... it wouldn't mean that you can not implement it
paulc: when we did the breakout
on Wednesday
... I encouraged people to look at the Extension spec
... which says you can use HTML5 + others
... I think there were very few people beyond Noah Mendelson
... who raised the concern
... who read that spec
rubys: we made a change
... noah said "you can't say I'm an HTML5 client without being more specific"
... you have to say "conformant to HTML5+longdesc"
... Hixie said you can just say "conformant to HTML5"
... noah was saying you had to specify
... we tried on IP provenance
... we tried twice to say
... currently, someone sends IP to ML
... and it makes it to the spec
... we tried to track
... github does some tracking
... we said we could report various contributors
... tracking when people stop working for employers when ...
... we can't do
... more data is good news
... but it seems to rathole
MikeSmith: that argument doesn't
make sense
... we're there already
... using outside systems won't make it any worse
[ Questions? ]
paulc: darobin, you're the only one w/ an action
action-249?
<trackbot> action-249 -- Robin Berjon to Triage new whatwg updates, html bugs, landscape document in order to list priority content for modules -- due 2014-11-06 -- OPEN
<trackbot>
paulc: hoping to make a more
extensive list
... i know you were busy over lunch
<darobin>
paulc: i don't know if we want to
open up your scratch pad
... DnD was there
... what was the definitive list of things that failed to exit CR?
darobin: date and time related elements
paulc: categorize as "failed CR
items"
... things to polish spec text, polish test suite, polish implementations
... we had a request from Addison and i18n
aphllip: Addison Phillips, chair
of i18n WG
... i brought my cohorts here
... we have a couple of things we proposed in the past
... not a good fit for HTML5
... one was handling TZ values
... for time values on the web
... we have a proposal
... it was created
... it's in HTML.next bug space
<r12a> Locale-based forms in HTML pages
<r12a> HTML5 TimeZone
aphllip: timezone
... calendar
... there's a Blink intent-to-implement
... we have good guidance there
paulc: things we tried to do in 5.0 + moved out, or only got to bug stage
aphllip: things we either didn't
fit in the timeline from early on
... TZ is that
... or things which exist in HTML structure and were considered out-of-scope
paulc: is TZ the only item, or do
you have a collection of items
... how many of wishes do you want?
... and if your third wish is for more wishes...
darobin: that's locale dependent
paulc: no, the number of wishes and when they occur is TZ dependent
aphllip: TZ is concrete
... forms affected by Locales
r12a: Locale varies
... we've identified issues we want to think through more
... possible security problems
aphllip: 3rd wish, we wished our issues list before we came here
[ laughter ]
paulc: generally thinking about
doing
... if we have a subgroup, e.g. Editing TF
... pull it out into a module, then let them do a pull request
... and see their proposed replacement
... wondering if i18n WG would be willing to work like that
... high level Q
... would it suit your workmode?
... suit your direction?
aphllip: i think not
... although we do develop things like that
... we generally have our feedback on what others develop
... TZ is recommendation for an approach to solve a specific set of problems
... w/in the larger context of say, <form>s
darobin: you don't have to do all
the work yourself
... we're not excluding people from outside the group contributing to modules
... we're making a list now
... but this isn't a finalized list
aphllip: we're not shy, not
against helping
... but we come here not understanding how we'd do that yet
paulc: we come unprepared because we don't know what to ask you to do yet
[ mutual confusion ]
paulc: your desires to improve a
part of html5+ would fit in w/ this model
... we might have to find someone to work w/ you
... set UC, Reqs, and go from there
... you provide commentary on that
... I mentioned i18n WG in the wiki
... have i met your needs?
rniwa: one thing, looking at the
list
... Locale based forms + HTML timezone
... it'd be really nice to have concrete user scenarios
... user visits Citibank account from China
... maybe you want to show numbers in Chinese instead of Latin
... helpful to see scenarios
... potential problems you anticipate
... could be really helpful
paulc: is that all the failed items?
darobin: it's all the stuff that got pushed off
paulc: also missing are items
from other groups
... e.g. whatwg
... if we're identifying modules
... we should identify what we're working on
... and what others are working on
darobin: this also includes our worklist
rniwa: if we're modularizing
it
... the newer version of html draft should link to the module
... otherwise, a person reading html5 spec may not realize it's there
paulc: we haven't solved that
problem at all
... but we recognized it
... we're thinking that we might use the extra link in html5 spec
... not current version, but latest version
... /TR/html could become a link of specs defining sum of html
darobin: as we move stuff to
modules
... if things have modules, we'll cut things out of html5 core
... we haven't done it, and we might bump into issues, but we have a reasonably good idea
paulc: did i miss anything?
... any things in whatwg that aren't in 5.1 that aren't in this list?
MikeSmith: yes
... whatwg spec has WebWorkers, WebSockets, WebStorage
<plh> I heard canvasproxy this morning
MikeSmith: but we've already handled that
darobin: who mentioned <hgroup>?
paulc: i gave up months of my
life to <hgroup>
... i want those back
... we need to update the landscape document (from June), then have definitive list -- and provide rationale, difference, additions <- what paulc is looking for.
... i want to start by looking backwards
... then turn 180 degrees and start looking forwards
... get definitive list, publicize it, get people to understand it
... we need an incredible list
... modules we'll work on, modules we think others are working on
darobin: <template> is in
html5
... i think we dropped <input inputmode=>
plh: isn't there a spec in
DAP?
... Hixie has been trying to solve
... one is script-dependencies
... i know Hixie is working on it
... so that, features that might be added to whatwg spec
... it's quite complex to solve
... i don't know where he is at getting to that
... another I see in WGs is ServiceWorker impact
... on the architecture
<darobin>
plh: we might want to think of
impact to whole spec
... if SW is the future of AppCache
... then someone needs to look at that
... another that the WebApps WG is working
... is WebComponents
... they're impacting HTML as well
rniwa: from WebApps, when we
worked on XHR
... there's a refactor for Fetch
... perhaps refactor of spec to have a better model for how HTML and DOM interact
... i think Hixie last year or two years ago added Tasks and MicroTasks
... so MutationObserver could work w/ those timings
... so things could be coherent
... Model changes could be important
plh: when we shipped HTML5, there
are dark corners
... one is the Window object
... i'm not sure we want to take on that dragon
... since we're fixing HTML5 spec
rubys: another category, things no one is working on but should be
paulc: dark corner
... speced to a level that can be tested
... show certain amount of interop
... but multiple implementations do things that aren't in the spec/aren't tested
plh: yes
... or seeing only one or two do, and two others aren't doing it
... and no convergence in sight
Travis: referring to WebIDL, or things like .name, etc.?
rubys: I remember a specific
one
... it's true every browser loads a document
[ laughter ]
rubys: spec says how you should
do that
... but browsers don't do that
... there are observable differences
... i see heads nodding
paulc: Travis said don't take the
bait
... simon's saying the same thing
... We have this list
... darobin made a suggestion this moring
... we shouldn't just take a butcher knife/cleaver to the spec and break it up
... but maybe disciplined
darobin: i'd never use disciplined
paulc: ok, ondemand
... SteveF suggested having a particular area to work on
... so we should show how we'd go about doing this
... start small
... set success bar low, overachieve
... find out what works/doesn't
... do one/two
... ask the question, how do we do maintenance on that section
... tantek_ made a strong point
... minor release of 5.0 w/ just errata
... think about that while doing new work in some of these areas
... ask some group of people, possibly editors to put together a concrete plan
... hesitant to say plan
... what are the next steps?
darobin: i'd like the next steps
to be get to work and write specs
... need for higher level visibility, it ought to come from triage action
... things we could work on/open sores
... rather than planning, i'd rather do work writing spec text + publishing
... i heard SteveF would like to get to work
... lacking visibility prevented that
paulc: the only part that
concerns me is a Q that SteveF asked this morning
... darobin you said, if you were to start new work, you'd rather do it off CR branch?
darobin: no, i'd rather do that for maintenance
paulc: i'm asking for a
plan
... your action was to triage those 288 bugs
... landscape document will help
... some will involve cloning
... i believe we need to give the consortium members a plan on maintenance
... and how we're doing After HTML5
... i don't believe one of the editors w/ a favorite topic here can get started w/o part of the story written
darobin: i'm not sure if we'll
keep master(5.1) alive at all
... we might not
... i need to think about it
... i haven't thought about it at all
... if we only do new modules in separate documents
... and only do maintenance on CR branch (which should be renamed)
paulc: i want that written down
darobin: i think we can do them in parallel
paulc: you can do them for some
people
... but for other people
... all editors have a high pain threshold
... you want a bit of experimentation
... but we want to show progress
... bottom line is writing spec text
... if we want other people to do this, they have to understand the system
SteveF: WAI-ARIA section
... Hixie has said in the past, and quite recently
... said if someone were to take that, and turn it into a module
<gitbot> [13html] 15darobin pushed 1 new commit to 06CR: 02
<gitbot> 13html/06CR 141df5ac6 15Robin Berjon: stray inputmode
SteveF: he'd be happy to point to
it
... he did ask me
... i'm not sure if he'd be happy w/ it being in W3C
paulc: SteveF, really good characteristic, let's find out
SteveF: MikeSmith , you've seen the expressed sentiment
MikeSmith: no, we've talked about
it
... whatwg is a do-ocracy
... and if you volunteer it, then that's ok
SteveF: and that's one of the sections where people look to W3C
zcorpan: what you described is
something that has happened on a few occasions
... there are several parts that were in html5, and someone took over it
... and in several cases it moved to w3c
... one is DOM Parsing and Serialization, Travis is editing it
... when it became clear that W3C version is better maintained
... WHATWG redirected their url to w3c url
... there's precedent to being happy to move stuff to w3c
SteveF: seems like something
we're going to do anyway
... Hixie will point to it
<darobin> now redirects to W3C DOM-TS
paulc: other examples of it
... Hixie pointed to zcorpan for the <img> element
zcorpan: also, WebSocket Protocol
and WebVTT
... lots of other things
paulc: looking squarely in the
eye of darobin here
... do you have direction
darobin: i can come back in a year and a half
paulc: when will you convene the editors
rubys: same question to SteveF
paulc: when do we see progress
rubys: SteveF , do you have enough direction
SteveF: yes
... some advice on splitting out
rubys: ok, but you're not gated on us?
SteveF: partially, if i ensure, if i pull it out, that it won't be consumed (absorbed, taken over) by someone else
paulc: thank you to our i18n friends
[ Applause ]
paulc: if darobin has enough
data
... we've spent 2 hours on this topic, that's enough for now
... we'll reconvene at 4pm w/ PF WG
<darobin> edoyle, Travis, hober, SteveF: I'd like to take a pic of the editors together after the meeting :)
paulc: i still haven't received confirmation about 5pm slot
[ Coffee Break until 4pm ]
<rubys>
<darobin_> darobin has joined #html-wg
tzviya: Tzviya Siegman
dcramer: David Cramer, Hachette Livre
paulc: two topics PFWG wanted to
talk about, overlapped w/ DpubIG and CSS
... support for notes/footnotes
... roles/validation
... and since Canvas TF is a11y related
... i'm going to overrule my original decision
... we'll do Canvas last
janina: PF is mushrooming
... we're thrilled to be working w/ DpubIG on enhancing access to books
... making that accessible
... desire of DpubIG is to leverage HTML5 to do this
... it doesn't quite meet their requirements
... a lot of our discussion just concluded was on what doesn't meet this
... wanted to share our approach w/ HTML WG
... 1. semantic markup
... need to know what's what when you publish a book
... what's a chapter, subsection
... might function like a chapter
... but it might be another word
... Dante's Inferno uses Canto's -- like chapters
... PF as gatekeeper
... community extensible vocabulary, PF manages to avoid collisions of definitions
... roles will help identify what's what
... and help assistive technology present it appropriately
... ARIA needs to change slightly, but not much
... footnotes we do need better support from HTML
... footnotes is best as an example of what's missing
... not the only thing that's missing
... #frag isn't enough
... want to know where it starts, and where it ends
... <p>...</p> don't have for footnotes
... what kinds these structures
... don't treat it as the full object
... hard to know where to end
... additional problems
... you came from somewhere, something referenced it
... you need to go back to where you came from
... but you could come from many places
... you want to go back to the right place
... i'd be remiss if i didn't touch on
... we had a Director's decision about a Formal Objection on longdesc=
... Dpub needs that, but it isn't enough
... different kinds of media
... braille + graphic + texted description as targets
... may be need for different description for image for different audiences
... want to work with them
... everyone who hates longdesc=, or those who like it
... help us build a better mousetrap
... for kids in schools, and professionals
... to be fairly tested on their knowledge, not lack of sensory ability
... what did i miss Tzviya?
Tzviya: vocabulary for role,
would cover how long
... if i link to footnote
... we don't have a method to get back to the content
<Zakim> dauwhe_, you wanted to discuss Tzviya
Tzviya: it's really crappy to
navigate through an eBook right now
... we see sexy manipulation, footnote pops up
... but for sighted readers,
... if i turn the page, it might not be there
... if i want to cite it, it's not there
... if i want to print it
... it's not there
... we need some method for maintaining these
... linking them
... maintaining a functional body
... one group exploring this is Annotations WG
... maybe
janina: how to build a better
footnote
... how to treat that object in a publication
... we'll identify the structures that need it
paulc: you want the equivalent of the back button?
jfolio: increasingly complex if
you have 3 refs to the same footnote in the document
... on the second instance, you jump down and read the footnote
... the requirement is to go back to the same resource that sent you
... there's memory capture
paulc: that's what the back
reference does
... 3 refs to IBM quarterly results
... i can click on one of them, go to the content, and click back
darobin: if i click back twice
accidentally, i've lost my place
... and yay footnotes
paulc: are people hypothesizing a <footnote> ?
[ No ]
rniwa: i think the back button
not working seems like an Implementation issue
... more than a spec bug
... is back() spec'd ?
zcorpan: the behavior of the Back
button depends on the
... navigation part of the spec
... which is a mess
darobin: in ebook navigation
context, you might not be exactly in the same context as in the
browser
... if you go from a footnote, and hit back twice, you might exit the book
Josh_Soref: that case, it will probably be better, since the book should remember the last place you were in
darobin: you might want to know where the footnote came from for something
dauwhe_: i've been working on
print style footnotes in html+css
... people will code footnote at point of reference
... renderings involve moving that content to somewhere else in the document
... bottom of page, floated to margin as a marginal note
... sometimes we want to put something where it was
... larger problem
... if you float it, you might want a marker at point of origin
... might be able to use to create this
Tzivya: we have that need in many places
paulc: we've spent 4 hours today telling people who come to us to do it on their own
[ laughter ]
mhakkinen: Mark Hakkinen,
Educational Testing Service (ETS)
... footnote
... we have test items, delivered in HTML
... reading task items
... going back and forth
... "in the following sentence"
... you want to go back / forth in the sentence
... we don't want to hard code
... really hard code
... hard to code for assistive technologies
rniwa: ebook reader
<MikeSmith> dauwhe_ is Dave Cramer
rniwa: if they have a special UI
to get out of a book, that's outside the realm of html wg
... i have a hard time of reconciling that
... if the UC is inside the page
... if it's involving iBook content
... not really a web app per se
darobin: we need UCs
... to be pretty clear
... paulc said you'd be on your own
... obviously we'd be helping
... value: bring UCs
... explaining what the problem is
... what can't be solved w/ existing technologies
... with code examples
... we might come back w/ you could use this
rniwa: we also need to figure out
which part of those problems that can be solved w/in HTML
WG
... maybe some in other WGs, maybe government regulations
darobin: it might always be HTML, some may be CSS,
Tzivya: we came here to talk
about ARIA
... the only ask of HTML is Validation of Role
... work is to provide information to PF
... i have time
janina: as long as you're ok w/ using role= as a model
darobin: if we start adding too
many roles
... are there cases where you expect someone to want two roles?
Tzivya: no
... that's our task to prevent
janina: that's why we want a gatekeeper for role=s
paulc: you're the 3rd/4th WG that came in here, that i said the same thing
MarkS: Mark Sadecki
... majority of recent work was a11y focussed
... a lot of work was Canvas subgroup, of HTML/a11y TF
... now it's Canvas TF under HTML
... public-canvas-api@
... we have Canvas Level 2 in CR
... currently writing tests
... identified 24 testable statements -- tests written for all but 3
... we need to use an a11y inspector for some conditions
... joanie diggs from igalia, contributor webkit gtk thinks we can automate it
... there's one where we need to get a bug fixed in chrome
... two may prevent us from exiting CR
... 2 changes to the spec, one is purely editorial
... one is an oddity, support in 2 browsers
... records of talking about this feature in our minutes
... actions to add this to the spec
... we looked into adding it to the spec
... but it isn't in the spec @CR
... we'll have to add that back to the spec
... we recently lost our editor from MS
... all editors are currently not actively editing
... i've talked to Rik Cabanier to pick up editing
... question to you, do we have to go back to LC?
rubys: if it's substantive
MarkS: yes
... then we'll have to go back
plh: you can go to LC, or switch
to new Process
... and go to CR
paulc: summarize new process
plh: a lot easier to go to REC w/ new process
<cabanier> I thought we can stay in CR
plh: the new Process would let you update in CR, still need Director approval
paulc: doesn't the 90 day IP LC period still apply?
plh: maybe
paulc: new Process, if you're in
CR, you can cycle in CR
... old Process, you were in CR, leave CR back to LC, then back to CR
... sometimes people would skip CR
... nowhere on the Agenda was whether we should switch to the new Process
plh: the Process applies on a per
spec basis
... do whatever is simplest
hober: at the last CSS F2F (Sofia), we agreed to move to the new Process at publication time
paulc: their interpretation was
one decision
... as soon as they republish a document, it's published under the new Process
... reality, we have a C&P/Delete error, it impacts implementations, and needs to be fixed
... when will it be fixed?
MarkS: next week
... and we have support in implementations
janina: test results, just not spec language
<paulc>
paulc: model criteria for HTML
WG
... apply to all our documents
Implementation.
paulc: do your implementations pass this bar?
MarkS: i believe so
... hit region, drawfocus:ifneeded,
... Firefox Nightly, Chrome Canary, WebKit
paulc: i wanted to make sure i
ran this by you
... other questions of Canvas TF?
[ Silence ]
<MarkS> s/Sadocky/Sadecki/G
<MarkS> s/Rick Am/Rik Cabanier
plh: the motivation for the new
process
... was to resolve the case
... you're making a change to a CR
... you have to go all--the-way back to LC
... wait a while
... and then to CR
... we did that for HTML5 this year, despite the fact that we were in CR
... the AB decided to make it more agile
... we allow the group to update their CR
... just require Director approval
... additionally, the new process recognized that LC wasn't the best vehicle to do large review of documents
... wanted to give WG a more flexible way to do Wide-Review
... you have a WD
... you iterate
... then you go to CR
... then iterate
... once you're done, you go to PR
... don't be fooled -- thinking that you don't need review
... process says you need to demonstrate wide-review before CR
... there was a discussion yesterday
... and there's a wikipage
... if you make a substantive change in CR
... the Director will ask if you have wide-review for the change
... wide-review will depend on the change
... if it was a change of a function name,
<adrianba> TPAC break-out on wide review
plh: it will be if you got review
from implementers
... from Patent Policy
... it changes LC to CR
... what does it mean if we make a change in CR and publish
... the answer is you trigger a 60 day period for IP
... if you go to Director asking to go to PR
... he'll want to wait for it to close
... when do you change Process
... it can be per-spec
... but CSS decided, for each publication, when they publish, they'll switch
... that's it
rubys: i interpreted it as an explicit endorsement
hober: that's correct
rubys: and i heard it as not saying there's a step back
paulc: the most common way of
answering a Q in TR ->CR/ ->PR
... is to ask "did you get wide-review"
... is to answer with the link for bugzilla for LC
... that's what we did for HTML5
... that's what we did for Pre-LC and LC
... what plh is saying you still have to be able to demonstrate wide-review
rubys: we still put in the bugzilla link
paulc: the bugzilla link is to
all bugs since you started the document
... i've not heard any mention of LC
... was LC wasn't required, many people were doing testing/review while they did spec work
... why should they do WD/testing,
... then you go to a public CR for implementations
... going to CR is an onus on Chairs to prove to the Directors that you have more implementations
rubys: i've heard no downsides
paulc: when i Chaired XML-Query
WG
... a family of specs rivaling size of HTML5
... i couldn't reach LC
... because people wouldn't review the document as a WD
... until it got into LC
... so i had to do multiple LCs
... XQuery had 4 LCs
... the last had 120 comments
... the only w/ more was the Patent Policy itself
... having a stage saying it's functionally complete
... we want your comments on it before we do a call for implementation
rubys: does the new process get rid of LC
plh: you could "say it's a
LC"
... but you can't call it W3 LC
rubys: it gets rid of the step
paulc: you move "LC" out of the
Title, into the document
... you can always express your intent
... whether people understand that is open for judgement
fantasai: Elika J. Etemad
<inserted> Purpose of removing LC is to allow WG to break down review requests in more appropriate ways and help to solicit reviews earlier in the process (by not having LC be a fixed point in process where everyone comments)
fantasai: XYZ, different sets of features
s
scribe: we're done w/ the
api
... we're done w/ algorithm
... i'm hoping we're doing better w/ the spec tamplates, particularly reducing boilerplate in status section
... so we can communicate better the status of the document, expected timelines, and what kinds of reviews are solicited
... mostly in the head
... to help you communicate what you're looking for in your reviews
... want WGs to experiment with WD process that works for you, not just one-size-fits-all LC process
rubys: i understand what paulc
was saying
... i'll suggest that's a different problem than Canvas
... sounds like it's worth evaluating for Canvas
paulc: hypothetical
... i think i've convinced myself i'm neutral on this
... say we develop 10-15 modules
... and decide we need to publish a consolidated document
... would we want to give the community a chance to see that as a LC rather than as CR
... or do we feel confident today that we can choose how to handle the fact
... CSS can make a blanket decision that they'll say small
hober: small is not an attitude i've heard of CSS
paulc: you'll never do a union of
CSS level 4 specs
... i'd opt to do it on a per spec basis
... it doesn't hurt us on a per spec basis
... as soon as we've made the decision a couple of times
... and have some experience
... the WG will tell us
plh: you have 2 years
... after 2 years, you'll be forced to the new Process
Josh_Soref: which new Process
plh: 2014
paulc: when we recharter, or a specific date?
plh: i believe it's 2 years after approval of Process-2014
paulc: if they've given us two
years, let's try it for Canvas
... put a CfC in front of WG for Canvas, and see what happens
<jcraig> ?
fantasai: we're also asking for feedback on the new spec template for all WGs
paulc: fantasai please send a request to public-html-admin@
s//
<Santabarbara>
paulc: there's been active
discussion in the last 24 hours on the topic
... i need someone to introduce the topic
... Context: Baidu made a member submission
... at WebPerf WG meeting Mon/Tue
... feedback to them was let's understand your UC, and talk to HTML WG
<myakura>
<rubys>
rniwa: i was an observer in that
WG
... in most major browsers
... we have this behavior where
... if you have any pending stylesheets
... we'll block painting of the page
... until a timer fires, or all stylesheets load
... problem w/ their website, is they want to draw critical part of websites ASAP
... say page is 200k
... loads 4 50k stylesheets
... some aren't critical content
... say parts visible in phone
... we still block until those stylesheets are loaded
... we don't know if they have rules that apply to the top of the page
Travis: unstyled, or semi-styled content
rniwa: Amazon, you have product
description
... then related products
... then comments
<MikeSmith> FOUOSSC!
paulc: and if you're going to
that page to just see the product price
... and you're hoping price is near top of page
... I'll be really careful to ensure people use Q and mic
[ angel asks if Baidu is on irc ]
rniwa: they want to provide
critical parts of the page that's immediately rendered
... and have the browser paint those parts
... w/o having to manually load the stylesheets via script
... you can work around this behavior
... but it's a big hassle
... have to do that on every single page
Travis: based on rniwa
... this sounds like defer'd styles, like defer'd scripts
... rniwa is nodding his head
paulc: something that already
exists
... or <style defer> as an analog to <script defer>
rniwa: it's very similar to <script defer>/<script async>
<MikeSmith> timeless, Baidu_AC_rep is Yue Min
rniwa: but we also need the
ability to block the painting of parts
... we don't want to paint related products while the stylesheets are still loading
... baidu wants to add a hint that it blocks painting of content after
<script> ...</script> <node>
<node> isn't inserted until after <script> is parsed
Travis: still trying to
understand
... you have a dependency graph between <stylesheets> and subtrees in the DOM
... and you wan to tell the subtree that it depends on the stylesheet before it paints
zcorpan: currently the spec allows the <style> element if it has scoped=
Travis: in <body>
zcorpan: i don't know what the
behavior is
... in theory you could put critical content
... and then have a <div> w/ <style scoped=> @import () </style> </div>
... not necessarily the best
darobin: a bit of a hack
paulc: zcorpan proposed a
solution
... people nodding their heads, moving their shoulders
... yeah maybe
... worth investigating
... zcorpan is nodding
zcorpan: another point
... when you have <style> ... </style>
... it means you have to revaluate the earlier document
... bad for perf, can cause repainting
rniwa: I think zcorpan 's
proposal would be workable
... if everyone implemented it
... i think that solution is better wrt not reevaluating elements outside of that
... the solution in WebPerf has a drawback
... even if the author meant not to affect elements above <style> elements
<MikeSmith> Browser support for style[scoped]
rniwa: if we did <style scoped=> we have a problem
<jcraig>
rniwa: in that Blink and WebKit removed <style scoped=>
<MikeSmith> yes, Firefox is the only browser that supports style[scoped]
rniwa: that's the one
drawback
... if we use the <link rel=xxx> it would work for everyone
zcorpan: it's not a blocking
problem if the scoped= attribute isn't implemented yet
... if the behavior is what we want
... then it should work ok w/, w/o scoped=
... even if it gets implemented later
... you said my proposal would be acceptable if scoped= was implemented
... i don't see why it needs to be implemented
... the important part is what the behavior is
... right?
paulc: i thought you said you
could do this w/ <style scoped=>
... we're hearing that's not widely implemented
... is that not what you said
... please clarify
rniwa: i'm a bit confused
... it sounds like your solution does include <style scoped=>
zcorpan: the proposed spec change
is not changing UA requirements
... it's changing authoring requirements
... this is in theory already possible w/ today's authoring requirements in the spec
... assuming the <style> element has the behavior you want in existing browsers
[ rniwa nods ]
Ping_Wu: i'd like to give some
background introduction for this proposal
... we're the Baidu mobile browser team
... from experience
... by judging the first screen
... displaying th
... if this content can be shown quickly
... then user will think browser is very fast
... and will spend time reading
... and we propose this tag in the <head> tag
... it's not about layout speed
... it's first content speed
... this UX optimization
... may have some effect to overall loading page speed
... we think it isn't very important to UX
... that's the background to this proposal
... some colleagues from WebPerf introduced this
... critical-section
... we want to emphasize
... it's "above-the-fold" first screen
... in the first edition of this proposal
... we wanted to make the develop
... give a link
... a <div> w/ first screen paint
... but it may have some
... due to different devices/orientation
... this kind of solution may be hard
... also browsers can judge whether their layout size has reached this critical part
... at the same time
... some colleagues have mentioned that
... in the paint phase
... we're waiting for CSS/JS resources
... no matter if these are blocking or not
... we will try to wait until the first paint
... we will try to change the original browser implementation
... pass-layout-parse-layout
... until we detect that we've reached the full screen
... of first paint
<jamesx> should be parse - layout - parse - layout
Ping_Wu: before the first paint,
we wait for downloading/non-blocking css
... background and implementation and introduction
<jcraig> s/pass-layout-parse-layout/parse-layout-parse-layout/
s|s/pass-layout-pass-layout/parse-layout-parse-layout/||
[ Project First Screen Paint in Advance ]
rniwa: first, we wait for
stylesheets to load
... also have a timer
... basically a switch to turn this off
... i don't want to repeat the conversation from WebPerf
... so i'll be brief
... we talked to people in Perf group
... if we gave that switch to web developers
... we'll spend a lot of cpu time repainting content
paulc: until timer goes out or stylesheets load
rniwa: right
... terrible
... this is why WebPerf suggested link element
... and letting browser paint content above it
jgraham: to clarify
... before you (rniwa) were talking about arbitrary subtrees
... but w/ <link> you're talking about a specific point in the source
... but which is the requirement
... independent subtrees
... or just this much source to here?
rniwa: i don't know
... in terms of REQs and UCs
... people in other browsers said per sub tree is very hard
... binary bit is easier
paulc: member submission implies
above the fold
... not multiple subtrees
rniwa: right
jgraham: that's fine, it sounds like it's a different solution to zcorpan 's previous discussion
<MikeSmith> the problem / use-case is what paul described
jgraham: sounds like it'd be
useful to have clear understanding of UCs
... slightly concerned w/ how to know where the fold is
Travis: +1 to that
... putting a marker in HTML source code has little/no bearing at all on where that content will be positioned
... UA.css, user.css, page css
... hard to identified the fold
... w/o knowing the UCs
... on/off for painting, maybe it could work
... seems tricky
jgraham: seems like it'll work well on specific screen sizes, and like rubbish elsewhere
rniwa: the reason we came up w/
this solution is MS mentioned Amazon already does this
... send first part
... then later fetches the rest of the content
... first paint, fetch, second paint
paulc: so they've adapted their
page construction to the way browsers work
... if browsers change
... they have a this-is-where-the-fold should be
jgraham: i think facebook is
similar
... i remember reading a blog post
... i imagine they download the initial stuff
... paint that
... download and start inserting the gaps
... could be anywhere
paulc: angel, ask them if they
have other questions
... sounds like feedback was that <meta> wasn't very useful
... maybe using a <link rel=> element
... sounds like we really want a clear understanding of the UC
... to make sure we don't end up solving something that isn't exactly what baidu wants
[ nods ]
paulc: as cochair
... having more and more dialog about the UCs
... is the best first step here
... things should be measured against specific UC
... first reaction was you could end up repainting the page over and over again
<Zakim> MikeSmith, you wanted to comment
MikeSmith: as far as i
understand
... the problem case
... it's simply about the initial page load
... not anything beyond that
... first view-port chunk
... to make that load
... faster
... to have the user experience "page" load faster
paulc: people measure effectiveness of your mobile browser of how your first viewport is painted, the Business case?
MikeSmith: the problem you want
to solve
... if people aren't going to your site, browser doesn't show your content, people give up/go away
... point to make here
... effect of this on HTML spec
... don't have to define the behavior
... i think it could be done in WebPerf
... for HTML WG, we could
... have some discussion about the right markup
... but in the end, probably
... say we go w/ this <link rel=...>
... <link rel=firstpaint>
... we make a minor change to specification for link element
... say that it could appear anywhere in the document
... right now, we say it has to be in the <head>
... microdata says it can be in the body
... RDFa says it can be in the body
... that's all we'd have to do in the HTML spec
zcorpan: rel=firstpaint wouldn't
have a good backcompat story
... rel=stylesheet would
... if we think scoped= stylesheets is what we want to restrict authors to doing
... then we could add scoped= to linked
plh: the UC is all about above-the-fold
<hober> <link rel=stylesheet scoped href=...>
plh: how long it takes for the
user to see something
... browsers have techniques to avoid flash
... browsers want to paint as fast, but not flash
... different techniques
... iirc IE if you wait 200ms and cpu doesn't do anything, it starts painting
... another is to put </html>
... when the browser sees that, it starts painting
... and continues parsing
... this is all ugly, can we find something else that allows you to do that
... <link rel=stylesheet> works in some browser already
... not specified, but it works
<Zakim> timeless, you wanted to ask if we couldn't survey Amazon and Facebook (and Gmail/Gmaps) about this
paulc: seems like a good question
jgraham: yes
... there's work going on for a script dependency for html
... Hixie 's working on it w/ TC39
... seems related script-loading/style-loading
... perhaps we shouldn't punt off to WebPerf
<darobin> for reference:
jgraham: it should be like other things in the platform
Wu_Ping: some people have
mentioned we have wasted a lot of time
... we've only
... when we reach layout to the full screensize, we ...
... people have mentioned
... to avoid flash
... let's BBB
... correct
... this way, we may not correct result
<Zefa_> s/WWW/Wu Ping
Wu_Ping: during parsing
... 400,000
... tokens
... we may still see incorrect results
... we want a way for developers to direct to the browser
... if you have many dynamic resources
... first-screen-content
... you may tell the browser you don't want this optimization
... also mentioned Facebook may have similar techniques
... i don't know if i remember correctly
... sending first page content first
... this kind of thing could help
... but it requires a reorganization of the page
... in the optimization case, the browser can do it itself
... we also have UCs, like Data and Snapshot of high-speed-camera
... which captures displaying video of firstscreen content
... optimization can tell painting time from 2000ms to 1000ms
... most mobile site pages can now be restricted to 1s
... under this kind of optimization
paulc: we had a discussion in
WebPerf
... we've exposed the problem to people around the table here
... heard some solutions
... maybe not all discussed in WebPerf/whatwg
... maybe what we require is a super-general solution
... relation of html page to script
... i don't know what to tell Baidu about where the next discussion
... by default, it's going on in WebPerf
... plh, you're the staff contact for WebPerf?
plh: yes
paulc: i'll put the ball in your
court
... we have a UC, maybe it needs to be described in more detail
... maybe discuss isolated, or very powerful solution
... maybe some of us here, could put it on in WebPerf, i think the thread is copied to whatwg
... then that's where the discussion should continue
plh: i think there's an action in
WebPerf
... we'll discuss how to move forward
rniwa: paulc's/jgraham's points
on UCs
... their UCs are tied to their solution
... i think we need User Scenarios
... maybe we need UCs from other vendors
... Facebook/Gmail/Amazon/...
... and work forward in Web Perf
paulc: 5:45pm; we meet again
tomorrow morning @ 8:30am
... to meet on EME
... I predict we'll adjourn at Coffee in the afternoon
... i think that's a pretty strong indication from the agenda
... thanks everyone
<trackbot> Meeting: HTML Weekly Teleconference
<trackbot> Date: 31 October 2014
<paulc> EME outstanding bugs:
paulc: good morning darobin
paulc: i'll carry the mic around
the room
... and we'll introduce new faces
adrianba: adrian bateman, microsoft
paulc: paul cotton, cochair
rubys: Sam Ruby, cochair
joesteele: Joe Steele, Adobe
jdsmith: aaa
MikeSmith: Mike Smith, W3C
[ Scribe did not transcribe the room, sorry ]
paulc: it'd help if people marked themselves as present
<rubys>
BobLund: this is Bob Lund, from Cable Labs
paulc: please be aggressive in
q+'ing
... Morning is for Media TF
... this morning, i broke it up into three parts
... i suggest we attack ~25 open bugs
... i had a request from MarkVickers to time-anchor the discussion for bug-26332
... MarkVickers, you said you'd have someone call in for that
MarkVickers: correct, he may call in earlier, but i said then to him
paulc: Coffee break
10:30-11
... 12:30, acolwell will call in on MSE
... Lunch 1-2:00pm
... then darobin will give us an update on DOM4
... link is for test results
... we had a CfC to get to PR, and got a formal objection
... we're working on interop
... expected last session is to trawl through the Extension specs 3-3:30
... and yesterday, i predicted we'd break at Coffee
... a shown of hands yesterday showed one of the principle people we are losing is ddorwin at 1pm
... thus Media before 1pm
<paulc> EME bugs:
<paulc> EME bugs:
paulc: i sent an email on Oct
19
... each of the lines in this list is from Oct 19
... 10 days later, I updated the status
... no-action may no longer be correct
... if someone did something after i sent this out
... my proposal is
... these are the outstanding bugs up to ... 19
... then there is a series of bugs filed after Oct 14
... then another range 24..29 filed after my Oct 19 email
... suggest we start at the top
... obviously, because of the time element, if we get to that one, i'll skip it
... we have 1 1/2, 1, 1 1/2
... 200-300 mins, 30 bugs, ~7 mins/bug
... some prep CR/LC, we'll skip
... some are more recent which we want to get to since we've never had substantial discussion
... i'll try to go broad rather than deep
... anyone w/ other suggestions?
[ None ]
paulc: because we have BobLund on
the phone, we'll pass the mic around
... please use the q
ddorwin: we have TAG reps here
paulc: how long are TAG reps here for?
plinss: here to 11am
slightlyoff: same constraint
paulc: well, we could switch to
those bugs right away
... lower down on the list, but newer
... ok if we did that?
ddorwin: yeah
paulc: ok, let's do that
[ Projected bugs 20-24 ]
paulc: three initial bugs from
TAG: See 27053, 27054 and 27055 below.
... and then two additional spun out
paulc: I asked for clarification
on this bug filed by the TAG but so far none has been supplied.
We will review the state of this bug at the F2F meeting.
... could a TAG rep present this?
ddorwin: trying to find Domenic
paulc: ok, he's not here, we'll go back to the list from the top
paulc: David is working is on the open issues and will request feedback when he makes more progress.
ddorwin: i updated the basic
structure
... there's a Dictionary w/ some structure
... plan is to modify it, compare two shapes of the dictionary in the bug
... the bug just has the list of open issues
paulc: are you looking for input?
ddorwin: i need to redesign the
Dictionary and get feedback
... but we completely changed how we create media keys
... we call requestMediaSystemAccess()
... which gives you a MediaSystemAccess object
... and you ask it for keys
paulc: a lot of these ddorwin
assigned to you
... you can reject the request
... can we get an ETA/ordering?
ddorwin: technical spec writing one, top (high priority)
paulc: anyone have feedback to editor?
[ None ]
paulc: next
<ddorwin> Current state:
paulc: This bug is editorial and
David is awaiting IDL feedback due to a possible bug in IDL
spec.
... Oct 29 status: RESOLVED FIXED. See
paulc: Domenic do you want to introduce yourself
Domenic: Domenic XXW, W3
TAG
... not @TPAC
paulc: introduce yourself/schedule
Domenic: mostly free this
morning
... i realize i threw a lot of work at you guys, so i'm available
paulc: we were waiting for you to
arrive
... we'll finish the one bug, and then switch back to the TAG bugs
... so this bug is done
paulc: i asked for
clarifications
... clarifications are at a minimum in Comment 2, and comment 7
... but could you introduce this bug briefly for us
... and then general discussion
Domenic: this bug came out of
concerns from tbl
... we have a high standard of Web APIs and how they work
... how open they are to the web
... a lot of parties involved w/ DRM
... through open standards/standardization
... we want to allow independent content providers to be able to use EME
<scribe> ... new browser vendors of course
UNKNOWN_SPEAKER: you should be
able to create new browsers from the spec and support EME
... but Desktop and Mobile browsers
... and new EME key implementers should be able to join the ecosystem
... not just standardizing Widevine, Adobe, or MS PlayReady
... but others should be able to join
... content providers/developers should be able to implement code that supports content from multiple systems
... developers / content providers shouldn't have to special case that
... concerns from tbl
... that we were standardizing the needs for specific companies
paulc: response from EME/Media
TF?
... i noticed Sergey Konstantinov declined to give proposed change
joesteele: i have a clarifying
question
... seems to be standardizing a protocol
... so servers can implement on backend
Domenic: seems like that's the
most important part of achieving the objectives
... but i agree with your assessment
joesteele: Adobe wouldn't have a
problem implementing such a protocol
... but there's another party who isn't in the room
... -- the studios --
... i don't know how to solve that
... from a standards perspective, we think it's great
... but implementing something which won't be used by anyone isn't practical
ddorwin: maybe signatures are
opaque
... it's a big effort
... we're going to need approvals
... important to maintain robustness, features people want
... i'm not convinced the security is in the format so much
... have the experience of the people who know these things
MarkVickers: thanks
... i can't represent all the studios
... but we have a studio in my company
... studios don't want proprietary technology
... they evaluate/set criteria based on protection
... i don't think it would be negative
... we'd welcome it/evaluate it
... w/ EME, we can interface w/ the available technologies
... but the same interface could work for open-standards or standards-protocol based implementation
markw: similar comment to
MarkVickers
... if DRM vendors want to get together and agree on open formats, that's great
... if that work is done here
... what does that really mean from an IPR perspective?
... various DRM vendors won't propose something to which they don't have rights
... maybe they have the right to use it
... but maybe not the right to grant licenses
... there are dragons there
... of going in this direction
... this would take some time
... time to get support into DRMs
... we wouldn't want to see EME held up for that length of time
... we'd like to see EME deployed w/ proprietary protocols
paulc: ddorwin, you said you were
thinking of something on the table
... were you thinking of a place in EME for a hook to a second spec?
ddorwin: i don't know
... i was thinking of a second parameter
... we could have a second document in the same directory
... iterate on that
... i agree we don't want to block
... we want to ship, as well
... same approach as PSSH
... yes these exist, but people should be moving in this direction
glenn: not sure there's any bug,
w/ EME documented here
... unless the presumption here is requesting excluding proprietary DRMs be excluded
... i'd suggest we close this bug as LATER/noaction now
... nothing in there that reads on EME, unless it's adding a note for future work
Domenic: i'd caution against
pushing this work onto your future selves
... especially if ddorwin says he has an idea of how to get started on this
... it doesn't have to prevent these features from shipping in their more proprietary form
... but we should be able to get started on this to get it better
adrianba: clarifying
question
... do you mean network protocols for exchange between clients and servers for messages
... or client protocol between CDM and Service
Domenic: lot of moving parts
here
... my understanding is that the Server protocol would be important
... down to goals we have
... i guess we want anyone to be able to communicate w/ CDM
... i think the network protocol as well
adrianba: i think w/ current EME
structure
... communication to License service is in the realm of the application owner
... nothing proprietary in that exchange
... i don't think we have an objection to standardizing that
... that would open up new scenarios
... you could have common code running a player knowing automatically how to get licenses from different service providers
... because the api could be the same
... for the common case, i don't think that's really blocking
... we abstracted that at the API level in the spec
... i don't see that as blocking interoperable implementation
joesteele: when i asked about
network-protocol
... i was thinking not so much about App sending opaque to license server
... i was thinking what does a license look like
... how are keys included, things like that
... other comment was
... about Q on APIs, protocol between App and License Server
... as between CDM and Platform
... don't know if we could do that, i'd like to see work there
... not sure if W3C is right place for that, definitely long term proposal
... just negotiating such a spec would be a year
... and implementing it longer
... third? ... i'll have to think about other thing
markw: i think standardization of
Opaque blobs
... license server might be something else, dealt w/ libraries
... Q of standard api for CDM
... is something, for browser vendors
... browsers created NPAPI
... something like that
... MS published CDMI
... i think, going towards that
... for things they wanted to do
... it isn't really in our scope, it'd be good
<adrianba> if it is the format of the blob then that is the protocol between the CDM and the client application that we're talking about not network at all
ddorwin: this is about the
License Protocol
... CDMI is very narrow in what platforms may need
... platforms vary so much
... a fraction of what we have in Chrome for various things
... even the interface we provide in Chrome isn't what's used in Chrome, because we have a shim
... as long as you're clear about what you're expecting from a browser
<markw>
ddorwin: it's easy to shim
... Hardware, SSEs are implementing things over and over
joesteele: that's what i'd like to see standardized
pal: Pierre, MoviLabs
... struggling how EME doesn't support a fully open CDM
... unless EME doesn't do that
... i'm not sure there's a bug here
... what is the bug?
markw: that CDM doesn't exist
pal: that's orthogonal
... there is an open and fully specified DRM today
paulc: for fear of getting on
w3-meme
... i don't want to speak for the Director
... when we call for implementations of EME
... one thing Director asks is to get new people to come with implementations
... the call is meant to demonstrate that the spec can be used by a third party who wasn't in the room, to implement
... pal, you're saying they could implement it
... could you put that they could in the bug?
pal: can we resolve this bug
today
... if i write in the bug, can we resolve it?
paulc: two people said we might
resolve this LATER/something else
... one person said they might make a proposal to add something to EME
... seems like we might need more discussion
Domenic: wanted to second
interoperable implementations
... and Director's concerns there
... one of the best things to be done
... would be go beyond "hey, 2 browsers implement EME, and APIs exist"
... want to show multiple EMEs, content providers, interacting in an interoperable way
... that's what we're trying to get at
ddorwin: reiterating what Domenic
said
... all EME does now is expose proprietary blobs
... they want to see interoperable
... instead of just a spec
... part of it is "what does it mean to have 2 interoperable"
markw: EME is operating
today
... w/ multiple browsers, providers
... we need to support multiple key systems server side
... it's equally difficult for us as anyone else
... EME could support an open DRM CDM today if someone made it
... we could write something into the EME spec that CDMs support a specific thing
... different thing, go to DRMs saying you can keep your proprietary robustness solution and business arrangements
... but we want you to support open message formats
pal: i think some of the things
said here
... were interesting suggestions
... Exit-Criteria
... things to put in the Spec
... but that isn't the bug
... how do we resolve this bug
... do we close this bug and open other bugs?
BobLund: wanted to respond to
Domenic 's point about Interop
... we've demonstrated ability to take single piece of content
... encrypt w/ multiple keysystems
... and play back w/ multiple CDMs
... is that interop, because that exists
Domenic: how much code was
keysystem specific?
... sounds like your comments and markw 's that there's a good start on interop
... sounds like on license that it isn't interoperable
<slightlyoff> that would be helpful
BobLund: we'd be happy to share
the details
... tell us the right venue/mechanism
paulc: the bug
Domenic: largely a matter in
showing interop to go to CR
... we're happy to help get involve
... happy to continue conversation sometime
joesteele: not clear on part of
the goal of this bug
... same server on server side could service any key system on the client side
... i don't think that's possible
... since key encryption is hardware specific
... and requires specific stuff on the server side
... i think that might enforce proprietary code on server side
paulc: i've heard
... a) no issue
<Domenic> joesteele: I think that is pretty well covered by
paulc: b) here's the proof
... that's what we want added into the bug
... and ddorwin you had something to propose
... i think people understand the direction TAG suggests we go
... think we should have some dialog
... i think it's presumptuous to close this bug
<ddavis> Accessibility Concerns
paulc: I asked for clarification on this bug filed by the TAG and then asked the A11Y TF to supply their view which was done in:
paulc: john foliot said he didn't see a problem
ddorwin: john said he didn't see
a problem
... and then YYY said their interpretation wasn't right
... no one's done the wrong thing
... audio, i don't know the accessibility features there
... if that's over protected HDMI, there's a problem
... secure video path is a problem
... there are concerns there
... don't know the answer
MarkVickers: thanks paulc
... i read through this bug, i don't understand
... strong benefits of EME is accessibility
... if you want access for captions
... trick-plays
... any of those things are done by completely arbitrary interfaces
<scribe> ... done through proprietary means
UNKNOWN_SPEAKER: EME API provides
HTML5 standard access for Caption, Trick Play, moving through
media streams
... references to media streams
... huge improvements for Accessibilty
... strong driver for us to move our content to it
... i don't see downsides, i see all improvements
Domenic: largely agree w/ ddorwin
's assessment
... a11y came back w/ good review
... but hsivonen came back w/ points
... worth just watching
... i agree better-than-best
... goal should be as accessible as unencrypted
... not as-accessible-as-flash
paulc: MarkVickers is saying we're better rather than equal
<Domenic> is what i was thinking of
paulc: ddorwin did you propose changes
ddorwin: John Foliot and i
discussed
... i thought someone was going to file a bug and fill it in
... one problem area is high-contrast
paulc: you'll spin off bugs for audio/video/text
<MarkVickers> I'm believe that EME provides ALL the same HTML5 accessibility for encrypted content as for unencrypted content.
markw: biggest is video
... any accessibility function can be done in device
... can still be done w/ DRM
... but that's a QoI thing
... impact on a11y tools
... any tool that accepts HDMI can work
... but tools are reduced if they do HDCP will reduce a11y tool
paulc: I asked for clarification
on this bug filed by the TAG and this has generated new active
discussion.
... who wants to introduce?
Domenic: not sure we'll be able
to have a productive discussion on bug
... it's mostly Sergey Konstantinov, and he isn't in the room
... seems like a reasonable request to me
... to translate machine readable request
<slightlyoff> +1, I agree that we aren't going to make progress on this here
Domenic: machine readable 1
hour
... reasonable to give chance for human to understand
<markw> it's content providers who insist on HDCP and it is this insistence that reduces the set of a11y tools that could manipulate video to those that support HDCP not anything in EME
joesteele: when i read this, it
seems like a restriction on the application
... we could expose it from the CDM layer
... but if the application chooses not to expose it
... and i don't know any application that would
... how useful would it be?
Domenic: you click the lock icon
in your url bar
... 90% of users don't
... but some users do, to want to verify it
paulc: there could be guidance in
the spec for UAs
... whether we could make it mandatory would be hard
Domenic: yeah, there's discussion in the bug
<joesteele> timeless:FCC Chair was here Wednesday regulations could happen -- whether we ask for them or not
<joesteele> ... this is not an unreasonable authoring encouragement
<joesteele> ... be aware that it might make sense to add a regulatory hook -- that FCC can point to
<slightlyoff> I don't understand that suggestion...is there a concrete proposal?
markw: perfectly reasonable for
service providers to express
... and if they don't do it, it's outside of scope
... and w/o those, regulations may happen
... but that's different from Technical restrictions in the key
... unclear that those technical restrictions are meaningful
<MarkVickers> +1
adrianba: i agree w/ markw
... technical restrictions conveyed in licenses can vary considerably in various scenarios
... very time consuming to try to put together a technical API for the various restrictions
paulc: to bring this bug to a Media TF and get Sergey Konstantinov to attend
ddorwin: i'll action paulc to arrange meeting w/ Sergey
<scribe> ... done
<adrianba> Paul's action
paulc: TAG is asking that keys be flushable like cookies
Domenic: i understand it might
not be robust
... hsivonen had some idea
... something to be exposed to users if it's that possible
paulc: sounds like these bugs are very related
markw: if people agree to 27166,
maybe we don't need 27165
... do it first and see
... for NetFlix, there's no requirement for browsers to have unclearable identifiers
... if the identifiers are clearable, it's fine by us
It would be ideal if we required that clearing ones cookies, history, etc. also cleared any such identifiers.
I am unsure this is possible for robustness reasons, and as such filed bug #27165 to explore mitigating strategies, but if there is even a chance of requiring they be clearable that would be much better, and would love to have that discussion in this bug.
ddorwin: you asked how are we
going to address this
... probably a series of shoulds
... implementation guidelines
<markw> specifically, I a referring to identifiers that uniquely identify a device
paulc: do we have a security and privacy section?
ddorwin: yes, currently
non-normative
... we could do it elsewhere or here (in this room, now)
... no id, clearable, reset this if i want
... various robustness
... i think ids are overused
... don't use an id unless you actually need
joesteele: Q, I agree w/ this
bug
... but what do they mean by identifiers
... a list of things given
... what is the scope of the identifier being given
... if a key used by all CDMs for a keysystem
... is that an identifier
... this would be a permanent identifier, baked into the CDM client
... you're using the CDM
paulc: is TAG issue about whether a identifier can identify the person using the UA
Domenic: exactly
... it's a fingerprinting issue
... if you can identify the CDM/system in play
joesteele: answers my question
jdsmith: Jerry Smith,
Microsoft
... in PlayReady
... we have an identifier in personalization of key system
... we looked at privacy aspect
... we felt it was a fairly low risk
... exploiting it
<joesteele> it would be great if the comment about what types of identifiers are concerned about (aka fingerprinting user versus KeySystems) could be added to the bug
jdsmith: took license servers,
required them to retrieve it
... we concluded to allow users to delete it
... wouldn't object to recommending that in the spec
pal: is there a W3C spec that
mandates/recommends clearing cookies?
... under what circumstances
... there's no spec
... there's rough consensus of UAs
... users have consensus of expectations
... and as vendors, we understand that there's a third rail
... we're powerfully compelled to do this on their behalf
pal: all this is done w/o a spec
plh: Philippe Le Hégaret W3
<wseltzer> [Fingerprinting guidance being developed in the Privacy Interest Group: ]
<slightlyoff> pal: it's a good point, at the same time, the concern is that there might be specs that put undue constraints on impls in this way
plh: we have Web Storage, User Tracking
<plh>
plh: so there's no reason this
spec couldn't do this as well
... it's a REC actually
paulc: i guess it does matter
<slightlyoff> pal, the specific concern is that if impls are REQUIRED by some combination of tech and licenses to break these assumptions, it's very bad
<slightlyoff> and is likely to be unacceptable
ddorwin: clearly there's
disagreement on what constitutes a privacy concern
... something to work out
... in interest of users if we work it out
... take steps to help them
... even w/ a permanent HW ID
<plh>
ddorwin: mechanisms to protect
them
... also, Desktop browsers have done good things here
... also have to remember devices
... also browsers/native apps exposing the same id
... browser vendors should take that seriously
... i don't think solving this fixes the previous one
... cryptographic cookie
... could rebuild firefox/chromium and put whatever
paulc: you just had pushback on closing this
markw: WebStorage spec
... text came from the same source
... into the EME privacy section
... i think i copied+pasted
... in WebStorage it says here are things you could do
... we could say these are required/should
... on cookie DRM ids
... if you can clear the identifier and make a new one
... you could make one device and look like multiple
... we don't care
... if you can make multiple devices look like one
... we care
<joesteele> +1
markw: you can copy cookies
across devices
... that's a problem
paulc: updating 27166 to point to
existing material
... and ask about whether it should be NORMATIVE is the next step
markw: it's Non Normative in the
spec
... different to WebStorage (where it's normative)
... but neither have shoulds/musts
ddorwin: it's non normative
<pal> slightlyoff, can you elaborate on the specific concerns?
ddorwin: we could have "here's
introduction"
... and then "here's the recommendations", and that's normative
paulc: an editor assigned to this bug?
[ Adrian ]
markw: i'll work on it
<slightlyoff> pal: consider a situation where we had a persistent identifier across browsers for a specific bit of hardware in some other way
<slightlyoff> pal: and where users couldn't clear it
paulc: ddorwin assign it to
markw
... markw will bring it up to date
<slightlyoff> pal: (e.g., a CPUID)
paulc: I think that covers the
TAG bugs
... we're going to switch to another item at 10am
<slightlyoff> pal: browser vendors are very likely to mask that and/or prevent it from being available
paulc: bug about https:
<slightlyoff> pal: because privacy is a key component of what a browser promises to "be" in terms of an agent for the user's interests
<pal> slightlyoff, ok... so I am still no sure what is incorrect with the EME specification
paulc: we'll come back to this after 27166
paulc: Belongs in batch of
security related bugs which also includes: Bug 26838 -
Normatively address vulnerabilities related to initData
contained in media data
... thirty five comments
... ddorwin made a change, people asked it to be changed
<slightlyoff> pal: perhaps nothing! The question from the TAG is roughly along the lines of "is it the case that users are likely to be able to control this in common implementations?"
markw: I discussed the spec
change with David and we agreed to change the text for the
moment so that it is clear the behavior on unauthenticated
origins is an open issue.
... The procedures still describe the check for an unauthenticated origin, but the subsequent behaviour is noted as open with a reference to this bug.
... There is no disagreement that there is a problem to be solved here.
... The disagreement is about the solution and it requires continued discussion.
<slightlyoff> pal: the spec text has bearing on it, but what this room agrees to is more important because it'll help us understand the likely implications, which are what's important
[ from the bug ]
markw: it's been proposed that we
require an authenticated origin from EME
... a bunch of problems it would resolve
... there are implications
... from serving the site, it would be great
<pal> slightlyoff, ok... I think it is very difficult for this group to make progress on these bugs without a clear proposal and/or pointers to specific areas that are broken.
markw: but for serving the
content, we don't believe switching to https isn't great for
privacy
... costs of actually serving media over https
... it would be 30-50% increase in server load
... $10s-100s millions / year
... best way forward
... look at what are the conditions
... in which it's reasonable to use http://
... if they're met, it's ok, if not, it's ok
... discuss in detail about the conditions
... look at those
paulc: does anything in the bug define those criteria?
markw: i think someone agreed to make one
<slightlyoff> pal: the way to think about it is a question: the TAG wants to understand what's likely as a way to understand how it'll impact the overall architecture. If the spec text needs stronger language to constrain impls, that's something we want to understand
markw: hsivonen?
<pal> slightlyoff, in other words, I am concerned with "perhaps nothing" since it is difficult to come up with a solution when the problem is not well scoped/understood
markw: for people who don't want to read all 130 comments, just reading hsivonen's comments would be good
<slightlyoff> pal: the TAG isn't going to dive in and require things of WGs which are acting in good faith and for which implementations conform to social and architectural norms
<slightlyoff> pal: so the goal is to understand
<slightlyoff> pal: and, based on that, come to some common agreement. If this process is adversarial, the TAG is doing it wrong
paulc: markw 's suggestion was to develop criteria for whether you use a secured origin or not
markw: booked on spectrum
<joesteele> Here is a related email -- but not distilled well --
markw: if you had a unique,
non-clearable-id, in EME messages in the clear, and sent in the
clear
... if that was allowed at all, that definitely need to be restricted to secure origin
... then there's stuff which are encrypted already, per-origin, clearable
... for that, i think http: is reasonable
ddorwin: might be disagreement of
if that's reasonable
... 2 aspects
... 1. privacy
... 2. security
... the former is dealable
... the other is harder
... stuff that could be scrubbed
... always security until there's no robustness
... up to UAs on what they're willing to deal w/
... until w/ move to TLS
... then UAs
... if you provide options, the option will be "no", because they won't get Netflix
... platform segmentation, or no security/privacy
... even if someone has an unclearable ID in TV
... think they should use https: they add that, try to use it
... netflix doesn't work, they remove it
... it goes over the wire
... privacy, no-clearable-id
... security aspects are hard to define
... Venues proposed requiring sandboxing
... no normative ways to address security concerns
... this is an issue for...
... generally effort is to require TLS for powerful APIs
... what we know in historical implementations
... today ones
... those are Exceptional vs. anything else that can be implemented in OSS
joesteele: there's at least the
bones of a proposal
... origin specific id, so leaking it isn't a risk
<glenn>
joesteele: sandbox, normatively spec what it looks like
<glenn> see above for proposal by Henri
joesteele: proposal, what if we
added a normative requirement to the spec
... that a CDM
... operating in UA
... that there need to be a Security Review (possibly source level)
... of the CDM
<slightlyoff> it seems likely to me that there's a composition problem; e.g., what's allowed in an iframe?
joesteele: that be available to
Browser Vendor
... that's the one who has to make the security+privacy
... the browser can do whatever they want
... if the browser vendor isn't able to inspect CDM properly
... then there's a problem (possibly third party binary)
... concern for larger community
<ddorwin> slightlyoff: Not sure if this is what you're referring to, but yes, we probably need to check the full set of frames
joesteele: i want to remove that
concern
... Adobe would be ok w/ that requirement
<glenn> another proposal by Anne
<ddorwin> the current text checks just the document that contains the MediaKeys
markw: i think what joesteele
suggested would be a great improvement
... i'd like to hear if that would be acceptable of the other CDM vendors
... hsivonen points out that https: doesn't solve that
... if people wants to poke holes in CDMs, they can get a publicly trusted Cert and poke
... we can ensure methods are validated
... work on what sandboxing means
... privileges no greater than those of renders
... we need to do work, but there's a way forward
<ddorwin> HTTPS prevents injection (even of other HTTPS origins)
pal: i want to address markw
<joesteele> just to be clear the Security Review would need to cover both security and privacy concerns
pal: you can specify guidelines
that lead to the right privacy/security attributes
... you can normatively specify attributes leading to the right requirements
<markw> @ddorwin: Henri explains it better than me, but it's not hard to an attacker to trick people into visiting their HTTPS site
ddorwin: i'd welcome those
requirements
... i don't know them
... the problem is that the issue we have is robustness
... and robustness is out of scope
... normatively securing them would probably break most impls
pal: that's true for any
technology integrated by UA vendor
... UA has to do due-diligence to ensure technology isn't nefarious
... video driver could be nefarious
jdsmith: in favor of Defense in
Depth
... counter measure to ID
... may be difficult to anticipate all gaps
... but applying https: on the connection itself is more likely to be secure
... question is how secure do we want to be
... do what joesteele proposed
... some potential that https: could add additional protection
... over time, we should be trying to migrate our implementations toward
paulc: didn't annevk suggest that
in a bug comments?
... ok to use today, but at some point in the future, a clock clicks
... and in order to conform you'd need to use https
markw: absolutely
... perfectly reasonable to discuss how that migration would happen over time
... one to have gradual migration switching over one-by-one
... frog doesn't notice water is getting warmer, problem is solved
... but migrating 10s of percent, video is US peak 50% of traffic
... can't happen overnight
... involves 10s of ISPs
... slight economic problem
... from browser's perspective, you've solved problems for all sites
<joesteele> ISPs and CDNs are involved
markw: but for a single site
that's already solved it
... it's marginal benefit
... difference of who benefits, who pays
... needs some coordination
ddorwin: web in general is moving
to secure origins
... that may happen w/in impls before any date we set
... not just in EME
... even though Geolocation and getUserMedia have shipped
... browsers will flip over
... sites need to adapt
... Domenic mentioned this
... annevk has a proposal w/ messages
... get security, while allowing sites to adapt
... markw mentioned 30-50% server hit
... that's not for all/most servers
... they've done a job of optimizing things
... we're not seeing nearly that
... i'm trying to get numbers released
... we're serving video traffic over https:, not un-doable
... things that need to happen
... let's try to solve those
... netflix can help lead the way there, we (google) would be happy to help
... saying we can't do anything will help us
joesteele: Adobe is generally in
favor of moving the web towards more security
... not owning browsers ourselves, we'd like public by-when-date
... that would be useful from the viewpoint of talking to our customers
... to say "by-the-way, we won't be able to support your http server by XXXX"
paulc: HTTP-BIS in IETF had the
opportunity to make https: mandatory
... they chose not to
... IETF to me, from a distance
... chose not to, which seems like it isn't the time
... statement that it's going to happen wholesale
... why didn't it happen in HTTP-BIS?
... i wish i had mark here
slightlyoff: game theory works
against anybody but a particularly motivated vendor
... we'll pay a large price from a Chrome perspective when we try to move users away from http:
... because users will be unhappy
... it's a cost w/ low return in the short run
... i'm sympathetic to markw 's concerns
... maybe if we could identify privacy concerns
... content is encrypted
... parent page over https: isn't a concern
... serving media itself will cost large amounts of money
... can we discuss what mixed-content means in this scenario
... discuss goals in privacy design
markw: i agree w/ that
... serving parent page over https, we'd love to
... but then the media would have to come over https
wseltzer: Wendy Seltzer,
W3C
... hearing about secure-origin discussion in several different groups
... concern
... particular threat model that i've heard most compelling
... connecting to an un-authenticated-origin
... and permitting active-content
... that's MITM'd
... allowing it to run content
... exposing client to risk from who knows where
... running on your network connection
... threat model that
... as W3C, looking to work w/ TAG, and Security Group
... to more broadly address it
... not just spec by spec basis
... unfortunately, discussion is just beginning
... when it came up earlier in WebAppSec
... i hope we can bring together the people to think wholistically on how to improve ecosystem
MarkVickers: two things
... I want to support adding things that mandate end-to-end security
... nothing wrong w/ when we plan to move to https
... we have to do this
... secure PII on the web
... to do that, we do very very detailed investigation of our CDMs/...
... supporting what markw said
... let's get them in there
... regardless of https: or not
... idea that there could be an exception to https: origin property
... problem is video data
... it isn't executable code
... it's already encrypted
... massive amount of (50%) Internet bandwidth
... in general, exceptions to rules are problematic
... it doesn't have privacy problems
... bandwidth-cost issue, if we could make an exception to that
... it'd make things go more quickly
<ddorwin> Note: Whether the video is already encrypted is irrelevant. It is still observable and fingerprintable
paulc: we agreed to break for
coffee at 10:30am
... lots of concrete suggestions
... good to put a short summary of suggestions into the bug
... slightlyoff 's suggestion
... was along the lines of what markw said and what MarkVickers supported
... break for Coffee
... and switch over to the top of the bugs
[ Coffee break ]
<MarkVickers> Regarding drowns note above: I agree that there is privacy value in using HTTPS for encrypted content. I was making a crawl-walk-run argument. We could more quickly move the non-video content to HTTPS as an intermediate stage towards all content over HTTPS.
paulc: editor's suggested a
different approach instead of top down
... but they're not ready
paulc: does Media TF need another
F2F?
... instead of waiting until next April
... if we spent a whole day somewhere
... maybe longer than one day
... would that get us to the point where
... maybe break down into groups
... and get progress
jdsmith: it'd be useful
pal: do you think it would be useful
paulc: if we identified people w/
proposals
... and/or dedicate time to develop on the fly
<joesteele> I think it would be useful
pal: exactly
... extremely helpful, going into that discussion
<ddorwin> domenic: That's probably okay. timeless: Thanks.
pal: if someone made a proposal on each open issue
ddorwin: this has been more
productive and last fractured than email
... i'd prefer that as well
... i'm happy w/ a F2F
... one thing for the group, don't wait for milestones
... Tuesday morning is popular for bug updates
... i'd like something more fluid
... we don't need Tuesday morning (or Pacific time)
... but i'd like more continuous involvement
paulc: i won't disagree
... i've tried to get people off 6am Pacific bug fixes
... not sure how to push people to do what you wawnt
MarkVickers: i'm for another
F2F
... anytime/anyplace
paulc: pal suggested spread them
out
... and/or have time to develop proposals on the spot
... problem w/ allocating all morning on a discussion
... 90mins on TAG bugs
... we're still surface level
pal: hard for a group to just
open a bug and get to a point w/o any prep
... key is to have strawman proposal
... even if it's horribly wrong
paulc: rubys, "the way to find and answer is to say something that's wrong"
ddorwin: trying to move forward
in an iterative approach
... requestMediaKeySystemAccess
... we'll iterate
... i'd like smaller bugs
... yeah, that's a problem, file a bug
... please give me text to add
... discuss this small issue
... break things down into manageable things
... move forward, even if we have to change
pal: some of these bugs are
incredibly broad and vague
... in discussion spawn three other issues
paulc: usually in bugzilla
... you have a bug, you file 3 bugs, mark dependencies
... and close the dependencies, and then revisit and close the original
MarkVickers: what's called
for
... make clear text-change as strawman for "cunningham's law internet"
... spec changes for promoting discussion
... spec changes for completing discussion
markw: avoid doing things for
obviously controversial
... what would it look like on github?
pal: branching
... or proposal in plain text in bugs
... problem is ddorwin is 99% right
... you have to lower your percentages
<inserted> [ Examples of what github can look like ]
paulc: html5 spec after html5
will probably be done in git
... github or similar
... i don't want to drill on that today
... great lunchtime conversation
... jdsmith responded to my list
... pal suggested dealing w/ proposals that are presented
paulc: jdsmith will submit a proposal in time for F2F meeting.
<inserted> Bug 26776 comment 9
jdsmith: previously
... looking for key-specific-error-codes
... i know there was a discussion about key-status
... looking for aspect of it
... benefiting from specific error code
... talked to ddorwin about philosophical Q, not discussed as a group
... do we want CDM specific error codes
... or drive to standardized error codes?
... is my proposal reasonable/acceptable to support, or not
o "acquired",
o "expired",
o "notyetvalid",
o "renewalfailed",
o "playbacksexceeded",
o "authorizationfailed",
o "outputnotallowed",
o "downscaling",
o "released"
jdsmith: adding a specific
code
... interested to flesh out the list
paulc: datatype of "systemcode"
jdsmith: it's a number
paulc: where does it come from?
jdsmith: it's out of band
<inserted> Bug 26372 - Report issues/events not related to a specific method call
jdsmith: you have a range of problems that can occur
paulc: so, do we want CDM
specific error codes
... for debugging?
... for end user?
jdsmith: for initial
implementation
... they were important for telemetry
ddorwin: 2 issues
... 1. how to report this (technical)
... 2. does the platform want to let us expose non-standardized values (annevk feedback)
... we have to deal w/ this
... 1st isn't worth dealing w/
... developer debuggability is in javascript-console
markw: we should be clear
... if we expose codes like this, they shouldn't drive client script
... if we want to let the script drive actions, that should be standardized
... then there's exposing system specifics
... that's an antipattern
... but explicit errors from IE etc was really important for us to debug
<ddorwin> Anne's comments:
markw: errors are specific to CDMs
joesteele: i'd like to have
this
... system-code-level available for debugging purposes
... sensitive to the issue of not having a common way to use these
... keysystem specific, platform specific
... would it be good enough if this was in javascript console, but not programmatically to the application
[ markw shook his head -- no ]
paulc: in an open standard like
EME
... returning a proprietary specific code is bad
... but i can point to ISO specs
... SQL state
... there's an implementation defined range
<ddorwin> I think Paul said ISO
paulc: and the SQL spec says
"don't ever take action on one of those values"
... ISO standards say that because it's really useful
... if you get underflow in a phenomenally complex piece of code, it can be very very useful
... used by developers when they're developing their code
... i'm less worried about implementations exposing beyond the standard
... just paulc's personal opinion
ddorwin: argument is that should
be the exception message
... not a number
... that's why i wanted TAG to be here
... i wanted declarative text
... is there a way that an application can't do this
... but the server needs to see the error code
paulc: sentiment of the
room?
... straw poll, good facility to have?
[ 7 hands -- good ]
[ 0 hands for don't ]
paulc: jdsmith, make a concrete
proposal
... and make sure annevk's aware of your proposal
<ddorwin> and the TAG
<inserted> Comment 13 Jerry Smith 2014-10-30 22:32:25 UTC
paulc: Jerry to update proposal based on previous TF discussions.
jdsmith: we had a discussion on a
Tuesday call
... i listed feedback in comment 13
... strong input from apps to have influence over data storage
... apps in control over new keys/reuse
... we'd like to
... session-type temp/persistent, we can retain
... instead of app generate request for license w/ init data
... instead let app load local license w/ same info
... not exact
... it gives app control
... relatively transparent way
... they're not obligated to associate media-key-session-ids with the session itself
... there's more to it, and i can let others talk
... we retained retrieving keys/removing
... we also added remove key methods
ddorwin: thanks for taking that
feedback, noting it, addressing it
... i like this better than the last one
... i commented on specific apis
... markw addressed... i didn't read through all of his comment
... markw indicated PlayReady doesn't let you have the whole id
... might be multiple sessionids
... what happens
... app might want to load specifically one id
... if we have retrieve-by-id, let you get whatever you want from that
... removeallkeys is odd
... removekeybykeyids seemed odd
... if a license has multiple key ids, it doesn't make sense
... you can't rip key ids out of licenses
... in a more pure case, you might get session by init id
... but that's putting apps through extra work
... the remove stuff, the way keys are removed is redundant
... or do on sessions
... that you can't play back w/ session id is a problem
... iterate on this
jdsmith: we don't really believe
session-id is a good way to map stored keys
... we'd like to get away from using session-id to manage/retrieve keys
... that's why new key management api is proposed
... remove key/session w/ one operation
... session-id is an arbitrary number
... happens to get coordinating messages
... could be multiple messages w/in a key experience
... not a great identifier for managing stores
... retained to support Secure-Release UC
ddorwin: we're storing
something
... to retrieve, you need an index
... ~ IndexedDB, there's an id
... it's odd that if you had 2, you don't know which you'd get back
... index is not unique
... change meaning to clarify
... seems you should retrieve by id
... or people might want to
... more like rental case
... want to load things, and want to play it
... change model of EME?
<ddorwin> acc ddo
markw: when i looked at
this
... and compare it to our existing api
... you can polyfil it either way
... functionally it's not very different
... they might look different, but they might be the same
... trouble deciding which is better
... no really strong reason for choosing one/other
... need to look for underlying principle
... polyfill just has a mapping
... doesn't need to be in a secure boundary
... could be in js
... perhaps, pull out keyRelease
... atm, we're overloading session-id thing
... from original approach to not define keyRelease
... now we seem to be moving toward explicit definitions
joesteele: specific example
... putting aside keyRelease
... just talking about load
... spec talks about proprietary PSSHs
... only way it can do this is via loadSession
... even if app stores all sessions it had previously acquired keys for
... app can't decide which session introduced the keys
... w/o being able to parse the KeySystem specific initData
... blob is not key system specific
... it can be passed down for playing offline content in a general way
... this lets app avoid trying to load a lot of sessions and trying each to see if it can play the content
... session-id for us doesn't make sense for us
... we don't manage content
... we could make a shim, as markw suggested
... to make an offline content player, i couldn't do it today
... very difficult
paulc: you could do it w/ jdsmith 's proposal
joesteele: specific piece from
jdsmith 's proposal that's helpful is load()
... and clean way
... if i'm offline, unclear what loadSession
... can app assume no key request?
... in load() we could say, only load from keys we have, don't make key requests
ddorwin: CDM needs to know what
load() is intended to do
... alg currently lets it send messages
... whether it does anything w/ that, who knows
... you can load things while on line
... playlimits
... if you want an "i'm offline boolean"
<ddorwin> I don't agree that the application does not know which session ID is associated with specific content.
ddorwin: you'd probably be
ignored
... i don't agree app doesn't know which session-id's
... if you downloaded a movie, either got a manifest w/ init data
... either got need-key or similar events
... if it's aware of sessions, i don't see why it doesn't know session-ids
... apps might not want to track that, just want to play
<ddorwin> If we are going to remove load-by-ID, I think it should be a separate bug.
ddorwin: markw 's right, it seems
you could polyfill both of these
... apps might want to do by id
... If we are going to remove load-and-use-to-play-by-ID, I think it should be a separate bug.
... verify w/ people that they don't need that functionality
... jdsmith added load-by-data, that i don't quite understand
... may be specific features we want to talk about
MarkVickers: two styles of
interface
... at least two CDMs would prefer one way, i think that's a natural way to go that way
... all things otherwise equal
... i'd favor that, it seems there's agreement
... i'd favor UC joesteele 's offering on offline
... i think this is resolved
ddorwin: want to remind people
that authors have a higher constituency concern than
implementers
... know what authors want
markw: joesteele gave an example
of a UC
... that he couldn't do
... you can store map of init to session-id
... in IndexedDB
... you can polyfill
... it's hard to distinguish
joesteele: a bit of
confusion
... when i say the app doesn't know which keys are required
... not init-data to session-id
... application given that it could be operating on a number of key systems
... it doesn't know which keys were delivered in a given session
... load session could provide a number of keys at once
... but the app doesn't know which particular id
... if i can load by init data that i have
... i know that's supposed to result in a key
... it's a backwards mapping
... init-data i know will cause key to be satisfied
... i'm working through the argument
... i could scan through all the ones i've mapped
<ddorwin> We don't load by key; we load by session (i.e. license). The application could store a list of session(s) it has for the title.
joesteele: and assuming it
matches exactly, then it will work
... but it's a proprietary format, an exact match may not be possible
ddorwin: are you assuming your
application doesn't know what it's playing
... or what it played previously
... you got an encrypted event, now you're trying to find a license
<MarkVickers> I agree with David that we must prioritize application needs over implementation needs, what I said is that if either style of API is neutral for applications, then implementation preferences should be considered
joesteele: i have streams A, and
streams B
... i play A, and then get a key that lets me play A+B
... i can do loadkey
... i have to do an exact match
... it may fail
ddorwin: not the model i've
thought about
... i want to play Wizard of Oz
... i have it, metadata of it
... one requires one session, or a list
... user clicks play, puts media in
... calls load session
... handle encrypted
... or request session, preemptively loading
... that's the model i'm thinking of
... yes weird things w/ PSSHs
... not thought of that
... not clear to me, esp w/ proprietary PSSHs
... that even CDM knows
... PSSH doesn't need to have all the keys
... servers know
... potentially a flawed design
... --- what can you do
... if you're trying to load
... --- very different
... i want to parse init data, figure out which keys it needs, and try to find them
... different from retrieval by init data
... i think if we don't do that, we have other issues
paulc: next steps?
... beauty contest?
... markw suggested that
jdsmith: reloading license w/o
cross mapping
... hadn't thought that init data might not be unique/match particular content
<joesteele> I am happy to support both models -- but if we only support one -- the initData model is more flexible
jdsmith: heard ddorwin that
reloading based on session should be in a different bug
... didn't hear loading local licenses by init data
... as problematic
paulc: you heard support on that
<ddorwin> I'd argue the initData model is less exact and more difficult to reason about
paulc: refactoring so that's done in this, or another
<joesteele> we can add a separate bug for the "I am offline" issue
ddorwin: every time initData
comes up, there are holes
... always problem we have
... a) why I support session-id
... why we should solve corner cases
... i recognize app doesn't want to store in indexedDB, just want to play it
... in those cases, the load you proposed makes sense
... yes broad support, still concerns
<ddorwin> also, you can map imprecise on top of precise but not vice versa
paulc: Jerry is to discuss this item with Adrian.
<inserted> Comment 14 Jerry Smith 2014-10-31 15:21:33 UTC
jdsmith: this bug
... currently WONTFIX
... websites might try to do extensions on top of EME
... we had a mechanism createCDMdata
... to allow passing license data back to license server
<ddorwin> It's an interoperable problem and layering problem.
jdsmith: viewed as an opportunity
for interoperability problem
... haven't made a conscious choice to lock down
... so there are no viable ways to extend it
... so if they want to work around, it isn't support by us
... or try to offer a constrained mechanism
... so we could deprecate a specific thing and close the extension mechanism
... if done in an unspecified way, we won't have that ability
joesteele: apologize for reopening
<ddorwin> If you extend an API, you run the risk that you will be broken in the future. More incentive not to extend.
joesteele: it raises a concern to
me, as jdsmith was saying
... even if we support all UCs as defined now
... there may be new UCs that require extension points
<scribe> scribe: joesteele
paulc: we would come back after CR
ddorwin: it will be hard to get
through CR with a void* that is do what you want
... we have identified a few of these issue
... we should either do them or branch
... we want to make sure these things are defined -- know what they look like
... domains is an example
... impossible to know how folks are going to do it now
... there are specific points where if you want to ask for afeature you can
... explicitily defining key release is an example markw mentioned
... identifying these would allow us to move forward
... but would prefer not to have a blanket statement like "add your stuff here"
paulc: we will leave the bug
closed
... those were the 3 I had in my list for you Jerry
... any other bugs nominated to bring to the top of the list?
... did not see any others where an explcit action since the 29th
ddorwin:
paulc: these came in after Oct 19th
ddorwin: markw alluded to
this
... tried to have persistent sessions handle anything storage related
... for simplicity, issue like persistent and temporary
... and defining behavior
... this bug is mainly cosmetic, but addresses some of the confusion
... for persistent licenses which is ambiguous now
... some implementations might do key requests -- would be better to be explicit
... AFAIK we don't have anything that are are different type of license (other than domain keys)
markw: how do people think we
should deal with key release?
... sessions were the only way of dealing with key release
... issue with no closing sessions gracefully
... should we really be using sessions for that?
... should we have a getKeyRelease()
ddorwin: ... would be more
specific
... who or what would we be firing messages at
... I would say loadReleasedSession or something like that
... I would rather have an iterator model
... there is an ascpect to removing the session
... no matter how you get the session, it is valuable to have it
paulc: you said might be
cosmetic
... other key types in the taxonomy
... ?
markw: persistence in the session question -- is it assumed that you are asking about both the key release and the keys in the session
ddorwin: I think we asked that --
does that really exist?
... generally it can expire - think you want key release with an offline license
... our implementation would do different things
... persistent licenses is a superset
<timeless> scribe: timeless
joesteele: i don't know if i'll
be able to prove you wrong
... for key release
... the specific thing in this case
... in all the cases that i've seen key release used
... it's about (con?)current session counting on the server
... i don't think every server wants a notification about key-release
... we could require that
... i think some servers would drop it on the floor
ddorwin: what functionality are they using?
joesteele: they're saying; the
local application is flushing the keystore
... they're trusting the app to do the proper thing
ddorwin: you can still load a
session and release its keys
... key release is an online streaming license
... with persistance
... you want to retrieve the receipt later
joesteele: multiple UCs?
... some use offline licenses and don't care about the message to the server
... i don't care in this fight
... server could drop it on the floor
ddorwin: offline + don't care
what happens
... fine to ignore
... but we were thinking offline would have an ack
... UCs where it is necessary (rentals)
... we can avoid these things, solve interop
... a) app could have trouble w/ that behavior
... i guess, app doesn't care, it could do that
... risk of malware, inject "delete all licenses"
... we should talk about that, my vision of offline was there was always a receipt
... CDM would not know to delete license/receipt
... talk about that, separate issue
<scribe> scribe: joesteele
UNKNOWN_SPEAKER: ?
paulc: so what is the next step
ddorwin: do folks think this is a
step forward?
... joesteele just said that there are potentially other models for this
paulc: any objections?
... no -- then you can go ahead
... should we go to the top of the list?
<timeless> scribe: timeless
paulc: blocked w/ boblund (not here)
ddorwin: i'm going to implement
something like we agreed, and iterate
... it's going to look "maplike"
paulc: lower priority
... it blocks Bug 26738
... can you raise priority
ddorwin: i want to do 26372 first
ddorwin: questions around references
paulc: plh?
... i can't hit him
... ddorwin was asking current best normative reference to WebIDL
... MikeSmith ?
darobin: "reference it and say don't implement bindings"
ddorwin: we're adding things
added to the living standard version last week
... but the URL is /TR/ (old)
pal: update TR
paulc: darobin, advice here?
darobin: nope
... we could try to get WebApps to update /TR/
paulc: action on me
... i sent plh an email
... i'll give you feedback
ddorwin: i added new objects -- MediaKeyAccess
paulc: this needs to be expanded?
ddorwin: yes, but it isn't affecting compat, so lower priority
paulc: we looked on Oct 14
... said "discuss at F2F"
... made change on Oct 17
ddorwin: that's the https:
bug
... "data you can't validate is bad"
... "data you're passing that can't be sandboxed is bad"
... "inject random stuff, that's even worse -- network attack"
... left w/ "make it so you can sanitize it"
... some implementations can't
... they're working to improve
paulc: is this dependent on bug 26332?
ddorwin: yes
... both, it and bug 27093
paulc: so this is the nullset once those two others are done
ddorwin: i'm open to other
ideas
... but that's what the analysis boils down to
paulc: given discussion on
https:
... is that the only solution?
ddorwin: it depends on,
influences 26332
... it's one of the reasons you want a secure-origin
paulc: markw, when you discussed
things in 26332
... is this initData case one of those things?
markw: could be
... yeah, this was one of the
... in 26332, we talked about security + privacy
... are there different considerations for validating initData v.
... update messages in the update() method
... require UAs ensure those things are validated
... minimum standards for sandboxing etc?
... go through that, could allow unauthenticated storage
paulc: wanted you to think about it
joesteele: markw, you asked
ddorwin if those types of data are different
... they are different
... getting to a place where initdata is in the media, is a common format which is validatable
... is easier than getting messages from server are validatable
... those messages are entirely encrypted w/ a key that the app won't have a way
paulc: so it depends on how you get the initData ?
joesteele: no
... initData can be common-format, or proprietary format
... getting everyone to use common-format is easier problem to solve
... other thing
... in initialization-data portion
... where it talks about what it may contain
... one minor nit to pick w/ it, ddorwin and i have talked
... i may file a bug to make the change required
... right now, the text there requiring validating initialization data
... requires being able to validate that
... initially i thought there was no way
... but after browser vendor discussion
... validation may be minimal, but if that's ok
... it's up to browser vendor
markw: validation requirements to
put in place
... require that data must be validated
... in processes no-greater privs than rendering
... gives flexibility
... maybe UA validates
... maybe CDM does it (if it's reviewed)
<joesteele> +1 to that proposal
markw: ensures validation happens, but don't dictate where
paulc: i don't think URI has done anything about this?
markw: no progress i'm aware
of
... still, CSS side people or other media people + browsers
... from which we need input
paulc: ok
... on my list of things to followup / find someone to help
paulc: We will close this at the
F2F if no solution is provided.
... no proposal here
joesteele: i second
paulc: glenn said it was an
optimization
... ddorwin reduced priority
... we agreed on Oct 14 to resolve this
... wontfix/later?
ddorwin: LATER
paulc: objections?
jdsmith: makes sense
joesteele: no objection
paulc: ddorwin do that now
ddorwin: done
paulc: we'll skip -- probably last thing we do before LC
ddorwin: it has a formal objection
paulc: we don't need to deal w/
that until CR
... or we could change Process
Bug 25434 Remove unsupported informative text in Abstract regarding OOB communication.
paulc: This bug was re-opened after the Editors closed it. We will discuss at the F2F meeting.
[ hg server is broken ]
[ randomly ]
ddorwin: i'm in favor of moving
to git
... EME to be used to identify what's supported
... TAG stated that you send things through the application
... we can't enforce things if we can't control what goes through the UA
... this bug was opened claiming that the normative text doesn't enforce this
... this fixes this by additionally normally defining that you can't do out of band
... but i added an exception, individualization goes through the UA
... user clears id, you can do it again
... i added an exception for that
... debate over words, i've tried to clarify
paulc: status?
ddorwin: closed
paulc: CR, checklist -- later
paulc: David to update bug now
based on how MediaKey get created -- bug 25923.
... ddorwin, did you do the update?
... yes, you did in comment 2
ddorwin: some implementations
only support EME w/ MSE
... video.src=foo.mp4
... it doesn't work
... when we return it isn't supported
... there's no indication that it isn't supported, only w/ MSE
... maybe some TV type devices, won't put any effort in
... do we care?
... worth adding an extra attribute?
... how do we make default behavior correct?
... i'm turning into a pumpkin
MarkVickers: ddorwin mentioned
he's working on git
... and then commiting to hg
... seems like busywork
... can we let it stay in git?
paulc: continue to use bugzilla for bugs?
MikeSmith: as the person who got
stuck w/ maintaining the Hg server
... i'd like to get out of the Hg server
... you can move to github and keep using bugzilla
... maybe eventually you'd start using github issues
... but please do so as soon as possible
... i'll do the work to migrate you
paulc: as the rep of the company
that bought the hg server
... do i get the money back?
MikeSmith: we'll repurpose the server for a more useful thing for the world
paulc: ddorwin, make a proposal to move to github
acolwell: Aaron Colwell, MSE spec
editor
... I support using git instead of hg
paulc: we had a heartbeat
... that blew away the Streams object definition we were using
... first acolwell, do we have an MSE bug related to this?
... i know i had an action item
acolwell: i was planning to file
two bugs
... one to remove the existing text
... one to figure out a new way to integrate with the new version of the spec
paulc: appendStream() ?
... needs to be redefined?
acolwell: one path forward is to
completely remove it
... that didn't work out
... figure out a new way that's more natural
... to integrate w/ new Stream spec
... we could shoehorn, but it wouldn't be good
... Domenic 's spec
paulc: i expected that the w3c spec to tell me how do to things i was doing previously
adrianba: we talked about
this
... for a fair amount of time as part of WebApps WG meeting
... 1st, from a spec status perspective
... there was a heartbeat publication of WebApps
... that describes the objects in Domenic 's spec
... ReadableStreams, WritableStreams
... those are the things we care about
... points to Domenic 's spec @ whatwg
... part of discussion for future of that spec
... is Domenic is interested in potentially having foundational pieces of Streams spec
... independent of browsers, really JS language features
... being moved to TC39
... incorporated in discussions @ECMA
... caveat is that he's not sure if the group would adopt that
... Microsoft's position is that we're supportive of that
... the next question is how to update MSE spec to use the new way that Streams are exposed to the platform
... previously we just had a Stream object
... we wanted to keep the concept of adding data from a stream
... take a dependency in the CR draft w/ a note understanding that we'd need to update to the new spec
... in WebApps, we talked about a couple of different options
... this is what acolwell meant
... to integrate w/ the new approach to Streams
... it's very different
... one approach is ReadableStream w/ bytes, or ReadableByteStream
... we could do that and be done
paulc: reference would be to
Domenic 's current document
... w/ possibility that it might actually be an ECMA reference?
adrianba: i'd prefer to deal w/
technical aspect
... we could change appendStream to take a ReadableStream or ReadableByteStream
... call that good and move on
... but question is, whether that's really in the spirit of the new Stream API
... spectrum of things you might do beyond that
... in WebApps, we discussed "maybe that's good for now"
... and in v2 discuss changing things
... maybe change the MSE Stream API
... to expose a WritableStream API
... to let you build Pipes
... but there was a general consensus that it wasn't required
... given we've moved to CR
... called for implementations
... maybe this isn't the right time to do that
... that's a summary re: new [Streams] spec
... rewrite implementation to new design
... personally favoring small change rather than large change
paulc: your changes "2. small
change" "3. future change"
... eliminating "1. remove feature from MSE"
adrianba: we discussed #1 twelve months ago and decided it wasn't a good idea
<Domenic> I am willing to submit a pull request with updated text if that would help
paulc: we kept it w/ a reference
to the gone thing
... your preference is #2
adrianba: we discussed it twelve
months ago
... right now favor #2
... but i might be persuaded
acolwell: adrianba did a good job
of describing
... i'm in favor of 2
... less work for me, and implementations
... depends on how people feel about it not being as natural
... it would achieve the original intent of appendStream()
... from a platform perspective of everything hooking together, is this ok to have?
... it's kind of too late
paulc: can you re-iterate the two bugs?
acolwell: 2 bugs is if we take
option #1 path and then immediately do option #3
... #3 -- figure out something more natural
... adrianba is pro #2
... and i don't object severely
paulc: Domenic are you willing to
do that for option #2
... (or was that for #3?)
acolwell: if we take option #2, i
don't think we need Domenic
... it's really just changing implementations to use Promises
... two people have said option #2 is the way to go
paulc: we're in CR
... is there a bug for change #2
acolwell: i can file one
adrianba: i think Domenic was probably proposing option #3
markw: original intention of
putting this in here
... sounds like an optimization
<Domenic> yes, was proposing option 3
markw: media data doesn't need to
flow up to js and then down again
... but sometimes, it might not be an optimization
... we have an implementation that does that
... using ArrayBuffers
... but there's another reason
... Q to browsers, do browsers have an optimization
... if they don't, then we want option #3, but do it later
acolwell: i haven't looked at
what Chrome's implementation of the new stream api
... but based on the code for the old impl
... i wouldn't expect a big difference between old/new
... i don't think it really matters
jdsmith: in WebApps
... Domenic took an action to help us understand the capabilities of WritableStreams
... what specificaly we'd gain
... i think there's merit in embracing ReadableStreams
... how soon we'd want to pursue option #3
... how much we could optimize our impl
acolwell: when we implement a
WritableStream
... both appendBuffer and appendStream could maintain backwards compat w/ the API
paulc: markw was asking if there was merit in maintaining the current
jdsmith: speaking for IE
... we've spent effort in implementing current
... but i don't think we've spent much to optimize
... we actually don't believe migrating to ReadableStream is difficult
paulc: Domenic, sounds like we're
proposing is option #2
... redefine on top of ReadableStream/ReadableByteStream
... leave pending going to WriteableByteStream for a later version of the spec
Domenic: might be more awkward
for some consumers
... but even if you started w/ the current stream spec
... you might want appendStream anyway
paulc: so, acolwell, you'll do #2
Domenic: i'm glad you guys are
working to build on this
... i did similar w/ Promises
... i'm happy to help
... writing up how to use Streams in TAG,
... make pull requests
... etc.
paulc: we'll do this and then ask for your feedback
<MikeSmith> Open PRs for MSE tests
paulc: acolwell, you sent an
... i think your pull request to Chrome was accepted?
... and you submitted more tests?
... don't know offhand current status
... don't know if anyone else submitted
MikeSmith: Uchida
paulc: someone else submitting
tests
... hoping someone would know overall status
... if that was me, i don't know the answer
acolwell: that's the current
state
... i commented on all the other tests that were submitted
... most were included in my update
... i suggested waiving off a number since they were covered in my landing
... one-or-two not covered
... i'd like someone else from the TF to step up
... i know jerry-noble from Apple had TTT
paulc: this it the front end,
people submitting tests
... i don't believe we've started to construct an implementation report
... to tell us coverage of tests
... or results for implementations
... we went into CR in Jan
... and we haven't made much progress 10 months later
plh: someone needs to step up
acolwell: i'd prefer it not be
me
... we need understanding from chairs
... intent of providing Blink Tests
... was to get this started
... i'd like to see other implementers engaged
paulc: i guess that's not the kind of question between you and lunch
acolwell: i understand
paulc: i guess we need to find
more tests
... and find someone from outside the TF
<acolwell> timeless: The Blink tests are Chrome's tests
paulc: we've had 3 separate
submissions
... acolwell 's original blink tests
... independent tests that overlap
<plh>
paulc: acolwell 's second batch
that need to be reviewed
... no one has done analysis of those tests against MSE spec
... it isn't a small task
... you could look to darobin
... you can look at our DOM implementation report
... team members, plh heavily involved in WebPlatform testing
... alright, Cyril maybe you can help prune off items
... and then maybe we can find other resources
[ rubys recorded action in Media TF ]
<Zakim> MikeSmith, you wanted to comment
MikeSmith: not a great
situation
... we had a guy who went in, studied specification in enough detail
... put in several weeks of work
... writing testcases for your spec
... submitted the tests for review, many months ago
... and no one reviewed them
Cyril: i started reviewing them
MikeSmith: from his
perspective
... he's pretty frustrated
glenn: we'll get around to it
MikeSmith: several months
paulc: connection between
Pull-Request and MSE
... isn't obvious
MikeSmith: but i came to you
Cyril: critique system is hard to use
MikeSmith: i don't want to hand hold
paulc: MS volunteered to try to
... but the staff was reassigned
... to other work
... it's on the agenda
... we have at least one person stepping up
... work w/ Team, Cyril, myself
plh: answer how we take
... we have 13 pull-requests
... each is at least 100 lines of code
... i'm assuming you're not familiar w/ the testing system
... at least a full week of work
... 1-2 days to get into the code
... 2-3 days to go through the tests
... i'm assuming you're somehow familiar w/ the spec
... if not, it'll take you longer
Cyril: i have implemented MSE in
open source software
... i know a bit about the testing framework
... but it's so difficult finding which tests have been reviewed
... i wasn't aware of the Pull Requests
... where?
paulc: MikeSmith, that's the
point I was making
... let's do lunch
... pointer to pull-requests?
plh: we improved thanks to
jgraham
... the documentation
Cyril: i met jgraham in London in
August
... huge step in understanding
... if you want other people to help
... you want them to not have to meet jgraham directly
paulc: slope to climb
... glenn before lunch
glenn: plh, status of support of https: in webplatform tests?
plh: we have a pull-request for it
paulc: acolwell, i think if you
wanted to bring this up
... and your hope was to get a volunteer
... i think that actually happened (Cyril)
... maybe in 2-3 weeks we can schedule a test discussion on the MSE Tuesday call
... acolwell, please feel free to get Domenic 's help
acolwell: that's fine
paulc: recessed until 2pm
... darobin up then is DOM4 implementation / status
darobin: can we come back late?
paulc: let's try for 2pm
[ Lunch ]
<darobin> ://w3c.github.io/test-results/dom/less-than-2.html
s/i|||//
darobin: there are parts of the
spec that don't represent reality
... HTML5 not withstanding
paulc: i have two more press interviews on Monday
darobin: bz's objection was the
behavior of createDocument()
... if you create something that should be an xhtml document
... document has a type, either HTML, or xml
<paulc> Boris's objection:
darobin: the spec doesn't say if
an xml document should have type=xml
... you could create an XML document object with type = html
... if you create an xml document from the html element
... it creates an document object w/ type=html
... we tried to review the tests
... to see if interop/spec issue
... to see if it's just impls that haven't caught up
... no need to go through all tests
... if people want to contribute, we can talk about that
... some situations are things where browsers haven't caught up
... WebIDL -- nothing to fix in DOM, problems go away when impls catch up
... createNodeIterator
... so many errors that it impacts scrolling
... spec isn't 100% clear
... Firefox has a behavior no one else has
<darobin_> darobin has joined #html-wg
darobin: if you look at less than
two
... it's clear that the spec isn't clear
... the test follows Gecko's behavior
... no one else does
... spec probably needs to be clarified
... and the spec changed
... and then the others turn green
glenn_: doesn't mean it's correct
<plh>
darobin: you can pass three
things, one is a node filter
... it's exposed as a node filter, but the spec isn't clear how to construct that object
... it's fairly clear that the spec doesn't define how to construct it
... i think that's a spec bug
... that's like createElement
... and i'd like to remind people to discuss on www-dom@w3.org
... not public-html@
... if there's no bug, create a bug
... if there is, make sure there's a discussion on ML / in bug
... whereever annevk is happy
zcorpan_: you said the spec
doesn't define if createDocument should create Document w/ html
flag set/not
... but that isn't true
... the ED says ...
... "a document is assumed to be an xml document unless it's flagged as being an html document"
darobin: if you follow the spec
to the letter, you'll get clear behavior
... you have an XML Document interface, its flag could be set to html
zcorpan_: there's no API to create XML Document w/ html flag set
darobin: seems to be what chrome is doing
<zcorpan_>
darobin: if seems to be doing
zcorpan_: i pasted a link, and it seems to not be set
darobin: my tests were ...
... wrong case
... createDocument w/ html namespace
<zcorpan_>
<darobin_>
<darobin_>
<zcorpan_>
<zcorpan_>
darobin: the other thing is that
only gecko supports XMLDocument.load
... so we could kill that feature
paulc: we used Gecko as a legacy implementation to get test results?
darobin: Gecko is pretty
recent
... last time this was discussed... 3..5 years ago
... introduced by IE6? 5?
... Gecko emulated it
... 3..5 years ago, this had to be supported for compat
... then IE dropped it
... now, Gecko is the only one keeping it around
... so maybe we can drop thit
zcorpan_: the last two links test
namespaceuri instead
... that shows a difference in chrome
... document w/ null namespace+tagname
... createElement creates an element in null ns
... if you do it w/ an html element, you get html ns
... that's bz's issue
... that's a known bug/change
... it's where we wanted implementations to go
darobin: bz seemed to disagree w/ that direction
zcorpan_: my opinion is that we should push impls in that direction
darobin: we're trying to find problems to actually help
zcorpan_: i want it to go in this direction
darobin: discuss on list
... XMLDocument.load is an example
... bz said we needed it for compat
... but no one supports it
... if we can update and dropping it
... we now have much better results than 6 months ago
... nodeIterator wasn't there, and it found problems
... which is why i don't think we need to dig deep in meetings
... that's the plan
paulc: schedule?
... priority list?
darobin: good to get it done not too long from now, in November
plh: what are exact steps?
... to understand exact steps
... we need to identify what is important, and file bugs? start discussion?
darobin: same thing
... just a triage operation
paulc: the spec is in CR
darobin: if we fix this, it'd go back
paulc: do we want to run this on the new Process?
<scribe> [ new Process avoids needing LC ]
<rubys> ACTION: paulc prepare CfC concerning moving DOM4 to the new process [recorded in]
<trackbot> Created ACTION-250 - Prepare cfc concerning moving dom4 to the new process [on Paul Cotton - due 2014-11-07].
plh: nice to have a list of the failures that matter
paulc: triage list to ones we
want to investigate
... identify those that need to change the specification
darobin: no cases we're sure
of
... createDocument thing thought spec should match reality
... but there's pushback
paulc: i'll hold my CfC until you
show me at least one
... i'd like to refer to that in my CfC
... quantify, 10 failures or 100?
darobin: like 30 something
[ ignoring IDL ones ]
darobin: 30 ... features
... the dom spec has a file per feature
plh: you have 1100 failures
total
... less than two, we might want to look at complete-fails instead
... half from nodeIterator
... quarter from WebIDL
... 250-300 individual tests failing
darobin: good spec, decent interop
Josh_Soref: have you run a spell checker against your spec?
darobin: perhaps not
... different kind of lies
... lies, damn lies, spelling errors
paulc: steps
... look at failures
... determine significance
... determine spec/tests
... consider moving to new Process if we need to make a breaking change to CR
... get early feedback from bz
... discussion on www-dom@w3.org
... is that all?
darobin: yeah
<inserted> ExtensionSpecifications
paulc: Travis raised this
... EME/MSE, under dev in Media TF
... sourceset= and <picture> should have been moved down
... "former extension specs"?
rubys: yes, should have
been
... moved
paulc: Public Identifiers for entity resolution in XHTML
<scribe> ... no progress made
UNKNOWN_SPEAKER: Form HTTP Extensions
<scribe> ... no progress made
UNKNOWN_SPEAKER:
ACTION: chairs to contact proponents to ask
what they plan to do w/ the specs
... Polyglot Markup: A robust profile of the HTML5 vocabulary
... it's in CR
... afaik, no one has submitted any TestCases
... Leif H. Silli promised to do that, even before CR
<rubys> ACTION: paulc to contact public identifiers and Form HTTP Extension proponents to ask what they plan to do w/ the specs [recorded in]
<trackbot> Created ACTION-251 - Contact public identifiers and form http extension proponents to ask what they plan to do w/ the specs [on Paul Cotton - due 2014-11-07].
UNKNOWN_SPEAKER: chairs should look at what editors of spec say
plh: look at status of editors themselves?
paulc: yes
... Leif is very hard to contact
... pretty non-responsive to email
MikeSmith: he's been away
paulc: MikeSmith, if you have backchannel
SteveF: i tried to contact him
paulc: i know he physically moved residences
plh: is Eliot Graff still an editor?
<rubys> ACTION: paulc - Contact polyglot proponents to ask what they plan to do w/ the spec [recorded in]
<trackbot> Created ACTION-252 - - contact polyglot proponents to ask what they plan to do w/ the spec [on Paul Cotton - due 2014-11-07].
paulc: HTML JSON form
submission
... whose is this?
darobin: mine
paulc: status
darobin: large amount of
developer interest
... no vendor interest
... traditionally vendors have no interest in developer ergonomics
plh: a few vendors around the table
darobin: stays in limbo
zcorpan_: are there bugs filed on browsers asking them to implement
darobin: i'm not aware of
... i could do that if you think it'd be the most helpful
zcorpan_: it's sometimes a working approach
darobin: i'll take an action item
paulc: ED is the most recent version?
<rubys> ACTION: darobin to file bugs on implementors re: HTML JSON form submission [recorded in]
<trackbot> Created ACTION-253 - File bugs on implementors re: html json form submission [on Robin Berjon - due 2014-11-07].
darobin: i fixed a bunch of bugs
before publishing
... a few since, nothing that would justify going for a WD at this point
paulc: longdesc
... - A11y TF
... latest news:
<paulc> Longdesc CFC to move to PR:
paulc: link to CfC i sent seconds
ago
... that CfC closes next Friday
... HTML5/HTML4 differences document
... zcorpan_ 's document
<paulc> HTML5 to HTML4 differences CfC to WG Note:
paulc: we sent CfC to publish
this document as a WG Note
... ideally we did it at the same time as publishing HTML5
... this closes Friday as well
... that closes off the work
... we should thank zcorpan_ for tracking the progress of HTML5 backwards against HTML4
... darobin has an action item to update the Landscape document
... recommendation of Editors+Chairs was to archive this as a WG Note
... both of those CfCs are open now
... Anything else we need to look at?
... SteveF, Text Alternatives document
... it was supposed to be published before the meeting
... what happened?
SteveF: yes, it got published
<plh>
plh: WebPerf WG published
FPWD
... extending rel= to preload/preconnect
... wanted to raise it to the WG
paulc: in spirit of work
yesterday
... when a WG like that asks this WG to review
... it would be really good to ask a pointed question
... so start leading by example here
... so if someone from WebPerf could send pointer to draft
... w/ pointer to concerns
plh: i called it an ad more than
anything else
... we aren't saying it's READY
... not asking for a formal review
Cyril: this spec is under?
plh: WebPerf WG
... impls in at least 2 browsers
... experimental/deployed impls
... we expect that spec to move relatively fast
rubys: there are implementers?
plh: yes
... implementation won't be an issue for that spec
... it might be shipped in stable browsers in 6 months
... at least shipped in a stable browser by then
paulc: anyone else have any other Extension specs inside/outside WG?
<Cyril>
Cyril: HTML Sourcing inband
tracks
... as w/ plh, it's a WIP
... not final yet
... i'd like to ask people, in particular browser vendors, to review it
... if they could join the CG, that'd be helpful
... in HTML5 you can do src=mp4 file or
... mpeg-dash manifest
... if you want to build apps relying on tracks from the resource
... in an interoperable way
... we need a spec for that
... giving guidelines, normative text, for how that should be exposed
... Track has id property
... mp4 tracks have an id
... can we rely on them being the same?
... covers mp4, ogg, WebM, mpeg-dash, ...
... requests for HLS as well
... "Media Resource In-band Tracks Community Group"
... labels, languages, would be properties of tracks
<paulc> See
paulc: does it relate to this material in html5?
Cyril: yes it does
... i'll take it that it should have an introduction
... pointing to that
paulc: yes, that'd be good
<Zakim> timeless, you wanted to ask why "Media Resource In-band Tracks Community Group" isn't in document
Cyril: and that it should identify the CG
paulc: darobin, didn't we give information about resources into html5
darobin: a registry, yes
paulc: similar thing
... can you whip up the ToC
Cyril: that was only applicable to MSE
paulc: no, it was in HTML5 as
well
... we went to the Director w/ a question about non-normative references to things that sound like normative text
... you're right there are companion documents
... which say MUST
... but the origin pointer were non-normative
... If you have material that would be better for developers to see directly from html5
... if we could point directly, instead of backwards
darobin: if you look at html5
spec
... there are parts that link to inband tracks
<darobin> search for [INBANDTRACKS]
<Cyril>
paulc: so this document is
already referred to from html5
... yep
Cyril: what words should we
use?
... MUST?
paulc: doesn't matter
... if you want to use rfc2119
... MUST
... we have a judgement from the Director
... that as long as the reference is non-normative
darobin: yes, write it like a real spec
rubys: yes
Cyril: and if someone claims
conformance to HTML5 + INBANDTRACKS
... then rfc2119 must applies
paulc: pattern in the past has
been to have a F2F in Spring May/April
... and then TPAC
... next year, TPAC is this week in Saporo Japan
... Chairs/Team were looking for hosts
... previously, PayPal hosted a couple of times
<rubys>
paulc: Microsoft hosted it in
Silicon Valley
... we usually hosted in Silicon Valley, we get better attendance
plh: difficulty
... we like to get WebApps to meet at the same time
... and when the two get together, others like to meet there then too
... Charter of this group runs out in June
... if you tell me in March you want to meet in April, not going to happen
paulc: when I made the
arrangements, it was hard 4 months in advance
... 2+ rooms for 5 days
... not necessarily easy to find
... finding someone to Host+Pay is equally hard
... I don't want to wait until TPAC to meet
... in particular
... i'll be the person to throw a rock at
... if we don't meet
... and I'm concerned about attendance @TPAC
... there's movement for January for Media TF meeting
... many of us have budgets
... we need to think about it
... I'd generally say yes
rubys: anyone want to volunteer
jcdufourd: we might be able to host
Cyril: in Paris
... France
jcdufourd: we're a teaching
institution
... we have trimesters
... school breaks around Christmas, Easter
... HTML meets Thu/Fri
... Wed, other groups piggyback
... or HTML meets Mon, Tue
... WebApps meets later
... sometimes they're more realistic on who stays Fri
... at least those two groups
... could be just four days
... in past, WebCrypto/WebAppSec
... because they want to overlap
Cyril: no problem, we've hosted hundreds
rubys: Paris in April doesn't sound bad
plh: AC meeting is beginning of
May
... some people would like to have that meeting the week before/after
paulc: i think you've found one
rubys: May 5-7 AC meeting in Paris, France
Cyril: i'll take action to confirm availability
paulc: give us an offer
... Canadians will bring beer
plh: how late can you book those
rooms?
... what would you recommend?
jcdufourd: reserve them now for both dates
paulc: high cost in losing
... not a high cost in giving them back
plh: now i have to ask other WGs
jcdufourd: room for 20 people?
plh: I need 1 rooms 4 days, 50 people
jcdufourd: that's difficult
... some rooms are teach classrooms, less comfortable, forward oriented, fixed tables
plh: we try to limit attendance
of other WGs
... but i get slapped
... one room is certain
... in the past, i don't want them to meet, they insisted
paulc: plh, AC meeting is Tue-Thu
jcdufourd: Jean-Claude Dufourd
paulc: no complaints about Paris
in spring
... anything else?
plh: none from me
paulc: round of applause for Josh_Soref
[ Applause ]
paulc: thank you
<joesteele> +1 -- Josh you are awesome
<rubys> +1
<myakura> +1
paulc: I know i'll benefit from a
good minutes
... thanks to W3C for arranging / hosting us here at the Marriott
[ Adjourned ]
trackbot, end meeting
This is scribe.perl Revision: 1.138 of Date: 2013-04-25 13:59:11 Check for newer version at Guessing input format: RRSAgent_Text_Format (score 1.00) Succeeded: s/Weekly Teleconference/F2F - TPAC2014/ Succeeded: s/rubys1/rubys/G Succeeded: s/has the meeting started or is it unminuted at this time?// Succeeded: s/AAA: aaa/Cyril: Cyril Concolato, Institut Telecom, interested in the Media TF work/ Succeeded: s/EEE: eee/zcorpan: Simon Pieters, Opera Software/ Succeeded: s/BBB: bbb/kurosawa: Takeshi Kurosawa, Mitsue-Links/ Succeeded: s/1pm/11am/ Succeeded: s/30m/30am/ Succeeded: s/darobin_:/darobin:/G Succeeded: s/ darobin_/ darobin/G Succeeded: s/ddorwin1/ddorwin/G Succeeded: s/.../../ Succeeded: s/Areas/ARIA Roles/ Succeeded: s/Areas/ARIA Roles/ Succeeded: s/.../paulc:/ Succeeded: s/RRR/how we maintain stuff/ Succeeded: s/CCO/CC0/g Succeeded: s/placs/places/ Succeeded: s/grimmaces/grimaces/ Succeeded: s/res/ress/ Succeeded: s/lik/like/ Succeeded: s|topic: Accessibility w/ PF WG|topic: Scheduling| Succeeded: s/Harrito/Haritos/ Succeeded: s/ibl/ible/ Succeeded: s/shepazu_/shepazu/G Succeeded: s/foreignContent/foreignObject/ Succeeded: i|where is that joining defined|-> Data-Driven Documents Succeeded: s/ent/eign/ FAILED: s/forentObject/foreignObject/ Succeeded: s|s/forentObject/foreignObject/|| Succeeded: s/we'd like to have <svg:html>/we'd like to have an <html> element in SVG/ Succeeded: s/virtual/logical/ Succeeded: s/Visio/Visio - i worked on them/ Succeeded: i|we met|Topic: ComputedRole/ComputedLabel Succeeded: s/John Gunderman/Jon Gunderson/ Succeeded: s/ack me// Succeeded: s/jon:/jongund:/ Succeeded: s/ARAI/ARIA/ Succeeded: s/spec/page/ Succeeded: s/Process/Process TF is encouraging review requests to identify the areas which would be interesting to reviewers/ Succeeded: s/minutes/minutes from WebApps/ FAILED: s|Editing minutes from HTML WG:-> "selection, editing and user interactions" from WebApps WG meeting| Succeeded: s|-> "Editing" from WebApps WG meeting| FAILED: s|-> "HTML Modularisation" slides| Succeeded: s/that/that (Extensible Web Manifesto)/ Succeeded: s/[ Modularisation ]/[ The Unix Philosophy ]/ Succeeded: s|-> Locale-based forms in HTML pages| Succeeded: s|-> HTML5 TimeZone| Succeeded: s/QQQ/Richard/ Succeeded: s/Richard/r12a/ Succeeded: s/tzivia/tzviya/ Succeeded: s/BBB/Tzviya Siegman/ Succeeded: s/AAA/Dpub Roles/ Succeeded: s/../.../ Succeeded: s/+q/q+/ Succeeded: s/mhakkinen/skramer/ Succeeded: s/skramer/dauwhe_/ Succeeded: s/say/se/ Succeeded: s/rel=/role=/ Succeeded: s/Dpub Roles/Dpub Roles and footnotes/ Succeeded: s/Sodecky/Sadecki/ Succeeded: s/Rick Am/Rik Cabanier/ Succeeded: s/spec/publication/ Succeeded: s/drawfocus/drawfocus:ifneeded/ FAILED: s/Sadocky/Sadecki/G Succeeded: s/jonny diggs/joanie diggs/G Succeeded: s/bug fixed in webkit/bug fixed in chrome/ FAILED: s/Rick Am/Rik Cabanier/ Succeeded: s/CCC/Hachette Livre/ Succeeded: s|... we're done w/ the api|| Succeeded: s|... we're done w/ algorithm|| FAILED: s|... we're done w/ the api|| Succeeded: s|... we're done w/ the api|| Succeeded: s/|||// Succeeded: s/fantasia/fantasai/ FAILED: s/fantasia/fantasai/ Succeeded: s/the spec templates/the spec tamplates, particularly reducing boilerplate in status section/ Succeeded: s| s/fantasia/fantasai|| FAILED: s|s/fantasia/fantasai|| FAILED: s/s|||// Succeeded: s|s/fantasia/fantasai|| Succeeded: s/not just LC, but developing your WD/want WGs to experiment with WD process that works for you, not just one-size-fits-all LC process/ Succeeded: s/we can communicate/we can communicate better the status of the document, expected timelines, and what kinds of reviews are solicited/ Succeeded: s/joanie diggs/joanie diggs/ Succeeded: i/XYZ/Purpose of removing LC is to allow WG to break down review requests in more appropriate ways and help to solicit reviews earlier in the process (by not having LC be a fixed point in process where everyone comments) Succeeded: s/duct/ducts/ Succeeded: s/scope=/scoped=/ Succeeded: s/Yue_Min/Ping Wu/ Succeeded: s/Ping Wu/Ping_Wu/ Succeeded: s/pass-/parse-/ FAILED: s/pass-layout-pass-layout/parse-layout-parse-layout/ Succeeded: s/pass-/parse-/ FAILED: s|s/pass-layout-pass-layout/parse-layout-parse-layout/|| Succeeded: s/q=// Succeeded: s/jcraig/jgraham/ FAILED: s/WWW/Wu Ping/ Succeeded: s/crack/correct/ Succeeded: s/MMM/Wu_Ping/ Succeeded: s/crack/correct/ Succeeded: s/maybe we discussed/we'll discuss/ Succeeded: s/?P6, (SIP caller?) please identify yourself// Succeeded: s/s|||// Succeeded: s/s|||// FAILED: s|s///|| Succeeded: s|s///|| Succeeded: s/s|||// Succeeded: s/topic: EME Bugs// Succeeded: i/EME/topic: EME Bugs Succeeded: s/AAA/jdsmith/ Succeeded: s/Bill Hofmann/Bill_Hofmann/ Succeeded: s/Topic: Agenda for Friday// Succeeded: s/Mark Watson/Mark_Watson/ Succeeded: s/Topic: Agenda for Friday// Succeeded: s/Topic: Agenda for Friday// Succeeded: i/2014/Topic: Agenda for Friday Succeeded: s/people/people we are losing/ Succeeded: s/Glenn Adams/Glenn_Adams/ Succeeded: i/EME/Topic: EME Bugs Succeeded: s/XXX/plinss/ Succeeded: s/XXY/slightlyoff/ Succeeded: s/Dominic/Domenic/ Succeeded: i/do you want to introduce/Topic: Domenic joins the bridge Succeeded: s/WyPlay/Widevine/ Succeeded: s/to which they have rights/to which they don't have rights/ Succeeded: s/ECM/CDM/ Succeeded: s/Pal/Pierre/ Succeeded: s/keep your proprietary/keep your proprietary robustness solution and business arrangements/ Succeeded: s/an open thing too/open message formats/ Succeeded: s/folliet/foliot/ Succeeded: s/harry/hsivonen/ Succeeded: s/Wednedsayd/Wednesday/ Succeeded: s|topic: Bug 27093 Support for proprietary/system-specific formats in initData should be discouraged/deprecated|| Succeeded: s/MSPlay/MS PlayReady/ Succeeded: s/personsalization/personalization/ Succeeded: s/Story/Storage/ Succeeded: s/tep/step/ Succeeded: s/pal: the specific concern/pal, the specific concern/ Succeeded: s/stuff which are encrypted already/stuff which are encrypted already, per-origin, clearable/ FAILED: s/biz/bis/ Succeeded: s/BIZ/BIS/ Succeeded: s|s/biz/bis|| Succeeded: s/Not: /Note: / Succeeded: s/is strawman/as strawman/ Succeeded: i/48/[ Examples of what github can look like ] Succeeded: i|pre|-> "Bug 26776 comment 9" Succeeded: s/form/from/ Succeeded: i|you|-> "Bug 26372" - Report issues/events not related to a specific method call Succeeded: s/TAG/annevk/ Succeeded: s/fic/fics/ Succeeded: s/IETF/ISO/ Succeeded: i|Jerry|-> "Comment 13" Jerry Smith 2014-10-30 22:32:25 UTC Succeeded: s/cae/case/ Succeeded: s/keyReleae/keyRelease/ Succeeded: s/RRR/the KeySystem specific initData/ Succeeded: s/load-by-ID/load-and-use-to-play-by-ID/ Succeeded: s/ing/ying/ Succeeded: s/ext/est/ Succeeded: s/MarkVickers_/MarkVickers/G Succeeded: i|bug|-> "Comment 14" Jerry Smith 2014-10-31 15:21:33 UTC Succeeded: s/what we/do what you/ Succeeded: s/close/leave/ Succeeded: s/bug/bug closed/ Succeeded: s/timeless/scribe/ Succeeded: s/diffeent/different/ Succeeded: s/..../.../ Succeeded: s/trackbot, start meeting// Succeeded: s/item #24// Succeeded: s/arepotentially/are potentially/ Succeeded: s/scribe:/scribe: timeless/ Succeeded: s/i/i'll give you feedback/ Succeeded: s/markw_/markw/G Succeeded: s/add new text/figure out a new way to integrate with the new version of the spec/ Succeeded: s/of tha/of that/ Succeeded: s/were po/we're proposing is option #2/ Succeeded: s/Uchira/Uchida/ Succeeded: s/er/ere/ Succeeded: s|AAA|DOM4 implementation / status| Succeeded: s|topic: DOM4 implementation / status|| Succeeded: i|http|topic: DOM4 implementation / status| Succeeded: i|http|topic: DOM4 implementation / status Succeeded: s/http// Succeeded: s|topic: DOM4 implementation / status|| FAILED: s/i|||// Succeeded: i|Travis|-> ExtensionSpecifications Succeeded: s/leif/Leif H. Silli/ Succeeded: s/u/us/ Succeeded: s/ing/ing rel= to/ Succeeded: s/in REC/shipped in stable browsers/ Succeeded: s/is/is beginning of/ Succeeded: s/XXX/JC Dufourd/ Succeeded: s/JC Dufourd/jcdufourd/ Succeeded: s/XXX:/jcdufourd:/ Succeeded: s/XXX:/jcdufourd:/ Succeeded: s/XXX:/jcdufourd:/ Succeeded: s/XXX:/jcdufourd:/ Succeeded: s/tues/utes/ Found Scribe: timeless Inferring ScribeNick: timeless Found Scribe: joesteele Inferring ScribeNick: joesteele Found Scribe: timeless Inferring ScribeNick: timeless Found Scribe: joesteele Inferring ScribeNick: joesteele Found Scribe: timeless Inferring ScribeNick: timeless Scribes: timeless, joesteele ScribeNicks: timeless, joesteele WARNING: Replacing list of attendees. Old list: rubys paulc timeless MikeSmith darobin benjamp Baidu Baidu_AC_rep Yue_Min New list: BobLund paulc rubys timeless joesteele darobin Domenic ddorwin Aaron_Colwell Mark_Vickers +1.408.536.aaaa Default Present: BobLund, paulc, rubys, timeless, joesteele, darobin, Domenic, ddorwin, Aaron_Colwell, Mark_Vickers, +1.408.536.aaaa Present: +1.408.536.aaaa Aaron_Colwell AdamB BobLund Cyril_Concolato Domenic Josh_Soref Mark_Vickers Sam_Ruby darobin ddorwin joesteele paulc plh rubys timeless David_Dorwin Erika_Navara Adrian_Bateman Shane_Stevens Ben_Peters Addison_Phillips Bill_Hofmann hober Mark_Watson igarashi MikeSmith k_takabayashi Tatsuya_Igarashi Glenn_Adams Peter_Linss Yves_LAfon Agenda: Found Date: 30 Oct 2014 Guessing minutes URL: People with action items: - cfc concerning contact darobin dom4 moving paulc polyglot prepare proponents robin WARNING: Possible internal error: join/leave lines remaining: <darobin_> darobin has joined #html-wg <darobin_> darobin has joined #html-wg <darobin_> darobin has joined #html-wg WARNING: Possible internal error: join/leave lines remaining: <darobin_> darobin has joined #html-wg <darobin_> darobin has joined #html-wg <darobin_> darobin has joined #html-wg[End of scribe.perl diagnostic output] | http://www.w3.org/2014/10/30-html-wg-minutes.html | CC-MAIN-2018-39 | refinedweb | 33,492 | 77.74 |
Files and Directories in Java | Directory Structure
Created Nov 11, 2011
A directory structure for testing
For testing our programs we need a simple directory structure, with a few files and a few directories. Something along the lines of this:
- Figure 1 -
Here we have two files in "Dir-A", and one in each of the other two directories. If we run "Test1" above with the parameter "c:\Dir-A" we get this output:
Dir: c:\Dir-A Dir: c:\Dir-A\Dir-B Dir: c:\Dir-A\Dir-B\Dir-C File: c:\Dir-A\Dir-B\Dir-C\File C.txt File: c:\Dir-A\Dir-B\File B.txt File: c:\Dir-A\File A1.txt File: c:\Dir-A\File A2.txt
The output seems to be correct, but is of course not as nice as the graphical result in Figure 1.
Let's stop for a while and consider what could be improved in the current solution. First of all the output from the "list" method could be more readable, maybe by using some kind of indentation like in the graphical view. This could be achieved by adding a "level" parameter to the "list" method which is increased by one for every recursive call to "list". We could then indent each line for example 2 times "level" spaces. At the same time we could omit the path value. This would give this output:
Dir: Dir-A Dir: Dir-B Dir: Dir-C File: File C.txt File: File B.txt File: File A1.txt File: File A2.txt
Much better, but why tie up the solution to delivering the output only to System.out? We could have a much more generic solution if we define a couple of methods that contain the implementation of the output formatting and have them store the output in a member variable in the class. A get-method can be used to retrieve the final, formatted string.
Coding a more general solution
I'll sketch this solution here (the new code is marked with bold):
public class MyFileStructure{ private String dirname; private MyDir mdir; protected String result; public String getResult() { return result; } . . . /* * Display the name of the file on System.out */ protected void outFile(MyFile f, int level) { String name = f.getName(); result += repeat(" ",2*level) + "File: " + name + "\n"; } /* * Display the name of the directory on System.out */ protected void outDir(MyDir d, int level) { String name = d.getName(); result += repeat(" ",2*level) + "Dir: " + name + "\n"; } /* * Close display of the directory */ protected void outEndDir() { } public void list() { if (mdir == null) { System.out.println("Not a valid directory"); return; } result = ""; outDir(mdir, 0); list(mdir, 0); outEndDir(); } private void list(MyDir m, int level) { level++; Vector md = m.getDirs(); for (int i = 0; i < md.size(); i++) { MyDir d = (MyDir)md.elementAt(i); outDir(d, level); list(d, level); // recursive call outEndDir(); } Vector mf = m.getFiles(); for (int i = 0; i < mf.size(); i++) { MyFile f = (MyFile)mf.elementAt(i); outFile(f,level); } } }
The complete MyFileStructure also includes a utility method "repeat".
The test program will now have to write the results to System.out, so we must add this line to the program "Test1":
System.out.println(mf.getResult()); | http://www.jguru.com/print/article/core/directory-structure.html | CC-MAIN-2016-36 | refinedweb | 539 | 66.23 |
Created on 2020-01-30 15:11 by vstinner, last changed 2020-06-20 08:33 by larry. This issue is now closed.
Copy of an email received on the Python Security Response team, 9 days ago. I consider that it's not worth it to have an embargo on this vulnerability, so I make it public.
Hi there,
I believe I've found a denial-of-service (DoS) bug in
urllib.request.AbstractBasicAuthHandler. To start, I'm operating on some
background information from this document: HTTP authentication
<>. The bug
itself is a ReDoS <> bug
causing catastrophic backtracking. To reproduce the issue we can use the
following code:
from urllib.request import AbstractBasicAuthHandler
auth_handler = AbstractBasicAuthHandler()
auth_handler.http_error_auth_reqed(
'www-authenticate',
'unused',
'unused',
{
'www-authenticate': 'Basic ' + ',' * 64 + ' ' + 'foo' + ' ' +
'realm'
}
)
The issue itself is in the following regular expression:
rx = re.compile('(?:.*,)*[ \t]*([^ \t]+)[ \t]+'
'realm=(["\']?)([^"\']*)\\2', re.I)
In particular, the (?:.*,)* portion. Since "." and "," overlap and there
are nested quantifiers we can cause catastrophic backtracking by repeating
a comma. Note that since AbstractBasicAuthHandler is vulnerable, then both
HTTPBasicAuthHandler and ProxyBasicAuthHandler are as well because they
call http_error_auth_reqed. Building from the HTTP authentication document
above, this means a server can send a specially crafted header along with
an HTTP 401 or HTTP 407 and cause a DoS on the client.
I won't speculate on the severity of the issue too much - you will surely
understand the impact better than I will. Although, the fact that this is
client-side as opposed to server-side appears to reduce the severity,
however the fact that it's a security-sensitive context (HTTP
authentication) may raise the severity.
One possible fix would be changing the rx expression to the following:
rx = re.compile('(?:[^,]*,)*[ \t]*([^ \t]+)[ \t]+'
'realm=(["\']?)([^"\']*)\\2', re.I)
This removes the character overlap in the nested quantifier and thus
negates the catastrophic backtracking.
Let me know if you have any questions or what the next steps are from here.
Thanks for supporting Python security!
--
Matt Schwager
I added this vulnerability to the following page to track fixes in all Python supported branches:
CVE-2020-8492 has been assigned to this vulnerability:
Isn't this a duplicate of bpo-38826 ?
> Isn't this a duplicate of bpo-38826 ?
Oh right. I marked it as a duplicate of this issue.
bench_parser.py: Benchmark for AbstractBasicAuthHandler.http_error_auth_reqed().
Instead of
repeat_10_3 = 'Basic ' + ', ' * (10 ** 3) + simple
in the benchmark, try
repeat_10_3 = 'Basic ' + ', ' * (10 ** 3) + 'A'
Ooooh, I see. I didn't measure the performance of the right header. I re-run a benchmark using the HTTP header (repeat=15):
header = 'Basic ' + ', ' * 15 + 'A'
Now I see a major performance difference. Comparison between master ("ref") and PR 18284 ("fix"):
Mean +- std dev: [ref] 88.9 ms +- 2.4 ms -> [fix] 17.5 us +- 0.7 us: 5083.23x faster (-100%)
So the worst case is now way faster: more than 5000x faster!
It's even possible to go up to repeat=10**6 characters, it still takes less than 1 seconds: 412 ms +- 19 ms.
On the master branch, repeat=20 already takes around 3 seconds... The slowdown is exponential with repeat increase.
New changeset 0b297d4ff1c0e4480ad33acae793fbaf4bf015b4 by Victor Stinner in branch 'master':
bpo-39503: CVE-2020-8492: Fix AbstractBasicAuthHandler (GH-18284)
New changeset ea9e240aa02372440be8024acb110371f69c9d41 by Miss Islington (bot) in branch '3.8':
bpo-39503: CVE-2020-8492: Fix AbstractBasicAuthHandler (GH-18284) (GH-19296)
New changeset b57a73694e26e8b2391731b5ee0b1be59437388e by Miss Islington (bot) in branch '3.7':
bpo-39503: CVE-2020-8492: Fix AbstractBasicAuthHandler (GH-18284) (GH-19297)
New changeset 69cdeeb93e0830004a495ed854022425b93b3f3e by Victor Stinner in branch '3.6':
bpo-39503: CVE-2020-8492: Fix AbstractBasicAuthHandler (GH-18284) (GH-19304)
New changeset 37fe316479e0b6906a74b0c0a5e495c55037fdfd by Victor Stinner in branch '3.5':
bpo-39503: CVE-2020-8492: Fix AbstractBasicAuthHandler (GH-18284) (#19305) | https://bugs.python.org/issue39503 | CC-MAIN-2020-45 | refinedweb | 627 | 50.02 |
twitcher 1.7.1
A tool for watching Zookeeper nodes.
=== Twitcher ===
================
1. License
2. Overview
3. Installation
4. Configuration Language
4.1 Examples
4.2 Things to Avoid
5. Known Issues
6. Future Features
7. Change Log
1. License
==========
This software is licensed under the Apache 2.0 license. Please see LICENSE
in the top level of this git repository for more information.
2. Overview
===========
Twitcher is a minimal tool used to run scripts when a znode in ZooKeeper
changes. The intent is to allow various system tasks to take place on a
watched model rather than via polling.
The best description of Twitcher is to highlight an example that it solves
very well. Lets assume we are facing a problem where we need a single git
repository to be checked out and up to date on 100 machines in a cluster. The
typical solution to this is to add a cron job that performs a git pull every
minute. This can be problematic as your git server has to endure the load of
100 servers performing a pull every minute. You can configure Twitcher on all
machines to watch /git/head on your ZooKeeper instance. When that znode
changes Twitcher can run git pull. Add a post-commit script in your main
git repository that pokes that file and you will be able to fetch updates
within few seconds of a commit on all machines while not requiring constant
fetching when no changes are being made.
3. Installation
===============
The default installation of Twitcher places the twitcher binary (bin/twitcher)
in /usr/sbin and the twitcher module (twicher/*) in the site-packages
directory which is often /usr/lib/python2.6/sites-packages/twitcher.
The configs are read recursively from /etc/twitcher while twitcher is running.
Note that Twitcher uses inofity to update when files change so it can
automatically reload them. This is used to allow quick adding and removing
of configs without restarting the server binary. If a config fails to parse
then it will not be updated in the running binary and a log message will be
written.
By default Twitcher uses syslog under daemon as the default logging method.
4. Configuration Language
=========================
The configuration language for Twitcher is actually just python. Each
configuration must register a znode, and an action for each watch it wants.
This is done via a RegisterWatch function which takes several arguments.
RegisterWatch(): Creates a watch that will run a script when a Zookeeper node
is updated.
znode: This is the znode in ZooKeeper that is to be watched.
action: This is a function or lambda that will perform an action when
the znode is modified. The most common use here is to call Exec()
which is a function documented later.
pipe_stdin: If True then the contents of 'znode' will be piped to the stdin
of the processes running action. Default is True.
run_on_load: If True then the action will be executed when Twitcher starts.
Without this your action may miss updates.
The default is True.
run_mode: This defines how Twitcher will react when 'znode' is updated
while it is running 'action' for a previous update. The optional
modes are:
QUEUE: This will queue the watch until the currently running
'action' finishes, then run 'action' with the most
recent contents. If several watches are received while
'action' is running then only the last update will
be executed.
DISCARD: Ignore the update, don't run the script, but
re-register the watch.
PARALLEL: Run the script in parallel for every update received.
The default run mode is QUEUE.
uid: The user id to run the process as (string or int). The default is to
run as root.
gid: The group id to run the process as (string or int). The default is to
run as root.
notify_signal: This is the signal that will be send to the spawned
process that is currently running when a new update has
been received. By default this is not used, and it will only
work if the run_mode is QUEUE.
timeout: The number of seconds before any spawned process should be sent
a SIGTERM. Five seconds later the process will be sent a SIGKILL.
description: This is a text description of the watch which will be used
for logging. The default is to name watches after the file
they are configured in.
Exec(): Returns a lambda that will execute a given command when run.
command: If this is a string then the command will be invoked in a
shell interpreter. If its a list then it will be executed
exactly as specified.
By default the configuration files should be placed in /etc/twitcher and
should use an extension of ".twc".
4.1. Examples
=============
In this example config a node called '/twitcher/example1' will be watched for
updates, and when it changes it will execute
"date >> /tmp/twitcher_example1.out".
RegisterWatch(
znode='/twitcher/example1',
action=Exec('date >> /tmp/twitcher_example1.out')
)
As another example we can run a python function rather than executing a
command. For this example we will execute the function example2() every time
'/twitcher/example2' is updated.
def example2():
open('/tmp/twitcher_example2.out', 'w').write('testing')
RegisterWatch(
znode='/twitcher/example2',
action=example2
)
Keep in mind that the action function is run in a process that has been forked
off from the main Twitcher instance. As such the following example
DOES NOT WORK AS EXPECTED. The output will always be 1 since the increment
happens in the child process which exits after doesnotwork() finishes.
x = 0
def doesnotwork():
global x
x += 1
open('/tmp/twitcher_badexample.out', 'w').write(x)
RegisterWatch(
znode='/twitcher/doesnotwork',
action=doesnotwork
)
4.2 Things to Avoid
===================
Any action run by Twitcher is expected to by idempotent. Since the script may
be executed at any time and can be triggered rapidly it is expected that
each script does basic health and sanity checking before performing expensive
or destructive actions.
Even if the script is in QUEUE mode there is a possibility that it may be run
twice. If Twitcher is restarted while the script is running it will then
restart the script when Twitcher restarts which leaves two running at the
same time. In order to prevent this your script should use file based sigil
or other method to verify exclusivity.
5. Known Issues
===============
None at the moment.
6. Future Features
==================
Failure handling on the child process: Allow the config to specify what should
be done in the case where the script fails (returns non zero). Some examples
include "retry x times" "fail but keep watch" "fail and stop watching"
7. Change Log
=============
Release 1.7.1
2014/03/19: Integrated wickman and jtrosby's improvements into the code base.
Release 1.7.0
2014/03/19: No signifigant code changes but major changes to the delivery
and build structure.
Release: 1.5
2010/11/08: Make connection re-establish all existing watches.
Release: 1.4
2010/10/25: Fix client session expiration recovery.
2010/8/3: Documentation fixes.
Release: 1.3
2010/8/2: Added notify_signal and timeout support and fix a few bugs.
Release: 1.2, Open source under the Apache 2.0 license.
2010/7/15: Added uid/gid support
Release: 1.1
2010/6/24: Fixed a bug that allowed child processes to get ignored forever.
Release 1.0
2010/6/19: Initial review.
- Downloads (All Versions):
- 18 downloads in the last day
- 83 downloads in the last week
- 369 downloads in the last month
- Author: Brady Catherman
- Package Index Owner: liquidgecka
- DOAP record: twitcher-1.7.1.xml | https://pypi.python.org/pypi/twitcher/1.7.1 | CC-MAIN-2015-22 | refinedweb | 1,257 | 66.13 |
Real World Phoenix | User Roles | The Explicit Way
Tjaco Oostdijk
Originally published at
theguild.nl
on
・8 min read
Welcome back! In the last episode of this series we implemented user authentication. Now let's see how we can implement user authorization by implementing different user roles into our system.
We used Pow! for our authentication and that library also has a guide for implementing a user roles system. Let's see how far that gets us and I'd like to actually take it a bit further and implement different sign up flows for these different user roles.
But as always, we shouldn't get ahead of ourselves and make it too complicated too soon, so we'll first implement basic user roles. We are going to create a signup flow where an anonymous visitor can simply choose to sign up as a teacher or as a student. I already know I want to be able to define multple roles in the future so I'll take that into account when creating the field I'm going to use, but we'll not complicate things too much so for now 1 role will be set on signup.
Migration and schema
We'll need to store the user roles, so we'll add a migration to store a list of roles in the users table:
defmodule StudentManager.Repo.Migrations.AddRolesToUsers do use Ecto.Migration def change do alter table(:users) do add :roles, {:array, :string}, default: ["student"] end end end
In this migration I'm taking advantage of the Postgres Array type to store the list of roles in the db. It is of course also possible to store the roles in a different table and add those as an association, but for now this will do and we can just validate the allowed role values in the Changeset we'll use to store and update this user role info.
We'll also need to add this new field to our User schema to be able to use it in our application. Here I have also added the validation of the user role values. The way below is a naive implementation of this concept as this is potentially a very dangerous way to add role in a changeset. I'll explain later in this post when we'll implement specific user role changesets.
defmodule StudentManager.Accounts.User do use Ecto.Schema use Pow.Ecto.Schema schema "users" do field(:roles, {:array, :string}, default: ["student"]) pow_user_fields() timestamps() end def changeset_role(user_or_changeset, attrs) do user_or_changeset |> Changeset.cast(attrs, [:roles]) |> Changeset.validate_inclusion(:roles, ~w(student teacher)) end end
Testing
In the first blog post I didn't mention testing at all, but it is a very important part of building a reliable app that is easy to refactor and change with confidence. Without going into too much details about a proper and full-fledged test setup (I'll cover that in a separate post in the future), I would like to test this user role addition just to check if the above holds up and we are actually able to add these roles to a user.
Now, when creating this app and setting this up in the first post I briefly mentioned that I was going to add the user under the accounts context. Now, we currently don't have any contexts setup, so let's take advantage of Phoenix generators to set it up after we've alread created the user. I have confidence that Dan has taken care of the basic testing of the basic user level fields and changeset, so we are mainly concerned with testing our customisations. Testing the API layer(ie. the context layer) is a very nice way to test actual behaviour. But can we actually run the generators when we already have part of the contet defined? Let's find out:
mix phx.gen.context Accounts User users # outputs: The following files conflict with new files to be generated: * lib/student_manager/accounts/user.ex See the --web option to namespace similarly named resources Proceed with interactive overwrite? [Yn] * creating lib/student_manager/accounts/user.ex lib/student_manager/accounts/user.ex already exists, overwrite? [Yn] n * creating priv/repo/migrations/20190616212819_create_users.exs * creating lib/student_manager/accounts.ex * injecting lib/student_manager/accounts.ex * creating test/student_manager/accounts_test.exs * injecting test/student_manager/accounts_test.exs Remember to update your repository by running migrations: $ mix ecto.migrate
Now that is pretty awesome actually. Once we go into
interactive overwrite it'll ask us if we want to replace any existing files. In our case that's only the
user.ex file, and we don't want to override that one! You can also see that it created a new migration, but as we already have that in place we can simply remove that file.
Now this gives us a starting point to start testing our
accounts context. We'll actually remove some of the boilerplate tests as we don't need them right now and keep a subset we want to test now. This is what is left of the tests:
defmodule StudentManager.AccountsTest do use StudentManager.DataCase alias StudentManager.Accounts describe "users" do alias StudentManager.Accounts.User @valid_attrs %{email: "email@example.com", password: "supersecretpassword", confirm_password: "supersecretpassword"} @invalid_attrs %{email: "bademail@bad", password: "short", confirm_password: "shot" } def user_fixture(attrs \\ %{}) do {:ok, user} = attrs |> Enum.into(@valid_attrs) |> Accounts.create_user() user end test "create_user/1 with valid data creates a user" do assert {:ok, %User{} = user} = Accounts.create_user(@valid_attrs) end test "create_user/1 with invalid data returns error changeset" do assert {:error, %Ecto.Changeset{}} = Accounts.create_user(@invalid_attrs) end test "create_user/1 creates a user with a default role of student" do {:ok, user} = Accounts.create_user(@valid_attrs) assert user.roles == ["student"] end test "create_user/1 validates a correct role" do assert {:error, %Ecto.Changeset{}} = Accounts.create_user(Map.put(@valid_attrs, :roles, ["pilot", "teacher"])) end end end
Now, we could go ahead and add ExMachina (the Elixir equivalent of FactoryBot, if you come from Ruby...), but for now, let's not :) So we now have the ability to save user roles attached to a user. Great! I want to do 2 more things, so bear with me for a tad bit longer.
Custom registration
When visiting this app, it should be easy for potential students as well as teachers to sign up and that sign up process should be focussed on their role. This means a couple of things. First, we should set the role for them when they
sign up as..., because you don't want them to be entering that themselves. Secondly, the information we want to gather is very different when a student signs up compared to a teacher signing up, right? For a teacher I probably want to know what instrument(s) they teach, if they have existing students (and possibly import them during sign-up), if they have a location where they teach etc etc. This could become very extensive and is definitely not a sign-up process you want to use for students. For students it should be very simple. What is your name, email and do you have a teacher or are you looking for one in your neighbourhood. As an example.
So, without implementing all the details of this sign-up processes. Let's at least create two ways to sign up. The main thing I want to introduce here is the way to use specific changesets for this purpose. This example should make very clear what I mean here:
def teacher_registration_changeset(user_or_changeset, attrs) do user_or_changeset |> changeset(attrs) |> change(%{roles: ["teacher"]}) end def student_registration_changeset(user_or_changeset, attrs) do user_or_changeset |> changeset(attrs) |> change(%{roles: ["student"]}) end
Remember our first implementation above of adding user Roles:
def changeset_role(user_or_changeset, attrs) do user_or_changeset |> Changeset.cast(attrs, [:roles]) |> Changeset.validate_inclusion(:roles, ~w(student teacher)) end
You'll notice that instead of this changeset I am using the
change/2 method explicitly and setting the user role by user we are creating. The danger that the naive implementation introduced is that a user would potentially have the opportunity to set their own user role. And we want to control this value in our app explicitly.
Now without involving the frontend right away, let's test and create these two api endpoints in our accounts context:
So for the test this should do it:
test "create_teacher/1 creates a user with the teacher role set" do {:ok, user} = Accounts.create_teacher(@valid_attrs) assert Enum.member?(user.roles, "teacher") refute Enum.member?(user.roles, "student") end test "create_student/1 creates a user with the student role set" do {:ok, user} = Accounts.create_student(@valid_attrs) assert Enum.member?(user.roles, "student") refute Enum.member?(user.roles, "teacher") end
And to make that pass we'll need to create these two function in the accounts context:
@doc """ Creates a teacher. ## Examples iex> create_teacher(%{field: value}) {:ok, %User{}} iex> create_teacher(%{field: bad_value}) {:error, %Ecto.Changeset{}} """ def create_teacher(attrs \\ %{}) do %User{} |> User.teacher_registration_changeset(attrs) |> Repo.insert() end @doc """ Creates a student. ## Examples iex> create_student(%{field: value}) {:ok, %User{}} iex> create_student(%{field: bad_value}) {:error, %Ecto.Changeset{}} """ def create_student(attrs \\ %{}) do %User{} |> User.student_registration_changeset(attrs) |> Repo.insert() end
And all tests pass! I know what you're thinking. Why duplicate these functions based on only the role! But, yeah I like the explicitness for now and it could possibly diverge much more content-wise. So I'm gonna leave this as is. The tests are also very nice, concise and fast! Great!
CanCan or can it!
Ok, you're still here... great! One more thing until I leave you. The whole idea of the introduction of roles in any app is that you want to restrict certain users from doing things they are not supposed to do. So called
authorization! So in this scenario, most people start to google or search hex.pm for an out-of-the-box solution and they'll find a handfull of them indeed. But let's take a step back, read the excellent guides that were included in the
pow library that we have already added for authentication (see previous post), think again, and realize that Plug actually is all we need to implement this functionality ourselves, no dependencies added! I know there is a trend in Elixir land to get library maintainers going to get more tools in our toolbox, but the reason sometimes that these tools are not there is simply because we just don't need these dependencies because it is so straightforward to add ourselves. The big benefit in my opinion being that you fully understand what the code is doing, because you have written it all yourself! A win-win I'd say!
Implementing a Plug is very straightforward and if you want to read up on this, make sure to visit this excellent tutorial on elixirschool! For now we'll use the suggested implementation that Dan, the maintainer of
pow provides in this guide and leave it at that for now. We'll definitely expand and refine it when we discover places in our app that need some more custom control, but for now I think I have drained your mental power enough for the day and leave with this Plug:
defmodule StudentManagerWeb.Plugs.AuthorizationPlug do @moduledoc """ This plug ensures that a user has a particular role. ## Example plug StudentManagerWeb.Plugs.AuthorizationPlug, [:student, :teacher] plug StudentManagerWeb.Plugs.AuthorizationPlug, :teacher plug StudentManagerWeb.Plugs.AuthorizationPlug, ~w(student teacher)a """ alias StudentManagerWeb.Router.Helpers, as: Routes alias Phoenix.Controller alias Plug.Conn alias Pow.Plug @doc false @spec init(any()) :: any() def init(config), do: config @doc false @spec call(Conn.t(), atom()) :: Conn.t() def call(conn, roles) do conn |> Plug.current_user() |> has_role?(roles) |> maybe_halt(conn) end defp has_role?(nil, _roles), do: false defp has_role?(user, roles) when is_list(roles), do: Enum.any?(roles, &has_role?(user, &1)) defp has_role?(user, role) when is_atom(role), do: has_role?(user, Atom.to_string(role)) defp has_role?(%{role: role}, role), do: true defp has_role?(_user, _role), do: false defp maybe_halt(true, conn), do: conn defp maybe_halt(_any, conn) do conn |> Controller.put_flash(:error, "Unauthorized access") |> Controller.redirect(to: Routes.page_path(conn, :index)) end end
Now I believe that should be enough information for now. Next time we'll continue with these sign-up-scopes and see how we can utilise all of this to easily manage our sign-up process!
Thanks! | https://practicaldev-herokuapp-com.global.ssl.fastly.net/kabisasoftware/real-world-phoenix-user-roles-the-explicit-way-21bf | CC-MAIN-2019-35 | refinedweb | 2,060 | 57.57 |
Join devRant
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple APILearn More
Search - "z-index"
-
-
-
- z-index: 9;
😕
z-index: 99;
😐
z-index: 999;
😑
z-index: 9999;
😡
z-index: 9999 !important;
😠
z-index: 9999 !IMPORTANTAHFA;
😲29
- Hey frontend developers. If you do THIS:
z-index: 1000;
...expecting that it will ensure your div will be on top no matter what, I'm about to fuck your world up. Check this shit out:
z-index: 1001;7
- Coworker: hey man, do you know what is the limit for z-index on CSS?
Me: not sure but I think it is the signed int limit.
Coworker: the waaat?
Me inside: GET THE FUCK OUT OF HERE!!!!!!!7
-
-
-
- My rant on CSS in general, including z-index (a cruel practical joke) and the "secret menu."...
-
- What is the optimum value for z-index in css?
z-index: 999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999;4
- My boss still thinks that resizing his browser is equivalent to mobile testing, and his designs are desktop only and says "just have everything stack on top of each other"
below is how I feel.
* {
position: absolute;
Z-index: 1;
Top: 0;
Left:0;
}3
-5
-
-
-
-
- What do you do when a modal tries to cover up something you're reading?
Developer console. Delete div. *Flip off Screen * Ahh, z-index: 300000, how quaint? Delete class. Continue reading.
-
- I still remember when I was 8 years old and used to use "position:absolute"everywhere and use top and z-index to hardcodedly place my elements in my old web projects. I used a lot of <br> and padding + margin were not familiar words to me.
Somehow these projects were responsive, too. Strange times.
Nowadays I avoid "position:absolute", z-index and <br>s like the plague lol5
- Using z-index 99999999999.
Are you fucking serious... please go somewhere far far away from me and cut your hands off so I don't have to deal with this shit.3
- If you're having CSS problems, I feel bad for you son,
I got 99 problems that I fixed with 'z-index: 100;'
-
- As a Backend guy doing CSS. (Honestly don't know what i'm doing)
position: absolute;
z-index: -999999999999; /* better fucking work*/
margin-left: -1200;
background: red;
asdfghjkl
wait? what?3
- Idea to overhaul the CSS !important system...
Allow it to accept a numerical value much like z-index.
But the max !important level is the current year so that the more current your code, the more important it is.
Works based off the last edited date of your files to prevent cheaters.7
-
- Defining importance as a Web Developer.
Firefox === Iceweasel !important;
z-index: 99999999999999999;
- One time I was building a custom modal for some crappy WordPress template and I was having trouble with the header rendering above my backdrop, after digging into the CSS I realized the headers z-index was literally set to 9001.1
-
-
-
- Working on modifying a legacy web project and just about every single element is `position: absolute` with crazy z-index juggling and hard-coded pixel sizes and positions everywhere 😭
To make it even worse, a bunch of the javascript will also change elements sizes and positions so it takes forever to track down why an element is where it is1
- was pretty excited to see the annular solar eclipse, pretty cloudy today, wish I could adjust the sun's z-index
-
-
- Made a custom pop up for the web app im building then i encouter a problem when i saw the pop up in safari it doesnt show up properly -_- deym cross platform compatibility the background is not grey and i think safari ignored the z index in my css :(1
-
- Let me pretend this site supports markdown for this therapy session. Ever had a project with an `index.js` in every directory that looks like this?
```
import a from './a'
import b from './b'
...
import z from './z'
export default { a, b, ..., z }
```
If you do this, please stop.
1. `export default` for an object is not the same as having a named export for each of the property names in that object. In this form, someone has to first `import` the module's default export and then destructure it. This screws up tree-shaking and someone expecting a CommonJS module is bound to try destructuring it up front using a `const {} = require()`, which will blow up too unless you've configured a builder to "promote" default exports for ES6 modules. The way this is set up pleases literally no one.
2. I have to edit a file like this every time I add a new module to a directory. If you desperately want an experience where you can `import` against a directory and use named exports for files, you can configure a builder to generate those files for you. Stop making other people deal with this shit just because you don't like having more `import` statements at the top of your modules.
Bonus for you guys: I saw a team justify reducing the number of `import` lines with these index files because they also have a Java-inspired habit of exporting exactly one `default` symbol and nothing else from each module. Which means there are 30+ modules that each contain exactly one function. Half of the work days was file-hopping, and they didn't like the idea of combining modules with related functionality.3
-
-
- why the F was the DOM designed with only two dimensions in mind? I mean, sure, we have z-index but that's just shit, we should be allowed to have as much crap as we want in the 3rd dimension.10
-
-
Top Tags | https://devrant.com/search?term=z-index | CC-MAIN-2021-17 | refinedweb | 962 | 70.02 |
Yii 2.0 is finally coming, after more than three years of intensive development with almost 10,000 commits by over 300 authors! Thank you for your support and patience!
As you may have already known, Yii 2.0 is a complete rewrite over the previous version 1.1. We made this choice in order to build a state-of-the-art PHP framework by keeping the original simplicity and extensibility of Yii while adopting the latest technologies and features to make it even better. And today we are very glad to announce that we have achieved our goal.
Below are some useful links about Yii and Yii 2.0:
- Yii project site
- Yii 2.0 GitHub Project: you may star and/or watch it to keep track of Yii development activities.
- Yii Facebook group
- Yii Twitter feeds
- Yii LinkedIn group
In the following we will summarize some of the highlights of this long awaited release. You may check out the Getting Started section if you want to rush to try it out first.
Highlights ¶
Adopting Standards and Latest Technologies ¶
Yii 2.0 adopts PHP namespaces and traits, PSR standards, Composer and Bower. All these make the framework more refreshing and interoperable with other libraries.
Solid Foundation Classes ¶
Like in 1.1, Yii 2.0 supports object properties defined via getters and setters, configurations, events and behaviors. The new implementation is more efficient and expressive. For example, you can write the following code to respond to an event:
$response = new yii\web\Response; $response->on('beforeSend', function ($event) { // respond to the "beforeSend" event here });
Yii 2.0 implements the dependency injection container and service locator. It makes the applications built with Yii more customizable and testable.
Development Tools ¶
Yii 2.0 comes with several development tools to make the life of developers easier.
The Yii debugger allows you to examine the runtime internals of your application. It can also be used to do performance profiling to find out the performance bottlenecks in your application.
Like 1.1, Yii 2.0 also provides Gii, a code generation tool, that can cut down a large portion of your development time. Gii is very extensible, allowing you to customize or create different code generators. Gii provides both Web and console interfaces to fit for different user preferences.
The API documentation of Yii 1.1 has received a lot of positive feedback. Many people expressed the wish to create a similar documentation for their applications. Yii 2.0 realizes this with a documentation generator. The generator supports Markdown syntax which allows you to write documentation in a more succinct and expressive fashion.
Security ¶
Yii 2.0 helps you to write more secure code. It has built-in support to prevent SQL injections, XSS attacks, CSRF attacks, cookie tampering, etc. Security experts Tom Worster and Anthony Ferrara even helped us review and rewrite some of the security-related code.
Databases ¶
Working with databases has never been easier. Yii 2.0 supports DB migration, database access objects (DAO), query builder and Active Record. Compared with 1.1, Yii 2.0 improves the performance of Active Record and unifies the syntax for querying data via query builder and Active Record. The following code shows how you can query customer data using either query builder or Active Record. As you can see, both approaches use chained method calls which are similar to SQL syntax.
use yii\db\Query; use app\models\Customer; $customers = (new Query)->from('customer') ->where(['status' => Customer::STATUS_ACTIVE]) ->orderBy('id') ->all(); $customers = Customer::find() ->where(['status' => Customer::STATUS_ACTIVE]) ->orderBy('id') ->asArray(); ->all();
The following code shows how you can perform relational queries;
And the following code shows how you can update a Customer record. Behind the scene, parameter binding is used to prevent SQL injection attacks, and only modified columns are saved to DB.
$customer = Customer::findOne(100); $customer->address = '123 Anderson St'; $customer->save(); // executes SQL: UPDATE `customer` SET `address`='123 Anderson St' WHERE `id`=100
Yii 2.0 supports the widest range of databases. Besides the traditional relational databases, Yii 2.0 adds the support for Cubrid, ElasticSearch, Sphinx. It also supports NoSQL databases, including Redis and MongoDB. More importantly, the same query builder and Active Record APIs can be used for all these databases, which makes it an easy task for you to switch among different databases. And when using Active Record, you can even relate data from different databases (e.g. between MySQL and Redis).
For applications with big databases and high performance requirement, Yii 2.0 also provides built-in support for database replication and read-write splitting.
RESTful APIs ¶
With a few lines of code, Yii 2.0 lets you to quickly build a set of fully functional RESTful APIs that comply to the latest protocols. The following example shows how you can create a RESTful API serving user data.
First, create a controller class
app\controllers\UserController and specify
app\models\User as the type of model being served:
namespace app\controllers; use yii\rest\ActiveController; class UserController extends ActiveController { public $modelClass = 'app\models\User'; }
Then, modify the configuration about the
urlManager component in your application configuration to serve user data in pretty URLs:
'urlManager' => [ 'enablePrettyUrl' => true, 'enableStrictParsing' => true, 'showScriptName' => false, 'rules' => [ ['class' => 'yii\rest\UrlRule', 'controller' => 'user'], ], ]
That's all you need to do! The API you just created supports: API with the
curl command like the following,
$ curl -i -H "Accept:application/json" "", ... }, ... ]
Caching ¶
Like 1.1, Yii 2.0 supports a whole range of caching options, from server side caching, such as fragment caching, query caching to client side HTTP caching. They are supported on a variety of caching drivers, including APC, Memcache, files, databases, etc.
Forms ¶
In 1.1, you can quickly create HTML forms that support both client side and server side validation. In Yii 2.0, it is even easier working with forms. The following example shows how you can create a login form.
First create a
LoginForm model to represent the data being collected. In this class, you will list the rules
that should be used to validate the user input. The validation rules will later be used to automatically generate
the needed client-side JavaScript validation logic.; $form = ActiveForm::begin() = $form->field($model, 'username') = $form->field($model, 'password')->passwordInput() = Html::submitButton('Login') ActiveForm::end()
Authentication and Authorization ¶
Like 1.1, Yii 2.0 provides built-in support for user authentication and authorization. It supports features such as login, logout, cookie-based and token-based authentication, access control filter and role-based access control (RBAC).
Yii 2.0 also provides the ability of the authentication via external credentials providers. It supports OpenID, OAuth1 and OAuth2 protocols.
Widgets ¶
Yii 2.0 comes with a rich set of user interface elements, called widgets, to help you quickly build interactive user interfaces. It has built-in support for Bootstrap widgets and jQuery UI widgets. It also provides commonly used widgets such as pagers, grid view, list view, detail, all of which make Web application development a truly speedy and enjoyable process. For example, with the following lines of code, you can create a fully functional jQuery UI date picker in Russian:
use yii\jui\DatePicker; echo DatePicker::widget([ 'name' => 'date', 'language' => 'ru', 'dateFormat' => 'yyyy-MM-dd', ]);
Helpers ¶
Yii 2.0 provides many useful helper classes
to simplify some common tasks. For example, the
Html helper includes a set of methods to create different
HTML tags, and the
Url helper lets you more easily creates various URLs, like shown below:
use yii\helpers\Html; use yii\helpers\Url; // creates a checkbox list of countries echo Html::checkboxList('country', 'USA', $countries); // generates a URL like "/index?r=site/index&src=ref1#name" echo Url::to(['site/index', 'src' => 'ref1', '#' => 'name']);
Internationalization ¶
Yii has strong support for internationalization, as it is being used all over the world. It supports message translation as well as view translation. It also supports locale-based plural forms and data formatting, which complies to the ICU standard. For example,
// message translation with date formatting echo \Yii::t('app', 'Today is {0, date}', time()); // message translation with plural forms echo \Yii::t('app', 'There {n, plural, =0{are no cats} =1{is one cat} other{are # cats}}!', ['n' => 0]);
Template Engines ¶
Yii 2.0 uses PHP as its default template language. It also supports Twig and Smarty through its template engine extensions. And it is also possible for you to create extensions to support other template engines.
Testing ¶
Yii 2.0 strengthens the testing support by integrating Codeception and Faker. It also comes with a fixture framework which coupled with DB migrations, allows you to manage your fixture data more flexible.
Application Templates ¶
To further cut down your development time, Yii is released with two application templates, each being a fully functional Web application. The basic application template can be used as a starting point for developing small and simple Web sites, such as company portals, personal sites. The advanced application template is more suitable for building large enterprise applications that involve multiple tiers and a big developer team.
Extensions ¶
While Yii 2.0 already provides many powerful features, one thing that makes Yii even more powerful is its extension architecture. Extensions are redistributable software packages specifically designed to be used in Yii applications and provide ready-to-use features. Many built-in features of Yii are provided in terms of extensions, such as mailing, Bootstrap. Yii also boasts a big user-contributed extension library consisting of almost 1700 extensions, as the time of this writing. We also find there are more than 1300 Yii-related packages on packagist.org.
Getting Started ¶
To get started with Yii 2.0, simply run the following commands:
# install the composer-asset-plugin globally. This needs to be run only once. php composer.phar global require "fxp/composer-asset-plugin:1.0.0-beta3" # install the basic application template php composer.phar create-project yiisoft/yii2-app-basic basic 2.0.0
The above commands assume you already have Composer. If not, please follow the Composer installation instructions to install it.
Note that you may be prompted to enter your GitHub username and password during the installation process. This is normal. Just enter them and continue.
With the above commands, you have a ready-to-use Web application that may be accessed through the URL.
Upgrading ¶
If you are upgrading from previous Yii 2.0 development releases (e.g. 2.0.0-beta, 2.0.0-rc), please follow the upgrade instructions.
If you are upgrading from Yii 1.1, we have to warn you that it will not be smooth, mainly because Yii 2.0 is a complete rewrite with many syntax changes. However, most of your Yii knowledge still apply in 2.0. Please read the upgrade instructions to learn the major changes introduced in 2.0.
Documentation ¶
Yii 2.0 has a definitive guide as well as a class reference. The definitive guide is also being translated into many languages.
There are also a few books about Yii 2.0 just published or being written by famous writers such as Larry Ullman. Larry even spends his time helping us polish the definitive guide. And Alexander Makarov is coordinating a community-contributed cookbook about Yii 2.0, following his well-received cookbook about Yii 1.1.
Credits ¶
We hereby thank everyone who has contributed to Yii. Your support and contributions are invaluable! | https://www.yiiframework.com/news/81/yii-2-0-0-is-released | CC-MAIN-2021-04 | refinedweb | 1,907 | 50.12 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.