text
stringlengths
454
608k
url
stringlengths
17
896
dump
stringclasses
91 values
source
stringclasses
1 value
word_count
int64
101
114k
flesch_reading_ease
float64
50
104
User Tag List Results 1 to 5 of 5 Thread: New Instance of a Class Question Threaded View - Join Date - Feb 2009 - 3 - Mentioned - 0 Post(s) - Tagged - 0 Thread(s) New Instance of a Class Question Hi. Ok, I am new, and I'm sure my question is very basic, but I want to learn RoR and if I don't understand something in detail it bugs the heck out of me. So hopefully someone can help. I'm going through the Sitepoint book and come to this example: class Car @@number_of_cars = 0 def self.count @@number_of_cars end def initialize @@number_of_cars += 1 end end I created 4 car objects and then did a Car.count and got 4, so it works as advertised, but I have two questions. 1. with the line of code @@number_of_cars = 0, why isn't that variable getting reset to 0 each time I instantiate a new car object? It seems to me it would, but obviously it isn't. Which is a good thing, but I don't udnerstand why it isn't resetting the variable to 0 with each new instance. 2. I assume it is just 'convention' and the name 'initialize' that makes that method run each time a new instance of the object is created. Correct? Thanks. Bookmarks
http://www.sitepoint.com/forums/showthread.php?598086-New-Instance-of-a-Class-Question&p=4137970&mode=threaded
CC-MAIN-2014-10
refinedweb
217
75.95
import "builtin" Package builtin provides documentation for Go's predeclared identifiers. The items documented here are not actually in package builtin but their descriptions here allow godoc to present documentation for the language's special identifiers.. delete(m map[Type]Type1, key Type) The delete built-in function deletes the element with the specified key (m[key]) from the map. If m is nil or there is no such element, delete is a no-op.. type ComplexType. func imag(c ComplexType) FloatType The imag built-in function returns the imaginary part of the complex number c. The return value will be floating point type corresponding to the type of c. func real(c ComplexType) FloatType The real built-in function returns the real part of the complex number c. The return value will be floating point type corresponding to the type of c., so make([]int, 0, 10) allocates a slice of length 0 and capacity 10.. type Type1 int Type1 is here for the purposes of documentation only. It is a stand-in for any Go type, but represents the same type for any given function invocation. type bool bool bool is the set of boolean values, true and false. type byte = uint8 = int32.
https://static-hotlinks.digitalstatic.net/builtin/
CC-MAIN-2018-51
refinedweb
205
65.01
Please provide the following: - SDK Version: 40.0.0 - Platforms(Android/iOS/web/all): iOS - Add the appropriate “Tag” based on what Expo library you have a question on. Hello, I’ve been going around in circles for a few days, here’s my problem. I need to create an interactive map with custom tiles. I have created the tiles using MapTiler software. (I should mention that I have already done this development on a website with Leaflet, and that I am trying to do it again for Android/iOS applications). I use the MapView component of react-native-maps and “FileSystem.documentDirectory” to retrieve the base path of my tiles. These are located in a “/assets/tiles/” at the root of my project. The stantard map displays fine, but whether I try to use “LocalTile” or “UrlTile” I never get my custom tiles to display. Could someone help me? Here is my code: import React, { Component } from 'react'; import { Image, Platform, StyleSheet, Button, Text, View, Dimensions } from "react-native"; import MapView, { UrlTile, LocalTile } from 'react-native-maps'; import * as FileSystem from 'expo-file-system'; const styles = StyleSheet.create( { container: { height: 400, width: 400, justifyContent: 'flex-end', alignItems: 'center', }, map: { width: 400, height: 500, }, } ); class MapScreen extends Component { constructor( props ) { super( props ); this.navigation = props.navigation; this.templatePath = FileSystem.documentDirectory + "assets/tiles/{z}/{x}/{y}.png"; this.mapRef = null; } componentDidMount() { this.mapRef.setMapBoundaries( { latitude: 47.59646, longitude: -2.40272 }, { latitude: 47.59170, longitude: -2.39332 } ) } render() { return ( <View> <MapView ref={ ( ref ) => this.mapRef = ref } provider={ "google" } style={ styles.map } region={ { latitude: 47.59452, longitude: -2.39866, latitudeDelta: 0.00005, longitudeDelta: 0.00005, } } minZoomLevel={ 13 } maxZoomLevel={ 18 } showsUserLocation={ true } > <UrlTile urlTemplate={ this.templatePath } maximumZ={ 6 } zIndex={1} tileSize={256} shouldReplaceMapContent={true} flipY={ false } /> </MapView> </View> ) } } export default MapScreen
https://forums.expo.io/t/how-to-use-custom-tiles-with-mapview/51255
CC-MAIN-2021-21
refinedweb
297
53.17
I've set up listeners in my application to catch SIGTERM, SIGINT and SIGUSR2: # kill process.on 'SIGTERM', -> killExecutors 'SIGTERM' # ctrl + c process.on 'SIGINT', -> killExecutors 'SIGINT' # nodemon signal process.on 'SIGUSR2', -> killExecutors 'SIGUSR2' FROM node:4.4.7 MAINTAINER Newborns <newborns@versul.com.br> COPY . /src EXPOSE 7733 WORKDIR /src RUN npm install CMD ["./node_modules/.bin/coffee", "feeder.coffee"] FROM node:4.4.7 MAINTAINER Newborns <newborns@versul.com.br> COPY . /src EXPOSE 7733 WORKDIR /src RUN npm install CMD ["./node_modules/.bin/coffee", "--nodejs", "--max_old_space_size=384", "feeder.coffee"] CMD ./node_modules/.bin/coffee --nodejs --max_old_space_size=384 feeder.coffee USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND root 1 4.2 1.0 960940 85424 ? Ssl 20:21 0:01 node ./node_modules/.bin/coffee feeder.coffee root 16 0.1 0.0 20220 2884 ? Ss 20:22 0:00 bash root 20 0.0 0.0 17500 2064 ? R+ 20:22 0:00 ps -aux USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND root 1 0.1 0.3 707704 25272 ? Ssl 20:17 0:00 node ./node_modules/.bin/coffee --nodejs --max_old_space_size=384 feeder.coffee root 10 1.7 1.1 965900 90068 ? Sl 20:17 0:01 /usr/local/bin/node --max_old_space_size=384 /src/node_modules/.bin/coffee feeder.coffee TL;DR Use a Javascript loader file instead of the coffee executable when you need to use extended node options to avoid the technicalities of signals with forked processes under Docker. require('coffee-script').register(); require('./whatever.coffee').run(); Then node --max_old_space_size=384 app.js Now, onto the technicalities... The initial process in a container is PID 1 in the containers namespace. PID 1 (or the init process) is treated as a special case by the kernel with regards to signal handling. So a docker process is expected to handle signals itself. --nodejsoption As you have noted, coffee will fork a child node process when it has the --nodejs option to be able to pass the extra options on. This initially presents some odd behaviour outside of docker with signal handling (on osx at least). A SIGINT or SIGTERM will be forwarded onto the child but also kill the parent coffee process immediately, no matter how you handle the signal in your code (which is running in the child). A quick example process.on 'SIGTERM', -> console.log 'SIGTERM' process.on 'SIGINT', -> console.log 'SIGINT' cb = -> console.log "test" setTimeout cb, 5000 When you run this and ctrl-c, the signal is forwarded on to the child process and handled. The parent process closes immediately though and returns to the shell. $ coffee --nodejs --max_old_space_size=384 block_signal_coffee.coffee ^C SIGINT $ <5ish second pause> test Then the child process with your code continues running in the background for 5 seconds and eventually outputs test. coffee --nodejs The main problem is the parent coffee process does not handle any signals in code, so the signals don't arrive and are not forwarded onto the child. This probably requires a change to coffeescript's launcher code to fix. The signal quirk coffee --nodejs presents outside of Docker could also be bad if it happened under Docker. If the main container process (the parent of the fork) exits before your signal handlers have a chance to complete in the child, the container will close around them. This scenario is unlikely to happen if the above problem is fixed by just forwarding signals onto the child. An alternative to using the suggested javascript loader or fixing coffee scripts loader, would be to use an actual init process, like runit or supervisor but that adds another layer of complexity in between docker and your service.
https://codedump.io/share/xrCCPOSxLLT9/1/docker-sigterm-not-being-delivered-to-nodejscoffee-app-when-started-with-flags
CC-MAIN-2017-43
refinedweb
612
60.51
CLucene - a full-featured, c++ search engine API Documentation #include <PriorityQueue.h> Put()'s and pop()'s require log(size) time. Adds an Object to a PriorityQueue in log(size) time. If one tries to add more objects than maxSize from initialize a RuntimeException (ArrayIndexOutOfBound) is thrown. Adds element to the PriorityQueue in log(size) time if either the PriorityQueue is not full, or not lessThan(element, top()). insertWithOverflow() is the same as insert() except its return value:. NOTE: value is not being deleted - its the user responsibilty to dispose the returned _type (only if != NULL && != element). Returns the least element of the PriorityQueue in constant time. Removes and returns the least element of the PriorityQueue in log(size) time. Should be called when the object at top changes values. Still log(n) worst case, but it's at least twice as fast to { pq.top().change(); pq.adjustTop(); }instead of { o = pq.pop(); o.change(); pq.push(o); } Returns the number of elements currently stored in the PriorityQueue. Removes all entries from the PriorityQueue. clucene.sourceforge.net
http://clucene.sourceforge.net/doc/html/classlucene_1_1util_1_1PriorityQueue.html
crawl-002
refinedweb
178
60.01
Methods, Challenges, and Hazards of Collecting Tweets Author(s): Stephen DeFerrari 500 million tweets are sent a day, properly using them in your project goes beyond just writing an API request Disclaimer: This article is only for educational purposes. We do not encourage anyone to scrape websites, especially those web properties that may have terms and conditions against such actions. After finishing a sentiment analysis project on Covid vaccine-related tweets, I was left feeling like I was only seeing a small part of the picture. I had built the project using tweets somebody else graciously collected and posted on Kaggle. The criteria for collection was having the hashtag “#CovidVaccine” with retweets filtered out. Using somebody else’s data was convenient but a lot of tweets must have been missing with such strict criteria. Worse still, a lot of the tweets I did have seemed to be cut off; ending with “…” mid-sentence. I set out to do my own collecting to see if I could do any better. What I had expected to be a simple process of tweaking a few parameters and rewriting some code turned into an ordeal of figuring out 3 questions: - How am I going to actually collect any tweets? - How exactly does my query affect my project’s results? - How useful is Twitter for capturing “national conversations”? This article is broken down into 3 sections, each one dedicated to one of these questions. Think of this article as part tutorial, part experiment, and part musing. All the code will be in Python but if that isn’t your language of choice, there are still lessons here for anyone interested in using tweets for their next project. Feel free to skip around to portions that interest you most; I won’t mind too much. Section 1: Different Methods of Collecting Tweets Tweets can be collected either with or without Twitter’s API. I am going to cover each method and give you their pros and cons. Twitter API Collection via Tweepy Tweepy is a Python library that allows for easy access to Twitter’s API. Before you write your first line of code you’ll need to apply for a developer account. Don’t be intimidated, it’s free (for basic access, more on that later), and you should be accepted within a few hours of applying. After being accepted, you’ll need to create your own project to generate the keys, tokens, and secrets (passwords) needed to access the API. You can find them in the “keys and tokens” section of your project. Once you have them, start your code by importing Tweepy and Pandas and saving your keys, tokens, and secrets as variables. Then authenticate your account’s credentials so we can start accessing the API! When we’re successfully authenticated, we can use Tweepy’s Cursor object to search and collect tweets based on specific criteria. For this example, we’re going to collect 100 English tweets between 2020–12–25 and 2020–12–26 that contain the hashtag “#vaccine”. Tweepy also supports more complex searches including using geocodes. For those interested, I highly recommend reading Tweepy’s documentation for a better idea of what’s possible along with Twitter’s own search operators documentation. tweets = tw.Cursor(api.search, q="#vaccine", tweet_mode='extended', lang="en", since="2020-12-25", until="2020-12-28").items(100) This will return a new object which contains all 100 tweets, but accessing the tweets’ texts isn’t as simple as iterating through and running “print.” Each tweet inside tweets contains a host of information including when it was posted, its text, location, etc. We need to ask the right questions to get what we want from them. Below is a function I’ve written to retrieve each tweet’s user name, location, full text, and tell me if it’s a retweet or not. You may have noticed earlier that the Cursor object had tweet_mode set to “extended”. This is related to Twitter’s 2017 decision to up the character limit of tweets from 140 to 280. Without it, we’ll end up with tweets longer than 140 cut off with “…”, the issue I ran into with the original dataset. Simply setting our search to extended and asking for the full_text attribute still isn’t perfect due to retweets getting cut off. This is where the “try”- statement at the bottom of the function comes in. Asking for the full text of the original tweet instead works. Tweepy’s documentation covers this issue in more detail. With full_text_rt()set up, all we need to do now is a list comprehension on the tweets object. Run each tweet through the function and then convert the list of lists into a Pandas dataframe. final_tweet_list = [full_text_rt(tweet) for tweet in tweets] tweets_df = pd.DataFrame(data=final_tweet_list, columns=['user', "location", "text", "retweet"]) And there you have it, a dataframe with all of the information collected from Twitter’s API via Tweepy. Non-API Collection via Twint As smooth as the Tweepy process is, we can only get so far using a free Twitter developer account. Our searches can only go back 7 days and we get 50 requests a month. For those who don’t want to shell out between $99 and $1,899 a month for premium access, there is Twint. Twint is an OSINT (Open Source Intelligence) focused Twitter scraper that allows us to get around the API’s limitations by collecting tweets via Twitter’s own search feature. We can use Twint via the command line but I’m going to show you how to do it from a notebook. Twint uses asyncio, which has a history of not playing nice with notebooks, so we need to make sure we have nest-asyncio installed, imported, and applied before we do anything. import nest_asyncio nest_asyncio.apply() Actually importing Twint, running it, and converting its results into a dataframe can all be done in a single cell, thanks to Twint’s Pandas compatibility. With far less struggle (but a little more processing time), we should now have our own dataframe with tweets scraped with Twint. Comparing Tweepy and Twint As simple and as free as Twint is, it has its downsides. You may have noticed that we didn’t have locations in the Twint dataframe when we did have them in the Tweepy one. Due to Twint’s method of scraping via Twitter’s search function, collecting locations is actually a lot harder and more time consuming for it to do, and Twint is already slow compared to Tweepy. You may have also noticed that while we requested 100 tweets, my dataframe only came back with 84. If you ran that code on your end you may very well have ended up with anywhere from 80 to 120 tweets despite using identical search criteria. Again, due to Twint’s scraping method, it has problems with consistency. And then there is the issue of retweets. Despite setting c.Filter_Retweets to false, not a single retweet was returned. This is another problem inherited from using Twitter’s search function and one that Twint’s devs aren’t keen on fixing due to the library’s focus on OSINT collection. Comparing documentation and tutorials, Tweepy and the API are a lot easier to understand and learn than Twint. Whereas I learned Tweepy by reading its documentation and guides found online, I learned Twint by navigating its “Issues” section on Github where the devs are very active in helping people troubleshoot problems. Rather than choosing one over the other, it’s better to think of how they can be used together. With Tweepy and the API, you have the consistency and robustness you need to experiment and calibrate your queries to suit your needs. With Twint you have the ability to collect a large number of tweets without the API’s limitations. One idea is to pull your initial bank of tweets from Tweepy, set up your processing pipeline, and create a minimum viable product. If you’re not satisfied go over your search criteria and try again. If the results work for you, then use Twint to pull a larger bank of tweets using the criteria you perfected on Tweepy and run them through the same pipeline to get your final product. Section 2: The Challenges of Writing the “Right” Query Now that we have established how to collect tweets, we need to see how our query changes our results. In the examples used in the last section I searched for tweets containing the “#vaccine” hashtag, but what if I instead dropped the hashtag and searched for tweets just containing “vaccine”? My Tweepy searches also included retweets while my Twint ones did not; how meaningful is that difference? Rather than sit and wonder, let’s do an experiment where we run four different search results based on whether we use the hashtag or not, and whether we use retweets or not through the same VADER sentiment analysis pipeline and analyze the differences. The pipeline will result in a new column for each tweet with the classification of either “positive”, “neutral”, or “negative” based on the suggested thresholds from VADER’s documentation. Here are the 3 functions we will be using: With the functions in place, all we need to do is import the sentiment analyzer and run our search results through it. Here is my full code block for getting the sentiments for 500 tweets posted between 2020–12–25 and 2020–12–16 that contained the word “vaccine” with retweets filtered out. I’m using “vaccine” here rather than the longer “Covid vaccine” to include users who used “corona” instead of “Covid” in their tweets. Additionally, the term “vaccine” in conversation has become nearly ubiquitous with referring to the vaccine for Covid-19. I ran this code 3 more times, adjusting only the “search_words” variable and dataframe names to cover hashtags vs no hashtags and retweets vs no retweets. Afterward, I took the resulting sentiment columns and imported them into Tableau, turning them into percentage pie charts. Let’s start with comparing “vaccine” and “#vaccine” without retweets: These graphs paint two very different pictures. If we stuck with just using “#vaccine” for our search, we would conclude that a majority of people are feeling positive about the prospect of getting vaccinated, something the “vaccine” search directly disputes with results that instead tell us vaccine rollouts have been met with a lot of negativity and uncertainty on Twitter. Why the gap in results? It’s important to understand how often people actually use hashtags in their tweets. A 2010 paper titled “Language Matters in Twitter: A Large Scale Study”[1] by researchers from Google and the Palo Alto Research Center found that only 14% of English language tweets contained hashtags. A little bit rosier, brand engagement company Mention in a 2018[2] report concluded that 40% of tweets contained hashtags. We may have been drawing from a much smaller and different pool of tweets when we restricted ourselves to just hash-tagged tweets. What about retweets? Let’s compare these results if we instead allow retweets to be included in our searches: What’s interesting is that in both searches a majority of the tweets were retweets, but the results are strikingly similar to the results we got excluding retweets. The largest difference is the 11 point drop in positivity in the hash-tagged search, but it still left positive with the largest percentage of tweets. If we recall, one of our issues with Twint was that it doesn’t scrape retweets. With these results, we might feel a lot safer using Twint to scrape tweets that contain “vaccine” since the sentiment ratio would be similar enough to a search containing retweets. Section 3: Analytic Hazards of Using Tweets Before you fire up your notebooks and begin your next project it’s important to know how representative Twitter is of the general population, after all, we still have one last question to answer: how useful is Twitter for capturing “national conversations”? Selection bias should always be on our minds when we collect information from and about people. Understanding what biases exist when using Twitter might not help us mitigate them, but it can flag concerns for us to think about when drawing conclusions from our results. According to a 2019 Pew Research study, only 22% of Americans actually use Twitter [3]. So we’re working with almost a quarter of the population, but how uniform is that usage? It turns out not uniform at all, another Pew study focused exclusively on Twitter usage[4] found that 10% of American Twitter users were responsible for 80% of tweets in the United States. The same study found that American Twitter users were generally more likely to be younger, more educated, and more likely to be Democrats than the general public. When zooming in on the top 10% of American Twitter users, researchers found a much higher willingness to post about politics, with 69% of prolific tweeters saying they post about politics, compared to 39% of overall American Twitter users. While the gender divide was mostly evenly split among the bottom 90% of American Twitter users, women made up the majority of prolific tweeters. Putting all of this together we can see that the American tweets collected are coming from a population that is much smaller and less representative than we might have thought. These studies apply only to American Twitter users. Remember, our queries were for English language tweets, a language spoken by people all around the world, and who knows what biases exist in other countries regarding Twitter usage! Conclusion I hope this article leaves you more knowledgeable about using Twitter data for your next project. In review, we learned the following: - How to collect tweets using Tweepy and Twitter’s API as well as using Twint - The importance of testing multiple queries and comparing results - The biases you may encounter when using tweets based on usage statistics Twitter, like any source of data, has its pros and cons, but don’t let the negatives keep you from experimenting. My advice is if you have an idea for a project or an interesting query, use the code I provided today and see what results you get. Just remember the importance of experimenting, what to watch out for when drawing conclusions, and one final tip: not everyone takes Twitter seriously. has any picture summed up Twitter as well as this one pic.twitter.com/zoK9XfLw1I — Ryan (@NoMagRyan) January 30, 2018 References: [1] E. Chi, G. Convertino, and L. Hong, Language Matters in Twitter: A Large Scale Study (2010), Fifth International AAAI Conference on Weblogs and Social Media [2] Mention, 2018 Twitter Engagement Report (2018) [3] A. Perron, M. Anderson, Social Media Usage Survey (2019), Pew Research Center [4] A. Hughes, S. Wojcik, Sizing Up Twitter Users (2019), Pew Research Center
https://towardsai.net/p/nlp/methods-challenges-and-hazards-of-collecting-tweets-9e3e7805095a
CC-MAIN-2021-49
refinedweb
2,497
58.92
The annual IT budget has just been released and you’ve hit the jackpot! Now that it’s time to think big and not count the bitcoins, what would you buy? You can invest in anything you want to help you do your job – what would you buy? Unlimited backup storage? High-spec servers with 1TB RAM? Wearable watches which send you alerts? SAS SSD arrays? Robot assistants? What would you invest in to make your job easier? Please use the comments section below to tell us how you’d spend your unlimited IT budget. We want to hear, in as many or as few words as you’d like, what you’d dream up if money was no object. Share your thoughts with us by Monday, February 22 and we’ll give you 250 thwack points in return (sorry, it’s a bit too early for chocolate Easter eggs).
https://thwack.solarwinds.com/community/solarwinds-community/announcements/blog/2016/02/11/with-a-budget-big-enough-to-build-the-death-star-how-would-you-control-your-it-galaxy
CC-MAIN-2018-13
refinedweb
150
83.76
in reply to Puzzle: Given an array of integers, find the best sequence of pop / shift... Unless I'm missing something, I reckon your solution is a lot more complex than it needs to be. Given that "the other player also picks his best move", then all you need to do is determine which produces the higher score - a pop-first, or a shift-first. This is my go at it: #!/usr/bin/perl -wl use strict; my @numbers = qw(16 2 10 2 9 17 5 8 15 14 20 19 19 11 10 11 9 13 7 13) +; my $shiftscore = checkscore("shift"); @numbers = qw(16 2 10 2 9 17 5 8 15 14 20 19 19 11 10 11 9 13 7 13); my $popscore = checkscore("pop"); my $bestscore = $popscore > $shiftscore ? $popscore : $shiftscore; print "POP:$popscore:SHIFT:$shiftscore"; print "Best Score:$bestscore"; sub checkscore { my $first_turn = shift; my ($player, $opponent); $player = $first_turn eq "pop" ? pop(@numbers) : shift(@numbers); while (@numbers) { $opponent += $numbers[0] > $numbers[-1] ? shift(@numbers) : pop(@numbers); last if !@numbers; $player += $numbers[0] > $numbers[-1] ? shift(@numbers) : pop(@numbers); } return ($player - $opponent); } [download] POP:4:SHIFT:10 Best Score:10 [download] Update: To test how long it takes with 1000 numbers I added the following lines:. use List::Util qw(shuffle); my @numbers = shuffle(1 .. 1000); print join(" ", @numbers); my @copy = @numbers; my $shiftscore = checkscore("shift"); @numbers = @copy; my $popscore = checkscore("pop"); [download] POP:4354:SHIFT:7452 Best Score:7452 real 0m0.049s user 0m0.030s sys 0m0.000s [download] Update 2: - as tilly has pointed out, my solution is wrong. I kindof suspected that it would be - because it seemed too simple. And although I acknowledged further down in the thread that it was wrong, I forgot to add an update here. Cheers, Darren :) What he's written is to make the best choice at every turn based on the assumption that both players will thereafter play by a greedy strategy. However the greedy solution is suboptimal play, and the smart opponent will not do that. As an example for the game 38 67 63 43 83 66, Darren's solution says that if you pop, you'll get a final score of 4, versus -26 if you shift, so you should pop. In fact by shifting you can get a score of 8, while with pop you can be forced to a score of
http://www.perlmonks.org/index.pl?node_id=537863
CC-MAIN-2015-35
refinedweb
401
71.04
Ok, I'm sorry, I still don't really understand what to do. Does it actually say what values to add on that page? I found a link off of that page, but it wasn't actually the page. Anyway, I've been trying for a while now, to no avail. Here's what I found, although I must be doing something wrong because it isn't working: and. Can anyone explain this to me simply? I'm rather slow .. Use the tree-view on the left and look at some of the surrounding documentation. I would also inspect existing entries in your registry for examples - like how .txt maps to notepad.exe etc.. gg I associated one of the file types with my application not from the regristry, but form a folder - Tools->Folder Options->File Types. I then looked at the registry to see what it had done, did the exact same thing with another file I want to associate but this time I copied the stuff in the registry, changing only the things that needed to be changed, such as the name. Of course, the first one worked but the second one did not. Here's what I've tried: Under HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Explorer\FileExts\.mona: Gosh, this is a pain. Any suggestions?Gosh, this is a pain. Any suggestions?Code:(Default) = (value not set) Progid = mona_auto_file OpenWith List (Default) = (value not set) a = Program Name.exe b = NOTEPAD.EXE MRUlist = ab OpenWithProgids (Default) = (value not set) ft000001 = (zero-length binary value) //This is a REG_BINARY type mona_auto_file= (zero-length binary value) //This is a REG_BINARY TYPE File Type Description= (zero-length binary value) //This is a REG_BINARY type Well, I already tried that codeplug and it didn't really help... To set a default value in the registry, specify the name "" for the name argument.To set a default value in the registry, specify the name "" for the name argument.Code:HKEY_CLASSES_ROOT: -> File extension (including prefix .) -> Default value, set to a new value - this will be your key name. -> Your key name you specified in the default value. -> shell -> Name of your command -> command -> Default value: Set to command to execute. %1 means the filename. So "%SystemRoot%\system32\NOTEPAD.EXE %1" opens notepad and passes the textfile you're trying to open as an argument. Check out .txt in the registry to see how notepad does it. *sigh* I still can't get it to work! I did exactly as Elysia said, and that still didn't work. I must be doing something wrong. I've looked at the .txt part, but it doesn't look anything like Elysia's. The file still doesn't open with my program. Here's what I did: Code:HKEY_CLASSES_ROOT: -> .mona -> Default value = File Archive -> File Archive -> shell -> open -> command -> Default value = "C:\My Program.exe %1" Last edited by mikeman118; 12-21-2007 at 06:54 PM. Reason: Added more info I finally got it to work! Elysia, thanks for getting me in the right direction, but it seems your code didn't work. I got rid of the "Your key name you specified in the default value." key, and changed the value of "C:\My Program.exe %1" to "C:\My Program.exe" "%1" (I saw that on MSDN). Thanks again, codeplug and Elysia - you're the only ones who helped. Now if you guys aren't sick of me yet, I have just one more question. How would I specify the icon to display from the new file type? It's in my program. NVM, I think I found it. Thanks again! Last edited by mikeman118; 12-21-2007 at 07:06 PM. On second thought, maybe I haven't. This is what I tried: However, that doesn't seem to do anything. This isn't too important to me, so if you guys are too tired of answering my questions you don't have too.However, that doesn't seem to do anything. This isn't too important to me, so if you guys are too tired of answering my questions you don't have too.Code:->.cboarddefault = C++->C++default = C++ Application->DefaultIcondefault = C:\Program.exe, 1 [EDIT]I got this info from here.[/EDIT] [EDIT2]Ah, yes. Once again, I solved my own problem! I feel happy. It turned out that the resource value I gave to my icon in my .rc file was the number of the icon. So I changed it from "1" to "106", and the fixed it. Hopefully that's my last question about the registry![/EDIT2] Last edited by mikeman118; 12-21-2007 at 07:36 PM. Yeah I know- I used different names in my app - those names would be silly! I just didn't feel like putting the real names. Will this ever end? Ok, I have one last question. I have updated the icon for my file, but it doesn't appear to be working. I was looking through the documentation and found the SHUpdateImage( function which is apparently necessary to make the icons show up. When looking at it, I found that I have to use two other functions in combination with it (what is with the stupid win api? If they are going to make you call three different functions for one, can't they put it into 1 function?!)! So I tried that: However, I recieve compiler error C2352:However, I recieve compiler error C2352:Code:LPSTR lps = "C:\\My Program.exe"; int index; UINT value; SHFILEINFO sh; SHGetFileInfo(lp, 0, &sh, sizeof(SHFILEINFO), SHGFI_SYSICONINDEX); IExtractIcon::GetIconLocation(GIL_DEFAULTICON, lps, sizeof(LPSTR), &index, &value); SHUpdateImage(lps, index, value, sh.iIcon); I looked up what that error meant, but I have no idea how to fix it... does anyone else? I'm sure I made some other mistake anyway, so if anyone sees anything please point it out.I looked up what that error meant, but I have no idea how to fix it... does anyone else? I'm sure I made some other mistake anyway, so if anyone sees anything please point it out.Code:error C2352: 'IExtractIconA::GetIconLocation' : illegal call of non-static member function BTW Elysia that's not my real program name. This is COM... it's not a namespace - it's a class, so you have to create an instance of it first. Though you actually have to query for the interface and then extract the icon. COM is messy and confusing for newbies. You might want to stay away from it and it some other way... Yeah, I tried making an instance of it, but it gives me this error: I don't particularly want to get into COM... I just want to associate a file extension!I don't particularly want to get into COM... I just want to associate a file extension!Code:error C2259: 'IExtractIconA' : cannot instantiate abstract class That's because it's COM - you can't create them directly. You have to use CoCreateInstance. And even so, you're supposed to find the folder or file you want to get an icon from and query for the interface, so it's not easy. Better read up on how COM works or avoid it altogether.
https://cboard.cprogramming.com/windows-programming/97164-file-types-2.html
CC-MAIN-2018-05
refinedweb
1,214
76.52
Hello everyone! I'm trying to start a small series on a Mining Simulator game. Throughout the series, we will design a game of Mining Simulator where you can mine blocks, sell them, and use the money to buy better equipment. Backpacks give you more storage and Tools help you mine faster. Section-1 of Mining Simulator will teach you how to create the main structure of the game: Inside the mine. We will use hardcoded variables for our backpack and tool. Let's get started! Import the packs Import the files/packs using this code. from termcolor import cprint from replit import clear from time import sleep - cprint imports the text for colors. - Clear imports the function of deleting text - sleep imports the time in between print statements. Your code should look like this: Variables To play this game, we need variables for our tools and backpacks. For our tools, we can make a variable called "ToolSpeed" so we know the time interval between mining blocks (We will measure ToolSpeed in seconds). For our backpack, we can have a variable called "PackLimit" to know our limit for the number of blocks we mine. Here is the code: What this code really means is that every time you mine a block, it takes 3 seconds to be able to mine again, and once you've reached 10 blocks, you have to sell them. Changing the Variables Time to change the variables! Every time you mine a block, the tool needs a cooldown. The cooldown is the variable "Toolspeed." To mine a block, the output will need to be something that looks like this: Press enter to mine a block. [0/10] Then when you mine a block, it will say: Regenerating... (Stay this text for three seconds) Then it will clear the screen. Then it will say: Press enter to mine a block. [1/10] You see the 0 changed to a 1. We can write the code as: for i in range(PackLimit+1): print('Press enter to mine a block','[',(i),'/',PackLimit,']') input(">>> ") print("Regenerating...") sleep(Toolspeed) clear() So far, you should see this in your screen: Closing the Mine- Last chapter of this section When you've mined to your backpack limit, it should say a screen that says, "You've reached your backpack limit! Visit the store to buy a better backpack or sell your mined blocks!" We already have a "for" loop to take care of the backpack limit, so we don't need an if statement. We simply write a line of code on the next line: print("You've reached your backpack limit! Visit the store to buy a better backpack or sell your mined blocks!") THE END Thank you for taking the time to read this! Please upvote and I hope you have fun making this game! Remember: Criticism IS ALLOWED. Please tell me if there is anything wrong. Remember to upvote if you like this! Peace for now! -DJStudios Team @DJWang if you click enter while regenerating and then stop and don't do anything it keeps auto mining for you
https://repl.it/talk/learn/Mining-Simulator-Section-1/25436
CC-MAIN-2020-05
refinedweb
520
81.93
Having trouble understanding an error code i keep getting. Please help! dannygirl sylvest Greenhorn Joined: Oct 18, 2010 Posts: 9 posted Oct 18, 2010 20:10:50 0 I'm doing an assignment where i have. class SavingsAccount { private double balance; // Account balance private double annualinterestrate; // add code to the constructors public SavingsAccount() { balance = 0.0; } public SavingsAccount(double startBalance, double AnnualInterestRate) { balance = startBalance; annualinterestrate = AnnualInterestRate; } private double MonthlyInterestRate( double annualrate) { return annualrate /12; } public void addInterest() { double interest = (annualinterestrate * balance); } The deposit method makes a deposit into the account. @param str The amount to add to the balance field, as a String. */. */ public void setBalance(double b) { balance = b; } /** The setBalance method sets the account balance. @param str The value, as a String, to store in the balance field. */ public void setBalance(String str) { balance = Double.parseDouble(str); } /** The getBalance method returns the account balance. @return The value in the balance field. */ public double getBalance() { return balance; } } 45 minutes ago - 1 week left to answer. Additional Details I forgot to mention what my project consisted. To add the monthly interest to the balance, multiply the monthly interest rate by the balance, and add the result to the balance. ( this is compound interest ) Use DecimalFormat class to format output. package assignment06; import java.util.Scanner; // Needed for Scanner class. import java.text.DecimalFormat; // Needed for DecimalFormat class. /** * * @author Dsylvester */ public class testAccount { public static void main(String[] args) { String input; // To hold user input double balance, interestRate; double interest, deposit, withdrawl; double totalInterest = 0, totalDeposit = 0, totalWithdrawls = 0; int month=0; char repeat = 'Y'; // Create Decimal Format. DecimalFormat dollar = new DecimalFormat ("#,###.00"); // Create a Scanner object. Scanner keyboard = new Scanner(System.in); //Prompt for starting Balance. System.out.print(" What is your starting balance? "); balance = keyboard.nextDouble(); // Prompt for Annual Interest Rate. System.out.print("What is your annual Interest Rate? "); interestRate = keyboard.nextDouble(); I'm new at this and i am still trying to grasp the concept of calling methods and the use of constructors. When i run my code this is what happens Your total deposit is 0.0 Your total withdrawls were 0.0 Your total interest is 0.008333333333333333 Your total balance is $ 1,000.01 Calculate the month 2 (Y/N) Exception in thread "main" java.lang.StringIndexOutOfBoundsExceptio… String index out of range: 0 at java.lang.String.charAt(String.java:686) at assignment06.testAccount.main(testAccoun… Java Result: 1 BUILD SUCCESSFUL (total time: 11 seconds) i'm still not sure exactly what is going wrong . Thanks for your input [fbr - added code tags] Paul Beckett Ranch Hand Joined: Jun 14, 2008 Posts: 96 posted Oct 19, 2010 01:03:11 0 Welcome to the Java Ranch! Please can you use UseCodeTags when posting code samples. Paul Beckett Ranch Hand Joined: Jun 14, 2008 Posts: 96 posted Oct 19, 2010 01:13:23 1 first lets look at your exception stack trace. ...StringIndexOutOfBoundsException. This indicates that your String does not contain a character at the index you've asked for. For the String "abcd" which has a length of 4 characters but the maximum index you can ask for is 3 (Strings are zero indexed). Your stack trace says "String index out of range: 0". This indicates you've asked for index 0 of the String and it wasn't found so its an empty String (if it was null you would get a NullPointerException instead). ...String.charAt. This first line tells you exactly where the exception was thrown (line 686 of the String class in the chatAt method). I can't see anywhere in your code where the charAt method is called. Is your code listing complete? ...testAccount.main. This is a very useful line in your stack trace and tells you from where the String.charAt method was called. The stack trace will include the line number to help you but you haven't included the full stack trace in your post. fred rosenberger lowercase baba Bartender Joined: Oct 02, 2003 Posts: 11734 18 I like... posted Oct 19, 2010 07:04:26 0 I added code tags to make your post slightly more readable. There are only two hard things in computer science: cache invalidation, naming things, and off-by-one errors I agree. Here's the link: subject: Having trouble understanding an error code i keep getting. Please help! Similar Threads SubClass Blues! Help code problem please Very Confused!! Ready to give up! Help on testprogram and subclass please All times are in JavaRanch time: GMT-6 in summer, GMT-7 in winter JForum | Paul Wheaton
http://www.coderanch.com/t/514256/java/java/trouble-understanding-error-code
CC-MAIN-2015-22
refinedweb
765
58.48
-54761. November 13, 1985.] IN RE: PETITION FOR HABEAS CORPUS OF MANUEL M. VILLAR, ERROL ORGAYA and MIGUEL QUEBEDO, Petitioners , v. JOLLY R. BUGARIN, as Director, National Bureau of Investigation; THE CHIEF, PHILIPPINE CONSTABULARY; and THE HONORABLE MINISTER OF NATIONAL DEFENSE, Respondents . R E S O L U T I O N MAKASIAR, J. : This is a petition for habeas corpus filed on August 30, 1980 by petitioners Manuel M. Villar, Errol Orgaya and Miguel Quebedo, naming as respondents herein Jolly R. Bugarin, in his capacity as Director of the National Bureau of Investigation, The Chief of the Philippine Constabulary and the Minister of National Defense. The antecedent facts are as follows: chanrob1es virtual 1aw library On February 11, 1980, respondent Jolly R. Bugarin, as Director of the NBI, sought clearance from the Office of the President, for the issuance of an Arrest, Search and Seizure Order (ASSO) against the following officers of the Abba Holdings Corporation in Naga City and Rural Bank of Buhi, Bato and Pasacao: Manuel Villar, Erlinda Villar, Orlando Bernardino, Nestor Poro, Errol Orgaya, Jaime Fabi, Jose Adorable, Nestor Arulia, Lagrimas Geronimo, Lydia Mabesa; and Miguel Quebedo, as Assistant Manager, Pasacao Rural Bank, for their alleged complicity in a large-scale swindle (estafa) against the Central Bank and innocent third parties through the fraudulent grant of loans by rural banks under its control to "ghost borrowers" and obtaining rediscounts from the Central Bank, to the prejudice of the public and the Central Bank. On February 26, 1980, acting on the letter-request of the NBI Director, the President of the Philippines approved the issuance of an Arrest, Search and Seizure Order (ASSO). On March 10, 1980, Arrest, Search and Seizure Order No. 4785 was issued by the Minister of National Defense pursuant to the Presidential Memorandum of February 26, 1980. Having learned of the issuance of an ASSO against them, petitioners herein voluntarily surrendered to the authorities and were thus subsequently detained at Camp Aguinaldo (petitioner Manuel Villar) and Camp Crame (petitioners Errol Orgaya and Miguel Quebedo) in Quezon City, respectively. On May 5, 1980, Petitioners , along with five others, through counsel, wrote the President asking "for compassion and for their release soonest, to enable them to go about their livelihood for the survival of their families and those who depend upon them for daily subsistence." cralaw virtua1aw library On June 5, 1980, in a 2nd Indorsement signed by the Director of the NBI, respondent herein, and by way of reply to the letter-appeal of May 5, 1980, petitioners’ request for a temporary release was denied on the ground that." . . a favorable action on said requests may be recommended only after all cases for which ASSO No. 4785 dated March 10, 1980 shall have been filed." cralaw virtua1aw library On September 2, 1980, this Court adopted a resolution for the issuance of the writ of habeas corpus . The respondents were also required to make a return of the writ. The hearing was then scheduled for September 11, 1980. The respondents in their return (pp. 21-24, rec.) filed on September 10, 1980, alleged that eighty-two (82) cases for estafa against herein petitioners were filed for preliminary investigation at the Ministry of Justice. The preliminary investigation of thirty (30) charges have been terminated already, while the remaining fifty-two (52) are still undergoing preliminary investigation. Respondents further alleged that another forty-nine (49) similar charges are about to be filed also with the Ministry of Justice against petitioners herein in connection with fictitious loan transactions at the Rural Bank of Bato, Camarines Sur. Moreover, respondents alleged, other investigations involving nine other rural banks under the control of the petitioners as officers and directors of the ABBA Holdings Corporation are still going on. In the same return, respondents herein likewise attached a summary (Annex "L", p. 26, rec.) prepared by Central Bank Examiner King C. Disimulacion, showing the large-scale swindling activities allegedly committed by petitioners herein. In a resolution dated September 19, 1980, this Court resolved to require the NBI representatives, Atty. Ricardo P. Robles, Jr. and Atty. Wilfredo Bantay, to submit a manifestation of compliance that they have contacted NBI Director Jolly R. Bugarin who was abroad regarding the recommendation to lift the Arrest, Search and Seizure Order. On September 26, 1980, the NBI representatives filed a compliance stating that the Director of the NBI was amenable to recommending to the President the temporary release of the petitioners after all the criminal cases against them shall have been filed with the Ministry of Justice, and subject to the condition that petitioners herein report to the NBI at least once a week. On October 25, 1980, Petitioners , thru counsel, filed a manifestation stating that all criminal complaints against them have already been filed with the Ministry of Justice. Petitioners likewise pray that the petition be resolved and that they be released. In a resolution dated November 6, 1980, the Court resolved to require the Solicitor General to comment on the petitioners’ manifestation of October 25, 1980. On December 10, 1980, the Solicitor General filed his comment in compliance with the resolution of this Court dated November 6, 1980. In his comment, the Solicitor General stated that the petition has become moot and academic in view of the fact "that all the petitioners have been released, as evidenced by the Temporary Release Orders, dated October 30, 1980 of General Romeo C. Espino, Chief of Staff of the Armed Forces of the Philippines, directing the temporary release of petitioners Manuel Villar, Errol Orgaya and Miguel Quebedo, respectively, copies of which are attached hereto as Annexes ‘B’, ‘C’ and ‘D’." cralaw virtua1aw library In a letter dated January 21, 1981, Atty. Juanito C. Ranjo, Clerk of Court I of this Court, upon instruction of then Chief Justice Enrique M. Fernando, wrote a letter (p. 56, rec.) to the NBI Director requesting information regarding the "status of the detention of the three (3) petitioners, namely: Manuel M. Villar, Errol Orgaya and Miguel Quebedo, who have been released . . . pursuant to an Order issued by General Romeo C. Espino, Chief of Staff, AFP, in his capacity as Commander CAD dated 30 October 1980." cralaw virtua1aw library Likewise, on the same date - January 21, 1981 - Atty. Juanito C. Ranjo wrote a similar letter to the Honorable Carmelo Barbero (now deceased), then Deputy Minister of National Defense, also asking information regarding the status of the detention of the petitioners herein. chanrobles virtual lawlibrary In an answer to the letter of Atty. Juanito C. Ranjo of this Court, the NBI Director wrote a letter also dated January 21, 1981, hereunder quoted as follows: jgc:chanrobles.com.ph "S i r. "Anent your letter of instant date, please be informed that ERROL ORGAYA y FRIA and MIGUEL QUEVEDO y RAPISORA, who were detained in this Bureau on 21 March 1980 and 24 March 1980, respectively, by virtue of ASSO No. 4785 dated 10 March 1980, were both turned over for custody to the military authorities in Camp Crame, Quezon City on 10 May 1980. "MANUEL M. VILLAR, who reportedly surrendered to the military, was never detained with us. Very truly yours, (SGD.) JOLLY R. BUGARIN Director" (p. 58, rec.). In a letter dated February 10, 1981, the Office for Detainee Affairs of the Ministry of National Defense likewise wrote a letter addressed to Atty. Juanito C. Ranjo, the contents of which are as follows: jgc:chanrobles.com.ph "Dear Atty. Ranjo, "This has reference to your letter of January 21, 1981, requesting information regarding the status of the detention of the petitioners for Habeas Corpus, namely, Miguel Quevedo, Manuel Villar, and Errol Orgaya who were granted temporary release on October 30, 1980 under the supervision of Director, National Bureau of Investigation. "Please be informed that the status of their release will remain temporary until their case is finally resolved by the court which has jurisdiction over their case. Very truly yours, FOR THE CHIEF: chanrob1es virtual 1aw library (SGD.) JOSE O. STA. ROMANA Col., JAGS PC (Ret) Deputy Chief" (p. 59. rec.). On February 26, 1981, Atty. Juanito C. Ranjo submitted a memorandum to then Chief Justice Enrique M. Fernando pointing out some discrepancies in the letter-replies of the Director of the NBI and the Office for Detainees Affair of the Ministry of National Defense. It was also recommended therein that NBI Director Jolly R. Bugarin be required to comment on the letter of Col. Jose O. Sta. Romana, and vice versa, within ten (10) days from notice. On March 10, 1981, Atty. Juanito C. Ranjo wrote two separate letters addressed to the aforementioned officials inquiring specifically about the status of the detention of the petitioners herein. On September 8, 1981, Atty. Juanito C. Ranjo submitted a memorandum to the Chief Justice, the pertinent portion of which reads as follows: jgc:chanrobles.com.ph ". . . From the letters-reply of NBI Acting Director Ponciano V. Fernando dated March 17, 1981, and Col. Cesar P. Nazareno, Office for Detainee Affairs, Ministry of National Defense, dated August 27, 1981, the following may be gathered: Several criminal cases were filed in court against petitioners for which reason they were arrested. Manuel Villar was released on bail. A few days after his release, other warrants were issued for his arrest. However, the NBI could not effect his arrest because he could not be located. The same is true with respect to Errol Orgaya and Manuel Quevedo. After they were released on bail, several warrants were issued for their arrest in connection with other criminal cases. However, only Miguel Quevedo was arrested and is now under detention. In short, only Miguel Quevedo is under detention by virtue of a warrant of arrest issued in connection with another criminal case filed in court against him. The other petitioners, Manuel Villar and Errol Orgaya, are at large, their whereabouts unknown which accounts for the failure of the NBI to rearrest them in connection with other criminal cases filed in court against them. "Considering that the corresponding criminal charges against petitioners have already been filed in court, it is submitted that the submission of the Solicitor General in his comment that the petition is already moot and academic and, therefore, should be dismissed, merits favorable action" (pp. 82-83, rec.). In a resolution dated April 25, 1985, this Court resolved to require Atty. Juanito C. Ranjo to ascertain and report the criminal cases filed against petitioner Manuel M. Villar. chanrobles law library In two separate letters - both dated April 30, 1985 - addressed to the Minister of National Defense and the Director of National Bureau of Investigation, Atty. Juanito C. Ranjo formally asked for information about the criminal cases filed against petitioner Manuel M. Villar. On June 27, 1985, Atty. Ranjo filed a compliance with respect to the letter-answer of the NBI Director dated May 8, 1985, which states in part that they "cannot determine from the records available on file whether the aforementioned information pertain to the person subject of your request." cralaw virtua1aw library On August 21, 1985, Atty. Ranjo filed a manifestation before this Court, the pertinent portions of which are as follows: jgc:chanrobles.com.ph "1. On July 25, 1985, the undersigned addressed three (3) letters to the Honorable Chief State Prosecutor, Ministry of Justice, Manila, one (1) letter each to the Honorable Judge, Metropolitan Trial Court Branch XXXII at Quezon City (formerly Quezon City Court Branch II), and to the Honorable City Fiscal, Naga City, inquiring about the status of the criminal cases filed against the petitioner Manuel M. Villar. x x x "2. The aforesaid officials, except the City Fiscal, responded stating the status of said cases, to wit: jgc:chanrobles.com.ph "a. Chief State Prosecutor Artemio G. Tuquero. "(a.1) The ‘30 criminal cases for Estafa thru Falsification of Public and/or Commercial documents involving the operations of the Pasacao Rural Bank’ ‘are being jointly tried before Branch XXII of the Regional Trial Court of Naga City.’ "Status of Cases: ‘The last trial date was on June 14, 1985.’ "(a.2) The ‘45 cases for Estafa thru Falsification of Public and/or Commercial documents involving the operation of the Bato Rural Bank’ are being tried jointly before Judge Abonal of the Regional Trial Court of Iriga City.’ "Status of cases: ‘The last trial date was on August 1, 1985.’ "The prosecution of all the criminal cases mentioned in subparagraphs (a.1) and (a.2) are being handled/conducted by State Prosecutor R. Victorino. "(a.3) The ‘53 cases [People v. Manuel M. Villar, Et Al., Criminal Cases Nos. 1679 to 1731] for Estafa thru Falsification of Public and/or Commercial documents involving the operation of the Rural Bank of Bacon’ are being jointly tried before Branch II of the Regional Trial Court of Sorsogon.’ "Status of Cases: ‘There is a pending prosecution motion to discharge some accused to be utilized as state witnesses.’ This motion is pending resolution. "(a.4) ‘The 25 cases [People v. Manuel M. Villar, Et Al., Criminal Cases Nos. L-098 to 122] of Falsification of Public and/or Commercial documents involving the operation of the Libmanan Rural Bank’ are being jointly tried before Branch XXIX of the Regional Trial Court at Libmanan, Camarines Sur.’ "Status of Cases: These cases are pending trial. "The prosecution of all the criminal cases mentioned in subparagraphs (a.3) and (a.4) are being handled/conducted by Senior State Prosecutor Melquiades A. Gabriel. "(a.5) The ‘51 cases [Criminal Cases Nos. IR-1222 to IR-1273, People of the Philippines v. Manuel M. Villar, Et. Al.) for Estafa thru Falsification of Public and/or Commercial documents involving the operation of Buhi Rural Bank’ ‘are being jointly tried before the Regional Trial Court Branch XXXIV at Iriga City.’ "Status of Cases: ‘Scheduled trial last March 12 and 13, 1985 was suspended in view of the restraining order issued by the First Special Cases Division, IAC, on the petition for certiorari filed by accused Manuel M. Villar and Miguel Quevedo." [The prosecution is still presenting its evidence]. "(Note: ‘Manuel M. Villar, Erlinda Villar and ten [10] others except Orlando and Florante Bernardino who are at large, had already been arraigned and out on bail’). "(a.6) The ‘5 cases [Criminal Cases Nos. IR-1956 to IR-1963, People of the Philippines v. Manuel M. Villar, Et. Al.] for Estafa thru Falsification of Public and/or Commercial documents involving the operation of Balatan Rural Bank, Balatan, Camarines Sur’ ‘are being jointly tried before the Regional Trial Court Branches XXXIV and XXXVII at Iriga City.’ "Status of Cases: These cases have not yet been set for trial. "(Note: ‘Accused Manuel M. Villar is presently under the NBI custody at Naga City by reason of the earlier disapproval of his property bond per the Court’s order dated May 27, 1985’) [ Emphasis supplied ]. "The prosecution of all the cases stated in subparagraphs (a.5) and (a.6) are being handled/conducted by State Prosecutor Eugenio M. Cruz Jr.. "b. Branch Clerk of Court Emelita C. Camaya, Metropolitan Trial Court Branch XXXI at Quezon City. "Criminal Case No. 11-21149, People of the Philippines v. Manuel M. Villar, for violation of Sec. 24(d), in relation to Sec. 28(e) of RA 1161, as amended, was raffled to the Quezon City Court, Branch II at Quezon City (now Metropolitan Trial Court, Branch XXXII at Quezon City). "Status of the Case: The case was dismissed by the Metropolitan Court with costs de officio in an order dated October 5, 1982, upon written motion of the prosecution" (pp. 102-105, rec.). From the foregoing, as shown by the Memorandum of Atty. Juanito C. Ranjo dated September 8, 1981, it appears that petitioners herein were arrested because of several criminal cases filed in court against them. They were later released on bail. However, other warrants for several other criminal cases were issued against them. But, only petitioner Miguel Quebedo was arrested in connection with another criminal case filed against him. Petitioners Manuel Villar and Errol Orgaya remain at large, their whereabouts unknown. On July 31, 1985, however, by way of reply to the letter of Atty. Ranjo dated July 24, 1985, asking for information as to the status of the cases filed against petitioner Manuel Villar, Chief State Prosecutor Artemio G. Tuquero submitted the reply-letters of State Prosecutors Melquiades A. Gabriel and Eugenio M. Cruz (pp. 111-113, rec.). chanrobles lawlibrary : rednad In the reply-letter of State Prosecutor Eugenio M. Cruz, likewise dated July 31, 1985, which was cited in the Manifestation by Atty. Ranjo on August 21, 1985 before this Court, it was stated, inter alia, that "Accused Manuel Villar is presently under the NBI custody at Naga City by reason of the earlier disapproval of his property bond per the Court’s order dated May 27, 1985" in connection with Criminal Case Nos. IR-1956 to IR-1963 before the Regional Trial Court, Branch XXXIV & XXXVII, Iriga City, Camarines Sur. It thus appear clear from the record that petitioners Manuel Villar and Miguel Quebedo are in custody of the law in connection with several criminal cases filed against them, while petitioner Errol Orgaya remains at large. WHEREFORE, THE PETITION IS HEREBY DISMISSED. NO COSTS. SO ORDERED. Abad Santos, Melencio-Herrera, Plana, Escolin, De la Fuente, Cuevas, Alampay and Patajo, JJ. , concur. Teehankee, Aquino, JJ. , took no part. Concepcion, Jr. and Relova, JJ. , are on leave. Gutierrez, Jr., J. , concurs in the result. Jurisprudence Supreme Court Decisions 2004 : Philippine Supreme Court Decisions February 2004 : Philippine Supreme Court Decisions Top of Page The Firm The Law Library The Legal Materials The Firm : ReDiaz
http://lawlibrary.chanrobles.com/index.php?option=com_content&view=article&id=26955:g-r-no-l-54761-november-13,-1985-in-re-manuel-m-villar,-et-al-v-jolly-r-bugarin,-et-al&catid=1204&Itemid=566
CC-MAIN-2019-26
refinedweb
2,952
53.81
#include "seek.h" #include "libavutil/mathematics.h" #include "libavutil/mem.h" #include "internal.h" Go to the source code of this file. This routine is not supposed to be called directly by a user application, but by demuxers. A sync point is defined as a point in stream, such that, when decoding start from this point, the decoded output of all streams synchronizes closest to the given timestamp ts. This routine also takes timestamp limits into account. Thus, the output will synchronize no sooner than ts_min and no later than ts_max. Definition at line 244 of file seek.c. Store current parser state and file position. This function can be used by demuxers before a destructive seeking algorithm to store the parser state. Depending on the outcome of the seek, either the original state can be restored or the new state kept and the original state freed. Definition at line 394 of file seek.c. Definition at line 487 of file seek.c. Referenced by ff_free_parser_state(). Partial search for keyframes in multiple streams. This routine searches in each stream for the next lower and the next higher timestamp compared to the given target timestamp. The search starts at the current file position and ends at the file position, where all streams have already been examined (or when all higher key frames are found in the first iteration). This routine is called iteratively with an exponential backoff to find the lower timestamp. Definition at line 97 of file seek.c. Referenced by ff_gen_syncpoint_search(). Compute a distance between timestamps. Distances are only comparable, if same time bases are used for computing distances. Definition at line 63 of file seek.c. Referenced by ff_gen_syncpoint_search().
http://ffmpeg.org/doxygen/0.10/seek_8c.html
CC-MAIN-2014-42
refinedweb
281
68.97
Martin Hochel Member since Aug 20, 2015 - Profile: /members/12791-martin-hochel.htm - URL: Recent Blog Comments By Martin Hochel HTTP Requests Are Cold / Lazy Streams In Angular 2 Beta 6 Posted on Feb 28, 2016 at 9:37 AM afaik all observables ( Rx ) are lazy, and that's a good thing. You have explicit control over them, which you don't get with Promises for example. What Rob meant by saying HTTP streams are cold, is imo that they are implemented as "cold observables". There are hot and cold observables... read more » Understanding The Role Of Static Methods In An Angular 2 Dependency-Injection Context Posted on Feb 28, 2016 at 8:14 AM Hi Ben, again nice deep overview about more, kind of complex, ng2 behind the scenes concepts. Providing a class constructor for ng2 DI is a no brainer, because ng2 is so awesome :) I've created a plunk to demonstrate... read more » Component Life-Cycle Methods Need To Be Defined On The Prototype In AngularJS 2 Beta 1 Posted on Jan 25, 2016 at 4:33 PM @Ben, hehe yeah, well bundle is just readable like, mmm, well ... bundle :D but I completely understand your reasoning to stick with es5 for now. But trust me, once you start with ES6, you'll never look back ;)... read more » Component Life-Cycle Methods Need To Be Defined On The Prototype In AngularJS 2 Beta 1 Posted on Jan 25, 2016 at 3:39 PM rea... read more » Formatting And Parsing Custom ngModel Bindings In AngularJS Posted on Dec 2, 2015 at 3:54 PM @Ben, sorry for the delay, here is basic example: tl;dr always angular.copy to break the references and to provide new reference for ngModel.... read more » Formatting And Parsing Custom ngModel Bindings In AngularJS Posted on Nov 30, 2015 at 5:07 PM Ben, just bravo! Also using ng-model is very useful for passing data model binding to your component if you wanna provide one way data flow. $render( instead of $scope.$watch and within, setting your internal property with angular.copy(viewValue)) + $setViewValue for manually controlled update t... read more » Creating An Isolate-Scope Directive With Multiple Transclusion Points In AngularJS Posted on Oct 19, 2015 at 11:08 AM @Ben, wow thanks! I'm glad it was helpful :)... read more » Handling Window Blur And Focus Events In AngularJS Posted on Oct 19, 2015 at 10:53 AM @Ben, yup exactly, I've also used $apply for situations like in your example and because $evalAsync just wasn't there. thanks for chat! I love your posts and hope that one day I'll be able to buy you a beer for your effort to the community. cheers!... read more » Creating An Isolate-Scope Directive With Multiple Transclusion Points In AngularJS Posted on Oct 18, 2015 at 5:26 PM Interesting approach Ben. I think your approach is way to complicated. Check this out: just simple service implementation. anyway it has already landed to angular repo https://... read more » Handling Window Blur And Focus Events In AngularJS Posted on Oct 15, 2015 at 8:52 AM and of course, $evalAsync works :) // your code but $evalAsync instead of $apply // demo showcase?... read more » Handling Window Blur And Focus Events In AngularJS Posted on Oct 15, 2015 at 8:38 AM @Ben, haha, yes I am aware of everything you said master! :) $scope.$apply is not always the best choice because the dirty checking has to run through whole scope tree, which may be slow in some cases :) In some cases scope.$digest is sufficient. That was my point.... read more » Handling Window Blur And Focus Events In AngularJS Posted on Oct 14, 2015 at 7:58 AM very cool Ben! as always :) Maybe you can use just scope.$evalAsync( attributes.bnWindowBlur ); or just scope.$eval() instead of $apply. $apply is $EVIL! :)... read more » Creating A ReactJS-Inspired "Props" Object In AngularJS Posted on Aug 31, 2015 at 8:41 AM @Ben, yes the view can access the state. It's defined as private just explicitly disable to set state directly from link function or from some other directive, which requires that component/directive. All in all that's just typescript so the state is publicly available on the scope.ctrl namespace... read more » Creating A ReactJS-Inspired "Props" Object In AngularJS Posted on Aug 28, 2015 at 11:45 AM Again very interesting idea Ben. ReactJs is super cool(expect the jsx abomination imho) and we can definitely learn a lot from it. I'm doing something similar, angular via "reactJS" api style. So state ( vm ) props are strictly on this.state and you are using bindToController to get prop... read more » TypeError: Cannot Read Property "childNodes" Of Undefined In AngularJS Posted on Aug 20, 2015 at 1:06 PM Hi Ben, very interesting bug indeed. You should implement custom directive for these kinds of script/css lazy loading, because as you mentioned dom manipulation in controller is a BIG no no :) I've created jsbin as a showcase: look particulary at myLoadScri... read more »
https://www.bennadel.com/members/12791-martin-hochel.htm
CC-MAIN-2021-31
refinedweb
852
62.68
New exercises added to: Ruby, Java, PHP, Python, C Programming, Matplotlib, Python NumPy, Python Pandas, PL/SQL, Swift Python Module Introduction Modules are a simple way to organize a program which contains program code, variables etc.. All these definitions and statements are contained in a single Python file. The name of the module is the name of the file name with .py extension. Modules are not loaded unless we execute in Python interpreter or call within a program. In Python, there are modules in a standard library, current directory or directories containing .py files (in fact each file with .py extension is a module). To define a module, you can use Python IDLE, Notepad++ or any suitable text editor. Lets create a file called factorial.py which will create the factorial (in mathematics, the factorial of n [a positive integer] is the product of all positive integers less than or equal to n.) of a positive integer as well as some other jobs in the current directory. Example: # factorial.py def factcal(n): # Create the factorial of a positive integer fact = 1 while n>0: fact *= n n=n-1 if(n<=1): break else: # Display the message if n is not a positive integer. print('Input a correct number....') return return fact def factdata(n): # return the numbers of factorial x result = [] while n>0: result.append(n) n = n - 1 if(n==0): break else: # Display the message if n is not a positive integer. print('Input a correct number....') return return result Importing a module: In order to use a module, use import statement. Go to the Python interpreter and execute the following command : There are two functions factcal(n) and factdata(n) are defined in factorial.py. Using the module name we can access the functions. functions factcal(5) creates the factorial of 5 and factdata(5) shows the numbers involved in factorial 5. In the above example instead of factorial.factcal(n) or factorial.factdata(n) we can assign it to a local name. See the following codes, we assign factorial.factcal into fumber and factorial.factdata into fdata. In Python, a module name (as a string) is stored within a module which is available as the value of the global variable __name__. from..import statement from .. import statement is used to import selective names(s) or all names that a module defines. See the following codes. In above example when we execute factdata(9), an error arise as we only import factcal. To avoid this type of situation import all name(s) with import command adding with a * symbol. Executing modules as scripts: To run a Python module as a script use the following syntax. The program code in the module will be executed with the __name__ set to "__main__" which means adding some additional code at the end of the module. See the source code of script-factorial.py. # script-factorial.py def factcal(n): # Create the factorial of a positive integer fact = 1 while n>0: fact *= n n=n-1 if(n<=1): break else: # Display the message if n is not a positive integer. print('Input a correct number....') return print(fact) def factdata(n): # return the numbers of factorial x result = [] while n>0: result.append(n) n = n - 1 if(n==0): break else: # Display the message if n is not a positive integer. print('Input a correct number....') return print(result) if __name__ == "__main__": import sys factcal(int(sys.argv[1])) factdata(int(sys.argv[2])) Now execute the file at the command prompt (here in windows). Modules Path: - In the directory ,the script is saved or in the current directory. - in PYTHONPATH (a list of directory names), default search path for module files. PYTHONPATH is an environment variable. You will get it using 'env' command in UNIX-based operating system or in the properties of My Computer in windows system. - the installation-dependent default. Standard Module: Python comes with numerous modules. Python has many standard modules as a library. These are aimed to add efficiency or to access operating system primitives. Some of the modules depend upon the operating system. sys is a Python Standard module which is very useful. It is built into every Python interpreter. The dir() function: The built-in function dir() is used to get the names (a sorted list of strings), a module is defined. Check it into Python shell. Amazon promo codes to get huge discounts for limited period (USA only).
https://www.w3resource.com/python/python-module.php
CC-MAIN-2018-26
refinedweb
751
58.99
Search Create Advertisement Upgrade to remove ads 53 terms Sem2 Unit C STUDY PLAY visual elements a good presentation makes use of _____ such as CHARTS, GRAPHICS, and PHOTOGRAPHS. interesting Visual elements keep the presentation ______ and help the audience focus on what the presenter is saying. .doc Microsoft Word extension .rtf Rich Text Format extension .txt Plain Text Format extension (notepad) .htm HTML extension (webpage) word or rich text format When you import a ___ __ ____ ____ ___ into a presentation, PowerPoint creates an outline structure based on the styles in the document. outline structure When you import a word or rich text format into a presentation, PowerPoint creates an ____ ____ based on the styles in the document. heading 1 style A ____ _ ____ in word becomes a slide title. heading 2 style A ____ _ ____ becomes the first level of text in a bulleted list. plaint text format When you instert a ___ __ ____ document into a presentation, PPT creates an outline based on the tabs of the documents paragraphs. tabs When you instert a plain text format document into a presentation, PPT creates an outline based on the ____ of the documents paragraphs. slide titles (.txt) Documents without tabs become _____ first-level (.txt) Paragraphs with on tab indent become ______ text in bulleted list second level (.txt) Paragraphs with two tabs become _____ text Microsoft Clip Organizer In Microsoft Office, clip art and other media files, including photographs, movies, and sounds are stored in a file index system called the ______ and are identified by DESCRIPTIVE KEY WORDS unprofessional Overusing clipart can make a presentation appear _____. Clip art should help deliver a point, not TAKE AWAY FROM INFORMATION. resolution pixels are small squires placed closely together clipart much smaller than pictures; too many pictures can make a file too large to e-mail or store on a disc Clip Organizer The ______ sorts the clip art into groups: MY COLLECTIONS, OFFICE COLLECTIONS, WEB COLLECTIONS Microsoft Office Online Web You may find additional clip arts on the web through ___________. 17 You can download ___ different types of pictures. automatically When a picture is cropped, it is ___ saved unless you change the setting. text box Use a ______ if you need additional text on a slide where the traditional placeholder does not place text efectively for your message. text labels used for small phrase where text DOESN'T AUTOMATICALLY WRAP to the next line inside the box text labels click the text box button, position the insertion point where you want to place the text, click once then enter text word processing used for a sentence or paragraph where the TEXT WRAPS INSIDE the boundaries of the box word processing click the text box button, then click and drag to create chart can be the best way to communicate numerical information chart graphical representation of numerical data worksheet Every chart has a ____ that contains the numerical data displayed by the chart. imbedded when a shirt is inserted, it is ____. This means that it is part of your presentation; however, its data source can be opened for editing purposes. data source Changes made to an embedded object in PPT do not affect the ____ for data (in Excel) cell intersection of a row and column, referred to by row and column location axis labels cells in the first or left column identifies data in a row legend cells in the first or top row, names that provides further information about the data data series each column and row of data in the worksheet (excel) data series markers graphical representation such as bars, columns or pie wedges (in the PP chart) row headings gray boxes with numbers across the left side of the worksheet column headings gray boxes with letters along the top of the worksheet active cell cell currently selected correct information After you insert a chart into your presention, you need to replace the sample date with the _______ import If you have data in an Excel worksheet or another source, you can ____ it to excel. automatically As you enter data and make other changes in the Excel worksheet, the chart in PowerPoint automatically reflects the changes. Switch Row/Column command information is moved from the value or vertical axis to the column laels in legend. (only use this when excel is open) rows and columns tables show information in ______ tab key To move from cell to cell in a table use the ____. word art a set of decorative text styles, or text effects, that you can apply to any text object. contextual tab additional tabs that appear when graphics, tables, charts, etc. art selected column track values over a time or across categories line track values over time pie compare individuaal values to the whole bar compare values in categories or over time Advertisement Upgrade to remove ads
https://quizlet.com/1678962/unit-c-flash-cards/
CC-MAIN-2018-05
refinedweb
824
51.21
An integer number which is evenly divisible by 2 is called even number. When I say evenly divisible, it means that if we divide the even number by 2, it yields no remainder. For example, 2, 4, 6, 8 …are even numbers. An integer number which yields a remainder when divided by 2 is known as odd number. For example, 3, 5, 7, 9 are odd numbers. Lets write a program to check even odd numbers Example: Program to check whether the entered number is even or odd To understand this program, you should have the knowledge of if-else and user-defined functions in C++. #include <iostream> using namespace std; bool checkEvenOdd(int num); int main(){ int num; bool isEven; cout<<"Enter any number: "; //Storing the entered value in variable num cin>>num; //Calling the function that checks even odd isEven = checkEvenOdd(num); if(isEven) cout<<num<<" is an even number"; else cout<<num<<" is an odd number"; return 0; } /* This function checks whether the passed number is even * or odd. If the number is even then this function returns * true else it returns false. */ bool checkEvenOdd(int num){ bool b; /* If number is perfectly divisible by 2 then it is * an even number else it is an odd number * */ if (num % 2 == 0) b=true; else b=false; return b; } Output: Enter any number: 101 101 is an odd number
https://beginnersbook.com/2017/09/cpp-program-to-check-whether-the-input-number-is-even-or-odd/
CC-MAIN-2018-05
refinedweb
232
63.63
Hi. A few weeks a go a post some code to calculate the day of the week of a particular date. It was just an idea. I had to sit down and code it. Here you have it: Code: #include <stdio.h> char *day[] = {"Friday","Saturday","Sunday","Monday","Tuesday","Wednesday", "Thursday"}; int day_of_month[] = {31,28,31,30,31,30,31,31,30,31,30,31}; int day_of_week(int, int, int); int leap (int); void instructions(void); int d, m, a; int main () { instructions(); do { printf("\nEnter date -> "); scanf("%d%d%d",&d, &m, &a); printf("%d %d %d\n", d, m, a); printf ("\nThe day of the week is %s \n", day[day_of_week(d,m,a)]); } while ( (d!=0) && (m!=0) && (a!=0) ); } int day_of_week(int d, int m, int a) { int xa, i; int days_counter = 0; // Compute days from begining of era to december 31 of year a-1 for (xa = 0; xa < a; xa++) if (leap(xa)) days_counter += 366; else days_counter += 365; // Compute days from months before m for (i=0; (i+1) < m; i++) days_counter += day_of_month[i]; // compute the remaining days days_counter+= d; // See if a is leap year and if so, see if date is after february // Add 1 if so. if ( (m > 2) && (leap(a))) days_counter += 1; return ( (int) (days_counter % 7) ); // return the remainder } int leap(int x) { if ( (x % 400) == 0 ) // is leap return (1); else if ( (x % 100) == 0 ) // it's not leap return (0); else if ( (x % 4) == 0 ) return (1); // is leap else return (0); // it's not leap } void instructions(void) { printf("This program computes the day of the week of a particular\n"); printf("date. The date must be entered in the form dd mm yyyy.\n"); printf("It should be separated by spaces. Example October 12 1492,\n"); printf("should be entered as : 12 10 1492 .\n"); printf("1. the program will give an answer even if the date does not exist.\n"); printf("2. the program only works for dates after Christ.\n"); printf("3. try the day you were born!\n"); }
http://cboard.cprogramming.com/c-programming/68585-day-week-america-discovered-printable-thread.html
CC-MAIN-2016-18
refinedweb
345
74.32
On 1 May 2015 at 20:59, Guido van Rossum <guido at python.org> wrote: >. Really? I was under the impression that 'await yielding()' as defined above would actually not suspend the coroutine at all, therefore not giving any opportunity for the scheduler to resume another coroutine, and I thought I understood the PEP well enough. Does this mean that somehow "await x" guarantees that the coroutine will suspend at least once? To me the async def above was the equivalent of the following in the 'yield from' world: def yielding(): return yield # Just to make it a generator Then "yield from yielding()" will not yield at all - which makes its name rather misleading! -- Arnaud
https://mail.python.org/pipermail/python-dev/2015-May/139795.html
CC-MAIN-2017-47
refinedweb
115
59.67
Rename Problem...It gives me Error: "Rename:File exist" What should i do now?! Rename Problem...Hi! Look At this code: [code] #include <iostream> #include <conio.h> #include <cstdlib> #includ... seekp Problem...HI! i'v got a file like this: Lesson Name:Math Lesson File Name:1892.txt Student ID | Number ... need some help in files!yeah i know that's correct but i want to delete a group of lines! like this: i have text file with t... need some help in files!sorry but i don't understand what you are talking about! would you describe it more? Thanks so so mu... This user does not accept Private Messages
http://www.cplusplus.com/user/captain_fantastic/
CC-MAIN-2014-42
refinedweb
111
89.24
Class based template tags for Django Project description Please refer to the documentation in the docs/ directory for help. For a HTML rendered version of it please see here. About this project! For the impatient This is how a tag looks like using django-classy-tags: from classytags.core import Tag, Options from classytags.arguments import Argument from django import template register = template.Library() class Hello(Tag): options = Options( Argument('name', required=False, default='world'), 'as', Argument('varname', required=False, resolve=False) ) def render_tag(self, context, name, varname): output = 'hello %s' % name if varname: context[varname] = output return '' return output. Project details Release history Release notifications Download files Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
https://pypi.org/project/django-classy-tags/0.4/
CC-MAIN-2020-16
refinedweb
127
50.43
Hi, sopik at fzu.cz wrote: > I'd like to to work with fields of complex numbers of high precision using > the CLN library. I can't successfuly allocate the memory using memalloc > however. I tired few possibilities, but nothing worked. There is no notice > about this topic in manual or in mail discussion, so it seems to be > straightforward. But I have no idea how to do it. I'm not sure what you are trying to do, but working with complex numbers is straightforward. This is C++ and you should rely on the power of constructors/destructors and, if necessary, use new/delete for memory management, instead of malloc/free. Here is a working mini-example: #include <cln/cln.h> #include <iostream> using namespace std; using namespace cln; int main() { cl_N x = -4; cl_N sqrt_x = sqrt( x ); if ( sqrt_x == complex( 0, 2 ) ) { cout << "See, it works!" << endl; } } If this doesn't help, please post some example code. Best wishes -rbk. -- Richard B. Kreckel <>
http://www.ginac.de/pipermail/cln-list/2009-June/000518.html
CC-MAIN-2014-52
refinedweb
165
75.4
information if you have a previous printing of the book.) Under the section "Java Example Online," add the following section regarding licensing information: Licensing Information You may study, use, modify, and distribute these examples for any non-commercial purpose, as long as the copyright notice at the top of each example is retained. If you would like to use the code in a commercial product, you may purchase a commercial use license from the author for a nominal fee. Visit for information on obtaining such a license. Please note that the examples are provided as-is, with no warranty of any kind. rerun to reflect the removal of the appendix The last paragraph did read : "There were referring, of course" now reads "They were referring, of course" int current, prev=1, prevprev=0; // Initialize some variables for(int i = 0; i < 20; i++) { // Loop exactly 20 times now reads int current, prev=1, prevprev=1; // Initialize some variables System.out.print("1 1 "); // Output the initial two values for(int i = 2; i < 20; i++) { // Loop, outputting remaining values and in the paragraph above, in line 5 "First, it again uses a for statement to loop 20 times." now reads "First, it again uses a for statement as its main loop." "So, in this examples" should be "So, in this example". if (x == 1) return 1; now reads: if (x <= 1) return 1; line 24, changed if (c >= 'Z' ) c -= 26; to if (c > 'Z' ) c -= 26; and line 28, changed if (c >= 'z' ) c -= 26; to if (c > 'z' ) c -= 26; "interatively" should be "interactively". The end of example 2-4 now reads: public void draw(Graphics g) { g.setColor(fill); g.fillRect(x1, y1, (x2 - x1), (y2 - y1)); g.setColor(border); g.drawRect(x1, y1, (x2 - x1), (y2 - y1)); }()); inserted the word "the" between "and specified" World!" font = new Font("Helvetica", Font.BOLD, 48); changed "Helvetica" to "sansserif" create" import java.applet.*; import java.awt.*; to import java.applet.*; import java.awt.*; structure" "The adapter class..." * and keyboard events. This is a required or events won't be sent. should read * and keyboard events. This is required or events won't be sent. import java.applet.*; import java.awt.*; import java.awt.event.*; public class CardLayoutExample2 extends Applet { public void init() { // Create a layout manager, and save a reference to it for future use. // This CardLayout leaves 10 pixels margins around the component. final CardLayout cardlayout = new CardLayout(10, 10); // Specify the layout manager for the applet this.setLayout(cardlayout); // Create a listener to invoke the next() method of cardlayout. ActionListener listener = new ActionListener() { public void actionPerformed(ActionEvent e) { // When button is clicked cardlayout.next(CardLayoutExample2.this); // display the next one. } }; for(int i = 1; i <= 9; i++) { Button b = new Button("Button #" + i); b.addActionListener(listener); this.add("Button" + i, b); // Specify a name for each component } } } cardlayout.next(CardLayoutExample2.this); now reads cardlayout.next(CardLayoutExample.this); b.setBounds(i*26, i*18, 100, 25); // use reshape() in Java 1.1 to b.setBounds(i*26, i*18, 100, 25); // use reshape() in Java 1.0 *margin_height -- how much space...left and right *margin_width -- how much space...top and bottom now reads *margin_height -- how much space...top and bottom *margin_width -- how much space...left and right An important features of the Frame class ... should read An important feature of the Frame class ... Frame f = new Frame("InfoDialog Test"); To: Frame f = new Frame("YesNoDialog Test"); "move" // Ask whether to overwrite it System.out.print("Overwrite existing file " + to_name + "? (Y/N): "); To: // Ask whether to overwrite it System.out.print("Overwrite existing file " + to_file.getName() + "? (Y/N): "); Since this adds a line, we removed the blank line (to keep current page breaks) before: // If the destination is a directory, use the source file name The program went into infinite loop when reading Japanese file. File f; FileReader in = null; try { f = new File(directory, filename); // Create a file object in = new FileReader(f); // Create a char stream to read it int size = (int) f.length(); // Check file size // This size is the file size in byte. ------(1) char[] data = new char[size]; // Allocate an array big enough for it int chars_read = 0; // How many chars read so far? while(chars_read < size) // Loop until we've read it all chars_read += in.read(data, chars_read, size-chars_read); // chars_read is total read size in unicode char ------(2) textarea.setText(new String(data)); // Display chars in TextArea this.setTitle("FileViewer: " + filename); // Set the window title } The author's response: This is an embarrassing mistake, and I am grateful to you for noticing it. In general, I have difficulty catching internationalization errors like this since I do not have a system that uses or can display Japanese text. (And even if I did, I could not develop meaningful examples, since I have no comprehension of the language...) Of the two solutions you propose, I prefer the first one. We should show an example that is guaranteed to work in all cases. However, to improve the efficiency, I would recommend that you modify the example to read more than one line at a time. You use a BufferedReader, which makes reading individual lines efficient, but I fear that appending individual lines to the TextArea is not efficient. So I propose code like this: f = new File(directory, filename); // Create a file object in = new FileReader(f); // Create a char stream to read it char[] buffer = new char[4096]; int len; while((len = in.read(buffer)) != -1) { String s = new String(buffer, 0, len); textarea.append(s); } Note that I have not tested this code, with English text or with Japanese text. I'm just trying to give you an idea of what I'm suggesting. I think this code is properly internationalized, and should always work. If it does not, go ahead and use the code you proposed. "it creates and display a FileViewer window" should be "it creates and displays a FileViewer window". to_server.println("GET " + filename); to: to_server.println("GET " + filename + " "); * This applet uses the connects to the ... now reads * This applet connects to the ... "manifest.stub" to "manifest" (keep in italics) Also, changed the following line: Name: oreilly/beans/MultiLineLabel.class To: Name: oreilly/beans/yesno/MultiLineLabel.class Finally, changed the following line: % jar cfm MultiLineLabel.jar manifest.stub oreilly/beans/MultiLineLabel.class To: % jar cfm MultiLineLabel.jar manifest oreilly/beans/yesno/MultiLineLabel.class else if (c.getModifiers() != null) now reads else if (c.getSuperclass() != null) String filename = f.getFile(); // Get the user's response To: String filename = f.getDirectory() + f.getFile(); // Get response import java.applet.*; ... the 4.XX "RemoteBank interface" RemoteBank interface ... now reads ... the RemoteBank interface ... Example 15-4 s.XX "remote method invocation(RMI)" "MudServer class" hows the ... now reads Example 15-4 shows the ....) if (value != null) and changed indentation of the next line so the code now reads: Object value = rs.getObject(i+1); if (value != null) overwrite(line, colpos[i] + 1, value.toString().trim()); (Don't change the indent of the second "overwrite" line.) Finally, since we added a line, we cut the blank line before: // Finally, end the table with one last divider line (appendix) completely removed // Add some items to the Edit menu to // Add some items to the View menu © 2013, O’Reilly Media, Inc. (707) 827-7019 (800) 889-8969 All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners.
http://oreilly.com/catalog/errata.csp?isbn=9781565923713
CC-MAIN-2013-20
refinedweb
1,246
58.99
Software Development Showing page 6 of 278. Simple MS SQL Python extension module This module provides access to MS SQL Servers from Python scripts. Tested on Linux, *BSD, Solaris, Mac OS X and Windows.150 weekly downloads kXML kXML is a lean Common XML API with namespace and WAP support that is intended to fit into the JAVA KVM for limited devices like the Palm Pilot.167 sharpPDF sharpPDF is easy-to-use c# library to generate PDF on the fly. It allows to save pdf files or get binary streams in output(for example, usable in ASP.NET).155 weekly downloads Marvin Image Processing Framework Marvin is an image processing framework that provides features for image and video frame manipulation, multithreading image processing, image filtering and analysis, unit testing, performance analysis and addition of new features via plug-in.130 weekly downloads ASP Template ASP Template is an ASP/ASPX templating library aimed at separating code from HTML just like ITX and Smarty do for PHP.162 weekly downloads Enterprise .NET memcached client library C#/.NET memcached client library. This library can be used by .NET projects to access memcached servers. Ported from the Java memcached library located at Ruby-GNOME 2 This project is a set of Ruby language bindings for the various application development libraries included with the GNOME/GTK+ environment. This project is for GTK+2.0 or later.148 weekly downloads Report.NET The Report.NET library contains classes that generate precise PDF documents. It's written in C# for the .NET platform. ASP.NET can be used to create dynamic PDF-response pages.129 GNU/Linux 1394 AV/C Library libavc1394 is a programming interface for the 1394 Trade Association AV/C (Audio/Video Control) Digital Interface Command Set. It is intended for use with GNU/Linux IEEE-1394 ().148 Javascript VirtualKeyboard This keyboard allows you to use any imaginable keyboard layouts, without having them installed on your local PC. This tool is good to embed it into the WISYWIG editor, webmail, chat, forum and any other application, requires the user input.97 weekly downloads
http://sourceforge.net/directory/software-development/development/license%3Algpl/?page=6
CC-MAIN-2013-48
refinedweb
351
58.99
Hi Roger, On Sun, Aug 15, 2010 at 10:28:52PM +0100, Roger Leigh wrote: > On Tue, Aug 10, 2010 at 08:27:24PM -0700, Russ Allbery wrote: [..snip..] > >. When tracking upstreams VCS I usually put upstream's branches into their own "namespace" like: upstream/master upstream/2.30 upstream/2.28 I then use master for sid and create branches for the other distributions like master (current sid develoment) lenny (lenny stable updates) bpo-lenny (lenny-backports)xi experimental (experimental) etc. We could also move all the debian work into it's own namespace like: debian/sid debian/lenny debian/bpo-lenny debian/experimental but I think that's rather overkill and more typing. When cloning from git.debian.org I'd like to have the current development on master, because that's what one expects to happen in a git repository of a Debian package. Cheers, -- Guido > >.
https://lists.debian.org/debian-devel/2010/08/msg00449.html
CC-MAIN-2016-30
refinedweb
149
50.36
JavaScript Testing: Unit vs Functional vs Integration TestsBy Eric Elliott More from this author. Here are some simple unit test examples from real projects using Tape: // Ensure that the initial state of the "hello" reducer gets set correctly import test from 'tape'; import hello from 'store/reducers/hello'; test('...initial', assert => { const message = `should set { mode: 'display', subject: 'world' }`; const expected = { mode: 'display', subject: 'World' }; const actual = hello(); assert.deepEqual(actual, expected, message); assert.end(); }); // Asynchronous test to ensure that a password hash is created as expected. import test from 'tape', import credential from '../credential'; test('hash', function (t) { // Create a password record const pw = credential(); // Asynchronously create the password hash pw.hash('foo', function (err, hash) { t.error(err, 'should not throw an error'); t.ok(JSON.parse(hash).hash, 'should be a json string representing the hash.'); t.end(); }); }); Integration Tests Integration tests ensure that various units work together correctly. For example, a Node route handler might take a logger as a dependency. An integration test might hit that route and test that the connection was properly logged. In this case, we have two units under test: - The route handler - The logger If we were unit testing the logger, our tests wouldn’t invoke the route handler, or know anything about it. If we were unit testing the route handler, our tests would stub the logger, and ignore the interactions with it, testing only whether or not the route responded appropriately to the faked request. Let’s look at this in more depth. The route handler is a factory function which uses dependency injection to inject the logger into the route handler. Let’s look at the signature (See the rtype docs for help reading signatures): createRoute({ logger: LoggerInstance }) => RouteHandler Let’s see how we can test this: import test from 'tape'; import createLog from 'shared/logger'; import routeRoute from 'routes/my-route'; test('logger/route integration', assert => { const msg = 'Logger logs router calls to memory'; const logMsg = 'hello'; const url = `{ logMsg }`; const logger = createLog({ output: 'memory' }); const routeHandler = createRoute({ logger }); routeHandler({ url }); const actual = logger.memoryLog[0]; const expected = logMsg; assert.equal(actual, expected, msg); assert.end(); }); We’ll walk through the important bits in more detail. First, we create the logger and tell it to log in memory: const logger = createLog({ output: 'memory' }); Create the router and pass in the logger dependency. This is how the router accesses the logger API. Note that in your unit tests, you can stub the logger and test the route in isolation: const routeHandler = createRoute({ logger }); Call the route handler with a fake request object to test the logging: routeHandler({ url }); The logger should respond by adding the message to the in-memory log. All we need to do now is check to see if the message is there: const actual = logger.memoryLog[0]; Similarly, for APIs that write to a database, you can connect to the database and check to see if the data is updated correctly, etc… Many integration tests test interactions with services, such as 3rd party APIs, and may need to hit the network in order to work. For this reason, integration tests should always be kept separate from unit tests, in order to keep the unit tests running as quickly as they can. Functional Tests Functional tests are automated tests which ensure that your application does what it’s supposed to do from the point of view of the user. Functional tests feed input to the user interface, and make assertions about the output that ensure that the software responds the way it should. Functional tests are sometimes called end-to-end tests because they test the entire application, and it’s hardware and networking infrastructure, from the front end UI to the back end database systems. In that sense, functional tests are also a form of integration testing, ensuring that machines and component collaborations are working as expected. Functional tests typically have thorough tests for “happy paths” — ensuring the critical app capabilities, such as user logins, signups, purchase work flows, and all the critical user workflows all behave as expected. Functional tests should be able to run in the cloud on services such as Sauce Labs, which typically use the WebDriver API via projects like Selenium. That takes a bit of juggling. Luckily, there are some great open source projects that make it fairly easy. My favorite is Nightwatch.js. Here’s what a simple Nightwatch functional test suite looks like this example from the Nightwatch docs: module.exports = { 'Demo test Google' : function (browser) { browser .url('') .waitForElementVisible('body', 1000) .setValue('input[type=text]', 'nightwatch') .waitForElementVisible('button[name=btnG]', 1000) .click('button[name=btnG]') .pause(1000) .assert.containsText('#main', 'Night Watch') .end(); } }; As you can see, functional tests hit real URLs, both in staging environments, and in production. They work by simulating actions the end user might take in order to accomplish their goals in your app. They can click buttons, input text, wait for things to happen on the page, and make assertions by looking at the actual UI output. Smoke Tests After you deploy a new release to production, it’s important to find out right away whether or not it’s working as expected in the production environment. You don’t want your users to find the bugs before you do — it could chase them away! It’s important to maintain a suite of automated functional tests that act like smoke tests for your newly deployed releases. Test all the critical functionality in your app: The stuff that most users will encounter in a typical session. Smoke tests are not the only use for functional tests, but in my opinion, they’re the most valuable. What Is Continuous Delivery? Prior to the continuous delivery revolution, software was released using a waterfall process. Software would go through the following steps, one at a time. Each step had to be completed before moving on to the next: - Requirement gathering - Design - Implementation - Verification - Deployment - Maintenance It’s called waterfall because if you chart it with time running from right to left, it looks like a waterfall cascading from one task to the next. In other words, in theory, you can’t really do these things concurrently. In theory. In reality, a lot of project scope is discovered as the project is being developed, and scope creep often leads to disastrous project delays and rework. Inevitably, the business team will also want “simple changes” made after delivery without going through the whole expensive, time-consuming waterfall process again, which frequently results in an endless cycle of change management meetings and production hot fixes. A clean waterfall process is probably a myth. I’ve had a long career and consulted with hundreds of companies, and I’ve never seen the theoretical waterfall work the way it’s supposed to in real life. Typical waterfall release cycles can take months or years. The Continuous Delivery Solution Continuous delivery is a development methodology that acknowledges that scope is uncovered as the project progresses, and encourages incremental improvements to software in short cycles that ensure that software can be released at any time without causing problems. With continuous delivery, changes can ship safely in a matter of hours. In contrast to the waterfall method, I’ve seen the continuous delivery process running smoothly at dozens of organizations — but I’ve never seen it work anywhere without a quality array of test suites that includes both unit tests and functional tests, and frequently includes integration tests, as well. Hopefully now you have everything you need to get started on your continuous delivery foundations. Conclusion As you can see, each type of test has an important part to play. Unit tests for fast developer feedback, integration tests to cover all the corner cases of component integrations, and functional tests to make sure everything works right for the end users. How do you use automated tests in your code, and how does it impact your confidence and productivity? Let me know in the comments. - Andrés Gallego - Dan Prince - Eric Elliott - Dan Prince - Eric Elliott - Toño Alvarez - David Larbee - Eric Elliott - markbrown4 - Eric Elliott - markbrown4 - Eric Elliott - Tracker1 - joe3487 - Eric Elliott - joe3487 - Chairat Onyaem - Chet Harrison - Georgios Dyrrachitis - Deepak - M S i N Lund - Eric Elliott - Chyngyz Arystan - Bob Jones - davypeterbraun - Maximus Koretskyi - Dave - Vitalik Zaidman - Go JS!
https://www.sitepoint.com/javascript-testing-unit-functional-integration/?utm_source=javascriptweekly&utm_medium=email
CC-MAIN-2017-17
refinedweb
1,394
51.07
Names with No Linkage The only names that have no linkage are: Function parameters. Block-scoped names not declared as extern or static. Enumerators. Names declared in a typedef statement. An exception is when the typedef statement is used to provide a name for an unnamed class type. The name may then have external linkage if the class has external linkage. The following example shows a situation in which a typedef name has external linkage: The typedef name, POINT, becomes the class name for the unnamed structure. It is then used to declare a function with external linkage. Because typedef names have no linkage, their definitions can differ between translation units. Because the compilations take place discretely, there is no way for the compiler to detect these differences. As a result, errors of this kind are not detected until link time. Consider the following case: The preceding code generates an "unresolved external" error at link time. C++ functions can be defined only in file or class scope. The following example illustrates how to define functions and shows an erroneous function definition: // function_definitions.cpp // compile with: /EHsc #include <iostream> using namespace std; void ShowChar( char ch ); // Declare function ShowChar. void ShowChar( char ch ) // Define function ShowChar. { // Function has file scope. cout << ch; } struct Char // Define class Char. { char Show(); // Declare Show function. char Get(); // Declare Get function. char ch; }; char Char::Show() // Define Show function { // with class scope. cout << ch; return ch; } void GoodFuncDef( char ch ) // Define GoodFuncDef { // with file scope. int BadFuncDef( int i ) // C2601, Erroneous attempt to { // nest functions. return i * 7; } for( int i = 0; i < BadFuncDef( 2 ); ++i ) cout << ch; cout << "\n"; }
http://msdn.microsoft.com/en-us/library/hfs9f82w(v=vs.90).aspx
CC-MAIN-2013-48
refinedweb
275
67.96
Chatlog 2008-11-12 From OWL See original RRSAgent log and preview nicely formatted version. Please justify/explain all edits to this page, in your "edit summary" text. 00:00:00 <MarkusK_> PRESENT: Peter Patel-Schneider, Markus Krötzsch, Ivan Herman, Jie Bao, Jos de Bruijn, Boris Motik, Alan Ruttenberg, Uli Sattler, Sandro Hawke, Zhe Wu, clu, Michael Schneider, Bernardo Cuenca Grau, Mike Smith, Rinke Hoekstra, Achille Fokoue, Jeff Pan 00:00:00 <MarkusK_> REGRETS: Christine Golbreich, Evan Wallace, Ian Horrocks, Elisa Kendall 00:00:00 <MarkusK_> CHAIR: Alan Ruttenberg 17:49:12 <RRSAgent> RRSAgent has joined #owl 17:49:12 <RRSAgent> logging to 17:49:21 <pfps> Zakim, this is owlwg 17:49:21 <Zakim> pfps, I see SW_OWL()1:00PM in the schedule but not yet started. Perhaps you mean "this will be owlwg". 17:49:28 <pfps> Zakim, this will be owlwg 17:49:28 <Zakim> ok, pfps; I see SW_OWL()1:00PM scheduled to start in 11 minutes 17:49:39 <pfps> RRSagent, make records public 17:54:57 <schneid> schneid has joined #owl 17:55:22 <Zakim> SW_OWL()1:00PM has now started 17:55:29 <Zakim> +Peter_Patel-Schneider 17:57:33 <MarkusK_> MarkusK_ has joined #owl 17:58:01 <ivan> ivan has joined #owl 17:58:06 <Zakim> +??P7 17:58:16 <ivan> zakim, dial ivan-voip 17:58:16 <Zakim> ok, ivan; the call is being made 17:58:18 <Zakim> +Ivan 17:58:34 <uli> uli has joined #owl 17:58:35 <ivan> zakim, drop me 17:58:35 <Zakim> Ivan is being disconnected 17:58:37 <Zakim> -Ivan 17:59:01 <ivan> zakim, dial ivan-voip 17:59:01 <Zakim> ok, ivan; the call is being made 17:59:03 <Zakim> +Ivan 17:59:07 <Zakim> + +1.518.276.aaaa 17:59:13 <bmotik> bmotik has joined #owl 17:59:29 <josb> josb has joined #owl 17:59:38 <alanr_> alanr_ has joined #owl 17:59:39 <Zakim> +josb 17:59:41 <Zakim> +??P11 17:59:44 <bmotik> Zakim, ??P11 is me 17:59:44 <Zakim> +bmotik; got it 17:59:47 <bmotik> Zakim, mute me 17:59:47 <Zakim> bmotik should now be muted 18:00:54 <Zakim> + +1.617.452.aabb 18:01:11 <baojie> baojie has joined #owl 18:01:13 <Zakim> +??P14 18:01:17 <alanr_> zakim, aabb is me 18:01:17 <Zakim> +alanr_; got it 18:01:21 <uli> zakim, ??P14 is me 18:01:21 <Zakim> +uli; got it 18:01:23 <alanr_> zakim, who is here? 18:01:23 <Zakim> On the phone I see Peter_Patel-Schneider, MarkusK_, Ivan, +1.518.276.aaaa, josb, bmotik (muted), alanr_, uli 18:01:25 <Zakim> On IRC I see baojie, alanr_, josb, bmotik, uli, ivan, MarkusK_, schneid, RRSAgent, Zakim, clu, alanr, sandro, trackbot 18:01:25 <uli> zakim, mute me 18:01:25 <Zakim> uli should now be muted 18:01:34 <baojie> Zakim, aaaa is me 18:01:34 <Zakim> +baojie; got it 18:02:19 <Zhe> Zhe has joined #owl 18:02:42 <Zakim> +Sandro 18:02:53 <Zakim> +Zhe 18:03:00 <sandro> zakim, who is on the call? 18:03:00 <Zakim> On the phone I see Peter_Patel-Schneider, MarkusK_, Ivan, baojie, josb, bmotik (muted), alanr_, uli (muted), Sandro, Zhe 18:03:42 <Zakim> + +0494212186aacc 18:03:56 <clu> zakim, aacc is me 18:03:56 <Zakim> +clu; got it 18:04:00 <clu> zakim, mute me 18:04:00 <Zakim> clu should now be muted 18:04:16 <bcuencagrau> bcuencagrau has joined #owl 18:04:20 <Zakim> +wonsuk 18:04:33 <msmith> msmith has joined #owl 18:04:39 <alanr_> zakim, who is here? 18:04:39 <Zakim> On the phone I see Peter_Patel-Schneider, MarkusK_, Ivan, baojie, josb, bmotik (muted), alanr_, uli (muted), Sandro, Zhe, clu (muted), wonsuk 18:04:41 <Zakim> On IRC I see msmith, bcuencagrau, Zhe, baojie, alanr_, josb, bmotik, uli, ivan, MarkusK_, schneid, RRSAgent, Zakim, clu, sandro, trackbot 18:04:50 <schneid> zakim, wonsuk is me 18:04:59 <Zakim> +schneid; got it 18:05:03 <schneid> zakim, mute me 18:05:10 <Zakim> +??P20 18:05:15 <bcuencagrau> Zakim, ??P20 is me 18:05:19 <alanr_> zakim, who is here 18:05:22 <Zakim> schneid should now be muted 18:05:25 <alanr_> zakim, who is here? 18:05:30 <Zakim> +bcuencagrau; got it 18:05:31 <Rinke> Rinke has joined #owl 18:05:34 <Zakim> alanr_, you need to end that query with '?' 18:05:36 <bcuencagrau> Zakim, mute me 18:05:40 18:05:51 <MarkusK_> Scribe: MarkusK_ 18:05:53 <Zakim> bcuencagrau should now be muted 18:05:57 <Zakim> On IRC I see Rinke, msmith, bcuencagrau, Zhe, baojie, alanr_, josb, bmotik, uli, ivan, MarkusK_, schneid, RRSAgent, Zakim, clu, sandro, trackbot 18:06:02 <MarkusK_> Topic: Admin 18:06:05 <uli> Alan, you are very quiet 18:06:07 <Rinke> ScribeNick: MarkusK_ 18:06:09 <Zakim> +msmith 18:06:23 <MarkusK_> Alan: Last minute agenda extension regarding question on XML literals 18:06:28 <MarkusK_> Previous minutes 18:06:40 <alanr_> zakim is slow 18:06:52 <Zakim> +Tom 18:06:54 <alanr_> 18:06:57 <Rinke> zakim, Tom is me 18:06:57 <Zakim> +Rinke; got it 18:07:05 <msmith> last week's minutes looked ok to me 18:07:36 <MarkusK_> Alan: I did mechanical cleanup on F2F4 2nd day minutes 18:07:42 <pfps> pfps has joined #owl 18:07:57 <MarkusK_> Alan: Contents should be in better shape now 18:08:19 <MarkusK_> Alan: Anyone looked at last week's minutes? 18:08:27 <MarkusK_> Pfps: Yes, they appear to be ok 18:08:46 <uli> something is causing static noise 18:09:01 <MarkusK_> Proposed: Accept minutes of Nov 5 Telco 18:09:22 <MarkusK_> Accepted: Accept minutes of Nov 5 Telco 18:09:36 <pfps> I haven't had a chance to look at the F2F4 minutes since yesterday 18:09:37 <Zakim> +[IBM] 18:09:53 <Achille> Achille has joined #owl 18:09:58 <Achille> Zakim, IBM is me 18:09:58 <Zakim> +Achille; got it 18:10:10 <MarkusK_> Action item status 18:10:10 <trackbot> Sorry, couldn't find user - item 18:10:22 <msmith> I updated the action, it was actually done by markus k 18:10:36 <MarkusK_> Action 243 completed 18:10:36 <trackbot> Sorry, couldn't find user - 243 18:10:59 <sandro> action-243 closed 18:10:59 <trackbot> ACTION-243 Edit test section of test & conf to include two links and explanatory text closed 18:11:00 <MarkusK_> Alan: I completed Action 242 18:11:19 <sandro> zakim, who is on the call? 18:11:19 (muted), msmith, 18:11:22 <Zakim> ... Rinke, Achille 18:11:23 <MarkusK_> Topic: Reviewing and Publishing 18:11:23 <MarkusK_> SubTopic: OWL2 Datatypes 18:11:31 <MarkusK_> Alan: Jos de Bruijn is joining OWL WG to look at issues related to datatypes, esp. regarding RIF-OWL compatibility. 18:11:38 <JeffP> JeffP has joined #owl 18:12:11 <josb> 18:12:24 <JeffP> {JeffP am only available on IRC) 18:12:28 <MarkusK_> Jos: We have a certain set of required datatypes in RIF. These are required, but you are free to implement further datatypes. The conformance conditions of RIF require that only the required datatypes are implemented but conformance can be parameterized to include further datatypes. Now OWL requires much more datatypes than RIF, so the extended conformance conditions would apply. 18:14:01 <bmotik> +q 18:14:10 <bmotik> Zakim, unmute me 18:14:10 <Zakim> bmotik should no longer be muted 18:13:30 <sandro> ID, IDREF, ENTITY 18:14:15 <MarkusK_> Jos: I was surprised to see the datatypes ID, IDREF, ENTITY being included in OWL since they were partly discouraged by WebOnt. 18:14:18 <alanr_> ack bmotik 18:14:34 <msmith> Where in the RIF documents is the description of conformance? 18:14:37 <MarkusK_> Boris: I can try to explain. The datatypes ID, IDREF, ENTITY essentially are just restricted types of strings. They have no relation to documents or anything so things are done like in XML Schema. 18:15:35 <schneid> RDF Semantics document tells people they should not use xsd:ENTITY and such: <> 18:15:42 <MarkusK_> Boris: Those particular special forms of strings should not cause problems since they are not relatvie to a document. 18:15:46 <sandro> boris: We understand ID, IDREF, and ENTITY to just be subtypes of string with a restricted syntax. This is how they are done in XML Schema. They are just strings with additional restrictions. 18:16:00 <josb> 18:16:10 <MarkusK_> Jos: I think at least ENTITY seems to point to a document (see link pasted). 18:16:32 <MarkusK_> Boris: (reads from linked text) 18:16:34 <pfps> q+ 18:16:40 <MarkusK_> Boris: Indeed, it mentions a document. I had not noticed this; this was not the intention in OWL. I will check version 1.1 of the spec. 18:16:38 <msmith> 18:16:52 <alanr_> says same thing in 1.1 18:17:00 <pfps> the 1.1 document appears to be incoherent 18:17:27 <Zakim> -uli 18:17:32 <MarkusK_> Jos: The intended interpretation is that entities need to be distinguished when taking the union of two documents. 18:17:41 <MarkusK_> Boris: this was not intended in OWL. Anything beyond simple strings would be out of scope. 18:17:52 <Zakim> +??P14 18:18:00 <uli> zakim, ??P14 is me 18:18:00 <Zakim> +uli; got it 18:18:10 <uli> zakim, mute me 18:18:10 <Zakim> uli should now be muted 18:18:26 <sandro> q? 18:18:31 <MarkusK_> Jos: Why was this a concern for WebOnt and RDF but not for OWL? 18:18:38 <josb> 18:19:21 <MarkusK_> Jos: this link is relevant to the discussion of ENTITIY. 18:19:22 <pfps> q+ to ask why we are doing this sort of thing at a teleconference 18:19:32 <msmith> rdf-mt says, "xsd:QName and xsd:ENTITY require an enclosing XML document context" 18:19:40 <MarkusK_> Jos: Both RDF and OWL discourage the use of this type, pointing to this section. 18:19:42 <alanr_> ack pfps 18:19:42 <Zakim> pfps, you wanted to ask why we are doing this sort of thing at a teleconference 18:19:59 <josb> 18:20:05 <schneid> +1 to PFPS 18:20:13 <MarkusK_> Pfps: Should this be discussed during the current telco? We are not sufficiently prepared. Let us take this to Email. 18:20:37 <schneid> I just stumbled over the RDFS paragraph a few days ago, not related to this discussion. 18:20:38 <MarkusK_> Sandro: It seemed to be an urgent issue that needed some discussion. 18:21:01 <MarkusK_> Alan: Should we simply remove the problematic types then? Or is anybody interested in having them? 18:20:56 <schneid> q+ 18:20:58 <pfps> I'm perfectly happy to junk them 18:21:00 <uli> I would think that this would be too rushed 18:21:01 <schneid> zakim, unmute me 18:21:01 <Zakim> schneid should no longer be muted 18:22:32 <alanr_> ack schneid 18:21:28 <MarkusK_> Schneid: I would feel incomfortable with keeping these datatypes in, because RDFS semantics says SHOULD NOT be used, while RDF-based Semantics would have it in its datatype map. 18:21:25 <msmith> I think junking them is ok, but suggest that proposal go to the list and be resolved next week. 18:21:33 <uli> +1 to Mike 18:21:37 <schneid> zakim, mute me 18:21:37 <Zakim> schneid should now be muted 18:21:48 <ivan> +1 18:21:49 <uli> yes 18:21:50 <JeffP> +1 to Mike 18:21:55 <MarkusK_> Alan: Then we can discuss this over email and schedule a proposal for next week. 18:22:14 <MarkusK_> Subtopic: XMLLiteral in OWL 2 18:22:14 <MarkusK_> Jos: XMLLiteral is a datatype not included in OWL 2, but required in RDF; in OWL 1 it was built-in. Is it a mistake that it is not in OWL 2? 18:22:16 <pfps> q+ 18:22:23 <pfps> q+ on a point of order 18:22:25 <bmotik> q+ 18:23:54 <ivan> ack pfps 18:23:54 <Zakim> pfps, you wanted to comment on a point of order 18:23:04 <MarkusK_> Pfps: A link in the agenda is not accessible without a login. 18:23:12 <MarkusK_> Sandro: Sorry, I will fix this. 18:23:32 <MarkusK_> Pfps: What good can we do with this discussion now? I am clueless. More preparation would be useful. 18:24:07 <MarkusK_> Sandro: OK, but maybe Jos can still bring forward what the issue is, and then we can possibly move on. 18:24:10 <msmith> +1 to adding XMLLiteral if we can. 18:24:15 <ivan> XMLLiteral is not an xsd datatype 18:24:39 <MarkusK_> Boris: The only normative types in OWL 1.0 are strings and integers; I overlooked the XMLLiteral type. 18:24:41 <schneid> XMLLiteral is in the RDF namespace 18:24:53 <schneid> q+ 18:24:58 <schneid> zakim, unmute me 18:24:58 <Zakim> schneid was not muted, schneid 18:24:58 <ivan> XMLLiteral is (the only) datatype defined in RDF 18:24:59 <alanr_> ack bmotik 18:25:06 <bmotik> ACTION: bmotik2 to Come up with an analysis of whether OWL 2 should include XMLLiteral 18:25:06 <trackbot> Created ACTION-244 - Come up with an analysis of whether OWL 2 should include XMLLiteral [on Boris Motik - due 2008-11-19]. 18:25:07 <josb> I would expect an answer to my public comment to be an outcome of the action 18:25:10 <MarkusK_> Alan: We should come up with a proposal whether or not to include XMLLiteral in OWL 2 18:25:34 <josb> rdf:XMLLiteral spec: 18:25:38 <MarkusK_> Schneid: XMLLiteral is mandatory in RDF and thus it is mandatory for the RDF-based semantics. I do not see why it is required for DL datatype maps though. XMLLiteral is already covered for OWL 2 Full. 18:28:16 <schneid> rdf:XMLLiteral in RDF Semantics: <> 18:25:45 <alanr_> q? 18:25:49 <schneid> zakim, mute me 18:25:49 <Zakim> schneid should now be muted 18:25:50 <alanr_> acm schneid 18:25:52 <ivan> q? 18:25:54 <alanr_> ack schneid 18:26:01 <bmotik> Zakim, mute me 18:26:01 <Zakim> bmotik should now be muted 18:26:29 <bmotik> -q 18:26:35 <bmotik> Zakim, unmute me 18:26:35 <Zakim> bmotik should no longer be muted 18:26:38 <MarkusK_> Thanks to Jos for attending, bye 18:26:43 <Zakim> -josb 18:26:48 <JeffP> bye 18:22:14 <MarkusK_> Subtopic: Progress report on document changes 18:27:09 <sandro> Boris: my parts of to be done by the end of the week 18:27:29 <MarkusK_> Alan: I also noticed a link at the end where the full grammar should be 18:27:32 <schneid> Ivan, several of the RDF semantic conditions are about rdf:XMLLiteral 18:27:35 <MarkusK_> Boris: I can fix this too. 18:27:57 <MarkusK_> Alan: Some remaining changes seems to be more than editorial 18:28:16 <MarkusK_> Boris: Yes, the original reviewers should be asked to look over it again after I finish. I will send a pointer by email. 18:28:27 <alanr_> q? 18:28:35 <MarkusK_> Sandro: I will provide a color-coded diff then. 18:28:45 <bmotik> Zakim, mute me 18:28:45 <Zakim> bmotik should now be muted 18:29:02 <MarkusK_> Subtopic: Mime types 18:29:11 <sandro> 18:29:28 <sandro> q? 18:29:29 <MarkusK_> Alan: Peter's email suggested mime types for functional and Manchester syntax. There are still question marks for XML syntax. 18:29:57 <sandro> q+ 18:30:14 <MarkusK_> Alan: Do we still need to specify file extensions? 18:30:24 <MarkusK_> Pfps: I assume that file extensions should be specified. A three-character extension might be good. It should be possible to find un-occupied 3-char extensions. I propose oxl or just xml for XML syntax. 18:31:51 <MarkusK_> Sandro: I think it could be xml, but I need to check. 18:32:11 <MarkusK_> For RDF/XML the extension is rdf. 18:32:29 <MarkusK_> Alan: So the choice is between oxl and xml? 18:32:29 <alanr_> owx 18:32:31 <sandro> .xml or .oxl (.owx) 18:32:33 <MarkusK_> Pfps: Yes 18:32:40 <MarkusK_> Sandro: owx is another option 18:33:06 <MarkusK_> Action: Sandro to check if it would be recommendable to use xml as file extension for XML syntax files. 18:33:06 <trackbot> Created ACTION-245 - Check if it would be recommendable to use xml as file extension for XML syntax files. [on Sandro Hawke - due 2008-11-19]. 18:33:09 <ivan> good point 18:33:27 <MarkusK_> Alan: Using xml might cause confusion with some tools, e.g. Protege. 18:33:58 <MarkusK_> Sandro: Also web servers might like to have a separate extension for serving the right mime type. 18:34:14 <MarkusK_> Alan: Then we should probably not consider xml. 18:34:14 <sandro> action-245 closed 18:34:14 <trackbot> ACTION-245 Check if it would be recommendable to use xml as file extension for XML syntax files. closed 18:34:24 <MarkusK_> Pfps: ok 18:34:26 <Rinke> oxl = OMEGA Product Suite File 18:34:27 <ivan> toss a coin 18:34:29 <MarkusK_> Sandro: ok 18:34:31 <sandro> owx 18:34:45 <MarkusK_> Alan: So the choice is between owx and oxl. 18:35:10 <msmith> Does mime registration limit us to 3 characters? 18:35:22 <sandro> No, but some people prefer it. 18:35:37 <Rinke> ... and some filesystems do as well 18:35:43 <MarkusK_> Alan: There appears to be a file type for oxl but none for owx, which might support the latter. Peter, do you like owx? 18:35:57 <JeffP> xol? 18:36:04 <ivan> owx it is! 18:36:07 <MarkusK_> Pfps: I don't care. 18:36:17 <Zhe> owx is not bad 18:36:32 <MarkusK_> Alan: Ok, then let us use owx. 18:36:48 <MarkusK_> Pfps: I will edit all relevant documents to mirror this choice. 18:37:02 <ivan> :-) 18:37:16 <MarkusK_> Sandro: Could we fix who will contact IETF for registering the mime types? 18:38:13 <sandro> q? 18:38:15 <sandro> q- 18:38:30 <MarkusK_> Subtopic: Alignment of functional syntax keywords and RDF syntax URIs 18:38:41 <MarkusK_> (Sandro takes over chairing) 18:39:09 <MarkusK_> Alan: The action was to have a smaller group of people to work-out a proposal. It might be good to have another week for a coherent proposal. 18:39:59 <pfps> q+ 18:40:08 <sandro> ack pfps 18:40:18 <MarkusK_> 18:40:27 <ivan> q+ 18:41:07 <alanr_> q+ 18:41:13 <alanr_> ack ivan 18:41:17 <MarkusK_> Ivan: One option for solving the dealock would be to not do any change. 18:41:41 <pfps> there are a couple of suggestions that don't seem to have much, if any, pushback 18:42:09 <bmotik> I'm afraid that the only noncontentious thing is ExistsSelf 18:42:26 <sandro> STRAWPOLL: Should we put effort into aligning the functional syntax and RDF names? 18:42:29 <bmotik> -1 18:42:32 <ivan> +1 18:42:32 <bcuencagrau> -1 18:42:32 <alanr_> +1 18:42:35 <sandro> +1 18:42:38 <pfps> -1 18:42:44 <MarkusK_> 0 18:42:44 <schneid> -0 18:42:44 <msmith> 0 18:42:45 <JeffP> 0 18:42:48 <uli> -0 18:42:51 <Zhe> +1 consistency is always a good thing 18:42:53 <Rinke> +0.5 18:42:59 <Achille> 0 18:43:28 <sandro> baojie? opinion? 18:43:33 <schneid> consequently, one could then also ask for aligning the Manchester Syntax... 18:43:43 <Rinke> I don't really think differences in singular vs plural form are a problem 18:43:44 <pfps> there are various different kinds of consistency that could be aimed for here. The current status is for a particular kind of consistency. 18:43:51 <bmotik> +q 18:43:58 <ivan> ack alanr_ 18:44:02 <sandro> q? 18:44:05 <bmotik> Zakim, unmute me 18:44:05 <Zakim> bmotik should no longer be muted 18:44:05 <sandro> ack bmotik 18:44:09 <MarkusK_> Sandro: If there was no effort involved, would there be objections changing the names? 18:44:34 <baojie> sorry, was off for a few minutes, I would vote +1 18:44:24 <MarkusK_> Boris: I voted with -1. In an ideal world, it would be great to have that alignment but in practice, forcing an alignment would make the functional syntax ugly. For instance, we do have singular names in RDF where we have n-ary constructs in functional-style syntax. Given that we cannot change RDF, I believe that the alignment is not practical. 18:44:46 <alanr_> q+ 18:44:56 <sandro> boris: In an ideal world, yes, we'd like the same names. But the RDF syntax takes precidence, so the function syntax would start to get very ugly. 18:45:29 <sandro> boris: If we were designing two syntax from scratch, then sure, align them. 18:45:40 <sandro> boris: but since we can't change RDF, let's not make functional ugly. 18:45:41 <sandro> q? 18:45:43 <bcuencagrau> +q 18:45:45 <sandro> ack alanr_ 18:45:46 <bmotik> Zakim, mute me 18:45:46 <Zakim> bmotik should now be muted 18:46:23 <sandro> alan: let's accept plurality issues, but try to solve the other? 18:46:30 <MarkusK_> Alan: Maybe one could focus on alignments that are less problematic than the plurals/singulars. There are other issues that could possibly be changed with less effort. I will suggest this in an email. 18:46:38 <ivan> q+ 18:46:57 <sandro> ack bcuencagrau 18:46:57 <bcuencagrau> Zakim, unmute me 18:47:00 <Zakim> bcuencagrau was not muted, bcuencagrau 18:47:24 <msmith> q+ to mention the OWL XML schema 18:47:27 <MarkusK_> Bernardo: Do you then only suggest to change some names? I agree with Boris. We have a nice and well-developed functional syntax now. It has been developed for quite some time, and I would not like to implement major changes there now. 18:47:52 <sandro> q? 18:47:53 <alanr_> q+ 18:48:06 <sandro> ack ivan 18:48:12 <bcuencagrau> Zakim, mute me 18:48:12 <Zakim> bcuencagrau should now be muted 18:48:44 <MarkusK_> Ivan: I also see that the complete alignment appears to be unrealistic. We only arrived at consensus in a few cases, while most of the namings remained disputed. Still there is a problem in understanding OWL 2 for people coming to OWL from the RDF world. A possible answer of course is that people from the DL world would prefer the current namings over the RDF-compatible ones. But changing only two or three names seems not to solve the problem anyway, so we might just avoid this extra work. 18:49:19 <bcuencagrau> +q 18:49:25 <bmotik> +q 18:50:27 <sandro> ack msmith 18:50:27 <Zakim> msmith, you wanted to mention the OWL XML schema 18:51:00 <ivan> +1 to msmith 18:51:09 <sandro> ack alanr_ 18:51:11 <MarkusK_> MikeSmith: Note that the functional syntax is also aligned with the OWL XML syntax. Any change in the names would thus also affect the XML syntax. 18:51:08 <schneid> of course, every change in the FS would need to be followed by OWL/XML 18:51:17 <bcuencagrau> Zakim, unmute me 18:51:17 <Zakim> bcuencagrau should no longer be muted 18:52:06 <MarkusK_> Sandro: Many people may arrive at OWL as an extension of RDF and those people should be supported. 18:52:25 <sandro> q? 18:52:29 <sandro> ack bcuencagrau 18:52:48 <MarkusK_> Sandro: An editorial improvement could be to (scribe did not get this, sorry) 18:53:01 <pfps> q+ 18:53:05 <pfps> q- 18:53:10 <sandro> Alan: We could xref the function syntax to the RDF vocabulary, as an editorial fix. 18:53:13 <bmotik> Zakim, unmute me 18:53:13 <Zakim> bmotik should no longer be muted 18:53:13 <MarkusK_> Bernardo: One way to move forward would be to check if there are comments from the community after publishing the documents. So we may want to wait for comments before starting major changes. 18:53:33 <bcuencagrau> Zakim, mute me 18:53:33 <Zakim> bcuencagrau should now be muted 18:53:36 <sandro> ack bmotik 18:53:48 <MarkusK_> Sandro: The downside would be that this may require a second last call. 18:54:26 <MarkusK_> Boris: We should keep in mind that OWL is indeed serving two partially overlapping communities. I am not convinced that changing some names would solve the problem that those different approaches bring. And there are various documents addressing the view of the RDF community, including the Primer that shows explicitly how to translate syntactic forms. 18:54:14 <sandro> (Hey, let's have two different languages, with different names! :-) 18:54:38 <sandro> q? 18:55:09 <uli> good points, Boris 18:55:11 <bmotik> Zakim, mute me 18:55:11 <Zakim> bmotik should now be muted 18:55:18 <alanr_> q? 18:56:00 <MarkusK_> Ivan: So how should we continue? 18:56:24 <schneid> we had pretty much a draw in the straw poll, with half of the votes being 0 18:56:34 <MarkusK_> Sandro: This can be discussed on the mailing lists; if not enough people continue to work on this, we need to give up on the alignment. 18:56:45 <MarkusK_> Alan: I will send a mail with some suggestions for discussion 18:56:51 <MarkusK_> Subtopic: Manchester syntax 18:57:08 <MarkusK_> Pfps: Some months ago, I mailed that Manchester syntax is ready for review. There have been some at least partial reviews since then. I have addressed most of those comments, but one major comment resulted in issue-146. 18:58:23 <MarkusK_> Sandro: Any other comments before publishing this? 18:59:11 <MarkusK_> Alan: Some review comments are still in the document, maybe these should be turned into editor's notes. 18:59:31 <MarkusK_> Pfps: I still wait for responses from the authors of some of these comments. 19:00:25 <MarkusK_> Alan: I guess I would like my comments turned into editor's notes without open issues. If Peter agrees with that. 19:01:18 <Rinke> (my two remaining review comments have been addressed, as far as I'm concerned they may be removed) 19:01:23 <MarkusK_> Pfps: For this document there appears to be disagreement between the editor and the reviewers. Keeping the comments as notes will not solve the problem in the end. 19:01:42 <schneid> q+ 19:01:50 <ivan> q+ 19:02:00 <Rinke> I don't have an alternative either 19:02:00 <MarkusK_> Sandro: But we can ask the public for comments on open issues. 19:02:14 <Rinke> yes 19:02:34 <MarkusK_> Pfps: OK, I can turn the comments into editor's notes, and we can then go forward with publication. 19:02:42 <schneid> q- 19:02:57 <sandro> ACTION: Pfps convert review comments to editors notes (except rinke's) 19:02:57 <trackbot> Created ACTION-246 - Convert review comments to editors notes (except rinke's) [on Peter Patel-Schneider - due 2008-11-19]. 19:03:14 <msmith> and in test&conf (responding to the question where to find examples for making editor's notes on the wiki) 19:04:06 <schneid> there's also an EdNote resulting from some open disagreement between the editor and one of the reviewers of the RDF-Based Semantics ... :) 19:03:29 <ivan> q? 19:03:33 <MarkusK_> Sandro: Can we propose to publish? Should publication be as soon as possible or in combination with other publications? 19:04:08 <MarkusK_> Alan: Maybe we can at least resolve now to publish. 19:04:33 <sandro> PROPOSED: Publish ManchesterSyntax as FPWD, after Peter's just-discussed editors notes are added, in our next round of publications. 19:05:29 <MarkusK_> Alan: So "next round" would mean the next time we publish; is this at Last Call? 19:05:36 <MarkusK_> Sandro: Yes, that would be useful. 19:04:40 <bmotik> +1 (Oxford) 19:04:45 <Rinke> +1 (UvA) 19:04:46 <MarkusK_> +1 (FZI) 19:04:48 <pfps> +1 (ALU) 19:04:50 <bcuencagrau> +1 (Oxford) 19:04:53 <Zhe> +1 (ORACLE) 19:04:55 <ivan> +1 (w3c) 19:04:58 <alanr_> +1 19:04:58 <Achille> +1 (IBM) 19:05:11 <sandro> +1 19:05:12 <alanr_> +1 (science commons) 19:05:19 <uli> +1 (Man) 19:05:33 <msmith> +1 (C&P) 19:05:38 <sandro> RESOLVED: Publish ManchesterSyntax as FPWD, after Peter's just-discussed editors notes are added, in our next round of publications. 19:05:42 <baojie> +1 (RPI) 19:05:48 <sandro> ack ivan 19:06:16 <MarkusK_> Ivan: There is one open issue related to the Manchester Syntax; I do not understand what it says. 19:06:31 <MarkusK_> Sandro: This one is on the agenda, maybe we can get to this. 19:06:43 <MarkusK_> Subtopic: Datarange extensions 19:07:24 <MarkusK_> Alan: We have had some reviews, and the question now is if we can make this a publishable WG note. 19:07:12 <bmotik> q+ 19:07:18 <bmotik> Zakim, unmute me 19:07:18 <Zakim> bmotik should no longer be muted 19:07:22 <alanr_> ack bmotik 19:07:45 <MarkusK_> Boris: I think the document is good, but some of the comments need to be addressed. I think all reviewers agreed that this should be published as a note. Some open issues remain, but I do not see why those should not be solvable. 19:07:57 <uli> q+ 19:08:05 <bmotik> Zakim, mute me 19:08:05 <Zakim> bmotik should now be muted 19:08:09 <uli> zakim, unmute me 19:08:09 <Zakim> uli should no longer be muted 19:08:41 <MarkusK_> Uli: We plan to address all the reviewers' comments, but this won't happen by next week. 19:08:55 <uli> zakim, mute me 19:08:55 <Zakim> uli should now be muted 19:09:22 <MarkusK_> Alan: OK; so let us continue to work on this. 19:09:28 <sandro> Alan: consensus seems to be that this is moving along nicely to end up as a Note. 19:09:49 <bmotik> Given this outcome, could we perhaps resolve ISSUE-127 now/soon? 19:10:03 <MarkusK_> Topic: Issues 19:10:12 <sandro> subtopic: issue-127 19:10:29 <MarkusK_> (Alan is back chairing) 19:10:28 <bmotik> +1 to close 19:10:33 <bmotik> q+ 19:10:42 <sandro> ack uli 19:10:43 <alanr_> ack uli 19:10:54 <alanr_> ack bmotik 19:10:56 <bmotik> Zakim, unmute me 19:10:56 <Zakim> bmotik was not muted, bmotik 19:11:01 <ivan> q+ 19:11:02 <uli> zakim, mute me 19:11:02 <Zakim> uli should now be muted 19:11:16 <MarkusK_> Boris: Does anything speak against closing Issue 127? 19:11:43 <bmotik> Zakim, mute me 19:11:43 <Zakim> bmotik should now be muted 19:11:47 <ivan> q- 19:11:55 <schneid> we had /3/ proposals to close this in the last few days, AFAIR :) 19:12:07 <sandro> PROPOSED: Close issue-127 given the work on Data Range Extension is proceeding nicely 19:12:09 <bmotik> +1 19:12:12 <sandro> +1 19:12:13 <alanr_> +1 19:12:13 <msmith> +1 19:12:13 <ivan> +1 19:12:14 <Rinke> +1 19:12:14 <schneid> +1 19:12:14 <MarkusK_> +1 19:12:14 <pfps> +1 19:12:17 <Zhe> +1 19:12:18 <bcuencagrau> +1 19:12:23 <uli> +1 19:12:24 <JeffP> 0 19:12:26 <baojie> +1 19:12:33 <sandro> RESOLVED: Close issue-127 given the work on Data Range Extension is proceeding nicely 19:12:56 <MarkusK_> Subtopic: Issue-87 19:13:08 <MarkusK_> (Sandro is chairing this) 19:13:50 <MarkusK_> Alan: It is considered useful to add rational numbers as a datatype. The question was how this should be realized, and what conformance would require for this datatype. Also it was asked if we should have a dedicated lexical representation for rationals. 19:14:05 <bmotik> q+ 19:14:18 <msmith> q+ 19:14:20 <bmotik> Zakim, unmute me 19:14:20 <Zakim> bmotik should no longer be muted 19:14:23 <sandro> ack bmotik 19:15:17 <MarkusK_> Boris: Regarding the dedicated lexical form, I do not see any problems. There might be some implementation challenges involved. One would probably store rationals as pairs of integers. We do not need arithmetics, since OWL does not include much arithmetics anyway. But comparing floats and rationals might be a slight challenge for implementors. 19:15:28 <alanr_> q+ to mention finite number of floats between rationals 19:16:13 <msmith> q- 19:16:43 <sandro> ack alanr_ 19:16:43 <Zakim> alanr_, you wanted to mention finite number of floats between rationals 19:16:46 <bmotik> Zakim, mute me 19:16:46 <Zakim> bmotik should now be muted 19:16:51 <bcuencagrau> Zakim, mute me 19:16:51 <Zakim> bcuencagrau was already muted, bcuencagrau 19:17:11 <bmotik> q+ 19:17:33 <MarkusK_> Alan: I was also wondering about the comparison. Maybe we should put this in and tag it as an "at risk" feature. There was also a problem relating to counting floats. 19:17:33 <sandro> a? 19:17:36 <sandro> q? 19:17:37 <bmotik> Zakim, unmute me 19:17:37 <Zakim> bmotik should no longer be muted 19:17:42 <sandro> ack bmotik 19:17:54 <schneid> xsd:double just specifies a finite subset of all rationals 19:18:17 <alanr_> q+ 19:18:45 <sandro> ack alanr_ 19:18:46 <MarkusK_> Boris: Yes, but the value space of rationals is dense, i.e. there are infinitely many values between each pair of distinct rational numbers. Even if there are only finitely many constants, the number of rationals is not a problem. 19:19:32 <bmotik> Zakim, mute me 19:19:32 <Zakim> bmotik should now be muted 19:19:33 <MarkusK_> Alan: Yes, but there might e.g. be a data range of floats bounded by rational constants 19:19:58 <MarkusK_> Sandro: This discussion probably should be continued elsewhere. 19:19:41 <msmith> +1 19:19:46 <alanr_> +1 19:20:10 <sandro> STRAWPOLL: go ahead with Rationals in OWL2, marked as At Risk until we get implementation experience 19:20:11 <ivan> +1 (why putting it on the agenda next week?) 19:20:14 <bmotik> +1 19:20:17 <MarkusK_> +1 19:20:17 <baojie> +1 19:20:18 <uli> +1 19:20:19 <pfps> +1 19:20:19 <Achille> +1 19:20:19 <Zhe> +1 19:20:22 <schneid> +1 (even without "at risk") 19:20:23 <alanr_> +1 19:20:23 <bcuencagrau> +1 19:20:24 <Rinke> +1 19:20:29 <JeffP> 0 19:20:49 <bmotik> Perhaps we can come up by the next week with questions that need to be answered in order to remove "at risk" 19:20:55 <MarkusK_> Sandro: It appears to be too early to make this a full resolution, since it was not announced on the agenda. 19:21:06 <ivan> q+ 19:21:12 <sandro> Subtopic: issue-146 19:21:22 <MarkusK_> (Sandro chairing) 19:22:16 <MarkusK_> Sandro: We probably could let this issue sit until we have feedback on Manchester syntax. 19:22:17 <sandro> we're going to let this sit.... 19:22:52 <ivan> q- 19:22:55 <MarkusK_> Ivan: I really do not understand Issue 146. I would like a more detailed explanation via email. 19:23:19 <sandro> ACTION: Alan make a detailed proposal for edits to ManchesterSyntax to address issue-146 - due Jan 15 19:23:19 <trackbot> Created ACTION-247 - make a detailed proposal for edits to ManchesterSyntax to address issue-146 [on Alan Ruttenberg - due 2008-01-15]. 19:23:56 <sandro> Subtopic: deprecated 19:24:08 <sandro> 19:24:18 <bmotik> q+ 19:24:21 <pfps> q+ 19:24:36 <MarkusK_> Alan: Since we have punning, we can no longer distinguish deprecation of properties and classes. A simple way to fix this would be to have two separate annotation properties as deprecation markers: one for classes and one for properties. 19:24:43 <Zakim> -Rinke 19:24:45 <sandro> ack bmotik 19:24:46 <bmotik> Zakim, unmute me 19:24:48 <Zakim> bmotik was not muted, bmotik 19:24:49 <sandro> q? 19:25:04 <pfps> q- 19:25:24 <MarkusK_> Boris: So the suggestion is to have two distinct annotation properties? 19:25:29 <MarkusK_> Alan: Yes. 19:25:48 <ivan> q+ 19:25:51 <schneid> or more: for individuals, classes, datatypes, dataproperties, objectproperties 19:25:54 <sandro> ack ivan 19:25:56 <bmotik> Zakim, mute me 19:25:56 <Zakim> bmotik should now be muted 19:25:57 <MarkusK_> Boris: Isnt't it that you deprecate a URI rather than a particular use/view of it? 19:26:11 <MarkusK_> Alan: No, my intention is to deprecate a particular view on a URI. 19:26:24 <MarkusK_> Ivan: Are there any use cases? 19:26:27 <bmotik> +1 to ivan 19:26:37 <bmotik> q+ 19:26:41 <MarkusK_> Alan: Yes, you could have a legacy document that contains a deprecated property. But you can no longer tell that that use was deprecated, and not, e.g., the class. 19:27:00 <sandro> q? 19:27:37 <MarkusK_> Ivan: Conceptually, URIs still refer to one thing, and this is what I expect to deprecate. Thus the deprecation refers to all uses of the URI. 19:27:54 <sandro> q? 19:28:01 <schneid> q+ 19:28:02 <MarkusK_> Alan: My assumption was that single uses of URIs might be deprecated. 19:28:23 <MarkusK_> Ivan: If I am in OWL Full, I also deprecate a URI. 19:28:41 <bmotik> In OWL Full, there is no distinction between a property and a class 19:28:43 <sandro> ack bmotik 19:28:44 <bmotik> Zakim, unmute me 19:28:44 <Zakim> bmotik was not muted, bmotik 19:29:20 <MarkusK_> Boris: The reason for having deprecated class and deprecated property in OWL 1 seems to be a side effect but not a very thought-through design. For instance, there is no way of deprecating individuals. I do not think that this OWL 1 deprecation was actually used a lot either. Maybe we do not require to spend more effort on this. 19:29:56 <ivan> ??? 19:30:04 <alanr_> q? 19:30:10 <schneid> zakim, unmute me 19:30:10 <Zakim> schneid was not muted, schneid 19:31:00 <schneid> zakim, mute me 19:31:00 <Zakim> schneid should now be muted 19:31:03 <MarkusK_> Schneid: One could imagine that someone wants to deprecate only the class use of a URI but not the property use, but this will probably never happen in practice. 19:31:07 <uli> bye 19:31:10 <Zhe> bye 19:31:10 <Zakim> -bmotik 19:31:11 <sandro> ADJOURNED 19:31:13 <Zakim> -alanr_ 19:31:14 <Zakim> -msmith 19:31:15 <msmith> bye 19:31:15 <Zakim> -uli 19:31:17 <Zakim> -Peter_Patel-Schneider 19:31:17 <Zakim> -Zhe 19:31:18 <msmith> msmith has left #owl 19:31:18 <Zakim> -baojie 19:31:23 <Zakim> -clu 19:31:24 <Zakim> -bcuencagrau 19:31:28 <Zakim> -Ivan 19:31:36 <ivan> ivan has left #owl 19:31:40 <uli> uli has left #owl 19:31:46 <Zakim> -Achille 19:31:52 <sandro> RRSAgent, make log public 19:32:02 <sandro> 19:32:17 <MarkusK_> Bye 19:32:17 <Zakim> -Sandro 19:32:21 <Zakim> -MarkusK_ 19:34:17 <Zakim> -schneid 19:34:18 <Zakim> SW_OWL()1:00PM has ended 19:34:20 <Zakim> Attendees were Peter_Patel-Schneider, MarkusK_, Ivan, +1.518.276.aaaa, josb, bmotik, +1.617.452.aabb, alanr_, uli, baojie, Sandro, Zhe, +0494212186aacc, clu, schneid, bcuencagrau, 19:34:23 <Zakim> ... msmith, Rinke, Achille 19:35:47 <alanr_> alanr_ has left #owl 19:42:01 <alanr> alanr has joined #owl 19:58:43 <alanr> alanr has left #owl 21:58:03 <Zakim> Zakim has left #owl
https://www.w3.org/2007/OWL/wiki/Chatlog_2008-11-12
CC-MAIN-2017-51
refinedweb
6,868
65.86
indra negi wrote:Please explain me whether this() and super() same. What I know about this is it refers to the currently running object. I have two questions for the below given code: What will be the difference if I replace this() by super() in the following code given in K&B book?What will happen if i remove this and super both? class Building { Building() { System.out.print ("b "); } Building(String name){ this(); System.out.print("bn "+name); } } public class House extends Building{ House() { System.out.print("h ");} House(String name){ //Replacing this() with super() will call parent's no-arg constructor and prints "b" rather than "h" //Removing this() and super() will make it print only "hn" and appends passing arg 'name'. this(); System.out.print("hn "+ name); } public static void main(String[] args) {new House ("x "); } } What I have understood is that this() will give a call to the no args constructor of the parent class(Building) current object. What I have not understood is once that completes the control will go to which line the one after the this() call(line 18) or to the no args constructor of the child class(line no. 14)? Please explain me. Priyanka Tyagi wrote: What I have understood is that this() will give a call to the no args constructor of the parent class(Building) current object..
http://www.coderanch.com/t/459822/java-programmer-SCJP/certification/super
CC-MAIN-2015-35
refinedweb
228
71.04
Question: I'm defining a ChoiceField based on a model's datas. field = forms.ChoiceField(choices=[[r.id, r.name] for r in Model.objects.all()]) However I'd like to prepend my options with an empty one to select "no" objects. But I can't find a nice way to prepend that. All my tests like : field = forms.ChoiceField(choices=[[0, '----------']].extend([[r.id, r.name] for r in Model.objects.all()])) Returns me a "NoneType object not iterable" error. The only way I've found until now is the following : def append_empty(choices): ret = [[0, '----------']] for c in choices: ret.append(c) return ret And when I define my field : forms.ChoiceField(choices=append_empty([[r.id, r.name] for r in Restaurant.objects.all()]), required=False) However I'd like to keep my code clean and not have that kind of horrors. Would you have an idea for me ? :p Thanks by advance. Solution:1 An easy answer is to do: field = forms.ChoiceField(choices=[[0, '----------']] + [[r.id, r.name] for r in Model.objects.all()]) Unfortunately, your approach is flawed. Even with your 'working' approach, the field choices are defined when the form is defined, not when it is instantiated - so if you add elements to the Model table, they will not appear in the choices list. You can avoid this by doing the allocation in the __init__ method of your Form. However, there is a much easier approach. Rather than messing about with field choices dynamically, you should use the field that is specifically designed to provide choices from a model - ModelChoiceField. Not only does this get the list of model elements dynamically at instantiation, it already includes a blank choice by default. See the documentation. Solution:2 Since this question and its answer almost solved a problem I just had I'd like to add something. For me, the id had to be empty because the model didn't recognise '0' as a valid option, but it accepted empty (null=True, blank=True). In the initializer: self.fields['option_field'].choices = [ ('', '------')] + [[r.id, r.name] for r in Model.objects.all()] Note:If u also have question or solution just comment us below or mail us on toontricks1994@gmail.com EmoticonEmoticon
http://www.toontricks.com/2018/11/tutorial-add-aemptya-option-to.html
CC-MAIN-2019-04
refinedweb
375
59.5
import "istio.io/istio/pkg/test" Eventually polls cond until it completes (returns true) or times out (resulting in a test failure). A Condition is a function that returns true when a test condition is satisfied. EventualOpts defines a polling strategy for operations that must eventually succeed. A new EventualOpts must be provided for each invocation of Eventually (or call Reset on a previously completed set of options). func NewEventualOpts(interval, deadline time.Duration) *EventualOpts NewEventualOpts constructs an EventualOpts instance with the provided polling interval and deadline. EventualOpts will perform randomized exponential backoff using the starting interval, and will stop polling (and therefore fail) after deadline time as elapsed from calling Eventually. Note: we always backoff with a randomization of 0.5 (50%), a multiplier of 1.5, and a max interval of one minute. func (e EventualOpts) Eventually(t Failer, name string, cond Condition) Eventually polls cond until it succeeds (returns true) or we exceed the deadline. Eventually performs backoff while polling cond. name is printed as part of the test failure message when we exceed the deadline to help identify the test case failing. cond does not need to be thread-safe: it is only called from the current goroutine. cond itself can also fail the test early using t.Fatal. type Failer interface { Fail() FailNow() Fatal(args ...interface{}) Fatalf(format string, args ...interface{}) Helper() } Failer is an interface to be provided to test functions of the form XXXOrFail. This is a substitute for testing.TB, which cannot be implemented outside of the testing package. Package test imports 3 packages (graph) and is imported by 62 packages. Updated 2020-03-28. Refresh now. Tools for package owners.
https://godoc.org/istio.io/istio/pkg/test
CC-MAIN-2020-16
refinedweb
279
50.84
Welcome. Previous Part: AINext Part: The Template Regarding dedication: These tutorials are supposed to take you anywhere between two and four hours each. Aim to complete a minimum of two tutorials per week. That means that you have an extra workload of 4-8 hours. No-one said this was going to be easy, right? If you need support while going through these articles, join the Discord channel. You’ll have no problems getting answers to your newbie questions there. Lecturers and experienced programmers also roam this channel. About the Authors This course was originally created for the Games programme at Breda University of Applied Sciences (known as IGAD at the previously named NHTV); see. It was recently updated for the students of the Utrecht University as well; see. This tutorial was written by Jacco Bikker, Brian Beuken, Nils Deslé, and Carlos Bott and updated for Visual Studio 2019 by Robbie Grigg and Phil de Groot. Getting the Stuff You Need For the purpose of these tutorials, I will assume you develop your games on PCs. The preferred development environment is Microsoft’s Visual Studio 2019. A free version (the Community Edition) of this software is available from Microsoft, via. Checklist: - A PC or laptop, pretty much any CPU and GPU will do - Windows 10 (32-bit or 64-bit) - Visual Studio 2019 Community Edition (Professional and Enterprise more than welcome), installed with default settings Starting Visual Studio 2019 When you start Visual Studio 2019 for the first time you are greeted with this window: Selecting not now, maybe later is luckily a perfectly viable option, so let’s go for that (no need to leave any more personal information with a tech giant than strictly necessary, right?). In the next window, you get to choose a theme. As the window says, you can always change this later, so let’s go with dark. Now we finally get into the Integrated Development Environment (IDE) Create a New Program Now that you have Visual Studio up and running, select the 4th option Create a new project as pictured: You then need to select the type of project. Because we are building a very simple project then select Empty project as you can see here: You now need to change a few things in the following dialog – this is all about where you place your files. Set the Project name to Getting Started Set the Location to C:\my_projects (or whichever folder you keep all of your programming projects). C:\Users\[username]\Desktop) folder or in your Documents ( C:\Users\[username]\Documents) folder because these folders are indexed by the Microsoft indexing services to improve search performance. The indexing services will have a negative impact on the performance of the build process and for this reason, it is recommended to save your projects in a folder that is not being indexed by the indexing service. Set the Solution name to C++ Fast Track for Games Programming Click the Create button to create your new project! You should see something similar to the screenshot below. IDE Tidy-Up Optionally, you can skip ahead to the Hello World section below. As you can see, there is a lot of stuff on the screen. Let’s make some room: - Click on Team Explorer, then close it to get rid of it. The Team Explorer can also be hidden by selecting View > Team Explorer from the main menu. - Do the same to Toolbox and Properties. - Drag the Solution Explorer to the left of the screen. - If you don’t like toolbars and their buttons then on the main menu, click on View, go to Toolbars, and deselect Standard. You should now have something like this: I often see people work on the area of a postage stamp (not just when programming) due to all the toolbars: this layout prevents that. We didn’t remove anything that we need (apart from one thing), and we assumed control of the software in the process. The one thing we are missing is two drop-down boxes (OK, so two things). We can store these next to the menu bar, so they don’t need their own toolbar. In the main menu, select Tools > Customize and select the Commands tab. Now click on Add Command, select the Build category, and choose the Solution Configurations command. This adds the drop-down box to the left of your menu bar; click the Move Down button a few times, until it is all the way to the right. Repeat this for the Solution Platforms command. The top of the screen now looks like this: And the IDE is as tidy as it gets for now. Solution Explorer Tidy-Up Your Solution Explorer should currently look like this: Now, let’s delete some things we don’t need: Select all three folders (Header files, Resource files and Source files and delete them. From the main menu, select Tool > Options and expand Text Editor > C/C++ > Advanced option or search for “Disable External Dependencies Folder” in the Search Options (Ctrl+E) Set the “Disable External Dependencies Folder” option to true. Your solution explorer should now look something like this: Before we go on: That being said, let’s get coding! Now it’s finally time to add a C++ source file to play with. Right-click on your project Getting Started in the Solution Explorer and select Add > New Item. In the Add New Item dialog that appears, select C++ File (.cpp), and name it main.cpp (or anything else really, as long as it ends with .cpp). Then click the Add button. The new file is immediately opened, and we’re ready for some coding. Hello World A tutorial on C++ is not complete without a ‘hello world’ example, so here we go. Enter the following program: #include "stdio.h" void main() { printf( "Hello world!\n" ); getchar(); } You can start the program by hitting F5. Visual Studio will ask you if you want to build the program; you want this so click yes. You should see a console window with the text Hello world! printed in it. Press Enter (while the console window has the keyboard focus) to close the console window. Discussion When you go to D:\Projects\C++ Fast Track for Games Programming (or wherever you saved your Visual Studio solution files) you will see that Visual Studio created a large amount of files for you. The most interesting one is in the Debug folder, and it’s called Getting Started.exe. When you start this application, you will see that you created it yourself. Apart from this file, we have: C++ Fast Track for Games Programming.sln: your solution file, which points to Getting Started.vcxproj: your project file, which points to main.cpp: the source code file. A project can have multiple source files, and a solution can have multiple projects. Other files: Getting Started.vcxproj.filters: stores the references to all of the source files in your project; Getting Started.VC.dband opendb: some internal information for Visual Studio; - various other files in the Debug folder: .obj, .ilk, .pdb. Quite confusing perhaps, but all that matters right now is the .cpp file in Projects\C++ Fast Track for Games Programming\Getting Started folder and the executable that it was built from it. It is always good to understand what each file is for – especially when it comes to working out which ones you need on GitHub or Perforce (hint: Never commit compiler generated content to version control!) .vsfolder as shown in the screenshot above, make sure you you select “Show hidden files, folders, or drives” in File Explorer Options in windows control panel. To change this setting, open the Windows control panel and go to File Explorer Options, then the select the View tab, and select the Show hidden files, folders, and drives radio button. If you don’t see file extensions ( .sln, .ccp, and .h) in the File Explorer, make sure the Hide extensions for known file types is not checked as shown in the screenshot below. Assignment So, here’s your task: - Every article in this series will end with a small practical assignment. You need to complete this assignment, and send the result to one of the programming teachers. Once you have done so, you may continue with the next part. - Create an executable that prints your name 10 times, then waits for a key, then prints Coding is awesome! 10 times, then waits for a key again, then exits. Previous Part: TitlesNext Part: The Template Are there any restrictions on how the exercise should be resolved? Or can we use everything we want (for example, add some #include for string manipulation)? You may use whatever you would like to solve the exercises. I’ve notice two “.vs” folders one on solution level and the other on project level. In order to use version control properly should I add the “.vs” folder to my gitignore file? Thanks! Isaac, Generally, you can safely ignore hidden files and folders and files that are generated by the IDE. The .vsfolder both hidden (by default) and generated by the IDE. In this case, I would highly encourage you to ignore the .vsfolder by adding it to your .gitignorefile. First of all thank you in advance for the high quality info your are putting here! Second, is it a problem to do the classes/tutorials using a mac, for example on (Visual Studio for Mac)? Thanks in advance! Djakson, The tutorials (and the corresponding source code that is provided) are tested on Windows. Using other platforms is not recommended (but may be possible).
https://www.3dgep.com/cpp-fast-track-1-getting-started/
CC-MAIN-2021-10
refinedweb
1,612
71.85
Errata for Seven Languages in Seven Weeks The latest version of the book is P (26-Nov-12) PDF page: 23% During Day 2 of Io the reader is suddenly told to "Think of doMessage as somewhat like Ruby's eval". eval however was never mentioned any where in the Ruby section an far as I could see. Which can cause readers to stumble a bit. The explanation of what eval is follows in the next sentence, but it's a bit weird to suddenly learn eval first after you are told to think of something else as eval. - Reported in: P5.0 (09-Dec-12) PDF page: 25 In the 3rd paragraph of the "I Won’t Be Your Programming Reference" section, "I will walk you through examples in each languages" should be "I will walk you through examples in each language".--Dan Parson - Reported in: P1.0 (30-Oct-12) PDF page: 32 You list the "logical operators" | and & as behaving more or less like || and && but without shortcutting. This is incorrect. | and & are the bitwise operators and the only reason they can behave somewhat like || and && in some circumstances is due to the specific types you have been comparing and how they have these operators implemented. It is misleading not to specifically refer to these as the bitwise operators.--Oliver Hookins - Reported in: P5.0 (13-Jan-13) PDF page: 35 In the check out code of Duck Typing when discussing the type system the example >>a = ['100', 100.0] returns ["100", 100.0] not ['100', 100.0]--IshtarIS - Reported in: P3.0 (31-Oct-12) PDF page: 43 You describe "methods that test" as those that end in a question mark. I think you can be clearer than that about this Ruby idiom. Specifically, methods that are expected to return a boolean are expected to end in a question mark. You could probably combine the description to include both ideas - testing something and the expectation of a boolean return value.--Oliver Hookins - Reported in: P5.0 (04-Jun-12) PDF page: 43 Paper page: 45 The attr keyword defines an instance variable. Several versions exist. The most common are attr (defining an instance variable and a method of the same name to access it)… Presumably this should be attr_reader rather than attr?--Vincent Bray - Reported in: P5.0 (28-Oct-12) PDF page: 44 In the Tree code example, visit_all method, it should say @children.each instead of children.each - Reported in: P5.0 (13-Jul-13) PDF page: 69 The first paragraph says "Create a list like this" then shows the method 'list'. Then there's a paragraph explaining that there's a shortcut method 'list', which we've already seen. The first code example should probably use 'toDos := List clone' then append values.--Michael Bannister - Reported in: P5.0 (28-Oct-13) Paper page: 72 In "What We Learned in Day 3" for Io (Chapter 3), it states "Next, we built an XML generator that used /method_missing/ to print XML elements." however it was Io's /forward/ that was used, and while a previous heading was called "Io's missing_method" (p.67) and went on to say "You can use the /forward/ message in the same way that you would use Ruby's /missing_missing/" (p.68) it seems a mistake to still refer to the Ruby construct in the Io summary. --Ciarán - Reported in: P2.0 (18-Nov-16) Paper page: 76 > "The coroutines differed from concurrency in languages like Ruby, C, and Java because threads could only change their own state, leading to a more predictable and understandable concurrency model and less of a need for blocking states that become bottlenecks." This sentence is confusing. Coroutines are compared to threads, which are "leading to a more predictable and understandable concurrency model …" (?), but a few sections back it was said that threads are harder to use and debug (true). * Is that quoted part related to coroutines? * Or it seems that "actors" should be used instead of "threads" there, which is also confirmed in the Actors section on p.74. * Is it possible to rephrase the sentence? Thanks.--eugene - Reported in: P5.0 (10-Jun-15) PDF page: 77 Paper page: 79 When you call `postOffice messageTarget` it should report back the `postOffice` object memory address: `Object_0x100444b38`. It currently reports `Object_0x1004ce658`, which is incorrect.--Marc Soda - Reported in: P2.0 (14-Dec-13) Paper page: 83 The definition of the friend rule works for very simple queries, but gives unexpected results when querying with an unbound variable (e.g. asking "who is the friend of wallace?": ?- [user]. |: likes(wallace,cheese). |: likes(grommit,cheese). |: likes(wendolene,sheep). |: friend(X,Y):- \+(X = Y),likes(X,Z),likes(Y,Z). |: % user://1 compiled 0.01 sec, 1,720 bytes true. ?- friend(wallace,grommit). true. ?- friend(wallace,X). false. This is because the "\+(X = Y)" clause comes before the X and Y variables are bound to possible values by the "likes" statements. If the order of the clauses is changed, the query works: ?- [user]. |: likes(wallace,cheese). |: likes(grommit,cheese). |: likes(wendolene,sheep). |: friend(X,Y):- likes(X,Z),likes(Y,Z),\+(X = Y). |: % user://2 compiled 0.01 sec, 480 bytes true. ?- friend(wallace,grommit). true. ?- friend(wallace,X). X = grommit ; false. These examples use SWI Prolog, but I received the same results with GNU Prolog.--Rob - Reported in: P5.0 (04-Nov-13) Paper page: 83 In the Prolog code for map.pl on page 83, since the three colours are defined as being different through symmetric relations, there seems to be an unneeded line of code in the rule for coloring: different(Alabama, Mississippini), It's the only instance of a symmetrically relational subgoal in the rule, all others having been omitted.--Ciarán - Reported in: P5.0 (07-Jul-16) PDF page: 84 Typo with foreach->forEach; "we iterate through the phone numbers in the list with forEach" should be "we iterate through the phone numbers in the list with foreach".--Ben Moon - Reported in: P5.0 (08-Jan-14) PDF page: 97 Stupid error I know, but it's "Gromit" not "Grommit" - only one 'm' :)--Keith Marshall - Reported in: P3.0 (18-Jul-15) Paper page: 104 In the explanation of the concatenate example <code> concatenate([], List, List). concatenate([Head|Tail1], List, [Head|Tail2]) :- concatenate(Tail1, List, Tail2). </code> you talk about List1, List2 and List3 which refers to <code>concatenate(List1, List2, List3)</code> mentioned earlier. This is for the poor beginner, who tries to understand the logic way of doing things for the first time, extremely confusing. Would be better to either have a consistent naming or a completely different one. Otherwise: thank you for this very valuable book!--Martin - Reported in: P3.0 (04-Mar-12) Paper page: 105 On fourth bullet (line 16) Tail2-2 must read Tail2-B, Tail2 must read Tail2-A--Norbert Müller - Reported in: P4.0 (13-Jun-13) Paper page: 124 for loop example run as forLoop.scala, but called for_loop.scala on bottom of previous page - Reported in: P2.0 (04-Mar-12) Paper page: 131 The book translates some Scala to Ruby as: args.each {|arg| println(arg)} println isn't a Ruby function so it should be 'puts'--Nigel Lowry - Reported in: P5.0 (29-Apr-12) PDF page: 144 In section "Classes in Scala": class Person(firstName: String, lastName: String) doesn't result in a class with firstName and lastName attributes, as the text says. It merely results in a class whose constructor takes two arguments but doesn't do anything with them. To get attributes, "val" must be added in from of the two parameters. Otherwise readers will be confused that they cannot access the supposed attributes if they experiment with the example: scala> class Person(firstName: String, lastName: String) defined class Person scala> val gump = new Person("Forrest", "Gump") gump: Person = Person@43900f17 scala> gump.firstName <console>:10: error: value firstName is not a member of Person gump.firstName ^ with val though: scala> class Person(val firstName: String, val lastName: String) defined class Person scala> val gump = new Person("Forrest", "Gump") gump: Person = Person@707cdc58 scala> gump.firstName res1: String = Forrest--Robin - Reported in: P5.0 (01-May-15) PDF page: 146 def turnRight() { bearing = (bearing + 1) % directions.size inform("right") } Should be: def turnRight() { bearing = (bearing + (directions.size + 1)) % directions.size inform("right") }--Eric T. - Reported in: P5.0 (29-Apr-12) PDF page: 148 In scala/employee.scala: Using "override val" for the name attribute in Employee is not necessary. It's easier to write it like this: class Employee(name: String, val number: Int) extends Person(name) { ... } This results in the Employee constructor taking the names as an argument and passing it on to Person, where it will live as a field. If you use override val, it results in an override of the public getter method, which is not necessary as Person already provides that. The same thing for scala/nice.scala, this way is much better: class Character(name: String) extends Person(name) with Nice--Robin - Reported in: P5.0 (29-Apr-12) PDF page: 148 In scala/employee.scala: "id():String" isn't recommended style, the colon should always be followed by a space. It's right most of the time, but it's not consistent (it looks unclean). Other examples of missing space after colon is in scala/nice.scala, on page 151. Maybe other places, but I'm not yet as far :).--Robin - Reported in: P3.0 (11-Mar-12) Paper page: 150 In the description of the sort example it is said "that will yield a case-insensitive sort". This is not true as the comparison is only performed on the first character of each word--Norbert Müller - Reported in: P5.0 (19-Apr-13) Paper page: 152 (Note that the page# is a guess based on other submissions since I'm reading the Kindle version.) Under "What We Learned in Day 2", in the fourth paragraph, the second sentence reads: "We also used count, isEmpty, and first methods for obvious purposes." I looked manually and searched via the search function, but could find no example of a method named "first" being used.--Glenn - Reported in: P5.0 (26-Jun-14) PDF page: 158 Inconsistent formatting and syntax highlighting Code example not prefaced with "scala >" prompt val hobbits = Set("frodo", "samwise", "pippin") should be scala> val hobbits = Set("frodo", "samwise", "pippin") - Reported in: P5.0 (06-Sep-14) Paper page: 159 In getPageSizeConcurrently() 'actor' is used but not explained. I guessed that it's a factory method in Actor (since that's a new import not found in the 'kids' example on p.157) that creates an instance of Actor with the code block argument as the act() method and calling start on it... --Ajit Dingankar - Reported in: P5.0 (19-Apr-12) PDF page: 167 In the first paragraph of the Scala subsection titled "Concurrency" (bottom of the page numbered 167 on the page in the PDF --- my reader thinks it's page 163), you've a sentence "Often, the actor uses a pattern matcher to detect the message and perform the appropriate message." I think the last word should be "action". Also, "classify" might be more appropriate than "detect", but that's a minor preference. Thanks for writing the book!--Conrad Hughes - Reported in: P1.0 (22-Jun-12) Paper page: 173 4 + "string". "Unlike Scala, there's no coercion between strings and ints." Yes, but the example is misleading since + doesn't concatenate strings, e.g. "4" + "string". yields the same exception.--Jerry Morrison - Reported in: P1.0 (22-Jun-12) Paper page: 175 {comic_strip, {name, "Calvin and Hobbes"}, {character, "Spaceman Spiff"}}. "We've represented a hash for a comic strip." ... "If you are used to Ruby or Java-style hashes, it may seem strange to have the initial atom ..." The code shows a way to represent key-value associations but I don't think there's any hashing going on here. The order of key-value pairs matters and a key may appear multiple times. Can it look up values by key? The initial atom is a simple way to indicate type information (what Scala does with case classes) and indeed it doesn't fit the hash table concept.--Jerry Morrison - Reported in: P1.0 (13-Aug-12) Paper page: 215 Section: Booleans and Expressions (= 1 1.0) returns false in Clojure 1.3. Is that a language change? (== 1 1.0) does return true.--Jerry Morrison - Reported in: P5.0 (21-Dec-12) PDF page: 219 Clojure: Under the Booleans and Expressions section, you give an example of (= 1 1.0) and in the example, it evaluates to true. When I run the example on my machine, it evaluates to false. --Brad Cantin - Reported in: P5.0 (16-Jan-15) Paper page: 227 The definition of left and right function on SimpleCompass can be improved by omitting the redundant SimpleCompass creation. At least as of Clojure 1.6.0 (which I am using), the functions could be simply "(left [_] (turn bearing 3))" - Reported in: P5.0 (27-Mar-12) PDF page: 232 In "you’ll define a higher-order function with the fn function", "higher-order" should be "anonymous". Using "fn" always defines an anonymous function which may or may not be higher order. Higher-order function may also be defined using "defn". In fact your example using fn is not higher-order.--art gittleman - Reported in: P1.0 (13-Aug-12) Paper page: 235 Section: Infinite Sequences and take Perhaps it's a language change in Clojure 1.3, but the fib-pair example as written gets an ArithmeticException integer overflow. Starting iterate with [1N 1N] gets it to happily use BigInt values. BTW there's no need to map first over all the iterated values -- it's enough to take the first of the nth pair -- but maybe you wrote it that way to demonstrate that map works on infinite sequences. Is it typical Clojure code to compute one more fibonacci number than needed vs. returning the second element of the previous fib-pair?--Jerry Morrison - Reported in: P3.0 (20-Mar-12) Paper page: 238 On line 4-5 (SomeType.arg) means fire the constructor for SimpleCompass, binding arg to the first parameter. should be (SomeType.arg) means fire the constructor for SomeType, binding arg to the first parameter. --Norbert Müller - Reported in: P3.0 (29-Jan-14) PDF page: 249 Generating the 500th Fibonacci number using the following code: (nth (map first (iterate fib-pair [1 1])) 500) will not work, since the integer values will overflow. You get an error like this: ArithmeticException integer overflow clojure.lang.Numbers.throwIntOverflow (Numbers.java:1388) In order to successfully generate the number, the BigInt type must be explicit with [1N 1N] as the initial values: user=> (nth (map first (iterate fib-pair [1N 1N])) 500) 225591516161936330872512695036072072046011324913758190588638866418474627738686883405015987052796968498626N This is using Clojure 1.5.1 on Java 1.6--Oliver Hookins - Reported in: P3.0 (30-Jan-14) PDF page: 250 "We grab n elements from the infinite sequence (iterate inc 1). Then we take n of them and multiply them together with apply *." There seems to be a redundancy between these two sentences - we "grab n elements" and THEN "take n of them"? The inner function is not grabbing n of anything, it is starting generation of infinite elements lazily, and the only time we start limiting this is at "take n".--Oliver Hookins - Reported in: P5.0 (15-Aug-12) PDF page: 251 One of the titles used in "Working with Atoms" does not match. "Seven Languages" becomes "Seven Languages in Seven Weeks". user=> (swap! top-sellers conj {:title "Seven Languages", :author "Tate"}) [{:title "Seven Languages in Seven Weeks", :author "Tate"}] --Christophe Verre - Reported in: P3.0 (31-Jan-14) PDF page: 252 You have written: --- You can verify that entering (String. "new string") into the repl returns the new string "new string". --- Entering that text into the repl does absolutely nothing to verify that it actually returns a new string, as it just returns the string in question. Perhaps you could add some more code to make it a bit more clear, for example: user=> (identical? "new string" "new string") true user=> (identical? (String. "new string") "new string") false --Oliver Hookin - Reported in: P1.0 (24-Feb-13) Paper page: 258 This page says: "[...] if/then/else statement" and later: "In Haskell, if is a function" Both are wrong -- 'if/then/else' is an expression with special syntactic support. --Matt Fenwick - Reported in: P1.0 (24-Feb-13) Paper page: 260 "[...] use the let function [...]" let is not a function. "in Haskell, let binds a variable to a function" 'function' should be replaced by 'value', as is shown in the following example.--Matt Fenwick - Reported in: P5.0 (25-Jun-14) Paper page: 261 foldl1 only takes a function and a list. The example in the middle of the page provides 0 as an initial value to foldl1. Removing the zero makes the example work.--Eric Andres - Reported in: P4.0 (20-Mar-12) Paper page: 263 There is a discrepancy between the two implementations of the Fibonacci sequence on pages 262-263 of the UK edition. The 1st fib implementation prints out the nth Fibonacci number like a zero based array (write out the 1st 10 numbers starting with a 0). For example fib 10 returns 89, which is the 11th Fibonacci number. The 'x' in the fibTuple is the correct fibonacci number though.--Tom Kealy - Reported in: P1.0 (24-Feb-13) Paper page: 267 "Haskell includes first-class ranges and some syntactic sugar to support them" Ranges are not first-class, they're just sugar for calls to functions from the Enum typeclass.--Matt Fenwick - Reported in: P5.0 (15-May-13) Paper page: 276 Two issues [page 276-277] The composition operator [pg276] is misused; "foo(bar x)" would be "(foo . bar) x". "(foo x).(bar x)" can be written "(foo <*> bar) x" using applicatives, but that goes beyond the scope of the section. Second, the starter 'monad' example [pg277] is also applicitive functor-ish rather than monad-ish. '>>==' and 'rtn' are typed 'Position a -> Position a'; to be monadic they must be type 'a -> Position a' Evaluation in a 'do' block is enforced by composition, but it is not the same as stringing functions together with the compose operator; if "(bar . foo) x" is valid for a monadic x, then the equivalent bind would be "return x >>= foo . return >>= bar . return".--Ryan Domigan - Reported in: P1.0 (24-Feb-13) Paper page: 277 "f . g x" is not shorthand for "f (g x)". Example: "sum . map (+1)" is a valid function. "sum (map (+1))" is a type error.--Matt Fenwick - Reported in: P5.0 (08-Jun-12) PDF page: 279 Instead of "foldl1 (+) 0 [1 .. 3]" it should either read "foldl (+) 0 [1 .. 3]" or "foldl1 (+) [1 .. 3]" Anyway, it might be a good idea to shortly discuss the difference between foldr/foldl and foldr1/foldl1 or leave out the latter version. IMO this difference is not related to the application of an operator, e.g. (+), in contrast to an anonymous function.--Kay-Uwe Kirstein - Reported in: P5.0 (01-Jan-15) PDF page: 279 Wrong order of arguments in 'foldl (\x carryOver -> carryOver + x) 0 [1 .. 10]' The order and the following explanation would be correct for foldr but has to be reversed for foldl. (Of course, it does not really matter for this particular function. Replace 'x' with '2 * x' to see the difference). - Reported in: P1.0 (24-Feb-13) Paper page: 282 at the top of the page: "the types that each statement returns" Those are expressions, not statements. Also, expressions do not return types.--Matt Fenwick - Reported in: P1.0 (24-Feb-13) Paper page: 282 "a string is an array of characters [...] represent the array of characters, with an array [...]" s/array/list/--Matt Fenwick - Reported in: P1.0 (24-Feb-13) Paper page: 282 "That means that the type Boolean will have a single value, either True or False." I think I get what this is saying, but it's confusing, and taken literally is wrong -- the type Boolean has two values.--Matt Fenwick - Reported in: P1.0 (24-Feb-13) Paper page: 283 At the top of the page: "Suit and Rank are type constructors" Suit and Rank are not type constructors -- they're types.--Matt Fenwick - Reported in: P1.0 (24-Feb-13) Paper page: 287 "You can also specify boilerplate implementations." That should be 'default', not 'boilerplate'.--Matt Fenwick - Reported in: P1.0 (25-Feb-13) Paper page: 289 "Haskell allows us to chain let expressions together and express the final form in an in statement." The example doesn't show chained let expressions -- it shows a single let expression. There is no such thing as an 'in statement'. That is part of the syntax of let expressions.--Matt Fenwick - Reported in: P1.0 (25-Feb-13) Paper page: 289 "Monads let you simulate program state." Many monads have nothing to do with state. This seems to imply that monads are only/best for stateful patterns. "do syntax allows programs in the imperative style." 'Do syntax' also allows non-imperative programs when working with other monads. Also, such programs can always be written without 'do syntax'. A monad has "a type constructor that's based on some type of container." (p. 290) "type that can hold a value" Many people (myself included) find this intuitive explanation actually makes it harder to grok monads. The problem is that some monads act like containers, and some don't.--Matt Fenwick - Reported in: P1.0 (25-Feb-13) Paper page: 290 "return wraps up a function into a monad" 'return :: Monad m => a -> m a'. It injects any value, not just functions, into the monad. ">>= unwraps a function" Same thing.--Matt Fenwick - Reported in: P1.0 (25-Feb-13) Paper page: 291 As mentioned in the 2nd monad law, "m >>= return = m". However, both the treasureMap example on p. 291 and the last example on p. 294 make the mistake of using "m >>= return" instead of simply "m". If return needs to be demonstrated, it should be a useful example.--Matt Fenwick - Reported in: P1.0 (25-Feb-13) Paper page: 294 Just is not a type. It is a function of type ':: a -> Maybe a'. The examples at the top of the page are confusing. They should probably be: Prelude> Just "some string" :: Maybe String ... Prelude> Nothing :: Maybe String ... This shows that there can either be a value or not. However, "Just Nothing" is of a totally different type than 'Just "some string"'. "The bind is also easy. For Nothing, it returns a function returning Nothing. For Just x, it returns a function returning x." The Maybe implementation of >>= does not return a function.--Matt Fenwick - Reported in: P1.0 (25-Feb-13) Paper page: 296 "The fully polymorphic template system" The type system is not a template system. Although there is something separate and unrelated called Template Haskell.--Matt Fenwick - Reported in: P1.0 (25-Feb-13) Paper page: 296 Haskell's type system is referred to as 'strong' on this page and again on p. 298. It should be 'static'/'statically'.--Matt Fenwick Stuff To Be Considered in the Next Edition - Reported in: P3.0 (23-Nov-11) Paper page: 35 You say "... class will be much more difficult to debug because Ruby can no longer tell when a method is missing. We would definitely want strong error checking to make sure it was accepting valid Roman numerals." But, adding a line such as return super if (!name.to_s.match(/[IVXLC]+$/)) first thing in the method_missing definition, Ruby will be able to handle the missing methods just fine. The problem of finding the definition of the methods remains, of course. I'd personally strip the quoted lines from that paragraph and add them as an introduction to an exercise to find the return super if cannot_handle_method idiom.--Vinko - Reported in: P3.0 (05-Sep-11) PDF page: 42 Figure 2.1 is correct but to make it consistent with the code you show, the three blue boxes on the left should be moved down with the left arrow coming from Fixnum, not Numeric. Then add an Object box above Numeric with an up arrow showing the inheritance.--art gittleman - Reported in: P4.0 (27-Sep-11) PDF page: 92 In the chapters about Prolog, tuples and list are mentioned. 1. Prolog does not have a real tuple type, and especially not a constant access one. 2. It is not true that lists and tuples are "containers" respectively of variable and fixed size. In Prolog there is a binary left associative term constructor ,/2 which is what is used to build things which look as tuples: ?- (1, (2, (3, 4))) = (1, 2, 3, 4). true. ?- (((1, 2), 3), 4) = (1, 2, 3, 4). false. In fact, what looks like a tuple is simply a nested term, not different from lists. Things are slightly more complicated as there is a ,/2 predicate which represents the logical conjunction of two predicates: ?- (true, false). false. ?- (true, true). true. The list functor is '.'. ?- .(3, []) = [3]. true. The usual [...] syntax is just syntactic sugar. Essentially a list is not a "mutable size container" (lists are essentially immutable[0]). It is just a cons list, like in Scheme. Simply the pair constructor is . and not cons. ?- ','(3, 4) = (3, 4). true. The 'term' syntax can be used essentially to bypass usual precedence rules which would make the desugared version ,(3, 4) a syntax error. Since in Prolog it is possible to use any functor (including ',') to build terms of arbitrary arity, it is correct to write: ?- X = ','(3, 4, 5). X = ','(3, 4, 5). However, that is *not* a tuple type: ?- ','(3, 4, 5) = (3, 4, 5). false. Because (1, (2, (3, 4))) = (1, 2, 3, 4). ---- [0] In some sense it can be "modified" because if we have variables we can "extend" the list through unification if the last term is a variable (this is also the basis for difference lists). Same applies to tuples, though. ?- (1, A) = (1, 2, 3). A = (2, 3). --Enrico Franchi - Reported in: P4.0 (28-Nov-11) PDF page: 171 The Fibonacci sequence is defined with the 0th element as 0. The definition on page 171, as another_fib, starts with the 0th element as 1.--Tyler Bindon - Reported in: P3.0 (17-Aug-11) PDF page: 193 Immediately after mentioning Erlang is tail recursion optimized, two recursive examples are given - factorial and fibonacci. But neither of them are implemented in a tail recursive fashion. This could be confusing. --Martin Leech - Reported in: P4.0 (25-Nov-11) PDF page: 239 In Hackers and Painters, Graham chronicles a start-up that leveraged produc- tivity with Lisp to achieve productivity that no other vendors could match. should probably be: In Hackers and Painters, Graham chronicles a start-up that leveraged Lisp to achieve productivity that no other vendors could match.--Julian Ceipek - Reported in: P4.0 (28-Nov-11) PDF page: 250 The Fibonacci sequence is defined with the 0th element as 0. The definition on page 250, as fib, starts with the 0th element as 1. This gives different results from the alternative definition on page 251 where the 0th element is 0.--Tyler Bindon
https://pragprog.com/titles/btlang/errata
CC-MAIN-2016-50
refinedweb
4,607
67.35
Testing There are several different approaches to testing Starlark code in Bazel. This page gathers the current best practices and frameworks by use case. - For testing rules - For validating artifacts - For testing Starlark utilities For testing rules Skylib has a test framework called unittest.bzl for checking the analysis-time behavior of rules, such as their actions and providers. Such tests are called “analysis tests” and are currently the best option for testing the inner workings of rules. Some caveats: Test assertions occur within the build, not a separate test runner process. Targets that are created by the test must be named such that they do not collide with targets from other tests or from the build. An error that occurs during the test is seen by Bazel as a build breakage rather than a test failure. It requires a fair amount of boilerplate to set up the rules under test and the rules containing test assertions. This boilerplate may seem daunting at first. It helps to keep in mind. The testing rule’s implementation function carries out assertions. If there are any failures, these are not raised immediately by calling fail() (which would trigger an analysis-time build error), but rather by storing the errors in a generated script that fails at test execution time. See below for a minimal toy example, followed by an example that checks actions. Minimal example //mypkg", # ... ], ) //mypkg/BUILD: load(":myrules.bzl", "myrule") load(":myrules_test.bzl", "myrules_test_suite") # Production use of the rule. myrule( name = "mytarget", ) # Call a macro that defines targets that perform the tests at analysis time, # and that can be executed with "bazel test" to return the result. myrules_test_suite(name = "myrules_tests") The test can be run with bazel test //mypkg:myrules_test. Aside from the initial load() statements, there are two main parts to the file: The tests themselves, each of which consists of 1) an analysis-time implementation function for the testing rule, 2) a declaration of the testing rule via analysistest.make(), and 3) a loading-time function (macro) for declaring the rule-under-test (and its dependencies) and testing rule. If the assertions do not change between test cases, 1) and 2) may be shared by multiple test cases. The test suite function, which calls the loading-time functions for each test, and declares a test_suitetarget bundling all tests together. We recommend the following naming convention. Let foo stand for the part of the test name that describes what the test is checking ( provider_contents in the above example). For example, a JUnit test method would be named testFoo. Then: the macro which generates the test and target under test should should be named _test_foo( _test_provider_contents) its test rule type should be named foo_test( provider_contents_test) the label of the target of this rule type should be foo( provider_contents_test) the implementation function for the testing rule should be named _foo_test_impl( _provider_contents_test_impl) the labels of the targets of the rules under test and their dependencies should be prefixed with foo_( provider_contents_) Note that the labels of all targets can conflict with other labels in the same BUILD package, so it’s helpful to use a unique name for the. For validating artifacts There are two main ways of checking that your generated files are correct: You can write a test script in shell, Python, or another language, and create a target of the appropriate *_test rule type; or you can use a specialized rule for the kind of test you want to perform. Using a test target The most straightforward way to validate an artifact is to write a script and add a *_test target to your BUILD file. The specific artifacts you want to check should be data dependencies of this target. If your validation logic is reusable for multiple tests, it should be a script that takes command line arguments that are controlled by the test target’s args attribute. Here’s an example that validates that the output of myrule from above is "abc". //mypkg/myrule_validator.sh: if [ "$(cat $1)" = "abc" ]; then echo "Passed" exit 0 else echo "Failed" exit 1 fi //mypkg/BUILD: ... myrule( name = "mytarget", ) ... # Needed for each target whose artifacts are to be checked. sh_test( name = "validate_mytarget", srcs = [":myrule_validator.sh"], args = ["$(location :mytarget.out)"], data = [":mytarget.out"], ) Using a custom rule A more complicated alternative is to write the shell script as a template that gets instantiated by a new rule. This involves more indirection and Starlark logic, but leads to cleaner BUILD files. As a side-benefit, any argument preprocessing can be done in Starlark instead of the script, and the script is slightly more self-documenting since it uses symbolic placeholders (for substitutions) instead of numeric ones (for arguments). //mypkg/myrule_validator.sh.template: if [ "$(cat %TARGET%)" = "abc" ]; then echo "Passed" exit 0 else echo "Failed" exit 1 fi //mypkg/myrule_validation.bzl: def _myrule_validation_test_impl(ctx): """Rule for instantiating myrule_validator.sh.template for a given target.""" exe = ctx.outputs.executable target = ctx.file.target ctx.actions.expand_template(output = exe, template = ctx.file._script, is_executable = True, substitutions = { "%TARGET%": target.short_path, }) # This is needed to make sure the output file of myrule is visible to the # resulting instantiated script. return [DefaultInfo(runfiles=ctx.runfiles(files=[target]))] myrule_validation_test = rule( implementation = _myrule_validation_test_impl, attrs = {"target": attr.label(allow_single_file=True), # We need an implicit dependency in order to access the template. # A target could potentially override this attribute to modify # the test logic. "_script": attr.label(allow_single_file=True, default=Label("//mypkg:myrule_validator"))}, test = True, ) //mypkg/BUILD: ... myrule( name = "mytarget", ) ... # Needed just once, to expose the template. Could have also used export_files(), # and made the _script attribute set allow_files=True. filegroup( name = "myrule_validator", srcs = [":myrule_validator.sh.template"], ) # Needed for each target whose artifacts are to be checked. Notice that we no # longer have to specify the output file name in a data attribute, or its # $(location) expansion in an args attribute, or the label for the script # (unless we want to override it). myrule_validation_test( name = "validate_mytarget", target = ":mytarget", ) Alternatively, instead of using a template expansion action, we could have inlined the template into the .bzl file as a string and expanded it during the analysis phase using the str.format method or %-formatting. For testing Starlark utilities.
https://docs.bazel.build/versions/2.0.0/skylark/testing.html
CC-MAIN-2021-04
refinedweb
1,033
55.64
Okay, I'm trying to create calculator that counts times like: 18:00 - 17:00 = 1 hour I have most of the code ready, but I'm getting wrong answers, there must be error somewhere, but I can't find it... here's the code: #include <stdio.h> int main ( ) { int hours; int min; int hours2; int min2; int total; int minutes, time_h, time_min; printf("\Give first time in form h min (example 12 34):"); scanf("%d %d", &hours, &min); printf("\Give second time in form h min (example 12 34):"); scanf("%d %d", &hours2, &min2); if ((hours >= 0)&&(hours <=23)&&(min >= 0)&&(min<=59)) { total = hours / 60 + min - hours2 / 60 + min2; printf("%d", total); printf("\n"); minutes = 1440 - (min + 60*hours); time_h = minutes / 60; time_min = minutes % 60; printf("The time was %d minutes", total); } else printf("You gave incorrect clock time!"); return 0; } Don't mind about the time_h and time_min, those don't have anything to do with the problem I'm trying to solve now...
http://cboard.cprogramming.com/c-programming/4301-clockwork-puzzle.html
CC-MAIN-2014-10
refinedweb
168
60.01
I'm looking for a better/more Pythonic solution for the following snippet count = sum(1 for e in iterable if e) I'm looking for a better/more Pythonic solution for the following snippet count = sum(1 for e in iterable if e) Honestly, I can't think of a better way to do it than what you've got. Well, I guess people could argue about "better," but I think you're unlikely to find anything shorter, simpler, and clearer. len(filter(None, iterable)) Using None as the predicate for filter just says to use the truthiness of the items. (maybe clearer would be len(filter(bool, iterable))) This isn't the fastest, but maybe handy for code-golf sum(map(bool, iterable)) sum(not not e for e in iterable) Most Pythonic is to write a small auxiliary function and put it in your trusty "utilities" module (or submodule of appropriate package, when you have enough;-): import itertools as it def count(iterable): """Return number of items in iterable.""" return sum(1 for _ in iterable) def count_conditional(iterable, predicate=None): """Return number of items in iterable that satisfy the predicate.""" return count(it.ifilter(predicate, iterable)) Exactly how you choose to implement these utilities is less important (you could choose at any time to recode some of them in Cython, for example, if some profiling on an application using the utilities shows it's useful): the key thing is having them as your own useful library of utility functions, with names and calling patterns you like, to make your all-important application level code clearer, more readable, and more concise that if you stuffed it full of inlined contortions!-) If you're just trying to see whether the iterable is not empty, then this would probably help: def is_iterable_empty(it): try: iter(it).next() except StopIteration: return True else: return False The other answers will take O(N) time to complete (and some take O(N) memory; good eye, John!). This function takes O(1) time. If you really need the length, then the other answers will help you more. Propably the most Pythonic way is to write code that does not need count function. Usually fastest is to write the style of functions that you are best with and continue to refine your style. Write Once Read Often code. By the way your code does not do what your title says! To count not 0 elements is not simple considering rounding errors in floating numbers, that False is 0.. If you have not floating point values in list, this could do it: def nonzero(seq): return (item for item in seq if item!=0) seq = [None,'', 0, 'a', 3,[0], False] print seq,'has',len(list(nonzero(seq))),'non-zeroes' print 'Filter result',len(filter(None, seq)) """Output: [None, '', 0, 'a', 3, [0], False] has 5 non-zeroes Filter result 3 """
http://ansaurus.com/question/3393431-how-to-counting-not-0-elements-in-an-iterable
CC-MAIN-2017-51
refinedweb
486
53.75
Create a data source The Azure Maps Web SDK stores data in data sources. Using data sources optimizes the data operations for querying and rendering. Currently there are two types of data sources: - GeoJSON source: Manages raw location data in GeoJSON format locally. Good for small to medium data sets (upwards of hundreds of thousands of shapes). - Vector tile source: Loads data formatted as vector tiles for the current map view, based on the maps tiling system. Ideal for large to massive data sets (millions or billions of shapes). GeoJSON data source A GeoJSON based data source load and store data locally using the DataSource class. GeoJSON data can be manually created or created using the helper classes in the atlas.data namespace. The DataSource class provides functions to import local or remote GeoJSON files. Remote GeoJSON files must be hosted on a CORs enabled endpoint. The DataSource class provides functionality for clustering point data. And, data can easily be added, removed, and updated with the DataSource class. The following code shows how GeoJSON data can be created in Azure Maps. //Create raw GeoJSON object. var rawGeoJson = { "type": "Feature", "geometry": { "type": "Point", "coordinates": [-100, 45] }, "properties": { "custom-property": "value" } }; //Create GeoJSON using helper classes (less error prone and less typing). var geoJsonClass = new atlas.data.Feature(new atlas.data.Point([-100, 45]), { "custom-property": "value" }); Once created, data sources can be added to the map through the map.sources property, which is a SourceManager. The following code shows how to create a DataSource and add it to the map. //Create a data source and add it to the map. var source = new atlas.source.DataSource(); map.sources.add(source); The following code shows the different ways GeoJSON data can be added to a DataSource. //GeoJsonData in the following code can be a single or array of GeoJSON features or geometries, a GeoJSON feature colleciton, or a single or array of atlas.Shape objects. //Add geoJSON object to data source. source.add(geoJsonData); //Load geoJSON data from URL. URL should be on a CORs enabled endpoint. source.importDataFromUrl(geoJsonUrl); //Overwrite all data in data source. source.setShapes(geoJsonData); Tip Lets say you want to overwrite all data in a DataSource. If you make calls to the clear then add functions, the map might re-render twice, which might cause a bit of a delay. Instead use the setShapes function, which will remove and replace all data in the data source and only trigger a single re-render of the map. Vector tile source A vector tile source describes how to access a vector tile layer. Use the VectorTileSource class to instantiate a vector tile source. Vector tile layers are similar to tile layers, but they aren't the same. A tile layer is a raster image. Vector tile layers are a compressed file, in PBF format. This compressed file contains vector map data, and one or more layers. The file can be rendered and styled on the client, based on the style of each layer. The data in a vector tile contain geographic features in the form of points, lines, and polygons. There are several advantages of using vector tile layers instead of raster tile layers: - A file size of a vector tile is typically much smaller than an equivalent raster tile. As such, less bandwidth is used. It means lower latency, a faster map, and a better user experience. - Since vector tiles are rendered on the client, they adapt to the resolution of the device they're being displayed on. As a result, the rendered maps appear more well defined, with crystal clear labels. - Changing the style of the data in the vector maps doesn't require downloading the data again, since the new style can be applied on the client. In contrast, changing the style of a raster tile layer typically requires loading tiles from the server then applying the new style. - Since the data is delivered in vector form, there's less server-side processing required to prepare the data. As a result, the newer data can be made available faster. Azure Maps adheres to the Mapbox Vector Tile Specification, an open standard. Azure Maps provides the following vector tiles services as part of the platform: - Road tiles documentation | data format details - Traffic incidents documentation | data format details - Traffic flow documentation | data format details - Azure Maps Creator also allows custom vector tiles to be created and accessed through the Render V2-Get Map Tile API Tip When using vector or raster image tiles from the Azure Maps render service with the web SDK, you can replace atlas.microsoft.com with the placeholder {azMapsDomain}. This placeholder will be replaced with the same domain used by the map and will automatically append the same authentication details as well. This greatly simplifies authentication with the render service when using Azure Active Directory authentication.. This vector tile source has a single set of data in the source layer called "Traffic flow". The line data in this data set has a property called traffic_level that is used in this code to select the color and scale the size of lines. //Create a vector tile source and add it to the map. var source = new atlas.source.VectorTileSource(null, { tiles: ['https://{azMapsDomain}/traffic/flow/tile/pbf?api-version=1.0&style=relative&zoom={z}&x={x}&y={y}'], maxZoom: 22 }); map.sources.add(source); //Create a layer for traffic flow lines. var flowLayer = new atlas.layer.LineLayer(source, null, { //The name of the data layer within the data source to pass into this rendering layer. sourceLayer: 'Traffic flow', //Color the roads based on the traffic_level property. strokeColor: [ 'interpolate', ['linear'], ['get', 'traffic_level'], 0, 'red', 0.33, 'orange', 0.66, 'green' ], //Scale the width of roads based on the traffic_level property. strokeWidth: [ 'interpolate', ['linear'], ['get', 'traffic_level'], 0, 6, 1, 1 ] }); //Add the traffic flow layer below the labels to make the map clearer. map.layers.add(flowLayer, 'labels'); Connecting a data source to a layer Data is rendered on the map using rendering layers. A single data source can be referenced by one or more rendering layers. The following rendering layers require a data source: - Bubble layer - renders point data as scaled circles on the map. - Symbol layer - renders point data as icons or text. - Heat map layer - renders point data as a density heat map. - Line layer - render a line and or render the outline of polygons. - Polygon layer - fills the area of a polygon with a solid color or image pattern. The following code shows how to create a data source, add it to the map, and connect it to a bubble layer. And then, import GeoJSON point data from a remote location into the data source. //Create a data source and add it to the map. var source = new atlas.source.DataSource(); map.sources.add(source); //Create a layer that defines how to render points in the data source and add it to the map. map.layers.add(new atlas.layer.BubbleLayer(source)); //Load the earthquake data. source.importDataFromUrl(''); There are additional rendering layers that don't connect to these data sources, but they directly load the data for rendering. - Image layer - overlays a single image on top of the map and binds its corners to a set of specified coordinates. - Tile layer - superimposes a raster tile layer on top of the map. One data source with multiple layers Multiple layers can be connected to a single data source. There are many different scenarios in which this option is useful. For example, consider the scenario in which a user draws a polygon. We should render and fill the polygon area as the user adds points to the map. Adding a styled line to outline the polygon makes it easier see the edges of the polygon, as the user draws. To conveniently edit an individual position in the polygon, we may add a handle, like a pin or a marker, above each position. In most mapping platforms, you would need a polygon object, a line object, and a pin for each position in the polygon. As the polygon is modified, you would need to manually update the line and pins, which can quickly become complex. With Azure Maps, all you need is a single polygon in a data source as shown in the code below. //Create a data source and add it to the map. var source = new atlas.source.DataSource(); map.sources.add(source); //Create a polygon and add it to the data source. source.add(new atlas.data.Polygon([[[/* Coordinates for polygon */]]])); //Create a polygon layer to render the filled in area of the polygon. var polygonLayer = new atlas.layer.PolygonLayer(source, 'myPolygonLayer', { fillColor: 'rgba(255,165,0,0.2)' }); //Create a line layer for greater control of rendering the outline of the polygon. var lineLayer = new atlas.layer.LineLayer(source, 'myLineLayer', { color: 'orange', width: 2 }); //Create a bubble layer to render the vertices of the polygon as scaled circles. var bubbleLayer = new atlas.layer.BubbleLayer(source, 'myBubbleLayer', { color: 'orange', radius: 5, strokeColor: 'white', strokeWidth: 2 }); //Add all layers to the map. map.layers.add([polygonLayer, lineLayer, bubbleLayer]); Tip When adding layers to the map using the map.layers.add function, the ID or instance of an existing layer can be passed in as a second parameter. This would tell that map to insert the new layer being added below the existing layer. In addition to passing in a layer ID this method also supports the following values. "labels"- Inserts the new layer below the map label layers. "transit"- Inserts the new layer below the map road and transit layers. Next steps Learn more about the classes and methods used in this article: See the following articles for more code samples to add to your maps:
https://docs.microsoft.com/en-us/azure/azure-maps/create-data-source-web-sdk?WT.mc_id=AZ-MVP-5003408
CC-MAIN-2021-39
refinedweb
1,634
57.27
Spring 3 MVC Interceptor tutorial with example - By Viral Patel on November 20, 2012 - Spring MVC provides a powerful mechanism to intercept an http request. Similar to Servlet Filter concept, Spring MVC provides a way to define special classes called Interceptors that gets called before and after a request is served. Quick Overview Each interceptor you define must implement org.springframework.web.servlet.HandlerInterceptor interface. There are three methods that need to be implemented. preHandle(..) is called before the actual handler is executed;. postHandle(..) is called after the handler is executed; afterCompletion(..) is called after the complete request has finished. These three methods should provide enough flexibility to do all kinds of preprocessing and postprocessing. You can define an interceptor class as follow: postHandle() and afterCompletion() } Once the interceptor is defined, you can ask Spring MVC to configure it via tag within spring-servlet.xml file. Let us start with the complete Demo application. We will create a demo Interceptor that logs each request. Tools and technologies: - Java 5 (or above) - Spring MVC 3.0 (or above) - Eclipse 3.2 (or above) We will need following JAR files in order to execute this project. If you are using Apache Maven as dependency management, add following dependencies to pom.xml. org.springframework spring-webmvc 3.0.1.RELEASE jstl jstl 1.2 Let us create a simple Spring MVC Interceptor class that logs each request. Step 1: The Controller – Create new Spring MVC Controller We create a simple Spring MVC controller that displays a plain JSP view. HelloWorldController.java package net.viralpatel.spring3.controller; import org.springframework.stereotype.Controller; import org.springframework.web.bind.annotation.RequestMapping; import org.springframework.web.bind.annotation.RequestMethod; @Controller public class HelloWorldController { @RequestMapping(value = "/hello", method = RequestMethod.GET) public String sayHello() { return "hello"; } } The controller has one method sayHello() which is mapped to URL /hello using @RequestMapping. This simply paints the hello.jsp view. Step 2: The View – Create new JSPs Create two JSPs, hello.jsp that displays hello message and index.jsp that simply redirects first request to /hello.html. /WEB-INF/jsp/hello.jsp Hello!! WebContent/index.jsp The index.jsp simply redirects to hello.html which calls the HelloWorldController. Step 3: The Interceptor – Spring MVC HandlerInterceptor Let’s create the Spring based Handler Interceptor which will intercept the request and print a message. HelloWorldInterceptor.java package net.viralpatel.spring3.interceptor; public void postHandle(HttpServletRequest request, HttpServletResponse response, Object handler, ModelAndView modelAndView) throws Exception { System.out.println("Post-handle"); } @Override public void afterCompletion(HttpServletRequest request, HttpServletResponse response, Object handler, Exception ex) throws Exception { System.out.println("After completion handle"); } } Thus in each of the method preHandle, postHandle and afterCompletion we print a message on console. Step 4: Spring Configuration Now lets glue up the source code and configure Spring. Note how we declared the interceptor in spring-servlet.xml using spring-servlet.xml Also configure the spring’s DispatcherServlet in web.xml file. web.xml Spring3MVC-Interceptor example spring org.springframework.web.servlet.DispatcherServlet 1 spring *.html Final Project Structure Once all the source files and configuration files are in place, your project should look like below: Demo Compile and execute the project in Eclipse. Open below URL in browser. URL: Check the server console logs. You must see following: Pre-handle Post-handle After completion handle Download Source Code SpringMVC_Multi_Interceptor_example.zip (2.5 MB) Get our Articles via Email. Enter your email address. Nice Tutorial. i love you viral without you m nothing in this industry ……….. ;) Download source code downloading some other project source code. Please advise I added following dependencies but getting compilation error with these two imports in controller class Viral, Java 6 will be required for Annotations that you have used like @Override.. Thanks! This description solved my problem nicely!! I want to develop a complte web applicationn in spring frame work where I can connect to oracle DB and I have front end and data validation done Please help me I encounterd error blow. why??? Please help me ^^;; Caused By: org.xml.sax.SAXParseException: cvc-complex-type.2.4.c: The matching wildcard is strict, but no declaration can be found for element ‘mvc:interceptors’. —————————— xmlns:mvc=”” @eugene add xmlns:mvc=”” @ header Thanks very much Thank you very much!!! thank you so much for your post, a sensible example which i’ve seen after searching about 50 sites… cheers :) Can anyone help me how to configure maven in eclipse? @Ravi: Follow these steps to configure maven plugin in eclipse: In eclipse go to help -> eclipse marketplace -> search for m2e and install it Hi Viral, My functionality is when i click on link of my application page, it will open xml in another window. i want to hide or change url of that window, how can i achive using above interceptor ? Please help Thanks Can you please tell me the real time applications where we will use interceptors most..? What is use of pre handling, or post handling the requests. Please Explain me with any real time scenarios. Thanks in advance. I can tell you what I use a HandlerInterceptor for. In my application, which is an e-commerce engine, I use a HandlerInterceptor to resolve certain things that all controllers will need to have at their disposal before they can render a response. I initialize certain things like the particular store they’re accessing, the user’s shopping cart, navigation UI, robots rules, client timezone, etc. If I didn’t do those things inside an interceptor, then I would have to do repeat all of those initializations inside of each controller method, which would make my code a lot more redundant and less readable. Whatever you find yourself repeating a lot in controller methods can be factored out and handled inside an interceptor. I hope that gives you some more insight. Hi, These ‘interceptors’ are useful to validate requests from client. For Eg: It is useful to avoid spam requests By Validating the request according to Your app Requirements(You allow the request to Process Furthur only it has perticuls credentials). And you can Provide Secirity by Restricting the invalid requests to access the resources of your App. Thanks & Regards raju. we will interceptors used for setMaxAgeForSession, checkIfRequestIsAllowedWithoutLogIn some other purposes… Do you know of a way to intercept requests BEFORE a handler has been chosen? The reason I want to know is because some parts of my application have dynamic URLs (neither in XML nor in @RequestMapping annotations) that are stored in a database and updated via a web front-end. As such, static URL-to-controller mappings won’t work in my case (think of an app like a CMS where end users can choose their own URL for a particular page). Any ideas? If you don’t know the complete URL then ServletFilters are way to go these work similar to interceptors this can be used on any java based web application. Read more at Great tutorial! Really simple and easy to follow. Thanks!! Using this to put a CorsFilter in. i have an error above code: HTTP Status 500 – An exception occurred processing JSP page /index.jsp at line 1 Stacktrace: org.apache.jasper.servlet.JspServletWrapper.handleJspException(JspServletWrapper.java:568)) write ur jsp code here,error in line1 of ur jsp, you hv written smthig that is nt accepted any one is help 2 me above http status… Any tell me how to close a session when browser tab closeed i am usin Spring ,Jsf 1.8 Icefaces hi patel Great tutorial! Really simple and easy to follow. Thanks!! i need gosu technology sample project with source code please send me viralpatel very urjent ….. What if I want to inject interceptor logic for a certain method on a certain controller? Is there an easy to to achieve that? Literally I am looking for something like @Before or @After annotation in PlayFramework (see) in spring Hi, Really nice tutorial. I understood the whole concept. I only dont understand where have we linked the interceptor to handler. I mean how does the framework know that the HelloWorldInterceptor is to be called for request to HelloWorldController controller This example doesnt work on JBoss 7.1.1 Example doesnt work on Jboss. This line gives error xmlns:mvc=”” Nice article Viral. Sometime back I implemented a timestamp ‘Filter’ which would take start timestamp when user enters the filter and another end timestamp just before returning the response. Since these timestamps were in the same method, I calculated the time taken to complete the request and was able to log it to file along with the request parameter. How can I achieve it using interceptors ? (Since pre and post are separate methods, the local variable values are lost). I am relatively new to Spring so if there’s another way ..please point me to it. Regards, Rajesh
http://viralpatel.net/blogs/spring-mvc-interceptor-example/
CC-MAIN-2015-11
refinedweb
1,477
57.77
SYNOPSIS #include <openssl/engine.h> Deprecated since OpenSSL 3.0, can be hidden entirely by defining OPENSSL_API_COMPAT with a suitable version value, see openssl_user_macros(7): since OpenSSL 1.1.0, can be hidden entirely by defining OPENSSL_API_COMPAT with a suitable version value, see openssl_user_macros(7): void ENGINE_cleanup(void); DESCRIPTION All of the functions described on this page are deprecated. Applications should instead use the provider APIs., - - i.e. initialised and is ready to perform cryptographic operations, and will remain initial (e.g. lack of system drivers, no special hardware attached, etc), otherwise it will return nonzero, e.g.. Default implementations, (e.g.. Application requirements - i.e., otherwise OpenSSL should use its built-in ENGINE implementations Here we'll assume we want to load and register all ENGINE implementations bundled with OpenSSL, such that for any cryptographic algorithm required by OpenSSL - if there is an ENGINE that implements it and can be initialised,. Advanced configuration support, i.e.zero, i (e.g. application "foo" might query various ENGINEs to see if they implement "FOO_GET_VENDOR_LOGO_GIF" - and ENGINE could therefore decide whether or not to support this "foo"-specific extension). ENVIRONMENT - OPENSSL_ENGINES The path to the engines directory. Ignored in set-user-ID and set-group-ID programs.() always return 1.() always returns 1. All of these functions were deprecated in OpenSSL 3.0. ENGINE_cleanup() was deprecated in OpenSSL 1.1.0 by the automatic cleanup done by OPENSSL_cleanup() and should not be used. Licensed under the Apache License 2.0 (the "License"). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at.
https://www.openssl.org/docs/man3.0/man3/ENGINE_register_DSA.html
CC-MAIN-2021-49
refinedweb
277
52.46
Tackling React Native Storage — Part 1 Making data persist in React Native can be hard. I have worked with AsyncStorage, RealmDB, and Firebase using React Native. Today I am going to cover RealmDB but also briefly touch on AsyncStorage. If you would like to skip the details and go straight to the example, feel free to check out my github for a simple todo items using realm and redux. AsyncStorage is a local storage that gives you the ability to persist data between app restarts. One big advantage of using AsyncStorage is that it requires no additional setup to use as it comes with React Native out of the box. However, downside is that it has slow runtime and has no indexing capabilities. Because AsyncStorage only accepts string as its value, all data must first be serialized into string before being inserted, and deserialized once retrieved. This is why you should not use AsyncStorage when dealing with a large amount of data. Below is a simple example to store and retrieve a simple JavaScript Object. import {AsyncStorage} from 'react-native' ... const SETTINGSKEY = 'Settings' const settingsObj = {lastUpdate: 1479396301390, language: 'en', theme: 'dark'} AsyncStorage.setItem(SETTINGSKEY, JSON.stringify(settingsObj)) AsyncStorage.getItem(SETTINGSKEY).then((settingsStr)=>{ const settings = JSON.parse(settingsStr) }) ... When you are dealing with a large amount of data, or simply require a faster local storage, consider using Realm. I have used this database with React Native extensively and I am very happy with it. It is simply much faster than AsyncStorage and SQLite (source:). Compared to AsyncStorage, you need to write more lines of code, however, it is totally worth it, as it will save you tonnes of efforts down the line. Unfortunately the documentation and examples are somewhat lacking, so it may take some time to get used to its APIs. In order to maximize the performance, Realm has decided to go with statically typed database. This means you first need to define the structure of database (using JS classes) before you can add/remove anything to it. import Realm from 'realm' class TodoItem { static get () { return realm.objects(TodoItem.schema.name) } static schema = { name: 'TodoItem', primaryKey: 'id', properties: { id: {type: 'string'}, value: {type: 'string'}, completed: {type: 'bool', default: false}, createdTimestamp: {type: 'date'} } } } // Create Realm DB const realm = new Realm({schema: [TodoItem]}) Once you create realm, you can now add/remove/update items from it. Here are some basic operations in Realm. // Retrieves all todo items in sorted(reversed) order export const getTodoItems = () => { const todoItems = TodoItem.get().sorted('createdTimestamp', true) return todoItems } // Retrieve a single todo item export const getTodoItem = (id) => { const todoItem = realm.objectForPrimaryKey(TodoItem, id) return todoItem } // Update todo item. todoItem parameter must be of Realm.Object export const updateTodoItem = (todoItem, value, completed) => { realm.write(() => { try { todoItem.value = value todoItem.completed = completed } catch (e) { console.warn(e) } }) } // Creates a new TodoItem export const createTodoItem = (value) => { realm.write(() => { realm.create(TodoItem.schema.name, { id: uuid.v1(), value, createdTimestamp: new Date() }) }) } // Deletes a todo Item. todoItem parameter must be Realm.Object export const deleteTodoItem = (todoItem) => { realm.write(() => { realm.delete(todoItem) }) } So far, I have covered very basic things that you can easily figure out by reading the official realm documentation. Before I continue on, please take a quick look at the official documentation. . Once you are more familiar with Realm, I suggest you read it again so you don’t miss anything out. I also found API reference page to be extremely useful as it covers many functions that get started guide does not. From now on, I will list out some of the tips that I have learned through using realmDB for the past year. You should refer to my github project to see how to do this in action. () I have started using Redux extensively for the past year. Redux works wonderfully together with Realm. The reason is because whenever you change the data stored in Realm, it always goes through the redux dispatch. This means you no longer have to subscribe to changes to Realm to know when to refresh the UI. This is also extremely important, and applies for any database you might want to use. Benefits of doing this will be that when you want to change to a different database (for example Realm to Firebase), it will be extremely easy. Another way to put it will be that you want to decouple Realm with your container components, they don’t need to know that the data is coming from Realm or Firebase (or even hard coded data). This also allows you to combine multiple data sources into a single data stream. Simply create a folder store and create index.js that combines all data sources into one. import * as realm from './realm' import * as asyncStorage from './asyncStorage' export default { ...realm, ...asyncStorage } Your container components now only need to import store. Caution: When you want to reference anything inside store, such as store.createTodoItem following will not work! // This will fail, createTodoItem will be undefined import {createTodoItem} from '../store' // This will work import store from '../store' const {createTodoItem} = store The reason is import (unlike require) gets resolved during compile time, but createTodoItem is not available until runtime. Just stick to store.createTodoItem or use de-structuring. Realm comes with their own version of ListView, which optimizes the performance if Realm.Results is used as ListView.DataSource, but has exactly same API as React Native ListView. First, you do not need to create instance of ListView.DataSource every time. A good place to put it would be in the same file where you define your RealmDB class. import { ListView } from 'realm/react-native' export const todoItemDS = new ListView.DataSource({rowHasChanged: (r1, r2) => r1.id !== r2.id}) Note: I return true whenever id is different as that is my primaryKey for TodoItem class. According to Realm getStarted guide, Realm.Results is auto-updating. However, you still need to update the UI because React does not know that Realm.Results has been updated. Auto-updating means you simply do not have to re-fetch the data from the realm database. // Realm.Results is auto-updating, therefore no need to re-fetch the data const todoItemsResults = store.getTodoItems() const mapStateToProps = (state, props) => ({ ...getTodoItems(state), dataSource: store.todoItemDS.cloneWithRows(todoItemsResults) }) const mapDispatchToProps = { ...actions } export default connect(mapStateToProps, mapDispatchToProps)(TodoItems) Note that I still need to cloneWithRows every time my UI updates. The reason why I don’t need to manually refresh the UI is because my redux action causes redux-store state to change which causes my UI to update. // actions.js export const createTodoItem = (todoText) => { store.createTodoItem(todoText) return { type: 'TODOITEMADDED' } } export const deleteTodoItem = (todoItem) => { store.deleteTodoItem(todoItem) return { type: 'TODOITEMDELETED' } } // reducers/todoItems.js const DEFAULTSTATE = {} export default (state = DEFAULTSTATE, {type, payload} = {}) => { switch (type) { case 'TODOITEMADDED': case 'TODOITEM_DELETED': return {...state, lastModified: Date.now()} default: return state } } That is it! I hope you learned something useful from this post. Like and share if you think others will be able to benefit from it too. In part 2, I will cover Firebase but it will be much shorter than this post. If you want to know more about the navigation / redux check out my previous blog post. Thanks!
http://brianyang.com/tackling-react-native-storage-part-1-2/
CC-MAIN-2018-43
refinedweb
1,197
67.76
Frequently Asked Questions¶ How do I install GeoTrellis?¶ Sadly, you can’t. GeoTrellis is a developer toolkit/library/framework used to develop applications in Scala against geospatial data large and small. To use it, you need it listed as a dependency in your project config, like any other library. See our Setup Tutorial on how to do this. How do I convert a Tile’s CellType?¶ Question: Let’s say I have a tile with incorrect CellType information or that, for whatever reason, I need to change it. How can I convert a Tile’s CellType? Which methods can I use? Answer: There are two distinct flavors of ‘conversion’ which GeoTrellis supports for moving between CellTypes: convert and interpretAs. In what follows we will try to limit any confusion about just what differentiates these two methods and describe which should be used under what circumstances. Elsewhere, we’ve said that the CellType is just a piece of metadata carried around alongside a Tile which helps GeoTrellis to keep track of how that Tile’s array should be interacted with. The distinction between interpretAs and convert relates to how smart GeoTrellis should be while swapping out one CellType for another. Broadly, convert assumes that your Tile’s CellType is accurate and that you’d like the semantics of your Tile to remain invariant under the conversion in question. For example, imagine that we’ve got categorical data whose cardinality is equal to the cardinality of Byte (254 assuming we reserved a spot for NoData). Let’s fiat, too, that the CellType we’re using is ByteConstantNoData. What happens if we want to add a 255th category? Unless we abandon NoData (usually not the right move), it would seem we’re out of options so long as we use ByteCells. Instead, we should call convert on that tile and tell it that we’d like to transpose all Byte values to Short values. All of the numbers will remain the same with the exception of any Byte.MinValue cells, which will be turned into Short.MinValue in accordance with the new CellType’s chosen NoData value. This frees up quite a bit of extra room for categories and allows us to continue working with our data in nearly the same manner as before conversion. interpretAs is a method that was written to resolve a different problem. If your Tile is associated with an incorrect CellType (as can often happen when reading GeoTIFFs that lack proper, accurate headers), interpretAs provides a means for attaching the correct metadata to your Tile without trusting the pre-interpretation metadata. The “conversion” carried out through interpretAs does not try to do anything intelligent. There can be no guarantee that meaning is preserved through reinterpretation - in fact, the primary use case for interpretAs is to attach the correct metadata to a Tile which is improperly labelled for whatever reason. An interesting consequence is that you can certainly move between data types (not just policies for handling NoData) by way of interpretAs but that, because the original metadata is not accurate, the default, naive conversion ( _.toInt, _.toFloat, etc.) must be depended upon. /** getRaw is a method that allows us to see the values regardless of if, semantically, they are properly treated as non-data. We use it here simply to expose the mechanics of the transformation 'under the hood' */ val myData = Array(42, 2, 3, 4) val tileBefore = IntArrayTile(myData, 2, 2, IntUserDefinedNoDataValue(42)) /** While the value in (0, 0) is NoData, it is now 1 instead of 42 * (which matches our new CellType's expectations) */ val converted = tileBefore.convert(IntUserDefinedNoData(1)) assert(converted.getRaw.get(0, 0) != converted.get(0, 0)) /** Here, the first value is still 42. But because the NoData value is * now 1, the first value is no longer treated as NoData * (which matches our new CellType's expectations) */ val interpreted = tileBefore.interpretAs(IntUserDefinedNoData(1)) assert(interpreted.getRaw.get(0, 0) == interpreted.get(0, 0)) TL;DR: If your CellType is just wrong, reinterpret the meaning of your underlying cells with a call to interpretAs. If you trust your CellType and wish for its semantics to be preserved through transformation, use convert. How do I import GeoTrellis methods?¶ Question: In some of the GeoTrellis sample code and certainly in example projects, it looks like some GeoTrellis types have more methods than they really do. If I create an IntArrayTile, it doesn’t have most of the methods that it should - I can’t reproject, resample, or carry out map algebra operations - why is that and how can I fix it? Answer: Scala is a weird language. It is both object oriented (there’s an inheritance tree which binds together the various types of Tile) and functional (harder to define, exactly, but there’s plenty of sugar for dealing with functions). The phenomenon of apparently missing methods is an upshot of the fact that many of the behaviors bestowed upon GeoTrellis types come from the more functional structure of typeclasses rather than the stricter, more brittle, and more familiar standard inheritance structure. Roughly, if OO structures of inheritance define what can be done in virtue of what a thing is, typeclasses allow us to define an object’s behavior in virtue of what it can do. Within Scala’s type system, this differing expectation can be found between a function which takes a T where T <: Duck (the T that is expected must be a duck or one of its subtypes) and a function which takes T where T: Quacks (the T that is expected must be able to quack, regardless of what it is). If this sounds a lot like duck-typing, that’s because it is. But, whereas method extension through duck-typing in other languages is a somewhat risky affair (runtime errors abound), Scala’s type system allows us to be every bit as certain of the behavior in our typeclasses as we would be were the methods defined within the body of some class, itself. Unlike the rather straightforward means for defining typeclasses which exist in some languages (e.g. Haskell), Scala’s typeclasses depend upon implicitly applying pieces of code which happen to be in scope. The details can get confusing and are unnecessary for most work with GeoTrellis. If you’re interested in understanding the problem at a deeper level, check out this excellent article. Because the entire typeclass infrastructure depends upon implicits, all you need to worry about is importing the proper set of classes which define the behavior in question. Let’s look to a concrete example. Note the difference in import statements: This does not compile. import geotrellis.vector._ val feature = Feature[Point, Int](Point(1, 2), 42) feature.toGeoJson // not allowed, method extension not in scope This does. import geotrellis.vector._ import geotrellis.vector.io._ val feature = Feature[Point, Int](Point(1, 2), 42) feature.toGeoJson // returns geojson, as expected TL;DR: Make sure you’re importing the appropriate implicits. They define methods that extend GeoTrellis types. How do I resolve dependency compatibility issues (Guava, etc.)?¶ Full possible exception message: Caused by: java.lang.IllegalStateException: Detected Guava issue #1635 which indicates that a version of Guava less than 16.01 is in use. This introduces codec resolution issues and potentially other incompatibility issues in the driver. Please upgrade to Guava 16.01 or later. GeoTrellis depends on a huge number of complex dependencies that may cause dependency hell. One of such dependency is the Guava library. GeoTrellis ETL and GeoTrellis Cassandra depend on Guava 16.01, but Hadoop depends on Guava 11.0.2 which causes runtime issues due to library incompatibility. When two different versions of the same library are both available in the Spark classpath and in a fat assembly jar, Spark will use library version from its classpath. There are two possible solutions: 1. To shade the conflicting library (example below shades Guava in all GeoTrellis related deps, this idea can be extrapolated on all conflicting libraries): assemblyShadeRules in assembly := { val shadePackage = "com.azavea.shaded.demo" Seq( ShadeRule.rename("com.google.common.**" -> s"$shadePackage.google.common.@1") .inLibrary( "com.azavea.geotrellis" %% "geotrellis-cassandra" % gtVersion, "com.github.fge" % "json-schema-validator" % "2.2.6" ).inAll ) } 2. To use spark.driver.userClassPathFirst. It’s an experimental Spark property to force Spark using all deps from the fat assembly jar.
https://geotrellis.readthedocs.io/en/latest/guide/faq.html
CC-MAIN-2022-27
refinedweb
1,399
54.83
#include Preprocessing Directive Line 3 #include <iostream> // allows program to output data to the screen is a preprocessing directive, which is a message to the C++ preprocessor (introduced in Section 1.4). Lines that begin with # are processed by the preprocessor before the program is compiled. This line notifies the preprocessor to include in the program the contents of the input/output stream header <iostream>. This header is a file containing information used by the compiler when compiling any program that outputs data to the screen or inputs data from the keyboard using C++’s stream input/output. The program in Fig. 2.1 outputs data to the screen, as we’ll soon see. We discuss headers in more detail in Chapter 6 and explain the contents ... Get C++11 for Programmers, Second Edition now with O’Reilly online learning. O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.
https://www.oreilly.com/library/view/c11-for-programmers/9780133439885/ch02lev2sec3.html
CC-MAIN-2020-05
refinedweb
156
54.93
Much of the time invested as a Network Engineer is performing network simulations for reasons like studying for a certification, trying out a proof-of-concept or testing design patterns, or even validate configuration changes before pushing to production! One of the best platforms out there for network device simulation is GNS3, which stands for Graphical Network Simulator-3. It is commonly implemented with a GNS3 server ,where the network nodes simulations, topology and projects are stored and processed, and a GUI application on the user computer to interact with it. The GNS3 server provides a really good REST API that we can leverage for programability purposes. In this post I will write about gns3fy, a python interface of the GNS3 server and its elements that is easy and reliable to use. Network engineers can use it for multiple purposes like creating scripts, use it in automated pipelines (CI/CD systems) or even local testing. It can be installed using pip: pip install gns3fy You also need to have successful connection with the GNS3 server REST API where your project is located. In this example I will use a remote server: 3080 test_lab The library exports 4 main objects for you to interact with: Gns3Connector: Is a connector type object that performs the main HTTP transactions and operations against the server REST API Project: Interacts with a specific GNS3 project Node: Interacts with a specific node of a project Link: Interacts with a specific link of a project For more information you can take a look at the API Reference - gns3fy Ok, enough of introductions and let’s get down to it. First we need to define a connector object and a project object from it. from gns3fy import Gns3Connector, Project, Node, Link SERVER_URL = "" # Define the connector object, by default its port is 3080 server = Gns3Connector(url=SERVER_URL) # Verify connectivity by checking the server version print(server.get_verion()) {'local': False, 'version': '2.2.0b4'} # Now obtain a project from the server lab = Project(name="test_lab", connector=server) lab.get() # Show some of its attributes print(f"{lab.name}: {lab.id} -- Status {lab.status}") # test_lab: 4b21dfb3-675a-4efa-8613-2f7fb32e76f -- Status: closed Lets open it lab.open() print(lab.status) # opened Now we can interact with the topology inside it. You can verify the nodes inside a project under the attribute lab.nodes, which gives a list of the Node(s) objects available . There is also a handy method you can use to list a summary of nodes inside a project: print(lab.nodes_summary()) # veos-1: stopped -- Console: 5028 -- ID: ea3a788d-51ee-4efb-a7aa-02db682999ac # veos-2: stopped -- Console: 5030 -- ID: c3b87554-72b6-4c21-b7d4-0b4679f192e8 We have 2 nodes. Lets start them up with a delay of 30 seconds between them (this is usually good for large scenarios or devices that take up too much resources when booting up) import time for node in lab.nodes: node.start() time.sleep(30) # Now check again the status of the nodes lab.get_nodes() print(lab.nodes_summary()) # veos-1: started -- Console: 5028 -- ID: ea3a788d-51ee-4efb-a7aa-02db682999ac # veos-2: started -- Console: 5030 -- ID: c3b87554-72b6-4c21-b7d4-0b4679f192e8 Each nodes and link on a project has its own properties and attributes. For example you can inspect an specific node and retrieve its properties: from pprint import pprint veos1 = lab.get_node("veos-1") pprint(veos1.properties) # {'adapter_type': 'e1000', # 'adapters': 13, # 'category': 'router', # 'console_type': 'telnet', # 'cpu_throttling': 0, # 'cpus': 2, # 'custom_adapters': [], # 'first_port_name': 'Management1', # 'hda_disk_image': 'vEOS-lab-4.21.5F.vmdk', # ... # To verify its ports pprint(veos1.ports) # [{'adapter_number': 0, # 'adapter_type': 'e1000', # 'data_link_types': {'Ethernet': 'DLT_EN10MB'}, # 'link_type': 'ethernet', # 'mac_address': '0c:53:2e:99:ac:00', # 'name': 'Ethernet0', # 'port_number': 0, # 'short_name': 'e0'}, # ... Now let’s get a feel of how the links are set up in the project. For this we can use the links_summary method print(lab.links_summary()) # veos-1: Ethernet1 ---- veos-2: Ethernet1 Ok, so let’s try creating another link between the nodes lab.create_link("veos-1", "Ethernet1", "veos-2", "Ethernet3") --------------------------------------------------------------------------- ValueError Traceback (most recent call last) <ipython-input-25-c5afeaa1b3bc> in <module> ----> 1 lab.create_link("veos-1", "Ethernet1", "veos-2", "Ethernet3") ~/miniconda3/envs/ansible-netsetup/lib/python3.7/site-packages/gns3fy/gns3fy.py in create_link(self, node_a, port_a, node_b, port_b) 1446 _matches.append(_l) 1447 if _matches: -> 1448 raise ValueError(f"At least one port is used, ID: {_matches[0].link_id}") 1449 1450 # Now create the link! ValueError: At least one port is used, ID: ab81059b-b454-490a-914f-535a898a281c Oops, I had a typo and port veos-1 Ethernet1 is already used. Let’s fix that lab.create_link("veos-1", "Ethernet3", "veos-2", "Ethernet3") # Created Link-ID: d583f011-6d52-4871-a37b-fcc5a44ee76b -- Type: ethernet # Now lets verify all the links lab.links_summary() # veos-1: Ethernet1 ---- veos-2: Ethernet1 # veos-1: Ethernet3 ---- veos-2: Ethernet3 Great! we have successfully created a link on the project. I hope you have seen how easy is to interact with the GNS3 server REST API using gns3fy!
https://davidban77.hashnode.dev/manage-your-gns3-network-labs-programmatically-with-gns3fy-ck00v5ecm000g6es1u33bh15y?guid=none&deviceId=ef27c7c8-ea76-45f4-a80a-9918b880d5c0
CC-MAIN-2020-40
refinedweb
829
54.22
query an interrupt handler #include <sys/irqinfo.h> int qnx_hint_query( pid_t proc_pid, int iid, struct _irqinfo *bufptr ); The qnx_hint_query() function returns a structure of information on an interrupt handler associated with iid on the node identified by proc_pid. If proc_pid is zero, the current node is used. To query another node, proc_pid should be passed as a virtual circuit to the process manager on that node. For example, /* Attach a vc to the process manager on node 4 */ proc_pid = qnx_vc_attach( 4, PROC_PID, 0, 0 ); The iid is a small positive integer. If you ask for information on an ID that isn't in use, information is returned on the next monotonically greater ID. This automatic search for the next existing ID provides a convenient method of obtaining information on all handlers. An interrupt ID on success. If no interrupt handler with an ID greater than or equal to iid exists, -1 is returned, and errno is set. #include <stdio.h> #include <sys/irqinfo.h> #include <errno.h> void main() { int id; struct _irqinfo buf; printf( "List of interrupt handler on this node:\n" ); for( id = 0; ( id = qnx_hint_query( 0, id, &buf ) ) != -1; ++id ) printf( "Pid %d Irq %d\n", buf.pid, buf.intnum ); } QNX errno, qnx_hint_attach(), qnx_hint_detach(), qnx_vc_attach()
https://users.pja.edu.pl/~jms/qnx/help/watcom/clibref/qnx/qnx_hint_query.html
CC-MAIN-2022-33
refinedweb
208
65.62
Closed Bug 1013024 (downloaddistro) Opened 6 years ago Closed 6 years ago Handle install referrer intent to determine distribution Categories (Firefox for Android :: General, defect) Tracking () Firefox 33 People (Reporter: rnewman, Assigned: rnewman) References (Depends on 1 open bug, Blocks 1 open bug) Details Attachments (2 files, 12 obsolete files) We'd like for Fennec to be able to respond intelligently to tags included in Play Store referrer intents. N.B., using Google Analytics is explicitly a non-goal. Documentation links: This is a pretty trivial part 0. We'll be accruing more logic around distribution handling, and this is a nice step towards a svelte m/a/b/. Attachment #8425203 - Flags: review?(margaret.leibovic) WIP for the first part of the meat. This approach catches and parses the incoming intent, aiming to deliver it to the Distribution handler before it does its initial work. The idea is that if the referrer is there, we can do something more sophisticated, like picking a different distribution file. A small extension is to say "oops" if we already loaded a distro, and do something else. f? for the overall approach. Comment on attachment 8425204 [details] [diff] [review] Part 1: catch install intent and deliver it to the distribution handler. v1 Does this mean we can kill: I'd probably lean more to naming InstallReceiver to ReferrerReceiver (assuming we kill the current file) since the focus is the "referrer" part and we already have a few other "Install" related receivers. Attachment #8425204 - Flags: feedback?(mark.finkle) → feedback+ (In reply to Mark Finkle (:mfinkle) from comment #3) > I'd probably lean more to naming InstallReceiver to ReferrerReceiver > (assuming we kill the current file) since the focus is the "referrer" part > and we already have a few other "Install" related receivers. Yeah, I'll be "eating" the old ReferrerReceiver as we go. A trivial utility I wanted to use in Part 1. This simply generalizes our existing thread asserts to support checking "anything but", and adds the utility for checking "not the UI thread". Attachment #8425915 - Flags: review?(margaret.leibovic) Testing this: * Clear data, kill app. * Send an intent: am broadcast -a com.android.vending.INSTALL_REFERRER -n org.mozilla.fennec_rnewman/org.mozilla.gecko.distribution.ReferrerReceiver --es "referrer" "utm_source=mozilla&utm_medium=testmedium&utm_term=testterm&utm_content=testcontent&utm_campaign=testname" * Launch Fennec. You'll see debug output like: I/GeckoDistribution(10572): Getting file from distribution. I/GeckoDistribution(10572): Downloading referred distribution: I/GeckoDistribution(10572): Distribution fetch: 301 D/GeckoDistribution(10572): Redirecting to I/GeckoDistribution(10572): Distribution fetch: 200 D/GeckoDistribution(10572): Distro fetch took 16318ms; result? true I/GeckoDistribution(10572): Copying files from fetched zip. D/GeckoDistribution(10572): Considering distribution/searchplugins/common/engine.xml D/GeckoDistribution(10572): Considering distribution/bookmarks.json D/GeckoDistribution(10572): Considering distribution/preferences.json Yes, that's a 16-second fetch. Ouch. WIP. This has some resource closure errors that I haven't addressed, which ultimately cause a failure, but it's most of the way there. I imagine I'll need to fix Bug 1013684 first -- that sixteen-second fetch blocks top sites, because we're handling the distribution too soon. I/GeckoDistribution(15146): Downloading referred distribution: I/GeckoDistribution(15146): Getting file from distribution. I/GeckoDistribution(15146): Distribution fetch: 200 D/GeckoDistribution(15146): Distro fetch took 1277ms; result? true I/GeckoDistribution(15146): Copying files from fetched zip. D/GeckoDistribution(15146): Considering distribution/searchplugins/common/engine.xml D/GeckoDistribution(15146): Considering distribution/bookmarks.json D/GeckoDistribution(15146): Considering distribution/preferences.json I/GeckoDistribution(15146): Getting file from distribution. I/GeckoDistribution(15146): Getting file from distribution. D/GeckoHealthRec(15146): Distribution is test-partner Verified that the right distribution shows up in the only FHR environment, which is woo awesome. Now... works, modulo the order of execution bugs (Bug 1013684, Bug 1014283, Bug 1014242). Comment on attachment 8425203 [details] [diff] [review] Part 0: move Distribution class into its own package. v1 Moved to Bug 1014338. Attachment #8425203 - Attachment is obsolete: true Comment on attachment 8425915 [details] [diff] [review] Pre: add ThreadUtils.assertNotOnUiThread. v1 Moved to Bug 1014338. Attachment #8425915 - Attachment is obsolete: true Apparently all of my imports are disappearing today! I duped Bug 986119 to this bug, 'cos this is the direction we're taking for now. There are patches in that bug for SIM-based approaches, should we need those. Summary: Handle install referrer intent → Handle install referrer intent to determine distribution Attachment 8426762 [details] [diff] triggers a build failure due to a trivial class path issue in TestDistribution.java. Here's a patch for the patch that fixes the problem. Comment on attachment 8429600 [details] [diff] [review] patch to fix build failure in patch This is fixed in my local copy; this bug is kinda dormant until the sub-bugs get through the queue. Thanks for the fix, though! Attachment #8429600 - Attachment is obsolete: true Alias: downloaddistro Things to verify are loaded correctly from the distribution, either on first run or second: 1. Add-ons (second) -- Bug 923581 applies here 2. Prefs (first or second?) 3. Bookmarks (first) 4. Search engines (first?) 5. Themes, perhaps 6. Quickshare defaults (second until Bug 1021176 is implemented) And not loaded from distributions yet: 1. Suggested sites. Now with telemetry. Tested by hand, with and without network; we record a certain set of errors, and also how long the fetch took. Obviously still waiting on final URL! I tested themes today. They weren't working before because the test distro had outdated theme data; the images didn't exist. Once I got over a PEBKAC (two in one morning!), they work. It takes a while, though -- we download the distro, Gecko loads, downloads the images, hands them to Java, we display them. Gecko startup time is about 4-5 seconds, maybe a little more on first run, so we don't show a theme for the first 5 seconds you're looking at the browser. On a low-end device that can be as much as 10+ seconds. Not much we can do about that unless we decouple theming from Gecko. N.B., Bug 846184 tracks improving theme loading. We'd need to extend that to also be aware of distros. CDN fetch, https, wifi, Nexus 10: 783msec. cell (AT&T), HTC One: 1046msec. http, cell, HTC One: 874msec. So we have about a 200msec penalty for using a secure connection. I think that's acceptable, particularly if it avoids us having to do client-side verification of payloads. Anyone else have an opinion? Flags: needinfo?(mgoodwin) (Note that these numbers are spectacularly non-scientific: single runs. But they look sane.) (In reply to Richard Newman [:rnewman] from comment #23) > I think that's acceptable, particularly if it avoids us having to do > client-side verification of payloads. Anyone else have an opinion? I think that if we had to rely on a single mechanism I'd personally prefer robust package signing over relying solely on a secure connection. But 'robust' is the key there... did you also get numbers on the JAR thing? Flags: needinfo?(mgoodwin) (In reply to Mark Goodwin [:mgoodwin] from comment #25) > But 'robust' is the key there... did you also get numbers on the JAR thing? Not yet. Code needs to be written. (In reply to Richard Newman [:rnewman] from comment #26) > (In reply to Mark Goodwin [:mgoodwin] from comment #25) > > > But 'robust' is the key there... did you also get numbers on the JAR thing? > > Not yet. Code needs to be written. Given that code needs to be written, I'd like to consider an HTTPS approach to start, and follow up with signing as we get it working. This is a trivial extension to use jars instead of zips, and handle security exceptions. This does *not* mandate signed jars; it'll just error if the downloaded jar is trivially corrupted or modified. A smart attacker would remove all of the signing metadata when modifying the jar, and thus pass the checks. However, this does pave the way for easily adding stronger verification down the line. Bug 1013024 - Use jars instead of zips. Comment on attachment 8447289 [details] [diff] [review] Catch install intent and deliver it to the distribution handler, processing the distribution file dynamically. v5 Folded in the basic jar change. This is ready for first-pass review. End-to-end test to come before landing. FETCH_PATH will switch to /distro/ when we're done testing. I'm keeping namespaced for now, hence the TODO. Attachment #8447289 - Attachment description: Catch install intent and deliver it to the distribution handler, processing the distribution file dynamically.* * * → Catch install intent and deliver it to the distribution handler, processing the distribution file dynamically. v5 Attachment #8447289 - Flags: review?(mark.finkle) Comment on attachment 8446834 [details] [diff] [review] Use jars instead of zips. v1 Marking as obsolete, 'cos folded into v5 of the main patch. Attachment #8446834 - Attachment is obsolete: true Comment on attachment 8447289 [details] [diff] [review] Catch install intent and deliver it to the distribution handler, processing the distribution file dynamically. v5 >diff --git a/mobile/android/base/distribution/Distribution.java b/mobile/android/base/distribution/Distribution.java >+ private static final String FETCH_HOSTNAME = "distro-download.cdn.mozilla.net"; Is this set in stone yet. My OCD doesn't like the "distro" part. Sounds too much like Linux. "download" is kinda redundant. If this is a lot of work for server-ops to change then leave it. Otherwise, something simpler, like "distributions.cdn.mozilla.net" ? >+ private static final String FETCH_PATH = "/test/"; // TODO For the final paths, I think we should bake a little platform and versioning. Something like "android/v1". I don't think using App Version is possible since we'd need to keep updating folders on the CDN. Thoughts? >+ private boolean checkIntentDistribution() { >+ Log.d(LOGTAG, "Downloading referred distribution: " + uri); Should we be logging the URL? >+ recordFetchTelemetry(status); Do you want recordFetchTelemetry(status) as a separate method? Looks like it's not used anywhere else and the code right below this does some recording of telemetry based on status too. >+ private static void recordPostFetchTelemetry(final Exception exception) { Not worth just wrapping this into recordFetchTelemetry? All the recordFetchTelemetry variants makes this code a little harder to follow. -- copyFiles()/copyFiles(JAR) and recordFetchTelemetry(status)/recordFetchTelemetry(exception) make me realize that I am still in the "use explicit method names" camp. I was not always in that camp, but it's my personal style. Just a realization. Not worth a request to change, except for the considerations of collapsing recordFetchTelemetry and recordPostFetchTelemetry. -- >diff --git a/mobile/android/base/distribution/ReferrerDescriptor.java b/mobile/android/base/distribution/ReferrerDescriptor.java >+} >\ No newline at end of file Throw in a newline >diff --git a/mobile/android/base/distribution/ReferrerReceiver.java b/mobile/android/base/distribution/ReferrerReceiver.java >+ private static final String MOZILLA_UTM_SOURCE = "mozilla"; >+ >+ >+ @Override >+ public void onReceive(Context context, Intent intent) { Two line breaks might be one too many >+ ReferrerDescriptor referrer = new ReferrerDescriptor(intent.getStringExtra("referrer")); >+ >+ //. >diff --git a/mobile/android/tests/browser/junit3/moz.build b/mobile/android/tests/browser/junit3/moz.build These are not on TBPL yet right? r+, with some "for your consideration" thrown in. Attachment #8447289 - Flags: review?(mark.finkle) → review+ (In reply to Mark Finkle (:mfinkle) from comment #32) > Otherwise, something simpler, like > "distributions.cdn.mozilla.net" ? I would guess that it's moderately calcified. If you would like it changed, please comment in Bug 1020033? > For the final paths, I think we should bake a little platform and > versioning. Something like "android/v1". I don't think using App Version is > possible since we'd need to keep updating folders on the CDN. > Thoughts? Was planning to, yup. Versioning is less of an issue here -- it should be vanishingly uncommon for a user to reach the Play store for a build that doesn't support the matching distribution -- but it's habit for me. > >+ Log.d(LOGTAG, "Downloading referred distribution: " + uri); > > Should we be logging the URL? I'm in two minds about this. It's not sensitive information, it's useful for debugging, and the info should already be in the log at some level (after all, you just installed an app and got a system intent). > copyFiles()/copyFiles(JAR) and > recordFetchTelemetry(status)/recordFetchTelemetry(exception) make me realize > that I am still in the "use explicit method names" camp. These used to be even more similar than they already were -- one took a ZipFile, one took a ZipInputStream. The latter still does, but only the JarInputStream flavor. From that perspective, this is the perfect example of polymorphism -- we just don't really use it. At this point I think it makes sense to split them in name, too. > >+ //. Fair. I'll have docs explaining which fields are 'protected', too. > >diff --git a/mobile/android/tests/browser/junit3/moz.build b/mobile/android/tests/browser/junit3/moz.build > > These are not on TBPL yet right? Correct. (Alas.) > Fair. I'll have docs explaining which fields are 'protected', too. Enough docs to start for this particular thing: Comment on attachment 8449974 [details] [diff] [review] Part 1: catch install intent and deliver it to the distribution handler, processing the distribution file dynamically. v6 Carrying forward review. Attachment #8449974 - Flags: review+ Tests look good on Try. Status: ASSIGNED → RESOLVED Closed: 6 years ago Resolution: --- → FIXED Target Milestone: --- → Firefox 33 Are partners testing this? They'll be exercising it, but not QAing it.
https://bugzilla.mozilla.org/show_bug.cgi?id=1013024
CC-MAIN-2020-29
refinedweb
2,227
50.53
Alright. Basically the point of this program is to allow a user to select how many fractions they want printed on the screen. It is supposed to print 3 fractions PER line. If a user requests 4 fractions..it would print 3 and print the 4th fraction by itself on the next line. The numerator is any number between 1 - 10. Denominator is any number between 1 - 20. Currently...with what I have it gets stuck in an infinite loop and I can't quite put my finger on what is causing it. On a side note, I'm really rusty with C++. It's been years. #include <iostream> #include <cstdlib> using namespace std; struct Fraction { int num; //non-negative number int den; //non-negative number }; int main(void) { Fraction *intList; int arraySize; cout << "How many fractions would you like to display? "; cin >> arraySize; cout << endl; intList = new Fraction[arraySize]; //initializing values of the array for(int i=0; i<arraySize; i++) { intList[i].num = (rand()%10)+1; intList[i].den = (rand()%20)+1; } for(int z=0; z<arraySize; z+3) { cout << intList[z].num << "/" << intList[z].den << " "; if (z+1 > arraySize) { break; } else if (z+1 < arraySize) { cout << intList[z+1].num << "/" << intList[z+1].den << " "; } if (z+2 > arraySize) { break; } else if (z+2 < arraySize) { cout << intList[z+2].num << "/" << intList[z+2].den << " " << endl; } } system("PAUSE"); return 0; }
https://www.daniweb.com/programming/software-development/threads/222720/generating-and-printing-fractions
CC-MAIN-2018-43
refinedweb
232
68.06
I “Separate the construction of a complex object from its representation so that the same construction process can create different representations”. Like most of the GoF book, that is an accurate if dull description. Josh Bloch, in his Effective Java book, suggests a more interesting use for builders. The problem his approach was trying to solve is when a class has “more than a handful” of parameters that would normally be set via a constructor, and many of them may be optional. Typical solutions are - A telescoping constructor pattern, in which you provide a constructor with only the required parameters, as well as additional constructors with variations of the optional parameters, culminating in a constructor with all the optional parameters. This works, but makes for a fairly messy solution that has a potentially large number of constructors to cover all permutations - A simpler constructor (e.g. for just the required parameters), backed up by setter methods for the optional parameters (the JavaBeans approach). However, this can leave an object in an inconsistent state during it construction and of course precludes immutability since fields can’t be made final. - Use a Builder. This is the approach recommended by Bloch. The client creates a builder (often using a parameter-less constructor), then calls setter like methods for the values of interest (the rest assume default values), before finally calling a build method. A few years back, I attended a talk in which Ted Young discussed taking the builder pattern a step further by using it for the construction of test objects, and it’s this approach that is discussed below. [Update: see Ted’s response to this post here] Using the Builder pattern to construct test fixtures Using a Builder allows test fixtures to be created more easily, and with clearer intent. The type of test objects I typically use this Builder approach for are domain model objects, such as Account, User, Widget or whatever. I am a proponent of making such objects immutable. For example: public final class Account { private final Integer id; private final String name; private final AccountType type; private final BigDecimal balance; private final DateTime openDate; private final Status status; public Account(Integer id, String name, AccountType type, BigDecimal balance, DateTime openDate, Status status) { this.id = id; this.name = name; this.type = type; this.balance = balance; this.openDate = openDate; this.status = status; } public Integer getId() { return id; } //other getters, toString(), equals() and hashCode() omitted for brevity //no setters } With such a class, you often run into the problem Bloch discussed. In this example, we have a single constructor that forces you to set all values, but we could also have many variations where some values can be omitted to use default values. So, creating an instance of such a class for tests can be somewhat painful, and more so if it has even more fields than this simple example. You are forced to provide values even for fields you may not care about for the test. That also makes it difficult to know which values are actually of interest for the test, and which are purely to make things compile. A Builder can help. Example public class AccountBuilder { //account fields with default values Integer id = 1; String name = "default account name"; AccountType type = AccountType.CHECKING; BigDecimal balance = new BigDecimal(0); DateTime openDate = new DateTime(2013, 01, 01, 0, 0, 0); Status status = Status.ACTIVE; public AccountBuilder() {} public AccountBuilder withId(Integer id) { this.id = id; return this; } public AccountBuilder withName(String name) { this.name = name; return this; } public AccountBuilder withType(AccountType type) { this.type = type; return this; } public AccountBuilder withBalance(BigDecimal balance) { this.balance = balance; return this; } public AccountBuilder withOpenDate(DateTime openDate) { this.openDate = openDate; return this; } public AccountBuilder withStatus(Status status) { this.status = status; return this; } public Account build() { return new Account(id, name, type, balance, openDate, status); } } Now you can create an Account object for testing much more easily. Notes on using Builder for tests - Default values The default values used in a builder are a convenience to avoid exceptions. If your test needs specific values for a test, it is best to explicitly set them, rather than rely on any defaults. It makes the intent of your test clearer, plus minimizes the risk of inadvertently breaking tests if you ever need to change defaults (e.g. due to changing business requirements). - Non-final fields While the domain model class itself is immutable and hence has final fields. All fields in the Builder are, by design, non-final. Hence Builders are not thread-safe. So don’t reuse Builders; instead create a new instance for each test. - Method order should not be significant For the most part, the order that methods are called on a builder should not be significant, and the object will not be constructed until build() is called. This makes the builder easier to use and avoids unexpected surprises. There are obvious and acceptable exceptions to this rule of thumb. For example calling Account account = new AccountBuilder() .withType(AccountType.SAVING) .withType(AccountType.CHECKING) .build(); is silly but allowed. It would just leave you with an account of type checking. This is fine, but try to avoid more subtle causes of confusion, for example if you have a collection that can have something added, or the whole collection replaced (hence wiping out previous additions). Advantages of using a Builder for tests - Easy to read The following declaration is not particularly clear: Account account = new Account(1, "test", 10, ...); This declaration is much clearer: Account account = new AccountBuilder() .withId(1) .withName("test") .withBalance(10) .build(); As Bloch puts it, “The Builder pattern simulates named optional parameters”. - Only specify values that are actually relevant to your test If your test is only concerned with account balance and status: Account account = new AccountBuilder() .withBalance(new BigDecimal(-100)) .withStatus(Status.OVERDRAWN) .build(); As opposed to having to specify every value in the Accounts constructor. - Ability to create invalid objects The constructor of the domain model class will likely (hopefully!) force you to create valid objects. In your tests, you may want to deliberately create invalid objects for testing. Further enhancements Convenience methods You can add convenience methods for common scenarios used in testing. For example public AccountBuilder withNegativeBalance() { this.balance = new BigDecimal(-100); return this; } Fixtures class In addition to using a Builder class, I have also found it useful to have an associated fixtures class that provides pre-constructed instances for tests. These can make use of the Builder object for the construction (although there is nothing to stop you using the raw constructors too). For example public class AccountFixtures { //a shortcut to creating a basic Account object public final Account ACCOUNT = new AccountBuilder().build(); public final Account OVERDRAWN_CHECKING_ACCOUNT = new AccountBuilder() .withType(AccountType.CHECKING) .withNegativeBalance() .build(); public final Account CLOSED_SAVING_ACCOUNT = new AccountBuilder() .withType(AccountType.SAVING) .withZeroBalance() .withStatus(Status.CLOSED) .build(); } I’ve seen this style before, and I think I need to use this more in my code. Hi this is a really great simplified example, simplification being the AccountBuilder ( Concrete Builder ) is being used directly by the client . Can we illustrate some thing with an interface for building (builder Account Builder interface) and then Concrete Account Builder. Basically , I am trying to decouple the Client from Concrete Builder. BTW pardon me if while making this suggestion , I missed some thing fundamental to the Builder Design Pattern. I am starting to explore it .
https://www.javacodegeeks.com/2013/06/builder-pattern-good-for-code-great-for-tests.html
CC-MAIN-2017-39
refinedweb
1,235
54.83
[ ] Raghu Angadi commented on HADOOP-5158: -------------------------------------- This patch requires increasing file system image version. The main implication is that once a cluster upgrades to 0.18.4, 0.18.3 can not be run on the same image (normal for major version upgrades). '-rollback' works as expected. This is a fairly safe patch and there is no known impact on performance or stability (especially when no quotas are used). In the worst case where 'rollback' is not good enough, a small patch that ignores the new quota fields. > Port HDFS space quotas to 0.18 > ------------------------------ > > Key: HADOOP-5158 > URL: > Project: Hadoop Core > Issue Type: Improvement > Components: dfs > Affects Versions: 0.18.3 > Reporter: Raghu Angadi > Assignee: Raghu Angadi > Fix For: 0.18.4 > > > 0.18 already has quotas for HDFS namespace (HADOOP-3187). HADOOP-3938 implements similar quotas for disk space on HDFS in 0.19. This jira proposes to port HADOOP-3938 to 0.18.4. -- This message is automatically generated by JIRA. - You can reply to this email to add a comment to the issue online.
http://mail-archives.apache.org/mod_mbox/hadoop-common-dev/200902.mbox/%3C704517585.1233618479738.JavaMail.jira@brutus%3E
CC-MAIN-2014-23
refinedweb
178
68.36
send a signal to a process or a group of processes #include <sys/types.h> #include <signal.h> int kill( pid_t pid, int sig ); The kill() function sends the signal sig to a process or group of processes specified by pid. If sig is zero, then no signal is sent, but the validity of pid is still checked. For a process to have permission to send a signal to a process, the real or effective user ID of the sending process must match the real or effective user ID of the receiving process. If pid is greater than zero, then sig is sent to the single process that has that process ID. If pid is equal to zero, then sig is sent to all processes that are in the same process group as the sending process. If pid is less than zero, sig is sent to every process that is a member of the process group -pid. If the value of pid causes sig to be generated for the sending process, and if sig is not blocked, either sig or at least one pending unblocked signal is delivered before the kill function returns. Upon successful completion, the kill() function returns a value of zero. If an error occurs, -1 is returned, and errno is set. See sigprocmask(). POSIX 1003.1 getpid(), setsid(), sigaction(), signal()
https://users.pja.edu.pl/~jms/qnx/help/watcom/clibref/qnx/kill.html
CC-MAIN-2022-33
refinedweb
224
78.28
Detecting virtual IP addresses Discussion in 'Java' started by Gordon Beaton, Dec 5,11 - Derek Simmons - Aug 1, 2004 V1.1 Virtual Folder when V2.0 installed for the virtual server?Jéjé, Nov 30, 2005, in forum: ASP .Net - Replies: - 2 - Views: - 406 - Jéjé - Nov 30, 2005 Detecting classes with virtual functionsNews Admin, Jul 27, 2004, in forum: C++ - Replies: - 5 - Views: - 421 - David Abrahams - Aug 4, 2004 Detecting virtual inheritanceImre, Mar 27, 2006, in forum: C++ - Replies: - 1 - Views: - 267 - Gernot Frisch - Mar 27, 2006 Physical Addresses VS. Logical Addressesnamespace1, Nov 29, 2006, in forum: C++ - Replies: - 3 - Views: - 921
http://www.thecodingforums.com/threads/detecting-virtual-ip-addresses.148313/
CC-MAIN-2014-42
refinedweb
101
63.49
Are you sure? This action might not be possible to undo. Are you sure you want to continue? Next: Introduction A comprehensive guide to the theory and practice of monadic programming in Haskell Version 1.1.0. All About Monads Contents Part I - Understanding Monads Introduction What is a monad? Why should I make the effort to understand monads? Meet the Monads Type constructors Maybe a monad An example A list is also a monad Summary Doing it with class Haskell type classes The Monad class Example continued Do notation Summary The monad laws The three fundamental laws Failure IS an option No way out Zero and Plus Summary Exercises Monad support in Haskell In the standard prelude In the Monad module Summary Part II - A Catalog of Standard Monads Introduction The Identity monad Overview Motivation Definition Example The Maybe monad Overview Motivation Definition Example The Error monad Overview All About Monads Motivation Definition Example The List monad Overview Motivation Definition Example The IO monad Overview Motivation Definition Example The State monad Overview Motivation Definition Example The Reader monad Overview Motivation Definition Example The Writer monad Overview Motivation Definition Example The Continuation monad Overview Motivation Definition Example Part III - Monads in the Real World Introduction Combining monads the hard way Nested Monads Combined Monads Monad transformers Transformer type constructors Lifting Standard monad transformers The MonadTrans and MonadIO classes Transformer versions of standard monads Anatomy of a monad transformer Combined monad definition Defining the lifting function Functors More examples with monad transformers WriterT with IO ReaderT with IO StateT with List Managing the transformer stack Selecting the correct order An example with multiple transformers Heavy lifting Continuing Exploration Appendices Appendix I - A physical analogy for monads Appendix II - Haskell code examples Next: Introduction Introduction Prev: Table of Contents TOC: Contents Next: Meet the Monads Introduction What is a monad? Why should I make the effort to understand monads?: 1. Modularity - They allow computations to be composed from simpler computations and separate the combination strategy from the actual computations being performed. 2. Flexibility - They allow functional programs to be much more adaptable than equivalent programs written without monads. This is because the monad distills the computational strategy into a single place instead of requiring it be distributed throughout the entire program. 3.. Prev: Table of Contents TOC: Contents Next: Meet the Monads Meet the Monads Prev: Introduction TOC: Contents Next: Doing it with class Meet the Monads Type constructors Maybe a monad A list is also a monad An example Summary is a type constructor that creates monad instances physical analogy of a monad can apply the same combinator to other computations that may fail to return a value. understand and modify. or multiple values. 1. Thus.. During this process. That is the subject of the next chapter. or it may eventually resolve into a single allowed outcome or no allowed outcome at all. because we have to handle the possibility of not having a parent: maternalGrandfather :: Sheep -> Maybe Sheep maternalGrandfather s = case (mother s) of Nothing -> Nothing Just m -> father m and so on for the other grandparent combinations. The binding operation for lists creates a new list containing the results of applying the function to all of the values in the original list (l >>= f = concatMap f l). 1. But first. A list is also a monad We have seen that the Maybe type constructor is a monad for building computations which may fail to return a value.. mother :: Sheep -> Maybe Sheep mother = .Meet the Monads We would represent the possibility of not having a mother or father using the Maybe type constructor in our Haskell code: type Sheep = . and a combinator function called bind or >>=. In fact. the combinator captures a general strategy for combining computations that may fail to return a value. Notice also that the comb function is entirely polymorphic — it is not specialized for Sheep in any way. [] (for building lists). we saw how good programming practice led us to define a simple monad that could be used to build complex computations out of sequences of computations that could each fail to return a value. The Maybe type constructor along with the Just function (acts like return) and our combinator (acts like >>=) together form a simple monad for building computations which may not return a value. The List monad thus embodies a strategy for performing simultaneous computations along all allowed paths of an ambiguous computation. and difficult to maintain. and it would be much nicer to implement this notion once in a single place and remove all of the explicit case testing scattered all over the code.. The happy outcome is that common sense programming practice has led us to create a monad without even realizing it. []. Examples of this use of the List monad. and contrasting examples using the Maybe monad will be presented shortly. So good programming style would have us create a combinator that captures the behavior we want: Code available in example1..comb is a combinator for sequencing operations that return Maybe comb :: Maybe a -> (a -> Maybe b) -> Maybe b comb Nothing _ = Nothing comb (Just x) f = f x -. Then. The List monad allows us to build computations which can return 0. 1.hs -. It is clear that a Nothing value at any point in the computation will cause Nothing to be the final result. It gets even worse if we want to find great grandparents: mothersPaternalGrandfather :: Sheep -> Maybe Sheep mothersPaternalGrandfather s = case (mother s) of Nothing -> Nothing Just m -> case (father m) of Nothing -> Nothing Just gf -> father gf Aside from being ugly. The resulting Maybe monad encapsulates a strategy for combining computations that may not return values. We have also seen that another common Haskell type constructor. is also a monad.. easier to read and easier to change. a function called return.. we have achieved a degree of modularity and flexibility that is not present when the computations are combined in an ad hoc manner. or more allowed outcomes. father :: Sheep -> Maybe Sheep father = . such as database queries or dictionary lookups.now we can use `comb` to build complicated sequences mothersPaternalGrandfather :: Sheep -> Maybe Sheep mothersPaternalGrandfather s = (Just s) `comb` mother `comb` father `comb` father The combinator is a huge success! The code is much cleaner and easier to write. we must see how useful monads are defined in Haskell. or more values. The return function for lists simply creates a singleton list (return x = [x]). All that remains to make this monad truly useful is to make it conform to the monad framework built into the Haskell language. Summary We have seen that a monad is a type constructor. Prev: Introduction TOC: Contents Next: Doing it with class . is a monad. unclear. In a computation composed from ambigous subcomputations. This will make the code easier to write. this is just too much work. the set of possible computational states is represented as a list. the ambiguity may compound. You may be surprised to know that another common Haskell type constructor. These three elements work together to encapsulate a strategy for combining computations to produce more complex computations. Using the Maybe type constructor. defining functions to find grandparents is a little more complicated. One use of functions which return lists is to represent ambiguous computations — that is computations which may have 0. The List monad encapsulates a strategy for combining computations that can return 0. By codifying the strategy in a monad.. so you don't need to do it yourself. whereas the latter function is restricted to the strategy of the Maybe monad. Do notation is an expressive shorthand for building up monadic computations.Doing it with class Prev: Meet the Monads TOC: Contents Next: The monad laws Doing it with class Haskell type classes The Monad class Example continued Do notation Summary Haskell type classes The discussion in this chapter involves the Haskell type class system. but another advantage of membership in the Monad class is the Haskell support for "do" notation. is also defined as an instance of the Monad class in the standard prelude.2. (x:xs) would match against Maybe [1. so just do it! The standard Monad class definition in Haskell looks something like this: class Monad m where (>>=) :: m a -> (a -> m b) -> m b return :: a -> m a Example continued Continuing the previous example. similar to the way that list comprehensions are an expressive shorthand for building computations on lists. The other monad we have seen so far. Then using that variable in a subsequent monadic computation automatically performs the binding. The type of the expression to the right of the arrow is a monadic type m a. Maybe is defined as an instance of the Monad class in the standard prelude. Haskell has special support for Monad instances built into the language and making your monads instances of the Monad class will allow you to use these features to write cleaner and more elegant code. It is not strictly necessary to make your monads instances of the Monad class. the list constructor. Any instance of the Monad class can be used in a do-block in Haskell. for example. . Also. Recall that our Maybe monad used the Just data constructor to fill the role of the monad return function and we built a simple combinator to fill the role of the monad >>= binding function. The Monad class In Haskell. the do notation allows you to write monadic computations using a pseudo-imperative style with named variables. The result of a monadic computation can be "assigned" to a variable using a left arrow <. we will now see how the Maybe type constructor fits into the Haskell monad framework as an instance of the Monad class. but it is a good idea. try to make use of the Monad class instead of using a specific monad instance. there is a standard Monad class that defines the names and signatures of the two monad functions return and >>=. We can make its role as a monad explicit by declaring Maybe as an instance of the Monad class: instance Monad Maybe Nothing >>= f = (Just x) >>= f = return = where Nothing f x Just Once we have defined Maybe as an instance of the Monad class. It's easy to do and it has many benefits. Do notation Using the standard monadic function names is good.3].we can use monadic operations to build complicated sequences maternalGrandfather :: Sheep -> Maybe Sheep maternalGrandfather s = (return s) >>= mother >>= father fathersMaternalGrandmother :: Sheep -> Maybe Sheep fathersMaternalGrandmother s = (return s) >>= father >>= mother >>= mother In Haskell. If you are not familiar with type classes in Haskell. When writing functions that work with monads. we can use the standard monad operators to build the complex computations: -. In short. making your monads instances of the Monad class communicates important information to others who read the code and failing to do so can cause you to use confusing and non-standard function names. you should review them before continuing. The expression to the left of the arrow is a pattern to be matched against the value inside the monad.operator. Summary Haskell provides built-in support for monads.mother s. expr2 becomes expr2 >>= \_ -> All do blocks must end with a monadic expression. becomes expr1 >>= \x -> and every expression without a variable assignment.Doing it with class Here is a sample of do notation using the Maybe monad: Code available in example2. imperative-style notation for describing computations with monads. monads offer the possibility to create imperative-style computations within a larger functional program.expr1. father gf } Notice that do notation resembles an imperative programming language. There is nothing that can be done using do notation that cannot be done using only the standard monadic operators. The actual translation from do notation to standard monadic operators is roughly that every expression matched to a pattern. Prev: Meet the Monads TOC: Contents Next: The monad laws .we can also use do-notation to build complicated sequences mothersPaternalGrandfather :: Sheep -> Maybe Sheep mothersPaternalGrandfather s = do m <.father m. you must declare the monad type constructor to be an instance of the Monad class and supply definitions of the return and >>= (pronounced "bind") functions for the monad. Haskell also allows you to use braces and semicolons when defining a do block: mothersPaternalGrandfather s = do { m <. To take advantage of Haskell's monad support. The do block shown above is written using the layout rule to define the extent of the block. especially when the sequence of monadic computations is long. It is literally used to bind the value in the monad to the argument in the following lambda expression. which is syntactic sugar that provides a simple. The definition of mothersPaternalGrandfather above would be translated to: mothersPaternalGrandfather s = mother s >>= \m -> father m >>= \gf -> father gf It now becomes clear why the binding operator is so named. In this respect.mother s gf <. But do notation is cleaner and more convenient in some cases. You should understand both the standard monadic binding notation and do notation and be able to apply each where they are appropriate. in which a computation is built up from an explicit sequence of simpler computations. A monad that is an instance of the Monad class can be used with do-notation. This theme will be expanded upon when we deal with side-effects and the I/O monad later.hs -. gf <. and a let clause is allowed at the beginning of a do block (but let clauses in do blocks do not use the "in" keyword). Do notation is simply syntactic sugar. x <.father m father gf Compare this to fathersMaternalGrandmother written above without using do notation. The default implementation of the fail function is: fail s = error s You do not need to change this for your monad unless you want to provide different behavior for failure or to incorporate failure into the computational strategy of your monad.The monad laws Prev: Doing it with class TOC: Contents Next: Exercises The monad laws The three fundamental laws Failure IS an option No way out Zero and Plus Summary The tutorial up to now has avoided technical discussions. The fail function is not a required part of the mathematical definition of a monad. values can be extracted from the Maybe monad by pattern matching on Just x or using the fromJust function. The >> function is a convenience operator that is used to bind a monadic computation that does not require input from the previous computation in the sequence.l!!idx -. To be a proper monad. the Haskell Monad class allows the creation of one-way monads. (m >>= f) >>= g == m >>= (\x -> f x >>= g) The first law requires that return is a left-identity with respect to >>=. but it is included in the standard Monad class definition because of the role it plays in Haskell's do notation. such as List and Maybe. It is defined in terms of >>=: (>>) :: m a -> m b -> m b m >> k = m >>= (\_ -> k) No way out You might have noticed that there is no way to get values out of a monad as defined in the standard Monad class. for instance. Monadic operations must obey a set of laws. Just [7. This means that any function whose result type does not contain the IO type constructor is guaranteed not to use the IO monad. many monads obey additional laws beyond the standard monad laws. defines fail as: fail _ = Nothing so that fail returns an instance of the Maybe monad with meaningful behavior when it is bound with other functions in the Maybe monad.. In Haskell. Haskell's Monad class also includes some functions beyond the minimal complete definition that we have not seen yet. The full definition of the Monad class actually includes two additional functions: fail and >>. Finally. m >>= return == m 3. it is not enough just to declare a Haskell instance of the Monad class with the correct type signatures. It is up to the programmer to ensure that any Monad instance he creates satisfies the monad laws. (return x) >>= f == f x 2. Any type constructor with return and bind operators that satisfy the three monad laws is a monad. and there is an additional Haskell class to support these extended monads.2. so it is up to the programmer to ensure that any Monad instances he declares obey they laws. but there are a few technical points that must be made concerning monads. Other monads. but fn 1 and fn 2 both have the value Nothing. While it is not necessary to know category theory to create and use monads. For instance.20]] (x:xs) <. do . the compiler does not check that the laws hold for every instance of the Monad class. By not requiring such a function. The fail function is called whenever a pattern matching failure occurs in a do block: fn :: Int -> Maybe [Int] fn idx = do let l = [Just [1. Because you can't escape from the IO monad. Nothing.3].3]. To create a monad. The second law requires that return is a right-identity with respect to >>=. the return and >>= functions must work together according to three laws: 1. Just []. One-way monads allow values to enter the monad through the return function (and sometimes the fail function) and they allow computations to be performed within the monad using the bind functions >>= and >>. fn 0 has the value Just [2. known as "the monad axioms". Nothing prevents the monad author from allowing it using functions specific to the monad. The IO monad is a familiar example of a one-way monad in Haskell. That is not an accident. These laws aren't enforced by the Haskell compiler. it is impossible to write a function that does a computation in the IO monad but whose result type does not include the IO type constructor. The Maybe monad. The third law is a kind of associativity law for >>=. Failure IS an option The definition of the Monad class given earlier showed only the minimal complete definition.a pattern match failure will call "fail" return xs So in the code above. The three fundamental laws The concept of a monad comes from a branch of mathematics called category theory. we do need to obey a small bit of mathematical formalism. but they do not allow values back out of the monad. Obeying the three laws ensures that the semantics of the do-notation using the monad will be consistent. There are three of these laws which state that the return function is both a left and a right identity and that the binding operator is associative. then the result of mplus is also Nothing. so the IO type constructor acts as a kind of tag that identifies all functions that do I/O. which would return a parent if there is one. Haskell provides a MonadPlus class for such monads which define the mzero value and the mplus operator. because it needs to return a different character each time it is called. 3. Zero and Plus Beyond the three monad laws stated above. But it is ok to have an I/O function getChar :: IO Char in the IO monad. mzero is the empty list and mplus is the ++ operator. Some monads obey laws beyond the three basic monad laws. Furthermore. Prev: Doing it with class TOC: Contents Next: Exercises .. depending on the input from the user. the Monad class defines another function. The mplus operator is used to combine monadic values from separate computations into a single monadic value. We cannot simply have a function readChar :: Char. parent s = (mother s) `mplus` (father s). some monads obey additional laws. Failure to satisfy these laws will result in monads that do not behave properly and may cause subtle problems when using do-notation. and >>= with × in ordinary arithmetic. mplus with +. because it can only be used in a sequence within the one-way monad. 4. we could use Maybe's mplus to define a function. So a one-way monad effectively creates an isolated computational domain in which the rules of a pure functional language can be relaxed. fail. Another common pattern when defining monads is to represent monadic values as functions.. the function would return one or the other. which describe algabraic properties of monads. If both input values are Nothing. Then when the value of a monadic computation is required. Functional computations can move into the domain. Summary Instances of the Monad class should conform to the so-called monad laws. mzero >>= f == mzero m >>= (\x -> mzero) == mzero mzero `mplus` m == m m `mplus` mzero == m It is easy to remember the laws for mzero and mplus if you associate mzero with 0.The monad laws allow values out of the monad. The monads have a special value mzero and an operator mplus that obey four additional laws: 1. the resulting monad is "run" to provide the answer. 2. Consider the simple issue of reading a character from the user. The wonderful feature of a one-way monad is that it can support side-effects in its monadic operations but prevent them from destroying the functional properties of the non-monadic portions of the program. but dangerous side-effects and non-referentially-transparent functions cannot escape from it. but it is often useful in practice and it is included in the Monad class because it is used in Haskell's do-notation. depending on the exact definition of mplus in the Maybe monad. and Nothing is the sheep has no parents at all. It is an essential property of Haskell as a pure functional language that all functions return the same value when called twice with the same arguments. Within the context of our sheep-cloning example. So it is possible to write functions which use these monads internally but return non-monadic values. The fail function is not a technical requirement for inclusion as a monad. In addition to the return and >>= functions. such functions are only useful within the IO monad. For a sheep with both parents. An important class of such monads are ones which have a notion of a zero element and a plus operator. There is no way to get rid of the IO type constructor in the signature of any function that uses it. The List monad also has a zero and a plus. without using any do-notation syntactic sugar. Exercise 4: Using the Monad class constraint Monads promote modularity and code reuse by encapsulating often-used computational strategies into single blocks of code that can be used to construct many different computations. Less obviously. Prev: The monad laws TOC: Contents Next: Monad support in Haskell .Exercises Prev: The monad laws TOC: Contents Next: Monad support in Haskell Exercises 1. Click here to see the solution. Exercise 3: Using the List monad Write functions parent and grandparent with signature Sheep -> [Sheep]. Exercise 2: Combining monadic values Write functions parent and grandparent with signature Sheep -> Maybe Sheep. Hint: the mplus operator in the List monad is useful here. or the empty list if there is no such sheep. They should return all sheep matching the description. class constraints. They should be useful in both the Maybe and List monads. look here. Click here to see the solution. monads also promote modularity by allowing you to vary the monad in which a computation is done to achieve different variations of the computation. fathersMaternalGrandmother. or Nothing if there is no such sheep. 4. Click here to see the solution. 3. using the (Monad m) =>. 2. etc. Do notation Combining monadic values Using the List monad Using the Monad class constraint This section contains a few simple exercises to hone the reader's monadic reasoning skills and to provide a solid comprehension of the function and use of the Maybe and List monads before looking at monadic programming in more depth. This is achieved by writing functions which are polymorphic in the monad type constructor. Also the maybeToList function in the Maybe module can be used to convert a value from the Maybe monad to the List monad. They should return one sheep selected from all sheep matching the description. (MonadPlus m) =>. Hint: the mplus operator is useful here. with which the reader should already be familiar. Exercise 1: Do notation Rewrite the maternalGrandfather. Write functions parent and grandparent with signature (MonadPlus m) => Sheep -> m Sheep. How does the functions' behavior differ when used with the List monad versus the Maybe monad? If you need to review the use of type classes and class constraints in Haskell. The exercises will build on the previous sheep-cloning example. and mothersPaternalGrandfather functions in Example 2 using the monadic operators return and >>=. Click here to see the solution. e. sequence_ :: Monad m => [m a] -> m () sequence_ = foldr (>>) (return ()) The mapping functions The mapM function maps a monadic computation over a list of values and returns a list of the results. which contains less-commonly used monad functions. mapM_ operates the same as mapM. but it doesn't return the list of values. In the standard prelude The Haskell 98 standard prelude includes the definition of the Monad class as well as a few auxilliary functions for working with monadic data types.Minimal complete definition: -(>>=). The individual monad types are each in their own libraries and are the subject of Part II of this tutorial. mapM_ :: Monad m => (a -> m b) -> [a] -> m () mapM_ f as = sequence_ (map f as) As a simple example of the use the mapping functions.. the reverse binding function is called "=<<".Introduction Monad support in Haskell In the standard prelude In the Monad module Summary Haskell's built in support for monads is split among the standard prelude. executes each one in turn and returns a list of the results. intended for binding) will have a signature similar to the non-monadic version but the function outputs will be within the monad: -.. Its definition is simply: (=<<) :: Monad m => (a -> m b) -> m a -> m b f =<< x = x >>= f . return m >> k = m >>= \_ -> k fail s = error s The sequencing functions The sequence function takes a list of monadic computations. It is useful in circumstances where the binding operator is used as a higher-order term and it is more convenient to have the arguments in the reversed order. and the Monad module. Since the standard binding function is called ">>=". This is a common pattern with monads — a version of a function for use within a monad (i. a putString function for the IO monad could be defined as: putString :: [Char] -> IO () putString s = mapM_ putChar s mapM can be used within a do block in a manner similar to the way the map function is normally used on lists. mapM_ which is defined using sequence_. It is useful when only the side-effects of the monadic computation are important. It is useful when only the side-effects of the monadic computations are important. It is defined in terms of the list map function and the sequence function above: mapM :: Monad m => (a -> m b) -> [a] -> m [b] mapM f as = sequence (map f as) There is also a version with an underscore. If any of the computations fail. which exports the most common monad functions.Monad support in Haskell Prev: Exercises TOC: Contents Next: Part II . The Monad class We have seen the Monad class before: class Monad m where (>>=) :: m a -> (a -> m b) -> m b (>>) :: m a -> m b -> m b return :: a -> m a fail :: String -> m a -. foldM is a monadic version of foldl in which monadic computations foldM :: (Monad m) => (a -> b -> m a) -> a -> [b] -> m a foldM f a [] = return a foldM f a (x:xs) = f a x >>= \y -> foldM f y xs built from a list are bound left-to-right.NOTE: doesDirectoryExist has type FilePath -> IO Bool . clear way mothersPaternalGrandfather s = traceFamily s [mother.. f an xn Right-to-left binding is achieved by reversing the input list before calling foldM.hs -. To access these facilities. but you are encouraged to explore the module for yourself when you feel you are ready to see some of the more esoteric monad functions.foldM addDataFromFile emptyFM handles print (fmToList dict) The filterM function works like the list filter function inside of a monad.filterM p xs return (if b then (x:ys) else ys) Here is an example showing how filterM can be used within the IO monad to select only the directories from a list: Code available in example5. Not all of the function in the Monad module are discussed here.hs -.. father] paternalGrandmother s = traceFamily s [father.traceFamily is a generic function to find an ancestor traceFamily :: Sheep -> [ (Sheep -> Maybe Sheep) ] -> Maybe Sheep traceFamily s l = foldM getParent s l where getParent s f = f s -.we can define complex queries using traceFamily in an easy.this is an auxiliiary function used with foldM inside the IO monad addDataFromFile :: Dict -> Handle -> IO Dict addDataFromFile dict hdl = do contents <. In fact. a list of those values for which the predicate was True.a Dict is just a finite map from strings to strings type Dict = FiniteMap String String -. it is probably clearer to write "traceFamily s [father. mother] The traceFamily function uses foldM to create a simple way to trace back in the family tree to any depth and in any pattern. We can use foldM to create a more poweful query function in our sheep cloning example: Code available in example3...Monad support in Haskell In the Monad module The Monad module in the standard Haskell 98 libraries exports a number of facilities for more advanced monadic operations.this an auxilliary function used with foldl addEntry :: Dict -> Entry -> Dict addEntry d e = addToFM d (key e) (value e) -. It returns.xn] = do a2 <. It takes a predicate function which returns a Boolean value in the monad and a list of values.hs import Monad import Directory import System -.return (map read (lines contents)) return (foldl (addEntry) dict entries) -.f a1 x1 a3 <.hGetContents hdl entries <.this is not valid Haskell code.getArgs handles <. The mapM functions are exported in the standard prelude and were described above. filterM :: Monad m => (a -> m Bool) -> [a] -> m [a] filterM p [] = return [] filterM p (x:xs) = do b <.this program builds a dictionary from the entries in all files named on the -. inside the monad..x2. father. it is just for illustration foldM f a1 [x1.. simply import Monad in your Haskell program. mother]" than it is to use the paternalGrandmother function! A more typical use of foldM is within a do block: Code available in example4.command line and then prints it out as an association list main :: IO () main = do files <. The definition is: but it is easier to understand the operation of foldM if you consider its effect in terms of a do block: -.p x ys <.f a2 x2 ..mapM openForReading files dict <. allCombinations (+) [[0.3]] would be -[0+1. which lifts a function of a single argument into a monad. John").0*1*5. Michael")] tempName <.1+3]. Functions up to liftM5 are defined in the Monad module.3. John").6.and allCombinations (*) [[0.1+2.1.0+2.0+3. zipWithM_ behaves the same but discards the output of the function. liftM :: (Monad m) => (a -> b) -> (m a -> m b) liftM f = \a -> do { a' <. ap is useful when working with higher-order functions and monads.[1. "Caine.getArgs <.[3.Monad support in Haskell -. So for example [(*2).For example. The unless function does the same.2.lookup name db return (swapNames tempName) But making use of the liftM function. consider a computation in the Maybe monad in which you want to use a function swapNames::String -> String.1*2*3. The simplest lifting operator is liftM.of elements of the given lists -. we can use liftM swapNames as a function of type Maybe String -> Maybe String: Code available in example6. or [1. return (f a') } Lifting operators are also provided for functions with more arguments.1*1*5. The when function takes a boolean argument and a monadic computation with unit "()" type and performs the computation only when the boolean argument is True. "Caine. Michael")] liftM swapNames (lookup name db) The difference is even greater when lifting functions with more arguments. "Smith. ap is simply the function application operator ($) lifted into the monad: ap :: (Monad m) => m (a -> b) -> m a -> m b ap = liftM2 ($) Note that liftM2 f x y is equivalent to return f `ap` x `ap` y.0*2*5. and so on for functions of more arguments.4] -.1*2*5].0.. "Smith. Imagine how you might implement this function without lifting the operator: Code available in example7.this program main :: IO () main = do names dirs mapM_ prints only the directories named on the command line <. It is useful when only the side-effects of the monadic computation matter. To see how the lifting operators allow more concise code. A lifted function is useful for operating on monad values outside of a do block and can also allow for cleaner code within a do block.4.hs getName :: String -> Maybe String getName name = do let db = [("John".5.5]] would be -[0*1*3.4. Here is a simple example that shows how ap can be useful when doing higher-order computations: Code available in example8. ("Mike".3.3.hs -. You could do: getName :: String -> Maybe String getName name = do let db = [("John".2. you might need to review the definition of the monad functions for the List monad (particularly >>=).0.0*2*3.2.5] and (Just (*2)) `ap` (Just 3) is Just 6.2].filterM doesDirectoryExist names putStrLn dirs zipWithM is a monadic version of the zipWith function on lists.1]. except that it performs the computation unless the boolean argument is True.2] is equal to [0.a.2. b' <. or [0.10] allCombinations :: (a -> a -> a) -> [[a]] -> [a] allCombinations fn [] = [] allCombinations fn (l:ls) = foldl (liftM2 fn) l ls There is a related function called ap that is sometimes more convenient to use than the lifting functions. We say that a function is "lifted into the monad" by the lifting operators. The effect of ap depends on the strategy of the monad in which it is used.hs .3.allCombinations returns a list containing the result of -. To understand this example code.(+3)] `ap` [0.[1.a.1].1*1*3. liftM2 lifts functions of two arguments: liftM2 :: (Monad m) => (a -> b -> c) -> (m a -> m b -> m c) liftM2 f = \a b -> do { a' <.folding the binary operator through all combinations -.1+1. return (f a' b') } The same pattern is applied to give the definitions to lift functions of more arguments. The lifting functions also enable very concise constructions using higher-order functions.b.. ("Mike".0. age::Int} deriving Show type DB = [Record] -. In real life. ("square". placing a guard function in a sequence of monadic operations will force any execution in which the guard is False to be mzero.hs type Variable = String type Value = String type EnvironmentStack = [[(Variable.compute a result.It uses msum in the Maybe monad to return the first non-Nothing value. for example. The first function is msum.Introduction . negate). msum is equivalent to concat.(`div`2)). ("incr".. When the filter criteria are more complex. Many other types in the Haskell libraries are declared as instances of Monad and MonadPlus in their respective modules. return r }) db Summary Haskell provides a number of functions which are useful for working with monads in the standard libraries. msum allows many recursive functions and folds to be expressed more concisely. ("halve".Value)]] -. we can write: Code available in example9.clearer to simply use filter.(\x->x*x)). msum returns the first non-Nothing value from a list. -. ("decr".getYoungerThan returns all records for people younger than a specified age. getYoungerThan :: Int -> DB -> [Record] getYoungerThan limit db = mapMaybe (\r -> do { guard (age r < limit). This is similar to the way that guard predicates in a list comprehension cause values that fail the predicate to become []. main :: IO () main = do let fns = [("double".(2*)). In the Maybe monad Monad class and most common monad functions are in the standard prelude.It uses the guard function to eliminate records for ages at or over the limit. ("negate".Monad support in Haskell -. In the Maybe monad. Prev: Exercises TOC: Contents Next: Part II .This is just for demonstration purposes. it would be -. Code available in example10.lookup the commands and fold ap into the command list to -. Here is an example demonstrating the use of the guard function in the Maybe monad.(+(-1))) ] args <. -. So. which is analogous to the sum function on lists of integers.hs data Record = Rec {name::String.guard becomes more useful.. The MonadPlus class and less commonly-used (but still very useful!) functions are defined in the Monad module.lookupVar retrieves a variable's value from the environment stack -.(+1)). the behavior in other monads will depend on the exact nature of their mzero and mplus definitions. Likewise. -. TOC: Contents Next: The Identity monad Prev: Monad support in Haskell . The Monad Template Library is included in the Glasgow Haskell Compiler's hierarchical libraries under Control. These monads are beyond the scope of this reference. Failure records information describing the failure. Computations which write data in addition Written data is maintained separately from values. Binding passes failure information on without executing the bound function. The bound function is applied to the input value to produce a state transition function which is applied to the input state. The bound function is applied to the to computing values input value and anything it writes is appended to the write data stream.Introduction Prev: Monad support in Haskell TOC: Contents Next: The Identity monad Introduction The monads covered in Part II include a mixture of standard Haskell types that are monads as well as monad classes from Andy Gill's Monad Template Library. but they are thoroughly documented on their own. Computations which can be interrupted and restarted The bound function is inserted into the continuation chain. or uses successful values as input to the bound function. Nothing input gives Nothing output Just x input uses x as input to the bound Identity N/A — Used with monad transformers Maybe Error [] (List) IO State Reader Writer Cont function.Part II . monads appear many other places in Haskell. The bound function is applied to the value of the input using the same environment. You can get a taste of the Parsec library by looking in the source code for example 16. Computations which perform I/O Computations which maintain state Computations which read from a shared environment Sequential execution of I/O actions in the order of binding. such as the Parsec monadic combinator parsing library. Monad Type of computation Computations which may not return a result Computations which can fail or throw exceptions Combination strategy for >>= The bound function is applied to the input value. In addition to the monads covered here. Non-deterministic computations which can Maps the bound function onto the input list and concatenates the resulting lists to get a return multiple possible results list of all possible results from all possible inputs.Monad Some of the documentation for these monads comes from the excellent Haskell Wiki. return = id -. Definition newtype Identity a = Identity { runIdentity :: a } instance Monad Identity where return a = Identity a (Identity x) >>= f = f x -. For a better example of this style of monad. see the State monad.e. Because the Identity monad does not do any computation. -.derive the State monad using the StateT monad transformer type State s a = StateT s Identity a Prev: Part II . It simply applies the bound function to its input without any modification.Introduction TOC: Contents Next: The Maybe monad The Identity monad Overview Motivation Definition Example Overview Computation type: Binding strategy: Useful for: Zero and plus: Example type: Simple function application The bound function is applied to the input value. a monadic computation is built up using the monadic operators and then the value of the computation is extracted using the run****** function. Computationally.i. In this style. Example A typical use of the Identity monad is to derive a monad from a monad transformer. Any monad transformer applied to the Identity monad yields a non-transformer version of that monad. x >>= f = f x The runIdentity label is used in the type definition because it follows a style of monad definition that explicitly represents monad values as computations. Identity x >>= f == Identity (f x) Monads can be derived from monad transformers applied to the Identity monad. None. its definition is trivial.i.The Identity monad Prev: Part II .Introduction TOC: Contents Next: The Maybe monad .e. there is no reason to use the Identity monad instead of the much simpler act of simply applying functions to their arguments. The purpose of the Identity monad is its fundamental role in the theory of monad transformers (covered in Part III). Identity a Motivation The Identity monad is a monad that does not embody any computational strategy. If you ever find yourself writing code like this: case .(lookup name nameDB) `mplus` (lookup name nickDB) lookup addr prefDB Prev: The Identity monad TOC: Contents Next: The Error monad . Nothing is the zero.. Code available in example11. other values are used as inputs to the bound function. The plus operation returns the first non-Nothing value or Nothing is both inputs are Nothing. getMailPrefs :: MailSystem -> String -> Maybe MailPref getMailPrefs sys name = do let nameDB = fullNameDB sys nickDB = nickNameDB sys prefDB = prefsDB sys addr <.The Maybe monad Prev: The Identity monad TOC: Contents Next: The Error monad The Maybe monad Overview Motivation Definition Example Overview Computation type: Computations which may return Nothing Binding strategy: Nothing values bypass the bound function. Useful for: Zero and plus: Example type: Building computations from sequences of functions that may return Nothing. Maybe a Motivation The Maybe monad embodies the strategy of combining a chain of computations that may each return Nothing by ending the chain early if any step produces Nothing as output. you should consider using the monadic properties of Maybe to improve the code... of Nothing -> Nothing Just x -> case . another that maps nicknames to email addresses. and in which some steps may fail to return a value. Definition data Maybe a = Nothing | Just a instance Monad Maybe return = fail = Nothing >>= f = (Just x) >>= f = where Just Nothing Nothing f x instance MonadPlus Maybe where mzero = Nothing Nothing `mplus` x = x x `mplus` _ = x Example A common example is in combining dictionary lookups. and a third that maps email addresses to email preferences.. It is useful when a computation entails a sequence of steps that depend on one another. you could create a function that finds a person's email preferences based on either a full name or a nickname..hs data MailPref = HTML | Plain data MailSystem = .. Given a dictionary that maps full names to email addresses. of Nothing -> Nothing Just y -> ... Complex database queries or dictionary lookups are good examples. A common idiom is: do { action1. action2.The Error monad Prev: The Maybe monad TOC: Contents Next: The List monad The Error monad Overview Motivation Definition Example Overview Computation type: Binding strategy: Useful for: Zero and plus: Example type: Computations which may fail or throw exceptions Failure records information about the cause/location of the failure. Building computations from sequences of functions that may fail or using exception handling to structure error handling. Note that handler and the do-block must have the same return type. other values are used as inputs to the bound function. Following convention. data ParseError = Err {location::Int.We make it an instance of the Error class instance Error ParseError where .This is the type of our parse error representation. Failure values bypass the bound function. We use a custom Error data type to record the location of the parse error. In these cases you will have to explicitly define instances of the Error and/or MonadError classes. which are language extensions not found in standard Haskell 98. In that case and many other common cases the resulting monad is already defined as an instance of the MonadError class. Definition The definition of the MonadError class below uses multi-parameter type classes and funDeps. You can also define your own error type and/or use a monad type constructor other than Either String or Either IOError.. reason::String} -. The exception is caught by a calling function and handled by printing an informative error message. The example attempts to parse hexadecimal numbers and throws an exception if an invalid character is encountered. Left is used for error values and Right is used for non-error (right) values. The MonadError class is parameterized over the type of error information and the monad type constructor. The definition of the Either e type constructor as an instance of the MonadError class is straightforward. action3 } `catchError` handler where the action functions can call throwError. instance MonadError (Either e) where throwError = Left (Left e) `catchError` handler = handler e a `catchError` _ = a Example Here is an example that demonstrates the use of a custom Error data type with the ErrorMonad's throwError and catchError exception mechanism. It is common to use Either String as the monad type constructor for an error monad in which error descriptions take the form of strings.hs -. catchError provides a handler function to handle previous errors and return to normal execution. Zero is represented by an empty error and the plus operation executes its second argument if the first fails. Either String a Motivation The Error monad (also called the Exception monad) embodies the strategy of combining computations that can throw exceptions by bypassing bound functions from the point an exception is thrown to the point that it is handled. You don't need to understand them to take advantage of the MonadError class. Code available in example12. toString converts an Integer into a String in the ParseMonad monad toString :: Integer -> ParseMonad String toString n = return $ show n -.number. A parse error on the input String will generate a -.The Error monad noMsg = Err 0 "Parse Error" strMsg s = Err 0 s -.successful result of type a using Right a. toString n} `catchError` printError in str where printError e = return $ "At index " ++ (show (location e)) ++ ":" ++ (reason e) Prev: The Maybe monad TOC: Contents Next: The List monad .an Integer in the ParseMonad monad and throws an error on an -.parseHex s.descriptive error message as the output String.convert takes a String containing a hexadecimal representation of -.will cause an exceptional return from parseHex. convert :: String -> String convert s = let (Right str) = do {n <. we use Either ParseError -.parseHex parses a string containing a hexadecimal number into -.which represents failure using Left ParseError or a -.a number to a String containing a decimal representation of that -.parseHexDigit attempts to convert a single hex digit into -.invalid character parseHexDigit :: Char -> Int -> ParseMonad Integer parseHexDigit c idx = if isHexDigit c then return (toInteger (digitToInt c)) else throwError (Err idx ("Invalid character '" ++ [c] ++ "'")) -.an Integer in the ParseMonad monad.For our monad type constructor. parseHex :: String -> ParseMonad Integer parseHex s = parseHex' s 0 1 where parseHex' [] val _ = return val parseHex' (c:cs) val idx = do d <. type ParseMonad = Either ParseError -. A parse error from parseHexDigit -.parseHexDigit c idx parseHex' cs ((val * 16) + d) (idx + 1) -. for example.the result is a list of possible parses parse :: Parsed -> Char -> [Parsed] parse p c = (parseHexDigit p c) `mplus` (parseDigit p c) `mplus` (parseWord p c) -. The bound function is applied to all possible values in the input list and the resulting lists are concatenated to produce a list of all possible results. decimal values and words containing only alpha-numeric characters. "dead" is both a valid hex value and a word. Building computations from sequences of non-deterministic operations. [a] Motivation The List monad embodies the strategy of combining a chain of non-deterministic computations by applying the operations to all possible values at each step. Definition instance Monad m >>= f = return x = fail s = [] where concatMap f m [x] [] instance MonadPlus [] where mzero = [] mplus = (++) Example The canonical example of using the List monad is for parsing ambiguous grammars. leading to an ambiguous grammar.attempts to add a character to the parsed representation of a word parseWord :: Parsed -> Char -> [Parsed] parseWord (Word s) c = if isAlpha c then return (Word (s ++ [c])) else mzero parseWord _ _ = mzero -.parse an entire String and return a list of the possible parsed values parseArg :: String -> [Parsed] parseArg s = do init <. and "10" is both a decimal value of 10 and a hex value of 16.hs -.we can parse three different types of terms data Parsed = Digit Integer | Hex Integer | Word String deriving Show -. In that case it allows all possibilities to be explored until the ambiguity is resolved. It is useful when computations must deal with ambiguity. [] is the zero and ++ is the plus operation.The List monad Prev: The Error monad TOC: Contents Next: The IO monad The List monad Overview Motivation Definition Example Overview Computation type: Binding strategy: Useful for: Zero and plus: Example type: Computations which may return 0.(return (Hex 0)) `mplus` (return (Digit 0)) `mplus` (return (Word "")) foldM parse init s . 1. a decimal value and a word -. or more possible results.attempts to add a character to the parsed representation of a decimal digit parseDigit :: Parsed -> Char -> [Parsed] parseDigit (Digit n) c = if isDigit c then return (Digit ((n*10) + (toInteger (digitToInt c)))) else mzero parseDigit _ _ = mzero -. Code available in example13. Parsing ambiguous grammars is a common example.tries to parse the digit as a hex value.attempts to add a character to the parsed representation of a hex digit parseHexDigit :: Parsed -> Char -> [Parsed] parseHexDigit (Hex n) c = if isHexDigit c then return (Hex ((n*16) + (toInteger (digitToInt c)))) else mzero parseHexDigit _ _ = mzero -. The example below shows just a small example of parsing data into hex values. Note that hexadecimal digits overlap both decimal digits and alphanumeric characters. .. The standard prelude and the IO module define many functions that can be used within the IO monad and any Haskell programmer will undoubtedly be familiar with some of them. resulting in the final I/O action that is the main value of the program. instance Error IOError where .... catch :: IO a -> (IOError -> IO a) -> IO a catch = .Monad.function from a -> IO a . ioError :: IOError -> IO a ioError = .. the top-level main function must have type IO (). The functions exported from the IO module do not perform I/O themselves. -.. However. fail is defined to throw an error built from the string argument.. Left) The IO monad is incorporated into the Monad Template Library framework as an instance of the MonadError class. so that programs are typically structured at the top level as an imperative-style sequence of I/O actions and calls to functional-style code. In Haskell. we have referred to monadic values as computations. instance MonadError IO where throwError = ioError catchError = catch . Throughout this tutorial.. This makes the IO monad a one-way monad and is essential to ensuring safety of functional programs by isolating side-effects and non-referentially transparent actions within the imperative-style computations of the IO monad. Within the IO monad you can use the exception mechanisms from the Control.. The IO type constructor is a member of the Monad class and the MonadError class. Definition The definition of the IO monad is platform-specific.... No data constructors are exported and no functions are provided to remove data from the IO monad.f return (Right r)) (return . which describe an I/O operation to be performed. This tutorial will only discuss the monadic aspects of the IO monad.. instance Monad return a = m >>= k = fail s = IO where . try :: IO a -> IO (Either IOError a) try f = catch (do r <. -. values in the IO monad are often called I/O actions and we will use that terminology here. The same mechanisms have alternative names exported by the IO module: ioError and catch. The I/O actions are combined within the IO monad (in a purely functional manner) to create more complex I/O actions.Error module in the Monad Template Library if you import the module.The IO monad Prev: The List monad TOC: Contents Next: The State monad The IO monad Overview Motivation Definition Example Overview Computation type: Computations which perform I/O Binding strategy: Useful for: Zero and plus: Example type: I/O actions are executed in the order in which they are bound.executes the I/O action m and binds the value to k's input ioError (userError s) data IOError = . None. Failures throw I/O errors which can be caught and handled. where errors are of the type IOError. The IO monad solves this problem by confining computations that perform I/O within the IO monad. IO a Motivation Input/Output is incompatible with a pure functional language because it is not referentially transparent and side-effect free. They return I/O actions. userError :: String -> IOError userError = . not the full range of functions available to perform I/O. Performing I/O within a Haskell program. set2] <.The IO monad The IO module exports a convenience function IOError if an I/O error was caught." -.Error -.hs import import import import Monad System IO Control -.getArgs contents <.translates stdin to stdout based on commandline arguments main :: IO () main = (do [set1.hGetContents stdin putStr $ translateString set1 set2 contents) `catchError` usage Prev: The List monad TOC: Contents Next: The State monad .Monad. Code available in example14. called try that executes an I/O action and returns Right result if the action succeeded or Left. 100) g (b. State st a Motivation A pure functional language cannot update values in place because it violates referential transparency. newtype State s a = State { runState :: (s -> (a. Building computations from sequences of operations that require a shared state. simultaneously making the code easier to write. easier to read and easier to modify. It is not necessary to fully understand these details to make use of the State monad. StdGen) makeRandomValue g = let (n. Example A simple application of the State monad is to thread the random generator state through multiple calls to the generation function. but such code can be error-prone. None. The type constructor State s is an instance of the Monad class. There are many additional functions provide which perform more complex computations built on top of get and put. The put function sets the state of the monad and does not yield a value. messy and difficult to maintain. class MonadState m s | m -> s where get :: m s put :: s -> m () instance MonadState (State s) s where get = State $ \s -> (s.g1) = randomR (1. Definition The definition shown here uses multi-parameter type classes and funDeps.n) g3 in (MT n b c m. g4) This approach works. The State monad hides the threading of the state parameter inside the binding operation. Binding threads a state parameter through the sequence of bound functions so that the same state value is never used twice. The binding operator creates a state transition function that applies its right-hand argument to the value and new state from its left-hand argument.s)) } instance Monad (State s) where return a = State $ \s -> (a. The others are listed in the documentation for the State monad library.s) put s = State $ \_ -> (().g4) = randomR (-n. A common idiom to simulate such stateful computations is to "thread" a state parameter through a sequence of functions: data MyType = MT Int Bool Char Int deriving Show makeRandomValue :: StdGen -> (MyType. giving the illusion of in-place update. The get function retrieves the state by copying it as the value.s') = x s in runState (f v) s' Values in the State monad are represented as transition functions from an initial state to a (value.g3) = randomR ('a'. which are not standard Haskell 98.newState) pair and a new type definition is provided to describe this construct: State s a is the type of a value of type a inside the State monad with state of type s. The return function simply creates a state transition function which sets the value but leaves the state unchanged.'z') g2 (m. . The most useful one is gets which retrieves a function of the state.g2) = random g1 (c.s) (State x) >>= f = State $ \s -> let (v.The State monad Prev: The IO monad TOC: Contents Next: The Reader monad The State monad Overview Motivation Definition Example Overview Computation type: Binding strategy: Useful for: Zero and plus: Example type: Computations which maintain state.s) The MonadState class provides a standard but very simple interface for State monads. but it bounds the random value returned getOne :: (Random a) => (a.get (x. StdGen) makeRandomValueST = runState (do n <.Using the State monad. we can build random complex types without manually threading the random generator states through the code.hs data MyType = MT Int Bool Char Int deriving Show {.return $ randomR bounds g put g' return x {.g') <.getOne (-n.getOne ('a'. we can define a function that returns a random value and updates the random generator state at the same time.getAny c <. -} makeRandomValueST :: StdGen -> (MyType.g') <.get (x.a) -> State StdGen a getOne bounds = do g <.Using the State monad with StdGen as the state.'z') m <. -} getAny :: (Random a) => State StdGen a getAny = do g <.similar to getAny.getOne (1.The State monad Code available in example15.n) return (MT n b c m)) Prev: The IO monad TOC: Contents Next: The Reader monad .100) b <.return $ random g put g' return x -. None. The Reader monad is specifically designed for these types of computations and is often a clearer and easier mechanism than using the State monad. we can maintain an environment of all known templates and all known variable bindings. we can use the local function to resolve the template in a modified environment that contains the additional variable bindings. you simply apply (runReader reader) to an environment value. Example Consider the problem of instantiating templates which contain variable substitutions and included templates.Value)] a Motivation Some programming problems require computations within a shared environment (such as a set of variable bindings). Then. The return function creates a Reader that ignores the environment and produces the given value. The bound function is applied to the bound value. which are not standard Haskell 98. Maintaining variable bindings. Reader [(String. Monad values are functions from the environment to a value. or other shared environment.hs . Code available in example16. The asks function is a convenience function that retrieves a function of the current environment. The ask function retrieves the environment and the local function executes a computation in a modified environment. The binding operator produces a Reader that uses the environment to extract the value its left-hand side and then applies the bound function to that value in the same environment. when a variable substitution is encountered. and is typically used with a selector or lookup function. sel The MonadReader class provides a number of convenience functions that are very useful when working with a Reader monad. we can use the asks function to lookup the value of the variable. Definition The definition shown here uses multi-parameter type classes and funDeps. but they do not require the full generality of the State monad. These computations typically read values from the environment and sometimes execute sub-computations in a modified environment (with new or shadowing bindings. . To extract the final value from a computation in the Reader monad. for example). newtype Reader e a = Reader { runReader :: (e -> a) } instance Monad (Reader e) where return a = Reader $ \e -> a (Reader r) >>= f = Reader $ \e -> f (r e) e Values in the Reader monad are functions from an environment to a value. When a template is included with new variable definitions. and both have access to the shared environment. Using the Reader monad.The Reader monad Prev: The State monad TOC: Contents Next: The Writer monad The Reader monad Overview Motivation Definition Example Overview Computation type: Binding strategy: Useful for: Zero and plus: Example type: Computations which read values from a shared environment. It is not necessary to fully understand these details to make use of the Reader monad. This the abstract syntax representation of a template -Text Variable Quote Include Compound data Template = T String | V Template | Q Template | I Template [Definition] | C [Template] data Definition = D Template Template -. Prev: The State monad TOC: Contents Next: The Writer monad .String)]} -.value) pair resolveDef :: Definition -> Reader Environment (String.an association list of named variable values.String) resolveDef (D t d) = do name <.mapM resolveDef ds local (addDefs defs) (resolve t') Nothing -> return "" resolve (C ts) = (liftM concat) (mapM resolve ts) To use the Reader monad to resolve a template t into a String. variables::[(String.Our environment consists of an association list of named templates and -.asks (lookupTemplate tmplName) return $ maybe "" show body resolve (I t ds) = do tmplName <.asks (lookupVar varName) return $ maybe "" id varValue resolve (Q t) = do tmplName <.The Reader monad -.value) -.resolve t body <.resolve d return (name.resolve t body <.resolve a Definition and produce a (name.resolve resolve :: resolve (T resolve (V a template into a string Template -> Reader Environment (String) s) = return s t) = do varName <.resolve t varValue <. data Environment = Env {templates::[(String.Template)]. you simply need to do runReader (resolve t) env.String)] -> Environment -> Environment addDefs defs env = env {variables = defs ++ (variables env)} -.asks (lookupTemplate tmplName) case body of Just t' -> do defs <.lookup a variable from the environment lookupVar :: String -> Environment -> Maybe String lookupVar name env = lookup name (variables env) -.resolve t value <.add a list of resolved definitions to the environment addDefs :: [(String.lookup a template from the environment lookupTemplate :: String -> Environment -> Maybe Template lookupTemplate name env = lookup name (templates env) -. Monoid) to provide a standard convention for working with monoids: the identity element is named mempty and the operator is named mappend. Binding executes the bound function using the current value as input.w') = runWriter $ f a in Writer (a'. newtype Writer w a = Writer { runWriter :: (a.w). and appends any log output to the existing log. and an associative binary operator over the set of objects. a monoid consists of a type. Care should be taken when using a list as the monoid for a Writer.w) listens f m = do (a.w) <. a single identity element.f). Haskell defines the Monoid class (in Data. you need to know about Haskell's Monoid class. and also the natural numbers with identity element 1 and binary operator for multiplication.m. and a binary operator.w) w -> m () instance (Monoid w) => MonadWriter (Writer w) where pass (Writer ((a.f w) . To fully understand this definition.log) pair.w) } instance (Monoid w) => Monad (Writer w) where return a = Writer (a. as there may be a performance penalty associated with the mappend operation as the output grows.w)) = Writer (a. but functions of type (a -> a) also form a monoid. Logging and tracing are the most common examples in which data is generated during a computation that we want to retain but is not the primary result of the computation. such that applying the operator to any values from the set gives another value in the set. You may notice that these laws are the same as the laws governing mzero and mplus for instances of MonadPlus.w) tell s = Writer (().f w) listen (Writer (a. Binding replaces the computation value with the result of applying the bound function to the previous value and appends any log data from the computation to the existing log data. In that case. Monad m) => MonadWriter w m | m -> w where m (a.The Writer monad Prev: The Reader monad TOC: Contents Next: The Continuation monad The Writer monad Overview Motivation Definition Example Overview Computation type: Binding strategy: Useful for: Zero and plus: Example type: Computations which produce a stream of data in addition to the computed values. where the log type must be a monoid. Definition The definition shown here uses multi-parameter type classes and funDeps.w -> w) -> m a m a -> m (a.w)) = Writer ((a. Writer [String] a Motivation It is often desirable for a computation to generate output "on the side". which represents a mathematical structure called a monoid in the same way that the Monad class represents the monad structure.s) listens :: (MonadWriter w m) => (w -> w) -> m a -> m (a. A monoid is a set of objects. It is not necessary to fully understand these details to make use of the Writer monad. Explicitly managing the logging or tracing data can clutter up the code and invite subtle bugs such as missed log entries. an identity element. and whenever one operand of the operator is the identity element the result is equal to the other operand. A monoid must obey some mathematical laws. The most commonly used standard monoid in Haskell is the list. which are not standard Haskell 98. That is because monads with a zero and plus are monads that are also monoids! Some examples of mathematical monoids are the natural numbers with identity element 0 and binary operator for addition. None. A Writer monad value is a (computation value. or other computations that produce output "on the side". a data structure that supports fast append operations would be a more appropriate choice. Logging. The return function simply returns the value along with an empty log. In Haskell. return (a.w)) >>= f = let (a'. class (Monoid pass :: listen :: tell :: w. The Writer monad provides a cleaner way to manage the output without cluttering the main computation. The good news is that monoids are simpler than monads. log value) pair.w `mappend` w') The Writer monad maintains a (value.mempty) (Writer (a. merge initial output rest <.It maps a function over a list of values to get a list of Writers. Code available in example17.m. but we can use a "delayed logging" trick to only add a log entry only after we get a new entry that doesn't match the ones before it. groupSame :: (Monoid a) => a -> (a -> a -> Writer a a) -> [b] -> (b -> Writer a c) -> Writer a [c] groupSame initial merge [] _ = do tell initial return [] groupSame initial merge (x:xs) fn = do (result. This allows the computation to "listen" to the log output generated by a Writer.this filters a list of packets. but what if we want to merge duplicate consecutive log entries? None of the existing functions allow us to modify the output from previous stages of the computation. -.merge identical entries at the end of the log -.this is the format of our log entries data Entry = Log {count::Int.This function uses [Entry] as both the log type and the result type.groupSame [] mergeEntries packets (filterOne rules) tell [Log 1 "STOPPING PACKET FILTER"] return (catMaybes out) Prev: The Reader monad TOC: Contents Next: The Continuation monad .is a writer whose value is a list of all the values from the writers and whose -. -.w) and still produces output w.with an incremented count.then runs each writer and combines the results.The Writer monad censor :: (MonadWriter w m) => (w -> w) -> m a -> m a censor f m = pass $ do a <.the activity in which consecutive messages are merged filterAll :: [Rule] -> [Packet] -> Writer [Entry] [Packet] filterAll rules packets = do tell [Log 1 "STARTING PACKET FILTER"] out <.log entries (using 'initial' as the initial log value). The censor function takes a function and a Writer and produces a new Writer whose output is the same but whose log entry has been modified by the function. When two different messages are merged.add a message to the log logMsg :: String -> Writer [Entry] () logMsg s = tell [Log 1 s] -. so the helper function censor is normally used. the result is just the message -.the first message is logged and the second is returned as the result.this handles one packet filterOne :: [Rule] -> Packet -> Writer [Entry] (Maybe Packet) filterOne rules packet = do rule <. It converts a Writer that produces a value (a. -.return (runWriter (fn x)) new <. The firewall's primary job is packet filtering. The simplest and most useful is tell.This is a complex-looking function but it is actually pretty simple. This is somewhat cumbersome. which adds one or more entries to the log.f) and output w into a Writer that produces a value a and output f w. Example In this example. Code available in example17.When two identical messages are merged. The pass function is slightly more complicated.hs -. we imagine a very simple firewall that filters packets based on a rulebase of rules matching the source and destination hosts and the payload of the packet.log output is the result of folding the merge operator into the individual -. The listens function operates just like listen except that the log part of the value is modified by the supplied function.hs -.f) The MonadWriter class provides a number of convenience functions for working with Writer monads. The result of the function -. The listen function turns a Writer that returns a value a and produces output w into a Writer that produces a value (a.] -.output) <.groupSame new merge xs fn return (result:rest) -. but we would also like it to produce a log of its activity. -. producing a filtered packet list and a log of -.return (match rules packet) case rule of Nothing -> do logMsg ("DROPPING UNMATCHED PACKET: " ++ (show packet)) return Nothing (Just r) -> do when (logIt r) (logMsg ("MATCH: " ++ (show r) ++ " <=> " ++ (show packet))) case r of (Rule Accept _ _) -> return (Just packet) (Rule Reject _ _) -> return Nothing That was pretty simple. msg::String} deriving Eq -. return (a. i. Example This example gives a taste of how escape continuations work. manipulation of the continuation functions can achieve complex manipulations of the future of the computation. The >>= operator adds the bound function into the continuation chain. Before using the Continuation monad. callCC calls a function with the current continuation as its argument (hence the name). the Continuation monad can be used to implement other. error handling and creating co-routines. Cont r a Motivation Abuse of the Continuation monad can produce code that is impossible to understand and maintain. c >>= f = \k -> c (\a -> f a k) The Continuation monad represents computations in continuation-passing style. Complex control structures. . The example function uses escape continuations to perform a complicated transformation on an integer. restarting a computation and interleaving execution of computations. however — and abuse of them can easily create fiendishly obfuscated code — so they will not be covered here.Introduction The Continuation monad Overview Motivation Definition Example Overview Computation type: Binding strategy: Useful for: Zero and plus: Example type: Computations which can be interrupted and resumed. Then calling the named continuation anywhere within its scope will escape from the computation. The standard idiom used with callCC is to provide a lambda-expression to name the continuation. class (Monad m) => MonadCont m where callCC :: ((a -> m b) -> m a) -> m a instance MonadCont (Cont r) where callCC f = Cont $ \k -> runCont (f (\a -> Cont $ \_ -> k a)) k The MonadCont class provides the callCC function. In addition to the escape mechanism provided by callCC. Binding a function to a monadic value creates a new continuation which uses the function as the continuation of the monadic computation. They achieve a similar effect to throwError and catchError within an Error monad. Since continuations are functions which represent the future of a computation. return a = \k -> k a (Cont c) >>= f = Cont $ \k -> c (\a -> runCont (f a) k) -. Continuations represent the future of a computation. The return function simply creates a continuation which passes the value on. as a function from an intermediate result to the final result. which provides an escape continuation mechanism for use with Continuation monads.r is the final result type of the whole computation instance Monad (Cont r) where return a = Cont $ \k -> k a -.The Continuation monad Prev: The Writer monad TOC: Contents Next: Part III . be sure that you have a firm understanding of continuation-passing style (CPS) and that continuations represent the best solution to your particular design problem. The Continuation monad adapts CPS to the structure of a monad. Many algorithms which require continuations in other languages do not require them in Haskell.e. more powerful continuation manipulations. Cont r a is a CPS computation that produces an intermediate result of type a within a CPS computation whose final result type is r. such as interrupting a computation in the middle. Definition newtype Cont r a = Cont { runCont :: ((a -> r) -> r) } -. due to Haskell's lazy semantics. terminated by a final continuation (often id) which produces the final result. Escape continuations allow you to abort the current computation and return a value immediately. computations are built up from sequences of nested continuations. In continuation-passing style. aborting a portion of a computation.e. even if it is many layers deep within nested computations. These other mechanisms have fairly specialized uses.i. None. callCC $ \exit1 -> do -.The Continuation monad Code available in example18.define "exit1" when (n < 10) (exit1 (show n)) let ns = map digitToInt (show (n `div` 2)) n' <.Introduction . This function implements a complicated control structure to process numbers: Input (n) ========= 0-9 10-199 200-19999 20000-1999999 >= 2000000 Output ====== n number of digits in (n/2) n (n/2) backwards sum of digits of (n/2) List Shown ========== none digits of (n/2) digits of (n/2) none digits of (n/2) -} fun :: Int -> String fun n = (`runCont` id) $ do str <.We use the continuation monad to perform "escapes" from code blocks Prev: The Writer monad TOC: Contents Next: Part III .hs {. Part III . the computations can't be performed in isolation. we would prefer to develop a way to combine the standard monads to produce the needed hybrids. it is possible to perform the monad computations separately. such as stateful. because in the real world you often want computations which combine aspects of more than one monad at the same time. Prev: The Continuation monad TOC: Contents Next: Combining monads the hard way . non-determistic computations or computations which make use of continuations and perform I/O. The technique that lets us do exactly that is called monad transformers. In this case. When one computation is a strict subset of the other. what is needed is a monad that combines the features of the two monads into a single computation. however. It is inefficient and poor practice to write a new monad instance with the required characteristics each time a new combination is desired. unless the sub-computation is performed in a one-way monad. Instead. Often.Introduction Prev: The Continuation monad TOC: Contents Next: Combining monads the hard way Introduction Part I has introduced the monad concept and Part II has provided an understanding of a number of common. and they are explained by revisiting earlier examples to see how monad transformers can be used to add more realistic capabilities to them. Monad transformers are the topic of Part III. It may be helpful to review the earlier examples as they are re-examined. useful monads in the standard Haskell libraries. This is not enough to put monads into heavy practice. they can be arbitrarily complex. we make the computation in the Continuation monad use values from the IO monad. We use a helper function toIO to make it clearer when we are creating values in the IO monad nested within the Continuation monad. so you may want to review it before continuing.this is an IO monad block return $ (`runCont` id) $ do -. all computations occur in the IO monad at the top level. The code introduced in example 18 followed the nesting pattern: reading a number from the command line in the IO monad.str has type IO String when (n < 10) (exit1 $ toIO (show n)) let ns = map digitToInt (show (n `div` 2)) n' <. Likewise. To do this. Nested Monads Some computations have a simple enough structure that the monadic computations can be nested. In this case. As long as the inner computation does not depend on the functionality of the outer monad.(readLn::IO Int) convert n -. This is a useful excercise to develop insights into the issues that arise when combining monads and provides a baseline from which the advantages of the transformer approach can be measured. and finally perform their output at the end. we will allow the user to specify part of the output value when the input value is within a certain range. Consider a slight modification to our example in which we perform the same I/O at the beginning. For example. we will see how monads can be combined without using transformers. This structure avoids the issues of combining monads but makes the examples seem contrived at times. Code available in example20.n' has type IO Int when ((length ns) < 3) (exit2 (toIO (length ns))) when ((length ns) < 5) (exit2 $ do putStrLn "Enter a number:" x <. Instead. passing that number to a computation in the Continuation monad to produce a string. we need a way to combine the attributes of two or more monads in a single computation. and then writing the string back in the IO monad.this is an IO monad block convert :: Int -> IO String convert n = (`runCont` id) $ do -. it can be safely nested within the outer monad. as illustrated in this variation on example 18 which reads the value from stdin instead of using a command line argument: Code available in example19.callCC $ \exit2 -> do -. the inner computation can be arbitrarily complex as well. We could use a monad of type State (Either Err a) a to combine the features of the State and Error monads in a single. so the monad examples we have seen so far all actually use the technique of nested monadic computations.callCC $ \exit1 -> do -. we might perform computations in the Continuation monad of type Cont (IO String) a if we need to perform I/O within the computation in the Continuation monad.hs toIO :: a -> IO a toIO x = return x fun :: IO String fun = do n <. We can't extract values from the IO monad — it's a one-way monad — so we may need to nest little do-blocks of the IO monad within the Continuation monad to manipulate the values.(readLn::IO Int) . This is accomplished by doing computations within a monad in which the values are themselves monadic values in another monad. The computations in the IO monad aren't restricted to reading from the command line and writing strings. the computations perform all of their input at the beginning — usually by reading arguments from the command line — then pass the values on to the monadic computations to produce results.this is a Cont monad block str <. we cannot use the nested monad pattern. What used to be Int and String values are now of type IO Int and IO String.hs fun :: IO String fun = do n <. Because the I/O depends on part of the computation in the Continuation monad and part of the computation in the Continuation monad depends on the result of the I/O.(readLn::IO Int) -. In Haskell. but we may require additional input in the middle of the computation in the Continuation monad.callCC $ \exit1 -> do when (n < 10) (exit1 (show n)) let ns = map digitToInt (show (n `div` 2)) n' <. avoiding the need for a combined monad altogether.this is a Cont monad block str <. We use the code from example 18 (the Continuation monad) to illustrate these issues.Introduction TOC: Contents Next: Monad transformers Combining monads the hard way Nested Monads Combined Monads Before we investigate the use of monad transformers.Combining monads the hard way Prev: Part III . (readLn::IO Int) let ns = map digitToInt (show (n `div` 2)) return $ (`runCont` id) $ do n' <. Comparing the code side-by-side shows the degree to which the manual monad combination strategy pollutes the code.Introduction TOC: Contents Next: Monad transformers .callCC $ \exit2 -> do str <.n' return $ "Answer: " ++ str return $ "(ns = " ++ (show ns) ++ ") " ++ (show num) return $ do s <.callCC $ \exit1 -> do when (n < 10) (exit1 $ toIO (show n)) fun = do n <.callCC $ \exit1 -> do when ((length ns) < 3) (exit2 (toIO (length ns))) when (n < 10) (exit1 (show n)) when ((length ns) < 5) (exit2 $ do let ns = map digitToInt (show (n `div` 2)) putStrLn "Enter a number:" n' <. It works. but it isn't pretty.Combining monads the hard way return x) when ((length ns) < 7) $ do let ns' = map intToDigit (reverse ns) exit1 $ toIO (dropWhile (=='0') ns') return (toIO (sum ns)) return $ do num <.this is an IO monad block return $ "(ns = " ++ (show ns) ++ ") " ++ (show num) return $ do s <.callCC $ \exit2 -> do x <.str -.str return $ "Answer: " ++ s Prev: Part III .n' -. Nested monads from example 19 Manually combined monads from example 20 convert n = (`runCont` id) $ do str <.(readLn::IO Int) when ((length ns) < 3) (exit2 (length ns)) return x) when ((length ns) < 5) (exit2 n) when ((length ns) < 7) $ do when ((length ns) < 7) $ do let ns' = map intToDigit (reverse ns) let ns' = map intToDigit (reverse ns) exit1 $ toIO (dropWhile (=='0') ns') exit1 (dropWhile (=='0') ns') return $ sum ns return (toIO (sum ns)) return $ "(ns = " ++ (show ns) ++ ") " ++ (show n') return $ do num <.this is an IO monad block return $ "Answer: " ++ s Even this trivial example has gotten confusing and ugly when we tried to combine different monads in the same <. Each monad transformer provides a lift function that is used to lift a monadic computation into a combined monad. ReaderT r IO is a combined Reader+IO monad. the transformer version of Cont. To see this in action. exists which adds a monad type constructor as an addition parameter. with the original version to see how unobtrusive the changes become when using the monad transformer.hs fun :: IO String fun = (`runContT` return) $ do n <. we can produce combined monads very simply. Code available in example21. We can also generate the non-transformer version of a monad from the transformer version by applying it to the Identity monad.define "exit2" when ((length ns) < 3) (exit2 (length ns)) when ((length ns) < 5) $ do liftIO $ putStrLn "Enter a number:" x <. Nested monads from example 19 fun = do n <. Recall the liftM family of functions which are used to lift non-monadic functions into a monad.callCC $ \exit1 -> do when (n < 10) (exit1 (show n)) let ns = map digitToInt (show (n `div` 2)) n' <. we avoid having to explicitly manage the inner monad types. Transformer type constructors Type constructors play a fundamental role in Haskell's monad support. So ReaderT r Identity is the same monad as Reader r. Make sure that you have supplied the correct number of parameters to the type constructors and that you have not left out any parenthesis in complex type expressions. we can use lifting operations to bring functions from the inner monad into the combined monad. Contrast this with the changes required to achieve the same result using a manually combined monad.(readLn::IO Int) return $ (`runCont` id) $ do str <.callCC $ \exit2 -> do when ((length ns) < 3) (exit2 (length ns)) when ((length ns) < 5) $ do liftIO $ putStrLn "Enter a number:" x <. Instead of creating additional do-blocks within the computation to manipulate values in the inner monad type.define "exit1" when (n < 10) (exit1 (show n)) let ns = map digitToInt (show (n `div` 2)) n' <.callCC $ \exit1 -> do when (n < 10) (exit1 (show n)) let ns = map digitToInt (show (n `div` 2)) n' <. we will continue to develop our previous example in the Continuation monad.callCC $ \exit1 -> do -. and the runReaderT::(r -> m a) function performs a computation in the combined monad and returns a result of type m a. A transformer version of the Reader monad. ReaderT r m is an instance of the monad class. The type constructor Reader r is an instance of the Monad class.liftIO (readLn::IO Int) str <. resulting in clearer.callCC $ \exit2 -> do -. and the runReader::(r->a) function performs a computation in the Reader monad and returns the result of type a.Monad transformers Prev: Combining monads the hard way TOC: Contents Next: Standard monad transformers Monad transformers Transformer type constructors Lifting Monad transformers are special variants of standard monads that facilitate the combining of monads. which is a version of lift that is optimized for lifting computations in the IO monad. Their type constructors are parameterized over a monad type constructor. it means that you are not using the type cosntructors properly. Using the transformer versions of the monads. Recall that Reader r a is the type of values of type a within a Reader monad with environment of type r. Many transformers also provide a liftIO function. called ReaderT. Lifting When using combined monads created by the monad transformers. and they produce combined monadic types. simpler code. If your code produces kind errors during compilation.liftIO (readLn::IO Int) str <. ReaderT r m a is the type of values of the combined monad in which Reader is the base monad and m is the inner monad. . s) r -> a (a. class MonadTrans t where lift :: (Monad m) => m a -> t m a Monads which provide optimized support for lifting IO operations are defined as members of the MonadIO class. Prev: Standard monad transformers TOC: Contents Next: Anatomy of a monad transformer . However. It turns state transformer functions of the form s->(a. StateT s (Error e) is different than ErrorT e (State s). The MonadTrans and MonadIO classes The MonadTrans class is defined in Control. which defines the liftIO function.Standard monad transformers Prev: Monad transformers TOC: Contents Next: Anatomy of a monad transformer Standard monad transformers The MonadTrans and MonadIO classes Transformer versions of standard monads Haskell's base libraries provide support for monad transformers in the form of classes which represent monad transformers and special transformer versions of standard monads. class (Monad m) => MonadIO m where liftIO :: IO a -> m a Transformer versions of standard monads The standard monads of the monad template library all have transformer versions which are defined consistently with their non-transformer versions.s).s).Trans and provides the single function lift.s) into state transformer functions of the form s->m (a. The second combination produces a combined type of s -> (Error e a. Standard Monad Transformer Version Original Type Error State Reader Writer Cont ErrorT StateT ReaderT WriterT ContT Either e a s -> (a. We have seen that the ContT transformer turns continuations of the form (a->r)->r into continuations of the form (a->m r)->m r.Monad. in which the computation always returns a new state. it is not the case the all monad transformers apply the same transformation. there is no magic formula to create a transformer version of a monad — the form of each transformer depends on what makes sense in the context of its non-transformer type.w) (a -> r) -> r (a -> m r) -> m r Order is important when combining monads.s) r -> m a m (a. In general.s).w) Combined Type m (Either e a) s -> m (a. and the value can be an error or a normal value. The StateT transformer is different. in which the computation can either return a new state or generate an error. The first produces a combined type of s -> Error e (a. The lift function lifts a monadic computation in the inner monad into the combined monad. The result is that a function that returns a list (i. Certain transformers can be grouped according to how they use the inner monad. Combined monad definition Just as the State monad was built upon the definition newtype State s a = State { runState :: (s -> (a.s) put s = StateT $ \_ -> return ((). StateT.Anatomy of a monad transformer Prev: Standard monad transformers TOC: Contents Next: More examples with monad transformers Anatomy of a monad transformer Combined monad definition Defining the lifting function Functors In this section. We also want to declare all combined monads that use the StateT transformer to be instaces of the MonadState class. check out Mark Jones' influential paper that inspired the Haskell monad template library. Despite this. Prev: Standard monad transformers TOC: Contents Next: More examples with monad transformers . the lifted computation produces multiple (value.s)]). Of course.s) (StateT x) >>= f = StateT $ \s -> do (v. Furthermore. and the transformers within each group can be derived using monadic functions and functors. StateT s m should also be a member of MonadPlus. The effect of this is to "fork" the computation in StateT. so we will have to give definitions for get and put: instance (Monad m) => MonadState s (StateT s m) where get = StateT $ \s -> return (s. we will take a detailed look at the implementation of one of the more interesting transformers in the standard library. That is.s) Finally. Functors.s)) } State s is an instance of both the Monad class and the MonadState s class.)) } instance (Monad m) => Monad (StateT s m) where return a = StateT $ \s -> return (a.s)) The lift function creates a StateT state transformation function that binds the computation in the inner monad to a function that packages the result with the input state. where it becomes a function that returns a StateT (s -> [(a. You might want to review the section on the State monad before continuing. creating a different branch of the computation for each value in the list returned by the lifted function. Our definition of return makes use of the return function of the inner monad. Studying this transformer will build insight into the transformer mechanism that you can call upon when using monad transformers in your code.apply bound function to get new state transformation fn -. roughly.. Functors We have examined the implementation of one monad transformer above.s)) } the StateT transformer is built upon the definition newtype StateT s m a = StateT { runStateT :: (s -> m (a.apply the state transformation fn to the new state Compare this to the definition for State s. a computation in the List monad) can be lifted into StateT s [].s') <.state) pairs from its input state.e. state -. if m is an instance of MonadPlus. are types which support a mapping operation fmap :: (a->b) -> f a -> f b.x s (StateT x') <. and the binding operator uses a do-block to perform a computation in the inner monad. applying StateT to a different monad will produce different semantics for the lift function. and To define StateT s m as a Monad instance: newtype StateT s m a = StateT { runStateT :: (s -> m (a. so StateT s m should also be members of the Monad MonadState s classes. Each transformer's implementation will depend on the nature of the computational effects it is adding to the inner monad. and it was stated earlier that there was no magic formula to produce transformer versions of monads. To learn more about it. there is some theoretical foundation to the theory of monad transformers.get new value.return $ f v x' s' -. and the packet data from -. The idea behind it is to have a number of variables that can take on different values and a number of predicates involving those variables that must be satisfied. producing a filtered packet list -.log) <.liftIO getClockTime tell [Log t s] -. move on to a slightly more complex example: convert the template system in example 16 from using a single template file with named templates to treating individual files as templates.More examples with monad transformers Prev: Anatomy of a monad transformer TOC: Contents Next: Managing the transformer stack More examples with monad transformers WriterT with IO ReaderT with IO StateT with List At this point.this handles one packet filterOne :: [Rule] -> Packet -> LogWriter (Maybe Packet) filterOne rules packet = do rule <. One possible solution is shown in example 23. but try to do it without looking first. but first you should master the basic process of applying a single transformer to a base monad.mapM (filterOne rules) packets logMsg "STOPPING PACKET FILTER" return (catMaybes out) -. msg::String} deriving Eq instance Show Entry where show (Log t s) = (show t) ++ " | " ++ s -.and a log of the activity filterAll :: [Rule] -> [Packet] -> LogWriter [Packet] filterAll rules packets = do logMsg "STARTING PACKET FILTER" out <. As your monadic programs become more abitious.a log generated during the computation. This will be addressed in the next section.this is the combined monad type type LogWriter a = WriterT [Entry] IO a -.runWriterT (filterAll rules packets) putStrLn "ACCEPTED PACKETS" putStr (unlines (map show out)) putStrLn "\n\nFIREWALL LOG" putStr (unlines (map show log)) ReaderT with IO If you found that one too easy.getArgs ruleData <.the file named in the second argument.read the rule data from the file named in the first argument.add a message to the log logMsg :: String -> LogWriter () logMsg s = do t <. main :: IO () main = do args <. The best way to build proficiency is to work on actual code. StateT with List The previous examples have all been using the IO monad as the inner monad.this is the format of our log entries data Entry = Log {timestamp::ClockTime. The current variable assignments and the predicates make up the state of the computation. WriterT with IO Try adapting the firewall simulator of example 17 to include a timestamp on each log entry (don't worry about merging entries). you should know everything you need to begin using monads and monad transformers in your programs.readFile (args!!1) let rules = (read ruleData)::[Rule] packets = (read packetData)::[Packet] (out. and then print the accepted packets followed by -. and the non-deterministic nature of the List .hs -.return (match rules packet) case rule of Nothing -> do logMsg ("DROPPING UNMATCHED PACKET: " ++ (show packet)) return Nothing (Just r) -> do when (logIt r) (logMsg ("MATCH: " ++ (show r) ++ " <=> " ++ (show packet))) case r of (Rule Accept _ _) -> return (Just packet) (Rule Reject _ _) -> return Nothing -. We will apply this powerful monad combination to the task of solving constraint satisfaction problems (in this case. The necessary changes should look something like this: Code available in example22.readFile (args!!0) packetData <. Here is a more interesting example: combining StateT with the List monad to produce a monad for stateful nondeterministic computations. a logic problem).this filters a list of packets. you may find it awkward to mix additional transformers into your combined monads. exclusive or orElse :: Predicate -> Predicate -> Predicate orElse a b = (a `And` (Not b)) `Or` ((Not a) `And` b) -. isConsistent :: Bool -> NDS Bool isConsistent partial = do cs <.an initial problem state and then returning the first solution in the result list. Their females never make two consecutive true statements. A. -.Get a list of all possible solutions to the problem by evaluating the solver -. Setting this to True -. getFinalVars :: NDS Variables getFinalVars = do c <. Worf asks Kibi: ``Are you a .The partial argument determines the value used when a predicate returns -.allows us to accept partial solutions. check :: Predicate -> Variables -> Maybe Bool check (Is var value) vars = do val <.hs -.Nothing because some variable it uses is not set.First.Value)] -.hs -.fst) (vars st) put $ st {vars=(v. by J.Check if the variable assignments satisfy all of the predicates. -. For this example.isConsistent False guard c gets vars -.computation with an initial problem state. Show) language to express logic problems Var Value Var Var Predicate Predicate Predicate Predicate Predicate -----var has specific value vars have same (unspecified) value both are true at least one is true it is not true type Variables = [(Var. he meets a Kalotan (heterosexual) couple and their child Kibi.False at the end to signify that all solutions should be complete.get vs' <. by evaluating the solver computation with -.Check a predicate with the given variable bindings. Code available in example24.this is our monad type for non-determinstic computations with state type NDS a = StateT ProblemState [] a -. constraints::[Predicate]} -. getSolution :: NDS a -> ProblemState -> Maybe a getSolution c i = listToMaybe (evalStateT c i) -.if a is true. Hunter. H.Return only the variable bindings that are complete consistent solutions. This is where we will define our combined monad.gets vars return $ lookup v vs -. we will use the well-known Kalotan puzzle which appeared in Mathematical Brain-Teasers. An anthropologist (let's call him Worf) has begun to study them.An unbound variable causes a Nothing return value.set a variable setVar :: Var -> Value -> NDS () setVar v x = do st <.lookup var vars return (val == value) check (Equal v1 v2) vars = do val1 <.lookup v1 vars val2 <. then we can use a value of -. Dover Publications (1976). or two consecutive untrue statements.or Nothing if there was no solution.this is the type of our logic problem data ProblemState = PS {vars::Variables.Get the first solution to the problem. The Kalotans are a tribe with a peculiar quirk: their males always tell the truth. getAllSolutions :: NDS a -> ProblemState -> [a] getAllSolutions c i = evalStateT c i We are ready to apply the predicate language and stateful nondeterministic monad to solving a logic problem.More examples with monad transformers monad allows us to easily test all combinations of variable assignments. then b must also be true implies :: Predicate -> Predicate -> Predicate implies a b = Not (a `And` (Not b)) -. -. we develop a type Var = String type Value = String data Predicate = Is | Equal | And | Or | Not deriving (Eq. One day.gets vars let results = map (\p->check p vs) cs return $ and (map (maybe partial id) results) -. We start by laying the groundwork we will need to represent the logic problem. Worf does not yet know the Kalotan language.x):vs'} -.lookup a variable getVar :: Var -> NDS (Maybe Value) getVar v = do vs <. a simple predicate language: Code available in example24.test for a variable NOT equaling a value isNot :: Var -> Value -> Predicate isNot var value = Not (Is var value) -.gets constraints vs <.return $ filter ((v/=). if a male says two things. tryAllValues :: Var -> NDS () tryAllValues var = do (setVar var "male") `mplus` (setVar var "female") c <. Worf turns to the parents (who know English) for explanation.Define the problem.. one must be true and one must be false saidBoth :: Var -> Predicate -> Predicate -> Predicate saidBoth v p1 p2 = And ((v `Is` "male") `implies` (p1 `And` p2)) ((v `Is` "female") `implies` (p1 `orElse` p2)) -. it must be true said :: Var -> Predicate -> Predicate said v p = (v `Is` "male") `implies` p -. they must be true -. assigning the named variable to be "male" in one fork and "female" in the other. Kibi lied.if a male says something. and to define the universe of allowed variables values: Code available in example24. main :: IO () main = do let variables = [] constraints = [ Not (Equal "parent1" "parent2"). "parent1" `said` ("child" `said` ("child" `Is` "male")).lying is saying something is true when it isn't or saying something isn't true when it is lied :: Var -> Predicate -> Predicate lied v p = ((v `said` p) `And` (Not p)) `orElse` ((v `said` (Not p)) `And` p) -.if a female says two things.hs -. We will need some additional predicates specific to this puzzle. One of them says: "Kibi said: `I am a boy.isConsistent True guard c All that remains to be done is to define the puzzle in the predicate language and get a solution that satisfies all of the predicates: Code available in example24.Test consistency over all allowed settings of the variable.hs -. Prev: Anatomy of a monad transformer TOC: Contents Next: Managing the transformer stack ." Solve for the sex of Kibi and the sex of each parent. The forks which produce inconsistent variable assignments are eliminated (using the guard function). try all of the variable assignments and print a solution.'" The other adds: "Kibi is a girl. which of course Worf doesn't understand. The call to getFinalVars applies guard again to eliminate inconsistent variable assignments and returns the remaining assignments as the value of the computation.More examples with monad transformers boy?'' The kid answers in Kalotan. but should you apply StateT to the Error monad or ErrorT to the State monad? The decision depends on the exact semantics you want for your combined monad. H] asc desc -.this is the type of our problem description data NQueensProblem = NQP {board::Board..s)].gets ranks fs <. WriterT w (StateT s []) yields a type like: s -> [((a. it becomes increasingly important to manage the stack of monad transformers well. there is little difference between the two orders. you would apply StateT to Error. then you would apply ErrorT to State.gets desc let b' = (Piece Black Queen. Choosing the correct order requires understanding the transformation carried out by each monad transformer.gets asc ds <. Our combined monad is an instance of both MonadState and MonadWriter.w)]. StateT s (WriterT w []) yields a type like: s -> [((a. so we can freely mix use of get. Selecting the correct order Once you have decided on the monad features you need.d) = getDiags p as <.hs -. desc::[Diagonal]} -. asc::[Diagonal]. In this case. and tell in our monadic computations.this is our combined monad type for this problem type NDS a = WriterT [String] (StateT NQueensProblem []) a -.or Nothing if there was no solution.an initial problem state and then returning the first solution in the result list.Get the first solution to the problem. and how that transformation affects the semantics of the combined monad. and diagonals free initialState = let fileA = map (\r->Pos A r) [1. Which order to choose depends on the role of errors in your computation..s).initial state = empty board. The problem we will apply this monad to is the famous N-queens problem: to place N queens on a chess board so that no queen can attack another.gets board rs <.gets files as <.Managing the transformer stack Prev: More examples with monad transformers TOC: Contents Next: Continuing Exploration Managing the transformer stack Selecting the correct order An example with multiple transformers Heavy lifting As the number of monads combined together increases. put.. files. If an error means no state could be produced. we have added the WriterT monad transformer to perform logging during the computation. files::[File].d) = getDiags p as' = delete a as ds' = delete d ds tell ["Added Queen at " ++ (show p)] put (NQP (Board b') rs' fs' as' ds') -. getSolution :: NDS a -> NQueensProblem -> Maybe (a. you must choose the correct order in which to apply the monad transformers to achieve the results you want.[String]) getSolution c i = listToMaybe (evalStateT (runWriterT c) i) -.s). Applying StateT to the Error monad gives a state transformer function of type s -> Error e (a. If an error means no value could be produced. but the state remains valid. Code available in example25.8] rank8 = map (\f->Pos f 8) [A .s). all ranks. however. -.test if a position is in the set of allowed diagonals inDiags :: Position -> NDS Bool inDiags p = do let (a. The first decision is in what order to apply the monad transformers. The code uses the StateT monad transformer along with the List monad to produce a combined monad for doing stateful nondeterministic computations.w).gets asc .add a Queen to the board in a specific position addQueen :: Position -> NDS () addQueen p = do (Board b) <. so we will choose the second arbitrarily.8] [A .. H] asc = map Ascending (nub (fileA ++ rank1)) desc = map Descending (nub (fileA ++ rank8)) in NQP (Board []) [1. For instance you may know that you want a combined monad that is an instance of MonadError and MonadState.. ranks::[Rank]. In this case. An example with multiple transformers The following example demonstrates the use of multiple monad transformers. by evaluating the solver computation with -. p):b rs' = delete (rank p) rs fs' = delete (file p) fs (a. H] rank1 = map (\f->Pos f 1) [A . Applying ErrorT to the State monad gives a state transformer function of type s -> (Error e a. Instead of writing brittle code like: logString :: String -> StateT MyState (WriterT [String] []) Int logString s = . As a final task. The issue is that m in the constraint above is a type constructor. the impact on the lifting code is confined to a small number of these helper functions.this is our combined monad type for this problem type NDS a = StateT Int (WriterT [String] []) a {..getArgs let n = read (args!!0) cmds = replicate n addQueens sol = (`getSolution` initialState) $ do sequence_ cmds gets board case sol of Just (b. more flexible code like: logString :: (MonadWriter [String] m) => String -> m Int logString s = . and then lift the logString computation into the combined monad when we use it. like lift . reusable manner and then lift the computations into the combined monad as needed.return the digits of a number as a list getDigits :: Int -> [Int] getDigits n = let s = (show n) in map digitToInt s {.Managing the transformer stack ds <.l) <.show the solution putStr $ unlines l -.Here are some computations in MonadWriter -} -.gets files allowed <. This is where the lift function from the MonadTrans class comes into its own. Did you notice that all of the computations in the previous example are done in the combined monad. Heavy lifting There is one subtle problem remaining with our use of multiple monad transformers. -. however. lift $ f x. since this depends on the details of the inner monad and the transformers in the stack. and this is not supported in standard Haskell 98. The hardest part about lifting is understanding the semantics of lifting computations. lift Then.gets ranks fs <. A good practice to prevent this is to declare helper functions with informative names to do the lifting: liftListToState = lift .filterM inDiags [Pos f r | f <. even if they only used features of one monad? The code for these functions in tied unneccessarily to the definition of the combined monad.fs. try to understand the different roles that lifting plays in the following example code.show the log Nothing -> putStrLn "No solution" The program operates in a similar manner to the previous example.. lift . we can write clearer.write a value to a log and return that value logVal :: (MonadWriter [String] m) => Int -> m Int logVal n = do tell ["logVal: " ++ (show n)] return n -. which solved the kalotan puzzle. The lift function gives us the ability to write our code in a clear.rs] tell [show (length allowed) ++ " possible choices"] msum (map addQueen allowed) -. and if the transformer stack changes (perhaps you add ErrorT into the mix) the lifting may need to be changed all over the code.log a string value and return 0 logString :: (MonadWriter [String] m) => String -> m Int logString s = do tell ["logString: " ++ s] return 0 Code available in example26. lift . the code is more informative and if the transformer stack changes. Can you predict what the output of the program will be? -.add a Queen to the board in all allowed positions addQueens :: NDS () addQueens = do rs <.then get the board and print the solution along with the log main :: IO () main = do args <. modular. r <.Here is a computation on lists -} -.listen $ c return (length (concat l)) -. When using lifting with complex transformer stacks. This can become hard to follow. we only create branches that correspond to allowed queen positions. In this example. You may need to use the compiler flags -fglasgow-exts with GHC or the equivalent flags with your Haskell compiler to use this technique.gets desc return $ (elem a as) && (elem d ds) -.. you may find yourself composing multiple lifts. we do not test for consistency using the guard function. We use the added logging facility to log the number of possible choices at each step and the position in which the queen was placed. not a type. Instead.do a logging computation and return the length of the log it wrote getLogLength :: (MonadWriter [[a]] m) => m b -> m Int getLogLength c = do (_..hs .Start with an empty chess board and add the requested number of queens. which decreases their reusability.l) -> do putStr $ show b -. perform a series of computations in the combined monad. -} liftListToNDS :: [a] -> NDS a liftListToNDS = lift . Happy hacking! Prev: More examples with monad transformers TOC: Contents Next: Continuing Exploration .lift .get msum (map (\i->setVal (x+i)) (getDigits n)) -} {.monads as necessary. to add ErrorT) the changes to the existing lifting logic are confined to a small number of functions."Fork" the computation and log each list item in a different branch.get y <. All that is left to do is to hone your skills writing real software.This is an example of a helper function that can be used to put all of the lifting logic in one location and provide more informative names.get put (x+n) {. lift $ getDigits n setVal (x+y) {.lift $ logEach [1.Because setVal is used.lift $ getLogLength $ logString "hello" addDigits x x <.5] lift $ logVal x liftListToNDS $ getDigits 287 Once you fully understand how the various lifts in the example work and how lifting promotes code reuse.Managing the transformer stack {.3. you are ready for real-world monadic programming. adding a different digit to the state in each branch. main :: IO () main = do mapM_ print $ runWriterT $ (`evalStateT` 0) $ do x <.Here is a computation that requires a WriterT [String] [] -} -.Here are some computations in the combined monad -} -. addDigits :: Int -> NDS () addDigits n = do x <. logEach :: (Show a) => [a] -> WriterT [String] [] a logEach xs = do x <.an equivalent construction is: addDigits :: Int -> NDS () addDigits n = do x <.Here is a computation in MonadState -} -. lifting computations from other -.lift xs tell ["logEach: " ++ (show x)] return x {. This has the advantage that if the transformer stack changes in the future (say. and log that value setVal :: Int -> NDS () setVal n = do x <. the new values are logged as well. -.lift $ logVal n put x -.increment the state by a specified value addVal :: (MonadState Int m) => Int -> m () addVal n = do x <.set the state to a given value. lift -."Fork" the computation. Continuing Exploration Prev: Managing the transformer stack TOC: Contents Next: Appendix I . Prev: Managing the transformer stack TOC: Contents Next: Appendix I . If you discover any errors — no matter how small — in this document.A physical analogy for monads . You may also be interested in arrows. you might want to explore the design of the Parsec monadic parser combinator library and/or the QuickCheck testing tool.com. or if you have suggestions for how it can be improved. there are numerous category theory resources on the internet.A physical analogy for monads Continuing Exploration This brings us to the end of this tutorial. For more examples of monads and their applications in the real world. which are similar to monads but more general. If you want to continue learning about the mathematical foundations of monads. please write to the author at jnewbern@yahoo. worker function 3: wraps chopsticks wrapChopsticks :: Chopsticks -> Tray Wrapper Chopsticks wrapChopsticks c = . The combiner machine would take each input tray and pass along empty trays while feeding the contents of non-empty trays to its worker machine. The second takes a pair of roughly shaped chopsticks and outputs a tray containing a pair of smooth. Our trays should either be empty or contain a single item. We use the monad by setting up our assembly line as a loader machine which puts materials into trays at the beginning of the assembly line. Loader machines that can put any object into a tray.. -. Begin by thinking about a Haskell program as a conveyor belt. 3.. These combiner machines are attached to worker machines that actualy produce the new objects.. polished chopsticks with the name of the restaurant printed on them.worker function 1: makes roughly shaped chopsticks makeChopsticks :: Wood -> Tray Chopsticks makeChopsticks w = .. The important thing to notice about the monadic assembly line is that it separates out the work of combining the output of the worker machines from the actual work done by the worker machines. and see how it is handled in our physical analogy and how me might represent it as a program in Haskell.NOTE: the Tray type comes from the Tray monad -. The first takes small pieces of wood as input and outputs a tray containing a pair of roughly shaped chopsticks.... The third takes a pair of polished chopsticks and outputs a tray containing a finished pair of chopsticks in a printed paper wrapper.worker function 2: polishes chopsticks polishChopsticks :: Chopsticks -> Tray Chopsticks polishChopsticks c = . We will have three worker machines. we would define the Tray monad as: -. we can use our physical intuition and experiences to gain insights that we can relate back to the abstract world of computational monads. At each work area. In this way.trays are either empty or contain a single item data Tray x = Empty | Contains x . Our monad consists of three parts: 1. we can vary them independently. Trays that hold work products as they move along the conveyor belt. In Haskell.A physical analogy for monads Prev: Standard monad transformers TOC: Contents Next: Appendix II . and combiner machines that collectively make up the Tray monad. The particular physical analogy developed here is that of a mechanized assembly line. the conveyor belt carries the final product to the end of the assembly line to be output. as shown in Figure A-1. some operation is performed on the item on the conveyor belt and the result is carried by the conveyor belt to the next work area. Likewise. The conveyor belt then carries these trays to each work area. It is clear that the worker machines contain all of the functionality needed to produce chopsticks. type Chopsticks = .. Combiner machines that can take a tray with an object and produce a tray with a new object. We could represent this in Haskell as: -. 2.the basic types we are dealing with type Wood = .Haskell code examples A physical analogy for monads Because monads are such abstract entities. So the same combiner machines could be used on an assembly line to make airplanes and an assembly line to make chopsticks. -. loader. data Wrapper x = Wrapper x -. our physical monad is a system of machines that controls how successive work areas on the assembly line combine their functionality to create the overall product. Finally. where a combiner machine takes the tray and may decide based on its contents whether to run them through a worker machine.. Our loader machine would simply take an item and place it in a tray on the conveyor belt. it is sometimes useful to think about a physical system that is analogous to a monad instead of thinking about monads directly. Input goes on end of the conveyor belt and is carried to a succession of work areas. An assembly line using a monad architecture. Figure A-1. What is missing is the specification of the trays.. Lets take the example of an assembly line to make chopsticks. It is not a perfect fit for monads — especially with some of the higher-order aspects of monadic computation — but I believe it could be helpful to gain the initial understanding of how a monad works. In this assembly line model. Once they are separated. the same worker machines could be used with different combiners to alter the way the final product is produced. It will always either contain an item or it will contain a failure report describing the exact reason there is no item in the tray. consider what would happen if we wanted to change the manufacturing process. Because your assembly line is organized around a monadic approach.Tray2 is a monad instance Monad Tray2 where (Failed reason) >>= _ (Contains x) >>= worker return fail reason = = = = Failed reason worker x Contains Failed reason You may recognize the Tray2 monad as a disguised version of the Error monad that is a standard part of the Haskell 98 libraries. but all you have to go on is an empty tray. the quality control engineer. <. but our Tray type ignores this and simply produces an empty tray. the tray that is brought to the quality control engineer contains a failure report detailing the exact cause of the failure! Prev: Standard monad transformers TOC: Contents Next: Appendix II .wrapChopsticks c' return c'' So far. but you probably haven't been overawed by their utility. The fail routine takes an argument describing the failure. where it is brought to you.tray2s either contain a single item or contain a failure report data Tray2 x = Contains x | Failed String -.A physical analogy for monads -. Right now. as shown in Figure A-2. All that remains is to sequence the worker machines together using the loader and combiner machines to make a complete assembly line. Figure A-2. It eventually reaches the end of the assembly line. it is easy for you to add this functionality to your assembly line without changing your worker machines. Now when a failure occurs. you have seen how monads are like a framework for building assembly lines. when a worker machine malfunctions. To see why we might want to build our assembly line using the monadic approach. A complete assembly line for making chopsticks using a monadic approach. -. It is your job to figure out which machine failed. You realize that your job would be much easier if you took advantage of the failure messages that are currently ignored by the fail routine in your Tray monad.Haskell code examples .polishChopsticks c c'' <. To make the change. it uses the fail routine to produce an empty tray. This empty tray travels down the assembly line and the combiner machines allow it to bypass the remaining worker machines. Replacing the Tray monad with the Tray2 monad instantly upgrades your assembly line. In Haskell.makeChopsticks w c' <. you simply create a new tray type that can never be empty.Tray is a monad instance Monad Tray where Empty >>= _ (Contains x) >>= worker return fail _ = = = = Empty worker x Contains Empty You may recognize the Tray monad as a disguised version of the Maybe monad that is a standard part of Haskell 98 library.
https://www.scribd.com/doc/52906893/All-About-Monads
CC-MAIN-2017-43
refinedweb
19,790
57.77
When I run gnome-terminal, I get the following error: Traceback (most recent call last): File "/usr/bin/gnome-terminal", line 9, in <module> from gi.repository import GLib, Gio File "/usr/local/lib/python3.4/dist-packages/gi/__init__.py", line 39 print url This looks odd to me, because the script is located in a python 3.4 installation but is calling print as if it was a python2 script (which is why the error occurs). I tried to reinstall the package gi with pip3, but it keeps installing this version that looks like a python2 script. My gnome-terminal points to /usr/bin/gnome-terminal, which is a python script that starts with #!/usr/bin/python3. The lines with that particular error in init.py are: if __name__ == '__main__': try: url = save_file() print url except GistError as e: print e.value This suggests a quick fix: putting parenthesis in those two print lines. File "/usr/bin/gnome-terminal", line 9, in <module> from gi.repository import GLib, Gio ImportError: No module named 'gi.repository' Which is strange. This must be running on /usr/bin/python3, because that's what on the shebang on /usr/bin/gnome-terminal. python3 on the /usr/bin is actually a link to python3.4, which is a binary file. I then run pip3 install gi and I get the following output, which tells me that actually gi is installed. Requirement already satisfied (use --upgrade to upgrade): gi in /usr/local/lib/python3.4/dist-packages Requirement already satisfied (use --upgrade to upgrade): requests in /usr/lib/python3/dist-packages (from gi) And right now I am out of ideas. This started after I tried to install a Pumubuntu from. In the main script file it says: import sys if len(sys.argv) == 1: print('Importing Python modules. If one is missing get it with:\n' ' "sudo apt-get install python-..." or\n' ' "sudo apt-get install girX.Y-..." for gi.repository imports.') So I thought I had to enter those commands. And that must have broken my gir installation (gir). Can anybody help me? This is an old question but this being the first google hit, it should be answered. The error is caused by installing gi package on python3. It is a package for GIST Github commandline for python2. It is not related to gnome object or gnome introspection. Visit it here: python gi on package index It causes naming conflicts with gi.repository, rather than looking for gir in your python dist-packages, your system __init__ the gi package. And hence the error shows ImportError: No module named 'gi.repository' Uninstalling that package will resolve the error. Also if you are looking for a gister, try defunkt gist
https://www.codesd.com/item/gnome-terminal-does-not-start-due-to-an-error-in-the-gi-related-python-script.html
CC-MAIN-2021-04
refinedweb
458
68.36
This article has been excerpted from book "A Programmer's Guide to ADO.NET in C#".I'll show you how to develop database applications using ADO.NET and ASP.NET. To start creating your first ADO.NET application, you'll create a Web Application project as you did in the previous section. In this example you're adding only a List Box control to the page and you're going to read data from a database and display the data in the list box. After dragging a list Box control from the Web Forms control toolbox and dropping it on the page, write the code in Listing 7-2 on the Page_Load event. You can add a Page_Load event either double clicking on the page or using the Properties window.Note: If you're using an access 2000 database and OleDb data providers, don't forget to add reference to the System.Data.OleDb namespace to your project.Listing 7-2. Filling data from a database to a ListBox controlusing;namespace firstADO{ public partial class _Default : System.Web.UI.Page { protected void Page_Load(object sender, EventArgs e) { // Put user code to initialize the page here // Create a connection object string ConnectionString = @"Provider = Microsoft.Jet.OLEDB.4.0;" + " Data source =c:/Northwind.mdb"; OleDbConnection conn = new OleDbConnection(ConnectionString); // open the connection if (conn.State != ConnectionState.Open) conn.Open(); // create a data adapter OleDbDataAdapter da = new OleDbDataAdapter ("Select customerID From customers", conn); //Create and fill a dataset DataSet ds = new DataSet(); da.Fill(ds); // Bind dataset to the control // Set DataSource property of ListBox as DataSet's DefaultView ListBox1.DataSource = ds; ListBox1.SelectedIndex = 0; // Set Field Name You want to get data from ListBox1.DataTextField = "customerID"; DataBind(); // Close the connection if (conn.State == ConnectionState.Open) conn.Close(); } }}As you can see, this code looks familiar. First you create a connection object with the Northwind.mdb database. After that you create a data adapter and select FirstName, LastName and Title from the Employees table. Then you create a dataset object and fill it using the data adapter's Fill method. Once you have a dataset, you set the dataset as the ListBox's DataSource property and set SelectIndex as 0. The SelectIndex property represents the index of the column from a dataset you want to display in the control. The field name of your column is FirstName. At the end you call the DataBind method of the ListBox. This method binds the data to the list box. The output like figure 7-17. As you can see the ListBox control displays data from FirstName column of the Employees table.Figure 7-17. Your first ADO.NET Web applicationConclusionHope this article would have helped you in understanding Creating Your First ADO.NET Web Application. See other articles on the website also for further reference. ©2014 C# Corner. All contents are copyright of their authors.
http://www.c-sharpcorner.com/uploadfile/mahesh/creating-your-first-ado-net-web-application/
CC-MAIN-2014-49
refinedweb
481
68.16
Marc Kleine-Budde wrote: > the latest coreutils release 8.4 and current git master fail during the > (cross-) compilation of tail. The used components are: > > gcc-4.3.2 > glibc-2.8 > binutils-2.18 > > The following patch fixes the commit. It's against git master, but should > apply on 8.4, too. ... > # if HAVE_SYS_STATFS_H > # include <sys/statfs.h> > # endif > +# if HAVE_SYS_VFS_H > +# include <sys/vfs.h> > +# endif > #endif I'd like to take a slightly more conservative approach, including sys/vfs.h only when sys/statfs.h is not available. Does this work for you? >From 98dacf492e2e6f2153455cb4179058578cee20ff Mon Sep 17 00:00:00 2001 From: Marc Kleine-Budde <address@hidden> Date: Sun, 4 Apr 2010 09:15:07 +0200 Subject: [PATCH] tail: include sys/vfs.h (if possible) when sys/statfs.h is absent * src/tail.c [HAVE_INOTIFY && !HAVE_SYS_STATFS_H]: Include <sys/vfs.h>. --- src/tail.c | 2 ++ 1 files changed, 2 insertions(+), 0 deletions(-) diff --git a/src/tail.c b/src/tail.c index 02c4a1a..9e95dee 100644 --- a/src/tail.c +++ b/src/tail.c @@ -56,6 +56,8 @@ # include "fs.h" # if HAVE_SYS_STATFS_H # include <sys/statfs.h> +# elif HAVE_SYS_VFS_H +# include <sys/vfs.h> # endif #endif -- 1.7.0.4.529.g78fb
http://lists.gnu.org/archive/html/bug-coreutils/2010-04/msg00017.html
CC-MAIN-2016-30
refinedweb
203
64.88
Shakespeare How many times does the word 'love' appear in Shakespeare's plays? Is it possible to find negative passages using a list of keywords? We'll use Python to practice our skills and answer questions like these. Contents Setup[edit] - Download - Extract the contents of the folder, as per Goal 6 yesterday - Change directory to inside the folder, for instance: cd Downloads/ShakespearePlay - Open up the python shell and import some modules: from RomeoJuliet import RomeoJuliet from summerNight import SummerNight from summerChar import SummerChar Goals[edit] - Have fun using Python to learn basic data science. - Practice searching for information in text documents - Practice manipulating strings - Practice using loops - Practice using lists - Practice using dictionaries. Skills & Exercises[edit] Strings[edit] - Checking if two strings are equal >>>>> s == "mama" True >>> s == "papa" False - Checking if a string contains another as a substring >>>>> s in "I love mama" True >>> "day" in "Saturday" True >>> "Day" in "Saturday" False >>>>> "day" in Sat True File Operations[edit] - Open a file >>> M_S=open("A Midsummer-Night's Dream.txt", "r") >>> M_S <open file "A Midsummer-Night's Dream.txt", mode 'r' at 0x102d04660> - Read a line >>> M_S = open("A Midsummer-Night's Dream.txt", "r") >>> line = M_S.readline() >>> print line < Shakespeare -- A MIDSUMMER-NIGHT'S DREAM > - Read a file line by line until the end of file (also known as eof) >>> for eachline in M_S: >>> # Do something here with each line read ... File & Strings Exercise[edit] Using the word "love"[edit] - We will use the play Romeo and Juliet 1. Create a file named Rom_Juli.py save it under the same directory as where you've saved the Shakespeare texts. 2. Import RomeoJuliet 3. The variable RomeoJuliet is the play - don't output it, as it's too long. It's in a list. 4. Now create a variable that represents the string "love", for example: >>> lv = "love" 5. Also create a variable that is a counter for the number of time that "love" appears, for example: >>> lv_counter = 0; 6. Use a for loop (or while loop, if you like) to read through the lines of the file. While you are reading each line, count the number of lines that contains the word "love" 7. Does Shakespeare use a lot of love in his plays? How about other synonyms of "love"? Lists[edit] - Recall that lists in Python can contain multiple kinds of items (numbers, strings, etc.) and dynamically expand as new things are added. - We may declare our list as such >>> lst=["William","Shakespeare"] >>> lst ['William', 'Shakespeare'] - We may append something to our list as such >>> lst.append("Bard of Avon") >>> lst ['William', 'Shakespeare', 'Bard of Avon'] - More on list operations can be fount at the following URL: - One common way to process a file is to open it, and save each line as a string into a list >>> lst = open("importList.txt").readlines() # readlines.() reads each line in the file and puts each line as a string and saves them all to the list called lst. >>> lst ['apple\n', 'pear\n', 'oranges\n', 'kiwi\n', 'banana\n', 'monkey'] # notice that there are these weird '\n' characters following each item, they are the newline symbols (when you hit enter to start a new line) # we can remove them as such: >>> lstFinal = [eachthing.strip("\n") for eachthing in lst] >>> lstFinal ['apple', 'pear', 'oranges', 'kiwi', 'banana', 'monkey'] Dictionaries[edit] - Dictionaries are another data structure commonly used in programming. Dictionaries store what we call key-value pairs (kind of like dictionaries in real life). One common thing to do with dictionary is determine an entry's value given its key. - Entries in the dictionary are stored without order (i.e. no way to arrange storage position according to value) - keys for each entry in the dictionary must be unique, values do not have to be unique. - For our simplicity, we will use a string as keys. - Creating a dictionary: >>> myDict = {"Python":9, "Workshop": 27, "Interesting":1} >>> myDict {'Python': 9, 'Interesting': 1, 'Workshop': 27} # notice that printing them does not necessarily give the entries in the order you entered them. - The following basic operations work with entries in a dictionary (remove an entry, add an entry, check if a key is in the dictionary, print the value corresponding to a given key): >>> del myDict["Interesting"] >>> myDict {'Python': 9, 'Workshop': 27} >>> myDict["Interesting"]=1 >>> myDict {'Python': 9, 'Interesting': 1, 'Workshop': 27} >>> "Interesting" in myDict True >>> myDict["Interesting"] 1 For more information on the dictionary data type: Lists and Dictionaries Exercises[edit] List & Iteration Exercise 1: - Create a new python file. - Import the list of characters from A Midsummer Night's Dream by importing summerCharand import the play summerNight >>> summerChar.SummerChar # prints all the characters (such as <HELENA>) that are in the play A Midsummer Night's Dream. List & Iteration Exercise 2: In the same file that you created in the previous exercise: - Count how many times <OBERON> has spoken. - Print to screen the name <OBERON> and the number of times he spoke. Demo: Which of Shakespeare's famous tragic heros talks the most? List & Iteration Exercise 3*: - Now iterate through the list of character you saved from exercise 1, see how many times each of them speak. - Print to screen each character's name and the number of times they spoke. List & Iteration Exercise 4**: - Do the same as exercise 3, except now instead of printing them directly, save the names of character and number of times they spoke as a key:value pair in to a dictionary. - Print the dictionary to screen and check that you have the same result as part 3. Who speaks the most in Shakespeare's A Midsummer Night's Dream? Can you guess (or if you know) the pairings of the couples in the story? Extended Exercises[edit] Exercise 1: - In modern English, we owe many words to William Shakespeare, who alone invented over 2000 words in the English literature. - The file "popularWords.txt" lists some popular words that we still use today that were invented by Shakespeare (bet you didn't know that!). Each word originates from at least one of his plays. Can you find the play(s) where each word originated? - You can save the popular word and the play it comes from as a key:value pair in a dictionary. (remember that value does not have to be a number, it could be arbitrary data structure, i.e. it could be a string or a list of strings) Exercise 2: - Give yourself a word that you see in a play. Try to output the entire dialogue spoken by the person that first contained the word. - i.e. if your word is "fantastical" and you are looking at the play "Twelfth Night", you should output: <DUKE> . </DUKE> - Note that each person's speech is opened with their name in angular brackets and ends with </...>, as similar to HTML tags. Exercise 3: - Animals are often used as condescending terms to address someone in Shakespeare's plays. - Using the list of animals given in the file "listAnimal.txt" can you find (in a play or in many plays) which play and who spoke of something as what animal? Finally... - Feel free to devise your own exercises that you would enjoy and find out things about Shakespeare's plays!
https://wiki.openhatch.org/wiki/Shakespeare
CC-MAIN-2020-10
refinedweb
1,215
61.56
This page should hopefully become a quick guide to integrating other (Python-based) software with Bazaar. Most objects in Bazaar are in files, named after the class they contain. To manipulate the Working Tree we need a valid WorkingTree object, which is loaded from the workingtree.py file, eg: from bzrlib import workingtree wt = workingtree.WorkingTree.open('/home/jebw/bzrtest') This gives us a WorkingTree object, which has various methods spread over itself, and its parent classes MutableTree and Tree - its worth having a look through these three files (workingtree.py, mutabletree.py and tree.py) to see which methods are available. There are two methods for comparing trees: changes_from and iter_changes. iter_changes is more regular and precise, but it is somewhat harder to work with. See the API documentation for more details. changes_from creates a Delta object showing changes: from bzrlib import delta changes = wt.changes_from(wt.basis_tree()) This gives us a Delta object, which has several lists of files for each type of change, eg changes.added is a list of added files, changes.removed is list of removed files, changes.modified is a list of modified files. The contents of the lists aren't just filenames, but include other information as well. To grab just the filename we want the first value, eg: print("list of newly added files") for filename in changes.added: print("%s has been added" % filename[0]) The exception to this is changes.renamed, where the list returned for each renamed files contains both the old and new names -- one or both may interest you, depending on what you're doing. For example: print("list of renamed files") for filename in changes.renamed: print("%s has been renamed to %s" % (filename[0], filename[1])) If you want to add files the same way bzr add does, you can use MutableTree.smart_add. By default, this is recursive. Paths can either be absolute or relative to the workingtree: wt.smart_add(['dir1/filea.txt', 'fileb.txt', '/home/jebw/bzrtesttree/filec.txt']) For more precise control over which files to add, use MutableTree.add: wt.add(['dir1/filea.txt', 'fileb.txt', '/home/jebw/bzrtesttree/filec.txt']) You can remove multiple files at once. The file paths need to be relative to the workingtree: wt.remove(['filea.txt', 'fileb.txt', 'dir1']) By default, the files are not deleted, just removed from the inventory. To delete them from the filesystem as well: wt.remove(['filea.txt', 'fileb.txt', 'dir1'], keep_files=False) You can rename one file to a different name using WorkingTree.rename_one. You just provide the old and new names, eg: wt.rename_one('oldfile.txt','newfile.txt') You can move multiple files from one directory into another using WorkingTree.move: wt.move(['olddir/file.txt'], 'newdir') More complicated renames/moves can be done with transform.TreeTransform, which is outside the scope of this document. To commit _all_ the changes to our working tree we can just call the WorkingTree's commit method, giving it a commit message, eg: wt.commit('this is my commit message') To commit only certain files, we need to provide a list of filenames which we want committing, eg: wt.commit(message='this is my commit message', specific_files=['fileA.txt', 'dir2/fileB.txt', 'fileD.txt']) Generating a log is, in itself, simple. Grab a branch (see below) and pass it to show_log together with a log formatter, eg: from bzrlib import log from bzrlib import branch b = branch.Branch.open('/path/to/bazaar/branch') lf = log.LongLogFormatter(to_file=sys.stdout) log.show_log(b, lf) Three log formatters are included with bzrlib: LongLogFormatter, ShortLogFormatter and LineLogFormatter. These provide long, short and single-line log output formats. It's also possible to write your own in very little code. To annotate a file, we want to walk every line of a file, retrieving the revision which last modified/created that line and then retrieving the information for that revision. First we get an annotation iterator for the file we are interested in: tree, relpath = workingtree.WorkingTree.open_containing('/path/to/file.txt') fileid = tree.path2id(relpath) annotation = list(tree.annotate_iter(fileid)) To avoid repeatedly retrieving the same revisions we grab all revisions associated with the file at once and build up a map of id to revision information. We also build an map of revision numbers, again indexed by the revision id: revision_ids = set(revision_id for revision_id, text in annotation) revisions = tree.branch.repository.get_revisions(revision_ids) revision_map = dict(izip(revision_ids, revisions)) revno_map = tree.branch.get_revision_id_to_revno_map() Finally, we use our annotation iterator to walk the lines of the file, displaying the information from our revision maps as we go: for revision_id, text in annotation : rev = revision_map[revision_id] revno = revno_map[revision_id] revno_string = '.'.join(str(i) for i in revno) print "%s, %s: %s" % (revno_string, rev.committer, text) To work with a branch you need a branch object, created from your branch: from bzrlib import branch b = branch.Branch.open('/home/jebw/bzrtest') To branch you create a branch object representing the branch you are branching from, and supply a path/url to the new branch location. The following code clones the bzr.dev branch (the latest copy of the Bazaar source code) - be warned it has to download 60meg so takes a while to run with no feedback: from bzrlib import branch b = branch.Branch.open('') nb = b.bzrdir.sprout('/tmp/newBzrBranch').open_branch() This provides no feedback, since Bazaar automatically uses the 'silent' UI. To push a branch you need to open the source and destination branches, then just call push with the other branch as a parameter: from bzrlib import branch b1 = branch.Branch.open('') b2 = branch.Branch.open('') b1.push(b2) Pulling is much the same: b1.pull(b2) If you have a working tree, as well as a branch, you should use WorkingTree.pull, not Branch.pull. This won't handle conflicts automatically though, so any conflicts will be left in the working tree for the user to resolve. This performs a Lightweight checkout from an existing Branch: from bzrlib import bzrdir accelerator_tree, source = bzrdir.BzrDir.open_tree_or_branch('http:URL') source.create_checkout('/tmp/newBzrCheckout', None, True, accelerator_tree) To make a heavyweight checkout, change the last line to: source.create_checkout('/tmp/newBzrCheckout', None, False, accelerator_tree To get the last revision number and id of a branch use: revision_number, revision_id = branch.last_revision_info() If all you care about is the revision_id there is also the method: revision_id = branch.last_revision() IMPORTANT: This should be avoided wherever possible, as it scales with the length of history: revisions = branch.revision_history() now revisions[0] is the revision id of the first commit, and revs[-1] is the revision id of the most recent. Note that if all you want is the last revision then you should use branch.last_revision() as described above, as it is vastly more efficient. The Revision object has attributes like "message" to get the information about the revision: repo = branch.repository revision = repo.get_revision(rev_id) To get the file contents and tree shape for a specific revision you need a RevisionTree. These are supplied by the repository for a specific revision id: revtree = repo.revision_tree(rev_id) RevisionTrees, like all trees, can be compared as described in "Comparing Trees" above. The most common way to list files in a tree is Tree.iter_entries(). The simplest way to get file content is Tree.get_file(). The best way to retrieve file content for large numbers of files Tree.iter_files_bytes()`
http://doc.bazaar.canonical.com/bzr.1.13/developers/integration.html
CC-MAIN-2018-05
refinedweb
1,236
57.77
Let's now create the /products page for browsing just our products. Create the file src/pages/products.js, and add the following: import React from "react"; import { graphql } from "gatsby"; import ProductList from "../components/ProductList"; export default function ProductsPage({ data: { allChecProduct } }) { return ( <React.Fragment> <h1>Products</h1> <ProductList products={allChecProduct.nodes} /> </React.Fragment> ); } export const pageQuery = graphql` query ProductsPageQuery { allChecProduct { nodes { name permalink price { formatted_with_symbol } } } } `; Similar to the homepage, we export a pageQuery that queries allChecProduct. You will notice a bit of repetition for our query here. Let's assume the products index page will in the future show more than just the name and permalink, so we'll keep this query defined here, but let's turn the price query into a GraphQL Fragment. GraphQL Fragments mean we can define a name for our query, and use that fragment instead of typing again what fields we want from price. Inside the pageQuery of src/pages/index.js, add the following fragment: fragment PriceInfo on ChecProduct { price { formatted_with_symbol } } Then where we have: price { formatted_with_symbol } In both src/pages/index.js, and src/pages/products.js, replace it with: ...PriceInfo Discussion (0)
https://dev.to/notrab/create-products-index-page-5ha1
CC-MAIN-2021-21
refinedweb
192
50.73
Jeff Dyke wrote: >> actually no, the only things in that fucntion were. >> print globals().keys() - i see it here >> print mymodulename - it fails here. >> >> the `import mymodulename` statement is at the very top of the file. >> >> plus the processing that was attempted after. so how did that processing use the "mymodulename" name? >> in fact in the calling >> method i was able to execute print mymodulename and it printed the >> expected python output. the calling method has nothing to do with what's considered to be a local variable in the method being called, so that only means that the name is indeed available in the global scope. >> So i went back to check that the name 'mymodulename' was not getting >> overwritten by something else and the error went away. I've been >> working on something else entirely for the past few hours and have >> changed none of the code...and now it works. which is even more >> troublesome then the error itself. more likely, it indicates that you removed the line that caused Python to treat that name as a local variable. >> Follow on question. If this name, mymodulename, was imported in some >> other module.fucntion local to a function like >> def anotherfunc(): >> import mymodulename >> >> would that remove it from the globals() and save it to a locals() ? I >> would assume the answer to be no. even after reading the page I pointed you to? import binds a name, so an import statement inside a function will cause Python to treat that name as a local variable (unless you add a global declaration to that function). maybe a few examples will make this clearer; the following snippets are complete programs: snippet 1: import module # adds module to the global namespace def func(): module.func() # uses module from the global namespace func() # no error here snippet 2: def func(): import module # adds module to the *local* namespace module.func() func() # no error here module.func() # doesn't work; no module in global namespace snippet 3: def func(): global module # marks module as a global name import module # adds module to the *global* namespace module.func() func() # no error here module.func() # no error here; global module set by function snippet 4: import module # adds module to global namespace def func(): import module # adds module to local namespace too print module # prints local variable module = None # sets local variable to None func() # no error here module.func() # no error here either; uses global namespace snippet 5: import module def func(): print module # fails with an UnboundLocalError. # lots of lines import module # adds to local namespace; marks name as local # some more code func() # will fail at print statement my guess is that the last snippet corresponds to your case. </F>
https://mail.python.org/pipermail/python-list/2008-July/480257.html
CC-MAIN-2014-10
refinedweb
458
62.48
#include "lttwn.h" L_LTTWN_API L_INT L_TwainInitSession (phSession, pAppData) Initializes the TWAIN session. L_TwainInitSession (or L_TwainInitSession2) must be called before calling any other LEADTOOLS TWAIN toolkit functions. When the handle to the TWAIN session is no longer needed, free it by calling L_TwainEndSession. Every call to L_TwainInitSession or L_TwainInitSession2 requires a call to L_TwainEndSession. LEADTOOLS TWAIN toolkits support both the TWAIN 1.9 and the TWAIN 2.x specifications. By default LEADTOOLS TWAIN will try to load the TWAIN 2.x DLL if it exists in the system. If that fails or if the scanner is not compatible with TWAIN 2.x, it will try to start TWAIN 1.9. You can also override the default behavior and explicitly set which version of TWAIN the selected device will use. To do so, call L_TwainSetVersion and pass “TWAIN_VERSION1” to use version 1.9, or “TWAIN_VERSION2” to use version 2.x. Calling L_TwainSetVersion changes the way L_TwainSelectSource behaves for the rest of the session. For more information, refer to Setting which TWAIN Specification Version to use and Managing the TWAIN Source. Call L_TwainGetVersion to determine which TWAIN specification is currently being used by the LEADTOOLS TWAIN toolkit. Required DLLs and Libraries For an example, refer to L_IsTwainAvailable.
https://www.leadtools.com/help/leadtools/v19m/twain/api/l-twaininitsession.html
CC-MAIN-2017-43
refinedweb
204
59.8
Most Frequently Asked Questions Surrounding Google’s Cloud Operations Sandbox This article answers FAQs surrounding Google SRE Sandbox, a tool that provides an easy way to get started with the core skills you need to become an SRE. Join the DZone community and get the full member experience.Join For Free The Google SRE Sandbox provides an easy way to get started with the core skills you need to become an SRE. It simulates all the behavioral complexities of a real GCP(Google Cloud Platform) environment, so that budding SREs can practice hands-on while learning SRE best practices. The core skills you need to become a good SRE are: - Observability of complex microservice-based cloud environments - Performing quick root-cause analysis when things go wrong - Automating rollbacks and monitoring deployments - Tracking SLOs, SLIs over a time period With Cloud Operations Sandbox, you can get started and take the first steps into SRE expertise and answer the question, "Will it work in my production environment?" We have compiled a list of FAQs related to the Google SRE Sandbox and answered them below. Q: What Are the Major Features of the Sandbox? While the Sandbox has many features, in this blog we will be focusing on observability, root cause analysis, simulating user traffic and SLO/SLI tracking. The features in the Sandbox used for learning about these are Cloud Tracing, Locust artificial load generator, cloud profiler, cloud debugger and SRE recipes. Q: Can I Track Custom SLOs and SLAs With the Sandbox? The demo application that comes with the Sandbox has microservices that are pre-instrumented with logging, monitoring, tracing, debugging, and profiling capabilities. In the screenshot shown below you can see how Service Level Indicators(SLI)s can be defined for the demo app. You can pick SLIs based on availability, latency or even define your own custom metric for the demo application. If you have instead chosen to track SLIs for your replicated production environment you will need to instrument the services separately. Q: Which Module Is Used To Simulate Traffic in the Sandbox? The artificial load generator used by the Sandbox is Locust. Locust is mainly used for testing the load-bearing abilities of your infrastructure. With Locust, you can define artificial user behavior using Python code. Locust allows performing load tests by simulating up to millions of concurrent users. Below you will find a code-snippet with the python code used to simulate the behavior of a user: from locust import HttpUser, between, task class WebsiteUser (HttpUser ): wait_time = between(5 , 15 ) def on_start (self ): self.client.post("/login" , { "username" : "test_user" , "password" : "" }) Q: What Is "Google Cloud Debugger" and How Does It Work in the Sandbox? You may have noticed many instances where an issue faced in production cannot be reproduced in the test environment for root cause analysis. To discover the underlying cause, you must either go into the source code or add more logs to the program when it is running in the production environment. The Cloud Debugger allows developers to debug code during execution using real-time request data. Developers have the option of utilizing the Cloud Debugger to debug a running application using real-time request data. Breakpoints and log points may be defined while viewing the project. A snapshot of the process state is taken when a breakpoint is hit, so you may examine what went wrong. With the Cloud Debugger, adding a log statement to a running project doesn't result in slowed performance. Typically, this would need re-deploying the program/code, with all of the risks that are involved in production deployment. Q: What Is "Google Cloud Profiler" and How Can It Help Me? You can use Cloud Profiler to perform statistical testing on your application. It collects statistical information on CPU usage, heap size, threads, etc., depending on the programming language used. You may utilize the Profiler UI charts to identify performance gaps in your application code. Once you have installed the Profiler library, you do not have to write any profiling code in your application; all you have to do is make the Profiler library available (the method depends on the language). This library will generate reports and allow you to conduct various analyses. Note that if you are not using the demo application the profiler has to be configured to work with the related microservice. Q: What Are the Tools Available To Learn Tracing Across Sandbox? Cloud Trace allows developers to examine distributed traces by graphically revealing request latency bottlenecks. Developers gather the trace information by instrumenting the application code. Traces also include environmental information added to the Cloud Logging records. The Sandbox provides OpenCensus and OpenTelemetry to learn tracing within the platform. The solution the Sandbox uses for instrumenting is OpenCensus. The OpenCensus project is open-source and offers trace instrumentation in many languages. Furthermore, it enables the trace data to be exported to the Google Cloud Operations dashboard. To examine the data, you may utilize the Cloud Trace UI. Clicking on a trace in the timeline will give you a more detailed view and breakdown of the traced call and the subsequent calls that were made. Q: Can I Replicate My Production/Staging Environment in the Sandbox? Your production/staging environment can be replicated if it is hosted on GCP(Google Cloud Platform). Q: Can I Check for Observability of My Replicated Environment? The Sandbox has a demo application(hipster shop) that comes pre-instrumented with observability. If you are using your own environment, you will need to instrument your microservices accordingly. Q: Can I Send Alerts to an External Platform? As of now, the demo Sandbox has an inbuilt incident management system with basic functionality. Sending alerts to an external platform can be done after creating a custom module. Q: How Much Does the Sandbox Cost? The Sandbox is provided free of charge. However, since it can only be used on the Google Cloud Platform(GCP) platform, any computing resources consumed will be billed. Q: Can I Improve My MTTR(Mean Time To Respond) With the Sandbox? The Sandbox has a feature called “SRE recipes” that auto-generates issues in your environment. It is a good way to learn the skills to fix things in production. It is important to note that SRE recipes will only be working in the demo application provided with the Sandbox. You will need to create your own scripts to auto-generate problems in your custom setup. By practicing, SREs can get better at fixing issues in production and reducing the MTTR(Mean time to respond) to incidents. Q: Can I Test the Performance of My Production Environment in the Sandbox? Yes. The Sandbox environment can be used to test your production environment since it has a tool to generate synthetic traffic. However, the Sandbox does not have any tools for thorough unit testing and performance testing. Q: What New Features Will Be Added to the Sandbox? Runbooks are expected to be added to the Sandbox in the near future. Creating effective runbooks is an important skill all SREs need to acquire. Conclusion The SRE Sandbox is a great place to test out your skills for becoming a better SRE. To be effective in their work, SREs need expertise in the areas of observability, performance testing, and distributed architecture. The Sandbox provides a way for budding SREs to test out different scenarios. Some possible scenarios include checking the performance of your application under different user loads, getting better at resolving critical issues, and testing out different on-call strategies. Published at DZone with permission of Nir Sharma. See the original article here. Opinions expressed by DZone contributors are their own.
https://dzone.com/articles/most-frequently-asked-questions-surrounding-google
CC-MAIN-2022-27
refinedweb
1,281
55.03
Author:Yury Kashnitskiy. Translated and edited by Sergey Isaev, Artem Trunov, Anastasia Manokhina, and Yuanyuan Pao This material is subject to the terms and conditions of the Creative Commons CC BY-NC-SA 4.0 license. Free use is permitted for any non-commercial purpose. Unique values of all features (for more information, please see the links above):. salary: >50K,<=50K import numpy as np import pandas as pd pd.set_option('display.max.columns', 100) # to draw pictures in jupyter notebook %matplotlib inline import matplotlib.pyplot as plt import seaborn as sns # we don't like warnings # you can comment the following 2 lines if you'd like to import warnings warnings.filterwarnings('ignore') data = pd.read_csv('../../data/adult.data.csv') data.head() 1. How many men and women (sex feature) are represented in this dataset? # You code here 2. What is the average age (age feature) of women? # You code here 3. What is the percentage of German citizens (native-country feature)? # You code here 4-5. What are the mean and standard deviation of age for those who earn more than 50K per year (salary feature) and those who earn less than 50K per year? # You code here 6. Is it true that people who earn more than 50K have at least high school education? (education – Bachelors, Prof-school, Assoc-acdm, Assoc-voc, Masters or Doctorate feature) # You code here 7. Display age statistics for each race (race feature) and each gender (sex feature). Use groupby() and describe(). Find the maximum age of men of Amer-Indian-Eskimo race. # You code here 8. Among whom is the proportion of those who earn a lot (>50K) greater: married or single men (marital-status feature)? Consider as married those who have a marital-status starting with Married (Married-civ-spouse, Married-spouse-absent or Married-AF-spouse), the rest are considered bachelors. # You code here 9. What is the maximum number of hours a person works per week (hours-per-week feature)? How many people work such a number of hours, and what is the percentage of those who earn a lot (>50K) among them? # You code here 10. Count the average time of work (hours-per-week) for those who earn a little and a lot (salary) for each country (native-country). What will these be for Japan? # You code here
https://nbviewer.jupyter.org/github/Yorko/mlcourse_open/blob/master/jupyter_english/assignments_demo/assignment01_pandas_uci_adult.ipynb?flush_cache=true
CC-MAIN-2019-13
refinedweb
392
68.06
Decorator for automatic code optimization. If a global is known at compile time, replace it with a constant. Fold tuples of constants into a single constant. Fold constant attribute lookups into a single constant. Discussion When hand optimizing functions, it is typical to include lines like _len=len for looking-up the len function at compile time and binding to a local constant. The speed-up is substantial (trading one or more dictionary lookups for a single C-speed array lookup). make_constants() performs those optimizations automatically; leaving the original code free of clutter like _len=len. In the example, observe replacements of "random" from the global namespace and "len", "ValueError", "list", "xrange", and "int" from the builtin namespace. All of those are recoded as constants. If "random" had not already been imported at binding time, then it would have been left as a runtime global lookup. Constant binding is especially useful for: * Functions with many references to global constants (sre_compile for example). * Functions relying on builtins (such as len(), True, and False). * Functions that raise or catch exceptions (such as IndexError). * Recursive functions (to optimize the function's reference to itself). * Functions that call other functions defined in the same module. * Functions accessing names imported into the global namespace (i.e. from random import random). After binding globals to constants, the decorator makes a second pass and folds constant attribute lookups and tuples of constants. The first frequently occurs with module references (such as string.hexdigits). The second commonly occurs in for-loops and conditionals using the "in" operator such as: for x in ('a','b','c'). Binding should be applied selectively to those functions where speed is important and dynamic updates are not desired (i.e. the globals do not change). In more dynamic environments, a more conservative approach is to set builtin_only to True so that only the builtins get optimized (this includes functions like len(), exceptions like IndexError, and constants like True or False). Alternatively, individual variable names can be added to a stoplist so that the function knows to leave them unchanged. Note, make_constants() works like other function decorators such as classmethod() and staticmethod(), so it can be used inside a class definition to optimize methods. For versions of Python before Py2.4, the @decorator syntax was not available. To invoke the decoration, do so after the function is defined with: <pre> sample = _make_constants(sample, verbose=True) </pre> Also, due to the way decorators work, the latter form must be used to optimize recursive function calls. Instead of decorating every function and method in a module, the bind_all() utility function is provided. Call bind_all(my_class) after the class definition or put bind_all(sys.modules[__name__]) as the last line in a module to be optimized. Very cool ... One suggestion. This is a very cool decorator Raymond. I do have one small suggestion. Instead of hard-coding the various bytecode numbers, I'd import symbols from the opcode module just to future-proof it a little: Skip Done. Incorporated the suggested change. Thanks! Exceedingly Cool. I have a voxel rendering class, with several nested loops. It needs a very tight inner loop, and as such I have 17 _len = len style optimisations to avoid excessive dict lookups. Thanks Raymond, this is brilliant stuff, and has tidied up my code very nicely indeed! compile time? Since the constants are bound when the module is imported, the recipe should be named "BindingConstants at import time" or something like that, imo. Metaclass makes things more handy. Here's a metaclass that calls make_constants for all methods of a class. I know, decorators make you think about the right place to put them - but if it doesn't break the code, there should be nothig bad about optimizing everywhere. BTW, if you still want to keep it configurable, try: bind_all misses imports. bind_all misses and, I guess, bind_all simplifies my last comment to getting into closures as well. I use closures fairly frequently, so I've found it useful to add code to this to also prebind constants in code objects in func_code.co_consts and functions under closures. The code objects part is pretty simple; just split out the part of _make_constants that deals only with the code object into a separate function (say, code_make_constants) which takes the code object co, the environment dict env, stoplist, and verbose as arguments and do somewhere up at the top. Binding the constants on functions in closures is a little more tricky, but it can be done using the get_cell_value and change_cell_value functions from some recipes I've posted. I have this code block in _make_constants, before the function object is created: For those that wonder why I would do such a thing: Optimizing code objects in .co_consts is useful when you have subfunctions, i.e. bar will show up as a code object in foo.func_code.co_consts. Optimizing functions in a func_closure tuple is useful when you use wrapper functions in decorators, i.e.: With this pattern, the original baz code will not be accessible except in a cell in baz.func_closure. Another side effect. I used to wrap all the functions and classes in a "main" function, which returned a dictionary of names to be exported for two reasons: speed (LOAD_DEREF was faster than LOAD_GLOBAL) less namespace clutter (ie all the imported modules did not show up in the module's globals) The first part is handled by the recipe. The second part can easily be dealt with by deleting the imported modules after running the bind_all function (assuming that all LOAD_GLOBALS have been replaced with LOAD_CONST, of course :) There's a typo in sample function, ininstance should be isinstance I think i have not get the stoplist usage, i have tried this: @binding_constants.make_constants(verbose=True, stoplist=[util,]) but still i get util module optimized, so i have introduced in the decorator this print for debug. if verbose: print name, stoplist, name in stoplist and i get this: util [<module 'util' from 'util.pyc'>] False util --> <module 'util' from 'util.pyc'> why is the util module still optimized? Thanks.
http://code.activestate.com/recipes/277940/
crawl-002
refinedweb
1,018
54.93
. . I definitely agree: if you can retain syntax compatibility with Python that's very, very, huge win. But are you sure Python 3's hinting system provides enough flexibility to annotate all inputs and outputs and there is no conflict with existing code already using these features? Though I am pretty sure that there are very little user for this feature as it is new in Python 3k. The only library I know utilizing this is plac. Python 3's annotation syntax seems to have just enough flexibility when combined with other Python features such as function decorators and operator overloading. I'll write another blog post with more details about the syntax. The annotations would only have special meaning in Python files that explicitly use static typing. Other files can use the annotations for their own purposes. Also, there could be an escape that lets you mix different kinds of annotations within a file. This could be a function decorator, for example. Of course, this all would only work if the other library does not assume that nobody else uses function annotations. I like the new ideas that focus on compatibility and static type checking. I found mypy in my search for static type checking tools. I would really like to see an option for const function arguments. Is this a realistic option? It depends on what kind of const arguments you have in mind. An option to check that functions don't assign to arguments would be easy to add. Checking that functions don't modify argument objects is tricky; using an abstract type such as Sequence that does not allow direct modification goes a long way but doesn't generalize easily to arbitrary objects. Hi Jukka, This project sounds really really interesting! I was wondering if you are looking for any help, I would love to contribute in any way possible - [I am a developer]. Feel free to contact me on G+. Keep on the good work! So, essentially the plan is to turn mypy into a type-checking library/program, and then build a compiler/translator off that? Neat! The problem with Python 3's annotation syntax is that it allow everything to be behind that colon i.e. this is allowed: def greeting(name:"Your name"): return 'hello, ' + name So even if this syntax is used compatibility still isn’t satisfying. Personally I don't like things that looks the same when it is partially the same as it creates confusion. Also Python doesn’t allow this: a:int = 0 Personally I would like the C style type specification together with Pythons annotation, like this: str greeting(str name:"Your name"): return 'hello, ' + name This allows us to specify the computer type (which is important as other computer types could create a crash) and human type (which is important as other human types wouldn't make any sense). This could also preserve Python compatibility as def greeting(name:"Your name"): return 'hello, ' + name would be implicitly dynamically typed. Thus making Python code fully valid Mypy code. One could then start porting a Python application step by step. Rasmus: An important goal of the new syntax is to allow incremental adaptation of Python applications to static typing without a mypy-to-Python translation step. Thus existing Python tools such as IDEs would work. This rules out *any* extra syntax right now. I don't think that many programmers use the Python 3 annotations currently. Also, it would be possible to allow the alternative Python 2 annotation syntax (types in comments) to be used even in Python 3 code. This would let you use Python 3 annotations for other purposes. The problem with any new language intent to be python compatible is that it will eventually be limited to the ultra-dynamic of python. You would be able to do "your thing" if you need to be python compatible everywhere. At the end, you just create another half-ass python accelerator like all the other failed attempts which are all killed by "python compatible". Python like syntax give you much more freedom to do things beyond Python both feature-wise and performance-wise. Python-compatible syntax is just putting dead weight for short term benefit. Bob: I don't think that Python-compatible syntax really is a significant restriction. The highly dynamic Python semantics, not syntax, make it very hard to run Python code fast. It makes more sense to evolve the semantics separately from the syntax (e.g. by removal of implicit locking). The Python syntax is flexible enough to support pretty much all the new mypy features that have been proposed. And the benefits of Python syntax compatibility are huge. Besides, there is still the option of extending the syntax in the future if there is a compelling enough use case. However I can't think of any yet. I think it very much makes sense what you wrote above - first write the library for static checking which runs on any Python VM and then, later, add the faster, statically-typed, VM. I personally also think that Python 2 support is waste of your time but hey, it's your time. What the way of adding types goes, if you used comments, how would I annotate lambdas? You might also want to consider this: int, int, int def adder(a, b): return a+b PS: there is a mailing is about Python static type checking, maybe you know about it, maybe you don't...: Tuom: Currently you can't directly annotate lambdas, but the type of a lambda can usually be inferred from the context, and when this isn't possible, you can explicitly set the context yourself by using a type declaration, for example like this: f = lambda s: 'hi, ' + s # type: Function[[str], str] I feel that using just a tuple literal for annotating functions is too "light-weight" syntactically and the return type does not stand out from the argument types. And thanks for the link! I didn't know about it. Jukka, I think Python2 support is unnecessary, as it would waste too much of your time. Even a project as mature as PyPy has been struggling to get adoption, you probably should not expect mypy be vastly adopted in the current Python2 era. Planning for the future and taking this chance to refine your design and implementation may be a wiser choice.
http://mypy-lang.blogspot.co.uk/2013/04/pycon-update-python-compatible-syntax.html
CC-MAIN-2016-36
refinedweb
1,072
62.27
Get this book -> Problems on Array: For Interviews and Competitive Programming Reading time: 20 minutes | coding time: 10 minutes The problem we will solve is that given a set of integers in sorted order, find length of longest arithmetic progression in that set. This can be solved by brute force in O(N^3) while a dynamic programming approach with take O(N^2) time complexity. Arithmetic progression is set of numbers in which difference between two consecutive numbers is constant. Mathematical formula for arithmetic progression is Tn = a + (n – 1) d where a is first element, T(n) is nth element and d is constant. 1,2,3 is AP with d = 1 3,7,11,15 is AP with d = 4 Let’s define in detail first. Our Problem statement is to find longest sequence of indices, 0 < i1 < i2 < … < ik < n such that sequence A[i1], A[i2], …, A[ik] is an arithmetic progression. Examples: set[] = {1, 7, 10, 15, 27, 29} output = 3 The longest arithmetic progression is {1, 15, 29} set[] = {5, 10, 15, 20, 25, 30} output = 6 The longest arithmetic progression is {5, 10, 15, 20, 25, 30} What will be the brute force solution? A brute force. For better understanding Lets us go through an example:- Let us consider a sorted array and we have to find 3 or more elements in AP. if we get 3 elements in AP we return TRUE otherwise FALSE. In order to find. We can follow this ALGO to find numbers:-++). This will give answer to question if there exist three numbers in set which form AP. If set contains two or more elements,** minimum length** of longest AP will be2. Why? because any number will always form AP of length 2 with last element of set. We can proceed with this problem using Dynamic Programming The idea is to create a 2D table L[n][n]. An entry L[i][j] in this table stores Longest arithmatic progression with arr[i] and arr[j] as first two elements of AP and (j > i). The last column of the table is always 2 (as discussed above).. Algorithm to find length of longest arithmetic progression - For j = n L[i][j] = 2 for 0<i<n, bottom most column filled with 2. - Fix j = n-1 to 1 and for each j do below steps: - Find all i and k such that A[i], A[j] and A[k] form AP. Algorithm given above. - Fill L[i][j] = 1 + L[j][k] - Check if L[i][j] is longer than current max length, if yes, update it. - Slight change for optimization, if A[i] + A[k] is greater than 2*A[j], we can safely fill L[i][j] as 2. - While i > 0 even after k > n, fill all L[i][j] =2. Example Let us consider the example number 1 where input array was a[]={ 1, 3, 5, 6, 8, 7 }. Now when we will build the dp[n][n] matrix it would look like following- From the above method we can see that we will be using only n-1 + ...... + 3 + 2 + 1 space of the matrix making the time complexity to be n*(n-1)/2 ~ O(n^2). Complexity Time Complexity: O(n^2) [Dynamic programming] Auxiliary Space: O(n^2) Implementations #include <iostream> using namespace std; // Returns length of the longest AP subset in a given set int lenghtOfLongestAP(int set[], int n) { if (n <= 2) return n; // Create a table and initialize all values as 2. The value of // L[i][j] stores LLAP with set[i] and set[j] as first two // elements of AP. Only valid entries are the entries where j>i int L[n][n]; int llap = 2; // Initialize the result // Fill entries in last column as 2. There will always be // two elements in AP with last number of set as second // element in AP for (int i = 0; i < n; i++) L[i][n-1] = 2; // Consider every element as second element of AP for (int j=n-2; j>=1; j--) { // Search for i and k for j int i = j-1, k = j+1; while (i >= 0 && k <= n-1) { if (set[i] + set[k] < 2*set[j]) k++; // Before changing i, set L[i][j] as 2 else if (set[i] + set[k] > 2*set[j]) { L[i][j] = 2, i--; } else { // Found i and k for j, LLAP with i and j as first two // elements is equal to LLAP with j and k as first two // elements plus 1. L[j][k] must have been filled // before as we run the loop from right side L[i][j] = L[j][k] + 1; // Update overall LLAP, if needed llap = max(llap, L[i][j]); // Change i and k to fill more L[i][j] values for // current j i--; k++; } } // If the loop was stopped due to k becoming more than // n-1, set the remaining entties in column j as 2 while (i >= 0) { L[i][j] = 2; i--; } } return llap; } int main() { int set1[] = {1, 7, 10, 13, 14, 19}; int n1 = sizeof(set1)/sizeof(set1[0]); cout << lenghtOfLongestAP(set1, n1) << endl; return 0; } Output: 4
https://iq.opengenus.org/longest-arithmetic-progression/
CC-MAIN-2022-27
refinedweb
878
72.19
Mailslot bug (MS06-035) vs non-Mailslot bug (CVE-2006-3942) Aug 14 2006 11:12PM Gerardo Richarte (lists core-sdi com) (2 replies) Mailslot bug (MS06-035) vs. non-Mailslot bug(MS0?-???/CVE-2006-3942) This is the story of a yet unpatched bug which is not a 0-day. Time line: 2006-07-12 - MS06-035 Published by Microsoft [1] 2006-07-12 - "Windows Mailslot (MS06-035) DoS" module released to IMPACT customers 2006-07-13 - We realized (too late) that it was a different bug [2] 2006-07-14 - We got in touch with Microsoft 2006-07-19 - Public exploit released by cocoruder [3] (frankruder_at_hotmail.com) 2006-07-28 - ISS released their advisory [4] 2006-07-28 - Microsoft acknowledged the bug [5] 2006-08-14 - Today - We publish and advisory [10] and this email ---[ Intro ] Last month's patch Tuesday started with a nice challenge: A remotely exploitable code execution kernel bug for most Microsoft's OSes (most supported Windows). As my job is to write exploits, I jumped to that as soon as I could (which was latter than what I liked because we were closing a new version of our product). I got something working in a short time, sent it to QA to test and released before the end of the day... I was truly amazed... to only find out, a little bit later, that I had accidentally found a different (yet unpatched today) bug. In this pseudo-advisory I will describe the Details of this new bug, the process of how I [also] "discovered" it, and why I think it's not exploitable (only to be proved later by someone else that I'm a moron) ---[ MS06-035... I think ] For a long time I've been waiting for a remotely exploitable kernel bug to try to exploit. It was a tough challenge, at least for me, as I've never before worked on such a beast. I jumped immediatly to Microsoft's advisory's [1] "Vulnerability details" section to find what I expected: NOTHING. Just a general description, as in most advisories lately, which can't, in any way, be used to prove or disprove the existence of the bug, nor to decide how high in the priority list this patch should be put: "There is a remote code execution vulnerability in the Server driver that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system." [1] Uhm... if the information is not under "Vulnerability details", where may it be? I think I need to take even more English lessons, because I thought "details" meant "detalles", oh well... let's read all the advisory just in case... After reading Microsoft's advisory I continued with TippingPoint's [5] and Pedram Amini's blog [7] to happily find a few more details. Let me summarize what I knew then: . Mailslot ==> SMB . Kernel Heap overflow . Code execution is possible (why would Microsoft over-rate it?) . SRV.SYS (Server driver) . Port 445 (from advisory's Workarounds section) . First class mailslot (whatever it means) What do I know about Mailslots? the basics, probably a little bit more, but surely not enough. Let's see if Impacket [11] has something for Mailslots: $ cd Impacket-0.9.6.0 $ grep -i mailslot * $ grep -i mailslot */* $ grep -i mailslot */*/* $ grep -i mailslot */*/*/* grep: */*/*/*: No such file or directory ... mmmm... nothing... now what? After quickly sending Pedram an email to congratulate him and HD for their finding (and, of course, cry for some help), I sat down to read CIFS' specification [12] once again. I searched for the word "mailslot" to only find it in one section describing the format for Mailslot Write transactions. Nice! Lets try the fuzzing approach, lets create a Mailslot request with a lot of data! So I opened my Ethereal and my Python interpreter, booted up a VMware with Windows, went through the automatic "Win-R, cmd, ipconfig". Got VMware's IP address and continued typing: from impacket import smb s = smb.SMB('*SMBSERVER','10.0.1.44') s.login('','') tid = s.tree_connect_andx(r'\\*SMBSERVER\IPC$') s.send_trans(tid, '\x01\x00\x00\x00\x00\x00', r'\MAILSLOT\LANMAN', '', 'A'*1000) BOOM! The vmware crashed! What? Wait a second... At this point I thought "How stupid I am! I should have tested this before! just sending a big packet crashed it!" And I'm one of those who 5 years ago thought "first generation fuzzers are not going to find too many bugs any more"... stupid me! "Ok. Got a crash, it's a kernel bug... no, no, it's a remotely exploitable kernel heap overflow bug... it's quite unlikely I will be able to do anything better than a simple Denial of Service for quite some days. So I better focus on writing down the documentation. I will send right away a working version to QA so we can try to ship it today". Thought and done. Documentation written, typos fixed, some extra packets added just in case, QA approved it for "Early release" mode... "Nice! we tested it against most Windows VMWares we have, it crashed them all in the first try. And we shipped it all in a single day! I was not really expecting this, I'm more used to spending a few days per bug until I have a QA-approved shippable version" - "Hey Kelya! lets ship it! it's done, QA approved it!" (Kelya's my boss) - "Sure... Ok, it's shipped now. Have you tried against a patched box?" - "Nop... 'cmon, It's not my job to test MS' patches!" [8] [9] (thanks aazubel!) - "Oh well... let me see... My box is patched, throw it against it" - "Ok, going... (double-click), gone" - "Eh! wait a second... Got a crash and dump, let me see if the box's really patched" - "Yeah, it must be still unpatched, I'll try someone else's box" - ... - "I think we may have found something else... pass me the memory dump to debug it" And so the second part of the story begins. ---[ MS0?-??? - CVE-2006-3942 - the new bug ] - "Let's go home now. Tomorrow we'll verify it and talk to Ivan so he gets in touch with Microsoft about this new issue" - "Ok, I'll try to debug it and figure out what's going on" The new bug, as explained by ISS' advisory [3], is due to a NULL pointer dereference, and I firmly believe that it's not exploitable. As I said, I will quite likely be proved wrong on this, but I'll try to give my reasons: The crash <-- not reached SRV.SYS:0002f4a5: jmp loc_20bf6 SRV.SYS:0002f4aa: Apparently, for some reason, our packet made [eax+24h] be NULL, which forced something like: wcsnicmp(0, "\\MAILSLOT", 9); Which obviously crashes. After some tests, I found out that the only thing that mattered here, is that no NUL should be sent after the "Mailslot name". And in fact, 'A'*1000 is not necessary, and the mailslot name doesn't really have to mean anythin. So, the following python script should still trigger the bug: ----- from impacket import smb s = smb.SMB('*SMBSERVER','10.0.1.44') s.login('','') tid = s.tree_connect_andx(r'\\*SMBSERVER\IPC$') s.send_trans(tid, '\x01\x00\x00\x00\x00\x00', 'cuchicuchi','','') ----- - "Kelya, Ivan: I'm pretty sure this is a different thing... it's not related to mailslots, it's not related to a buffer overflow, and apparently, it's not exploitable for code execution" - "Uhm... Ok, I'm getting in touch with MS to let them know. You should have tried it against a patched box before releasing." - "I know, but we were in Early Release mode, and we were too worried testing the exploit to stop and test if Microsoft's patch really worked." - "Take some time to see if it's exploitable or not, I'll talk to Microsoft" - "Sure! I have already started!" I believe this is not exploitable for code execution, and I know stating this is pretty much like putting a loaded gun in my mouth. My decision tree for that is: . Either it crashes in wcsnicmp(). In which case it's only a Denial of Service. . Or it doesn't crash in wcsnicmp(). . The string begins with "\\MAILSLOT", and it becomes a MailslotTransaction() where it may find another bug, but not this. . The string doesn't begin with "\\MAILSLOT", in which case ExecuteTransaction() returns with an error message. Evidently this is a new bug, not related to the processing of Mailslots and even not strictly related to Named Pipes [3], but to SMB_COM_TRANSACTION SMB messages (0x25) instead. So, we were in the process of talking to Microsoft when three interesting things happened: . A few customers sent us emails saying that we should get in touch with Microsoft because the exploit was too effective DoSsing patched and unpatched boxes. . An exploit for the very same bug was published, producing exactly the very same traffic as our exploit, bit by bit. And also falling in our same mistake of believing it was a Crash for MS06-035. [4] . ISS published an advisory a few days latter stating that, given the public exploit, they have independently discovered this new bug. [3] Microsoft publicly acknowledged the situation [6] after the advisory was published. All the information available says that they are currently working in a patch for the issue and that they have "...not observed or received any reports of the PoC being used to actively attack systems", what kind of confirms that the availability of Proof of Concept code has nothing to do with the bad people doing bad things. ---[ Concluding ] . Yes, there is a public exploit for a yet unpatched bug. This time it's just a DoS situation unless somebody proves me wrong (which is simpler than proving I'm right). . No, even when there's a public exploit, an advisory and a note by Microsoft acknowledging the bug, your box is not being DoSsed all the time. . Advisories with almost no technical details are bad: They do not provide enough information to let users decide how serious the condition is in their specific situation, quite often lead to the accidental discovery of new bugs (this is not the first time I've seen it). And more important (for me), they make my everyday task of writing exploits harder :-) . Microsoft is already working on fixing the issue. They are trying to target Noveember for a release. . In the meanwhile, filtering ports 135-139 and 445 from the outside is pretty much your only choice... Unless somebody comes out with a home made patch for SRV.SYS. I haven't checked, but I wouldn't be surprised if this could be triggered on UDP, as most standard MAILSLOT transactions are made over UDP. . We tried targeting a Windows Vista beta 2 build 5381, and it didn't crash. So Vista MAY be safe. . Only a few days ago, after we finally closed a new release of CORE IMPACT (v6.0), I could go back and work on the original MS06-035. I got again in touch with HD Moore and Pedram (Thanks again guys!), and they passed me some clues, but I'm still working on getting something working :-( take care, be safe gera [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [ reply ] RE: Mailslot bug (MS06-035) vs non-Mailslot bug (CVE-2006-3942) Aug 18 2006 01:40AM Marc Maiffret (mmaiffret eeye com) Re: Mailslot bug (MS06-035) vs non-Mailslot bug (CVE-2006-3942) Aug 15 2006 10:54PM naveed (naveedafzal gmail com) Privacy Statement
http://www.securityfocus.com/archive/1/443288
crawl-002
refinedweb
1,951
72.05
Dear forum members, I'm working on an accounting software, which I was planing to do using C#. Now that I see there is WPF that I can use instead of WinForms, I would like to ask you a couple of questions. For an account software, which I would like to have it looking good, with dynamic graphs and "easy on eyes" with light animations (like apps on iphone, transitions etc), is C# .NET WPF a good choice? What would be your recommendations?And how can I skin the window completely? Like, iTunes working on a Windows machine. The window and the title bar is custom, but buttons for quitting the application or minimizing it still the Windows one. How can I do this with VS and C# with WPF?Once the project is complete, can I deploy it to work on a web browser? Is it possible? Because I read some stuff like this.Also, dear members, do you have any favorite resource which teaches animation and design side of WPF? Thank you very much. Yes, WPF is a good choice. If you want to deploy the app in a browser, Silverlight is an even better choice; here is a Silverlight banking demo: Here is a sample demonstrating how to skin a window: Phil Weber Please post questions to the forums, where others may benefit. I do not offer free assistance by e-mail. Thank you! Thank you Mr. Weber for your quick answer and recommendations. I've checked the Silverlight banking demo and its beautiful. And the blog of Pavanpodila is brilliant, however I can't get to download the indicated file, as the domain no longer exists of his host. If you know, can you please give me the name or some sort of starting point of windowless-window that I can build from scratch so I can learn it better? What kind of a research shall I perform to find necessary namespaces or whatever that needs to be done in order to achieve it? Also if you are aware of more useful blogs like the one of Pavanpodila, could you please share them too? Thank you, once again. Originally Posted by Phil Weber Yes, WPF is a good choice. If you want to deploy the app in a browser, Silverlight is an even better choice; here is a Silverlight banking demo: Here is a sample demonstrating how to skin a window: Perhaps And here are some zip files that you might find interesting... MrGreene: The GlassWindow source code is included in this project: Thank you! Fluidkit seems to be an excellent source of information, as it contains a lot of things that I can learn from. Now thanks to Fluidkit's GlassWindow, I also understand the logic behind how iTunes looks. I realise the shadow of their -close, minimize, maximize- buttons are limited in size, unlike native Windows applications, it's obvious that they have also "skinned" the Window. I tought it was native. I'm thinking about following these footsteps, in order to create the project I've planned. Could you please tell me your opinion? Create a C# WPF Project on VS.Start coding the software, focusing on codebehind, not caring much about how it looks. With basic textboxes, and so on on visual level.Once everything is in well runing order, and fully functional, start desiging its forms and textboxes and everything in MS Expression and import them and replace the old controls and it become "easy on the eyes", to publish it. Originally Posted by Phil Weber MrGreene: The GlassWindow source code is included in this project: View Tag Cloud Forum Rules
http://forums.devx.com/showthread.php?173423-C-and-WPF-a-good-choice
CC-MAIN-2013-48
refinedweb
610
72.87
. Sub-dividing the model into smaller models with type reuse. a. Multiple CSDL files( Models) while sharing MSL and SSDL:″ /> b. Divide application schemas into different sets of CSDL, MSL and SSDL files :: The example uses Northwind sample database.″ /> Join the conversationAdd Comment. Thanks Srikanth. Thanks, Rez Hi Srikanth, you perfectly understood what i mean to say. I’m happy that this feature will be (soon? 😉 )… Hi Srikanth, We split our model into two and were working on this till recently. I tried refactoring the code and it is broken now. When i try to load the data from other mode i am getting an error like "System.InvalidOperationException: The relationship ‘DataAccess.EF.ParameterListValuesParameters’ does not match any relationship defined in the conceptual model". Do you have idea about this error? I searched in net for this error but no help. By the way, I used your option B to create 2 sets of csdl, msl and ssdl files for the models and used "using" in the second model to refer the entities in the first model. Thanks, Dhileep Having one .edmx file might be good as far as it could be easily edited both manually and via designer. – For the manual editing improvements you could add one simple feature which will provide some sort of "navigation links". Thus when you edit some peace of xml code related to some table in SSDL part, VS will show you links (or previews) of other related peaces of xml in CSDL and MSL part. – In entity designer we need an ability to group entities into aggrigates with different namespaces. (ex.: Membership.User, Membership.Role, Store.Product, Store.CreditCard etc.). That would be great if we could collaps/expand those "aggrigates". Zoom in/out int0 aggrigates view and into entities view. — navin@php.net Hi Srikanth, Is there any fix for the "large model" issue in version 4? Will any of the "large model" issues mentioned in Part I and Part II be addressed in the upcoming EF4 release? There is a lot of good information about some of the new features, but can you let us know if there is any movement towards making EF more friendly to large models? Or at least if there will be a less manual approach to splitting models in EF4? My team is in the process of migrating an application with LOTS of tables. So far we only have ~80 tables in EF (out of 1,000+), but we will add more tables to the model as we add functionality. Unfortunately we couldn’t add all of the tables to EF due to performance problems and others issues mentioned in these blog posts. Thanks in advance for any information you can provide! have you tried this in EF4.0, at least once, based on your defined steps in the blog. I am using T4 template to generate POCO Classes which are then moved to another project. Can you please provide some tips as to how can we divide the EF model into separate models while using POCO Classes ? thanks in advance Hi I don't understand in multiple schema set method, How "customerdetails.model.cs" created? could you help me? whats it's command? and how can i use these files in my project? I copy that files in a directory and change my connectionStrings in app.config to refer to that files,but this cause my project generate 49 errors! any answer? With the "using" approach, how does that affect the startup performance of the app? Currently, we have one big edmx, and start-up performance is bad, because EF 4.2 processes the whole model at startup. (even with pre-generated views it is still too slow). With the using approach, will EF only process stuff from one diagram on startup (i.e. process the stuff from one diagram the first time something on that diagram is queried) or will it still process all the metadata for the whole application at startup? The very first thing we need is an EF who deals properly with sub-models because we handle complexity with abstraction and clean code and less plumbing. LineOfBusines applications are most of the time as serious as the number of entities, and 100..900 entities with structure is no exception. I wait for EF7 being capable to handle these situations and for the time being I use creative work around's 🙂
https://blogs.msdn.microsoft.com/adonet/2008/11/25/working-with-large-models-in-entity-framework-part-2/
CC-MAIN-2018-47
refinedweb
739
65.22
Hello guys, I have just started a new series, React for Java developers and I am going to publish React tutorials and examples to teach React.js, one of the most popular frontend libraries to Java developers. Since most full-stack Java development is happening on React and Spring Boot, it makes sense for Java developers to learn React.js. In the past, I have also shared both best React courses and books, as well as The React Developer RoadMap, which provides all the tools, libraries, and resources you need to become a proficient React Developer. This series aims to teach you essential React.js concepts to Java developers and this is the second article on my React for Java developer series. In the first part, we have seen what is Redux and how to use it and in this part, you will learn how to use state in React.js. Components are the building blocks of a react application. In other words, a UI or part of a UI is a component. If you have ever built a react component, you may be familiar with the term “state”. A react application is incomplete without a state. In simple words, the state in react is a plain JavaScript object that controls the behavior of a component. We can say, the state is the data that manages a component. The state is one of the most important concepts of React. You just cannot build react applications without understanding the working of the state. In this article, we will discuss what the React state is and how to use it. What is State in React.js? As mentioned above, the state controls the behavior of a component. We can have a component state that is only limited to a single component, or a global state for the entire application. For smaller applications, react provides in-built support to manage state while third-party libraries such as Redux are used to manage the global state of larger applications. The state can be used in class-based components as well as functional-based components. In this article, we will discuss how to use state in both components. 1. State in class-based components In the class based component, we can create a state object, and then we can update it by using the in-built “setState” method. Observe the following code. import React from "react"; class CountClick extends React.Component { constructor(props){ super(); this.state = { counter: 0 } this.clickHandler = this.clickHandler.bind(this); } clickHandler(){ this.setState({ counter: this.state.counter + 1 }) } render() { return( <React.Fragment> <button onClick={this.clickHandler}> Click here </button> <p> {this.state.counter} </p> </React.Fragment> ) } } export default CountClick; In the above code, the state is declared in the constructor. this.state = { counter: 0 } Whenever the button is clicked, “clickHandler” is invoked and the value of “counter” is incremented by 1 using the “setState” method. clickHandler(){ this.setState({ counter: this.state.counter + 1 }) } In the JSX, we can access the state like the following. <p> {this.state.counter} </p> This is how the state is used in a class-based component. 2. State in functional component Earlier, it was not possible to use state in functional components. There was no mechanism for it. But with the introduction of react hooks, we can use state in a functional component and more easily and simply. To use state in a functional component, react provides the useState hook. Before moving to the code, let’s discuss in brief what are react hooks. React hooks are functions that can be used to “hook in” state and lifecycle methods. In simple words, react hooks let us use state and lifecycle methods in functional components that were earlier limited only to the class based components. Observe the following code. import React, {useState} from "react" function CountClick() { const [counter, setCounter] = useState(0); return( <React.Fragment> <button onClick={() => setCounter(counter + 1)}> Click here </button> <p> {counter} </p> </React.Fragment> ) } export default CountClick; The above code is equivalent to the earlier class-based code. Isn’t it easier to understand? And it also has fewer lines of code. Let’s understand what is happening here. Observe the following line of code. const [counter, setCounter] = useState(0); Here, the “useState” hook is used to create a state named “counter” and a function named “setCounter”. Now, the “setCounter” function will update the state. Moreover, we have passed 0 to the “useState'' hook, meaning, the initial value of “counter” is 0. Unlike the class based component, we did not create a separate function to update the state because we already have one. <button onClick={() => setCounter(counter + 1)}> Click here </button> Now let's see how we can access the state in JSX. <p> {counter} </p> Isn’t it easier to use state in a functional component? That's all about how to use state in the React.js library. The state is an essential part of a react component. It helps us create dynamic and interactive user interfaces. In this article, we discussed what state is and how to use it in class as well as functional components. In class-based components, we have to create a constructor, declare the state in it, and use the “setState” method to update. It works fine but the state is easier to use in the functional components. The “useState” hook is simple and easy to use. Moreover, the code is less complicated and has fewer lines. - My favorite free Courses to learn Angular and React - My favorite books to learn React.js in 2021 - Top 5 Websites to learn React.js for Beginners - The React Developer RoadMap - 5 Best courses to learn React Native in 2021 - The 2021 Frontend and Backend Developer RoadMap - 5 Courses to Learn Ruby and Rails for Free - 10 Books and Courses to learn Angular - 5 Free Courses to learn Kubernetes in 2021 - 5 Free Docker Courses for Java and DevOps Engineer - 5 Online training courses to learn Angular for Free - 5 Courses to learn Object-Oriented Programming for Free - 10 Courses to learn AWS for beginners - 3 Books and Courses to Learn RESTful Web Services in Java Thanks for reading this article so far. If you like these free React framework courses, then please share them with your friends and colleagues. If you have any questions or feedback, then please drop a comment. 1 comment : Really a good article thank your sharing
https://javarevisited.blogspot.com/2021/09/how-to-use-state-in-react-example.html
CC-MAIN-2022-40
refinedweb
1,071
65.83
You've been using collections throughout this book to store objects. Many of the standard ASP.NET controls, such as DropDownList and DataGrid , use collections internally to store the items they display. In the following sections, you look at the properties and methods of the different types of collections in detail. Most of the collection classes inhabit the System.Collections namespace, which includes several types of collections. Some of these collections are generally useful, whereas some were designed for more specialized functions. I discuss three types of collections in these sections: ArrayLists HashTables SortedLists An ArrayList enables you to store lists of objects (any type of object, even other ArrayLists ). Using an ArrayList is similar to using an array, except that an ArrayList does not have any fixed upper bound. An ArrayList also has a number of useful properties and functions that it does not share with an array. You can create a new ArrayList by using the following statement: colArrayList = New ArrayList() This statement creates an ArrayList that can initially store 16 objects. If you attempt to store more than 16 objects, the capacity of the ArrayList is automatically doubled . The capacity keeps doubling to handle the number of elements added. If you know the number of elements that an ArrayList will store before you create the ArrayList , you can get the (ever so slight ) performance benefit by declaring the ArrayList with a particular starting capacity. For example, if you know that an ArrayList will be used to store 100 items, you can declare it like this: colArrayList = New ArrayList( 100 ) This ArrayList is declared to handle 100 elements. If you add a 101st element, the capacity of the ArrayList automatically doubles to 200. You can determine the number of elements in an ArrayList at any time by using the Count property. You can determine the current capacity of an ArrayList at any time by using the Capacity property. For example, the following statements display the numbers and 16 : Dim colArrayList As ArrayList colArrayList = New ArrayList Response.Write( colArrayList.Count & "," & colArrayList.Capacity ) The numbers and 16 are displayed because they are the initial values of the Count and Capacity properties. If you are working with a really huge ArrayList , you can trim its capacity back to its current size by using the TrimToSize method as follows : colArrayList.TrimToSize() The TrimToSize method changes the capacity of the ArrayList to match its current number of items. Finally, if you want to clear all the objects out of an ArrayList and start over again, you can use the Clear method like this: colArrayList.Clear() The Clear method gets rid of all the current items in an ArrayList . However, it does not reset the capacity. To clear all the items and reset the capacity, you must call both the Clear and TrimToSize methods. You can add individual items to an ArrayList by using the Add method. For example, the following statement adds the string "Hello World!" to an ArrayList : colArrayList.Add( "Hello World!" ) Remember that an ArrayList can contain any type of object. So, you can add integers, TextBox controls, or any weird object that you discover in the .NET framework. When you add an object to an ArrayList , it's added to the end as the last element. You can return the index of an item that you add to an ArrayList like this: intItemIndex = colArrayList.Add( "Hello World!" ) If this were the first item added to the ArrayList , intItemIndex would return ; if it were the second, intItemIndex would return 1 ; and so on. If you need to add multiple objects to an ArrayList at once, you can use the AddRange method. For example, the following statement adds all the items in an ArrayList named colAnotherArrayList to an ArrayList named colArrayList : colArrayList.AddRange( colAnotherArrayList ) You also can add multiple duplicate items to an ArrayList by using the Repeat method: colArrayList = ArrayList.Repeat( "Hello World!", 100 ) The Repeat method returns an ArrayList that contains a value repeated a certain number of times. In this case, the ArrayList would contain 100 items with the value "Hello World!" . If you need to insert an object into an ArrayList at a particular position, you can use the Insert method. For example, the following statement inserts the string "Hello World!" at the fourth index position: colArrayList.Insert( 4, "Hello World!" ) The InsertRange method also corresponds to the AddRange method. You can use the InsertRange method, as shown here, to add multiple objects starting at a certain position: colArrayList.InsertRange( 4, colAnotherArrayList ) This statement adds the contents of an ArrayList named colAnotherArrayList to an ArrayList named colArrayList starting at the fourth index position. NOTE You can use the AddRange and InsertRange methods to add other types of objects to an ArrayList as well. You can use these methods with any object that supports the ICollection interface. You might be disappointed that you can add only single items to an ArrayList . The Add method accepts only one argument. However, this disappointment is not warranted. Remember that an ArrayList can contain any type of object. If you want to add multiple items to an ArrayList at a time, use a class with the ArrayList . The page in Listing 24.1, for example, contains a class named Products . This class has both ProductName and Price properties. <Script Runat="Server"> Public Class Product Public ProductName As String Public Price As Decimal Public Sub New( ProductName As String, Price As Decimal ) MyBase.New() Me.ProductName = ProductName Me.Price = Price End Sub End Class Sub Page_Load Dim colArrayList As ArrayList colArrayList = New ArrayList colArrayList.Add( New Product( "eggs", 2.10 ) ) colArrayList.Add( New Product( "milk", 3.24 ) ) dlstDataList.DataSource = colArrayList dlstDataList.DataBind() End Sub </Script> <html> <head><title>MultiArrayList.aspx</title></head> <body> <asp:DataList <itemTemplate> <%# Container.DataItem.ProductName %> - <%# String.Format( "{0:c}", Container.DataItem.Price ) %> </itemTemplate> </asp:DataList> </body> </html> The C# version of this code can be found on the CD-ROM. In the Page_Load subroutine in Listing 24.1, an ArrayList named colArrayList is declared. Two instances of the Product class are added to the ArrayList . Finally, the ArrayList is bound to a DataList control, and the two products are displayed. The most straightforward method of removing an item from an ArrayList is to use the Remove method. For example, the following statement removes the item "Hello World!" from an ArrayList : colArrayList.Remove( "Hello World!" ) If an ArrayList contains duplicate items, the first item is removed. Beware that the Remove method performs an exact comparison, so it is case sensitive. If you attempt to remove a nonexistent item, nothing horrible happens. The whole ArrayList is searched for the item, and the Remove method gives up without generating an error. If you need to remove an ArrayList item with a certain index, you can use the RemoveAt method like this: colArrayList.RemoveAt( 4 ) This statement removes the item with an index of 4. If the ArrayList doesn't contain an item at index position 4, an error is generated. If you want to remove a range of items in an ArrayList , use the RemoveRange method. For example, the following statement removes three items (items 2 through 4), starting at index position 2: colArrayList.RemoveRange( 2, 3 ) Finally, if you want to clear all the items from an ArrayList , use the Clear method like this: Remember to call the TrimToSize method after calling Clear if you want to reduce the capacity of the ArrayList to the minimum (16 items). If you need to loop through the contents of an ArrayList , displaying each item, you can use either a For...Each or For...Next loop. The following For...Each loop, for example, displays all the elements in an ArrayList named colArrayList : Dim strItem As String For Each strItem in colArrayList Response.Write( strItem ) Next You can do the same thing with a For...Next loop: Dim intCounter As Integer for intCounter = 0 To colArrayList.Count - 1 Response.Write( colArrayList( intCounter ) ) Next In both cases, you assume that the ArrayList contains strings. If the ArrayList contains items with different types of data or you are not sure about the type of data contained in the ArrayList , you can loop through it by using an Object variable like this: Dim objItem As Object For Each objItem in colArrayList Response.Write( objItem.ToString ) Next An Object type can accept any type of value. So, regardless of whether an ArrayList contains integers, strings, classes, or whatever, you can assign the items to an Object type. You can sort the items in an ArrayList by using the Sort method. For example, the page in Listing 24.2 sorts all the elements in an ArrayList named colShoppingList . <% Dim colShoppingList As ArrayList Dim strItem As String colShoppingList = New ArrayList colShoppingList.Add( "eggs" ) colShoppingList.Add( "milk" ) colShoppingList.Add( "beer" ) colShoppingList.Sort For Each strItem in colShoppingList Response.Write( "<li>" & strItem ) Next %> In Listing 24.2, three items are added to the ArrayList : eggs, milk, and beer. When the Sort method is called, the items are sorted in alphabetical order: beer, eggs, milk. You reverse the order in which items in an ArrayList are sorted by calling the Reverse method. This method reverses the order of all the elements in an ArrayList . For example, the page in Listing 24.3 sorts a list of random numbers and reverses the results. <% Dim colArrayList As ArrayList Dim objRanNumber As Random Dim intCounter As Integer Dim intItem As Integer colArrayList = New ArrayList objRanNumber = New Random For intCounter = 1 to 10 colArrayList.Add( objRanNumber.Next( 100 ) ) Next colArrayList.Sort colArrayList.Reverse For Each intItem in colArrayList Response.Write( "<li>" & intItem.ToString() ) Next %> Ten random numbers are assigned to the ArrayList in this listing. Next, the ArrayList is sorted, and the elements are reversed by calling the Reverse method. You could find an element in an ArrayList by looping through all its elements until a match is found. However, this is a notoriously slow search algorithm. If an ArrayList contains thousands of elements, then, potentially , thousands of elements must be checked before a match is found. You can perform this type of slow, linear search on an ArrayList by using the Contains method. For example, the page in Listing 24.4 uses the Contains method to find the number 53 in an ArrayList . <% Dim colArrayList As ArrayList Dim intCounter As Integer Dim objRanNumber As Random colArrayList = New ArrayList objRanNumber = New Random For intCounter = 1 to 1000 colArrayList.Add( objRanNumber.Next( 1000 ) ) Next If colArrayList.Contains( 53 ) Then Response.Write( "Found 53!" ) Else Response.Write( "Couldn't Find 53!" ) End If %> In Listing 24.4, 1,000 random numbers are added to the ArrayList . The Contains method determines whether the number 53 is contained in it. Using the Contains method can be slow when you're working with large ArrayLists . Fortunately, an ArrayList supports binary searches. If you want to perform a binary search, the ArrayList must be sorted. A binary search takes advantage of the fact that the elements in an array occur in a certain order so that a match can be found more quickly. CAUTION A binary search can return incorrect results if an ArrayList is not sorted. The page in Listing 24.5 illustrates how you can use the BinarySearch method. <% Dim colArrayList As ArrayList Dim objranNumber As Random Dim intCounter As Integer Dim intItemIndex As Integer colArrayList = New ArrayList objRanNumber = New Random For intCounter = 1 to 1000 colArrayList.Add( objRanNumber.Next( 1000 ) ) Next colArrayList.Sort() intItemIndex = colArrayList.BinarySearch( 53 ) If intItemIndex > 0 Then Response.Write( "Found 53!" ) Else Response.Write( "Couldn't Find 53!" ) End If %> If the BinarySearch method finds a match, it returns the index of the matched item in the ArrayList . Otherwise , it returns a negative number. By default, the BinarySearch method performs a case-sensitive search. If you need to perform a search that is not case sensitive, call the BinarySearch method like this: intItemIndex = colArrayList.BinarySearch( "Smith", New CaseInsensitiveComparer ) This statement performs a binary search for Smith using an instance of CaseInsensitiveComparer . So, the statement matches both Smith and smith . A HashTable , like an ArrayList , can be used to store a collection of items. However, a HashTable , unlike an ArrayList , is used to store key and value pairs. The key and value pairs can represent just about anything you desire . For example, you can use the key and value pairs to represent product codes and product names . Or the keys could represent page numbers, and the values could represent the contents of a page. Each key in a HashTable must be unique. If you try to add two items with the same key, you receive an error. There's a good reason for this unique key requirement. You can look up a key very quickly in a HashTable because of the manner in which it stores its items. Whenever you add an item to a HashTable , the HashTable calculates a hash code for the item's key. The HashTable internally sorts the hash codes using different buckets. By dividing the hash codes into different buckets, it can retrieve a key very quickly. A hash code is a shorthand representation of a value. For example, you can use a hash code to represent text that contains thousands of characters with a relatively small, fixed-length number. Small differences in values result in different hash codes. So, two versions of the Declaration of Independence that differ in a single letter result in different hash codes. You can create a new HashTable by using the following statement: colHashTable = New HashTable() This statement creates a new HashTable named colHashTable . You also have the option, when creating a HashTable , of specifying its initial capacity. For example, if you know that the HashTable will be used to hold at least 100 items, you can declare the HashTable like this: colHashTable = New HashTable( 100 ) If you enter more than 100 items, the HashTable automatically expands to handle the greater number of items. Finally, you can create a HashTable with a particular load factor. The load factor determines the number of buckets to use when sorting the hash codes for a HashTable. (It specifies the maximum ratio of items to buckets.) By default, a HashTable is initialized with a load factor of 1.0. However, you can use a lower value, as shown here, if you want to use more buckets and perform faster searches: colHashTable = New HashTable( 100, 0.1 ) This statement initializes the HashTable with a capacity of 100 items and a load factor of 0.1 (the minimum load factor). The advantage of a lower load factor is faster searches. The disadvantage of using a lower load factor is that it requires more memory. You can add an item to a HashTable in two ways. First, you can use the Add method like this: colHashTable.Add( "WA", "Washington" ) This statement adds a new key with the value "WA" and a new item with the value "Washington" to the HashTable named colHashTable . Alternatively, you can add a value to a HashTable like this: colHashTable( "WA" ) = "Washington" If the key "WA" doesn't already exist, it's added with the value. If the key already exists, it's assigned the new value. Remember, you cannot add duplicate keys to a HashTable . So, the following two statements would result in an error: colHashTable.Add( "CA", "California" ) colHashTable.Add( "CA", "California" ) However, there is nothing wrong with adding two items with the same value. The following two statements would not generate an error: colHashTable.Add( "CA", "California" ) colHashTable.Add( "CALIF", "California" ) You use the Remove method to remove an item from a HashTable . For example, to remove an item with the key "WA" , you would use the following statement: colHashTable.Remove( "WA" ) Realize that the Remove method is, by default, case sensitive. So, this statement would not remove an item with the key "Wa" . If you want to remove all the items in a HashTable , you can call the Clear method like this: colHashTable.Clear() This statement removes all the items in the HashTable named colHashTable . Several methods can be used for displaying the items in a HashTable . You can use a For...Each loop like this, for example: Dim objItem As DictionaryEntry For each objItem in colHashTable Response.Write( "<li>" & objItem.Key & "=" & objItem.Value ) Next This For...Each loop displays the key and value for each item in the HashTable named colHashTable . (Notice that each item in a HashTable is actually an instance of the DictionaryEntry class.) You also can use a For...Each loop to iterate through the Keys collection of a HashTable like this: Dim strItem As String For Each strItem in colHashTable.Keys Response.Write( "<li>" & strItem ) Next The Keys collection represents all the keys in a HashTable . I'm assuming that all the keys are strings. If the Keys collection contains items of another type, such as integers, you need to declare a variable with the appropriate type. You also can loop through all the values in a HashTable by using the Values collection: Dim strItem As String For Each strItem in colHashTable.Values Response.Write( "<li>" & strItem ) Next Again, I'm assuming that all the values are strings. If the items in the Values collection are a different type, you need to declare a variable with the appropriate type. The HashTable collection was designed to enable you to quickly look up a key and retrieve the key's associated value. The simplest way to retrieve a certain value from a HashTable that has a certain key is to use the following: Response.Write( colHashTable( "WA" ) ) This statement displays the value for the "WA" key. (The comparison is case sensitive.) If you simply want to check whether a certain key exists in a HashTable , you can use the Contains method like this: If colHashTable.Contains( "WA" ) Then Response.Write( "Found WA!" ) Else Response.Write( "Couldn't Find WA!" ) End If The Contains method returns True if the key exists and False otherwise. (Again, the Contains method is case sensitive.) If you want to perform comparisons that are not case sensitive with a HashTable , you need to declare it like this: colHashTable = New HashTable( _ New CaseInsensitiveHashCodeProvider, _ New CaseInsensitiveComparer ) This statement initializes the HashTable with a hash code provider that enables hash code comparisons that are not case sensitive. It also uses the CaseInsensitiveComparer to compare values. HashTables are very good at finding keys. They are slower at finding values, however. You can find a particular value by using the ContainsValue method: If colHashTable.ContainsValue( "Washington" ) Then Response.Write( "Found Washington!" ) Else Response.Write( "Couldn't Find Washington!" ) End If The ContainsValue method must perform a linear search on the elements of the HashTable . So, the more elements in a HashTable , the slower the search. HashTables are great for quickly looking up a key and finding an associated value. However, they are not useful for displaying items in a certain order. You have no control over the order in which a HashTable internally represents its items. A SortedList collection, on the other hand, enables you to control exactly how items are sorted. You can create a new instance of the SortedList collection like this: colSortedList = New SortedList() You also have the option of declaring a SortedList with an initial capacity like this: colSortedList = New SortedList( 100 ) This statement creates a new SortedList with an initial capacity of 100 elements. If you add more than 100 elements, the SortedList automatically doubles in size to handle the new elements. Like a HashTable , a SortedList contains key and value pairs. You can add a new key and value pair to a SortedList by using the Add method like this: colSortedList.Add( "Bob", "(415) 455-9090" ) This statement adds a new key, "Bob" , and a new value, "(415) 455-9090" , to a SortedList named colSortedList . Alternatively, you can add a new item to a SortedList like this: colSortedList( "Bob" ) = "(415) 455-9090" A SortedList cannot contain duplicate keys. So, if you try to execute this statement twice, an error is generated. There is nothing wrong, however, with adding duplicate values to a SortedList . Whenever you add new items to a SortedList , they are automatically added in the right order. For example, imagine that you add the following three items: colSortedList.Add( "eggs", 2.39 ) colSortedList.Add( "beer", 8.16 ) colSortedList.Add( "milk", 4.87 ) The SortedList automatically rearranges the items in the following order: beer, eggs, milk. Notice that the items are sorted in order of the keys, and not the values. You can remove an item from a SortedList by using its key or index position to refer to the item. For example, the following statement removes an item with the key "eggs" : colSortedList.Remove( "eggs" ) You also can remove an item according to its index position in the list by using the RemoveAt method like this: colSortedList.RemoveAt( 1 ) Remember, when you're using the RemoveAt method, the items in a SortedList are automatically ordered. So, an item's index position has nothing to do with the order in which you added the item. If you want to clear away all the items in a SortedList , you can use the Clear method like this: colSortedList.Clear() This statement removes all the items from a SortedList named colSortedList . Clearing a SortedList does not automatically reduce the capacity of the list. To reduce the capacity of a SortedList to its initial capacity (16 items), you need to call the TrimToSize method after calling the Clear method like this: colSortedList.Clear() colSortedList.TrimToSize() Several methods can be used to loop through the contents of a SortedList . For example, you can display all the elements by using a For...Each loop like this: Dim objItem As DictionaryEntry For each objItem in colSortedList Response.Write( "<li>" & objItem.Key & "=" & objItem.Value ) Next Notice that each entry in a SortedList is actually an instance of the DictionaryEntry class. The Key and Value properties are used to display the key and value for each item in the SortedList . You also can use the Keys property to display each key in a SortedList like this: Dim strItem As String For each strItem in colSortedList.Keys Response.Write( "<li>" & strItem ) Next A Value property also enables you to display all the values in a SortedList : Dim strItem As String For each strItem in colSortedList.Values Response.Write( "<li>" & strItem ) Next I'm assuming here that the SortedList contains strings. You need to use the correct data type for the items contained in the SortedList (for example, Integer , Decimal , or Object ). The most straightforward way of displaying the value of an item with a certain key in a SortedList is to use a statement like this: Response.Write( colSortedList( "eggs" ) ) If the SortedList contains a list of grocery store items and their prices, this statement displays the price of eggs. If you want to check whether a SortedList contains a particular key, you can use the Contains method like this: If colSortedList.Contains( "eggs" ) Then Response.Write( "We sell eggs!" ) Else Response.Write( "Nope, no eggs!" ) End If The Contains method returns True if the key exists and False otherwise. By default, a SortedList is case sensitive. So, the key "eggs" is treated differently than the key "eGGs" . If you want to perform comparisons that are not case sensitive, you need to initialize the SortedList collection like this: colSortedList = New SortedList( New CaseInsensitiveComparer ) This statement initializes the SortedList with CaseInsensitiveComparer . The Contains method uses a fast binary search to find a matching key. The process of finding a matching value is slower because a linear search must be performed. You can check whether a SortedList contains a particular value by using the ContainsValue method as follows: If colSortedList.ContainsValue( 2.39 ) Then Response.Write( "Found It!" ) Else Response.Write( "Couldn't Find It!" ) End If Here, the ContainsValue method finds an item with the value 2.39 . If an item is found, the ContainsValue method returns True ; otherwise, it returns False .
https://flylib.com/books/en/3.443.1.157/1/
CC-MAIN-2019-18
refinedweb
4,005
66.44
Components of a C++ source file Aims To enable students to: describe source, object and executable code create source code understand library files - produce an executable program Understand the structure of a C++ source file Sample Program Notes Describe the purpose of this source file. /****************************************************/ /* */ /* Module name: sample.cpp */ /* */ /* Description: Writes 'Hello World' to the screen. */ /* */ /* Date: 10/10/1998 */ /* */ /* Change History: */ /* */ /* 10/10/1998 Module creation by RF */ /* */ /****************************************************/ Reference any header files required by this source file - in this case iostream.h as we use cout. /****************************************************/ /* Header files */ /****************************************************/ #include <iostream.h> Constants used in this source file - in this case there are none. /****************************************************/ /* Constant definitions */ /****************************************************/ /* -- none -- */ Functions declared within this source file, in this case none other than the special function main. /****************************************************/ /* Function prototypes */ /****************************************************/ /* -- none -- */ Describes the purpose of the function. /****************************************************/ /* */ /* Function name: main */ /* */ /* Description: Main function of the program. */ /* */ /* Parameters: none */ /* */ /* Returns: none */ /* */ /* Change History: */ /* */ /* 10/10/1998 Function creation by RF */ /* */ /****************************************************/ void main () { cout << "Hello World\n"; } #includeprovides access to library routines all programs must have a function main () ;terminates statements coutsends output to the screen ""indicates a string literal \nprints a newline C++ is case sensitive { }marks the beginning and end of program blocks (functions, loops, etc.) Operate the preprocessor Before converting source to object code the compiler will execute the preprocessor. The preprocessor performs preliminary operations on C++ files before they are passed to the compiler. The preprocessor allows you to: Define and undefine macros. Expand macros. Conditionally compile code (i.e. direct the actions of the compiler during compilation). Insert specified files. Specify compile-time error messages. - Apply machine-specific rules to specified sections of code. Instructions to the preprocessor are proceeded by a #, e.g. #include The #include directive tells the preprocessor to treat the contents of a specified file as if those contents had appeared in the source program at the point where the directive appears. Usually this is used to reference the header files of libraries, for example iostream.h, which consist of a series of prototypes, one for each function supported by the library. By including the header file the compiler will recognise the functions called later within the source file, checking that they are being used correctly. To indicate to the preprocessor where the filename starts and ends < > are employed, with < marking the start and > the end, for example #include <iostream.h>. The #define directive permits meaningful names to be assigned to constants in your program. For example, the statements #define RED 2 and #define BLUE 3 permit the programmer to use the terms RED and BLUE freely throughout the source code wherever the values 2 or 3 are expected. When the preprocessor parses the source file all occurrences of the name are replaced with their value (i.e. all instances of RED become 2). Declare variables of an appropriate data type There are two fundamental data types in C++, real for numeric values with decimal parts and integral for whole numbers and characters. Examples of reals include, float and double, with the type determining the number of bytes used to hold the variable and thus the precision and range of values the variable can hold. The actual number of bytes used depends on the computer system. Values used in complicated calculations that must be exact to several decimal places, such as 12.4736, are stored in variables of type float. Note, it is entirely possible to store whole numbers, such as 12.0, in floats. A float declaration would appear as: float fNumbmer; Integrals include int, char, and long again with the type determining the number of bytes used to hold the variable. The actual number of bytes used depends on the computer system, except for variables of type char which always hold 1 byte. Characters, for example 'a', are stored in variables of type char, while integers, such as 47, are held in int variables. Declaration of integers and characters appear as: int iNumber; char cCharacter; The following code fragment illustrates the use of variables. First the source code allocates two areas of memory to hold integer values: int iFirstNumber; int iSecondNumber; Next, the fist variable is assigned the value 17. Then the contents of the first variable are copied to the second: iFirstNumber = 17; iSecondNumber = iFirstNumber; which has the effect of allocating the value 17 to both variables. Within programs it is often necessary to refer to constant (or literal) values, such as p or the name of a person. Unlike variables, constants can not be changed by the operation of a program - they are fixed until the source code is changed and re-compiled. For example, the following code fragment sets the variable fDiameter to fRadius multiplied by 3.142. No matter what value is contained in fRadius the program will always use a multiplier of 3.142, the only way to change this is to modify the source code and recompile the program. float fDiameter; float fRadius; ... fDiameter = 3.142 * fRadius Besides including real values, such as 3.142, in source code it is possible to declare variables as constants through the const keyword. Such variables are assigned a value at creation, but can not be changed later, for example: float fDiameter; const float fPi = 3.142; float fRadius; ... fDiameter = fPi * fRadius When writing programs it is often necessary to handle characters and strings. A char is a single byte used to store a numeric representation of a character, for example the character 'A' would be stored in the variable as 65, B as 66, etc. The following code declares a character variable and loads it with the letter 'A': char cCharacter; cCharacter = 'A'; Note that the variable is assigned the value 'A', letters in '' are treated as characters. It is not permissible to have more than one character between ''. A string is a sequence of characters, for example "Rosetta". C++ does not provide a specific data type to hold strings, instead an array of chars is employed, an array being a series of contiguous memory locations. Arrays can exist for any data type and are denoted by [x], where x is the number of items to store in the array. The following code declares an array of 10 characters and loads it with some text, note strcpy is a function provided by string.h: #include ... char cCharacters [10]; strcpy (cCharacters, "Rosetta"); In the example above the function strcpy copies the contents of a string literal ("Rosetta") to a string variable (cCharacters). The double quotes indicate to the compiler that a string is being referenced (remember, single quotes indicate a single character). Write and use functions All executable code within C++ programs are contained within functions. Even the simplest programs, as outlined above, contain at least one function called main (). The main function is the entry point to all C++ programs, but is not supplied by the compiler - a developer must provide it. A function is typically a short piece of named code (sometimes referred to as a routine) which performs a simple, well defined action such as taking two numbers, multiplying them together and returning the result to the calling code. Functions may call other functions (or even themselves) but may not contain the definitions of other functions within themselves. All functions, other than main (), must be known to the compiler before they are used within a source file. Unfortunately this is not always possible, either because you do not have access to the source code which defines the function (as in the case of library functions) or because you do not wish to place the function before it is first used within a file. To solve this problem C++ permits the use of function prototypes. A function prototype describes the function to the compiler, but does not actually provide the implementation - it is an indication of what is to follow. Note, when including header files for libraries (e.g. iostream.h) the developer is providing a number of function prototypes (they are contained by the header file, the preprocessor expanding them into the source file). Supposing we have a function that displays a message on the screen. The function takes no parameters and returns no value, its prototype would thus be: void vDisplayMessage (); The ; immediately after the closing bracket indicates that this is a prototype. If there was an opening { then this would be the start of the function definition itself and not just a prototype. Over time the requirements of vDisplayMessage change, it must now be capable of taking a parameter (in this case a number). This number will indicate which message to display (1 for "hello", 2 for "goodbye"). The function prototype changes to: void vDisplayMessage (int iMessageNumber); If the function prototype and definition are modified, but uses of it with the program are not changed, the compiler will generate compilation errors until the usage matches the definition.
https://www.gsys.biz/resources/7261-229/components-of-a-source-file
CC-MAIN-2018-30
refinedweb
1,478
52.8
On 05/16/2012 03:01 PM, Andreas Färber wrote: Am 16.05.2012 14:36, schrieb Igor Mammedov:On 05/11/2012 01:26 PM, Andreas Färber wrote:Am 11.05.2012 13:22, schrieb Peter Maydell:On 10 May 2012 01:14, Andreas Färber<address@hidden> wrote:Eliminates cpu_state_reset() usage. Signed-off-by: Andreas Färber<address@hidden> --- linux-user/main.c | 2 +- linux-user/syscall.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/linux-user/main.c b/linux-user/main.c index 191b750..49108b8 100644 --- a/linux-user/main.c +++ b/linux-user/main.c @@ -3405,7 +3405,7 @@ int main(int argc, char **argv, char **envp) exit(1); } #if defined(TARGET_I386) || defined(TARGET_SPARC) || defined(TARGET_PPC) - cpu_state_reset(env); + cpu_reset(ENV_GET_CPU(env)); #endif thread_env = env; diff --git a/linux-user/syscall.c b/linux-user/syscall.c index 20d2a74..539af3f 100644 --- a/linux-user/syscall.c +++ b/linux-user/syscall.c @@ -4262,7 +4262,7 @@ static int do_fork(CPUArchState *env, unsigned int flags, abi_ulong newsp, /* we create a new CPU instance. */ new_env = cpu_copy(env); #if defined(TARGET_I386) || defined(TARGET_SPARC) || defined(TARGET_PPC) - cpu_state_reset(new_env); + cpu_reset(ENV_GET_CPU(new_env)); #endif /* Init regs that differ from the parent. */ cpu_clone_regs(new_env, newsp); --Do you have any plans to try to rationalise the handling of reset so that we consistently either do or don't reset the cpu here, rather than having it done based on a TARGET_* ifdef ?Igor had an RFC for x86; sparc and ppc reset I haven't looked into yet. Cc'ing Alex and Blue.I'll rebase RFC for x86 and post patches today and will remove it from here by the last patch in patchset so that when this patch applied we could remove unnecessary call. So ACK for target-i386 here.Since back then Peter and I have discussed whether we can rather just remove the #ifdef here and reset for all targets. Unfortunately I'm still not clear about some patches that stand in the way of ObjectClass::realize - if cpu_reset() is moved to realizefn for all targets then we can just call realize here. 1. I'd like to have cpu_reset in realizefn - which is kind of equivalent of cpu power-on, after which cpu should be in known state (i.e. the state after reset, at least for target-i386). 2. cpu_reset in realizefn as well will free us from calling cpu_reset in device_add when implementing hotplug and will allow to remove it from hw/pc.c. 3. regarding exec.c:cpu_copy and do_fork on target-i386 cpu_copy first creates cpu then copies all over it CPUArchState of original cpu perserving only cpu_index. It's beyond my understanding why anyone would/need do this. So I'll not touch cpu_reset in do_fork since I haven't a clue what's going on. Albeit adding cpu_reset in realizefn shouldn't break anything here. Actually, all we'd need is ObjectClass::realize field, so I'm considering extracting the intersection between Paolo and me, stick a CPU-specific wrapper method on top as requested by Anthony and then we can move ahead here... Andreas -- ----- Igor
https://lists.gnu.org/archive/html/qemu-devel/2012-05/msg02286.html
CC-MAIN-2019-30
refinedweb
524
56.55
The Rigidbody2D attached to the Collider2D. Collider2D are automatically attached to a Rigidbody2D on the same GameObject as the Collider2D or if none is present then on a Rigidbody2D on the nearest parent GameObject. The property will be null if no Rigidbody2D is attached. In this case, the Collider2D is attached to a hidden body known as the ground body that lives at the world origin as is set to be RigidbodyType2D.Static. No reference to this hidden body is available however. See Also: Rigidbody2D, RigidbodyType2D. using UnityEngine; using System.Collections; public class ExampleClass : MonoBehaviour { public Vector2 force = Vector2.up; void Start() { // Apply a force to the rigidbody attached to the collider. GetComponent<Collider2D>().attachedRigidbody.AddForce(force); } }
https://docs.unity3d.com/es/2019.3/ScriptReference/Collider2D-attachedRigidbody.html
CC-MAIN-2021-17
refinedweb
117
50.63
15 July 2013 09:00 [Source: ICIS news] LONDON (ICIS)--Germany-based Brenntag once again leads the annual ICIS Top 100 Chemical Distributors listing ranked by 2012 sales, ICIS Chemical Business (ICB) magazine unveiled on Monday. Brenntag, which also topped the ranking last year, reported $12.8bn in sales in 2012. US-based Univar was second in the list with $10.3bn in revenues, while Germany-based Helm took third spot at around $7bn in sales with US-based Nexeo Solutions in fourth with sales of $4.1bn. “Each year we strive to compile the most comprehensive list of global chemical distributors – a critical link in the supply chain for buyers and sellers of chemicals. This year, we received a record number of entries,” said Joseph Chang, global editor of ICB. The ICIS Top 100 Chemical Distributors is a global ranking based on total sales. Separately, it also lists leaders in key geographies such as North America, ?xml:namespace> The listing also goes beyond the Top 100 companies by sales. This year ICB provides details on 213 chemical distributors around the world. A new feature this year includes data on sales from trading activities as opposed to traditional distribution. ICB defines “Chemical distributors have continued to grow despite challenging macroeconomic conditions in many regions. This shows just how vibrant and innovative this sector has been in dealing with the downturn,” said Will Beacham, deputy editor of ICB. Currency conversions to US dollars for the ranking were based on year-end 2012 exchange rates. The ICIS Top 100 Chemical Distributors ranking is available for download
http://www.icis.com/Articles/2013/07/15/9686875/brenntag-again-tops-icis-top-100-chemical-distributors-list.html
CC-MAIN-2014-15
refinedweb
264
55.44
From: Eric Woodruff (eric.woodruff_at_[hidden]) Date: 2008-03-19 00:21:57 I have a question about xsltproc.jam. It states: # This module defines rules to apply an XSLT stylesheet to an XML file # using the xsltproc driver, part of libxslt. # # Note: except for 'init', this modules does not provide any rules # for end users. What does that mean? Does that mean I shouldn't use it? I'm having a problem getting it to work via a simple: import xsltproc ; make header.h : source.psmc schema/header.xsl : @xsltproc.xslt ; I get the following problem and haven't been able to find anything solution referencing anything similar: xslt-xsltproc ../../myproj/catalogs/bin/gcc-4.1.1/debug/header.h cannot parse <p../../myproj/catalogs>../catalogs/schema/header.xsl "xsltproc" --xinclude -o "../../myproj/catalogs/bin/gcc-4.1.1/debug/header.h" "<p../../myproj/catalogs>schema/header.xsl" "../../myproj/catalogs/source.psmc" Where did the "<p" come from? Thanks in advance. I hope I haven't missed something fundamental here, but I may have as I've only been experimenting with Boost.Build for a few days now. I know I could just write a simple actions to call xslt like the Makefile I'm attempting to port, but that is not as desirable as using a built-in rule set. Eric Boost-Build list run by bdawes at acm.org, david.abrahams at rcn.com, gregod at cs.rpi.edu, cpdaniel at pacbell.net, john at johnmaddock.co.uk
https://lists.boost.org/boost-build/2008/03/18597.php
CC-MAIN-2021-49
refinedweb
251
61.83
Opened 4 years ago Closed 4 years ago #21170 closed Bug (needsinfo) Clearing DatabseCache doesn't work with Oracle backend. Description I have one row in my oracle cache table. I'm trying to clear it using standard django way: from django.core.cache import cache cache.clear() But it doesn't work! The row is still in my cache table. So I run python manage.py sell and put some code from DatabaseCache.clear() method: from django.db import connections table = connections['cache'].ops.quote_name('ws_cache_table') cursor = connections['cache'].cursor() cursor.execute('DELETE FROM %s' % table) But it doesn't work either... I don't get any exceptions thrown, my 'cache' connection is configured correctly in settings.py. When I open SQL Developer and put DELETE FROM ws_cache_table Table gets truncated correctly. On the other hand, when I add: connections['cache'].commit() I get exception django.db.transaction.TransactionManagementError: This code isn't under transaction management thrown but the table is truncated now. Change History (6) comment:1 Changed 4 years ago by comment:2 Changed 4 years ago by OK, so you say this is only a problem for Django < 1.6, correct? comment:3 Changed 4 years ago by Yes, I think so. Adding tests might be a good idea so that we could actually verify that this works in 1.6 & master. comment:4 Changed 4 years ago by Marking as accepted. Only tests should be needed. Lets not worry about fixing this in 1.5. comment:5 Changed 4 years ago by Which tests would these be? There is a test for clearing the cache in tests/cache/tests.py, it is run also with a DBCache backend, and so is also run with Oracle whenever we run the full test suite -- which, AFAICT, currently passes for Oracle on 1.6 and master. As far as I understand, there is nothing to solve here for Django>=1.6. comment:6 Changed 4 years ago by So we're not fixing for pre-1.6; and there seems to be no problem for 1.6 and up. If anyone sees a problem, or even wants to add a test for 1.6, feel free to reopen. Weirdness of old Django transaction management is the reason for the last error. You get exception and the commit both in one call. You can use commit_unless_managed() to just get a commit. To me it seems that every writing operation should to commit_unless_managed() in 1.5. 1.6 should work automatically - either you are in autocommit mode which means every operation is committed automatically, or you are inside an atomic block in which case the transaction is going to be committed at the end of the block.
https://code.djangoproject.com/ticket/21170
CC-MAIN-2017-34
refinedweb
457
68.97
So here is the deal: The program below is intended to find the arithmetic mean of the numbers stored in the array q in two ways: once by storing the numbers in an ArrayList d, where you allow all the necessary conversions to be performed automatically; and once by storing them in an ArrayList e, where you perform all the conversions by hand. Complete the program. Here is what I have so far: Code Java: double[] q = { 0.5, 2.4, 7.4, 2.8, -6.2 }; ArrayList<Double> d = new ArrayList<Double>(); ArrayList<Double> e = new ArrayList<Double>(); for ( double x : q ) { d.add( x ); e.add ( new Double ( x ) ); } double dTotal = 0.0, eTotal = 0.0; for (double c : d) { double a += c; } for (double f : e) { double b += f; } return (dTotal / d.length); return (eTotal / e.length); --- Update --- I switched it a little bit. It still gives me the same error: Code Java: --- Update --- Why does it still show "a / d.size?" I thought I fixed that. Whatever, it's supposed to be "dTotal / d.size()", etc.
http://www.javaprogrammingforums.com/%20whats-wrong-my-code/35960-exercise-147-a-printingthethread.html
CC-MAIN-2016-22
refinedweb
180
75.71
StateNode that executes a LedMC motion command and posts a status event upon completion. More... #include <LedNode.h> StateNode that executes a LedMC motion command and posts a status event upon completion. Extends MCNode slightly so that each time the LedMC is accessed, any flash commands are reset. This allows a flash to be triggered each time the node starts Definition at line 11 of file LedNode.h. this default constructor, use type name as instance name Definition at line 14 of file LedNode.h. constructor, take an instance name Definition at line 17 of file LedNode.h. Definition at line 19 of file LedNode. Reimplemented from MCNode< LedMC >. Definition at line 20 of file LedNode.h. extends MCNode implementation so that each time the LedMC is accessed, any flash commands are reset. Definition at line 24 of file LedNode.h. Referenced by LedActivate::LedActivate(). stores time of last call to getPrivateMC() for resetting flash commands Definition at line 34 of file LedNode.h. Referenced by getPrivateMC().
http://tekkotsu.org/dox/classLedNode.html
CC-MAIN-2016-30
refinedweb
167
68.36
Fallout 3 FAQ/Walkthrough by imadeaguide Version: 1.35 | Updated: 12/02/08 | Search Guide | Bookmark Guide Fallout 3 Walkthrough and FAQ Written by: Nick Bartosic This file is Copyright (c)2008 Nick Bartosic. All rights reserved. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Table of Contents ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1. About Me 2. The Guide 3. The Game 4. Fallout 3 Tips 5. Walkthrough 5.1 Baby Steps 5.2 Growing Up Fast 5.3 Future Imperfect 5.4 Escape! 5.5 Following in His Footsteps 5.6 Galaxy News Radio 5.7 Scientific Pursuits 5.8 Tranquility Lane 5.9 The Waters of Life 5.10 Picking Up the Trail 5.11 Rescue from Paradise 5.12 Finding the Garden of Eden 5.13 The American Dream 5.14 Take it Back! 6. Optional Quests 6.1 The Wasteland Survival Guide 6.2 The Replicated Man 6.3 Big Trouble in Big Town 6.4 Strictly Business 6.5 Tenpenny Tower 6.6 The Power of the Atom 6.7 You Gotta Shoot 'Em in the Head 6.8 Trouble On the Homefront 6.9 Those! 6.10 The Superhuman Gambit 6.11 The Nuka-Cola Challenge 6.12 Head of State 6.13 Blood Ties 6.14 The Oasis 6.15 Stealing Independence 6.16 Reilly's Rangers 6.17 Agatha's Song 7. Freeform Quests 7.1 Angela and Diego 7.2 Super Mutant Attack on Big Town 7.3 Freeing Cherry 7.4 Charon's Contract 7.5 Republic of Dave Election 7.6 Evergreen Mills 7.7 Kidnap Order 7.8 Lamplight Fungus Trade 7.9 Grady's Last Recording 7.10 Hubris Comics Printing 7.11 Canterbury Commons Merchant Contract 7.12 Old Olney 7.13 The Nuka-Cola Clear Formula 7.14 Chinese Rifles, Pronto! 7.15 Lincoln's Artifacts 7.16 National Archives Guess and Win 7.17 Sydney and the Ultra SMG 7.18 Sheet Music for Agatha 8. Party Members 9. Schematics 10. Bobble Heads 11. Equipment 12. Mini Nuke Locations 13. Caravan Traders 14. FAQ 15. Credits 16. Copyright Notice 17. Contact Information ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ About Me ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ This is my third FAQ/Walkthrough of any kind on GameFaqs. I also wrote the Thieves Guild and Mage's Guild FAQs for Oblivion. I know it would seem I'm a bit of a Bethesda fanboy considering Bethesda made both Fallout 3 and Oblivion, but I've been a Fallout fan for many years, since the original games came out over 10 years ago, so I've been waiting for this game for a very, very long time. Aside from playing Fallout 1 and 2, I also played Fallout: Tactics and Fallout: Brotherhood of Steel, although I didn't play the later extensively. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ This Guide ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Version 0.2 November 2, 2008 Began writing introductions Added Contact and Copyright information Version 0.5 November 3, 2008 Added information to Walkthrough and Optional Quests November 4, 2008 Version 0.6 Added information to Optional Quests Version 1.0 November 5, 2008 Finished quests in Walkthrough, uploaded version 1.0 Version 1.1 November 7, 2008 Added Big Town and Tenpenny Tower optional quests Began listing Equipment and roaming Trader information Version 1.2 November 10, 2008 Added some Freeform Quests and Optional Quests, added some info to Walkthrough. Added some Weapons/Armor and sorted Weapons. Started adding Mini-Nuke, Schematic, and Bobble Head info. Version 1.25 November 14, 2008 Updated some more info in the main walkthrough, added a few quests Corrected an issue where I didn't include a main quest by name Version 1.30 November 17, 2008 Added info to everything but the Main Walkthrough. Version 1.35 December 2, 2008 Finished Optional quests section, added equipment, some Mini-Nuke info. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ This Game ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Version 1.0 October 28, 2008 Bethesda releases Fallout 3 for the PC Version 1.0.0.15 November 6, 2008 Bethesda releases patch for Fallout 3, fixes some crashing issues ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Fallout 3 3,. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Walkthrough ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ *****Quest 1: Baby Steps***** You've started a New Game, watched the opening cinematic, and you're ready to decapitate some raiders. Unfortunately, first you must go through the arduous task of customizing your character, fun for some, boring to others. You've been born; you get to see your father for the first time apparently, and your mother's right leg. Choose whatever sex/facial features you like. Your gender will affect some basic things about the game, but it seems it doesn't influence as much as it once did in past Fallout games. Once you've chosen your looks, we immediately get some bad news, then a flash of light... After the flash of light, we fast-forward to one year later. You're a baby in the vault, this is your first tutorial of the game and will teach you how to move, fairly basic. Walk forward to your father in the pen, objective complete. After walking to your father he'll take off and say he'll be back later, locking you in the play pen. Being the baby genius that you are, you're going to escape the minute his back is turned. Walk over to the gate on the pen and hit your action key, whatever it may be. Another simple task, they don't get much better than this! After two easy objectives, you're given possibly the most frustrating one for your third. It's frustrating for me, anyway. Once you've escaped the pen, head over to the toy box on your left. On the floor you'll find a children's book, use your action key to pick it up. Flip through the pages while it explains the S.P.E.C.I.A.L. parameters, being Strength, Perception, Endurance, Charisma, Intelligence, Agility, and Luck. Coincidently, after playing Fallout for as many years as I have, I can't believe I never read my character sheet sideways to see "SPECIAL." You have so many points to work with, 40 I believe, which averages out to 5 points on each stat if you like, plus 5 points to distribute elsewhere. Most people won't roll with average stats, most people customize these to their own personal tastes or a play style for specialized runs like Melee, Sniper, Diplomat, Thief, etc. Also, if you plan on collecting all the bobble heads in the game, I don't suggest putting over 9 points in any one stat as you can only have a max of 10 points in a stat permanently (I believe you can go over this value through drug enhancements). I've used information from Fallout.Wikia.com to outline the stats below : Strength: Affects Melee/Unarmed attack damage, as well as your carry weight. For every point in this, you gain an extra 10 pounds of total carrying weight. Your base carry weight is 150, plus 10 lbs. for each point. Each point in strength also adds .5 to your melee damage and +2 to your Melee Weapon stat. Perception: This affects what you can see/hear, so this affects Energy Weapons, Lockpicking, and Explosives skills. Each point in Perception will add +2 points to each of these skills. Perception also factors in when you see the grenade arrows appear during combat. Endurance: This affects your hit points as well as your resistance to radiation and poison effects. This also appears to affect your ability with Big Guns and Unarmed attacks. Each point in Endurance will add 20 points of health to you, and +2 points to Big Guns and Unarmed. Charisma: Charisma involves your dealing with other people, so naturally the skills tied to this are Barter and Speech. For every point in Charisma you get +2 to each of these skills. This will also come into play in some dialogue options. Intelligence: One of the most important stats in the game, it affects Science, Medicine, and Repair. Along with that, Intelligence also determines how many skill points you get each level, which is huge. For every point in Intelligence you get +2 to Science, Medicine, and Repair, and +1 skill points at level up (A maximum of 20 total points when you have an Intelligence of 10). Agility: This used to be a huge stat in previous Fallout games. It's still important, just not as much in my opinion. Agility affects the number of available points in VATS mode, and also your Small Guns and Sneak skills. For each point in Agility you'll get +2 to these skills, and +2 to Action Points for Vats. Your base AP in Vats is 65, so with 10 Agility you would have a max of 85. Luck: This parameter used to affect Critical Chance, random encounters, and various other things in previous Fallout games. Now it appears to affect Crit Chance and all skills, that's it. Luck does not affect any one stat, but it will increase all skills by +0.5 for each point in it. Also, each point in luck will increase your Crit Chance by 1, to a maximum of 10% Crit Chance. There are many ways to build your character, the great thing about Fallout is theres no wrong way to build your avatar. You want to pound things with your fists? Put points in Strength and Endurance. Want to shoot things from a distance? Perception and Agility is a good combo. Want to talk your way out of situations? Charisma and Intelligence. Personally, I go for head shots with rifles, so my build is usually something like: 5 Strength, 7 Perception, 6 Endurance, 6 Charisma, 8 Intelligence, 7 Agility, 1 Luck (Not a Luck person, if you can't tell. Better to be good than lucky sometimes). In any event, choose what you like, try not to worry about it too much though. You'll have an option to tweak these choices later on if you wish, and theres plenty of opportunities to add to points through enhancements and perks later on. When you're done, accept your build. You'll then have a few seconds to run around the room, pull toys out of the toy box if you wish. Your father will eventually come into the room. He'll point out your mother's favorite passage, Revelations 21:6. Just follow him out of the room, eventually he'll lead you away to play with Amata, then you get another flash of light. *****Quest 2: Growing Up Fast***** This quest doesn't determine much about your character's skills or stats, but has more to do with learning about the conversations in the game, and how to shoot. Fast forward 9 years, you're now 10, Happy Birthday! Gosh, just 5 minutes ago it seems like you were born =) Anyway, at age 10 every Vault inhabitant receives their Pip-Boy 3000 from the Overseer, congrats. Learn to use this thing, within the Pip-Boy you'll do all your menu-intensive things: sorting inventory, viewing maps, fast travel to locations, view stats and karma, you name it. After receiving your Pip-Boy you can now talk to the various guests at the party and make some contacts. You see Amata face to face for the first time, she's one of your friends. She has a present for you, an issue of Grognak the Barbarian. If you read this item from your Pip-Boy, it will increase your Melee Weapon skill by 1. No matter what option you pick from Amata, you'll still get the comic, so insult her if you like. After talking to Amata you can speak to Old Lady Palmer. She'll give you a sweet roll, despite your replies as well. You can speak to Wally Mack or Freddie, but they don't have much to say, they'll later become part of the "Tunnel Snakes" gang, which brings us to Butch. Sometime during the party, Andy the Mr. Handy robot will cut the cake...but he doesn't do a very good job (He appears to have problems frequently with cutting things). Butch will be pissed he didn't get any cake, and demands your sweet roll from Ms. Palmer. There are a few things you can do here, you can be polite and share it, you can pick a fight with Butch, or you can spit on it and give him the Sweet Roll. If you decide to pick a fight with Butch, Amata and Officer Gomez will sympathize with you afterwards. Theres not much else you can do here. You can grab a party hat off the table. You can also talk to Stanley and receive a baseball cap, but not much point to either of these items. Eventually you'll need to speak to your father, he lets you know he has a surprise for you. He speaks to his friend, Jonas, then instructs you to go to the Reactor room for the surprise. You'll bump into the creepy Beatrice if you go out the same diner door your father leaves. She'll give you a birthday poem you can read in your Pip- Boy...yeah...its interesting. You can go straight to the reactor room, or you can go past that and up the stairs to overhear the Overseer complain about your stupid little party and what he thinks of it. The security guard he speaks with has 2 Stimpacks on him, and you won't take a Karma hit for stealing them. No one else at the party has anything to steal. Eventually, make your way to the Reactor Room, you should have seen a sign for it after leaving the mess hall. You'll see Jonas there, after some brief dialogue he'll see your father coming. Your father's surprise is a BB gun, sweet! Choose whatever option you like, he'll give it to you anyway. Your father will then lead you to a special location where you can practice shooting. Not too tough, this just gets you used to the system. Hit the three targets, or hit one target three times, whatever you prefer. After this, a Radroach will spawn. Your father asks you to try and hit the Radroach. You can target it the same way you hit the inanimate targets, manually aim and pull the trigger, or you can hit the Radroach in VATS mode. VATS mode is something totally new to a FPS game, but very familiar to Fallout Veterans. In VATS mode you can specifically target various body parts of a target, or cycle through multiple targets. Using your action points, you have the ability to make 1 or more shots in VATS mode, the more action points you currently have, the more shots you can take. Each attack will have a percentage chance based on your distance from the target AND the availability of the location you're trying to hit. For example...if you're trying to head shot a super mutant from close range, normally you would have a high percentage chance to connect. If the super mutant happens to be swinging a sledgehammer at the time though, the hammer may be blocking part of his face making it difficult to make the shot at that time. VATS targeting has its benefits. For moving targets, it can make it easier for you to do things such as shooting weapons out of target's hands. It will be easier to get head shots, and easier to cripple certain limbs. This can help save on ammo, as well as save on your health. Targets can still hit you while you're firing in VATS mode, but nothing will be attacking you when you're targeting. VATS mode is also fun for viewing the gory deaths in slow motion! Once you've blasted the Radroach, your father asks to have his picture taken with the "Big Game Hunter." Jonas will snap the shot, the flash fades and... *****Quest 3: Future Imperfect***** This is your last tutorial quest, and will determine what your starting skills will look like. Fast-forward another 6 years, you're now 16 and must take your G.O.A.T, Generalized Occupational Aptitude Test, with the other children. Everyone is told to take this test, so despite your best attempt at getting out of it by playing sick, your father asks you to go. You can ask your father various questions before you go, some about your mother I believe, but none of these will ultimately change anything, just adds to the immersion which is enjoyable. Before you leave, be sure to grab your first bobble head off your father's desk, the Medicine doll which increases your Medicine skill by 10. Theres not much else of value to swipe in the area. Theres some stimpacks on the table in the next room. You can view your father's computer terminal, read some of the patient files which are interesting. You're already getting some important insights to the Overseer and others. You can speak to Jonas and Stanley, but they don't have a lot to say. If you walk into the hallway you'll see Butch and his "gang" of Tunnel Snakes harassing Amata. You have a few options here. You can help Amata out by trying to talk Butch and his thugs out of torturing the poor girl, you can try to be the top dog and intimidate Butch, or you can take the negative Karma route and point out to Butch that Amata is sensitive about her weight (Despite the fact she's skinny). Choose your path, theres good karma or bad karma to be had here. When you're done, head into the classroom to take the G.O.A.T. The G.O.A.T. exam affects your skills, based on the answers given the game will choose what tags it thinks you should have starting out. Fear not though, if you feel the game is off-base in its choices, or feel like you want to choose something else, you can always alter your test. If you want, you can also try and talk your teacher into letting you skip the test, meaning you choose your own 3 tag skills and bypass the questions. The questions are fun though, I suggest you take the actual test at least once! In past Fallout games, Tag skills usually meant that you got 2x the skill points for each skill point you dropped into a Tag skill, not anymore though. Your tag skills only receive a one time bonus of 15 points, and no bonuses afterwards. This is still important, however, as these will be the skills you're most proficient in starting out. I suggest usually taking one combat skill, like Small Guns or Melee Weapons, taking a communication skill, either Barter or Speech, and taking a trade skill, such as Repair or Lockpick. Feel free to take whatever you like. Once you've solidified your 3 Tag skills, and remember you can change these one time later on, leave the class room and you'll encounter one more flash of light. Congrats, you're done with the Tutorial quests! *****Quest 4: Escape!***** You're rudely awakened by Amata. Its 3 years after your G.O.A.T, making you 19 now. She informs you on various items, your father has left Vault 101, Jonas is dead, and the Overseer has his goons looking for you now...smashing. You determine that your next move is to escape, if you choose to extract revenge on the Overseer that's your call, it'll bring negative Karma though. If you offer to take Amata's help in escaping, she'll offer you a 10mm Pistol, you can take it if you want, but it's not required. Be sure to check the room around you, as theres various items you can take. Be sure to check the drawers, as all the stuff you previously collected as a child will be there: your baseball cap, any stimpacks, BB gun, etc. Theres also a baseball bat, ball, and glove in the room, the bat may come in handy as it's more powerful than a Police Baton. If you chose not to accept Amata's help in escaping, you can still pickpocket the 10mm gun from her. To pickpocket, go into Sneak mode, walk up behind her and click your action key/button. If you're successful, you'll take the item and she won't have a clue. If you're not successful, you'll get nothing and she'll scold you. Either way, you'll get negative Karma, Karma sees EVERYTHING. When you head out of the room, one of the Overseer's lackeys will spot you, but he'll quickly become overrun with Radroaches. You can use this as an opportunity to run/sneak away, or you can use this as an advantage to kill him. You can try to help him by killing the Radroaches, but he'll eventually just attack you afterwards. The Vault is pretty linear at this point, most of the doors are inaccessible. As you head down the hall, you'll run into your "buddy" Butch. He'll tell you that his mother is being attacked by Radroaches and he asks for your help. You'll have more options here. You can tell him you'll help her out, kill the roaches, and he'll make you an honorary Tunnel Snake by giving you his jacket. You can also boost Butch's confidence and talk him into helping her instead. Finally, you can tell Butch that the irony is bittersweet and leave his mom to die. If you're really bad, you can kill Butch and leave his mom to die still. If you do choose to save her, you'll have to move quickly. You should be able to see Butch's mom through the window in the hallway, but there isn't a doorway to her room from the hall. You'll have to enter an adjacent room to get to her. The Radroaches aren't tough at all, a swing or two of your bat should be all that's required to bring them down. If you killed the Security Guard you ran into earlier, hopefully you equipped his helmet and armor. Talk to Butch and his mother if you decided to be heroic. You can check out the diner, theres a dead body here with some items and more roaches, kill them for the experience. Keeping following the hallway and you'll run into Officer Gomez. Even if you've been bad up till this point, Gomez will let you off the hook and won't attack, no other guard will give you such a luxury though. If you continue you'll run into Andy and Stanley. Andy will be busy torching Radroaches with his flamethrower attachment, you cannot take this though =) Stanley doesn't want to turn you in, he just wants to stay out of trouble. You can head into the room near where Andy was torching Radroaches. There should be a few stimpacks on the floor, be sure to take these. If you didn't get the bobble head earlier, this may be your last chance to do so. Your lockpick skill probably won't be high enough, but if it is you can lockpick your mother's Bible quote to find some goodies hidden behind the verse. When you're done, head to the Atrium. When you enter the Atrium, you'll notice a young couple (Or brother and sister, I'm not sure) talking. The male, Tom Holden, says he's been inspired by your father leaving the Vault, and says he's going to do the same. He makes a break for the door, only to be shot down by the security guards. The female, Mary Holden, runs towards the scene afterwards, only to be shot down as well. Obviously some screwed up stuff is going on here, this Vault will never be the same. You can run in and kill the guards yourself, or you can try to sneak past their vision. They're not incredibly tough, do as you wish. In any event, the door behind them should be well out of your Lockpick reach, so you'll have to find another route out. The only option is to head through the other door, which is attempting to close but cannot. Head up the stairs, kill a few Radroaches. You'll notice a Vault resident yelling at you through some glass. You'll get attacked by a few guards, waste them by any means available. You'll be in a large room at this point, a catwalk suspended off the ground in an "H" shape. If you peer at the large, circular glass window you can see the Overseer's office. Before you can get there, you'll need to decide Amata's fate. In the next available room past the catwalk you'll see Amata being harassed/beaten by a guard. You can kill the guard to free her, or you can keep walking by. If you kill the guard, you can confront the Overseer in the same room. The good karma path is to kill the guard, saving Amata, and don't kill the Overseer. Feel free to call him a bad person, if you so choose. You can kill the Overseer, but this will upset Amata despite her agreeing that he's nuts. Also, you can choose to speak to the Overseer here. He'll say you can relinquish your weapons, and all will be forgotten...fat chance. He'll take your weapons and then attack, so don't bother with this option. Feel free to tell him he's a jerk. You can find a few items in this room among lockers and whatnot, namely ammo and stimpacks. If you saved Amata you can get the Overseer's Office Key. If you didn't, no worries, theres another coming up shortly. After saving/ignoring Amata, continue on. In the next room you'll see the corpse of Jonas. Theres random items among the desks and lockers in this area, I found a lot of pre-war money. Take any items off Jonas's corpse you want, he'll have a holotape from your father, check that out. His lab coat adds +5 to Science, which will aid in hacking any computer terminals later on. At the end of the hallway you'll find a path to the left and to the right. The path to the right leads to the Overseer's room, we don't want to go here yet. The path to the left leads to Amata's room and the Overseer's personal room. Feel free to loot both before you go, Amata's room has 5 bobby pins, the Overseer's has some 10mm ammo and the key to his office if you didn't get it before. Open the door to the Overseer's office using the key. If you didn't get the key, you'll have to use your Lockpick skill. You'll see his terminal and a container, there is a secret exit here too. Check the container to find his technical password if you didn't happen to find it earlier. Check the terminal, if you didn't get the technical password you'll have to use your Science skill to "hack" the terminal. Once you're inside, you should be able to read various reports and information. For vets, some of this will be old information such as info about G.E.C.K.s, for others this will be new info. The Overseer has also chronicled his opinions on various Vault individuals, such as your dad and Amata. Finally, you can open the secret escape route to the Vault door. Head down the stairs toward your freedom. You may encounter a few Radroaches along the way, no biggie. You'll have to hit a switch and go through a few doors, but eventually you'll find yourself in a small room looking out into the Vault 101 entrance. Hit the yellow control pad to open the gate. Alarms will start going off, and you'll notice Amata rushes down the stairs. She'll come down regardless of the fact if you saved her or not, and if you killed her father or not. Two final security guards will come with her as well and attack, be sure to take them out. If you decide not to take the guards out, they'll whip her once you leave. Take the experience and their goods, wax them. Say your goodbyes to Amata, then head out the door. The door will shut, you're now locked out of Vault 101. *****Quest 5: Following in His Footsteps***** Alright, so now you're alone. You've been kicked out of your home after 19 years. You're in a wasteland that you know nothing about, and you don't know a soul here. What happened to your father, why did he leave without saying goodbye? Sure, he left a tape for you, but the "why" was never really answered. So, your first quest in this new world is to try and seek out your father. As you walk away from the Vault you'll exit out the cave door. Here is your last and only option to change your SPECIAL stats and your skill tags. You'll also be able to edit the other characteristics of your character such as looks, but there will be other options for this later. Make your final choices, then accept. You'll walk out into the Capital Wasteland, the remnants of old D.C. following the war. After some blinding light and your eyes adjusting to the sun for the first time, you'll be able to look out over the wasteland. You may notice what appears to be a settlement of scrap metal to the south-east. The easiest way to get there is to follow the road, but you can cut across the rough if you like. If you decide to take the road, make your way down the path from the Vault 101 cave. Take a left once your feet hit the pavement. As you make your way down the hill you'll come to the town of Springvale. Theres not much to do here at the moment, theres some burnt out houses you can loot for various items. On one play through I found a nice piece of Leather Armor here, on a 2nd play through I did not, so you never know what you'll find. You can loot mail boxes here, theres a safe, refrigerators, and foot lockers. You may see an Enclave bot hovering around, belting out patriot tunes and the voice of President Eden, don't worry, the bot will leave you alone. In any event, don't travel too deep into Springvale, as you may find yourself getting closer and closer to the school which is overrun with raiders, you may want to gear up before that. You can find an old call-girl, Silver, hiding out in the first house on your left if you're on the road heading north out of town. You can try to talk her into giving you 100 caps to keep her location a secret, your choice, but nothing more to do here yet. Your best bet is to head to Megaton, which is that large scrap heap you saw in the distance from Vault 101. If you follow the eastern road from Springvale, it will eventually turn south. You'll see a painted sign for Megaton, follow the sign back to the west till you reach the gate. Theres a dying man out front, you can give him one of your purified waters (If you have one on you) for positive karma. If you ever want positive karma, you can give him purified water. At the Megaton gate you'll see a greeter "Deputy" robot, theres no real interaction here if you talk to him, so head on through the gate. Shortly after entering Megaton you'll be approached by the self appointed Sheriff, Lucas Simms. He'll ask you not to cause trouble, welcome to Megaton, etc, etc. You can cause trouble if you like right from the start, I once selected the option to call him "Calamity Jane." We then threw down. In any event, if you're playing a good character, you probably don't want to do this. If you're playing an evil character feel free to challenge him (Note: if you kill Simms and decide you want the house in Megaton, get the house first before killing him. If you're blowing Megaton, don't worry about it). The Sheriff does have a quest for you to disarm Megaton's Atomic bomb, but that is not related to the main quest. You can also steal the good Sheriff's house key, loot his house and find the Strength bobble head inside. You'll notice you can also use the key to break into Megaton's Armory, located in the southern part of town. Make a fresh save before you enter, though. Theres a Mr. Gutsy Deputy robot guarding the stash, I've been pretty unsuccessful and sneaking in on him, but you can take him out for a small Karma hit, and then loot the goods. The Armory is pretty well stocked, so I'd check it out. You shouldn't get caught for this act, unless you open the door right in front of Sheriff Simms. I did exit the Armory on my first play through, and Simms was standing right there. He didn't acknowledge me breaking in. If you speak to various townspeople, asking if they've seen an elder gentleman looking like you, most of them will point you towards Moriarty's Saloon. Moriarty says he did run into your father, and he says he spoke with him 20 years before when you were born...curious...your father wasn't born in the Vault? In any event, Moriarty claims he knows where your father has gone, but he's not going to fork over the information freely. You have a couple options here. You can try being nice to Moriarty's slave...err...bartender Gob, he may fork over the code to Moriarty's terminal. If you have the Lady Killer perk, you can speak to Nova in the Saloon, she'll give you the password to Moriarty's terminal in the back. As far as getting the info straight from Moriarty, you can pay Moriarty 100 caps for the info (Or you can take a quest from him to kill Silver in Springvale for a discount). If you decide to kill Silver, she's in that first house on the left in Springvale, on the road leading north. You can speak to her and offer to take all the money she has so Moriarty will leave her alone. Keep pushing, and she'll give you 300 caps if your Speech skill is high enough. She's lying, of course, because you can kill her anyway and find another 200 caps. You can then head back to Moriarty and give him the 100 caps he wants for the information (Hey, you made a profit!). As far as the quest, I chose to hack Moriarty's terminal in the back room and get the information myself for free. *Update* Drew tells me you can also lie to Moriarty, that your dad talked about him all the time. He'll give you the info you need without having to approach Silver, pay any money, or use the terminal. You find out that your father left for GNR radio station after stopping in Megaton. The problem is GNR is a good trek to the east, and its smack dab in the middle of Super Mutant land. At this point you're probably level 2 or 3 and poorly equipped. I would suggest skipping to the Optional Quests section, take a few quests for Megaton, Grayditch, or another nearby location before venturing to GNR. An acceptable level would be 6 or 7, but you could go sooner or later depending on your skills and desire to complete the main quest line. GNR is located east from Megaton, but the path is rather fraught with peril. You can technically skip this part of the quest if you so choose, but its better if you don't. You'll miss out on a quest or two by skipping this quest, as well as missing a few references to yourself via GNR's radio programs. The first time I played through I inadvertently came across Vault 112 and skipped the GNR section as well as the Rivet City section entirely. As a result, I didn't get to meet with Three Dog, and didn't get his quest to fix the dish, I ended up reloading later =P To get to GNR from Megaton, you'll need to do some hiking. Heading east, you should come across the Super Duper Mart, you may have been here earlier if you did the quest for Moira Brown in Megaton. Continue heading east from here and you should run into a river. You'll have to cross the river sometime, you can swim across if you like. You'll take a few rads, but hardly anything to cry about. There is a bridge further down, it's entirely up to you (Theres also tougher enemies the further south you go). You now have a few options to get to GNR. Theres a metro station right across the river, Farragut West Metro Station. The game believes this is the quickest route via Megaton. Head into the Metro, its one of the shorter ones. Theres a nice closet with Missiles, junk parts, and weapons. You can find it down a set of stairs just before the door to your destination. The door you're looking for is the one to Tenleytown/Friendship Station (Can't miss it). From here you want to look for Chevy Chase, its pretty close to the south. Alternatively, you can navigate the wasteland and come to Freedom station later which will also take you there. Both paths will get you there, it depends on which you decide to use. If you keep this quest as "Active" in your Pip-Boy's Quests section, it will provide an arrow to the shortest path for you to take from wherever you're currently at. Please note this arrow on your map will not point out any possible road blocks along the way, such as various twists and turns in a subway, hosts of locked doors and computer terminals barring immediate access, or packs of Super Mutant road blocks =) Follow your quest arrow through the metros. Eventually it'll bring you to Chevy Chase. Feel free to loot the various objects outside the metro, but sooner than later you'll probably be attacked by a couple Super Mutants, or hear them attacking someone else. You'll then see a few members of the Brotherhood of Steel engaging the giants. The Brotherhood will come out on top (Feel free to lend a hand for xp). Speak to Sentinel Lyons. She'll let you know they're currently on their way to the radio station, you can tag along, but don't get in the way. For the next few minutes you'll be escorted the final stretch to the radio station. Take pot shots if you can to help out. Early on in the trip you'll see a hurt Brotherhood soldier being tended to. You can loot their armor/weapons if you wish without penalty of Karma, but be advised that you cannot wear Power Armor until later, so you would have to store it for a rainy day. You'll find yourself crawling through a few broken buildings and fighting your way through a dozen Super Mutants or so before you reach the area just in front of GNR. Take cover when you can, some will try to snipe you, others will run up and try to hit you with melee weapons. Try to help keep the Brotherhood soldiers alive if possible. Eventually you'll come to a fountain area and the station itself. You're not done yet, theres one very LARGE road block between you and the station. A huge Super Mutant known as a Behemoth will crash through a wall of debris and begin attacking you and your Brotherhood companions. If you've looked at the fountain nearby, you'll notice a fallen Brotherhood soldier that was carrying a "Fat Man" and "Mini Nukes." I think you should know what you need to do! Equip this bad boy, make sure you have a very, very good distance between yourself and the Behemoth, then let 1 or 2 Mini Nukes fly. You'll see a mini mushroom cloud, a flash of light, and a large chunk of the beast's life will evaporate. If you don't give this weapon a wide birth, you may find yourself caught in the area of effect, causing massive damage to yourself as well. If possible, try not to hit any Brotherhood of Steel members when dropping the bomb. Some deaths may be unavoidable, but the deaths of some members will affect some conversations later on (Nothing game breaking). *****Quest 6: Galaxy News Radio***** If you're playing the entire main quest line and not skipping anything, head inside the radio station following the massacre of Super Mutants. You can sneak around and loot a few items off the first floor, but theres not a lot to explore here. Theres a back door leading to another part of the wasteland. Theres also a few doors to strategic balconies on the 2nd floor of GNR, nothing to see through any of these doors. The only door you should be concerned with is the one heading up to the radio station itself, where Three Dog awaits. Three Dog will come to speak with you. He'll let you know he's been expecting you, and that he has come in contact with your father. He'll also fill you in a little bit about GNR itself, about the Good Fight, and providing hope to the Capital Wasteland. Before he'll provide you information regarding your father's next stop, he asks that you do something for him. Whether you do this quest or not is entirely up to you. In a way, the quest is optional as you can skip ahead to Rivet City, but the quest is good experience, it's a good source of loot, and it broadens the reach of the radio station's signal again. *Update* Drew says one way to bypass Three Dog's quest is to tell him your dad can help him with the Good Fight if he tells you where he went next. This will update your quest, and you should still be able to take Three Dog's mission to get the dish. If you choose to help Three Dog out, he wants you to obtain a new relay dish for the radio broadcast. As it turns out, a Super Mutant thought it would be funny to knock the old one off the Washington Monument. Three Dog knows where you can swipe a new dish: The Museum of Technology which is conveniently located south-east about 200 yards from the Washington Monument. Getting to these locations from GNR will require more hiking through more Metros though, so be prepared. If you haven't figured it out already, the underground Metros are highly useful for navigating around various debris that blocks your path to various landmarks. Fortunately, once you've been to a location at least once, it'll show on your map and you can always fast travel back to it. To reach the area where the Washington Monument and Museum of Technology, have Three Dog's quest set to active in your quest section of the Pip-Boy. It should provide the closest path again for you. If you're going straight from GNR, head out the back exit to Dupont Circle. This is a one way trip, if you decide later you want to head back, you'll have to fast travel. From there take the Collapsed Car Tunnel. From here it's a few ghouls and a short walk to the Dupont Circle Station. Through Dupont you'll have to fight a good number of Raiders and a couple muties, you're looking for Metro Central next. This area is huge, and consists of multiple levels. Ultimately, you'll want to go up a few levels and take some train tunnels to the Museum Station. Finally, from Museum Station follow it south till you come to the main area, you'll see the exit to the Mall to the east. If you followed the path correctly, you should come out of a Metro and see the Washington Monument to the west, and the remnants of the Capitol Building rising above you to the east. The downside to exiting via this area is you're coming out in a heavy Super Mutant area. Theres also another Mall exit in the Museum Station, and it's a little safer. Downside is you're not as close to the Technology Museum. If you decide to take the other Mall exit, you'll come out near the Lincoln. The Lincoln will be overrun with various slavers, feel free to wax them if you wish, just be advised they've booby trapped the area extensively with traps. Also, I've read around the net that wasting the slavers early may bug a quest later on, so you may wanna hold off on going to the Lincoln Memorial. The Washington Monument fortunately is in better hands, it's guarded day and night by Brotherhood representatives. Using the pass code given to you, you can log in to the gate terminal at the Washington to access the site, but theres no need at this point, so I would wait. South-east from the Washington Monument you'll find your target location, the Museum of Technology. Along the way you'll probably run into a few Super Mutants, better get used to it. Everything within a 1-2 mile radius is infested with Super Mutants, and most of the area is not protected with Brotherhood soldiers that will hold your hand. Super Mutants don't have many weaknesses, you can pop one in the face with an Assault Rifle and some will just smile back at you and keep firing. I suggest taking cover when possible and using your stronger weapons. Theres also varying strengths of Super Mutants. Theres your basic Super Mutant, they're the weakest and usually don't carry the most threatening weapons. The next level involves Super Mutant Brutes. These guys tend to wear metal armor for protection, usually with a helmet, and carry harder hitting weapons such as Assault Rifles and possibly Miniguns/Missile Launchers. The strongest Super Mutants (Aside from Behemoths) are the Super Mutant Masters. These guys usually have the hardest hitting weapons: Miniguns, Super Sledgehammers, whatever will put a dent in you. Just like the trenches outside, the Museum is filled with Super Mutants. If you run into Brutes, be sure to take them down first as they'll pack the most heat. There is an opportunity to access a weapons locker later in the museum, but it's not required for the mission. If you want access to this, look for the various terminals around the Museum. Some will have a code, you'll have to pick the correct number to unlock that terminal. They key is to look for the prime number in each set, or a number that isn't evenly divisible by anything. Once you've found all 3 terminals, you can unlock the safe near the Virgo exhibit, which you can get a key from for a weapons locker. The safe is located in the Security Office terminal. Just keep an eye out for any terminals as you progress. The information you get will also lead to the location of Prime and the Xuanlong Assault Rifle. The museum itself is fairly linear. You can pick up some Stealth Boys along the way, I would horde these whenever possible. You'll be looking for the Virgo II Lunar Landing exhibit, this is where you'll find the replacement dish. To get there, follow the path through the creepy Vault-Tec exhibit. I expected something to jump out at me here, I dunno. You'll eventually find yourself in a room where the Virgo II is, but a pile of debris lies between you and your target. There are two paths here, you can head through the Planetarium, or you can head through the rocket display, either one will get you to the Virgo eventually. You'll run into a few Super Mutants either path you take. When you eventually get to the Vigo, there will be a Super Mutant Master waiting for you along with one of his lackey's. Waste them both, then claim the dish. If you made your way through and retrieved the weapons locker key, you'll find it in a side room off the Planetarium. When you're ready, leave the museum. Head to the Washington Monument. Use the pass code to unlock the gate. You'll be able to enter and use the elevator to reach the top. Use your action key on the radio station hardware to install the dish, the signal should be coming in clear now for GNR all over the Capital Wasteland. Head back to Three Dog at GNR. He'll inform you that your father was next heading to Rivet City, if you weren't already aware. If you went to Rivet City first and spoke to Dr. Li, Three Dog may give you a key to a weapons cache as well. When you're ready, prepare to trek to Rivet City. *****Quest 7: Scientific Pursuits***** Your next location to hit is Rivet City, far to the south-east. If you haven't been there, it's half of a ship floating in the Potomac River. The easiest way to get there is to follow the river. I suggest walking along the west bank of the river, as it's the safest path. If you want experience, loot, and the chance to kill Super Mutants and Raiders, take the east bank. You'll have to kill some either way. If you're on the west bank and reach the Citadel, you'll see a broken bridge across the river. Head across this bridge, then continue south. You'll soon come to the Jefferson Memorial, which is crawling with Super Mutants. Don't head inside yet, or if you want to skip ahead to Rivet City go ahead. Make your way around the monument, once you've walked around the structure you should see the broken ship floating. Look for the large, metal structure with steps, there may be a caravan outside it. Climb the steps, you'll see a dying man sitting nearby. He wants purified water, much like the man outside Megaton. He's free positive Karma if you want to donate your water to him. When ready, use the intercom nearby, they'll swing the bridge over so you can enter Rivet City. Head inside the Stairwell, then take the door to the Lower or Upper sections of the ship. Either one will point you toward the Lab. Follow the signs, you'll find yourself in the Lab where Doctor Li is (Provided it's not after hours). She'll immediately recognize you as James's son/daughter. You can ask her questions about your father, your mother, about Project Purity, and their efforts to bring clean water to the Capital Wasteland. If you ask about your father's current whereabouts, Li will say he stopped by recently, wanting to restart Project Purity. She believes he was next on his way to his old lab, which happens to be in the Jefferson Monument. Before you leave Rivet City, be sure you stock up on goods in the Market, do any side quests you Like while you're here as well. I suggest researching Rivet City's history For Moira Brown, if you're doing the Wasteland Survival Guide (If you haven't started it, you may wanna get up to this point). You may want to start the Replicated Man quest at this time as well. Theres a lot of locked doors and terminals you can break into in Rivet City, just be sure you're not caught. They're all little bits of xp, and you can get some good stuff. Particularly the Armory located in the Flight Deck of the ship. I don't suggest breaking into the Armory until you have at least 75 Lockpicking or better, there are some tough chests. Also, theres a guard robot out front. You can trick him into thinking theres an emergency down below, you can use this time to loot everything (This trick only seems to work once). You can fast travel to Jefferson if you like. If you previously cleared out the whole Memorial, you shouldn't have anything to worry about here. If you didn't go inside, you'll find more Super Mutants and Centaurs within. Head in through the Gift Shop door, which is on the west side of the building near the stairs. Head down the hallway. You should find a terminal nearby, disable the turret if you wish, or reset the targeting data so it begins unloading on Super Mutants. There isn't much to loot in this first area, it's been pretty well cleared out. The best loot will be on the mutants themselves. Head downstairs first, where you'll find 4 or 5 more Super Mutants. Near the back of the basement you'll find a bed and a couple tables. On the tables will be several holotapes, mostly from your father. They chronicle Project Purity. They don't seem to provide much information on his current location. Head back up to the Gift Shop area, and then through the door to the Rotunda. You'll run into a few more Mutants. When you first entered the Rotunda area you should have seen some stairs leading up to the enclosed glass area. At the top of the steps look ahead, you'll see more holotapes. Listen to these holotapes, you'll find out your father caught a break in his research, he wants to meet a Dr. Braun in Vault 112 to ask him about his G.E.C.K. technology. You now know your father's next destination, and yours. Vault 112 can be found far to the west of Megaton. It's located in an old garage known as Jake's. If the quest is active, you should see a marker on your map pointing it out. Once you've reached the garage look for a switch inside that opens the path to Vault 112. Head down the path to the Vault gate, activate the terminal to head inside. Once you're within you'll be greeted by a robot, apparently you're 200+ years behind schedule. The robot gives you a Vault 112 suit and asks that you put it on, go ahead. Feel free to explore the facility at this point. You'll notice a dozen or so Tranquility Lounges with people in them. You can read the terminals next to each pod, but they don't have a lot of useful information. You notice that one pad has subject "Unknown." Take a peak inside...hmmm. Before you look at the other pods, clear out any and all side rooms. You should find some drugs in the clinic and some combat oriented loot items elsewhere. When you're ready, make a clean save, then head back to the lounges and grab the unoccupied one. *****Quest 8: Tranquility Lane***** You've stepped into Tranquility Lane, a "Leave it to Beaver," black-and-white style neighborhood block straight out of the 50s. Everyone here will appear overly cheery, they love their lives, most of them anyway. Speak to the various inhabitants, most of them will be unaware they're living in a virtual world, and they think you're just playing a game. Speak to the young girl, Betty, watering the flowers in the center of town. She seems like a nice enough girl, but she wants you to play a little trick on Timmy Neusbaum, she wants you to make him cry. You now have a few options. Making Timmy cry will get you negative Karma, but not much. You can continue down this road, which will lead to more negative Karma later, or you can skip right to the positive Karma ending and skip the fun (Although this ending is rather amusing as well). If you want the Positive Karma, skip down several paragraphs, otherwise if you don't mind, keep reading. You can try and convince Timmy that his parents are getting a divorce to make him cry, but even with a high speech skill I couldn't pull this one off. Theres easier methods. Speak to the various town residents again. You'll find out from one that Timmy could use some discipline at boarding school, and Timmy's parents have already received a brochure. You can find the brochure in the Neusbaum kitchen, show it to Timmy to make him cry. Alternatively, you can also kill his parents or beat him up. Once you've made Timmy cry, go back to speak to Betty. Prepare for a surprise...creeeepy. Feel free to ask Betty any question you like, it's relatively irrelevant what you decide. After a brief explanation, Betty wants you to be mean again. Next, she wants you to break up the marriage of the Rockwells, without killing them. Theres a few ways you can do this. The first way I found was to speak to the residents again. It appears Martha Simpson had a little romp with Mr. Rockwell. If you speak to Ms. Henderson about it, she'll elaborate a little more, you should be able to convince Martha to open up about it more afterwards. This won't break up the marriage, but it will allow you to go to Martha's bedroom, steal her lacy underwear, and plant it on Mr. Rockwell's desk in the basement. Show Mrs. Rockwell the underwear, convince her they belong to Martha or Mr. Rockwell likes to wear women's underwear, it doesn't matter. There may be other ways to finish this one, I could see a diary in the bedroom, on my 2nd play through I was able to read it. Apparently Mrs. Rockwell wants to beat Mrs. Simpson secretly with her rolling pin. Lets make this a reality. Find the rolling pin in the kitchen, go beat Martha Simpson up with it. Return to Mr. Rockwell and show him the rolling pin, claim it was Janet's doing. Easy as pie! Go back to Betty, ask another question if you like. She has another task for you, this time, its going to get violent no matter how you slice it. She wants you to kill Ms. Henderson, but she wants it to be creative, so no fists, rolling pin, etc. Let's snoop around her house first. The first thing that caught my eye was the oven, you can fiddle with the pilot light, then go to Ms. Henderson and ask her to bake you a pie, flames ensue. There are also some roller skates near the stairs, you can fiddle with these to cause an interesting death. This one is a little more dangerous, but you can lock Ms. Henderson in her house via the terminal in the kitchen. You can then set the Mr. Handy robot to cleaning mode and disable his security measure so he'll attack his own master. Rather amusing, but you'll have to be wary he doesn't attack you as well. When the innocent woman is dealt with, head back to Betty. She'll have one more task for you, and it doesn't get any worse (Or better, if you're an evil character) than this. She wants you to go to the Abandoned House in town and look for the dog house on the side. Within you'll find a scary clown mask and knife, don them and you'll become the "Pint Sized Slasher." Holy moley, talk about demented! You now get to wipe out the entire town, from the Neusbaums, to old Mrs. Dithers. This can be frustrating at times, as the people will obviously run away from you. They'll often hide in houses too (And they won't always hide in their own). Sometimes they'll run to their backyards, find them wherever they go, one or two knife swipes should be all you need. Go back to Betty, she'll finally be done with the games and give you the information you seek. She'll release you from the Tranquility simulation, as well as your father (Who has been transformed as "Doc" the dog the entire time, gotcha!). Head through the Matrix-like door to exit the simulation. If you wanted the positive Karma finish to this quest, read on. Sometime after you enter Tranquility Lane you'll be approached by Mrs. Dithers, an elderly woman. She'll seem a little...crazy, paranoid, and worried. She'll inform you that something isn't right, Betty isn't who she says she is, and tells you that theres a Failsafe Terminal hidden in the Abandoned House that can be used to exit. Head to the Abandoned House when you're ready. Inside it'll be rather dark and incredibly creepy. You'll find a number of items in the living room here: a radio, a block, a pitcher, a Nuka Cola bottle, and a gnome. You need to hit these in a specific order to activate the terminal. For those that are lazy, the combination is: radio, pitcher, gnome, pitcher, block, gnome, and bottle. Once the Failsafe Terminal has been activated, go check it out on the other side of the room. Theres various things you can do here, if you want information about Braun and the whole simulation, don't choose the Chinese Invasion option yet. You can read about other simulations that have been run, some are a little amusing. When you've seen all you want to see, activate the Chinese Invasion. Tranquility Lane will become Commie Lane. Hundreds of soldiers will gun down the residents of Tranquility, and according to the Failsafe terminal, all of them will perish permanently. If you had killed all of them as the "Pint Sized Slasher" in the negative Karma path, apparently you only killed the "avatars" of the residents, so they could always be brought back to life before. Speak to Betty afterwards, she'll be very upset that she will no longer be able to torture the residents as they'll be permanently gone. You can ask Betty why she doesn't leave the simulation, she realizes that her body is over 200 years old at this point and would never survive outside the computer. She is now alone, which is the ultimate positive Karma result since she can no longer torture people (It's a fitting end to her too). When you're ready, exit through the door. When you leave Tranquility Lane you'll be back in Vault 112, as if you never left. You'll reunite with your father, feel free to catch up on everything. Ask about your mother, about Project Purity, and what to do next. James now knows that a G.E.C.K. is required to get Project Purity to truly work, the next step is to meet with Dr. Li in Rivet City again. When you're ready, follow your dad out of Vault 112. You can travel/escort him all the way to Rivet City, but it isn't necessary. Unless you want the extra xp, you probably don't want to walk all that way anyway, believe me, I did it. Fast travel to Rivet if you like, your father will make it on his own, he won't be able to die in the Wasteland. *****Quest 9: The Waters of Life***** Once you get to Rivet City, speak to Dr. Li in the Lab. James and Li will talk together for a bit, he will finally convince her to jump on board and get the Purity going again. Your next task is to head to the Jefferson Memorial. If you cleared out the entire monument earlier, it will probably still be clear at this point. Your father needs your help in getting the mainframe back online. Once you see him in the Rotunda, head to the basement. Your father will have given you some fuses and asks you to replace the burnt out ones. The fuse box is located in the basement as well, bottom floor, take the right path at the intersection and go through the doorway on the left. Next he'll ask you to activate the power from a nearby switch. To drain the water, head back to the intersection and go straight (The left path if you were coming down the stairs from the Gift Shop). You should be able to activate the mainframe after this, the mainframe room is back up the stairs, above the area where the pools of water are. Once the mainframe is active, he'll tell you through the intercom theres a blockage that needs to be removed. Head back up to the Gift Shop area. <Spoilers coming> Continue to the entrance hallway, hang a right. You'll make your way to a room where theres a grate in the floor, open it up. You'll head down some pipes till you find a release valve, activate it. Your father will let you know you did well...but wait...what's that sound? Look through the hole in the pipe, you'll notice something...Enclave? Quickly continue through the pipes, you can't go back the way you came. You'll exit outside the memorial, the Enclave have invaded and are crawling everywhere. Take them out, you need to fight your way to the Rotunda. Make your way into the Gift Shop, be wary of the soldiers here. They'll probably have Plasma Rifles and/or Laser weaponry, and their armor is tough. Go for head shots when possible, if you can't do a lot of damage, try to knock their weapons out of their hands. When you reach the Control Room you'll see Doctor Li on the outside, your father is locked in the Control Room with a few Enclave and an Enclave man not in Power Armor. They exchange words, then the unthinkable...you must now escape with Dr. Li and the other scientists. It seems they had to escape once before, they'll lead you to a secret escape tunnel that leads to the old Taft Tunnels. Your objective here is to keep the Scientists alive. The Enclave will be in pursuit, so be mindful of your surroundings. Lead the scientists through the tunnels. You'll have a lot of killing to do down here. You'll eventually come to a door that requires a terminal to be hacked. Li will get to work on the terminal so you can protect the group. It looks like the secret escape isn't all that secret. Out of a side room, Enclave soldiers will start pouring out. Take them out quickly, as you'll get overrun if you wait too long, the scientists will be at risk as well. The Enclave up top will be the most difficult as they may not always be in sight of your weapons. You may be able to leave these targets as well. Once Li has the terminal hacked, continue on. You'll soon have to stop, Li's assistant has a heart condition and needs a rest...apparently his life is important enough to risk everyone's...so you best try and get things moving as quick as possible. You can give Li 5 Stimpacks to speed things up here, a heavy cost if you ask me. Keep moving through the tunnels. You'll encounter some Feral Ghouls, these should be much easier to kill than the Enclave. Fear not, as the Enclave will still try to hinder your movement. You'll be ambushed a few times, watch for a set of stairs, a couple Enclave soldiers will try to shoot you down from behind and above you. Keep pressing on, you'll make your way to a large sewer door that requires a switch to activate. On the other side is freedom, any pursuers should be gunned down by the Brotherhood of Steel soldier waiting on the other side. You can move through the rest of the tunnel in safety, you'll pop out just outside the Citadel, the Brotherhood stronghold. *****Quest 10: Picking Up the Trail***** Head to the gate, Li will demand entrance and she'll get you in. Once inside you'll encounter Elder Lyons, leader of this division of the Brotherhood. Li will catch the Elder up to speed. The Elder asks that you get with Scribe Rothchild and check the Library for information on Vaults. Your task is to find a G.E.C.K, that way the Enclave will be a step behind and unable to activate Project Purity for their own needs. The Library can be found within the Citadel in the A-Ring. Scribe Rothchild can be found in the Lab, which is down the stairs nearby. Once you've spoken to Rothchild and checked the computer, you'll have your next destination. Vault 87 appears to have been on the list to receive a G.E.C.K. in its list of supplies. Unfortunately, Vault 87 has been known to be severely overrun with radiation at its entrance, so you'll need to find another way in. Scribe Rothchild suggests checking the Lamplight Caverns far to the west, maybe theres a way in from there. While in the Citadel you can also train in how to use Power Armor from Gunny outside in the Courtyard area. Theres also some goodies to be had, Elder Lyon's room contains a unique Laser Pistol named the Smuggler's End. Theres some other looting you can do in the form of footlockers and chests. At this point, you can head straight to Lamplight, but I suggest checking back at Megaton (If it still exists). About this time I noticed there was an emergency distress signal from Vault 101 in my radio frequencies. Supposedly this is only active for 24 hours following your arrival to the Citadel, but I'm fairly confidant I picked this quest up several days later as I wanted to complete side quests before 87. Check the optional quests section for info on Vault 101's trouble. When you're ready to pick back up the main quest, read on. *****Quests 11: Rescue from Paradise***** Your need to find a way into Vault 87 through the Lamplight Caverns. You're not finished with Picking up the Trail yet, but you need to take another quest in most cases to get in to Vault 87 and Little Lamplight. Some people with the children perk may be able to talk their way in, but for most people they'll have to do a quest. Head out west, its fairly far away. When you enter the caverns, you'll soon hit a dead end. A young kid will yell out to you, Mayor MacCready as he calls himself. He calls you a "Mungo," and doesn't trust you. If you have a high enough speech skill or the Child at Heart Perk you can talk your way right in, but I did not have either my first time through. For most people, you'll have to do a quest for MacCready before he'll give you access. A few of his friends, Sammy, Squirrel, and Penny didn't listen and they got caught by Slavers. MacCready wants you to go save them, then he'll think about letting you in. The children are being held in Paradise Falls, a slaver community to the north-east. You may have been to Arefu for an optional quest, if so, part of the trip is done for you already. When you get to Paradise Falls it looks like a giant fort, and theres only one way in for you. On the western side of the compound is a security check. The guard out front isn't going to let you waltz right in. If you've never been here before, you're going to have to do something for him. The other two options are to use a high Speech skill and 500 caps to bribe the guard to let you in. The third option only applies if you're really evil, the guard may let you go right in. The last option is to go Commando on everybody and waste the Slavers. For information on the pre- quest to get in to Paradise Falls without killing, bribing, or being evil, check the optional quests section for "Strictly Business." Once you're in Paradise Falls, by hook or crook, you're looking for Sammy, Squirrel, and Penny. If you're killing the slavers, this will be a fairly easy task. Sammy should be hiding just outside the main slaver fortress, but within the outer wall. Penny and Squirrel will be in the slave cages at the back of the fortress. If all the slavers are dead, you can release the children from the cages using the key obtained from Eulogy's Pad. If you are obtaining the children through means other than force, you should be able to buy the children from Eulogy. You have two purchase options. All three kids for 2000, or 1200 if your Speech skill is high enough. Alternatively, you can try and help the kids escape for free. Speak to Sammy from the other side of the Slave cages, he'll direct you to Squirrel. Squirrel says he knows a way to disable the slave collars so they won't explode when they escape. He has a terminal inside the cage, but it currently isn't connected to the main terminal. Your job is to get it connected, easy enough. Head into Eulogy's Pad, his terminal in the back is what you need. Hack it, then reconnect the terminal for Squirrel. Go back to Squirrel, the collars will be disabled. Theres another thing you have to do, you have to make the guard take off. The best time to do this is at midnight, when theres only one guard around...Forty, and he's a mean one. Speak to Forty, comment on the fact he must be getting paid more than the other guards (He's not). This will get him thinking, he'll decide he needs to talk to Eulogy. Head back to the kids, they'll be ready to make their escape...all except one, Penny. She won't leave without Rory, who is Mayor MacCready's older brother I think. You can try and convince her Rory is already dead, or talk her out of it another way. Know this-if you decide to save Rory, it's probably going to end in bloodshed and/or you going hostile with any slavers that may be alive (If you didn't kill them). Rory got locked up in the "Box" last week, the Box is near the slave cages. To get him out you need to do is get a key to unlock the Box. You can steal one off Forty himself, or find one on Eulogy. When you've obtained one, head back to the Box. At this point you can release Rory, but he's either going to die, or you're going to have to kill some Slavers, take your pick. When the Rory situation is resolved (Either death to him or the Slavers), head back to Penny. She'll make her escape. Once the children are free, head to the bathrooms (If they escaped that way), or escort the children to the Paradise Hills entrance. Your quest will update, you should then return to Lamplight. MacCready will be waiting, he'll admit you're alright for a Mungo, then he'll let you in to their fair city. You can now ask MacCready about getting to Vault 87. MacCready doesn't think you're up to the task, theres monsters in Murder Pass and the Vault, monsters that would certainly scare you as even the brave MacCready doesn't like to mess with them. Take your chances, and ask for entry to Murder Pass. The mayor will lead you a good distance to the gate and help open it. Enter Murder Pass when you're ready. If you don't feel like fighting your way in, and you're able to hack at least average level computers, skip the next paragraph. As it turns out, the monsters of Murder Pass are Super Mutants, who woulda thunk it? You should be pretty adept at handling these bad boys by now. Some parts of the pass will be fairly thick with the big uglies, so hopefully you're heavy on ammo and your weapons are in good repair. Make your way through the path, you'll soon see a door to the Reactor Room of Vault 87. If you don't want to fight your way into Vault 87, theres a safer way. The Mayor will tell you theres another way, but its not accessible right now. He'll mention Joseph, go seek him out. Joseph will probably be in the Great Room area. Ask him about the door, he'll say the door works, but the computer that opens it is locked. Nobody knows the password, so the door remains out of commission. Ask Joseph to turn the computer on and he will. The computer is average level, that's all it takes to gain access to Vault 87. At this point, your quest "Picking Up the Trail" should finally finish. *****Quest 12: Finding the Garden of Eden***** Guess what? More Super Mutants in Vault 87. Theres not a lot of road blocks in this Vault, most of the doors are open for you, at least the ones you need to use. There is an alternate route to get to the Vault through the Great Room, this door has a tough lock to pick for access though. As you make your way through the Vault, you get the distinct impression that this Vault didn't empty on its own...like something went horribly wrong as it did in Vault 112. I'll leave you to read the terminals and find out for yourself. Your goal is to reach the Test Lab. First you'll have to go through the Reactor Room, and then through the Living Quarters. I've found that a good number of the Super Mutants here are Masters, and some Brutes/regular muties. Bring some heavy hitters, at least for the Masters so they don't eat through you fast. Theres not much in the Reactor Room, and its fairly linear, so make your way to the Living Quarters. In the south-east part of this zone you can find an Engineer's Terminal, it'll have some information and it will also unlock a safe if you read all the messages. Inside you'll find a Magnum, some ammo, Stimpacks, and Nades. Make your way to the Test Labs. Here you'll find several rooms with gruesome test subjects, failed creatures it seems. They look like Super Mutants themselves...hmm. At the end of the hallway you notice theres a Super Mutant in one of these containment rooms, he speaks rather well for a mutant, he goes by the name of Fawkes. He seems fairly non-hostile, he proposes a deal. He knows you're probably here to get the G.E.C.K, he must be a mind reader too...the problem is, said item is located in a highly radiated area that only Fawkes can survive. Your part of the deal is to free Fawkes from his prison. Theres a few ways to do this. You can't hack his terminal to get him out, theres something wrong with it. What you'll need to do is make a right and go down to the end of the hall. In the next room you'll find some mutants and a console. From the console you can release Fawkes, either by unlocking all the cages, or just unlocking cage #5. Once Fawkes is out, go speak to him. He asks that you clear the path to the G.E.C.K. for him. Head left of his chamber. Continue in this direction, you'll find more mutants, and eventually come to a room leading to the G.E.C.K. Let Fawkes do his thing, he asks you to watch his back and hold off any Super Mutants that may attack while he's retrieving the holy item. I never had any Super Mutants attack, it's possible that any remaining mutants will converge on your location. Fawkes will retrieve the item and give it to you as promised. You can ask if he'll join you, but at this time he won't come along. He believes townspeople will not understand, so you part ways. Make your way back towards Lamplight, you won't make it far though... *****Quest 13: The American Dream***** You awake to find yourself in an unknown location. In front of you is Colonel Autumn. He's demanding the access code to Project Purity. At this time you may already know what it is, you may not be sure, it doesn't matter...just don't give it to him, trust me. Give him no code or the wrong code. The President of the United States, Eden, will interrupt and asks Autumn to leave. Once he's gone, Eden will release you. You have full access to your inventory now, it's in the locker in front of you (Don't forget to equip your armor and weapon). Eden says he'd like to speak with you, so exit your chamber. You'll quickly be stopped by a passing soldier. Unaware you've been summoned by Eden, he'll start interrogating you. I suggest you try your Speech here to let the guard know you are, in fact, allowed to run around outside of your holding cell. Using this option the guard will eventually go to the nearby eye on the wall. He'll ask Eden if you're supposed to be out, Eden will appear and berate the guard, then inform everyone in the Raven Rock complex you're to go unhindered to your destination. Sounds good! This gives you a brief period of time to explore, not long though. If you're unable to use your skill on the guard, he'll either run off for reinforcements, or you can try and use your Strength skill to bully him away. Either way, it doesn't matter, its only a matter of time before they come down on you and shoot. You'll see old man Nathan from Megaton in a holding cell, provided he wasn't killed if you decided to blow up the town with the nuke. apparently he wised up and realized the Enclave isn't all its cracked up to be. I searched for a way to free this guy, despite his stupidity, but he was left to a nasty demise. Eventually, Colonel Autumn will jump on the PA system and inform the complex to ignore Eden's order and shoot you on sight...wonderful, so much for that! You have two options at this point. You need to get to Ravel Rock level 2, you're currently on level 3. You can kill more Enclave, which I strongly encourage, or you can try and sneak your way out. Much of the floor on level 3 can be traveled under, you'll see grating below. In most cases, as long as your repair or science skill is high enough, you can move around unnoticed below by disarming the lasers and making your way through the complex. Check your map for the quest arrow, and navigate your way to that door to reach level 2. Theres two ways to get there, through the weird lab in the center room, or through the south-west door. Theres not a lot of great stuff to loot on this floor (Unless you're a fan of the Rock-It Launcher, the mess hall has plenty of ammo). Once in level 2 you'll probably be able to sneak less and will be forced to kill more. Theres a good number of Enclave, but they're killable. Watch out for plasma rifles, they'll turn you to goo if you let them fire for long periods. Eden is to the north-west, but I would search all the side rooms and labs for crates and such. Plenty of ammo on this floor and other goodies. The south-west corner has a lot of lockers with ammo. You'll find Anna Holt in the west room, talk to her and waste her if you like for bad Karma, she dies regardless. In the far north-west room you'll find Colonel Autumn's bedroom. The Energy Weapons bobble head is on the desk, grab that. You can also snoop around and pick his footlocker...interesting, the ZAX destruction sequence, lets hold onto that. You can also hack the nearby terminal to lower the barrier in his room for more ammo and goodies, theres a similar barrier in a barracks down the hallway you came from. Across the hall from Autumn's room you'll find the path to the Control Room where Eden awaits. When you enter, you'll see 2 Enclave guards get wasted by some bots. Hey, the bots are on your side! Your goal is to make it to Eden and speak with him. Interesting, did you see that one coming? Listen to what he says, some of it makes sense, some of it is the typical Enclave mentality we've come to know and loathe. Eden ultimately gives you a choice. He knows that Autumn is already undermining his authority, as seen by going over his head earlier in the compound. Eden asks that you activate Project Purity and add an altered FEV (Forced Evolutionary Virus) sample to the mixture. This new virus will be added to the newly clean water, and any non-pure strain creature that comes in contact with the water will be destroyed. Essentially, most of the people you've come across in the Wasteland will be dead, those that would survive would be Enclave members and Vault dwellers. Theres no way to exit to level 1 without taking the FEV virus, so pick it up for now. You can leave Eden to his devices. If you found the self destruct code earlier, you can enact it at this time. I found it was fairly easy to talk Eden into destroying Raven Rock himself. Choose what you like, or let him go, then head to level 1. This is the last level of the compound, and it's a doozy. It's a long, linear hallway filled with Enclave trying to bar your exit. Fortunately it seems Eden is trying to protect your escape, Sentinel Robots will help attack Enclave soldiers on your way out (Hell of a lot better than attacking you for once!). It's quite the war zone, but with the Sentinel's help you should be able to reach the front gate. Theres also a Death Claw in a cage you can unleash, just be careful. If the Deathclaw survives the Sentinel Bots and Enclave, it'll come for you next. Outside, the carnage continues. Raven Rock will start to explode if you chose to blow the whole place up. If so, I think it may be best if you move away from the compound. If you saved Fawkes earlier, you'll find that he's outside toasting Enclave guards with a new toy he found. Excellent! Finish off the troopers, then group up with Fawkes if you wish, he'll now become a member of your party. Speaking of your party, if you had any party members with you when you were abducted earlier, you'll find most of them returned to the location you recruited them at, or close to that area. For instance, your Brotherhood friend will be around the Lab in the Citadel. Dogmeat, on the other hand, should be on the cliff just outside Vault 101. *****Quest 14: Take it Back!***** At this point, you should be free to do as you like. I suggest doing any and all quests you plan on participating in as you're getting close to the point of no return. When you're ready, head to the Citadel. In the lab you'll find Elder Lyons and his daughter discussing the Enclave and their occupation of Project Purity/Jefferson Memorial. Elder Lyons speaks with you, update him on the status of the G.E.C.K. and the Enclave. If you want a positive Karma boost, you can hand over the FEV virus, Elder Lyon's will take it and you'll lose the ability to destroy most of humanity. The other options don't yield much. At this point, Sara Lyons will insist that the Lyons Pride move now to retake Project Purity while the Enclave is in disarray. The Elder will agree, but insists she take "Optimus" Liberty Prime along for support. Also, Sara will inform you that you've been made an official member of the Lyon's Pride as well as the Brotherhood of Steel for your actions, yay. You can take Power Armor or Combat Armor as a reward, choose one and wear it, or drop it, you won't be able to come back for it either way. When you're ready to assault the Jefferson, let Sara know, then head to the Courtyard of the Citadel. You'll notice Prime being lifted from his resting place to the outside world. You're on the clock essentially. Prime is being lifted, or has already been lifted to the outside of the Citadel. Exit as soon as you can through the front door. Prime will be making his way across the bridge, supported by the Lyon's Pride. Watch as he decimates Vertibirds like they're flies, awesome. Despite the magnitude of this quest, Prime and the Pride will do much of the work for you if you let them. Do your best to keep up, but stay alive. Feel free to use your stash of drugs, including all Stimpacks, for this mission. Use whichever weapon you're most comfortable with. Help take out the Enclave trying to bar your path, Prime will do the rest for you. After tearing down a few barriers and leaving a path of destruction, you'll find yourself at the Jefferson. Unfortunately, once you arrive a huge regiment of Enclave will be making their way toward you from the catwalk. Prime appears to be busy with others things at this moment, so I would take the opportunity to waste the Enclave soldiers yourself if you can. You'll probably encounter at least 10-15 here, both Enclave soldiers and officers. Take what you need from the corpses, then enter the ol' Gift Shop when you're ready. You'll find several more Soldiers in the Gift Shop area, deal with them as you see fit. If you destroyed the turret system earlier, it may be repaired at this point, so watch out. You can always rehack the system and disable it, or turn it on the Enclave. The basement is clear, so don't bother with that section. You know where you have to go...the Rotunda. This is the final showdown, be prepared. Depending on your reasoning skills and speech, you may not have to fire a shot, you may WANT to fire a shot. Autumn stands between you and Project Purity. I'll leave the decisions up to you, do what you like with him. When you've resolved the issue, you'll get a message from Dr. Li through the intercom. It seems the fighting has caused a massive build up of pressure in the tanks, if Project Purity isn't engaged immediately the whole place could blow! Theres one problem though...theres still a huge amount of radiation in the Control Room. This means whoever enters the room to activate the system will probably die. It's between you and Sentinel Lyons, one of you must go in. I'll tell you now, you cannot explore the Capital Wasteland once Project Purity has been activated, so unless you're looking to get a certain ending, you might as well be heroic and accept the task and finish your father's work. Trust me, theres no way around this. You can take all the Rad-x you want, once you choose to initiate the system, theres no coming away from it alive. You can try and talk Fawkes into taking your place, apparently he wants you to be a hero though. You may or may not be wondering what the password is for Project Purity. It's rather simple, if you haven't figured it out. Think back to your mother, and your 1st birthday. The Bible passage, Revelations 21:6. 216 is the password you need to input at the keyboard. The numbers are kinda small, but you should have enough time to do the entry work. If you wait forever, the place WILL blow up. Do the deed, hit enter, then watch the ending you made for yourself. Depending on your actions throughout the game, you will get one of hundreds of possible endings. Enjoy it, you earned it, congrats! Now restart the game and play as a bad guy (Or good guy, if you were bad before). Of course, you can always reload to the point before the final battle and finish all the little things too =) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Optional Quests ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ *****Optional Quest 1: The Wasteland Survival Guide***** If you talk to Moira Brown in Craterside Supply in Megaton, she'll start going on about the book she's writing. She wants you, as a Vault Dweller, to do the foreword to the book. Now, based on your different reactions and replies to her questions, the book will shape up to be cynical, intelligent, strong, etc. You'll notice dialogue options each time you talk to her after completing one of the steps. Theres 3 chapters she's writing, and each chapter has 3 sections in it, so that means theres 9 different sub-quests within the Wasteland Survival Guide (Which means good xp for you). This quest chain also comes with some nice rewards, or side effects in some cases =) This quest is epic in size, you could write a FAQ for just this alone. ***Get Radiated*** One of the options you can research in Chapter 1 is how radiation affects humans. Moira claims she's never had a live sample of an irradiated individual; they just don't make it back alive. She assures you you'll be fine though, and asks that you get at least 200 rads and return. She'll give you a bonus if you get 600 rads though. The easiest way to complete this quest is to go drink some water in the pool beneath the giant, stinkin' Atom bomb in the center of town. Get up to 600+ rads and then return to Craterside supply. After going through Moira's little experimentation you have a nice little side effect...a mutation. It's a good mutation though! Now, when you achieve advanced radiation sickness, your crippled limbs will automatically regenerate! Doesn't that sound fun? She'll also give you some drugs as her way of saying "Sorry I twisted your DNA like a kitten with a ball of yarn." I swear, Moira's responses in this game are hilarious, partially because she's a little crazy. The Rad Away and Rad-X will help prevent and remove any radiation you pick up. You can always see a doctor to remove radiation for 100 caps, or if you buy the "My First Infirmary" for your house you can remove it for free after the initial cost. Please note, if you do NOT get at least 600 rads, you won't get the neat little limb regeneration perk; you'll only get the drugs. ***Find Food and Medicine*** One of the next parts of Chapter 1 you can research is searching for food and medicine out in the wasteland. Moira wants you to check out the nearby Super Duper Mart to see what they have. She wants to find out if they have food for sure, but medicine is good too. The mart is just east of town, be sure to bring some heat with you though and some defense, I have a feeling other people want to "research" the store. Outside the Super Duper Mart you may run into a few Raiders already, so be prepared. If theres no Raiders, there will probably be a number of Vicious Dogs waiting to attack. Clear the front of the mart; you'll probably be approached by a Bryan Wilks at this point. He starts rambling on and on about creatures this, and dead grownups that. If you choose to help him, he'll tell you that his town of Grayditch is south east from your current location. This will be covered in another quest though; it's separate from this one. Once inside the mart you'll have roughly 8 Raiders to deal with. Some are walking on top of the displays, scouting for intruders, others are in the back, and theres at least one in the side rooms near the restrooms on the left. The key here is to NOT have them all jump you at once. A smart move would be to stealth over to the restroom area, take out the Raider here quietly (Be it with Melee Weapons, Fists, Silenced 10mm, whatever you may have). You can then use this area to try and lure other Raiders to their death. If not, you'll at least know you're boxed in and nothing can attack you from behind =) If you pick up a Hunting Rifle in your travels you'll find they're decent for hitting targets at long range, and can do some decent damage if you're going for head shots. If Melee Weapons are your thing, you'll have good chances to knock weapons out of Raider's hands here, effectively taking the offense out of them before you take them out for good. Once you've cleared the mart, near the back center of the store you'll notice a counter. You can jump behind it, or go around using the door to the back area. Behind the counter you'll find ammo, grenades, a Motorcycle gas tank, the key to the Pharmacy, and possibly some food/drugs. Theres also a counter at the front of the store, effectively customer service, that has Laser Pistols on the counter, be sure to take these. You'll also find some more ammo, some stimpacks on the counter, and food in the refrigerator. If you take the food, your quest will update and says you can head back to Moira...but let's not go yet. Head to the back left corner of the store. Behind the counter here you'll find a lot more ammo, some frag grenades, a book "Tales of the Junktown Jerky Vendor," and more goodies. You'll also see a computer terminal nearby. Use your Science skill to hack the terminal and open the nearby door. In the back you'll see another computer terminal, a Protectron robot sitting in its docking bay, and shelves with more goodies. Let's have some fun with the robot...before you touch the terminal, take the employee ID that's above the computer. Hack the 2nd computer terminal, and then have the computer run the maintenance routine. The robot will come to live. About this time, if you look out front, you'll see some new Raiders have joined the party, one sounds to be on the PA system. Have no fear, the robot you just activated will spring into action and laser blast the baddies, leaving you to mop up and loot the back room before heading out. You can find some Rad meds, Mentats, ammo, and a few Quantum Nuka-Colas in the back room, among other items. You can kill the Raiders yourself for xp, but its much more fun watching the Protectron reek havoc on your unsuspecting foes. They'll think twice about knocking over this store now! You can gather up all the little tin cans and milk bottles scattered around the mart, but it's rather pointless. It can all add up to a decent value if you trade it all in...Believe me, I looted each and every one on my first play through, but crawling back to town got old...fast. So, once you have what you need, use your map to fast travel back to Megaton and talk to Moira. When you get back to Moira you can tell her what you like regarding the Super Duper Mart. She'll let you keep whatever you found anyway. She'll give you 3 Iguana Bits and a Food Sanitizer, which will make your food a little safer to eat; it works like magic behind the scenes. ***Minefield*** The last part of Chapter 1 involves navigating a mine field and bringing back a live mine for study. Sounds like fun! Fortunately Moira just HAPPENS to know of a town called...get ready for it....Minefield that has mines strewn all over the place. Minefield is a good hike north of Megaton, so prepare for a trek, and sell off any and all loot you don't need to make space in your packs. If you want to profit from this big time, you'll want to take them all back with you. If you haven't been that far north yet, you may wanna stop by the Scrapyard just south of Minefield to pick up Dogmeat, who may be your first companion. Then again, with all the mines you may decide to hold off on Dogmeat or pick him up and leave him at home for this. When you get to Minefield, be wary at all times where you tread. The mines planted along the streets are easy enough to spot, but in the grass/dirt it can be difficult to see some of them. The mines tend to blend into the dirt very well, the only tell-tale sign of one in these cases is the small, red blinking button (And of course the initial "beep" when you get close before the explosion, heh). Mines are easy enough to disarm, when you see one move up on it quickly and hit the action button. If you wait too long once you hear the beep, you'll be crawling out with stumps for legs. I suggest using the streets whenever possible, as they're less dangerous. Fortunately, there is only one hostile target in Minefield, an old coot named Arkansas. He does have a Sniper Rifle though, and has been known to shoot nearby mines as you get close to him. I don't advise running straight in against Arkansas, as he's well protected by mines all around and inside the destroyed structure he snipes in. Arkansas is basically here to take your focus off the landmines. Keep your eyes down rather than up at all times. Your best chance is to find cover and shoot from a distance or to try and lure him out of the building to a safer location. If you're persistent (Or bored) you can potentially disarm and loot all the mines in town for a nice profit. I picked up 47 mines the second time I ran through, and I had more the first time. The frag mines don't weight much, just .5 pounds each, but if you loot all of them you'll probably be sitting on 30 lbs. of explosives and good trade in value for cash. If you don't sell them, you can make use of them later against beasties like Mire<lurks>. To complete Moira's quest, all you need to do is get to the center of town where the playground is. You don't have to disarm all the explosives, but bring back at least one for Moira to look at as part of the optional quest. Don't forget to loot the 4 houses in town before you go! Each of them has 1 first aid box with goodies, 1 book to read and increase your skill, and 1 safe hidden in the house (Usually behind a dresser, under a bed, or hidden behind a cupboard). Also, if you go inside the building Arkansas was sniping from, you'll find some ammo crates stashed up top. When you get back to Moira, tell her about your little adventure and give her the landmine. She'll reward you with some grenades and a Bottlecap mine schematic. If you've been following the guide up to this point you should be done with Chapter 1, congrats! Moira will reward you with stimpacks. Theres a few tough objectives coming up though, so don't get ready to rest on your laurels. ***Mole Rat Repellant*** The next chapter is more about handling creatures in the wasteland and surviving bodily injury. One of the 3 quests you can choose from is to test a Mole Rat Repellant Moira has developed. She gives you a stick that's been doused with her chemical formula...now...you may be a little weary going against Mole Rats with just a stick, but trust me, this thing is hilarious. Be sure to equip the stick, then head to the Tepid Sewers to the east, just over the river. You can kill any 10 Mole Rats you wish in the Capital Wasteland, but you might as well head to these sewers. Something to keep in mind: in this Chapter, Moira ALSO wants us to test...umm...bodily injury. If you happen to get seriously injured during this mission, and/or crippled, try to hold out and only heal when necessary so you can kill two birds with one stone =) If you haven't been across the river to the eastern side of the Capital Wastes, be warned. You'll probably encounter a Raider battle with a few Super Mutants. The encounter doesn't seem to spawn until you cross the river the first time and reach the Farragut West Metro Station. Anyway, once you reach this station and survive the battle, the Tepid Sewers will be just south-east of there. Be warned, while there are many Mole Rats in this location, its also infested with Raiders. Theres also a sentry gun, you can disable it by hacking the computer terminal near the entrance. When you reach the old metro part of the Tepid Sewers, be warned, as Raiders have laid land mines in the location. You should be pretty good at disarming these by now, just be sure not to go charging in. Moira only asks that you "repel" 3 Mole Rats with the stick, but to achieve the optional quest reward you'll need to kill 7 (She verbally asks you to kill 10, disregard this). Once you killed your Mole Rats, fast travel back to town. Moira will reward you with the leftover chems from making the "repellant," a few Jets and Psycho. She's a little upset that the stick didn't so much repel the filthy Mole Rats, but made them explode. That's ok, seems to work great for us! On to the next task, if you got injured and didn't heal during the last mission, you may already be done with this one! ***Surviving Bodily Injury*** Moira next asks that you get seriously injured so she can study how it affects one's reasoning, survival skills, and umm...Ok, this one is just kinda silly, I don't really know what to say. I guess she wants to tell her readers how to prevent and survive this kind of damage. If you got injured during the last quest and didn't heal yourself, you may already be on your way to having this step done. NOTE: if you came to Moira with 50% or more damage and took this objective immediately after returning from the Mole Rats, you will need to EXIT Craterside Supply and walk back in before you can turn the quest in and get the reward. If you were already healed before you took this quest, no problem. The easiest way to rectify this is just run into some baddies and let them shoot you up. To get the optional reward, you'll want to be crippled too. An even easier solution for this is to plant a frag mine at your feet (Hopefully you saved a few from Minefield) and shoot it. One or two should be all you need to get crippled and under 50% health. Return to Moira for your rewards, some Med X and the Environmental Suit. Before you take the next quest, I suggest you may want to head to the Anchorage Memorial (south-east along the river you crossed earlier for Mole Rats) first and clear it of Mirelurks, if you want to complete the optional quest. If you're not worried about the optional reward, don't worry. ***Studying Mirelurks*** The last task Moira has for you in Chapter 2 is to study the Mirelurks. If you haven't run into a Mirelurk yet, they're nasty creatures, much like giant, walking snails. They have tough shells, their most vulnerable location is their face (Which is often and impossible to target if one is barreling into your ribs). I've found that Frag Mines work absolutely great for Mirelurks, as well as any other creature in the Wasteland that can't shoot projectiles. What I like to do is plant 2-3 Frag Mines along a straight line, get a Mirelurks attention (Like shooting it in the head) and then watch as it blows itself up. You can use this strategy for this quest, just let me warn you...if you take on the Mirelurk King, prepare to use up 7-9 Frag Mines on him alone. You can find a nice nest of Mirelurks in the Anchorage Memorial. It's very close to the Tepid Sewers from earlier in the chapter, in the middle of the river you crossed. Please note that if you want to achieve the optional reward for this quest, you do NOT want to kill any Mirelurks. Easier said then done, I know, they'll follow you from room to room if you run. The solution to this is to clear the location BEFORE you take the Mirelurk quest (Hopefully you took my advice in the last mission). If you have already taken the quest, and you didn't clear the facility ahead of time, you can attempt to sneak to the location for the optional reward. A Stealth Boy would help immensely with this task, seek one out if you can. Theres a few places you can enter from, the safest location is the door heading into the wall of the memorial itself. One of the other doors jutting out into the river itself leads right to the Mirelurk King, and you may not want to start there.. Now that we have the loot, the only thing left to do is to finish the quest. If you were in the Facility Bay earlier, you can actually stash Moira's observation device here, in the little pond where the eggs are. Just use your action key on one of the eggs and you'll have the option to put the device there. At this point, your job is finished. If you cleared the whole facility ahead of time, theres nothing more to do. If you still have yet to face the Mirelurk King, he's in the Office area. You can access the Offices from the Facility Bay area. You won't get anything special for killing the King, aside from the personal satisfaction the memorial is clear. You can plant the observation device down in the Mirelurk pools where you find the King as well, wherever you see an egg pod essentially. When you're finished, head back to Moira. She'll give you a few Stealth Boys (These would have come in handy for the mission...). If you're following the guide, Chapter 2 should be done now. Moira will reward you with 20 rounds of .32mm ammo. ***Using Old Technology*** Moira says Chapter 3 will be a little deeper, it will deal more with the survival of humanity as a whole and using old technology. The easiest quest to start with in this last series of quests is the old technology one. Moira wants you to head to an old Robco Factory and activate all the robots there using a widget on the main mainframe. She also wants you to be on the lookout for other old technology you can make use of there. The factory is located south-west of Megaton, a decent hike away. The entrance to the factory is on the southern side of the building. The first area is fairly straight forward. The factory should only be inhabited by Mole Rats and Radroaches, hardly a challenge for you by now. Theres no shortage of closets and desks to be looted here, take the ammo you find and any other parts that can be used to make weapons, there is a tool bench here. The door you're looking for leads to the Offices and Cafeteria, you'll have to climb some steps to the rafters of the factory to reach it. Once you're in the next zone you'll find more Mole Rats and Radroaches here. Theres not a lot of ammo here, but a good number of parts to make weapons with, as well as two Stealth Boys among the desks and shelves. Your target is up the stairs on the other side of the area. Theres a mainframe there that you want to plug the widget into, save first! Once you plug the widget in, the robots all over the facility will reactivate and go into "purge" mode, meaning you'll become hostile. So much for having a robot army at your disposal. You can quickly fix this by hacking the terminal once you install the widget. Turn the genocide option off, then set the robots to clear pests. Your work should be done, and your optional quest should be done as well. The robots will take care of most of the remaining vermin, if there are any. Loot what you want and need, then fast travel back to Megaton. When you get back to Megaton, Moira will reward you with Pulse Grenades and a Big Book of Science, provided you did the optional quest to reprogram the robots. That's one task researched for this chapter, 2 to go! The next one will be about the same difficulty, if you follow it through to completion. If you've already been doing some exploring, or part of the main quest line, the trip should be easy. ***Learning About Rivet City*** If you haven't been there, Rivet City is a giant, broken ship that's floating in the river in the south-east part of the Capital Wasteland. It isn't too hard to find, if you head east out of Megaton, follow the river to the south you'll eventually see the Jefferson Memorial. If you go just east from there, you should see the ship. To board the ship, climb the stairs of the metal structure nearby and look for the PA system, they'll swing the bridge over for you at that point. Anyway, now that you know where Rivet City is, your next quest is to go there and learn about their history. Moira wants to document how a group of people come together to form a community, so future wastelanders will know what helps form this collective. Theres a couple ways you can go about this. If you ask around to various people on the boat, some will be sketchy on the actual details, even some that have been there a long time. Don't be fooled though, theres only 1 or 2 people on the whole ship that have the real story. If you talk to Banon, he'll claim to have been there from the start...but not quite. If you've spent 2 minutes with this NPC, you already get the feeling he's a bit arrogant and thinks highly of himself. Instead, speak to the older woman in the Muddy Rudder, Belle Bonny. To get to the Muddy Rudder, head to the stairwell and go to the bottom floor. If you try your speech skill against Belle, she'll eventually suggest you speak with a Mr. Pinkerton who lives in the bow of the broken ship. On your way in, you may have noticed the front of the ship is detached from Rivet City itself, Pinkerton lives in that hunk of wreckage. If you're attempting to get the special Plasma Rifle, or wanting to investigate what happened to Dr. Zimmer's escaped robot, you may want to check out my write up on the Replicated Man optional quest before continuing to Pinkerton. Getting to Pinkerton is no easy task. He obviously doesn't want visitors, otherwise he wouldn't be living by himself in a wreck of a ship. To get inside you'll need to do some diving. You're going to take a little radiation on this trip, so either pop some Rad-X, or make sure your rad count is low before you dive in. Wade out into the water and swim toward the broken bow of the ship. If you check your local map, you'll notice where the break occurred a door lies under the water, just to the right of center. Take a breath, then swim quickly down and through the door. You'll want to turn your light on right away, then swim forward and up to get to air. You have to watch your O2 meter closely here, if you run out of air, you'll start running out of health...and fast. Check out your local map, it'll help you navigate through the waters a bit. Once you're in the first room, look to swim west through a couple doors. After you've gone through 2 doorways, take the first door on the left. You should see a set of steps, run up the stairs quickly and you'll get some air. You'll probably get some Mirelurks too, if you haven't already had them on your back. Take out the Mirelurks quickly, there should only be a few. Go up one more flight of stairs. At the top of the stairs you have two directions to go, once is a very hard lock to the outside of the ship, the other is booby trapped, don't bother with the locked door. The way to your target is full of traps. Watch your feel for trip wires, disarm them first. When you open a door, watch for Combat Shotgun traps (There will be a pressure plate you can disarm). Continue through the ship. When you reach a door that you can't open normally, don't try to use the terminal, it'll explode. Check the wall on the other side of the door, theres a switch to activate. Hit the switch and the door will open. You're now in Pinkerton's personal lab. You can ask him about Rivet City's history, he'll give you the real story. It turns out he was ousted in a way by Li quite awhile ago, shortly after you were born. He chose to move to the wrecked bow to get away from everything. If you ask Pinkerton for proof, he'll give you what you need. This should give you the evidence you need for Moira, and your quest should fully update, go ahead and head back to Megaton. If you're doing the Replicated Man optional quest, and have done the full investigation, ask Pinkerton about this as well. Head back to Moira. Tell her about the history of Rivet City, and provide Pinkerton's evidence. She'll reward you with some Mentats. If you're following along you only have 1 more objective to complete! Let's get started. ***Learning About the Past*** Moira wants you to visit the Arlington Library. She wants any information on past history that you can find there. Your primary objective is to access the card catalog. Ideally, she'd like you to pull all the information out of the archive that you can as an optional quest. If you ask about a reward, Moira says she could reward you with a book for this quest, but she figures you'd like caps more, I agree =) Arlington Library is to the south-east of Megaton. You'll probably encounter more than one group of raiders along the way, so prepare for a fight. The safest way there is to head east of Megaton to the river, then follow the river south, past the Citadel. This will drop you pretty near the Arlington Library. Inside the library you'll be approached by a Brotherhood Scribe right away. Let her know you're here to do research, she'll let you go. She'll also give you a repeatable quest. If you find any Pre-War books in the library, or anywhere else for that matter, save them. She'll give you 100 caps for each one, nice! Keep that in mind when you're scouring the library, check all desks and shelves you come across. Burnt out books won't do, only the Pre-War ones. The library itself has a lot of twists and turns, and its pretty full with Raiders. On the plus side theres also a few Brotherhood members to help clear the place out. Keep your eyes on the floor for a few frag mines. Also, theres a couple turrets around, you can turn the turrets on the Raiders or just shut them down. If you want to complete the quest in a hurry, you can ask the Brotherhood Scribe at the entrance for the password to the card catalog. She'll get you access, you can check the terminal right there at the desk and your main quest will be finished already! IF you want the optional quest reward, you'll have to dig a little deeper. The optional quest reward can be found in the Arlington Media Archive. To get there, head to the other end of the 1st floor, a door will take you there. The computer you need to access can be found in the south-west corner of the Archive, its guarded by a few Raiders. Feel free to scavenge the Children's Wing, you'll find a good number of Pre- War books there. If you enter the Children's Wing from the Archive, you'll find 3 books right away that are otherwise unattainable (They're on the 2nd story and no stairs, just a hole in the floor). Unfortunately, most the library doesn't have a lot of good loot. Most your profit will come from looting Raiders, there are a few ammo cases lying around. When you're ready, turn in your Pre-War books at the front desk, then head back to Megaton. When you get back to Megaton, give Moira the final piece of the puzzle. If you got both the card catalog and the archive on holotape, she'll reward you with 200 caps and a Congressional Speech book. Also, for completing the final chapter you'll get a Mini-Nuke Moira was saving to dig a well...scary. So, you're all done! Depending on your responses during the whole book process, you'll receive your own copy of the Wasteland Survival Guide. Your responses to Moira's questions will alter the Survival Expert perk you receive for completing the quest. The second time I did the quest I replied with all the cynical responses and received +6% to Poison and Radiation resistance and +4% to Crit Chance. <More info on Wasteland Survival book bonuses to come> *****Optional Quest 2: The Replicated Man***** I'm sure if you've been to Rivet City and to the Science Lab there, you've come in contact with the wonderful Dr. Zimmer. He's arguing with Anna Holt, trying to speak with Dr. Li regarding a missing android of his. Zimmer comes from the Commonwealth, a group that produces incredibly lifelike androids. Zimmer claims one of his most prized and advanced androids "escaped" and he's tracked him to this area of the Capital Wasteland. If you speak to Zimmer about this quest and accept his offer to search for the android, be sure to ask him everything you can about it. Why the android is special, where he may have gone, etc. He'll give you an optional quest as well to go talk to Dr. Preston. It seems the android may have had a mind wipe and facial reconstruction to hide his identity, and Dr. Preston may know something about this. Speak to Preston. He'll admit that he received a holotape that circulated to all the doctors around the wasteland. In the holotape, an individual is requesting help with a mind wipe and facial reconstruction. Preston wholeheartedly believes this is a human and the whole thing is a hoax. He seems believable, so we need to continue our investigation elsewhere. Now, sometime around here you'll be approached by Victoria Watts. She usually hangs out in the Marketplace, but she may hunt you down anywhere. She'll mention that she's a member of the Railroad, an organization that tries to free and protect escaped androids. Kind of like Underground Railroad...except not. She wants you to quit the investigation, and she has a way to get Zimmer off his chase. She has somehow acquired a piece from our missing android friend. She wants you to lie to Zimmer, tell him the android is destroyed to make him leave. If you do this, please note that you will NOT receive Zimmer's good reward, he'll toss you 50 caps and leave. Also, you will not be able to acquire the special Plasma Rifle, so you're out two great rewards. I can tell you how to get both, so continue reading. Now, I'm sure theres other people you can ask about this, but I didn't have much luck. Li's and her team don't seem to know anything about the robot, or they're keeping quiet about it. If you were to confide in someone, say...confess something, who would you go to? A priest perhaps? Check out St. Monica's church. If you look below the pulpit in the church you'll find a holotape, give it a listen. When you're done, ask Father Clifford about it. You'll point out that he's a member of the Railroad, and ask him what he knows. He won't give up any concrete info on where to go next, although the first time I played through I could have sworn there was a Speech option here. If you spoke to Seagrave Holmes before speaking to Father Clifford, and you received another holotape from Seagrave, Father Clifford may open up. Either way, continue reading. Now, if you've spoken to Seagrave Holmes in the Marketplace before, you'll know he's been in Rivet City since he was a boy, and he has a lot of odds and ends to sell. If you've already spoken to Father Clifford, ask Seagrave about the android and he may admit right away that Pinkerton did the memory wipe on the escaped android. So, it looks like we need to go to Pinkerton. *Update* alex_gh let me know he also found a holotape and information off Red in Big Town. She pointed out that Pinkerton had access to the tools needed to do the mind wipe and facial reconstruction, but she didn't know why he needed those. I've done some more research on this, it looks like most or many of the doctors around the wasteland have this info, it was circulated to all of them. Interestingly enough, Pinkerton was right there in Rivet City the whole time. Feel free to seek out these other doctors, but all the clues you need should be in Rivet City. If you've read my write up regarding Moira Brown's Wasteland Survival Guide, and you've done the quest to find out about Rivet City's history, you'll already know where Pinkerton is. You can kill two birds with one stone and find out about the history and the android at the same time. Read where to find Pinkerton in my explanation of that Wasteland Survival quest. When you get to Pinkerton, ask him about the android. He'll feign ignorance at first, but if you persist, he'll open up. He'll let you know he documented everything so he could rub it in Dr. Li's face later. If you ask Pinkerton if theres something he's not telling you, he'll admit that he didn't actually perform a mind wipe, he just suppressed the androids memories deep down. He'll give you the evidence you need, and he'll give you a code to speak so you can make the android remember his former self. This should be all you need. Before you leave, if you're doing the Rivet City history section of the Wasteland Survival Guide, be sure to ask Pinkerton about this. Pinkerton can also do facial reconstruction on you if you want. You now have THREE options. You can go speak to the android and make him realize who he really is, then help him keep his identity safe. Alternatively, you can tell Zimmer where his android is, receive his reward, and your mission is done. Finally, you can make the android realize who he really is, receive his reward, tell him you'll take care of Dr. Zimmer...then tell Zimmer the truth, receive his reward as well, and quickly end his life before he's able to collect. If you prefer the later option and want both rewards, read on. If you want the first reward, read the next paragraph and just give Zimmer the android part from Victoria Watts.<Spoiler coming next paragraph> When you're ready, make a save (preferably a new one) and go find Harkness. He's usually at the front gate of Rivet City, later on he'll wander the Marketplace and maybe the Weatherly Hotel. Inform Harkness about the android, he won't believe you at first. Show the audio testimony and pictures. After that, ensure him that androids have synthetic skin and blood, they appear just like humans. When he's still trying to make sense of all this, provide the memory recall code Pinkerton gave you. Harkness will remember everything. At this point, you have your options. If you ask Harkness what he's going to do about Zimmer, you can offer to kill Zimmer for him. You'll receive the A3-21 Plasma Rifle, you can then go to Zimmer, tell him the truth, receive his reward (A boost to your VATS targeting), and then kill Zimmer before he can collect Harkness. If you tell Harkness that his secret is safe, you'll get the A3-21, but you will NOT be able to kill Zimmer if you accept Zimmer's reward as well. Zimmer will only incapacitate if you try to attack him. He'll eventually find Harkness, use a subroutine to reset him, and walk away with him leaving Rivet City without their head security guard. If you tell Harkness that he's going home, you don't receive the A3-21, but you can get the VATS reward from Zimmer. Once you've spoken to both the android and Zimmer, your quest will be complete. I know theres a lot of options here, some good and some bad. Getting both rewards is possible, get one reward or the other is possible, and getting no reward is possible. Make your choice, either way, Replicated Man will be finished. *****Optional Quest 3: Big Trouble in Big Town***** If you're doing the quest "Strictly Business," and you're looking for Red, it seems that Red is not in Big Town currently. Speak to the townspeople in Big Town, you soon find out that Super Mutants have carried off much of the town, they're being held in the Germantown Police Station. Germantown is far to the north, your quest marker should update to this location. When you get to Germantown, seek out the Police HQ. You'll run into a Super Mutant or two outside, and probably a Centaur. There are two entrances, one leads to the top floor, the other leads to the ground floor. If you're looking for Red, she can be found on the ground floor, very close to the door outside. To get her out of the cage, use the terminal nearby to open all the cages. Be careful, the whole police station has frag mines lined along the floor, probably 10 or so total. Theres a lot of great loot to be had here, closets with weapons and ammo. There aren't that many Super Mutants in the whole place, but there is a Super Mutant Master, so watch out. When you rescue Red, you have the option to go find Shorty too. They recently dragged him down to the basement. The basement entrance will be on the northern side of the ground level. There aren't many Super Mutants downstairs either, save Shorty quickly, they're going to use him for a snack! When you've found Shorty and Red, exit the Police HQ, then fast travel back to Big Town. When you get back to Big Town, speak to Red. She can reward you with 300 caps. If your Speech skill is high enough, you can con her out of another 200 caps she was saving for medicine, and you'll get some negative Karma. Shorty doesn't give you anything for saving his hide. Stick around town, they'll soon be attacked by Super Mutants (Check the Freeform quest section for more info). *****Optional Quest 4: Strictly Business***** If you're not a bad character, you have two options to get into Paradise Hills, the slaver town. You can try to bribe the guard with 500 caps, or you can do this quest. The guard out front wants you to enslave a few people, its your choice which one you decide to pick up, enslave any target you want first. Please note, if you've killed one of the targets, or if they've died by other means, they will no longer be available for slavery...duh. For instance, if you did Tenpenny Tower, Susan Lancaster may be dead. Also, if you went to Minefield and/or completed Moira Brown's Wasteland Survival, Arkansas may be dead. Red could be dead if she did not survive the Super Mutants. Flak should hopefully still be alive in Rivet City. Red is the doctor in Big Town, apparently she failed to deliver on a few promises, the slavers want her. The only problem is, Red won't be found in Big Town when you first go there (Check out the quest "Big Trouble in Big Town" above for more info on how to retrieve Red). Once Red is back in Big Town and you've received her reward, feel free to double cross her and hit her with the Mesmetron! You can also take her special clothes after you've hit her with the Mesmetron. Send her back to Paradise Hills and you'll get 250 caps and some xp once you speak to the guard out front. He'll also give you a collar to get another slave. If you're looking to get into Paradise Hills, you're now able to walk in without getting shot at. The other targets are much easier to come across, provided they aren't already dead. Arkansas can be found in Minefield, although he'll probably see you before you see him. It'll take some effort to get to his sniping location to mez him, unless you lure him from his spot. Susan Lancaster can be tricky, as she'll constantly be around other people. Your best bet is to wait until she's in her penthouse room at night so you can get her then. Fire away once the door is closed and no one else is in the room, then collar her and send her off. Flak will be the hardest one to collar, but he'll also be the least likely to already be dead. He'll be in Rivet Town, my best suggestion is to wait till its late. You can try and follow him into his room, if Shrapnel isn't there you can mez him with the door closed. Be careful though, if a guard sees you in the vicinity of Flak when he starts heading to Paradise Hills, they may go hostile. A trick I like to use is collar my target, let them leave, shut the door, then wait an hour. It should be clear after that. Head back to Grouse in Paradise Hills after each target you enslave, he'll give you another collar and send you on your way, as well as rewarding you with 250 caps each. I've had the quest bug on me (In a good way) and was rewarded for turning in Red twice. If this happens, talk to Grouse again to also receive the bounty for your last target, your quest should then update. Note: the slave collars are quest items, if you start getting more than 1 on your character, they'll hog carrying weight. You can enslave other NPCs if you wish to get rid of them =) *****Optional Quest 5: Tenpenny Tower***** This one is a fun one, and it has multiple possible endings here. Here are the possible endings to this quest: 1. Help the residents of Tenpenny Tower by disposing of the ghouls living in Warrington Station. 2. Help the ghouls of Warrington Station get into Tenpenny Tower by removing the lock to the underground entrance. 3. Help the ghouls and the Tenpenny residents by finding a common ground so both can live together in harmony (Well, not really). *Option 1*: If you want to dispose of the ghouls, read on. Speak to the residents and Chief Gustavo in Tenpenny. To get into Tenpenny, simply speak into the intercom at the gate outside. You'll receive the quest from Gustavo to eliminate the ghouls, he'll also give you a Hunting Rile and ammo. You can try and use your Speech skill to increase the caps reward, 500 is the base reward though. When you're ready to find the ghouls, exit the tower and head west to Warrington Station. You can't get in directly to the area the ghouls are holed up, you'll have to go through the Warrington Tunnels to get to them. Look for the old train west of Tenpenny, you'll see an entrance to the Tunnels nearby. Make your way through the Warrington Tunnels, lots of Feral Ghouls here (Aim for the head, usually works best). The way into Warrington Station is to the north- east, the path is fairly linear. Theres a little bit of looting you can do along the way, a couple closets with meds, ammo, and junk. Once you're in Warrington Station, you'll soon run into Michael Masters. He'll ask you to put your weapon away, and why you're there. You can kill the ghoul right now, but you may just wanna wait till you meet with Roy, catch them by surprise. The choice is yours, if you plan on killing the ghouls, you'll have to kill Michael either way. Continue through Warrington Station, you'll find Roy holed up with Bessie in a pocket of rooms. You can follow Masters if you left him alive, or just take the first right once you go through the gate below the main station area. You can waste Roy and Bessie at this time if you wish, Roy packs the most punch of the ghouls, you can attack while they sleep if you want a bigger edge. Once you're finished with them, head back to Gustavo. *Option 2*: If you want to help the ghouls rid the Tenpenny Tower of humans, read on. I suggest you make a fresh save here, and if you plan on doing the "You Gotta Shoot 'Em in the Head" quest from Underworld, you may want to take care of it now. You can take this quest even if you've already told Gustavo that you'll kill the ghouls. Use the guide in Option 1 to get to the Warring Station and meet with Roy. Speak to Roy, you'll find out he wants to clear Tenpenny Tower out and rid the world of the bigots, that way the ghouls can live there. His plan is to open the emergency exit to Tenpenny Tower and sick the Feral Ghouls on them. To do this, he'll need your help. After you've spoken with Roy, head back to Tenpenny Tower. You can ask Gustavo about the emergency exit, but he'll be leery to give you the key. You can try talking him into giving it to you, but its much easier just to pickpocket it off him. Wait for a moment late at night when there aren't a lot of residents running around, or catch Gustavo when he's napping. Once you have the key, head outside the tower itself, and around to the back. You'll see a set of stairs and a door to use the key on. Head on down, then head to the terminal. Hack the terminal and open the emergency access, you'll then see Roy peer through the window. Roy congratulates you, then tells you to meet him out front. Head back to the front of Tenpenny Tower to meet with Roy. He'll give you a Ghoul Mask that will keep the Ferals from attacking you, be sure to put it on! Then head inside the tower. Help the ghouls wipe out all the smoothskins, when all of them are dead you can talk to Roy. He won't provide any dialogue options, but he'll mention the place needs cleaned up. Head to the ground floor of Tenpenny, if everyone is dead Masters and Bessie should be there now. Before you do anything else, be sure to loot all the residents! If you want, leave Tenpenny, fast travel to another location, then fast travel back. When you return, Tenpenny Tower will be cleaned up and many ghouls will be living there! (You may need to wait 24 hours for this to happen. Also, if you have a suite in Tenpenny, you'll be able to access it again at this time). Bessie and Masters will become vendors to replace the dead ones. *Option 3*: If you want the notorious third option, speak to Gustavo and the residents to learn about the ghoul problem. You don't necessarily have to take the quest yet, just find out where they're holed up. Use the description in Option 1 to find out how to get to the ghouls. Speak to Roy, he'll say he's cooking a plan to unleash the Feral Ghouls on the Tenpenny bigots. You can tell him you want to help provide a non-violent solution to the problem. Roy will accept your proposition, but he doesn't want to wait forever. Head back to Tenpenny Tower. Ask to speak to Alastair Tenpenny, Gustavo doesn't think Tenpenny will allow ghouls in the tower, but try your luck. Go up to the Penthouses using the elevator, Tenpenny is usually out on the balcony getting smashed. Tell him about the ghoul situation, surprisingly he'll be easily persuaded to consider letting the ghouls in! On one condition, he wants you to speak to the various residents and get their approval. Now THIS is easier said than done. Tenpenny wants you to talk to Mr. and Mrs. Wellington, Mr. Ling, Mrs. Montenegro, and Ms. Lancaster. I can't remember, but you may need to talk to Mr. Cheng as well. Theres a few more named residents of Tenpenny Tower, Michael Hawthorne is one, as is the legendary Herbert Dashwood. In any event, you'll have to talk to the people Tenpenny lists before the ghouls can move in. In most cases, this is not going to be a pretty event. I would make a save here, just in case. Most of these ghoul bigots will not be happy when you tell them the ghouls are going to move in. They want no part of it, and are unwilling to compromise. You'll have to force them out (Through dialogue), they'll eventually pack up their bags and leave for good. Ms. Lancaster will move into Burke's pad in the Penthouse Suites (So you can enslave her later, should you choose to do so). The other residents Tenpenny doesn't list should be fine with the ghoul neighbors. Speak to them all if you wish, they'll back you up and let Tenpenny know they're cool with it. You may want to make another save here, a new one. Also, if you're planning on doing the "You Gotta Shoot 'Em in the Head" Optional quest from Underworld, I suggest you take care of it now, just in case. There may be a bug if Tenpenny is dead already. Once you've spoken to all the required individuals and you've evicted them, speak to Tenpenny for your reward. He'll let you know the ghouls can begin moving in. You can now head back to Warrington Station and speak to Roy, they'll immediately begin moving to Tenpenny Tower. You'll also receive the Ghoul Mask from Roy, Feral Ghouls will leave you alone now. If you head back to Tenpenny Tower, you can look for Alastair Tenpenny, but he'll be missing. Speak to Roy, apparently Roy and Tenpenny had an argument, and Roy says Alastair won't be coming back...hmmm. Also, if you decide to fast travel from Tenpenny Tower and return at a later time, you'll notice that all the smoothskins will be gone, only ghouls remain. You can speak to Roy or Masters about it, apparently the ghouls and the humans didn't play nice together, and the ghouls stashed the bodies in the basement. You can search for the bodies, but I don't think you'll find them. I checked the subways, all I found was a Feral Ghoul in the basement. On my first play through I decided to purge Roy and Masters from the Tower for their actions, Bessie doesn't appear to be party to the plot, I let her and the others live. *****Optional Quest 6: The Power of the Atom***** You may get this quest early, and theres two options here. Either option can lead you to getting a house in Megaton or in Tenpenny Tower. One option brings bad Karma, the other brings good Karma, keep reading. Speak to Sheriff Simms just inside the Megaton entrance. You can ask him about the giant Atom bomb sitting in the middle of the town, irradiating the water and just waiting for the right idiot to come in swinging a Sledgehammer at it. Simms won't give it much thought, but you can offer to disarm the bomb. Simms asks that you be careful if you attempt this heroic. Before you fidget with the nuclear device, you may want to head to Moriarty's Saloon. Speak to Mr. Burke, he'll be on your right when you enter. He'll let you know he's looking for an individual who has no ties to the town, someone who won't care if it's wiped from the earth. If you choose to accept his offer, he'll give you some pulse charges to rig to the bomb, these will...coax the bomb to finish its job. You can also try your hand, if your Speech skill is high enough, and convince him to give you more money. So, here are your options: *Option 1*: You can go back to Sheriff Simms and rat out Burke and his plan, be sure to show him the pulse charges Burke gave you. You may want to make a new save here. Follow the Sheriff to the saloon where he'll confront Burke. Burke will try to act all tough, the Sheriff says he's going to lock Burke up...Burke pretends to go along, but as soon as the Sheriff turns his back, Burke whips out a gun and will blow him away fast. You only have a split second to save the Sheriff here, otherwise he'll be toast. Hit Burke hard to put him down, you don't want Simms to die, otherwise you won't get the reward. With Burke dead, the bomb is safe, temporarily anyway. It still needs to be disarmed. To disarm the bomb you only need an Explosives skill of 25 or more (Kinda silly, you need less than average skills in explosives to disarm a nuclear bomb?). Feel free to disarm the bomb once you have the ability to do so. When you're done, go speak to Sheriff Simms. He'll be happy to know they no longer have to worry about the bomb going off someday. As a reward, he'll give you the key to a house at the north-east corner of the town as well as 100 caps, sweet! You're also the town hero and you'll get positive Karma. If you want, you can buy furniture and Themes for your house from Moira Brown in Craterside Supply. I suggest getting the Infirmary first, the ability to remove radiation from yourself for free is invaluable, and you'll save your Rad-X meds this way. You'll also be able to repair crippled limbs and heal your damage, if you happen to be against sleeping. *Option 2*: You decide you don't like the look of Megaton, and you want the place to blow. Obviously this is the negative Karma route. Make sure you take care of EVERYTHING you ever want to do in this town, including the Wasteland Survival quest, because you won't have an option to do it again. Moira will still be alive at the Megaton Ruins afterwards, but...she's not too keen on giving out any quests. It seems she'll only repair your items. Anyway, if you followed the information previously listed, you should be sitting with Mr. Burke's pulse charges in your hands. Whenever you're ready, head over to the bomb and choose the option to arm the bomb with the charges. Don't worry, it won't blow up yet =) When you're ready to see some fireworks, head to Tenpenny Tower, which can be found a good distance to the south-west. Tell the guard at the gate you're here to see Mr. Burke. Head inside the tower itself, then take the elevator to the Penthouse suites. Speak with the guard to your left, he'll open a door that will lead to the balcony. Speak to Tenpenny and Burke when you're ready, Burke will give you the satisfaction of activating the Doomsday device. You can open the briefcase, and then hit the switch...pretty! Speak to Tenpenny and Burke again when you're finished, you'll find out theres more than a 500 cap reward. Tenpenny has an offer for you to live in the tower, free of charge! Your room will be in the Penthouse suites, hang a right if you're getting off the elevator, your room will be the locked one. If you want to furnish your pad, speak to Mrs. Montenegro downstairs (Or speak to Bessie if Montenegro took a hike). As mentioned, the Infirmary is the most beneficial item, try to get it first. The Lab isn't too shabby either, but probably not worth the price tag. I got it for the looks mostly, and occasional free Stimpack. *****Optional Quest 7: You Gotta Shoot 'Em in the Head***** This is an interesting one. In Underworld you'll see a ghoul by the name of Mr. Crowley in Carol's place. He'll jaw with you for a bit, he doesn't seem too high on smoothskins. He'll then ask you to wipe out a few bigots that supposedly hate ghouls...ok. Ask around town a bit before you start causing some bloodshed. Carol and Quinn may mention that Crowley only recently became a smoothskin hate, and he's been vocal about looking for a wastelander to do his dirty work. Go speak to Crowley about it again, and he'll admit that these guys aren't all bigots. He offers you another 100 caps to seal the deal, all he wants are the keys off the targets, except Tenpenny. He wants him dead for sure. First, talk to Dukov if you want. He's located at Dukov's Place, just south- east of the Tepid Sewers and Anchorage Memorial. Speak to Dukov, find out a little bit about the job he pulled with Crowley. You can try to talk Dukov out of the key he has, or buy him off, kill him, or talk to Cherry. Cherry is easier to convince, she'll steal the key for you. She'll want you to escort her to Rivet City afterwards (Check the brief write up in Freeform quests). Once you have Dukov's key, check out Rivet City. Ted Strayer has the next key. Supposedly he inherited the key from his dad, who was on the same job with Dukov, Crowley, and Dave. Ted Strayer is a drug junkie, so it won't take much to get the key from him. You can try to talk him out of it, or offer him a mere 25 caps for the key. You can also threaten him, just don't go combat or the guards will jump in. He obviously doesn't know it's use, and he doesn't care much. Once you have Strayer's key, go check out Dave waaay too the north. You'll find the "Republic" to be...a little different. Ask Dave about the key, he'll tell you it's part of the lovely Republic of Dave Museum. The easy way to get it is to convince Dave you're an ambassador of the Wastes. Dave will give you the key as a gift from the Republic of Dave. If you decide to help with Dave's election, and you're planning on rigging it, you may want to get this key first. You should now have all the keys, only Tenpenny remains. Go to Tenpenny Tower and speak with Tenpenny. Hopefully he's still alive, if you did the Tower quest earlier, he could be dead depending on your choices. If he's alive, tell him about Crowley and that he wants him dead. Tenpenny will offer to buy you out for 200 caps (Twice what Crowley is paying). You can also get him to up the ante to 300 caps with Speech skill. Choose what you like, just take into account a guard may be nearby, or may go hostile later. From what I've seen, you don't have to actually kill Tenpenny or interact with him, Crowley just seems to want the keys. Return to Crowley with all the keys...or don't. Theres a few ways you can proceed at this point. You can head to Fort Constantine and loot the Power Armor for yourself. You can give Crowley the keys, wait a few days, then kill Crowley for the armor yourself (Which will allow you to cover your half of the deal if you told Tenpenny you'd kill Crowley). Finally, you can give Crowley the keys and be done with the whole thing. If you decide to get the armor yourself, here's how to get it. Head to Fort Constantine. The easy way in is through the CO Quarters. You'll see some Office Personnel entrances nearby, this isn't what you want. There will be a small house near this though, inside is a locked door that you can use one of your keys on. Feel free to take the Big Gun Bobble Head inside as well. You can find a Launch Code in the same safe as the Bobble Head. You'll be in the Launch Area if you go through the door in the CO Quarters. Theres some loot to be had here, but with most of the facility you'll need 100 Science or Lockpick to get the good stuff. Loot what you can in the area, launch the nuclear warheads from the terminal if you like (Anyone have any idea where they hit? I'm guessing they went to China, who knows). The next area is the Bomb Storage, this is where the best stuff is. There will be a few Very Hard locks with ammo and weapons on the other side, lots. The main target is the T-51b Power Armor and Helmet. You'll find them through the door to the R&D area. You'll find the body of Tara outside the door, she has a key you can use. Use the terminal nearby to drop the statis field, then take the armor for yourself! Your quest will update at this point, so you can return back to Crowley if you like and gloat, he won't have anymore dialogue options. If you decide to kill Crowley, keep it discreet. I killed him once, I dropped a Frag grenade into his Power Armor once he started wearing it. I ran out of the room just as it blew, waited a few hours then came back to claim the armor. *****Optional Quest 8: Trouble on the Homefront***** After you help Dr. Li and the scientists get to the Citadel, head back to the Megaton (Or ruins of Megaton) area. You should come in contact with an Emergency Signal from Vault 101. Its Amata, and it seems she's calling out for your help specifically. She has changed the password to the Vault door, you should be able to get back in now. Head on in if you want. Once inside you may be approached by Officer Armstrong, or Gomez if he's alive. They'll catch you up to speed a little bit on what's going on with the Vault. Whether you left in bloodshed or mostly peace, they should let you go out of respect for your father. Continue through the Vault, you'll see another Security Guard come in contact with Freddie. Freddie will make some idle threats, and the geezer will fire. Obviously things have escalated a bit here. Now, you can go straight to the Overseer's room if you wish from this level, or you can head to the Lower Levels. I suggest heading to the Lower Levels. Here you'll find Amata and many people that are referred to as the Rebels. You'll probably find one or two surviving Tunnel Snakes, maybe even Butch if you left him alive. Amata will be in the northern-most room, towards a sign that says Atrium. It will be your father's old medical room. Amata will explain in more detail what's going on. Either her father, the Overseer, or the new Overseer (If you killed the old one, the new one is Wally Mack's father) will be running the Vault under Martial Law. Amata wants to bring peace, she asks for your help. You have a few options here: 1. Speak to the current Overseer and try to peacefully end the conflict. 2. Speak to the current Overseer and waste him, solving the problems. 3. Speak to the Overseer and offer to take out Amata and the Rebels, quelling the upstart civil war. 4. Check out the Reactor area and rig the Water Chip to contaminate the whole Vault, forcing everyone to leave. 5. Walk away, it's not your problem anymore. If you decide to help Amata and talk to the Overseer, for good or for awesome, head back to the Upper Levels. Speak to the current Overseer, whoever that may be. If it's Amata's father, he'll babble on about the Vault's safety, and about your father. If your speech skill is high enough, you can convince him that what he's doing is wrong. He'll make the right call, see Amata afterwards. If Wally Mack's father is Overseer now, due to you killing Amata's father, you may not be able to convince him to open the Vault peacefully. He mentioned that the previous Overseer wanted to do things peacefully and you just killed him, so he decides to fight instead. Either way, speak to Amata afterwards. Depending on how you handled the situation, you may receive a Vault Utility suit from her before she asks you to leave. If you decide to be evil and wipe out the Rebels, have some fun. You may just have to kill Amata, but I also killed all the teens, Old Lady Palmer, and your old teacher you save from the Security room outside the Overseer's office. Return to the Overseer when you've completed the task, he may give you a Vault Utility suit before he kicks you to the curb. The other option you have is to force everyone out of the Vault. This isn't the ideal scenario, the best scenario is to give the people the option to leave when they want to, but don't force them to leave their home. If you want to kick them out, check out the Reactor room. In this area, you'll find a Filtration area, this is where the Water Chip is stored. What you want to do is go to the terminal in the side room, turn on the Manual System, and then do a Purge. The system will go haywire and spread toxins into the Vault. Your quest updates and says to evacuate everyone. I searched the entire Vault, everyone but Stanley had already left, and I could get him to go. If you go to exit, you can speak with Amata. She probably won't give you a reward, you can lie to her and say the Overseer was to blame, or take the blame yourself. You probably won't get the Utility suit. That's about it. Through some choices you'll get the Utility suit, most of the peacefully options will get you it, other than taking out the Rebels. When you're ready, head to the Vault door. Be SURE you've looted everything in the place, because you will NOT be coming back. This includes unlocking the safe behind your mother's Bible verse In your father's medical office, theres a Rock-It Schematic here (It will increase the Launcher's damage by 10% if you already had one). Get the bobble head if you missed it the first time too. Head out the door and say your goodbyes. No matter how you complete this, you may never return home. *****Optional Quest 9: Those!***** If you've been anywhere around Grayditch or the Super Duper Mart, you have Probably been approached by a little boy named Bryan Wilks. The boy is all Over the place, talking about monsters and such. If you can get him to calm down for 2 minutes he'll tell you that his town is overrun with creatures. Agree to help him out, he lives in Grayditch. He'll let you know that he'll hideout in one of the Preservation boxes near the town diner till you can check on his dad. Bryan's house is near the diner, right across the street and next to the shack. If your Speech skill is high enough, you can ask Bryan if theres anything he can provide as help. He'll give you a key to the dumpster behind the diner, inside you'll find Frag grenades, a Laser Pistol and ammo. When you enter you'll find a gruesome sight, and your quest will update. Check the bodies for a shack key. Check out the shack next to the house. You'll find a terminal with some information...hmmm...seems like this Lesko guy that was staying with the Wilks family was doing some experiments of some kind. Talk to Bryan in the box. You can try to tell him at this point to take a hike, nothing left for him here, but he doesn't seem to want to budge. He's looking for someone to take care of the menace so no one has to go through this again. You might as well agree to help him. If you read the terminal in the shack, Marigold Station should be your next stop, its in the southern part of town. Feel free to loot the houses in the area. If you go to the neighbors across the street you can read their terminal and find out about a gun and ammo behind the refrigerator (Don't try to get it before reading the terminal, the gun won't be there). The other houses in the town say they're Abandoned, and they don't have a lot of great items in them either. Loot them if you wish. You'll be running into a lot of ants in Grayditch and Marigold. You can try to shoot for their "Antenner" to confuse them and cause good damage, but a shot to the head is as good as anything else. If you have a good stash of Frag Mines, these are perfect provided Dogmeat isn't with you. Lay 1 or 2 mines in a line and keep walking backwards, the stupid ants will walk right over them. The Worker ants will be the easiest and go down with cheap weapons, the Soldiers and Warriors will be stronger, save your good stuff for those if you're running low. Head through Marigold, your destination is to the east. Take the tunnels heading in this direction, theres two ways to get to your target, either through the tunnel on the right and take your first right, or take the left tunnel, follow it till the tunnel bends around to the south, go past the door with the spinning light. If you see the body of William Brandice, you're on the right path. Loot William, then continue a further till you see a door on the left. The door opens, surprise! It's Dr. Lesko. He'll fill you in on what he's been doing. Apparently he ACCIDENTLY gave the giant ants fire breathing capabilities. He was attempting to alter their DNA to shrink them, nice job Doc. The Doc wants to continue his research and find the right mutagen to inject into the eggs so each generation of ants will become smaller like they once were. The problem is, the Queen Ant has a quintet of Fire Ant Guardians that block the doctor's path. He wants you to take them out so he can correct his mistake. As a reward he'll give you an enhancer which will act as a perk, either "Ant Sight" or "Ant Might." Sight gives you +1 to Perception, Might gives you +1 to Strength, both give you 25% to your fire resistance! Also, if you ask the doctor to up the ante for the job, he'll throw in his old lab coat as a reward. The Ant Hatchery is located just past Lesko's room. The tunnel is linear, so you can't miss anything. There isn't much to loot here either, just the Guardians, the Queen, and a Protectron bot of Lesko's near his equiptment. The Guardians are the toughest of the Fire Ants, besides the Queen herself. Use those mines and grenades if you have them. Once you've killed all five your job is done as far as Lesko is concerned, if you want to do more it's up to you. If you decide not to return for your reward, you can hack Lesko's terminal in the Queen's room (You'll have to Sneak, she has good vision). You can activate the Inhibitor yourself, which will destroy the remaining ants around Grayditch. You can also destroy the mutagen if you so choose, and slay the Queen. She has a lot of life, and will spit goo, watch out. If you plan on still getting a reward after destroying the mutagen, you better either have high Speech or Science skills, because this will upset Lesko. It doesn't seem that you can alter the Mutagen yourself. Return to Lesko after you've killed the Guardians, or after you've killed the Guardians, Queen, and destroyed the Mutagen. If your Speech or Science is high enough you can make Lesko realize the damage he caused by not starting small in his experiments. If you do this, you can still receive your reward if you killed the Queen and Lesko's project. If you just wasted the Guardians, you'll get your reward as promised. There remains one final thing to do before "Those!" is wrapped up, you have to speak to Bryan Wilks and decide his fate. Head back to the Pulowski Preservation Shelter next to the diner. Bryan will describe the ants going crazy and killing each other. You can tell Bryan to go back to his house, or you can look for a home for him. If you tell him to go back home your quest will complete, but he'll be lonely and basically living in a ghost town, you bad person you. [EDIT] If you want to be really evil you can sell him to Eulogy in Paradise Falls, now that's bad! Thanks to OCBucksFan for that info. If you want to be good, you can extend the quest just a little more and offer to look for a home for him. If so, he'll stay in his home for the meantime and bury his dad. Ask Bryan where a good place to look would be, he'll mention his cousin Vera lives in a big ship, Rivet City? Sure enough, head to Rivet City and find Vera in her Weatherly Hotel. She'll be happy to take Bryan in, head back to town and let the boy know, he'll pack his bags and head on down on his own (Brave!). Your quest will update finally, and you'll get to hear Three Dog praise you on GNR radio. Alternatively I've read somewhere you can send Bryan to two other locations, but I haven't tried this myself. If you talk to Mayor MacCready in Little Lamplight, Bryan can stay there. It seems you can also sell Bryan to Eulogy in Paradise Hills like you sell other children. He'll go for 100 caps or 300 caps with Speech skill. This would be a good negative Karma solution. *****Optional Quest 10: The Superhuman Gambit***** Upon entering the town of Canterbury Commons you'll see a showdown in the streets. One side is fielded by the AntAgonizer with a pack of bugs, the other is the Mechanist with his army of robots. After a standoff, both parties will retreat for the day. You'll run into Uncle Roe shortly after, he'll explain the Mechanist used to be the town's mechanic. One day a crazy girl came to town with these bugs. Eventually she started calling herself the AntAgonizer, the Mechanist took up his costume and they have done battle everyday since. Speak to Derek Pacion, Uncle Roe's nephew. He has some info on the two, the AntAgonizer's lair can be found just north of town. The Mechanist stays in his fort making robots to the south. You can choose to stop the AntAgonizer, the Mechanist, or both. Stopping either or will save the town. If you plan on taking out the AntAgonizer, you may want to check out Hubris Comics (See the Freeform quests section). You can read a terminal and get the evil woman's real name in a letter to the editor about Grognak the Barbarian. To reach the AntAgonizer, head north of town. You'll see a door to some tunnels, this will lead you to the lair of the AntAgonizer. Alternatively you can climb the rocks and take the secret entrance right to her lair, but you'll need a lockpick skill of 50 or you would have needed to steal her key off her earlier. While you're in the caves, be wary of traps. Theres a trip wire/shotgun trap, and Frag mines here and there. The right path on the right will lead to some supplies, if you continue down the other path and keep going straight you'll find a Stealth Boy. The tunnels aren't very long, and you'll only have to kill about 5 ants along the way. You'll come to the AntAgonizer's Lair, inside only the woman awaits. Speak to her, you have a few options. Option 1: If you went to Hubris Comics earlier you'll be able to point out that the AntAgonizer can be redeamed, she can return to a normal life and forget everything. She'll give you her costume and walk off into the sunset. You can then give the Mechanist the costume to receive Protectron's Gaze. You can then kill the Mechanist if you wish to receive both costumes. Option 2: If you didn't go to Hubris Comics, the only other safe way to proceed and stop the AntAgonizer is to make a Speech check or use the Lady Killer perk. If you do either of these things, she'll see the error of her ways. She'll give you her costume, then take off. You can then give the costume to the Mechanist to receive Protectron's Gaze. You can kill him if you wish to receive both costumes. Option 3: If you kill her you can get the costume, and the quest updates. You can then give the costume to the Mechanist to receive Protectron's Gaze. You can kill the Mechanist if you wish to receive both costumes. Option 4: If you tell the AntAgonizer in any way that you'll kill the Mechanist, you'll find that he immediately shows up in her Lair for a battle. You'll have to kill him at this point. If you loot the Mechanist's suit you can give it to her, she'll reward you with the Ant's Sting. You can kill her at this point to receive both costumes, its up to you. Option 5: If you talked the Mechanist out of fighting or killed him for his costume, you can give it to the AntAgonizer. She'll reward you with her weapon, the Ant's Sting. You can kill her at this point to receive both costumes, it's up to you. Option 6: If you talked the Mechanist out of fighting or killed him, you can go back to the AntAgonizer. If you convince her she doesn't need the costume, you can keep it for yourself, but you will not receive the Ant's Sting or Protectron's Gaze. If you're wanting to stop the Mechanist, or take him down for the AntAgonist, look for him to the south. He'll be in the Robot Repair Center. Head in, hopefully you have a few Pulse Grenades or Mines. If you don't, no worries. If your Lockpick skill is 75 or more you can pick the elevator near the entrance to get in through the back way, right to the Mechanist. If not, you'll have to fight your way through some robots and turrets. In the first area of the Robot Repair, head to your left. You'll find some office cubes. Theres a terminal here with a message from one co-worker to another. He stashed a key behind his terminal, it unlocks a safe under his desk with Pulse Grenades. The cube you're looking for is next to the one with the active terminal, the key is behind the monitor there. Theres a ton of Scrap Metal and various parts in the Robot Repair Center. I suggest entering the factory area via the door closest to the cubicle area. There's a turret here and a Sentry bot, nothing too tough. Clear out this room, then head up the stairs. You can use the terminal in this room to disable security in the next room, go ahead if you want. You can take the door in this room back into the previous part of the factory. If anything remains alive you can unlock the safe in the upper room, take the decrypter and use the terminal to send a huge pulse charge through the room, killing all robots in that area of the factory. When you're ready to seek the Mechanist, head to the elevator near the entrance to the Repair Center, or take the door near the room where you could unleash the large Pulse charge. If you entered through the back door, it will take you straight to the Mechanist. Otherwise you'll have to activate the coffee maker in the next room, then click on the gear sticking out. The door opening sequence is kinda neat, Get Smartish if you will. You'll be approached by the Mechanist, here are your options for the quest: Option 1: If you want to talk the Mechanist out of fighting peacefully, you'll have to make a horrendous Speech check to talk him out of fighting (For me, it was a 42% chance with 100 Speech). If you talk him out of fighting, you'll receive the Mechanist Costume and Helmet, your quest will update. You can give the AntAgonizer the costume to receive the Ant's Sting. You can kill her if you want to receive both costumes. Option 2: If you previously talked the AntAgonizer out of fighting, or killed her, you can turn in her costume. The Mechanist will reward you with Protectron's Gaze. You can kill him at this time to receive both the Mechanist's Costume and the AntAgonizer's Costume. Option 3: You can tell the Mechanist that you'll help him take out the AntAgonizer. He'll dub you "Mechano Lad." Before you can head to her lair, she'll attack the Robot Repair Center. Head to the elevator to meet her. You'll have to be careful here if you want to keep the Mechanist alive, he doesn't have as much backup and may get wasted easily. Kill the AntAgonist, give the Mechanist her costume to receive Protectron's Gaze. You can kill him at this time to receive both costumes. Option 4: You can kill the Mechanist and take his costume. You can take it to the AntAgonizer and receive the Ant's Sting. You can then kill the AntAgonizer if you want and loot both costumes. Option 5: If you killed the AntAgonizer or talked her out of fighting, return to the Mechanist. He'll ask for the costume, but you can convince him that he doesn't need it. He'll let you keep the costume, but you won't receive the Ant's Sting, nor Protectron's Gaze. Return to Uncle Roe when you've taken care of the AntAgonizer, or the Mechanist, or both. If you just took care of one, you will only receive 200 caps (Unless you used your Speech earlier). If you took care of both he'll up the ante to 600 caps. *****Optional Quest 11: The Nuka-Cola Challenge***** You'll pick this quest up in Girdershade. Speak to Sierra in her home, it's a museum to all things Nuka Cola. She'll offer you a tour, go ahead and take it. She'll show you around the shack, then offer you an Iced Nuka Cola for taking the time. She now has a request. She apparently has an addiction to Nuka Cola Quantum, and she wants you to collect some for her. She'll pay you 40 caps for each. If you bring back 30 bottles she'll also reward you with a Nuka Grenade Schematic. Exit the shack, you'll probably be approached by Ronald. Apparantly he has the hots for Sierra, unfortunately for him she's so wrapped up in Nuka Cola that she hasn't even realized his feelings. He really just wants in her pants. Anyway, Ronald wants you to find the 30 Quantums for him so he has a better chance of getting with Sierra. Ronald doesn't have anything extra to offer you at first, but if you use a Speech check you can get him to offer you 80 caps for each Quantum you bring him (No Nuka Grenade Schematic). At this point theres a few things you can do. If you've been a good little Vault Dweller, you've been exploring the wasteland and picking up any glowy Nuka bottles you've seen. I already had 40 myself by the time I got to the town, and I wasn't actively searching. If you're a woman, and you have the Black Widow perk, you can promise Ronald a threesome and he'll get brave and go to the Nuka Cola Factory on his own. After reading the forums, people have tried to keep Ronald alive, but it seems inevitable that he dies. Some people have gone so far to protect him all the way to the factory, but it seems he'll drop dead as a script once he arrives. This will allow you to get his special Shotgun, but otherwise theres no point in sending Ronald to his doom. You can head to the factory yourself. Its located west of Arlington Library, or directly south from Megaton. Theres not a lot of goodies within the factory itself, a little ammo and a lot of junk and empty Nuka-Cola bottles. You'll find a locked safe in the Offices area, but you need a key to get to it. Theres also a Very Hard locked door just inside the lobby. If you can pick this it will take you directly to the Manifest, otherwise you'll have to take the slightly longer way. The path to get there isn't too bad, and its linear so you can't miss it. You'll have to travel to the Mixing Vats area. Here you'll find some Nukalurks...interesting. I bet Sierra has a recipe for those guys somewhere. You'll find the body of a named Merc in the Offices area after you've gone through the Vats. She has a note about obtaining the Nuka-Cola Clear formula (The locked safe from earlier) and heading to the Red Rocket Tricycle Factory for big pay. Keep heading through the Offices area, you'll eventually come back to the factory floor. You'll run into Milo, a Mr. Handy. You can try to lie to him or say you don't know your name/ID, he'll just give you demerits. Instead, pretend to be the president with a Speech check, no ID required. He'll accept it, and you can ask him to craft a key for the safe. He'll also tell you where the Manifest is (Right beside him) along with the password. Check the terminal, it tells you that 3 test markets received cases of 5 Quantums: Old Olney, Paradise Falls, and the Super Duper Mart. If you continue through the Factory Floor, you'll find a packing terminal. You can load the system with Nuka Quantum and activate the conveyor. It will spit out 3 for you before it breaks. So, if you collect these 3 and the other 15 or so you should be sitting at 18. The other 12 should be easy. Don't forget to get the Nuka-Cola Clear formula from the safe before you leave! Check the Freeform quests for more info on that. When you have 30 Quantums, turn them in to either Sierra or to Ronald. You'll get the promised reward. If you turned it in to Sierra she'll also give you a recipe for Mississippi Quantum Pie (As if the stuff isn't rare enough). If you turn it in to Ronald you can watch him try to put the moves on Sierra, only to get shut down as she still doesn't understand he wants to bed her. If you ask her about it later she'll comment that she thinks Ronald is in love with her, and that maybe he'll propose marriage... yeah, not so much. *****Optional Quest 12: Head of State***** First things first, let me say you want to make MULTIPLE saves during this quest, as things can get hairy and bugs have known to occur, you're warned. This one starts from the Temple of Union, although theres other ways to get it going. Speak to Hannibal there, he'll let you know that Temple of Union is inhabited by former slaves. He wants to restore the Lincoln Memorial by taking it over and making it a bastion of hope for other slaves. He also would like you to help Caleb there in Temple of Union to fix the missing head on Lincoln's statue, they found the head there in the Temple. Caleb wants you to go to the Museum of History to find a picture he can use to fix the statue. Lets head there first (See Freeform Quest "Lincoln Artifacts"). After you have all of Lincolns artifacts, go scope out the Lincoln Memorial. If you've been to the Washington Monument or any of the Museums around that area, its an easytrip. If not, you may need to do some backtracking and take some subways. The game would have you take the LOOONG way around, which would be taking Tenleytown/Friendship Station to Farragut Station, then walk south all the way to Anacostia Crossing Station. That will lead you through another subway I believe, and finally to Museum Station. This will pop you out at the Washington Monument. Just note there are quicker ways, this may just be the safest route and it's the one the game gives. Walk west to the Lincoln, make sure to make a new save before you get there. At any point if you snoop around the wrong area of the monument, the slavers will go hostile. If you come up the main dirt path you can speak to Silas. If you have really good Karma, this more or may not work. You can tell him you're just looking around, if so he'll take you to Leroy Walker. At this point, if you want to do the negative Karma option, skip down to Option 2, if you want to complete the good Karma option, read on. Option 1: This is the positive Karma option. Once you've seen the Lincoln Monument and you've collected all the artifacts, head back to the Temple of Union. Hannibal may be wandering around outside in the wastes (I have no clue why). You have to be careful during this mission, I had one attempt where Hannibal actually died in the Capital Wasteland even before I returned (This is part of the thing about making multiple saves). Once you get back to the Temple, give Caleb the poster you found in the Museum. He'll be ready to do the work now, let Hannibal know. He says they'll pack up and be ready to leave within an hour. You can use the wait function to wait an hour, or hang around. You can also sell the remaining artifacts to Hannibal, you can also use the Speech skill to double the money he offers you. He won't pay much for the action figure or the pennies, but the rifle, diary, and wanted poster will bring in a little money. If you sell him the hat and rifle, he'll use them. At this point, I highly suggest you make more saves. Hannibal and company have been known to get lost on the way to the Lincoln, and theres a few nasty areas they have to travel through to get there. Namely, just south of the Temple is an Enclave Field Testing area, the remaining Enclave there toasted the dog, Four Score, and ol' Bill. Theres two ways you can do this, you can walk with the freed slaves, which is sloooow, and they like to get turned around a bit sometimes. The other option, which is what I did, was to take the suggested path the game gave me and plow a path. This is also one of the long ways around I mentioned before (Through Tenleytown, down to Rivet, etc). I forged ahead and killed everything along the way. When I got to the Lincoln, I only had to wait about 8 hours before Hannibal and company showed up. They seemed to come from the Museum Station as I did, they'll wait for you just east of the monument. Speak to Hannibal, he'll see theres Slavers at the monument. You can tell him to charge right in (Which can lead to Hannibal getting killed) or you can ask him to wait while you clear the area. I've also had success in clearing the monument while Hannibal was on his way, although I've seen on the forums that some people have encountered bugs in the quest if you clear the monument before you take the quest. In any event, once the area is clear, let Hannibal know he can head on in, he'll thank you for your work and give you a Dart Gun Schematic. You should also get an extra scene at the end of the game for your work. Option 2: When you're at the Lincoln after obtaining all the artifacts, speak to Silas and let him know you're looking around, he'll take you to Leroy Walker. Leroy will want you to find some of Lincoln's artifacts, he wants to burn them all so slaves won't have any hope. Hey, we already have them all! If you give Leroy all the items, including the rifle, he'll allow you up the stairs to the Memorial without being shot, nothing that great up there, not worth giving up the hat and the rifle in my opinion. Anyway, if you do sell Leroy the items, you can talk him into paying double for each item, just like Hannibal. Abraham Washington will buy them too. After you've given Leroy some items he'll ask if you've seen any slaves running around, he's actually looking for Hannibal. You can tell him that you know where they're hiding out near Old Olney. He'll tell you that they're going to go take care of them, if you want to sell any other Lincoln items to Leroy you better do it now. He'll immediately round up the other slavers and head toward the Temple. Fortunately he actually runs there with his ground, and Raiders don't bother Slavers (They'll bother you though). I ran with Leroy and the slavers the entire way to the Temple. They take the exact same path that Hannibal would have taken, just in reverse. You'll find Leroy and the slavers underneath the highway near the Temple once they get there. They won't wait, as soon as they see you Leroy will start the raid. The escaped slaves are outnumbered and not much of a match for the Slavers, they'll go down easily. Your quest should update once they're all dead. Unfortunately you won't get the Dart Gun Schematic, and it doesn't appear to be in the storeroom or on Hannibal. At this point Leroy will tell you the job is done, and they no longer need to be at the Lincoln. He's going to head back to Paradise Falls he says, and he'll begin to lead the slavers back that way. I gotta tell you, I actually followed the slavers all the way back...and they seriously need a map. They went south to Tenleytown/Friendship Station again, came out at Farragut West Station, west past Megaton, kept going west till they almost reached Evergreen Mills, then finally turned north. They went past Rockbreaker's Last Gas and the MDPL Mass Relay Station before they FINALLY cut through the wilderness going north-east to Paradise Falls. I also did this quest after finishing most of the main quest, so there were several encounters with Enclave that would have wasted the slavers, not to mention the numerous Death Claws and Super Mutants that killed the group (Or most of it) unless I intervened. So, its safe to say that Leroy and the team will not make it back to Paradise Falls on their own, not that they need to. If they do make it back they'll just sit around the bar and drink all day. I did try to wait 5 days once, and none of them seemed to show up, it took us 3 days roughly to go the long way on foot. So, essentially what I'm trying to say is don't go looking for Leroy at Paradise Falls afterwards, he'll probably be dead somewhere and you get nothing for escorting him. *****Optional Quest 13: Blood Ties***** Theres a few ways to start this quest. One way is to talk to Lucy West in Megaton and tell her you'll deliver her letter to Arefu. If Megaton is kablooie that won't be available, no worries. When you're ready to take the quest either talk to Lucy, or head to Arefu. Arefu is north-west of Big Town, which is north of Vault 101. The town is actually up on the highway, suspended above ground. Approach the town, you'll have a grenade thrown at you by Evan King. Evan King will fill you in on the Family, let him know you have the letter (Or you may not have it). He'll ask you to check on the Ewers, the Schenzy family, and the West Residence. Knock on the doors of the Ewers and Schenzy families. Mrs. Ewers is a little nuts, yay. You get the impression the people are tired of Evan's wait and hide strategy, they want action. Check out the West house, interesting... depending on your Medicine skill, you'll get different analysis of the deaths in your autopsy evaluations. A Medicine skill of 30 will show you they had deep bite marks to the bone. A skill of 50 will notice that there should be a lot more blood for the wounds the West family suffered. A skill of 70 notes that the bite marks were made by a human and not a creature. Finally, if you happen to have a Medicine skill of 90 you'll notice a black residue on the bodies, like the kind that may be at a train yard. Ask Evan about the train yard if you happen to have the skill high enough, he'll point you toward the Meresti Trainyard to the east. If your Medicine skill wasn't high enough, it doesn't matter. I can tell you that theres nothing of note at the Moonbeam Outdoor Cinema and the only thing in Hamilton's Hideaway of note is a Nuka Quantum. Northwest Seneca Station will lead to the Meresti Service Tunnels if you check the sewer grate inside, so you can get there either going through Northwest Seneca or going to the actual station. Once you're in the Service Tunnels, be wary of traps. Lots of trip wires, mines, and bear traps. You'll run into Robert, he'll ask what you're doing. If you have the letter from Lucy you can show it to him, he'll let you go. If you don't have the letter you'll have to bypass a high Speech check, or you'll have to bribe Robert. If you have the Cannibal perk, you can also use that to get in. When he gives you access, head on back. Robert tells you to look for Vance. The Family lives in the next area, the Meresti Metro Station. You can speak to various Family members, they won't be hostile at this time. You can ask about Ian, they'll tell you he's in meditation currently. On most members you can use your skills to find out the password to Ian's room. Karl can be intimidated through Strength. Brianna can be convinced to give it up using the Lady Killer perk. Holly will give it up if you have a high Charisma, theres others as well. Vance is the guy you want to see, he's the head of the Family. If your Speech skill is high enough you can convince Vance to let you see Ian. If it isn't high enough you'll have to rely on the Cannibal perk, you'll have to read the rules of the Family and use that knowledge, or you'll have to use the password you got from one of the other Family members. Vance will tell you what happened to Ian's parents...disturbing. Vance will also give you information about the Family if you ask him. When you're ready, go up the stairs and look for Ian. Make a new save at this time too. If you want a positive Karma finish, read on, otherwise skip to Option 2. Option 1: Use the password you received to unlock the door to Ian's room. Speak to Ian, you can give him the letter from Lucy if you have it. If you give him the letter he'll start thinking a little clearer and will probably decide to face his demons and go back to Arefu. You can also use a Speech check to convince him to go back. You can also convince Ian that the best course of action is to stay with the Family. Whatever you do, make your decision on how to help Ian, then return to Vance. It won't really matter whether you helped Ian make a decision to stay or to go back to Arefu, Vance is fine either way although a little disappointed if he goes. He'll give you a schematic for a Shishkebab despite everything. You also need to decide how to help Arefu, they can't continue to live in fear of the Family. Vance is actually a good character, he doesn't want the violence and destruction of their cattle. You can ask him not to attack, and he'll agree. A better alternative is to use your Intelligence or Medicine skill to convince Vance to use Blood Packs to survive. Blood Packs are scarce, of course, so there needs to be a comprise if you go this route. You can either bargain with Vance so Arefu donates Blood Packs so the Family leaves the town alone, or Arefu donates Blood Packs in exchange for protection from the Family. The option to buy the blood is no good, they don't have the caps for that. Choose the protection option, it's the best for everyone. Head back to Arefu and speak to Evan King. If Ian decided to come back, let him know and you'll get positive Karma. If Ian decided to stay, you'll have to lie, preferably tell him that he went to live with Lucy or he wasn't with the Family if you don't want to stir trouble. After the quest updates, let Evan know about the proposal if you spoke to Vance. Evan will agree, everyone is happy. Evan doesn't really have anything to give to you, he'll give you junk if you ask for compensation. Return to Vance once you've spoken to Evan, he'll let you know that he'll dispatch Alan to go protect Arefu. You can also ask at this time to learn the ways of the vampire. You'll receive a perk that allows you to receive more HP for drinking Blood Packs. Option 2: Alternatively, if you want to go the negative Karma route, you can kill the vampires (Doesn't that sound backwards?). You can take Vance's jacket, which has some nice stats. This will also allow you to loot Karl's goods, you can make a pretty penny off this. Vance also has a key that opens the sword cabinet in his room where the Vampire's Edge is stored. You can also get the password to Ian's room by looting it off Vance. Please note, if you decide to kill the Family you HAVE to do it before speaking to Ian. If you do it after, the entire town of Arefu will become hostile with you, as well as the Family of course. Also, make sure you kill Robert in the Service Tunnel if you're going to kill the Family, otherwise he'll go hostile on you when you try to leave. Once everyone is dead, you can speak to Ian and convince him to go back, or he can remain alone in the Station. You can then return to Evan King and deliver the news. *****Optional Quest 14: The Oasis***** You'll find the Oasis in the northernmost square, about in the middle of the map. You'll have to approach is from the west, theres a small trail leading to the location in the mountains. You'll come up to a gate with some weird looking people in twiggy clothing. Tree Father Birch will approach you right away and asks you to come closer. He'll tell you that "He" has been expecting you, and has granted you access. Birch won't tell you much more than that, he asks that you come inside so all will be explained. Fine, you crazy hippy! Head inside, Birch will explain a little more. If you pass a Speech check, he'll give up that "He" is a tree god, he guides the Treeminders (Birch and the other twiggies), and is the reason for all the lush greenery in the Oasis. Birch continues on, letting you know most outsiders aren't allowed into Oasis, but He has made an exception for you. Birch finishes by saying if you'd like to meet with Him, you have to take part in the ceremony. No worries, there's nothing to fear. You just need to drink some trippy sap while the Treeminders chant. If you don't want to take part, and you have a Lockpick skill of 100, theres a door in the Oasis that will take you through some Caverns to meet with Him, but most people won't have 100 Lockpick. You can also unlock a door using your console if you're on the PC version, but that's cheating =P Ok, nevermind about the Very Hard lock. Even if you go into the Caverns, the path will be blocked eventually, no point in going that route. So, tell Birch you'll accept the ceremony whenever. When you come to you'll be in a little grove, with a giant tree in the center. Go to the other side of the tree, you'll see...a face? Activate the tree, prepare for a surprise. Guess who it is? If you played the old games, you may recognize an old buddy. Gotta love Harold, he's hilarious. Speak with him at length, he'll explain how the Oasis came to be, about Herbert/Bob, and your task at hand. Apparently he has asked the Treeminders, but they blindly follow and hear, but they don't really listen. You can choose to accept Harold's plea, or leave him be. It may be wise to speak to the other Treeminders first though. If you don't want to speak to them and just want to carry out Harold's request, theres a locked door behind you leading to the caverns, or you can speak to Cypress to unlock another door to the caverns (Nevermind on that locked door in the Grove, it's a dead end and can only be used as an exit). Go and speak to Birtch and the Tree Mother. You'll see them arguing about Oasis' future. He'll let you know that he's concerned with Harold/Bob's growth. The Oasis is a wonderful place, and if it continues to expand they may find more Wastelanders seeking it out and it could lead to fighting or exploitation. He wants you to take some of the sap and apply it to Harold's heart, shunting the growth of the Oasis to protect it. If you speak to his wife, she'll want the exact opposite. She has an item that will help accelerate the Oasis's expansion, which will bring life to the Wasteland in a matter of years as oppose to centuries. You don't have to make your choice just yet, just head into the caverns. As mentioned there are two entry points. Either way, you're going to be killing some Mirelurks, so be prepared. I find a Shishkebab works well against them, but that's with 100 Melee Weapon skill. In total you'll encounter about 6 or 7 Mirelurks and Hunters, and 2 or 3 Mirelurk Kings. Eventually you'll start hearing a heart beat. Follow the noise, you'll find Harold's heart. It will be located in the Sunken Tunnels. Here you'll have to make your decision, here are the options: Option 1: Apply the sap to the heart, shunting the growth of the Oasis and fulfilling Birch's request. Continue on through the Damp Cave, you'll come out where Harold is and Birch will be nearby. Speak to both of them, Harold will have a change of heart. Birch tells you that there are Treeminders with rewards for you. Speak to Cypress, he'll give you a Missile...yay. Speak to Maple, she'll give you an Oasis Villager Outfit...double yay. Yew gives you the only worthwhile reward, Yew's Bear Charm. Option 2: Apply the Liniment from the Mother, which will increase the Oasis's growth. Continue through the tunnels and through the next area. You'll come out near Harold, the Tree Mother will be nearby. Speak to each of them, she'll thank you for your work, and Harold will have a change of heart. The Tree Mother asks you to speak to the Treeminders, they have some gifts. Linden will give you his special Power Armor, Poplar gives you Poplar's Hood, and Yew will give you Yew's Bear Charm. Option 3: Kill Harold's heart. Harold will die instantly, you'll be unable to speak to him again afterwards. If you speak to Birch afterwards, he'll admit that Harold made him understand just before his death that he was not a god in any way, and that he just wanted to pass on peacefully. Birch will admit he carelessly lead the Treeminders and was blind to what Harold was really trying to say. He tells you that they will try to continue to keep the Oasis alive. When you kill Harold's heart, you'll receive the Barkskin perk/mutation which increases your damage resistance by 5% and also +1 to your Endurance. You can also speak to Yew and receive her Yew Bear Charm. Option 4: Trees don't like fire, right? This is the negative Karma response. Take the Flamer to poor Harold and watch him burn agonizingly. He'll be no more, and you'll have some very angry Treeminders outside waiting for you. Prepare to fight. You don't really get a decent reward for this one, but it really is the only evil way to complete the quest. You can really profit by taking Tree Mother's request, applying the Liniment, receive the rewards from everyone, then burn Harold. Plus, you'll get a bunch of the Oasis Villager Robes if you so choose. *****Optional Quest 15: Stealing Independence***** If you talk to Abraham Washington in Rivet City (Located in the Preservation Society), he'll mention his collection of US History pieces. In a short amount of time he'll go on how his collection means nothing without the Declaration of Independence. He already knows where it is, he paid someone to dig up the info. He also paid another individual to go seek it out, but they failed to return (You can hack his terminal for a little back story into this). He would like you to go retrieve it for him, the reward is a rare Railway Rifle schematic. The Declaration can be found in the National Archives, located near the Washington Monument in the Mall, so head that direction. Make a fresh save before you go in, it's going to be nasty. In the entrance area theres a small quest to get some special Mentats, check out the Freeform Quest section. If you head toward the center of the building, you'll run into Sydney and a TON of frag mines she laid. Don't worry, she's on your side, she was the one Washington first sent. I advise not going into that room yet, instead take the side doors and circle around the premises. You'll encounter a dozen or so Super Mutants, a good deal of ruined books, ammo, and some weapons. The north-west corner of the room with the shelves of books has some missiles tucked away in a corner by a register. Up some stairs on the east side of the building you can find some more vouchers for Mentats in a safe. When you're ready, head to the center room. Sydney will warn you about the mines. About 30 seconds after you enter, the Super Mutants will attack. They'll come in 3 waves, not too tough. When they're dead, speak to Sydney. She'll notice you must be there for the Declaration as well, and suggests you team up. You can accept her help, or deny it. There is another way in, but you'll have to hack a terminal to get there, she has a way to get there using her remote terminal. Accept her help, then use the password she gives to access the secret elevator. Archival Secure Wing East is where you'll be. As you go, you'll hear a voice over the loudspeaker, calling people to fight. Your target is to the north, but be careful as theres a good number of robots in this section. Pulse grenades and mines are your best weapons against these guys, unless you have the robitics perk that allows you to shut them down. You'll come across a utility door to the north, blocking your path. If your Science skill is 67 or above, or your Repair skill I believe, you can open it. This is a small shortcut, not terribly worthwhile. In the next room is a turret generator, disable it if you can. Continue on, you'll run into a few more robots. You can find the Magna Carta and the Bill or Rights in side rooms on the way to your destination. Each one will be in a similar looking room, behind an Average locked door and guarded by 2 turrets. You can also find a lot of good ammo and items in these rooms. When you're ready, head into the room to the Archival Strongroom. You'll see a Protectron robot with...a wig? Using an intelligence check, you can surmise that this robot is the one that was rallying over the loudspeaker before, identified as Button Gwinnett, representative from the state of Georgia long ago. This is one of my favorite conversations in the game thusfar, the reactions and choices are legendary. I suggest making a save at the beginning, if possible. Theres some negative Karma options and some Speech checks, you wouldn't want to make a mistake, unless you want to collide with more robots. Have some fun, and make your choices. I highly suggest checking out all the options at least once, they're good for a laugh. In the end, I chose to masquerade as Thomas Jefferson, to badger Button for his failure and cause him to explode, highly entertaining. If you want to go a positive Karma route, you can have a forgery made. Button asks you to get some ink from the Arlington Library (You may have this already). If you return with the ink, he'll create a perfect forgery. Just to let you know, if you're thinking about giving Washington the forgery and keeping the Declaration for yourself, don't bother. It's a quest item, so you can't drop it on your desk at home, boo! In fact, if you get both the original and the forgery, when you speak to Washington you'll give him both, so the only way to keep one for yourself is to go back for the Declaration after completing the quest. When you've resolved the Button situation, you can get the passcode to his terminal on his body, if he's dead. If not, you can hack the computer. You can unlock all the doors of the facility and do some other things. You can find Button's Wig in the same room, grab that if you want along with more ammo. The Declaration is in the next room to the north, grab it out of the safe. You can take a quick exit west of Button's office, and see other Presidential robots, not much to do here though. You can also head back to the south where the elevator was and clear out the Sub-Basement. Theres some ammo here and a Mini-Nuke behind a Very Hard lock. When you're ready, exit the Archives and head back to Rivet City. Speak to Washington, he'll reward you 400 caps and the schematic. He'll also buy the Magna Carta and Bill of Rights off you if you have them, 75 caps and 100 caps respectively (25 caps more for each one if you ask him). Sydney will take off at this point, you can ask her about her father (Which can lead to a Freeform quest). She'll head to Underworld, find her there later, or find her dead in a Metro station (Which is what happened the first time I did this quest. If you want her to live, you may have to escort her). *****Optional Quest 16: Reilly's Rangers***** If you've checked out Underworld or if you've been anywhere in the downtown DC ruins area, you may have come across Reilly or a distress signal from her rangers. If you find Reilly in the Chop Shop at Underworld, have the doctor bring her out of her coma, she'll explain the situation to you at great length. Reilly and her rangers are the "Best mercs in the Capital Wasteland," even though theres only 5 of them. Quality over quantity I guess. It looks like the best mercs aren't so hot though, they got ambushed in Vernon Square by a Super Mutant party. They tried to duck into Our Lady of Hope Hospital, only to find more Super Mutants. From there it only got worse. Their man, Theo, was carrying the ammo and died somewhere on the steps leading to the roof of the Statesman Hotel. That is where the other mercs are holed up now, Reilly snuck out with a Stealth Boy to find help, only to be ambushed again. Your mission is to find Reilly's Rangers and get them off the roof of the Statesman. You may want some help though. As Reilly if theres any help she can provide, and whats in it for you. She'll give you a pass code to their hideout in the south-eastern part of downtown DC. She'll also promise you some Ranger Combat Armor, or a special Minigun, if you help them out. Before you head to Vernon Square, I suggest checking out the Ranger's base. Theres some decent stuff there, and you're gonna need a lot of ammo and we'll maintained armor/weapons going into this one. If you're wanting to go to Reilly's hideout, I suggest going through the Capital Building. It's by no means the safest route, there couldn't be a more dangerous path, but some good stuff in the Capital if you've never been there, and the route through the Metro is kinda convoluted. Of course, on my 2nd play through I also tried to follow the map marker directions to get there from Vernon Square, it send me all over the place. So, lesson learned, just go through the Capital. I think you can also get to the Ranger hideout by going through Anacostia Crossing just north of Rivet City, that's probably easier than the path the game gives. If you go through the Capital, you'll have to fight a ton of Super Mutants and Talon Company, the good news for you is the two parties will be pretty busy with each other, taking some heat off of you. You're looking to get to the east side of the Capital Building, the map marker is called Seward Sq. Northwest. From there, head east till you come across Reilly's Hideout. Oh, and there will be more Talon Company and Muties outside the Capital's east side, watch out for the guy on the bridge, he can activate a bomber that will mess you up. If you hear a guy over a loudspeaker I suggest watching where you go. There's an alley filled with enough Mini-Nukes to detonate anything. When you get to Reilly's, punch in the code at the door and loot the place to your heart's content, no negative Karma. Theres a few ways to get to Vernon Square. One way involves jumping in the Museum Station subway outside Underworld, hitting the Metro Station, then go to Freedom Station which pops you out where you need to be. If you took my advise and went to the Ranger hideout, the quickest way will take you through a Sewer found in an alleyway between the Capital and Reilly's hideout. This will take you to Pennsylvania Avenue. From here take Freedom Street Station for a short trip to Vernon Square where you can find the hospital. When you get to Our Lady of Hope, fight your way in and prepare for war. This place is about as bad as it gets when it comes to Super Mutants. On top of that Reilly's Rangers have booby trapped both the hospital and the hotel during their escape, so you'll constantly be on the lookout for mines, trip wires, exploding baby carriages, you name it. Theres plenty of junk and medical supplies in the hospital, loot up when you can. Theres nothing really special on the 1st floor aside from the junk and meds mentioned. When ready, the stairs to the 2nd floor in the north-west is your next target. There is almost nothing of note on the 2nd floor of the Hospital. Maybe one terminal/safe combo you can hack/pick for some meds. Aside from that theres pretty much nothing but a few Muties and junk for your Rock-It Launcher. Head outside and cross the bridge over to the Statesman. You'll have to drop down a floor once you cross the bridge, then enter the Mid Level of the hotel. This place will be annoying at times, lots of similar looking rooms, so use your map and watch for more traps, you'll find more and more the closer you get to Reilly's Rangers. On the first set of stairs going up in the Statesman you should find the body of Theo, use the code to unlock the ammo box and loot it to complete that part of the optional quest. Keep heading up, on the next floor you should find a Note from Little Moonbeam's Father. If you did the quest "Stealing Independence," you should know who Little Moonbeam is, hang onto this for now. Keep heading up, more Muties, more traps, lots of burnt books for shooting. You'll pass an elevator that leads to the Restaurant part of the hotel, but it doesn't work currently so you'll have to continue via stairs. Head around the corner from the elevator, watch for trip wires on your way up to the next level. You'll eventually come to a door leading to the hotel restaurant, make a new save. There will be a good number of Super Muties in this area. One particular room will have several alone, so you may need a Stimpack or two, depending on your level and gear. Clean the floor out when you're done, this nothing particularly worthwhile, the Super Mutants will have the most lucrative loot usually. Theres some ammo about, and some goodies behind the counter of the bar including a Quantum. When you're ready, head up the stairs to the roof. You'll hear the sound of explosions and gunfire. Around the corner you'll find a trail of Muties, and they get thicker. As you reach the back of the roof, you'll find some stairs and a pair of fresh Mutant carcasses will fall towards you. Head up the stairs and to the other end, you'll find your missing Rangers. Speak to Butcher, he's currently the acting leader. He'll notice you broke through the enemy line, but more will be coming so they can't go back the way they came. They want to repair the express elevator for a hasty retreat. You can give each of the Rangers the ammo you picked up earlier, or keep it for yourself. Butcher will tell you they need a Fission Battery to rig the elevator. If you have one on you, you can give it to Donnovan to repair the elevator, or you can go over to the switch and repair it yourself. If you don't have a battery, don't worry. If you head back into the restaurant there should be a closet near the bar area you were just in, and the Protectron there should have a battery on him. Make a new save before you repair the elevator, then repair. The Rangers will pile in immediately, follow them. You'll be in the lobby of the Statesman. If the elevator had been working earlier you could have short cut your way, but up till now it has been a dead end. Clear the room of Super Mutants, when you're done loot the floor if you like. Theres actually a good amount of ammo and meds in this small area. Speak to Butcher on the way out, he'll ask you to head to the Ranger compound when you're ready. It appears the Rangers automatically teleport to the compound once outside, so you shouldn't need to worry about escorting them. Fast travel to the Ranger headquarters when ready. Once at the Ranger headquarters you can speak to the others and find that Reilly has returned from Underworld. Update her on the status of the mission and she'll give you a choice of rewards: Brick's Minigun known as Eugene, or some Ranger Combat Armor. The Combat Armor is better, but I've taken both during my two game saves. The Ranger Armor is considered the best in the game by some players as it's easily repairable and it won't slow you down like most Power Armor. I don't know yet if this optional quest has an evil solution, I haven't found one yet (I usually do find a way). It seems the best you can do is be snooty to the Rangers. You can, of course, always kill them and take Eugene, 4 Ranger Armors, and Donovan's Ranger Helmet for yourself, that will get you negative Karma =) You also won't be able to do Reilly's Freeform Repeatable quest "Reilly's Caps for Locations," unless you kill them all after you've found everything in the game. *****Optional Quest 17: Agatha's Song***** Agatha is an older lady that plays music on the radio. She'd like you to find her old relative's Soil Stradivarius, which she believes is in Vault 92. You may have already been to Vault 92, you may not have been. In any case, I'm gonna assume that you haven't been there and explain it all anyway. If you keep asking Agatha where you can find Vault 92, she'll have a lead for you. She'll tell you that you may be able to find the location from a mainframe in the Vault-Tec Headquarters in Downtown DC. You can check that out, or skip ahead. Agatha should give you a location to the HQ. You can also use Speech checks, SPECIAL checks, and yes...the Lady Killer perk to talk Agatha into giving you some more assistance. She'll give you a key to some ammo her husband had. Theres surprisingly a lot of different ammo in the box. Nothing in great quality, but at least one of just about every kind, even a Mini-Nuke. When you're ready, head to Vault 92 if you know where it is, or Vault-Tec. Vault-Tec is located in Vernon Square, near the Statesman Hotel and Our Lady of Hope Hospital. You'll see a sign north of those two locations, pointing to a Metro. Head down a narrow alley and keep heading that direction till you see the headquarters. I'm not gonna lie, for being the Vault-Tec HQ, I was kinda disappointed. Theres not a lot of great loot here, and not a lot of interesting computers to delve into. Theres almost nothing at all in the Guest Relations. The Corporate Offices aren't much better, the only thing of real interest is in the north-west corner there on the 2nd level. You can access a small closet by hugging the wall around a big pitfall, inside you'll find a weapon, ammo, meds, and some other goodies. You're looking for the Administrative Offices. If you haven't already noticed, theres plenty of robots in this area. Pack some Pulse weaponry if you have it, I only ran into a few Sentries though. On the Administrative floor you'll find your target. To reach the mainframe you'll have to access 3 other terminals to unlock the door. Each one is numbered 1-3. Make your way around, looking for the 3 terminals scattered about. Theres also an Employee terminal you can use, but it's mostly for fun, you can't get the bobble head it speaks of. You'll have to kill the Masterbrain bot on the floor, kinda impossible to avoid him. Once you do you can examine the body and shutoff the relay, disabling the remaining bots. Once you've unlocked all 3 terminals on the floor, head past the executive offices on the upper floor there, you'll go through a cell door and then another before you reach the mainframe. You can download the info you need, as well as some other info for other Vaults. Theres nothing else of much interest on this floor, the only decent loot is a Grognak the Barbarian in one of the exec's offices, and a storage closet with mostly lunchboxes. When you're done, head down the stairs to the Guest Relations area and exit. Vault 92 is far to the north-east, very close to the west side of Old Olney. It's hidden just down a narrow gulch. Vault 92 isn't as nasty as some of the other Vaults, but it still has some creepiness factor to it. This used to be a Vault filled with musicians mostly, if you couldn't tell from Agatha's description. Her ancestor, Hilde, was asked to live here, and she once had a very rare Stradivarius violin from the 18th century, known as the Soil Stradivarius as previously mentioned. To find the legendary instrument, you'll have to go to the Sound Test area. From the entrance to Vault 92 head east. Theres a door down the eastern corridor that will lead you there, theres also doors that will take you there, it doesn't matter. Vault 92 is inhabited with a lot of Mirelurks and a lack of great loot, surprise, surprise. If you want to explore around, you won't find a lot. I believe theres a Wasteland Legend Outfit, possibly in the Living Quarters. I didn't find much other than that. You can turn on the special noise via a terminal in the Living Quarters. This will make any remaining Mirelurks go crazy and attack each other, or possibly just die on their own. When you're done exploring, you can find the Soil Stradivarius in the south-west corner of Vault 92. It will be in a recording studio, you will probably need to open the door via a computer terminal around the corner from the studio. You'll find the violin in it's case on the table. Return to Agatha and give her the violin...or don't. This is another one of those quests where there isn't a clear cut negative Karma solution. The best you can do, to my knowledge, is sell the violin to someone like Abraham Washington. He'll pay 200 caps for it, or 300 caps if you pass a Speech check. If you wanna be really bad you can go back to Agatha and tell her that you sold the Soil Stradivarius. While this didn't seem to get me any negative Karma, it's the closest you can get. If you have a change of heart later on, you can buy the violin back from Washington for 300 caps. You can then give it to Agatha, despite the quest being finished and the fact she asked you to leave her home earlier. If and when you decide to turn the violin in to her, you'll get positive Karma and the frequency to her radio station where you can hear her play all over the Wasteland. You don't really get anything else, just her thanks and the chance to look for sheet music for her as a Freeform quest. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Freeform Quests ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ *****Freeform Quest 1: Angela and Diego***** If you talk to Angela Staley in Rivet City, you can ask her about the men on the ship. She'll say that she doesn't have a problem with them hitting on her or anything, even the ones that she flirts with. If you push the subject further, you find that she's in love with a man named Diego, but he doesn't exactly return her affections. If you speak to Diego on the subject, he'll hint that he does have some feelings for Angela, but he chose a religious life rather than being with Angela. You can help push these lovebirds together! Speak to Angela again, ask her why she doesn't try to seduce Diego. She'll mention that she has spoken to Trinity in the Muddy Rudder, and she suggested using Queen Ant Pheromones because they work like a charm. It just so happens that Cindy Cantelli, proprietor of the Quick Fix in the Market of Rivet City, sells the item you need. You can go buy the pheromones and give them to Angela. Alternatively, you can go right to Father Clifford and lie to him, say that you caught Diego and Angela together. This will kick him out of the priesthood and Diego will eventually propose to Angela. If you got the pheromones, sure enough, if you come back a little later and speak with Angela, she'll be overjoyed and let you know the pheromones did the job. In fact, Diego and Angela will be getting married. You can speak to both, Diego seems to be happy in his decision. If you ask about the wedding to Gary Staley, he'll provide you with a date for the wedding, if you care to show up. The ceremony is short, 30-45 seconds, feel free to take a seat in the chapel to witness the occasion. Theres not much else to do with this, it appears Angela and Diego move in together into an empty room of the ship, not much else comes of this. The good reverend of the ship is disappointed he's down an acolyte, but is happy for the couple. [EDIT] Some people are writing in that they've been having trouble with the ceremony, either people show up and the bride, groom, or preacher don't show (Cold feet NPCs?). Unfortunately, I don't have a suggestion for this at this time. My best advice is to reload from a previous save and try again, show up to the church early and get a seat (Try not to block the door to the church with one of your party members, or yourself). Keep an eye on the Fallout forums for a work around if you encounter this. *****Freeform Quest 2: Super Mutant Attack on Big Town***** This isn't much of a Freeform quest, but there are rewards, so I'm listing it. Once you've rescued Red and you've gotten back to Big Town, speak with her for your reward for the rescue. She'll then mention that the Super Mutants will be back, you can offer to help protect the town. If your Small Guns skill is high enough, you can train the townspeople to make things easier. Also, if you go to the junkyard nearby you can find a few robots that you can bring back to life to help protect the town. Finally, if you haven't done it already, and you have a Medicine skill of at least 40, you can bring Timebomb back to life in Red's medical facility. Wait awhile (I waited till morning) and you'll soon see the Super Mutants charge the front gate. There will be 5 of them, they'll go down fast, but you'll want to try and protect the civilians! Protect Timebomb at all costs. Once you've dropped the Super Mutants, speak to everyone in town, you'll be a hero. Timebomb will give you his Lucky 8 Ball, which will increase your Luck by 1 as long as you keep it on you, very nice! *****Freeform Quest 3: Freeing Cherry***** This goes along with the Optional Quest "You Gotta Shoot 'Em in the Head." You can talk Cherry into stealing the key off Dukov, but she wants you to take her to Rivet City so she can get away. Once she has stolen the key, tell her to follow you. Once you're outside, fast travel to Rivet City. You'll get some positive Karma and the satisfaction you freed him from a life of, umm...bad things. *****Freeform Quest 4: Charon's Contract***** If you're looking to pick up a ghoul for your party, a particularly nasty ghoul, go speak to the proprietor of the Ninth Circle in the Underground. Ahzrukhal will tell you that Charon's contract is for sale, but how you choose to pay for him is up to you. You can buy him off for 2000 caps, use your skill to talk him down to 1000 caps, or you can do a favor for Ahzrukhal. The bar owner doesn't like competition, and Greta in Carol's place is serving up drinks, he doesn't like that. Kill Greta and Ahzrukhal will give you the contract. Ahzrukhal suggests not to get caught with the kill, as he'll be unable to help you. If you chose to kill Greta, theres a few ways to do this. If you have the Sandman perk, you can try to use that while Greta sleeps. Personally, my Sneak skill is fairly high, so I planted a Frag grenade on her and ran. I left town and waited 24 hours, then returned. Nobody seemed to acknowledge that I was responsible for the kill, although on previous attempts if I waited around for Greta to blow up, Crowley and Carol went hostile (Even though I successfully planted the grenade without getting caught). Once Greta is out of commission, return to Ahzrukhal. He'll transfer the contract, speak to Charon when you're ready to take him on. Be ready for a surprises...and loot the mess afterwards =) *****Freeform Quest 5: Republic of Dave Election***** If you check out the "Republic of Dave," you'll find a small...erm...group of people living in some shacks. Dave is the leader here, he claims he'll bring civilization back to all the Capitol Wasteland, and it'll all be under the Republic of Dave someday. This guy is a little loony. Anyway, despite the fact he runs a dictatorship, Dave holds an election in which everyone basically votes for him to feed his ego. Of course, Dave's little Republic is free he says...so if you want, you can spice things up. If you decide to help one of the other adults win the election, be sure to get Dave's key for the quest "You Gotta Shoot 'Em in the Head" first, unless you plan in stealing it later. Dave says election time is here again. He wants you to help gather all the ballots from the adults in town. Dave has already voted, so that leaves Bob, Rosie, Shawna, and Jessica. Shawna and Jessica appear to unquestionably see Dave as their leader, so they'll vote for him no matter what, ask them to vote right away. Bob and Rosie, on the other hand, can be persuaded to throw their hat into the ring. Despite my best attempts, I could not become a citizen of the Republic myself, so I couldn't run. If you're wanting to mix things up, and you convince Rosie and/or Bob to run for Presidency, go speak to Dave once everyone has cast their votes. If you want Dave to be ousted as President, let him know all votes are in. Dave will give you 25 caps. He'll then head over to the ballot box. If you want to rig the election, the only way I can see how to do it is to remove the ballots as SOON as Dave unlocks the box. I went stealth mode, and continued to hit the action button on the ballot box until it was available. Take out all of Dave's votes, and only leave a vote for who you want to win. I took Rosie. Despite the fact Dave will say in game that theres 2 votes for him, and a single vote for the competition, Rosie or Bob should win (That is, if you rigged the election). If you didn't rig the election, nothing really happens. If Rosie won, she'll give you the combination to the safe, which is where Dave stores Ol' Painless, she's yours now. You'll get the same if you help Bob to win, but you'll get nothing if Dave remains in office. *****Freeform Quest 6: Evergreen Mills***** This isn't a quest really, but it's a rather large area and deserves it's own section. Three Dog talks about it on the radio, how theres a good chance a bunch of Raiders are hanging out here due to the repeated attacks in the area. No kiddin'? Yeah, theres a good amount of Raiders here. You'll find the place just east of Vault 112, it's a large valley where a factory remains. Theres all kinds of goodies here, besides what the Raiders are carrying. Theres Smiling Jack, whom you can either trade with, or kill and take his special Shotgun (And then take his key to loot his closet). Theres a Bobble Head, Fat Man, Behemoth Super Mutant, and more! *****Freeform Quest 7: Kidnap Order***** If you speak to Eulogy about Little Lamplight, you'll have an option to ask him about enslaving children...yeah, doesn't get much worse than this. He'll go along with it, and make you an offer. He just asks you to find one of the youngest kids in the place, one that doesn't have a lot of fight in it yet, that way it'll be less prone to run away. Eulogy says he'll have a slaver waiting outside Little Lamplight, just lead the kid outside and head back to Paradise Hills for your reward. This is sick, but it's a good way to get some cash and bad Karma. Once you have access to Little Lamplight, look for the kid named Bumble. She'll be obviously a little more naive than the rest, and easily convinced. Tell her something great is waiting for her outside, and the others won't think she's a big girl unless she goes. This should be enough, lead her outside to the slaver waiting, done deal. I've never felt so sick in a game until this moment, although admitting to my father about Megaton's destruction was pretty hard too. Head back to Eulogy to collect. He'll reward you with the Boogeyman's Hood, which has decent defense. *****Freeform Quest 8: Lamplight Fungus Trade***** You can get this quest from Little Lamplight. Speak to Lucy the medic, or Eclair the cook. Each of them is looking for items, they'll trade fungus to get what they need. Lucy needs Buffout to use in medicine for rickets, Eclair wants Strange Meat so the kids don't have to eat the dang fungus all the time. Once you've spoken to one or both of them, talk to Mayor MacCready to seal the deal. You can now trade 2 Buffout or 2 Strange Meats for the fungus. The Cave Fungus removes 10 Rads and adds 5 HP, its also worth 50 caps. Its not a horrible deal, in any case its worth more than 2 Buffout, so you make a slight profit on the trade, not enough to warrant buying all the Buffout you find though. *****Freeform Quest 9: Grady's Last Recording***** Inside Marigold Station, in the main part of the subway, you'll find a booth with a dead body. You'll also find a holotape called Grady's Last Recording. It'll detail a package that needs to be delivered to Girdershade. The key to the package is stashed in a Firehose case in a side room. The safe with the package is in a room with a spinning light. Lets get to it. Head down the stairs from Grady, take the tunnel to your right heading east. You'll want to take the first door to your right. Head that direction, you should come to a rectangular room with a door on the left. It'll lead to a small closet area where Grady's Fire Hose Box will be. Take the key from there and loot anything on the shelves you want. Your next target location is the room with the spinning light outside it, it's to the east. You can continue south and follow the tunnels till you see a string of broken down train cars, or you can head back north and follow the other tunnel that will bend around from east to south leading you to the room. If you're having trouble finding it, the room will be directly east from Grady's Fire Hose. Use the terminal or your Lockpicking skill to open the door. Loot the room, then use the key to open the safe. Hmmm...interesting package. You can attempt to leave, but you'll be stopped by a guy named Lug-nut. You have 3 options here: You can try to use your Speech skill to make him leave, you can give up the package, or you can kill him outright. I chose option 3. You now need to deliver the package to Girdershade. Girdershade is far to the south-west. Find Ronald, ask him if he knows a guy named Grady. You can tell him you have his package. You know have a few options. You can force him to pay you 300 caps for the underwear, you can give it to him and he may pay you 200 caps for it anyway, you can kill him, or just not tell him/give him the item. Note that if you give Ronald the package and try to steal it back, you may have a hell of a time. I attempted to take it back 30 times in a row with 100 Sneak, couldn't get it, could only get it by killing him (Which is fine, he has the Kneecapper Shotgun too!). *****Freeform Quest 10: Hubris Comics Printing***** Not a quest, but an area with things to loot. You can reach this by taking the sewer entrance directly south of the Farragut West Station, across the river. Its also north-east of Grayditch. Alternatively, if you don't want to use the sewer you can enter via the Mason District. Lots of ghouls around this area, the sewers will eventually lead to Hubris Comics Publishing where you'll find more ghouls. Lots of traps in this area, beware of baby carriages and trip wires. You'll find a few terminals with some info, mostly related to Grognak, there is a funny cameo letter on a terminal about the Antagonizer though. You're looking for the elevator to the Hubris Comics Printing area. Inside you'll find even more ghouls and a Mad Johnny Wes shooting a Minigun. More traps here too, watch for mines on the ground and turrets. Make your way to Johnny where you'll find a Nuka Quantum and a Grognak comic. You can turn the printing press on, but it doesn't seem to function and I couldn't get it working properly. *****Freeform Quest 11: Canterbury Commons Merchant Contract***** Not a quest of sorts, but something you can do. If you haven't met one, theres four merchants that caravan around the Capital Wasteland peddling their wares. Each one has their own specialty: Crow deals in armor. Lucky Harith deals in weapons mostly. Doc Hoff has meds, chems, and food. Finally, Crazy Wolfgang has a little of everything, junk mostly. Speak to Uncle Roe, he'll tell you about the caravans and he can give you a map of their routes. They each go in a big circle around the area, stopping at many cities. You can speak to Uncle Roe about each trader. You can offer to contribute to the caravan's income, investing in their area of expertise to increase their supply and upgrade their goods. I haven't noticed a big difference in goods offered yet, this may contribute to their availability of caps they can offer. You can first offer to invest 200 caps to each of the traders. You can then invest 500 caps, you can invest more than that. It seems if you invest 500 caps you'll get a present the next time you see that particular merchant, here's what you get: 1. Lucky Harith will present you with a Mini Nuke. 2. Crow will give you Crow's Eyebot Helmet. 3. Doc will give you 7 Stimpacks. 4. Crazy Wolfgang will give you 6 Stealth Boys. It also appears he can repair your gear up to 90%. *****Freeform Quest 12: Old Olney***** Once again, not a quest of sorts, but general information on this zone. It's totally infested by Death Claws, just an fyi. This is a decent place to loot though, as theres plenty of dead bodies you can take goods off of, if you survive the beasties. The place you really want to look for is the Olney Sewer. Inside you'll find the Prototype Medic Power Armor, a Mini Nuke and Fat Man, a Quantum Nuka Cola, and lots of ammo and other things. Also, if you went to the Republic of Dave and rigged the election, Dave will be here either dead, or alive (If you previously cleared the area out) at least until the Death Claw respawn. *****Freeform Quest 13: The Nuka-Cola Clear Formula***** If you do the "Nuka-Cola Challenge" or just happened to wander into the Nuka Cola Factory, you may have run into a dead scavenger named Winger Mercier. She has a note on her, a Goalie Ledoux wants her to find the coveted formula to Nuka-Cola Clear. It can be found on the Factory Floor level in a locked safe that requires a key. Theres two paths to get to the key, you can lockpick a Very Hard lock just inside the lobby, then look for the Mr. Handy bot Milo, or you'll have to go through the rest of the facility to get to Milo. Once you reach Milo you'll have to do a Speech check and convince him you're a big wig from Nuka Cola. You can then ask him to craft you a key. Once you have the key, head back towards the entrance lobby. Theres a small group of cubicles in the next room, you should see the locked safe on the wall in that area, take the formula. You'll find Goalie Ledoux outside the Red Racer Factory. He won't be hostile, and he'll offer to pay you for the formula. You can take 250 for it, or use a Speech check to talk him up to 400 caps. He'll take the formula, mission complete. If you want you can kill him for Ledoux's Hockey Mask. *****Freeform Quest 14: Chinese Rifles, Pronto!***** If you're not hostile with Paradise Falls, speak to Pronto in Lock and Load. If you comment on his selection being crummy, he'll tell you that he rarely gets anything good because the slavers keep the good stuff for themselves and they'll only trade the junk they don't need. He wants to be able to offer a greater selection, but he needs some help as he isn't able to provide it on his own. He asks that you bring 20 Chinese Assault Rifles. This may take some time, as you may have a hard time finding Chinese Assault Rifles early in the game. As you take on Super Mutants you should start getting more of them. When you have 20 and you're ready to turn them in, go see Pronto (You can also turn them in early, a little bit at a time). Pronto won't give you anything of material value, but he says it'll take a few days for him to make some deals with the rifles for better selection. He'll also offer you a 20% discount from now on, which is a good deal. *****Freeform Quest 15: Lincoln Artifacts***** Theres two reasons to retrieve Lincoln's Artifacts. For one, you need a particular one for the Head of the State quest. Two, you can sell the priceless gems to Hannibal at the Temple of Union, to Abraham Washington, to Leroy at the Lincoln Memorial, or others. You're looking for the Museum of History, and to be precise you want the Lower Halls. Head into the Museum of History like you're going to Underworld, the door to the Lower Halls will be to the left of the entrance to Underworld. You want to find the Museum of History Offices, the Offices are up the stairs ahead and through the door in the back. Theres a good deal of Lincoln memorabilia you can take. Theres an action figure on a desk in the east office room. Theres a Wanted poster for John Wilks Booth in the south-west corner. In the center area you can go up the stairs, at the top of the stairs is a poster of the Memorial, this is what you need for the quest "Head of State." Note: the poster will only show up if you've activated the quest. If you want the other artifacts, Lincoln's Voice can be found on the desk near the poster. Still on the 2nd floor you can head north, the sacred Lincoln's Repeater is in a display case. The Antique Lincoln Coin Collection is on the 2nd floor in an east room. Lincoln's Hat can be found on the first floor on the ground in a north-west room. Theres a Civil War Draft poster on a shelf, 1st floor, south-east corner. If you're looking for the final artifact, the Diary is actually back in the Lower Halls. It's up the stairs, and on the first display on the right in the large display room. At this point you can sell the artifacts off to whoever you want. You'll want to give the poster of the Memorial to Leroy at the Lincoln, or Caleb at the Temple of Union. Other than that, you're free to sell the others or keep them for yourself. Many people like Lincoln's Repeater, I kept that and the hat for myself. *****Freeform Quest 16: National Archives Guess and Win***** If you're going after the Declaration of Independence, or just happen to be exploring the Archives, you'll come across two terminals at the entrance. If you answer the 1st one's history questions correctly, you'll receive a voucher that can be redeemed at the other terminal for special Mentats! You can also find loose vouchers elsewhere in the Archives that you can redeem. Don't worry if you get a question wrong, you'll have to start over, but theres no penalty. The answers and questions are: Q1. The Declaration of Independence was an act of what body? A1. Second Continental Congress Q2. How many North American Colonies rebelled against Great Britain in 1776? A2. Thirteen. Q3. Who was the first person to sign the Declaration of Independence? A3. John Hancock. Q4. How many delegates signed the Declaration of Independence? A4. 56. Q5. Which one of the following is NOT a written section of the Declaration? A5. Ratification. Q6. Who was the ruler of Great Britain when the Declaration was enacted in 1776? A6. King George III. Q7. Complete this Famous Phrase from the Declaration: "Life, liberty, and the pursuit of..." A7. Hapiness. Q8. Who was the principal author of the Declaration of Independence? A8. Thomas Jefferson. The rewards are as follows: 1. Berry Mentats - Adds +5 to Intelligence. 2. Grape Mentats - Adds +5 to Charisma. 3. Orange Mentats - Adds +5 to Perception. *****Freeform Quest 17: Sydney and the Ultra SMG***** If you've done the optional quest "Stealing Independence," you probably ran into the lovely Sydney in the rotunda of the Archives. She carries a special 10mm SMG on her. Theres two ways to obtain this weapon. One way involves either killing her or letting her be killed by Super Mutants while on the mission (She may also die on the way back to the Museum of History once you've finished the quest). The nicer way to do it is to ask her about her father. She'll talk about her father a bit, how he was all she had, and he used to call her "Little Moonbeam." He left her when she was little, and she had to make it on her own. Well, if you've been exploring the Statesman Hotel at all, or you've done the mission "Reilly's Rangers," you may have come across her father. Once you've made it into the mid level of the Statesman by crossing the bridge from Our Lady of Hope Hospital, you will find a bedroom. It should be one flight of stairs up from where you enter. There will be a holotape on a bed, the holotape will be addressed to Little Moonbeam. Listen to it, then go find Sydney in Underworld, if she made it. Show her the holotape, she'll thank you and reward you with her Ultra SMG. If she didn't make it to Underworld after the "Stealing Independence" mission, check Anacostia Crossing Metro just north of Rivet City. She may have been run down by Raiders if you didn't escort her back. *****Freeform Quest 18: Sheet Music for Agatha***** If you did the quest "Agatha's Song," you can activate this mini-quest to find some sheet music for Agatha so she can write down her music so it won't be lost( hopefully ) years later. I found this to be a rather tough task, as sheet music can be one of the most difficult things to find in the Wasteland. You may have come across one in Vault 92, although you would have to be looking hard! I'll just say check the bathrooms in the Living Quarters, I think there was one there. If you can't find it, or may have sold it off you can find another on the roof of the Statesman Hotel, and the only other one I've found is in the Springvale School. Return to Agatha with the Sheet Music. She'll be utterly shocked you were able to come across the Soil Stradivarius as well as some Sheet Music. She'll say she can provide a reward this time, here are your options: 1. Say you do not need the reward, you'll get good Karma instead. 2. Say you'll take whatever she can afford, she'll provide you with the uber Blackhawk pistol at 100% condition. 3. Insult her, she'll give you a Blackhawk pistol at 50% condition (Repairable with .44 Scoped Magnum). <More info to come> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Party Members ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1. Dogmeat - You can find Dogmeat in the north-west corner of the Scrapyard. The Scrapyard is north of Megaton, or just south of Minefield. When you find him, he'll currently be disposing of 5 Raiders single handedly. Yeah, this dog isn't your average house pet. Speak to Dogmeat, ask him if he lost his former master and if he'd like to join up with you. You'll have to watch out, Dogmeat has his perks and his downside. On the good side, Dogmeat won't count against the "One party member at a time" rule. You can also send him out to find food, ammo, and other items. He'll find the closest item and return with it (This also means if you're in your own house, he'll go down to the refrigerator and return with food). You have to be careful, if Dogmeat has to search too far, he may not come back alive. Also, unlike other party members, Dogmeat doesn't understand the concept of sneaking much, he'll growl at hostile targets and sometimes charge right in. On the plus side again he can survive a few Assault Rifles to the face, and he can do decent damage. If Dogmeat leaves your party at any time, you should be able to find him just outside the Vault 101 cave. Dogmeat will join you regardless of Karma. 2. Jericho - Jericho can be found in Megaton. He'll only join up with you if your character is evil. You can get good Karma once Jericho is in your party, but if he ever leaves, you'll need the bad Karma to get him back. You'll also need 1000 caps to pay him so he can get supplies. Jericho can be pretty good at ranged attacks, but he's not as tough as say...Fawkes. If you decide to let Jericho go, or he leaves your party for whatever reason, you can find him again in Moriarty's in Megaton. If you blew up Megaton, Jericho should still be there. If you don't find Jericho at the ruins, he either is still making his way through the wilderness, or he didn't make it, good luck finding the body! 3. Fawkes - You'll run into Fawkes in Vault 87. He'll be locked in a containment cell. He makes a deal with you, get him out and he'll get the radiated G.E.C.K. for you. Theres two ways you can do this. You can't hack his terminal and release him that way, you have to go to the main terminal nearby and release all the containment cells, or, if you remember Fawkes's cell door number (5), you can just release his cell. Fawkes won't join up with you right away, but you'll soon run into him again and make the offer. Fawkes is good with a heavy weapons, and can do some damage with a Gatling Gun. He can take some damage as well. If Fawkes should leave your party, he'll be studying in the Museum of History downtown. You need good Karma for Fawkes to join your party, but you do not need to keep good Karma for him to stay. 4. Charon - Charon is one tough ghoul you can find in the Underworld. As it turns out, he was brainwashed long ago, now he serves whoever holds his contract. Currently his contract is held by Ahzrukhal in the Ninth Circle. Theres a few ways you can obtain the contract, unfortunately you cannot steal it or find it anywhere on Ahzrukhal or in his shop. The only way is to compensate him in some way. One way to do this is to knock off Greta in the Underworld, his competition. I planted a frag grenade on her, unfortunately I didn't do a good job of sneaking and was seen, no biggie. As long as Ahzrukhal can't be tied to the murder, you'll get credit and Charon's contract. The other way to get Charon is to pay 2000 caps, or 1000 if your Barter skill is high enough. Charon is pretty good with a Combat Shotgun, as you'll soon see. Charon will wait for you in the Underworld if he should ever leave your party. Charon also does not require any specific Karma. 5. Star Paladin Cross - Once you've made it into the Citadel, Cross can be found in the A Ring. She'll be in a debriefing room of sorts, or the round table room. When you speak with her, she'll mention she knew your father, and as a tribute she will join your part to make sure his work is fulfilled. She's good with a Super Sledgehammer, but she's also good with ranged weapons. She can take some decent hits in her Power Armor as well. If she ever leaves your party for whatever reason, you should be able to find her again in the Lab in the Citadel. You must have good Karma to get Cross into your party, although getting bad Karma while she is with you is fine. 6. Clover - This crazy chick comes from Eulogy's Pad in Paradise Hills. Speak with Eulogy to obtain her. You must have bad Karma to be able to purchase her, but you do not need to have keep bad Karma for her to stay in your party. If you fire her and get good Karma later, you can still pick her up as well (Provided she's been in your party once before). 7. RL-3 - This Mr. Gutsy robot, with some slight modifications, can be bought from Tinker Joe. He roams the Robco Factory near Tenpenny Tower. The thing with RL-3 is you have to have neutral Karma before he'll even join, this can be easier said than done. You do not need to keep neutral Karma once RL-3 has become a member of your party. If he should ever leave, you can find him in Canterbury Commons, but you'll need neutral Karma to get the soldier in your party once more. 8. Butch - Ol' Butchie will be available to join your party, provided you didn't waste him earlier in the Vault. After you make it to the Citadel, head back to Vault 101. You may get an emergency message (See the Optional Quests section for more on this). If you have neutral Karma, you may be able to recruit Butch to your party at this time. If you don't get him here, you may be able to find him in Rivet City later, provided you resolved the Vault's problems in a way so Vault Dwellers can leave the Vault. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Schematics ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1. Rock-It Launcher - Buy it off Moira Brown in Craterside Supply 2. Shishkebab - Find the plans at a small Brotherhood Outcast camp south-east of Fort Constantine, near the satellites. 3. Shishkebab - Lucky Harith, the trader, sells a copy. 4. Nuka Grenade - Doc Hoff sells one of these schematics. 5. Rock-It Launcher - Get a copy off the Crazy Wolfgang 6. Rock-It Launcher - In Vault 101, pick the lock behind your mother's Bible verse in your father's office. 7. Bottlecap Mine - Jocko's Pop Stop, east of Girdershade. 8. Deathclaw Gauntlet - F. Scott Key Trail and Campground. 9. Nuka Grenade - Get one from Sierra for the Nuka-Cola Challenge. 10. Shishkebab - Receive the schematic from Vance for completing the Blood Ties quest. 11. Dart Gun - Receive it from Hannibal for completing his end of the quest Head of State. <More info to come> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Bobble Heads ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1. Medicine - In Vault 101, it'll be on your father's desk, grab it on your 16th birthday, you'll have less opportunities after that. 2. Strength - Inside Sheriff Simm's house in Megaton. 3. Big Guns - Inside the CO Quarters near Fort Constantine. 4. Intelligence - On the desk in Dr. Li's Lab at Rivet City. 5. Speech - Eulogy's Pad in Paradise Hills. 6. Lockpick - Inside the Bethesda Offices East within the Bethesda Ruins. 7. Perception - From the Republic of Dave, in the Museum. 8. Barter - In Evergreen Mills Bazaar, behind a counter past Smiling Jack. 9. Energy Weapons - In Raven Rock, you'll find this in Colonel Autumn's room. 10. Repair - Evan King's House in Arefu. 11. Science - Vault 106, the far right room on your map in Living Quarters. 12. Melee Weapons - Dunwich Building, in the Virulent Underchambers. 13. Unarmed - Find it next to the body of Argyle in Rockopolis. <More info to come> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Equipment ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Please note, I've done my best to list the stats for weapons and armor here. I'm currently in the process of repairing ALL wasteland items to 100% so I can accurately list their stats. Your damage/DR/mileage may vary depending on your perks and skills. I'm listing stats according to a skill level of 100, so take that into consideration. *****Armor***** ***Body*** Name DR Weight Value Vault 101 Security Armor 12 15 70 Raider Badlands Armor 16 15 180 Raider Blastermaster Armor 16 15 180 Raider Painspike Armor 16 15 180 Raider Sadist Armor 16 15 180 Leather Armor 24 15 160 Rivet City Security Uniform 24 20 330 Notes: Adds +5 to Small Guns. Recon Armor 28 20 180 Notes: Adds +5 to Sneak. Talon Combat Armor 28 25 275 Combat Armor 32 25 390 Metal Armor 36 30 460 Notes: Reduces Agility by -1. Enclave Power Armor 40 45 780 Notes: Adds +1 to Strength, reduces Agility by -1, adds +15 to Radiation Resistance. Power Armor 40 45 715 Notes: Adds +2 to Strength, reduces Agility by -2, adds +10 to Radiation Resistance. Tesla Armor 43 45 819 Notes: Adds +10 to Energy Weapons and +20 to Radiation Resistance. Armored Vault 101 Jumpsuit 12 15 180 Notes: You can get this from Moira in Megaton, either through the Wasteland Survival Guide quest or ask her about it. Adds +5 Small Guns and +5 Energy Weapons. Wanderer's Leather Armor 24 15 160 Notes: Found on the Wanderer, between Roosevelt Academy and Paradise Hills, will also increase your Small Guns by 10. Use Leather Armor to repair. Ranger Battle Armor 39 27 430 Notes: Adds +5 AP, +1 to Luck, and +10 to Small Guns. Possible quest reward from Reilly's Rangers quest. Considered one of the best armor's in the game as it uses Combat armor for repairs and does not slow down run speed like Power Armor. Linden's Outcast Power Armor 40 45 739 Notes: Adds +5 to Big Guns, +1 to Strength, -1 to Agility, and +10 to Radiation Resistance. Possible reward from The Oasis quest. Prototype Medic Power Armor 40 45 1000 Notes: Reduces Agility by -1, adds +25 Radiation Resistance. It will also produce Med-X for you, and it talks! You can find a suit of this in the Old Olney Sewers on a dead Brotherhood Iniate. T-51b Power Armor 50 40 1000 Notes: Possible reward for the quest "You Gotta Shoot 'Em in the Head." Adds +25 Radiation Resistance. ***Helmets*** Name DR Weight Value Hockey Mask 3 (3/4 cond) 1 9 Notes: Adds +5 to Unarmed skill. Raider Arclight Helmet 3 3 20 Raider Psycho-Tic Helmet 3 3 20 Raider Wasteland Helmet 3 3 20 Vault 101 Security Helmet 3 (3/4 cond) 3 20 Raider Blastmaster Helmet 3 (3/4 cond) 3 11 Notes: Adds +5 to Big Guns and +5 to Explosives. Motorcycle Helmet 4 1 4 Eyebot Helmet 4 (1/2 cond) 3 8 Notes: You can get these by destroying the Enclave radio bots. Recon Armor Helmet 4 3 40 Rivet City Security Helmet 4 3 50 Ledoux's Hockey Mask 4 1 100 Notes: Adds +25 to AP. Kill Goalie Ledoux outside the Red Rocket Tricycle Factory for it. it. Combat Helmet 5 3 50 Metal Helmet 5 3 70 Ranger Battle Helmet 6 5 60 Notes: Found on Donovan of Reilly's Rangers. Power Helmet 8 5 110 Notes: Adds +3 to Radiation Resistance. Enclave Power Helmet 9 5 110 Notes: Reduces Charisma by -1 and adds +5 to Radiation Resistance. Tesla Helmet 9 5 120 Notes: Reduces Charisma by -1 and adds +5 to Radiation Resistance. The AntAgonizer's Helmet 4 5 21 Notes: You can get this by killing the AntAgonizer, or talk her out of fighting. The Mechanist's Helmet 4 5 21 Notes: You can get this by killing the Mechanist, or talk him out of fighting. Crow's Eyebot Helmet 5 10 20 Notes: Adds +1 to Perception. Receive it from the merchant, Crow, for investing a total of 700 caps in his business. Boogeyman's Hood 8 3 110 Notes: Freeform quest reward from Eulogy. Ask about enslaving children and bring Bumble from Little Lamplight to Eulogy. T-51b Power Helmet 10 4 120 Notes: Possible reward for the quest "You Gotta Shoot 'Em in the Head." Adds +1 Charisma and +8 Radiation Resistance. ***Clothing*** Name DR Weight Value Advanced Radiation Suit 8 7 100 Notes: Adds +40 to Radiation Resistance. Brahmin-Skin Outfit 2 2 6 Notes: Adds +1 Agility and +1 Endurance. Dirty Pre-War Businesswear 3 2 8 Notes: Adds +5 to Speech. Dirty Pre-War Spring Outfit 3 2 5 Notes: Adds +1 Agility. Eulogy Jones' Suit 2 (3/4 cond) 3 4 Notes: Adds +2 to Small Guns and +1 to Charisma. Kill Eulogy Jones to obtain it. Enclave Officer Uniform 5 3 8 Notes: Adds +5 to Energy Weapons. Enclave Scientist Outfit 3 2 8 Notes: Adds +5 to Science. Environment Suit 6 5 100 Notes: Adds +5 Medicine and +30 Radiation Resistance. Grimy Pre-War Businesswear 3 2 6 Notes: Adds +5 to Speech. Lab Technician Outfit 3 2 8 Notes: Adds +5 to Science. Lesko's Lab Coat 5 1 150 Notes: Adds +10 to Science and +20 to Radiation Resistance. You can get this by asking Dr. Lesko for an added reward during the "Those!" quest. You can also kill him for it. Merc Adventurer Outfit 12 8 50 Notes: Adds +2 to Melee Weapons and +2 to Small Guns. Merc Charmer Outfit 12 8 50 Notes: Adds +2 to Melee Weapons and +2 to Small Guns. Merc Cruiser Outfit 12 8 50 Notes: Adds +2 to Melee Weapons and +2 to Small Guns. Merc Grunt Outfit 12 8 50 Notes: Adds +2 to Melee Weapons and +2 to Small Guns. Merc Troublemaker Outfit 12 8 50 Notes: Adds +2 to Melee Weapons and +2 to Small Guns. Naughty Nightwear 1 1 200 Notes: Adds +10 to Speech and +1 to Luck. You can find it in the Marigold Station where the "Those!" quest takes place. Oasis Villager Robe 2 (1/3 cond) 2 1 Notes: Possible quest reward from The Oasis. Pre-War Relaxedwear 3 2 8 Notes: Adds +1 to Agility. Pre-War Spring Outfit 3 2 8 Notes: Adds +1 to Agility. Radiation Suit 6 5 60 Notes: Adds +30 to Radiation Resistance. Red's Jumpsuit 2 (1/2 cond) 1 12 Notes: Found on Red in Big Town. You can take these from her if you Mez her (See the "Strictly Business" quest). Adds. +5 Small Guns. Regulator Duster 10 3 70 Notes: Adds +1 to Charisma and +5 to Small Guns. Robco Jumpsuit 2 (1/2 cond) 1 2 Notes; Adds +5 to Repair skill. Roving Trader Outfit 2 2 6 Notes: Adds +5 to Barter skill. Sexy Sleepwear 1 1 6 Notes: Adds +1 to Charisma. Sheriff's Duster 4 (1/2 cond) 3 14 Notes: You can get this off the Sheriff of Megaton if you kill him. Adds +1 Charisma and +5 Small Guns. Tenpenny's Suit 2 (3/4 cond) 2 5 Notes: You can take this off Alastair Tenpenny's body if you kill him. It adds +1 to Charisma and +2 to Small Guns. The AntAgonizer's Costume 12 (1/2 cond) 15 42 Notes: You can get this by killing the AntAgonizer, or talk her out of fighting. Reduces Charisma by -1 and Adds +1 to Agility. The Mechanist's Costume 12 15 11 Notes: You can get this by killing the Mechanist, or talk him out of fighting. Reduces Charisma by -1 and Adds +1 to Endurance. Tunnel Snake's Outfit 4 2 8 Notes: The Tunnel Snakes Jacket. You can get this from Butch for saving his mother during your Vault escape, or you can kill him for it. Adds +5 Melee skill. Vance's Longcoat Outfit 10 4 100 Notes: Adds +1 Perception, +1 to Charisma, and +10 to Small Guns. Vault 77 Jumpsuit 1 1 6 Notes: Adds +5 to Unarmed skill and +5 to Melee Weapons skill. Find it in the Barracks of Paradise Falls. Vault 101 Jumpsuit 1 1 8 Notes: Adds +2 to Melee Weapon skill and +2 to Speech. Vault 101 Utility Jumpsuit 1 1 10 Notes: Adds +5 to Lockpick skill and +5 to Repair. Vault 112 Jumpsuit 1 1 6 Notes: Adds +2 to Melee Weapon skill and +2 to Speech. Vault Lab Uniform 2 1 6 Notes: Adds +5 to Science skill, can be found on Jonas's body. Wasteland Legend Outfit 12 8 50 Notes: Adds +2 to Melee Weapon skill and +2 to Small Guns. Can be found in Vault 92. Wasteland Settler Outfit 2 2 6 Notes: Adds +1 Endurance and +1 Agility. Wasteland Surgeon Outfit 2 2 6 Notes: Adds +5 to Medicine. Wasteland Wanderer Outfit 2 2 6 Notes: Adds +1 to Agility and +1 to Endurance. ***Hats*** Name DR Weight Value Biker Goggles 1 1 6 Enclave Officer Hat 1 1 6 Notes: Adds +5 to Energy Weapons. Eulogy Jones' Hat 1 1 5 Notes: Adds +1 to Charisma. Ghoul Mask 3 1 50 Notes: Feral Ghouls will not attack. Possible quest reward from the quest Tenpenny Tower. Lincoln's Hat 1 (3/4 cond) 1 26 Notes: Adds +1 to Intelligence and +5 to Speech. Find it in the Museum of History Offices, first floor on the ground in a north-west room. Party Hat 1 1 5 Poplar's Hood 2 1 100 Notes: Adds +10 Sneak and +1 to Agility. Possible quest reward from The Oasis quest. Pre-War Baseball Cap 1 1 8 Notes: Adds +1 to Perception. Pre-War Hat 1 (1/2 cond) 1 3 Notes: Adds +1 to Perception. Reading Glasses 1 (3/4 cond) -- 8 Red's Bandana 2 (1/2 cond) 1 11 Notes: Found on Red in Big Town. You can take these from her if you Mez her (See the "Strictly Business" quest). Adds +1 Perception. Sheriff's Hat 1 (1/2 cond) 1 14 Notes: You can get this off the Sheriff of Megaton if you kill him. Adds +1 Perception. Stormchaser Hat 1 (1/2 cond) 1 2 Notes: Adds +1 to Perception. *****Weapons***** ***Fist/Unarmed Weapons*** Name Damae Weight Value Brass Knuckles 12 1 20 Spiked Knuckles 15 1 25 Power Fist 26 6 100 Deathclaw Gauntlet 26 10 150 Notes: Requires Deathclaw Gauntlet Schematic to make. Also requires Wonderglue, a Leather Belt, a Medical Brace, and a Deathclaw Hand. ***Melee Weapons*** Name Damage Weight Value Pool Cue 8 1 15 Rolling Pin 8 (3/4 cond) 1 7 Knife 9 1 20 Police Baton 9 2 70 Switchblade 10 1 35 Tire Iron 11 3 35 Combat Knife 12 1 50 Nail Board 13 4 30 Baseball Bat 14 3 55 Lead Pipe 14 3 75 Chinese Officer's Sword 14 (3/4 cond) 3 50 Sledgehammer 25 12 130 Ripper 35 6 100 Repellant Stick 6 3 120 Notes: Give to you by Moira Brown of Megaton, for use during one of the Wasteland Survival quests. If you hit a Mole Rat with this item, they'll usually explode in 1-2 hits. Ant's Sting 9 1 30 Notes: Receive this from the AntAgonizer for retrieving the costume of the Mechanist. Can repair with Knives, also takes away 4 HPs every 10 seconds. The Break 11 1 50 Notes: Find it outside Eulogy's Pad in Paradise Falls. Use Pool Cue's to repair it. Board of Education 17 4 60 Notes: Find it inside the Abandoned Shack in the hills south-east from Oasis. Use Nail Boards to repair. Vampire's Edge 20 1 100 Notes: Found in Vance's sword case in his room, in the Meresti Metro Station. You may need to pick the lock, or get the key off Vance. The Tenderizer 35 12 230 Notes: Found in the Anchorage Memorial, Service Entrance. Its through a doorway that requires parts and a repair skill of 35 to obtain (See Mirelurk quest in Wasteland Survival Guide). Uses Sledgehammers to repair. Shishkebab 60 3 200 Notes: Requires a Shishkebab schematic, as well as a Motorcycle Gas Tank, Pilot Light, Lawnmower Blade, and a Motorcycle Handbrake. It will also do -2 HPs every 5 seconds. ***Small Guns*** Name Damage Weight Value BB Gun 4 2 36 Chinese Pistol 4 2 190 .32 Pistol 6 2 110 Silenced 10mm Pistol 8 3 250 10mm Pistol 9 3 225 Hunting Rifle 25 6 150 Scoped .44 Magnum 35 4 300 10mm Submachine Gun 37 5 330 Assault Rifle 38 7 300 Sniper Rifle 40 10 300 Chinese Assault Rifle 51 7 500 Sawed-Off Shotgun 50 4 150 Combat Shotgun 55 7 200 Dart Gun 6 3 500 Notes: Requires the Dart Gun Schematic to make, as well as a Paint Gun, Radscorpion Poison Gland, Toy Car, and Surgical Tubing. The dart gun will also do -1000 to right and left legs, and take away 8 HP every 8 seconds. Ol' Painless 30 6 250 Notes: Get this from the safe in the Republic of Dave. The easiest way to obtain it is to rig the election so Rosie or Bob wins, they'll give you the combination to the safe where Ol' Painless resides. You can repair it using Hunting Rifles. Railway Rifle 30 9 200 Notes: Requires Railway Rifle Schematic to make, as well as a Crutch, Steam Gauge Assembly, Fission Battery, and Pressure Cooker. Lincoln's Repeater 50 5 500 Notes: Found in the Museum of History Offices. Blackhawk 55 4 500 Notes: Possible reward from Freeform Quest "Sheet Music for Agatha." Use Scoped .44 Magnum for repairs. Sydney's 10mm "Ultra" SMG 59 5 430 Notes: Show Sydney the holotape from her father, which can be found in the Statesman Hotel. You can also find it on her body if she died during the mission "Stealing Independence" or if she dies on the way back to Underworld after arriving in Rivet City. Xuanlong Assault Rifle 64 7 400 Notes: Found in the diner outside the Jury Street Metro. You get directions to Prime using the terminals in the Museum of Technology. You can repair it using Chinese Assault Rifles. The Kneecapper 75 5 350 Notes: Found on Ronald Laren from Girdershade. Can be repaired with Sawed-Off Shotguns. The Terrible 80 10 250 Notes: Found on Smiling Jack inside the Evergreen Mills Bazaar. You can repair it using Combat Shotguns. ***Energy Weapons*** Name Damage Weight Value Laser Pistol 12 3 320 Plasma Pistol 20 (1/2 cond) 3 113 Laser Rifle 23 8 1000 Plasma Rifle 45 8 1800 Mesmetron 1 2 500 Notes: This weapon is given to you by the front guard of Paradise Hills if you accept the "Strictly Business" quest. This item will mesmerize your target, allowing you to fit them with a slave collar, among other things. The same guard will also sell you more ammo, should you need it. Smuggler's End 18 2 450 Notes: Find this in Elder Lyons' room in the Citadel, its in the safe. You can repair it using Laser Pistols. Protectron's Gaze 24 3 320 Notes: You can receive this weapon from the Mechanist for turning in the AntAgonizer's costume to him. It appears to fire 5 lasers, but I don't believe each laser counts as a shot. Can be repaired with Laser Pistols. Wazer Wifle 28 8 900 Notes: You can buy this weapon off Biwwy in Little Lamplight. You can buy it straight up for 500 caps, or use your skill to talk him down to 250. Use Laser Rifles to repair it. A3-21's Plasma Rifle 50 8 2200 Notes: Possible quest reward from Replicated Man quest, requires Plasma Rifles to repair. Alien Blaster 88 (3/4 cond) 2 262 Note: Find this at the crash site. There isn't a marker for it on the map, my best description is look in the hills between Vault 92 and the MDPL-13 Power Station. Be sure to take all the ammo on the ground, as it's hard to find. You'll know you're getting close when you start getting radiation. Gatling Laser 100 (1/2 cond) 18 802 Notes: Find one in Raven Rock. ***Big Guns*** Name Damage Weight Value Minigun 75 18 1000 Flamer 160 15 500 Notes: Also does -2 HPs every 5 seconds. Missile Launcher 170 20 500 Fat Man 1610 30 1000 Rock-It Launcher 50 8 200 Notes: Requires Rock-It Launcher Schematic to make, as well as a Vacuum Cleaner, Leaf Blower, Firehose Nozzle, and Conductor. This item will shoot a variety of items, including coffee cups and teddy bears! Eugene 105 18 1500 Notes: Possible quest reward from Reilly's Rangers quest, Brick's personal Minigun. You can use other Miniguns to repair it. ***Explosives*** Name Damage Weight Value Frag Grenade 101 .5 25 Frag Mine 101 .5 25 Pulse Grenade 11 .5 40 Notes: Very effective against robots/machinery. Nuka Grenade 501 .5 50 Notes: Requires the Nuka Grenade to make, as well as 1 bottle of Nuka-Cola Quantum, a Tin Can, Turpentine, and Abraxo Cleaner. Lethal! FYI: If you plan on Bottlecap Mine 501 .5 75 Notes: Requires the Bottlecap Mine Schematic to make, as well as a Lunchbox, a Cherry Bomb, a Sensor Module, and 10 Bottlecaps. Plant this like you would any mine, and watch people explode! ***Miscellaneous*** Name Weight Value Timebomb's Lucky 8 Ball 1 4 Notes: Get this from Timebomb for saving the town from the Super Mutants. You cannot pickpocket Timebomb or kill him for this item. It gives you +1 Luck. Yew's Bear Charm 1 50 Notes: Receive this from Yew as a possible reward from The Oasis quest. Will add +10 to your Speech skill permanently. Soil Stradivarius 3 -- Notes: Found in Vault 92. This can be given to Agatha, as it was in her family, or it can be sold to certain individuals. One person is Abraham Washington, who will pay 200 caps, or 300 with a Speech check. <More info to follow, please do not send me e-mails on locations of special weapons, I am collecting them all myself and will post them in due time, thanks!> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Mini Nuke Locations ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ While you can occasionally find a Mini Nuke on certain traders, like Flak and Shrapnel in Rivet City, there are a few locations you can find them throughout the Capitol Wasteland. So, think of these as free Nukes. 1. The Radroach King's rocket, just northeast of Minefield. 2. Theres 3 in the Bomb Storage area of Fort Constantine. 3. Old church south-west of Jury Street Metro. 4. Receive one from Lucky Harith for investing 700 caps in him via Uncle Roe. 5. Old Olney's Sewer, in a closet behind a Very Hard locked door. 6. In a barn just west of Vault 92. 7. Behind a Very Hard locked door in the Nation Archives Sub-Basement. 8. You can find 3 in the Capital, all in the Rotunda. One on a Behemoth, a Talon Company will be carrying one (He may shoot it), and near the shelves. 9. On the east side of Seward Square you'll hear a crazy guy on a megaphone. Kill him from a distance, then loot 3 Mini-Nukes in the alleyway. 10. Find one in the ammo box in Agatha's house, she'll give you the key. <More info coming> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Caravan Traders ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ The caravan traders all deal out of Canterbury Commons, but they'll travel the Capital Wastes in a big circle, selling to various towns around. From Canterbury they'll generally head south toward Rivet City. From there it looks like Megaton, then maybe Evergreen Mills. From there I think they head to Arefu, then Paradise Falls, Big Town, then Temple of Union I think before they return to Canterbury Commons. 1. Doc Hoff - The good doctor will mostly sell you chems, but he also sells a Nuka Cola Grenade schematic. If you invest 700 caps in his business via Ernest Roe in Canterbury, Doc will give you 7 Stimpacks when you next see him. 2. Crazy Wolfgang - This guy's a little weird, but he'll sell random junk to you, the only thing he really seems to have of note is a schematic for the Rock-It Launcher. He has some parts to make other weapons. If you invest 700 total caps in Wolfgang's business via Roe, he'll give you 6 Stealth Boys next time you see him. 3. Lucky Harith - Your typical trader, I first encountered him near the steps Leading to the Rivet City bridge. He was selling a schematic for the Shishkebab. If you invest 700 caps total in Lucky, he'll give you a Mini Nuke the next time you see him. 4. Crow - Crow specializes in armor, although he doesn't seem to carry anything particularly great even after investing in him. If you invest 700 total caps in his business by speaking with Uncle Roe, he'll give you Crow's Eyebot Helmet next time you see him. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ FAQ ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Q1. How do I train to use Power Armor? The Brotherhood members at GNR tell me to seek Elder Lyons in the Lab, but I don't see a Lab! A1. You can't get to this location yet, this is entirely misleading. What the Brotherhood soldiers should say is speak to Elder Lyons and Gunny once you get inside the Citadel. This will happen on its own as part of the main quest line, you can't rush this. If you're having trouble finding Gunny, he's training soldiers out in the Courtyard of the Citadel. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Credits ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Thanks to GameFaqs for posting this guide Thank you Bethesda for making such a great game Info on S.P.E.C.I.A.L. stats taken from Fallout.Wikia.com Thanks to my best friend, Chris, for info on how to obtain both rewards from the Replicated Man quest, the location of the Alien Blaster, and Oasis. Thanks to blarg_blarg for some Karma info on party members. Thanks to ParaBellum for info on collecting more money from Silver. Thanks to MikeTastiK for pointing out the typo on my luck description. Thanks to Drew for a little more information on Moriarty and Three Dog. Thanks to alex_gh for a little more info on clues for the Replicated Man. Thanks to OCBucksFan for an alternative place to take Bryan Wilks in "Those!" ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Copyright Notice ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ This piece of work is copyright Nick Bartosic c)2008. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Sorry, I'm going to temporarily disable contact info. I'm still in the process of adding all the information, and I'm already getting barraged by e- mails with people trying to add to quests I haven't even written up yet. I'll put my contact info back up once I've filled in the majority of the info.! View in:
https://www.gamefaqs.com/ps3/939932-fallout-3/faqs/54673
CC-MAIN-2017-39
refinedweb
49,027
80.72
I'm writing a program that rolls a die a number of times that the user enters, and counts up each time a one, two, three, and so on is rolled. Right now, it only prints out zero's. Any guidance would be appreciated! Here's my code: // dice.cpp : Defines the entry point for the console application. // #include "stdafx.h" #include <iostream> using namespace std; int _tmain(int argc, _TCHAR* argv[]) { int one = 0; int two = 0; int three = 0; int four = 0; int five = 0; int six = 0; int result[6] = {0}; int numberOfRolls; cout << "Enter the number of times that you want to roll the die: "; cin >> numberOfRolls; for (int counter= 1; counter < numberOfRolls; counter++) { int answer = result[rand() % 6 + 1]; if(answer == 1) one++; if(answer == 2) two++; if(answer == 3) three++; if(answer == 4) four++; if(answer == 5) five++; if(answer == 6) six++; } cout << "The number of one's rolled is: " << one << endl; cout << "The number of two's rolled is: " << two << endl; cout << "The number of three's rolled is: " << three << endl; cout << "The number of four's rolled is: " << four << endl; cout << "The number of five's rolled is: " << five << endl; cout << "The number of six's rolled is: " << six << endl; system("pause"); return 0; }
https://www.daniweb.com/programming/software-development/threads/406232/dice-program
CC-MAIN-2018-26
refinedweb
212
64.58
About | Projects | Docs | Forums | Lists | Bugs | Get Gentoo! | Support | Planet | Wiki El jue, 21-06-2007 a las 15:40 +0300, Philipp Riegger escribió: > On 21.06.2007, at 15:02, josé Alberto Suárez López wrote: > > > nice idea :) > > > > El jue, 21-06-2007 a las 14:48 +0300, Philipp Riegger escribió: > >> Good day. > >> > >> I though it might be nice to be able to tell gnap_make which tempdir > >> to use. I can think of 2 scenarios where this will make sense: > > I'd like to discuss 2 points i'm not quite sure about. > > 1) keeptemp: Should this be an extra option (-K) or should this be > triggered by my introduces custom tempdir option (-T)? i prefer an extra option, so maybe is better to keep this kind of "advanced" options in commons.conf > 2) My option is quite strange since "usually" you give a tempdir > like /var/tmp and the tool uses a subdir of that e.g. /var/tmp/gnap- > lsdfnsdf. My approach uses the given dir directly, this is kind of > not straight forward. Furthermore, if somebody uses a environment > variable TEMPDIR and -T is not used, the alternative execution path > is also used. > > Some possibilities what to do: > > To fix the environment thing, TEMPDIR can be set to '' before parsing > command line arguments. As an alternative we could use the GNAP* > namespace and rename it to GNAPTEMP or GNAPTEMPDIR. This would be > easier than setting all sensitive variables to '' and if somebody > messes with that namespace, it's not our fault. We must use the GNAP namespace. > To fix 2) we could use TEMPDIR/gnap or TEMPDIR/gnap-VERSIONSTAMP in > the -T case. anything against this? VERSIONSTAMP must be used ever. > > Thoughts about 1): If no overlays are used, the tempdir is quite > small. If overlays are used, then it is bigger, but the data created > during the snapshot creation is simply the portage snapshot and the > overlays on top and can be found in the catalyst tempdir. So... the > big data is never really needed and it is available at another place > and the small data is the important one and does not hurt much. > > Still: Should we introduce a new command like option or create some > logic when to delete what and when not? I would prefer 2. i prefer 2 too, so maybe we can guide this logic in cmmons.conf > > Philipp -- gnap-dev@g.o mailing list Updated Jun 17, 2009 Summary: Archive of the gnap-dev mailing list. Donate to support our development efforts. Your browser does not support iframes.
http://archives.gentoo.org/gnap-dev/msg_62e10e19cc78c7055175bc5611ae9562.xml
CC-MAIN-2014-10
refinedweb
428
73.27
Studia Overview The Studia plug-in helps tracking the origin of alarms reported by Eva, adding useful shortcuts in the Frama-C GUI for navigation between an expression and its uses/definitions. Quick Start frama-c-gui -eva studia.c Right-click on an expression in the code and choose the Studia context menu to access its features. You can use the example code below to test its features. Example code #include <string.h> typedef struct { int id; char msg[16]; } person; void disable(person *p) { if (p->id == 2) strcat(p->msg, "_disabled"); } void set_state(person *p, int on) { if (p->id > 0 && !on) { disable(p); } } void main() { person p = {2, "john_doe"}; set_state(&p, 0); } Other plug-ins derived from Eva, such as Impact, Occurrence and Scope, also include menus in the GUI which complement Studia. Technical Notes Maturity: industrialized Automatically enabled after running Eva and opening the GUI.
https://www.frama-c.com/fc-plugins/studia.html
CC-MAIN-2020-50
refinedweb
150
54.73
While the vast majority of Python developers currently use CPython, which is downloaded at python.org, another Python implementation written in Python - PyPy - has gained wider support from developers. Some see PyPy as an even better platform for Python's growth than CPython. One of the main reasons why PyPy is so well suited for growth is because changes can be made to the language without having to update the JIT. The JIT backend is abstracted so that it is almost totally separate from the interpreter. You can maintain the speed of the JIT while making updates to the language, therefore you don't need to be an assembly expert to write new bytecode. CPython modules The CPython extension modules (written in C) are the only feature that breaks with the stability theme. This support is considered alpha quality because it's unlikely that unmodified C extensions will work out of box (due to missing functions or refcounting details). This support is disabled by default, so to turn it on you need to type: import cpyext pypy setup.py buildBe sure to include the above line at the beginning of setup.py or put it in your PYTHONSTARTUP. The Blackhole Compiler PyPy has a number of benchmarks showing its speed compared to CPython. PyPy is also able to automatically generate C code along with JVM and .NET versions of the interpreter (no need to write in Jython or IronPython). See what PyPy projects are currently in progress during Google's Summer of Code. {{ parent.title || parent.header.title}} {{ parent.tldr }} {{ parent.linkDescription }}{{ parent.urlSource.name }}
https://dzone.com/articles/pypy-opens-blackhole?mz=55985-python
CC-MAIN-2016-07
refinedweb
265
62.98
Despite Oracle recently agreeing to hand over control of Java Enterprise Edition to the Eclipse Foundation, it seems that the situation isn't as clear cut as it originally seemed. The latest clarifications from Oracle are that the names 'Java' and 'javax' aren't part of the handover, and that they don't want future developments to be managed using the JCP Java Community Process. The problem starts with what to call Java EE when it completes its move to the Eclipse Foundation. At the moment, the platform based on Java EE 8 is an Eclipse Top Level Charter project, and is known as Eclipse Enterprise for Java (EE4J). Oracle doesn't want the open source version to use the name Java, nor does it agree that extension packages can be called "javax". Oracle is citing branding and intellectual property concerns. The Java EE Guardians and the developer community want the name Java kept somewhere in the brand, with potential options including Open Java EE. The Guardians are a joint community of many Java Champions, Java User Groups, Java User Group leaders, JCP experts, JCP members, open source committers, and many other Java developers. A poll organized by Reza Rahman, enterprise Java expert and co-founder of the Guardians, found that the developer community want the word Java at the start of the name. In an open letter on Java EE by the Java Guardians, they say:." The letter continues: ." The letter ends: ." Unfortunately, Oracle isn't prepared to compromise. In a message posted to the EE4J community mailing list, Oracle's Will Lyons, said that the Java EE and javax names make use of the Java trademark. He interprets this as indicating that: "the source of these technologies is Oracle and community processes managed by Oracle. As a critical identifier of the source of products to our users, we must continue to reserve use of such names using the Java trademark to serving that fundamental source identifying function." The message continues: "we must require that a new namespace be used for the new EE4J technologies that are developed using that process, and a new brand (other than Java EE) that includes these new technologies." Lyons also made clear that Oracle doesn." JCP has traditionally been the standard way to develop technical specifications for Java technology. The JCP process is open to anyone to make suggestions, review ongoing Java Specification Requests (JSRs) and provide feedback. Given the community desire to get Java out of Oracle's hands, it seems likely that Oracle will get its own way over the name. Java Guardians Open Letter Oracle Promises To Open Source Oracle JDK And Improve Java EE Java EE Moving To Eclipse [ ... ] The latest breakthrough in brain function is the reconstruction of what the eye sees from the activity of neurons that form the optic nerve. Man machine neural interfaces get closer. or email your comment to: comments@i-programmer.info
http://www.i-programmer.info/news/80-java/11476-oracle-holds-on-to-java-ee-brand.html
CC-MAIN-2018-22
refinedweb
489
52.09
I've got some code that works pretty nicely. Basically it's a while-loop that goes through a list of dates, finds files on my HDD that corresponds to those dates, does some calculations with those files, and then outputs to a "results.csv" file using the command my_df.to_csv("results.csv",mode = 'a') import datetime, time, os import sys import threading import helperPY #a python file containing the logic I need class myThread (threading.Thread): def __init__(self, threadID, name, counter,sn, m_date): threading.Thread.__init__(self) self.threadID = threadID self.name = name self.counter = counter self.sn = sn self.m_date = m_date def run(self): print "Starting " + self.name m_runThis(sn, m_date) print "Exiting " + self.name def m_runThis(sn, m_date): helperPY.helpFn(sn,m_date) #this is where the "my_df.to_csv()" is called sn = 'XXXXXX' today=datetime.datetime(2016,9,22) # yesterday=datetime.datetime(2016,6,13) threadList = [] i_threadlist=0 while(today>yesterday): threadList.append(myThread(i_threadlist, str(today), i_threadlist,sn,today)) threadList[i_threadlist].start() i_threadlist = i_threadlist +1 today = today-datetime.timedelta(1) Writing the file in multiple threads is not safe. But you can create a lock to protect that one operation while letting the rest run in parallel. Your to_csv isn't shown, but you could create the lock csv_output_lock = threading.Lock() and pass it to helperPY.helpFn. When you get to the operation, do with csv_output_lock: my_df.to_csv("results.csv",mode = 'a') You get parallelism for other operations - subject to the GIL of course - but the file access is protected.
https://codedump.io/share/BNZ0bXIIdBrw/1/python-multthreading-safe-to-use-pandas-quottocsvquot-on-common-file
CC-MAIN-2017-43
refinedweb
254
54.39
Angular Master Class in Málaga Join our upcoming public training!Get a ticket → In our latest article, we talked about how to make our Angular apps fast by exploring Angular’s ChangeDetectionStrategy APIs as well as tricks on how to detach change detectors and many more. While we were covering many different options to improve the demo application’s performance, we certainly haven’t talked about all possible options. That’s why Jordi Collell pointed out that another option would be to take advantage of Zone APIs, to execute our code outside the Angular zone, which will prevent Angular from running unnecessary change detection tasks. He even put time and energy into creating a demo plunk that shows how to do exactly that. We want to say thank you for his contribution and think that the solution he came up with deserves its own article. So in this article we’re going to explore his plunk and explain how Jordi used Zones to make our demo application perform at almost 60 fps. TABLE OF CONTENTS Seeing it in action Before we jump right into the code, let’s first take a look at the demo plunk with the running application. As a quick recap: The idea was to render 10.000 draggable SVG boxes. Rendering 10.000 boxes is not a super sophisticated task, however, the challenge lies in making the dragging experience as smooth as possible. In other words, we aim for 60 fps (frames per second), which can be indeed challenging, considering that Angular re-renders all 10.000 boxes by default when an event has fired (that we bound to). Here’s the demo with the unoptimized version: And here’s Jordi’s optimized plunk, which uses Angular’s NgZone APIs: Even though the difference is rather subtle, the optimized version performs much better in terms of JavaScript execution per frame. We’ll take a look at some numbers later, but let’s quickly recap Zones and then dive into the code and discuss how Jordi used Angular’s NgZone APIs to achieve this performance first. The idea of Zones Before we can use Zone APIs and specifically the ones from Angular’s NgZone, we need to get an understanding of what Zones actually are and how they are useful in the Angular world. We won’t go into too much detail here as we’ve already written two articles on this topic: - Understanding Zones - Discusses the concept of Zones in general and how they can be used to e.g. profile asynchronous code execution - Zones in Angular - Explores how the underlying Zone APIs are used in Angular to create a custom NgZone, which enables consumers and Angular itself to run code inside or outside Angular’s Zone If you haven’t read these articles yet, we definitely recommend you to do so as they give a very solid understanding of what Zones are and what they do. The bottom line is, however,. Once notified, Angular knows that it has to perform change detection because any of the asynchronous operations might have changed the application state. This, for instance, is always the case when we use Angular’s Http service to fetch data from a remote server. The following snippet shows how such a call can change application state: @Component(...) export class AppComponent { data: any; // initial application state constructor(private dataService: DataService) {} ngOnInit() { this.dataService.fetchDataFromRemoteService().subscribe(data => { this.data = data // application state has changed, change detection needs to run now }); } } The nice thing about this is that we as developers don’t have to care about notifying Angular to perform change detection, because Zones will do it for us as Angular subscribes to them under the hood. Okay, now that we touched on that, let’s take a look at how they can be used to make our demo app fast. Running outside Angular’s Zone We know that change detection is performed whenever an asynchronous event happened and an event handler was bound to that event. This is exactly the reason why our initial demo performs rather jankee. Let’s look at AppComponent’s template: @Component({ ... template: ` <svg (mousedown)="mouseDown($event)" (mouseup)="mouseUp($event)" (mousemove)="mouseMove($event)"> <svg:g box * </svg:g> </svg> ` }) class AppComponent { ... } Three (3) event handlers are bound to the outer SVG element. When any of these events fire and their handlers have been executed then change detection is performed. In fact, this means that Angular will run change detection, even when we just move the mouse over the boxes without actually dragging a single box! This is where taking advantage of NgZone APIs comes in handy. NgZone enables us to explicitly run certain code outside Angular’s Zone, preventing Angular to run any change detection. So basically, handlers will still be executed, but since they won’t run inside Angular’s Zone, Angular won’t get notified that a task is done and therefore no change detection will be performed. We only want to run change detection once we release the box we are dragging. Okay, how do we achieve this? In our article on Zones in Angular, we already discussed how to run code outside Angular’s Zone using NgZone.runOutsideAngular(). All we have to do is to make sure that the mouseMove() event handler is only attached and executed outside Angular’s zone. In addition to that, we know we want to attach that event handler only if a box is being selected for dragging. In other words, we need to change our mouseDown() event handler to imperatively add that event listener to the document. Here’s what that looks like: import { Component, NgZone } from '@angular/core'; @Component(...) export class AppComponent { ... element: HTMLElement; constructor(private zone: NgZone) {} mouseDown(event) { ... this.element = event.target; this.zone.runOutsideAngular(() => { window.document.addEventListener('mousemove', this.mouseMove.bind(this)); }); } mouseMove(event) { event.preventDefault(); this.element.setAttribute('x', event.clientX + this.clientX + 'px'); this.element.setAttribute('y', event.clientX + this.clientY + 'px'); } } We inject NgZone and call runOutsideAngular() inside our mouseDown() event handler, in which we attach an event handler for the mousemove event. This ensures that the mousemove event handler is really only attached to the document when a box is being selected. In addition, we save a reference to the underlying DOM element of the clicked box so we can update its x and y attributes in the mouseMove() method. We’re working with the DOM element instead of a box object with bindings for x and y, because bindings won’t be change detected since we’re running the code outside Angular’s Zone. In other words, we do update the DOM, so we can see the box is moving, but we aren’t actually updating the box model (yet). Also, notice that we removed the mouseMove() binding from our component’s template. We could remove the mouseUp() handler as well and attach it imperatively, just like we did with the mouseMove() handler. However, it won’t add any value performance-wise, so we decided to keep it in the template for simplicity’s sake: <svg (mousedown)="mouseDown($event)" (mouseup)="mouseUp($event)"> <svg:g box * </svg:g> </svg> In the next step, we want to make sure that, whenever we release a box ( mouseUp), we update the box model, plus, we want to perform change detection so that the model is in sync with the view again. The cool thing about NgZone is not only that it allows us to run code outside Angular’s Zone, it also comes with APIs to run code inside the Angular Zone, which ultimately will cause Angular to perform change detection again. All we have to do is to call NgZone.run() and give it the code that should be executed. Here’s the our updated mouseUp() event handler: @Component(...) export class AppComponent { ... mouseUp(event) { // Run this code inside Angular's Zone and perform change detection this.zone.run(() => { this.updateBox(this.currentId, event.clientX + this.offsetX, event.clientY + this.offsetY); this.currentId = null; }); window.document.removeEventListener('mousemove', this.mouseMove); } } Also notice that we’re removing the event listener for the mousemove event on every mouseUp. Otherwise, the event handler would still be executed on every mouse move. In other words, the box would keep moving even after the finger was lifted, essentially taking the drop part out of drag and drop. In addition to that, we would pile up event handlers, which could not only cause weird side effects but also blows up our runtime memory. Measuring the performance Alright, now that we know how Jordi implemented this version of our demo application, let’s take a look at some numbers! The following numbers have been recorded using the exact same techniques on the exact same machine as in our previous article on performance. - 1st Profile, Event (mousemove): ~0.45ms, ~0.50ms (fastest, slowest) - 2nd Profile, Event (mousemove): ~0.39ms, ~0.52ms (fastest, slowest) - 3rd Profile, Event (mousemove): ~0.38ms, ~0.45ms (fastest, slowest) Conclusion Using Zones is a great way to escape Angular’s change detection, without detaching change detectors and making the application code too complex. In fact, it turns out that Zones APIs are super easy to use, especially NgZone’s APIs to run code outside or inside Angular. Based on the numbers, we can even say that this version is about as fast as the fastest solution we came up with in our previous article. Considering that the developer experience is much better when using Zones APIs, since they are easier to use than manually detaching and re-attaching change detector references, it’s definitely the most “beautiful” performance improvement we have so far. However, we shouldn’t forget that this solution also comes with a couple (probably fixable) downsides. For example, we’re relying on DOM APIs and the global window object, which is something we should always try to avoid. If we wanted to use this code with on the server-side then direct access of the window variable would be problematic. We will discus these server-side specific issues in a future article. For the sake of this demo, this isn’t a big deal though. Again, a huge shout-out goes to Jordi Collell who not only made us adding this option, but also taking the time to actually implement a first version of this demo! Go fast with $applyAsync in Angular 1.3 Angular 1.3 comes with a feature to share a running $digest cycle across multiple XHR calls. This articles details how... Disabling Debug Info in Angular 1.3 This article details how to give your app a performance boost in production environments with just a single line of... Making your Angular apps fast In this article we discuss tips and tricks to make Angular blazingly fast!...
https://blog.thoughtram.io/angular/2017/02/21/using-zones-in-angular-for-better-performance.html
CC-MAIN-2019-35
refinedweb
1,803
51.99
Each Answer to this Q is separated by one/two green lines. If I have a python function like so: def some_func(arg1, arg2, arg3=1, arg4=2): Is there a way to determine which arguments were passed by keyword from inside the function? EDIT For those asking why I need this, I have no real reason, it came up in a conversation and curiosity got the better of me. No, there is no way to do it in Python code with this signature — if you need this information, you need to change the function’s signature. If you look at the Python C API, you’ll see that the actual way arguments are passed to a normal Python function is always as a tuple plus a dict — i.e., the way that’s a direct reflection of a signature of *args, **kwargs. That tuple and dict are then parsed into specific positional args and ones that are named in the signature even though they were passed by name, and the *a and **kw, if present, only take the “overflow” from that parsing, if any — only at this point does your Python code get control, and by then the information you’re requesting (how were the various args passed) is not around any more. To get the information you requested, therefore, change the signature to *a, **kw and do your own parsing/validation — this is going “from the egg to the omelette”, i.e. a certain amount of work but certainly feasible, while what you’re looking for would be going “from the omelette back to the egg”… simply not feasible;-). Here’s my solution via decorators: def showargs(function): def inner(*args, **kwargs): return function((args, kwargs), *args, **kwargs) return inner @showargs def some_func(info, arg1, arg2, arg3=1, arg4=2): print arg1,arg2,arg3,arg4 return info In [226]: some_func(1,2,3, arg4=4) 1 2 3 4 Out[226]: ((1, 2, 3), {'arg4': 4}) There may be a way to clean this up further, but this seems minimally intrusive to me and requires no change to the calling code. Edit: To actually test if particular args were passed by keyword, then do something like the following inside of some_func: args, kwargs = info if 'arg4' in kwargs: print "arg4 passed as keyword argument" Disclaimer: you should probably consider whether or not you really care how the arguments were passed. This whole approach may be unnecessary. Is there a way to determine which arguments were passed by keyword from inside the function? In trying to assess default values of keyword parameters, yes there are options: Code Option 1 – locals() def f(a, b=1, c="1"): print(locals()) f(0) # {'c': '1', 'b': 1, 'a': 0} Option 2 – Partial Type Hints* def g(a, b:int=1, c:str="1"): pass keys = g.__annotations__ values = g.__defaults__ dict(zip(keys, values)) # {'b': 1, 'c': '1'} Option 3 – Full Type Hints* def h(a:float, b:int=1, c:str="1") -> int: return 0 keys = reversed(list(filter(lambda x: x != "return", h.__annotations__))) values = reversed(h.__defaults__) {k: v for k, v in zip(keys, values) if k != "return"} # {'c': '1', 'b': 1} Note: None of these options are particularly Pythonic, but they demonstrate potential. Details locals()depends on the function call. The results should be default values, but they change with values passed into the call, e.g. f(0)vs. f(0 2, 3) - “Partial” type hints mean only keyword parameters are annotated. Adding any other annotations will not work with this naive approach. - “Full” or complete type hints may include other parameters. Since a "return"annotation is optional, we filter it from our keys. Furthermore, we iterate backwards to trim potential positional parameters with zip(). *These options depend on type hints and key insertion order preservation (Python 3.6+). They only give the default values and do not change with function call values. Type hints are optional right now in Python, and thus should be used with caution in production code. Suggestion I would only use the latter approaches to debug or quickly inspect a function’s signature. In fact, given keyword-only arguments (right of the *), one can use inspect.getargspec() to capture the kwonlydefaults dict. def i(a, *, b=1, c="1"): pass spec = inspect.getfullargspec(i) spec # FullArgSpec(args=['a'], varargs=None, varkw=None, # defaults=None, kwonlyargs=['b', 'c'], # kwonlydefaults={'b': 1, 'c': '1'}, annotations={}) spec.kwonlydefaults # {'b': 1, 'c': '1'} Otherwise, combine some of the mentioned techniques with the args and defaults attributes of FullArgSpec: def get_keywords(func): """Return a dict of (reversed) keyword arguments from a function.""" spec = inspect.getfullargspec(func) keys = reversed(spec.args) values = reversed(spec.defaults) return {k: v for k, v in zip(keys, values)} get_keywords(f) # {'c': '1', 'b': 1} where the FullArgSpec from the regular function f would show: spec = inspect.getfullargspec(f) spec # FullArgSpec(args=['a', 'b', 'c'], varargs=None, varkw=None, # defaults=(1, '1'), kwonlyargs=[], # kwonlydefaults=None, annotations={}) You’re pretty much going to have to redefine your function: def some_func(*args, **kwargs): and do the marshaling yourself. There’s no way to tell the difference between pass-by-position, pass-by-keyword, and default. Just do it like this: def some_func ( arg1, arg2, arg3=None, arg4=None ): if arg3 is None: arg3 = 1 # default value if arg4 is None: arg4 = 2 # default value # do something That way you can see when something was set, and you are also able to work with more complex default structures (like lists) without running into problems like these: >>> def test( arg=[] ): arg.append( 1 ) print( arg ) >>> test() [1] >>> test() [1, 1] do you want to know whether arg3 was 1 because it was passed from outside or because it was a default value? No there is no way to do this as far as I’m aware. The main reason, I suspect, that there is no need for such knowledge. What typically is done is the following: >>> def func(a, b=None): if b is None: # here we know that function was called as: # func('spam') or func('spam', None) or func('spam', b=None) or func(a="spam", b=None) b = 42 _kwargs decorator with inspect.signature hacks A variant of @awesomo’s solution which introduces a “private” _kwargs parameter and also works with default kwargs: import inspect def with_kwargs(func): sig = inspect.signature(func) def inner(*args, **kwargs): bound = sig.bind(*args, **kwargs) bound.apply_defaults() _kwargs = bound.arguments del _kwargs["_kwargs"] return func(*args, **kwargs, _kwargs=_kwargs) return inner Usage: @with_kwargs def some_func(a, b, c=3, d=None, _kwargs=None): print(_kwargs) >>> some_func(1, b=2, d=4) {'a': 1, 'b': 2, 'c': 3, 'd': 4}
https://techstalking.com/programming/python/get-kwargs-inside-function/
CC-MAIN-2022-40
refinedweb
1,124
59.84
The new EWS Managed API 2.0 is ready for prime time, and discovering how to use all the new Exchange Server 2013 features just got easier. The EWS Managed API developer reference content has been updated to include descriptions, summaries, return values, and applicability statements for all new members. In most cases, the updated member topics are for features that are new in Exchange 2013, but some existing members have been updated to reflect new functionality as well. For a list of new and updated types and member topics, see New EWS Managed API content. To find the EWS Managed API developer reference content, see EWS Managed API namespaces. The new and updated EWS Managed API reference content supports the following new Exchange 2013 features: - eDiscovery - Archiving - Retention policies - Mail apps for Outlook For more information about these features, see the article New features in the EWS Managed API. For information about the EWS Managed API 2.0, see the Exchange API-spotting post, EWS Managed API 2.0 – now released! For a great article that explains how to get conversation items from an Exchange mailbox by using the EWS Managed API, check out How to: Get conversation items by using the EWS Managed API. Don’t forget to check out our collection of code samples to help you develop Exchange 2013 applications by using EWS Managed API. Currently, 38 code samples are available; check back for more. For a list of the current code samples, see EWS Managed API code samples. whether there is the possibility to use this api on platform wp8? social.technet.microsoft.com/…/getting-erroritempropertyrequestfailed-error-while-creating-attachment-in-restore
https://blogs.msdn.microsoft.com/exchangedev/2012/12/06/new-ews-managed-api-2-0-reference-content-is-now-available/
CC-MAIN-2018-05
refinedweb
277
53.81
<dce/pgo.h>-Header file for the sec_rgy_pgo API #include <dce/pgo.h> Header file for the Registry API used to create and maintain PGO items in the Registry database. All of these routines have the prefix sec_rgy_pgo. Data Types and ConstantsThere are no particular data types or constants specific to the sec_rgy_pgo API (other than those that have already been introduced in this specification). Status CodesThe following status codes (listed in alphabetical order) are used in the sec_rgy_pgo API. - error_status_ok The call was successful. - sec_rgy_bad_domain An invalid domain was specified. - sec_rgy_no_more_entries The cursor is at the end of the list of entries. - sec_rgy_not_authorized The client is not authorized to add, delete, or modify the specified record. - sec_rgy_object_exists An object of that name already exists. - sec_rgy_object_not_found The Registry server could not find the specified name. - sec_rgy_server_unavailable The Registry server is unavailable. - sec_rgy_unix_id_changed The UNIX number of the item was changed.
http://pubs.opengroup.org/onlinepubs/9696989899/dce_pgo.h.htm
CC-MAIN-2014-41
refinedweb
150
51.65
[Solved] PySide new Mac OS install can't load QtCore.so The problem was that the various Qt<etc>.framework directories did not exist in /Library/Frameworks. I looked at a system where PyQt4 runs and saw that they were there. On this machine, although I ran the Qt installer, it did not place the necessary frameworks in /Library/Frameworks where apparently Python expects them. I used @sudo cp -pvR /Developer/SDKs/QtSDK/Desktop/Qt/473/gcc/lib/*.framework /Library/Frameworks@ to make copies, and immediately, PySide came up. I hope this benefits somebody although I have no idea why the Qt installer did not do this. ---- original question --- New installation of Qt and PySide on a MacPro desktop machine with Snow Leopard. PySide attempts to load QtCore.so (which does exist in the site-packages/PySide folder) but an error occurs: @>>> import PySide Traceback (most recent call last): File "<stdin>", line 1, in <module> File "/Library/Python/2.6/site-packages/PySide/init.py", line 2, in <module> import private File "/Library/Python/2.6/site-packages/PySide/private.py", line 2, in <module> from QtCore import __moduleShutdown ImportError: dlopen(/Library/Python/2.6/site-packages/PySide/QtCore.so, 2): Library not loaded: QtCore.framework/Versions/4/QtCore Referenced from: /Library/Python/2.6/site-packages/PySide/QtCore.so Reason: image not found@ I tried forcing python2.6 to run in 32-bit mode, but this only changed the message to read: @ImportError: dlopen(/Library/Python/2.6/site-packages/PySide/QtCore.so, 2): no suitable image found. Did find: /Library/Python/2.6/site-packages/PySide/QtCore.so: mach-o, but wrong architecture@ (I know I am not alone in this experience, as I found the identical issue posted at Quora.com!) Well, a day passes, 23 views, no suggestions. Just to make sure, I downloaded PySide and re-installed it, also re-installed Qt, and rebooted. Symptoms the same (see listing in original post). Several significant things here that I don't understand. The first error message is @ImportError: dlopen(/Library/Python/2.6/site-packages/PySide/QtCore.so, 2)@ The second message is @Library not loaded: QtCore.framework/Versions/4/QtCore@ Now the latter exists as part of the Qt SDK. Which I installed in /Developer/SDKs/QtSDK -- which is not the default install location. Where does python look for the Qt SDK? Do I need to set some kind of environment variable to help it? I have set a symbolic link ~/QtSDK to where I installed Qt, so it should look as if it was installed in the default location. Also I have exported DYLD_LIBRARY_PATH=/Developer/SDKs/QtSDK/Desktop/Qt/473/gcc/lib/ Neither step makes any difference, the message is the same as before.
https://forum.qt.io/topic/8814/solved-pyside-new-mac-os-install-can-t-load-qtcore-so
CC-MAIN-2018-43
refinedweb
460
51.65
This guide provides instructions on how to create a new end-to-end test using the Dart test library and SL4F. The guide creates an end-to-end test that prints “Hello world!” in the log of a Fuchsia device. Once you verify that you can build and run this test from your machine, use the resources provided in this guide as reference to further develop the test. To create a new end-to-end test, the steps are: - Create a new test. - Build the test. - Start the emulator. - Run the test. - Edit the test. - Update and run the test. Prerequisites This guide requires that you’re familiar with the following tasks: - Configure and build a Fuchsia image to include an end-to-end test. - Start the emulator (FEMU) with a Fuchsia image. - Run an end-to-end test. To learn about these tasks, see the Run an end-to-end test guide. Create a new test An end-to-end test needs to have the following directory structure and files: //src/tests/end_to_end/<your_test_directory> ├── test │ └── <test_source_code_files> ├── BUILD.gn ├── OWNERS ├── README.md ├── pubspec.yaml └── analysis_options.yaml The instructions in this section create the minimum directory structure and files necessary to build and run an end-to-end test. Do the following: Go to your Fuchsia directory, for example: cd ~/fuchsia Create a new branch, for example: git checkout -b create_my_first_e2e_test Go to the //src/tests/end_to_enddirectory: cd src/tests/end_to_end Create a new test directory called my_e2e_test_example, which has a testdirectory: mkdir -p my_e2e_test_example/test Go to the new test directory: cd my_e2e_test_example Use a text editor to create a new my_new_e2e_test.dartfile in the testdirectory, for example: vim test/my_new_e2e_test.dart Paste the following code: import 'package:sl4f/sl4f.dart' as sl4f; import 'package:test/test.dart'; void main() { sl4f.Sl4f sl4fDriver; setUp(() async { sl4fDriver = sl4f.Sl4f.fromEnvironment(); await sl4fDriver.startServer(); }); tearDown(() async { await sl4fDriver.stopServer(); sl4fDriver.close(); }); test('tests hello world', () async { await sl4f.DeviceLog(sl4fDriver).info('Hello world!'); print('Printed "Hello world!" in the device\'s log.'); }, timeout: Timeout(Duration(minutes: 1))); } The test()function in this code prints Hello world!in the device’s log, then the test outputs the Printed "Hello world!" in the device's log.message on the host machine’s screen. Save the file and exit the text editor. Use a text editor to create a new BUILD.gnfile, for example: vim ./BUILD.gn Paste the following code: import("//build/dart/test.gni") dart_test("my_new_e2e_test") { sources = [ "my_new_e2e_test.dart" ] deps = [ "//sdk/testing/sl4f/client", "//third_party/dart-pkg/pub/test", ] } group("test") { testonly = true deps = [ ":my_new_e2e_test($host_toolchain)" ] } This BUILD.gnfile defines the testtarget group to include my_new_e2e_test. Save the file and exit the text editor. Copy an existing analysis_options.yamlfile to your test directory, for example: cp ../sl4f/analysis_options.yaml . The Dart compiler uses this file to identify compile warnings. Create empty pubspec.yaml, OWNERS, and README.mdfiles: touch pubspec.yaml OWNERS README.md Some text editors use the pubspec.yamlfile to recognize that this test is a Dart package. Provide the content of OWNERSand README.mdfiles later when you contribue the test to the Fuchsia project. Build the test Before you can run an end-to-end test, you first need to configure and build a Fuchsia image to include the test in the build artifacts: Configure your Fuchsia image to include the my_e2e_test_exampletest directory and the testtarget group: fx set terminal.x64 --with //src/tests/end_to_end/my_e2e_test_example:test //src/tests/end_to_end/my_e2e_test_exampleis the path to your new test directory. The testtarget group, as defined in the BUILD.gnfile, includes my_new_e2e_test. Build your Fuchsia image: fx build When the fx buildcommand completes, your build artifacts now include the my_new_e2e_testend-to-end test, which you can run from your host machine. Start the emulator Start the emulator to run your Fuchsia image: Configure an IPv6 network for the emulator (you only need to do this once): sudo ip tuntap add dev qemu mode tap user $USER && sudo ifconfig qemu up In a new terminal, start the emulator: fx emu -N Run the fx set-devicecommand and select step-atom-yard-juicy(the emulator’s default device name) to be your device, for example: $ fx set-device ERROR: Multiple devices found, please pick one from the list: 1) rabid-snort-wired-tutu 2) step-atom-yard-juicy #? 2 New default device: step-atom-yard-juicy In another terminal, start a package server: fx serve Run the test In a new terminal, run the my_new_e2e_test end-to-end test: fx run-e2e-tests my_new_e2e_test This test prints the following output: ... << running host_x64/my_new_e2e_test >> 00:00 +0: my_new_e2e_test tests hello world Printed "Hello world!" in the device's log. 00:02 +1: All tests passed! 1 of 1 test passed To scan the device’s log for the Hello world! string, run the fx log command with the following options: fx log --dump_logs yes --only Hello,world! This command only prints the lines that contain Hello or world! from the device’s log, for example: [00770.760238][105502][105667][sl4f, parse_request] INFO: request id: String(""), name: "logging_facade.LogInfo", args: Object({"message": String("Hello world!")}) [00770.760356][105502][105504][sl4f, run_fidl_loop] INFO: Received synchronous request: Sender, MethodId { facade: "logging_facade", method: "LogInfo" }, Object({"message": String("Hello world!")}) [00770.760432][105502][105504][sl4f] INFO: "\"Hello world!\"" Edit the test Edit the my_new_e2e_test.dart file to implement your test case. Use the following resources for writing new tests: - The developer guide for writing Dart tests. - The source code of existing end-to-end tests, for example: - The source code of the sl4fend-to-end test, which tests various facades in SL4F. See these tests to understand how you may want to invoke some facades for testing certain features of a Fuchsia product, for example: - Audio facade test - Insert and capture audio on the device. - DeviceLog facade test - Read and write log messages on the device. - Performance facade test - Enable collecting performance traces from the device, for instance, CPU usage, Flutter frame rate, and kernel counters. - SetUI facade test - Configure the device’s settings, for instance, a network interface setting. - File facade test - Read and write files on the device’s storage. Update and run the test After editing the test’s source code, use the fx run-e2e-tests command to run the updated version of the test, for example: fx run-e2e-tests my_new_e2e_test When this command detects any changes in the test’s source code, the command automatically rebuilds the test prior to running the test.
https://fuchsia.dev/fuchsia-src/development/testing/create_a_new_end_to_end_test
CC-MAIN-2020-24
refinedweb
1,087
59.5
Here are some frequently asked interview questions for freshers as well as experienced C# developers candidates to get the right job. 1. What is C#? C# is an object-oriented, type-safe, and managed language that is compiled by .Net framework to generate Microsoft Intermediate Language. 2. Explain types of comment in C# with examples Single line Example: //This is a single line comment ii. Multiple line (/* */) Example: / process it and then automatically dispose of when the execution of the block completed. 10. What is serialization? When we want to transport an object through a network, then we have to convert the object into a stream of bytes. The process of converting an object into a stream of bytes is called Serialization. For an object to be serializable, it should implement ISerialize Interface. De-serialization is the reverse process of creating an object from a stream of bytes. 11. Can we use "this" command within a static method? We can't use 'This' in a static method because we can only use static variables/methods in a static method. 12. What is the difference between constants and read-only? Constant variables are declared and initialized at compile time. The value can't be changed afterward. Read-only is used only when we want to assign the value at run time. 13. What is an interface class? Give one example of it An Interface is an abstract class which has only public abstract methods, and the methods only have the declaration and not the definition. These abstract methods must be implemented in the inherited classes. using System; using System.Collections.Generic; using System.Linq; using System.Text; using System.Threading.Tasks; namespace DemoApplication { interface Guru99Interface { void SetTutorial(int pID, string pName); String GetTutorial(); } class Guru99Tutorial : Guru99Interface { by Guru99"); Console.WriteLine(pTutor.GetTutorial()); Console.ReadKey(); } } } 14. What are value types and reference types? A value type holds a data value within its own memory space. Example int a = 30; Reference type stores the address of the Object where the value is being stored. It is a pointer to another memory location. string b = "Hello Guru99!!"; 15. What are Custom Control and User Control? Custom Controls are controls generated as compiled code (Dlls), those are easier to use and can be added to toolbox. Developers can drag and drop controls to their web forms. Attributes can, at design time. We can easily add custom controls to Multiple Applications (If Shared Dlls). So, If they are private, then we can copy to dll to bin directory of web application and then add reference and can use them. User Controls are very much similar to ASP include files, and are easy to create. User controls can't be placed in the toolbox and dragged - dropped from it. They have their design and code-behind. The file extension for user controls is ascx. 16. What are sealed classes in C#? We create sealed classes when we want to restrict the class to be inherited. Sealed modifier used to prevent derivation from a class. If we forcefully specify a sealed class as base class, then a compile-time error occurs. 17. What is method overloading? Method overloading is creating multiple methods with the same name with unique signatures in the same class. When we compile, the compiler uses overload resolution to determine the specific method to be invoke. 18. What is the difference between Array and Arraylist? In an array, we can have items of the same type only. The size of the array is fixed when compared. To an arraylist is similar to an array, but it doesn't have a fixed size. 19. Can a private virtual method can be overridden? No, because they are not accessible outside the class. 20. Describe the accessibility modifier "protected internal". Protected Internal variables/methods are accessible within the same assembly and also from the classes that are derived from this parent class. 21. What are the differences between System.String and System.Text.StringBuilder classes? System.String is immutable. When we modify the value of a string variable, then a new memory is allocated to the new value and the previous memory allocation released. System.StringBuilder was designed to have a concept of a mutable string where a variety of operations can be performed without allocation separate memory location for the modified string. 22. What's the difference between the System.Array.CopyTo() and System.Array.Clone() ? Using Clone() method, we creates a new array object containing all the elements in the original Array and using CopyTo() method. All the elements of existing array copies into another existing array. Both methods perform a shallow copy. 23. How can we sort the elements of the Array in descending order? Using Sort() methods followed by Reverse() method. 24. Write down the C# syntax to catch an exception To catch an exception, we use try-catch blocks. Catch block can have a parameter of system.Exception type. Eg: try { GetAllData(); } catch (Exception ex) { } In the above example, we can omit the parameter from catch statement. 25. What's the difference between an interface and abstract class? Interfaces have all the methods having only declaration but no definition. In an abstract class, we can have some concrete methods. In an interface class, all the methods are public. An abstract class may have private methods.. 27. What are circular references? Circular reference is situation in which two or more resources are interdependent on each other causes the lock condition and make the resources unusable. 28. What. 29. What is an object pool in .NET? An object pool is a container having objects ready to be used. It tracks the object that is currently in use, total number of objects in the pool. This reduces the overhead of creating and re-creating objects. 30. List down. 31. What are Custom Exceptions? Sometimes there are some errors that need to be handled as per user requirements. Custom exceptions are used for them and are used defined exceptions. 32. What are delegates? Delegates are same are function pointers in C++, but the only difference is that they are type safe, unlike function pointers. Delegates are required because they can be used to write much more generic type-safe functions. 33. How do you inherit a class into other class in C#? Colon is used as inheritance operator in C#. Just place a colon and then the class name. public class DerivedClass : BaseClass 34. What is the base class in .net from which all the classes are derived from? System.Object 35. What is the difference between method overriding and method overloading? In method overriding, we change the method definition in the derived class that changes the method behavior. Method overloading is creating a method with the same name within the same class having different signatures. 36. What are the different ways a method can be overloaded? Methods can be overloaded using different data types for a parameter, different order of parameters, and different number of parameters. 37. Why can't you specify the accessibility modifier for methods inside the interface? In an interface, we have virtual methods that do not have method definition. All the methods are there to be overridden in the derived class. That's why they all are public. 38. How can we set the class to be inherited, but prevent the method from being over-ridden? Declare the class as public and make the method sealed to prevent it from being overridden. 39. What happens if the inherited interfaces have conflicting method names? Implement is up to you as the method is inside your own class. There might be a problem when the methods from different interfaces expect different data, but as far as compiler cares you're okay. 40. What is the difference between a Struct and a Class? Structs are value-type variables, and classes are reference types. Structs stored on the Stack causes additional overhead but faster retrieval. Structs cannot be inherited. 41. How to use nullable types in .Net? Value types can take either their normal values or a null value. Such types are called nullable types. Int? someID = null; If(someID.HasVAlue) { } 42. How we can create an array with non-default values? We can create an array with non-default values using Enumerable.Repeat. 43. What is difference between "is" and "as" operators in c#? "is" operator is used to check the compatibility of an object with a given type, and it returns the result as Boolean. "as" operator is used for casting of an object to a type or a class. 44. What's a multicast delegate? A delegate having multiple handlers assigned to it is called multicast delegate. Each handler is assigned to a method. 45. What are indexers in C# .NET? Indexers are known as smart arrays in C#. It allows the instances of a class to be indexed in the same way as an array. Eg: public int this[int index] // Indexer declaration 46. What is difference between the "throw" and "throw ex" in .NET? "Throw" statement preserves original error stack whereas "throw ex" have the stack trace from their throw point. It is always advised to use "throw" because it provides more accurate error information. 47. What are C# attributes and its significance? C# provides developers a way to define declarative tags on certain entities, eg. Class, method, etc. are called attributes. The attribute's information can be retrieved at runtime using Reflection. 48. How to implement a singleton design pattern in C#? In a singleton pattern, a class can only have one instance and provides an access point to it globally. Eg: Public sealed class Singleton { Private static readonly Singleton _instance = new Singleton(); } 49. What is the difference between directcast and ctype? DirectCast is used to convert the type of object that requires the run-time type to be the same as the specified type in DirectCast. Ctype is used for conversion where the conversion is defined between the expression and the type. 50. Is C# code is managed or unmanaged code? C# is managed code because Common language runtime can compile C# code to Intermediate language. 51. What is Console application? A console application is an application that can be run in the command prompt in Windows. For any beginner on .Net, building a console application is ideally the first step, to begin with. 52. Give an example of removing an element from the queue The dequeue method is used to remove an element from the queue. using System; using System.Collections; using System.Collections.Generic; using System.Linq; using System.Text; using System.Threading.Tasks; namespace DemoApplication { class Program { static void Main(string[] args) { Queue qt = new Queue(); qt.Enqueue(1); qt.Enqueue(2); qt.Enqueue(3); foreach (Object obj in qt) { Console.WriteLine(obj); } Console.WriteLine(); Console.WriteLine(); Console.WriteLine("The number of elements in the Queue " + qt.Count); Console.WriteLine("Does the Queue contain " + qt.Contains(3)); Console.ReadKey(); } } }
http://www.test3.guru99.com/c-sharp-interview-questions.html
CC-MAIN-2020-10
refinedweb
1,833
60.11
The Federal Trade Commission challenged the merger The Supreme Court legalized gay marriage in the U.S. Join the NASDAQ Community today and get free, instant access to portfolios, stock ratings, real-time alerts, and more! With its regular August hiatus approaching, the US IPO market began stumbling last week. Only two deals , Eloqua ( ELOQ ) and Globus Medical ( GMED ), priced while an equal number withdrew. In the shadow of the busiest week since March (7 IPOs priced during the week of July 23), half of last week's expected deals, including online legal service LegalZoom.com ( LGZ ), were delayed or postponed. Newly formed real estate company Aina Le'a ( AINA ) ended a two-week filings drought, but with only 10 for the month, it was the slowest July for filings since 2003. Although confidential filings under the JOBS Act have played a role, we do not think they fully explain the slowdown and we speculate that activity has decreased. Valuation pressure strikes Recent deals have faced considerable valuation pressure, and over a third have priced below the range in the past month. Although Eloqua, an on-demand marketing software company with healthy 25% growth, priced at the high-end of its range on Tuesday, it was valued at a discount to its SaaS peer group. On-demand supply chain software company E2open ( EOPN ), which priced the week before and fell 9% on day one, had been priced in line with its SaaS peers despite uneven historical growth. Prior to E2open, all five of the year's on-demand companies had priced above the range, many at premium multiples. LegalZoom.com, which, like Eloqua, offers 20%+ growth and expects to expand margins, was being pitched at a premium to many other online subscription services. The postponement may have reflected management's unwillingness to accept a similar discount. Spine implant provider Globus Medical, which priced on Friday after slashing its valuation by over 30%, rose 13% on its first day. Eloqua gained 12% on its first day and rose another 16% on Friday to finish the week up 30%. Paying for growth While the recent pricings may indicate increased price sensitivity from IPO buyers, not all companies have needed to yield ground on valuation. The past month's top two performers, Five Below (FIVE) and Palo Alto Networks (PANW), both priced at premium multiples and above upwardly revised ranges. The keys for both were unique concepts and extremely fast growth, over 50% for Five Below and more than 100% for Palo Alto. At the end of last week, Five Below and Palo Alto were up 75% and 30%, respectively. The strong investor appetite for growth was also reflected in the July 19th withdrawal of guitar maker Fender Musical Instruments (FNDR), whose famous brand name failed to overcome tepid growth prospects. The 16% total return for IPOs in the past month is well above the S&P 500 return (0.1%) over the same period and exceeds the 12% year-to-date average. While most of the performance was captured on day 1, the 2% average aftermarket return represents a strong bounce back from negative returns year-to-date. More than 75% of the deals, versus 63% year-to-date, are trading above their offer prices. Five new deals coming next week Five companies will try to achieve similar results next week. Restaurant companies Bloomin' Brands (BLMN) and CKE (CK), both of which are returning to the public markets after being LBO'd by large private equity firms (Bain and Apollo, respectively), will seek a total of $500 million dollars in proceeds. Performant Financial (PFMT), a debt collection agency, is hoping to raise $150 million, and wireless-focused Peregrine Semiconductor (PSMI) will be the first attempted chip deal since Audience (ADNC) in May 2012. Finally, Manchester United (MANU), a storied English soccer club, will look to capitalize on its 659 million worldwide supporters in a $300 million deal. If it prices at the midpoint, its $3 billion market cap would make it the 7th largest IPO of 2012. If all deals price, the US market will have seen 91 IPOs so far in 2012, just shy of last year's total before the IPO market experienced a long, 2-month dry?
http://www.nasdaq.com/article/us-ipo-market-stumbles-before-august-hiatus-cm161684
CC-MAIN-2015-27
refinedweb
708
57.61
DBI::DBD - Perl DBI Database Driver Writer's Guide perldoc DBI::DBD This document is still a minimal draft which is in need of further work. The changes will occur both because the DBI specification is changing and hence the requirements on DBD drivers change, and because feedback from people reading this document will suggest improvements to it. Please read the DBI documentation first and fully, including the DBI FAQ. Then reread the DBI specification again as you're reading this. It'll help. This document is a patchwork of contributions from various authors. More contributions (preferably as patches) are very welcome. This document is primarily intended to help people writing new database drivers for the Perl Database Interface (Perl DBI). It may also help others interested in discovering why the internals of a DBD driver are written the way they are. This is a guide. Few (if any) of the statements in it are completely authoritative under all possible circumstances. This means you will need to use judgement in applying the guidelines in this document. If in any doubt at all, please do contact the dbi-dev mailing list (details given below) where Tim Bunce and other driver authors can help. The first rule for creating a new database driver for the Perl DBI is very simple: DON'T! There is usually a driver already available for the database you want to use, almost regardless of which database you choose. Very often, the database will provide an ODBC driver interface, so you can often use DBD::ODBC to access the database. This is typically less convenient on a Unix box than on a Microsoft Windows box, but there are numerous options for ODBC driver managers on Unix too, and very often the ODBC driver is provided by the database supplier. Before deciding that you need to write a driver, do your homework to ensure that you are not wasting your energies. [As of December 2002, the consensus is that if you need an ODBC driver manager on Unix, then the unixODBC driver (available from) is the way to go.] The second rule for creating a new database driver for the Perl DBI is also very simple: Don't -- get someone else to do it for you! Nevertheless, there are occasions when it is necessary to write a new driver, often to use a proprietary language or API to access the database more swiftly, or more comprehensively, than an ODBC driver can. Then you should read this document very carefully, but with a suitably sceptical eye. If there is something in here that does not make any sense, question it. You might be right that the information is bogus, but don't come to that conclusion too quickly. The primary web-site for locating DBI software and information is There are two main and one auxiliary mailing lists for people working with DBI. The primary lists are dbi-users@perl.org for general users of DBI and DBD drivers, and dbi-dev@perl.org mainly for DBD driver writers (don't join the dbi-dev list unless you have a good reason). The auxiliary list is dbi-announce@perl.org for announcing new releases of DBI or DBD drivers. You can join these lists by accessing the web-site. The lists are closed so you cannot send email to any of the lists unless you join the list first. You should also consider monitoring the comp.lang.perl.* newsgroups, especially comp.lang.perl.modules. The definitive book on Perl DBI is the Cheetah book, so called because of the picture on the cover. Its proper title is 'Programming the Perl DBI: Database programming with Perl' by Alligator Descartes and Tim Bunce, published by O'Reilly Associates, February 2000, ISBN 1-56592-699-4. Buy it now if you have not already done so, and read it. Before writing a new driver, it is in your interests to find out whether there already is a driver for your database. If there is such a driver, it would be much easier to make use of it than to write your own! The primary web-site for locating Perl software is. You should look under the various modules listings for the software you are after. For example: Follow the DBD:: and DBIx:: links at the top to see those subsets. See the DBI docs for information on DBI web sites and mailing lists. Before going through any official registration process, you will need to establish that there is no driver already in the works. You'll do that by asking the DBI mailing lists whether there is such a driver available, or whether anybody is working on one. When you get the go ahead, you will need to establish the name of the driver and a prefix for the driver. Typically, the name is based on the name of the database software it uses, and the prefix is a contraction of that. Hence, DBD::Oracle has the name Oracle and the prefix 'ora_'. The prefix must be lowercase and contain no underscores other than the one at the end. This information will be recorded in the DBI module. Apart from documentation purposes, registration is a prerequisite for installing private methods. If you are writing a driver which will not be distributed on CPAN, then you should choose a prefix beginning with 'x_', to avoid potential prefix collisions with drivers registered in the future. Thus, if you wrote a non-CPAN distributed driver called DBD::CustomDB, the prefix might be 'x_cdb_'. This document assumes you are writing a driver called DBD::Driver, and that the prefix 'drv_' is assigned to the driver. There are two distinct styles of database driver that can be written to work with the Perl DBI. Your driver can be written in pure Perl, requiring no C compiler. When feasible, this is the best solution, but most databases are not written in such a way that this can be done. Some examples of pure Perl drivers are DBD::File and DBD::CSV. Alternatively, and most commonly, your driver will need to use some C code to gain access to the database. This will be classified as a C/XS driver. There are a number of files that need to be written for either a pure Perl driver or a C/XS driver. There are no extra files needed only by a pure Perl driver, but there are several extra files needed only by a C/XS driver. Assuming that your driver is called DBD::Driver, these files are: The first four files are mandatory. Makefile.PL is used to control how the driver is built and installed. The README file tells people who download the file about how to build the module and any prerequisite software that must be installed. The MANIFEST file is used by the standard Perl module distribution mechanism. It lists all the source files that need to be distributed with your module. Driver.pm is what is loaded by the DBI code; it contains the methods peculiar to your driver. Although the META.yml file is not required you are advised to create one. Of particular importance are the build_requires and configure_requires attributes which newer CPAN modules understand. You use these to tell the CPAN module (and CPANPLUS) that your build and configure mechanisms require DBI. The best reference for META.yml (at the time of writing) is. You can find a reasonable example of a META.yml in DBD::ODBC. The lib/Bundle/DBD/Driver.pm file allows you to specify other Perl modules on which yours depends in a format that allows someone to type a simple command and ensure that all the pre-requisites are in place as well as building your driver. The lib/DBD/Driver/Summary.pm file contains (an updated version of) the information that was included - or that would have been included - in the appendices of the Cheetah book as a summary of the abilities of your driver and the associated database. The files in the t subdirectory are unit tests for your driver. You should write your tests as stringently as possible, while taking into account the diversity of installations that you can encounter: Many drivers also install sub-modules DBD::Driver::SubModule for any of a variety of different reasons, such as to support the metadata methods (see the discussion of "METADATA METHODS" below). Such sub-modules are conventionally stored in the directory lib/DBD/Driver. The module itself would usually be in a file SubModule.pm. All such sub-modules should themselves be version stamped (see the discussions far below). The software for a C/XS driver will typically contain at least four extra files that are not relevant to a pure Perl driver. The Driver.xs file is used to generate C code that Perl can call to gain access to the C functions you write that will, in turn, call down onto your database software. The Driver.h header is a stylized header that ensures you can access the necessary Perl and DBI macros, types, and function declarations. The dbdimp.h is used to specify which functions have been implemented by your driver. The dbdimp.c file is where you write the C code that does the real work of translating between Perl-ish data types and what the database expects to use and return. There are some (mainly small, but very important) differences between the contents of Makefile.PL and Driver.pm for pure Perl and C/XS drivers, so those files are described both in the section on creating a pure Perl driver and in the section on creating a C/XS driver. Obviously, you can add extra source code files to the list. To be remotely useful, your driver must be implemented in a format that allows it to be distributed via CPAN, the Comprehensive Perl Archive Network ( and). Of course, it is easier if you do not have to meet this criterion, but you will not be able to ask for much help if you do not do so, and no-one is likely to want to install your module if they have to learn a new installation mechanism. Writing a pure Perl driver is surprisingly simple. However, there are some problems you should be aware of. The best option is of course picking up an existing driver and carefully modifying one method after the other. Also look carefully at DBD::AnyData and DBD::Template. As an example we take a look at the DBD::File driver, a driver for accessing plain files as tables, which is part of the DBD::CSV package. The minimal set of files we have to implement are Makefile.PL, README, MANIFEST and Driver.pm. You typically start with writing Makefile.PL, a Makefile generator. The contents of this file are described in detail in the ExtUtils::MakeMaker man pages. It is definitely a good idea if you start reading them. At least you should know about the variables CONFIGURE, DEFINED, PM, DIR, EXE_FILES, INC, LIBS, LINKTYPE, NAME, OPTIMIZE, PL_FILES, VERSION, VERSION_FROM, clean, depend, realclean from the ExtUtils::MakeMaker man page: these are used in almost any Makefile.PL. Additionally read the section on Overriding MakeMaker Methods and the descriptions of the distcheck, disttest and dist targets: They will definitely be useful for you. Of special importance for DBI drivers is the postamble method from the ExtUtils::MM_Unix man page. For Emacs users, I recommend the libscan method, which removes Emacs backup files (file names which end with a tilde '~') from lists of files. Now an example, I use the word Driver wherever you should insert your driver's name: # -*- perl -*- use ExtUtils::MakeMaker; WriteMakefile( dbd_edit_mm_attribs( { 'NAME' => 'DBD::Driver', 'VERSION_FROM' => 'Driver.pm', 'INC' => '', 'dist' => { 'SUFFIX' => '.gz', 'COMPRESS' => 'gzip -9f' }, 'realclean' => { FILES => '*.xsi' }, 'PREREQ_PM' => '1.03', 'CONFIGURE' => sub { eval {require DBI::DBD;}; if ($@) { warn $@; exit 0; } my $dbi_arch_dir = dbd_dbi_arch_dir(); if (exists($opts{INC})) { return {INC => "$opts{INC} -I$dbi_arch_dir"}; } else { return {INC => "-I$dbi_arch_dir"}; } } }, { create_pp_tests => 1}) ); package MY; sub postamble { return main::dbd_postamble(@_); } sub libscan { my ($self, $path) = @_; ($path =~ m/\~$/) ? undef : $path; } Note the calls to dbd_edit_mm_attribs() and dbd_postamble(). The second hash reference in the call to dbd_edit_mm_attribs() (containing create_pp_tests()) is optional; you should not use it unless your driver is a pure Perl driver (that is, it does not use C and XS code). Therefore, the call to dbd_edit_mm_attribs() is not relevant for C/XS drivers and may be omitted; simply use the (single) hash reference containing NAME etc as the only argument to WriteMakefile(). Note that the dbd_edit_mm_attribs() code will fail if you do not have a t sub-directory containing at least one test case. PREREQ_PM tells MakeMaker that DBI (version 1.03 in this case) is required for this module. This will issue a warning that DBI 1.03 is missing if someone attempts to install your DBD without DBI 1.03. See CONFIGURE below for why this does not work reliably in stopping cpan testers failing your module if DBI is not installed. CONFIGURE is a subroutine called by MakeMaker during WriteMakefile. By putting the require DBI::DBD in this section we can attempt to load DBI::DBD but if it is missing we exit with success. As we exit successfully without creating a Makefile when DBI::DBD is missing cpan testers will not report a failure. This may seem at odds with PREREQ_PM but PREREQ_PM does not cause WriteMakefile to fail (unless you also specify PREREQ_FATAL which is strongly discouraged by MakeMaker) so WriteMakefile would continue to call dbd_dbi_arch_dir and fail. All drivers must use dbd_postamble() or risk running into problems. Note the specification of VERSION_FROM; the named file (Driver.pm) will be scanned for the first line that looks like an assignment to $VERSION, and the subsequent text will be used to determine the version number. Note the commentary in ExtUtils::MakeMaker on the subject of correctly formatted version numbers. If your driver depends upon external software (it usually will), you will need to add code to ensure that your environment is workable before the call to WriteMakefile(). If you need to check for the existence of an external library and perhaps modify INC to include the paths to where the external library header files are located and you cannot find the library or header files make sure you output a message saying they cannot be found but exit 0 (success) before calling WriteMakefile or CPAN testers will fail your module if the external library is not found. A full-fledged Makefile.PL can be quite large (for example, the files for DBD::Oracle and DBD::Informix are both over 1000 lines long, and the Informix one uses - and creates - auxiliary modules too). See also ExtUtils::MakeMaker and ExtUtils::MM_Unix. Consider using CPAN::MakeMaker in place of ExtUtils::MakeMaker. The README file should describe what the driver is for, the pre-requisites for the build process, the actual build process, how to report errors, and who to report them to. Users will find ways of breaking the driver build and test process which you would never even have dreamed to be possible in your worst nightmares. Therefore, you need to write this document defensively, precisely and concisely. As always, use the README from one of the established drivers as a basis for your own; the version in DBD::Informix is worth a look as it has been quite successful in heading off problems. The MANIFEST will be used by the Makefile's dist target to build the distribution tar file that is uploaded to CPAN. It should list every file that you want to include in your distribution, one per line. The CPAN module provides an extremely powerful bundle mechanism that allows you to specify pre-requisites for your driver. The primary pre-requisite is Bundle::DBI; you may want or need to add some more. With the bundle set up correctly, the user can type: perl -MCPAN -e 'install Bundle::DBD::Driver' and Perl will download, compile, test and install all the Perl modules needed to build your driver. The prerequisite modules are listed in the CONTENTS section, with the official name of the module followed by a dash and an informal name or description. A suitable skeleton for this file is shown below. package Bundle::DBD::Driver; $ =head1 CONTENTS Bundle::DBI - Bundle for DBI by TIMB (Tim Bunce) DBD::Driver - DBD::Driver by YOU (Your Name) =head1 DESCRIPTION This bundle includes all the modules used by the Perl Database Interface (DBI) driver for Driver (DBD::Driver), by running: C<perl -MCPAN -e 'install Bundle::CPAN'> =head1 SEE ALSO Bundle::DBI =head1 AUTHOR Your Name E<lt>F<you@yourdomain.com>E<gt> =head1 THANKS This bundle was created by ripping off Bundle::libnet created by Graham Barr E<lt>F<gbarr@ti.com>E<gt>, and radically simplified with some information from Jochen Wiedmann E<lt>F<joe@ispsoft.de>E<gt>. The template was then included in the DBI::DBD documentation by Jonathan Leffler E<lt>F<jleffler@informix.com>E<gt>. =cut There is no substitute for taking the summary file from a driver that was documented in the Perl book (such as DBD::Oracle or DBD::Informix or DBD::ODBC, to name but three), and adapting it to describe the facilities available via DBD::Driver when accessing the Driver database. The Driver.pm file defines the Perl module DBD::Driver for your driver. It will define a package DBD::Driver along with some version information, some variable definitions, and a function driver() which will have a more or less standard structure. It will also define three sub-packages of DBD::Driver: with methods connect(), data_sources() and disconnect_all(); with methods such as prepare(); with methods such as execute() and fetch(). The Driver.pm file will also contain the documentation specific to DBD::Driver in the format used by perldoc. In a pure Perl driver, the Driver.pm file is the core of the implementation. You will need to provide all the key methods needed by DBI. Now let's take a closer look at an excerpt of File.pm as an example. We ignore things that are common to any module (even non-DBI modules) or really specific to the DBD::File package. package DBD::File; use strict; use vars qw($VERSION $drh); $VERSION = "1.23.00" # Version number of DBD::File This is where the version number of your driver is specified, and is where Makefile.PL looks for this information. Please ensure that any other modules added with your driver are also version stamped so that CPAN does not get confused. It is recommended that you use a two-part (1.23) or three-part (1.23.45) version number. Also consider the CPAN system, which gets confused and considers version 1.10 to precede version 1.9, so that using a raw CVS, RCS or SCCS version number is probably not appropriate (despite being very common). For Subversion you could use: $VERSION = "12.012346"; (use lots of leading zeros on the second portion so if you move the code to a shared repository like svn.perl.org the much larger revision numbers won't cause a problem, at least not for a few years). For RCS or CVS you can use: $VERSION = "11.22"; which pads out the fractional part with leading zeros so all is well (so long as you don't go past x.99) $drh = undef; # holds driver handle once initialized This is where the driver handle will be stored, once created. Note that you may assume there is only one handle for your driver. The driver() method is the driver handle constructor. Note that the driver() method is in the DBD::Driver package, not in one of the sub-packages DBD::Driver::dr, DBD::Driver::db, or DBD::Driver::db. sub driver { return $drh if $drh; # already created - return same one my ($class, $attr) = @_; $class .= "::dr"; DBD::Driver::db->install_method('drv_example_dbh_method'); DBD::Driver::st->install_method('drv_example_sth_method'); # not a 'my' since we use it above to prevent multiple drivers $drh = DBI::_new_drh($class, { 'Name' => 'File', 'Version' => $VERSION, 'Attribution' => 'DBD::File by Jochen Wiedmann', }) or return undef; return $drh; } This is a reasonable example of how DBI implements its handles. There are three kinds: driver handles (typically stored in $drh; from now on called drh or $drh), database handles (from now on called dbh or $dbh) and statement handles (from now on called sth or $sth). The prototype of DBI::_new_drh() is $drh = DBI::_new_drh($class, $public_attrs, $private_attrs); with the following arguments: is typically the class for your driver, (for example, "DBD::File::dr"), passed as the first argument to the driver() method. is a hash ref to attributes like Name, Version, and Attribution. These are processed and used by DBI. You had better not make any assumptions about them nor should you add private attributes here. This is another (optional) hash ref with your private attributes. DBI will store them and otherwise leave them alone. The DBI::_new_drh() method and the driver() method both return undef for failure (in which case you must look at $DBI::err and $DBI::errstr for the failure information, because you have no driver handle to use). \%attr attributes can be used to provide fine control over how the DBI dispatcher handles the dispatching of the method. However it's undocumented at the moment. See the IMA_* #define's in DBI.xs and the O=>0x000x values in the initialization of %DBI::DBI_methods in DBI.pm. (). Also needed here, in the DBD::Driver package, is a CLONE() method that will be called by perl when an interpreter is cloned. All your CLONE() method needs to do, currently, is clear the cached $drh so the new interpreter won't start using the cached $drh from the old interpreter: sub CLONE { undef $drh; } See for details. The next lines of code look as follows: package DBD::Driver::dr; # ====== DRIVER ====== $DBD::Driver::dr::imp_data_size = 0; Note that no @ISA is needed here, or for the other DBD::Driver::* classes, because the DBI takes care of that for you when the driver is loaded. *FIX ME* Explain what the imp_data_size is, so that implementors aren't practicing cargo-cult programming. The database handle constructor is the driver's (hence the changed namespace) connect() method: sub connect { my ($drh, $dr_dsn, $user, $auth, $attr) = @_; # Some database specific verifications, default settings # and the like can go here. This should only include # syntax checks or similar stuff where it's legal to # 'die' in case of errors. # For example, many database packages requires specific # environment variables to be set; this could be where you # validate that they are set, or default them if they are not set. my $driver_prefix = "drv_"; # the assigned prefix for this driver # Process attributes from the DSN; we assume ODBC syntax # here, that is, the DSN looks like var1=val1;...;varN=valN foreach my $var ( split /;/, $dr_dsn ) { my ($attr_name, $attr_value) = split '=', $var, 2; return $drh->set_err($DBI::stderr, "Can't parse DSN part '$var'") unless defined $attr_value; # add driver prefix to attribute name if it doesn't have it already $attr_name = $driver_prefix.$attr_name unless $attr_name =~ /^$driver_prefix/o; # Store attribute into %$attr, replacing any existing value. # The DBI will STORE() these into $dbh after we've connected $attr->{$attr_name} = $attr_value; } # Get the attributes we'll use to connect. # We use delete here because these no need to STORE them my $db = delete $attr->{drv_database} || delete $attr->{drv_db} or return $drh->set_err($DBI::stderr, "No database name given in DSN '$dr_dsn'"); my $host = delete $attr->{drv_host} || 'localhost'; my $port = delete $attr->{drv_port} || 123456; # Assume you can attach to your database via drv_connect: my $connection = drv_connect($db, $host, $port, $user, $auth) or return $drh->set_err($DBI::stderr, "Can't connect to $dr_dsn: ..."); # create a 'blank' dbh (call superclass constructor) my ($outer, $dbh) = DBI::_new_dbh($drh, { Name => $dr_dsn }); $dbh->STORE('Active', 1 ); $dbh->{drv_connection} = $connection; return $outer; } This is mostly the same as in the driver handle constructor above. The arguments are described in DBI. The constructor DBI::_new_dbh() is called, returning a database handle. The constructor's prototype is: ($outer, $inner) = DBI::_new_dbh($drh, $public_attr, $private_attr); with similar arguments to those in the driver handle constructor, except that the $class is replaced by $drh. The Name attribute is a standard DBI attribute (see "Database Handle Attributes" in DBI). In scalar context, only the outer handle is returned. Note the use of the STORE() method for setting the dbh attributes. That's because within the driver code, the handle object you have is the 'inner' handle of a tied hash, not the outer handle that the users of your driver have. Because you have the inner handle, tie magic doesn't get invoked when you get or set values in the hash. This is often very handy for speed when you want to get or set simple non-special driver-specific attributes. However, some attribute values, such as those handled by the DBI like PrintError, don't actually exist in the hash and must be read via $h->FETCH($attrib) and set via $h->STORE($attrib, $value). If in any doubt, use these methods. The data_sources() method must populate and return a list of valid data sources, prefixed with the "dbi:Driver" incantation that allows them to be used in the first argument of the DBI->connect() method. An example of this might be scanning the $HOME/.odbcini file on Unix for ODBC data sources (DSNs). As a trivial example, consider a fixed list of data sources: sub data_sources { my($drh, $attr) = @_; my(@list) = (); # You need more sophisticated code than this to set @list... push @list, "dbi:Driver:abc"; push @list, "dbi:Driver:def"; push @list, "dbi:Driver:ghi"; # End of code to set @list return @list; } If you need to release any resources when the driver is unloaded, you can provide a disconnect_all method. If you need any other driver handle methods, they can follow here. It is quite likely that something fails in the connect method. With DBD::File for example, you might catch an error when setting the current directory to something not existent by using the (driver-specific) f_dir attribute. To report an error, you use the set_err() method: $h->set_err($err, $errmsg, $state); This will ensure that the error is recorded correctly and that RaiseError and PrintError etc are handled correctly. Typically you'll always use the method instance, aka your method's first argument. As set_err() always returns undef your error handling code can usually be simplified to something like this: return $h->set_err($err, $errmsg, $state) if ...; package DBD::Driver::db; # ====== DATABASE ====== $DBD::Driver::db::imp_data_size = 0; There's nothing much new in the statement handle constructor, which is the prepare() method: sub prepare { my ($dbh, $statement, @attribs) = @_; # create a 'blank' sth my ($outer, $sth) = DBI::_new_sth($dbh, { Statement => $statement }); $sth->STORE('NUM_OF_PARAMS', ($statement =~ tr/?//)); $sth->{drv_params} = []; return $outer; } This is still the same -- check the arguments and call the super class constructor DBI::_new_sth(). Again, in scalar context, only the outer handle is returned. The Statement attribute should be cached as shown. Note the prefix drv_ in the attribute names: it is required that all your private attributes use a lowercase prefix unique to your driver. As mentioned earlier in this document, the DBI contains a registry of known driver prefixes and may one day warn about unknown attributes that don't have a registered prefix. Note that we parse the statement here in order to set the attribute NUM_OF_PARAMS. The technique illustrated is not very reliable; it can be confused by question marks appearing in quoted strings, delimited identifiers or in SQL comments that are part of the SQL statement. We could set NUM_OF_PARAMS in the execute() method instead because the DBI specification explicitly allows a driver to defer this, but then the user could not call bind_param(). Pure Perl drivers will rarely support transactions. Thus your commit() and rollback() methods will typically be quite simple: sub commit { my ($dbh) = @_; if ($dbh->FETCH('Warn')) { warn("Commit ineffective while AutoCommit is on"); } 0; } sub rollback { my ($dbh) = @_; if ($dbh->FETCH('Warn')) { warn("Rollback ineffective while AutoCommit is on"); } 0; } Or even simpler, just use the default methods provided by the DBI that do nothing except return undef. The DBI's default begin_work() method can be used by inheritance. These methods (that we have already used, see above) are called for you, whenever the user does a: $dbh->{$attr} = $val; or, respectively, $val = $dbh->{$attr}; See perltie for details on tied hash refs to understand why these methods are required. The DBI will handle most attributes for you, in particular attributes like RaiseError or PrintError. All you have to do is handle your driver's private attributes and any attributes, like AutoCommit and ChopBlanks, that the DBI can't handle for you. A good example might look like this: sub STORE { my ($dbh, $attr, $val) = @_; if ($attr eq 'AutoCommit') { # AutoCommit is currently the only standard attribute we have # to consider. if (!$val) { die "Can't disable AutoCommit"; } return 1; } if ($attr =~ m/^drv_/) { # Handle only our private attributes here # Note that we could trigger arbitrary actions. # Ideally we should warn about unknown attributes. $dbh->{$attr} = $val; # Yes, we are allowed to do this, return 1; # but only for our private attributes } # Else pass up to DBI to handle for us $dbh->SUPER::STORE($attr, $val); } sub FETCH { my ($dbh, $attr) = @_; if ($attr eq 'AutoCommit') { return 1; } if ($attr =~ m/^drv_/) { # Handle only our private attributes here # Note that we could trigger arbitrary actions. return $dbh->{$attr}; # Yes, we are allowed to do this, # but only for our private attributes } # Else pass up to DBI to handle $dbh->SUPER::FETCH($attr); } The DBI will actually store and fetch driver-specific attributes (with all lowercase names) without warning or error, so there's actually no need to implement driver-specific any code in your FETCH() and STORE() methods unless you need extra logic/checks, beyond getting or setting the value. Unless your driver documentation indicates otherwise, the return value of the STORE() method is unspecified and the caller shouldn't use that value. As with the driver package, other database handle methods may follow here. In particular you should consider a (possibly empty) disconnect() method and possibly a quote() method if DBI's default isn't correct for you. You may also need the type_info_all() and get_info() methods, as described elsewhere in this document. Where reasonable use $h->SUPER::foo() to call the DBI's method in some or all cases and just wrap your custom behavior around that. If you want to use private trace flags you'll probably want to be able to set them by name. To do that you'll need to define a parse_trace_flag() method (note that's "parse_trace_flag", singular, not "parse_trace_flags", plural).. This package follows the same pattern the others do: package DBD::Driver::st; $DBD::Driver::st::imp_data_size = 0; This is perhaps the most difficult method because we have to consider parameter bindings here. In addition to that, there are a number of statement attributes which must be set for inherited DBI methods to function correctly (see "Statement attributes" below). We present a simplified implementation by using the drv_params attribute from above: sub bind_param { my ($sth, $pNum, $val, $attr) = @_; my $type = (ref $attr) ? $attr->{TYPE} : $attr; if ($type) { my $dbh = $sth->{Database}; $val = $dbh->quote($sth, $type); } my $params = $sth->{drv_params}; $params->[$pNum-1] = $val; 1; } sub execute { my ($sth, @bind_values) = @_; # start of by finishing any previous execution if still active $sth->finish if $sth->FETCH('Active'); my $params = (@bind_values) ? \@bind_values : $sth->{drv_params}; my $numParam = $sth->FETCH('NUM_OF_PARAMS'); return $sth->set_err($DBI::stderr, "Wrong number of parameters") if @$params != $numParam; my $statement = $sth->{'Statement'}; for (my $i = 0; $i < $numParam; $i++) { $statement =~ s/?/$params->[$i]/; # XXX doesn't deal with quoting etc! } # Do anything ... we assume that an array ref of rows is # created and store it: $sth->{'drv_data'} = $data; $sth->{'drv_rows'} = @$data; # number of rows $sth->STORE('NUM_OF_FIELDS') = $numFields; $sth->{Active} = 1; @$data || '0E0'; } There are a number of things you should note here. We initialize the NUM_OF_FIELDS and Active attributes here, because they are essential for bind_columns() to work. We use attribute $sth->{Statement} which we created within prepare(). The attribute $sth->{Database}, which is nothing else than the dbh, was automatically created by DBI. Finally, note that (as specified in the DBI specification) we return the string '0E0' instead of the number 0, so that the result tests true but equal to zero. $sth->execute() or die $sth->errstr; In general, DBD's only need to implement execute_for_fetch() and bind_param_array. DBI's default execute_array() will invoke the DBD's execute_for_fetch() as needed. The following sequence describes the interaction between DBI execute_array and a DBD's execute_for_fetch: $sth->execute_array(\%attrs, @array_of_arrays) @array_of_arrayswas specified, DBI processes @array_of_arraysby calling DBD's bind_param_array(). Alternately, App may have directly called bind_param_array() execute_for_fetch($fetch_tuple_sub, \@tuple_status), where &$fetch_tuple_subis a closure to iterate over the returned ParamArray values, and \@tuple_statusis an array to receive the disposition status of each tuple. &$fetch_tuple_subto retrieve parameter tuples to be added to its bulk database operation/request. &$fetch_tuple_subindicates no more tuples by returning undef, the DBD executes the bulk operation, and reports the disposition of each tuple in \@tuple_status. E.g., here's the essence of DBD::Oracle's execute_for_fetch: while (1) { my @tuple_batch; for (my $i = 0; $i < $batch_size; $i++) { push @tuple_batch, [ @{$fetch_tuple_sub->() || last} ]; } last unless @tuple_batch; my $res = ora_execute_array($sth, \@tuple_batch, scalar(@tuple_batch), $tuple_batch_status); push @$tuple_status, @$tuple_batch_status; } Note that DBI's default execute_array()/execute_for_fetch() implementation requires the use of positional (i.e., '?') placeholders. Drivers which require named placeholders must either emulate positional placeholders (e.g., see DBD::Oracle), or must implement their own execute_array()/execute_for_fetch() methods to properly sequence bound parameter arrays. Only one method needs to be written for fetching data, fetchrow_arrayref(). The other methods, fetchrow_array(), fetchall_arrayref(), etc, as well as the database handle's select* methods are part of DBI, and call fetchrow_arrayref() as necessary. sub fetchrow_arrayref { my ($sth) = @_; my $data = $sth->{drv_data}; my $row = shift @$data; if (!$row) { $sth->STORE(Active => 0); # mark as no longer active return undef; } if ($sth->FETCH('ChopBlanks')) { map { $_ =~ s/\s+$//; } @$row; } return $sth->_set_fbav($row); } *fetch = \&fetchrow_arrayref; # required alias for fetchrow_arrayref Note the use of the method _set_fbav() -- this is required so that bind_col() and bind_columns() work. If an error occurs which leaves the $sth in a state where remaining rows can't be fetched then Active should be turned off before the method returns. The rows() method for this driver can be implemented like this: sub rows { shift->{drv_rows} } because it knows in advance how many rows it has fetched. Alternatively you could delete that method and so fallback to the DBI's own method which does the right thing based on the number of calls to _set_fbav(). If your driver doesn't support multiple result sets, then don't even implement this method. Otherwise, this method needs to get the statement handle ready to fetch results from the next result set, if there is one. Typically you'd start with: $sth->finish; then you should delete all the attributes from the attribute cache that may no longer be relevant for the new result set: delete $sth->{$_} for qw(NAME TYPE PRECISION SCALE ...); for drivers written in C use: hv_delete((HV*)SvRV(sth), "NAME", 4, G_DISCARD); hv_delete((HV*)SvRV(sth), "NULLABLE", 8, G_DISCARD); hv_delete((HV*)SvRV(sth), "NUM_OF_FIELDS", 13, G_DISCARD); hv_delete((HV*)SvRV(sth), "PRECISION", 9, G_DISCARD); hv_delete((HV*)SvRV(sth), "SCALE", 5, G_DISCARD); hv_delete((HV*)SvRV(sth), "TYPE", 4, G_DISCARD); Don't forget to also delete, or update, any driver-private attributes that may not be correct for the next resultset. The NUM_OF_FIELDS attribute is a special case. It should be set using STORE: $sth->STORE(NUM_OF_FIELDS => 0); /* for DBI <= 1.53 */ $sth->STORE(NUM_OF_FIELDS => $new_value); for drivers written in C use this incantation: /* Adjust NUM_OF_FIELDS - which also adjusts the row buffer size */ DBIc_NUM_FIELDS(imp_sth) = 0; /* for DBI <= 1.53 */ DBIc_STATE(imp_xxh)->set_attr_k(sth, sv_2mortal(newSVpvn("NUM_OF_FIELDS",13)), 0, sv_2mortal(newSViv(mysql_num_fields(imp_sth->result))) ); For DBI versions prior to 1.54 you'll also need to explicitly adjust the number of elements in the row buffer array ( DBIc_FIELDS_AV(imp_sth)) to match the new result set. Fill any new values with newSV(0) not &sv_undef. Alternatively you could free DBIc_FIELDS_AV(imp_sth) and set it to null, but that would mean bind_columns() wouldn't work across result sets. The main difference between dbh and sth attributes is, that you should implement a lot of attributes here that are required by the DBI, such as NAME, NULLABLE, TYPE, etc. See "Statement Handle Attributes" in DBI for a complete list. Pay attention to attributes which are marked as read only, such as NUM_OF_PARAMS. These attributes can only be set the first time a statement is executed. If a statement is prepared, then executed multiple times, warnings may be generated. You can protect against these warnings, and prevent the recalculation of attributes which might be expensive to calculate (such as the NAME and NAME_* attributes): my $storedNumParams = $sth->FETCH('NUM_OF_PARAMS'); if (!defined $storedNumParams or $storedNumFields < 0) { $sth->STORE('NUM_OF_PARAMS') = $numParams; # Set other useful attributes that only need to be set once # for a statement, like $sth->{NAME} and $sth->{TYPE} } One particularly important attribute to set correctly (mentioned in "ATTRIBUTES COMMON TO ALL HANDLES" in DBI is Active. Many DBI methods, including bind_columns(), depend on this attribute. Besides that the STORE() and FETCH() methods are mainly the same as above for dbh's. A trivial finish() method to discard stored data, reset any attributes (such as Active) and do $sth->SUPER::finish(). If you've defined a parse_trace_flag() method in ::db you'll also want it in ::st, so just alias it in: *parse_trace_flag = \&DBD::foo:db::parse_trace_flag; And perhaps some other methods that are not part of the DBI specification, in particular to make metadata available. Remember that they must have names that begin with your drivers registered prefix so they can be installed using install_method(). If DESTROY() is called on a statement handle that's still active ( $sth->{Active} is true) then it should effectively call finish(). sub DESTROY { my $sth = shift; $sth->finish if $sth->FETCH('Active'); } The test process should conform as closely as possibly to the Perl standard test harness. In particular, most (all) of the tests should be run in the t sub-directory, and should simply produce an ok when run under make test. For details on how this is done, see the Camel book and the section in Chapter 7, "The Standard Perl Library" on Test::Harness. The tests may need to adapt to the type of database which is being used for testing, and to the privileges of the user testing the driver. For example, the DBD::Informix test code has to adapt in a number of places to the type of database to which it is connected as different Informix databases have different capabilities: some of the tests are for databases without transaction logs; others are for databases with a transaction log; some versions of the server have support for blobs, or stored procedures, or user-defined data types, and others do not. When a complete file of tests must be skipped, you can provide a reason in a pseudo-comment: if ($no_transactions_available) { print "1..0 # Skip: No transactions available\n"; exit 0; } Consider downloading the DBD::Informix code and look at the code in DBD/Informix/TestHarness.pm which is used throughout the DBD::Informix tests in the t sub-directory. Please also see the section under "CREATING A PURE PERL DRIVER" regarding the creation of the Makefile.PL. Creating a new C/XS driver from scratch will always be a daunting task. You can and should greatly simplify your task by taking a good reference driver implementation and modifying that to match the database product for which you are writing a driver. The de facto reference driver has been the one for DBD::Oracle written by Tim Bunce, who is also the author of the DBI package. The DBD::Oracle module is a good example of a driver implemented around a C-level API. Nowadays it it seems better to base on DBD::ODBC, another driver maintained by Tim and Jeff Urlwin, because it offers a lot of metadata and seems to become the guideline for the future development. (Also as DBD::Oracle digs deeper into the Oracle 8 OCI interface it'll get even more hairy than it is now.) The DBD::Informix driver is one driver implemented using embedded SQL instead of a function-based API. DBD::Ingres may also be worth a look. A lot of the code in the Driver.pm file is very similar to the code for pure Perl modules - see above. However, there are also some subtle (and not so subtle) differences, including: prepare(), execute(), disconnect(), disconnect_all()and the STORE()and FETCH()methods. DBD::Driver::driver(), and you define the corresponding function in Driver.xs, and you define the C code in dbdimp.c and the prototype in dbdimp.h. For example, DBD::Informix has such a requirement, and adds the following call after the call to _new_drh() in Informix.pm: DBD::Informix::dr::driver_init($drh); and the following code in Informix.xs: # Initialize the DBD::Informix driver data structure void driver_init(drh) SV *drh CODE: ST(0) = dbd_ix_dr_driver_init(drh) ? &sv_yes : &sv_no; and the code in dbdimp.h declares: extern int dbd_ix_dr_driver_init(SV *drh); and the code in dbdimp.ec (equivalent to dbdimp.c) defines: /* Formally initialize the DBD::Informix driver structure */ int dbd_ix_dr_driver(SV *drh) { D_imp_drh(drh); imp_drh->n_connections = 0; /* No active connections */ imp_drh->current_connection = 0; /* No current connection */ imp_drh->multipleconnections = (ESQLC_VERSION >= 600) ? True : False; dbd_ix_link_newhead(&imp_drh->head); /* Empty linked list of connections */ return 1; } DBD::Oracle has a similar requirement but gets around it by checking whether the private data part of the driver handle is all zeroed out, rather than add extra functions. Now let's take a closer look at an excerpt from Oracle.pm (revised heavily to remove idiosyncrasies) as an example, ignoring things that were already discussed for pure Perl drivers. The connect method is the database handle constructor. You could write either of two versions of this method: either one which takes connection attributes (new code) and one which ignores them (old code only). If you ignore the connection attributes, then you omit all mention of the $auth variable (which is a reference to a hash of attributes), and the XS system manages the differences for you. sub connect { my ($drh, $dbname, $user, $auth, $attr) = @_; # Some database specific verifications, default settings # and the like following here. This should only include # syntax checks or similar stuff where it's legal to # 'die' in case of errors. my $dbh = DBI::_new_dbh($drh, { 'Name' => $dbname, }) or return undef; # Call the driver-specific function _login in Driver.xs file which # calls the DBMS-specific function(s) to connect to the database, # and populate internal handle data. DBD::Driver::db::_login($dbh, $dbname, $user, $auth, $attr) or return undef; $dbh; } This is mostly the same as in the pure Perl case, the exception being the use of the private _login() callback, which is the function that will really connect to the database. It is implemented in Driver.xst (you should not implement it) and calls dbd_db_login6() or dbd_db_login6_sv from dbdimp.c. See below for details. If your driver has driver-specific attributes which may be passed in the connect method and hence end up in $attr in dbd_db_login6 then it is best to delete any you process so DBI does not send them again via STORE after connect. You can do this in C like this: DBD_ATTRIB_DELETE(attr, "my_attribute_name", strlen("my_attribute_name")); However, prior to DBI subversion version 11605 (and fixed post 1.607) DBD_ATTRIB_DELETE segfaulted so if you cannot guarantee the DBI version will be post 1.607 you need to use: hv_delete((HV*)SvRV(attr), "my_attribute_name", strlen("my_attribute_name"), G_DISCARD); *FIX ME* Discuss removing attributes in Perl code. *FIX ME* T.B.S If your data_sources() method can be implemented in pure Perl, then do so because it is easier than doing it in XS code (see the section above for pure Perl drivers). If your data_sources() method must call onto compiled functions, then you will need to define dbd_dr_data_sources in your dbdimp.h file, which will trigger Driver.xst (in DBI v1.33 or greater) to generate the XS code that calls your actual C function (see the discussion below for details) and you do not code anything in Driver.pm to handle it. The prepare method is the statement handle constructor, and most of it is not new. Like the connect() method, it now has a C callback: package DBD::Driver::db; # ====== DATABASE ====== use strict; sub prepare { my ($dbh, $statement, $attribs) = @_; # create a 'blank' sth my $sth = DBI::_new_sth($dbh, { 'Statement' => $statement, }) or return undef; # Call the driver-specific function _prepare in Driver.xs file # which calls the DBMS-specific function(s) to prepare a statement # and populate internal handle data. DBD::Driver::st::_prepare($sth, $statement, $attribs) or return undef; $sth; } *FIX ME* T.B.S *FIX ME* T.B.S *FIX ME* T.B.S Driver.xs should look something like this: #include "Driver.h" DBISTATE_DECLARE; INCLUDE: Driver.xsi MODULE = DBD::Driver PACKAGE = DBD::Driver::dr /* Non-standard drh XS methods following here, if any. */ /* If none (the usual case), omit the MODULE line above too. */ MODULE = DBD::Driver PACKAGE = DBD::Driver::db /* Non-standard dbh XS methods following here, if any. */ /* Currently this includes things like _list_tables from */ /* DBD::mSQL and DBD::mysql. */ MODULE = DBD::Driver PACKAGE = DBD::Driver::st /* Non-standard sth XS methods following here, if any. */ /* In particular this includes things like _list_fields from */ /* DBD::mSQL and DBD::mysql for accessing metadata. */ Note especially the include of Driver.xsi here: DBI inserts stub functions for almost all private methods here which will typically do much work for you. Wherever you really have to implement something, it will call a private function in dbdimp.c, and this is what you have to implement. You need to set up an extra routine if your driver needs to export constants of its own, analogous to the SQL types available when you say: use DBI qw(:sql_types); *FIX ME* T.B.S Driver.h is very simple and the operational contents should look like this: #ifndef DRIVER_H_INCLUDED #define DRIVER_H_INCLUDED #define NEED_DBIXS_VERSION 93 /* 93 for DBI versions 1.00 to 1.51+ */ #define PERL_NO_GET_CONTEXT /* if used require DBI 1.51+ */ #include <DBIXS.h> /* installed by the DBI module */ #include "dbdimp.h" #include "dbivport.h" /* see below */ #include <dbd_xsh.h> /* installed by the DBI module */ #endif /* DRIVER_H_INCLUDED */ The DBIXS.h header defines most of the interesting information that the writer of a driver needs. The file dbd_xsh.h header provides prototype declarations for the C functions that you might decide to implement. Note that you should normally only define one of dbd_db_login(), dbd_db_login6() or dbd_db_login6_sv unless you are intent on supporting really old versions of DBI (prior to DBI 1.06) as well as modern versions. The only standard, DBI-mandated functions that you need write are those specified in the dbd_xsh.h header. You might also add extra driver-specific functions in Driver.xs. The dbivport.h file should be copied from the latest DBI release into your distribution each time you modify your driver. Its job is to allow you to enhance your code to work with the latest DBI API while still allowing your driver to be compiled and used with older versions of the DBI (for example, when the DBIh_SET_ERR_CHAR() macro was added to DBI 1.41, an emulation of it was added to dbivport.h). This makes users happy and your life easier. Always read the notes in dbivport.h to check for any limitations in the emulation that you should be aware of. With DBI v1.51 or better I recommend that the driver defines PERL_NO_GET_CONTEXT before DBIXS.h is included. This can significantly improve efficiency when running under a thread enabled perl. (Remember that the standard perl in most Linux distributions is built with threads enabled. So is ActiveState perl for Windows, and perl built for Apache mod_perl2.) If you do this there are some things to keep in mind: dTHX;declaration. my_perlis used if and only if the perl you are using to develop and test your driver has threads enabled. dTHX;with pTHX_prepended to the parameter list and then aTHX_prepended to the argument list where the function is called. See "How multiple interpreters and concurrency are supported" in perlguts for additional information about PERL_NO_GET_CONTEXT. This header file has two jobs: First it defines data structures for your private part of the handles. Second it defines macros that rename the generic names like dbd_db_login() to database specific names like ora_db_login(). This avoids name clashes and enables use of different drivers when you work with a statically linked perl. It also will have the important task of disabling XS methods that you don't want to implement. Finally, the macros will also be used to select alternate implementations of some functions. For example, the dbd_db_login() function is not passed the attribute hash. Since DBI v1.06, if a dbd_db_login6() macro is defined (for a function with 6 arguments), it will be used instead with the attribute hash passed as the sixth argument. Since DBI post v1.607, if a dbd_db_login6_sv() macro is defined (for a function like dbd_db_login6 but with scalar pointers for the dbname, username and password), it will be used instead. This will allow your login6 function to see if there are any Unicode characters in the dbname. People used to just pick Oracle's dbdimp.c and use the same names, structures and types. I strongly recommend against that. At first glance this saves time, but your implementation will be less readable. It was just hell when I had to separate DBI specific parts, Oracle specific parts, mSQL specific parts and mysql specific parts in DBD::mysql's dbdimp.h and dbdimp.c. (DBD::mysql was a port of DBD::mSQL which was based on DBD::Oracle.) [Seconded, based on the experience taking DBD::Informix apart, even though the version inherited in 1996 was only based on DBD::Oracle.] This part of the driver is your exclusive part. Rewrite it from scratch, so it will be clean and short: in other words, a better piece of code. (Of course keep an eye on other people's work.) struct imp_drh_st { dbih_drc_t com; /* MUST be first element in structure */ /* Insert your driver handle attributes here */ }; struct imp_dbh_st { dbih_dbc_t com; /* MUST be first element in structure */ /* Insert your database handle attributes here */ }; struct imp_sth_st { dbih_stc_t com; /* MUST be first element in structure */ /* Insert your statement handle attributes here */ }; /* Rename functions for avoiding name clashes; prototypes are */ /* in dbd_xsh.h */ #define dbd_init drv_dr_init #define dbd_db_login6_sv drv_db_login_sv #define dbd_db_do drv_db_do ... many more here ... These structures implement your private part of the handles. You have to use the name imp_dbh_{dr|db|st} and the first field must be of type dbih_drc_t|_dbc_t|_stc_t and must be called com. You should never access these fields directly, except by using the DBIc_xxx() macros below. Conventionally, dbdimp.c is the main implementation file (but DBD::Informix calls the file dbdimp.ec). This section includes a short note on each function that is used in the Driver.xsi template and thus has to be implemented. Of course, you will probably also need to implement other support functions, which should usually be file static if they are placed in dbdimp.c. If they are placed in other files, you need to list those files in Makefile.PL (and MANIFEST) to handle them correctly. It is wise to adhere to a namespace convention for your functions to avoid conflicts. For example, for a driver with prefix drv_, you might call externally visible functions dbd_drv_xxxx. You should also avoid non-constant global variables as much as possible to improve the support for threading. Since Perl requires support for function prototypes (ANSI or ISO or Standard C), you should write your code using function prototypes too. It is possible to use either the unmapped names such as dbd_init() or the mapped names such as dbd_ix_dr_init() in the dbdimp.c file. DBD::Informix uses the mapped names which makes it easier to identify where to look for linkage problems at runtime (which will report errors using the mapped names). Most other drivers, and in particular DBD::Oracle, use the unmapped names in the source code which makes it a little easier to compare code between drivers and eases discussions on the dbi-dev mailing list. The majority of the code fragments here will use the unmapped names. Ultimately, you should provide implementations for most of the functions listed in the dbd_xsh.h header. The exceptions are optional functions (such as dbd_st_rows()) and those functions with alternative signatures, such as dbd_db_login6_sv, dbd_db_login6() and dbd_db_login(). Then you should only implement one of the alternatives, and generally the newer one of the alternatives. #include "Driver.h" DBISTATE_DECLARE; void dbd_init(dbistate_t* dbistate) { DBISTATE_INIT; /* Initialize the DBI macros */ } The dbd_init() function will be called when your driver is first loaded; the bootstrap command in DBD::Driver::dr::driver() triggers this, and the call is generated in the BOOT section of Driver.xst. These statements are needed to allow your driver to use the DBI macros. They will include your private header file dbdimp.h in turn. Note that DBISTATE_INIT requires the name of the argument to dbd_init() to be called dbistate(). You need a function to record errors so DBI can access them properly. You can call it whatever you like, but we'll call it dbd_drv_error() here. The argument list depends on your database software; different systems provide different ways to get at error information. static void dbd_drv_error(SV *h, int rc, const char *what) { Note that h is a generic handle, may it be a driver handle, a database or a statement handle. D_imp_xxh(h); This macro will declare and initialize a variable imp_xxh with a pointer to your private handle pointer. You may cast this to to imp_drh_t, imp_dbh_t or imp_sth_t. To record the error correctly, equivalent to the set_err() method, use one of the DBIh_SET_ERR_CHAR(...) or DBIh_SET_ERR_SV(...) macros, which were added in DBI 1.41: DBIh_SET_ERR_SV(h, imp_xxh, err, errstr, state, method); DBIh_SET_ERR_CHAR(h, imp_xxh, err_c, err_i, errstr, state, method); For DBIh_SET_ERR_SV the err, errstr, state, and method parameters are SV* (use &sv_undef instead of NULL). For DBIh_SET_ERR_CHAR the err_c, errstr, state, method parameters are char*. The err_i parameter is an IV that's used instead of err_c if err_c is Null. The method parameter can be ignored. The DBIh_SET_ERR_CHAR macro is usually the simplest to use when you just have an integer error code and an error message string: DBIh_SET_ERR_CHAR(h, imp_xxh, Nullch, rc, what, Nullch, Nullch); As you can see, any parameters that aren't relevant to you can be Null. To make drivers compatible with DBI < 1.41 you should be using dbivport.h as described in "Driver.h" above. The (obsolete) macros such as DBIh_EVENT2 should be removed from drivers. The names dbis and DBIS, which were used in previous versions of this document, should be replaced with the DBIc_DBISTATE(imp_xxh) macro. The name DBILOGFP, which was also used in previous versions of this document, should be replaced by DBIc_LOGPIO(imp_xxh). Your code should not call the C <stdio.h> I/O functions; you should use PerlIO_printf() as shown: if (DBIc_TRACE_LEVEL(imp_xxh) >= 2) PerlIO_printf(DBIc_LOGPIO(imp_xxh), "foobar %s: %s\n", foo, neatsvpv(errstr,0)); That's the first time we see how tracing works within a DBI driver. Make use of this as often as you can, but don't output anything at a trace level less than 3. Levels 1 and 2 are reserved for the DBI. You can define up to 8 private trace flags using the top 8 bits of DBIc_TRACE_FLAGS(imp), that is: 0xFF000000. See the parse_trace_flag() method elsewhere in this document. This method is optional; the support for it was added in DBI v1.33. As noted in the discussion of Driver.pm, if the data sources can be determined by pure Perl code, do it that way. If, as in DBD::Informix, the information is obtained by a C function call, then you need to define a function that matches the prototype: extern AV *dbd_dr_data_sources(SV *drh, imp_drh_t *imp_drh, SV *attrs); An outline implementation for DBD::Informix follows, assuming that the sqgetdbs() function call shown will return up to 100 databases names, with the pointers to each name in the array dbsname and the name strings themselves being stores in dbsarea. AV *dbd_dr_data_sources(SV *drh, imp_drh_t *imp_drh, SV *attr) { int ndbs; int i; char *dbsname[100]; char dbsarea[10000]; AV *av = Nullav; if (sqgetdbs(&ndbs, dbsname, 100, dbsarea, sizeof(dbsarea)) == 0) { av = NewAV(); av_extend(av, (I32)ndbs); sv_2mortal((SV *)av); for (i = 0; i < ndbs; i++) av_store(av, i, newSVpvf("dbi:Informix:%s", dbsname[i])); } return(av); } The actual DBD::Informix implementation has a number of extra lines of code, logs function entry and exit, reports the error from sqgetdbs(), and uses #define'd constants for the array sizes. int dbd_db_login6_sv(SV* dbh, imp_dbh_t* imp_dbh, SV* dbname, SV* user, SV* auth, SV *attr); or int dbd_db_login6(SV* dbh, imp_dbh_t* imp_dbh, char* dbname, char* user, char* auth, SV *attr); This function will really connect to the database. The argument dbh is the database handle. imp_dbh is the pointer to the handles private data, as is imp_xxx in dbd_drv_error() above. The arguments dbname, user, auth and attr correspond to the arguments of the driver handle's connect() method. You will quite often use database specific attributes here, that are specified in the DSN. I recommend you parse the DSN (using Perl) within the connect() method and pass the segments of the DSN via the attributes parameter through _login() to dbd_db_login6(). Here's how you fetch them; as an example we use hostname attribute, which can be up to 12 characters long excluding null terminator: SV** svp; STRLEN len; char* hostname; if ( (svp = DBD_ATTRIB_GET_SVP(attr, "drv_hostname", 12)) && SvTRUE(*svp)) { hostname = SvPV(*svp, len); DBD_ATTRIB_DELETE(attr, "drv_hostname", 12); /* avoid later STORE */ } else { hostname = "localhost"; } If you handle any driver specific attributes in the dbd_db_login6 method you probably want to delete them from attr (as above with DBD_ATTRIB_DELETE). If you don't delete your handled attributes DBI will call STORE for each attribute after the connect/login and this is at best redundant for attributes you have already processed. Note: Until revision 11605 (post DBI 1.607), there was a problem with DBD_ATTRIBUTE_DELETE so unless you require a DBI version after 1.607 you need to replace each DBD_ATTRIBUTE_DELETE call with: hv_delete((HV*)SvRV(attr), key, key_len, G_DISCARD) Note that you can also obtain standard attributes such as AutoCommit and ChopBlanks from the attributes parameter, using DBD_ATTRIB_GET_IV for integer attributes. If, for example, your database does not support transactions but AutoCommit is set off (requesting transaction support), then you can emulate a 'failure to connect'. Now you should really connect to the database. In general, if the connection fails, it is best to ensure that all allocated resources are released so that the handle does not need to be destroyed separately. If you are successful (and possibly even if you fail but you have allocated some resources), you should use the following macros: DBIc_IMPSET_on(imp_dbh); This indicates that the driver (implementor) has allocated resources in the imp_dbh structure and that the implementors private dbd_db_destroy() function should be called when the handle is destroyed. DBIc_ACTIVE_on(imp_dbh); This indicates that the handle has an active connection to the server and that the dbd_db_disconnect() function should be called before the handle is destroyed. Note that if you do need to fail, you should report errors via the drh or imp_drh rather than via dbh or imp_dbh because imp_dbh will be destroyed by the failure, so errors recorded in that handle will not be visible to DBI, and hence not the user either. Note too, that the function is passed dbh and imp_dbh, and there is a macro D_imp_drh_from_dbh which can recover the imp_drh from the imp_dbh. However, there is no DBI macro to provide you with the drh given either the imp_dbh or the dbh or the imp_drh (and there's no way to recover the dbh given just the imp_dbh). This suggests that, despite the above notes about dbd_drv_error() taking an SV *, it may be better to have two error routines, one taking imp_dbh and one taking imp_drh instead. With care, you can factor most of the formatting code out so that these are small routines calling a common error formatter. See the code in DBD::Informix 1.05.00 for more information. The dbd_db_login6() function should return TRUE for success, FALSE otherwise. Drivers implemented long ago may define the five-argument function dbd_db_login() instead of dbd_db_login6(). The missing argument is the attributes. There are ways to work around the missing attributes, but they are ungainly; it is much better to use the 6-argument form. Even later drivers will use dbd_db_login6_sv() which provides the dbname, username and password as SVs. int dbd_db_commit(SV *dbh, imp_dbh_t *imp_dbh); int dbd_db_rollback(SV* dbh, imp_dbh_t* imp_dbh); These are used for commit and rollback. They should return TRUE for success, FALSE for error. The arguments dbh and imp_dbh are the same as for dbd_db_login6() above; I will omit describing them in what follows, as they appear always. These functions should return TRUE for success, FALSE otherwise. This is your private part of the disconnect() method. Any dbh with the ACTIVE flag on must be disconnected. (Note that you have to set it in dbd_db_connect() above.) int dbd_db_disconnect(SV* dbh, imp_dbh_t* imp_dbh); The database handle will return TRUE for success, FALSE otherwise. In any case it should do a: DBIc_ACTIVE_off(imp_dbh); before returning so DBI knows that dbd_db_disconnect() was executed. Note that there's nothing to stop a dbh being disconnected while it still have active children. If your database API reacts badly to trying to use an sth in this situation then you'll need to add code like this to all sth methods: if (!DBIc_ACTIVE(DBIc_PARENT_COM(imp_sth))) return 0; Alternatively, you can add code to your driver to keep explicit track of the statement handles that exist for each database handle and arrange to destroy those handles before disconnecting from the database. There is code to do this in DBD::Informix. Similar comments apply to the driver handle keeping track of all the database handles. Note that the code which destroys the subordinate handles should only release the associated database resources and mark the handles inactive; it does not attempt to free the actual handle structures. This function should return TRUE for success, FALSE otherwise, but it is not clear what anything can do about a failure. int dbd_discon_all (SV *drh, imp_drh_t *imp_drh); This function may be called at shutdown time. It should make best-efforts to disconnect all database handles - if possible. Some databases don't support that, in which case you can do nothing but return 'success'. This function should return TRUE for success, FALSE otherwise, but it is not clear what anything can do about a failure. This is your private part of the database handle destructor. Any dbh with the IMPSET flag on must be destroyed, so that you can safely free resources. (Note that you have to set it in dbd_db_connect() above.) void dbd_db_destroy(SV* dbh, imp_dbh_t* imp_dbh) { DBIc_IMPSET_off(imp_dbh); } The DBI Driver.xst code will have called dbd_db_disconnect() for you, if the handle is still 'active', before calling dbd_db_destroy(). Before returning the function must switch IMPSET to off, so DBI knows that the destructor was called. A DBI handle doesn't keep references to its children. But children do keep references to their parents. So a database handle won't be DESTROY'd until all its children have been DESTROY'd. This function handles $dbh->{$key} = $value; Its prototype is: int dbd_db_STORE_attrib(SV* dbh, imp_dbh_t* imp_dbh, SV* keysv, SV* valuesv); You do not handle all attributes; on the contrary, you should not handle DBI attributes here: leave this to DBI. (There are two exceptions, AutoCommit and ChopBlanks, which you should care about.) The return value is TRUE if you have handled the attribute or FALSE otherwise. If you are handling an attribute and something fails, you should call dbd_drv_error(), so DBI can raise exceptions, if desired. If dbd_drv_error() returns, however, you have a problem: the user will never know about the error, because he typically will not check $dbh->errstr(). I cannot recommend a general way of going on, if dbd_drv_error() returns, but there are examples where even the DBI specification expects that you croak(). (See the AutoCommit method in DBI.) If you have to store attributes, you should either use your private data structure imp_xxx, the handle hash (via (HV*)SvRV(dbh)), or use the private imp_data. The first is best for internal C values like integers or pointers and where speed is important within the driver. The handle hash is best for values the user may want to get/set via driver-specific attributes. The private imp_data is an additional SV attached to the handle. You could think of it as an unnamed handle attribute. It's not normally used. This is the counterpart of dbd_db_STORE_attrib(), needed for: $value = $dbh->{$key}; Its prototype is: SV* dbd_db_FETCH_attrib(SV* dbh, imp_dbh_t* imp_dbh, SV* keysv); Unlike all previous methods this returns an SV with the value. Note that you should normally execute sv_2mortal(), if you return a nonconstant value. (Constant values are &sv_undef, &sv_no and &sv_yes.) Note, that DBI implements a caching algorithm for attribute values. If you think, that an attribute may be fetched, you store it in the dbh itself: if (cacheit) /* cache value for later DBI 'quick' fetch? */ hv_store((HV*)SvRV(dbh), key, kl, cachesv, 0); This is the private part of the prepare() method. Note that you must not really execute the statement here. You may, however, preparse and validate the statement, or do similar things. int dbd_st_prepare(SV* sth, imp_sth_t* imp_sth, char* statement, SV* attribs); A typical, simple, possibility is to do nothing and rely on the perl prepare() code that set the Statement attribute on the handle. This attribute can then be used by dbd_st_execute(). If the driver supports placeholders then the NUM_OF_PARAMS attribute must be set correctly by dbd_st_prepare(): DBIc_NUM_PARAMS(imp_sth) = ... If you can, you should also setup attributes like NUM_OF_FIELDS, NAME, etc. here, but DBI doesn't require that - they can be deferred until execute() is called. However, if you do, document it. In any case you should set the IMPSET flag, as you did in dbd_db_connect() above: DBIc_IMPSET_on(imp_sth); This is where a statement will really be executed. int dbd_st_execute(SV* sth, imp_sth_t* imp_sth); dbd_st_execute should return -2 for any error, -1 if the number of rows affected is unknown else it should be the number of affected (updated, inserted) rows. Note that you must be aware a statement may be executed repeatedly. Also, you should not expect that finish() will be called between two executions, so you might need code, like the following, near the start of the function: if (DBIc_ACTIVE(imp_sth)) dbd_st_finish(h, imp_sth); If your driver supports the binding of parameters (it should!), but the database doesn't, you must do it here. This can be done as follows: SV *svp; char* statement = DBD_ATTRIB_GET_PV(h, "Statement", 9, svp, ""); int numParam = DBIc_NUM_PARAMS(imp_sth); int i; for (i = 0; i < numParam; i++) { char* value = dbd_db_get_param(sth, imp_sth, i); /* It is your drivers task to implement dbd_db_get_param, */ /* it must be setup as a counterpart of dbd_bind_ph. */ /* Look for '?' and replace it with 'value'. Difficult */ /* task, note that you may have question marks inside */ /* quotes and comments the like ... :-( */ /* See DBD::mysql for an example. (Don't look too deep into */ /* the example, you will notice where I was lazy ...) */ } The next thing is to really execute the statement. Note that you must set the attributes NUM_OF_FIELDS, NAME, etc when the statement is successfully executed if the driver has not already done so: they may be used even before a potential fetchrow(). In particular you have to tell DBI the number of fields that the statement has, because it will be used by DBI internally. Thus the function will typically ends with: if (isSelectStatement) { DBIc_NUM_FIELDS(imp_sth) = numFields; DBIc_ACTIVE_on(imp_sth); } It is important that the ACTIVE flag only be set for SELECT statements (or any other statements that can return many values from the database using a cursor-like mechanism). See dbd_db_connect() above for more explanations. There plans for a preparse function to be provided by DBI, but this has not reached fruition yet. Meantime, if you want to know how ugly it can get, try looking at the dbd_ix_preparse() in DBD::Informix dbdimp.ec and the related functions in iustoken.c and sqltoken.c. This function fetches a row of data. The row is stored in in an array, of SV's that DBI prepares for you. This has two advantages: it is fast (you even reuse the SV's, so they don't have to be created after the first fetchrow()), and it guarantees that DBI handles bind_cols() for you. What you do is the following: AV* av; int numFields = DBIc_NUM_FIELDS(imp_sth); /* Correct, if NUM_FIELDS is constant for this statement. There are drivers where this is not the case! */ int chopBlanks = DBIc_is(imp_sth, DBIcf_ChopBlanks); int i; if (!fetch_new_row_of_data(...)) { ... /* check for error or end-of-data */ DBIc_ACTIVE_off(imp_sth); /* turn off Active flag automatically */ return Nullav; } /* get the fbav (field buffer array value) for this row */ /* it is very important to only call this after you know */ /* that you have a row of data to return. */ av = DBIc_DBISTATE(imp_sth)->get_fbav(imp_sth); for (i = 0; i < numFields; i++) { SV* sv = fetch_a_field(..., i); if (chopBlanks && SvOK(sv) && type_is_blank_padded(field_type[i])) { /* Remove white space from end (only) of sv */ } sv_setsv(AvARRAY(av)[i], sv); /* Note: (re)use! */ } return av; There's no need to use a fetch_a_field() function returning an SV*. It's more common to use your database API functions to fetch the data as character strings and use code like this: sv_setpvn(AvARRAY(av)[i], char_ptr, char_count); NULL values must be returned as undef. You can use code like this: SvOK_off(AvARRAY(av)[i]); The function returns the AV prepared by DBI for success or Nullav otherwise. *FIX ME* Discuss what happens when there's no more data to fetch. Are errors permitted if another fetch occurs after the first fetch that reports no more data. (Permitted, not required.) If an error occurs which leaves the $sth in a state where remaining rows can't be fetched then Active should be turned off before the method returns. The $sth->finish() method can be called if the user wishes to indicate that no more rows will be fetched even if the database has more rows to offer, and the DBI code can call the function when handles are being destroyed. See the DBI specification for more background details. In both circumstances, the DBI code ends up calling the dbd_st_finish3() method (if you provide a mapping for dbd_st_finish3() in dbdimp.h), or dbd_st_finish() otherwise. The difference is that dbd_st_finish3() takes a third argument which is an int with the value 1 if it is being called from a destroy() method and 0 otherwise. Note that DBI v1.32 and earlier test on dbd_db_finish3() to call dbd_st_finish3(); if you provide dbd_st_finish3(), either define dbd_db_finish3() too, or insist on DBI v1.33 or later. All it needs to do is turn off the Active flag for the sth. It will only be called by Driver.xst code, if the driver has set ACTIVE to on for the sth. Outline example: int dbd_st_finish3(SV* sth, imp_sth_t* imp_sth, int from_destroy) { if (DBIc_ACTIVE(imp_sth)) { /* close cursor or equivalent action */ DBIc_ACTIVE_off(imp_sth); } return 1; } The from_destroy parameter is true if dbd_st_finish3() is being called from DESTROY() - and so the statement is about to be destroyed. For many drivers there is no point in doing anything more than turning off the Active flag in this case. The function returns TRUE for success, FALSE otherwise, but there isn't a lot anyone can do to recover if there is an error. This function is the private part of the statement handle destructor. void dbd_st_destroy(SV* sth, imp_sth_t* imp_sth) { ... /* any clean-up that's needed */ DBIc_IMPSET_off(imp_sth); /* let DBI know we've done it */ } The DBI Driver.xst code will call dbd_st_finish() for you, if the sth has the ACTIVE flag set, before calling dbd_st_destroy(). These functions correspond to dbd_db_STORE() and dbd_db_FETCH() attrib above, except that they are for statement handles. See above. int dbd_st_STORE_attrib(SV* sth, imp_sth_t* imp_sth, SV* keysv, SV* valuesv); SV* dbd_st_FETCH_attrib(SV* sth, imp_sth_t* imp_sth, SV* keysv); This function is internally used by the bind_param() method, the bind_param_inout() method and by the DBI Driver.xst code if execute() is called with any bind parameters. int dbd_bind_ph (SV *sth, imp_sth_t *imp_sth, SV *param, SV *value, IV sql_type, SV *attribs, int is_inout, IV maxlen); The param argument holds an IV with the parameter number (1, 2, ...). The value argument is the parameter value and sql_type is its type. If your driver does not support bind_param_inout() then you should ignore maxlen and croak if is_inout is TRUE. If your driver does support bind_param_inout() then you should note that value is the SV after dereferencing the reference passed to bind_param_inout(). In drivers of simple databases the function will, for example, store the value in a parameter array and use it later in dbd_st_execute(). See the DBD::mysql driver for an example. To provide support for parameters bound by reference rather than by value, the driver must do a number of things. First, and most importantly, it must note the references and stash them in its own driver structure. Secondly, when a value is bound to a column, the driver must discard any previous reference bound to the column. On each execute, the driver must evaluate the references and internally bind the values resulting from the references. This is only applicable if the user writes: $sth->execute; If the user writes: $sth->execute(@values); then DBI automatically calls the binding code for each element of @values. These calls are indistinguishable from explicit user calls to bind_param(). The Makefile.PL file for a C/XS driver is similar to the code needed for a pure Perl driver, but there are a number of extra bits of information needed by the build system. For example, the attributes list passed to WriteMakefile() needs to specify the object files that need to be compiled and built into the shared object (DLL). This is often, but not necessarily, just dbdimp.o (unless that should be dbdimp.obj because you're building on MS Windows). Note that you can reliably determine the extension of the object files from the $Config{obj_ext} values, and there are many other useful pieces of configuration information lurking in that hash. You get access to it with: use Config; The DBI code implements the majority of the methods which are accessed using the notation DBI->function(), the only exceptions being DBI->connect() and DBI->data_sources() which require support from the driver. The DBI code implements the following documented driver, database and statement functions which do not need to be written by the DBD driver writer. The default implementation of this function prepares, executes and destroys the statement. This can be replaced if there is a better way to implement this, such as EXECUTE IMMEDIATE which can sometimes be used if there are no parameters. The DBD driver does not need to worry about these routines at all. This attribute needs to be honored during fetch() operations, but does not need to be handled by the attribute handling code. The DBD driver does not need to worry about this attribute at all. The DBD driver does not need to worry about this attribute at all. Assuming the driver uses the DBIc_DBISTATE(imp_xxh)->get_fbav() function (C drivers, see below), or the $sth->_set_fbav($data) method (Perl drivers) the driver does not need to do anything about this routine. Regardless of whether the driver uses DBIc_DBISTATE(imp_xxh)->get_fbav(), the driver does not need to do anything about this routine as it simply iteratively calls $sth->bind_col(). The DBI code implements a default implementation of the following functions which do not need to be written by the DBD driver writer unless the default implementation is incorrect for the Driver. This should only be written if the database does not accept the ANSI SQL standard for quoting strings, with the string enclosed in single quotes and any embedded single quotes replaced by two consecutive single quotes. For the two argument form of quote, you need to implement the type_info() method to provide the information that quote needs. This should be implemented as a simple efficient way to determine whether the connection to the database is still alive. Typically code like this: sub ping { my $dbh = shift; $sth = $dbh->prepare_cached(q{ select * from A_TABLE_NAME where 1=0 }) or return 0; $sth->execute or return 0; $sth->finish; return 1; } where A_TABLE_NAME is the name of a table that always exists (such as a database system catalogue). The default implementation of default_user will get the database username and password fields from $ENV{DBI_USER} and $ENV{DBI_PASS}. You can override this method. It is called as follows: ($user, $pass) = $drh->default_user($user, $pass, $attr) The exposition above ignores the DBI MetaData methods. The metadata methods are all associated with a database handle. The DBI::DBD::Metadata module is a good semi-automatic way for the developer of a DBD module to write the get_info() and type_info() functions quickly and accurately. Prior to DBI v1.33, this existed as the method write_getinfo_pm() in the DBI::DBD module. From DBI v1.33, it exists as the method write_getinfo_pm() in the DBI::DBD::Metadata module. This discussion assumes you have DBI v1.33 or later. You examine the documentation for write_getinfo_pm() using: perldoc DBI::DBD::Metadata To use it, you need a Perl DBI driver for your database which implements the get_info() method. In practice, this means you need to install DBD::ODBC, an ODBC driver manager, and an ODBC driver for your database. With the pre-requisites in place, you might type: perl -MDBI::DBD::Metadata -we \ "write_getinfo_pm (qw{ dbi:ODBC:foo_db username password Driver })" The procedure writes to standard output the code that should be added to your Driver.pm file and the code that should be written to lib/DBD/Driver/GetInfo.pm. You should review the output to ensure that it is sensible. Given the idea of the write_getinfo_pm() method, it was not hard to devise a parallel method, write_typeinfo_pm(), which does the analogous job for the DBI type_info_all() metadata method. The write_typeinfo_pm() method was added to DBI v1.33. You examine the documentation for write_typeinfo_pm() using: perldoc DBI::DBD::Metadata The setup is exactly analogous to the mechanism described in "Generating the get_info method". With the pre-requisites in place, you might type: perl -MDBI::DBD::Metadata -we \ "write_typeinfo (qw{ dbi:ODBC:foo_db username password Driver })" The procedure writes to standard output the code that should be added to your Driver.pm file and the code that should be written to lib/DBD/Driver/TypeInfo.pm. You should review the output to ensure that it is sensible./GetInfo.pm is not very much more complex unless your DBMS itself is much more complex. Note that some of the DBI utility methods rely on information from the get_info() method to perform their operations correctly. See, for example, the quote_identifier() and quote methods, discussed below./TypeInfo.pm is not very much more complex unless your DBMS itself is much more complex. The guidelines on writing this method are still not really clear.. This method generates an array of names in a format suitable for being embedded in SQL statements in places where a table name is expected. If your database hews close enough to the SQL standard or if you have implemented an appropriate table_info() function and and the appropriate quote_identifier() function, then the DBI default version of this method will work for your driver too. Otherwise, you have to write a function yourself, such as: sub tables { my($dbh, $cat, $sch, $tab, $typ) = @_; my(@res); my($sth) = $dbh->table_info($cat, $sch, $tab, $typ); my(@arr); while (@arr = $sth->fetchrow_array) { push @res, $dbh->quote_identifier($arr[0], $arr[1], $arr[2]); } return @res; } See also the default implementation in DBI.pm. This method takes a value and converts it into a string suitable for embedding in an SQL statement as a string literal. If your DBMS accepts the SQL standard notation for strings (single quotes around the string as a whole with any embedded single quotes doubled up), then you do not need to write this method as DBI provides a default method that does it for you. If your DBMS uses an alternative notation or escape mechanism, then you need to provide an equivalent function. For example, suppose your DBMS used C notation with double quotes around the string and backslashes escaping both double quotes and backslashes themselves. Then you might write the function as: sub quote { my($dbh, $str) = @_; $str =~ s/["\\]/\\$&/gmo; return qq{"$str"}; } Handling newlines and other control characters is left as an exercise for the reader. This sample method ignores the $data_type indicator which is the optional second argument to the method. This method is called to ensure that the name of the given table (or other database object) can be embedded into an SQL statement without danger of misinterpretation. The result string should be usable in the text of an SQL statement as the identifier for a table. If your DBMS accepts the SQL standard notation for quoted identifiers (which uses double quotes around the identifier as a whole, with any embedded double quotes doubled up) and accepts "schema"."identifier" (and "catalog"."schema"."identifier" when a catalog is specified), then you do not need to write this method as DBI provides a default method that does it for you. In fact, even if your DBMS does not handle exactly that notation but you have implemented the get_info() method and it gives the correct responses, then it will work for you. If your database is fussier, then you need to implement your own version of the function. For example, DBD::Informix has to deal with an environment variable DELIMIDENT. If it is not set, then the DBMS treats names enclosed in double quotes as strings rather than names, which is usually a syntax error. Additionally, the catalog portion of the name is separated from the schema and table by a different delimiter (colon instead of dot), and the catalog portion is never enclosed in quotes. (Fortunately, valid strings for the catalog will never contain weird characters that might need to be escaped, unless you count dots, dashes, slashes and at-signs as weird.) Finally, an Informix database can contain objects that cannot be accessed because they were created by a user with the DELIMIDENT environment variable set, but the current user does not have it set. By design choice, the quote_identifier() method encloses those identifiers in double quotes anyway, which generally triggers a syntax error, and the metadata methods which generate lists of tables etc omit those identifiers from the result sets. sub quote_identifier { my($dbh, $cat, $sch, $obj) = @_; my($rv) = ""; my($qq) = (defined $ENV{DELIMIDENT}) ? '"' : ''; $rv .= qq{$cat:} if (defined $cat); if (defined $sch) { if ($sch !~ m/^\w+$/o) { $qq = '"'; $sch =~ s/$qq/$qq$qq/gm; } $rv .= qq{$qq$sch$qq.}; } if (defined $obj) { if ($obj !~ m/^\w+$/o) { $qq = '"'; $obj =~ s/$qq/$qq$qq/gm; } $rv .= qq{$qq$obj$qq}; } return $rv; } Handling newlines and other control characters is left as an exercise for the reader. Note that there is an optional fourth parameter to this function which is a reference to a hash of attributes; this sample implementation ignores that. This sample implementation also ignores the single-argument variant of the method. Tracing in DBI is controlled with a combination of a trace level and a set of flags which together are known as the trace settings. The trace settings are stored in a single integer and divided into levels and flags by a set of masks ( DBIc_TRACE_LEVEL_MASK and DBIc_TRACE_FLAGS_MASK).. The trace level is the first 4 bits of the trace settings (masked by DBIc_TRACE_FLAGS_MASK) and represents trace levels of 1 to 15. Do not output anything at trace levels less than 3 as they are reserved for DBI. For advice on what to output at each level see "Trace Levels" in DBI. To test for a trace level you can use the DBIc_TRACE_LEVEL macro like this: if (DBIc_TRACE_LEVEL(imp_xxh) >= 2) { PerlIO_printf(DBIc_LOGPIO(imp_xxh), "foobar"); } Also note the use of PerlIO_printf which you should always use for tracing and never the C stdio.h I/O functions. Trace flags are used to enable tracing of specific activities within the DBI and drivers. The DBI defines some trace flags and drivers can define others. DBI trace flag names begin with a capital letter and driver specific names begin with a lowercase letter. For a list of DBI defined trace flags see "Trace Flags" in DBI. If you want to use private trace flags you'll probably want to be able to set them by name. Drivers are expected to override the parse_trace_flag (note the singular) and check if $trace_flag_name is a driver specific trace flags and, if not, then call the DBIs default parse_trace_flag(). To do that you'll need to define a parse_trace_flag() method like this: of DBIc_TRACE_FLAGS(imp) i.e., 0xFF000000. If you've defined a parse_trace_flag() method in ::db you'll also want it in ::st, so just alias it in: *parse_trace_flag = \&DBD::foo:db::parse_trace_flag; You may want to act on the current 'SQL' trace flag that DBI defines to output SQL prepared/executed as DBI currently does not do SQL tracing. Access to the trace level and trace flags is via a set of macros. DBIc_TRACE_SETTINGS(imp) returns the trace settings DBIc_TRACE_LEVEL(imp) returns the trace level DBIc_TRACE_FLAGS(imp) returns the trace flags DBIc_TRACE(imp, flags, flaglevel, level) e.g., DBIc_TRACE(imp, 0, 0, 4) if level >= 4 DBIc_TRACE(imp, DBDtf_FOO, 2, 4) if tracing DBDtf_FOO & level>=2 or level>=4 DBIc_TRACE(imp, DBDtf_FOO, 2, 0) as above but never trace just due to level Study Oraperl.pm (supplied with DBD::Oracle) and Ingperl.pm (supplied with DBD::Ingres) and the corresponding dbdimp.c files for ideas. Note that the emulation code sets $dbh->{CompatMode} = 1; for each connection so that the internals of the driver can implement behaviour compatible with the old interface when dealing with those handles. For example, ingperl has a $sql_rowcount variable. Rather than try to manually update this in Ingperl.pm it can be done faster in C code. In dbd_init(): sql_rowcount = perl_get_sv("Ingperl::sql_rowcount", GV_ADDMULTI); In the relevant places do: if (DBIc_COMPAT(imp_sth)) /* only do this for compatibility mode handles */ sv_setiv(sql_rowcount, the_row_count); Any handle has a corresponding C structure filled with private data. Some of this data is reserved for use by DBI (except for using the DBIc macros below), some is for you. See the description of the dbdimp.h file above for examples. Most functions in dbdimp.c are passed both the handle xyz and a pointer to imp_xyz. In rare cases, however, you may use the following macros: Given a function argument dbh, declare a variable imp_dbh and initialize it with a pointer to the handles private data. Note: This must be a part of the function header, because it declares a variable. Likewise for statement handles. Given any handle, declare a variable imp_xxx and initialize it with a pointer to the handles private data. It is safe, for example, to cast imp_xxx to imp_dbh_t*, if DBIc_TYPE(imp_xxx) == DBIt_DB. (You can also call sv_derived_from(h, "DBI::db"), but that's much slower.) Given a imp_sth, declare a variable imp_dbh and initialize it with a pointer to the parent database handle's implementors structure. The driver code which initializes a handle should use DBIc_IMPSET_on() as soon as its state is such that the cleanup code must be called. When this happens is determined by your driver code. Failure to call this can lead to corruption of data structures. For example, DBD::Informix maintains a linked list of database handles in the driver, and within each handle, a linked list of statements. Once a statement is added to the linked list, it is crucial that it is cleaned up (removed from the list). When DBIc_IMPSET_on() was being called too late, it was able to cause all sorts of problems. Once upon a long time ago, the only way of handling the internal DBI boolean flags/attributes was through macros such as: DBIc_WARN DBIc_WARN_on DBIc_WARN_off DBIc_COMPAT DBIc_COMPAT_on DBIc_COMPAT_off Each of these took an imp_xxh pointer as an argument. Since then, new attributes have been added such as ChopBlanks, RaiseError and PrintError, and these do not have the full set of macros. The approved method for handling these is now the four macros: DBIc_is(imp, flag) DBIc_has(imp, flag) an alias for DBIc_is DBIc_on(imp, flag) DBIc_off(imp, flag) DBIc_set(imp, flag, on) set if on is true, else clear Consequently, the DBIc_XXXXX family of macros is now mostly deprecated and new drivers should avoid using them, even though the older drivers will probably continue to do so for quite a while yet. However... There is an important exception to that. The ACTIVE and IMPSET flags should be set via the DBIc_ACTIVE_on() and DBIc_IMPSET_on() macros, and unset via the DBIc_ACTIVE_off() and DBIc_IMPSET_off() macros. THIS IS CRITICAL for C/XS drivers. The $sth->bind_col() and $sth->bind_columns() documented in the DBI specification do not have to be implemented by the driver writer because DBI takes care of the details for you. However, the key to ensuring that bound columns work is to call the function DBIc_DBISTATE(imp_xxh)->get_fbav() in the code which fetches a row of data. This returns an AV, and each element of the AV contains the SV which should be set to contain the returned data. The pure Perl equivalent is the $sth->_set_fbav($data) method, as described in the part on pure Perl drivers. DBI from 1.611 (and DBIXS_REVISION 13606) defines the sql_type_cast_svpv method which may be used to cast a string representation of a value to a more specific Perl type based on a SQL type. You should consider using this method when processing bound column data as it provides some support for the TYPE bind_col attribute which is rarely used in drivers. int sql_type_cast_svpv(pTHX_ SV *sv, int sql_type, U32 flags, void *v) sv is what you would like cast, sql_type is one of the DBI defined SQL types (e.g., SQL_INTEGER) and flags is a bitmask as follows: If set this indicates you want an error state returned if the cast cannot be performed. If set and the pv portion of the sv is cast then this will cause sv's pv to be freed up. sql_type_cast_svpv returns the following states: -2 sql_type is not handled - sv not changed -1 sv is undef, sv not changed 0 sv could not be cast cleanly and DBIstcf_STRICT was specified 1 sv could not be case cleanly and DBIstcf_STRICT was not specified 2 sv was cast ok The current implementation of sql_type_cast_svpv supports SQL_INTEGER, SQL_DOUBLE and SQL_NUMERIC. SQL_INTEGER uses sv_2iv and hence may set IV, UV or NV depending on the number. SQL_DOUBLE uses sv_2nv so may set NV and SQL_NUMERIC will set IV or UV or NV. DBIstcf_STRICT should be implemented as the StrictlyTyped attribute and DBIstcf_DISCARD_STRING implemented as the DiscardString attribute to the bind_col method and both default to off. See DBD::Oracle for an example of how this is used. This is definitely an open subject. It can be done, as demonstrated by the DBD::File driver, but it is not as simple as one might think. (Note that this topic is different from subclassing the DBI. For an example of that, see the t/subclass.t file supplied with the DBI.) The main problem is that the dbh's and sth's that your connect() and prepare() methods return are not instances of your DBD::Driver::db or DBD::Driver::st packages, they are not even derived from it. Instead they are instances of the DBI::db or DBI::st classes or a derived subclass. Thus, if you write a method mymethod() and do a $dbh->mymethod() then the autoloader will search for that method in the package DBI::db. Of course you can instead to a $dbh->func('mymethod') and that will indeed work, even if mymethod() is inherited, but not without additional work. Setting @ISA is not sufficient. The first problem is, that the connect() method has no idea of subclasses. For example, you cannot implement base class and subclass in the same file: The install_driver() method wants to do a require DBD::Driver; In particular, your subclass has to be a separate driver, from the view of DBI, and you cannot share driver handles. Of course that's not much of a problem. You should even be able to inherit the base classes connect() method. But you cannot simply overwrite the method, unless you do something like this, quoted from DBD::CSV: sub connect ($$;$$$) { my ($drh, $dbname, $user, $auth, $attr) = @_; my $this = $drh->DBD::File::dr::connect($dbname, $user, $auth, $attr); if (!exists($this->{csv_tables})) { $this->{csv_tables} = {}; } $this; } Note that we cannot do a $drh->SUPER::connect($dbname, $user, $auth, $attr); as we would usually do in a an OO environment, because $drh is an instance of DBI::dr. And note, that the connect() method of DBD::File is able to handle subclass attributes. See the description of Pure Perl drivers above. It is essential that you always call superclass method in the above manner. However, that should do. Fortunately the DBI specifications allow a simple, but still performant way of handling attributes. The idea is based on the convention that any driver uses a prefix driver_ for its private methods. Thus it's always clear whether to pass attributes to the super class or not. For example, consider this STORE() method from the DBD::CSV class: sub STORE { my ($dbh, $attr, $val) = @_; if ($attr !~ /^driver_/) { return $dbh->DBD::File::db::STORE($attr, $val); } if ($attr eq 'driver_foo') { ... } Jonathan Leffler <jleffler@us.ibm.com> (previously <jleffler@informix.com>), Jochen Wiedmann <joe@ispsoft.de>, Steffen Goeldner <sgoeldner@cpan.org>, and Tim Bunce <dbi-users@perl.org>.
http://search.cpan.org/~timb/DBI/lib/DBI/DBD.pm
CC-MAIN-2014-52
refinedweb
15,872
61.56
Sencha + Post New Thread Hello, Is it possible to make product list like office 2007 button , with rounded corners and shadow ? Thanks <script src=""></script> <script... How do I hide all grid headers? I want the column to show up but not the header. Is it possible to place an image/icon next to each option within the combobox? I looked through the threads and I didn't find any. Hi Is there a way to change the url in the address bar without affecting the browser history? YUI history manager uses the location.hash property... I currently have a grid that has the property of having the color of its cells change depending on how big of a change the value underwent. So, some... I didnt see combo.getText() in documentation (or am I wrong again?). I would like to get the Text on the field, not the value, I know I have seen... I have been playing around with the style elements for ages and I just can't seem to crack it :"> Reason for wanting it is that I want to use... Hi there, My problem is that how can i disable the particular item from the context menu the context menu code is ctxMenu = new... I am trying to send records inside a editable grid back to the server. I know I can use Ext.util.JSON.encode() to convert them into JSON format, but... Hi to all, I have a combobox like in the example: // some data used in the examples Ext.namespace('Ext.exampledata'); ... Hi All, I have got requirement like i have loaded my Ext grid with data. When i click on the perticular cell i should open... Hello, How can I enable word wrapping in a textarea thx for the help getting the url parameters or do I need to parse it myself? Hi, i have a Ext.Store with static data. To filter with one param is no problem, but how can I apply multiple filters? In API Store.filter is... I want to DragDrop TreeNode to and from a standard Div. Do I have to overwrite the default functionality of DragDrop of tree panel. Currently, I can... Currently, if you click a column header the grid gets sorted by this column. If you click again the sort order is reversed. Is there any... I checked the API of Connection/AJAX classes, but cannot find related configuration options? Can someone help me out here? Thanks. Are there plans to support other currency formats (e.g. Hello, I have created a localization tool called iL10Nz in extjs. iL10Nz allows the user to : - log in with the admin account - ...
http://www.sencha.com/forum/forumdisplay.php?5-Ext-1.x-Help-amp-Discussion/page2&order=desc
CC-MAIN-2015-18
refinedweb
446
76.32
Are you sure? This action might not be possible to undo. Are you sure you want to continue? ABCs of Dog Life Your canine care, connection, and training resource celebrated its 25th anniversary. Best Friends Animal Society 5001 Angel Canyon Road Kanab, UT 84741 Phone: 435-644-2001 Website: About This Manual The resources in this manual are mostly derived from Best Friends’ pet care library, located online at, where they can be downloaded as individual handouts. The manual is intended to be a guide for all dog lovers who want to know more about the Best Friends way to care for and train dogs. Disclaimer: Best Friends Animal Society is not responsible for any injuries to anyone using the techniques described in this manual. Any person using the techniques described here does so at his/her own risk. Best Friends’ ABCs of Dog Life Table of Contents About This Manual ............................................................................................1 About Sherry Woodard ......................................................................................7 Section 1: Training Philosophy .............................................................. 1-1 Why We Use Relationship-Based Training ................................................... 1-2 Human Expectations for Dogs ....................................................................... 1-5 A Dog’s Place in a Human Family................................................................. 1-6 Dog Training: A Glossary of Terms ............................................................... 1-7 How to Find a Good Trainer ........................................................................ 1-10 Recommended Dog Training and Care Resources ...................................... 1-12 Section 2: Getting Started ..................................................................... 2-1 How to Choose a Dog, Part 1......................................................................... 2-2 How to Choose a Dog, Part 2......................................................................... 2-4 Promises to My Dog ...................................................................................... 2-6 Preventing Problems from Day One .............................................................. 2-7 What Dogs Need to Be Happy ....................................................................... 2-9 What’s in a Name? ....................................................................................... 2-11 Dog Body Language .................................................................................... 2-12 How to Educate Your Dog ........................................................................... 2-15 Daily Activities for You and Your Dog ........................................................ 2-16 Crate Training: The Benefits for You and Your Dog.................................... 2-20 House-Training Your Dog ............................................................................ 2-22 Finding a Good Veterinarian ........................................................................ 2-24 Staying Safe Around Dogs ........................................................................... 2-25 Preventing Dog Bites on Children ............................................................... 2-27 Pets and a New Baby ................................................................................... 2-28 Small Dogs, Big Dogs: What’s Safe? .......................................................... 2-30 Introducing Dogs to Each Other .................................................................. 2-31 Introducing a Cat and a Dog ........................................................................ 2-33 Preventing Your Dog from Chasing Your Cat.............................................. 2-34 Managing a Dog with Behavior Challenges ................................................ 2-36 Best Friends’ ABCs of Dog Life Section 3: Health and Care .................................................................... 3-1 Routine Veterinary Care for Your Dog........................................................... 3-2 The Costs of Caring for a Dog ....................................................................... 3-3 Signs of Health and Sickness in Your Dog .................................................... 3-5 Spay or Neuter Your Dog ............................................................................... 3-6 Your Dog’s Diet ............................................................................................. 3-7 Obesity in Your Pet ........................................................................................ 3-9 Hazardous to Your Pet’s Health! .................................................................. 3-10 Why Dogs Itch ............................................................................................ 3-11 Flea and Heartworm Prevention for Your Pets ............................................ 3-12 Smile! Dental Care for Your Pets................................................................. 3-14 Grooming Your Pets ..................................................................................... 3-16 Cold Weather and Your Pets ........................................................................ 3-19 Hot Weather and Your Dog .......................................................................... 3-20 Keeping Your Dog Safe and Sound ............................................................. 3-21 Preventing Your Dog from Escaping ........................................................... 3-22 Fencing Options for Your Escape Artist ...................................................... 3-23 Unusual Eating Habits in Pets...................................................................... 3-25 Holiday Hazards for Pets ............................................................................. 3-26 Bloat in Dogs ............................................................................................... 3-28 Caring for Your Older Dog .......................................................................... 3-29 Living with a Diabetic Pet ........................................................................... 3-30 Living with a Deaf Dog ............................................................................... 3-32 Living with a Blind Dog ............................................................................. 3-34 Cleaning Up Pet Stains and Odors ............................................................... 3-35 The Trouble with Breeding .......................................................................... 3-36 Zoonotic Diseases in Cats and Dogs............................................................ 3-37 Section 4: Socialization, Basic Training and Enrichment ..................... 4-1 Positive Reinforcement: Training with Praise and Rewards ................................................................. 4-2 Getting the Behavior You Want from Your Dog ............................................ 4-3 Improving a Dog’s Social Skills .................................................................... 4-5 Teaching Your Dog Basic Cues ..................................................................... 4-7 Best Friends’ ABCs of Dog Life Clicker Training for You and Your Pets ......................................................... 4-9 Teaching ‘Come’ .......................................................................................... 4-11 Teaching ‘Down’ and ‘Stay’......................................................................... 4-12 Teaching ‘Leave It’ ...................................................................................... 4-14 Teaching ‘Speak’ and ‘Quiet’....................................................................... 4-15 Teaching Your Dog to Enjoy Touch ............................................................. 4-17 Helping Your Dog to Enjoy Car Rides ........................................................ 4-19 Dogs and Aggression ................................................................................... 4-21 The Look of Fear in Dogs ............................................................................ 4-23 Fun Things to Do with Your Dog................................................................. 4-24 Dog Toys ...................................................................................................... 4-26 So Your Dog Has ‘Drive’? ........................................................................... 4-28 Section 5: Puppy Care and Training ...................................................... 5-1 Neonatal Care for Orphaned Puppies ............................................................ 5-2 Puppy Development ....................................................................................... 5-5 Socializing Your Puppy.................................................................................. 5-7 Section 6: Common Behavior Challenges............................................. 6-1 Chewing and Mouthing.................................................................................. 6-2 Excessive Barking.......................................................................................... 6-3 Digging .......................................................................................................... 6-5 Preventing Jumping Up.................................................................................. 6-6 Pulling on the Leash....................................................................................... 6-7 Head Halters for Dogs ................................................................................... 6-8 Urine Marking in Dogs .................................................................................. 6-9 Submissive and Excitement Urination ........................................................ 6-10 Fear of Thunder and Other Loud Noises ..................................................... 6-11 Separation Anxiety in Dogs ......................................................................... 6-12 Section 7: More Complex Behavior Challenges ................................... 7-1 Eliminating Barrier Aggression ..................................................................... 7-2 Eliminating Collar Sensitivity........................................................................ 7-3 Meeting Fearful Dogs Safely ......................................................................... 7-4 Object Guarding and Food Aggression in Dogs ............................................ 7-5 Best Friends’ ABCs of Dog Life Using Visual Barriers with Dogs ................................................................... 7-7 Muzzles: A Tool to Keep Everyone Safe ....................................................... 7-9 When the Helpline Can’t Help ..................................................................... 7-13 Section 8: Rescue and Emergency......................................................... 8-1 Feral Dogs ...................................................................................................... 8-2 How to Trap Animals for Rescue ................................................................... 8-4 After the Rescue: What Next? ....................................................................... 8-6 How to Muzzle a Dog in an Emergency ..................................................... 8-10 Finding Your Lost Dog ............................................................................... 8-11 What to Do When Your Pet Is Hurt ............................................................ 8-14 Disaster Readiness ....................................................................................... 8-16 Disaster, Safety, and First-Aid Websites ...................................................... 8-18 Section 9: Miscellaneous Resources ...................................................... 9-1 Finding Pet-Friendly Housing........................................................................ 9-2 Giving Pets as Gifts ....................................................................................... 9-4 Finding a New Home for a Pet ...................................................................... 9-5 Coping with Return-to-Run Resistance ......................................................... 9-7 Helping Shelter Dogs to Meet Each Other Successfully ............................... 9-8 Helping Shelter Dogs Develop Life Skills ................................................. 9-10 Health and Behavior Profile ......................................................................... 9-12 Best Friends’ ABCs of Dog Life About Sherry Woodard Most of the resources in this manual were written by Sherry Woodard, Best Friends Animal Society’s resident animal behavior consultant. As an expert in animal training, behavior and care, she develops resources, provides consulting services, leads workshops and speaks nationwide to promote animal welfare. Before coming to Best Friends, Sherry, a nationally certified professional dog trainer, worked with dogs, cats, horses and a variety of other animals. She also worked in veterinary clinics, where she gained valuable experience in companion-animal medical care and dog dentistry. Sherry came to Best Friends Animal Sanctuary in 1996 as a dog caretaker. Her understanding of animals and insights into their buildings and exercise areas in Dogtown that have provided stimulating and comfortable environments for thousands of dogs over the years. Early in 2003, Sherry joined Best Friends’ No More Homeless Pets national team. Today, representatives from humane organizations and shelters across the country seek out Sherry for advice. Sherry assists individuals and shelter and rescue personnel with animal behavior, management and enrichment. She gives workshop presentations on animal care, animal behavior, training and adoptions at national conferences as well as local shelters. Sherry has been certified by the Certification Council for Professional Dog Trainers (CPDT) as a certified professional dog trainer – knowledge assessed (CPDT-KA). In March 2008, Best Friends’ ABCs of Dog Life Sherry’s Dog Behavior and Handling Workshop was approved for continuing education credit by CPDT. Sherry has written over 50 animal care, behavior, and training documents for Best Friends Animal Society Channel’s TV series called “DogTown,” which chronicles the physical and emotional rehabilitation of dogs living at Best Friends Animal Sanctuary. Sherry developed a canine behavior assessment method to help people learn what dogs need so that they can be placed safely in new homes. Sherry also created a cat assessment program for shelter adoption staff and cat rescuers to help them read cats’ body language and assess their needs. Widely regarded as an expert on animal behavior, Sherry has consulted on and assisted with the investigation of animal cases in litigation, testified in cases of cruelty and breed discrimination, and worked with law enforcement on a fatal dog attack case. 12 FEMA Emergency Management Institute courses. Sherry is a certified first-aid first-responder and an EMT. She has been a whitewater raft guide licensed in the Grand Canyon and has experience as a back- country guide and with rock climbing and swiftwater rescue. She volunteers with local animal control and is a member of the local search and rescue team. In 2007, Sherry spent six months working with Best Friends’ Great Kitty Rescue in Pahrump, Nevada, where 800 cats were discovered living in horrible conditions. To prepare these traumatized kitties for new lives as house cats, she and several colleagues developed a process for socializing fearful cats. As a result, hundreds of cats from the Pahrump compound were adopted into good homes. Sherry’s latest project is Best Friends’ Canines with Careers, a training program that is part of Best Friends’ Community Training Partners program. Sherry is helping rescue groups and shelters that want to start training and placing qualified shelter dogs in loving homes as working dogs. The dog careers will vary and could include therapy, assistance, different types of service and detection. Best Friends’ ABCs of Dog Life Section 1: Training Philosophy Best Friends’ ABCs of Dog Life 1-1 Section 1: Training Philosophy Why We Use Relationship-Based Training By Sherry Woodard The trainers at Best Friends have found that dog training built on a positive relationship is the most kind – and also the most effective – method of training. When you have a positive relationship with the dog, you have the animal’s trust, and he/she wants to spend time with you and: • The animal’s immediate needs come first. Is the animal injured, ill, fearful, frustrated, hungry, thirsty, needing to eliminate? Put off training until the animal’s needs have been met and he/she can concentrate on the training exercise. • Learn to interpret animals’ body language. There are telltale signs that let you know how the animal is feeling – whether it’s joy, anger, fear, frustration or some other emotion. Understanding body language improves communication between people and animals, and helps keep both animals and people safe. • Find out what motivates the animal (affection, treats) and use it to your advantage. 1-2 •. • punBest Friends’ ABCs of Dog Life Section 1: Training Philosophy • • • • ishment: • Dominance and physical force: – Pushing a dog into a sit or down position – Alpha rolls – Physical punishment (hitting, kicking, slapping, hanging, finger jabs) • Leash corrections • Harsh tones, verbal reprimands •. 1-3. Best Friends’ ABCs of Dog Life Section 1: Training Philosophy Helpful Resources If you want to know more about positive, relationship-based training, here are some resources that I recommend: Before You Get Your Puppy and After You Get Your Puppy by Dr. Ian Dunbar Dunbar, a veterinarian and animal behaviorist, covers what he calls the “developmental deadlines” to meet before and after you get your puppy.. Also, check out the many resources listed under “Behavior and Training” in the section of the Best Friends website called You and Your Pets: dogs.cfm Helpful Articles Using punishment: “I’ll Teach You a Thing or Two! The Unwanted Teachings of Punishment” “Let Me Teach You a Thing or Two! The Unwanted Teachings of Negative Reinforcement” The American Veterinary Society of Animal Behavior has several position statements that reflect the society’s opinion on topics such as dominance and the use of punishment: (click on Position Statements) Using shock collars: Letter from Dr. Karen Overall joelwalton.com/shockcollars.html “The Problem with Shock” “Vets on Behavior Proclaim, Never Use Shock Collar”. asp?ID=147 Studies: “Dog Training Methods: Their Use, Effectiveness and Interaction with Behavior and Welfare” art_training_methods.pdf “You Can Cross Over, But You Can’t Cross Back” “If You’re Aggressive, Your Dog Will Be Too, Says Veterinary Study” 090217141540.htm 1-4 Best Friends’ ABCs of Dog Life Section 1: Training Philosophy Human Expectations for Dogs By Sherry Woodard What are some expectations we have of dogs? We expect dogs to be: • Well-socialized: comfortable with all types of people, places, and things • Comfortable with all types of handling by all types of people • Friendly with all other dogs and all other animals • Other: ________________________________ It should be fine to: • Have anyone run toward a dog • Ride a bike past a dog • Throw a stick near a dog • Have children playing – yelling, wrestling, play fighting – near a dog • Leave a dog tied outside a store while you are shopping • Other: _______________________________ But, not all dogs can meet these expectations. Why not? • Shy dogs can become more comfortable in some situations, but they may not become comfortable in all types of situations. • Some dogs are born genetically unstable. Shy dogs need our help to live in society. You can help these dogs to: • Have more relaxed relationships with people • Become more comfortable with handling • Improve their social skills and manners Special homes can be found for most dogs who lack good social skills. You can help by: • Screening potential homes carefully to find the right match • Counseling the adopters on management and training of their dog, so the dog will have a home for life • Doing follow-up to create and maintain a relationship with the adopters Remember: You can make a difference! Best Friends’ ABCs of Dog Life 1-5 Section 1: Training Philosophy A Dog’s Place in a Human Family By Sherry Woodard What does your dog expect from you? Most dogs need and want a leader. Dogs are social animals and like being part of a group, but every group must have a leader to prevent chaos. For your dog to feel relaxed, he needs to know that someone is in charge. If you don’t take on the role of leader, your dog may feel that he has to fill the position. But, your dog may not be the best leader – he may not make the best decisions for your family! As your dog’s leader, then, you are responsible for managing the following aspects of your dog’s life: Safety. You should make sure that your dog is contained – that she doesn’t run loose and she’s on lead when necessary. You provide her with I.D. on her collar and a registered microchip. You make sure that your home environment is safe for her. Social skills. You must manage his behavior at all times. If your dog has behavior issues such as aggressive tendencies toward other dogs or irritability around small children, work with him and manage his behavior so that he doesn’t get into trouble. Well-socialized dogs are able to go many places; they are comfortable in most situations. Manners. Training is among your leadership duties. You must teach your dog basic cues and basic manners. Well-mannered dogs are much more welcome by other humans than badly mannered dogs. Medical concerns. You are responsible for managing your dog’s health. He cannot tell you if he is due for vaccines or if he needs to have blood work done because he is getting older. Keeping order. In your home, it is your job to keep your dog from being destructive. If she is getting into the trash when you’re not home, 1-6 Best Friends’ ABCs of Dog Life move the trash can or put a lid on it. If she is chewing the children’s toys and shoes, teach them to pick things up and put them away, and give the dog some of her own things to chew. As a kind leader, you will gently teach your dog the things she needs to know to be comfortable in our human world. Don’t expect her to somehow magically know how to live in a human family. (She is a dog, after all!) She will love being a valued family member, but she will still be a dog and will look to you for guidance. Section 1: Training Philosophy Dog Training: A Glossary of Terms The Four Stages of Learning Acquisition: The dog understands that the cue is a request for a behavior, understands what that behavior is, and is able to produce the behavior. Fluency: The dog produces the cued behavior regularly and quickly. He no longer has to struggle to think through what to do when he is asked. Generalization: The dog learns that the cue and the behavior remain the same in a variety of locations, for a variety of people, and in spite of a variety of imprecise cues (for example, the handler may wear different clothes, give the cue from a sitting instead of a standing position, speak the cue loudly or softly). Maintenance: The behavior is practiced frequently enough to prevent a decrease in proficiency or potential extinction. (If the cue isn’t practiced, the dog will forget what behavior is expected from the cue.) Operant conditioning/learning: The process by which behavior changes occur related to the outcome of chosen behaviors. Behaviors that result in positive outcomes are likely to increase or remain the same. Behaviors that produce negative or unproductive outcomes are likely to decrease. There are four categories of outcomes that can affect learning: positive reinforcement, negative reinforcement, positive punishment, and negative punishment. Positive and negative reinforcement support or strengthen the behavior. Positive and negative punishment discourage or weaken the behavior. Classical conditioning: Associations formed between paired events that are not dependent upon choice. In Pavlov’s famous example, the natural salivation that occurs when dogs are presented with food became associated with the Best Friends’ ABCs of Dog Life sound of a bell that was rung when food was being served. The result of this pairing was that the sound of the bell produced salivation even when no food was present. Reinforcement Reinforcement: In training, reinforcement can be positive or negative. Reinforcement always supports or strengthens a behavior and increases the likelihood of it occurring. Positive reinforcement: In training, “positive” means “added to.” If you give a dog a treat when he sits, you have added something reinforcing (the treat) to the outcome of the behavior. Negative reinforcement: In training, “negative” means “removed from” or “taken away.” A human example would be if you discovered that pushing a button on your phone stopped the Muzak when you were on hold. Pushing the button would be negative reinforcement because something unpleasant was removed from the situation. Premack Principle: In behavioral psychology, the Premack Principle states that a desirable behavior can be used to reinforce a less desirable one. This is commonly referred to as Grandma’s rule: “After you eat your vegetables, you can have ice cream.” Unconditioned reinforcer: Also called a primary or natural reinforcer, these are things that are valuable or desired in themselves (e.g., food, water, play, affection). These are not the same for all individuals or even the same individual at all times. Examples: A shy dog may experience an affectionate pat as punishment. After a Thanksgiving meal, we may find the thought of more food unpleasant. 1-7 Section 1: Training Philosophy Conditioned reinforcer: A neutral stimulus that has become reinforcing by pairing it with a natural or existing reinforcer. The bell in Pavlov’s experiment or a whistle in dolphin training are neutral until they become associated with the dog’s food and fish, respectively. Other Useful Definitions Capturing: Rewarding a behavior that occurs spontaneously. Most training involves behaviors that occur naturally, and we reinforce them to suit our own purposes. Dogs already sit, lie down, wag their tails and raise their paws before we begin to work with them. Chaining: Teaching multiple simple behaviors in sequence to produce a more complicated behavior. One simple example is teaching a dog to ask for a walk by teaching him to hold his leash, then to carry the leash, and then to carry it to the door and sit. A more complicated example would be teaching a dog to run an agility course. Counter-conditioning: A method of changing a response to a “trigger” or stimuli, usually by introducing a positive element into the situation. For example, a dog who lunges at a stranger across a fence can be conditioned to like the approach of a stranger by setting up training sessions in which the stranger tosses a high-value treat to the dog each time he approaches. Counter-cueing: Cueing a well-established behavior that is incompatible with an unwanted behavior. An example is cueing a “sit” when a dog is jumping up. If the “sit” produces a more positive outcome, it can replace the jumping behavior. Cue: Anything that serves as a signal to request a specific behavior. A cue is a way of asking for a response from a dog. (The terms “command” and “order” are misleading because they do not compel a behavior to occur. The dog still has the power to choose his response.) Desensitization: The process of presenting a weak version of a problem stimulus at a level and duration that does not produce a negative reaction and gradually increasing the intensity as the dog’s comfort level grows. An example is playing recordings of the sounds of thunderstorms at low volume, to begin desensitizing a dog to thunderstorms. Punishment Punishment, which can also be positive or negative (meaning that something is added or something is taken away), is a consequence that causes a behavior to be less likely to occur in the future. For punishment to be effective, it must be precisely timed, immediately and consistently presented, and of sufficient intensity relative to the appeal of the behavior and its normal outcome. Positive punishment: The introduction of an unpleasant element as a consequence of an unwanted behavior. Examples: A dog is pulling on the leash and a leash correction (sharp jerk of the leash) is given. A dog nears the edge of the yard and an “invisible fence” causes a shock through his collar. Negative punishment: The removal of a desirable element as a consequence of an unwanted behavior. An example is leaving the area when a dog is being jumpy or mouthy. The desirable element that you are removing is your attention and interaction with the dog. Conditioned punisher: A neutral stimulus that takes on an unpleasant connotation. For example, if you say “time out” right before you put a dog in a time-out (a crate or spare room), the sound of the words alone can become associated in the dog’s mind with the consequence and may decrease the behavior. Remote punisher: An unpleasant consequence that can be employed without your presence. Automatic bark collars, flappers on a counter top, and bitter-tasting substances applied to discourage chewing are examples of remote punishers. 1-8 Best Friends’ ABCs of Dog Life Section 1: Training Philosophy Displacement behaviors: Behaviors that are performed out of their normal context. An anxious dog may yawn, stretch or drink water, even though she is neither tired nor thirsty. Ethology: The study of animal behavior, which includes human behavior. It is often used when referring to natural behaviors in an evolutionary context. Extinction: In operant conditioning, extinction refers to the elimination of a behavior that fails to produce desirable results. Ignoring a behavior such as pawing or jumping can lead to extinction of that behavior. Unlike the biological extinction of a species, however, an “extinct” behavior can reappear if it once again produces successful results. Flooding: In contrast to desensitization, flooding is a behavioral technique that involves exposure to an aversive stimulus at full intensity until habituation occurs (i.e., the animal no longer reacts to the stimulus). There is debate about the use of this technique, but it is not operant conditioning. The subject must endure the aversive stimulus until it is removed; there is no behavior the dog can choose that will make it go away. Head halter: Inspired by the lessons learned with larger, more powerful animals like horses. A head halter can reduce the amount of physical effort required to manage a strong dog. Head halters are sometimes mistaken for muzzles, but they aren’t muzzles. Head halters do not restrict a dog’s ability to bite. Jackpot: Giving a large reward – lots of treats, tons of praise – when there is a breakthrough in training. Lure training: Using a high-value “lure,” such as treats or toys, to produce a behavior that can then be rewarded. Physical prompts: An outmoded technique that involves using physical force to produce a behavior. Examples are pushing a dog down into a sit or reeling in a dog to make him come. Shaping: Similar to chaining, except the “simple behaviors” are small steps toward what is often considered a single behavior. For example, getting a dog to respond to a “down” cue may be shaped by luring and rewarding “head lowering,” then “elbow bending,” then “body on the floor.” Best Friends’ ABCs of Dog Life 1-9 Section 1: Training Philosophy How to Find a Good Trainer By Sherry Woodard. Positive training methods have lasting beneficial effects. When you have a positive relationship with the dog, you have the animal’s trust, and he/she wants to spend time with you and work with you. Training based on punishment or dominance negates any sort of positive relationship you might develop with the animal. For more details, see “Why We Use Relationship-Based Training” in this section. selftaught through experience. Also, the best trainers keep themselves well-informed about new training methods and theories. What training methods do you use? You want to find a trainer who uses humane. 1-10 Best Friends’ ABCs of Dog Life Section 1: Training Philosophy www. ccpdt.org, the website for the Certification Council for Professional Dog Trainers. You can also find a trainer through the Association of Pet Dog Trainers (); choose a trainer who is a professional member of AP. Best Friends’ ABCs of Dog Life 1-11 Section 1: Training Philosophy Recommended Dog Training and Care Resources By Sherry Woodard Books housetraining.. Excel-Erated Learning: Explaining How Dogs Learn and How Best to Teach Them by Pamela Reid Using a relaxed writing style and numerous examples, psychologist Pamela Reid introduces cutting-edge scientific techniques to use in dog training. Periodicals The. You can subscribe by calling 800-829-5116. For more information, go to. 1-12 Best Friends’ ABCs of Dog Life Section 1: Training Philosophy Videos Unleash Your Dog’s Potential: Getting in TTouch with Your Canine Friend The TTouch method helps you achieve a relationship with your pet based on appreciation and friendship, rather than on dominance and submission. There are several videos for dog people. Call 800-797-PETS or visit www. animalambassadors.com (click on “Store”). Puppy Love: Raise Your Dog the Clicker Way with Karen Pryor This video shows you how to use a clicker to train your dog. (See also Don’t Shoot the Dog! by Karen Pryor in the book section.) Available at. Clicker Fun Series with Deborah Jones This series of three videos shows you how to use clicker-based methods to change your dog’s behavior. Each video comes with a clicker. Available on the Canine Training Systems website:. com/products.php. DirectStop citronella spray is a humane way to prevent or stop dog fights. Available at pet supply stores or at. Pet Corrector training spray (produced by the Company of Animals) emits a blast of compressed air, which interrupts undesirable behaviors. Reward the dog immediately after the behavior has stopped. Available at pet supply stores. Soothing Your Dog Dog-appeasing pheromone (DAP) is a spray/ plug-in that provides an effective way to control and manage unwanted canine behavior associated with fear and/or stress. Available at Doctors Foster and Smith:. Bach Flower Remedies () and BlackWing Farms flower essences (www. blackwingfarms.com) can soothe your dog during times of stress. Products Controlling Your Dog The Halti head halter is an effective alternative to the choke collar, enforcing the simple principle that a dog’s body will follow where his head leads him. Available at pet supply stores. The Gentle Leader Headcollar is another product that helps you to control your dog humanely. For details, visit. A martingale or limited-slip collar offers greater control without the danger of choking. Available at pet supply stores or at or. A front-clip harness is another option. Check out these harnesses: the Halti from the Company of Animals (), Premier’s Easy Walk harness () and the SENSE-ation harness from Softtouch Concepts (). Best Friends’ ABCs of Dog Life Kongs come in various sizes and designs. Great fun for both you and your dog! 1-13 Section 1: Training Philosophy Toys All of the following are available at pet supply stores. Kongs are durable rubber enrichment toys that can provide you and your dog with hours of fun. For more information, visit their website at. Nylabone makes a variety of chew toys and interactive toys for dogs. Check out their products at. Dispensing toys are great for mental stimulation. You hide treats in the toy and the dog has to figure out how to get the treats out. Try a Treat Stik (), Busy Dog Ball () or Buster Cube (www. bustercube.com). Cleaning Products Nature’s Miracle and Simple Solution are two products containing natural enzymes that tackle tough stains and odors and remove them permanently. Available at pet supply stores. OdoBan is an odor eliminator that cleans, disinfects, sanitizes and deodorizes. For more information, go to. Treat-dispensing toys can engage the dog’s mind as well as his body. Be sure to use a size appropriate to the dog. Food Canine Caviar is the all-natural dog food that we use at Best Friends. For more information, visit. 1-14 Best Friends’ ABCs of Dog Life Section 2: Getting Started Section 2: Getting Started Best Friends’ ABCs of Dog Life 2-1 Section 2: Getting Started How to Choose a Dog, Part 1 By, daycare, boarding, grooming, dog walker, possible additional medical costs, such as medication)? • Are my emotional expectations realistic? (A dog is not a furry little person.) • Will she be living in the house as a valued family member? (Dogs should not live outside.) he’ll be when he grows up.. But, keep in mind that some purebred dogs don’t have the breed characteristics that are expected in their breed.ahas can have heart problems and hypoglycemia. 2-2 Where should I get my dog? There are many wonderful dogs (including purebreds) at your local shelter. Statistics show that 25 percent of dogs in shelters are purebred animals. When you choose one of these dogs, you often get the added bonus of knowing that you have saved a life. Please don’t buy an animal from a pet store or Best Friends’ ABCs of Dog Life Section 2: Getting Started Some questions to ask to determine if you are dealing with a responsible breeder: • Can you visit their facility and see all their dogs? (If so, is the facility clean and airy? Do the dogs seem healthy and happy? Are the dogs very social with you even though you’re a stranger?) • Are they knowledgeable about the breed they are selling? • Have they tested their breeding dogs for genetic problems? • Do they show their dogs? (The best breeders are serious about their breed and want to show quality dogs who exhibit the best of the breed’s standards, and who are healthy and well cared for.) • Do they belong to breed clubs? (Belonging to breed clubs also shows commitment to the quality of the dogs.) • Do they breed more than one breed of dog? (If so, breeding for profit may be their main motivation.)”). If you feel that you are ready for a lifetime commitment to a dog, do your homework and ask lots of questions. If you ever have problems with your dog’s health, training or behavior, get professional help from a veterinarian, trainer or behaviorist. from a website. If you do, you will most likely be supporting puppy mills (“factory farms” for dogs). Most pet stores buy from puppy mills and “backyard breeders” – people who are just in it for the money and often don’t care about the health or well-being of the dogs. Many puppy mill breeders sell their dogs over the Internet. If you decide to purchase a purebred dog from a breeder, do some research and choose a reputable breeder. All dog breeders are not alike – the top-quality breeders work hard to produce genetically healthy, emotionally sound puppies. They have an interest in ensuring that each puppy has a happy life. Good breeders have a return policy if the puppy turns out to be unhealthy; they offer support if you have questions or concerns. Some spay or neuter all their puppies (or co-own them until they are neutered) to ensure that careless breeding will not occur. Best Friends’ ABCs of Dog Life 2-3 Section 2: Getting Started How to Choose a Dog, Part 2 By Sherry Woodard So, you’ve decided that you’re going to get a dog. How do you choose a dog who will be a good fit for you and your lifestyle? First, consider what you will want this dog to be doing in daily life. Will the dog be: • Playing with children? • Living with cats? • Living with or playing with other dogs? • Going to dog parks or doggie daycare? • Learning to compete in dog sports such as agility or flyball? • Going running or hiking with you? Not every dog can or will be appropriate for all of these things. Choose a dog whom you will be ready to learn and grow with. Before going to meet a potential canine candidate, read “Dog Body Language” (in this section), give 2-4. Best Friends’ ABCs of Dog Life Section 2: Getting Started manual this manual, you can help to set a dog up for great success as a member of your family for life. Remember, you will be responsible for this dog’s behavior wherever he goes and with whomever he meets. Keep him happy, healthy and safe. Best Friends’ ABCs of Dog Life 2-5 Section 2: Getting Started Promises your dog: 1. I promise to have realistic expectations of the role my dog will play in my life. I will remember that she is a dog, not a furry little human; she cannot satisfy all my emotional needs. 2. I promise to protect my dog from dangers, such as traffic and other creatures who might want to hurt her. 3. I promise to keep her well dressed with a collar containing up-to-date I.D. 4. I promise to learn kind and gentle training methods so that she can understand what I am trying to say. 5. I promise to be consistent with my training, since dogs feel secure when daily life is predictable, with fair rules and structure. 6. I promise to match her loyalty and patience with my own. 7. I promise that my dog will be part of my family. I will make a commitment to schedule time every day to interact with her so that she will feel loved and will not develop behavior problems from a lack of stimulation and socialization. 8. I promise to seek professional help if my dog develops behavior problems that become unmanageable. 9. I promise that my dog will have opportunities to exercise and honor some of her instincts. She’ll have walks and runs outside of her daily territory, so she can sniff and explore. 10. I promise to provide veterinary care for her entire life. I will keep her healthy and watch her weight. 11. I promise that if I move, marry, have a baby, or get divorced, she will continue to share my life, since she is a beloved family member. 12. I promise that if I absolutely must give her up, I will find an appropriate home for her that is as good as or better than my home. 2-6 Best Friends’ ABCs of Dog Life Section 2: Getting Started Preventing Problems from Day One By Sherry Woodard Before you bring your new dog home, there are a number of ways that you can prepare for the new addition to your family. First,in yard or an approved, fenced off-lead area. Always use a leash or lead near traffic, since your dog can be distracted or fearful for just a second and run into the street. this is your first dog), you will also benefit from the training classes. Your dog needs you to be the leader. If you don’t function as the leader, your dog. Strive for structure and consistency in your dog’s daily routine to give him a healthy feeling of stability as a member of the family. The relationship between your family and your new What does my new dog need? To be happy and healthy, your dog will need the following: • Constant access to a bowl of fresh, clean drinking water • A nutritionally balanced diet • A safe place to eliminate outside (if she’s not being litter-trained) •. If you haven’t had any experience with the role of leader (i.e., Best Friends’ ABCs of Dog Life 2-7 Section 2: Getting Started squeeze through? Is there anything that he can climb on that would allow him to escape over the fence (e.g., a wood pile, a fountain, latticework)?cans have tight lids – to avoid “dumpster diving” by your dog. Besides the smelly mess that an overturned trashcan. Do I need to dog-proof my house? Before your new dog arrives, you should dogproof 2-8 Best Friends’ ABCs of Dog Life Section 2: Getting Started What Dogs Need to Be Happy By Sherry Woodard Most dogs are loving, intelligent, and loyal. They want nothing more than to be members of a family. They give unconditional love, but they need love, attention, and kindness in return. In this fast-paced world, we all have so much to do that a dog’s needs can be easily forgotten. Some dog owners may not even realize how much attention a dog needs for him or her to live a happy life. This story illustrates how this “benign neglect” can happen: One day, the family came home and Cowboy was gone. They found a hole that Cowboy had dug under the fence. His family walked the streets near their home, calling his name. They found him at the park – the boys used to play with him there when he was small. Cowboy ran to them when he saw them; they were so glad to see him that they hugged him and walked him home. But then, after a few days, Cowboy escaped again. This time, the family decided that for Cowboy’s safety, they should tie him on a chain so that he could not dig out again. As the weeks passed, Cowboy waited in vain for the boys to come out and play with him. He started barking, sometimes for hours, trying to relieve his boredom and loneliness. When the boys came out to feed and water him, Cowboy naturally became very excited. He would leap and jump at the end of his chain. The boys didn’t let him off his chain very much, since he was hard to catch when it was time to put the chain back on. ---------------------------Unfortunately, this story is true for many dogs. In most communities, there are dogs living through each day alone in a backyard, some on chains. Now, all people would agree that intentional physical abuse of animals is a terrible thing. Yet, the isolation and neglect that Cowboy suffered, however unintentionally, is also a form of abuse. Dogs are social animals – one of their most basic needs is to spend time with other creatures. 2-9 Cowboy’s Story Cowboy is a border collie mix. When he was brought home as a puppy from a local shelter, his adoptive family thought the world of him. The boys spent hours playing in the yard with Cowboy, and every night he climbed into bed with one of the kids. In the beginning, it seemed like there wasn’t enough of Cowboy to go around – he was very much a part of the family. Slowly, however, things began to change. As Cowboy grew into an adult dog, he started losing his puppy charm. The family started feeling that he required too much attention. He had never had training, and the antics that were cute when he was a puppy were now annoying. He had never been taught the difference between appropriate and rough play, so the boys avoided playing with him. His uncontrolled exuberance in the house caused him to break things. When he scratched a visiting child, he was exiled to the backyard from that day on. The family bought Cowboy a nice doghouse and new, bigger bowls for food and water. The boys were assigned the job of feeding Cowboy and keeping his water bowl filled. As the days passed, however, the boys stopped giving Cowboy daily meals. They just filled his big bowl every two days; his water was often dirty and warm. Best Friends’ ABCs of Dog Life Section 2: Getting Started Dogs who are left alone most of the time are being asked to go against their basic nature, and that’s too much to ask of a dog. Because there are no laws that require love and attention be given to animals, no one can demand that dogs like Cowboy be treated differently. Often, the dog’s distress gets worse over time. The neighbors start complaining about the incessant barking. The family starts yelling at the dog to get him to stop. Whenever anyone does spend time with him, the dog is unruly and overexcited, so they avoid him even more. Chaining a dog as a form of long-term containment is often damaging to his health and disposition. Out of sheer frustration, many dogs run for hours every day in the circle allowed by the chain. They run through their own waste, and flies are attracted by the smell and may begin to eat away at the dog’s ear tips until they are raw and sore. If a chained dog is released by his family for exercise, he often will refuse to come when called, since he’s so reluctant to be chained up again. The family may see this as disobedience, so the dog is put back on the chain and is let off less and less. Some chained dogs will begin to exhibit aggression, and some lose the ability to interact with other dogs. What happened to Cowboy? Cowboy was one of the fortunate ones. He came here to Best Friends because his family thought he was too much of a nuisance. At first, he only walked and ran in circles – he had been on his chain for almost a year. He loved people but could not focus. He would stop for a toy or treat and then begin to circle again. As the months passed, however, his circles became bigger and bigger. Eventually, he was adopted into a good new home. We have kept in touch with his new family and they say, “He is the world’s greatest dog!” We hope Cowboy’s story can help to change the lives of other dogs like him. 2-10 Best Friends’ ABCs of Dog Life Section 2: Getting Started What’s in a Name? By Sherry Woodard Teaching name recognition is a great way to start a personal relationship with a dog. When I work with a dog, I teach her to respond enthusiastically to me by calling her by name in a happy tone of voice. A dog’s name should be a good thing for her to hear. Even shelter dogs should be given names and be taught to respond to them. What is the hidden value in a dog loving her name? • Your dog will run – not walk – to you when she hears her name. • You can use her name to interrupt and distract her from any behavior (e.g., barking, chewing inappropriate items) that you want to stop. Remember to keep your tone happy – you don’t want the dog to associate her name with a reprimand. • You can use her name and the positive associations she has with it to help her become more comfortable in scary situations. For example, you can say her name and consequently have her focus on you when walking by something that makes her fearful or anxious. If she is relaxed and distracted until you pass the scary situation, she will realize that it wasn’t as frightening as in the past. • If your dog knows her name and has good recall, you can call her away from a potentially dangerous situation. To teach name recognition, pack a treat pouch with about a hundred pea-sized soft treats. Take the dog somewhere with few distractions. I tether the dog to me, a doorknob or a chair leg so she won’t wander off. Have a treat in your hand ready and when she looks away from you, say her name and give her the treat. Interact with her briefly, then wait for her to look away again and repeat. Do this over and over; to keep it fun, always use a happy tone. Once you have practiced in locations with few distractions, start practicing in locations with more distractions. Then, add other people to the game of learning. Start with the exercise described above: Have a friend stand near the dog and instruct him/her to wait until the dog is not looking and then have your friend call the dog’s name and give her a treat. Next, stand a short distance from your friend and alternate calling the dog’s. What should you name your dog? Most people try a variety of names before settling on one; some dogs have first, middle and last names. I knew a dog with a long Russian name. Most long names chosen are eventually shortened or replaced by nicknames. I think the important part of choosing a name is that the dog learns that it is his name. Some people worry about changing a dog’s name after adoption: Will the dog be confused? Will it be difficult to teach him a new name? I haven’t found it to be a problem. Dogs generally respond just fine to name changes or nicknames if the names are properly taught and maintained as positive associations. Every socialized dog will want to come when called, looking forward to spending time with humans because humans can be best friends to dogs. Best Friends’ ABCs of Dog Life 2-11 Section 2: Getting Started Dog Body Language By Sherry Woodard Just like people, dogs communicate using “body language.” Your dog is communicating with his entire body, not just his tail or his voice. You’ll need to learn to read your particular dog’s body language if you want to know how your dog is feeling. To get a sense of what your dog is trying to tell you, spend as much time as you can observing your dog and his body posture. – he may be about to make a bad decision. • A loose wag – not really high or really low – normally means “I am comfortable and friend2-12 ly.” But, you should keep watching the dog’s entire body: Some dogs have a large personalspace requirement. They will tell you if you get too close. Freeze. A dog freezes if she is scared or guarding, or feels cornered. She may bite, so please slow down., uncomfortable with something. Signs of Stress When a dog is stressed, he often shows displacement behavior – any of a variety of activities that seem inappropriate in the situation they are seen in. These behaviors occur most often during times of emotional conflict. For example, a dog starts self-grooming when he’s afraid and faces the decision to fight or run away; grooming is an odd response to a “flight or fight” situation. Displacement behavior can be the dog’s attempt to calm himself. Here are some typical displacement behaviors: • Yawning in new or emotional situations • Panting when it’s not hot • Scratching himself when he’s not itchy Best Friends’ ABCs of Dog Life Section 2: Getting Started Far left: If the tail and mouth are loose, the dog is probably comfortable and asking for a belly rub. Left: Tail tucked, body stiff, looking away: indicates fear and discomfort. • Lifting a front paw as someone walks toward the dog • Licking his lips, even though the dog hasn’t been eating or drinking • Looking away as a person or another animal walks toward the dog • Shaking off after someone handles the dog or another dog plays too roughly • Stretching out as though doing a play bow, but not asking for play (sometimes a greeting when a dog is stressed) • Making a puff (exhale) of breath, sometimes whining at the same time, and looking away or turning away • Lying down and trying to make whatever is happening stop by not taking part in it There is stress along with fear when a dog:, though not all dogs move away from things they fear (Many people punish dogs for growling, which takes away a valuable form of communication) Best Friends’ ABCs of Dog Life • Starts to curl her lips (Sometimes this is all the warning a dog will give before biting) • Starts to show his teeth (Again, the warning before biting can be brief, so try to remember every detail of what triggered the behavior so you can work on improving or at least managing it) Diffusing the Stress-Inducing Situation If you notice that a dog appears stressed, stop whatever you are doing and try to determine what the dog is reacting to. You want to help the dog become more comfortable to become more comfortable in general, in order to keep them safe and to keep us safe. For more details, see “Managing a Dog with Behavior Challenges,” in this section, and the resources in Section 4 of this manual. 2-13 Section 2: Getting Started Left: Yawning may be displacement behavior. Middle: Ears back and whites of eyes showing indicate that this dog is unsure or fearful. Right: Running with teeth showing could mean several things. If you don’t know the dog, you will learn more shortly. Above: Bunny shows fear by looking away and lowering her body to appear smaller. Above left: Bunny’s body language indicates that she is uncomfortable with being touched while she’s eating. Left: Bunny learns to practice trades with pig ears. She is more comfortable now. 2-14 Best Friends’ ABCs of Dog Life Section 2: Getting Started How to Educate Your Dog By Sherry Woodard Dogs need guidance and consistent training from their people if they are going to live in harmony with humans. All dogs must be taught acceptable behavior, and one way to do that is to train your dog or pay a trainer to do it. Dogs are happiest when they know who’s in charge and what’s expected of them. When you are looking for an obedience class or a trainer, shop around and ask questions. You will want to find a trainer who uses humane methods, someone who uses positive reinforcement rather than punishment. Ask if you can watch the trainer give a class and speak with people who are currently taking a class. If the trainer says or does anything that you are uncomfortable with, you may want to look elsewhere. With positive reinforcement – treats, rewards like ball-playing, and praise – training can be fun for all involved. If you develop a loving, fun relationship with your dog, she will enjoy the time spent learning. You should be integrally involved in your dog’s training. The trainer should also be training you, so that you understand how to practice with your dog what she has learned. Training your dog doesn’t end after the class is over; you will need to practice cues with your dog throughout her life. Your dog should be taught helpful cues such as come, sit, wait, down, stay, leave it, and drop it. Consistent training can produce a dog who will walk nicely on lead, which makes outings a lot more enjoyable. Your dog can learn to give greetings by politely sitting (instead of jumping up) when meeting new people. Though training is a good thing, keep in mind that dogs still need to behave like dogs. They need to play, run, dig, and chew. These are Best Friends’ ABCs of Dog Life 2-15 natural behaviors that can happen in appropriate ways and places: • Make sure your dog gets plenty of running and playing outside the house; that way, she will be less inclined to be rambunctious inside the house. • Provide a dirt box out in the backyard for your dog to dig in. You can bury a variety of toys in the box to encourage him to dig there (instead of in your flower beds). • Supply your dog with a variety of appropriate things to chew on – some examples are frozen carrots, Kongs stuffed with peanut butter or treats, Red Barn bullies, rawhide chips, and Nylabones. You also need to socialize your dog – to get him accustomed to behaving acceptably in public, and comfortable with meeting new people and other dogs. If your dog is properly socialized, he will enjoy meeting other animals and will be able to safely interact with them. A socialized, emotionally healthy dog allows handling of every part of his body, not only by you, but also by the veterinarian and the groomer. If at any point, your dog’s training doesn’t seem to be working or his behavior is problematic, please seek help before becoming frustrated with him. Try to remember that he needs continuing education throughout his life. Some problems are easy to fix by going back to basic training and practicing cues consistently. For more complex issues, you may want to consult your veterinarian. If the cause is not medical, your veterinarian may recommend a behaviorist, who can do an in-depth assessment and develop a plan for behavior modification and long-term management of the problem. Section 2: Getting Started Daily Activities for You and Your Dog By Sherry Woodard If you want a well-trained, well-mannered, wellsocialized dog, interact multiple times every day with your dog, with the goal of building a foundation of trust and a healthy relationship with your dog. (See “Why We Use RelationshipBased Training,” Section 1.) Things to Teach and Practice Daily 2-16 Best Friends’ ABCs of Dog Life Section 2: Getting Started relax and enjoy touch, I do the massage in a quiet room without a lot of human or non-human traffic. If your dog does not allow touch, please read “Teaching Your Dog to Enjoy Best Friends’ ABCs of Dog Life 2-17 Section 2: Getting Started 2-18. Best Friends’ ABCs of Dog Life Section 2: Getting Started. Providing medical and dental care. All dogs need regular medical and dental care. They need a family doctor just like us – one we trust to oversee their general health. Routine visits allow your doctor to see changes through examinations, blood tests and x-rays. Different parts of the country have different parasites, for example; your veterinarian will be able to keep your dog safe in your area. Please report any change in behavior to your family veterinarian. Often, changes in behavior are related to changes in the dog’s physical health. Best Friends’ ABCs of Dog Life 2-19 Section 2: Getting Started Crate Training: The Benefits for You and Your Dog By Sherry Woodard Why should I use a crate? Dogs are hard-wired by their genetic history to be den animals. A den is a small, safe, welldefined. 2-20 Best Friends’ ABCs of Dog Life Section 2: Getting Started. Best Friends’ ABCs of Dog Life 2-21 Section 2: Getting Started House-Training Your Dog By Sherry Woodard. urinate). I carry feces to the desired location as well. During this training process, keep the urine on the sponge and feces fresh so the dog gets the idea, but don’t allow the area to become too “messy” because some dogs will avoid the spot if they feel they may step in feces and/or urine. How do I house-train my dog? First, during those times when you cannot supervise him, it is wise to restrict the movement of a new animal during the house-training phase. You can house-train your dog by using a crate. Or, for limited periods of time, you can confine the dog to a small, easy-to-clean room, like the bathroom, equipped with a child gate. Under supervision, of course, he can have the run of the house. Your dog should consider this space a safe place, so add the dog’s bed, water and things to chew on to create a comfortable den. The dog should be fed in this space as well.. I recommend the use of sponge pads to help clearly communicate where you want your dog or puppy to eliminate. I place the sponge – containing urine from cleaning up their urine outside – in the spot where I want the dog to go daily. If you hang the sponge, many dogs will see it as a place to mark (i.e., lift a leg and What do I need to know about house Sponge pad 2-22 Best Friends’ ABCs of Dog Life Section 2: Getting Started eliminate on paper or in a litter box, may have a lifelong surface preference – that is, even as an adult, he may eliminate on paper if it is lying around the house. Having a puppy eliminate in the house will prolong the process of teaching him to eliminate outdoors. If you do decide to change a paper-trained dog to an outside-eliminating dog, move the paper closer day by day to the door. If your dog continues to eliminate on the spot where the paper was originally placed, slow down on how far you are moving the paper each day. Keep some paper (or a pad) just inside the door and after the dog uses it, move it outside. Leave the paper or pad close to the door outside at first, and gradually move it until the dog is eliminating outside in the designated spot. The next step is to make the size of the paper or pad gradually smaller until it no longer exists. While employing this step-by-step process, take your dog often to the outside place where you want her to eliminate. Put a used paper or pad there every day to help make quick progress. If you don’t have a doggie door, remember that your dog will rely on you to provide access to the outdoors multiple times per day. to clean up the mess and put it in the designated elimination spot, so the smell will help your dog recognize that this is where to go. If you’re training a puppy, keep in mind that a puppy’s muscles are still developing, so he may not be able to control himself when he eliminates in an inappropriate spot. Puppies mature at different rates, and some will take longer to develop bladder and bowel control. There’s a difference between a dog who marks his territory and a dog who isn’t house-trained. Early neutering will reduce a dog’s inclination. If you find the results of an accident after it’s happened, do not punish the dog, since punishment could make him afraid to eliminate in your presence. It’s more effective Best Friends’ ABCs of Dog Life to mark surfaces with his scent. For dogs who mark inside, I recommend the use of a belly band for males (see photo above) or panties for females. For small male dogs, tube socks work well. I have found that most dogs do not continue marking inside when the result is that they wet themselves with their urine. Remember to take the dog outside often and, of course, remove the garment for appropriate elimination. Have the dog wear his/her “clothes” until you have a dry week. Finally, if a dog who is already house-trained starts having accidents, check with your veterinarian – there may be a medical cause. 2-23 Section 2: Getting Started Finding a Good Veterinarian By Faith Maloney It’s important to find a veterinarian with whom you are comfortable and whose expertise you respect. Don’t hesitate to talk to your vet about concerns or questions that you have about your pet’s care. If you are ever unhappy with your vet care, get a second opinion. Here are some guidelines. Honesty and openness. Will she let you stay while a procedure is being done, or allow you to visit your pet in the back if he has to stay at the clinic?. Faith Maloney, one of the founders of Best Friends, is the former director of animal care at the sanctuary. These days, she devotes her time to helping people from all over the world who are starting sanctuaries themselves. 2-24 Best Friends’ ABCs of Dog Life Section 2: Getting Started Staying Safe. Dog Safety for You • Learn how to interpret dog body language (read “Dog Body Language,” in this section). • Always ask permission before petting or touching someone else’s dog. • Most of the time, we encounter friendly, wiggly dogs in public. But you should be cautious if a dog goes still, becomes stiff, and/or is not wagging in a loose and friendly way. • Don’t corner a dog. All dogs have a sense of personal space, so watch their body language as you get closer (or the dog gets closer to you). • When approached by a strange dog, stand quietly, hands at your sides and avoid eye contact. A dog’s natural instinct is to chase, so if you run, a dog may chase. Keep your eyes on the dog and don’t turn your back. • Do not approach dogs in cars or on chains or ropes. Dogs can be protective about their territory and may be a bit more mouthy than usual. When dogs are tied up, they know they can’t run away so their only defense will be to fight. • To avoid startling dogs, don’t approach or touch them while they’re sleeping, fixated on something, or with puppies. • Never get between dogs who are fighting. • Leave dogs alone when they are eating, whether the dog is eating from a bowl or chewing a treat (generally a high-value item for dogs). Like people, dogs don’t like it when people get between them and their food. • Don’t reach over or through fences or barriers to pet or touch a dog. • Never tease, chase or harass a dog. • Don’t enter a property containing a dog if you’re not accompanied by the dog’s person. Dogs can be protective of their family and territory and think it’s their job to protect them. 2-25 Best Friends’ ABCs of Dog Life Section 2: Getting Started The Dog-Safe Family • Children should always be accompanied around dogs, even the family dog. • Supervising children around dogs not only protects the children from accidents but also protects the dog from harm by children who don’t always know that touching animals in a certain way can hurt them. • Don’t leave babies unattended around dogs. Dogs may not realize that babies aren’t as strong as adults or even know what a baby is. • If you’re expecting a baby, start early to get your dog used to the changes a baby will make in your dog’s and your lives. • Don’t attempt to remove anything (toys, food or other objects) from your dog’s mouth. • Teach your children about dog safety early and promote dog-safe practices. • If you are considering bringing a new dog into your family, write down what your family is like and then consult your local shelter staff or do research on the Internet to learn about what kind of dog would be best for you. Good Dog Habits • Socialize your dog and make him a part of your family activities early on. Dogs also need to be socialized beyond your family and home; they need to be comfortable in the world. • Teach your dog appropriate behavior. • Read up on positive training techniques and get your whole family involved. • Take your dog to obedience training. • Make a game for the whole family of spotting and reinforcing positive behavior in your dog. • Don’t allow children to play rough with your dog. (That doesn’t mean you shouldn’t play games like tug with your dog. Teaching your dog to play games using healthy rules will help the dog to learn self-control.) • Avoid hitting your dog or using other forms of punishment. This can make the dog aggressive. (See “Why We Use Relationship-Based Training” in Section 1.) 2-26 • Provide lots of exercise for your dog through positive play like fetch and/or frequent walks. Walks or hikes provide great exercise for you and your canine companion. Regular activity not only gets rid of excess energy but reduces frustration levels in your pet. Interactive play increases the bond between you and your pet. •. • Make sure that your dog has lots of human interaction every day. A happy dog is a good dog. As social animals, dogs thrive on social interaction and love to be a part of the family. •. • Never let your dog roam free. Letting your dog roam free greatly increases his/her chance of injury or death from cars or attacks by people or other animals. A roaming dog may become confused or frightened, leading to aggressive behavior. • Use caution when introducing your dog to new people, new dogs or new situations. Your goal is to provide the dog with a succession of positive experiences so his/her social skills will continually improve. • If your dog’s behavior changes (e.g., he becomes irritable), take him to your vet for a checkup. Behavior changes can sometimes be a symptom of a medical problem. Best Friends’ ABCs of Dog Life Section 2: Getting Started Preventing Dog Bites on Children By Sherry Woodard dog need to know? • Socialize your puppy or dog to children. Watch your puppy or dog as she plays with children; stop the play if the child or the dog gets too rough. • does my child need to know to prevent dog bites? • Teach your children that they should never tease a dog. Teach them to be especially gentle and calm around dogs that they don’t know. • Tell your children not to run, jump or scream around an unfamiliar dog, since you are unaware of what actions may cause fear or predatory aggression in that animal. • Children are often the same size as dogs and may stare into a dog’s eyes without meaning to or without understanding that the dog may feel threatened. • Tell your children not to wake up a sleeping dog. The dog may be startled and react aggressively. • Tell your children not to climb on any dog, even the family dog. It may be perfectly safe with your own dog, but children may try this with another dog and get bitten. • Tell your children not to pet strange dogs without asking permission. What do I need to know? • Have your whole family go to training classes with the dog. Everyone in your family should have some understanding of acceptable dog behavior • Don’t stare into a dog’s eyes, since this can be threatening to him. • Watch your dog carefully around other people’s children, since he or she does not know those children, and you can’t be certain of how your dog will react. •. Best Friends’ ABCs of Dog Life 2-27 Section 2: Getting Started Pets and a New Baby By Sherry Woodard. 2-28 Best Friends’ ABCs of Dog Life Section 2: Getting Started Best Friends’ ABCs of Dog Life 2-29 Section 2: Getting Started Small Dogs, Big Dogs: What’s Safe? By Sherry Woodard The dogs of today have been bred by people into hundreds of different breeds that come in a wide range of sizes, from toy dogs that weigh a few pounds to large dogs who top the scales at over 100 pounds. This disparity in dog sizes is very different from what nature would have created – that is, extra small sizes are not found in the wild. The result is that people with pet dogs need to be aware of some safety issues. You may not see your friendly 50-pound dog as large or dangerous, but a mid-size dog with an easygoing temperament can cause injury to a tiny toy dog even when trying to play. Some dogs have a strong chase drive (which is normal behavior) that instinctively causes them to want to chase and catch moving objects. Even if they’re not bent on killing, they can hurt or even kill much smaller dogs if they catch them. Other dogs have a strong prey drive that motivates them to shake, kill and eat small animals. Like the chase drive, this instinct is a natural behavior inherited from the need to hunt to survive. On the other end of the size spectrum, some toy dogs try to play with much larger animals, or they may be aggressive toward them. We find it amusing when a small dog stands up ferociously to a big dog, but it’s actually an inappropriate greeting that could endanger the small dog. Little dogs often lack proper social skills with other animals and people because of our human tendency to act as their protectors. Our instinct is to protect small dogs, so we hold them in our arms above the other dogs, and pick them up all the time, so they never learn proper greetings. Of course, we do need to protect them. Whenever dogs are off lead, we should supervise them closely. For safety, small dogs can be kept on a loose lead and be picked up only when necessary. If you see a bigger dog (more than 50 percent larger than another dog) who is staring, stalking or charging, use your voice to slow or stop the dog. Some dogs are fine with all dogs of a similar size, but they will react negatively if a small dog passes by. Know your own dog’s tendencies. Some triggers for dogs with strong chase or prey drive are: • Small dog showing fear and running away • Small dog running off lead, even if he appears confident or is playing • Small dog yelping or barking No matter what size dogs we live with, let’s try to be aware that size matters, so all dogs can be kept safe and trouble-free. 2-30 Best Friends’ ABCs of Dog Life Section 2: Getting Started Introducing Dogs to Each Other By Sherry Woodard. Don’t rush things ... some dogs need to “date” a bit.. Do not allow nose-to-nose greetings. This type of greeting is very stressful for many dogs, particularly those who are fearful or feel threatened Above: Improper dog greeting. Left: Proper dog greeting. Best Friends’ ABCs of Dog Life 2-31 Section 2: Getting Started. In the beginning of all new doggie relationships, don’t leave the dogs unsupervised. If you are not confident or comfortable at any point, please seek help from someone who is knowledgeable about dog behavior. 2-32 Best Friends’ ABCs of Dog Life Section 2: Getting Started cues. Praise and reward the dog for being able to focus elsewhere. Continue to give the dog short viewings of the cat throughout the day. The hope here is that the dog will eventually lose interest in the kitty. In some cases, the dog Best Friends’ ABCs of Dog Life. 2-33 Section 2: Getting Started Preventing Your Dog from Chasing Your Cat By Ann Allums Chasing is a natural instinct for a dog, but it is not appropriate behavior in your home when directed toward your cat. The following guidelines can help you deal with this behavior through management (preventing the problem) and training (motivating the dog to change his behavior). “Introducing a Cat and a Dog.” If at any time during the introduction process, the dog barks, fixates on the cat or tries to chase the cat, give the dog a time-out. You’ll also want to use the time-out process if you have a dog who has already made a habit of chasing cats. A time-out involves removing your dog from the situation so he cannot continue practicing inappropriate behavior. So, decide on a time-out room (a bathroom, for example) in advance. The instant your dog starts to behave inappropriately toward your cat (chasing the cat or whining), calmly tell your dog “time-out,” then go to him and lead him by the collar or leash to the time-out room. You should act and speak calmly to avoid arousing the dog even more. After a minute or two, release your dog from the time-out in an equally low-key manner. If the dog comes back from a time-out and repeats the inappropriate behavior toward the cat, he should immediately go back to timeout. To increase the chances of success, reward your dog for desired behavior. Reinforcing appropri2-34 ate behavior teaches your dog what you want him to do (i.e., behave appropriately around your cat). Prepare a ready supply of greattasting upon seeing the cue (the cat). Just make sure the treats you are giving are more desirable to your dog than the fun of chasing the cat! Once you’ve established what you want your dog to do (ignore the cat) and you’ve built a reBest Friends’ ABCs of Dog Life Section 2: Getting Started ward history for that behavior, you may choose to allow the dog more freedom around the cat.. If the chasing persists, the motivation for your dog could be boredom or he could need more exercise. So, give your dog appropriate outlets. For instance, make sure he gets plenty of physical exercise, like running off-leash, playing with another dog friend, playing fetch with you, or swimming. A tired dog is a good dog, and tired dogs do much less chasing. Also, provide a variety of appropriate chew toys. Some ideas for ap- pealing chews are stuffed Kongs, pressed rawhide and frozen broth. For mental stimulation, teach your dog basic cues or tricks. A rewardbased training program will teach your dog to listen to you, provide him with alternative behaviors to perform, and exercise his brain. In summary, prevent the problem from occurring; be consistent in training and reward appropriate behavior; be persistent with instituting the time-out as a consequence for inappropriate behavior; and make sure your dog’s social, physical and mental needs are being met. Finally, never leave your dog alone with the cat unsupervised, since behavior can never be guaranteed. Ann Allums, a certified professional dog trainer (CPDT), was a dog trainer at Best Friends from August 2004 to September 2010. Best Friends’ ABCs of Dog Life 2-35 Section 2: Getting Started Managing a Dog with Behavior Challenges By Sherry Woodard I have met many dogs with behavior challenges whose people want to keep them and help them, but they just don’t know how. This resource can help people learn how to manage dogs with behavior challenges like aggression. the resources in Section 7 and working with a kind, gentle trainer, a veterinarian, and your family and friends to help your dog become less fearful and more comfortable in the world. Fear and a lack of positive experiences are the main reasons for aggression in dogs. (For more information, see “Dogs and Aggression,” Section 4.) You should be aware, though, that aggression can be genetic: Not every dog is born genetically stable. Your vet can help you de2-36 Best Friends’ ABCs of Dog Life termine. For more specifics, see “Dog Body Language,” in this section. Many people chastise a dog for growling, thinking that the dog is being “bad.” But growling is actually a good way for your dog to communicate. Growling is his way of saying he is feeling Section 2: Getting Started threatened by something or someone. If you punish your dog for growling, you will have less warning before a possible bite.” (Section 7). This resource will help you to work safely with your dog to change how she feels about new people and other animals. positive-reinforcement Best Friends’ ABCs of Dog Life 2-37 Section 2: Getting Started 2-38 Best Friends’ ABCs of Dog Life Section 3: Health and Care Section 3: Health and Care Best Friends’ ABCs of Dog Life 3-1 Section 3: Health and Care Routine Veterinary Care for Your Dog By Sherry Woodard Puppies should be seen. At 12 weeks, your puppy should get a parasite test. A rabies vaccine should be given between 12: • He is a puppy and is not gaining weight • She is lethargic, or she is losing or gaining weight • She seems to be having some discomfort • You notice a change in his behavior • You notice a change in her general health – for example, her eyes have lost their brightness or her coat has lost its luster Remember, regular veterinary care is an essential component of your pet’s good health! 3-2 Best Friends’ ABCs of Dog Life Section 3: Health and Care The Costs of Caring for a Dog In the excitement that comes with the decision to get a dog, people sometimes forget to consider whether they can afford one. Part of being a responsible dog person is making sure you have the money to keep your pet happy and healthy. Your first expense will be the adoption fee, which can range from $50 to $300, depending on the facility you’re adopting from and where you live. Adopting from a shelter tends to be cheaper than adopting from a breed rescue group. Besides being the right thing to do, adoption is much cheaper than buying a dog from a breeder or pet store, which can cost $300 to $1,500, or more. If the dog isn’t fixed, you’ll probably spend $45 to $135 for neuter surgery or $50 to $175 for spay surgery at a low-cost clinic. Animal hospitals and veterinary clinics can charge $200 to $300. Then, you’ll need supplies: a dog collar and leash, toys, a dog bed, maybe a doghouse or crate, food and water bowls, dog food and treats, grooming brushes. If you live in an area where heartworm, fleas and/or ticks are a problem, you’ll want to add in the cost of heartworm prevention or flea/tick control: $150 to $200 or more per year. Your dog will need an annual checkup and vaccinations, which can cost $175 to $200 for a puppy and $50 to $100 for an adult dog. For more details on what people are paying for things like spay/neuter surgery, teeth cleaning, grooming and vaccinations, go to CostHelper.com:. html Depending on your lifestyle and the type of dog you get, you may also need to factor in other costs, such as paying for doggie daycare, grooming, training, dog walking, boarding or pet-sitting. All of the costs mentioned above Best Friends’ ABCs of Dog Life vary according to what part of the country you live in and whether you live in a big city, a town or a rural area, so you might want to do some preliminary research yourself. According to PetPlace.com, here are average, routine costs for caring for a dog: Small to medium-sized dogs: • Estimated life span: 14 years • First year: $740 to $1,325 • Estimated annual costs thereafter: $500 to $875 Total cost over a dog’s lifetime is about $7,240 to $12,700. Large to giant-sized dogs: • Estimated life span: 8 years • First year: $1,020 to $1,825 • Estimated annual costs thereafter: $690 to $875 Total estimated lifetime cost: $5,850 to $7,950. Puppies: The First Year • Veterinary care and laboratory tests: $100 to $200 • Physical examinations and immunizations: $80 to $200 • Internal/external parasite treatment and control: $100 to $150 • Spay/neuter: $90 to $200 (The cost often depends on the dog’s size and age.) • Food: $150 to $250 • Miscellaneous (collars, leads, crate, toys, bed, training): $250 to $285 Total: $770 to $1,285 3-3 Section 3: Health and Care Dogs: Annual Costs • Veterinary care, examinations and laboratory costs: $150 to $255 • Immunizations: $60 to $75 • Internal/external parasite preventatives: $120 to $190 • Food: $150 to $300 • Miscellaneous: $100 to $125 Total: $580 to $945 These are routine costs – not including the cost of emergency trips to the vet or necessary surgeries or treatments. Surgeries can cost several thousand dollars or more, while a simple ear infection may only cost a couple hundred dollars in vet fees and medications. Helpful Resources Consumer Reports Veterinary Care Without the Bite: 20 Ways to Cut Vet Costs: About.com: The Cost of Dog Ownership dogs.about.com/od/becomingadogowner/a/ costofdogs.htm ASPCA: Cutting Pet Care Costs costs.html 3-4 Best Friends’ ABCs of Dog Life Section 3: Health and Care Signs of Health and Sickness in Your Dog By Sherry Woodard • Ears on the inside should be light pink (though dark-skinned dogs may have black pigment), clean or with just a trace of wax, not swollen, and free of discharge. • Nose should be moist – not necessarily wet, but not dry or cracked. • Temperature should be 100 to 102.5 degrees (101.5 is the average). • Gums are normally pink, but they can have black or gray pigment. • Stools should be firm and free of parasites. One of your responsibilities as a dog owner is to bring her to a veterinarian if you think she may be ill. Here are some signs that your dog could be sick: • A significant change in behavior (such as increased irritability) • Perceived pain or lethargy • Visible pain (such as limping or chewing on a joint) • Persistent vomiting • Persistent diarrhea • Persistent coughing • Lack of appetite • Excessive drinking • Excessive urination If any of these symptoms last more than 24 hours, you should bring your dog to your veterinarian. You should also bring her in for routine checkups and dental care. Your dog may not be able to communicate with you in words, but he can give you signs to indicate whether he is healthy or sick. Here are some signs of a healthy dog: • Skin is smooth and supple, and free of scabs, growths and rashes. • Coat is glossy, without dandruff or any areas of baldness, and with no signs of parasites. • Eyes are bright, not watering, and free of discharge. Best Friends’ ABCs of Dog Life 3-5 Section 3: Health and Care Spay or Neuter Your Dog dog to lead a longer, healthier and happier life. Sexual behavior in both male and female dogs is reduced following surgery. Neutering male dogs reduces the urge to roam, urine marking, and mounting, and may reduce some forms of aggression. In female dogs, the inconvenient “heat” cycle, with its messy, bloody discharge, is eliminated. Spaying or neutering eliminates or greatly reduces the development of mammary tumors in females and reproductive organ tumors in both sexes. What’s spaying? What’s neutering? Spaying is the surgical removal of a female dog’s ovaries and uterus, while neutering is the removal of a male dog’s testicles. While both operations are conducted routinely with few complications, only licensed veterinarians are allowed to perform them. Prior to. Will my dog’s personality change? Other than the previously mentioned positive behavior changes,. Both neutered males and spayed females have a tendency to gain weight, but weight gain can be prevented by proper diet and sufficient exercise. When should I spay/neuter my dog? Dogs as young as eight weeks of age can be spayed or neutered safely. Studies have recommended that male dogs be neutered before six to eight months of age. For female dogs, the surgery should ideally be performed before their first heat cycle. If you have questions, talk to your veterinarian. dogs. Consult with your veterinarian or veterinary behaviorist for further information. Why should I spay or neuter? Spaying or neutering your dog prevents unwanted births and reduces the influence dog, you do your part to prevent this tragedy. Behavior problems can also be prevented or minimized by spaying or neutering your dog. 3-6 Best Friends’ ABCs of Dog Life Section 3: Health and Care Your Dog’s Diet By Sherry Woodard What should I feed I need to know about feedingchested breeds are at higher risk, but if any dog shows discomfort after eating or has a visibly Best Friends’ ABCs of Dog Life If your dog eats too fast, try putting a smaller bowl (turned upside down) or a large smooth stone in the food bowl. bloated abdomen, seek medical attention right away. GDV is very painful and will be fatal if left untreated. Should I change 3-7 Section 3: Health and Care: • Sometimes, skin problems, ear infections and digestive problems are signs of food allergies. Discuss with your veterinarian whether a diet change is indicated. • Some medical conditions, such kidney disease or diabetes, require special diets. • I avoid feeding my dog? You should avoid the following: • Alcoholic beverages (they can cause coma and even death) • Cat food (it’s generally too high in protein and fats) • Caffeine (it can be toxic, and adversely affect the heart and nervous system) • Chocolate (in large amounts, chocolate can also be toxic) • Fat trimmings (they can cause pancreatitis) • Raisins and grapes (they can damage the kidneys) • Nicotine (it affects the digestive and nervous systems, and can result in rapid heartbeat, collapse, coma and death) • Table scraps (they are not nutritionally balanced) Excess salt, sugar and fats can cause obesity, dental problems and finicky eating in your dog. For a happy dog, feed him a healthy diet and get plenty of exercise together. 3-8 Best Friends’ ABCs of Dog Life Section 3: Health and Care Obesity in Your Pet By Virginia Clemans, DVM Is your pooch pudgy? Is your feline fat? When you try to feel ribs, do you feel folds of fat instead? As a veterinarian, I see obese pets every day, day after day! Obesity is as much a problem in pets as it is in humans, and it can cause many of the same health problems. There are many reasons why our pets become overweight, but the most common cause is overeating – that is, the pet consumes more calories than he uses. Other contributing factors to obesity in pets are heredity, breed, body type, and certain medical conditions. Spaying and neutering are often blamed for causing pets to become overweight. This perception seems to be derived from the fact that altered pets do tend to be more calm and relaxed, and to be more content to stay close to home (which are good things). But, a calmer animal doesn’t cause weight gain – overeating does. Do you know the ideal weight for your pet? Your veterinarian can help you with this. The ideal weight of dogs varies tremendously – from Chihuahuas, who weigh about 6 pounds, to St. Bernards, who can weigh as much as 165 pounds. And what about mixed breeds? There will be many variations, based on such factors as bone structure, body type, sex, etc. Most cats should weigh between 8 and 10 pounds. If you’re not sure if your pet is overweight, try feeling her rib cage. Put your hands on the rib cage with your thumbs over her spine. If you can easily feel the ribs, then your pet is probably a normal weight. If you can see the ribs, then your pet is too thin. If you can feel fat between the skin and ribs, or if the ribs are difficult to feel, your pet is overweight. If you cannot feel the ribs at all, your pet is obese. In cats, a large abdomen that hangs down and swings when the cat walks indicates obesity. There are many health risks associated with obesity. Overweight dogs and cats have a higher incidence of heart and lung problems, diabetes and arthritis. They’re at an increased risk for complications should they need to be anesthetized for surgery. Overweight pets can have problems with their skin as well. The treatment for weight loss is (you’ve heard it before) reduced caloric intake and increased energy output. Less food, more exercise. A reduced caloric intake can best be accomplished by feeding your pet a high-fiber, low-fat diet, which allows your pet to continue to eat approximately the same volume of food as before and still feel full and satisfied. Feeding lesser amounts of a regular diet can lead to vitamin and mineral deficiencies, and your pet’s hunger won’t be satisfied. You should cut down on treats or eliminate them altogether. To reduce begging and sneaking of snacks, keep your pet out of the room when the family is eating. And make sure your pet doesn’t have access to the garbage can or the neighbor’s dog or cat food! Your veterinarian should be the final judge of your pet’s weight status. Make an appointment with him or her to determine if your pet is truly just overweight and not suffering from signs of heart, kidney, or endocrine or hormonal disorders. At your visit, after a complete physical exam and blood work, your pet’s dietary needs can be established. Remember, you can give your pet a longer and happier life by providing the proper diet, exercise, and regular veterinary care. Dr. Virginia Clemans was Best Friends’ chief veterinarian from 2001 to 2004. Best Friends’ ABCs of Dog Life 3-9 Section 3: Health and Care Hazardous to Your Pet’s Health! By Sherry Woodard: Many other things in or around your home can cause serious illness or even death in your pet: • Antifreeze • Bait for rodents • Batteries (they can contain corrosive fluid) • Car care products, such as cleaners or oils • Fertilizer • Gorilla Glue (or similar products) • Household cleaners • Ice-melting products • Nicotine products (including patches) • Pesticides for insects • Plants that are toxic to pets • Pool or pond products • Poisonous snakes • Utensils with food on them (e.g., steak knives) 3-10 Other potential dangers in your home include burning candles that may be knocked over, electrical cords that can be chewed, and loose cords or wires that animals may become tangled in. Take a look around your house and make it petsafe. For more information on what to do for a poisoned animal, what plants are poisonous, and how to poison-proof your home, visit the ASPCA website () and click on “Animal Poison Control” on the Pet Care tab.. Away from Home Here are some things to avoid when traveling with your pet: •. •. Best Friends’ ABCs of Dog Life Section 3: Health and Care Why Dogs Itch By Virginia Clemans, DVM Does your dog itch? Scratch? Chew? Rub? Shake? Scoot? Is it driving you and your dog mad? Just like in people, itching in dogs can be caused by a lot of different things. The most common cause is atopic dermatitis, also called “inhalant allergy.” When dogs are allergic to dust, pollens, mold, mildew, insects, or animal or human dander, instead of suffering from hay fever, they get itchy skin. When they scratch, the bacteria normally present on the skin becomes driven into the deeper skin layers and causes an infection. Sometimes dogs even develop an allergy to the bacteria itself and this causes even more itching! Those little red bumps you may see on the skin are probably pustules (little pimples) caused by the bacteria. Fungal infections like ringworm can affect the skin and nail beds, causing itching and chewing of the feet. Yeast infections of the skin and ears also can be very itchy, and cause a very characteristic odor. Some other causes of itching include “contact allergy” – an allergic reaction to the detergent used to wash bedding, for example, or allergies to materials like wool. But this type of allergy is fairly rare in dogs. Dogs can become allergic to fleas, however, and even one flea bite can become very itchy. There are some skin mites that can cause itching as well. A food allergy (allergy to proteins contained in food) can be the cause of itching in some dogs. Dogs can have several different types of allergies all at once (bacterial, food, inhalant, etc.), making the causes more difficult to determine. Certain diseases can cause skin problems or make existing skin problems worse. Just like people, dogs can have thyroid problems. In dogs, a condition called hypothyroidism (not enough thyroid hormone produced) can make the skin more likely to have allergy and infection problems. Thyroid disease can cause the Best Friends’ ABCs of Dog Life skin to become oily or flaky, and the hair coat to be dull, thin, and brittle. Blood tests, skin scrapings, and fungal cultures all help determine the exact cause of a skin problem. Once we know what the cause is, an appropriate treatment can be prescribed and the dog can be on the way to comfortable, healthy skin. Various combinations of treatments may need to be tried before the right combination is found. Medications such as antibiotics, antihistamines, anti-inflammatories, and fatty acid supplements may need to be given by mouth until the problem is under control. Some medications may need to be continued long-term. Bathing is very important to maintain healthy skin. Regular baths with a medicated shampoo can reduce the number of bacteria on the skin. Baths remove dead hair and skin cells that aggravate skin conditions. If a food allergy is suspected, a diet change may be in order as well. Try switching your dog’s food to one that contains a type of protein that your dog hasn’t been exposed to yet. Beef, lamb and chicken are found in most dog foods, so this means switching to a dog food containing a “novel” protein, such as fish, venison or rabbit. Talk to your veterinarian about which food to switch to and where to obtain this type of food. The skin cycle lasts approximately 21 days – it takes that long for old skin to be replaced by new skin. So, any treatment that you attempt may not show results until a three-week period has passed. This is especially true for diet changes and fatty acid supplements. Be patient! Find the cause, follow the treatment exactly, and get your dog’s skin back on the track to health. Beauty is only skin deep, but healthy skin makes you and your dog feel better! Dr. Virginia Clemans was Best Friends’ chief veterinarian from 2001 to 2004. 3-11 Section 3: Health and Care Flea and Heartworm Prevention for Your Pets By Dr. Mike Dix, DVM Here’s some basic information about preventing fleas and heartworms in your cats and dogs. For more specifics about how to treat your pets for these conditions, please talk to your veterinarian. Frontline and Revolution) and lice (Revolution and Frontline); repel mosquitoes (Revolution); and control other external parasites (Promeris in dogs, and Revolution). Revolution is also a heartworm preventative and can control internal parasites (in cats more than dogs). All these products have been proven to be relatively safe as long as they are used for the species intended; for example, never give Advantix (not to be confused with Advantage) to cats. Some people don’t like putting these chemicals on their pets, but in my opinion, it is better than having the nuisance of fleas and the potential diseases that can come from fleas. There are alternative therapies, such as feeding garlic and spreading diatomaceous earth on the ground, but I have not found these methods to be consistently effective. In some regions of the country (e.g., the desert) and seasons (e.g., winters in cold climates), fleas are less of a problem. Consult with a veterinarian about what flea product is best for your pet, your pet’s lifestyle and your geographic region. Flea Prevention Flea preventative comes in either an oral or a topical form. The oral forms typically only last a short time (Capstar is one example) or do not kill adult fleas and only prevent flea reproduction (e.g., Program). The most popular forms are the topical preparations, which usually last for about a month and are very effective. Some are more waterproof than others (for example, Frontline is more waterproof than Advantage). Some also treat other insects, such as ticks (Promeris in dogs, Heartworm Prevention Heartworm is a parasitic infection that is spread by mosquitoes. Cats and dogs can both get it, but heartworm is much less prevalent in cats: between 10 and 15 percent of the rate of infection in dogs, depending on geographic region. Not all mosquitoes everywhere transmit heartworm. The weather has to be warm enough consistently for long enough for the mosquitoes to be able to transmit the infection, which is why most mosquitoes in Alaska don’t spread the disease. Here’s what happens: Heartworm is injected into the dog or cat from the mosquito in a larval stage. This larva develops through several more stages before becoming an adult worm and re3-12 Best Friends’ ABCs of Dog Life Section 3: Health and Care siding in the pulmonary arteries of the dog or cat. The infection is debilitating to the animal and treatment is costly, so it’s best to prevent the disease from happening in the first place. The heartworm preventatives available today are effective if used consistently. They actually work retroactively, meaning they kill larvae that have been in the dog for up to 45 days. Once the larval stages advance beyond this 45-day period, however, the preventatives are no longer effective. Since it is easier to remember to give medication every 30 days instead of every 45 days, the heartworm preventatives are dosed at 30-day intervals. Heartworm preventatives come in three forms – oral, topical and injectable (soon to come back on the market as ProHeart). The oral products are my favorite, since the animals like them, you know they got the medication at the right dose, and they also control intestinal parasites (good for the health of the dog and the human family). The most popular are Heartgard and Interceptor. Some breeds (such as collies) are sensitive to the medications, so please consult a vet before starting one of the preventatives. The most popular topical preventative is Revolution, which works in a similar fashion to Heartgard but is applied topically. My concern with this medication is that if some gets stuck on the fur or gets washed away, the dose may not be appropriate and the animal may not be protected. The injectable form is good for six months, which is more convenient than a monthly dose, but it does not control intestinal parasites (at least it didn’t used to). I am not sure how ProHeart will work because injectables have been off the market for awhile. Heartworm is a regional condition. Because the mosquitoes must have a certain ambient temperature to develop the mosquito larvae, some areas only get the disease seasonally (e.g., Wisconsin does not have a problem in the winter), some do not get it at all (e.g., most of Alaska) and other areas have it year-round (e.g., the southeastern U.S.). In warm areas like the southeastern U.S., if pets are not on preventative, they will get the disease. Consult with a vet to determine when and if your pet should be on heartworm preventative. Dr. Mike Dix is Best Friends’ medical director. Best Friends’ ABCs of Dog Life 3-13 Section 3: Health and Care Smile! Dental Care for Your Pets By Virginia Clemans, DVM Do you avoid getting up close and personal with your pet’s breath? That bad breath is certainly unpleasant enough, but your pet could have a worse problem. Tartar buildup on teeth and inflamed gums can actually undermine your pet’s good health. Do animals have. the teeth may help tartar buildup somewhat, but only a professional cleaning by your veterinarian can remove tartar once it forms. Won’t feeding my pet dry food prevent dental problems? Most people believe that feeding their pets dry food is enough to ward off dental problems. Not so. 3-14. Best Friends’ ABCs of Dog Life Section 3: Health and Care! Dr. Virginia Clemans was Best Friends’ chief veterinarian from 2001 to 2004. What does a dental cleaning involve? If your vet determines that your pet needs a dental cleaning, here’s what happens. First, your pet must be completely anesthetized. It is not possible to thoroughly clean the teeth if your Best Friends’ ABCs of Dog Life 3-15 Section 3: Health and Care Grooming Your Pets By Sherry Woodard Most animals can be taught to enjoy grooming at any age. Regular grooming will help you build and maintain healthy relationships with your pets, and practice gentle leadership skills. If your dog has positive associations with grooming, it can help to reduce handling challenges.. Here are some supplies that you might need for grooming: • Shampoo that is appropriate for the age and species of your pet (kittens and puppies need gentle shampoo; very young animals need products free of harsh pesticides; and ferrets should have ferret shampoo) • Large cup or small bucket containing water, to create a nice lather • Cotton balls • Ear cleaner • Parasite-control products (ask your veterinarian about what is needed in your area for fleas, ticks and mites) • Metal comb • Brush (there are many styles to choose from: pin, rake, slicker, mitt or curry) • Nail trimmers (find the best size for your pet’s nails) • Nail file (some animals will actually sleep while their people file each toenail) • Styptic powder (to use if you accidentally cut a nail too short) • Ophthalmic ointment (used in the eyes to protect them from shampoo and debris) • Detangler or conditioner (great for combing through long hair before a final rinse) • Spray attachment for your shower (very helpful for rinsing your pet) • A hair dryer (because some animals can chill easily, but be careful not to overheat the pet) • Toothbrush and animal toothpaste • Safety scissors for trimming hair •, Best Friends’ ABCs of Dog Life 3-16 Section 3: Health and Care- coats during the shedding season. Short, smooth coats can be brushed with a grooming mitt or rubber curry. After brushing, you can use an allpurpose longhaired. Another good reason to keep dogs well groomed: It can be difficult to read the body language of ungroomed dogs. The groomed dog on the right is alert, eyes soft, no fear seen. Teeth. You can gently massage the gums and brush the teeth on any pet – from the smallest rodents to the largest horses. If taught with 3-17 Best Friends’ ABCs of Dog Life Section 3: Health and Care. 3-18 Best Friends’ ABCs of Dog Life Section 3: Health and Care Cold Weather and Your Pets By Sherry Woodard Here.. in the future.. – they want to be with you, so don’t leave them out in the cold too long! Best Friends’ ABCs of Dog Life 3-19 Section 3: Health and Care Hot Weather and Your Dog By Sherry Woodard One of the most life-threatening mistakes people can make is to leave a dog in a vehicle.. If your dog stays outside during the day, make sure his water bowl isn’t in a place where he will tip it over. Water bowls can be tipped over by dogs trying to make a cool spot to lay sunscreen. 3-20 Best Friends’ ABCs of Dog Life Section 3: Health and Care Keeping Your Dog Safe and Sound By Sherry Woodard Why shouldn’t I let my dog run free? Many dogs are allowed to roam the streets. The dog’s family might say, “Oh, he’s okay – he comes home eventually; he has friends out there.” But, it’s often a dangerous world out there. If you allow your dog to roam, you are abdicating responsibility for his safety. Here are some ways your dog could be harmed: • He might be hit by traffic, causing injury or death. • She might be picked up by animal control officers, just doing their jobs. • He might be poisoned or suffer injury at the hands of people who feel that the dog is a nuisance. • She might be poisoned by drinking antifreeze from a puddle, or ingesting snail bait or other toxins. • He might fight with or be attacked by other dogs, resulting in injury. • Get her a dirt box to dig in or a kiddie pool to splash in. • Take him on more walks so he can smell and explore outside the confines of his yard. Make sure your dog gets plenty of exercise. A tired dog is much less likely to try and escape from his yard. He would much rather relax in front of the TV with his family! What else can I do to keep my dog safe and sound? Some other responsibilities of taking care of a dog are: • Make sure your dog always has a current I.D. tag on his collar, so that you can be called if he is found wandering alone. He should also have a microchip ID. • Spay/neuter your pet – it’s your responsibility to prevent unwanted animals from being born, and spaying or neutering helps animals lead happier, healthier lives. • Take care of your dog’s health by bringing her to the vet for annual checkups. Be aware that your dog may require more medical checkups and medication as she ages. • Train your dog – teach him simple cues and proper manners so he will be well-behaved and welcome in any home or setting. When you take an animal as a pet, it is your responsibility to stay committed to your loyal companion for a lifetime – through thick and thin, through whatever changes occur in your life. If you absolutely must find a new home for your pet, it is also your responsibility to find a home that is as good as or better than your own. What to do about an escape artist? If you have a dog who is an escape artist, start with securing your yard so he can’t escape. But, don’t stop there. Your dog may be escaping because he is bored. Try the following: • Let him spend more time in the house, interacting with his family. • Make sure she gets some active play time with some dog friends. • Get him some fun things to chew on (like Kongs and hollow bones with treats stuffed inside). Best Friends’ ABCs of Dog Life 3-21 Section 3: Health and Care Preventing Your Dog from Escaping By Sherry Woodard Is your dog escaping from the yard? Here are two reasons why this could be happening and some possible solutions to the problem: her way of dealing with loneliness and boredom. If you’re away from home all day, are there ways that you can break up the long days for her? Perhaps a neighbor could give. Here are the various ways that dogs get out and some methods to prevent escape: Latch-lifting. Some dogs have learned to open gates and let themselves out. Most gates have a latch that can be secured by placing a clip through a hole when the latch is closed. The clip can be a clip from an old leash or a lock. If you need a reminder to use the clip and to get others to use it, put a sign on the gate that says, “Please clip the gate.” Jumping or pur3-22 pose; if the dog feels that the light wire is unstable, he may decide that he can no longer jump out. If your dog only climbs out at the corners, you can add fencing across the corners over the top. There’s also a product called Coyote Roller (), rollers that can be installed on the top of fencing to prevent the dog from being able to grip the top of the fence. Digging under the fence. If digging out is your dog’s plan,. Dashing out the door. Some dogs escape by dashing out of the house the moment the door opens. For door-dashers, the best strategy is to train the dog to expect a treat whenever the door is opened. Start by placing a baby gate he sits, and then offering the treat. Only give the treat when his rear is on the floor – not before he sits or after he pops up. Practice walking into the house and closing the door behind you, offering the treat only after your dog gives you a sit. When teaching your dog to sit, you don’t need to use a harsh tone. Once he is trained, you can have fun with your happy, well-behaved dog. Best Friends’ ABCs of Dog Life Section 3: Health and Care Fencing left). Wire-mesh fencing. (above center) If you need extra tall fencing, chain-link is not a good choice. Instead, buy coated wire-mesh fencing, which is stronger than chain-link. One company that sells this type of wire mesh is Riverdale Mills (). Flat-top. (above right). Fencing and Shelter Manufacturers Barnmaster buildings and panels MD Barns buildings and panels Centaur Horse Fencing Cover-All buildings 3-23 Best Friends’ ABCs of Dog Life Section 3: Health and Care Top-angling. A slightly different approach to the flat-top: Angle the fence extension so that it’s aimed upward. Full cover. For dogs who’ve managed to climb over every fence, and for dogs who’ve been in trouble for escaping, cover the fencing completely on top. Free-standing. This type of fencing pops apart, so it can be easily taken apart and positioned in a different spot. It’s a good solution for aggressive dogs who must be kept away from the outside fence line of a yard. Priefert Ranch Equipment (www. priefert.com) is a good supplier of this type of fencing. Note: Best Friends doesn’t recommend invisible fence systems. Read this article from Whole Dog Journal: “Simply Shocking” by Pat Miller 3-24 Best Friends’ ABCs of Dog Life Section 3: Health and Care Unusual Eating Habits in Pets By Sherry Woodard Pica Cats and dogs will sometimes eat non-food items such as rocks, dirt, clothing, rubber bands, or string. This condition is called pica. Once ingested, some of these items can produce lifethreatening. Coprophagy Another type of pica behavior is stool-eating, called coprophagy. Coprophagy is fairly common in dogs, but is rarely seen in cats. Dogs have been known to eat their own or other dogs’ feces, and some dogs find cat feces quite delectable. Again, the causes are unknown. There are some techniques that have been tried to eliminate this unsavory behavior, but none seem to be consistently effective in resolving the problem. One preventive measure is to pick up daily after your dog to minimize his opportunity to eat his own feces. The dog’s food can be treated with MSG or commercial products such as ForBid or Deter, which make the dog’s stool taste bad. Before using any food additives, schedule a visit to your veterinarian to check for any medical cause and to talk about the dog’s diet. Supplements or a diet change may help. If your dog is eating your cat’s feces, install a baby gate in front of the area where your litter box is kept or otherwise make the litter box inaccessible to the dog (but still accessible to the cat). Best Friends’ ABCs of Dog Life 3-25 Section 3: Health and Care Holiday Hazards for Pets by Sherry Woodard Though holidays can be a great time for people, they can be problematic for our pets. Here are some things to be aware of as you celebrate the holidays. The Fourth of July Fireworks can be very frightening for our pets. They may panic and try to escape the noise by attempting to leave the safety of their own house or yard. Here’s how you can protect your animal family members on the fourth of July: • Make sure they wear properly sized collars (no more than two fingers should fit under the collar). All dogs and cats (even house cats) should have current ID on their collars, and they should have microchip IDs as well. Cats should wear safety collars that will pop or stretch if they get caught on something. • Keep your pets inside the house. If there will be a lot of people going in and out, you might want to put your animals in a bedroom with the door shut. Close the windows, curtains and shades so they will feel more safe and secure. • You can muffle the sound of fireworks by turning on a fan, radio or television. If your pet is extremely distressed during fireworks, she may become destructive and may even hurt herself trying to escape the noise. To calm her, you may need to stay with her and try to distract her with play or favorite things to chew. Do not verbally reassure a nervous pet, however, since that may reinforce her nervousness. Do not put a frightened dog in a crate and leave the house. Though his crate may normally be a safe place for him, he may feel trapped in there if he’s frightened by fireworks. He could injure himself badly trying to get out of the crate. Halloween Halloween is a fun day for humans, but pets may become spooked (no pun intended!) by the altered appearance of their families. If your dog does not appear to recognize you and your children, use caution when approaching him or her. Candy can make your pets sick, so you should always keep it out of reach of your pets, but especially on this holiday, when there’s so much of it around. You can encourage pet involvement in Halloween by making homemade dog and cat treats for your own animals and for other people’s pets. (Make sure they’re clearly labeled as pet treats!) Some people like to dress up their pets for Halloween (or other holidays). Because wearing a costume might be uncomfortable or frightening to your pet, introduce the costume slowly. Start by taking the costume out of the packaging and allow it to air out. Costumes may have strong smells that pets can be sensitive to. 3-26 Best Friends’ ABCs of Dog Life Section 3: Health and Care. Finally, dogs and cats should be kept inside on Halloween. If a lot of people will be coming to your door, put your pets in a bedroom with the door shut to prevent them from escaping into the night. Keeping them in a closed room will also minimize the fright they might get from loud voices and wild costumes. Black cats are especially vulnerable on Halloween, since black cats are often associated with evil and misfortune, and they can be the victims of abuse. So, to keep them safe, keep them inside. Even cooked turkey, duck, geese, and other bird bones are dangerous to dogs. Cooked bones splinter and break easily, so sharp pieces may tear the intestines. Christmas Here are some tips for keeping pets safe at Christmas time: over. • Tree lights should not be left on when you’re not around, since your pets may tangle themselves in the cords. Unplug the tree lights when you’re not using them. • Once you’ve decorated your tree, pick up all tinsel, ribbon and ornament hooks on the floor. These glittery items may be attractive playthings to your pets, but they can get sick if they ingest them. If a gastrointestinal blockage occurs, surgery may be needed to save your pet. • If your pets express interest in playing with the decorations on the tree, decorate the bottom third of the tree with wood or plastic ornaments that won’t break. • Keep all gifts that contain human food off the floor so that pets are not tempted by the smells. Human treats can be dangerous for pets – especially food containing chocolate, alcohol, raisins and onions. • Holiday plants such as poinsettias and mistletoe can be dangerous, too, if your pets chew on them. Keep holiday plants well out of reach of your pets, or buy artificial plants. • Burning candles can also be a concern around this time of year. Put burning candles in places that are inaccessible to your pets and don’t let candles burn unattended. Your cat can easily light herself on fire by brushing up against a burning candle or start a fire by tipping the candle over. 3-27 Thanksgiving Many of the traditional holiday foods for people are dangerous to your dog’s health. Feeding dogs large quantities of fatty foods, such as turkey gravy, mashed potatoes with butter, and stuffing, can cause pancreatitis. This potentially deadly inflammation of the pancreas produces severe symptoms of diarrhea or vomiting. Best Friends’ ABCs of Dog Life Section 3: Health and Care Bloat in Dogs By Virginia Clemans, DVM Bloat, or gastric dilatation and volvulus (GDV), is a serious, life-threatening condition seen in dogs. GDV mainly affects large deep-chested dogs, but it can affect any size of dog. It happens when distention of the stomach with food and/or air together with the momentum of this now heavy organ by movement (walking or running) causes the stomach to “flip” upon itself, closing both the in-flow and out-flow passages. The stomach then becomes more and more distended, causing pressure on the large blood vessels of the abdomen, cardiac irregularities, difficulty breathing, tissue death and toxin release. Many theories exist about why this scenario develops. An older but still accepted theory involves large dogs eating large quantities of food (particularly dry food), eating fast and ingesting air, then drinking large quantities of water, and then exercising. The theory is that the stomach becomes very heavy and “swings” inside the dog’s abdomen. The pendulous momentum sends the stomach in a twisting motion over and around itself. Since some dogs with GDV have been found to not have a stomach that is excessively full of food or water, newer theories have been adopted. One of these is that, particularly in older dogs, the stomach’s regular contractions become weaker, and air and food can remain in the stomach longer than normal, causing the stomach to become heavy, which then results in the twisting event. Still another theory proposes that, again, particularly in older dogs, the spleen can become enlarged due to congestion or cancer. Since the spleen is so closely associated anatomically with the stomach, it can be involved in causing the stomach to become heavy and pendulous, and then twist. Regardless of the cause of the twisting, gastric dilatation and volvulus in a dog is a life-threatening medical emergency. In order for there to be a chance of a good outcome, aggressive medical care must be obtained without delay. A dog whose stomach has twisted shows acute signs of sickness – difficulty moving around, restlessness, and attempts to vomit (the “dry heaves”). Usually, a dog with this condition salivates, pants, and has a rather remarkable distention of the abdomen that is very hard and painful to the touch. Once these signs appear, the dog can decline rapidly, and death can occur in as little as one hour. A “wait and see” attitude is not advisable. For the best outcome, the dog must be seen by a veterinarian immediately. Diagnosis is made by x-ray. It is sometimes necessary to decompress the stomach; surgery is usually needed to correct the twisting and stabilize the dog. The prognosis for recovery depends upon the condition of the stomach and other organs at the time of surgery. Despite aggressive treatment, though, many of these dogs do not recover. So, monitor your large-breed dog carefully and seek veterinary care at the first sign of a problem. Dr. Virginia Clemans was Best Friends’ chief veterinarian from 2001 to 2004. 3-28 Best Friends’ ABCs of Dog Life Section 3: Health and Care Caring for Your Older Dog By Sherry Woodard Whether you have been sharing your life with your dog for years or a senior dog has just joined your family, having an older dog has many benefits. For one thing, adult dogs often need very little house-training. If given access to a dog door, most will routinely go out to eliminate; a few need to have the door flap clipped up for a day or two so they get the idea. Dog doors are great for those senior dogs who have to answer the call of nature a bit more frequently. Adult dogs have usually passed the restless, destructive chewing stage that young dogs and puppies go through. They are more mellow and need less exercise than young dogs. Even adult dogs, though, need things to do and chew. They enjoy light exercise, practicing basic cues, and finding hidden treasures with their noses. Dispensing toys like Buster Cubes, Kongs, and TreatStik can be loaded with appropriate treats for your dog and placed around the house to encourage working for food. Keeping dogs social is also important for their emotional health. Many dogs love going out to see other doggie friends or having friends over for a visit. Some dogs seem to become much younger when they have an active social life or when a new, slightly younger dog is adopted into the family. Of course, your old dog will want to help choose the new addition! As our dogs age, there may be physical changes to address. They may need a change in diet or some arthritis pain medication. The older dog’s eyesight or hearing may start to diminish. You can accommodate failing eyesight by keeping the furniture and water bowls in the same locations. A hard-of-hearing dog can wear a vibrating collar and be taught that when it vibrates, a treat is forthcoming. Once that association is taught, the dog will look for you to hand her a treat if the collar vibrates. Instructions to make Best Friends’ ABCs of Dog Life a vibrating collar are found at the bottom of this web page: If at any time your dog’s behavior changes, a trip to see your veterinarian is in order, since a dog’s health can affect his behavior. Don’t wait for your routine examination or yearly blood work; medical needs can change at any age. Sharing our lives with dogs into and throughout their adulthood teaches us how precious their lives are. I buy them comfy beds, hand-feed them, and tell them I love every hair on their bodies (even the ones they have shed). Enjoy every moment with your older dog! 3-29 Section 3: Health and Care Living with a Diabetic Pet by Dr. Patti Iampietro Diabetes mellitus is a common disease in both dogs and cats. The good news is that animals with diabetes can lead full, happy and — yes — healthy lives. A close relationship among you, your pet and your veterinarian is the key to successfully living with and caring for a diabetic pet. better. In fact, because diabetes can arise slowly, you may not realize just how affected your pet was until he is treated and back to his old self! Daily Care Caring for a diabetic pet is a lifelong commitment, but the day-to-day care of most stable diabetic pets is actually quite simple. They can sleep in your bed, hang out with you on the couch, go to the park, swim, play, and in general act and be treated like any other pet. Your diabetic pet does, however, require insulin each morning and night, every day, twice a day, forever. This is not nearly as scary as most people think. The needles are very small, and there are ways you can make administering the insulin an easy, and even fun, part of your daily routine with your pet. It is important that your pet feels well and eats a full meal prior to his shot. As he is finishing his meal, you can typically sneak in the insulin shot without him even noticing … yes, really! Or you can associate the shot with a special treat or game or just some one-on-one quality time so your pet looks forward to this time together. Your veterinarian will teach you how to administer the insulin. If your pet is part of a family, involve all family members who are mature enough to care for your pet. This helps to ensure that the shots are not forgotten and are given on time, and certainly helps to make sure any problems are noticed. It’s a great idea to keep a simple daily log in a spiral-bound notebook tracking who gave the insulin and when it was given, along with a notation about your pet’s well-being each day. Watch your pet closely for early signs of not feeling well. Your pet must be on a stable diet, with regular feeding times of consistent quality and quantity Best Friends’ ABCs of Dog Life Diagnosis Diabetes in pets is fairly straightforward to diagnose and treat. The most common signs you may see at home are increased thirst and urination, increased appetite and/or weight loss. Although there are other diseases that can cause similar signs, a few quick tests by your veterinarian can determine if diabetes is present. Blood work and a urine sample are typically sufficient to confirm the diagnosis. Dealing with diabetes in your pet may seem daunting. There are things to consider, such as cost, time commitments, medication, and possible complications of the diabetes itself. Your veterinarian will help you fully understand the disease and be able to avoid complications or more quickly address problems if they do arise. The most complicated and sometimes frustrating part of living with a diabetic pet occurs during the first few months after diagnosis. This is typically when costs are most high, your learning curve is most steep, and more complications can arise. Some pets are quite sick at diagnosis and need to be hospitalized, or there may be complicating factors such as urinary tract infections, skin infections or pneumonia. Some pets take weeks or months to become regulated as your veterinarian determines the appropriate dose of insulin. Hang in there during these early months. Most pets recover quite well with appropriate care from a veterinarian and go home feeling much 3-30 Section 3: Health and Care wobbliness, disorientation, vomiting and even seizures. The solution: Do NOT give insulin; feed your pet if she is able to chew and swallow; call your vet immediately. Don’t panic. This is not a sign that you have to give up. It does mean that you have to work with your vet to readjust the insulin to a lower dose. Throughout a diabetic’s life, the insulin requirements will change. Not all adjustments are associated with signs of hypoglycemia, but you should know what to look for. Another good thing to have on hand is the number of an after-hours emergency veterinary clinic. You need to have a Plan B in case your vet is not available. Hyperglycemia, or high blood sugar, may be signaled by increased thirst and urination, “accidents” in the house, excessive hunger and stealing food, and weight loss. The solution: Call your vet and arrange for him/her to help you adjust the insulin. Again, don’t become discouraged. Even though these signs are not as severe as the signs of hypoglycemia, they can be quite frustrating for a caregiver. Work closely with your vet, since he/she can often help you get these symptoms under control, making your life (and your pet’s life) much easier. of food. It is not a good idea to share your people food with your pet or offer your ice cream bowl to finish. Your pet must always have access to fresh, clean water. Even a well-regulated diabetic will drink more water than a typical dog or cat. Your diabetic pet can be an active part of the family, but remember he cannot regulate his own blood sugar, so you need to make sure that if he is really active in a day that he receives small snacks and, as always, has access to plenty of water. Getting Help If you feel that caring for your diabetic pet is just too much for you to do, ask for help. There are often sympathetic friends, family, neighbors, veterinary technicians, and other pet lovers in your life who will be happy to help. You can ask your veterinarian for sources of help. Many pet owners have found great support and advice on websites set up by others caring for diabetic animals. At there’s a comprehensive list of diabetes-related pet websites. Always remember: You do not have to do this alone! Once you get a system in place, you will find that caring for your diabetic pet is really not as difficult as it might have seemed at first, and your pet can bring you many years of joy. Dr. Patti Iampietro is one of the staff veterinarians at Best Friends Animal Society. 3-31 Potential Complications To care well for your diabetic pet, you need to be aware of potential complications. Most of the things that you need to watch for fall into two categories: • Signs that the blood sugar is too low (hypoglycemia) • Signs that the blood sugar is too high (hyperglycemia) Hypoglycemia, or low blood sugar, is the more serious of the two complications. Signs include Best Friends’ ABCs of Dog Life Section 3: Health and Care Living with a Deaf Dog A lot of the same things that cause hearing loss in humans also cause hearing loss in dogs. Dogs can be born deaf (congenital deafness) or can become deaf because of some injury, disease, drug, toxin, or simply as a result of aging (acquired deafness). The most common cause of congenital deafness is related to the amount of pigment (coloring) that the dog has. The proper development of the hearing mechanism depends partly on the development of pigment in certain cells of the inner ear. If there is no pigment development (as seen in dogs who are white), these cells do not function properly and the animal may be deaf. A white animal with blue eyes is more likely to be deaf than a white animal who has gold, green, or brown eyes. Acquired deafness can happen after an injury to the head or ear canal. Certain drugs can also cause deafness. Even chronic ear infections can eventually cause deafness. It may be difficult to determine whether or not your dog is deaf. A dog who doesn’t respond to being called or to other noises may be deaf, or he may just have “selective hearing,” meaning that he hears when he chooses to do so! Older animals may experience a gradual loss of hearing as part of the aging process. The only sure way to know if your dog is deaf is to have a Brainstem Auditory Evoked Response (BAER) test done. Unfortunately, this test is available only at veterinary schools or large referral hospitals. If you believe that your dog is deaf, start with a complete health checkup by your veterinarian. After receiving a clean bill of health, you can work with your deaf friend to teach him or her how to recognize basic cues. Dogs who are deaf can lead long, healthy, happy lives. If you’re patient with training, they can be 3-32 Best Friends’ ABCs of Dog Life taught to respond to cues as well as any hearing dog. In terms of learning principles, deaf dogs are trained just like dogs with normal hearing. The biggest difference lies in how we get their attention, and what type of cues we use to ask for a behavior. Teaching a deaf dog to respond reliably to the “come” cue when she’s not on leash is probably the biggest challenge. The simplest solution is to keep her on a long leash rather than wonder how to get her to look at you when she is 50 yards away and looking at a rabbit. Indoors, stomping your foot on the floor will create vibrations that can signal your dog. If the dog is off-leash in a fenced yard at night, try using a flashlight. Laser pointers also work well at night and sometimes even in daylight. (Caution: Never shine a laser pointer anywhere near your dog’s head, as it can cause eye damage. Point the laser at the ground or on an object in front of your dog.) Section 3: Health and Care You can also train your dog to come to you in response to a flashing light: You can flick your porch light off and on when your dog is outdoors at night; indoors, you can use the room lights. If you’re gadget-oriented, you might want to buy a remote-controlled vibrating collar, which creates a sensation similar to that of a cell phone or an electric toothbrush. To teach most behaviors, such as sit, down and stay, the techniques of capturing or luring work equally well for deaf dogs and dogs with good hearing. In some situations, in fact, deafness is an advantage because deaf dogs are less susceptible to random distracting noises during training. Instead of using a verbal cue (“sit,” “stay”), you’ll use a visual marker, such as a hand signal. Dogs are actually more naturally disposed to respond to visual cues. (It is humans who like to put words to things.) A few more points worth mentioning: • Although verbal praise may not be a meaningful reinforcer for a deaf dog, you are not limited to food as a reward. Physical contact like petting or other playful interactions can be highly desired rewards for any dog. • The loss of hearing associated with normal aging occurs gradually and in stages. The few studies done show that hearing is lost first in the middle- to high-frequency range of sounds, with the hearing loss for low-frequency sounds coming later. Therefore, your dog will be able to hear you when you speak in a low-pitched voice for a longer period of time than when you use a normal or high-pitched voice. Sometimes, whistles (sports or dog whistles, or using your own mouth) will work for certain partially deaf dogs. • Because hearing-impaired dogs can’t hear approaching cars, always pay extremely close attention to your dog whenever you and he are near a street or road. Finally, two excellent resources for people who have deaf dogs are the Deaf Dog Education Action Fund website at and the book Living with a Deaf Dog by Susan Cope Becker. Best Friends’ ABCs of Dog Life 3-33 Section 3: Health and Care Living with a Blind Dog When blindness strikes a pet, it can be quite sudden or it can slowly develop over time. If you think your dog has gone blind or is going blind, a trip to the veterinarian is in order as soon as possible. Blindness can be caused by a variety of medical problems, not just those affecting the eye itself. Diabetes in dogs can cause sudden blindness, as can cataracts or glaucoma. Diabetes is potentially life-threatening, so it’s important to make an appointment with your vet right away. Also, a quick diagnosis and treatment can sometimes restore the animal’s sight. If the medical conditions have been dealt with and your pet has been determined to be permanently blind, you need to be aware that blind pets need time to adjust to their new limitations. Here are some guidelines: • Do not approach and handle your pet without first announcing your approach. Gently say his name before trying to touch him, so he knows who you are. • Blind pets may not like to be picked up. They lose their orientation and may become frightened. Pet and play with them on the floor, where they feel more secure. • Limit changes in furniture arrangement and routines as much as possible. Place food and water bowls in familiar places that are easy to locate. • If your pet has recently become blind, carefully monitor her food and water intake until you are sure she is able to manage on her own. Despite these few limitations, life for blind pets can be quite enjoyable. Since dogs have such a keen sense of smell, walks can be just as much fun as they were before the onset of blindness. For safety, of course, it’s a good idea to keep your dog on a leash when you’re out walking and watch for obstacles in her path. If your dog is a ball or toy lover, he can still locate these things with his sense of smell. Again, make sure there aren’t any dangerous obstacles in the way when you play with your dog. The website contains suggestions for toys and games for blind dogs, as well as other resources to help you enhance your dog’s quality of life. 3-34 Best Friends’ ABCs of Dog Life Section 3: Health and Care Cleaning Up Pet Stains and Odors By Sherry Woodard If your pet has an “accident” in your home, it’s important to neutralize the spot with an enzymatic cleaner to completely get rid of the odor. Otherwise, the smell is an invitation to the animal to mark the same spot again. The enzymes in the cleaner (Nature’s Miracle, OdoBan and Simple Solution are good brands) digest the odor-causing protein in organic materials. These products are safe for use around pets and children. Bleach is also a good cleaner, but it is not as safe because it is often used at strong concentrations. (It may also bleach out your carpets or floors.) When using any cleaners, always read and follow the directions carefully. A black light can be helpful in locating urine accident sites, even old accident sites. Turn off all the lights in the room, except the black light, of course. As the stain lights up, you can mark the outline with chalk. You may need to rinse or soak the spot if prior efforts failed to completely clean the site. While accident sites are drying, they may still be attractive as an elimination spot. To discourage your pet, you can try covering the spot with vinyl, flannel-backed tablecloths, which are machine-washable, inexpensive, and unattractive to most dogs and cats. Best Friends’ ABCs of Dog Life 3-35 Section 3: Health and Care The Trouble with Breeding By Sherry Woodard Here are some reasons that people give for breeding their pets, and some things to consider: “We just want one litter, and then we will have her spayed.” Though much progress has been made toward solving the pet overpopulation problem, millions of wonderful animals are homeless, waiting in shelters for families to adopt them. Breed rescue groups have too many animals to place as well. Over four million pets are still put down each year in the U.S. for want of a home. Without realizing it, many people contribute to the pet overpopulation problem by having “just one litter.” By not breeding your pet, you become part of the solution. “We will find good homes for all the babies.” Every day, shelters take in pets who were in good homes, but their people moved, married, divorced or had a baby – and decided they had to give up their pets. Don’t let them be pets that you have created. “We want a kitten from our cat (or a puppy from our dog).” There are no guarantees that your pet’s offspring will be just like your pet. There are many wonderful, unique animals available from your local shelter or rescue group. You can love and cherish an adopted animal just as much as the offspring of your beloved pet. Shelter staff can help you find a pet with just the right personality for your family. And, think about how satisfying it is to save a life. “We heard that having a litter has health benefits.” Actually, the opposite is true. Pregnancy does not confer any health benefits, but spay/neuter has both health and behavior benefits. Spaying or neutering greatly reduces the risk of your pet developing mammary tumors in females and reproductive organ tumors in both sexes. Neutering reduces the urge to roam, urine marking, and aggression. There are risks associated with pregnancy and delivery. Animals sometimes have a difficult pregnancy, miscarry, or have stillborn babies or babies with defects. Your pet may need help with a surgical delivery (a Cesarean section), which could be expensive. “We want to get our money back on our investment.” Buying and breeding a purebred dog with the intention of raising money is not a realistic expectation. There is a large investment of money and time involved in breeding a dog and raising puppies responsibly until they are ready for sale. If you’d like a purebred dog or cat, you don’t have to spend a lot of money to get one. There are rescue groups for almost any breed and 25% of dogs at shelters are purebred. To locate a purebred rescue group near you, search the Internet using the word “rescue,” the breed name and your state or city (e.g., “Chihuahua rescue California”). If you’re thinking about breeding your pet, please think twice – for the benefit of your pet, your family and the homeless pets across the country. 3-36 Best Friends’ ABCs of Dog Life Section 3: Health and Care Zoonotic Diseases in Cats and Dogs By Virginia Clemans, DVM Zoonotic diseases are diseases that can be transmitted to people by animals. These diseases can be caused by internal parasites, external parasites, fungal infections, and dog and cat bites. Let’s look at some of these diseases and find out how they are transmitted to humans and how they can be prevented. Internal Parasites Giardia is the most common intestinal parasitic disease in humans in the United States. It is caused by a one-celled organism that can live in the intestinal tract of many species of wild and domestic animals. Dogs, cats, or humans infected with giardia may have diarrhea and/or weight loss, or may have no symptoms at all. The signs, if present, may be intermittent. Direct transmission from pets to humans is not considered to be a source of infection, but giardia can be transmitted indirectly via handling of contaminated feces or soil. Drinking contaminated water is usually the way giardia is transmitted, so drinking water from rivers or streams may be a problem for campers, hikers, and pets who use water for recreational purposes. Diagnosis is made by laboratory analysis of feces and an effective treatment is available. You can prevent giardia by not drinking water directly from lakes, ponds, and streams. Also, adults and children should wash their hands before eating and after handling dog or cat feces. Roundworms and hookworms can also be a problem in humans, particularly children. Roundworms are spread when a person accidentally ingests an infective egg. If you touch the ground or soil that contains the eggs, and then touch your mouth and swallow the eggs, you can get the disease. Roundworm occurs primarily in children, who pick up and eat contaminated dirt. Most cases occur because of lack of personal hygiene. Hookworms are another inBest Friends’ ABCs of Dog Life testinal parasite of dogs and cats that can cause disease in people. Transmission occurs when the larvae are accidentally ingested. The larvae can also penetrate the skin. Most cases of hookworm have been traced to the soft, wet sand at beaches or moist soil under buildings. Roundworm and hookworm infection can be detected by examination of the feces. Prevention involves the control of parasitic infections in our pets with regular testing and the use of dewormers. You should remove dog and cat feces from the environment on a daily basis. The best way to prevent infection is to wash your hands after handling dog or cat feces, after gardening, or before eating, and always wear shoes in areas that you think may be contaminated. Toxoplasmosis is another single-celled organism 3-37 Section 3: Health and Care that lives in the intestinal tract of rodents, cats, other animals and, potentially, humans. People become infected most commonly by eating undercooked meat. Infection can also occur by accidentally ingesting the organism after handling cat feces or while gardening. Women who are pregnant or considering becoming pregnant should see their physician regarding toxoplasmosis, particularly if they have cats as pets. In pregnant women, the disease can cause miscarriage, stillbirth, and serious birth defects. The best prevention is good personal hygiene. Cat litter boxes should be changed on a daily basis and pregnant women should avoid handling any cat feces or cat litter. disease. People can be bitten by ticks that fall off a pet and by sharing exposure to ticks in the environment. Tick bites and disease transmission increase in warm weather, when ticks are most active. Treatment is available for tick-borne diseases in animals and humans. The best means of prevention is to avoid tick bites, so avoid tick-infested areas and wear long pants, long sleeves, socks, boots, and repellent when traveling in areas that are habitats for ticks. Pets can be protected by some of the same products used to prevent fleas. Transmission of disease by feeding ticks requires a minimum of 12 to 24 hours of attachment, so ticks should be removed daily from pets and humans. External Parasites Fleas are wingless insects that feed on the blood of animals, including dogs, cats and people. Biting fleas can cause a wide range of signs in dogs and cats, from mild to moderate itching to extreme itching, hair loss and skin sores. People who are bitten by fleas usually have red, irritating, itchy bumps on their ankles and lower legs. If you’re allergic to flea saliva, you may have intense itchy reactions that can last for days. The fleas that bite dogs and cats prefer dogs and cats to people. Humans are usually bitten only when the flea burden on the pet becomes overwhelming or when the pet is absent. There are many effective flea-control medications available that are designed to rid pets and the environment of biting fleas, eggs, and larvae. Your veterinarian can help you choose products that are safe for both your pet and your family. When treating your pet for fleas, be sure to follow package directions carefully for the best and safest results. Ticks, besides being annoying to dogs and cats, can transmit diseases to people. These diseases include Lyme disease and Rocky Mountain spotted fever. There is no evidence of direct transmission of these diseases from pets to people. However, if ticks are found on your dog or cat, then there are ticks in the environment and you are at risk of tick bites and tick-borne 3-38 Fungal Infections Ringworm is a fungal infection of the hair, nails and skin caused by a unique fungus that has adapted to living on animals. The infection is commonly known as ringworm because of the typical circular shape of the skin lesions seen on the skin of humans. There is no “worm” involved, however. Among animals, ringworm is most commonly seen on cats, but dogs and horses can be infected as well. Some animals show no disease signs, while others may have patches of hair loss, scaling, and itching. Few animals show the classic circular, red crusty patches seen in humans. Cats, dogs and humans most commonly come into contact with the organism from the soil, from infected bedding or brushes, or from other animals. People can even spread the infection to their pets. An exact diagnosis in animals and people is made by appearance of the skin lesions and fungal cultures. There are a variety of anti-fungal creams, lotions, shampoos, and oral medications available for both pets and people. If ringworm is identified on your pet, all bedding, combs, and brushes must be thoroughly cleaned and disinfected. The fungal spores remain infective for up to 18 months, so remove as many as posBest Friends’ ABCs of Dog Life Section 3: Health and Care sible by vacuuming floors, surfaces, and vents. Steam-cleaning carpets is also necessary. Avoid contact with stray animals, particularly if they show signs of ringworm infection. The best way to prevent ringworm transmission is diagnosing your pet early and following your veterinarian’s instructions completely when treating your pet. Dog and Cat Bites Most dog and cat bites are not severe but, depending on the location of the bite and the severity of the wound, bites can result in infection and damage to bones and soft tissues. Aside from people who handle dogs routinely, such as veterinarians, most dog bites occur in children under the age of 12. The damage inflicted by dog and cat bites is a function of both the physical trauma associated with the wound and the bacteria that spread from the animal’s mouth into the wound. Your pet’s mouth contains many bacteria that can cause disease if it gets into a wound. The majority of bites result in small wounds, but even the smallest wound can become infected. Signs of infection in people and animals include pain, swelling, redness, and/or drainage from the wound. All animal bites should be vigorously cleaned with soap and water. A physician should see all bite victims, and animals bitten by another animal should be seen by a veterinarian. Following a bite, many people and pets are treated with antibiotics to prevent infection. Bites can be avoided by taking measures to prevent the interactions that lead to bites. People who have pets should learn proper methods of obedience training, and children should be taught to avoid loose or unfamiliar dogs or cats. Young children should always be supervised when playing with dogs or cats, and no child should be left alone with a dog or cat. Remember, most bites involve children, and bite victims can suffer from long-term negative physical and emotional effects. Dr. Virginia Clemans was Best Friends’ chief veterinarian from 2001 to 2004. Best Friends’ ABCs of Dog Life 3-39 Section 3: Health and Care 3-40 Best Friends’ ABCs of Dog Life Section 4: Socialization, Basic Training and Enrichment Section 4: Socialization, Basic Training and Enrichment Best Friends’ ABCs of Dog Life 4-1 Section 4: Socialization, Basic Training and Enrichment cues. a few resources: • How to Teach a New Dog Old Tricks by Ian Dunbar (1996). A comprehensive workbook for the motivated dog person, with sections on basic off-leash obedience, temperament modification, behavior troubleshooting, training theory and health care. • The Whole Dog Journal is a monthly guide to natural dog care and training. It contains helpful information on new training methods and products, and accepts no commercial advertising. Approximately 25 pages each month. For more information, read the other training resources in this manual and “Recommended Dog Training and Care Resources” in Section 1. Best Friends’ ABCs of Dog Life 4-2 Section 4: Socialization, Basic Training and Enrichment Getting the Behavior You Want from Your Dog By Sherry Woodard All dogs benefit from learning how to behave appropriately when sharing space and time with their human family members and their other animal friends. Dogs aren’t born knowing how to interact politely with people, so you’ll need to teach your dog the basics using positive reinforcement.” Best Friends’ ABCs of Dog Life 4-3 Section 4: Socialization, Basic Training and Enrichment: • Ask your dog to sit before going outside and before coming back in. • Use “down” before giving your dog a meal. • Use “sit” before giving the dog a treat or toy, or before throwing a toy for a game of fetch. •. 4-4 Best Friends’ ABCs of Dog Life Section 4: Socialization, Basic Training and Enrichment Improving a Dog’s Social Skills By Sherry Woodard All dogs can benefit from practicing their social skills. Many dogs lack basic social skills, either because of limited exposure to other dogs and people, or a lack of positive experiences. Dogs who were raised without leaving their house and yard often show fear of many commonplace situations, such as meeting new people. These dogs are uncomfortable near new people because they look, smell and sound different from their families. unsuitable family pets. We can help these dogs by teaching them that the world isn’t as scary as it seems. Here is a list of things to practice with a dog to get him up to speed on his social skills and more comfortable with all types of situations. When working with a dog, try to check all the boxes and use a fresh copy of the worksheet each month. If your dog develops positive associations with meeting new challenges, he will soon be comfortable and relaxed, ready to go places and do many fun things. Dog Socialization Check-Off List Handle all the dog’s body parts on a daily basis, giving praise and small food rewards for relaxing. As the dog becomes more comfortable, have other people start to handle the dog, too. Introduce the dog to people. People of various ages: q Newborn to three months q Three months to six months q Six months to nine months q Newly walking toddlers q One year old q Two years old q More than one toddler at a time q Three to four years old q Groups of children playing q Teenagers – boys and girls q Adults – many different ones q Seniors – many different ones Differences in people: q Loud man q Loud woman q Ethnic differences q Using oxygen q Using a cane q Using a walker q Using a wheelchair q Other ______________________ Best Friends’ ABCs of Dog Life 4-5 Section 4: Socialization, Basic Training and Enrichment People doing different things: q Singing q Dancing q Clapping q Jumping q Hopping q Skipping q Whistling q Jogging q Other ______________________ People wearing different things: q Hats q Glasses q Sunglasses q A helmet q Coats with hood up q Capes with hood up q Gloves q Masks q Big boots q Uniforms Introduce the dog to other animals. To keep all pets safe, supervise at all times. q Cats q Kittens q Dogs q Puppies q Horses q Small pet animals Introduce the dog to household activities. If the dog was an outdoor pet, everything will be new, so don’t do too much at once. q Vacuum q Broom q Mop q Alarm clock q TV q Radio q q q q q q q q q q q q q Noise-making children’s toys Children’s pull toys Umbrella (open and close it) Dog nail clippers Dog brush and comb Sound of electric hair clippers Sound of electric fan Plastic bags flapping A balloon with air escaping A recording of storm sounds A kite Things being dropped Other _________________________ Introduce the dog to the big, wide world. Take the dog on many different types of outings. q Ride in cars q Walk on different flooring q See people on skates q Use stairs with and without backs q See people using shopping carts q Walk on bridges q Meet new friends q Visit other people’s homes q Take the dog to be groomed q See and smell parks q Sit at coffee shop with you q Use elevators q Use automatic doors at stores q See people on bicycles q Other _________________________ 4-6 Best Friends’ ABCs of Dog Life Section 4: Socialization, Basic Training and Enrichment Teaching Your Dog Basic Cues By Sherry Woodard Teaching a dog to respond to basic cues, using small food treats as a lure, is easy, fun and gives fast results. Here’s how to do it: Teaching “Sit” Hold a treat in front of the dog’s nose, just out of the dog’s reach. Raise the treat toward the top of the dog’s head. When the dog’s head follows the treat up, the dog’s rear end will go down. When the dog’s rear is solidly on the floor, give the dog the treat and praise her. If the dog jumps up rather than sits, you are holding the treat too high. If the dog backs up, try teaching the cue with a wall behind the dog. Teaching “Down” laying down, try again. Once the dog lays down, praise him and give him the treat. Best Friends’ ABCs of Dog Life 4-7 Section 4: Socialization, Basic Training and Enrichment Teaching “Stand” Start with the dog sitting in front of you. Slowly move the treat toward your body and take one step back. As the dog follows the treat, she will stand up. Give her the treat as soon as she is standing. Adding a Verbal Cue When the dog is consistently performing the behavior you want (e.g., sitting), add a verbal cue (e.g., “sit”) when the dog is sitting. If you start giving the cue before the animal is offering dog to learn that a particular cue is associated with a particular behavior. Teaching “Sit” from “Down” Start with the dog laying down. Hold a treat in front of the dog’s nose, keeping the treat close to his nose. Slowly raise the treat up over his head. As he follows the treat, he will move into a sit. Give him the treat as soon as he is sitting. 4-8 Best Friends’ ABCs of Dog Life Section 4: Socialization, Basic Training and Enrichment Clicker Training for You and Your Pets By Sherry Woodard What is clicker training? Clicker training is a fun and effective way to communicate with your pets. You can train almost any kind of pet – including cats, birds, dogs,.” took off when trainers realized how easy and effective it was. How does clicker training work? Clicker training works by getting your pet to expect something positive (like a treat) in return for doing something you ask him or her to do. You use the clicker so that your pet will associate the treat with the clicking noise. (By the way, you don’t have to use a clicker; if your dog is frightened by the clicker sound, try clicking a ballpoint pen.) Eventually, you won’t even have to use treats; your pet will respond to the clicker alone. Best Friends’ ABCs of Dog Life How do I do clicker training? To start, make sure you have your clicker and some soft treats on hand, cut or broken up into small pieces. You don’t want treats that are too crumbly, since you want your pet to focus on you, not the crumbs dropping on the floor. Step 1: Face your pet. Push and release the clicker, then give your pet a treat. Practice this a few times. You want your pet to expect a treat every time she hears the clicking noise. 4-9 Section 4: Socialization, Basic Training and Enrichment Step 2: Ask your pet to do something easy – like “sit.” Then, as she is doing what you’ve asked, click the clicker and offer the treat. Make sure you click and offer the treat while your pet is sitting, so she connects it all together – the click, the treat, and the act of sitting.: • A head tilt • Holding up one paw (high five!) • Sitting up on her hind legs • Dancing or turning in a circle Remember: • Click while the behavior is happening. • Always click first, then offer a treat. • Only click once. One last thing: Keep the practice sessions short. You want your pet to enjoy clicker training, so don’t make it into a chore. Have fun clicker training your pet! What if my pet doesn’t do what I asked?). If your pet is still not responding, you can do a click when there’s even small movements in the right direction. For example, if you are working on “come” and your pet takes two steps in the right direction, click the clicker and offer a treat. Don’t ever push, pull or force her to do what you want. Where can I find out more about clicker training? Here are two websites to check out: 4-10 Best Friends’ ABCs of Dog Life Section 4: Socialization, Basic Training and Enrichment Teaching ‘Come’ By Sherry Woodard The best way to have your dog come reliably is to make it a party every time you call her and she comes to you. Whether the party involves giving treats, affection, praise or toys, she should never have a reason to think twice about coming to you. saying “come” and giving treats. You and your friend can start moving farther away from each other and have the dog on a long leash so she can run between you for fun and treats. This can grow Best Friends’ ABCs of Dog Life into a long-distance game of recall. It’s a great way for your dog to interact, exercise and learn to enjoy more people. One of the reasons that “come” can be challenging to teach is that much of the time, it is. 4-11 Section 4: Socialization, Basic Training and Enrichment Teaching ‘Down’ and ‘Stay’ By Sherry Woodard “Stay” is a lifesaving cue to teach all dogs. When can “stay” save your dog’s life? Whenever giving the cue would prevent your dog from making a mad dash out the front door, the car, or the backyard gate. Stay is a cue that many people forget to practice – and without practice, your dog may not have this skill when it truly matters. Prepare yourself for the lesson with pea-sized treats in a treat pouch you wear and/or a favorite toy tucked in your pocket. Select a place with few distractions. I offer a flat pad or mat for the dog to lie on. I think it helps communicate to the dog that if he moves from that spot, he will be going back and trying again before a reward comes his way. For the dog’s comfort, I teach him to stay in a “down” position. He can wiggle in a “down” without leaving his stay, whereas wiggling in a “sit” or “stand” often means leaving the desired position. Down If your dog doesn’t know “down,” here’s how to teach him: lying down, try again. Once the dog lies down, praise him and give him the treat. When the dog is consistently doing a “down,” add a verbal cue (e.g., “down”) when the dog is lying down. If you start giving the cue before 4-12 the animal is doing. Stay To teach “stay”: Have your dog lie down. Put one hand out toward him and say “stay.” Give a treat quickly, before he moves. He may then get excited and stand up. Have him lie down again and repeat: Say “stay” and give a treat quickly so he gets the idea that the treat is given only when he is down. Then, start lengthening the time before the treat is popped into his mouth. I start using a release word to indicate that the dog may move. In fact, I use the word “release” because it is a word not often used in casual conversation. Once your Best Friends’ ABCs of Dog Life Section 4: Socialization, Basic Training and Enrichment dog is waiting consistently in a “down,” move one step away before stepping back and giving him the treat. Use small steps for best results. I continue this process, gradually increasing the number of steps back, until I have the dog waiting for a treat while I leave the room and return. If your dog is high energy or easily bored, you can start the lessons with a tether on him so he cannot move away. If you started with a tether, remove it once you have a brief “stay.” If your dog needs many lessons with the tether before he has the self-control necessary to do a “stay,” don’t worry. Some dogs need more time to get the idea. Remember to keep all learning as fun as possible. Use a happy tone, be patient, and keep lessons short and frequent. Best Friends’ ABCs of Dog Life 4-13 Section 4: Socialization, Basic Training and Enrichment Teaching ‘Leave It’ By Sherry Woodard. Teaching “leave it” is not difficult. Do the lessons inside your home or in an area with very few distractions. I prepare by loading a treat pouch with pea-sized, high-value treats — food the dog will find enticing but won’t take him a long time to eat. I place a boring item (something the dog has not seen before) on the floor. The item — an unopened can of human food from the kitchen, for example — will get the dog’s attention but most dogs won’t want to pick up the can. Allow the dog to approach the can and as he starts to sniff, say “leave it” in a happy tone and pop a treat into his mouth. Change the item to something else that he probably won’t want to pick up and repeat the exercise. Try five different items, repeating the exercise, and each time move farther away from the item so the dog has to come to you to get the treat. After using five different “boring” items and gradually increasing the distance between the dog and the treat, start using slightly more exciting items. You know your dog, so you alone know what items he would consider more in- teresting, but don’t jump to “high-value” items right away. To increase his chances of success at learning the cue, you want to work up to highvalue items gradually. If Kleenex or a piece of plastic, for instance, would attract your dog on a walk, don’t start with those. Choose the items based on your ultimate goal: Anytime you say “leave it,” you want to be confident that your dog will indeed leave whatever it is and come to you. The reward can change as well. If your dog has a favorite toy, squeak it and play for a moment when he comes running to you after leaving the other item of interest. Most dogs love interacting with us, so a moment of praise or play with a toy can be just as effective as a treat. Even though you’re practicing “leave it” as a way to keep your dog safe, you want him to see it as a fun game you play. When your dog is proficient at the game in your home, start practicing in a variety of locations with more distractions. 4-14 Best Friends’ ABCs of Dog Life Section 4: Socialization, Basic Training and Enrichment Teaching ‘Speak’ and ‘Quiet’ By Sherry Woodard Why would you want to teach your dog to “speak” (bark)? Well, teaching a dog to bark on cue can actually help control excessive barking. Plus, barking is one way for dogs to express themselves. It’s a good idea to teach “quiet” first, though, especially if your dog is very talkative. Have a supply of soft, small yummy treats at the ready. You can teach “quiet” by rewarding the dog with a treat between barks. You want to be clear that you are rewarding the quiet, not a bark, so use a marker — a clicker or your voice saying “yes” — at the quiet moment. Start by rewarding a quiet moment, then reward for longer and longer periods of quiet. Add a verbal cue (“quiet,” for instance) once the dog is consistently giving you the behavior you want. If you start giving the cue before the animal is doing the behavior, the dog may not. Your dog will learn that if you give the cue “quiet,” she will only be rewarded if she doesn’t make a sound. To teach “speak,” I often have another dog act as a role model. This technique works amazingly fast if you are rewarding the “speaking” dog with treats. Tether both dogs and stand in front of them so you can be ready to reward the “speaking” behavior from each dog. If you do not have a role model who speaks, start by tethering your dog and standing in front of her. Show the dog the treat and wave it close enough for the smell to be enticing. Most dogs will then start offering any behaviors that have been rewarded in the past (sit, down). Others may wiggle and seem confused. Give the dog time to become slightly frustrated. It doesn’t take more than a minute for most dogs. If the dog makes any sound — a whine or a yip — give her a marker (a click from a clicker or a verbal “yes”) to mark that moment, then reward her with a treat. Step back and wait again. I reward for any sound for about five repetitions, then I wait for more sound. If I don’t get a bark but do have more vocalizing, I continue to reward the dog. As with teaching “quiet,” get the behavior first and then start giving a cue (e.g., “speak”) while the dog performs the desired behavior. Gradually move the cue back in time until you are giving the cue before the dog barks. Best Friends’ ABCs of Dog Life 4-15 Section 4: Socialization, Basic Training and Enrichment I have met many people who say they will never again teach a dog to speak because their dog started barking all the time, as a way of requesting treats. If you want your dog to speak on cue, reward her for speaking only when you have asked her to speak. Ignore any unsolicited barking: Turn your body away or walk away. To increase your rate of success, practice both of these cues often and remember to keep it fun. Talkative dogs love to interact! With that said, I do meet dogs who are not barkers. If your dog is not enjoying learning to speak, I suggest that you move on to something both you and your dog will enjoy. 4-16 Best Friends’ ABCs of Dog Life Section 4: Socialization, Basic Training and Enrichment Teaching Your Dog to Enjoy Touch By Sherry Woodard Many dogs have sensitive areas where they would rather not be touched. If you’ve adopted a dog with an unknown past, you may never know what past experiences triggered your dog’s current aversion to having certain areas of his body touched. These past experiences may have included one or more of the following: • If the dog’s nails were cut to the quick, it is very painful. The next time someone tries to lift and hold a paw, the dog may expect pain. • If the dog was badly matted or overdue for a grooming, her hair may have been pulled during grooming. Mats themselves can become painful as they pull on the skin. • Lack of socialization is a common reason that some dogs don’t enjoy touch as much as they would if they had been properly socialized. You don’t have to accept the status quo, however. You can help the dogs in your life learn to enjoy touch more. First, see a veterinarian to rule out any medical causes for the discomfort. Then, you can begin to work on teaching your dog new associations to touch. Here are a few things you will need: • Comfortable clothes that allow you to move freely. • A lead, to let the dog have freedom of movement without allowing wandering. • A washable mat big enough for you and the dog to sit on. Ideally, the mat would be big enough so the dog could lay down on the mat next to you or between your legs. • A treat pouch, such as a fanny pack with a zipper or other closable pouch. • Treats to fill the pouch. The treats should be small enough so that doling out many treats won’t be a meal or cause stomach upset. (Try mixing dry kibble and soft moist kibble.) Best Friends’ ABCs of Dog Life • A grooming kit: a comb, a brush, and nail clippers. (These are for teaching more than actual grooming.) If you are doing this exercise at home, you might want to work with the TV or radio on allow or, if needed, encourage the dog to investigate. Sit on the mat with the dog and bring her toward you with the lead. Don’t stare directly into the dog’s eyes or lean over the dog, since the dog may find this behavior threatening. Allow the dog about 2 1/2 feet of lead for movement. Once she relaxes – either in a standing, sitting or prone position – you can loosen the lead, but keep it under part of your body so that she cannot wander off. Make sure you are relaxed yourself – if this exercise is going to be relaxing for the dog, you must be relaxed as well. Start talking to the dog using a calm, soothing voice. Next, touch her 4-17 Section 4: Socialization, Basic Training and Enrichment and pet her, using gentle pressure. Move your hand slowly so you don’t startle her. Try not to touch the spots that she is uncomfortable with. Depending on how sensitive the dog is, she may relax quickly or not relax much the first time. You might have to do several sessions before you see and feel the changes in her energy and body language. Some dogs are fearful of touch in general and will need many sessions of these exercises to become relaxed. All sessions should be kept short, starting with five minutes. When the dog begins to relax, add five more minutes, and continue adding time until the dog is able to fall asleep. Some dogs need help on very specific body parts, such as feet or ears. If that’s the case with your dog, don’t touch those areas the first couple of sessions, just get close to them without touching them. After three sessions, move near the problem area and then touch it, watching closely for a reaction. Use caution here! If he has a negative reaction (such as moving away from you), offer a small treat and start touching other parts of his body again. Gradually work your way back to the problem area, and then give a treat and touch the sensitive spot. If he reacts positively, repeat the process: Touch his whole body and return to the problem area, giving a treat if he stays relaxed. Remember to keep the sessions short until you have a relaxed dog. Once you have a relaxed dog, you can proceed to lifting and holding his paws, lifting his lips and rubbing his gums, giving hugs, combing and brushing, and looking in his ears. If you want to progress to clipping his nails, the first step is to simply move the nail clippers near his feet. Next, just touch the clippers on the nails and watch your dog’s reaction. Always back up the process if he appears anxious or upset.. 4-18 Best Friends’ ABCs of Dog Life Section 4: Socialization, Basic Training and Enrichment Helping Your Dog to Enjoy Car Rides By Sherry Woodard are some steps you can take to help your dog enjoy car rides: 1. Don’t feed your dog her daily meal before doing the exercise. Start with a walk out to the car. If your car is in an unfenced driveway, keep her on a loose lead for safety. Open the car door and hand the dog a small piece of food or her favorite toy, which you have retrieved from inside the car. If your dog doesn’t want to get into the car, walk back to the house. (If the dog does get into the car, move on to step 2.) Repeat this step one to three times each day for six days. Best Friends’ ABCs of Dog Life three times each day for six days. Hopefully, when she feels more relaxed, she will surprise you and climb in. You can also up the ante by using a more enticing food treat (like boiled chicken) as you move further into the car. “okay,” and climb out together (you first) and go for a short walk – another reward. Practice three times in one day. 4. On another day, repeat step 3 but this time have your dog eat her whole meal out in the car. Sit in the car with her next to you and 4-19 Section 4: Socialization, Basic Training and Enrichment let her eat. After she has finished, release her with an “okay” and take a walk.! 4-20 Best Friends’ ABCs of Dog Life Section 4: Socialization, Basic Training and Enrichment Dogs and Aggression By Sherry Woodard social hierarchy. Because people don’t communicate in the same ways that dogs do, misunderstandings between people and dogs can occur. If a dog feels intimidated, confused or threatened by a person, the dog may growl, show his teeth, or snap. Unneutered dogs. Aggression between dogs and people can be very dangerous. If your dog has ever hurt (broken the skin) of a person, it is your responsibility to seek help from a behavior specialist for your dog’s aggression.. If your dog has broken the skin on another dog, you should still be concerned about injury to people, since they can be bitten trying to stop dog fights. Again, you should seek help from a behavior specialist for your dog’s aggression. Best Friends’ ABCs of Dog Life 4-21 Section 4: Socialization, Basic Training and Enrichment If your dog suddenly starts exhibiting aggressive behavior, there could be a medical cause, so consult your veterinarian first. If that’s ruled out, ask your veterinarian to recommend a behavior specialist. Choose an expert who uses positive reinforcement. structure. Some dogs may place themselves higher than people in their perceived group or human family. Dogs who show dominance toward people need training to help build healthy relationships. The training must be done with positive reinforcement, – such as. 4-22 Best Friends’ ABCs of Dog Life Section 4: Socialization, Basic Training and Enrichment The Look of Fear in Dogs By Sherry Woodard Dogs vary in their basic approach to the big wide world: Some have a “bring it on” attitude and others are fearful. A dog’s body language will change as he becomes fearful. What does a fearful dog look like? • His ears will be flat if they normally stand up or will lay back against his head if they are normally floppy. • Her tail will be down low or tucked under her body, between her legs. • He will hold his head down; he may try to avoid eye contact. • Her body will be tense and will sometimes tremble. • He may urinate or defecate as you approach. • She may try to hide or run away. • He may exhibit excessive drooling, panting or yawning. • She may offer threats to try to scare you away: She may become motionless or stiff, show her teeth or lunge at you. A dog with healthy behavior has the following characteristics: • She is friendly with adults and at least tolerant of children. • He can be handled by you and other people, such as the veterinarian, the groomer or a stranger giving a casual hello. • She is friendly with other dogs and plays well with them while young (of course, she may play less as she gets older). • He relinquishes control of food and other objects, such as toys, without any guarding behavior, like growling. • She is affectionate without being too needy. She can be left alone for reasonable periods of time without any dire consequences. It’s possible to work with fearful dogs so they can become adoptable. When working with a fearful dog, be extra gentle and patient. Some may always be shy around new people and new places, but with patience and understanding, a good home can be found. Use caution while getting to know fearful dogs. If you have not worked with dogs before, you may need help to start building trust and a respectful relationship with a fearful dog. Fearful and shy dogs benefit from being around behaviorally healthy dogs, who serve as role models. The fearful dogs watch and learn. Training is also helpful to fearful and shy dogs, since learning basic cues and agility builds their confidence. Simply going out in public places to socialize will help fearful dogs to become more confident and gregarious. You might invite your friends (who are strangers to the dog) to offer small food treats to teach the dog about the pleasant rewards of interacting with people. Best Friends’ ABCs of Dog Life 4-23 Section 4: Socialization, Basic Training and Enrichment Fun Things to Do with Your Dog By Sherry Woodard There are many activities that you can enjoy with your dog. Here are some examples: Agility.. There are various organizations in the United States that sanction agility trials. For more information, visit. com. Click on “Videos” and then search for “agility training for dogs.” Animal-assisted activities (AAA). These activities (AAT). the website for the Delta Society (), whose mission is to improve human health through service and therapy animals. Backpacking. Dogs, like people, love to get away from it all! If you’re going on a backpacking trip with your dog, plan ahead. Taking a dog out on the trail without some type of fitness conditioning can be dangerous to your dog’s 4-24 health. Fitness doesn’t come overnight, so start the process well before your trip. Check with a local authority to see if pets are allowed in the area where you’ll be trekking; some places allow dogs, but require permits. Carry a firstaid kit for you and your dog, and know how to administer basic first aid if your dog becomes injured. At any time of year, remember to pack enough water for you and your dog. For more information, visit hike.html. toysized, supervise him or her closely around other dogs. While trying to play, a big dog may injure a small dog unintentionally. Some parks have a section exclusively for small dogs. For more information, visit. html. Freestyle musical dance. This choreographed set of moves, performed to music, is done by dogs in partnership with their handlers. If you have not seen this new “sport” in action, you will be amazed at the level of expertise that can be achieved through teamwork, focus, and prac- Best Friends’ ABCs of Dog Life Section 4: Socialization, Basic Training and Enrichment tice, practice, practice. For more information, visit. Flyball.. For more information, visit. Hiking. Though most national parks don’t allow dogs on trails, there are many state parks that do. For more information on finding dog-friendly trails in your state, visit hikewithyourdog. com. Also, almost every city has trails. Obedience.: Vacations. If you haven’t taken a vacation with your dog, give it some thought. It can be very rewarding to have your dog along on your adventure, and many hotel chains accept dogs these days. To find dog-friendly lodging, visit, a website that also lists dog-friendly restaurants, parks, beaches and other attractions. The website called friendlytravel.com includes vacation rentals, such as cabins, condos and B&Bs. If you want to take it a step further, look into dog camps, the ultimate vacation for you and your dog. They provide games, training opportunities, and plenty of other dogs to interact with. For a list of dog camps, visit.! Best Friends’ ABCs of Dog Life 4-25 Section 4: Socialization, Basic Training and Enrichment Dog Toys By Sherry Woodard Dogs who have their own toys are less likely to be attracted to children’s toys, or to use household items – such as the garden hose or your favorite shoes – as toys. Most dogs love to play with toys, but just like humans, they get bored with the same old thing. So, get your dog a variety of fun and interesting toys to play with. The toys you buy should be appropriate for the size, strength, activity level and interest of your dog. For safety, you should watch how your dog uses (or rather, abuses) his toys. Some dogs will keep a soft toy forever without “killing” it. Other dogs will gleefully destroy their toys – it’s all part of the fun. But, it could be dangerous if parts of the toy become lodged in the dog’s mouth or throat, or are ingested. Wood and plastic can become lodged in gum tissue, causing painful injuries and infections that may require medical attention. If ingested, the toy parts can create blockages in the dog’s intestines, and surgery may be needed to remove the blockage. Please replace all dangerous items with appealing safe toys. Some examples of safe toys are Nylabones and Kongs. Nylabones are hard rubber chew toys that come in a variety of sizes and flavors. Kong-type toys, which come in a variety of shapes, are great fun – you can stuff them, freeze food in them, and hide them for a game of seek. Puzzle toys (Buster Cubes are one example) are also entertaining, safe toys that keep your dog occupied for a while. When the dog rolls the cube, treats fall out at random. If you have toys that are not dog-safe – for instance, stuffed animals that have ribbons, plastic eyes and other parts that may be chewed off – you can sometimes make them safe by removing the offending parts. Check what the stuffing is made of, too, since some toys contain sharp pieces of nut shells or plastic beads that your dog could ingest. If the toy has a squeaker inside, many dogs feel compelled to remove the 4-26 Best Friends’ ABCs of Dog Life noise-making item. Dogs who tend to be destructive with toys should only play with these toys under supervision. Take the toys away if you are leaving the dog alone. Check all toys periodically for wear and tear. Rubber balls and tennis balls are often favorite fetch toys. But, never throw them hard and fast toward the dog for her to catch – they may become lodged in the back of her mouth or throat. If your dog is extra large, you will need balls that are larger than tennis balls. Some dogs like to chase after rocks, but don’t use rocks as fetch toys, since they can wear down and even break your dog’s teeth. Section 4: Socialization, Basic Training and Enrichment If your dog loves chewing, you could try giving him Red Barn bully sticks or chipped rawhide. Again, though, watch him at first. Some dogs are so enthusiastic that they swallow without enough chewing, which could cause choking. Any product can be dangerous – watch your dog so you’ll be aware of his habits and preferences, and know how to keep him safe and busy. To get the most fun out of toys, keep some hidden away and trade a few out every week or so. That way, your dog will think she’s getting a constant supply of new toys.. Playing with your dog enhances both of your lives – the interaction provides exercise, stress relief, comic relief and bonding opportunities. Best Friends’ ABCs of Dog Life 4-27 Section 4: Socialization, Basic Training and Enrichment So Your Dog Has ‘Drive’? By Sherry Woodard When it comes to dogs, what does “drive” mean? Is there more than one type of drive? People talk about sex drive, play drive, prey drive. They also talk about drive in terms of high or low: a certain breed has a high prey drive, for example. I have read everything I could find on drive and have found no scientific evidence that “drives” can be generalized in dog behavior. Every dog is an individual and should be treated as such. There is no special energy stored in a dog for sex drive or prey drive or ball drive. What’s important is not whether a dog has a high prey or play drive, but what motivates each dog as an individual. We can learn how to use the dog’s preferences to encourage behavior we want or that the dog will enjoy. For instance, we can direct the dog’s energy into actions such as retrieving a toy, herding, lure coursing, participating in agility or flyball, catching a Frisbee, or doing scent work (detection or just hide and seek). Dogs who want to interact all day can be good candidates for Best Friends’ Search and Service Dog program. On the other hand, I have met many dogs who did not seem to want to participate in one of these activities until they were encouraged, taught, and/or reinforced. I think the word “drive” is adding confusion to many human lives. Thinking we can generalize about what drives dogs is far too simple. Behavioral control in each dog is much more complex. I have found “prey drive” defined as natural behavior based in the survival instincts of wild animals. For the most part, though, dogs have not been wild animals for thousands of years and dogs have been bred for hundreds of years to create many different types, sizes and shapes of dogs with many different traits. Of course, many dog breeds were developed to perform certain jobs, like herding or retrieving. But, I meet many dogs that get labeled as a particular breed because of what they look like, and sometimes these dogs don’t have the expected breed traits or characteristics. There are retriever-type dogs, for example, who don’t “naturally” seem highly motivated to retrieve. I think the concept of “drive” is over-used and misunderstood – and can lead to people feeling disappointed in their dog’s level of drive. It’s not just genetics that influence who a dog is. The social skills a dog develops and the training techniques used also affect a dog’s overall personality, energy level, potential reached, and ability to show his true self. Fearful dogs may seem to have low energy: They may not play or chase anything. Again, each dog should be treated as an individual; your dog’s energy level, motivations and preferences are unique to him/her. You can influence your dog’s behavior by rewarding the behavior you like. If your dog has extreme behavior or behavior you do not like, manage the dog so that she does not practice unwanted behavior while giving her other options that are more acceptable to you. (Please read “Managing a Dog with Behavior Challenges.”) If your dog’s behavior changes suddenly, make an appointment with your vet for a checkup because behavior changes can signal illness or injury. Instead of focusing on how much (or how little) drive your dog has, I recommend that you concentrate on building a great relationship with your dog and directing your dog’s energy into activities you can both enjoy. Try different toys, use different play spaces and have fun together! 4-28 Best Friends’ ABCs of Dog Life Section 5: Puppy Care and Training Section 5: Puppy Care and Training Best Friends’ ABCs of Dog Life 5-1 Section 5: Puppy Care and Training Neonatal Care for Orphaned Puppies By Sherry Woodard Raising orphaned puppies can be very rewarding. It is, however, a serious responsibility that requires some time, money and work on your part if you want to help the little ones grow up healthy. Close observation and prompt attention if any problems develop are especially important. If you have not raised orphans before, you should have a veterinarian look the babies over before you get started. Don’t be disappointed if you are unable to save all the orphan puppies; you can only give it your best effort. Basic Medical Care What are the medical concerns when raising orphaned puppies? Here’s some basic information about what’s normal and what’s not: Temperature.. Weight. Weighing the puppies daily to check for weight gain can reassure you that they are doing well. If a puppy is losing weight, you should consult with your veterinarian. Dehydration. The lack of normal parental care may mean that you receive puppies who are dehydrated. They may also become dehydrated by being chilled – newborns can’t nurse if they are too cold, because their energy is spent trying to stay warm. One sign of dehydration is loss of elasticity in the skin. If you pick up the pup’s scruff with two fingers, it will stay up, looking pinched. Another way to test for dehydration is to look at the puppy’s gums (mucous membranes). The gums should be moist and shiny; if you touch them, they should not be sticky. Hypoglycemia. Hypoglycemia, an abnormal 5-2 decrease of sugar in the blood, can also happen to orphaned puppies. The signs to look for are lack of strength, lack of movement, and muscle twitching (sometimes with convulsions). If a puppy shows signs of hypoglycemia, you can place a few drops of corn syrup under his or her tongue before calling your veterinarian for further assistance. Warmth. A puppy burns far more body heat per pound of body weight than an adult dog. To stay warm, puppies depend on radiant heat from their mother. In her absence, they need constant temperature control. So, provide your puppies with a draft-free nesting area. Heat lamps or hot water bottles can be used to keep the temperature up. During the first four or five days of life, puppies should be kept in an environment that is between 85 and 90 degrees. The temperature may gradually be decreased to 80 degrees by the seventh to tenth day, and may be reduced to 72 degrees by the end of the fourth week. Warm and cool the puppies gradually. If you have a large litter, they will huddle together, which means they won’t require as much help with heat from you. Don’t overheat the puppies – newborns cannot move away from the heat on their own. Stimulation for elimination. For the first two Best Friends’ ABCs of Dog Life Section 5: Puppy Care and Training weeks of life, puppies are stimulated by their mother to encourage urination and defecation. In the absence of their mother, you will have to provide the stimulation. Massage your puppies’ genital area with a moist cloth to stimulate bladder and bowel action. After two weeks, puppies should urinate and defecate on their own. Watch them carefully to make sure that happens. Internal parasites. If your puppies are developing very slowly or have blood in their stool, they may have an infestation of internal parasites. A stool sample should be taken to your veterinarian for examination. Vision. Puppies’ eyes open when they are 10 to 14 days old. Because their eyes are very sensitive to light, they should be kept out of direct sunlight until approximately four weeks of age. through before entering the area where they are kept. The “bath” can be a cat litter tray with an old towel in the bottom. Add a light (30 to 1) mixture of bleach and water to moisten, but not cover, the towel. This method will disinfect your shoes without soaking them or the floors. Always wash your hands before touching the puppies. If you work with other animals or visit shelters or dog parks (anyplace where you come into contact with other dogs), changing your clothes before handling the puppies is recommended. Feeding. Newborns will need food every three hours, around the clock. Six or eight meals, equally spaced over 24 hours, are sufficient for most puppies; small or weak puppies may need more feedings. You can give your orphans complete nutrition by buying a commercial puppy milk replacer (such as Esbilac), which can be purchased through your veterinarian or a pet supply store. Commercial milk replacers have feeding directions on the label. In an emergency, you can feed puppies the following recipe, but only use it short-term, until a milk replacer can be purchased: 1 cup whole milk 1 tablespoon corn oil 3 egg yolks (no whites) Pinch of salt Blend the mixture well and warm it to 95 to 100 degrees. Test it on your forearm – the milk should feel slightly warmer than your skin. When the puppies are two and a half weeks old, you can start feeding them milk replacer at room temperature. There are various methods of feeding orphan puppies. You can use an ordinary eyedropper, but commercial animal baby bottles can also be purchased. Puppies do not have a well-developed gag reflex, so you must be very careful not to drown the puppy while feeding him or her. The size of the hole in the nipple is crucial. If you turn the bottle upside down and the milk drips freely, the hole is too large. The bottle 5-3 Getting Started Living space. If the puppies were being cared for by their mother, she would choose a place that is soft, warm and away from full sunlight. In the absence of their mother, you must provide this type of environment. A box may be large enough for a first home for the family. Put the box in a warm, sheltered space. (See the section above on temperature.) If the litter is a big one, you may need to buy a child-size plastic pool. As the puppies grow, watch to see whether they can climb out of the box or pool. Once puppies start to move, they can climb well within a surprisingly short period of time. Bedding. Use clean newspaper for the first week or so. Newborn puppies can get caught up in soft cloth and can die if they can’t breathe. After they are able to lift their heads and move around a bit, you can use a sheet or blanket. Sheets or blankets purchased from a thrift store are inexpensive and easy to wash. They work great when folded and rolled into a nice bed. When your puppies start crawling, and then walking, they’ll use the cloth for traction. Disease prevention. Puppies are very vulnerable to disease, so disease prevention is needed around the clock. Create a bleach bath to walk Best Friends’ ABCs of Dog Life Section 5: Puppy Care and Training should need a light squeeze for milk to drip out. If you need to enlarge the hole, you can heat a needle with a lighter and apply it to the hole. Tube-feeding is the easiest, cleanest and most efficient method of hand-feeding newborns. To tube-feed, you will need to purchase supplies from your veterinarian and have a lesson in the technique used to prevent milk replacer from getting into the puppy’s lungs. Hand-feeding can generally be ended during the third week. Nail trimming. The puppies will need nail trims often, so if you have not trimmed toenails on dogs, ask someone to show you how to do it safely. Human nail clippers work well on small puppies. Visitors. You should limit the number of visitors and the number of people who handle the pups until the puppies are a few weeks old. Use caution – gentle handling and disease control will continue to be concerns for many weeks. to climb in instead of drinking from it. Then, introduce the puppies to gruel. Make a gruel by blending a good-quality dry puppy food with commercial milk replacer. Put the gruel, warm and not too thick, in a low pan. As the puppies discover how to lap the gruel, you can gradually thicken the mixture. By five weeks of age, most puppies can eat a diet of dry puppy food. Don’t forget to give them a constant supply of fresh water. Socialization. In your role of dog parent, you will have the challenge of safely socializing these pups to other canines and the rest of the world. They have much to learn – things that mom would normally teach them. Invite fully vaccinated dog guests over to visit, and introduce the puppies to cats as well. Be careful to protect the puppies from any harm, however – not all other animals like puppies. When children visit, supervision is absolutely necessary. Puppies scratch and bite; children sometimes get too rough in their handling of them. Both children and puppies can benefit from learning proper manners required in human/animal relationships. The puppies should also encounter men, women, raincoats, hats, glasses – anything you can think of that is commonplace out in the world. To prevent them from becoming fearful of noises, you can play thunderstorm sounds, run the vacuum, and turn on the TV for background noise. If they are comfortable hearing many different sounds as puppies, there will be less to fear later on. Finding homes for the puppies. Please try to place the puppies in homes where they will be considered valued family members. Emphasize the social needs of dogs and recommend to the puppy’s new family that they invest in some training as the puppy gets older. As the Puppies Grow Visits to the vet. During the puppies’ third week, a visit to your veterinarian for a checkup is a good idea. The puppies’ eyes are still sensitive at this stage, so don’t expose them to direct sunlight on this first outing. Ask your veterinarian about diet, deworming and vaccinations. You should also talk to the vet about spay/neuter, since this procedure should be done before the puppies leave your care. (Spay/neuter can be done as early as eight weeks; the puppies must weigh at least two pounds.) The vet may want to evaluate each puppy and start individual records for their future human families. Yes, they are growing up! Weaning puppies to gruel. During the third week, begin offering the puppies a water dish, one that is not too large, since they may attempt 5-4 Best Friends’ ABCs of Dog Life Section 5: Puppy Care and Training Puppy Development By Sherry Woodard Here is a quick summary of the stages of puppy development, starting at birth: – young (with supervision) and old, male and female. House-training can begin as early as five weeks, when puppies will follow their mother through a dog door or can be taken out for elimination lessons. At approximately six weeks, puppies can begin in-home training. You should handle all parts of the puppy, introduce his first collar and lead, encourage him to come using his name, and reward him with praise and treats. At this age, you can also start training puppies with positive reinforcement methods: using a clicker, praise, and rewards. At about eight weeks, puppies start experiencing fear; everyday objects and experiences can alarm them. This is a perfectly normal reaction – it doesn’t mean that you will have a fearful dog. You don’t want to socialize your puppies with other dogs and cats until the puppies have been vaccinated, since they may pick up diseases (such as parvo, distemper, and hepatitis) that can be fatal to puppies. The time to worry about is the period after mom’s protection ends (between six to eight weeks) and until after the second vaccine takes effect. By 12 weeks, puppies usu- Neonatal: Birth to Two Weeks From birth to two weeks, puppies are completely dependent on mom for food and care, such as keeping themselves clean. The senses of touch and taste are present at birth. Transitional: Two to Four Weeks From two to four weeks, puppies become aware of and interact with their littermates as well as their mother. Their eyes open and their sight is well developed by five weeks. The senses of hearing and smell are developing; their baby teeth start emerging. During this stage, puppies begin to walk, bark and wag their tails. Weaning from the mother also begins during this phase. At around three weeks, puppies should be started on solid food. Offer the puppies small amounts of soft food in a shallow dish. By the time the puppies are eight weeks old, they should be eating solid food and no longer nursing. Socialization: Four to Twelve. At this point, if mom is aggressive or fearful of people, the puppies may be affected by her attitude. To socialize your puppies with humans, have a variety of people interacting with them Best Friends’ ABCs of Dog Life 5-5 Section 5: Puppy Care and Training ally have received a couple of vaccine combo shots and can safely interact with other vaccinated puppies and dogs. Ask your veterinarian if she or he knows of any parvo or distemper outbreaks in your area. Puppies can socialize with other species of animals as well – horses, cats, whatever animals you would like your puppy to be comfortable around. But, use caution and make sure that the other animals are friendly. perfectly normal part of puppy development and is nothing to be alarmed about. Adolescence: Six to Twelve Months Like most adolescents, puppies are very rambunctious, so continue the process of training and socializing your dog during this phase. Socialization and training are important if you want your puppy to be comfortable and act acceptably in public places such as dog parks and beaches, or anywhere that she will meet new dogs and new people. Four to Six Months During this period, puppies grow rapidly and you may notice daily changes. Even though puppies are very energetic, don’t exercise your puppy too much – he can overdo it! Among themselves, puppies begin to use ranking in their group structure – that is, they start testing where they fit in. Puppies may experience another fear phase that lasts about a month and seems to come from nowhere. Again, this is a Social Maturity: Between One and Two Years By this age, your dog will be socially mature and will know what her ranking is in your family. Ongoing training will ensure a respectful and fun relationship between your dog and all human family members, which makes having an animal in the family a daily pleasure. 5-6 Best Friends’ ABCs of Dog Life Section 5: Puppy Care and Training Socializing Your Puppy By Sherry Woodard Puppies and dogs need to be socialized to the big wide world so that they won’t be afraid of new situations, objects, sounds, people and other animals. Dogs should be socialized when they are puppies – it’s critical to their lifelong emotional well-being and their ability to be comfortable in the world. There are a few guidelines to follow, however. Until the puppy has been vaccinated, you don’t want him to be around other unvaccinated animals, since he may pick up diseases (such as parvo, distemper, and hepatitis) that can be fatal to puppies. Consult your veterinarian about when and how to safely introduce your puppy to other animals. Even before vaccinations are complete, however, you can begin socializing your pup. Puppies can safely be around other vaccinated animals in your home. It can be fun to introduce the new addition to your family by having friends over for a small party. Your puppy can become accustomed to people who are loud or quiet, young or old, tall or short, active or inactive. Introduce your puppy to people wearing hats, glasses or sunglasses, helmets, coats or capes with hoods up, gloves and masks. You can also take the puppy on short car rides, so she’ll be a good traveler from an early age. Be careful to make all of your puppy’s socialization experiences positive. If something or someone seems to frighten your pet, introduce that object or person more slowly, and associate the object or person with positive things. For example, if your puppy is afraid of someone wearing a big hat, have the person with the scary hat offer treats to the puppy. Soon, the puppy will associate the hat with something good instead of something scary. You should also gradually introduce your puppy to a variety of household items and sounds, such as: • The sound and movement of the vacuum cleaner, broom or mop • TV and radio noise (play a variety of types of music) • The noises made by whistles and children’s toys • The sound of electrical appliances, like a blender, fan or hair dryer • The sound and motion of a kite or a plastic bag rippling in the breeze • The sound of a balloon as air is allowed to escape • A CD or tape recording of storm sounds (played at low volume) Start early with getting your puppy comfortable with handling and grooming. Touch all her body parts: Open her mouth, look in her ears, hold her tail for a moment, wiggle your fingers between her toes. Hold the pup on your lap and hug her for 10 seconds. To help her practice being calm, massage her whole body and have the puppy Best Friends’ ABCs of Dog Life 5-7 Section 5: Puppy Care and Training relax with you until she falls asleep. Friends and family can help by handling the puppy, too. Using positive reinforcement (treats and praise), introduce a brush, comb, and dog nail clippers. If you plan to use a professional groomer, introduce your puppy to the sound of electric hair clippers at home first. When the puppy is eight weeks old, other animals who are healthy, vaccinated and friendly can come to your home, and you can work on socializing your puppy to them. After you have your veterinarian’s blessing to take the puppy out into the world, you can introduce the pup to the delights of going for walks in the neighborhood or to the park, and visiting other people’s homes, where the puppy can get used to different types of flooring and stairs. Your puppy also needs to learn not to be startled by bikes, skateboards, shopping carts and wheelchairs. If you have more than one pet, make a point to spend time with your puppy one-on-one. The individual attention can prevent the pup from becoming codependent on another animal in the household. To be emotionally healthy, a dog needs to form his/her own personality. Finally, to enhance your dog’s socialization skills, do basic training. Teach your puppy to take treats gently, and to play with his toys (not your hands). You can make walks fun for both you and your dog by teaching him to walk nicely on lead. He should also be taught basic cues, such as “sit,” “down” and “stay.” If you are conscientious about socializing and training your puppy, he will be happier, more welcome, and more comfortable in our busy, often chaotic human world. 5-8 Best Friends’ ABCs of Dog Life Section 6: Common Behavior Challenges Section 6: Common Behavior Challenges Best Friends’ ABCs of Dog Life 6-1 Section 6: Common Behavior Challenges Chewing and Mouthing By Sherry Woodard Why does my dog chew on things? Chewing is a normal canine behavior. So, instead of punishing your dog for chewing, try to redirect his attention to more appropriate objects. If your dog starts chewing on an inappropriate item, simply offer him an appropriate one. When he begins to chew on it, give him lavish praise. Don’t allow your dog to chew on any of your possessions (even the ones that you don’t mind him chewing up), since he can’t distinguish between an old worn-out shoe and a brand-new one. To prevent your dog from becoming bored, give her a variety of items to chew that offer different tastes, odors, textures and challenges. Occasionally add new items to your dog’s choices. Besides the above suggestions, many dogs love frozen carrots, cow hooves and Nylabones. If your dog is very enthusiastic about chewing, make sure chew toys are available to him all the time. For example, put chew toys outside if you leave your dog in the yard for more than a few minutes. Remember, too, that dogs will chew out of boredom, so make sure your dog gets plenty of exercise and interaction with you on a daily basis. What should my dog chew on? Pet supply stores have a wide variety of durable rubber or nylon toys that satisfy a dog’s urge to chew. Dog “puzzles” that you can stuff treats into (like Kongs and Buster Cubes) can keep her occupied for a long time. You can also buy sterilized, hollow bones that you can fill with peanut butter, cheese or wet dog food mixed with dry. If your dog empties the bone or toy too quickly, experiment with different fillers. You can try freezing wet dog food or wedging a piece of hard cheese tightly inside the toy or bone. What is mouthing?. How do I discourage mouthing? To discourage mouthing, always use a toy to play with your dog. If you inadvertently become the toy,. 6-2 Best Friends’ ABCs of Dog Life Section 6: Common Behavior Challenges Excessive Barking By Sherry Woodard Dogs bark for different reasons: There’s watchdog barking, request barking, “spooky” barking, and boredom barking. Though people find barking annoying, it isn’t annoying to dogs. Rather, it’s one of a variety of ways that dogs express themselves. To other dogs and some people, each bark has a tone that communicates something specific and significant.: 1. Give the cue: “Who’s there?” 2. Have the person knock on the door. 3. When the dog barks, give the next cue (“enough” or “okay”) and show the dog the toy or treat. 4. Best Friends’ ABCs of Dog Life. Then, after a decent interval when the dog has been quiet, you can come up with a meal or a walk. In so doing, you teach 6-3 Section 6: Common Behavior Challenges. This strategy. Outside dogs who have very little interaction with their families often become boredom barkers. If you have an outside dog, please allow her to be part of your family. Because dogs are social animals, it is stressful for them to be alone all the time. Dogs do not need space as much as they need our time and our love. 6-4 Best Friends’ ABCs of Dog Life Section 6: Common Behavior Challenges Digging By Sherry Woodard Why does my dog dig? Digging is a natural canine behavior. his paw and circles around, put an old blanket or a square of carpet in that spot to make a bed. How can I prevent my dog from digging? Since digging is an enjoyable activity for dogs, it’s tough to get a dog to stop. But, you can train your dog to dig in an acceptable spot. Here’s how to do it: Pick a place in your yard where a wooden dirt or sand box can be built. (If you can’t build a box, you could try a child-size pool.) For a 50-pound dog, the dirt box should be at least 12 inches deep. After you fill the box with dirt or sand, moisten the soil and hide some toys in the box. Provide a variety of treasures for your dog to dig up – new toys, her favorite toys and long-lasting things to chew. Then, encourage your dog to dig in the box. Watch your dog for awhile – if you see her digging anywhere else in the yard, take her back to her dirt box. If you’re someone who enjoys playing in the dirt, you might try actually digging with her. Sometimes, you may be what your dog would like to play with! To minimize digging, make sure your dog’s physical and social needs are met. In hot weather, dogs must have shade and clean, cool water to drink. Some dogs enjoy a child-size pool to splash around in. Remember, too, that dogs will dig out of boredom, so make sure your dog gets plenty of exercise and interaction with you on a daily basis. If your dog likes to play with other dogs, try to ensure that he gets the chance to do that. Besides keeping him occupied for a time, playing with other dogs will use up some of his excess energy. In general, when dogs have enough exercise, they are more relaxed and more likely to happily lay around instead of digging in your garden. Best Friends’ ABCs of Dog Life 6-5 Section 6: Common Behavior Challenges Preventing Jumping Up By Sherry Woodard Most puppies are so cute (and so short) that we allow them to jump up on us. By the time they reach adulthood, however, jumping up to say hello is not so popular.. If you have more than one dog, practice with each dog alone. Teach your dog to sit in front of you for a small treat. Hold up the treat, say “sit,” and then offer the treat when the dog complies. Give the treat only if the dog’s bottom is on the floor. (Don’t reward for a half-sitting position.) Have your dog wait one second, then two, then three for the treat. When your dog is consistently sitting for a treat, you can practice leaving and returning. Place a mat or dog bed inside the entryway of your house, where the dog will be situated when the door opens. (Since many entryways are tile or wood, a dog will be more willing to sit or lay on something more comfortable and less slippery.) Place a treat jar outside your door. Go outside, pick up a treat and, as you enter, ask the dog to sit. Use your body to position the dog on the mat as you walk in. Do not give the treat or praise until the dog sits. You may need to be patient, since this is the greeting scenario that the dog has trouble with. Avoid using an angry tone if your dog doesn’t do what you want. Just say “sit” once and wait, holding the treat in front of you. If you have practiced enough inside the house, your dog will eventually sit in the greeting situation. If she doesn’t, practice some more inside the house, and use higher-value treats. When she is consistently sitting for a treat, try the exit. Soon you will have proper greetings every time. A treat jar may be needed for a while, but eventually you can move to praise alone. 6-6 Best Friends’ ABCs of Dog Life Section 6: Common Behavior Challenges Pulling on the Leash By Sherry Woodard Most dogs want to go out for walks and get very excited when the leash is brought out. But, do you have one of those dogs who is so enthusiastic that he. The way to teach a dog to walk with a loose lead is to reward for a relaxed pace and stop walking if you are being pulled. You can begin teaching a dog to walk nicely on lead in your home or yard. Put a four- to six-foot lead on your dog’s collar and talk to her as you start to walk. If she walks without pulling, praise her and walk some more. If she pulls on the lead, stop, and wait until she stops pulling. As soon as the tension on the lead is released, praise the dog, offer a quick treat, and then continue walking.. One good technique is to practice a lot of random direction-changing, so the dog gets used to focusing attention on you and moves with you. If you’re not making much headway with a regular collar, you might want to purchase a head halter. Made by Gentle Leader, Halti and other companies, these halters can be valuable tools for training dogs to walk on a loose lead. They wrap around the dog’s muzzle and operate on the simple principle that a dog will follow where his head leads him. A head halter will not choke or pinch your dog. Once your dog is used to the head halter, it can make training much easier. Keep in mind, however, that all dogs need a little time to adjust to wearing a head halter. At first, they often try to take off the foreign object. Each halter will come with fitting instructions, so make sure that you read the instructions and properly adjust the halter to fit your dog. If you don’t want to use a head halter but have a dog who tries to pull back out of his collar, a martingale collar may be a safe choice. They are designed with a fabric loop that tightens if the dog pulls. Be patient and persistent – your dog will improve with practice. She’ll gradually learn what to expect, and both of you can enjoy daily exercise. Your efforts to train your dog in this and other aspects of good behavior will be rewarded – you’ll have a polite, well-socialized animal who is welcome in many places. Best Friends’ ABCs of Dog Life 6-7 Section 6: Common Behavior Challenges Head Halters for Dogs By Sherry Woodard What is a head hal. The result in many cases is a calmer, more focused dog. If your dog is aggressive, you will have better control of his head if he wears a halter, but a halter is not a muzzle – the dog can still bite.. 6-8 Best Friends’ ABCs of Dog Life Section 6: Common Behavior Challenges Urine Marking in Dogs By Sherry Woodard Why do dogs engage in urine marking? Among dogs, urine marking is territorial behavior. An intact (uncastrated) male dog will instinctively mark his territory with his urine. A well-trained dog may not mark indoors in familiar surroundings, but as soon as he is moved to a new place, the behavior will resurface. Some female dogs are highly territorial and they will also urine-mark. Dogs may feel threatened and consequently feel the need to mark their territory because: • A new pet moves into your home. • A new human baby comes home. • A new adult starts spending time at your house. • You move to a new place that may or may not have smells from other dogs.conditioning.. (See “House-Training Your Dog,” Section 2.) If your neutered dog is still marking after you have tried the above suggestions, seek professional help from a behaviorist in your area. What can I do to eliminate urine marking? Best Friends’ ABCs of Dog Life 6-9 Section 6: Common Behavior Challenges Submissive and Excitement Urination By Sherry Woodard Dogs sometimes resort to submissive urination when they don’t want to challenge someone that they perceive as dominant. Other dogs are prone to urinating when they become excited. The submissive urinators are often timid or young dogs who lack confidence in themselves. Submissive urination can be their response to intimidating encounters with either people or with other dogs. Submissive urination is fairly standard puppy behavior in relation to a dominant adult dog, so it’s not anything abnormal. If you have an adult dog, however, who suddenly starts having submissive or excitement urination, you should first see your veterinarian because there could be a medical cause. To minimize the possibility of submissive urination, you should avoid using postures or gestures that the dog might view as threatening, such as: • Making direct eye contact with the dog • Bending over the dog • Reaching toward the dog with both hands, especially over the dog’s head • Hugging the dog • Approaching the dog head-on Punishment of any kind, even harsh tones, may cause submissive urination. A less-threatening greeting for a submissive dog would be as follows: • When approaching the dog, look off to the side rather than directly at her • Bend down on your haunches or sit, so that you appear smaller to the dog • Wait quietly, without moving, for the dog to approach you and smell you • After the dog approaches, reach slowly with one hand to pet her under the chin 6-10 If the dog doesn’t approach, offer a small treat. Much of the advice above also applies to dogs who urinate out of excitement. Keep greetings low-key and tell visitors to ignore the dog. Try to encourage quiet, non-threatening forms of play, and reward the dog when playtime doesn’t end in urination. If an accident does happen, clean it up with an enzymatic cleaner (such as Nature’s Miracle or Simple Solution), which neutralizes the odor. To encourage the dog to urinate in a more appropriate place, take the urine-soaked paper towels to the desired spot outside. Don’t ever punish a dog for urinating in the house. Management of submissive or excitement urination requires patience and time. If the inappropriate urination continues, seek help from a trainer or behaviorist. Inappropriate urination can also be a result of fear, separation anxiety, incomplete house-training, or an unneutered male dog’s natural tendency to mark his territory. Best Friends’ ABCs of Dog Life Section 6: Common Behavior Challenges Fear of Thunder and Other Loud Noises By Sherry Woodard Many dogs have a fear of loud noises,. What can I do to reassure my dog during a storm?, but don’t reassure him. When dogs are frightened, you may reinforce fearful behavior by providing reassurance. How can I help my dog overcome her fear? If your dog’s fear is not extreme, you may want to try behavior modification. Here’s how it works: Get a recording of storm sounds (or Best Friends’ ABCs of Dog Life 6-11 Section 6: Common Behavior Challenges Separation Anxiety in Dogs By Sherry Woodard What is separation anxiety? It is anxiety that manifests itself as visible stress within 30 minutes of the departure of the dog’s person. The anxiety can vary from mild to severe. Separation anxiety is preventable and responds well when treated.: • A new home (a move for the dog to a new family) • A change in the amount of time you are absent • A move to a different house (with the same family) • The death of a family member (human or otherwise) • A new baby • Time spent in a boarding kennel or away from you • Time spent at the veterinary clinic: • A need for house training • A marking habit • Submissive or excitement urination • Teething • Boredom chewing or digging 6-12 Best Friends’ ABCs of Dog Life Section 6: Common Behavior Challenges • Cognitive dysfunction • A phobia about thunderstorms or other sounds •: • Make sure your dog gets plenty of exercise. Being physically tired helps everyone to relax. • Offer the dog a Kong toy stuffed with treats before practicing the leaving-and-returning exercises. • Ignore the dog before and during the exercises. • Provide background noise (the radio or television) during the exercises. The background sounds may provide a reassuring cue that you will return soon. • You can also use a word as a cue. Say the words (“I’ll be back” or “Later”) every time you exit. Best Friends’ ABCs of Dog Life. 6-13 Section 6: Common Behavior Challenges 6-14 Best Friends’ ABCs of Dog Life Section 7: More Complex Behavior Challenges Section 7: More Complex Behavior Challenges Best Friends’ ABCs of Dog Life 7-1 Section 7: More Complex Behavior Challenges Eliminating Barrier Aggression By Sherry Woodard Please use caution at all times when working on behavior modification. It’s important to establish a positive relationship with a dog; once you have that, you will be able to make good progress with behavior modification techniques. Many dogs act aggressively when they are behind a barrier, such as a gate, fence, crate or car window. The following technique can be used to eliminate this undesirable behavior. It is not intended for use with a dog who acts aggressively on lead. For your own safety, do the exercise through a barrier with an opening just large enough for a treat to pass through. To begin changing the undesirable behavior, you will need to change the dog’s negative association with being behind the barrier to a positive association. Use these steps: 1. Equip yourself with food rewards. For safety, long moist stick treats are recommended. Put the rewards in a pouch around your waist so that your hands are free. 2. Take the dog to an area where you can use food rewards without interference from other dogs. If you have to work in a run, remove the other dogs until you’ve finished. 3. Begin by giving a treat through the barrier, even if the dog looks aggressive. Give another as soon as the first has been eaten; repeat until you’ve given five stick treats. 4. Then, stop and wait for 3–5 seconds; if the dog remains calm, give him five more treats. If he becomes aggressive, say nothing to him; just turn and walk away. 5. If the dog became aggressive, move him to another area (behind another barrier) where he hasn’t been practicing bad behavior. Give him five stick treats; if he remains calm, give him five more. 7-2 Working with Buddy on his barrier aggression. As you work with a dog, here are some things to keep in mind: • Always use a calm, gentle tone while working with a dog. • Keep sessions short – five minutes or less at first. • Remember to take breaks; stop and take the dog out for a walk. • Be patient, but optimistic! Progress may be slow, but it will happen. Once progress has been made with one handler, start introducing different handlers in different locations to help the dogs generalize about the positive associations. Best Friends’ ABCs of Dog Life Section 7: More Complex Behavior Challenges undesirBest Friends’ ABCs of Dog Life 7-3 able run. Soon, no food reward will be necessary, although a cookie upon returning from a walk is always welcome! Once progress has been made with one handler, start introducing different handlers in different locations to help the dog generalize about the positive associations. Section 7: More Complex Behavior Challenges Meeting Fearful Dogs Safely By Sherry Woodard When meeting new dogs, always use respect, caution, and attentive awareness. Think in terms of learning the dog’s language. Be aware of your speed while approaching any dog you don’t know – slow your pace and use a gentle tone as you approach. If you know the dog is shy or fearful, change your body language. Approach toward the side of the dog, not toward his head, and avoid direct eye contact. Watch the dog out of the corner of your eye for signs of fear or aggression, such as: • Body that is still or frozen • Hackles are up • Looking away or lowering of the head while still sitting up, or raising the head way up while looking away • Staring at you (if a defensive dog stares into your eyes, look away – to show respect and for your own safety) • Growling • Wrinkling of the lips without teeth showing • okay.. 7-4 Best Friends’ ABCs of Dog Life Section 7: More Complex Behavior Challenges Object Guarding and Food Aggression in Dogs By Sherry Woodard What is object guarding? An object-guarding dog is one who guards objects that he considers to be valuable. Oftentimes, train my dog not to guard food? First, only adults should train dogs to stop guarding. Here’s how to do it: Best Friends’ ABCs of Dog Life . 7-5 Section 7: More Complex Behavior Challenges If the dog becomes threatening toward you at any point, back up to the step where she was relaxed and work forward from that step again. If your dog is a serious guarder already when you start training, you must be very careful. In fact, you may want to get help from a humane trainer. growls or stiffens up. Remember – be very careful. Do not include other adults in the training until you can trade up for the highest value item with ease. After you’ve worked with other adults, you can work with children, but only if you know that your dog likes children and takes treats with a soft mouth. Also, children should be supervised by you at all times. How can I train my dog not to guard other objects? Dogs who guard food may also guard other objects, such as a toy, bone, or even an item out of the trash.. How long do I have to practice these routines? If you have a dog with a tendency to guard food or objects, you should practice the above routines often to prevent any future problems. 7-6 Best Friends’ ABCs of Dog Life Section 7: More Complex Behavior Challenges Using Visual Barriers with Dogs By Sherry Woodard A visual barrier is a solid wall that prevents dogs from seeing what’s on the other side (see photo at left below). Most often, visual barriers are used so that dogs can’t see other dogs, but occasionally they serve to block the dog’s view of human neighbors. There are several reasons why visual barriers might be used: • To prevent injury to the dog from daily running, jumping and twisting • To stop a dog from exercising too much, which could result in excessive weight loss • For safety – to prevent bites from occurring through a fence • To prevent a dog from being in an anxious, overly excited state Visual barriers should only be used if other options have been tried without acceptable results. Dogs who are fence-line runners may be doing it partially because they are bored and/or don’t get enough exercise. If you help the dog to improve his behavior, you’ll enhance his daily quality of life, which doesn’t happen if you simply put up a barrier. So, here are some things to try before you start putting up walls: • Spend time every day interacting with the dog. • Shorten the amount of time the dog is out in the yard, so she’s not out there for hours. • Place the dog in a crate for a short period of time and let him calmly enjoy a treat-dispensing toy or a loaded Kong. • Teach and practice basic cues. • Teach and practice fun tricks. • Take the dog for daily walks on lead. Interacting with a social dog in any of the ways listed above may reduce fence-line running and, at the very least, will help him enjoy a bigger, better life. If you are part of a rescue group and/or you’re fostering the dog, send the dog on outings and sleepovers with other people. If possible, you can also change the dog’s space – putting her in a place with different dogs or neighbors on the other side of the fence. Another thing to try: Set up path obstacles along the fence line (see photo below). The goal is Best Friends’ ABCs of Dog Life 7-7 Section 7: More Complex Behavior Challenges to help the dog decide to run less on her own. Faced with path obstacles, many dogs decide that fence-line running is not as exciting as it once was. If aggression at the fence line is the problem, you can attach an additional layer of fencing (creating a double fence) if your dog, or the neighbor’s dog, is willing to bite through the fence (see photo above left). Or, you could set up a freestanding run with no shared fence lines (see photo above right). Here are a few other things to consider before putting up visual barriers: • Visual barriers are not allowed everywhere. • The cost of construction and maintenance could be considerable. • Some dogs will continue to have the same behavior even with a barrier in place, or develop other undesirable behaviors that then need to be addressed. • If you have a scenic view from your yard, you’ll lose it. 7-8 Best Friends’ ABCs of Dog Life Section 7: More Complex Behavior Challenges Muzzles: A Tool to Keep Everyone Safe By Sherry Woodard” in Section 4.) Other reasons for teaching a dog to become comfortable wearing a muzzle are: 1. To safely handle a terrified or injured dog (either a rescued animal or your own) in an emergency. 2. To safely do a medical exam or groom a dog who is willing to bite. 3. many types of muzzles: • Plastic basket muzzle: My favorite for training. • Leather muzzle: These vary in design, so be sure you choose the basket style so your dog can pant, drink and receive treats. • Soft muzzle: My favorite in terms of comfort for the dog. I use this type once the dog has learned that having the muzzle on means she will be having fun. (Two types are Tuffie and Softie by ProGuard.) • Grooming muzzle: I don’t use these for training, since the dog can’t pant, drink or eat treats with this muzzle on. • Metal basket muzzle: I don’t recommend these because they can break at the welded spots, leaving sharp wire ends or edges that can injure the dog or you. • Jafco muzzle: This is a comfortable basket muzzle that dogs who require muzzles can look forward to wearing. Dogs can drink, get treats and pant while wearing a Jafco muzzle, which is durable and easy to wash. Basket muzzle Best Friends’ ABCs of Dog Life Tuffie muzzle Softie muzzle 7-9 Section 7: More Complex Behavior Challenges • Emergency muzzle: In an emergency, you can make a muzzle from gauze. (See “How to Muzzle a Dog in an Emergency,” Section 8.) A good place to buy muzzles is. above). For even more security, attach a string from the top of the muzzle over the dog’s forehead and attach it to the dog’s collar (see photo above). Severity of Dog Bites When it comes to dog bites, does the size of the dog matter? If a dog is willing to bite, a dog of any size can cause damage! Of course, a fourpound on the next page for a scale that’s useful to trainers, animal behavior consultants and vets in judging the severity of a dog bite. Wearing the Muzzle Before you start training a dog with a muzzle, you’ll need to get the dog comfortable with wearing the muzzle. Here are the steps: 1. Purchase an appropriately sized basket muzzle. 2. Allow the dog to see it and sniff it. 3. Feed treats very close to the muzzle, then have the dog touch the muzzle to receive the treat. Grooming muzzle 7-10 Metal basket muzzle Jafco muzzle Best Friends’ ABCs of Dog Life Section 7: More Complex Behavior Challenges 4.. 5.. the muzzled dog out walking on lead in a lowtraffic Training with the Muzzle Once the dog is accustomed to wearing the muzzle, it’s time to start the training. With the dog wearing the muzzle and focusing on you, teach and/or practice basic cues, giving praise and treats generously. (See “Teaching Your Dog Basic Cues” in Section 4.) Do whatever else the dog enjoys – playing with toys, petting – so the dog continues to associate wearing the muzzle with positive things. Again, do this work in your home or someplace with no distractions. When you’ve mastered basic cues, start taking This standard scale was developed by Ian Dunbar to judge the severity of dog bites based on damage inflicted. • Level one: Bark, lunge and no teeth on skin. • Level two: Teeth touched skin, no puncture. • Level three: One to four holes from a single bite; all holes less than half the length of a single canine tooth. • Level four: Single bite, deep puncture (up to 1 1/2 times the depth of a single canine tooth). Wound goes black within 24 hours. • Level five: Multiple-bite attack or multiple attack incidents. • Level six: Missing large portions of flesh. Anyone with sensitive skin – such as babies, young children and elderly people – will have more damage. Best Friends’ ABCs of Dog Life 7-11 Section 7: More Complex Behavior Challenges can keep this daily activity interesting for the dog. Next, build up the traffic by walking in places where more people or other animals are passing by. Recruit people that the dog is comfortable with and have them appear, approach and give treats. Even if the dog. Your goal is a relaxed dog who is comfortable in the world and can enjoy a wide variety of experiences – doing more while staying safe. 7-12 Best Friends’ ABCs of Dog Life Section 7: More Complex Behavior Challenges When the Helpline Can’t Help By Sherry Woodard If you have contacted an animal behavior helpline about your pet’s problem behavior, and the helpline hasn’t helped, there are a few other options to consider.: behavior problems, but they are the least expensive option among the behavior professionals. Anyone can claim to be a trainer, so ask questions like the following if you’re thinking about hiring someone: •informed about new training methods and theories. •. •. • Are you certified by the Certification Council for Professional Dog Trainers? This is the only national certification for pet dog trainers. • Can I contact a few of your customers? Often the most helpful information comes from those who have used the services of the trainer you are interested in. You might also want to visit during one of the trainer’s sessions to see the style, techniques and tools being used. If the trainer does anything that you are uncomfortable with, keep looking. 7-13 Best Friends’ ABCs of Dog Life Section 7: More Complex Behavior Challenges. gram, click on “Behaviorist Directory” on the Animal Behavior Society website at. Board-certified veterinary behaviorist. A veterinary behaviorist is a veterinarian who has completed an approved residency training pro- at. org. Recommended Reading If you want to learn more about dog behavior, we recommend the following books: • The Dog Who Loved Too Much by Dr. Nicholas Dodman. Using examples from his own practice, Dodman intelligently and humorously talks about symptoms, treatment options, and helpful tips for prevention. • Final Hope by Stephen Joubert. This book offers a comprehensive approach to dealing with an aggressive dog. It has a helpful section on finding a professional to work with. 7-14 Best Friends’ ABCs of Dog Life Section 8: Rescue and Emergency Section 8: Rescue and Emergency Best Friends’ ABCs of Dog Life 8-1 Section 8: Rescue and Emergency Feral Dogs By Sherry Woodard How do dogs become feral? A feral dog is the offspring of domestic dogs (strays) that may have been abandoned. Like feral cats, they live on the edges of human society, scavenging for food, finding shelter where they can, mating, and raising completely unsocialized feral puppies. tion to themselves often brings danger. Many ferals are seen by the general public as either dangerous or diseased. How can I help the adult dogs? In general, feral dogs should remain in their original outdoor environment. You can help the dogs by setting up and maintaining feeding stations, and by providing shelter, such as dog houses, for them. You can also improve their lives by doing trap/neuter/return (TNR). TNR involves trapping the dogs; transporting them to a veterinarian to be vaccinated, treated for parasites, and spayed or neutered; and returning them to their home environment. Spay/neuter prevents the dogs from breeding, and it also reduces wandering and fighting. To capture the dogs, you’ll need a trap, thick gloves, a vehicle large enough to carry the trap, and old blankets to cover the trap. Your local animal control may lend out traps or you can purchase them from or. The Havahart website has instructions for how to use traps, depending on the type of trap you buy. If you decide to do TNR, you will need to find a veterinarian who will work with you and a secure place to keep dogs recovering from spay/neuter. If you find that you have trapped a stray, you can foster him or her until the perfect home is found. During your time as a foster parent, you can teach the dog basic cues and house manners, which will improve your foster dog’s prospects for adoption. If an adult feral dog does not have a safe place to return to, one option is to find someone who owns property that is fenced and who is willing to allow you to set up a station for food, water and shelter. How can I tell the difference between a stray and a feral dog? Strays were once family pets. Since they were socialized in the past, they are usually willing to accept handling fairly soon after being trapped. They may need to be trapped if they have been living on their own for a period of time, during which they may have learned to be wary of some people. After eating a few meals, and making some new human and dog friends, most strays will become pets again. A feral may never be able to enjoy human touch and companionship. When people take ferals into their homes, the dogs often have good social skills with other dogs and are willing to be part of a dog group living in a home. Some are even willing to use a dog door to eliminate outside. But, they often hide if a human enters the room. Most ferals can be handled for necessary medical needs such as sedation for surgeries, blood draws for tests or sedation for grooming. Where do feral dogs live? Like feral cats, feral dogs live wherever there is habitat and a food source. Most commonly, they live in parks, under abandoned buildings, in rural wooded areas, beneath freeways, etc. They live in hiding, and are often seen only at a distance. They generally move about during the times when humans are indoors – in the evening, night and early morning hours. The adult dogs are primarily silent, since drawing atten8-2 Best Friends’ ABCs of Dog Life Section 8: Rescue and Emergency The other option is to take the feral dog home. But, be aware that a feral dog may never become a sociable, cuddly pet. You have to decide if you can live with the limitations of a feral dog. She may jump and freeze every time you touch her for months, years, maybe forever. She may want to live in hiding, under furniture or in a closet. The dog will be more comfortable if your home is quiet, and you have a dog door that she can use without walking past you. To prevent escape, your yard should be securely fenced. It might also be helpful if you have another dog. Most ferals are not dog aggressive, so a very social, playful dog can be a good role model. How can I help feral puppies? It is best to take the puppies away from their mother when they are two to three weeks of age. They will not be able to run from you or bite you, and they will have the best chance of being socialized if they are young. At two to three weeks, their mom has not yet taught them her fearful behavior. At two weeks old or younger, the puppies will need help eating. If puppies are over five weeks old, they may bite as you handle them, so wear gloves. You may also need to use a trap to capture them. They are still young enough to socialize and place as family pets, but the older the puppies are, the more work they will need to be comfortable in human society. If feral puppies are older than 12 weeks, they will probably remain shy and fearful of new situations for life. This doesn’t mean that good homes cannot be found. Many people are willing to adopt shy dogs and continue to socialize them throughout their lives. Other dogs can be very helpful when you are socializing older puppies, since they learn by watching happy, relaxed dogs interact with people. Finally, the puppies will need to visit the veterinarian for a physical, fecal check for parasites and, depending on their age, vaccines, tests for diseases and spay/neuter surgery. Best Friends’ ABCs of Dog Life 8-3 Section 8: Rescue and Emergency How to Trap Animals for Rescue By Sherry Woodard Why would you want to learn how to humanely trap animals? One reason is to rescue animals in danger. Be aware that the rescued animals will require at least basic medical care and may need more extensive treatment. They may have diseases, injuries or major behavior challenges.. missible to humans include ringworm, a fungal disease, and rabies and encephalitis, which are viral diseases. “Zoonotic Diseases in Cats and Dogs” (Section 3) is an excellent place to start learning about these, at this link:. Information about first aid and emergency care of animals can be found on the American Veterinary Medical Association website at.8-4 Best Friends’ ABCs of Dog Life Section 8: Rescue and Emergency Getting Started Here’s a list of items you’ll need for trapping: • Humane traps sized for the animals you are going to trap • Towels, to line the inside of the trap and to cover the trap if you’ll be trapping cats • Blankets, for covering dog-sized traps • Work gloves, for protection • Exam gloves, to wear anytime surfaces might be contaminated • First-aid kit • Antibacterial hand sanitizer • Disinfectant, bactericide and virucide cleaner to use on all surfaces and as a foot bath (read the labels carefully to find out how to use them) • Washable liner (tarp) to put in your vehicle, under the trap If you need to buy a trap, you can purchase one online. Tomahawk Live Trap at livetrap. 5. While holding the door open, set the door with the trip-pin/rod. 6. Apply pressure to the trip plate to spring the door. 7.. Setting the Trap Before setting the trap out in the wild, make sure it works. The steps for testing the trap: 1. Set the trap up on a level surface. 2. Place a towel inside the trap for comfortable footing once the animal is inside. 3. Hold the door open. 4..) Best Friends’ ABCs of Dog Life 8-5 Section 8: Rescue and Emergency After the Rescue: What Next? By Sherry Woodard So, you’ve successfully trapped a stray animal. What’s the next step?: • Knock on doors in the area where you found the animal and ask people if they know who the pet belongs to • Put up flyers in the area announcing that you’ve found a pet • Contact local shelters and veterinarians to find out whether anyone has reported a lost pet • Have the dog or cat scanned for a microchip at your vet’s office or animal shelter • Put an ad in the “lost and found” section of the local newspaper. 8-6 Best Friends’ ABCs of Dog Life Section 8: Rescue and. the Helpline Can’t Help.”) 8-7 positive reinforcement trainers in your area; even if they can’t help, they may be able to refer you to individuals or groups that work with unsocialized animals. (Also, you might want to see “When Best Friends’ ABCs of Dog Life Section 8: Rescue and Emergency. (See “The Look of Fear in Dogs,” Section 4, for more details.)! must have wonderful greeting skills – that is, they should meet new animals in a friendly, nonthreatening way. Don’t use puppies and kittens as role models – they can be injured or killed – and avoid extreme size differences. Also, introduce animals of the same species first. Here are the steps to follow to introduce other animals to your stray: 1.. 2.up tail, or lunging forward and then retreating. In dogs, signs of fear aggression can be charging forward, growling or snapping, hackles up or tail tucked. 3.. 4. Best Friends’ ABCs of Dog Life 8-8 Section 8: Rescue and Emergency by gradually decreasing the space between her and other animals. Because strays often lack positive associations with other animals, practice is needed. Life out on the street was probably tough, and some people and other animals may have seemed unpredictable or aggressive. 5. Be prepared to stop aggressive behavior if it happens when the animals are close together. A loud, quick sound from you (try a sound like “aaut!”) should be enough. 6. Until your rescue learns proper greetings, keep your role model at a safe distance. You can still use your role models, though, to demonstrate hand-feeding, to practice basic cues, to model healthy behavior, and to show how people and animals can have fun together., Best Friends Community Animal Assistance (e-mail animalhelp@bestfriends.org or call 435644-2001, ext. 4800).. Best Friends’ ABCs of Dog Life 8-9 Section 8: Rescue and Emergency How to Muzzle a Dog in an Emergency 1 2 3 1. Make a loop, using a leash, soft rope, cloth, tie or belt. 2. Slip over the nose and draw tight. 3. Cross under the chin. 4. Bring behind the neck (under ears). Tie in a bow (NEVER use a knot). 5. For short noses, take one end of the bow and loop it through the band around the muzzle. 6. Bring the ends together and tie on top of the dog’s head. 4 5 8-10 6 Best Friends’ ABCs of Dog Life Section 8: Rescue and Emergency Finding Your Lost Dog: •. • Aloof dogs. Dogs with aloof temperaments are wary of strangers and will initially avoid human contact. They will be inclined to accept human contact,. • Xenophobic (fearful) dogs. Xenophobia means “fear or hatred of things strange or foreign.” Dogs with xenophobic temperaments (due to Best Friends’ ABCs of Dog Life genetics and/or puppyhood experiences) are more inclined to travel farther and are at a higher risk of being hit by cars. Due to their cowering, fearful behavior, people assume these dogs were abused, and even if the dog has ID tags, they will refuse to contact the who escapes in a mountainous area. Fences that create barriers 8-11 Section 8: Rescue and Emergency of a lost dog. People with a strong HAB will go to extremes to find their lost dog. They will tirelessly visit all the local shelters, post flyers, and contact rescue groups while maintaining a fulltime)! Best Friends’ ABCs of Dog Life Owner Behaviors That Create Problems People often behave in ways that actually inhibit their chances of recovering their lost dogs. Some develop a “wait and see” approach (believing their dog will return home, like Lassie). By the time they start actively looking, those 8-12 Section 8: Rescue and Emergency For more information on the behavioral patterns of lost pets, visit. For a list of training resources that can help you search for your lost pet (including search dogs trained to track lost pets), visit. Kathy “Kat” Albrecht is a former police officer, field training officer, police detective, and K9 (police bloodhounds and cadaver dogs) trainer turned pet detective. In 2001, Albrecht founded Missing Pet Partnership, a national nonprofit organization that is working to research the behavioral patterns of lost pets, educate people with pets in how to properly search for a lost pet, and educate animal shelter staff and volunteers in the science of lost pet behavior. In 2004, Albrecht founded Pet Hunters International (), a pet detective academy that trains Missing Animal Response (MAR) technicians in how to analyze both human and animal behaviors when investigating a lost-pet incident. Kat Albrecht © Copyright 2005 Best Friends’ ABCs of Dog Life 8-13 Section 8: Rescue and Emergency What to Do When Your Pet Is Hurt By Virginia Clemans, DVM Proper first aid can prevent injuries from worsening, can alleviate pain, or can even save your pet’s life. Remember, however, first aid is preliminary action only. It can never replace professional care by your veterinarian. But, making yourself familiar with basic first aid can help you and your veterinarian better handle emergency situations. Be sure to have the telephone number of a veterinarian readily available (placed with other household emergency numbers). What kind of situations might warrant first aid? Cuts, exposure to poisons, eye injuries, trauma and heatstroke or cold exposure are just a few of the many types of emergencies that may require first aid at home. The following takes a brief look at some of the basic do’s and don’ts of dealing with an animal requiring first aid. Remember that these are but guidelines and should be used with good judgment and in conjunction with your veterinarian’s advice. Be ready to notify the veterinarian that you are on your way with an emergency and describe the nature of the problem so that preparations can be made for your arrival. Preparation can greatly improve the probability of a favorable outcome in the case of an emergency. Use caution when dealing with an injured animal. In his pain and fright, even a well-loved and trusted pet can become frantic while being handled. Muzzling an injured dog is the quickest and easiest way to prevent yourself from being bitten. Pantyhose, a necktie, or a soft piece of rope about two feet long will make a good muzzle. To give yourself some protection from teeth and claws, cats can be covered with a heavy towel or rug; placed in a pillowcase, box, or pet kennel; and then transported to the veterinarian. Here’s what to do in certain situations: External bleeding. To slow external bleeding, apply a pressure dressing using clean cloth to cover the wound and then bandage it snugly. If swelling occurs below the bandage, loosen or remove it. Please do not apply tourniquets! Tourniquets can potentially cause greater problems than they solve. Fractures and dislocations. These are usually self-evident. The affected limb is held in an unnatural position and the broken bone may actually be visible through the skin. Don’t try to apply a splint, since it will most often inflict greater pain. Move the animal as little as possible during transport, and do the transport as soon as possible. Shock. Animals in shock will have pale gums, weakness, and rapid breathing. Keep the animal warm and transport her to the veterinarian as quickly as possible. Heatstroke. Heatstroke causes many of the same signs. 8-14 Best Friends’ ABCs of Dog Life Section 8: Rescue and Emergency Remember, to prevent heatstroke, never leave an animal in a parked vehicle during hot weather.. Exposure to poison. If you think your pet has been exposed to a poison, contact your veterinarian immediately. If detected soon enough, many poisons can be eliminated from the animal without need for extensive, expensive treatment. It’s important to bring the label of the suspected poison to your veterinarian so the correct treatment can be given. Some poisons may take a period of time before their effects become evident, so act quickly if you think poison ingestion is a possibility. You should be especially careful about antifreeze, which often leaks from cars into parking lots and puddles. Check the floor of your garage, too, for any telltale signs. Antifreeze is attractive to pets because it tastes sweet, but most brands are very poisonous and even a few licks can be fatal. If your pet ingests even a small amount of antifreeze, contact your veterinarian immediately. Pet-safe antifreeze (which tastes bad) is now available, so consider buying it for your car in the future. For any emergency involving your pet: • Be prepared. • Stay calm and act responsibly. • Call your veterinarian. Remember, your pet’s depending on you! Dr. Virginia Clemans was Best Friends’ chief veterinarian from 2001 to 2004. Best Friends’ ABCs of Dog Life 8-15 Section 8: Rescue and Emergency Disaster Readiness By Sherry Woodard If there’s ever a natural disaster or situation requiring evacuation in the area where you live, you’ll want to be ready to keep not only yourself safe, but your pets, too. You’ll want to think about how to be prepared for three types of disasters: • Immediate, such as a gas leak or house fire, when evacuation is necessary right away • Short warning, such as a toxic spill or fire in the neighborhood, when you have to grab your pets and a few supplies and leave within a short period of time • Seasonal disaster, such as hurricanes, floods or forest fires, when you’ll need a plan for gathering your pets, packing up supplies and evacuating pet’s ID on her collar: pet’s microchip information and contact information for the microchip company in the event your pet gets lost. Have current photos of your pets in case one of them is lost. Buy carriers appropriate for your pets’ sizes; the carriers should be easy to transport. 8-16 youraid kit for pets. Best Friends’ ABCs of Dog Life Section 8: Rescue and Emergency Put all the information mentioned above (copies of your pet’s: • A roll of paper towels • A pet-friendly cleaner • Trash bags • Small poop bags • A small bag of litter • Litter pan • Pet first-aid kit • Leashes • A pair of heavy-duty gloves • A blanket • Two towels • Two bowls • Can opener and spoon This means buying duplicates of a lot of items you may already have and use, but having these items in one location will save time when you are in a hurry to leave your home. Last minute items to grab: • Food, canned and/or dry • Gallon jug of water • Treats or snacks. Best Friends’ ABCs of Dog Life 8-17 Section 8: Rescue and Emergency Disaster, Safety, and First-Aid Websites Here are some web resources that can help you keep your pets safe in the event of an emergency or disaster: American Red Cross The Red Cross () has a booklet called Pet First Aid that you can get at your local Red Cross office. There’s also a PDF called “Pets and Disaster Safety Checklist” on the website (search for “pets disaster preparedness”). American Society for the Prevention of Cruelty to Animals (ASPCA) Go to and search for “emergency pet preparedness.” American Veterinary Medical Association This page describes several publications designed to help veterinarians and people with pets prepare for animal safety in the event of a disaster: Dog Owner’s Guide This page contains a list of items to include in a basic first-aid kit for your dog: Federal Emergency Management Agency (FEMA) FEMA offers a DVD kit called Animals in Emergencies. Search for the DVD title in the FEMA library: ResQPet Emergency Preparedness Kits for Pets On this site, you can purchase emergency preparedness kits for pets and find out about taking a course in pet first-aid: United Animal Nations This page describes the Emergency Animal Rescue Service (EARS), a United Animal Nations program that aims to save disasterstricken animals: 8-18 Best Friends’ ABCs of Dog Life Section 9: Miscellaneous Resources Section 9: Miscellaneous Resources Best Friends’ ABCs of Dog Life 9-1 Section 9: Miscellaneous Resources Finding Pet-Friendly Housing By Sherry Woodard Anyone who rents knows how difficult it can be to find a decent place to live. Those of us who have pets face a special challenge. If you know you’re going to be looking for a new home for you and your pets, allow plenty of time for your search. can I do to be more effective in my search? You can in your local newspaper and ask local realtors about pet-friendly housing. Here are several websites that might be helpful in your search: What do I do after I’ve found a place? Once you have secured a place, make sure that you have written permission to have a pet. A verbal agreement between you and the landlord is not enough. Some security deposits are nonrefund: • How disabled individuals may be eligible to keep pets even in “no-pets” housing • A new federal law that allows pets in federally assisted housing • Arguments that may allow animals in “no pet” privately owned housing • Responsible pet guardianship • How to convince your landlord to adopt a “pets welcome” policy 9-2 Best Friends’ ABCs of Dog Life Section 9: Miscellaneous Resources • Model rental guidelines that protect the rights of renters and animals The booklet is available through Doris Day Animal League by calling (202) 452-1100, e-mailing info@ddal.org, or accessing www. ddal.org (click on News and Publications). The Humane Society of the United States has lots of resources for both tenants and landlords. Go to and search for “pet friendly housing.” The Delta Society has some additional resources at (search for “pet friendly housing”). Our pets depend on us to find a place where we can live comfortably and happily together. With an investment of some time and effort, you will find a great pet-friendly home. Best Friends’ ABCs of Dog Life 9-3 Section 9: Miscellaneous Resources Giving Pets as Gifts By Sherry Woodard Are. Bunnies and chicks are popular animals to give to children at Easter. But, rabbits are sensitive creatures that require a considerable amount of care and those cute chicks grow up to be chickens (or roosters), which can be very messy. Unless you are prepared to take care of a fullgrown chicken, real chicks are not a good idea. Stick with peeps (the marshmallow kind) instead! Here’s a better option if you would like to give the gift of a pet: Create a gift certificate stating that you will cover the cost of a future adoption. (Please offer to cover adoption costs rather than the cost of buying a pet from a breeder or pet store. Breed rescue groups exist for almost every type of animal.) Include some information to help your friend or family member make a wise decision. housetrained if left alone all day during the regular work hours kept by most adults. The gift recipient needs to take into account the commitment that he or she is making to care for an animal for the rest of that animal’s life. For some animals, the commitment may be 15 years or more. There will also be future costs (food, supplies medical attention, etc.) for all types of animals, so the gift recipient must be aware that getting a pet is a financial commitment as well as a time commitment. 9-4 Best Friends’ ABCs of Dog Life Section 9: Miscellaneous Resources Finding a New Home for a Pet If you would like to find a new home for a pet, rather than turn the animal into a shelter where he or she may be euthanized, there are proactive strategies you can use to increase your chances of success. First, prepare the animal for adoption. To increase the chances of finding a home and the success of the new placement, it is important that the pet is: • Spayed or neutered • In good health • Clean and groomed •: • Photos and descriptions really help people make a connection to an animal.. • Flyers are inexpensive to produce and often highly effective, especially when they include a good photo and lively description of the animal. They work especially well for older animals or animals with special needs. Post the flyers throughout your community, wherever a good prospective adoptive person may see Best Friends’ ABCs of Dog Life 9-5 it. Health food stores, supermarkets, libraries, churches, health clubs, and sporting goods stores are just a few examples of good places to post flyers. • finder.com). • To find a home for a dog of a particular breed or breed mix, look for a breed rescue group with whom you could list the dog. (On the Section 9: Miscellaneous Resources Internet, search for “breed rescue,” where “breed” is the name of the particular breed.). Get the pet out there! (This works especially well with dogs.) The more the pet is out and about, interacting with people, the more likely he’ll charm the right person. Take him on walks, to pet supply stores, to the local park. You can even put a colorful bandana or sign on him that says “Adopt me” or “Looking for a home.” Check with your local shelter to see if they have off-site adoption days; if so, they might let you bring your pet. Be creative, positive and persistent. There are many animals needing homes at any one time, so finding a home can take some work. But, there are good homes out there, so try to maintain a positive attitude. Explore all options you can think of for finding a home – creativity and persistence are usually rewarded. Remind yourself that you are this pet’s best option for finding a new home. You might think shelters or rescue groups would be more adept at placing the pet because problems. Anxiety, aggression, and even illness are common and these natural reactions may make adoption difficult or impossible. For more detail about the strategies described above, see the Best Friends manual called How to Find Homes for Homeless Pets, available for download as a PDF from the resource library: resourcelibrary The manual provides simple step-by-step instructions for finding a good new home for a pet. 9-6 Best Friends’ ABCs of Dog Life Section 9: Miscellaneous Resources Coping with Return-to-Run Resistance By Sherry Woodard • To build trust, give the dog part or all of his daily meals by hand-feeding him instead of putting his food in a bowl. • If possible, walk back to his run from a different direction sometimes. • If possible, move him to another run to live. Having different sights and sounds can make returning to the run more palatable. Things you can do while in his run: • Introduce aromatherapy – lavender, chamomile, dog-appeasing pheromones (DAP) – for stress relief. Try different ones; some dogs have favorites. • If he enjoys touch, try petting, brushing and massage. If he is touch-challenged and needs hug therapy, please read “Teaching Your Dog to Enjoy Touch.” • Play soothing music or read out loud to promote calm. • Teach and practice responding to basic cues (see “Teaching Your Dog Basic Cues” in Section 4): • Carry treats, his favorite toy, or some of his regular food with you. After he has eliminated, while walking back, hold a toy (maybe a rope toy or loaded treat tube) or give small treats to help him stay busy enjoying something. • Toss a few high-value treats in his run as you take him out – a surprise for him to find upon returning to the run. • Go back into the run with him and stay for a few minutes. Time spent with you in his run will become very special to him. • If someone else has walked him, surprise him by going in and visiting without him coming out. Best Friends’ ABCs of Dog Life 9-7 Section 9: Miscellaneous Resources Helping Shelter Dogs to Meet Each Other Successfully By Sherry Woodard Dogs are naturally social animals, but that doesn’t mean they all have the necessary social skills to meet each other politely. Why would you want shelter dogs to meet and get along with each other? Well, shelter dogs can experience stress when housed individually in runs,. To proceed with the meeting, have each dog on lead with a calm, relaxed handler. Keep the leads loose, since pulling on the leash might communicate to the dog that the handlers are fearful or anxious about their meeting. Don’t let the dogs rush up to each other; avoid face-toface greetings (a rude way of meeting) by keeping them 8 to 10 feet apart. try distracting the dogs by keeping them moving. The dogs should be kept at a distance from each other, far enough apart so that they can’t touch.. At Best Friends, we continue to socialize them and help them improve their skills with walks and classes in Dogtown. 9-8 Best Friends’ ABCs of Dog Life Section 9: Miscellaneous Resources Dogs live in groups of four or five at Best Friends,. At Best Friends, spied on. Besides providing social opportunities, encouraging dogs to interact politely also helps them become more adoptable. Every dog needs our assistance to become more adoptable or to stay adoptable until he/she finds a wonderful home. You can make a difference in shelter dogs’ quality of life by adding enrichment with your time, attention and love. Best Friends’ ABCs of Dog Life 9-9 Section 9: Miscellaneous Resources Helping Shelter Dogs Develop Life Skills By Sherry Woodard Tara’s run is a training. Remember to keep training sessions fun by using praise, pets and treats to encourage the behavior you want. Many dogs need practice living in a house, so this structure helps dogs become comfortable with entering and exiting doorways, walking down a hallway, and walking on different types of flooring. Above: Stairs with backs go up to a walkway with different types of flooring, such as linoleum and tile. Anything new can be scary, so dogs who haven’t lived in homes may need to get comfortable with stairs and different types of flooring. Right: The other end of the training walkway. This side has stairs without backs. Some dogs refuse to start at this end because stairs without backs are more frightening. With practice, they will approach the walkway from both ends. 9-10 Best Friends’ ABCs of Dog Life Section 9: Miscellaneous Resources The short table was designed to teach dogs to stay in one place. Dogs can be taught to sit, stay down and stay. It can also be used for handling and grooming. This structure helps to build a dog’s confidence. While the dog is on lead, the lead can be put through the opening in the top and the dog can be encouraged to walk through. Best Friends’ ABCs of Dog Life 9-11 Section 9: Miscellaneous Resources Health and Behavior Profile This health and behavior profile is a form that Sherry Woodard, animal behavior consultant at Best Friends, asks people to fill out before consulting with her about one of their dogs. Whether you are a trainer or someone seeking a trainer, you might find it useful for gathering information about a dog. Date__________________________ Dog’s name____________________________________ q Male q Female Age_______ Weight_________ Breed/mix _____________________________________________ Special needs_____________________________________________________________________ Spay/neuter status_________________ Age at surgery________ Date of surgery _______________ History Where did you obtain this dog? ______________________________________________________ How long has this dog been living with you? ____________________________________________ Please give a short history of the dog. _________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ Please explain in detail your reason for this request for help. _______________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ 9-12 Best Friends’ ABCs of Dog Life Section 9: Miscellaneous Resources Medical Information Date of last vet visit________________ Reason for visit __________________________________ Blood work done? q Yes q No X-rays done? q Yes q No Has the dog been tested for: Heartworm? q Yes q No If yes, when?________________________ Result: Lyme disease? q Yes q No If yes, when?________________________ Result: + + + Concerns found ______________________________________ Concerns found __________________________________________ Other tick-borne diseases? q Yes q No If yes, when?____________________ Result: Last vaccine(s) given______________________________________ Date ____________________ Last time worming was done ________________________________________________________ Coat type and current condition ______________________________________________________ Condition of nails _________________________________________________________________ Condition of ears __________________________________________________________________ Condition of teeth: q White q Stained with tartar q Damaged q Missing q Needs dental Condition of eyes: q Clear q Cloudy q Have discharge q Eyes missing or blind Is this dog taking any medications? q Yes q No If yes, what are they? ____________________ ________________________________________________________________________________ Is this dog taking any supplements? q Yes q No If yes, what are they? ___________________ ________________________________________________________________________________ Have there been any major medical events or injuries in the dog’s past? q Yes q No If yes, please describe: _____________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ Training Has this dog had any training? q Yes q No If yes, what type of training? (crate training, house-training, training to respond to cues such as “sit” or “down,” etc.) ___________________________________________________________________ What kinds of equipment do you use in training? (crate, collars, etc.)_________________________ ________________________________________________________________________________ Best Friends’ ABCs of Dog Life 9-13 Section 9: Miscellaneous Resources Will the dog sit if you ask? q Yes q No What other cues (such as “down,” “stay” or “wait”) does the dog respond to? __________________ ________________________________________________________________________________ What are your training concerns? _____________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ Exercise and Socialization Do you go for walks with the dog? q Yes q No If yes, how often and how long is a typical walk? ________________________________________ Are the walks on lead or off lead? ____________ Describe the dog’s leash behavior. ____________________________________________________ Does the dog go for car rides? q Yes q No If yes, describe the dog’s behavior in the car. ________________________________________________________________________________ Does this dog play? q Yes q No If yes, with what? (toys, games, people, other animals) ________________________________________________________________________________ Does this dog get along with other dogs? q Yes q No q Some dogs Other animals? q Yes q No q Some animals (specify)_________________________________ Children? q Yes q No What type of friends does the dog have? _______________________________________________ Is there anyone that this dog dislikes? _________________________________________________ Describe the dog’s behavior while being groomed. _______________________________________ Describe the dog’s behavior while being bathed. _________________________________________ Can you touch the dog’s entire body? q Yes q No What does the dog bark at? __________________________________________________________ What is the dog fearful of? __________________________________________________________ What are your socialization concerns? _________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ 9-14 Best Friends’ ABCs of Dog Life Section 9: Miscellaneous Resources Time Alone Where is the dog if you are not home? _________________________________________________ How many hours each day does the dog spend alone? _____________________________________ Where does the dog sleep? __________________________________________________________ Feeding What do you feed the dog (include brand names)?________________________________________ Does the dog eat table scraps? q Yes q No Who feeds the dog? ________________________ How much do you feed the dog and how many times each day is the dog fed? _________________ ________________________________________________________________________________ The Rest of the Family Please list any other animals in your home, including the species, breed, age, and spay/neuter status. Also, please note if any animals have recently been ill or require medication. ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ Please list the human family members in the household, including age, sex, any disabilities, and special needs. ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ Your name___________________________ E-mail address _______________________________ Phone: Home___________________ Work___________________ Cell ______________________ Mailing address ___________________________________________________________________ City____________________________ State_____________________ Zip ___________________ Best Friends’ ABCs of Dog Life 9-15
https://pt.scribd.com/document/71705091/ABCsofDogLife
CC-MAIN-2018-09
refinedweb
46,875
70.63
JavaScript - Data Binding in a Windows Store App with JavaScript By Chris Sells , Brandon Satrom | 2012 In this article we’ll explore data binding in a Windows Store app built with JavaScript. This is a hybrid of other kinds of apps built for Windows 8. It’s like a desktop app in that it’s installed on your computer, unlike a Web site. On the other hand, it’s like a Web site in that you can build it using HTML5, JavaScript and CSS3. However, instead of generating the UI on the server side, the JavaScript framework for building Windows Store apps and the underlying Windows Runtime allows you to build apps with client-side state, offline storage, controls, templates and binding—along with a whole host of other services. Data binding is the ability to take the value of a list of data, such as a set of RSS feeds, and use it to populate a control, such as a ListView. We can tailor which data we extract using templates. We’ll show how binding is even more flexible than that, allowing updating of the UI as the underlying data changes, along with sorting, filtering and grouping. When we use data binding, it’s often in the context of a control. We’re going to take a look at the ListView and its support for data binding and templates. Data Binding 101 The use of binding allows you to set up an association between two properties on two objects, most often associating the property of an object with a property on an HTML Document Object Model (DOM) element, as Figure 1 shows. Figure 1 Binding Between an Attribute on a Destination Element and a Property from a Source Object The purpose of establishing a binding is to copy data between the two objects involved: the source from where the data comes and the destination to which the data goes. You might think that you can accomplish this goal using a simple assignment statement: Fundamentally, assignment is what binding does. However, binding is not just a description of what data to copy and to where, but also when. The “when” of a binding is generally one of the following: - One-way binding: Copy the data to the DOM element when the object changes. This is the default in the Windows Library for JavaScript (WinJS). - One-time binding: Copy the data to the DOM element when the binding is first established. This is the equivalent of assignment. - Two-way binding: Copy the data to the DOM element when the object changes and copy the data to the object when the DOM element changes. This isn’t supported in WinJS. By default, WinJS binding is one-way binding, although one-time binding is supported as well. Although WinJS doesn’t support two-way binding, there’s a nice place to hook in your favorite two-way binding engine, such as the one in jQuery, as you’ll see. Binding Objects To get started, let’s say we want to build a little browser for the people in our lives, as shown in Figure 2. The idea is that we can have a number of people through whom we can navigate, each with a name, age and a favorite color. As we use the previous and next buttons, we navigate to other people in the list, and if we press the button in the middle—the clock—we celebrate a birthday by increasing the age of the currently shown person. The following represents the set of people we’ll be browsing in our sample: Starting from a Navigation Application project template in Visual Studio 2012 provides HTML for us to populate, as shown in Figure 3. <!DOCTYPE html> <!-- homePage.html --> <html> <head> <meta charset="utf-8" /> <title>homePage</title> <!-- WinJS references --> <link href="//Microsoft.WinJS.1.0/css/ui-light.css" rel="stylesheet" /> <script src="//Microsoft.WinJS.1.0/js/base.js"></script> <script src="//Microsoft.WinJS- <button class="win-backbutton" aria-</button> <h1 class="titlearea win-type-ellipsis"> <span class="pagetitle">Welcome to PeopleBrowser!</span> </h1> </header> > </div> </body> </html> The interesting part of this HTML is the use of the data-win-bind attribute, which uses the following format: The data-win-bind syntax is a semicolon-delimited list of binding expressions. Each expression is the combination of a destination DOM element property and a source object property. The dotted syntax we’re using to set the background color on the style for the favorite color div—that is, style.backgroundColor—works for properties on both the source and the destination, and it drills into subobjects, as you’d expect. Each destination property in a binding expression is resolved against the HTML element that contains the data-win-bind attribute. The question is: Where does the object come from against which the property names are resolved? And the answer is: the data context. Setting the data context is part of the binding operation, which establishes the association between the HTML element and whatever object is used as the data context, as shown in Figure 4. // homePage.js (function () { "use strict"; WinJS.UI.Pages.define("/pages/home/home.html", { ready: function (element, options) { var people = [ { name: "John", age: 18, favoriteColor: "red" }, { name: "Tom", age: 16, favoriteColor: "green" }, { name: "Chris", age: 42, favoriteColor: "blue" }, ]; // Bind the current person to the HTML elements in the section var section = element.querySelector("section[role=main]"); var current = 0; WinJS.Binding.processAll(section, people[current]); } }); })(); The processAll function in the WinJS.Binding namespace is the function that parses the data-win-bind attributes for a given hierarchy of HTML elements, the section containing the input and div elements in our sample. The call to processAll establishes the bindings between the HTML elements and the data context as described in each data-win-bind attribute. The data context is the second argument to processAll and is used to resolve the property names found in each binding expression. The results already look like what we’re after, as shown in Figure 2. By default, if we do nothing else, we’ve established a one-way binding connection between the data context object and the DOM element. That means that as properties on the data source object change, we expect the output to change as well, as shown in Figure 5. function ready(element, options) { var people = [ { name: "John", age: 18, favoriteColor: "red" }, { name: "Tom", age: 16, favoriteColor: "green" }, { name: "Chris", age: 42, favoriteColor: "blue" }, ]; var section = element.querySelector("section[role=main]"); var current = 0; WinJS.Binding.processAll(section, people[current]); birthdayButton.onclick = function () { var person = people[current]; person.age++; // Changing a bound property doesn't work yet ... }; } Our implementation of the click handler for the birthday button looks up the current element and changes a property, specifically the age. However, we’re not quite where we need to be to get the UI to update automatically. The problem is that a standard JavaScript object doesn’t support any notification protocol to inform interested parties—such as a binding—that its data has changed. To add the notification protocol is a matter of calling the as method from the WinJS.Binding namespace, as shown in Figure 6.; WinJS.Binding.processAll(section, people[current]); birthdayButton.onclick = function () { var person = people[current]; person.age++; // Now this works! }; } }); The “as” method wraps each object, providing the binding notification protocol so each property change notifies any binding listeners (such as our bound HTML elements). With this code in place, changing a person’s age is reflected in the UI, as Figure 7 shows. Figure 7 Changing the Underlying Data Automatically Updates the Bound HTML Elements We’ve been binding a single person object to the set of HTML elements for display, but you can process the data-binding expressions in the data-win-bind attributes with a different kind of data context, as shown in Figure 8.; var viewModel = WinJS.Binding.as({ person: people[current] }); WinJS.Binding.processAll(section, viewModel); birthdayButton.onclick = function () { viewModel.person.age++; }; // Bind to the previous object previousButton.onclick = function () { current = (people.length + current - 1) % people.length; viewModel.person = people[current]; }; // Bind to the next object nextButton.onclick = function () { current = (people.length + current + 1) % people.length; viewModel.person = people[current]; }; } }); Here’s where we make a shift between passing in a single piece of data from our app’s “model” (that is, the set of data that has nothing to do with the display of itself) to grouping the data that’s appropriate for our “view” of that model (in this case, the current person to view). We call this variable the “view model” after a famous and useful technique for implementing UIs called Model-View-ViewModel (MVVM). Once we’ve built our view model as a bindable object, as the underlying properties change (the person, in our case) the view is updated. We then bind our view to the view model so that in our Next and Back button handlers—as we change which person we’d like to view—the view is notified. For this to work, we’ll need to update the HTML to use the view model instead of the person directly, as shown in Figure 9. > Figure 10shows the result. Figure 10 You Can Rebind Different Objects to the Same Set of HTML Elements In addition to binding objects to elements, binding also allows you to simply listen for a value to change. For example, right now as we change the index to the current value when the user clicks the previous or next buttons, we have to remember to write the code to change the view model’s person field to match. However, you could use binding itself to help here, as shown in Figure 11.]"); // Listen for the current index to change and update the HTML var viewModel = WinJS.Binding.as({ current: 0, person: null }); WinJS.Binding.processAll(section, viewModel); viewModel.bind("current", function (newValue, oldValue) { viewModel.person = people[newValue]; }); birthdayButton.onclick = function () { viewModel.person.age++; }; // Bind to the previous object previousButton.onclick = function () { // Set the current index and let the binding do the work viewModel.current = (people.length + viewModel.current - 1) % people.length; }; // Bind to the next object nextButton.onclick = function () { // Set the current index and let the binding do the work viewModel.current = (people.length + viewModel.current + 1) % people.length; }; } }); Instead of a simple variable to hold the index to the currently shown person, we add the index to the currently viewed person to our bindable view model. All bindable objects have a bind method, which allows us to listen for changes to the object’s properties (the current property in this example). When the user clicks on the previous or next buttons, we simply change the index of the current person to be shown and let the bind handler process the data-win-bind attributes for the HTML that shows the current person. If you want to stop listening for bind events, you can call the unbind method. Now, as we mentioned, everything you’ve seen works against the default: one-way binding. However, if you’d like to set up other kinds of binding or participate in the binding process itself, you can do so with a binding initializer. Initializers An initializer is the optional third parameter to a binding expression that specifies a function to call when the binding is established: You provide an initializer as part of a binding expression if you want to participate in or even replace the existing binding behavior—for example, to perform a data conversion or even hook up jQuery two-way binding. A binding initializer is a function that takes over for the default one-way binding and has the following signature: The details of implementing a custom initializer are beyond the scope of this article, but WinJS has several initializers built-in of which you can take advantage. For example, if you’d like to do one-time instead of one-way binding, you can use the oneTime function from the WinJS.Binding namespace: On the other end of the spectrum, when performing one-way binding, it’s often useful to perform data conversion (also known as data transformation). For example, imagine we wanted to spell out the ages of the people in our life: The converter function on the WinJS.Binding namespace provides the hard part of the initializer implementation; all you have to do is provide a function to perform the actual conversion and it will be called as the source value changes. Using it in the HTML looks like you’d expect: You can see the results in Figure12. Figure 12 Translating a Numeric Age into Words via Data Conversion Binding values one at a time is useful, but even more useful—especially for Windows Store apps—is binding collections of values all at once. For that we have the binding list. A Binding List Imagine a simple example of using a ListView with a collection of values: Here we’re creating a ListView control declaratively in HTML that’s bound to the dataSource property of a global items object. In our JavaScript, it’s easy to create and populate the items object as a binding list: In this code we create a binding list (an instance of the List type from the WinJS.Binding namespace) and we loop over an array of values, using each to create a timeout, which is a promise that will fire at some time in the future according to the argument you pass (milliseconds). When each timeout completes, we’ll see the ListView get an additional value, as Figure 13 shows. Figure 13 The ListView Updating as the Underlying Binding List Updates The HTML doesn’t provide an ID for the ListView, nor does the JavaScript interact with the ListView in any way. Instead, the HTML and the JavaScript both rendezvous on the items binding list. It’s the binding list that implements the collection binding API (called IListDataSource). Instead of making you program against IListDataSource directly—it’s not particularly programmer-friendly—the binding list exposes its IListDataSource implementation via the dataSource property. To provide an API that’s as familiar as possible to JavaScript programmers, the binding list implements a similar API and similar semantics as the built-in array supports—for example, push, pop, slice, splice and so on. As a comparison, here’s how the built-in JavaScript array works: The binding list behaves similarly except that instead of using an indexer—that is, square brackets—it exposes items via setAt and getAt: Sorting and Filtering In addition to the familiar API, the binding list was built with Windows Store app building needs in mind. You’ve already seen how the dataSource property lets you connect to the ListView control. In addition, you might be interested in sorting and filtering your data. For example, here’s our list of people again, this time wrapped in a binding list: var people = new WinJS.Binding.List([ { name: "Tom", age: 16 }, { name: "John", age: 17 }, { name: "Chris", age: 42 }, ]); // Sort by name window.sortedPeople = people. createSorted(function (lhs, rhs) { return lhs.name.localeCompare(rhs.name); }); // Filter by age (adults only) window.filteredPeople = people. createFiltered(function (p) { return p.age > 17; }); We can sort a binding list by calling the createSorted method, passing in a sorting function, or filter it by calling the createFiltered method, passing in a function for filtering. The result of calling one of these create methods is a view over the data that looks and acts like another instance of the binding list, and we can bind it to a ListView, as Figure 14 shows. Figure 14 Filtering a Binding List Instead of providing a copy of the underlying data, the createSorted and createFiltered methods return a live view over the existing data. That means that any changes to the underlying data are reflected in the views and will be shown in any bound controls. For example, we could add a minor to the underlying list: Even though we’re changing the underlying data, the sorted view will be updated and the ListView will be notified of the change, as Figure 15 shows. Figure 15 Sorting a Binding List Also, because the view from the create methods looks and feels like a binding list, you can further sort or filter the view in a stacked way: The results of binding to the resultant filtered and sorted view shouldn’t be a surprise (see Figure 16). Figure 16 Sorting and Filtering a Binding List Be careful when stacking that you do so in the correct order. In the case of filtering, if you sort or group first and then filter, you’re doing more work than you have to. Also, every view layer is overhead, so you’ll want to make sure you stack them only as deep as necessary. Grouping In addition to sorting and filtering over the binding list data, you can also group it by some criteria of the data. For example, adults and minors would work well for our sample data: The return value of the grouping function is a string value that uniquely identifies the group—in our case, either the string “minor” or the string “adult.” Binding to the grouped view of the data shows the data arranged by group—that is, all items from each group before moving onto the next group, as Figure 17shows. Figure 17 Grouping a Binding List This example shows just two groups, but you can have any number of groups. Also, just like createSorted and createFiltered, the createGrouped method returns a view over live data, so changes in the underlying data will be reflected in bind destinations. However, while it’s clear to us, the developers, that we’re sorting the groups—first the adults and then the minors—it’s not clear to users of our program because there’s no visual indicator of the grouping. To ask the ListView to provide a visual grouping indicator, the ListView allows you to specify two sets of data: the list of grouped items and the groups themselves. Configuring the ListView with both sets of data looks like this: Once we’ve created the grouped view of the binding list, the groups property exposes a list of those groups so the ListView can use them. However, before we can make it work, we also need to go back to our use of the createGrouped function: Previously, when we were grouping, we just needed to provide a function that could do the grouping based on some unique group identifier. However, if we want to actually display the groups for the user, we need another method that can extract the groups themselves (if you wanted to choose the order of the groups, you could provide a third method to the createGroup method that does the sorting). In both cases, we’re providing a string to represent the group as well as to build the list of groups, which works just fine, as you can see in Figure 18. Figure 18 Grouping a Binding List with ListView Headers As Figure 18 shows, the group is actually used to decorate the grouped data, making it very easy to see which data falls into which group. Unfortunately, even with this visual indication of grouping, our JSON-formatted objects aren’t really the UI we’d want to show our users. For this to work the way we want requires templates. Templates A template is a single-rooted hierarchy of HTML elements with optional “holes” to fill in dynamic data. The data-win-bind attribute on the div defines the holes using data-win-bind attributes. For example, we could create a template for our person objects like so: What makes this chunk of HTML a template is the data-win-control attribute set to the WinJS.Binding.Template control type. Once we have our template, you need to render it to fill in the holes with data: Because the template is just another control (although a control that hides itself until manually rendered), we can reach into the div that defines it and gain access to its functionality via a well-known property called winControl. The functionality we want to access is the template’s render method, which takes a data context for use in binding the data-win-bind attributes and produces a fully formed HTML element for us to do what we want with. If you provide the ListView a template, it will render each item in the ListView with that template. In fact, the ListView can have templates for rendering both items and group headers. To see that in action, let’s first update the groups to objects, as is more typical: // Fancy group by age var groups = [{ key: 1, name: "Minor" }, { key: 2, name: "Adult" }]; function groupDataSelector(p) { return p.age < 18 ? groups[0] : groups[1]; }; function groupKeySelector(p) { return groupDataSelector(p).key; }; window.fancyGroupedPeople = people.createGrouped(groupKeySelector, groupDataSelector); In this code, we’ve got two group objects, each with a key and a name, and we’ve got separate data and key selector functions that return the group itself or the group’s key, respectively. With our group data made a little more real-world-like, a template for the group header is created, as shown in Figure 19. <div id="headerTemplate" data- <span data-</span> </div> <div id="itemTemplate" data- <span data- <span data-</span> <span> is </span> <span data-</span> <span> years old</span> </span> </div> <h1>Fancy Grouped</h1> <div data- </div> The template for the group header is created just like an item template. The group header and item templates are passed to the ListView control via the groupHeaderTemplate and itemTemplate properties in the data-win-options attribute. Our fancier grouped data looks like Figure 20. Figure 20 Grouping a Binding List with ListView Headers and Templates OK, we admit that’s not very fancy, but the combination of groups and items, including templates, shows the power of the binding list. In fact, the binding list is so useful, it’s the core of the asynchronous data model exposed from the data.js file generated by the Grid Application and Split Application project templates, as shown in Figure 21. // data.js (function () { "use strict"; var list = new WinJS.Binding.List(); var groupedItems = list.createGrouped( function groupKeySelector(item) { return item.group.key; }, function groupDataSelector(item) { return item.group; } ); // TODO: Replace the data with your real data. // You can add data from asynchronous sources whenever it becomes available. generateSampleData().forEach(function (item) { list.push(item); }); WinJS.Namespace.define("Data", { items: groupedItems, groups: groupedItems.groups, getItemsFromGroup: getItemsFromGroup, ... }); ... // This function returns a WinJS.Binding.List containing only the items // that belong to the provided group. function getItemsFromGroup(group) { return list.createFiltered(function (item) { return item.group.key === group.key; }); } ... }); })(); You can see the creation of the empty binding list, the creation of a grouped version of that list using functions that do key and data selection over the groups, a little forEach loop that adds the items to the binding list and finally, a helper function that does filtering. Where Are We? We started this article by digging into binding, the ability to associate a property on an object with an attribute on an HTML element. Out of the box, WinJS supports one-way, one-time and custom binding initializers, but not two-way binding. Binding is supported on single bindable objects as well as lists of objects that implement the IListDataSource interface. The easiest place to get an implementation of the IListDataSource interface is via the binding list (WinJS.Binding.List) object, which fully supports sorting, filtering and grouping. We also saw how useful templates are when combined with binding and how useful both templates and binding are when it comes to controls that support list binding, such as the ListView. Receive the MSDN Flash e-mail newsletter every other week, with news and information personalized to your interests and areas of focus.
https://msdn.microsoft.com/en-us/magazine/jj651576.aspx
CC-MAIN-2016-50
refinedweb
4,016
51.78
simple-stream utility functions for simple streams Want to see pretty graphs? Log in now!Want to see pretty graphs? Log in now! npm install simple-stream Simple Stream Useful stream sources, transforms and sinks for Simple Streams. Documentation Sources Transforms Sinks Sources fromArray(array) -> stream Creates an stream from an array. var arrayStream = stream.fromArray(numbers) fromReadableStream(readableStream) -> stream Creates an stream from a Readable Stream. var readStream = fs.createReadStream('input.txt', {encoding: 'utf8'}) var streamStream = stream.fromReadableStream(readStream) Transforms map(stream, mapFn) -> stream Create an stream that applies a map function to transform each value of the source stream. var mapStream = stream.map(someNumberStream, function(each) { return each * 2 }) // pipe the stream to an array: stream.toArray(mapStream)(function(err, res) { console.log(res) }) mapAsync(stream, mapFn) -> stream var mapStream = stream.map(someNumberStream, function(each, cb) { cb(null, each * 2) }) Create an stream that filters the values of the source stream using a filter function. filter(stream, filterFn) -> stream var evenNumbersStream = stream.filter(someNumberStream, function(each) { return (each % 2) == 0 }) filterAsync(stream, filterFn) -> stream var evenNumbersStream = stream.filter(someNumberStream, function(each, cb) { cb(null, (each % 2) == 0) }) range(stream, range) -> stream Creates an stream that only streames over the specified range. range is specified as {from: startIndex, to: endIndex} where from and to are both inclusive. var rangeStream = stream.range(stream, {from: 10, to: 19}) buffer(stream, bufferSize) -> stream.buffer(someStream, 10) // inspect buffer size console.log(bufferedStream.bufferFillRatio()) // change the buffer size later bufferedStream.setBufferSize(100) Sinks toArray(stream) -> continuable Reads the source stream and writes the results to an array. stream.toArray(someStream)(function(err, array) { console.log(array) }) toWritableStream(stream, writeStream, encoding) -> continuable Reads the source stream and writes the result to a Writable Stream. var writeStream = fs.createWriteStream('output.txt') stream.toWritableStream(stream, writeStream, 'utf8')(function(err) { console.log('done') }) forEach(stream, fn) -> continuable Reads the source stream and invokes fn for each value of the stream. stream.forEach(someStream, function(data) { console.log(data) })(function(err) { console.log('end') }) forEachAsync(stream, fn) -> continuable Reads the source stream and invokes fn for each value of the stream. Only once the callback is invoked the next value is read from the source stream. stream.forEachAsync(someStream, function(data, cb) { console.log(data) setTimeout(cb, 100) }(function(err) { console.log('end') }) Contributors This project was created by Mirko Kiefer (@mirkokiefer).
https://www.npmjs.org/package/simple-stream
CC-MAIN-2014-15
refinedweb
394
54.49
177 Related Items Succeeded by: Gondolier (Venice, Fla.) Full Text -- __ 6r __6r6r6r _ TIDES CONTENTS , VENICE INLET STUMP PASS OBITUARIES ......,................ .. PAGE 1 I High Low High LowS )lat. 2 2:13:; am 8:40: am :17 am 1:18: am EDITORIAL ........................ .. PAGE 8 I, ' 2 22 pm 9:23: pm 3:24: 10:14 : pm : ()Jar S 3:32: am 8,:41 am 4::10 am 1:43: am pm SOCIETY ...................... PAGES and 8 ' 3:14: pm >:57 pm 3:62 pm 10:54: pm CLASSIFIED ........................ PAGE 11 I 4 4:11: am t:27 am 5:13: am 10:05 am Mar 3:23 pm 11:23 pm : 4,25, pm < J1" AREA SPORTS ................... .. PAGE 12 5:43 am 11:32: am 8:45: am 12 01 / : : am 5 Mar B 08 NEWS AND COLUMNS ..... PAGES 4 and 9 4:04 pm : pm 10:10 am ..- 1 -- ' Serving the Fattest Growing Area On Florida Wett Coast Osprey Laurel Nokomis, Venice, South Venire, Venice Gardens Venice East, Englewood North Port Charlotte L 20, N0. 18 12 PAGES MEMBER! THIS' ASSOCIATED PRESS VENICE. FLORIDA. MONDAY, MARCH 2, 1964 MEMBER FLORIDA PRESS ASSOCIATION PRICE 10 cent .... .........---- -- C- - STUPENDOUS TERRIFIC i . / t k Homs! Show Draws Praise I IBy SAM DILLON of 1 i Great!" "Terrific! . Tremendous! "Outstand iiA I ing!" These and nearly every I ad"t other superlative in the diction. *" * ily f iiJw-'W t3$ ments ary were from samples exhibitors of the and com visitors IrI T i'' , 'P .. to the first annual Tri- 1 City Home Show and IndustrialExhibition i which closed l Saturday - night after a successful four-day run at the Ringling , circus arena. "It bore out the fact that this area is surging forward every day in growth and progress kcv1kr ," said William C. Payne t president of the First National Bank of Venice, "and dem- onstrated the tremendous upswing - in building, expansionand improvements going on. We were gratified at the tremendous . turnout and we were proud to be part of It." "The reception by the public { has been excellent said Harry White of the Venice.Nokomis - 1T Bank "It far exceeds anything . we've ever had in Ven T .4 ice," added his co-worker at the banks exhibit Mrs VirSinia - Ramsey."I r think its been an outstanding 4 rTHESE show," declared Dick p ' Doudna of Littrell Concrete "both from an attendance standpoint and the quality of the exhibits" MODERN MAYDEN LADYES" found the hunting most terrible Saturday --- New VistasMost when they went on their leap year man-hunt, variously equipped. Mis Frances Webinga left used a fishing net (now discarded), Miss Mary Burris of the persons queriedfelt OUTSTANDING SUCCESS The first annual Trl-City Home ors alike ran the gamut of superlatives About one-half of the center, found her slinky evening attire no more successful and Sharon Muller the Home Show had open Show and Industrial Exhibition closed Saturday night at the exhibits which nearly filled the big arena to capacity can be I success with a borrowed hunting rifle (now returned) was nil. Maybe in 1968 ed up new vistas for Venice, Rmglmg winter quarters circus arena after a successful four. seen in this high-angle GONDOLIER photo by Bob Obendorf. (GONDOLIER PHOTO by Bob Obendorf) "Its been very successful day run. Comment about the show from visitors and exhibit- I'm very well pleased and glad I Leap Year's Over Gals we're manager Robert participating for Green's Caudle," Fuels enthused district ofFlorida SV Area Business I "It's a good thing for Puzzler: What To Do I Unlike bachelors who regard ""leap estait may be: except and of awls"glf the Venice areahe continued ,ear" with a rather jaundiced eye, single (which if) he can make it appear that he "and we're already "look. Group Selects is betrothit ither woman he then hall ing forward to next year. (irli look upon the extra day every fourth ane year u open season on all single male be free." Caudle added that he felt the About Fire I And, fellows, you can blame it all on In other words men, It was give up or circus arena should be used Engine Official Name w the Scots, who atarted it all back to 1288 pay up in those days. more for such events The ! nth a law that reads: Shortly thereafter France took to the Home Show is only the second - "It I is statut and ordaint that duringthe tame law quite happily at least the women time the arena has been used NORTH PORT' CHARLOTTECity tain legal possession of the sion chose, it could enter Intoa SOUTH VENICE The rein of Hir Maist Blissit Mejeste for did. It was a slow two centuries before for a public function aside from commissioners of North 1926 unit contract with the volunteer South Venice Area Business ilk years knowne as lepe years ilk may. the custom became legalized in Genoa and the circus rehearsals for whichit Port Charlotte will seek legal Obviously irked by a published fire department for the purchase Group U the official name of den ladye of bothe hlghe and lowe estait Florence, Italy was primarily constructed. advice on the course of action report that the venerablefire of the vehicle. I' the new organization being she And then, somehow the men took over "I'm tickled to death with it follow In of the *ill hue liberte to bespeke ye man to disposing engine was Inoperable, The combined group will also formed by business leaders ,des, albeit he refuses to taik hir to be his and the whole thing was dropped except myself exclaimed John city's one piece of fire fighting Mayor Flavius Wood and the have the city attorney check along U. S. 41 from Center U ful wyfe, he shall be mulcted In ye in the memory and minds of women, Erickson of Walker's Hardware equipment. commissioners met informally their Insurance policies coverStog Road to the Englewood Road 1 wm ane pundis (one pound) or less a* his where it will, no doubt, always be in force we'll.really"I imagine have a show next here year," The engine American La in joint session Friday afternoon the equipment and its attendant intersection France circa 1926 sits in solitary with Fire Chief F. H. (liability with an eye to The designation was decided .--.............. 'Outstanding'Palll splendor in the parkinglot "Doc" Hendrlcksen and Hugh eliminating any duplication. upon at a meeting last Wednes- .. ----- ... ... Cockrill of the Venice of this city's only shopping MacKibbon, assistant chief. day attended by merchants Area Home Builders Assn. center. Owned by the city, the Hendricksen and MacKibbon representing the varied business - classified the show as "very In. piece of apparatus U operatedby assured the commission mem- interestc in the area. A teresting" Said Cockrill "I the Volunteer Fire Depart bers the truck is operable, "we Boyer Celli! committee also was appointedto At A Glance! think the crowd 1 ia terrific for ment. This group would like to had it running this morning investigate possibility of Politics the first year," I The chief said neither he nor erecting sign boards at the of 1--- King Morton local restaura- get a more modern piece anyone in the fire department RacesTwo northern and southern limits of Enter I (Continued on page 2) equipment but first must ob- authorized the published story the South Venice area business new, contestants have lumped Into the race for teats on the Sarasota County Como The engine was purchased in district. Floyd Potter of Englewood a candidate for the District 5 post, and Larry 1961 for $1,000 by the City of more candidates announced The group expressed consld. y are District I.w I. North Port Charlotte and has over the weekend inadvance enable interest in recently the job for To Lead Sarasota seeling -. _- Again been used and maintained by of Tuesday' opening published population statistics Fourth candidate from the the volunteers Maintenance date for formal entry Into reflecting the tremendous an- South County and the third Re- has been a problem as parts the May 5 primary. ticipated growth of the South publican to seek the District 5 Cancer DriveHeading for this model are no longer As anticipated, Sheriff Ross County "It looks like we in nomination for the Sarasota b available and must be "hand I Boyer announced as a candidate South Venice are going to be county commission Is Floyd + tiy" made," according to MacKib- for the fourth four. right in the center of things," Potter of Englewood: y" the 1964 South County ---, bon.The year term. Boyer, a Democrat Temporary Chairman Hartley The 50-year-old Englewood Cancer Crusade fund drive I II. manufacturer charges will be opposed by previously P. Dermond remarked. building contractor announced for the 17th straight year will J $8 an hour for a mechanic's announced candidates his candidacy last Thursday. be Mrs Charles McG Robert time plus travel expenses. Constable Jack Knuckles of Potter will face fellow Republicans of Nokomis. MacKibbon said rather than Venire, William A. Sullivan Car Jumps Curb Charle E. (Chuck) Mr. Roberts' appointmentwas face such an expense the vol. and John B. Johnson of Sarasota Schmitt of Venice Gardens and announced last week by unteers have attempted to do all Republicans.Joe Joseph L. Johnson, 74, of Robert M. (Bob) Wright of Dr. Leo H. Wilson Jr., president the work themselves V. Celli, former Ven. Duxbury, Mass, wa charged ? Manasota Key In the May 5 of the Sarasota County Commissioner Hubert Fox, ire policeman, announced as with failure to have his car under . sb GOP primary. Lone Democrat unit of the American Cancer acting chairman of the joint a candidate for the constable control after it Jumped the candidate in the District 5 con. Society session, told the group City At. post now held by Knuckles curb on West Venice Avenue { test so far is incumbent Masel, Dr. Wilson congratulated torney John Wood, suggestedthe Celli!, son of Councilwoman early Friday afternoon and C. fusion who will be seekinghis Mr*. Roberts on her outstanding truck be appraised Then, I Blanche J. Celli, Is a Repub crashed into the Blalock Insurance 1'I first lull four-year term on achievements during past he related, if the city commls-i lican. Company offices. the board. campaigns and expressed con I appointed to the fidence that the. 1964 crusade Huston was Board of County Commission. will be as successful as the Prominent Successful People I ers last year to fill the vacancy other 16 she" has "so expertly , created by the election of FLOYD POTTER managed LARRY MURPHY Warren S. Hender Mr. Roberts' tireless work Chairman -- son to the state senate. I for the society was praised officialslast by Enter Contests And Win Them I Posts Florida cancer drive vd ' Many Find Cats DO Friday at a stata meeting wo Sites For potter a lifelong Republican In Tampa. In communities throughoutthe obtaining the next largest vote gatherings, all you have to do is president of the Englewood (Continued on page 2) \MRS. ROBERTS ___ I state and nation where total will get a new $25985 is to ask for the votes rG' Firehouse Chamber of Commerce, Have 9 Lives newspapers have conducted Frigidaire mobile dish washer In contests like the one The past vice president of the contests and offered the choiceof and the next a $209.95 G,E. air GONDOLIER has announced , \dice Englewood Builders and Con. If you want to find out howto i Rock Fossil ExhibitBy cars or cash and other conditioner All who enter and the busiest most successful p He-ion' of two sites' for tort tractor Assn, past chairmanof asphyxiate a cat don't prizes leading citizen and fail to win prizes will receive citizens of the community can , ItlUon of fire department the Englewood Recreation ask Ben J. Peters. business people have enteredto cash commissions on the subscription do a good job. In Venice Garden Council and past chairman of For Peter is convinced now W. EARL AUMANN today. "I want the people of make them successful and credited to them. The one who realizes that by L South repOrtedly been offered to the Englewood Cub Scout Com that the furry felines really do "Hundreds of rockhoundsfrom I. Venice to see what we have I won them. There' only two way to expanding the circulation of Ir Fire Venice Area Vo\un-\ mittee. have nine lives Especially the our southeastern tales right here at home," he added. The GONDOLIER la now or- get the prize-winning<; votes their local newspaper that theyare '> Department by deW I He Is a member of the Englewood wild ones i travel thousands of miles each The Rev. Mr. Jelks Is not a anlzlng its $4,500 Subscription One i la to get your friend and making the community a John E, Porte. : Volunteer Fire Depart- The Venice Gardens resident year to Arkansas, Colorado, commercial rockhound but collect Contest and i* making an effort acquaintance to clip the 500 better trade area will consider . I iftmiChuck) Schmitt, ment board of director and related to members of the VG Arizona, Wyoming and Mon specimens of rare rocks to enlist some of the busiest FREE VOTE COUPONS out of entering this contest and In the Venice .Gar. : recently was made an honorary Homeowner Assn last Monday i tans in search of rare rocks, as a hobby and cuts them into I men and women of this their copies of The GONDOLIER help build a growing industry I "omeowner Assn. told ; member of the Englewood night how as grievance I when we have a wonderful Cobochon or oval shapes and ",sea as contestants and give them to you or A GONDOLIER reporter has F'February meeting of the Board of Realtor chairman he was called upon variety right here on our own fashions them into settings for The grand prize is a new turn them in at the office to been checking newspaper i> ICreed lZatlon the VG official Potter was appointed by the recently to rid a neighborhood west coast of Florida rings, earrings, bracelets and $2,48250 Ford or its cost in your credit. No string are attached from all parts of the United to donate a location Straaota county commission toa a variety of other things.!: to these They such In, on Center to : of a quartet of prowling That was the reason given each The second prize is $500In coupons State where contests recom- re Road or In the special committee all' can be votes with or without have been conducted On one tone plan pussycats by the Rev. Hendley F Jelk 1 give away to friends cash. The next prize a of reorganization the proposed mend a Council Peters said he wa called bya for )hi ".All Florida Exhibit of I can produce in my spare $500 U. S. Savings Bond or its subscriptions newspaper l in an area like this, ! center Industry * Onus at the Light I Blvd rn for the of the woman resident of the cub- time," he said I was on the cost will be awarded to some Everyone is a prospect for the entrant were the most Schmitt I han>rock after the' resignation members. division and Informed she had Rock and Fossils" to be seen receiving end so many yearsas entrant residing outside of the the winning vote. If you see substantial, most successful $ 'IVI said< the SVFD exe- envious council in the lobby of the First National After this people day if attend best known people. Many of board has explained that he ia i the four predator locked in a Baptist minister, I feel city limits of Venice. every you ( ? voted unani He U awarded the entrant club meeting. or social (Continued on page J) l 1COlllillileel on pft 2) I (Continued ou page :2) _. ,Continued oa page J) Bank Venice starting/ (Continued on page 2) prize( la " t . .,,,., ,......,';1(,.....,,. ..".. ... ... r ... .. .. ,.. ..... .. .." ... ,, .1" ......" ''j.. . MONDAY, , MARCH p, THE GONDOLIER POLITICS Hospital ReportADMISSIONS ROCK HOUNDS PROMINENT (Continued I Obituaries from (Continued from page 1) It Is my time tothing give pan I"I interested in promoting (Continued from pare 1) life have remained a country "vitally orderly expansion of the P'hklNoko"i'rJobnne1.Lod.' .! to ethers "to!{ EARL JOHN HAVENS daughter Miss Sibyl Klinck an I Many It Is apparent from newspapers school teacher afraid that he industrial potential. : VuIce Varieties Earl John Havens, 78, of i 1617. IJew: Point Comfort Road the participants were people published in other lections would do something that his county's The father Of three including "n.lewo"l HIII, V..t"l lI.n.rot 11010&S. 'o.IM.Des'nn. Vevr Among the many |Inter . Venice Municipal Trailer Park Englewood. whose only reason for enteringwas of the country that many school board or patrons Mrs. Mahlon Brown of i'eIs" : Wlnllyd l FuII.ot'n.J,j"nlto.I specimens of rocks I 1 died Friday Venice Hospital. He had pent the winters to expand the circulationof successful and influential two hob, is Fbnws from Florida Mr jH at people wouldn't like. Other example. Cincinnati, N. Y., and ... Naken, 0. Crlb; s.010's Born In Mich. .here Ao! .the past 19 years and their loral paper and widen behind their "ood'I Cal I showing a large ' Kent County, have gotten like this could be repeated school-age children Bruce 15, dhehls.n 1 1 r.ral o : }:, komi. ,jaw he came here nine! years alto came here io live permanently 1U scope of Influence and use- local newspaper drives and put without end. Some of them and Laurie 11, he has been rd' I ...mVe1Si' J.nd a prehistoric mwnnmihS t ' from Mount Clemens; Mien. He .attar his retirement in 1901. fulness to the merchants, the them over not merely for probably applying to people In active in the Parent-Teacher .: 'Ann.... Noko",10 Csa'h I BonJ..ID 1'o"NJ'. right here on the vl?r;, :Formerly of Knoxvllle 111, he local organizations the churches what would receive for rase Vo. N..t". I Pert beach. Another ?' was employed by Holland Fur they this section of this atate. Association since moving to Venla; B.b Do' rare fladi nace Co., there for 4) years'until owned and operated a'funeral and schools. themselves but to help their Big Opportunity Englewood in 1957. III hit.. E..l.wood, ., I huroedrt.Yenk.1ma the local beach! !! Is a 110111'of ' V. . his retirement in 1954.: .home there for SI )'aan. One of the entrants in one of hometown paper get in positionto If opportunity ever knockedat Potter and his wire Lois, also "k. Ve.'oo 11t' Brow. V..I.. ., ('h..I.JlorandVr r.Itl.le mastodon's upper! p1 l'' He is survived bv a daughter, Mr. Klinck was a member of the contests was a prominent render greater service to your door it Is knockingnow. have been active in the local ,. En.lawood aD" a. showing portion ot fostlN, Mrs Lucille H. Havens Mor i Order of the Eastern Star and doctor's wife. He had a large their community. It', up to you to recognizeIt. library movement and organized is. 21 nov 0urandl. V... with the nerves easily da; .J ris of Baltimore Md., and two the Masonic Lodge in Knox- and famous clinic. Another was The attitude of the people ofa No matter what business Englewood'i first com tai, M..OFns&ae D.odlo..,.. 1II"I.wood'M.I gulshed. grandchildren 'ville Ha was also a member of of a druggist, and another the I fast-growing and aggressive you are in, how busy you are, i munity concert. ('..It""" EnslmodI. K..I Fbyna ... Although his collection Rawles Funeral Home was the National Funeral Directors manager of a large departmentstore. community was demonstratedin how much you make or whether Born in Scotland, he grew rnrJan''.'''I IAprlu'a". ;naN./ s.4 tarns many specimens ,eo" in charge of arrangements Assn and Illinois Funeral Directors one of these contests in a you are rich or poor you up and attended achool in rub U .Au'ims5. ;..1.Vred. LFdwsd Enpi tied oyster shells] (which TV' : Assn.Survivors Another entrant !III one con. county adjacent to Jackson. owe it to yourself to consider Englewood N. J. He was elect Jr.. Venlee4/Stoll.D.lOth B".I 6.lOta'' excellent earrings) h. Is /' include three est: was the wife of the president ville Fla., recently. A man what it means to you and your ed secretary of the PalisadesPark H. J. Sit''"..''''' V..o aerbl I Worse peclally proud of an agate e, KNOWLTON C. KLINCK daughters, Miss Klinck Mrs. and general manager of a who had established five large community to participate in N. J., Republican\ Clubat J.F i."iv': "-'E;,, BUV.H Yenlat l Das. oyster itself. Inside the std Knowlton: G Klinck, 82, died Gene Bragg of Fort Myers and large leather manufacturing supermarket entered his this contest. Many people who the age of 25 and served BU..b... NnkwilIfN : Arde. M.Kern. found near Blackburn'i bit Saturday at the home of his Mrs. George Essex of Mount company that employed over wife in the contest. He was have entered such contests and as justice of the peace and a Vmlo.ttad. Rocs.. at.G.nd.I Pesnbnel, .... on the Myakka River: ';" r.wewnuww......................-..........".. Pleasant Iowa; and two sons, 2,000 men. running a page advertisementeach failed to win prizes have said member of the town councilin VOid........; Nokomla 1"" aunlM' Rak EnInroodI Mr. Jelki also hal a v ALLEN Willard D. Klinck of Knoxvilleand Then there was I man that week in the local paper.In that the knowledge gained and Pharsalia N. Y. .. I Rau Pltune,... Nokm.lsl, I A Ch.l II.. number of yellow caldt a Jack Klinck of Atkinson her he said the experience obtained was ... H'.I.both.' C1urbtlw Tsar stale In lime ran a huge hotel that entered entering name Also active In church work, No.... ro,", Get'Mm stone maim\ Convalescent and 111 t and won. Several other people that if she secured any new worth all of their effort. the Potters are members of St. N.wll. V.nlml, Liu Ho.kl. 011'01'' They were found in a cm ' t' Nursing Home Funeral service and inter that entered and won other contests readers for the paper that it Public admiration respect Raphael's Catholic''Church. Knurl......1-.no"_ H".h Vmm" Dew, Vmlert, M.,., the Mvakka River by s s., 24 HOt ment will be later this week in ran country stores. In two would help not only his business end compensation In cash awaits MfRPIIt r..... VonIH'tI VI.I. Lnn. 1Dn.'ewood'H.'d sot. High School boy, ".hoh' Service I Phone Venice Nursing 4812702 Knoxville Farley Funeral towns surrounded by good but the business of every the men and women who Lawrence E, (Larry) Murphy 11....... Vmlet Velal' Wilbur/ ton"Von'OII refused to divulge the loch.:, I., rONCI DB LION A v.. Home was in charge of local farming areas all the prizes other merchant of that area have it in them to come forward director of the county' Vonleo' Dun Ann Cnlenm DI.I. Qullll"idVminl, of the cave hoping! to titan, I She won second prize. enter the contest and be- Nokombl" Ar"" E.he. Nakm' new ..ww..w.wmww w.wewww arrangements.CUSTOMS were won by farmers or their Public Information Service sophls Llaalt many specimen 4-. wives. One paper listed a sher Stop and Think come active. The winner of the and former assistant editor- .. aM.rI Leo.onl, V....... the summer vacation * lIII'I'JiJIJte DJ. .ijit; ? iff's wife as winning first prize, Out of the hundred of capable Ford could be you but you publisher of The Sarasota Fab DISCHARGE'"ob. Another prized rock found must give the chance T and another listed the police men and women residing yourself News, today announced his It Alta D,.. Nok..t". the Myakka River wctta, -- chief as winning. A barber's in this area who are in positionto to win it. candidacy for the Sarasota Chrl.tla Adhino. Vmlal II...,... II.... the south county Is the M; 1 : Clip the blank and mall g.hwl 1 1Iv wife won in one contest Three enter and win with a minimum entry County Commissioner In District knslsodt: W..doI. IN.. Lon..11 Cloak, fled dropping of a prehiitiJ Dsrbors I'I+ newspapers listed rural mall of effort it is doubtful if it today or come to The GON- I I 1, subject to the Republican VonIOl'Pont, Wllllun Dos 4r.ndol 0....... Venle.t, JerreDItm Dinosaur. DOLIER office and let it be ' I , STOCK carriers or their wives as first any of them have stopped to Party primary. ioko..t.1, ThornOr- .. Nok0CC Seaeow Rib known that interested.It Nokmnb.Feb. p prize winners, and one listed think how easy it would be for costs you nothing.are You have I During his 14 years In the I..B..ba.10 Cobman Edwt"/ &nsan. 00...,050151I 050151I.en. From this same lectio- < I the wife of a postmaster.Four them to win the new Ford. all to you field of journalism, he special -.. LI.tna Vnle.t, Wllh..I.1a. the south county cam slot, It. gain, absolutely nothing J other newspapers that Men and women who come In to lose ized in government reporting Lo.d"" ,NokOlllI'1.,., MmruVmlanl'' Jos prized possession opah H. FRAMES h were checked listed schoolteachers contact with other people will and analysis] and was publicly Hel..I..ood VonlN'' Goren 110.... Noka rib of a Manatee or ueo. as winning and two see all of their friends and recognized and commended by 11I10.r.h. Brlna. VonlOlI l showing the need for the I'lt';,( MAT AND MOUNTING SERVICE others' listed paymasters, one business acquaintances any NINE LIVES various governmental units in Dorothy II Cnrrla.Nelr Venloo, 0.61. rWksass. supplied by the Mvaklti Jm' for a factory and one for a way. They will talk with them the Elmira N. Y, area when iokomlo'' WI.I/.od Full.rtoa.s.a Mr. Jelks explained opi'it' e NON GLARE GLASS about (Continued from page 1) !i.II., J/.d.. .. I something By enteringand R.M.NV.naI stones the hardest mine. Two newspapers listed her garage. he was employed by the Gannett l HU. Vonl.l .l Kopf I are md f. restaurant people a* winning, starting your campaign And he went on to tell how Newspapers before mooIng 1'.nl.Walter Woton. V.nle.1' D''">. Klklund.M fleet the various colors bw I E L L PITMAN and one listed a tax collector. among your friend and acquaintances all was quiet as he and to Sarasota in 1957. V..o Fah, /ohn A.d. 1I.Iood) the agattzed stones rest ' your candidacywill born In Elmira "S" hardness followed Several other newspapers VGHA president Chuck Sch- Murphy was M.r" Br lforf. Comn's, Vrollall Al- by petrel,- were checked and it was found soon become widely I N. Y. June 7, 1928 He received Kokomli I Plora specimens. All teke l "ondt' mitt armed with a shrimp net Ends.wadl Ellis' CHURCH STREET NOKOMISOne known. In a short time will f.od Idd,. CHIfWI J.ma that the winning list Includedtwo you approached the building. Quiet his early schooling in Elmira Ernot H.Hw. E..I.wood'' Wl|. ful polish he added. 1 Block N. E. of Railroad Crowing priest several ministers, create enough interest in the that la, until they opened the and later attended St. II... r.! ....". Nokwnl.1' shay B.b Bw.V The recent drec"lnit it |p v PHONE 468-3393 lumber leaiers, several insure contest to make participation door. Andrew's Preparatory SchoolIn '?ib...IS Iwlt I H.rtm. Vtnlet! Charlotte has produced! i m e once people or their wives, and easy pleasant and profitable. Then according to Peters, Rochester N. Y. and Elmira Gibbi / l ber of other Inter!! t1n, spr f f''f J ,,;jIf, ,MoitW.QF ether people of all walks of In addition to being unable to the cats were all over the College where he studied eco vS5. | AM. Smith, 0.It...Nrs1.11Lnn. tmttor.Nnkonli mens among them a lit lose Imm.koloe l anything by entering the MMIO t nomics.He tt of calcite VmlM.Clir. group crystals ' place, dashing frantically a- ; Ann" C.mphioMn. i contest active participants will round the climbing the joined the staff of the AI.... Flitch, Noknmltl: Job.Loofbourrow another group encased la m . room . widen their circle of friends Gannett Newspapers In 1948 flat with the walls and knocking things .. same chiridtIstics . (4 J m AD I and acquaintances. At the from shelves. and served in various editorial i wood I Fr.nk II..... V. sa.IEnrrrldh' as the famed mud Hi same time you will gain department until V.nle. Ttrrr Or*)!.". VmlwlChTrli , JUST A LITTLE BIT NICER enough prestige and Influence At this point, the two Intrepid capacities KM".l Entl.wo.dl, P-Ur. M..- In the western states Ht t' to make the venture cat hunters decided to put 1957. For one year he also oul... V..,." Jtnf. MomnJl. Vtnle.1' plalned these mud nail el t- profitableto managed weekly ..... Liur.li, Corn.llm; Van their quarry to sleep by running a newspaperin Pour M. west are found in the dried.> them in more ways than the exhaust from an automobile the village of Horseheads Tv6 F.6.V..I.21 .- *"<**. NokowUlK.U I bottoms of prehistoric lik one.Activity into the closed garage. N. Y. .rln. H.rurN"*>?"' V>'"... and are cracked into mportions , in such affair as Murphy discontinued his association Dull, Booth &nd. Indt I C6ola F rrlw . I"r inch That didn't work either. an or two .. 0''_. Su Ches.Mlrh.l y this has started peeopleon EmrlnroodOu: ad INC. many Forty-five minutes later the with the local news I ".11 Bh..., Endses.dI I Pad l diameter. or the road to success Take paper when Mr. and Mrs KentS. Puns Nokon.1.1, M.... _Ilk. H-Ao. Molten Glass alive cats were just as the of the unknown as ever. ... Br dtn" n! . case timid mill, CUr Bp Fr.jl McKinley sold the t publication The site backward school teach. But the crowning blow came Wllllim. It Pmnbartl, IAn... of the ancient.. ' country later to Pennsylvania interests Chirlot' mill town of Woodnwi er who doubted his ability to as they were discussingthe 505 Port it 11intcmectlon and subsequently the - accepted harrowing experience witha of U S. 41 IT accomplish anything at all in retired veterinarian who livesin county appointment.He the Englewood Road his finished ,,.,,3 BUILT WiTN THAI one of these he found contests. To his the Gardens. is a member of the Elks HOME SHOW some specimens! of mi that he surprise Influenced people to help him "Don't you fellows know" Club was charter secretary of (Continued from pace 1)) ten glass' that have local m< I asked the the Mannsota Lions Club and a hounds vet divided disparagingly. into their! ,' op win. from he Harold Starting there with and partner former director of the Florida teur a At the Shamrock Blvd. Entrance to Venice Gardens ran for the legislature and was "that cats have nine lives?" West Coast Blood Bank. He is K. Hall in a brand new industry Ion One as to their origin! % PHONE 4884885P. elected Then he ran for con- I a former director of the Sarasota here the manufactureof grow contends 6' gress and was elected. He later I FIRE HOUSE County Chamber of Commerce salt water aquariums for brightly colored ipecimr' O. Box 1014 Venice, Florida was Governor of his state. Hadit (Continued from 1) and also served on the tropical fish said he had were forest formed fire by the disaster pate that wiped out it not been for participating in executive committee of that heard wonderful comments on the contest he probably would mousy] for the shopping senter organization. the entire show "I think it's saw mill and entire ton . -1 -u-_-- --- ---..."..-,-" ..-"'-<<-_ _-_.....-.............'''''... site.Porte last year agreed to donate Mrs. Murphy Is the former outstanding for a first show" The Woodmere several yean ,r theory being that the Lie' Jane French of Elmira. The said Morton, "and we're veryhappy a site for the sub atation In l' the ." sandy ground mt:* couple have four sons and re- with It In the Venice Gardens recrea- from the intense hut and " side at 2944 51st Street. The 'Its been a very excellent re- tion area, fronting on Pomolo colored by various rocti a ft(, 7\\ Road. So many protests were family attends St. Martha turnout something; the town ground. Church. has needed for a long time DOWNTOWNVENICE received from residents of the John E declared Harry H Britton of Another croup scoff at i Ii Wenger Jr of 3128 that area however plans for sawmill theory and claim \tin of building the branch firehouse Browing Street will serve asMIrph.y' Britton's! House Furniture. ships from Italy eomlni there campaign treasurer. Britton was one of the Ihow'loriginal Meanwhile were scrapped The Sarasota Bank & Trust planners as a memberof Florida for Its vast tail a direct access road from South Venice to Company is designated as the the Retail Division of the supplies brought slcllia basing Venice Gardens has been official depository for funds sponsoring Venice Area Chamber rock from the famed r proposed of Commerce. glass sections of Italy over for better fire protectionin the Gardens and specifications MORE PEOPLE ARE S. M (Jim) Jimison, producer South County as ballast m have been received from ESCRIBING TO AND of the Home Show, call dumped the rock out n till t the READING TIIEGONDOLIER ed it "one of the most successful loaded vffh lumber It ! county engineering office :'\ ever held on Florida's West known that in the days oil II Areat First & Finest Shopping ! -- Coast" three-mast schooners afar Jimison said the outstanding practically all shippirf 1',1 \ ---SPORTSCARBE. aspect of the show were the one-way traffic it WII nit!' displays which he said were sary to carry ball st of IO!!' i., DAZZLING SPARKLING better on the average than sort on the cutroing trip. te, many of the national displaysin The Venice beach hu 1 lDri other shows. been famous for the sharp< 1-/ BARGAINS VALUES! And Jimison went on to express his appreciation teeth found In its sandy b'all to the specimens for hive bet' 4' exhibitors both sa With the New 1964 Tread Design from himself and the Venice black. However Mr. Jells bJ'' --- Area Chamber of Commerce. three ivory colored lha't' r DICK & MEADOWS PHARMACY THE MEN'S SHOP $7.95 $8.95 Venice.teeth found He in feels a marl\the bdn W ivory color is due to the CRUSADE NEW BEAUTIFUL EASTER JEWELRY PALM BEACH BLAZERS Any Size Black lime deposits in the mid I Size Any White $1.00 and $2.00 I All Colors . . . . $37.50 (Continued from page 1) which they were found. The South County chairman Other interesting lpaebnrII .t 231 W. Venice Ave. 438-6776 Medical Center Btdg. 225 W. Venice Ave. 488.1620 PIllS Tn. Exchange, or applied to your Sound Casings is widely known throughoutthe are petrified ship bamn:e Venice from the Myakka River! ; w .....-,..- -- M. _, W'__'_''''''' in area many for civic her participation pro- lone colored pieces of con VENICE jects. Her record of from the Venice beach; s JIIII( OFFICE MACHINES CO. SHRODE JEWELRY accomp lishments includes aiding in of agatized coral from BiBi AUTHORIZED AGENT FOR UNDERWOOD OLIVETTI Wedding Rings Diamonds Stone Set Rings the establishment of a public Point in Tampa Ball! * Sala l I Watches Silverware Jewelry beach at Nok oils, building! of pieces of limestone with P** I ServiceSupplier I We Repair All' Males Stuart Owner Watch: end Jeweler Repair the Venice Hospital and orranl- fied sea urchins from O;:: Merriclc W. Venice Ave. 488-3119 s ration of the Hospital Auxill.: State Park north of Kd I 235 W Mieml Ave. 488-2473 Springs Just off U. S. Hs.Mr. n_._ .. ary.Mrs . 1 -- LF'niEATRE-TROPICAL Roberts also] Is active Jelks U widely ltnw ----.G DRIVE-IN In St. Mark's Episcopal Church the Venice area hlvln'O w* TAYLOR HARDWARE & PAINT CO. Showing Monday March: 2 work and once was chosen to Venice In I sd Now Showing Kentucky Military Institute pastor of the Venice Bf! i, BAHIA RAKES . . $3.98 WALT DISNEY'S"MISADVENTURES "GYPSY" I "Sweetheart." Church. He retired as an KW1minister o'' "," I WithI In addition to the annual in October 1942New .- Ih OF 213 W. Venice Ave 4884909 MERLIN JONES" I Natalie Wood and Rosalind VENICE South County Cancer Crusade, I I Russell Mrs. Roberts also carries on -- -_.-.._-"" T .. _._ ,.. 513 Cypreu One BIL. E. of E. Venice Ave. a year-round service and educational I \- VENICE TILE & FLOORS Welcome/ To I American program Cancer Society for the in ( I'' .. the South County area.DON'T . CARPETS VINYL FLOORS I VENICE SEED & FEED STORE I I FLEXALUM SHADES VENETIAN BLINDS A COMPLETE GARDEN CENTER 311 W, Venice Ave. 488-1117 : 248 W. Miami Ave Dial 488-34S7 BUY A ._ ...... -- -- - ------ -_. .J:>.._ ...... VENICE STATIONERS WATER sonoton'THINLINB - s OFFICE SUPPLIES AND ARTIST SUPPLIES JIM WRIGHT'S ( eyegas! | J Typewriter, Adding Machine (Mechanically: Operated) I SOFTENER hearing aid can correct I" ' SHIRTS SLAX most hearing losses. Chemically Cleaned Just $$12.50 Plus Parts If Required until you see Jack Hill transistor hearing aid bilUlinto .;, 211 W. Venice! Ave. 4884113 121 W. Venice Av. 488-3080 SAVE UP TO Sonotone'i lnnw 1es* I d __ - t Aloha Music & I Fully Guaranteed men's eyeglass For Appliance \ 10 Year HEAR BETTER. LOOK BETW I tyj! f3 8 Years Here Opp. Theatre READ AND USE THE GONDOLIER AT LIVE BETTER Exclusively J 4':' E jiaH Open 'Till 10 p.m.urnteed I .4h GULFSHAMROCKPLUMBING 'i.J [.)II.J < Service On All Mates ? TV RADIO AND HI-FI I) DOWNTOWN VENICE ADS INC. Of f We Give U a TV to use free while repairing yours 621 E. Venice Ave. Phone 48(4247 SARASOTA Ph. 488-2618 311 Venice Ave. W. S ......... "_..,,,,"'" ... __......_ __ __ U_. _.__- _"'_ ....'-,... .- .. .- -. -- -. 1666 Main St. TEL 955.1772PAGETWO A I _;- ;- --- __ THE GONDOUER, "A C n-mEl Irr I , , V W4 . nr r u t , rd d+' u SMOG tl \ : r L ::4V4a. 'v Ydc. r n f_ L s 'h ; ... 1 I f i4J. ', : I. I\.t.I... i:' ". .. '. ,..t...... r\\ ' I a bi '! .* z a ; I rI r THIS IS HOW. O . YOUR NEWSPAPER FITS TOGETHER ! A lot tile a JIg sew pvne? If the pieces don't fit together perfectly then there no paper. Actually, newspapers are so much e part of our daily life than we are prone to lust "accept" them without taking into consideration: [ust erectly how muck work goes into each ditio,,. r There il the copy to be written and edited, photograph of event to be made, the advertising' layouts to be designed end submitted for okays and changes But this is just a small part because once this is done, both copy: and layout must be transmuted into METAL. There are the linotype operator with their deft touch: and mage: machines and the men who compose: the copy .nd ads Once each page is completed: it u matted under a thousands of pounds of pressure As each page is matted i it Is, in turn, cast in the cylindrical: shape in metal so that it will precisely fit the roller on the press. Plastic cuts of photographs are stuck onto the metal cylinders, each cylinder: n locked into place and the pressis finally ready to roll. s Each man has to be a specialist, for each operation is interdependent upon the proceeding one and the step to follow. . There's a great deal more to getting out I paper than . the I 10 cents you place on the counter: or in the rack cup Il'pi' .... would imply I'' I-Dot Gaynor worli at Woman News r and special: I We hop. you'll vis t us at our booth at the Tri.City I '," &j&S8SL1 .awrwe f futures. .Home Show. We'll have an exhibit we hope you'll find both ; 1J1: rr; interesting. and informative. ;, I s < *"% '-Barbara Lanius tales care of booUeepmg and I I rrj'I//i//, billing ', i f'l'; L fu.y j>**' J-News editor Sam editor and 'l f Ent $4,500 Contest Akgpya } GOhIDOUEREwdorBk ; a fJl pr'e'* t r ; 30 Percent Water Rate increase Publisher of the in t and urn. "" l'll'', ii.+':. J.4Margaret > Share In Caih,, PriiesSSSftaitw k. + Curwood at Margaret1 machine that '", *' 'fI r.iw ToBeVotedQn6 cuts the plastics for all photograph. 'I I..; +' "' I/r'tJ/1/' / I. 7 ! Th* ad dftoartment in full swing with Courtney "ll' 'ra veati w'Hu' and Peg Bngert '.ptf; il' BSjfjKfjpftvS '-The closecrufmy / ! lead individual pages tr up 'In oet * from tin Shop Foreman, Roger Kilby. '.', : ? Ml, | H-...- refer to copy ai he sets a large ad. ttr-jsn. iSK ' -JSe page.. met ? |being| eat ,in |Iud by Charlie z n (?+ r.- L..'__..:!__ ; mrve -Olympic Swim Star 9 j| Kit + s : i Dsuig':'tt Deb copy em.ay (news) is set by linotype operator. s ? "afea* ww ; '+,ei ?n:;; They're Faster Today+ Uie 1 I" -'( Stephens puts the finishing touches on a'V I ?rar ; t '' + e- r needy: completed page prepantory to matting. U "-pegs cylinder east: Charlie gets let to place it .'. T ; . 01 the (if ,. , 'I' .T1 press. able handl( '.' ('' '"' r' ? eo::', ar 1h'a + , ? photogranhy) department IS In the 01' Bob OrmndorfCheeking . hr t r : "- for any flaws, Bob has lust fini.hed. deducing . t' t uw : .r .r'"f' I a photograph and is about to place it In , another tank of solution. j t a MONDAY, MARCH J. '964 THE GOMDOLIERI r Sunday was his third Ja jam;; Church Drive Tops $35,000 Goal Mrs. Green Joins Loveland r Jump war civilian*tyl In*.,a but now crouched with lumln wide pos gp\:: arm to atabUiMIf the Venice United Church of vice far the Board of Homeland The congregation recently Faculty As Speech TeacherA you are planning drop 01IIIIk. Christ oversubscribed Its 135,- Ministries, who arrived engaged Frank Folsom Smith, Ins that drop. r.member" 000 building fund goal in a here last week from Buffalo, Sarasota architect, to develop Venice woman has come count, after you jump ? membership canvass Sunday, N. y. plans for the five and ona-half up with a solution to help pupil Civic one thousand; two one'flu/ Charlotte according to the pastor, Dr. E. Aiding Timm and Elam In acre building ait* in Venice of the Loveland School for W. and; three one thousand" ' Robert Chabl. the canvas were R. D. Clark Gardens purchased s o m e Retarded Children Improve Committees the chute: should Open, but Dr. Chabl Mid Sund.,'* vice chairman; Clark D. Adair, month. ago by the church. A their speech. Group It hasn't by the time 7011 Mg drive by a 33-member convass CoL John L. Ferguson Mrs. tentative master plan for the Mrs Gene L. (Fifi) Green ENGLEWOOD The West "six: : one thousand teal ht4 committee, headed by Herbert Edward R. Naar, Arthur H. building was shown to the congregation former speech therapist in the Charlotte County Civic Assn better break out the , C. Elam of Nokomis, raised to Payson Frank P. Reynolds, recently by Smith.A Milwaukee public schools, will standing commutes for 196 parachut Incidentally, ern:: $51,012 the total amount to far and Mrs. Charles F. Town special meeting of the congregation Join the faculty of the school on were announced by President w w your streamer shoots oge received or pledged for three has been called for a volunteer basis Charles E. Yale at this month' slow you down to about 5m ;year, beginning March 2. Monday evening. March 9, by Mrs. Green majored In meeting of the organization' .ph. Static line Jumpers ! The overall total include Million $ Month Adair, chairman of the Board speech at Marquette University board of directors last Friday a line attached that toe hare\ 7.294 in gifts designated for of Trustees, to take the nece.. where she received her Ph.D. nldht. muter flat( >in the Plane specific memorial or other Hit By TurnpikeThe ..,., step to proceed with the and did graduate work In The committees named are leave) can pull to make " purpoaei. Dr. Chable add building program. Th meetingwill speech at the University of Delegate to Federation ot DAVE'S DIATRIBE the diver doesn't form lUre Elam reported M calls yet to Florida turnpike report. follow the monthly church Wisconsin. She taught speech Civic Assn, Charles E. Yale, open his chut*. At least only" II be made and he anticipated ed today Its first million dol. family fellowship dinner at 8:30: therapy in the Milwaukee Fred Pfefferkorn, Robert Se. By DUFFY LEWIS the way w* understand It, B.! '1"" these calls "will increase the lar month since it first opened p.m. in the Venice Garden achools and public speaking in benmorgen; alternates, C. FHlffglnbotham was blowing out of the northwest last Sun- fore w* 'Jump we'll make sun- total subscriptions significant Its lanes to Florida toll traffic Recreation Center the adult education program of John Kimball. d.y.Guf SXnd took off cms-wind on th. paved road out for sure. ' In January the Milwaukee electric com. Recreation Council: Age Ski. out of the open There ly. 1937. one country and the three passengers J jumped| are 17 active members I', The fund drive directed The record period coveringthe ptny. olvlg. anvwa/ all much alive, healthy and napW In the Mission Valley was door They are very Sky Church Finance Advisory Ser 30 days of Jan 20 through Bill AngerIs A tireless civic worker, Mrs.Green Schools and Safety John L, though the 20 miles an hour (higher In gusts) wind dU in. er.' Club at present, with mTfor Dlr by Roy Timm, director of Feb. 18, was the first month has been affiliated with Graham, James padovanoSally urfara with soma of the later parachute Jumpers landing close more if you'r so incline fund drives and other Helm Prlscllla Gauguin, , the 2e5 mile many / long turnpike was and will learn the in full operation between Mi CandidateFor community projects. She I I. Mrs. James Padovano. to the ground target. That by Nathan is president of the sport. It 1* good clean rules of the? Swim ami and Wildwood.The president of the Venice Little Library: Age Sklolvlg. the way Is a big red cross on Mission Valley Sky Divers, his of doors and a fun reported cash Theater, a director of the Aso- Membership: John Kimball, canvas lying in an open field charming wife ("doesnt wonderful tn. Ins 70 tolls of agency$965243: charge account Relection 10 Theater at Sarasota and a C. F. Flees, James Padovano, manned by a Jump club memo jump") Marilyn is secretary.treasurer. Jump satlon,step they of say 4 and They 7 have , Water tolls of $48.257 and Just member of the Vena-Nokomia Ernest Thelin, Sam Splnosa,, ber who stands on whateverpoint It was she who briefed feet whtit under $85.300 in restaurant and I ENGLEWOOD H. H. (Bill) Woman's Club and the Venice Frank Scholl, Fred Pfeffer of the cross will give the. us on this, to us, unknownnew you practice*. Also Jumps wltwparachute AT service station lease revenues. Anger, commercial fisherman, Area College Club. korn, Gaud McMullen, Prts man hanging in the air the direction sport Bill DondanviUe I.I learn to roll with you ham j q said Monday he will seek re She came to Venice In 19S4 cilia Gauguin, Walter E. Hoi in wnlch to guide his vice-president of the club, both when the the punch Warm Mineral --.......... ........... election to the Charlotte Coun From Paris, France, where her comb, George Thompson. parachute toward a bullseye he and Nathan having over (0 meet you. earth The comes jumper up t k ty Commission from District 5. husband was an attorney with Publicity: William E. Herd. landing. jumps to their credit. They did ' I Elferdlnk's of Osprey < Anger, 49, 1* a native and the U. S. Department of State. man, James O'Brien It's fun to watch, an unexpected the free falls from two miles such a friendly, alert, InWgent Springs I[$100,000 Liquidation! Sale J lifelong resident of Englewoodand The Greens have three children Development Commies I Ion sight in the area and up. Take ;your binoculars with talked bunch. Some with who!* 1 II the owner and manager Mrs. Ronald Cyril of and Zoning: C, F, Pfefferkorn this greatest show offtheearths to the meet. Jim Bellar we are students st tin 12 Mlles South ef Venice UP TO 49%" OFF I of Anger' Boatways and Ma Miami; Jill, a Junior at the John KimbalL even free to the spectators. and Miss Grady have more of Manatee them Junior who had College Tnr? On US 41 rina. A Democrat, he was first University of Florida and Terry Water Resources and Conservation Only the Jumpers are chargeda than a score of jumps to their been i*., tililui i__ _; elected to the board in IBM and a Junior at Venice High : Frank Scholl, John fee to cover the expense of credit, Sunday being her 22nd. doing their military sane will seek his third term. School. Klmball. the Diane to lift them up there Those on the "static line" told us of the transition back la. 2tiC He has been the Charlotte Utilities: Sam Splnosa, C 'T, Into-the cold blue sky.: And who balled out this day were to a student boa.' after thru or County representative on the 'Flare, Al Duncan there are plenty of applicants,, Dave Hurkatt. Kurt Lewis Jim four years absence "To tin VENICE MOVIE LOG West Coast Inland Navigation Government and Public Services so that not all could be youngster we are all mlddi.. Pedigo, Joe and ka'3o Vargha John " GULF THEATRE TROPICAL District (WCIND) and 1* presently Nelson CandidateFor : Charles E. Yale, WalterE. the day we watch Greer Jr These have had less aged men they said. Our only sky dive . serving as vicechairmanof Holcomb, George Thomp. ed. This sky-diving appeals to than six jumps, with the exception witcUtt . outside of movies M1ADYevnis DRIVE-IN THEATRE the group. son. many more than you would or TV, ''u of Greer. He -Tee MIBLIN JONES', or The candidate said he feel Legislature Waterway and WCIND, think. In fact if it weren't for paratrooper in World War was II a Just before the armlstic n M..a that his past experience In dealing Beaches and Parks: Fred some physical handicaps, this where he made 20 for War One A balloon corps dp. a Jumps fMnw/.wrrWr."rdn r with the problem of the west Pfefferkorn, Bert Guthrie Age old kiwi would ask to take the Uncle tain friend took a couple slut "MOVI OVSR DARLING": ereYrN.bp end of Charlotte a. M. (Gus) Nelson of Sarasota Skiolvig Robert Seibenmorgen, jump. And it's not the Sam Some of them in w..a ... a-1I.4 Rw.ll.. County quail. age the hard Battle of the Bulge I (Continued ea page 11Contestant's ) ties him for re-election and has announced as a candidate Ernest Thelin, Ray Wolke. handicap either for Bernard TIandqtreww .."..fIt stated he has had many oppor- for the Republican nom Taxes and Budget: J. C. McFadden took his first Jump "OVIR A4n 1 m... I al" .r CA51.e5AN wheel.: : M nr with all phases of county gov- tepresentatlve from Sarasota Lane Frank McCook, Sally Everything is shipshape (sky- PledgeNot He of the County was one two Helm. ernment. shape) at the vast grounds of Anger will be opposed In his lepublicans in the House from Roads and Bridges: Walter Mission Valley Estates, east bid for re-election by Mrs. Sarasota County from 1980 to E.; Holcomb, Claude McMullen, ot Laurel. There is a roped off I To Cut Contest PricesIn 962. Dorothy Flowers his ex-wte, Ernest Thelin. area for the "pit" where the DINNER SPECIALS and James D. (Buck) White- Nelson was born In Illinois During the board session divers fold their chutes and get and graduated from West Pointin President Yale outlined the aker. Into the 1921. He served 27 year in activities of the Charlotte harness. That folding fairness to all contestants, I, the undersigned, upon the United States Army in all County Federation of Civic ot parachutes Is the all important entering as a contestant In The GONDOLIER'S $4,900 VG NewcomersGet from part of the Jump as you Subscription Contest hereby pledge not to accept sub grades second lieutenantto Assn. and reported Sklolvlg, of I[EARLY WYNN'SMarch I colonel retiring in 1948. In btanasot Key, had been elected can I.: tucked well Imagine into place Everything with the scrlptions at prices below those printed in this announcement WelcomedBrand World War II he commanded to the office of vice president of and on my receipt book. greatest care. There Is the . I new residents of Venice n Infantry regiment in the of the federation main parachute and then a Gardens are in for a warm tattle of the Bulge and receive It was the concensus of the mailer one for emergency, SIGNED .. .. ..,. ... ....... .... ,....... .. .......... 2nd 6th ed numerous United States and board that closer Ilasion should Contestant. from their' neighbor in welcome i just case, though that case foreign combat decoration He be maintained among the several in the residential community, should never occur when all iso Monday, March 2nd two miles south of Venice, under has ota been since a 1M9.resident of Sara- future civic associations in the well planned.For ADDRESS .. .. ... ... .... .... ...... ... .. ............ promoting thereby more Roast Sirloin of Beef a newly inaugurated program In addition to his service In the trip "upstairs" they au {jus of the Venice Gardens concentrated action for the welfare had S S2.75 a sleek Cessna 170 four the Florida House of Represenstives of the area.Vagrancy. Homeowners Assn. place plane piloted by skillful Nelson was a Sarasota Rules and Regulations ' The VGHA's Membership. pilot Fred Lovlngood, who had March 3rd County Commissioner from Tuesday, Welfare and Hospitality Com 95S to 1959. H* was Chairman Charge to be good (no pun) to take off Braised Rock Cornish Game Hen 52 85 mittee, headed by Charles Wor- ot the Sarasota County Commission and land in that stiff cross 1. No salaried employee of this newspaper or their Wild Rice, Current ,N't' ,. stall, has divided the subdivis- in 1951. In that year Against Wilson wind. For gauging the wind famllle or immediate families of firm furnishing prises Ion into eight; districts, each he the they drop a yellow wind are eligible to enter this contest. This doe not apply to was March 4th captain and I Republican candle Dale H. Wilson 18, of Flint . Wednesday, with a "precinct" dale! for Congress from the streamer when they get aloft correspondent several workers Mich., Is free on S100 bond on to show direction and speed. 1 Any reputable over 11 ef Broiled Corned Brisket of Beef Seventh District and was d*. person year age residing 52.75 Their will be to welcome a charge following I job feared by James A. Haley, vagrancy Pilot Bill Scott's young son In Southern Sarasota County, or near the county line In in New Cabbage, Partlay Potatoes newcomers to the community, Democrat, the present incvnv his apprehension by Police calls this a "wind screamer" adjoining county, U eligible to enter and compete for the! March answer the questions they will bent. Dispatcher George Wilkins to find the "darget"Sunday's prizes Thursday, 5th Inevitably ask and make sure early Monday morning.. Gus Nelson I I. the President sky divers were na. 3. Contestant are not confined to their town or com Breast of Chicken saute, Virginia they are properly oriented. Wilkins was called out to as- lives of far and lands. in $2.65 ot the Republican Party Lea- near munity getting subscriptions, but may take orders anywhere Captains heading up the gue which now has over 700 slat Patrolmen George Kinder They came from Pa 111., Ky., in the United States eight: districts are Mrs. Marorie and John Harris when the Mich, N. Y., Rhode Island and members In Sarasota 4. Vote credits issued County in = for subscriptions will be March 6th Williams, Area 1 Mrs. burglar alarm at Shrode's Friday ; even one each from West Germany He is Past-Chairman of the accordance with the schedule published in this issue, including Sroiled Sea Margaret Busby, Area 2; Miss Sarasota Jewelry store was tripped Hungary and England.The the first Deep Scallops County Republican week cash and vote coupon which will about $2.60 Anne Lothman, Area 3; Mrs.Clyde 3 a.m. from Executive Committee and la entry England was become a first period coupon minus extra cash one week On Toast Rasher of Bacon Area The In KammerT 4; Mrs. Michigan man, an apparent petite, attractive Michelle after now a precinct committeemanIn a contestant makes his or her first cash report. This Oven Braised Fresh Brisket of Beef CO Clarence Ktrsy> Area 5; that organization. Nelson attempt to avoid Kinder Grady the only lady of that coupon will decrease in value 23,000 votes every week, 75 Mrs. Eugene r "kman Area and Harris who were ** has been active in Republican guarding day who Jumped. Perhaps Itwas starting one week prior to the close of the first period German Potetoe Pancakes 8, Mrs. Hare 1 Jensen, Area the front of the store on West I because \ she Right politic since 1952. was lightestof is reserved to Issue extra votes t not to exceed the 7, and Mrs. Samuel Roth, Area Venice Av*., ran directly into the lot ( value of 20 each of INCLUDED IN THE ABOVE ENTREES 8. Nelson helped organize the the arms of Wilkins who was we've still to learn these coupons, also on extended subscription Sarasota Visiting Nurse Assoc the technical points) that the *. e Soup Baked Potatoes or French Fries ---- ation and was its first presi- approaching the back of the establishment wind carried her over the target 5. Votes are not transferable. One contestant cannot V(.",tablel! r1* ;"ur Salad New Speed Limit I dent. He has served as president According to Police Chief into another field, the withdraw In favor of another contestant or give subscrip of the West Point Society round crew racing after hero tions to another contestant. Contestants violating this rule t t' i Is a 't verage Dessert rest) In GardensLegal John Shockey, jeweler Don the Florida West Coast, the see that she got loose from are subject to disqualification HAVE YC '+EXT DINNER speed limit in V' i', ired Officers Club of Sara. entry Shrode and found said apparently no evidence noth-of her chute all right Collapsing 8. Any collusion on the part of contestants to nullify Gardens has been set at la and is now president of tog was missing. Later, however the chute once you've landed competition or any other combination formed in the d.tri at EARLY WYNN'S STEAK HOUSE miles per hour through the ef '!he Board of Trustees of the it was discovered an ate end done ;your somersault is a ment of this newspaper or contestants is forbidden. Contestants orts of the Venice Gardens Concordia Lutheran Church tempt had been made to enter neat trick in a high wind. Onecliver' taking part in such combination and violating tliil Homeowners Assn. Foundation He la a member the El Patio Hotel, next doorto chute didn't deflate unil rule are subject to disqualification at the discretion of the U.S. 41 4 MILES SOUTH OF VENICEFor Speed limit signs have been of that church. He Is also a Shrode's, by breaking e it had dragged him along management. erected along the subdivision's member of Sarasota Bay Post glass in the door the ground a bit. 7. All votes Issued to contestants may b* held In Reservations Call streets, along with stop signs No. 30, American Legion, and Ages of the club's: divers reserve and b* published discretion of this newt PHONE 488-2295 placed at important inlersecions. the Sunshine Post No. 3233, range from 17 to 41, with the paper. Published standings twW1'show only enough votes Veterans of Foreign Wars. He Gardeners youngest of all being Foxle to show the leaders for the prizes. Entertainment Wednesday thru Sunday Streets in the Gardens are has belonged to Mount Herman Sack whose age we didn't re- 8. The winners of the prizes will be decided by their I now patrolled periodically by Lodge No. 304 & Slate 2 Sessons cord. bale not being present earned vote credit, said credits represented by votes 1 issued heriff's. deputies to enforce lumbua., I his day to Jump. A special har- for cash subscription collection, extra votes for the new speed limit. : ENGLEWOOD In pr4>para. ness and parachute had to be turning them in at certain e and the free couponiclipped tion for their coming flowerNflffN made for o'int the toy fox terrier from this newspaper. t can win two of fNNIf I f INNIf1 NNHINffNNNIfNINNf fNNN.Nf IfIf11tf1ffNNffNfNff11Nf1i I how, the Lemon BayGarden diver. They sr he loves it and the prizes listed in this announcement. Club: has scheduled two meet- beg. to Sometimes go up. It's 9. Contestants in this contest are authorized representatives for this week. r yy ngs reported that he comes even of this newspaper but it I I. understood and The first will be the regular loser to the target than his agreed that they will be held responsible for all money Dine Out Often k'v monthly membership meeting human competitors, without collected and will remit such amount in full on regular : today at 10 a.m. at St.Javld's ends to pull the guide ropes. report days to the Contest Department. j, Episcopal Church, Yes, the divers have a rope 10. No statement v S : with the program featuring in each hand which or promise made by any representatives I. they can varying from the rules and statement appearinl v flower containers. The pull alternately to in this turn Ute newspaper will be I In it's fun FOR THE WHOLE FAMILY i iI'h S: fer speaker, owner will of be the Mrs Ceramicraft Jack Tel. chute In the direction they case of typographical or other recognized error by in the a rule publisher or oats' wish. It has two vents in the meet, it 'II understood that neither the contest managernor : Studio, located on New Point Ides to aid steering we pre. the publisher shall be held responsible except to make v v Comfort.; She will show a var. ume, though we forgot to ask. necessary corrections upon discovery of same e \ : lety of containers to illustrate We did ask about the free falls 11. To insure absolute . her discussion. ; fairness in awarding the prize Ira I The ot 3,000 feet that some of the hiVS t'it.wu'' be brought to a close under a sealed : second meeting will consist GRANT'S "SKILLET" SPECIAL experienced members took bee ?, n which the find 1 return will be placed and of ,I en all day clinic and fore opening their chutes. opened by a board of three impartial Judges st a liven .. workshop on flower arrangement Dropping) free is hour By a great sen- dolnW., no n. managercan : -n even the contest Carry Ont to be held on Thursday, Ration they say (and we can possibly know who the prize winners will be. Tim . DECKHOUSE March S, at the Englewood well imagine) for they float at precludes any possibility of favoritism and insures abs Savings and Loan Assn. The a speed between 120 to 230 }lute fairness : awarding the prim. The decision of *' BUCKET of.! V. leader for this workshop will miles per hour and can judges will final. RESTAURANT be i Mrs. Crawford T Bickford, : swim" in the air by holding 12. In event of a tie for any ot the prlz" s prllt a well-known judge at flower their and identical In arms bodies In cer. value will b. given each tying contestant NOW OPEN shows and herself an arranger. lain positions Some of these 13.; ALL CONTESTANTS will be paid $3.00 for esch " The morning session will beheld "free club during CIdcken .wheellng" Jumps were the first week vi activity Active contelt.ntl / from 10 to noon, and the started at about 12,000 feet. who do not Zin prizes will b. paid '10<> rcent cash comemissions ; DAYS A WEEKSalad afternoon session from 1 to 3. "And it was awful cold up on amount of cub collected for subscr.ptioniBont ! Members are requested to there down In the 30s first week. This commission will be paid when the ::1 7 ring their own materials and about froze my hands," Duffy close. It la distinctly understood. however, tllst t containers for the instruction Nathan said .n event any contestant to ..- becomes INACTIVE, falling 'f, $2 60 WHOLE 2>/ LB. Sandwich Lunches: of make the weekly cash reports he or she will at the discretionH.h ; a CHICKEN (110 Piece.) management, become disqualified and forfeit .U SPECIAL FAMILY DINNER MENU to a prize or WITH: I LB. FRENCH FRIES, I LB. COLE SLAW, 14. This commission. 1/2 DOZEN, HOT ROLLS newspaper guarantees fair and Impartial J 5 SI.1 50 treatment of aria contestants V1 but should question I all orders pocked In foil lined buckets J choice of Entrees the decision of the management will be any tlnal. ;. Phone Ahead your order will be ready S.rv.d.With Cole Slaw TOM SaladCocktail Small Sign' Service of the U. car If,the twenty first(.20 prat%!> percent winner will choose be deducted cash lntllad from l J : I I; PHONE 488-5075 Hour 4:30: to 6 p.m. the delivered price for advertising. 43 V! . 488-6690 abde8'h.I1vb.ec! a contestant each person agrees + : ;t \Ve T. GRANT CO. HIGHBALLS, MANHATTANS, MARTINIS MeAT above rules and condition HsheJ' list] '!,conte.t ""''el/ opens with the first t& 9 ,I' 1 RIALTO SHOPPING CENTER VENICE THE JETTIES a 48-Hour Service -- Joha/ J. Usto 2:, 1984. the C0nt"' 'it.. and continues until 10111PAGEFOU1 iI iZ I -- I Z 1i i I I 4U ------ION MARCH 2. ItM ' THE GONDOLIER I PA&EfV! 0ti tit Enter YOUR NAME >t. o'n'o a'en oek*o'e'o "' '' ,. In The GONDOLIER'S ( 1 t 0t" 4 5 0 0 IA M FREE 500 Subscription VOTE Contort COUPON- Good For $ S j Iy Ij I II S ( rip" Ion Contest,0, t hereby cast 500 500 FREE FREE CREDITS VOTES to the credit f; I a, of . ,)t And As Many of f Thus e Coupons As You Can Get Cut ADDRESS by .::::::::::::::::::::::::::::::::::::: < 1 0 f these 500 FREE This coupon when neatly clipped, with name a,4 ) Clip a. many COUPONS I as you can Oct from your own papers and "from your neighbor's papers-fill in !:'o and address of contestant, filled In, and return (.).\: ; , of who your name 1 and name persons gave YOU the and ed to The GONDOLIER count 900 Free Win one of the big coupons \\.n them In now They give you a start In the contest They help YOU win Credits toward winning the car andCAothNer 1I prizes I prlzls. or earn some EXTRA MONEY. You can't lase 51bscri lions turned In and prizes TURN IN AS MANY AS ' and new subscribers earn for P credited to you by C THEY ALL COUNT! (This coupon must be D. gnt money YOIi. Enter the contest today pres.l v voted on or before 8 p.m. March 20, 1964 o REPRESENT YOUR COMMUNITY-ENTER-START NOW bCasOOOOOoeDneOeDOOOpa r STILL WHILE YOU CAN (jET 500 FREE VOTE COUPONS CLOSES 1 OPEN FORENTRANTS Entrants Will Be Accepted This Week To Get OFFICIALLY ON Live Wire, Active Entrants From MAY 2 I oprOy.La.rtl, Nokomis, Venice, South Venice, Venice I Gardens, Venice I East, Englewood, No. Port Charlotte . FIRST Grand Capital Prize EXTRA PRIZE FOR ENTRANTS OUT OF VENICE ; $2482.50 FORD $500 U. S. SAVINGS BOND OR COST j OR COST IN CASHCustom DISTRICT PRIZE IF THE CHOOSES DISTRICT A BOND WINNER $500( BOND IT HILL BE DELIVERED BT Custom Door Six Cylinder Conventional Drive With Standard Shift, Seat Belts, Heater and Defroster, Oil Filter and Air Cleaner, Turn Signals, 2 Year 24,000 Mile For Entrants Residing Outside of City Limits Venice Nokomis Guarantee. Any Entrant Can Win This Priie of Venire OR ITS COST IN CASH .......... the Ford and 1500 In cash have been award. , After entrant from this district with the next 'I .::0:. i Bank :: :. vote totals) .-tR! be awarded the District \, ;::::::.i . Prlie No entrant can win two prizes ,,,,,' l :. J I --- 4 aN dhlY4OlitgIDIIt P v a , THIRD PRIZE , NEW 5259.95 DELUXE MUST BUY OWN LICENSE PLATES AND PAY STATE SALES TAX iit FRfGIDAIRE DISH WASHER To Be Supplied By and Be on Display At I IT'S PORTABLE BILL PHILLIPS FORD COMPANY THIS PRIZE CAN BE WON BY ANY "ft>9 most afordable/ fords In llorida" ENTRANT U.s. 41 SOUTH VENICE. FLORIDA 488-6787 Supplied By and on Display at VENICE ELECTRIC APPLIANCEAUTHORIZED i SECOND PRIZE j SALES AND SERVICE j I3J W, VENICE AVE., VENICE PHONE 488.2834 i I II $500 CASHAny , I FOURTH PRIZE Entrant Can Win This Prize -- NEW $209.95$ 6300 btu/hr. 115-Y Room G.E. , HOW TO ENTERThe Judges Feature Of Contest _- AIR CONDITIONER! ) first step in order ta become a contestant and In order to make fairness a feature of this content, a .,,,, THIS PRIZE CAN BE WON BY ANY compete for a prize, is to clip the nominating or entry committee of local business men will be selected with coupon appearing In this announcement, fill in your name approval of t the contestants, to act as advisors and official ENTRANT addres *ncj mail it to the Campaign Manager of Judges. In this way each contestant who enters can be ThinG. GONDOLIER Venice. Fla This coupon entitles you, assured of fairness The official Judges will check the and or the person whom you might nominate' to 8,000 ENTRY records and make the final count and award the prizes Supplied By on Display at votes These totes are given ai a starter, and speed you when the contest comes to a close MAY 2. 011*")1 your be way to win. Only one such nomination entered. coupon Do not hesitate to enter You cannot lose, and you will VENICE VENICE STORE HOURS accepted from each contestant be receipted for all your votes and cash turned In. The early start is the thing that counts Come to The GONDOLIER SHOPPING MONDAY TO SATURDAY j office today and talk the proposition over with the ' contest manager. CENTER 0 it 9 A.M. TO 5 P.M. HOW TO WIN PHONE SARASOTA DRA tNtON FRIDAY The first step If to let The GONDOLIER contest man How Prizes Will Be Awarded 488..943 9 A.M. TO 9 P.M. seer know that you want to become a contestant Either clip the ENTRY BLANK below or phone 488-3341 and ask Entrants under the rules can win prizes as follows: for a fret outfit, consisting of an official receipt working The person entering from Southern Sarasota Countyor , ***. sample: copies of the paper and other. informationfelaUv6 near the county line In an adjoining county who secures - to launching an active campaign.tiVoThus the largest vote total by any or all\ of the method FIRST WEEK equipped you have to go to your friends, rely published In this announcement will\ be awarded the NEW ENTRY BLANK neighborstheir thisand havt them lub- 1964 FORD two-door sedan or cost The winner pays Woe subscription to through nothing extra but must buy own license and pay the Cash and Vote CouponGOOD 7u. Should you fall to get subscriptions or If you .e1d'en5 ittt tales tax GOOD FOR 5,000 ENTRY VOTES " BE to fiveS SURE to contact FOR ask every person you The entrant finishing with the second! largest vote aen4 you the Boo FREE VOTE COUPONS from his copyX the paper THAT'S ALL THERE IS TO IT except total will\ be awarded the $500.00 CASH PRIZE $3.00 Cash and 100,000 Extra Votes The William GONDOLIER Lancaster, Contest Manger, ; ' t an early start will give you an opportunity to get the After the Ford and 500 prizes are awarded, the entrant This Coupon when accompanied by. 530 worth of subsrrtp Venice Fla Mast volts for what dot; also the chance to set your residing out i 'ilk nf the city limit of Venice with you ends before someoneelse sees them. the next largest vote total will be awarded the $300 U.S. If lions returned Is WORTH In the FIRST S3.CO CASH WEEK and after 100,000 entering EXTRA the contest VOTES Date. ., .. .. ......._. 1884 . i Ia get The biggest step toward winning the biggest prise the la SAVINGS BOND or its cost No....... ... Subscriptions at f 5.00 .... $... ......... Plea, enter the person whole name appears below lint started early and do:ta: BEST WORK who during else l is After the $900 Savings Bond In awarded to some entrant No.....,.,.. !Subscriptions! at 110.011 .. ... S ........ In the $4.1100 CONTEST and send full detaUI: I week entered Instead to see out of Venice. the entrant with the next largest vote .......................................... going to enter. More votes and more cash can be earned! total! will I he awarded the NEW *29.95 FRIGIDAIRE: No.. ..... .. !Subscriptions! at 114.00 .. S ... .. ... Miss, Mr.. MI'I. time.during In your FIRST WEEK OF ENTRY than at any other MOBILE DELUXE DISH WASHER: TOTAL .. ..... .. ... ..... ............ $3000 Street No or Route ...................................... fact wt pay you to get started toward wlnnlo'ring ......... .. . .... ... .. the first week you are entered, we will pay you The entrant having the next largest/ vote total will be Deduct $3.00 cash 100 Town ................. ....... .. .. .. Phone No........... WM CASH and give 100000 EXTRA VOTES for each awarded the NEW $20993 GENERAL ELECTRIC AIR ... ....... ..... TURN IN at contest office 2700 ? worth of ub cf'Ptton' turned In at the contestVotes CONDITIONERALL AI... ...... ... Do you have access to a e.r'......... ettic issued a declining basis WHO ENTER AND DO NOT WIN PRIZES will Contestants Name .. .................................... Occupation ............................................... '. The' contest la for divided subscriptions Into four are periods on Subscriptions be amount paid of!tin money percent turned(lu, i into C.1ti!their$ COMMISSION credit for new on and the Address .... ....... ......... ...... ............... Resident of .. .... .... .. ............. Town-Elistriet a ""cllft during the first period tarn four times aa many renewal subscriptions to The GONDOLIER. (Set Rule NOTE No limit to the number of these coupons a contestant NOTE: You can enter your name er that 0' a friend. Only I j I . ::-' as In the final ptrlod (See schedule of votes In No 13)). can use the first week after enteringI .OOO entry votes wiD be credited I . .-! Announcement), J 8, ' J1 ,-l;: tl I WOKDKT, KWKCH 2, '&4 PAGEStX THE GONDOLIER, ? - r And Suddenly It's Spring AN. THE PEOPLE f : 1 .Ft ty *' + qMl jMl( b / SPEAK l j glS i - To The Editor: pictures, except those bought ITEMBEll Of TUB ASSOCIATED PKIOM: MEMBFR OF Trig: FLORIDA PRESS ASSOCIATION from Woody Thayer, as well Mr. Morgan Luck Is out of as editing all the copy, laying " Tho A.e4Nd Aar 10 .IaoI..1F ..tltIM Ie w fee p.....bl.......... ." an g..'_ dl.pntehr Sts ills,. bIS line when he asks: "Just who out ads, making up the dummy r ram oth.l md.W. la this p.p..M aIM IoeaI publlsb" .b.rw AU rl.h. of l'OPubU..Ilo.at do the Venice teenagers think and 1v 1 tF la )1f i .p.enl ......." ... aloo _.. the voters ) doing the page layout aq ? We are they are assigning all 1 head , writing, Tho m. .,d lr.l .dr.t.k..tw.t at Ible .ew.p.pr 10 ..rrtahird, end .Its rrpubHritlon b .>. of tomorrow, but we are still of gr ..._ .. stories and covering many r pr..ly I ''''''"Id. n..pt by .m..Iota. . young: enough to enjoy ourselves them, helping in the back shop PnblliM. Tm "......., sad ", ......., From 11M4 B. Miami AmitM and handling all the duties that '" Also, if we are not allowed to fall to a publisher, it FAt A. Bond Ctu> Mitter Al Port Offlm At recta Florid normally use the PUBLIC beach, just got to be too much for me. EDWARD D. BALL Editor and Publisher what are we supposed to use? Many times I simply couldn'tget Just who does Mr. Morgan the last picture finished I. COURTNEY WILLIS Executive Editor he Luck think isT quite' in time to put them on SAM DILLON News and Newsphoto Editor BETTY KELLY, the II a.m. Wednesday bus and ROGER KILBY Mechanical Superintendent Senior, Venice High School. had to chase it to Sarasota at 60 to 80 miles an hour. Even ft (EDITOR'S NOTE: (a) SUBSCRIPTION RATES In county, $5.25 per year, $3 25 per six months, $2.75 Morgan Luck Is a she, not a though I kept a cot in my of. fice to drop onto when I had to per three months, 10 cents per copy. Out of county, $6.25 per year, $4.25 he. She's the wife of Dr. work late I often was unableto Luther Luck. (b) Read Mrs. , per six months, $3 per three months. Luck's tongue-in-cheek letter use it after those frantic dt M r' again; she took your chases and had to start right side (c) Go right ahead and back to work when I returned. beach It's official. The only thing that kept me use the ) I The Little TheatreI going on such days was the \\\\4\\\1IIfm4e )breakfasts that this same Mar f. I To The Editor garet Curwood so thoughtfully brought in and put on my desk I Venice Little Theatre h" |lust a small space. They were effectively I enjoyed your recent editor. while I shaved, and the know. concluded I memorable four-night run of answered with a performance long to be sal about" "Margaret's Mon. ledge thtat everyone on the r a< i\ PitJ& pier, more formally your staff was putting equal effort "The Diary of Anne Frank." remembered.It Model K-150 dual-screen Klis- into our attempt to give Venice . proved that there is sufficient ama chograph electronic engraver, a good newspaper. Still, it ? It of superb actIng was a masterpiece and the trouble had with it teur talent of high calibre hereabouts and you finally became evident in 1959 tilled direction end artful set con audiences which besides recently I think, however, thatI that this bus-chasing methodof appreciate something had better set the record handling pictures couldn't struction. Many who have teen the >Kowperformed" the so-called sophisticated plays straight with reference to your continue and I began to look by professionals acclaimed filled with sex, bilge and billingsgate. comment that there was a into what was then available in ky k around the that rumor shop the electronic engraving field. VLT'i amateur production II equally as Even Broadway has proved this. "Soundof this German-made machinewas To shorten what has already better Music" and "The Music Man "liberated" in World War in , good some respects. among become too I decided Two. long a story, due to the fact that parenti There were some who felt the locals others, have been smash hits without usingone against a Scanagraver or- come to pick up the students had taken on more than they could handle cuss word or over exploitation of set As you so aptly put it, because of a rather fantastic and they pick them up in dd. there is no truth to the rumor mixup involving the key to the School with such t difficult production in such and the biological. furthermore, I have reason to men's washroom at the new High How ferent of places traffic., disrupting Bill Krueger tilt, feel much affection for this Fairchild plant on Long IslandI Jeff Kunkle and machine and as those who ( won't go into that now) and have been, out Gent Ii Hootenannies read the GONDOLIER duringthe chose the Klischograph It had Eddy policmt Legalized the traffic the with object 01 15 I owned it will tell I years been put on the market in Ger NewsBy the traffic out getting as quick.ly you, I don't lightly pass off many after the American ma. I If the Venice City Council were to a hootenanny fan or not. At least it'i a even humorous remarks that chine made its debut and had ] and as smoothly as posubli r to facilitate the busses' exit. run for reelection today, and teenagers wholesome way for the kids to work off reflect on either people OR the advantage of being able to DIANE LEMIART and GENE EDDY' -.0- things I adhere to. This includ several of engrave on types could rote, it would win by a landslide. some of their excess energy. es machinery, which after all, easily obtainable flat plastic Well, things are fine now, and almost back to normal. Excuse us please: The Ker. And if don't at the is but reflection of man's intelligence said that they ette induction was held Feb 27, you get enough a and on zinc, lead copper and Thursday, Feb. 20, eight teachers called in and Council gained the favor of young. and ingenuity and is record of some kind, but not instead of the previous beach, there's a fine program put on several other materials, including couldn't teach that day. This a start, and a lot of oldsters as well, last each Monday night from 7 to 8.30 at progress. I don't mean that I old X-ray films The the type that makes a principal's heart pound with joy. A solution Thursday several complaints night. We and received wish to I took offense to the editorial. members of the Future American machine used onlya was found, though, and two of the j weed<< by squelching a rhubarb over wHeth. the high school. The Monday evening It's just that since the questionof plastic material sold by the Teachers of America were called on to teach to help fill out the apologize for any inconvem- er the beach pavilion could be used for musical, organized by David Corbett of where I got this machine, engraver's maker. This par. teaching roster not completelyfilled ence we may have caused any. etc. has been raised I of their high-school years. body. figureI'd Sunday afternoon music>ma ing by the the school faculty, is sponsored by the ticular Klischograph was purchased by available substitutes. better it and answer once in August, 1959, from Anne MacDonald took over - younger set. Keyette Club with members of the Folk for all. the Tribune of Kokomo, Ind, Mrs. Dunn's classes, French The school newspaper was Go ahead and enjoy yourselves, council Singing Club contributing their talents.In To first lay that "war liheraLion" which in turn had bought it and art. Diane Lenhart subbedfor out Thursday and included in Dave's Diatribe said in effect, that's what the beach this time of rising concern over rumor to rest, let it be eight! months earlier The publisher Miss Piercy, the girls'] phys. the issue was a follow-up of noted that no electronic en. there told me it did high ed instructor. The students' the editorial published in our (is for. juvenile delinquency, we can stand more gravers had been Invented quality work, but that anothernew cooperation with the student last edition. The editorial expressed (Continued from pare 4)) It was a wise decision, whether you're of this kind of thing, not less. or at least developed to the invention, the Swiss El. teachers and their behavior in concern about the emphasis test pilots from the First Ait point of practical use in grama, would handle a plate those classes showed an excel. placed on sports rather Base, at ColombeylesBelleiFrance Germany or anywhere else up twice as large and that this lent example of the caliber of than scholarship, and the up to an observation . What Others to the time the war ended and capacity was needed by a people we have at the High recognition given the "foot balloon post at the lines. Wed Say. for some years later. As you daily. Since a new Klischo School. ball hero" in comparison always wanted to go up in not may remember, engineers graph then cost $12,000 and this with that given the student of the things instead of shooting there and elsewhere were oc one was offered to at me just with an exceptionally high at it. The problem presented by increasing a source of crucial within with Class started sellIng unemployment cupied other, less peaceful over $3,000 I considered it a The Senior scholastic standing. This, of automation wW- machine: of an aU that industry. But the telephone companiesnow matters during this period. In bargain despite its eight tickets last Monday, Feb. course, aroused much controversy The big its"sausage"cable was then tat- at a fact it until 24 to their annual play that is ging up was not 1948 that , months of The fact thatit most incredible adaptability replace the employ more people than ever be the first of these devices became has not required use. thana to be held at the Venice Little with both students and prettily, and it was our turn human hand and' do with for. more faculty. The Tomahawk is Interested next time up. That turn didnt many jobs a vast a reality and it was a half dozen service visits from Theatre Wednesday through in any views and wel !instead increase in efficiency and economy Automation, modern style, will create former American war contraCt Klischograph mechanics in the Saturday, March 4-7. The cast comes any and all letters that come. and Two started Fokkers diving came tnl tor, Fairchild and Aviation for the "Mouse That Roared"has confroafc tU Unfed States, 'and is a problems. It will demand difficult read Corp. of Engine Hagerstown, last five years and is turning been devoting three nightsa any individual may care to shooting incendiaries at the out first class engravings for source of concern: to industry labor wo- justments. There is not the slightest doubtof Md, that developed and you, when you have first class week to rehearsal, and things write on the, issue.Concerned concerning, their, views gas bag. Then as the winch began Sons and government at aJ levels. flwrf. But the chances are that, in the marketed it under the name photos, is indication I was are really humming in the costume to haul the balloon down, alt hell loose from the .0- broke The and "Scanagraver. derived departments. Without minimizing then problem 3rs long run, it will' make more jobs, higher- name right, and I still feel a sense props four anti aircraft batteries I : from the fact that its of wonder when I see it speed. In charge of costumes are Pam with the essential' that we take a loot i: at a 'W paid jobs and contribute to a higher electric eye "scanned" photos ily punch out engravings and Lee and Mary Boone. These traffic problem on the school around. AJ the two observers as they revolved before it ona girls have their work cut out grounds after dismissal, the jumped and their chutes opened facts and drew tome conch'-'onl bated. standard of living and working for us all. think of all the intricate, labor. t drum and with a heated sty ous work with lights and for them, for they are responsible Student Council has been busy they were in a cloud , on then facts rather than $4... frightened To deliberately delay the progress of lus punched out an engraved chemicals, whirlers and pad. for making costumes for with plans to correct this situation white shrapnel smoke. Toe> emotional! reaction expressed by some automation would be somewhat similar to replica on a plastic sheet revolving dlers, that was necessary some 30 actors who have to be Already having painted enemy planes got away, cur t another dressed in clothes of the Medieval yellow in men got away, the beg f* segments} of ow population.The seeing every American destroying his automobile on drum. Of under the old zing engraving stripes the senior parochial interest is the fact and Modem times as parking lot the SC plans to away (with some bolesmend .It American Economic Foundation and buying a horse and buggyto that the Sarasota Herald-Tri system.' But more important was the well. Mr. Mahar, the director, follow through with the Issuingof ) and we didn't get ow says that: ". automation does not un- take its place. Automatic machines can bune was one of the first pa. fact that with it we had, for says that, all things considered, parking permits to students employ labor, it redeploys labor" Ac.eerd'ing produce Wit than human beings can, pers in the nation to install a the first time, complete control he is pleased with the way that drive cars. In their last ride.The Scanagraver, just as the GON of every step needed in things are going, and predicts meeting it was brought oyt by New York World's Wr to accepted estimates, it goes thus lowering the cost of each Item pro DOLIER was the first paper in producing Venice's newspaper. a very funny play. We wish Charles Winters, head of the of 1964 marks the 300th w* en, 18 million jobs were eliminated bymachines duced. For instance, consider what the Florida to install a K-150 Klis- Instead of having a picture the senior class good luck in Traffic Committee, that a ma. vrrsary of the use of the ail in the 195040 period. Yet, in cosf of a handmade automobile would be chograph some 11 years later. deadline two days before the their last fund-raising venture jor part of the congestion is name I960' there were 7 million more jobs then compered with+ the price tag on modem The out year was the the Scanagravercame same year our weekly Hoe issue rotary began press rolling(and the off w -- t there. heel been in 1950. So, automationnotwithstanding mats produced vehicles." Automation that I became owner of the GONDOLIER is still one of the SEE THE 1964 VENICEPARADE 25 million jobs wereueafed has made this possible. GONDOLIER. As a former few weeklies in the south with OWl news picture caption desk Us own rotary, by the way), that The of automation will . 10 during year period. progress perhaps chief and a former Milwaukee we could provide photo cover. after all said and done be for the Journal assistant picture edi- AanVxnetioH, is an agonizing experience age right up to press time Is not new. ft ;is simply an advanced stage nation but the end result seems to tor, nothing would have pleased when need be. It was tile final OF HOMES me more than to have been tl the hduttrUI' revolution that began justify the agonizing transition period. It able to install such a machinefor step DOLIER toward self-sufficient making the GON not i over a century ago with the introduction wit be da. building a new highway. One the GONDOLIER. But Ven only as a weekly, but mechanl. el &e fin workable And ice had only a handful of residents cally able without major steam engine. any must put up with several I months of rough, then and the staff of the additions, to publish semiweekly . here. are many specific examples where paper consisted of myself bumpy dusty driving while construction my as you now are doing, mechanization has made room for many wife and one printer, Howard and tri-weekly or even daily as snore workers than it has eliminated. For Is enderwey 'in order to later enjoy a Briley, and even at that it was seems probable in the fairly example, ft was widely feared that intro smooth, safe road. tough paying meeting for the the supplies payroll and we near saved future.me personally Also it probably from a p" clucfe of the dial telephone wovld be -Naples, (Fla) Daily Newt HAD to have. So not only wasa breakdown. The 6 , Scanagraver out of the ques "Monster" Indeed. No other tion, but we couldn't af ; Southern even machine in your shop does so , ford running water In the photo much for the and ' IWl appearance n Library ColumnBy darkroom polite languagefor appeal of your paper and has t4 Models Belle ' a broom closet under the needed so little maintenance stairs with a blanket over the attention in return I suggestyou door and had to do all news rename it "Margaret'sMarvel" .. picture processing at night out and bow down beforeit Y B. LARZ NEWTON Here are some quotations we have enjoyed of buckets carried In from the at least once before every The The' The Editor, FRIENDS OF THE LIBRARY and noted in our own BARTLETT rear issue. It has certainly been one THERE IS NO LOVE LOST BETWEENUS Blessed is he who expects nothing for We WERE fortunate In that of your most faithful mechanical Maljbu t a time The Herald made j' friends, just as it was mine. " is a familiar quotation you will find in for he shall not be disappointed. many of our engravings on its Bleu gu@ DON QUIXOTE, in an Oliver Goldsmith -Alexander Pope.It machine through the invari PETE CONOVER, e able courtesy of Dave Lindsay Former PublisheJl.P.S.Congratulations . play, in the Correspondence of David is better to live right than to who had just become publisherof on /the n Garrick who was the life-long friend of die, rich.-Samuel Johnson.It the paper his father had Ludlow. It was the one machine The Dr. Samuel Johnson, and in a play by started after World War One I wanted and didn't get is much easier to be critical I ( As Venice and our picture coverage around to buying. Another step Cardinal j Henry Fielding who wrote TOM JONES. than to be correct.-Disraeli. grew, though, the load forward. The 'e Clifton Fadiman: Today's Quotation is became too large to ask Daveto (EDITOR'S NOTE: The 6II I not and other am a politician my staf'fIF@ Tomorrow's Cliche. continue handling it for us. above Is acknowledged with THE ONLY THING WE HAVE TO habits are good.-Artemus Ward. So for almost 10 years '. deep appreciation. From now 4: People ask for criticism but they even after we had put up our on The Monster Is Marga , FEAR IS FEAR ITSELF. Of course Franklin own newspaper building with ret's Marvel but we reserve 1'I Delano Roosevelt! But in John Bartlett'l only want praise complete darkroom facilities, the right to refrain from I I FAMILIAR will discover -W. Somerset Maugham.. INCLUDING RUNNING WATER bowing down before graven ?QUOTATIONS you all of our pictures had Images). .- that Thoreau wrote: Nothing Is So We are interested in others when to be made up two days before Much To Be Feared As Fear. they are Interested in us.-Publiut. press time and sent to St. Pete ' In your Free Public Library you will We have all sufficient strength to to by be bus converted, marked for into cut zinc sizes en, Elferdlnk' of Osprey OPEN FOR YOUR INSPECTION AT derive fun and enlightenment from BART. endure the misfortunes of others gravings. I$10 ,OOO Liquidation Sale] LETT. On the same reference shelf art -Rochefoucauld. This worked well enough fora t i the OXFORD DICTIONARY OF QUOTA. Nothing succeeds like success since long I was time.personally But gradually taking,, UP TO 49% OFF EAST GATE ON E. VENICE AVE. TIONS and others -Alexander Dumas processing and printing ail the -"' "M_' M" ,.' ''' '','.._ ._ ",. ._, ...._ ....J 9 * 4 f -- PAS ey4,! MARCH I, 1964 G ON D OCI E R r nyintadeish I TV Star, Writer Will Narrate I Botanist SpeaksAt Tanned And Healthy Lady Golfers TalksjTampaMeet Caribbean Film Here ThursdayTelevision I star Col. John D won an Academy Award for Garden Club In Schedules ! Craig, three-time nominee for his underwater photography Include Social Events t Emmy awards for his ABC adventure "Over and Under the Caribbean" Miss Carol H. Beck of Se- I Oetj program, will be in bring, a botanist with Florida I . prize.winnlng Venice Thursday starts in Florida and That beautifully tanned woman . to narrate his - Mac- Park Services and Highlands r. .r- framabst Archibald covers the Dry Tortugas, downtown late yesterday w. saw j film, "Over and Under the Hammock State Park, will be you ,.. "r.7.ddres. theFestival Caribbean." Grand Caymen, Haiti, the afternoon the one you f The Virgin Islands and Bimini. guest speaker at the meetingof remarked looked so healthy I.. Florida travelogue will" 1 be at Venice Garden Club Thursday 1 University of South Flor. Gulf was probably one_of the 64. Theater : and Sat- at 8 p.m. It Is at 10 a m. at Venice-No- enthusiastic n Friday The 64 are the ' III Tampa the fifth In the Lyceum Fund Loomis Methodist Church fellowship , series sponsored by Optimist Country Store hall. members of the Lake VeniceWomen' ( /will fly in from his British win-" Club of Roberts Bay. Miss Beck will give an Illustrated Golf Assn. and certainly - : in Antigua Craig is also author it was late afternoon you I home of talk on "Wild Flowersof d Indies to participate He "Danger Is My Business," a Attracts 700More Florida." saw her since they, for a fact, 1 make a talk and read from at Literary Guild book of the Hostesses for the day will" be were at the golf course duringthe ,orki Friday at 8 p.m. month selection. He also has than 700 persons attended Mesdames Ik W. Moomaw, early afternoon, whateverthe Free University Theatre Venice-Nokomis Woman' William Morgan, Alexander day. public may be The club Is one which Is larg- ,ell for the Club one-day "Country Murphy, Everett Noland and theatre box of- Esthers Of Venice except on the the ely unpubliclzed at ' awed Store" bazaar Wednesday at M, B. Paschal, chairman. f" during the afternoons, the sports pages although they club house and the stock Will Meet At social ,i today through Friday.iicleish Home was cleaned out before closing have several large '! has won both the Of Mrs. Floyd Neil time, Mrs Donald Stevenson, NARCE Meet events during the year and v "1w,. to- In uer and Pulitzer prizes chairman, said. plan to have monthly get- tf ,"-r end his play "3. B." Mrs Floyd Neil of Sunrise She was assisted by Mrs. gethers from now on. . two Tcny awards for the Drive, Nokomis, will be hostessto Walter Wolf as co-chairman. Called At PC Mrs. Emma Manning Is the ',play and best direction in the Esthete of Venice at a Afternoon hostesses were Mrs president, the fifth In the present ; social meeting at her home Lewis Hester, president, Mrs. District Leader Emerson club's six year history, 1{graduate of Yale, he holds Wednesday at 12:30 p.m. J. T. Blalock Mrs. Carl Hamilton Johnson has called a meetingof She was preceded by Mrs. ::0'ary degrees from many Assisting her will be Mesdames Mrs Arthur Laughlin and Retired Federal Civil Service James McPherron. Prior to ,tee, including Harvard, Ralph Anderson, Fred Mrs, Charles B Richmond. Employee at Port Charlotte their tours of duty, Mrs Guy t ,mbia and Dartmouth. Borden and James Nixon. ---- _--- Thursday. The meeting will be Sipe, no longer here, was the at the Port Charlotte Civic first president. Mrs. Edward Party To Mark\ Assn. building on South Easy Buford was president in In epublican Women Install Street I 1960 and Mrs A. A. Urankar 7th AnniversaryOf The District includes all retirees filled the office for two termsin from Federal Civil Service 1961-62. R New Officers Wednesday from Bradenton to Fort Mrs McPherron was first 1 wit Safety ClubA Myers and including Bradenton president of the Venice Ladies ' or officers of the Venice. safety. Sarasota, Englewood, Ven- Golf Club, parent organization, i 1st" .axis Republican Women's. Installing officer will be Mrs. theater party for elemen- ice, Port Charlotte and Fort which was formed at Venice : tary pupils of the South Coun- Country Club, no longer in ex- will be installed at a Carl L. Hamilton retiring Myers Several officials of the !i> will istence in 1955. When the Lake the 10 p m. luncheon meeting president of the club. ty mark seventh anniversary State Federation of NARCE , of the Sheriffs Safety officer Venice Coif course was com- at the Deckhouse, and a national are expected Inesday Center Club. to attend. The meeting pleted in 1959 the club moved 'pan it. Margaret Busbey heads Kas-Mo Fla. Club Sheriff Ross Boyer and will begin about 1:30: p.m. there and changed its name 1964 elite of officers as Deputy C. N. (Cap) Stevens A covered dish luncheon will and format. Other new officers will be hosts for the party be served at noon. Members, according to Mrs. start Elects OfficersPORT Urankar are so in love with t , which is Mrs Harry J Barker, vice expected to attract the that they would be about 600 game ,dent Mrs. William C. youngsters second; vice president; CHARLOTTE The Announcement of the actual Jaycees Schedule on the course morning, noon .e s.,liuiam Rudolph record- Kansas-Missouri Florida Clubof date of the Safety Club party' Talent Audition if and they night could., fair She weather is one or foul of a, FOUR PRESIDENTS of Lake Venice Mrs. Emma Manning, right, Is the Ineum.Women's j : secretary; Mrs. Robert B. Port Charlotte-North Port will be made through the trio known in golf circles as Golf Assn., organized in 1959, who bent top officer They are, left to right Mrs. wedge, corresponding secrev Charlotte elected officers at its schools Auditions for the Venice Jaycee the "Three Musketeers" (with are still here posed for a picture this week Buford ((1960)), Mrs. A. A, Urankar ((1961-62), 1 in the Civic Additional treats will be In series of afternoon and Mrs, Kirkwood Tisch- February meeting Sunday Mrs. Olive Arnell and Mrs at the Lake Venice course, The first prestMrs.. James McPherson (1963) and Mrs Man- Center. store for the kids, with the talent contests will be held at treasurer, here Mrs. is longer in Venice ding. (GONDOLIER PHOTO by Sam Dillon) ) dent Guy Sipe no Danny Major, no longer , ,jest speaker will be H. L. The new officers are M. E First National Bank of Venice 7:30: p,m. Thursday, March 5, whatever former chairman of Streckenfiner, president; contributing "K now Your at Teen Haven youth center. who played the course , ;ann heldat the obstacles when the week the rest of the time will sponsor monthly covered to Mrs Urankar. There are a National Safety Council Claude E, Kean, first vice Presidents" and "Outer SpaceDialOMeters The contests are being a , expert in drivingES president; Dr. Abner Quin, second ." The dials are 2 p.m, every Sunday through back nine was being redone. being used for homework and dish suppers, after a mixed few in their 70's who play with : an vice president; Muss Fran constructed so that informationis April. Proceeds will go to the "The only thing that keepsme other activities best ball foursome event during the group, and play well, she cis M. Hill, cochairman for revealed in cutouts when Loveland School for Retarded away at all," she said, "is Mrs. McPherron is considered the afternoon. said.Members u Meets Thursday North Port Charlotte; Mrs several arrows are lined up. Children the fact that my husband is the best of the players, Mrs. "Some of the women hope report the courseis ",pier 248, Order of the Violet A. Sansone, secretary; Radio station WAMR, in cooperation At least 20 more entrants are not a golfer and" baa a penchant Urankar said Her handicap is this will interest their husbandsin becoming more and more ,tern Star will meet Thurs- and Mrs Viola Lessard, treas with the Safety Club, being sought for the final series for eating. 13 and several other membersare the game. Certainly it is a crowded each year and whereas " iii at the Masonic urer. will salute the youngsters by of contests. Persons Inter. According to friends, he eats running close to that. Those wonderful way to enjoy each they could get around the p.m. ,pie on East Venice Ave. The next meeting will be tomorrow donating colorful red, white ested in auditioning may call well, for Mrs. Urankar is famous who have a handicap of 24 or other's company with the course in 1960-61 in two and isituig! OES members are at the Port Charlotte and blue caps which will be 488.2589 or 488.2773 if unableto for her cooking. She restricts less are eligible to.play with families present," Mrs Urank- one-half hours now it takes almost . ltd. Civic Center at 7:30: p.m. given out at the theater party, attend the Thursday tryouts her playing to four days the Mid.Gulf Women's Golf ar said. five. I Assn. and 10 of the Lake Ven- The social schedule really Mrs. Manning Is assisted ice members are in the other began when Mrs. Urankar was with her club duties this year I I f HS SERVICE CLUB KEYETTES INDUCTS SEVEN NEW MEMBERS I association. The rest are working president. During her term of by Mrs. Ethel Bickel, vice- hard to become eligible. office covered dish suppers president; Mrs. Jack Sebastian I Once a year the club is host and "toddlers and teen's day" secretary and Mrs Cecil I arerih Are Present > ess to the Mid-Gulf Assn madeup were initiated (with teen foursomes Reichard, treasurer. Committee i1 of women golfers from Sun hunt for tots a ball the I heads are. Mrs. Beatrice t Formal Service City to Lake Venice. Also yearly and a weiner roast) and other Stewart, Mrs. Frank Belghey a large invitational tournament events scheduled to include Mrs John Geiglev, Mrs Harold . tires! members of Venice :t1 Is held with several other husbands and children Naegele: and Mrs. Harold i School sophomore class clubs invited. After 18 holes "When we get together In Beake. Sire members of the Key. are played, prizes are awardedat cocktail and evening for -i in formal induction servo a luncheon held in one of the gowns The group has one honorary don't know each parties we life member Mrs Frankye i it the community room of local restaurants. other we are so used to seeIng - - Powell who was organizer of it Federal Savings and t For the members, there is a and in slacks, being seen ,9 Assn. Thursday evening. 4 r' fir Hallowe'en event when the original club of 22 members ee yearly skirts and shorts," Mrs. Ur I . '"he girls, chosen for leader. members play in costume, anda ankar said.Weekly . qualifications and scholas- Christmas luncheon at which ] tournaments with" Handing, are Misses Bev club prizes are awarded. , toll, Louella Kirby Pam Beginning Sunday the group prizes members for the winners serving and as hostesses certain .1 EUerdink'a of Osprey |fie, Janie Ridlon, Liz are held in the 18.hole ( ' fft, Nancy Taylor and $100,000 Liquidation Sale LegionnairesPlan division as a regular part of , use! Wise. .. the club's activities. Va TO 49% OFF II tsa: Gayle Drehouse, presl- Members in from AnniversaryEnglewood range age t. was in charge of the the 30's to the 60's, according "ting, attended by approxl- o j American Legion I ely forty guest which anted will discuss plans for the 45th parents, friends, KeyL .. .. -..- ., National Anniversary celebra ---- -- WAYS L! members and Keyettes. YOU CAN SAVE tion on March 16 at a business 3 kers were Miss Joy Lew. . meeting today at 8 p m. club sponsor, and Mrs. ;! Junior Vice-Commander Ernest On Auto Insurance 'Othy Gaynor, GONDOLIER q A s Thelin is chairman of the I 1. NEW LOW RATES TOn'i Editor. Refreshments Al Er will work committee which" 2, SAFE DRIVER SAVINGS "I served after the meeting jointly with an auxiliary committee .senior club members, in planning the celebration - e club is sponsored by the Assisting Thelin will be Club, which is in turn Charles E. Yale, Jay Fittingand - lasted by Kiwanis. Club. William Haste. members are chosen Clark Eccles, commander, AGENCY "* I year by vote of thenbers FEDERAL4 will preside at the meeting. 116 W. Venice AvenueTelephone T * >' on the basis of char.er ..r r 1- service and mainten. Though the Chinese ruled all ea-2280 | of a "B" average, of Viet Nam for 1,000 years, the mice to VHS and the com- Vietnamese retained a remark lily' is the club's purpose 'I able cultural unity and national 3. LOCAL INDEPENDENT AGENT SERVICE i Miss( Lewis said the club Identity War has already exceeded 'I' Performances in its proJ.] 1"jfy I.themselves from have either, or with completed some, _BRAND NEW KEYETTES, seven of them, are shown grouped They Gayle are Drehouse, left to,right Nancy, front Taylor: Misses and Louella Bev Carroll.Kirby, Back Liz Smith row,, FREE LECTUREON tech: other groups, these around the club president, Miss Gayle Drehouse, at formal left to right: Misses Janie Ridlon, Denise Wise and Pam .t( benches painting, acquiring the high a induction ceremonies for the seven VHS sophomores Tuesday. Payne. (GONDOLIER PHOTO by Bob Obendorf) CHRISTIAN SCIENCESUBJECT r:able stage for the school, 'I and a spring winter fall and includes Tampa, wring a movie, a bi-week- trlct which ootenanny St. Petersburg, Palmetto and convention. collecting can-I district conven- 1. toads for the needy at Sarasota. District meetings are I This year's it. tion will be in St. Petersburgin Anyway you figure . !odes, purchase of mlrI held three times a year: for the Athletic Field rest Luncheon meetings during thellethodist'Vomen May. THE FINEST "Christian Science Reveals A New 1\1, cleaning and redecor- ' "I.the teachers lounge, Church Rummage \ WE'' nnMR ."wg when needed and as- I ,JlI civic and school events. Slated This WeekThe TO VENICE View of Man"LECTURER |w organization is aiming Will Hold SaleA Women's Fellowship of r .: WAGON I unified state group, so Venice United Church of Christ I IS WELCOME . loosely knit. The Venice, sale , b i. a member of the dis- rummage/ sale by Women's'Society will sponsor a rummage at 245 S. \ II'.f A visit from our hostess wilt make and Friday of Thursday of Christian Church Service will Tamiami Trail. Y ..I f jou feel at home, with her basket William M. Correll CSBOf Grace Methodist contributing articlesfor of gifts and answers to questions , at Those hristian Church be held March 7, beginning services and Its I W Venice Ave. the sale are requested to Y J about the city, 8 a.m., at 120 bring them to the building between facilities. Just tall Cleveland Ohio o Hold Dinner Clothing for men, women and 1 and 4 p.m. Wednesday.Mrs. A - children, household goods and Dorothy Miller and t- Member of The Board of lectureship of The Mother Church The First Church or ?e First Christian Church furnishings will be .displayed Mrs. Wilbur Barclay are Vlcotbt : I Venice will have covered for sale, chairmen. Pick-up of large \ agon Christ Scientist, of Boston, Massachusetts: I h, dinner immediately fol- Mrs. Arthur Swanson may be articles may be arranged by . 'ng> the worship service, called for further information.. calling Mrs. Barclay. /Phone 488.1 U4b PLACE day, March 8. 488.1771 e congregation at -' ------- ------U meets ---- ------ Church of Christ Scientist Mason First c Temple, East Ven- NEWCOMERS! , I Avenue, each Sunday at LOOK! April Special a. WELCOME |I'j.1 110 S sm for for Sunday School Use this coupon to let us know: you'ri bars 600 West Venice Avenue Venice Florida the morning wor- MacARTHUR HOTELON P service O MW j THE BEACH ( TIVE 1st.- ; 14,500 enter The contest CONDORs you- 0 Private WEEKLY Room and RATE B..* with 3 Meal.K$40. Ao0Rfo CITY Sunday Afternoon March 8 At 3:30 P.M. w IU to gain nothing to doubleREGISTER I Q Please haw the Welcome Wagon Hostess call on me I r e.or It Csts you nothing to en- single. D.p$65. O I would l like to subscribe to the GONDOLIER I II f see, I'.noneof the valuable IN MARCH I D I already subscribe to the GONDOLIER YOUR ARE CORDIALLY INVITED TO ATTENDTHE you fall to win a Fill out coupon and mail to Circulation DepL I ,:ted you share In the esU- Ph. 488-5447 I ...." JI 1730 - In cash bonuses and I ISAY . , -------T lUIuaaiona-.. - + 1 MONDAY, MARCH I, Igdt PAGE EIGHT THE GONDOLIER: r ..... - Mothers: Here "Chef" Louis Suter Creates Leap Year "ManCatcher" Fashions Shown I Are Lunch MenusAt One Dish Shrimp RecipeThe Show PresentedAt civic and organizational 1 1MI background of today's contributor l Area SchoolsThis to the GONDOLIER food r I Does LuncheonAnd column, Louis Suter reads like 1 a Mr. Venice candidate record. yv > tt. IJytI j week's menus at the orpi , Since coming here In 1944 I area schools are published by from Washington D. C, to Card PartyA i * the GONDOLIER, with the cooperation take over managership of pal ' of the lunchroom Venezia Hotel until then < manager open Year fashion show k ated by his father, Suter has Leap r The menus are subject to featuring eye-catching as well served in civic i change because of delivery numerous ca rrt as man-catching clothes was e .4 J: emergencies, the managers pacities.He presented at the Does luncheonand n said I continued for two years card party Thursday at Englewood Elementary School more as assistant to the U. S. Venice Gardens Recreation Quartermaster General in the "(lltOAI'. Center J I Hot doe .. ..... Capitol at which time he resigned There were approximately /..-.b.md.r. and took over :year- ..aaarkraDtCairo I 175 guests at the event arranged - round operation of his hotel otI... by Mrs. Richard Sadey I "-..... asks here. e general chairman. A patriotic Milk ITEHDATlRoot Suter has served as Venice 1 iI motif was used in decorations Bwaat! port I mayor and magistrate was 1"CHEF" : centerpieces on the cafe-slzo PaUtMlGraaa with aptla ineai 'I DaanaCVtorr acting postmaster and servedon tables I ... TbMM fcufflnPhiMtppIt" the first city sewer board.. Mrs Ruth Sovereign was 'r Mil He also served four years on LOUIS SUTER commentator on the fashions .. Milk the Governor's Highway Safety presented by The Cotton Fair. v Wtn.NESDATlPrlxl .. ehlrkM Council and as warden of the recipe below, to men who like I! Sports costumes and bathing Maibad pataloaa. t...., Civil Service and Ground Ob- to cook but dislike the washingup suits ensembles and street P-WIMa&.1I server Corps. He was first director afterward. It requires only and afternoon dresses in satin e-4 0...... for the Sarasota County one utensil for preparation. brocade and other cotton nil NIII RSDATlrhaeb Welfare Home for the Aged Skillet Shrimp finishes were shown as wellas .atm ataakRloa and has chaired county drive 154 lb. frozen cleaned and jerseys, knits and orlon and b and ....", for several groups.Active de-vcined shrimp dacron dresses. Buttered aaJadMacaroni aarrotaCaWan In American Red 1 can water chestnuts, sliced -' BI.wt.ADDI.rr' thin In the During the program a corsage DAYTIME SORCERY for the leap year Is shown by meal Cross, he has served as chair- SPORTS OUTFITS guaranteed not to miss leap year and three-tier birthday MdkPRIDAY man of Sarasota County Chap- 1 small can mushrooms hunt are the silk and linen three-piece outfit worn by Mrs. cake presented a to Mrs. 1 L. three costumes destined to help snag the unwary male Us! I' '. ter and retired as director with 1 10 oz. package frozen peas Grace Langiere, left, and the two-piece swim suit modeled by was time member of to right, Mrs. Donald Heath wears a three-piece weskit rut! P. Scott long .'. 'bwa M elRurmrd .IUI_.arlr the maximum ten years aervce. 1 tbs. soy sauce Mrs. Victor Retty Jr. The show was presented at the Does the Mrs. John Artman a silk shift and Mrs Richard Sadejr i S,h,._ ....... 1 tbs cornstarch Luncheon and card party with Mr. Frank Sovereign commenting group striped sharkskin Jersey. Wb... mufflaKokomls 3 tbs. salad oil on The Cotton Fair fashions, Show models were Thelma (GONDOLIER PHOTOS by Bob Obendorf!) . P-eha He has been president and Mary Lou Rctty, Put oil in skillet, add shrimpand Hamman PMdk held other offices in All States cook) until shrimp turn pink Adelaide Mueller Mae Wrede Hub, Venice Art Assn., Venice and curl. Add mushrooms and Grace Langierl Mary Balr, V-N Presbyterian Circles School Little League, Duplicate chestnuts plus their liquid, Helen Raymond, Lillian Art- Overbrook Gardens MONDAY' Bridge dub 32nd Degree and peas. Cook until peas are man, Betty Sadey Martha Spaibattl wlUI Bottarad p. MI aaaaa Masons Club Tampa Scottish tender. Add soy sauce and Gossman and Alene Webram. Will Have Meeting TuesdayThe Rtaamad.. bM oabbanRolM rolfcApplaaauaa Gourmet Rite Masons, Rotary Venice Club, cornstarch to thicken. I By MARY E. KROUPA There were 52 table and door) Club Area Serve with fluffy rice. Serves prizes. Door) prizes went to Circles of VeniceNokomis Circles Two and Milk Hotel, Motel and Apt. Assn. four. Mrs M. L. Townsend few to St. Louis Sunday to be with Galloway Six 1IiI TVEHDATlBnllad and Mesdames Fern Presbyterian Women of meet Jointly at 10 a.m. at Fl SPBSQSA. He is * now a her niece Miss Kathleen Poindexter of Daytona Beach. Miss bear wttti kamMl Ruth Sanford Lore Spilman will meet Tuesday. Ida Pines Mobile ..d prom rid tate director In the American Poindexter went to St. Louis to Barnes Hospital to have an open Thomas Barrett the Church Court tbmunlty Sniffed aalar ., Hotel and Motel Assn. and a I I Lena Kelly Circle One will meet at 10 center. Mrs. Cnn] ? ik pianul trcttar GOP's heart operation. Mrs. Townsend called her husband, Dr. M. L. Kester 1/' Englewood Lena Lewis Peggy home of Mrs. Lewis Gleason will be the anonMunkn.l trustee and board member oleniceN Townsend Monday evening to report Miss Poindexter had the a.m. at the hosts . o k o m 1. Methodist operation and was doing fine. Henry Baukat, C. M Meisner Eaton of 102 Park Blvd. N. The co-hostesses will be Mn. WCIIVE8DATI Church. Meet TomorrowTo -0- nurse's training at the Blod- Eva Milk and Frank Dalglelsh Mrs. Mark Even will be the Robert Caudle and Mn. Hilton\ I Special' aafloVfehHuturtd gett Memorial hospital In Assisting Mrs. Sadey with co-hostess Mrs. Corrie Graft Ridlon. Miss Kate Huntemu Suter also has In Jacket served as Dlsrlct Mr. potau Mrs Edwin 0. Tan Unit and Buttered Is... .Lrrreh Commissioner of the Organize Grand Rapids and will graduate arrangements were Mesdames will give the Bible study will give the Bible study Boy nehill of St. Paris Ohio are aebbI- in September. She is on Mueller Baukat Artman Circle Three will Milk Scouts of America and plays Charlotte County Republican in of Mr meet it living an apartment I her month's vacation and will Harold Gavreau, D. M. Goss Mason 1-30 at the Venice TBI lUfDATlPVM first violin with Venice Civic Meeting : p m. Gait leaders will be present at an and Mrs. Joseph Machacek on ; .h''...* Orchestra. be a houseguest of Mr and man Scott Hoke Bowden, dens home of Mrs. A. JLnufek . Englewood meeting tomorrowat 'enisota Road in Manasota Cranbarrr aaaaaTomato Mrs. Smith. Charles Reiter Ward Baier. of 107 RioToaiUil tataa Cooking) has long been a hobby 8 p.m. at Englewood Savings Gardens. This Is the eighth Eric Johnson and Don WilsonMrs Slated TonightThe Mrs. George Churcher Juniper will Drivt R.tt_ .prep .... > of his and he especially and Loan Assn to assist year Mr and Mrs. Tannehil Mr. and Mrs Oscar Peter. regular meeting of VenIce bi In co-hostess. Mrs. Edna Fn'ted 1.1Ia recommends the Skillet In organization of a Republican have been coming to Englewood Ralph Anderson was Brod-- Shrimp Lodge Free and Accepted son of Elmhurst 111 arrived 301 , and head will the charge of the card party give Bible Italy Silkd Unit in the Charlotte Countyarea to live during the winter Masons will be held athe Monday evening to be house- CutlerJr. Circle Four will Mrs. Samuel prizes and meet .t PRISSY of Englewood. months They have made t efcM" .........* Venice Elementary: School County Chairman Donald friends and they love it here many in guests of Mr and Mrs Joseph had charge of ticket sales. Masonic Temple on East noon at the home of Mn Bvlnaell Robbins for a few days this Venice Avenue tonight at 8 ........ whol bond on MONDAY. Fisher.' Vlce ''B.,,_ Hot t-t. h. Mrs. Richard Ackerman WIll applea I Catherine Travis and County abode in Manasota Gardens Milk Park b..... -a- Refreshments will be served the Bible airy Stl. finance Officer Marvin Hemp. Mr and Mrs Wilford Pierce Venice East following the meeting and Worshipful give study Appla 100d000A..b..1a Circle Five will meet at 1 1X field will be Venice Junlor.Senior present. Mr and Mr.. Edward O returned to their home in Zion, George R Collett Jr., at the home Mrs. of Herbert High School Milk Purpose of the group will be Smith of 1994 Greenlawn Dr. III, Monday They have been master invites all Master p.m. BOND\ AT I TVERDATlPoorbora to provide a medium of discus- visited with Mr and Mrs Walker Municipal Trailer houseguests of Masons to attend. Hot donPouu ......... eo h- aim of political issues and to Mr. and Mrs Contest NearThe Court. Mrs. Melvin Clevenja Ralph Miller in St. .. Petersburg Welsey Bennett Allen eklra 0.. b. petrrsuttw.d on Street will be the co-hostess and tin further the of the Bmtand._ bnema cause traditional uesday. the few Cote alarnlt 0...... _.. two-party system in -0- they past went over weeks to While the here east town's buzzin', cousin Miss Hennis Returns Bernard Bishop will live t the Milk aoektall Chooalatt pddlaMik America organizers said. Mrs. Byron P. Richardson Is coast to do some sightseeing uzzln' with the big news about Miss Bonnie Hennis, tormer Bible study.Circle . TIESDATtHrana "'ERNEBDATtMM AU Republicans in the area confined to her home with thenu before returning home.A the contest March 8 to select Venice area resident who mov. Seven will meet it I I and and tomatoaaSpinach tiamRica MulwdOrm Loaf p.0.krG. i are invited. We do hope she will feel i i Irs. Venice East. ed to Daytona Beach in 1962 pm. at the home of 111 B..... .and J.bro. pleM kaita ...... I better soon family fellowship dinner There's still plenty of time to has returned to Venice. George Youngberg Jr. of KK ( bawd llilood 1oe.t_ Jon -0- will be held at the Assembly let in the competition but don't She is now a counselor at Menender. Mrs. Richard Doui A.I. 5.WBrwd Harden Milk .d .terror Makes Mr and Mrs Edward G of God Church in Venice Mon. wait too long. Entry blanks Gulf Pines Memorial Park. na will give the Bible study WEPNESDATlBarbaraad ahlekx Milk RIT's Dean's List Smith of Greenlawn Drive day March 2. For entertainment available at the Venice Chamber While living here two years All women Interested fe G.,..be.. .. .IUI p. rauRSatn frla ........ went to Sarasota Wednesday Rev. Byron P. Richardson of Commerce Beall's Department ago she was associated with Presbyterian fellowship are IJIo ! Word has been to meet Mrs. Smith's grandniece will Store or Publix Fruit en* Rloa aad rr received put on a show of Sarasota Memorial HospitaL vited. Brrad aid kW_ Tow aalad from Rochester (N.Y.) Institute Miss Marilyn K. Jones, I magic. Mr. Richardson is an Market In the Venice Shopping THl Milk HSDATl, Frelt Appla...11__...-. 5.5 of Technology that Jon who flew in from Grand Rap. officer of the International Center, must be mailed before I Pork and .. rla Rod, a4 butte Harden, son of Mr. and Mrs. Ids, Mich. Miss Jones is in Brotherhood of Magicians.: March S. Venice Area Church Directory Ruuiad CafcbanBvUftrvd CarrotaCraabarrr : rRJDATlMacaroni Milk William H Harden of Hudson -- Mrs Venice East will go to , ...... itiaia Road, made the dean's list for Miami to compete for the VTNICB ASSEMBLY or GOD VETENTR BAT ADVENTIST Hot rolla nt Jnr Hard aaokad. .....f_ the fall quarter. Library Acquires New Books Mrs. Florida" title If successful Vanlaa' Brown at HrrUa A_.. Persons Trait. H ..I. aa4 rf MNokoBla SRe. MilkntlDATl r-. .b lad Jon 1962 graduate of Venice Victor Manrloa, Paak Fla.Pailor. . the ,...... tenelp ..- a there, she'll go to Reads School ICiOO, ..., L Cant A.wlm Pin.Porn. Met Mix High School, is a first year For 25th annual Mrs. America pageant Mornlnt' Woranlp. 11 tM a.m.rBNICBNOKOMIS ftrrfcOTt SatnrrfaT.iMoria tan.... 5 a . Light Serious .pw.fetwe. i.k.ras..4 Hot roll ud, batter) HrBrwl student in KIT'S School) of ReadingNonfiction to be held April 2 through _nins 5M.... .Itea ... Frarar Sarrtoaal T tlO TuadW rmt'* W.4nrdw P wa MmJas. .100 p." Milk Printing. In te.4er 12 In St. Petersburg conjunction - New titles of adult books,] and reference with the Festival of NORTH PORT CBARUrmCHURCHES both fiction and non-fiction,I books Include: 'Nefertitl a States RMITBODI8'r have been added to the Venice Biography of the World's Moat State title holders and their aha. Aranoa Pohl_..... 4M4MI FIRST PRESBYTERIAN CBT (* John Lank Jonai, ,...... Community OntarPr Free Public Library collectionduring Mysterious Queen" by Wells; husbands will receive a free I Worahlp ...._. ,,10 .-.. aad II Tarranf* J. Pota_.. Mrkm! the past week. I "Dorothy and Red" by Sheean, trip to St. Petersburg where ..... Siindar II r50 ..r. Wen iCaildraaa e'rcbh The fiction I kbm1, 1111 .... ClaM boW a1raWM.U.4I. - works "Indo" "Let's are Fish Guide I a to Fresh they will stay at the posh Yoalll PsI1eh/p, hlO ... .1.. AdultTRINITY s.nk 4j H't ,. 4ej s by Hahn "To the Far Mounains" -, and Salt Water" by Zarchy, Serene Hotel and enjoy specIal . ; fd by Ovecholser: "New "How to Organize and Operatea membership privileges at IMMANUEL LUTHERAN CHURCA mjTHODIST CHTJK Moon with the Old" by Smith; Small Business" by Kelley; both the Sunset Golf and Country 100 & T.ml.ml Tr.. +l LH1/5 Community Cntr I Paator Tha Rar CnarlM L Rowa . Smoking Mountain" by "Everlasting South" by Sim- Clubs and the exclusive Chanh: SVhooli till am.Wonhlpt AKa A. Soldo. Mu, '." .*.* i Boyle;; "House That Tai Minguilt" I kins "Horses, Their Selection, Bath Club. lui a.m. and 10110.... SiuuUr 1141 a.Wotahlr. n by Lee; "Spy Who Care and Handling" by Self, Mrs. America of 1964 will LASESIDB MISSION Came In From the Cold" LUTHERAN: CHTJRCH EPISCOPAL by "Lyndon Johnson Story" by win a week's vacation for her. 4 _I. South .. U S. 41 Al RMO! Bama Le Carte "On Her Majesty's Mooney "Confessions of an self and her husband the TJa _. MaMn !L II./.., 411100rose Mad**. VWr.Saadar . Secret Service" by Fleming, on Wanhlp Sarrliaa, lOilO .... .... Wofalu. a.." Man" '| 4..i "Shadow of Advertising by Ogilvy Caribbean island if. Curacao, a Sandw" ....... I ill ..*. > a. a Tiger" by Davis, "Child In the Glass Ball" by complete fashion wardrobe Blbla aaiaaa till, .... A 0. "Second Wife" by Mayer, Junker, "New Complete Bookof FWST BAPTIST CUM from nationally famous Hess's y "Venetian Affair" H. BlaeairM BM. by Macln- J'IRBT CHURCA Flower . 1 Arrangement" by Department Store, in Allen- : TICIWIT. Tka .-. Cbarlaa B. pOb..weel and T"qY 'dP rrw ,1 J,0u net Cadell."Come Be My Guest"by Rockwell "Hong Kong Surge own, Pa., and other gifts. "'.. Vanlaa. A_'" Bwdwt 1e/ae.YM .. ....... on" Li by Shu-fan, "How to Wsd Also "Wind From the Caro- Stop Smoking In Five Days" YOU may be the nation's Sunday 1IonJ.o.;; II150 ill{ar. = ': IfAAd .X eZi9.I II nas1' by Wilder "Richmond by McFarland "Latin America top homemaker. Only requirements Siiadar School, 11 ..? Fe. N_ ply' Wadnaadar. I ... Raid" that excell In G.rdwadn.d. by Buck. "Witch's : World in Revolution" by are you Raadln Roomi; 10 ask 4 p... "dy .,Td0, Tf50p p ., . ,dr xi ', Hou.. by Armstrong; "False, Beals, "Stretching Their the homemaklng arts and must :capt Btindara and llIwa: u d FrWr or 1e..1ea _ Colours" have poise and atanlnn ham f to w Y y by Meyer "Run Mea Minds" by Fine, "Comolete personality River" by Giles "Sing For Peace Corps Guide" by Hoopesand good grooming. GRACE METHODIST CHXTRCHOornar cauBCli or TI NAUuNI Your Supper" by Frankau, "Autoblograph of a Yogi" of Ctald and Datla. SaaUl Vaaloa A i d r "Last Raider" by Reeman, by Yogananda. Ba.. Mllai DaPaitar. ;.rf Cart dsos..50'i' t Maulever Hall" DDE Card Wanhlp Bvrtoa 1,10, .... a M " by Party l> 9d Hodge, Also "Gettysburg- Long Hunter School hit, ..... Phonal 484001. "Of Good and Evil" by Gann, Wanbl .... suede tetual.. ,W a.m.Horrla tM ,jS f bI "Land Breakers" by Ehle Encampment" by McLaughlin, Set For M T. P. Barrtoa lioo, p..UiOo. "'.......... 10SI ..* "Overland Journey" by Gree- ThursdayHMS atud Youth 1enl.alw "" "Long Shore" Bible ,, Till p., Wadna iar. : . "Professor by Langfus, ley, "On Safari" by Denis, Emlai Sarrtna TiM MaHlM. tNM. Stewart Descending": by "Hidden Heart of Baja" by Phoebe Chapter, Daughters CATHOLIC Wadnatdar Prayat _ "Savage Place" by Gardner "Homestudy Course of the British Empire will CHURCH OF TH* EPIPHANYortb. REIORNECAYDDeres Slaughter, "Fool-Be Still" by for Civil be hostesses RakerDtM and Sataaau (traat CALVARY Service Jobs" by > at a card party Talavbonat 4e -nil OYEN1Ca I Hurst "Bitter Iron" 1t by Young, Turner "Television and Radio Thursday at 1:30: pm. at the R. IU*. Man Gaona W. Oanmmai, 101 Norm Baora DrhaT1a ... "Enchantress" by Bolton and Putor fca.. Frank J. Shaarar. fBtinda Repairing" by Markus "Afri community room of Sarasota Sunday .._ .... Wagons West" .WintaiaVbadnla erbm"w by White. ) * Everyone )li looting for ways to uve money on tiro.. s can Creeks I Have Been Up"by Federal Savings and Loan liM a.m. OtOO a-ia. a-m. Hornlnf Warahlpl' 5IN ai Spencer "Furniture Finishing Seen!' Confmalonat; Batarday :iOIO..S: Canununltr H.::.inalii l 11N MST. their. home. With low servIce low 4 new a charge, .m. and TiM u StW .... Interett rate end a Modern Open-End Mortgage, Decoration and Patching"by Party hostesses will be Mrs. RAPHAEL'SOF ElferdlDk' of Osprey Pattou, "Modern History of Eugene Mahon, Mrs. William VENICE-NOKOMIS PRESBYTERIAN ONOIL0D Sarasota Federal can save you money on your Ft Japan" by Beasley, "Mathe Retallick and Mrs. Alex Gait. CHURCH W. Oa a*" I $100,000 Liquidation Sale ] matins Mlnbtarl D..W A. BowUa. Kb R.. Y.. flaorw t home financing now end for years to come. When ;: for the Millions" by Reservations and cancella- 4t ii,. aialu, Vantaa PaatorRnndar . UP TO 49% OFF Hogben, "Art Through the lons be Talaphonat\ 455.5 a HaM Sr9 .- . .; you find the home of your choice, atop In end 1 Ages" by Gardner and "Crea Mrs. may made by calling KiraoVy Schcoh. Ii4l .... Holfdar Hum ,.00 ... y'"E George Key not later than MEVANOXUCAL - Wanhlp Melees Caafiaahma; Baton Sundayt IM _ : a.m. learn how our home financing experts can help tive Hobbles" by Zarchy. Wednesday allawablp H.lll u a-aw. Gads Baaa.taarp . cosGREcATIoNAGCNRIFRAS you lave money RLFOa11fa AND SAINT MAR '" EPISCOPAL CHURCH Tha .... t Robart CaH 'fcMlnlatar ,.< EXQUISITE LAMPS AND LAMP SHADES Manasota Key Group Rlolara' M Sorraata t * SARASOTA X2LA1L rid __ Donla Daaa Pattano*, BactecT.IO 5"_ Mss hald t s5.P rwW -, U Will -a....., a-__ Vn.... G...... Rawaatlaa CaaW.m. EARLY AMERICAN CONTEMPORARY Elect OfficersOfficers .... Holy Vmanmkm. .. Sondara j alChardi PiOO .... Family Wonhlp Maralnt Sckool savings and loan association TRADITIONALI and directors Prayar t th. ** <* *! will be 111* .... Adult I 5R,4,5amdp rid4mR.._ Cantor "Adult tw jt us style your favorite vase elected at a meeting of Mana- Chuiab School : .::: a* Cant.; **JT H- VENICE or ceramic Into beautiful lamps ota Key Assn. Inc. Wednesday lit .... Moralnf Prayar aa4 aY.wr.LOl.erid.s '"" ... usm ........ . O at 2:30: p.m. at the Club Houseat a _ Tamiami Trail 1 446 So. e Rewkln s Rtrtytlng Early Wynn's Steak House. ": e All hemp flat BAPTIST CHURCH OF VtNlCI SOUTH VINICB BAPTIST f.1JI STICKNEY POINT Repairs Residents and property own. Richard S Lfeyd. Fmtor arrta or OM uw. . DOWNTOWN SOUTHSIDE ers who live in the from J-ind.y Srhaol. Ii4l a.. KM Anknr M. Blow * I, 1718 Main Street So. Trail at Bee Ridge Rd. So. Trail at I Work by Experienced Designer end Manasota Key bridge area Wanhlp t:::. 11 lOO a.ak south Stlckney Point Rd. Craftsmen to .. . Swrka at wenhle 11.N * the Sarasota County line are Evanlnt;' larHoa. tilo p.m. ---. ----- Invited to attend this meeting Wdord.. p...,, M' tl ,. ,,'8 ..n. VBHI01 araLil) CHD** YOUR 1964 DESK CALENDARS ARE AVAILABLE THE LAMPLIGHTER SHOP INC. ( .. and become association memo lasT CHRISTIAN roe S. Tanlaml TraODM rfI1I PICK ONE UP AT THE OFFICE NEAREST YOU j hers CHURCH Ua' B. F' Rlahara-a. i I 204 N. TAMIAMI TRAIL SARASOTA FLORIDA M mik T'21,' 1"" ? CT.lit /udw sea..L '' S..' "JI... Robert M. ?!; W Y.nln AMI .. smut. R..ming f.r I A Wright is . [ '. :;1.'II"r.J." : ; I'n""" .hI: 11 man of the chair- .!::. "h -, G. y, pt Pore m5 Bnk .t...... 1N W group a. w1'aya 'W' w.4n555wMhiq ta out ar. i 7 PAGE NINE y MARCH J THE GONDOLIER r Top Records f . Compiled by Rona Sear of Gilbert Youth Service The new spark of life to the record industry The Beatles, I Il are Hill in the lend with thci jolly tood hits "I Want To Hold Your Hand and fahe Loves You" Another blii-K buster by the boys from Liverpool, Pleuse, Please Me ha* oared into the No, 6 pot on out surves'. The Four Seasons may want "Dawn" to go away, but the teen-ager* lure don't, They've selected It as the No 2 song in the nation' Another t favorite i Navy Blue 1 ," by Diane i Re nay climbed from No. 20 to No 7 '.You Don t Own Me by Lesley Gore Is third, and "Java" by Al Hirt is fourth New Additions: Back on the charts again are Sam Cooke with Good News..' end Sammy Davis Jr, in his incomparable style, with The Shelter Of Your Arms" Also making their first appearance are "I Love You More and More Every Day," by Al Martmo, and Who Do You Love by the Saphires YYYRhAWNw Sucmfwjp cmfwyp cmfwyp cmfwyp mfwf I N. EVIDeNCE that Venice\ Wei- in concrete by city employes] When complel, Pick Hit of the Week: Jack Jone end his offering, from | and louru from both north ed IE tor this week, the new sign will be backed the movie of the same name, Love With The Proper r w.Ih a solid hedge of greenery and set off.. Stranger" new!" en' :led at the I r j this Ilgn. b) colorful flowering plants it the base His Ihls Last Two Weeks on l IlL Letter for the ngn. 'le,t I lr. ited just south of the entrance to the Week Meek Weeks fonr; and Recording Artist The List f uncilVtoman Blanche J. C I,'sr Muni ipal Trailer] Park I in department w"r.. r. .jit (GONDOLIER PHOTO h> Boh Ohl'nrlorf) 1 1 1 "I Want to Hold Your Hand and 1 --- -. --- She Love You" Beatles .. .. .. 6/5 a. y13ETTERLOOKING- -- Badger 2 3 18 Dawn (Go Away" BEATLES are these sari Capasso, Janle Tamer and Sandy ABOUT ENGLEWOOD h to Four Seasons . ... ..... ... 3 representatives of the female of the species, Ball) participant are requf Don Own Me" Venice who as the "Beatle Bugs'! their beetle hair.do* Hour will be from 8pm 3 2 2 You four girls will I I Haley Report Lesley Gore ( will make their first appearance on March 7 until midnight: Also entertaining Banging It Out 5 8 < Java' Al Hirt; :: :: .... :: :: 4 at the Teen Haven Beatle Ball Theyoung be the Chevelles, ObendorO A. HALEY 5 9 IS California Sun' Riviera .. 3 vocalists are left to right, Cindy Hen e. Su (GONDOLIER PHOTO by Bon ByIlEP. JAMES 8 Please, Please Me' Beatles 1 - ', re'!ntly have heard 7 20 'Navy Blue' Oiane Renay... 2 NPC Heart Fund Drive Nears End II ." the w.,vi were being With Pat Bang 8 13 17 Slop and Think It Over' Adams Pays Visit ,,M for launching the tax Dale It Grace . . ... 3 ; NORTH PORT CHARLOTTE Hellig Mr*. Viola Peterson i'wcd! Mve-.body, I great deal 9 10 U Talking About My Baby"Impressions -Many of the resident of Mrs Arthur Brigham Mrs. .' : some rather un The Friends of The Library of Englewood- Inc, had an open .. . .... .. 5 1 1 :North Port Charlotte have opened Neil Mackay Mrs Edward ,r t. ,< from d sources about fed house last Sunday at the Elsie Quirk Library This occassion 10 4 5 Um, Um, Um, Um, Um Um Van Orsdale Area their hearts and their Frank Mrs Oliver McShanofi, ,r-; m responsibility The was in honor of the new addition to the building made possible Major Lance .. .. .. .... tU to contribute to the < Mrs Lillian Davidson, Mrs rr fi;; 'I 1 of big new spend by the commissioners of Sarasota County Book circulation has 18 'See The Funny Little Clown" i Heart purses Fund this month Miss Gertrude Walker and MI* ,ponent' $ have been being Increased! each, year, with a high of S.014 In January A total of Bobby Goldsboro . .. .... 2 Ann Hardwlck, chairman of Evelyn Maloney, ,' ore !,1ms books been with 114 others for the Cooke . 1 Chief 1 indeed while the bill. 46 gift have processed, along 12 Good News Sam Campaign the fund drive here, says it is !'Y a (" tax cut was on, month and the volunteer hours 13 18 19 'I Only Want To Be With You nearing completion and we , h f f.r tve tax cut has I numbered 97, Mrs Eloise Meder, India, Dusty Springfield . . 3 Tom Adams I should know very loon now I'M r'w tint the I The Group Discussion" 14 8 4 Little Cobra' Rip Chords T Secretary of State of Hey amount contributions - Mrs Janet Pel yon of Cape just the exact i all Intents and pur- .. .' . 6 candidate for re election Home Burns 'r JIM I rush open to the public meet the Haze, China; Mrs Lucille 15 7 8 For You Rick Nelson a made from the area 'n.. a -!Hy the gold last Thursday of the month at Linn The Semiole Indians; 18 8 9 What kind of Fool (Do You tea this cabinet"post., The ladies working on this I J son .n' not the old fashM 7:30: p,mMr Hart Import House Israel Think I Am)" Tsms .. .. 5 what he called a non politicul .- are Mrs Viola Lassard, Mrs LAUREL The frame build, then i of courie. but -o- I The Mrs Schellhassa, Yale 17 U 3 Out of ImitV" Mirkett .. 7 visit to Venire W ednesday' Florence Shidler, Mr*. Dorothy ing occupied by the Will Hoilenquest - ' federal know .. tr.;t leads to the Flora Wilson from < Sterns and others were in costume 18 "I Love Vou More and More Every Adams: said, We don t Wangenstein, Mrs Paul family was destroyed i it:sury Brandenburg Kv. had an art 1 Mrs Boyd Lipett and Dny Al Mi mo 1 just what the political problems bv fire in the Laurel Quarter For 'ance as I write this exhibit Monday Feb 24 at Englewood Mrs Schroeder are cochairmen 19 The Sh let of Your Arms'Samm if any will be friends I am of state on problems! The building Wal owned by the . old retary in Wash . I happy to meet my 1, I're Umbled Savings & Loan There of the exhibits Mrs Dr' s Jr ," and activities in the county Johnson Chapel] Church , ,n hint called the Uri were several pietures in oil. as I I.inn, The Semmole Indians; 20 Who Do y.ru. Love -:- Saphires 1 1I t"-:c and to make new ones Civic leader The Union Volunteer Fire M' i s Transportation well as water color and ink "an Orsdale Named JI I Frank Babucz and Mrs Frank I I Dept of Nokomis responded fitted Oridale] is well L mmittee. This I is an sketches. Local subjects in Rowdier are chairmen for The secretary was introduced Van to the call when it ., in promptly TranXE Van for the task shead Active . f i le American of them to Venetians by Ray \ .1 : many the "SilerTea"A received but the flame I and civic affairs, he is a past presl was ,:.. h has a member Oisdale insurance man JJ. < I Mr. Wilton studied at the -0- Venice Junior had made too much headwayby J. 'I of 0 >f the ration s 1,200T Art Center in Louisulle and Vcnke campaign! chairman for dent of the and the time their truck arrived , ind its purpose in now has her paintings hung in I tea and fashion dhow was the campaign or Chamber of Commerce Chuck Mmtle a volunteer I :: tondtn state director . here is to get thee held at the Methodist Church 'I informal coffee currently serves as . station at 1 Louisville ( in the museums in and fireman, was .sve a mass Iran this past weekend. Tea was F Sherman's Wharf of the Jaycees r ; ,>pr at the call wa* rccelv'cd - Mr!*. Wilson has been called of Venice Area Association i the time served bv the Methodist- Ladies' president l'l.'1 I ,. Van Or dale will id The f Ilk Adams $ and sped to the fire of of out town the death 1at by a Cncles The model* were Mrs I of Insurance Agents Inthlll group is his (,impaign activl I UVFD remained I ',he scene . :e sister, but the exhibit was Vera M,Her, Mi'* Dot tie Davis supervise forthcoming At the time of his visit here I 1 innocent , 1 seem* ties dunn the than an hour .. aI ? for more ( shown She Is the sister m-law Mrs. Pat DAVIS Mr, Harriet no one had indicated a desire embodied in the He w l o nerve on the flarnW . 1. .r of Mr*. Jessie BlakeinanMr Ives and Mrs Jean HancoekThe .Ic'tj.m In his bid for I precaution against ..1 I ,'et Only $75 mil -0-- I a como itte of SIr, 3 111 Co.ini Ito opposeAdam spreading! to other building*, '" ,:i for to get the Fred- Eccles came fur Tumi children Harris Jane models Hill, Lollieflrtiwler were' dt: I>n 10 Inform the see._-re--election I -, -. fiscal . r > in - mg . I d $"5 million burketin i is In our after copy 6. U this was morning on the table a little but Moore Sally Moore and Beth "These Are My\ People!" ! I drip in the | IIer not In the envelope, As soon asue budget The UrT heard him drive in. dashed Commentary on the fashions > ... '. insportation Steer to the drawer and grubbed shown were by Alto Moore, | WELL WE DON' HAVE CHARLIE WEAVER 11 ft would have the nn envelope and tueked it In SwimsuiU. sportswear and HI'SI le..e this is the und went to the door with it. di esses weie modeled, The at ON OUR STAFF BUT WE DO HAVE I He said very seriously "Ddn't, Ic-ndance was o\er 150 and was jth Is that thu't know if >ou were. sealing! an a terrific success. BROTHER ,1.OJ ,ibsidy proposal nnvelope or playing the harm -0- I a federal taxpa>'ers. >'me'a," A new game! i Is being plaedIt I FANCY PLUMAGK Few people pi >babiy are aware that LES ARQUETTE .;; 0 biJl1nn, end probdc of the Kentucky 4II -0- Fn lewood It's an 1NITIAI the colorful plume on the caps of some I more, over A card party at the American game, of one, two or more UtItrs : Military Institute! cadets have a meanin' IIU I then own The that LES Is now to announce if this author hall We happy Leniun at their on re I One is talking to someone .adei of lice I the batal:ion one onlv b pending in 'the Munh 10 Door prl/e and refiikhments white plume I is w >rn ; > and all of suddt' . a n they ( ,,,,milleeshuuld- Fioin ]10 to 1:30p v'ill fling these initials] at commander, The thre membei' of his staff wear black selling for. " you I, !law. I .m. Don"ition SO cents T M for example it Tate plumes, Commanding officeis of the Band Company wear tor a moment at -0- Mar keto We haven done so red plumes and the captain and first lieutenant of the INC. dark 1 II' bill which al The Newlvwed, Mr. and WOLFER MOTORS bud but has one us slumped sport jellow gold plumes , n approved bv Mrs Wayne W Hill nephew ofMr four Kentucky Rifles companies What does MS stand for , 1 intempHle* $ 7r, Ivnn Stoles and his wife mavbe i is being played up in It Modeling three different colors of plume in the picture are South Trail. Venice DODGE. .;:; dinut subsidies. htv Beixip, Stile are in the Venice. Doe anvone know Major Edward Clay Kerton, batullion commander: 1st Lt RAMBLER 915 TRUCKS & m,IIion revenueprogram h 'ime they have rented down -0- James L Crissey, bullion adjutant, and Capt Gordon Roger USED CARS NEW . nndmiUd the street at Urn: Attention all New Yorkers'! loan Jolly of B Company pro * : The club meet* March 4 at be uied by )local I The United Presbyterian! Or'amation 6'30. Veteran Hall Bring your ::: I,,' bodies in build' '! of the Community own table service, plus a covered f 11 l II ''fI 'J ai iifficial. invite you to t thur "Silver evening ..,... :,-- ... .. would de.Ibln lea and Our %01 Id" exhibits 1 , .. .. HItas would March 4, from 1:30 to I \Massistance. 4,30 pm .. . .. known now how .. -.. - .0- . bent'ht. Bat the I The following people are Flferdink's! of Osprey I : 1; ;ftUtjJ.d< I ,H tells me there sharing collections from their ; I .. .., ",dard metropolitan navels with as: Mrs, Jean I $100000 liquidation Sale I . country, And a Thompson England l : Mrs Eli IP TO 49% OFF I . d for the Federal ?ibeth Giecnfield' The Holy lows that the cost Land: Mrsiv an Yale ... 1'W"'''''''''''_", , - m j transit needs Create; Mrs La Verne Arm. "f he $10 billion m the Stearns and Mrs Beth Baker and staff welcome you at Of Ih o. imd!!r the Hawaii: Mrs Ruth Babuc z : frl''oral taxpa\er and Mrs, Ethyl Gould Italy: t r .i : =, - D something more Mrs Ada Foster Thailand; [a;rii 1 'In Lynch and Mrs, , Mrs Regmia I.'....". i. ..uld not unfortu- Zabrenski Japan Mrs Glidys ; Ca": FEDERAL FIRST .. '.the end Remembercovers Marv Brend.Cohen, Spain and IIA1M:=' I"AI.' HUGH only the Sicil>'; Mrs Irma Bendijs .1I'IrlCO..1I'I -- 40 of the 212 metro- from Foil Myers, three South McPHERSON . Obviously when- American countries; Mrs, Pol. P59-131 488.6561I . ) f 'in to get theirs, I ly Martin of Venice, Mexico; perhaps all. of the I ;;;:;;;:::;;;: ,____ oW 172 areas will be . . VENICE j ;,.. m for their share of REALTY ". n..,' a program which . 6 . ''hip with the *ed : - -11 .r ,f 3aid program VIEWS More and families in this fast- :rim I Is financed by i more 'i (axes on gasobi - .. les, rubber acnd I telling Yet they have much growing area are getting ahead at it benefits not more money Invested In our Venice office. They like the ' but the entire I per .- TI their house than their car .n ma s transit - '\ be financed prould bs I I 11 1 get the point" ,he s* d sonal service, neighborlirvess and ' the Federal Tren,. with grin, ",III m.h it at ..... I' I ,t would benefit onhf I attractive ai possible And friendliness of Harry Raby and his JOHNSON f :rt, and operators by CHIPS fit up the tereen door and entire staff. U sutems Why un't my home iH thuttert May even paint it ,", ever was a progrim ing?"' a friend ailed (he other inside and out." n tuld be handled at then day 'We have to leave Topi ferolrn Drbwll. P.nl I..h.., 'ttonttfLWt ,..- d !fl.te level and 1" Two waekt later we told to rirttl M,(Ml'.i Hot K. KkU., !Wk. Diuihtrr. *...'w Houib I another month and .... ,. [ m n by town in the hous It looked attractive Bottom Hwrrr O Rftbr. oil ...." private ' enterprise ' .. III J It we would lite to get our like a girl about to FirtfMI; 'iI .1. ''Ii{'"', told before we go" W. piece have her picture taken. And Well *f course, that put it appealed to several buy ' me nqht en the ipot "Look, ert. FIRST I Glen," I laid. "if you were : what Let ut help tell your SAVINGS AND LOAN ASSOCIATION OF SARASOTA going to tell your car, would you do first?" property . I guett I I'd have it cleaned CHIPS JOHNSON VENICE OFFICE 601 S. Tamlami Trail and all the and pol.ihed. REALTOR INSUROR dentt taken out of the fend erl." he replied 306 W. Venice Ave, MAIN OFFICE SOUTH SATE ST ARMANO'S KEY Sure you would' Most Branch Real Estate Office I 200 South PineeppU 355 South T amiaml Tail 361 l Herding Circle .; I : But d be turprited ' folks do you I t' how many fail to get KENT MOTEL See The Jo* J. Men Photo DupUy in Our Venice lobby , th.ir..._n'house In top hape for Phone 4882279 I II -. 'ill. I advertisement .. n --.---- , I TEN THE GONDOLIER I MONDAY'- MARCH-$1461 NPC Club I NotesNORTH OPENS TUESDAY I PORT CHARLOTTE 4 _Th. Women's Society of o1PdOURoos INWINTIR ChrtatUn Serrtet of the Trinity Methodist Church of North . Port Charlotte will meet on Monday *t 2 p.m. it the borne 0i 9 HAVEN o of Mrs. Frank Carroll, 110 Talbot Street Mr. Willis Funk will be in charge of the Study 'yE lo Co HoetnH' will be Mn .TORcOp James Olaigow and Mr. Tier yt enc.is The preodent Sh Methodist Idler. Mr.ladies Robert held Orr ::::; their baked food ale on1 / Saturday from I:30 a.m to 2 2 . i p.m. in the North Port Charlotte 1 0/ Swift's Premium Sliced Shopping Center.0 601D /1 WHERE 5 rNEtNtUtIA The Michigan Club will mitlUedneaday Canadian Bacon *t. 9cI 1 at Center 7:30: p.m.Everyone: at theCommunity SHOPPING I i 't. Swiff' Premium TaityDinner from the state of Michigan la 9 +, urged to attend. and ft acquainted ISA I.IbPk9. 0 j with their neighbori 49c ; Franks '1.! The Greater.o.Pittburgh Club PLEASURE! o II e i will meet next Thursday I March 3, at 7:30: p m. at the Community Center. This Is en SWIFT'S' PREMIUM PROTEN GOVT. INSPECTED : active and growing club. Many I tit the former resident of Pittsburgh lure finding it a lot TENDER-AGED HEAVY WESTERN BEEF b of fun. I The World-War- I Auxiliary I will! hold Its regular meeting ROUND STEAK (boneless) en Tuesday, March 3 at 2:00: ,j 1 ter p.m. at the Community I Center, The WW I Veteran meet on Thursday, March J at 2:00p : m at the Center - The Hobby Club meet Wednesday - at 8:30: a.m. at the e"OIm'Ib.79c Community Center. These ladies get together each week MICE and exchange original Ideas for + treN y r EFFECTIVE making thing in their club. WON., TUES., Anyone Interested may join the ' group. WED., MARCH -0- 2, 3, 4, 1944 The Executive Board of the i Women of the First Presbyterian I Church of North Port , Charlotte met last t r f + t .e I I Tuesday l'"" oo iOO morning at the home of their s rREE president, Mr*. Edward Frankon 1 / ': Bumford Avenue The board delicious buffet treat ,d ( areen Stamps met to formulate plan for the > ah w .. four Circles and the next quar SKIP TILE CLEANER terly meeting of all the circle qt. alas $1.15 to be held at the church on BORDER'S (LIMIT 2)) t .. MMn Pirak 4 IM4e Monday, March 9, at 2 p m. x n.;t ThOR attending the meeting ; I were Mr*. Lucie Keliey Mr*. CREAM CHEESE Spencer Riley, Mr. Gordon ooo't3reen I Blend, Mr. Ruth McWillUm, Mr. Wilfred Churchill Mr. John Plant. Mr*. Doll claunch \ S tamps and Mr*. Edith Peterson 3-0%. 1 Oc ; : r Ma ab wrp.r.i...o . Circle No.1 will meet Tuesday pkg t ,, SKIP TILE SEAUR March 3. at the home of , r SI,49 Mr, Frank Stubbs, 171 East P"" . .NrN WN.W.K wNNI. Ila/ , Sydney Ave. Mr. Robert In- \ flea will be in charge of the Bible Study CROSSE & BLACKWELLDAlENUT '<,s .;, :4r' . f Circle No 2 meet the following t day, March 4 with Mr. Ralph Rodgers 231 Talbot St. ROLL I , Mrs. Gordon Nixon will give the Study. We are happy-0- to welcomethe p AJAX LAUNDRY DETERGENT : following new resident to limit 2 w/ '\ Sex kin, us. $1.35 _ C ' our City of North Port Charlotte fags : Mr. and Mr*. Cecil H. can 1 0 of down produce lane ? | ; O'Connor, Grobe Street formerly $3.00 or mar 7. of Fredrick, Md.; Mr. and ; Mrs. Joseph H. Bell, Chlcopa TXX ': Street from Sommerville, N. FIRM HARD GREEN Il rRuMew. J Mam.; Mr., Malaluka and Mrs.Road Harry, from C. ; c g J7( Green Stamps] 1 Ashland, Ky.; Clyde Davis, + CABBAGE ../Md ..Atj Dorothy Avenue, from Findlay, KAISER ALUMINUM FOIL Ohio, Mr. and Mrs Charles R Breakfast Club limit( 2)) 25 ft. rail 3}. Hartung, , Deming Avenue from Ludington, Mich.: Mr MARGARINE iun 4 MM i :i end Mr*. Charles H. Stewart C i. w.en.ri 1 Miriu Road, from Cahokla, '. 111; Paul Hedyl, Grobe Street, c Mb.ctn. . from McDone'd Cleveland Agrens, Ohio; Avenue Reid W. 10 Ib.Hunt's J SOW AmI50 i James Si'llvan, Merril Street l l.x Mr. and Mr*. Arthur Herlng, Assorted Flavor* Green Stamps I South Biscayne Drive and Em. I .l*Alt MWM*W....*...k i I '- inett Weist on Midas Place. : 0 Y AI. GILA TIN Dtffclou! DECAF INSTANT COFFEE I -0- seer Mushroom Sauce 2 27 5-o*. Jar We , Member of the South County ? cane - > Epiphany Guild met last 8000000000000000000 ' Underwood BrandSardines : Monday afternoon at the Warm rcg. 5c Mineral Springs Recreation p g. "enter: for their m ,nlhly meet- . . .. .. 2 caflat m 39'Three I , "g. Plans for n imming limit 6 with purchase of $3.Ou or more Diamond Brand SOyft V CEXTRA"X'X'X'FREe UVUPURPLE o ]p.>my:: were r" > led due to Volley Broad J t ch MSGR.'1 Py weather.Cummings from PLUMS While Meat Tuna 3 ;I.;". $1 1 ( Green' : p.1; { Venice Will guest speaker at Red LabelKaro BAYER ASPIRIN TAIIETS \ the meeting. I The next meeting of the 2V2 C Syrup "tt 3VJNOTIp '00 ct. bot. 79. I ' Guild will be on Monday, 29 - 8000000000000000000 March 16 at 1:30: p.m. '. con Alaska I ( -0- The. TTrn1' rarden Club> metal Penny .o"r Pink Lotion Salmon SI 57* I :n 1,<. lues i ''Y, rve u ''I: arrt heard an D r TI5RGENT Dallelauily DifferentMinute I lil.htt.mns i '; discussion on the }) ,i I ,, Jll Oreen Stamps " care iiid+ n.n.' tenance of omol"f' Rice * t i,$ I in.'n':4' panta: in this area. $ .. .IS45 I ***.. ww. *.... I f The new committee members 3 22 oz. 1 Anorted Scent Glade tTWl SPRAT DISINFECTANT | i i iB appointed are Mr. Frank sin 7-.*. *J*. 98e _: Carroll, program chairman; Air Freshener . . .. bomb.pray 59' ...... "'........... fret, .. uw l Paul Palmeter, publicity; Bill 000000000000000000 I Thomas, beautIfication; Claude o dairy specials 1 Kean, and William , ways mean.; Et 'lIzw; McGee, membership; Breakstone' J we. VeniceShopping These committee chairmen, Broad Ir I : make plus the up officer the executive of the board.club, SOUR . . . .. ft: 39 f leIore ,' Center I Pillsbury CreieentDINNER ,. There was much discussion at the meeting concerning ROLLS 8 Florida PUDIX[ t beautification of the area . . .. ;:: 29' around City Hall. The committee Store on beautification will re VfQiioffi t ;M A K K R T 1 1 Hours: port recommendation. for this ofrorcit foods r l d' i project In March.at the next club meeting Peppe'ldg Farm' Anorted Flavor I11t n. Fn 8: n .. 9'00: Mr. Claire C. Coon. i I. president i: r of the clubCongratulation.. PARFAIT CAKES . .. .. pk rei.,. 49' f ., Sat. 8:307:00: : *- to the winning :: I team of Anna Basom and ac'cent lipton's lipton's lipton's liquid alldetergent lux Eva Macomber who cama in liquiddetergent handy-andy ; first to win the prize in the seasoning instant tea tea bags bulk tea Shuffleboard League Contest liquid cleaner B Second F'n- prize went' to the team I''M; 29 ., $133 V-r 67 v..". u.... of r.te1or'I""o and Dora .1.; Ok*. 45- ,"! 79' 57* "_. I tl.e O'D'I"I1'.., "" '" tubers of __ __ :! __ .In liePAGE 69" --- the wi J their. banquet - oa March d. ./ : ' I t i 1 GONDOLIER I PAGE E1.EVENCLftSSIFIED -- - Ideas Not Gripes April meeting of the Venice !PIII-.' Osprey y Gardens Home Owners Assn. I Elferdlnk's of { 4jar Wanted For Center Saraaota County voters will l $100,000 Liquidation Sale I \ 4 Residents of VenL-e Gardensare have an opportunity to adoptor I evr'a being urged to communicate discard the proposed new UP TO 48% OFF their suggestions for rejuvenating legislation In a referendum at activities at the the May 5 primary election. .. Recreation Center with a new r ly organized recreation com 1 f . 1ea . -- --- ,,-,-- -" mittee. Members of the committeeare Houses For Sale Mobile Homes seeking ideas on the typeof Lost entertainment and activity range m- RATES FOR SALE OR RENT 2 bed. 10x47 STEWART, 2 bedroom, Hodson SpeakerAt that would Induce more residents room home, air conditioned. ...'''''''' the Gardens of to join $100.00 month. screened patio Waterfront MAN'S BILLFOLD S t ate LUM9ER 4883626. Sunday Ch 19' R.t" both Thursday Dock. Priced reasonably Lot K.M.J. parade grounds the Recreation Assn. t COItSPAJlYMr. kM.a1.ata : d Mond.\! Editions 53, Harbor Lights, Venice. Committee member are $afl MONTHLY Please return Irntlfication I including tax. Kiwanis Club Charles Worstall for< the Ven es and insurance papers, Reward Hall Osprey S130 beoutiful buys a 10' x 48' VINDALE, ALUMI 924-3506. ice Gardens Home Owners Remodeling says . new 2 a aII1N1II bedroom home Assn. Mlddlemlss for NUM, 2 bedrooms, tiled bath, George ((12 word minimum)I No cash needed if you have, gas heat large gas (s IK. wall CONTENTS OF PI AID pocket. Adequate classrooms and Venice Gardens of Venice good credit- [ Add tieml l Word. tacit. k Realtor Phone Byron M. Markle oven. Kelvinator, aiming doors, book left at MacDonald's equipment are essential but Inc., and Mike Cappe for thesubdivision's , 488-4708. exceptional closet spii'''e and Tues., Feb. 18. Please return "the real quality of teachln home builders 1ftulld.y cabinets, TV antenn.,, n\> imgs contact lens, prescription sunglasses comes from the right kind of CASH.nd Monday Editlone FISHING, SWIMMING. BOAT. covered patio. Not new but' repainted personal papers. Ph teachers," Robert D. Hodso Cornell Club's INO. I bedroom, custom. and refurnished. 488 6197. told the Kiwanis Nice Club Thura- $$1.90 heat built home on channel. Cenlre location and wonderful neigh day In paying tribute to his Meeting Today ( =1 J Air-conditioned. Below' bora. Lot 150 or call at office fellow teachers at Venice Jun. 1 | Additional(III word i W rd minimum.. .aehCLASSIFIED ) 5e CT tea:?'5062-. Channel Lane, Nokor.ua, HARBOR LIGHTS. Legal lor Schools High and Venice High Dr.of J.Cornell L. Zwingle University, vice president will. I IBULGING Business be the guest speaker at tod'Y'1annual Personals Hodson, heed of the science WATERFRONT IN THR CITNTT lUnGE'1I CURT meeting of the Cornell Arw ': "':, ": "'=. HOME. 2 bed IN AND FOR sARAsOTA COUNTY, department at VJHS for 11 WALLS? / 11 .r .:_ Y ehm room. IM baths Club at the Azure Tides, Lido garage, TYPEWRITERS FLORIDA. IN PROBATE r the -. and Adding years, was speaker at the ,....,..N ...::. IMr.NH.A dock. Reasonable Margaret Machines mechanically IN RRt ESTATE!: OF Teacher Appreciation Beach, Sarrsota. Enclose Your Screen PorchOr .? operated 1ANDON BA-KNKS, DwMMd.ProUt. Day program 0;:::."".n: M'::'I-';..: Drive Laurel Villa. 488-2484. ) Chemically cleaned .. til. 1'... till of the club at EarlWynn't Richard W. Cooney Is club L; ,Ar r ",Ile M .1a.tII_ GULF like new Just $12.50 plus r ..5* NOTICE TO CREDITORS Steak House president. A social hour beginsat CarportNo BEACH TO ALL FRONT-3 Bdr if required. All makes CREDITORS AND PERSONS noon and lunch served at DISPLAY 3 bath, airconditioned. Completely Stationers 211 W. Venice Venic Ave, HMINt-T,iXilNIl SAID(IAJMH ESTATE: OK DEMANDS He traced development of 12:45: p.m. AU Cornell\ men worries with ORANGE STATE'S furnished. Exclusive location 488-6113 Ym .r* bmtv. BotlfM. and mulradto I the Junior High science program and women in the area are ONE STOP SERVICE One Edition, per J Inch $1.00 lOOx OO. Seawalled. No fil. any cl.lm .r dead which roil step by step from the Invited. fcrti Edition, per inch $3.50 cIty tn. By appointment only .. DON...r h.BARNES'. mlut IMtMMd the K.UW, lit..*of of LAN.B> .. days of the old Laurel School. / Quality aterials 488-4006. SHEPARD Kit*. County JOHN florid T. GRAHAM.In Ih. offle ftinuoUCounty .fHon. "At first by grouping classes Jordan To Explain / Reliable Service I All diaifitd adi payable In14v.ecs 2 Jurii*. la the gate Court according to ability we foundwe BEDROOM, completely fur. ....... Hew Homestead Bill / Experienced Workmanship e eepr established"CANCELLATION LUMBER CO. HmiM M S Florid., within illnlmdnr could do a better job of e eounllr. Warm nlshed Mineral Separate Springs. garage$10,500. 1003 N Washington Blvd. tint publlr.il.m month o front( Uin. the Roe UU.... of the teaching" he told the Kiwanis. The proposed new Home. / Prompt courteous attention Each el lra or demand mult W In "But stead Exemption law will be Russell-Rlgbv, Margarita St., Sarasota rllini.. and I. duplleaU. shill >...... after couple of yearswe explained to Venice Gardens / Up to 7 yr. financing w Phone 42 -1203. Inspection In th. pines nf mldcne* Mid fxt allies turned to the popular teach . vlted. call 4driM. of the Claim.nt. I shall .b. >wornto er-team program whereby a residents April 27 by Rep. Russell ADJUSTMENT ELLIOTT PAULfor br the Claimant/ hi. a rest. or boo attornqr team of two or teacher Jordan of Sarasota. Qibpanna state lumbar! co. for cmcilUtion ... : .ball be aooorop.nlrxl. br a II.00 more 6 quMh 3 BEDROOM ,.., Jordan, one of the authorsof frame. Corner mini anil .r inch elalm' or ihmanl taught groups up to 100 stu- E dlustment" because orLror lot, city water and; not *, filed .hall .b. sold, Th. flllnl. dents. This method the bill\ at the 1963 sessionof 0III1.t C..1i Ace.l.Mdl SIIcWy'hd lit /talk...... be mad for sewer. ROOF TRUSSES mar ba addnl. to Ui.. amount of claim.and gave every. the Florida Legislature, will .11 must Walk to school and store. $7,25( Clam' form nay b. obulnad from one a chance to do laboratorywork TkmdiT Gondolier BEFORE 30 per cent: below cost! Call Alum. Windows & Doors. .UM Caste Jud..'. stn 1.., ," he said."Recently be the guest speaker at the 1 5 p'"'. on Mondiy. For Mon- 488-1510 after 4 or weekends. Contract Roofing & Painting MARGARET AitmmlatratrlT.FAWCETT at a., nf RARNni.aa Ili. E,.. we partially returned - day Gendolier BEFORE Spia ATTRACTIVE HOME In nice Phone 488-2132) Venice .sets t of LANDON BARNES, tae >aAttornrrt to the ability grouping IReal 011 Thursday. section of Venice. Two bedrooms BRA WELL a BROWN, plan in teaching science" he baths REMODELING Repairs V.nlrNnkonla. Bank Blrt.., added. "This enabled us to ot. PHONE two screened Carpentry Masonry P. O. Bo, 74T.Vmlm tee accelerated classes in bl. THRU THE and . porch carport, 1001 Nokomis Florida.Fnbll.li ' Ave, So., Venice, $14,000. Painting. Interior and exterior. I F.... IT 14 and Man t. t, 10(4 ology and physical science 488-3125 Quality work. with " Low down payment. No closing Phone 488-6395 ample laboratory work. costs. Call 488670LBEAUTIFUL Hodson said that next year Estate Dressmaking, alterations, draperies IN THE COUNTY JITDniPS COURT etc reasonable 488-1130 IN AND FOR SARASOTA COUNTY, they Intend to eliminate more jj I Real Estate SWIMMING Pool FLORIDA. IN PROBATE of the teacher-team program, : home. :2 bedrooms, den, Floret Personal IV RBi ESTATE OF and while still keeping the accelerated . RAIL FRONTAGE TO CA. a room. 21x31 screened patio. IIU,0 11. LUX, Deuaatd.ProhaU. science program, to NAL. 8 adjoining lots with Furnished if desired. Good dnlncing. ALCOHOLICS ANONYMOUS, File N... '.If Initiate a two-pronged science Corner JJ)1) etch on newlylaned 2102 Georgia Ave., Englewood Mondays 8 p.m., St. Mark's NOTICE TO CREDITORS PFRSONS program that will aid those xI TO AIL CREDITORS AND runlimi Trail (U.S. 41)\) with Grove City. Episcopal Church Parish Hall. HAVING CLAIMS OR DEMANDS preparing for college as well .pthi ranging from 923' to Call 4il8-4794 AGAINST SAID ESTATE!: as those who desire the vocational I YOUR GUIDE TO BETTER HOMES .. ..... .. . 3' backing up to 60' wide 5 Y ar. b. aotlflM aid r itilra4 training. GOLDEN BEACH near gulf to file claim. demand whlrh ate or yoamay IMP canal with access to Inter- Help WantedREAL h.v. analnat u.. fcuu" of HUGOH. Hodson said the county AND LOT VALUES Ul waterway, zoned R3. Two bedroom., two bathe IUX. Doroand., lata of fiaraantai school board had been generous - led! sites for motel rest au. I 30 foot Florida I C.",. Florida In Iha offleo of room ESTATE SALESMANwith to,,. JOHN T. GRAHAM. Saraaotabounty In furnishing the Junior ant, marina, filling station en 112 ft. comer lot. license. Full time only. Jad..... In tha County Court, High with equipment and with w>pi and to forth. This li the I. 519 GULF STREET Englewood Realty Co., 474-1985 calendar louaa at month Saranota.from Flnr'da the ,date within. of Ux all the: new science classroom r-ifl frontage of Sorrento or 474-2569. lint publication of this Notion that have been promised for lorn. Will lieU one lot or alls \ --- Faob: claim. or demand mod .ba m the: 1964-65 school year, the MODEL HOUSE 2 BLOCKS TO Ion for 12.000 each WANTED Young man between stun, and In diipllrat.l I .hall a.... local school can look forwardto Venice Downtown Homes For Trade the of rMliWnca and ofrico Venice 20-30 Must plae poet In East ages -mil Phone Venice 488-5027, yrs. odd_ of the Claimant. t ahall ho seen onother very successful i riut Sorrento Shores Sales be> high school graduate. Field to by see Claimant hla amt or hi. .o. year. 2 BEDROOMS I BATHSO' :"1Ct located 4 miles N. of WILL TRADE HOMES. 2 Bed representative for local finance h"n.y; .hall .b. atcompanM. by a II.M :3 Bedrooms, 2 Baths City Water Lot ... i 120' fillet f and any aueh elah..e' d..4 Paved StreetCentrallyducted itnice. 9 miles S. of Sarasota. room, 1V4 baths, CB home, company. For appointment call not an pled .hall ... n>ld. The flllna; fw Formica Kitchen large lot on deep canal with Mr. Toler 4885266.Situation may. bo addod to u.. amount of rlaim, Carport & Utility Gas HeatPrepaired TOTAL PRICE $10,90000 dock in Laurel Villa, for comparable and sidle forma may" ha obtajnod ems Safety Course Screened Porch for Air. MALL TRACT IN GROVE. U>. County I ad"'. offlr H. N. WIMMERS or larger home in Venice Comer Lot 85 ISO conditioning i Ure enough for thlrt n WantedLADY MAtTDB A. LUX REALTOR Phone 4882464. -u with 15,000 aq. ft. in each. area aa E:>o>utri> of tha BMato * 'algid R-l. On county mainlined BOOKKEEPER full of HUGO H. LVT, D......... By FlotillaAn 221 W. Miami Ave. GULF COAST DEVELOPMENT 488-5308 For Sale street 200 ft. West of Apts. charge. Rapid typist. Excel. Atton. BRASWELL BROWN 'amlami Trail 3\4 miles Vmlot-Nokomli Bank Bide, 4886413INTERESTED lent references. Permanent res- of Venice DELUXE CO-OP. bedroom. 1 P. O. Box 77, weeks In IA or H ml, South dent 4R8-54B8 mornings eight course bath and bedroom 2 bath . 2 , Vanlca Florid. safe Sorrento boating will be Shores. $19,000 --- -- practices furnished or partly furnished. Punlbh: Fab.. IT. tl and Mar. *. e. IW4 ' '1'1III. Call W. L. Sutherland, 488-M98 Misc. For Sale offered by the Venice Flotillaof 8 Suite Apartment Furnished, min 483-5027 or 488-2791.III the Coast Guard Auxiliary City of Venice. Each suite has Rentals CHEST ON CHEST, 40 in. Meeting Called Beginning Monday, March 9, living room, bedroom, kitchen . FT.111I1, ON (INKS* LOT Ann'T ... blond, 4 drawer; matching at Venice Bay Trailer Park. ? and bath Rents for $750 GUwonn. iwnuNA BANK AVB.INQT'UE OPPOSITE TEL 1 BEDROOM<<. I'NrtB. IN VENICE night stand; full\ size head. GoldensteinPlans The course of Instruction willbe a season. 8 times $750 means (" "Mm 01 TOl'* PIIORER. OK A Sl'BlRRAN IN .HO. TBNICS board.> Phone between 4-7 p.m. By open to the public, with $6,000.00. Paved treat city JUST CALL. LOU JACOBS 4M-I5IT 488 -5121 classes scheduled for 7.30 Lots For Sale I MODERN, airconditioned for a meeting of all\ m, every Monday at the: trail.p. H. N. Wfrnmers Reolfor water end Will sell CASH AND CARRYI! for $21,000. $2,100 down. stores available in South year-round South County residents er park auditorium. |I OR I LOTS in South Venice. : Venice Shopping Center. For Inexpensive unfinished cabinets of the Jewish faith 13 Included in the course will REAL ESTATE AND INSURANCEAgent This could b* a handy man's High and dry, with trees. Information call 4885858. for kitchens, utility tears of age and over, "for the be classes in practical sea for Wetter Union Telegraph gold nugget aeonabla Phone Englewoodlariat rooms, etc Wide selection of benefIt of the community"have manship, rules of the road, legal REASONABLY PRICED two sizes been announced by Paul requirements of a boater, Monday thru Friday 9 to 5; Saturday to I Martin S. Stancik bedroom, furnished home VENICE MILLWORK Goldenstein. chart reading, buoys and mark CLOSED SUNDAYS |tao mraovEn BAT FRONT TATS Private Gulf beach. April-No Air Base 488-6213 Goldenstein asked that all ers and much other informs- REALTOR II. 8UBW VISION. HELP KEEP VENICE CLEAN vember. 4881015. 'ewlsh interested in ion IJIUCIWOOD BATOIt PRIVATE NEW 4 USED GARAGE persons designed to making boat. Venice 488-5443 altar: IIILIP. INGLIWOOD, PHONE J 2 bedroomsand EQUIPMENT. undertaking a community proJect ind a safer pasttime. . BEDROOMS or Hydraulic Jack te Lubrication to be decided upon by the The course will be free except Florida room living r plTH VENICE, 80x100 on Al- ; Equipment Renairs. group: contact him by calling : for a small charge for a . I lifitor Canal. Any reasonW room w/FP: extra utility room. TRI-COUNTY 88-5331 and giving a first and textbook. It is open to all persons . ; In city children or pets Ok EQUIPT CO second choice of and Lovely 2 bedroom CB home ( offer. Phone 488-5052. 1070 DeSoto Rd. a day whether or not they owna month. 4885528 after , 5 $75.00 Sarasota, Fla. hour for the meeting. boat. NEW with Fla. room, screened PATERFRONT LOT IN SOR- p.m. Call collect 335.1240 breezeway, carport, corner RENTO SHORES, 5300. LARGE APARTMENT by 3 BEDROOM 2 BATH HOME lot 120' i 100'. Landscaped./ :filllt.ct Ward Sutherland Ven- month or year. Trallview, Auto For Sale Centrally Located Completely furnished Including - li'te5027 or 4882791. 1000 sq.' ft. Vacant March 1, CITY WATER, SEWER AND PAVED STREETS stove, refrigerator, washing . 3.OT5t2 Venice Gardens Price 1964. E. Tampa St. Tel. 488- ONE 1958 BELVEDERE PLYMOUTH bestwayJANITOR t machine, lawn mower, 11.850. Write Walter Polskl, 1321 forenoon. 2 door, hardtop. $2,000 DOWN etc. Owner leaving Said sell if Wrd Ave., No. St. Peters- New paint Job. A-l condition. :,orb, Fla. MODERN FURNISHED 2 Guaranteed. Reason for sellingtoo SERVICE $104 PER MONTH TO QUALIFIED BUYER $10,895. rooms, bath. Central ducted many cars 154 Hudson OllR AI.IO, a swims or mts I.OTS heat cedar closets, electric Rd. 48ft-5260. W. Specialize In FRANK C. RAEBURN H. P. HORN VENICE Bl'BINBSS SITES basis kitchen. Adults. Yearly , OWN I.. LOU JACOBS 4HutaiC $60 month. Write P. O. Box Boats For Sale RESIDENTIAL SERVICE REALTOR REALTOR | INLET Seawalled priv1 1302, Venice.MODERN. Also Commercial 251 W Venice Ave. Phones: 488160488264 PHONE 488-3785 ANYTIMEU.S. .H boat basins E. L. Kilton, ONE 14-ft. GLASPAR Outboard WASHING OF EAVES . r .r.bol't Drive Nokomis FURNISHED 4 with 25 h.p. electric Johnson. 41 end Albee Rd. WASHING rooms, bath, electric kitchen, WINDOWS AND SCREENS A Nokomis Marine 483- FIVER LOT Venice. Good for cedar closets, central duct 4607. Ways, r COMPLETE FLOOR CARE ncation cottage. Sacrifice heating, airconditioninir. Adults f: 11.500 Call 34-S4M Sara' Yearly basis, .1J1 month. Write MEYERS ALL ALUMINUM Washing Waxing Buffing e ...... ." P.O. Box 13"2 Venice. 12.ft. fishing boat. Handles 5 FREE ESTIMATES i SOIlTH H VENICE: 1 prime DELUXE 2 BEDROOMS, 2 h.p. motor. 550 Ib. capacity, All WORK GUARANTEEDAll I EAST GATE wmesites near beach Low. baths, complete, by season or oars included. 18-inch deoth. our equipment Is NEW for fetter, ES'II CHOICE LOTS I? ,Wees Box 800. Rt. I.gggtta year 100 The Esplanade, 488- 48-inch 1885 Revenna beam. R.St.P., Stull Nokomis\, Box better and more efficient work I 1 Min. 85 feet wide Springs. rUIJJousesFor. 5698. East I GERALD W, CONEY, Owner and Manager SEE or CALL Sale0pA.VSVR CASEY KEY on the Gulf. 2 12-FT. GULF LINER 7 h.p. Box 287, Nokomis Phone 488.3392 LARRY REDFORD a.naoolf. bedroom furnished house Johnson Motor. Excellent Licensed and Insured IT'S A HONEY FOR THE MONEY A woe. AN UNFUB IN SO IN, VRNHB.VBNKtRj Screened porch. 488-1333, 488- condition. $150. Phone 488-S052. Member Chamber of Commerce i| CHIPS JOHNSON J1Ar.CALL LOU JACOBS. 451.11,1 2151. 3 BEDROOM HOME, CITY OF VENICE I Real Estate 'BEDROOM CBS Home, heat, FOR RENTALS Stores Also Located In 306 W. Venice Ave. conditioned, extra large In Venice Area BRADENTON and FORT MYERS TIRES ARGE LOT LARGE TREESI! Your own picnic qreundi. Phone 488.3609-488.2241 carport. utility and screened See City water and sewer Garbage Disposal, Automatic Water wch. Better than new, has all Get More Mileage... NEW MOHAWKS Softner on paved street. Best section of' town. Zl'tt'300 cash will handle, CHIPS JOHNSON USED TIRES. ALL SIZES LOT ALONE WORTH $5,000. YOU CAN payments Realtor Costs. S695 $37.30 month. Owner Cut Tire ,. GUARANTEED RETREADS cItariottEEPTIONAL 1 11$ :: Ave.- North Port 30U W Venire Av 4M-M78 1 AS LOW AS . ... .. .. .. ... a 14 BUY THIS LARGE HOME C1Q QQIt WHETHER YOU'REBUYING Mobile Homes EXCELLENT TERMS. FOR ONLY VIWjVWM o C6t t VALUE, by RADIATORS t t WHY WAIT MOVE IN NOW! OR 'w", r. 1 bedroom, :2 baths WHITLEY, 85-ft. Will accept i ii iy SELLINGYou're ?ntral' heating, Mock and beet offer or sell for Blue REPAIRED FLUSHED 't, ti Best Values Are 2 IlIIa oonstr,. Uon. 4 blocks Book figure Phone for appointment y Warm Mineral Sorings Area Vacuum e NEW REBUILT USED Found HEREI! PPlng 4885033. Kirby ''I center.: City water HOWL Home. $400. Down. Monthly H"Ir, 3 Bedroom LIKE NEW! $67 $15,000 Phone 488MODELCharm- Co. g J'. 34i4. Budget Terms Payments Including'! Interest and Principal. ho BUILDER'S I : bell room.PERMANENT for sale Completely, with MOBILE 11x24 furnished.Florida Home S VENICE TIRE & RADIATOR CHIPS JOHNSON realtor at utility room W. Venice Ave. Phone 488-2?" 306 "biUntlal saving Also garage I Venice Ch covered patio in Serving For 5 Year : bJlen8lSa..Just, south of Pres-: washer-ironer.Covered boot well. Very y 313 IAMPA AVE., VENICE FLA. BEHIND THEATRE or within I walkAl1 rear Branch Office at Kent Motel, Phone : dl'h, reasonable 1908 Ravenna StiNokonUfEwt. Phn 483-1259 'In the 'TewerUti" Garage Of ehopFtng cen-: . .-- 11.&to... __ I I !: s I.THE . ? MONDAY, MARCH 2, |19( PAGE TWELVE THE GONDOLIER I ------.;, _ KMI Eliminated ,I Indians LoseIn r Osprey. Oracle I From TourneyBy Tournament By BETTY KAUf'FMAN The sooner the better realize how many Wowl Little did this new correspondent The GONDOLIER has , about Osprey fc SarasotaKMI Opener, 74-47 people are .0 eager, earnest and enthusiastic Residents and lIon.re.ldents some stiff competition in . its trials, tribulations and pos.ibihtle. ot the raleed-eyebrow Osprey area since the n,.j( ended Its 1964 basket Hot-shooting North Fort My- alike, have evidently had enough to work and fight for the of December, when the Ospr Venice 74.47 Fri treatment and are ready and willing 4 H girls and boys ball season Thursday night at era whipped the center ot Sarasota County started pi Sarasota as the Sailors eliminated day night at Punta Gorda in future of this small community lication of the Osprey 4 the Kaydeta from further .E' the opening' round of the ClassA coast line. It has been most prey PTA; TrIStaU Trailer Round.Up, Osprey's own co, tournament competition by ,=: Group 12 basketball tourney. gratifying and encouraging to Park Venetian Pools; Nan's munity newspaper! The edit\ ; pouting a 64-33 triumph In the Playing without the services hear from so many people who Gift Shop To fill the quota of are Karen Kauffman and Ri opening game of the Group II. starting center Sam Morgan, hope this column can continue, U players, two more sponsorsare Reardon and they are do, Class AA tournamentA who was out of action because needed See Joseph La- a wonderful 'job on this big Sailor fourth quarterwas ot illness, Venice was able to There are two churches In France if you wish to becomea weekly publication. The Ii| the difference ai the winners nailm keep pace during the first Osprey the First Baptist for this team. write the news, formulate t tallied 20 point while ao M9)..ab quarter but fell far behind in Church with 150 regular members sponsor editorial material, solicit t' holding KMI to nine, Sarasota 4 the second and third quarters.The and the Rev. Edward announced last advertising and roll the prei y r was out In front 35.24, at half. Red Knlh1s( from North Owens as pastor, and the First Clyde Bristol the Fellowship of the es. The boys take care of U! time but the Kaydets rallied Fort Myers led after the open Church of God with 67 members week that of God will build circulation of approximate' & for 20 points In the third per r ing period, 15-11 The Indians and the Rev. Charles W First Church Senior Lea- 100 copies of each publloatl for the iod to knot the count at 44-44 .rrrrrw 'Iz hit for two quick baskets at Jones as pastor. Many Catholic the dugouts Little League at five cents per copy Th' (', going into the final qu tor ? : a the start of the second quarter residents belong to the Church gue portion of the thanks are In have several regular subset, In the fourth stanza with the 1iEL while North Fort Myera garnered of the Epiphany In Venice of Field Many men I Rev. era Mrs Catherine Lou !core tied at 50.all Sarasota one to narrow the countto which Msgr. George W. Cummings order for these Baptist County Home Demomtrat''! of the First racked up 10 straight point 1715. But from this pointon is pastor, Other denominations Owens the Farm Agent, reports that, to b I end KMI was never able to It was the Red Knights on attend services In either Church will manage knowledge this Is the only 4 r recoup from the deficit top without any trouble.It Sarasota or Venice. This Team this year. group In the state who I I. pu The Sailors had three man In was 33-19 at the half and spiritual outlook together with -0- lishing a regular newspaper::> double figures Jeff Hipson hit 55.28 after three quarters. The the Osprey Elementary School Square dances are being held Hats off to the Osprey COMmunity for 19, Eddie Morton had 15 Indians matched the Red and its attendance of 152 students every Thursday evening at 8 4-H Club and the and Ron Blackburn t) John Knights In point making in the is the heartbeat of Os pm in the recreation hall. leader, Mrs. Geneva Reardon' Waller paced the KI.vdet attack final period as both teams hit prey.Economically. Last Thursday evening, 64 - with 14. while Roy Lagen- : for 19. square dance enthusiasts attended Beginning March 1, the Sun our registered 11 I : TroublesTo there are this popular event. day School of the First Churt KMI: Lagenaur 3.1ItTonerav ) Foul needs in Osprey The writer The, regular meeting" of the of God will\ launch an attein add to Venice's woes, has been asked by several is Recreation Assn. ance campaign. The 4-0-8; McGowan 2 0- Osprey campal;' I 4; McCray, 3.0Cooke 0 i .H44JL three players were lost via the businessmen of the community scheduled tonight at 7:30: at the will take the theme Hike th Burns, 1-1-3 Waller 5-4-14 foul route Tom Landgraf committed to urge and encourage the hall. All members, residentsand Kite to Sunday School" i ; his fifth foul In the sec formation of an Osprey Development friends Interested are urged Each Sunday the kite Sharpe, 0, Prewitt S.0-4, Ve. w. a ond quarter, Bruce Byrd was Association. This will be a to attend There rise or fall according to *T, 11.3, Cockrell, 0 Totals sidelined in the third period of organization needs atten type x 7.58. report on the dock, the tennis ance. The men and boys w. and Ken Ringo in the fourth. leadership and promotion. Eco- court and the speed limit on U. oppose the ladies and girls lo Sarasota + .rwwr Hipnon 9.1.19 Ringo was leading Venice In nomic leaders is th w now S. 41 at this meeting.We honors A June picnic will t h Prilchard 3-39 Cabak 2.0.4, scoring with 10 points when he time for you to come out of the the reward for the received prelimi have a wmmni Blackburn S-l-11\ : Morton 7-1 ( .p. fouled out. bushes and let the area know limit team. : 16! ; Carey, I.ORuh 1-02() asryy ro Jim Sikora ended the game you are ready to work for civic nary report on the speed Mushrush 1-0.2 Ramsey 0' mss as high point man for the Indiana development. Don't hide your from Abe Cornell, aide to Rep. -0- HarD"eanes, 0 Totals 29-6.64 e a ,. with 14 followed by Rin- light under a barrel. Osprey Jack Hasson. Hasson went to The often-delivered lecture l by Russell H. Conwell > for the reduced speed limit called p s si with 10 Bob Harrison bat KMI .. I u 12209-.f3 go was needs you a dedicated you! it to 'I "Acres of Diamonds" in by bringing mijht next with nine and Jack Osprey The Recreation Assn Sarasota IS 20 9 20--64 Osprey well be State Road symbolic of the of Wright, up from the 'jayvees, has offered the use of the recreation the attention Osprey 1I".JfoIIIW. hit for six all in the final hall as meeting place Department in Tallahassee Each time one of the char. a last week. He asked for Immediate acters in this wonderful ston quarter. fl Ilferdmk's: of Osprey The loss ended the season for Civic for any Development group interested Association in a action to reduce the looked far-afleld for hu for Venice. The win put North I of this type, speed to at least 45 m p.h. approaching -\' tune he was unable to find j $100,000 Liquidation Sale I Fort Myers in the finals i I Philip Smashey long-time and through the village -.elsewhere had been at dome i ('P TO 49"% OFF against Charlotte High, win. Osprey resident and ardent I Thank you, Mr Cornell. I I right in his own back yirdINCOME . ners over Naples, 8371 booster, reports that there are I ..-. R\'P';. _. .e w..1 VENICE Landgraf, 1-02() ; 36 business entities in the area I I VENICE HIGH SCHOOL GOLF TEAM Off son and Danny Kiehl; second row, Ken Walk. Sikora, 54-14; Ringo, 3410; From North Creek to South ..-..0 to a /good start against other county hijh; er and Martin Satava. David Bowles was not Byrd, 1-0-2, Harrison, 3.3.9; Creek Yet the village needs a F.ST CLAIMSERVICE schools) is the Indian [ It team, coached by present when the picture was taken. Recent Green, ((1..2-2; Satava, 0, Bowd- shopping center, barber shop, [ 8b Athletic Director Bill Smith, who Is shown victories include a win over KMI, Sarasotaand len, 102; Wright, 306. Totals, pharmacy, launderette, etc. ,......., I here with tour members of the five.man Riverview in a four-way meet 17-13-47. Professionally, Osprey needs Call: team. The team from left, front, Bill John- (GONDOLIER PHOTO by Bob Obendorf) NORTH FORT MYERS a general medical practitioner, I l"7 u!5KTmi HUGH Schroder, 1-0-2() ; Estes, 0, Mc. a dentist, an attorney's office 1 ."..1It1 COM'''' McPHERSON MORE PKOPLE ARE Evans, 75.19; Watson, 0, Swallow and a real estate office. Theseare TAX P59-137 488.6567 StBSCRIBINO TO AND Nancy Malone Captures WGA 6.6.18; Volmar, 0; Thomas just a few of the alms of RE4DING THE 43-lIj; Bartlett, 0-22; Mitchell enterprising residents. GONDOLIERWOLFER -- Weekly Event At Lake Venice 74.18; Wizcnroad, 2-04() - Totals, 2720-74( Osprey Recreation Assocla- MOTORS Inc. Venice 11 89 19-47 tion officials have announced RETURNSPrepared Nancy Malone took honors in ors with 34 s. E Smith and B. N Ft. Myers 15 18 22 19-74 that in order to defray expenses - RAMBLER DODGEMS the 18-hole division of the eclestic Stewart were runners-up with36's in the improvement and r S. Temiaml Trail 488.3965-488.6150 tournament held Wed. maintenance of the Recreation SPECIALIST IN. Field, the entire park will be By nesday at Lake Venice Golf Betty Shaughnessy scored Motor Home' Is named in honor of the S Brake Repair Lubricate Challis person S Front End Alignment Oil Change Club by the Lake Venice Women a 34 to win in Class B, while who will donate $1,000 to this Former Internal Revenue Agent Golf Asan. with a net Pauline Rayburn was second worthy youthful .. Front Wheel End Balancing Overhaul .. Adjust Electrical Headlights Repairs Beam score a of 70. In the runnerup with a 38. Class C honors went Big Travel HitIt's The following merchants cause. are. JOHN T. GALLAGHER sponsoring the Osprey Merhants Engine Overhaul Any Automatic or Standard spot with a 72 was Rella Beigh- to Amelia Muck with a 35. Little League Team this was Hazel McClynn 729 C N. TAMIAMI DRIVE Runnerup the Radio Repairs Transmission Repair cv biggest travel news year! Tacheny's Grocery ; ENGINE TUNING BY ELECTRONIC EQUIPMENT In the nine-hole division with 36.Qualifying. in 1964 the Dodge Motor Franklin' A. Smith, plumber; PORT CHARLOTTE Airconditioninq Installation c ii;, ACI' Ton "non and Frankye I for the club championship I Home. This handsome, beautifully 'oung'i Nursery; Townsend Repairs and I Prwol! nod for Clan A non will begin Wednesday equipped vehicle means Construction; Webster's Nursery NA 5.6534 that "where "ever you go ; Bob's Used Auto Parts; 22 YEARS EXPERIENCE you're home. 'ibb's Used Cars; Elferdmk'sf For two days, Monday and Osprey Hoosier Inn; Os. '--- Tuesday, the Motor Home will ..._ -.. "- .r. 7 SPECIAL. AN NOVCEENT be on display at Wolfer Motors, Inc at 915 South Trail. There will a be full Dodge Wolfer representativesand sales force SEE THE ALL NEW To Introduce the 1964- Bums on hand to to provide those interested.The all the information . Motor Home Is an entirely new concept in the world of travel It is ideal for many DodgeMOTOR "TF EE WHEELER"AT uses, vacationing, touring, hunting, fishing and skiing and is as self-contained as a home can be with all the comfortsand LOW LOW PRICES conveniences.You . , can nap, cook or eat while you roll along the high HOME ways. It 1 is equipped with bathroom : running water and refrigeration that all work while you travel. t : Special l interiors Include ones : Designed For ; e : EXCLUSIVE of washable textured walls, walnut paneling and all-nylon i Those From t8l DEALER upholstering and it can be - i manufactured to a modified or II I .. FOR special specifications so that it can be used as a show room, 4i IN 'Jr,, i, ttr SOUTHSARASOTA sales This room I is a and YEAR other.ROUND use. j ' ; I ALL-WEATHER wheels. No matter where home you on ;; 1 COUNTY pull off the road you can relaxin ',. !wr'w spacious comfort. . Everyone is welcome; everyone - is invited to see the Dodge I Motor Horn on display both I days from a aim until 6 p.m Monday & Tuesday, March 3 & 4.8 a.m.lo 6 p.m. A NEW CONCEPT IN FAMILY TRANSPORTATION . (V' *i. II I Mrs. Gomott Wins WHEREVER YOU GO YOU'RE HOME 1 II FOR ALL AGES Quad City Event I '. I I A FEW OF MANY FINE FEATURES SPECIFICATIONS VENICE EAST: Catherine The Dodge Motor Home a modem magic carpet that sleeps UP 00eight Gomatt was the winner of the A rolling home as telf-contained as any home can be. Ideal for vacationing, Free Rear Aile I Paper Delivery Wheeling Quad City Women's Golf Assn. touring, hunting, fishing, , I Hospitals Rear Reflector weekly tournament Tuesdaywith s iing. A rolling home "without equal for comfort and Small Package Delivery Sturdy, Lightweight Construction a net 60. eonvemenc *. Carries passenger ear license In most itate, can go anywhere.There . Cycle Club. Front Wheel Caliper BrakeShopping Irene Paulton, Mabel Callahan . English Style, Easy To Peddle Sires. and Genevieve Balmer I. VnJ'. of comfort options to pick! from. The Motor Hoots were runners up in a three-way has 200 hp. . Trailer Part Transportation Large Basket tie with net 6 Interplant Delivering of Supplies Delui SeatHeavy brake are all standard equipment to ,make driving supremely easy. Ideal For Senior Citizens . Duty Bearings It's easy to enter The GON- Healthful Exercise One Tear Warranty On Mechanical Parts DOLIER'S 14,MO contest. Just -u-NlV00S"VpUVl'iUyou, roll along It highway! spe.eI. Bathroom, turn to the advertisement! all in work WHILE YOU TRAVEL OPTIONAL FEATURES TO CONSIDER this Issue, clip the ENTR Lights Rear Fend.rs BLANK and send It in or come 'p Horns Locks to the office and enter. I Umbrella Speedometer \ WOLFER MOTORS INC. And other available at extra cost for an *3 Speed Rear Axle Optional Extra enjoyableday GOLF , AVAILABLE AT YOUR "BICYCLE" HEADQUARTERS THE FRIENDLY of 915 South Trail, Venice. Phone 488-6150 '1\\ WESTERN AUTO SERVICE SARASOTAGOLF TRY CLUB Everyone Welcome. 488-3962 t I West Venice Avenue Across from Venice-Nokomis Bank DAILY FEES .GREENV'e00.E. $ Dodge representative will accompany: tU unit, and a full Phone 488.3516 Just Off Bee Ridge Rd. I South of Sarasota Wolf.r Sales Force will 1 I:;>, On. hand to assist; ------- ----- -- -'" - r 1 t 4 Contact Us | Permissions | Preferences | Technical Aspects | Statistics | Internal | Privacy Policy © 2004 - 2011 University of Florida George A. Smathers Libraries.All rights reserved. Acceptable Use, Copyright, and Disclaimer Statement Powered by SobekCM
http://ufdc.ufl.edu/UF00079934/00177
CC-MAIN-2017-34
refinedweb
32,683
75
The Miami Student VOLUME 138 NO. 55 Oldest university newspaper in the United States, established 1826 Tuesday, April 26, 2011 MIAMI UNIVERSITY OXFORD, OHIO In 1981, The Miami Student reported the Miami University Faculty Association had sent a letter to faculty and administrators claiming the new dormitory being built on Western Campus was being paid for by illegally obtained funds. Remembering ‘Uncle Phil’ Phillip R. Shriver 1922-2011 CONTRIBUTED BY MIAMI UNIVERSITY ARCHIVES By Sam Kay Editor in Chief President Emeritus Phillip Raymond Shriver (1922-2011) died Saturday evening in Oxford at the age of 88. He was Miami University’s second-longest serving president and oversaw a remarkable period of growth for the university. During his 16 years as president from 1965-1981, Miami opened campuses in Middletown, Hamilton and Luxembourg. Thirty new buildings were constructed and the Western College for Women was merged with Miami, adding another 12 buildings. Miami’s first 10 doctoral programs were introduced and enrollment was nearly doubled to approximately its current levels. Shriver was born in Cleveland, Ohio, August 16, 1922 to Raymond Shriver and C. Ruth Smith Shriver. He graduated from Cleveland’s John Adams High School, graduated from Yale University in 1943, earned his Masters at Harvard University and his Doctorate from Columbia University. He saw action as a junior officer aboard the destroyer U.S.S. Murray in the Pacific Theatre during World War II and was inducted into the Ohio Veterans Hall of Fame in 2009. Shriver began his career as a teacher in 1946 at Kent State University, eventually becoming dean of the College of Arts and Sciences before becoming Miami’s 17th president in 1965 at the age of 42. He authored or co-authored seven books and more than 200 articles. He served as Chairman of the Board of the Federal Reserve Bank of Cincinnati, President of the Ohio 50 years of teaching, “Many a time Historical Society and the Ohio he has explained that continuing to Academy of History. He was an ac- teach at least one course each year has tive member of the Oxford Rotary served to maintain communication Club and Presbyterian church, and with students and to preserve his feel had a lifelong association with the for the classroom. The more nearly those two goals can be achieved … Delta Upsilon fraternity. He is survived by his wife of the more fully the entire campus is a classroom.” 67 years, Martha Professor of hisDamaris Nye, their “He had this tory Curt Ellison, five children, Caroamazing ability to editor of Miami lyn Shaul, Susan, Melinda Williams, tell stories ... (his University: BicenDarcy and Raystudents) hung on tennial Perspectives said Shriver always mond Scott II, eight every word.” placed great emphagrandchildren and sis on understanding four great-grandGREGORY MARRKO the classroom. children. STUDENT OF PHILLIP SHRIVER “He believed The family plans CLASS OF 1978 that administrators to have a private should be in the burial and a public classroom,” Ellison said. “The deans memorial service will be held at a he appointed would teach regularly.” later date. Before he took over the history of Miami course following Shriver’s re‘His greatest joy was tirement from teaching in 1998, Ellithe classroom’ son sat in on one of Shriver’s classes. “The room was filled, he drew Shriver was a lifelong educator. He people from all over the campus,” Eltaught a class in each of his 52 years lison said. “On one occasion, Shriver but one in higher education. Even read stories and aphorisms from the during his 16 years as president of McGuffey Reader,” hardly edge-ofMiami, he taught courses on Miami seat material. But Ellison said the and Ohio history. class sat in rapt attention. “His greatest joy was the class“You could hear a pin drop,” room. He was a teacher,” said his Ellison said. daughter, Darcy Shriver, class or “He was a storyteller with a talent 1975. “He loved students, and he or a genius for putting together a story was here for all of you, because you that captured a distinctive identity for are Miami.” the campus and made you feel like Those who knew him say his abili- you were a part of that legacy.” ties as a historian and a storyteller set Gregory Marrko, class of 1978, him apart as a remarkable educator. took Shriver’s Ohio history course, Robert Howard (d. 1998) wrote in which met once a week for five hours 1997, for an event marking Shriver’s when Marrko took it. “He had this amazing ability to tell stories,” Marrko said. “He was so good that at the end of a very long lecture session, he would start one of his stories about five minutes before class was supposed to end, go on for 20, 30 minutes, but nobody would move. They hung on every word.” Marrko said Shriver was down to earth as a teacher and tolerated the occasional practical joke. Once students had pizza delivered to class. Another night, students covered the map of Ohio Shriver would pull down at the beginning of every class with a Playboy centerfold. When Shriver pulled down the map that night, realizing what had happened, he blushed a deep red and immediately put the map away. “Well, you certainly can’t say we haven’t covered Ohio well tonight!” he said. Shriver began teaching Ohio wSee SHRIVER, page 12 CONTRIBUTED BY MIAMI UNIVERSITY ARCHIVES Shriver fishing with John Aigler (right) July, 1981. Shriver caught two fish, the larger of which weighed five pounds and was 26 inches long. 2 Campus Tuesday April 26, 2011 NEWS BRIEFS MU localizes dining hall food Part one of a two-part series exploring ethical food choices Professor speaks about battling germs By Allison McGillivray Professor at the University of British Columbia and researcher of microbiology, Brett Finlay, will present “Battling the Bugs: Confronting the Microbial Menace” for the annual Orton Stark lecture Wednesday. Finlay is internationally recognized for his research and work in host-pathogen interactions at the molecular level. His laboratory studies pathogenic bacteria, especially Salmonella and E. coli interactions with host cells. He is a Fellow of the Royal Society of Canada as well as the University of British Columbia Peter Wall Distinguished Professor. Numerous awards have been given to him including the E.W.R. Steacie Prize and the Canadian Killam Health Sciences Prize. The event is 4:15 p.m. in 116 Pearson Hall and is free and open to the public. Finlay will also give a research seminar called “The Role of the Microbiota in Enteric Infectious Diseases” 11 a.m. Thursday in 218 Pearson Hall. For The Miami Student Some Miami University students are becoming more conscious of the food they consume and campus dining halls are trying to keep up with this trend Miami has always purchased from local farmers, but buying local has become an even larger focus, according to Jon Brubacher, manger of purchasing at the Demske Culinary Support Center. “There has been more of a focus on local purchasing over the past four to five years, especially in the area of fresh produce,” Brubacher said. “I think this is a trend that is being seen across the entire food service industry including restaurants, grocery stores and university food service. To many people, buying local is a win-win in the fact that it not only decreases their individual carbon footprint, but at the same time, it helps to boost their local economy” Miami is a community that sees value in this increased awareness of environmental, ethical and nutritional food issues, said Nancy Parkinson, a professor and registered nutritionist. “I think (Miami)’s a pretty health conscious university,” Parkinson said. “Our fundamentals of nutrition classes are always full every semester and we are having more students outside the department, outside of the major, wanting to take nutrition courses.” Interest in food health is evolving and Americans are becoming more aware of the food they eat at an earlier age said junior dietetics major Elizabeth McEwen. “Even going to the elementary schools you are even Firm gives second grant to business school KMPG, a global audit, tax and advisory firm will be giving Miami University’s Center for Business, Excellence, located in the Farmer School of Business a three year grant of $120,000. This is the second grant from KMPG designed to support curriculum development and brings KMPG’s total commitment to Miami to $240,000. The grant will fund the development of course modules that include course notes, slides, case studies, suggested speakers and activities for classes. The grant will fund a new administrative position to implement the modules within and outside Miami. The James Lewis Family Miami Mock Trial team placed sixth in the nation at the American Mock Trial Association National Championship Tournament held April 15 through 17 in Des Moines, Iowa. Miami junior Pavel Gurevich won the All-American Witness Award. Forty-eight teams competed in the national tournament, narrowed down form the original 550 teams that began in the competition. Before moving on to the national championship, the mock trial team won its 13th consecutive regional championship in February. The team is directed by Daniel Herron, professor of business legal studies. Editor Amanda Seitz specialreports@miamistudent.net SPECIAL REPORTS FYI Mock trial places sixth in national championship Editors Lauren Ceronie Jenni Wiener campus@miamistudent.net Local companies Miami University purchases from* Walnut Creek Foods (Deli Meats and Cheese) Holmes County Rolling Acres (Fresh Produce) Delaware Dayton Oxford Young’s Jersey Dairy (Tuffy’s Ice Cream) Yellow Springs Midwest Juice (Fountain Juice Drinks) Butterfield Farms (Gourds, Apples) Cincinnati John Morrell (Hot dogs) Pierre Foods (Burgers) *this is a small portion of the local companies MU purchases food from COLLEEN YATES The Miami Student surprised about how much the little kids want to know about it,” McEwen said. “Everyone is always talking about ‘oh I need to eat healthy.’” Ethical food issues With Miami students being conscious of their purchasing decisions, the Demske Culinary Support Center, in turn, also attempts to buy ethical food for students, according to Brubacher. Miami’s beef is pasture-raised and both their beef and dairy products are hormone and antibiotic free. The Culinary Center purchases from All Trauth Dairy, an Ohio company, which pro- vides most of the dairy products seen in the dining halls. The Culinary Center purchases vegetarian foods, like the vegan nuggets in the dining halls, from United Natural Foods. “We buy from United Natural Foods,” Brubacher said. “UNFI is a company that specializes, they’re not strictly vegetarian and vegan but they do carry a lot of items that are vegetarian, vegan, kosher, organic.” According to both Brubacher and Elliot, the dining halls also serve vegetarian options. However, one area that is lacking in Miami’s ethical production practices is a large portion of the eggs they use are not cage free. Brubacher said the cost of purchasing cage-free eggs stops the university from providing them. “The whole eggs that we use are from a local egg farm, Morning Fresh eggs. If you go to a dining unit for over medium eggs or any eggs that we use that are shell eggs those are from a local egg farm too,” Brubacher said. According to Josh Balk, a spokesperson for the Humane Society of the United States, the number one ethical concern for university dining should be the use of cage-free eggs. “As long as the eggs are labeled cage free at minimum it wSee FOOD, page 17 Miami requires organizations to have event insurance By Rebecca Zemmelman For The Miami Student Until recently, extracurricular clubs not affiliated directly with Miami University, but recognized as on-campus organizations, were not required to purchase insurance for big events, according to Paul Allen, Miami’s director of business services. According to Allen, this can and has (at other universities) created million dollar lawsuits against officers of organizations, if there are damages or injuries during an event hosted by this type of organization. “To protect the RSOs (Registered Student Organizations) and their members, Miami University may require organizations to purchase liability insurance for events held on a Miami campus,” Brianna Picciuto, vice president of campus activities said. “Events involving physical activity or competition, attendance by large numbers of students, attendance by persons who are not Miami students and use of games, rides or other amusements will require purchase of a policy of insurance.” According to Allen, this rule will not only protect the organizations and their leaders, but also the university. To purchase insurance, Miami’s insurance broker set up a website, Renovated bookstore opens in Shriver Center By Michelle Rowley For The Miami Student Wednesday, the Shriver Center Bookstore will premiere its newly renovated store, after months of renovations. The upper level officially reopened Jan. 31 while the lower level opened April 18. The last time the store was redone was 18 years ago, making it outdated and in need of new floors, light fixtures and a new layout, according to James Simpson, assistant director of the bookstore. Simpson said the once cramped textbook section in the lower level is now more open, with much wider aisles. On the first floor where Miami University paraphernalia is sold, windows that had been sealed since the last remodel 18 years ago are now reopened, creating a lighter, more inviting space. According to Simpson, the newly renovated store will improve students’ shopping experience. “It gives the students something to be proud of and a nice place to shop,” Simpson said. He said the newly opened windows on the first floor and the new entrance in the basement level will draw more customers in. Simpson also believes the new design aesthetic is much more pleasing to the eye and the layout opens up a considerable amount of space on both floors. On the basement level, the main entrance reveals many Apple store-like qualities. The computer center has more space for customers to walk through since display counters have been replaced with modern, round, wooden tables. Simpson said to celebrate the grand reopening, the bookstore will be offering a number of deals on Apple products Thursday. Although the shelves have yet to be stocked with textbooks, the vast ma- jority of the items are moved back into the store. According to Simpson, among these items are many new products ranging from school and art supplies to an entirely new art and architecture section. Though many changes have been made to the store itself, Simpson believes as of now the staff will remain the same. According to Robert Keller, vice president of facility planning and operations, the budget for this project came from several different sources including the Housing, Dining, Recreation and Business Services, which funds capital renovations and replacements. Keller said part of the budget also came from a surplus of revenue from the bookstore itself. Fully completed, the renovation cost a total of $1.5 million. wSee CHANGES, page 12. This site is a web-based application that requires answers to a few pages of questions about the potential event. The website will then estimate a quote which will be taken out of a university account, and will later be charged back to the organization, according to Allen. The cost of the insurance is dependent on the event and the number of participants, according to senior member of the Delta Upsilon fraternity, Andrew Cramer. Cramer said the decision for this requirement began at the start of this academic year but will go into full effect in the fall with some clearer guidelines and definitions. According to Allen, however, there has been a longstanding requirement for insurance with Greek life events. Many fraternities and sororities get their insurance funded by their national organization. Cramer said he had experience with the insurance policies through Miami with the need for insurance during his fraternity’s annual philanthropy, Puddle Pull, a physically intense event similar to tug-of-war. “My one complete experience of the insurance policy is with Puddle Pull for Delta Upsilon,” Cramer said. “First we tried to use the university’s service, but when we received a quote back of $1,300 we knew that we needed to find a different option. Puddle Pull does fall into the highest risk category so I think this is the absolute highest price. Luckily, our national organization was able to help us out and cover us under their policy.” Miami sophomore Brooke Berka thinks this new rule is very necessary. “There is liability for anything and everything these days,” she said. “We need to protect the leaders of the organizations and the school itself, and prevent them from problems if something were to ever happen at an oncampus event.” THE MIAMI STUDENT TUESDAY APRIL 26, 2011 ♦ 3 CASH IN YOUR TEXTBOOKS Visit for additional buyback hours and locations. CHECK IN YOUR RENTALS Rented textbooks are due back May 6, 2011 Follett’s Miami Co-op Bookstore 110 East High Street 161SBB11 4 Community Tuesday April 26, 2011 Editor Melissa Tacchi community@miamistudent.net Weather plans vary Uptown By Sarah Sidlow Senior Staff Writer Police catch males stealing furniture At around 1 a.m. Friday, Oxford Police Department officers were dispatched to 115 N. Campus Ave. in response to a theft in progress. Two males reportedly stole porch furniture from the residence and attempted to steal a porch swing from another house on Withrow Street. When officers arrived, they reportedly spotted two males carrying a chair and a bench. The males reportedly dropped the items and continued walking when they saw the officers. The officers reportedly stopped the males, later identifying them as Miami University sophomore Michael O’Brien, 20, and Miami University sophomore Samuel Cagle, 20. When Cagle reached for his ID, a fake Pennsylvania driver’s license reportedly fell out of his pocket. The ID reportedly appeared to belong to a 22-year-old male, but when officers ran the license it returned to an 89-year-old woman. Officers also reportedly located a fake ID on O’Brien, identifying him as a 22-year-old male. Both men reportedly had the strong odor of alcohol on their breath. When asked about the stolen property, O’Brien reportedly told the officers the furniture had been stolen from him and he was only taking it back. However, when asked why the two dropped the furniture, O’Brien reportedly did not respond. After eventually admitting to stealing the furniture, O’Brien reportedly told the officers that property gets stolen “all the time” and “eventually it would be stolen from him.” O’Brien also reportedly stated that stealing is an “accepted practice” in Oxford and the entire event was being “blown out of proportion.” O’Brien and Cagle were cited for receiving stolen property and possession of a fake ID and released. While many students camped out in residence hall basements, others were caught uptown during the tornado warnings April 19. The Oxford Police Department (OPD) and Miami University Police Department (MUPD) sent out texts and email alerts telling residents to seek shelter until further notice, according to Miami sophomore Brooke Warren. Still many of Oxford’s businesses stayed open as the tornado sirens blared. “We’re always open,” said Ned Stevenson, owner of Bagel and Deli. “If we say we’re going to be open until three, we’re open until three.” Stevenson said the bagel shop is a relatively safe place to be, as it is enclosed in cement walls and has very few windows. However, Bagel and Deli stopped delivering and ceased all outgoing deliveries as soon as the sirens started. “(The tornado warning) killed our business,” Stevenson said. “We were doing really good until that happened.” Warren was celebrating 90s Night at Brick Street Bar and Grill when the tornado warning sounded. “They didn’t say anything about it,” Warren said. “The only people that knew anything were the kids that were getting the text alerts.” According to Warren, many residents stayed at Brick Street through the storm. Some uptown employees did take shelter. Three employees of Pita Pit went to the basement that they share with eight other businesses in the Masonic Building, according to Kathy Brown, a manager at Pita Pit. Brown said when they hear the tornado siren, they verify with the city that it is an emergency before they seek shelter. Brown also said if deliveries had been running, she would not have stopped them, but she would not have let any new deliveries leave. Two employees of Bruno’s Pizza were down in the basement with those from Pita Pit. “We follow the guidelines for the weather service,” Bruno’s owner Roger Perry said. “If they tell us to seek shelter, we seek shelter.” He said it was easy for them to close up and take shelter because the Bruno’s building was not open at the time the tornado sirens started on April 19. The only thing Bruno’s employees had to do was take in the outdoor table and head down to the basement. According to the City of Oxford website, Oxford follows the safety precautions laid out by the Red Cross. If a tornado warning is issued, you should seek shelter from glass and flying objects. If you are outside, you should hurry inside or lie flat in a ditch or a low-lying area. Cincinnati hosts Senate Bill 5 protests Friday By Shannon Pesek Senior Staff Writer Protests against the American Legislative Exchange Council (ALEC) and the legislation and conservative policies they write and champion will be held April 29 at Fountain Square in Cincinnati. The event has been dubbed “See You in Cincinnati.” Scott Gabbard Seedorg, a member of the protest’s press team, said “See You in Cincinnati” will be an organized day of resistance against ALEC, which is a right-wing leaning group of unelected officials who collaborate to protect corporate interests. ALEC creates and drafts legislation that favors oil companies, pharmaceutical companies, and other big name corporations, for use by conservative state representatives, Seedorg said. “The protest will be held in Cincinnati because the think tank will be having a strategy session in the city,” Seedorg said. Some of the issues that will be protested at “See You in Cincinnati” include anti-immigration laws, environmental protection, healthcare, voter suppression laws and Senate Bill 5, Seedorg said. “Senate Bill 5 (SB 5) is a comprehensive bill addressing public employees paid through the state of Ohio through taxpayer dollars,” Rep. Lynn Slaby (R-41) said. This bill clarifies the percentage that an employee would pay to their retirement program, as well as what can and cannot be bargained in a collective setting, Slaby said. “Typically, public employee unions bargain for salaries and wages.” Slaby said. “With SB 5 they can still bargain for wages, but they can no longer strike if they cannot get their benefits.” Slaby said the bill is under protest because of “misinformation.” “Unions believe that they have the right to strike and the consequences of the bill are misunderstood,” Slaby said. Seedorg said SB 5 was passed and signed by Governor John Kasich and there is an effort to revoke it using a citizen repeal on the fall ballot. “Citizens were not aware when they voted in their republican representatives that these anti bargaining and collection laws would be the result,” Seedorg said. Seedorg also said the majority of the organizers of the event are students. “I encourage students to get involved because students will be inheriting the policies of ALEC, especially for Ohio because of the lasting impact on the state,” Seedorg said. “Ohio has a hard time keeping students in the state and the policies created by ALEC are not helping.” Miami University senior and Co-President of College Democrats, Stephen Kostyo, recommends students attend the protest in Cincinnati. “I encourage students to go and have an open discussion to expose groups such as ALEC,” Kostyo said. “It is a way to assess our influences, as students.” Seedorg said the people of Ohio can do better than the ALEC legislation and that a part of the “See You in Cincinnati” protest is to educate and empower the people, not just corporations. Alumni help Oxford Copy Shop go digital Miami sophomore tries to outrun officer At around 1 a.m. Saturday, Oxford Police Department officers were dispatched to 112 ½ S. Poplar St. in response to a trespasser. Officers reportedly noticed a tall male in a black shirt on the porch of the residence. The male reportedly ran when he noticed the officers, who pursued the suspect. The male, later identified as Miami University sophomore Charles Scharfen, 19, reportedly jumped down a retaining wall before he was found hiding outside a garage. Scharfen was reportedly taken into custody, where officers noticed the strong odor of alcohol on Scharfen’s breath, along with slurred speech and bloodshot, glassy eyes. Scharfen reportedly apolgized, and told the officers he was scared because he had too much to drink. He also reportedly said he was on the porch of the house because he thought it was his fraternity house. Scharfen was cited for underage intoxication and obstructing official business before being driven back to his residence in Porter Hall. JULIA ENGELBRECHT The Miami Studentf The Oxford Copy Shop will be offereing digital copies of Miami University course packets for a fraction of the hard copy price. By Amelia Carpenter Online Staff Along with warmer weather this summer, Miami University students can expect to save money, support local business and be more environmentally friendly. VirDocs.com, a Miami alumnus’ start-up business that distributes documents online, recently partnered with Oxford Copy Shop to offer digital copies of course packets, lab manuals and other academic materials. VirDocs co-founder and 2010 graduate Greg Fenton and his college roommate Tim Haitaian started experimenting with websites and classifieds during their freshman year at Michigan State University and when a professor asked if Fenton could sell his lab manuals online for him, he instantly became an entrepreneur. “We figured we’d go to the local businesses (in college towns), give them the tools to do (digital distribution) and that way we’d be able to grow faster (while) supporting local businesses and in turn, catch our flank and keep us up-to-date with everything,” Fenton said. VirDocs provides a digital resource for course packets that saves students money when production costs are factored out. Students will be able to purchase digital course packets online through VirDocs.com and combination/ print-only course packets will still be available at Oxford Copy Shop. “For college students, price is a big deal,” Fenton said. “If you can get something for $30 that was $60, a lot of students are happy to save that $30.” Senior Ewa Cabaj identified additional incentives aside from saving money with VirDocs. “I’ve been looking for a way to save paper,” she said. “I feel bad having these really thick course packets and then not reading them or even using them and everything we do right now is on the computer … it’d be so much handier.” Oxford Copy Shop Owner JC Rupel explained how the partnership with VirDocs was beneficial. “It’s just a win-win for everybody,” Rupel said. “Low cost for some, more revenue for us and wSee COPY, page 5 Talawanda schools collaborate with University to go green By Mary Daly For The Miami Student Friday marked the 41st anniversary of Earth Day, a holiday that has been celebrated around the world since 1970. The theme of this particular Earth Day was “A Billion Acts of Green” which matches nicely with the work the students of Talawanda High School have been putting together. The students are preparing for their new green high school by putting an emphasis on being green in their current high school. The Go-Green Club at the high school experienced a period of closure after its adviser left, but has recently been re-opened. According to Phil Cagwin, Talawanda superintendent, club members have been pushing the importance of recycling to their fellow students and their families and recycling has been growing throughout the district for a few years, according to “We have been doing a lot of recycling in the district for the past couple of years now with the cooperation of Rumpke Recycling,” Cagwin said. “Student volunteers go around each week collecting the bins from classrooms. We have the large recycling containers at all of our schools so that community members can use those.” Recycling containers have also been placed at athletic venues so more recycling can go on there. Miami University geography professor and Vice-Chair of the McGuffey Foundation School Board Tom Klak are working with students from Talawanda and Miami in efforts to maintain native shrubs and plants. “The Partnership idea is key”, explained Klak in regards to Miami and the Talawanda school working together, “groups come together with overlapping interests and skills, and work out ways to collaborate to achieve exciting outcomes they would not be able to do on their own. Everyone helps, grows and native is made more healthy”. Cagwin said the preservation joint effort they have with Miami students is called the Erik Sustainability Initiative. Cagwin also said the students are trying to restore a stream that runs through the property. “This is a wetland restoration project,” Cagwin said. “A stream is going through the area that is suffering from erosion and Miami students and Talawanda students are doing work to restrain that.” According to Cagwin, Talawanda students are given the opportunity to learn the importance of keeping the land natural and pure while taking part in a hands-on experience. Students in botany classes have been regularly visiting the district’s wetlands and observing the land that is being replenished for them to use for environmental study. “I think a great deal of progress has been made,” Cagwin said. “Miami students have positively influenced our high school students.” Holli Morrish, Coordinator of Development and Community Relations of the Erik Sustainability Initiative project, said the efforts should never end. “I hope there will be conservation work that will last forever at the site,” Morrish said. “I think this is a great opportunity for the Talawanda community for living a greater life.” THE MIAMI STUDENT TUESDAY APRIL 26, 2011 ♦ 5 When you’re finished reading The Miami Student, please recycle! MYRON BOWLING Multi-Million Dollar - Court Ordered - Absolute Auction Butler County Common Pleas Court Case No. CV 2006-12-4689 å/8&/2$ å/()/å02/0%24)%3 3TUDENTå(OUSINGå å å-ULTI &AMILYåUPåTOåå5NITS å å$UPLEXåå3INGLEå&AMILY å å#OMMERCIALå0ROPERTY MONDAY, MAY 9, 2011 at 10AM Inspection Date: 3ATURDAY å!PRILåTHåFROMå.OONånå0Contact Bowling & Kugler Realty for more information Bob Kugler 513-646-3283 • Bill Kugler 513-260-2535 or 518 S. Main St. - Village Green Apts. - (32) 2BR & (1) BR 505 N. Campus Ave. 1 W. Chestnut St. 512, 514 & 818 S. College Ave. 120 E. Sycamore St. 98 E. Chestnut St. 816 & 816 ½ S. College Ave. 311 & 311 ½ W. Church St. 13 W. Rose Ave. 107 E. Spring St. 317 High St. 105 Linwood Ln. (3) 4BR Single Family (2) 4BR Duplex 4BR Single Family 5BR Single Family 5BR Single Family 4BR Duplex 3BR Single Family 5BR House w/(14) 1BR Apts 10BR Single Family 18 W. Collins St. A, B, & C 507 A & B N. Campus Ave. (2) 4BR Duplex more recognition because now we’re doing something that no one else is doing in town.” Rupel said he appreciates Fenton’s expertise with technology and suspected Miami students would appreciate the digital option. “We’re always trying to stay at the leading edge, trying to meet customer demands and Miami kids are at the leading edge of technology,” he said. Digital course packets, however, are not always an option for students. Professors work with Oxford Copy Shop to do one of three options: print only, a combination of print and digital copies or solely digital. Rupel has seen professors’ course packet preferences vary in recent years. “We’re all for choice,” Rupel said. “It depends on the classes and 4BR Single Family 101 E. & 103 E. Spring St. (4) 2BR & (5) 2BR Apartments continued from page 4 231 & 231-1/2 W. Church St. - 5BR, 3BA Duplex 415 S. College St. Commercial Property COPY it depends on the professor.” Professors will work with Rupel to determine security and time restrictions on their course packets. For example, VirDocs can set expiration dates for course packets, or prevent printing, saving or transferring documents through the website, Fenton said. VirDocs introduced documents on laptops for summer 2011 and starting in fall 2011, VirDocs would reach tablets such as the iPad. “We know that’s the future of the business,” Fenton said, adding that VirDocs would eventually be accessible on mobile devices. VirDocs hopes to have three or four clients for summer 2011. Fenton currently works as a regional manager for a manufacturing company, and when he finds free time in his travel schedule, he works on building VirDocs’ client base. A copy shop in Illinois has also agreed to partner with VirDocs. A full launch is expected for fall 2011 to ensure efficiency before expanding the business. (3) 1BR Triplex 3BR Single Family 418 S. Main St. 4BR Single Family 190 Foxfire Dr. 4BR Single Family SALE LOCATION: Holiday Inn - 75 S. Main St., Oxford, OH 513-844-8405 OH Auction Co. Lic. #63198514949 OH Auctioneer’s Lic. #62197620939 Need Summer Credits? Do it Online! Summer Seminars Start May2 or June 25 8 weeks, 6 credits $2,754 per seminar More than 35 seminars, including: • Alcohol and Drug Abuse Counseling • Alternative Healing Systems • Being on Earth • Buddhism and Psychology • Diseases and World History • Light and Dark: Gothic Literature • Sex, Gender and Love: A Biological View • The Psychology of Food Call or email today for more information 888-828-8575 ext. 8513 admissions@myunion.edu Non-profit, private, accredited by the North Central Association/ Higher Learning Commission () UI&U does not discriminate in its policies or procedures and conforms with federal non-discriminatory regulations. 6 Arts&Entertainment Tuesday April 26, 2011 Editor Megan McGill arts@miamistudent.net Concert to showcase student talent By Dan Hamlin For The Miami Student Fresh off of winning the Associated Student Government’s Outstanding Performance Organization for the second year in a row, the Miami University Symphony Orchestra (MUSO) will present a concert featuring the talents of three soloists and the combined power of the entire group 8 p.m. Friday in Hall Auditorium. The concert includes the famous Modest Mussorgsky piece “Pictures at an Exhibition,” transcribed for orchestra by Maurice Ravel. Ricardo Averbach, orchestra director and recent recipient of the American Prize in Conducting, said this concert is “the climax of the entire year.” “Pictures at an Exhibition” is widely considered one of the top pieces in the orchestral repertoire. According to Averbach, it contains contrasting sections and highlights the entire group. Aside from the orchestral classic, this concert also highlights the talents of three individual soloists. These soloists, the winners of the music department’s annual Concerto Competition, were chosen by an outside jury to perform with the MUSO. The winners for 2011 are sophomore piano performance major Jessica Hoffman, sophomore vocal performance major Daniel Moody and senior vocal performance and music education major Emily Moses. Hoffman will be performing Edward Grieg’s Piano Concerto in A Minor. Averbach describes this piece as one of the most performed piano concertos. MUSO President Kristin Hill said, “The piece is fun to listen to and to play.” Moses will be singing arias from the opera Carmen by Georges Bizet. Moody will be performing various baroque arias with the Oxford Chamber Orchestra (OCO), an orchestra comprised of faculty and students playing side by side. When asked why the OCO will be performing with Moody, Averbach said, “It would be out of style with a bigger orchestra.” Working with the soloists presents MUSO with unique and different challenges each year. “It is always a challenge because for many (soloists) it is their first time performing with an orchestra,” Averbach said. This year is unusual because all three soloists are undergraduate students. “It is the first time since I have been at Miami when this has happened,” Averbach said. Averbach invites all students to “celebrate the end of classes in a fun way.” This concert is free, provides great repertoire and will showcase the talent of the entire orchestra and individual soloists. Contributed by Jeanne Harmeyer Competition winners Jessica Hoffman, Daniel Moody and Emily Moses are to perform with MUSO. Glee Club welcomes 13th permanent director By Megan McGill Arts and Entertainment Editor Over 100 years ago, the Miami University Men’s Glee Club gave their first ever home concert in dedication of Hall Auditorium. This April, 104 home concerts later, the group sang for the first time under their 13th permanent director, Jones Jeremy Jones. Clubbers of all generations shared in the concert earlier this month. Alumni both young and old fled to the stage to join current members in traditional songs, including “Johnny Schmoeker” and “Java Jive.” George Beverley, a 1970 graduate and the first ever winner of Glee Club’s prestigious Scott Alexander award, traveled all the way from Texas for the concert. “Hearing the group brings back memories,” Beverley said. “We know what they’re going through and we want to support them.” According to Chris Walsh, sophomore student conductor of Glee Club, performing under their new conductor was a great success. of Music where he completed his “Club is in good shape,” Walsh doctorate in conducting. said. “We’ve been through a lot in According to Kevin Kuethe, histhis transition year, but everything torian of Glee Club, Jones gave his has definitely come together in the dissertation on Glee Club History. past two weeks. The spirit of club is “Dr. Jones has the grounds to apat least as good if not better than it’s preciate Glee Club’s storied history,” ever been.” Kuethe said. Jones came to Miami this past fall According to Kuethe, Miami Unias a visiting professor. The position versity’s Glee Club’s rich tradition was created last spring after conduc- runs as deep as those of other historitor Ethan Sperry left for Portland cal schools like Yale University and State University. Harvard University. Jones became one “It’s great to be “I want us to have of the four candisomewhere where our own voice dates for the perso many students throughout the manent position love singing and during his time as where passion for United States.” visiting professor. music can be shared According to among students of JEREMY JONES Judy Delzell, chair MIAMI UNIVERSITY MEN’S GLEE so many different CLUB PERMANENT DIRECTOR of the departacademic disciment of music, the plines,” Jones said. candidates were Jones plans for very competitive. both Collegiate Chorale and Glee “Being an internal candidate is Club to continue to be travelers and only an advantage if you do an excel- performers at state, regional and lent job,” Delzell said. “Dr. Jones was national conferences. in a tricky situation following some“I want us to have our own voice one as popular as Ethan Sperry. His throughout the United States,” students and colleagues have come Jones said. to appreciate his commitment to the This summer, Jones will work university and to his students.” toward these goals, leading the Jones attended the University of Glee Club on their summer tour Cincinnati’s College Conservatory through Europe. Groopease.com offers way to find new music By Lorraine Boissoneault For The Miami Student Along with beaches, bonfires and other summer fun, the end of the school year will usher in the beginning of concert season – and students looking for the best new music will have an easier time than ever finding emerging bands thanks to the start-up website groopease.com. “For most new bands, they’re really local and at that level they have to work day jobs. The music, as good as it is, is like a side project,” Andrew Bratt, one of the founders and chief operating officer and general counsel for the website, said. “We want them to make (their music) a full time job and this system benefits consumers and producers.” Bratt said the idea came to fruition through the combined brainstorming of Damien Amey and Matt Firlik. They realized there was an online niche that needed to be filled: a site for music-lovers looking to expand their iTunes library without getting lost in the endless new music online. Contest names next ‘Miami Idol’ By Christi Mueller Matt Firlik, a 2002 Miami University alumnus with a bachelor’s degree in finance, said his meeting with Amey and the creation of groopease.com was one happy coincidence after another. The two first met in a hostel in Barcelona in the spring of 2010 when Amey was stranded due to the Icelandic volcano eruption, then later crossed paths in California. “Damien and I went to a Dave Matthews concert and afterwards we were hanging out,” Firlik said. “We hadn’t stopped talking about things and at that point there was an ‘ah-ha’ moment for the two of us. (We wanted) to latch on to something we really loved and were passionate about.” Several months later, groopease was born. The site was launched April 4 and since then has offered members the inside scoop on seven different bands. He added that another part of the inspiration for the site came from sites like Groupon and Looking Ahead: Arts on Campus 2011-2012 Family Weekend: For The Miami Student After four days of auditions, 44 contestants were narrowed down to 15 finalists, all hoping to win the title of Miami University Idol. Jeremy Myeroff, Evelyn Duskey, Alex Tyree, Nikki Tesino, Phillip Iscman, Molly Pesarchick, Brian Rice, Anne Chestnut, Kyla Mainous, Tony Ramstetter, Marian Gbenro, Josh Carey, Amanda Smith, Haley Flynn and Andrew Yun competed for the title in the Miami Idol Finale held at Alexander Dining Hall earlier this month. Many audience members arrived early to the event and eagerly waited in line for the doors to open. Audience members received a free t-shirt that read, “Do you have what it takes to be Miami’s next star?” So many people came that the performers had to give up their reserved seats. The crowd hushed as the host announced the first performers should take the stage. While all the performers were charming, some were definitely better-liked than others. The judges did not show any bias, however and gave only kind comments to every performer. At one point, a screen upstage of the performers where messages could be texted read, “We want a Simon Cowell judge.” Chang Han Ryu came to the show to support his friend. “There are lots of talented people, but it could be better,” Chang Han Ryu said. “If there were more contestants and more publicity of the event, I think the talent would be even wSee IDOL, page 7 wSee GROOPEASE, page 7 Performing Arts Series presents ventriloquist Jeff Dunham. Fall: MU Opera presents Gilbert and Sullivan’s Pirates of Penzance MU Theatre presents William Shakespeare’s As you Like it Spring: PAS presents I Musici de Montreal featuring Mussorgsky’s Pictures at an Exhibition MU Theatre presents Thorton Wilder’s Our Town Fall-Spring: MU Art Museum presents Out of the Shadows: The Rise of Women in Art ANDREW BRAY The Miami Student Evelyn Duskey shines as the winner of “Miami Idol”. Contributed By Patti LIberatore THE MIAMI STUDENT TUESDAY APRIL 26, 2011 ♦ 7 GROoPEASE When you’re finished reading The Miami Student, continued from page 6 please recycle! Living Social. “It’s hard to determine what’s good from what’s just out there and new,” Firlik said. “We wanted to simplify exposure so it’s just one thing to listen to – like when you look at what Groupon and Living Social have done, simplifying the offer and offering things that are unique and cool.” According to Bratt, bands are chosen based on “certain statistical metrics” such as the albums they’ve come out with and how new they are. “Ultimately it comes down to the music,” Bratt said. For Miami students, groopease might just be the next big thing. Then again, it may be nothing new for those who already have IDOL continued from page 6 more amazing.” What at times seemed like an average karaoke night had a few gems. Several performers played guitars and others performed original songs. The audience “aaw-ed” at Andrew Yun’s original song “Can I Call You My Girl?”which he dedicated to his girlfriend. Both the audience and the judges were impressed with Anne Chestnut’s powerful “Mama Who Bore Me” from the Broadway musical Spring Awakening. The judges begged for more after hearing Brian Rice’s medley of pop songs with an acoustic twist.. Check out course offerings, class schedules and more at. Kent State University, Kent State and KSU are registered trademarks and may not be used without permission. Kent State University, an equal opportunity, affirmative action employer, is committed to attaining excellence through the retention of a diverse workforce. 11-0956 extra-legal methods of finding and obtaining music. “I think college students are reluctant to hand over their credit card,” senior Evy Duskey said. Duskey said she finds new music by sharing with friends and reading several blogs. She also uses 8tracks.com, an Internet radio station that allows users to share mix tapes with other users based on common tastes. “Being a member is a key aspect of groopease, since existing members can invite their friends and receive credit towards their purchases,” Firlik said. Firlik’s site features two to three “groops of the day” per week. Being featured means one free download and up to 75 percent off on the band’s album for site members. Miami students who wish to join groopease should use invitation code “Miami” to become members. After all the finalists performed, it was time to choose the winner. The judges chose the top three: Kyla Mainous, Jeremy Myeroff and Evelyn Duskey. The audience then voted and Evelyn Duskey was selected to be the winner. “I’m surprised and really happy,” Duskey said. Evelyn had performed an original song, displaying a unique voice that captured the audience’s heart. When asked about the Xbox 360 with Kinect that the senior had won, she said, “I don’t know much about them. My boyfriend really wanted one, so I’m glad I’ll be able to give him one.” Duskey’s plans for after graduation include moving to Argentina and probably amazing audiences there with her captivating voice and personality. You want to like this. become a fan of The Miami Student on Facebook.com PHOTO GRAPHERS PUT YOUR SKILLS TO USE AT THE MIAMI STUDENT! Excellence in Action MIAMI PROPERTIES | 513.523.9229 New 32’’ Flat Screen TV with each signed lease* for ’11-’12 school year Good through 4/30/11 *signed lease including all paperwork & security deposit 8 Opinion Tuesday April 26, 2011 Editors Noëlle Bernard Thomasina Johnson editorial@miamistudent.net ➤ EDITORIAL The following piece, written by the editorial editors, reflects the majority opinion of the editorial board. Businesses, city must properly warn customers of tornados A midst the tornado warnings and leaving or entering their business to student evacuations to shelter take appropriate measures and seek April 19, several area businesses shelter. The liability risk is too great stayed open for business. Both the for establishments to not do everyOxford Police Department (OPD) thing in their power to keep customand the Miami University Police ers safe. Customer safety should Department (MUPD) sent out text be the number one concern in any and email alerts to notify citizens situation. Bars and restaurants must to take shelter and create and impleavoid glass and ment a plan for torKeeping customers nado warnings or flying objects. in the dark about The editorial evacuation in case board of The Miami of an emergency. tornado warnings Student applauds loThe benefits of dois dangerous and cal businesses, like ing so far outweigh a liability. Bagel and Deli, that any inconvenience. Establishments put customer and Because so many employee safety should at least tell tornados occur durfirst by encouraging ing peak business them to take them to take shelter hours for establishmeasures and and follow Oxford ments uptown, the seek shelter. tornado precautions. board recommends However, putting MUPD and OPD customers at risk by constantly patrol keeping them (literally) in the dark the High Street area and instruct about the tornado warnings is both citizens on how and when to seek dangerous and a liability to their shelter. The city of Oxford must also business. This board understands make sure all warning system, like businesses like Brick Street Bar text messaging, emails and sirens and Grill may want to keep panic are timely. to a minimum when a natural threat By having emergency plans and warning is issued, but for the benefit the ability to educate and protect of the safety of all people, business- customers, Oxford bars and restaues must clearly and systematically rants can easily keep their business communicate to their customers. In safe from any legal action. Just a the future, establishments like Brick few simple steps may save much Street should at least tell customers more hassle and money. Rule of thumb Tornados Unfortunately, they won’t sweep us away to the Land of Oz. Summer just around the corner Thoughts of beach balls, grilling and camping have us dreaming of vacation. Excessive rain April showers ... blah blah blah. Where’s the sun? University of Massachusetts joining the Mid-American Conference (MAC)! UMass will bring more talent and excitement to Miami University’s athletic conference. Saying goodbye to seniors We will miss you, but enjoy your last few weeks at Miami! Miami women’s tennis Congrats on winning three straight regular season MAC titles! The King Library rush Last-minute projects make us thankful for King Café. Weiner Campus Editor Melissa Tacchi Community Editor Michael Solomon Sports Editor Amanda Seitz Special Reports Editor Julia Engelbrecht Photo Editor ASHLEY CEROLI The Miami Student ➤ LETTERS We must serve by listening I appreciated The Miami Student’s April 22 update on the chilling story of Rob Tammen, the Miami University student who disappeared in 1953. Since I first read about it several years ago, the whole thing has always struck me as eerie and bizarre and leaves me wondering what possessed Tammen to disappear from life the way he did. What I find very disturbing is the fact that this young man appeared to be a completely normal college student — he was active on campus, pledged a fraternity, played in the Campus Owls and so forth. He certainly did not seem like some marginalized member of the student body, and as the article indicates, he was well-liked by friends and classmates. Nobody knows if Tammen’s disappearance was suicide or otherwise or exactly where he went or why. Furthermore, the hours and minutes leading up to his disappearance seemed nothing other than normal to the people who last saw him. He was apparently going to his room to study for a history exam and gave no indication of leaving. However, what struck me from the story was the idea that he left because he was struggling with some kind of personal issues. While we still do not know whether this was the case or not, its possibility reminded me of another event, recent and equally (or more) chilling. Rutgers University freshman Tyler Clementi, an aspiring violinist, committed suicide by jumping from the George Washington Bridge in September 2010. Clementi was homosexual, driven to despair when his roommate posted a video online of him kissing another man. The pain, anguish and betrayal he felt drove him to take his own life by drowning himself in the Hudson River. While these two incidences are unrelated, their implications are pertinent to all of us. There are a great number of people in our midst who struggle with personal difficulties, emotional problems, mental disorders and the like. We may be completely unaware of them because these people appear “normal,” but the truth is, even our closest friends could be struggling with depression, personality disorders, loneliness, etcetera, that they do not wish to reveal to anyone. According to the National Institute of Mental Health, 26.2 percent of U.S. adults suffer from some type of mental disorder in a 12-month prevalence, while 46 percent of U.S. adults will experience some type of mental disorder during their lifetime. That’s huge and the numbers only indicate reported cases. A statement on the bathroom wall of Kofenya put it so eloquently: “Be kind to everyone, for they are all fighting a hard battle.” The more people I get to know, the more I see that everyone struggles with something. One of the ironies I have noticed in college is that people are usually very willing to help with a service project, fundraising or philanthropy event (which is great!), but they sometimes overlook the person next to them who is in need. Granted, most of us don’t have to worry about food, water, sanitation, clothing or shelter, and of course we have an obligation to help those who lack those things. However, we are also obliged to serve of the mental and emotional needs or our friends and colleagues in what ways we can. This means being a good listener as well as knowing when to give a person space and alone-time. This can actually be difficult and time-consuming, as it requires being sensitive and attuned to people on a more abstract level. Saying a kind word goes a long way, but I think we need to be doing more than that. I am talking about answering the friend who calls late at night because she is lonely and sitting with the guy who comes to your door because he needs to “talk it out” with someone. Some of us can have a far greater impact on the world by serving those in our immediate vicinities. Sincere attention and caring we give to others can do more good for the world than we will ever know. Christine Barilleaux barillc@muohio.edu Organizations need wariness of irresponsible rhetoric In President Obama’s administration, the political climate continues to grow more divisive and malicious as our leaders struggle to resolve our nation’s most pressing issues. Rhetoric that was once dependent on providing compelling arguments concerning policy has transformed into antagonistic and oftentimes irrelevant attacks on character. Both Democrats and Republicans are guilty of this irresponsible rhetoric and we should demand higher standards from those we elect to operate our government. Unfortunately, similar toxic behaviors have infiltrated our campus, creating serious concerns regarding how organizations grapple with their differences. Last Thursday, Miami University College Republicans distributed handouts advertising the College Democrats’ current deficit. While the numbers provided by the College Republicans about our deficit are factual, the contextual implications take no stride toward ending the inflammatory dialogue seen at the national level. Not only is this damaging to the political climate on our campus, but it is also distracting from real policy issues and what our organizations aim to achieve. The College Democrats organization recognizes our debt is a serious problem and we hold ourselves accountable for eliminating this deficit, even though no current member had any part in accumulating the debt. Under university policy, funding provided by Associated Student Government (ASG) cannot be used to eliminate outstanding debt. We have complied with all of ASG’s requests for debt relief and have been spending our current funds responsibly. Despite this, the College Republicans chose to attack us as an organization rather than on the candidates and issues we support. Both the College Republicans and the College Democrats work to achieve one goal: spreading campus-wide awareness of political issues. However, the College Democrats spread awareness without resorting to libeling the College Republicans. As an organization we seek to heighten awareness by distributing flyers focused on candidates and policy issues. Members of both organizations are energetic, articulate leaders with strong convictions with the determination to make a difference. The similarities we share are stronger than the contentions that divide us. Prior to this event, members of both the College Republicans and the College Democrats discussed planned to collaborate on joint events. We are frustrated and disappointed by the College Republicans’ actions. However, we are still open to working with their organization if they stop their needless mudslinging attacks. Not only should government officials rise above petty politics to resolve what has become a political reality, but also so should Miami’s student organizations. Regardless of our differences, we are a collective student body that needs to respect the individuals that compose our organizations. Jimmy Jordan jordanjj@muohio.edu President, College Democrats Chelsea Kiene kienecd@muohio.edu Communications Chair, College Democrats Opinion THE MIAMI STUDENT TUESDAY, APRIL 26,2011 ♦ 9 ➤ PERCEIVING REALITY ➤ PERSPECTIVE Course choice calls for smart selectivity Self-ideology should trump political party Class registration is often synonymous with stress and frustration; students are sometimes unable to get the classes they want, confused over what Miami Plan credits they still need and are finalizing their majors, minors and thematic sequences. However, I feel many students focus on the wrong things when Ty picking classes to regGilligan ister. They choose ease and convenience over interest and potential benefits. Having just completed my seventh class registration at Miami University, I have learned several key things regarding picking classes. The most important thing is to schedule classes around times when you are most productive. Some people are morning people and retain information better in morning classes and some people are night owls and don’t think twice about taking a three-hour night class. Furthermore, if you have a shorter attention span or tend to get bored easily, take a Monday – Wednesday - Friday class with a shorter meeting time, versus a Tuesday - Thursday class with a longer meeting time. Something else I have learned in regards to picking classes is do not take “easy classes.” “Easy” is a subjective term and means something different to every person. In my experience, classes which I was told by other people are “easy” tend to just be plain boring. So don’t take a class which is “easy” if you are not interested in the material or subject matter because you will get frustrated and feel you are wasting your time if the material is too “easy” or doesn’t interest you. It is also important to make sure that a professor who is said to be “easy” is not easy because they are disorganized, which I have found too often be the case. It doesn’t matter how “easy” a class is; if the professor is constantly changing due dates, assignments and losing papers you are going to get frustrated quickly and wish you hadn’t taken the course. Another strategy I utilize when selecting classes is doing some research on the professor teaching the course I plan to enrolling. Try to take professors whose teaching styles match your learning style. I personally learn best through lectures with PowerPoint presentations so I try to take professors who utilize lectures versus small-group work or group projects. RateMyProfessors.com can also be a helpful resource for information on teachers and the structure of courses, however it is important to keep in mind those reviews are often left by students who either really like the professor or really hate them; there’s hardly ever any “in-between” or neutral ratings. Therefore, I tend to take this advice with a grain of salt. Another registration tip I always adhere to is registering for an “extra” course in addition to the ones I need. This provides some flexibility in case you end up needing to drop a class. I usually register for an extra course so that in the event I hate one of the classes I can drop it and not be left with too few credits. If you only have 15 credits and drop one class, you are going to have 12 credits and will likely need to take a heavier course load the next semester to make up for it. I also always try to take classes that interest me for my “electives,” not random stuff I have no interest in. However, this doesn’t necessarily mean you should only take classes in your field of study. If something interests you in another field, branch out and try new things! You may find an additional major, minor or thematic sequence which interests you. The last thing I have learned in regards to class registration is don’t fear the force add. Force-adds are everyone’s worst nightmare but you will inevitably have to do at least one or two per academic year. I always make sure to be honest and polite when contacting an instructor for a force-add. Just explain your situation to the professor and express your interest in the course and they often will work to accommodate you. If they can’t help you, they can sometimes direct you to another course which is still open. In my experience, doing research on future courses and professors always pays off and it is worth the time to ensure a successful semester. ➤ THIS AND THAT AMANDA SEITZ As a nation, we’ve become increasingly polarized toward either end of the political spectrum. This increase in political affiliation has caused a number of setbacks for political debate in the nation. Although obnoxious pundit shows and nonsensical rallies are just some of the setbacks I can name, the most alarming is the rapid rate at which we are willing to give up our own positions on an issue for the sake of the political party. The word “winning” has been an increasingly popular term of late, not to discredit Charlie Sheen, but it seems the focus on “winning” was very popular before Sheen descended upon the Twitter world. As a people, we’ve become more concerned with ensuring that our own political party is “winning” whether it be in political opinion polls, elections or on god-awful shows such as The View, instead of ensuring the politician or legislation we so aggressively bolster up actually executes policy that we believe in. Being a conservative doesn’t automatically commit one to a lifetime pledge to fight against gay marriage rights, abortion and the poor. Yet in today’s world, if a conservative doesn’t support one of these stances it’s seen as a weakness or a “win” for the other side. The same goes for the liberal viewpoint. Instead of simply championing these stereotypes commonly identified with the political party, we should challenge our own political party to meet our standards. Just because a candidate has a (D) or a (R) next to his or her name, doesn’t mean his or her views are aligned with your own. Similarly, just because someone of your particular political party backs legislation does not mean you should automatically support that proposal. When was the last time you took a moment to actually read over a senate or house bill? When was the last time you did that before engaging in a political argument with someone ERIN KILLINGER The Miami Student about said bill? Or did you simply rely on whatever bits you overheard on the evening news? Too often, in today’s society, we are willing to tell others what their political ideology should be yet we’ve done so little to educate ourselves about our own claimed ideology. It’s up to our generation to challenge today’s traditional view of “liberal” or “conservative.” Study after study has shown that as a people, Generation Y is more accepting of social issues. On the opposite end of the scale, according to a March 2 article in US News and World Report, other studies suggest Generation Y is extremely frugal, out of concern for the debt that our parents did such a good job of making for us. Generation Y’s mindset is a challenge, not to American values, but to the traditional political party alignment. Our generation should bask in these ideals, not conform to please the party. Instead, We should push legislation that is molded to our indvidual logic. Politicians will gladly bend, after all, it’s your vote that keeps them #winning. SEITZ is the special reports editor for The Miami Student ➤ ESSAY. By 1925, after years of working with Al Capone and Joe Adonis, Luciano had total control of the prostitution market in Manhattan. Being a prominent member of his gang led to Luciano being kidnapped. He survived by keeping “omerta” on his side. “Omerta” basically means to never spill any secrets even when under torture. It is a very important concept passed down in families still in mafia groups. By the early 1930’s Luciano along with Salvador Maranzano wanted to control the New York underworld. Bringing families together, the men explained to all how the families would operate and then assigned a leader to five families. Eventually Luciano killed Maranzano for two reasons. First, Maranzano wanted Luciano to be killed and second to bring in mobsters from other countries. Marazano had established that only men from Italian descent could become a member. Luciano had Jewish and Irish mobsters join and created a nationally syndicated crime unit. This is how the Italian mafia, one of the most famous syndicated crime families, started in the United States. Five families run the mafia currently in the United States: Genovese, Gambino, Lucchese, Colombo and Bonanno. The families rein over Brooklyn, the Bronx, Staten Island, Queens and other areas of New York and New Jersey. They have since expanded to places such as Detroit and Chicago. According to the FBI, the mafia is involved in illegal gambling, drugs, extortion, fraud, murders, weapons trafficking and much more. With 2,500 Sicilian mafia affiliates, the mafia is the most organized, active and powerful Italian crime group located in the United States. They make around $100 billion annually and they get away with it. The mafia is like a disease that keeps spreading around the United States and the world. They control major industries the government tries to bring down, but parts of the mafia controls government officials as well. For example, Italian Prime Minister Silvio Berlusconi is reportedly associated with the mafia. That makes problems such as the toxic waste in Southern Italy an issue to resolve. The Camorra, a branch of the mafia, is responsible for moving the toxic waste from the affluent parts of Northern Italy to the poorer regions of Southern Italy. Based in Naples, the once cigarette smuggling prison gang turned into a drug smuggling mafia with the help of the Sicilian mafia. The Camorra Wars, well known around the country, started when a few Camorra leaders decided they did not want to join forces with the Sicilian mafia. 400 lives were lost. Blood relationships and marriages is what keeps this disease going. The mafia destroys families, careers and people’s livelihoods. Gomorrah, a famous work by Roberto Saviano, publicized portions of the Camorra’s inner workings. Saviano has been forced to be secluded and protected by police because if found, the mafia will torture or kill him. This is the amount of strength, control and ties the mafia has on lives. They are anywhere, everywhere and keep growing. Recently, VH1 produced yet another reality television show, but this one focused on the mafia in America. Mob Wives follows daughters and wives of mafia affiliates. When Renee Graziano (her father according to the government is a high ranking member of La Cosa Nostra) was asked what she thought about the mob, her answer was simple. “What mob?” These families are thick as ever and whatever the head of the household says, you follow. For example, Renee was told by her father that she was not be around Karen Gravano once her father Sammy “The Bull” Gravano worked with the government to bring down the Gambino family, specifically John Gotti. Renee still keeps to that word once Karen came strolling back to Staten Island in the pilot episode. But do all the secrets, killings and backstabbing really work? How far will some people go not to upset the mafia or how far will they go to become a part of it? It keeps growing, secrets keep getting hidden and people keep getting killed. In Italy, about one person is killed every three days to mod related activities. That could be your brother, your mailman or it could be you. Since the years that Luciano came to the United States, the mafia has gotten more powerful, broader and complex. Organized crime has even expanded to parts of Russia, Romania, Nigeria and Asia. Will organized crime ever end? As much work as the government puts into stopping it, it will take an army of people like Saviano and Sammy “The Bull” to bring down one of the biggest family businesses in the history of the world. Just remember that next time you are watching an episode of The Sopranos and remember the show is based off a real mafia family. Michelle Ludwin ludwinma@muohio.edu What does forgiveness mean to you? Holy Week has once again passed us. I found myself going to church the most this week than I have maybe in an entire year. Maybe it was guilt. Maybe it was that yearning for an absolution. Regardless, I sat in a pew and listened to the stories that have lasted through cenOriana turies of time. And Pawlyk these stories are still valid explanations to how we feel, why we choose to shut down and whom we choose to hurt. I suppose because it is the end of the year, everyone has a bucket list of things they want to accomplish before they leave next year … unless they’re leaving for good. On Good Friday, the priest gave a sermon that was particularly moving. It stemmed from the “Passions” Christ endured before he bowed his head and died. As he was being condemned for death, he said, “Father, forgive them, for they do not know what they are doing,” referring to the shouting crowd persecuting him. And as he died — for those who turned away from him — he did forgive. This year, there have been those moments and hardships with friends, family and those close to us that we cannot seem to let go. Even if it’s something petty and It’s a habitual act that asks us to look beyond the things that make us feel down about ourselves because of another’s unkind action. It takes strength to apologize. It takes strength to accept the apology. stupid, holding a grudge seems easier than confronting the person you love and respect and saying “I’m sorry.” Your personal mantras may differ from the person you care most about, but one thing holds true: regardless of who’s hurt you or how they’ve hurt you, forgiveness is forgiveness. Forgiveness may produce different results or change relationships around, but it stands alone. It works the same way: to push you beyond the trivial fights and to make you stronger. It’s a habitual act that asks us to look beyond the things that make us feel down about ourselves because of another person’s unkind action. It takes strength to apologize. It takes strength to accept the apology. But if this mutual exchange doesn’t happen, you can say goodbye to some people this year that could have made an impact. Make these last two weeks count. Go out there and be better people to those who you care about. If you come across one of those trivial moments, try to come to an agreement. Compromise. But don’t necessarily “forgive and forget.” Forgetting should never be the goal. Maya Angelou once said, “I’ve learned that people will forget what you said, people will forget what you did, but people will never forget how you made them feel.” And that’s where forgiveness comes in; once you see that humility in another person, you can forgive. You can empathize and accept their, “I’m sorry,” because you know that until you forgive, you don’t know how free it feels on your soul and on your heart. Forgiveness lets us move on. So as we move on into our summers, whether we’re graduating or not; value the relationships you have. Fix the ones you’ve broken. Because once you do whatever it takes, it’s quite simple: you cannot fail if you don’t give up. 10 ♦ TUESDAY APRIL 26, 2011 THE MIAMI STUDENT THE MIAMI STUDENT TUESDAY APRIL 26, 2011 ♦ 11 Don’t charge out into the ‘real world’ without one last pregame pep talk. THE SENIOR LAST MIAMI UNIVERSITY STUDENT FOUNDATION PRESENTS LECTURE Move-in Day. Your first-year roommate. That first all-nighter. New friends. Best friends. So many memories. Let’s make one more. Grab your classmates and take a break before the rush of finals and commencement. Senior Last Lecture, featuring alumnus and Miami Head Football Coach Don Treadwell `82. SEE YOU AT THE HUB APRIL 29 6 P.M. Rain Location: Shriver MPR One of Many Senior Week Activities ... Sponsored by the Miami University Student Foundation (MUSF) APRIL 26: Complete Your “30 Things to Do Before You Graduate” APRIL 27: Wieners for Seniors | 11 a.m.-1 p.m. /Phi Delt Gates APRIL 28: Thankful Thursday APRIL 29: Senior Last Lecture | 6 p.m./The Hub between Stoddard & Elliott (Rain Location: Shriver MPR) MAY 1: Senior Day at the Ballpark | 1 p.m./McKie Field at Hayden Park | THE MIAMI STUDENT 12 ♦ TUESDAY, APRIL 26, 2011 SHRIVER continued from page 1 history as a professor at Kent State and valued history education very highly. Shriver was a preeminent scholar of Miami and Ohio history. William Pratt, emeritus professor of English, and editor of Miami University: A Personal History by Shriver, said Shriver could speak volumes about Miami and Ohio history without the need for notes. “It was all in his head, any aspect of it,” Pratt said. “It was all there. He had a remarkable memory.” Shriver saw Miami’s history as vital to its present, according to Ellison. “He had a very active sense of Miami’s past and how it played a role in the present, and how it affected the decisions he made as the leader of the institution,” Ellison said. Ellison said Shriver changed the very nature of teaching at Miami by encouraging a strong commitment to undergraduate research, interaction between faculty and students and specialized programming. “He saw Miami as a family,” Ellison said. “A collegial extended family of students, their professors, the alumni, the administration of the university, and the thought of that had a vey positive influence on the quality of the school.” John Dolibois, vice president for development and alumni affairs at Miami before becoming American ambassador to Luxembourg, for whom Miami’s center in Luxembourg is named, said Shriver’s teaching received royal praise from the future Grand Duke. “We had a visit on campus in 1979 with his royal highness the Crown Prince (of Luxembourg) and I took him to one of Dr. Shriver’s classes,” Dolibois said. “He thought listening to Dr. Shriver’s lectures in that class was the highlight of his visit.” With Shriver’s 52 years of teaching, he and his father, Raymond Shriver, together taught for over a century. In remarks to a 1997 event marking his 50th year of teaching, Shriver credited his father as an inspiration for his career. “This evening really began 94 years ago, when a young 18-year-old by the name of Raymond Shriver began to teach in a one-room country school,” Shriver said. “In all he taught 49 years … he was a role model.” ‘A person of boundless goodwill’ Shriver was well known for his kindness, even temperament and remarkable ability to remember people. Lloyd Goggin, vice president for finance and business affairs under Shriver and namesake of the Goggin Ice Arena, said Shriver “is one of the finest persons I have ever met.” “He had a great way of working with people, asked a lot of questions and was very kind,” Goggin said. “He had a great ability to try to work through a problem with students and with all of us, for that matter.” Shriver was known as a visible presence on campus, easily accessible to students. “He was never the aloof kind who just stayed in his office. He was out on campus, seeing people, and he liked to spend a lot of time with faculty and students,” Pratt said. “He let himself be a target and many other presidents simply would not have endured it.” Todd Bailey, class of 1973 and visiting professor of finance, said Shriver’s benevolent personality had a positive impact on the campus. “Dr. Shriver was a person of boundless goodwill, he was just a positive force of nature,” Bailey said. “I’m sure he had his bad days, but I never saw them.” Bailey served as Student Body Vice President in his junior year and as an assistant in Roudebush Hall his senior year. Bailey credits his return to Miami to teach to Shriver’s influence. “When you make that connection to what Shriver’s university contributes to today’s university, it’s not bricks and mortar, it’s not a new stadium, or the student center,” Bailey said. “It’s the spirit of what we do here. That’s what he built and what is sustained.” One of Shriver’s most remarkable traits was his remarkable ability to remember people, according to Dolibois. “He remembered names, he remembered incidents and especially if alumni were former students in his classes, he had that knack, that personal touch, that really established him in The Shriver family has asked that Phillip Shriver be remembered with a donation to any one of the following: Miami University Phillip R. Shriver Scholarship, the Miami Glee Club Director’s Fund, the Lakeside Association or the Oxford Presbyterian Church. Darcy Shriver explained the family chose these specific groups with her father’s wishes in mind. “First and foremost, the scholarship was chosen because it goes to students, giving opportunities for kids to be at Miami, and that is huge for us and for dad, because students were at the center of his life.” “The Glee Club was special because he had sung in the glee club at Yale … the glee club is very, very special to him. He would just the hearts of a lot of people,” Dolibois said. Randall Listerman, who taught at Miami for 34 years and wrote a book about the Shriver presidency, said Shriver’s abilities were nothing short of miraculous. “It was an absolute gift, it was a miracle. It was absolutely stunning. He’d meet you once and never forget you,” Listerman said. “I don’t know how he did it.” Shriver treated everyone he met with respect. “He went across all spectrums, from the governor to the gardener and he treated everyone with the same respect and honor and courtesy,” Listerman said. Current Miami President David Hodge said alumni have repeatedly told him about Shriver’s outstanding character. “His basic humanity, his love for the university and for people, it made Miami more human, more personal,” Hodge said. “He had a wonderful supportive spirit.” Connor, starts looking at universities to attend in 2013.” Shriver replied a week later thanking Gilgen for her letter. He wrote that he remembered Gilgen’s father and that teaching both father and daughter made her family special to him. Shriver expressed pleasure that another generation of Gilgen’s family could be headed to Miami. ‘Uncle Phil’ loved that sort of thing. “Regrettably,” Shriver wrote, “I shall not be teaching at that time, but there will be other instructors who will be able to claim both you and your son as students.” ‘Phil Shriver saved the university’ Shriver’s presidency coincided with tumultuous times in higher education, including Miami. In Miami University: A Personal History, he wrote: “The spring of 1970 was the low point of student morale and the high point of student distress during the Vietnam War.” The period of wartime tumult at Miami is remembered primarily for the student sit-in at Rowan Hall, which nearly turned violent, and a “flush-in” in which students turned on all the faucets, flushed all the toilets and turned on all the showers at precisely 6:00 p.m., draining Oxford’s water supply in 25 minutes. Bailey credits Shriver and his administration with exceptional handling of student protest at Miami. “At the core of his being, he understood that we as a community of students were well-intentioned in our objectives and our values, but we were at times misguided in our efforts,” Bailey said. “He also understood as a dedicated educator that we would learn more from our mistakes than we would from our successes.” Doug Wilson, class of 1964 and later vice president of university relations, credited Shriver with preventing serious violence. “I watched him play a tremendously important role in keeping things as quiet as they could possibly be under the circumstances,” Wilson said. “I have the feeling that the empathy and compassion that he had working with the students at Miami in that very difficult spring would’ve probably diffused the situation at Kent State University.” The confrontation between students and the National Guard at Kent State escalated to the point where guardsmen fired on the protestors, killing four students. Dolibois said Miami owes Shriver a debt of gratitude for avoiding a similar situation at Miami. In Pattern of Circles, Dolibois wrote: “Phil Shriver saved the university. He endured abuse, stress, strain, and almost single-handedly reestablished a sense of unity on the campus. Miami University is deeply in debt to him.” CONTRIBUTED BY MIAMI UNIVERSITY ARCHIVES The Shriver family. Top row (left to right): Susan, Mindy, Carolyn, Darcy and Scott. Bottom row: Phillip and Martha Shriver. CONTRIBUTED BY MIAMI UNIVERSITY ARCHIVES Members of Phillip Shriver’s cabinet (left to right): John E. Dolibois, Robert F. Etheridge, Lloyd A. Goggin and David G. Brown. A Miami Man for life After his retirement in 1998, Shriver continued to accept invitations to speak to various campus, alumni and community groups. Together with his wife Martha, he attended numerous athletic events and concerts. Stephen Gordon, class of 1975 and curator of the McGuffey Museum, said Martha was a constant influence and presence during Shriver’s tenure as president and continued Miami involvement following his retirement. “They were really a team. I would bet that Dr. Shriver has been to more Miami athletic events than any person,” Gordon said. Martha was almost always with him. “Mrs. Shriver is beloved by Miami students,” Gordon said. “She was always there – equally friendly, and equally loved by the Miami community.” Shriver also kept up correspondence with many former students and colleagues. In 1997, Lisa Gilgen, class of 1988, wrote Shriver a letter congratulating him on 50 years of teaching. Gilgen’s father, William Martin, took Shriver’s Ohio history course at Kent State and Gilgen later took Shriver’s history of Miami course. Gilgen wrote, “Maybe some of my professors will be around when my son, tear up when we’d go to glee club concerts, and he rarely missed one. He and mom just loved the Miami glee club.” Darcy Shriver said she and her mother Martha attended the Miami glee club concert April 15, the Shrivers’ 67th wedding anniversary. “The Lakeside Association is a wonderful community up on Lake Erie … it’s near and dear to all of us, and dad.” “Lastly, his church: dad was a very strong Christian man and always walked the faith. He didn’t always talk about it, but he was a very, very, faithful man. To pass away on Easter… Easter was a very special time to him.” The family plans to have a private burial and a public memorial service will be held at a later date. CONTRIBUTED BY MIAMI UNIVERSITY ARCHIVES Phillip Shriver (center) and Lloyd Goggin (far right) break ground at the site of the old Goggin Ice Arena, June 1975. MUTV continued from page 17 campus, as well as in the Oxford community, according to Sweeney. “I think it’s great that MUTV is online, more people have access to it online so I think we’ll get more viewership,” Sweeney said. “The show is about the community so it would be nice for people off campus and people in the community to be able to access it.” The project to put MUTV online began about a year ago when a request for $9,100 was submitted to the IT technology fund to buy a video encoder that would allow MUTV to be accessed online, according to Sampson. After the device was purchased, Williams Hall Chief Engineer Steve Beitzel helped install it and get MUTV up and running online. “The video encoder allows a high resolution stream that’s identical to what you see on TV,” Beitzel said. Beitzel said he and IT Services are working on purchasing a new video encoder that will allow access to MUTV online off campus. Currently, students on the Hamilton, Middletown and Voice of America campuses can access MUTV online as well. Students interested in getting involved with MUTV can contact Sampson at sampsoja@muohio.edu. THE MIAMI STUDENT TUESDAY APRIL 26, 2011 ♦ 13 14 ♦ TUESDAY APRIL 26, 2011 THE MIAMI STUDENT Sports THE MIAMI STUDENT WOMEN’S TRACK TUESDAY APRIL 26, 2011 ♌ 15 NEXT MEET: All day Thursday in Hillsdale, Michigan Red and White compete in multiple meets By Melissa Maykut Staff Writer The Miami University women’s. “The highlight of the weekend was the group that went to the Mississippi meet,â€? head coach Kelly Phillips said. “The girls had good weather and they really took advantage of it.â€?best time of 14.24. In the 400-meter hurdles, redshirt freshman Ashley Zaper notched a 13th place finish with ď€ ď€‚ď€‚ď€ƒď€„ď€…ď€†ď€‡ď€‡ ď€ˆď€‚ď€‰ď€‡ď€Šď€‹ď€Œď€‡ď€‡ ď€?ď€Œď€Žď€Šď€‡ď€?ď€?ď€‘ď€’ď€Œď€‡ ď€Šď€‚ď€‡ď€†ď€Œď€Šď€‡ď€’ď€‘ď€Žď€‹ď€‡ ď€ˆď€‚ď€‰ď€‡ď€?ď€‚ď€‚ď€ƒď€Žď€“ď€‡iami’s ’Hawks ran the 1500-meter run. Senior Kelly Miller, who is red-shirting the outdoor season, placed second in the event. Senior Katie Lenahan placed fourth for Miami, finishing in a personal-best time of 4:30.18. The women’s team will split up again, as some of the team will compete in the Gina Relays in Hillsdale, Mich. April 28 through 30. The remainder of the team will compete in Miami’s second and final home meet of the season April 30 at George Rider Track. ď€ ď€‚ď€ƒď€„ď€ ď€…ď€†ď€‡ď€ƒď€ˆď€„ď€‰ď€Šď€‹ď€Œď€ƒď€‡ď€†ď€?ď€ƒď€Žď€‰ď€„ď€‹ď€?ď€?ď€ƒď€‹ď€‰ď€ƒ ď€?ď€ˆď€‡ď€‡ď€?ď€„ď€ƒď€‘ď€†ď€?ď€?ď€ƒď€’ď€‰ď€Šď€ƒď€ˆď€„ď€?ď€ƒď€ ď€‹ď€ƒď€“ď€”ď€•ď€‰ď€„ď€Œď€–ď€ƒ ď€Ąď€„ď€‚ď€‡ď€˜ď€?ď€œď€‡ď€˘ď€…ď€œď€Łď€‡ď€ ď€‚ď€ƒď€„ď€…ď€†ď€‡ď€?ď€Šď€‡ď€Šď€“ď€Œď€†ď€Œď€‡ď€‡  ď€—ď€„ď€˜ď€?ď€Šď€…ď€„ď€œď€†ď€‡ď€?ď€?ď€žď€‡ď€•ď€Œď€Œď€ˆď€§ď€‡ ď€ ď€‚ď€ƒď€„ď€…ď€†ď€‚ď€‡ď€ƒď€†ď€„ď€ƒď€‡ď€ˆď€‰ď€ƒď€Šď€†ď€‹ď€Œď€?ďŽď€‡ď€ƒď€ƒ ď€ƒ ď€?ď€?ď€?ď€?ď€†ď€Šď€‡ď€‘ď€…ď€’ď€“ď€‡ď€‰ď€Šď€‹ď€Œď€Œď€Šď€‡ď€?ď€?ď€?ď€†ď€‘ď€’ď€‡ď€‰ď€ƒď€“ď€”ď€’ď€?ď€?ď€‰ď€…ď€•ď€‘ď€–ď€ƒ • ď€˜ď€?ď€‡ď€†ď€™ď€‚ď€ƒď€ƒ ď€ƒ ď€‹ď€†ď€šď€Žď€‡ď€’ď€†ď€‚ď€ƒď€Žď€‡ď€ƒď€”ď€”ď€‡ď€•ď€Œď€†ď€Šď€‡ď€–ď€?ď€‹ď€ˆď€‡ď€–ď€—ď€?ď€˜ď€Œď€‡ď€?ď€›ď€œď€ƒď€šď€’ď€‡ď€œď€ƒď€?ď€Žď€…ď€”ď€–ď€ƒ • ď€ƒ â€‹ď€†ď€šď€Žď€‡ď€’ď€†ď€‚ď€ƒď€Žď€‡ď€ƒď€“ď€‡ď€‰ď€™ď€Žď€…ď€‡ď€ƒ ď€ƒ ď€?ď€˜ď€Žď€…ď€‰ď€ƒď€†ď€‚ď€ƒď€™ď€„ď€—ď€—ď€Œď€’ď€Œď€‡ď€šď€›ď€Œď€œď€‚ď€Œď€‡ď€?ď€›ď€œď€ƒď€žď€&#x;ď€“ď€–ď€ƒ ď€ ď€†ď€ˆď€‚ď€‚ď€œď€•ď€‘ď€ƒď€Ąď€‰ď€‹ď€’ď€ƒď€†ď€‚ď€ƒ ď€ƒ ď€?ď€˜ď€?ď€žď€„ď€‹ď€Œď€‡ď€‰ď€Šď€‹ď€Œď€Œď€Šď€‡ ď€˘ď€Žď€‰ď€‘ď€Žď€‚ď€†ď€•ď€‘ď€ƒď€†ď€‚ď€ƒ ď€ƒ ď€?ď€&#x;ď€‚ď€†ď€‡ď€šď€›ď€Œď€œď€‚ď€Œď€‡ď€?ď€?ď€?ď€†ď€‘ď€’ď€‡ď€‰ď€ƒď€žď€Łď€¤ď€ƒď€›ď€˜ď€’ď€‹ď€Œď€’ď€‚ď€Ľď€–ď€ƒ ď€ƒ • ď€¨ď€’ď€‚ď€Œď€ƒď€˜ď€‘ď€ƒď€†ď€‚ď€ƒď€ƒ ď€¨ď€Žď€šď€‰ď€›ď€†ď€†ď€”ď€ƒď€‡ď€†ď€ƒď€ƒ ď€šď€Žď€‡ď€šď€ˆď€ƒď€Śď€†ď€…ď€‰ď€ƒď€Œď€‰ď€Žď€‹ď€‘ď€ƒ ď€Žď€‚ď€Œď€ƒď€‘ď€?ď€‰ď€šď€’ď€Žď€‹ď€ƒď€†ď€„ď€„ď€‰ď€…ď€‘ď€Šď€ƒ ď€—ď€ˆď€‰ď€ƒď€ ď€‚ď€ƒď€„ď€…ď€†ď€‡ď€‡ď€…ď€Žď€’ď€‹ď€‰ď€…ď€ƒď€Žď€šď€…ď€†ď€‘ď€‘ď€ƒď€„ď€…ď€†ď€Śď€ƒď€§ď€šď€Ąď€†ď€‚ď€Žď€‹ď€Œď€•ď€‘ď€ƒď€†ď€‚ď€ƒ ď€ƒ ď€ ď€„ď€˜ď€‚ď€†ď€Šď€‡ď€‰ď€Šď€‹ď€Œď€Œď€Šď€ƒ ď€ ď€‚ď€ƒď€„ď€…ď€†ď€‡ď€‚ď€„ď€ ď€‚ď€ƒď€„ď€„ď€ˆď€†ď€‡ď€„ď€‰ď€†ď€Šď€‡ď€„ď€‹ď€Šď€‰ď€‹ď€Œď€?ď€Žď€„ď€ ď€…ď€†ď€‡ď€ˆď€„ ď€Œď€ƒď€„ď€‰ď€Šď€ ď€‹ď€Œď€?ď€Žď€ ď€‹ď€‹ď€?ď€Žď€ˆď€? Windows.ÂŽ Life without Walls™. Dell recommends Windows 7. .JBNJ6OJWFSTJUZ0Y'PSE Save even more on a new Dell system for college Students get the best price* on consumer PCs from Dell Dell XPS™ 15 $ 99 824 After member savings and $75 off coupon* Enjoy dynamic sound, razor sharp graphics and blazing speed with the XPS family of high-performance laptops. Ĺ”(FOVJOF8JOEPXTj)PNF1SFNJVN Ĺ”1VSDIBTF.JDSPTPGUj0ĹĽ DF1SPEVDU,FZUPBDUJWBUF 0ĹĽ DFQSFMPBEFEPOUIJT1$ Exclusive Student Coupons* Get an additional Systems $799 or more 75 off $ (before taxes & fees) Expires 5/21/2011 Use coupon* code: Q$LSSLRJK9LHMP Shop now Get an additional 100 off $ Systems $999 or more (before taxes & fees) Expires 5/21/2011 .JDSPTPGUj0ĹĽ DF gives you easy-to-use tools to help you express your ideas, solve problems, and simplify everyday projects. Use coupon* code: ?F?SH4PW03$8BP Dell.com EFMMV.609 1-800-695-8133 Member ID: 116017011 * If you ďŹ nd. $75 Off systems $799. $100 Off systems $999. FYI Page Tuesday 16 April 26, 2011 The Miami Student Oldest university paper in the United States, established in 1826 Sam Kayëlle. 9,000... The number of Miami Student readers who will see YOUR AD HERE! To advertise in The Miami Student , please contact Katie Neltner at neltekj@muohio.edu. For Rent Apartments Uptown Apts 2011-12 Across from BW-3’s, behind Pour House. 108 S. Main, Permit for 3, $1900 per semester/person. Large kitchen, big living room, A/C, some furnishings. Call Dan, 513-543-4470 Updated Condo For Rent4 Bedroom 2 Full Bath Extremely clean. Full kitchen/washer and dryer in the unit. 2nd floor~Garage, Security Door Vaulted Ceilings Water, Sewer, Trash paid.Call 513-266-1685” LCD TV, Free hi speedinternet. BISHOP & WITHROW ‘11-’12 school year, upstairs of “Top or Bottom”, permit for 4, 2 large bedrooms, 1 bath, reduced to $2700/person/semester. 812-350-4357 Notice Roommate needed Looking for a girl needing housing for 2011-2012 school year. House (Cosmopolitan) is located at 23 W. Spring Street(just 3 houses down from Patterson’s Cafe). Rent VERY CHEAP($2750/ semester)Will live with 7 others. Contact bickelle@muohio.edu or 412-708-5554 Duplex available 4 bedroom available in Northridge in a quiet residential area beginning in May. Perfect for graduate students and professors. Call 513.257.7237 for more info For Rent New, Spacious 4 bedroom/ 2 full bath house available for 11-12 school year. Contact Red Brick at 524.9340 for more info. Cincinnati rental Graduating and moving to Cincinnati? We have the perfect house available in desirable Mt. Lookout Square. Spacious 3 bedroom with huge 2nd story deck; walking distance to all the bars and restaurants. $465/ month per person, based on 3 people. You canít beat it! Call 513.257.7034 more info Wanted dead or alive. Cars, trucks, etc. 513-330-0263 Employment Opportunities Summer Job Opportunity Production workers needed for exterior house painting. $8/hr starting with bonuses.40 hours a weekStudent Painters hires on a first come, first qualified basisLocated throughout the midwest To set up an interview Call 513-582-5900 or email sehlhoer@ muohio.edu for Greater Cincinnati Other regions call 888-839-338 For Rent ‘11-’12. Great Location one block from campus: 22 E Central. Well maintained. Large spacious rooms. Off-street parking. Call First Financial Bank (513) 867-5576. News 513-529-2257 Editorial 513-529-2259 Advertising 513-529-2210 Fax 513-529-1893 For Rent 2011-2012 Great Properties available for the 2011-2012 school year. Contact OXRE at 513-523-4532 www. OXRE.com Love Where you Live! Oxford Real Estate, Inc.19 S. Beech St.Oxford, OH 45056 513.523.4532 Apartments SOUTH CAMPUS QUARTER OPENED August 2010 Modern Living ~ Contemporary Design -Located across from the REC Center. For more information call (513) 523-1647 or visit southcampusquarter.com COURTYARDS OF MIAMI TIRED. NEED SOMEONE TO ASSUME LEASE COLLEGE SUITES. 4 bed/4 bath. Regularly $430/month. WILLING TO TAKE $400/MONTH. 937-935-9078. pricebm2@muohio. edu Houses MILE SQUARE LOCATION ‘11-’12 school year, 220 E. Withrow, permit for 4, 4 bedrooms, 2 baths, dishwasher, washer and dryer..lots of living space! Price reduced to $2800/ person/semester 812-350-4357 812-350-4357 Roommate Needed HOUSEMATE NEEDED Looking for girl needing housing for Fall 2011. 104 Ardmore St. (by the rec). Will have 3 great housemates! $2300/ semester contact halleak@muohio. edu 330-268-8711 TMS When you’re finished reading The Miami Student, please recycle! eArn enGAGe exPLore [credits] [ your mind] [the possibilities] SUMMER SESSIONS at the University of Pittsburgh enroLL [in summer sessions] When you need transportation to: Greater Cincinnati/Northern Kentucky International Airport Dayton Ohio International Airport We also specialize in Sports & Reunion transportation needs Make the most of your summer break! Pick up some extra credits to get a head start on the fall semester. Credits are transferable to most colleges and universities around the country. Register today at SUMMER SESSIONS 2011 UNIVERSITY OF PITTSBURGH SCHOOL OF ARTS AND SCIENCES COLLEGE OF GENERAL STUDIES Campus THE MIAMI STUDENT TUESDAY, APRIL 26, 2011 ♦ 17 Broken Heritage Commons parking barrier becomes routine By Trent Marion For The Miami Student Ed Butch, the apartment director of Miami University’s Heritage Commons, is a full-time employee who serves as a resource for the community and aides in crisis management. This year, Butch has had to deal with a frequently occurring crisis: an estimated 50 times (and counting), he starts his day by calling the Maintenance Repair Technician for Heritage Commons to replace one or more parking lot barriers. Butch said access to the Heritage Commons parking lot is intended to be exclusively for students who live there and purchase a specific permit. Before entering the lot, students must swipe their Miami IDs, which raises the yellow barrier guarding the lot, according to Butch. “I’m not sure why it is broken so frequently,” Butch said. “This is my second year as apartment director and it has definitely happened more often this year than last, but this has been an ongoing problem for Heritage Commons.” With no concrete knowledge of its source, managing this crisis is no easy task. For others, the reason for the destruction is easy to pinpoint. Chris Hopkins, a sophomore resident of Heritage Commons, has witnessed intoxicated students break the barrier on multiple occasions. “It’s an easy target for drunk kids,” Hopkins said. “People like to break stuff when ANDREW BRAY The Miami Student The parking barrier at Heritage Commons has been broken more than 50 times this school year. they’re drunk. A couple times I’ve seen kids get a running start, jump on the barrier and run away.” According to Sgt. Jim Squance of the Oxford Police Department, these offenders risk fines and jail time for the sake of what they may see as an unadorned prank. “They would be charged with criminal damaging,” Squance said. “Criminal damaging is a fourth degree misdemeanor, which requires a court appearance and can result in up to a $250 fine and 30 days in jail.” Despite notifying law enforcement each time a barrier is broken, police involvement is usually unproductive. “(Miami University Police Department) is contacted about the gates whenever they are reported,” Butch said. “The issue is they can only do something about it when there is a suspect or the few times we have actually caught a student breaking the gate.” He also has been working closely with others in the Office of Residence Life to explore different options to deter this act of disobedience. “Some solutions that have been talked about include stronger gates and installing video surveillance,” Butch said. “There are many positives and negatives to each of these solutions – the most striking negative being the cost of installation for each.” Until a solution is agreed upon and put into action, the outlook remains bleak. Law school applications decrease nationally, return to normal rates MUTV streaming online, hopes to expand access By Erin L. Cox By Lauren Ceronie For The Miami Student The number of law school applications has dropped nationally by 11 percent from last year according to the Law School Admission Council. The decrease in applicants, however, may be showing a return to the average number of applicants after a peak was shown in the past two years. According to the Director of PreLaw Programs at Miami University, Yvette Simpson, the drop is not actually a drop, but a return to the normal number. “It’s a stabilization of really high increases that are leveling off,” Simpson said. “I think as the economy drops, students start to think more critically about their future.” Andrew King, a senior attending law school next year, said he thought the number of applicants showed a return to the status quo also. “I think the number is really just going back to what it was,” King said. “It also may be students who are deciding to get a job for a few years before going to law school because it’s more competitive.” Simpson said the competiveness of law school could factor into the lowering rates of law school applicants as students consider how they will fare in the applicant pool. “Very few students realize how competitive law school actually is,” Simpson said. “Some students may not be competitive enough as an applicant and need to take a few years off to gain more experience.” The cost of law school remains an important factor for students to consider before applying and according to Simpson, the drop in applicants results partly from more students realizing this huge investment. “Going into a graduate studies program is not the same as law school, you are going to learn to be a lawyer,” Simpson said. “We don’t encourage students who are trying to ‘find themselves’ to go because it’s a big investment.” King agreed cost could cause the dropping number of applications also. FOOD continued from page 2 means that the hens are not confined in cruel and inhumane battery cages,” Balk said. “For universities that’s the first thing they have to be concerned with.” Demske Culinary Center adjusts to student demands Deciding what to purchase — such as cage-free eggs or not — is the job of the Demske Culinary Center. “We have to offer products that the students are looking for,” Brubacher said. “We find out we make those decisions numerous ways. One way is we do follow the Miami Expressions, the online comment system. We take those to heart. Our large November survey that goes out every year to all on campus students, then just individual feedback to what our students give to our dining unit managers.” The center began using a group purchasing organization called Provista in 2008 in addition to purchasing from local and state suppliers. “A lot of our local farmers that we deal with, we wouldn’t be able to buy from them,” Brubacher said. “That was one of the selling factors for us with Provista was that we are not locked in, we can pick and choose to participate as much or as little as we want to.” Provista membership also gives Miami more power in the market. “There is over $40 billion in combined purchasing power,” Brubacher said. “By Miami being a member of Provista, the budget that I work with on an annual basis is about $10 million for food, instead us looking for a supplier and going in with our $10 million to spend, by being part of this group we are working with a combined $40 billion in purchasing power.” “Law school is a full time job,” King said. “It’s hard for students to work and go to law school, so it’s basically three years with no income.” Although cost may be considered a disadvantage of going to law school, Simpson thought it is necessary for the legal profession. “If you want to be a lawyer, you have to go to law school,” Simpson said. “It gives you the ability to practice what you want to do and you’re going to learn.” Simpson also said the economic problems have affected the legal profession and attending law school does not guarantee a job. “We encourage students to think more critically before going to law school,” Simpson said. “Students with more life experience are better able to handle the challenge of a law school as a professional school.” Miami will not know the change the number of Miami students applying to law school until next year, but Simpson expects a similar drop, as Miami tends to stay close to the national number. Campus Editor Students can now watch Miami University Television (MUTV) anywhere on campus, not just where there’s a television. MUTV, channel 15 on campus cable, is now streaming online where students can watch it any time, according to Joe Sampson, clinical faculty in journalism and communications. “The idea behind doing this is that we know students like TV, but they don’t like watching it on TV,” Sampson said. “Now they can watch in Shriver, their dorm rooms, anywhere on campus.” To access MUTV online, students can go to. edu/mutv and select MUTV from a list of programs, according to Sampson. Students can then watch whatever is currently on MUTV, but streaming online. MUTV is currently available only on campus due to the type of This is one of the “smart business decisions” Brubacher said he has to make. “We are an auxiliary of the university meaning Housing Dining and Recreation services,” Brubacher said. “Our money is generated through the sale of meal and board plans. We are not receiving tuition, so all of our dining services on campus, we have to make smart business decisions.” But the purchasing doesn’t happen just inside the confines of the building. Brubacher’s job focuses on getting familiar with the farms and companies Miami purchases food from. “We make sure that we know these people,” Brubacher said. “We make sure that we’re there when they deliver product. If it’s a product that needs to be refrigerated then they need to get it here under proper storage conditions.” Senior dietetics student Chloe Berdan said she wishes the center advertised their efforts more. “A lot of this is stuff I didn’t know,” Berdan said. “I feel like just letting the students know more about this is really important with what food Miami is providing and what food you can get outside Miami too.” Organic Vs. Local Food With the word organic often equated to healthy in terms of food, why isn’t Miami purchasing more organic food? For Parkinson, the answer may be that organic isn’t necessarily better than other food. “There is not a major nutritional difference between organically produced and regularly produced foods,” Parkinson said. “We can say that there are minimal nutritional differences in organic versus non-organic foods based on research from the Mayo Clinic and the American Dietetic Association and Tufts University and also the USDA.” According to McEwen, the organic label may not be as solid as it seems. “The label ‘organic,’ there is a lot of wiggle room to it,” McEwen said. “A lot of the companies do the least that they have to in order to be labeled organic and an organic farm video streaming device MUTV has, but the goal is to eventually have it available anywhere in the world, according to Sampson. “One of the things we want to be able to do is allow alumni who may have worked at MUTV and prospective students who want to see Miami to be able to access this and see what kind of opportunities they have,” Sampson said. Senior Meghan Sweeney, president of Miami Television News, a bi-weekly show, agrees that MUTV could be a good tool to attract prospective students. “I think it would be great for prospective students who are interested in TV or broadcast journalism to see that students have successful shows,” Sweeney said. “They would also get to see positive aspects of campus through the shows.” Miami Television News reports on things on wSee MUTV, page 12 doesn’t necessarily mean that it’s not commercialized, so even though it is labeled organic doesn’t necessarily mean that it is a family farm.” Miami utilizes organic produce in the salad bars but Brubacher said the focus for dining halls is more on purchasing local foods. “A lot of the local farmers that we use are not certified organic while they may follow organic farming practices we can’t advertise them as being organic because they don’t have that certification,” Brubacher said. “If we can buy from a farmer 10 miles from here that doesn’t have that organic certification it’s still a lot smaller carbon footprint than buying from a farm a large mass-produced farm in California that might have that certification.” According to Parkinson, farmers may be discouraged from registering their products as organic because they have to pay a fee. Instead of focusing on organic items, the Culinary Center tries to buy as many local and Ohio products as they can. “Some of the local farmers we buy from do participate in the Farmer’s Market,” Brubacher said. “We don’t go to the Farmer’s Market itself, but a lot of the people we buy from set up at either the uptown market or the Talawanda market.” According to Brubacher, location was a factor in the decision of where to purchase deli meat. “We decided to use Walnut Creek Foods which is an Ohio company which was a plus,” Brubacher said. “We try to use as many Ohio and local companies as we can so that was a plus there in the fact that it was an Ohio company and it was the overwhelming favorite of all of the deli turkey’s we sampled.” McEwen approves of Miami’s decision to purchase food from local sources. “I had no idea that Miami purchased local stuff so that’s awesome,” McEwen said. “Maybe if they could continue that, maybe expand it and help the local community that would be awesome.” 18 Tuesday April 26, 2011 No steroids in play for this record Brian Gallagher Gallagher’s Going for Two L egend has it that, around 500 B.C., a Greek messenger named Pheidippides ran 25 miles from a battle at Marathon to Athens to announce a victory over the Persians. After gasping, “we have won” he collapsed and died on the spot. While the veracity of this story may be questioned, the epic run served as the beginning of the event named after the battle rather than the famous messenger (because running a marathon sounds better than running a “pheidippides”). Although it had auspicious beginnings, the marathon does not enter into the public spotlight very often, outside of the Olympic Games. I could probably make it halfway through the Miami University Directory before I found someone who knew who the world record holder in the marathon is. For the record, it’s Haile Gebrselassie, who ran 2 hours, 3 minutes and 59 seconds in 2008. Even though the marathon is a popular event (thousands of people run one each year) it’s easy to see how the Attention Defecit Disorder-driven American public gets turned away from watching people run for over two hours. ESPN’s Tony Kornheiser once said he loved covering the marathon because he had time to eat a full meal, come back and not have missed anything. However, last week, something happened in the marathon that deserves the public’s attention, if at least for a few minutes. Geoffrey Mutai of Kenya not only broke the world record at the Boston Marathon, he shattered it, beating the previous best by nearly a minute and running 2:03:02. He averaged 4:42 per mile, a time which would have earned a letter jacket at most high schools, except he did it for 26 miles. The only problem was that Mutai did not get the world record. The fastest time by a human being over 26.2 miles will not be recorded in the annals of history. You might be asking yourself, how could such an injustice occur? The governing body of track and field, the International Association of Athletic Federations, mandates marathon courses eligible for record-setting purposes must be loop courses (Boston is a point-topoint course) and the course must not drop more than 170 feet over the entire race. Boston is notoriously known as one of the toughest marathon courses, where the hills are so tough they have names like “Heartbreak.” But since it drops 495 feet over the course of 26.2 miles it is not eligible for a world record. The weather was also in favor of a fast time, with cool temperatures and a “nor’easter” blowing at the runners’ backs the entire way, adding to the “advantage.” In today’s world of ego-driven, steroid-pumping, media-seeking professional athletes, you would have expected Mutai to throw a tantrum after finding out his time was not a new world record. Imagine what Barry Bonds would have done if baseball told him that his homerun record would not stand because too many were hit with the aid of a tail-wind (not to mention steroids). Or Tiger Woods being told that his score would not count because a tree gave him a lucky bounce. Let’s just say I wouldn’t want to be the one that had to tell them. When Mutai was told about the technicality, he simply said, “I see this (race) as a gift from God, I don’t have more words to add.” While he may not get his 15 minutes of fame and the record that he deserves, his humility should remind all athletes that being a good sport isn’t a bad thing. MEN’S TRACK Sports Editor Michael Solomon sports@miamistudent.net NEXT HOME MEET: All day Saturday in Oxford MU prepares for home invite By Melissa Maykut Staff Writer. Schedule GOLF SCOTT KISSELL The Miami Student Freshman Jahquil Hargrove competes in the Miami Invitational April 9 at Miami University’s George Rider Track.. baseball softball track and field FRIDAY FRIDAY THURSDAY Bowling Green State University Bowling Green 6 p.m. 1 p.m. Oxford, Ohio Bowling Green, Ohio Gina Relays all day Hillsdale, Mich NEXT GAME: All day Friday in Maineville, Ohio RedHawks place eighth in Columbus By Hannah R. Miller “We’re playing okay but we need to play a full 18 holes. We didn’t do that every round which is why we ended up where we did.” At the Kepler Intercollegiate Tournament, the final tournament Sophomore Brett Tomfohrde finished at 14-over par, tying for before the Mid-American Conference (MAC) Championships, the 37th place. Freshman Austin Kelly tied for 39th place at 15-over Miami University men’s golf team had trouble keeppar and sophomore Ben Peacock tied for 42nd at ing their scores down. With rainy conditions and a 16-over par. The final golfer for Miami was senior lengthy weather delay, Miami finished in eighth Michael Drobnick finishing in 51st at 18-over par. “We played better place, shooting a 46-over par. The University of IlIn order to compete in the MAC Championships, than our scores in- Lubahn knows what the team’s focus needs to be. linois and Kent State University tied for first out of the 11-team field, shooting an overall 5-over par. In dicated ... but we’re “We have to stick to the things we’re good at and the three round tournament, the ’Hawks had team play the shots we’re comfortable with,” Lubahn excited about the scores of 307, 298 and 293, showing improvement said. “We need to focus on leaving it all on the way we’re starting course, battling as hard as possible, not worrying each day but not gaining enough ground to stay to strike it. ” in contention. about expectations or consequences, and playing Head Coach Casey Lubahn noted some positive aswith deep down passion and determination.” CASEY LUBAHN pects from the weekend. Preparing for his final tournament as a ’Hawk, HEAD GOLF COACH “We played better than our scores indicated,” Sutherland agrees with Lubahn about leaving it all Lubahn said. “We struggled to finish some rounds and on the course. kind of had multiple guys play poorly on the same “We have nothing to lose so if we have that menday, but we’re excited about the way we’re starting to strike it.” tality every day out there and play with that, it will be easier to Senior Nathan Sutherland was the top finisher for the Red and shoot full rounds,” Sutherland said. “I know we’re capable of doing White, tying for 14th at 6-over par. Sutherland was consistent in his that and I think we believe that it’s possible. And we have to stay play, shooting 73s in each of the three rounds. He is optimistic that relaxed, that will help us.” with increased consistency his team will be in contention in their The RedHawks will battle for their 13th conference title as they final tournament. host the 2011 MAC Tournament at TPC River’s Bend starting April “Everyone played okay and had potential in their rounds but 29. There will be two rounds Friday followed by a single round both didn’t finish well or had a bad stretch somewhere,” Sutherland said. Saturday and Sunday. Senior Staff Writer Published on Apr 26, 2011 April 26, 2011, Copyright The Miami Student, oldest university newspaper in the United States, established 1826.
https://issuu.com/miamistudent/docs/04.26.2011
CC-MAIN-2017-47
refinedweb
19,526
61.26
> network-java.rar > ping.h // The following ifdef block is the standard way of creating macros which make exporting // from a DLL simpler. All files within this DLL are compiled with the PING_EXPORTS // symbol defined on the command line. this symbol should not be defined on any project // that uses this DLL. This way any other project whose source files include this file see // PING_API functions as being imported from a DLL, wheras this DLL sees symbols // defined with this macro as being exported. #ifdef PING_EXPORTS #define PING_API __declspec(dllexport) #else #define PING_API __declspec(dllimport) #endif // This class is exported from the ping.dll class PING_API CPing { public: CPing(void); // TODO: add your methods here. }; extern PING_API int nPing; PING_API int fnPing(void);
http://read.pudn.com/downloads117/sourcecode/java/496753/work/netManager/app/src/discovery/ping/ping.h__.htm
crawl-002
refinedweb
123
71.75