text
stringlengths
454
608k
url
stringlengths
17
896
dump
stringclasses
91 values
source
stringclasses
1 value
word_count
int64
101
114k
flesch_reading_ease
float64
50
104
Web Forms :: Capture Screenshot (Snapshot) Image Of Website Periodically Every 5 MinutesMay 7, 2015 Every 5 minutes automatic take screenshot capture & Save To Database Using WebPages Is it possible or not? Every 5 minutes automatic take screenshot capture & Save To Database Using WebPages Is it possible or not? With reference to example: [URL] I downloaded it and worked fine. However, I wish you push it further adding the following features: 1- Download button: where after the bitmap is captured and published into the image control, a "Download" button can be clicked to force the client browser open the "Save As File" dialog box in order to enable the user download the image into his/her client machine after choosing his/her suitable directory path. 2- Email button + Textbox to type the target email: where after te bitmap is captured and published into the image control, a "Email" button can be clicked in order to send the captured image to any email the user had specified in the textbox. Condition: - Captured image shall remain as bitmap in memory. It shouldn't be saved in the server. - Email shall be sent with the image placed in the BODY and ATTACHMENT. Within a div there is a iframe with loaded a link (which is not my own link). Now on a button click how can i capture the screen shot of that iframe using js or c#... Is it possible to Capture images using webcam and storing them into desktop in web application....View 1 Replies I would need to take a snapshot of my webpage in asp.net c#, i have used the WebsiteThumbnailImage which is a part of the System.Windows.Forms; i am able to get the snapshot of the webpage in my Local system but unable to get it in the Devlopment Server Can someone give me some working code that will take a snapshot a website giving the url or is there any free controls out there?View 1 Replies I have a register page. Where you have to enter a website url. -and when you click on the register button. Then it will automatically created a screenshot of the selected website url.View 5 Replies I am required to develop a page for news updates where user of the website can see the latest news updates with images in hindi. Like some news paper website. [URL] .... When user click on the read more or on the title of the news complete news will displayed on news on new tab. when admin of the website update the new it will appear on the page. where recently updated news is display first position. admin of the website have authority to do following task 1. update the news. 2.edit the news. 3.delete the news Can i make use of sqlserver for storing the news or xml. Would anyone know how to capture the complete website URL? I tried using this: string strRawUrlText = Request.RawUrl; but, this only gives me "/login.aspx", instead of the "". what's the easiest way to capture a web cam image in ASP.net? (I'm a visual kind of person - any examples or references) how to capture the live video from a dvr device to a webpage?I have been searching and googling for a week and found nothing.View 2 Replies How to capture images from webcam and store in database in asp.netView 1 Replies I am working on a web application that works very similar to YouTube where a user can upload a movie clip so that others can see. 1- to capture an imgae for the clip at the time of being uploaded to site so that I can use the image in the playlist. 2- best to create the playlist? I have a simple aspx page which display the google map when the user enters the address. When the user click Next, I want to capture the displayed map and email to me. How can I capture this google map image? aspx: <div id="map" style="width: 500px; height: 300px"></div> <asp:Button I have an application on server, now i want to create button that capture image using WebCam and upload on server....View 1 Replies to create an image from some data in my database on the server every 5 minutes. The image path is Images/top5.jpg, so that users can place a link to that imagine on some forum or whatever and it will update every 5 minutes.I am doing this by using a System.Threading.Timer in Global.asax: vb.net Code: Public Class Global_asax Inherits System.Web.HttpApplication Dim path As String Dim timer As System.Threading.Timer Sub Application_Start(ByVal sender As Object, ByVal e As EventArgs) [code]... I am using this tutorial, and my question is how can I save it to database after I capture? in ASP.NetView 1 Replies I need to capture and save user signature to database on asp.net webform. I found this plug-in: [URL] I downloaded the example project and it is very simple, it has only fews file but I could not understand. demo here: [URL] How do I use this on a web-form page, let say on "save" button click postback event, it will save the imageurl of the signature under this format: uk-button uk-button-primary" rel="nofollow" href="" target=_blank>View 1 Replies I want to redirect the user after 2 mins if there is inactivity for 2 mins. I am not using ASP.NEt membership. And I dont want to use Sessiontimeout for this. Session timeout will logout the user even if he is working on the system. My objective is like screensaver process. If there is no action for the specified time, the screensaver runs. Similarly, I want to redirect the user to login page. note that i have already handled it with the following javascript: [Code].... Here what my problem is, the user is working on the site...ok.. he want to see someother site.he browse someother site and works on....or even he can do some other work in his system...but he is active in his system... What this script does is, it automatically logout the user and redirect him to login page. But it should not do while he is active...IT SHOULD REDIRECT IF HE IS NOT ACTIVE REALLY (Similar to Screensaver process) Is it possible ? if. i need to develop application in asp.net which captures data from any website like live criket scores. how to proceed on this topic and from where to start.View 3 Replies i m developing an app in which i have need to get image from webcam and store it in to database i m using visual studio 2008 and asp.net with c# i m looking for code for this operation.View 9 Replies I am trying to capture the Enter kay when pressed on an ASP.net website in C#.View 1 Replies I want to develop a simple webcam image capture application in asp.net (vb.net). The camera output is 320x240. But I want the image in 240x320 size. When I try to resize the 320x240 image, the image stretches vertically and looks pretty bad. What code should be used to do this and upload the resultant 240x320 image.View 9 Replies This is the first time I've come across this kind of problem before and I'm having trouble approaching it. I have a swf developed by someone else that posts an image and I have to create a handler of some kind to capture it, name it, then upload it to a directory. I've tried a couple ways and nothing is working. this is a quick an dirty approach, just an aspx file <%@ Page Language="C#" %> <%@ Import Namespace="Components" %> <%@ Import Namespace="System.IO" %> <script runat="server"> public partial class upload : System.Web.UI.Page { protected void Page_Load(object sender, EventArgs e) { string uploadDirectory; uploadDirectory = Server.MapPath(@"images/"); string imageName = "image.jpg"; string uploadPath = uploadDirectory + imageName; //FileUpload imageUpload = new FileUpload(); // Get the data from the POST array string Email = Request["email"]; HttpPostedFile imageFile = _context.Request.Files["image"]; imageFile.SaveAs(uploadPath); } } </script> this is another approach using a handler. <%@ WebHandler Language="C#" %> using System.IO; using System.Web; using System.Web.Configuration; using System.Web.IHttpHandler; public class Uploader : IHttpHandler.i { public void ProcessRequest( HttpContext _context ) { string uploadDirectory; uploadDirectory = Path.Combine(_context.Request.PhysicalApplicationPath, @"images"); //uploadDirectory = Server.MapPath(@"images/"); string imageName = "image.jpg"; string uploadPath = uploadDirectory + imageName; //FileUpload imageUpload = new FileUpload(); // Get the data from the POST array string Email = _context.Request["email"]; HttpPostedFile imageFile = _context.Request.Files["image"]; imageFile.SaveAs(uploadPath); } }
https://asp.net.bigresource.com/Web-Forms-Capture-Screenshot-Snapshot-Image-of-Website-periodically-every-5-minutes-2SHU4.html
CC-MAIN-2021-17
refinedweb
1,457
66.23
about_Objects Updated: May 20, 2009 Applies To: Windows PowerShell 2.0 TOPIC about in a namespace. An object is made up of three types of data: the object's type, its methods, and its properties. The data about an object's type provides details about what kind of object it is. For example, an object that represents a file is a FileInfo object. An object's method is an action that you can perform on the item that the object represents. For instance, a FileInfo object includes a method that you can use to cause the file to be copied. That is, when you invoke the copy method of the object, the file that the object represents is copied. An object's property is information about the state of that object. For example, a FileInfo object includes the length property, which specifies the size of the file represented by the object. When working with objects, you can use their methods and properties in your commands to take specific actions and manipulate data. This is especially useful when you combine multiple commands into a single pipeline. an object for each item in the root directory of the file system. Those objects are passed down the pipeline to the second command (where {$_.PsIsContainer -eq $false}). The second command uses the PsIsContainer property of the object to filter the data from the input objects so that no directories (containers) are returned. The command then passes the information as objects to the third command (Format-List), which displays the contents of each piped object in a list format. SEE ALSO about_Methods about_Properties about_Pipelines Get-Member Community Additions Show:
https://technet.microsoft.com/en-us/library/dd347606.aspx
CC-MAIN-2015-11
refinedweb
275
64.91
Template class responsible for keeping a pool of open connections. More... #include <qgsconnectionpool.h> Template class responsible for keeping a pool of open connections. This is desired to avoid the overhead of creation of new connection every time. The methods are thread safe. The connection pool has a limit on maximum number of concurrent connections (per server), once the limit is reached, the acquireConnection() function will block. All connections that have been acquired must be then released with releaseConnection() function. When the connections are not used for some time, they will get closed automatically to save resources. Definition at line 243 of file qgsconnectionpool.h. Definition at line 247 of file qgsconnectionpool.h. Definition at line 249 of file qgsconnectionpool.h. Try to acquire a connection: if no connections are available, the thread will get blocked. Definition at line 262 of file qgsconnectionpool.h. Invalidates all connections to the specified resource. The internal state of certain handles (for instance OGR) are altered when a dataset is modified. Consquently, all open handles need to be invalidated when such datasets are changed to ensure the handles are refreshed. See the OGR provider for an example where this is needed. Definition at line 293 of file qgsconnectionpool.h. Release an existing connection so it will get back into the pool and can be reused. Definition at line 277 of file qgsconnectionpool.h. Definition at line 303 of file qgsconnectionpool.h. Definition at line 304 of file qgsconnectionpool.h.
http://www.qgis.org/api/classQgsConnectionPool.html
CC-MAIN-2017-30
refinedweb
245
60.11
Preparing the Environment And here we go..! Welcome to first programming lesson in this series, today we will prepare our desktop/laptop environment in order to start coding, and we will write our first Hello World applications. In this course, we will use a program called CodeBlocks (click here to download). its an IDE (Integrated Development Environment) which helps you create and compile (run) C++ programs, so download it from the link above, install it the way you install any program, and lets start working 🙂 My favorite way of learning any new program is to try it out, so lets try to create and compile our first C++ code: Open CodeBlcoks - Go to File -> New -> File.. - Chose C/C++ source, then hit Go - Click Next > - Make sure that C++ option is selected, click Next > - Click on the dots icon under (Filename with full Path) , create a new folder with the name (Tutorial 0), navigate to it, then write (helloWorld) inside the File Name field, and click Save - Click on Finish Writing & compiling your first code You will perform these steps each time you want to create and run a new code, so get used to them. Next, copy and paste the following code: #include <iostream> using namespace std; int main() { cout << "Hello World" << endl; return 0; } Now its time to compile & run our first code..! You will find a small toolbar at the top , the first icon is to compile the program, which means: build up your code, the second icon is to run it and see the result, and the last one, is to compile & run the code at the same time. So lets try to compile and run our code to see the results; click the third icon (compile and run): Congratulations..! you have successfully configured your CodeBlocks, and compiled and run your first code..! Now its time to explain what did we write exactly so we understand the basics of programming. Code Explanation #include <iostream> using namespace std; int main() This is the head start of any code you will write in the future. The #include<iostream> is the header file for input and output standard C++ Library. Its like saying (OK C++, I will output some lines “Like the Hellow World statement we just had”, and I will let the user to enter some parameters “will come lately’, so be prepared.!”). using namespce std; namespaces allows us to group a set of global classes, objects and/or functions under a name. If you specify using namespace std then you don’t have to put std:: throughout your code. The program will know to look in the std library to find the object. Namespace std contains all the classes, objects and functions of the standard C++ library, see how our code will have to look like if we didn’t put that statement on: #include <iostream> int main() { std::cout << "Hello world!n"; return 0; } See..! You will have to write std:: before every single step you perform, even if it was a simple input, output, whatever, who wants to do that :/ int main(), This is the main function prototype that you are going to use everywhere, its where you will put all of your code inside in order to make it run. cout << "Hello World" << endl; A couple of things you have to note and concentrate on here: To print a value to the screen, write the word cout, followed by the insertion operator (<<), which you create by typing the less-than character (<) twice. Even though this is two characters, C++ treats it as one. Next, put the word you want to print between two quotations, this actually tells the compiler that you want to print whatever is between these two quotes. And finally, indicates that you want to print an “end line”, or a new line, after the statement. Important notes: - When you want to code any program, try to think about the problem through out the process. Think about a logical solution for the problem, and try to implement it. And remember: you can NEVER find any two identical codes for one problem. There are always multiple solutions and each one of us tend to solve it the way he/she thinks that is the best. - Don’t forget the semi column after each statement, or you will never be able to compile the program. A semi column indicates that “here where the command cout will end, the next line will be a new command line”. - The curly brackets { } says that: the function “int main()” code will start at the beginning of this bracket and end when its closed. Well, that’s it for now, and I’ll be more than happy to read all of your comments or suggestions. Aslam 3likom I think reading every lecture you post before the lab will give me an advantage in the class. Having a background of what im going to study will give me straight A in the course . I’ll keep up with you class by class . Thanks is not enough , don’t know what to say. Author I’m so happy to read your comment, it gives me a great encouragement to continue with these tutorials, specially when you find someone who really benefit from it.. Thank you for passing by, and I hope to see you in next tutorials 🙂 I agree with Mohammad Yousuf its so simple and organized and if it contains the main point in every class it will be helpful specially for the beginners.. Thanks a lot.. I really appreciate your d work! 🙂 Author You are most welcome 🙂 .. Actually I’m not going to follow the labs. I prefer to describe the main ideas (the one which will be of benefit students in all classes) rather than to concentrate into a specific lab or point, in that case, a student will have enough knowledge to solve any of the labs provided 🙂 Great job bro 😀 .. As Mohammed said it is better to have an idea about what we are going to face and I can see that your tutorials are the best way to do that keep the hard work and waiting for the next tutorials ^^ 😀 .. Author Thank you 🙂 , and I’ll prepare for the next tutorial as soon as I can nshalla 🙂 Assalamu Alaikum.. thank you for the HUGE effort you’ve put in this first lesson 🙂 😀 the way of explaining is very simple and easy to understand ,, and everything is organized very well .. ^^ If i was taking programming this semester this would be very useful for me, but unfortunately I’m already done with the course ^^” keep it up and jazakaAllah alf khair 🙂 Author Wa Alykom al Salam 🙂 You are most welcome, and I’m happy that the efforts were recognized by someone who already finished the course al7amdulellah 🙂 , and congratulations at finishing the course..! you can actually do many things regarding stuff that are actually programming related, but now by choice, not forced to 🙂 Thanks for passing by, and Jazakom Khairan Wa Eyyakom ya rab 🙂 when start a new file on code blocks mac edition it works fine but when i click ( built and run) the terminal doesn’t work can you help me. also when i open code blocks then hit (new project) the terminal works is there any deferent between both
http://qurtoba.net/programming-in-c-lesson-0/
CC-MAIN-2018-43
refinedweb
1,225
71.38
Varnish can produce synthetic responses out-of-the-box, but these objects aren’t inserted into the cache, and they aren’t processed the same way (no ESI, gzip processing for example). This vmod allows the insertion of synthetic object at the beginning of the fetch pipeline, allowing you to store and manipulate them exactly like backend-generated response. vcl 4.0; import synthbackend; backend s1 { .host = "1.1.1.1"; } sub vcl_recv { # because varnish will reset the method to "GET", we have to store the # POST info in a header unset req.http.post-method; if (req.method == "POST") { set req.http.post-method = "yes"; return (hash); } } sub vcl_backend_fetch { # if the request was a POST, reestablish the method, and set the # "mirror" backend that will send back the request body as response body if (bereq.http.post-method == "yes") { set bereq.method = "POST"; set bereq.backend = synthbackend.mirror(); return (fetch); } } curl can then be used to push content: curl '' --data-binary @file.html It’s also possible to tell Varnish to fetch a list of URLs to prime the cache. In this example, vmod_xbody is used to transform the provided list of URLs: /path/to/page/1 /path/to/page/2 /path/to/page/3 ... into {{ > /path/to/page/1 }} {{ > /path/to/page/2 }} {{ > /path/to/page/3 }} ... which is vmod_edgestash syntax to trigger subrequests. In this example, we push the URL file with the LOAD method: curl '' --data-binary @url.list -X LOAD import edgestash; import synthbackend; import xbody; backend s1 { .host = "1.1.1.1"; } sub vcl_recv { unset req.http.warm-state; # set the warm-state header: "top" for the initial request, "sub" for # subrequests to be cached if (req_top.method == "LOAD") { if (req.esi_level == 0) { set req.http.warm-state = "top"; # we don't want the request cached, only its subrequests return(pass); } else { set req.http.warm-state = "sub"; # convert the request into a HEAD one to avoid sending # the body back set req.method = "HEAD"; return(hash); } } } sub vcl_backend_fetch { # only use mirror for the top request if (bereq.http.warm-state == "top") { set bereq.backend = synthbackend.mirror(); } else { set bereq.backend = s1; } } sub vcl_backend_response { # prepare the list for edgestash processing if (bereq.http.warm-state == "top") { set bereq.backend = synthbackend.mirror(); xbody.regsub("(.*)\n?", "{{ > \1 }}"); edgestash.parse_response(); } } sub vcl_deliver { # trigger the edgestash processing if (req.http.warm-state == "top") { edgestash.execute(); return (deliver); } } This example uses vmod_cookieplus to retrieve the user cookie and parse its value into the string that feeds synthbackend.from_string(). vcl 4.0; import cookieplus; import synthbackend; backend default { .host = "1.1.1.1"; } sub vcl_hash { #As the returned object depends on the "user" cookie, add it to the hash key hash_data(cookieplus.get("user")); } sub vcl_backend_fetch { set bereq.backend = synthbackend.from_string("Welcome " + cookieplus.get("user")); } BACKEND from_blob(BLOB) BACKEND from_string(STRING) Take a BLOB/STRING as argument and return a backend that will respond 200 OK with the argument as body. Both functions are largely equivalent, and from_string is certainly going to be used most of the time, with from_blob a necessary fallback in the case binary data is needed. Note: these function must be called from vcl_backend_fetch. BACKEND mirror() Reflects the request body as response body. If bereq.http.content-encoding exists, it’ll be copied to beresp.http.content-encoding. BACKEND null() Returns a null backend, akin to an empty director or a sick backend.
https://docs.varnish-software.com/varnish-cache-plus/vmods/synthbackend/
CC-MAIN-2021-31
refinedweb
567
59.5
parse very large json xml file. the file size is bigger than 10gb Budget $30-250 USD import search filter large json file . search edit export data in many ways xls pdf etc.. will provide sample of small file and example data inside it once we discuss. winner of this project who place best bid . thanks 13 freelance font une offre moyenne de $164 pour ce travail hi, I have a very long experience in c# , in this project we need to program it using WPF because it is fast and the GUI will work well with large database like those JSON files, hope you will choose me ,thanks Hello. I have good skills in .NET, Software Architecture, Windows Desktop. I'm interest to your project. Contact me please. Thanks. Hi, I'm an experienced developer with almost 4 years of expertise. I have worked with these types of application in the past and can provide you a sample. Feel free to contact me. Regards Uzair 200 USD Will complete the project within time and with low cost. Please brief about your requirement. I will try to work accordingly to fulfil your requirement.
https://www.fr.freelancer.com/projects/software-architecture/parse-very-large-json-xml/
CC-MAIN-2019-04
refinedweb
193
84.78
Hi, this is a forwarded patch from Marcus Comstedt <marcus@mc.pp.se>, to do unity conversion more efficiently and reliably when xlating. It looks quite sane to me, and I'd like to apply it. I've posted it here once before, but there were other discussions going on at the time and I'm not sure if anyone saw it. Here's a second chance for review. Please let me know if there's any reason not to apply this; the patch seems right to me, but I'm not the world's greatest i18n expert either. * i18n/unix/xlate.c (make_identity_table): New function to create a sbcs_table that performs unity conversion. See apr_xlate_open. (apr_xlate_open): When topage and frompage are the same, make_identity_table is used to create a shortcut instead of calling iconv_open. The reason being that iconv_open can fail in this case. Submitted by: Marcus Comstedt <marcus@mc.pp.se> Reviewed by: Karl Fogel <kfogel@collab.net> Index: i18n/unix/xlate.c =================================================================== RCS file: /home/cvspublic/apr/i18n/unix/xlate.c,v retrieving revision 1.26 diff -u -r1.26 xlate.c --- i18n/unix/xlate.c 8 Jun 2002 18:53:13 -0000 1.26 +++ i18n/unix/xlate.c 28 Jun 2002 14:52:34 -0000 @@ -219,6 +219,14 @@ } #endif /* HAVE_ICONV */ +static void make_identity_table(apr_xlate_t *convset) +{ + int i; + convset->sbcs_table = apr_palloc(convset->pool, 256); + for (i=0; i<256; i++) + convset->sbcs_table[i] = i; +} + apr_status_t apr_xlate_open(apr_xlate_t **convset, const char *topage, const char *frompage, apr_pool_t *pool) { @@ -251,6 +259,12 @@ set found to non-zero if found in the cache #endif + if (!found && !strcmp(topage, frompage)) { + /* to and from are the same */ + found = 1; + make_identity_table(new); + } + #ifdef HAVE_ICONV if (!found) { new->ich = iconv_open(topage, frompage); @@ -259,7 +273,8 @@ } found = 1; check_sbcs(new); - } + } else + new->ich = (iconv_t)-1; #endif /* HAVE_ICONV */ if (found) {
http://mail-archives.apache.org/mod_mbox/apr-dev/200207.mbox/%3C200207150459.g6F4xqW99556@newton.ch.collab.net%3E
CC-MAIN-2018-43
refinedweb
306
67.04
So, I'm dynamically allocating a char array in a function, then returning that array to an un-allocated char array in main(). Code: #include<iostream> using namespace std; char* cc(char*,char*); int main(){ char* strMain; char* str1="Well, hello there, "; char* str2="How are you?"; strMain=cc(str1,str2); cout<< strMain; } char* cc(char* str1,char*str2){ char* retVal; int i=0,len=0; while(str1[len]!='\0'){ len++; } while(str2[i]!='\0'){ len++; i++; } retVal=new char[len]; i=0; while(str1[i]!='\0'){ retVal[i]=str1[i]; i++; } len=0; while(str2[len]!='\0'){ retVal[i]=str2[len]; len++; i++; } return retVal; } will strMain become the reference for the block of memory allocated in the cc function as retVal? If I delete[] strMain, will that be the same as freeing the memory I allocated in cc()? Oh, second question, if I go char* variable="hello world!"; char* variable2; variable2=new char[13]; variable2="hello world!"; what's the difference between how variable and variable 2 are stored? My understanding is, variable is stored on the stack and will be pop'd automatically when it goes out of scope, whereas variable2 is allocated in a block of memory reserved for my program ("heap") and will stay there even if I lose the reference to it. Is this correct? How is the "heap" created? Do I just get some memory from the system when I allocate memory? Or is there a limited block of memory already there, and that's all I'm allowed to use? If the latter, how does one control the size of the "heap?"
https://www.daniweb.com/programming/software-development/threads/175591/dynamic-allocation-in-a-function
CC-MAIN-2017-17
refinedweb
270
66.54
CS::RenderManager::RenderTree< TreeTraits >::ContextNode Struct Reference A single context node, Groups meshes which should be rendered from the same view to the same target. More... #include <csplugincommon/rendermanager/rendertree.h> Detailed Description template<typename TreeTraits = RenderTreeStandardTraits> struct CS::RenderManager::RenderTree< TreeTraits >::ContextNode A single context node, Groups meshes which should be rendered from the same view to the same target. Create instances of this structure by using RenderTree::CreateContext. Definition at line 375 of file rendertree.h. Member Function Documentation Add a rendermesh to context, putting it in the right meshnode etc. Definition at line 460 of file rendertree.h. Copy the shader for mesh meshId from layer fromLayer to layer toLayer. Definition at line 534 of file rendertree.h. Get the dimension of the render target set for this context. Definition at line 545 of file rendertree.h. Add a new render layer after layer. Definition at line 516 of file rendertree.h. Member Data Documentation All portals within context. Definition at line 437 of file rendertree.h. Camera transformation. Definition at line 418 of file rendertree.h. Flags for iGraphics3D::BeginDraw(). Definition at line 420 of file rendertree.h. Sub-tree of mesh nodes. Definition at line 434 of file rendertree.h. Owner of context node. Definition at line 396 of file rendertree.h. Matrix to be applied after projection from camera (usually used for post processing manager targets). Definition at line 416 of file rendertree.h. Post processing effects to apply after rendering the context. Definition at line 431 of file rendertree.h. Definition at line 428 of file rendertree.h. All render targets to be used when rendering the context node. Definition at line 411 of file rendertree.h. View rendered to. Definition at line 399 of file rendertree.h. Sector to render. Definition at line 422 of file rendertree.h. Arrays of per-mesh shader. Definition at line 443 of file rendertree.h. Context-specific shader variables. Definition at line 426 of file rendertree.h. The SVs themselves. Definition at line 440 of file rendertree.h. Holds fog plane for sector+view. Definition at line 424 of file rendertree.h. Arrays of per-mesh ticket info. Definition at line 445 of file rendertree.h. Total number of render meshes within the context. Definition at line 448 of file rendertree.h. The documentation for this struct was generated from the following file: - csplugincommon/rendermanager/rendertree.h Generated for Crystal Space 2.0 by doxygen 1.6.1
http://www.crystalspace3d.org/docs/online/api-2.0/structCS_1_1RenderManager_1_1RenderTree_1_1ContextNode.html
CC-MAIN-2016-40
refinedweb
412
55
I installed this: 2004-08-06 Paul Eggert <address@hidden> * lib/raise.c, modules/raise: New files. --- /dev/null 2003-03-18 13:55:57 -0800 +++ modules/raise 2004-08-06 14:46:16 -0700 @@ -0,0 +1,18 @@ +Description: +Send a signal to the executing process. + +Files: +lib/raise.c + +Depends-on: + +configure.ac: +AC_REPLACE_FUNCS(raise) + +Makefile.am: + +Include: + +Maintainer: +Jim Meyering + --- /dev/null 2003-03-18 13:55:57 -0800 +++ lib/raise.c 2004-08-04 23:32:14 -0700 @@ -0,0 +1,32 @@ +/* Provide a non-threads replacement for the POSIX raise function. + Copyright (C) <sys/types.h> +#include <signal.h> +#if HAVE_UNISTD_H +# include <unistd.h> +#endif + +int +raise (int sig) +{ + return kill (getpid (), sig); +}
https://lists.gnu.org/archive/html/bug-gnulib/2004-08/msg00026.html
CC-MAIN-2021-31
refinedweb
118
64.47
Opened 20 months ago Closed 20 months ago #21564 closed Bug (fixed) Generic base view http_method_not_allowed method references self.request and should use locally scoped request Description (last modified by timo) The current method in django/views/generic/base.py is: def http_method_not_allowed(self, request, *args, **kwargs): logger.warning('Method Not Allowed (%s): %s', request.method, request.path, extra={ 'status_code': 405, 'request': self.request } ) return http.HttpResponseNotAllowed(self._allowed_methods()) The 'extra' dictionary should reference the locally scoped 'request' object instead of the class scoped member. There is a PR open with this fix: The side effect is that any unit test written that uses the view and manually calls the dispatch method to validate non-allowed-methods will crash with attribute not found error for request Change History (8) comment:1 Changed 20 months ago by adepue - Needs documentation unset - Needs tests unset - Patch needs improvement unset - Type changed from Uncategorized to Bug comment:2 Changed 20 months ago by claudep - Has patch set - Needs tests set - Triage Stage changed from Unreviewed to Accepted comment:3 Changed 20 months ago by adepue comment:4 Changed 20 months ago by timo comment:5 Changed 20 months ago by bmispelon - Patch needs improvement set - Triage Stage changed from Ready for checkin to Accepted There's another instance of a similar behavior in RedirectView.get: Would you mind fixing that one too and adding a test for it? Thanks. comment:6 Changed 20 months ago by timo In addition, I was going to backport this to 1.6.X since it's a crashing issue. Could you add the following to docs/releases/1.6.1.txt as well? "Fixed a typo in :meth:django.views.generic.base.View.http_method_not_allowed that caused it to crash in some cases (#21564)." (feel free to amend as you see fit and to account for the request from bmispelon)? comment:7 Changed 20 months ago by timo - Patch needs improvement unset - Triage Stage changed from Accepted to Ready for checkin comment:8 Changed 20 months ago by Baptiste Mispelon <bmispelon@…> - Resolution set to fixed - Status changed from new to closed Test added to PR.
https://code.djangoproject.com/ticket/21564
CC-MAIN-2015-32
refinedweb
357
61.06
S2DGB$L_32CDBADDR (S2DGB$PQ_64CDBADDR) This field should contain the 32-bit (or 64-bit) virtual address of the SCSI command data block (CDB) to be sent to the target by this IO$_DIAGNOSE operation. Note that S2DGB$L_32CDBADDR is a pointer to a longword, while S2DGB$PQ_64CDBADDR is a pointer to a quadword. S2DGB$L_32CDBLEN (S2DGB$L_64CDBLEN) This field should contain the number of bytes in the SCSI command data block (CDB) to be sent to the target by this IO$_DIAGNOSE operation. (Legal values: 2 to 248. However, some ports may restrict CDBs to smaller lengths. Recommended values: 2 to 16.) S2DGB$L_32DATADDR (S2DGB$PQ_64DATADDR) This field should contain the 32-bit (or 64-bit) virtual address of the DATAIN or DATAOUT buffer to be used with this SCSI operation. If the CDB being sent to the target does not use a DATAIN or DATAOUT buffer, then this field should be zero. Note that S2DGB$L_32DATADDR is a pointer to a longword, while S2DGB$PQ_64DATADDR is a pointer to a quadword. S2DGB$L_32DATLEN (S2DGB$L_64DATLEN) This field should contain the number of bytes in the DATAIN or DATAOUT buffer associated with this operation. If the CDB being sent to the target does not use a DATAIN or DATAOUT buffer, then this field should be zero. (Legal values: 0 to UCB$L_MAXBCNT. Recommended values: 0 to 65,536. All ports are required to support at least 65,536 byte data transfers.) S2DGB$L_32PADCNT (S2DGB$L_64PADCNT) This field should contain the number of padding DATAIN or DATAOUT bytes required by this operation. (Legal values: 0 to the maximum number of bytes in a disk block on this system minus one. Current legal values: 0 to 511.) S2DGB$L_32PHSTMO (S2DGB$L_64PHSTMO) This field should contain the number of seconds that the port driver should wait for a phase transition to occur or for delivery of an expected interrupt. If S2DGB$V_ TAGGED_REQ is 1 or this field contains a 0 or 1, then the current phase transition timeout setting will not be changed. (Legal values: 0 to 300 [5 minutes].) S2DGB$L_32DSCTMO (S2DGB$L_64DSCTMO) This field should contain the number of seconds that the port driver should wait for a disconnected transaction to reconnect. If S2DGB$V_TAGGED_REQ is 1 or this field contains a 0 or 1, then the current disconnect timeout setting will not be changed. (Legal values: 0 to 65,535 [about 18 hours].) S2DGB$L_32SENSEADDR (S2DGB$PQ_64SENSEADDR) If S2DGB$V_AUTOSENSE is 1, then this field should contain the 32-bit (or 64-bit) virtual address of the sense buffer to be used by this SCSI operation. If S2DGB$V_AUTOSENSE is 0, this field will be ignored. Note that S2DGB$L_32SENSEADDR is a pointer to a longword, while S2DGB$PQ_64SENSEADDR is a pointer to a quadword. S2DGB$L_32SENSELEN (S2DGB$L_64SENSELEN) If S2DGB$V_AUTOSENSE is 1, then this field should contain the number of bytes in the sense buffer associated with this operation. (Legal values: 0 to 255. Note: a value of 0 instructs the class driver to discard any sense data received. Recommended value: 18. Some ports may restrict the number of sense bytes to 18.) If S2DGB$V_AUTOSENSE is 0, this field will be ignored. 7.4.1 64-Bit S2DGB Example The following example shows how to set up a 64-bit S2DGB: #include <s2dgbdef.h> /* Define S2DGB */ #include <far_pointers.h> /* Define VOID_PQ */ S2DGB diag_desc; /* Set up some default S2DGB descriptor values */ diag_desc.s2dgb$l_opcode = OP_XCDB64 /* Use 64-bits */ diag_desc.s2dgb$l_flags = (S2DGB$M_READ | /* Flags*/ S2DGB$M_TAGGED_REQ | S2DGB$M_AUTOSENSE); diag_desc.s2dgb$v_tag = S2DGB$K_SIMPLE; /* SIMPLE que tag */ diag_desc.s2dgb$pq_64cdbaddr = (VOID_PQ)(&cdb[0]);/* Command addr */ diag_desc.s2dgb$l_64cdblen = 6; /* Command length */ diag_desc.s2dgb$pq_64dataddr = (VOID_PQ)(&buf[0]);/* Data addr */ diag_desc.s2dgb$l_64datlen = 20; /* Data length */ diag_desc.s2dgb$l_64padcnt = 0; /* Pad length */ diag_desc.s2dgb$l_64phstmo = 20; /* Phase timeout */ diag_desc.s2dgb$l_64dsctmo = 10; /* Disc timeout */ diag_desc.s2dgb$pq_64senseaddr = (VOID_PQ)(&asn[0]);/* Autosense addr */ diag_desc.s2dgb$l_64senselen = 255; /* Sense length */ diag_desc.s2dgb$l_reserved_1 = 0; /* Reserved */ . . . status = sys$qiow(0, target_chan, IO$_DIAGNOSE, &iosb, 0, 0, &diag_desc, S2DGB$K_XCDB64_LENGTH, 0, 0, 0, 0); If all arguments are valid, the class driver will invoke the necessary port functions to send the CDB, transfer the data, and return, save or discard sense data as defined by the input S2DGB. Upon completion, the return IOSB will have the following format: The DKDRIVER, GKDRIVER, and MKDRIVER class drivers, which implement other QIO functions, might intermix other tagged requests with IO$_DIAGNOSE requests. The order in which requests are sent generally matches the order in which requests are presented to the driver. An exception to this ordering occurs when the driver receives REQUEST SENSE for which autosense data previously has been recovered and stored. In this case, the IO$_DIAGNOSE will complete immediately and no command will be sent to the target. The DKDRIVER, GKDRIVER, and MKDRIVER class drivers permit only one IO$_DIAGNOSE operation to be active (in the start I/O routine) at given time, except as described in the next paragraph. However, applications must single thread IO$_DIAGNOSE requests in order to properly detect the presence of sense data and send the required REQUEST SENSE command. This is consistent with the VAX IO$_DIAGNOSE behavior. For example, if three reads are issued with no waiting and the first read gets a CHECK CONDITION, the sense data will be discarded by the target when the second read arrives. The DKDRIVER, GKDRIVER, and MKDRIVER drivers permit more than one IO$_DIAGNOSE operation to be active (in the start I/O routine) only when all active operations have the S2DGB$V_AUTOSENSE flag equal to 1. Upon encountering the first IO$_DIAGNOSE with S2DGB$V_AUTOSENSE equal to 0, the class driver will apply the restrictions described in the previous paragraph. This chapter describes the guidelines used to develop 64-bit interfaces to support OpenVMS Alpha 64-bit virtual addressing. Application programmers who are developing their own 64-bit application programming interfaces might find this information useful. These recommendations are not hard and fast rules. Most are examples of good programming practices. For more information about C pointer pragmas, see the DEC C User's Guide for OpenVMS Systems. 8: New routines should accommodate 32-bit and 64-bit descriptors within the same routine. The same argument can point to either a 32-bit or 64-bit descriptor. The 64-bit descriptor MBO word at offset 0 should be tested for one, and the 64-bit descriptor MBMO longword at offset 4 should be tested for a minus one 8-1 item_list_64a Figure 8-2 item_list_64b New routines should accommodate 32-bit and 64-bit item lists within the same routine. The same argument can point to either a 32-bit or 64-bit item list. The 64-bit item list MBO word at offset 0 should be tested for one, and the 64-bit item list MBMO longword at offset 4 should be tested for a minus one to distinguish between a 64-bit and 32-bit item list. in such a way that a call to the routine can be written in a 64-bit language or a 32-bit language. It should be clearly indicated that a 64-bit pointer is required to be passed by all callers. It is extremely important that routines which which 32-bit, sign-extended address. In the latter case, a new version of the routine could be provided, which 64-bit callers could invoke instead of the existing version if they prefer that 64-bit memory be allocated. Example: The routines in LIBRTL which. If embedded pointers are necessary for a new structure in a new interface, provide storage within the structure for a 64-bit pointer (quadword aligned). The called routine, which may have to read the pointer from the structure, simply reads all 64 bits. If the pointer is constrained to found to reside in a 64-bit address space may be copied to a 32-bit address space. The new structure should be defined 64-bit form of the function prototype can be selected In the previous example, if the structures foo and foo64 will be used interchangeably within the same source module, you can eliminate the symbol FOODEF64. The routine foo_print would then be defined as follows: int foo_print (void * foo_ptr); Eliminating the FOODEF64 symbol allows 32-bit and 64-bit callers to use the same function prototype, however less strict type checking is then available during the C source compilation.
http://h71000.www7.hp.com/doc/72final/6467/6467pro_005.html
CC-MAIN-2016-26
refinedweb
1,415
55.03
POD (Python Open Document) is the part of Appy allowing to easily generate documents whose content is dynamic. The principle is simple: you create an ODF (Open Document Format) text or spreadsheet document with LibreOffice, you insert some Python code at some places inside it, and from any program written in Python, you can call POD with, as input, the OpenDocument document template and a bunch of Python objects. POD generates another ODF document containing the desired result. If you prefer to get the result in another format, POD can call LibreOffice in server mode to convert the result in various formats, among which PDF, DOC, DOCX, XLS, XLSX and CSV. Create, with LibreOffice Writer, comments were also added. With LibreOffice, in the Insert menu, choose "Comment". Here is the code for calling POD for generating a result in ODT format. from appy.pod.renderer import Renderer commercial = 'creative' beingPaidForIt = True renderer = Renderer('SimpleTest.odt', globals(), 'result.odt') renderer.run() First we need to import class Renderer. Then, we define some Python variables. We must create an instance of the Renderer, with, as parameters, the name of the POD template (we assume here that the POD template shown above is called SimpleTest.odt and lies in the current folder), a dictionary of named Python objects (here we simply take the global interpreter environment) and the name of the result file. The script will generate it, with, as content, what is shown in the image below. The second line of the template is repeated 3 times. It is the effect of the for loop in the first comment. comment evaluated to False. The previous example generates a result in ODT format. If you prefer to get the result in PDF, DOC or DOCX, you must first launch LibreOffice in server mode, listening to some port. Under Linux, the following command launches a LibreOffice server running on port 2002: soffice --invisible --headless "--accept=socket,host=localhost,port=2002;urp;"& Under Windows, this is... hum... In fact I don't know, I do not use Microsoft software for many years. Once LibreOffice server is started, change the creation of the Renderer instance that way: renderer = Renderer('SimpleTest.odt', globals(), 'result.pdf') Instead of specifying a result being "result.odt", specify it being "result.pdf". Launch your Python script and you should get a nice PDF file. For generating a result as a .doc or .docx file, simply update the result extension accordingly. Suppose you write, with LibreOffice Calc, the following template, named SimpleTestOds.ods. Here is the way we will call POD for producing an ODS spreadsheet, based on some Python dict containing a bunch of people. from appy.pod.renderer import Renderer staff = [{'firstName': 'Delannay', 'name': 'Gaetan', 'age': 112}, {'firstName': 'Gauthier', 'name': 'Bastien', 'age': 5}, {'firstName': 'Jean-Michel', 'name': 'Abe', 'age': 79}] renderer = Renderer('SimpleTestOds.ods', globals(), 'result.ods') renderer.run() comment containing do row for person in staff), allowing to conditionaly or repeatedly include parts of the spreadsheet, are expressed in the same way as in ODT templates (see above). can repeat a template sheet and produce several sheets in the resulting spreadsheet. The previous example generates a result in ODS format. If you prefer to get the result in Excel (XLS or XLSX), you must first launch LibreOffice in server mode, listening to some port. Under Linux, the following command launches a LibreOffice server running on port 2002: renderer = Renderer('SimpleTestOds.ods', globals(), 'result.xlsx') Instead of specifying a result being "result.odt", specify it being "result.xls[x]". Launch your Python script and you should get an Excel file.
https://appyframe.work/13/view?page=main&nav=search.Page.allSearch.12.48&popup=False
CC-MAIN-2022-27
refinedweb
600
57.47
The key points for this example include the following: setprojent() rewinds the project database to start at the beginning. getprojent() is called with a conservative maximum buffer size that is defined in project.h. endprojent() closes the project database and frees resources. #include <project.h> struct project projent; char buffer[PROJECT_BUFSZ]; /* Use safe buffer size from project.h */ ... struct project *pp; setprojent(); /* Rewind the project database to start at the beginning */ while (1) { pp = getprojent(&projent, buffer, PROJECT_BUFSZ); if (pp == NULL) break; printf("%s:%d:%s\n", pp->pj_name, pp->pj_projid, pp->pj_comment); ... }; endprojent(); /* Close the database and free project resources */ Example 2-2 Getting a project Database Entry That Matches the Caller's Project ID The following example calls getprojbyid() to get a project database entry that matches the caller's project ID. The example then prints the project name and the project ID. #include <project.h> struct project *pj; char buffer[PROJECT_BUFSZ]; /* Use safe buffer size from project.h */ main() { projid_t pjid; pjid = getprojid(); pj = getprojbyid(pjid, &projent, buffer, PROJECT_BUFSZ); if (pj == NULL) { /* fail; */ } printf("My project (name, id) is (%s, %d)\n", pp->pj_name, pp->pj_projid); }
http://docs.oracle.com/cd/E23824_01/html/821-1499/tasks-8.html
CC-MAIN-2015-27
refinedweb
189
52.8
table of contents NAME¶ mmap, munmap - map or unmap files or devices into memory SYNOPSIS¶ #include <sys/mman.h> void *mmap(void *addr, size_t length, int prot, int flags, int fd, off_t offset); int munmap(void *addr, size_t length); See NOTES for information on feature test macro requirements. DESCRIPTION¶.¶ mapping the same region, and (in the case of file-backed mappings) are carried through to the underlying file. (To precisely control when updates are carried through to the underlying file requires the use of msync(2).) -. In addition, zero or more of the following values can be ORed in flags: - MAP_32BIT (since Linux 2.4.20, 2.6) - Put the mapping into the first 2 Gigabytes of the process address space. This flag is supported only on x86-64, for 64-bit programs. It was added to allow thread stacks to be allocated somewhere in the first 2 GB; provided for compatibility with other implementations. - MAP_ANONYMOUS -_GROWSDOWN - This flag is used for stacks. It indicates to the kernel virtual memory system that the mapping should extend downward in memory. The return address is one page lower than the memory area that is actually created in the process's virtual address space. Touching an address in the "guard" page below the mapping will cause the mapping to grow by a page. This growth can be repeated until the mapping grows to within a page of the high end of the next lower mapping, at which point touching the "guard" page will result in a SIGSEGV signal. - in conjunction with MAP_POPULATE. Don't perform read-ahead: create page tables entries only for pages that are already present in RAM. Since Linux 2.6.23, this flag causes MAP_POPULATE to do nothing. One day, the combination of MAP_POPULATE and MAP_NONBLOCK may be reimplemented. - had effect only for private writable mappings. - MAP_POPULATE (since Linux 2.5.46) - Populate (prefault) page tables for a mapping. For a file mapping, this causes read-ahead on the file.. - MAP_UNINITIALIZED (since Linux 2.6.33) - Don't clear anonymous pages. This flag is intended to improve performance on embedded devices. This flag is honored only if the kernel was configured with the CONFIG_MMAP_ALLOW_UNINITIALIZED option. Because of the security implications, that option is normally enabled only on embedded devices (i.e., devices where one has complete control of the contents of user memory). Of the above flags, only MAP_FIXED is specified in POSIX.1-2001 and POSIX.1-2008. However, most systems also support MAP_ANONYMOUS (or its synonym MAP_ANON). munmap()¶ (but length need not be). All pages containing a part of the indicated range are unmapped, and subsequent references to these pages will generate SIGSEGV. It is not an error if the indicated range does not contain any mapped pages. RETURN VALUE¶). ERRORS¶ - EACCES - A file descriptor refers to a non-regular file. Or a file mappingEXIST -). - EPERM - The prot argument asks for PROT_EXEC but the mapped area belongs to a file on a filesystem that was mounted no-exec. - EPERM - The operation was prevented by a file seal; see fcntl(2). - ETXTBSY - MAP_DENYWRITE was set but the object specified by fd is open for writing.. ATTRIBUTES¶ For an explanation of the terms used in this section, see attributes(7). CONFORMING TO¶¶¶¶. Huge page (Huge TLB) mappings¶¶¶ On Linux, there are no guarantees like those suggested above under MAP_NORESERVE. By default, any process can be killed at any moment when the system runs out of memory.(5) (for example, when using the POSIX shared memory interface documented in shm_overview(7)). EXAMPLES¶. Program source¶ ); } munmap(addr, length + offset - pa_offset); close(fd); exit(EXIT_SUCCESS); } SEE ALSO¶.
https://manpages.debian.org/bullseye/manpages-dev/mmap64.3.en.html
CC-MAIN-2021-49
refinedweb
605
66.84
Member 308 Points Nov 10, 2017 03:24 AM|kmcnet|LINK Hello everyone and thanks for your help in advance. I currently use Visual Studio 2015 and would like to migrate some projects to CORE. I'm a little confused about the migration path, what steps I need to take, and whether I can go to CORE 2.0 or only 1.1. Currently using VS 2015 Professional Update 3. Production environment is Windows Server 2012 with SQL Server 2012. Any insight would be appreciated. Contributor 2970 Points Nov 10, 2017 05:56 AM|Deepak Panchal|LINK Hi Kmcnet, follow the steps below. To demonstrate the upgrade, we'll start by creating a ASP.NET MVC app. Create it with the name WebApp1 so the namespace will match the ASP.NET Core project we create in the next step.+ Optional: Change the name of the Solution from WebApp1 to Mvc5. Visual Studio will display the new solution name (Mvc5), which will make it easier to tell this project from the next project. Create a new empty ASP.NET Core web app with the same name as the previous project (WebApp1) so the namespaces in the two projects match. Having the same namespace makes it easier to copy code between the two projects. You'll have to create this project in a different directory than the previous project to use the same name.+ Install the Microsoft.AspNetCore.Mvc and Microsoft.AspNetCore.StaticFiles NuGet packages. Microsoft.AspNetCore.Mvc is the ASP.NET Core MVC framework. Microsoft.AspNetCore.StaticFiles is the static file handler. The ASP.NET runtime is modular, and you must explicitly opt in to serve static files (see Working with Static Files). Open the .csproj file (right-click the project in Solution Explorer and select Edit WebApp1.csproj) and add a PrepareForPublish target: <Target Name="PrepublishScript" BeforeTargets="PrepareForPublish"> <Exec Command="bower install" /> </Target> The PrepareForPublish target is needed for acquiring client-side libraries via Bower. We'll talk about that later. Open the Startup.cs file and change the code to match the following: using Microsoft.AspNetCore.Builder; using Microsoft.AspNetCore.Hosting; using Microsoft.Extensions.DependencyInjection; using Microsoft.Extensions.Logging; namespace WebApp1 { public class Startup { // This method gets called by the runtime. Use this method to add services to the container. // For more information on how to configure your application, visit public void ConfigureServices(IServiceCollection services) { services.AddMvc(); } //.UseStaticFiles(); app.UseMvc(routes => { routes.MapRoute( name: "default", template: "{controller=Home}/{action=Index}/{id?}"); }); } } } The UseStaticFiles extension method adds the static file handler. As mentioned previously, the ASP.NET runtime is modular, and you must explicitly opt in to serve static files. The UseMvc extension method adds routing. For more information, see Application Startup and Routing. In this section, you'll add a minimal controller and view to serve as placeholders for the ASP.NET MVC controller and views you'll migrate in the next section.+ Add a Controllers folder. Add an MVC controller class with the name HomeController.cs to the Controllers folder. Add a Views folder. Add a Views/Home folder. Add an Index.cshtml MVC view page to the Views/Home folder. The project structure is shown below: Replace the contents of the Views/Home/Index.cshtml file with the following: <h1>Hello world!</h1> Run the app. See Controllers and Views for more information. Now that we have a minimal working ASP.NET Core project, we can start migrating functionality from the ASP.NET MVC project. We will need to move the following:+ client-side content (CSS, fonts, and scripts) controllers views models bundling filters Log in/out, identity (This will be done in the next tutorial.) Copy each of the methods from the ASP.NET MVC HomeController to the new HomeController . Note that in ASP.NET MVC, the built-in template's controller action method return type is ActionResult; in ASP.NET Core MVC, the action methods return IActionResult instead. ActionResult implements IActionResult , so there is no need to change the return type of your action methods. Copy the About.cshtml, Contact.cshtml, and Index.cshtml Razor view files from the ASP.NET MVC project to the ASP.NET Core project. Run the ASP.NET Core app and test each method. We haven't migrated the layout file or styles yet, so the rendered views will only contain the content in the view files. You won't have the layout file generated links for the About and Contact views, so you'll have to invoke them from the browser (replace 4492 with the port number used in your project). Note the lack of styling and menu items. We'll fix that in the next section In previous versions of ASP.NET MVC, static content was hosted from the root of the web project and was intermixed with server-side files. In ASP.NET Core, static content is hosted in the wwwroot folder. You'll want to copy the static content from your old ASP.NET MVC app to the wwwroot folder in your ASP.NET Core project. In this sample conversion:+ The old ASP.NET MVC project uses Bootstrap for its styling and stores the Bootstrap files in the Content and Scripts folders. The template, which generated the old ASP.NET MVC project, references Bootstrap in the layout file (Views/Shared/_Layout.cshtml). You could copy the bootstrap.js and bootstrap.css files from the ASP.NET MVC project to the wwwroot folder in the new project, but that approach doesn't use the improved mechanism for managing client-side dependencies in ASP.NET Core.+ In the new project, we'll add support for Bootstrap (and other client-side libraries) using Bower: Add a Bower configuration file named bower.json to the project root (Right-click on the project, and then Add > New Item > Bower Configuration File). Add Bootstrap and jQuery to the file (see the highlighted lines below). { "name": "asp.net", "private": true, "dependencies": { "bootstrap": "3.3.6", "jquery": "2.2.0" } } Upon saving the file, Bower will automatically download the dependencies to the wwwroot/lib folder. You can use the Search Solution Explorer box to find the path of the assets: See Manage Client-Side Packages with Bower for more information. Copy the _ViewStart.cshtml file from the old ASP.NET MVC project's Views folder into the ASP.NET Core project's Views folder. The _ViewStart.cshtml file has not changed in ASP.NET Core MVC. Create a Views/Shared folder. Optional: Copy _ViewImports.cshtml from the FullAspNetCore MVC project's Views folder into the ASP.NET Core project's Views folder. Remove any namespace declaration in the _ViewImports.cshtml file. The _ViewImports.cshtml file provides namespaces for all the view files and brings in Tag Helpers. Tag Helpers are used in the new layout file. The _ViewImports.cshtml file is new for ASP.NET Core. Copy the _Layout.cshtml file from the old ASP.NET MVC project's Views/Shared folder into the ASP.NET Core project's Views/Shared folder. Open _Layout.cshtml file and make the following changes (the completed code is shown below):+ Replace @Styles.Render("~/Content/css") with a <link> element to load bootstrap.css (see below). Remove @Scripts.Render("~/bundles/modernizr"). Comment out the @Html.Partial("_LoginPartial") line (surround the line with @*...*@ ). We'll return to it in a future tutorial. Replace @Scripts.Render("~/bundles/jquery") with a <script> element (see below). Replace @Scripts.Render("~/bundles/bootstrap") with a <script> element (see below).. The replacement CSS link: <link rel="stylesheet" href="~/lib/bootstrap/dist/css/bootstrap.css" /> The replacement script tags: <script src="~/lib/jquery/dist/jquery.js"></script> <script src="~/lib/bootstrap/dist/js/bootstrap.js"></script> The updated _Layout.cshtml file is shown below: <html> <head> <meta charset="utf-8" /> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>@ViewBag.Title - My ASP.NET Application</title> <link rel="stylesheet" href="~/lib/bootstrap/dist/css/bootstrap.css" /> <", new {</script> <script src="~/lib/bootstrap/dist/js/bootstrap.js"></script> @RenderSection("scripts", required: false) </body> </html> View the site in the browser. It should now load correctly, with the expected styles in place. For information about how to configure bundling and minification, see Bundling and Minification. There are many problems that can cause a HTTP 500 error message that contain no information on the source of the problem. For example, if the Views/_ViewImports.cshtml file contains a namespace that doesn't exist in your project, you'll get a HTTP 500 error. To get a detailed error message, add the following code:+ public void Configure(IApplicationBuilder app, IHostingEnvironment env, ILoggerFactory loggerFactory) { if (env.IsDevelopment()) { app.UseDeveloperExceptionPage(); } app.UseStaticFiles(); app.UseMvc(routes => { routes.MapRoute( name: "default", template: "{controller=Home}/{action=Index}/{id?}"); }); } See Using the Developer Exception Page in Error Handling for more information. Reference: Migrating From ASP.NET MVC to ASP.NET Core MVC Regards Deepak 1 reply Last post Nov 10, 2017 05:56 AM by Deepak Panchal
https://forums.asp.net/t/2131618.aspx?Visual+Studion+2015+and+CORE
CC-MAIN-2019-47
refinedweb
1,494
62.34
WCF is a framework that is asynchronous inside out. Internally, asynchronous patterns are used to achieve non-blocking calls between different layers inside WCF. Externally WCF exposes the asynchronous patterns for both client and service programming. Why Asynchronous Pattern? From performance perspective, it’s not always ideal to use asynchronous programming if you don’t have to. Any asynchronous pattern involves at least some thread switches and thus causes delays to requests. So you should not abuse it if you don’t have to. However, for blocking calls such as I/O operations or remote calls, you should always thinking about using asynchronous patterns. In those cases, you would be able to reduce number of threads used in the system while waiting for operations to complete. Here are a few cases where you would like to use asynchronous patterns: 1) A WCF service operation is waiting for a database operation to complete. 2) A WCF service operation calls into another WCF client proxy of a backend WCF service. 3) A UI thread waits for data from WCF client calls. 4) Any other case when the calling thread is blocked to wait for a slow operation but non-CPU bound operation to complete. If you are using synchronous calls for the above cases, you would clearly see the threads are blocked from a dump of the process. This is wasting resources and you are preventing more requests from being processed if the system is capable of. This becomes more serious if you are holding hundreds or thousands of threads. So whenever you are seeing a thread blocked waiting for something, you would have to think about why that is the case? Why can’t the thread go away and come back with a different thread when there is real work to do? Of course in reality, there are a small number of threads doing bookkeeping work, for example, they are doing event wait handling, finalizing, garbage collection, AppDomain unloading, ThreadPool gating, timer handling, etc. The rest of threads are worker threads or I/O threads that do the real work and they are what you need to pay attention to. Basic Asynchronous Pattern with IAsyncResult There are a few common asynchronous programming patterns with .NET Framework. Here is a rough list: 1) Begin/End pattern with IAsyncResult 2) Raw Callback model using a delegate as in C++ world 3) Implicit callback model with synchronous APIs WCF advocates the first approach from the high level and uses it in most of its implementation. For performance critical parts, WCF uses 3) to avoid extra GC costs dealing with IAsyncResult objects. Here I just want to describe the basic idea of how to use 1). The basic pattern of using IAsyncResult is to expose a pair of Begin/End operations from your type as following: public class IAsyncWork { public IAsyncResult BeginDoWork(MyPropertyBag propertyBag, AsyncCallback callback, object state); public WorkResult EndDoWork(IAsyncResult result); } When a caller invokes the methods of this interface, it supplies some custom arguments (here it’s “propertyBag”), a callback delegate, and the state object that will be consumed by the callback. The callback delegate wraps a callback method of the caller with the following type: public delegate void AsyncCallback(IAsyncResult ar); For best performance, here are two principles when you call/implement the above asynchronous pattern: · Principle 1: Do not do heavy-weighted work inside the Begin method (which is BeginDoWork above). The reason for this is that you should return the calling thread as soon as possible so that the caller can schedule other work. If it’s a UI thread, the application needs to use the thread to respond to user inputs. You should always put heavy operations in a different thread if possible. · Principle 2: Avoid calling End method (which is EndDoWork above) on the same thread of the Begin method. The End method is normally blocking. It waits for the operation to complete. If you implement the End method, you would see that it actually calls IAsyncResult.WaitHandle.WaitOne(). On the other hand, as a normal implementation (for example, the sample attached in this Blog entry), this WaitHandle is a delay allocated ManualResetEvent. As long as you don’t call it, it would be not allocated at all. For fast operations, this is pretty cheap. However, once End is called, you would have to allocate it. The right place to call End is from the callback of the operation. When the callback is invoked, it means that the blocking work is really completed. At this point, you can call End to get data retrieved without sacrificing performance. In online WCF samples, you would find a typical implementation IAsyncResult. I also included one in the sample attached. Service Asynchronous Pattern WCF provides asynchronous service operation contract support. An asynchronous service operation can be defined as following: [ServiceContract public interface IAsyncOrderService { [OperationContract(AsyncPattern=true)] IAsyncResult BeginGetOrders(int numOrders, AsyncCallback callback, object state); Order[] EndGetOrders(IAsyncResult result); } As you can see, other than the ServiceContract/OperationContract attributes, the interface is exactly the same as standard asynchronous patterns. One thing to note is that it is not your code but WCF that calls into these methods. So the operation names have to follow the Begin/End convention. Another minor thing to note is that, if you also have a synchronous operation for the service that matches the signature of the asynchronous operation as following, WCF would call this synchronous operation instead of the asynchronous operation: Order[] GetOrders(int numOrder); You may have control of which one to call in future releases. Asynchronous Database Access Now it’s time for you to think about your own service implementation. In order to leverage the asynchronous advantage of WCF, you need to implement your service to be purely asynchronous so that no threads are blocking. In the sample that I attached to this blog, I used SQL database access with System.Data API as an example. For simplicity, I used SQL Express which is available for free. To get asynchronous support, you need to use the “Asynchronous Processing” property of the connection string as following: const string ConnectionString = @"Server=LOCALHOST\SQLEXPRESS;Database=MyOrderDatabase; Integrated Security=True; Asynchronous Processing=True"; Once you have the asynchronous support from the SqlConnection, you can invoke the asynchronous API SqlCommand.BeginExecuteReader as following: IAsyncResult sqlAsyncResult = this.command.BeginExecuteReader(sqlGetOrdersCallback, this); With this, you would have a good asynchrony for your service side. Client Asynchrony On the client side, you can also asynchronous pattern to access the service. When you invoke the service operations, you would call into the asynchronous methods of the service contract. For example, the sample calls it in the following way: IAsyncResult result = client.BeginGetOrders(driver.numOrders, onGetOrders, this); It supplies a callback delegate that handles the response when the operation is completed. One important thing to note is that WCF is a fully decoupled platform. This means that the client-side asynchrony has nothing to do with the service-side asynchrony. So an asynchronous client can basically invoke either a synchronous or an asynchronous service. The decoupling happened at the transport layer when data is serialized or deserialized as byte arrays and being transmitted through the transport. If you are building N-tier WCF services, you would have WCF service operations invoking WCF client proxies for other backend services. In this case, you would need to make sure that the middle-tier (routing layer) has asynchronous service operation invoking asynchronous WCF proxy operations. In this way, your middle-tier won’t run out of threads when processing many slow operations. Exception Handling The logic of exception handling for asynchronous programming is more complicated than synchronous programming. Basically when an exception is thrown from a callback thread, you should not let it bubble up to the caller, which is almost the top of the callstack of a worker thread or an I/O thread. If you do so, your application would blow up as no other code would catch the exception and handle it. To best handle an exception happened from the callback thread, you would need to record the exception as a state somewhere, for example, in the AsyncResult as showing in the sample. At some point, when the End method is invoked, this exception will be thrown on that thread and thus causes the exception to be thrown on the caller’s thread. In the sample attached, we showed this once in SqlGetOrdersAsyncResult. In its callback “OnSqlGetOrdersCallback”, it catches the exception and passes to the AsyncResult.Complete method which then stores the exception there. When the SqlGetOrdersAsyncResult.End is invoked from WCF, this exception would be rethrown from AsyncResult.End. In this way, WCF would be able to catch the exception internally and convert it into a fault and send it to the client side. Sample Setup The attached sample implements a simple performance test that demonstrates the 3-tier model as showing above: WCF client, WCF service, and SQL database. The code is pretty self-explanatory and I copy the readme file here: Prerequisite 1) It’s better to use Windows 2008 so that you can leverage the asynchronous WCF HttpModule/HttpHandler that were released in .NET 3.5 SP1. Check here. 2) Visual Studio 2008 or above installed. 3) SQL Express or SQL server installed 4) IIS, IIS Management tools, and WCF HTTP Activation components installed. Steps to Run the Test 1) Open the solution file "WCFOrderService.sln" with VS 2008 and compile the whole solution with "Release" type. 2) Run "SQL\SetupSQL.bat" to create database "MyOrderDatabase". 3) Run "OrderCreator\bin\Release\OrderCreator.exe 1000" to insert 1000 distinct orders into database. 4) Open IIS Manager, create a virtual application that points to the full path of "OrderService". 5) Use IIS Manager to configure the default ApplicationPool to have identity "OrderPerfUser". This user was created in step 2) above. 6) Browse the OrderService.svc file in the browser. Make sure that you can see the WCF service correctly responds to the request from browser. 7) Run the client "OrderClient\bin\Release\OrderClient.exe" 8) Tune different parameters in the OrderService\web.config and OrderClient\bin\Release\OrderClient.exe.config 9) Use the tool "Tools\WcfAsyncWebUtil.exe" to configure WCF to use the async HttpModule and increase the ASP.NET registry "MaxConcurrentRequestsPerCpu". Run the test again to see the difference. 10) Open PerfMon to monitor requests such as "Calls Outstanding" counter. PingBack from Good idea to use async calls, but won’t this render your source code nearly unreadable, and there unmaintainable, since program logic will be really hard to follow if functionaly is spread over a lot of methods? I download wcfasyncService codes,and deploy it follow the manual,but when i start client program,the consol window display the start test but never end and return. IAsyncResult result = client.BeginGetOrders(driver.numOrders, onGetOrders, this); if (result.CompletedSynchronously) { HandleResult(result); } result.CompletedSynchronously always return false. can you help me solve the problem?thx This sounds like a good performance boost. Is it possible to call an Asynchronous WCF service from javascript(Microsoft ajax)? Does the current WCF implementation support it or we have to write our own WcfScriptHandler. How can I deploy OrderService? When I start OrderClient it throws an exception about listening Hi I have a question When the client makes the asynchronous call the thread will in fact execute the call synchronously Is that thread that executes the call synchroniously allocated from the thread pool or is an I/O thread and thus saving the thread pool thread? Thanks Though you have provided a working sample, but its impossible to get the hang of what's happening from your sample, because there are too many chained method calls in your sample which make it result in more and more confusion. I could not really understand your sample. It would be better if you just had non-chained method calls to show how begin and end methods are used in WCF async pattern.
https://blogs.msdn.microsoft.com/wenlong/2009/02/09/scale-wcf-application-better-with-asynchronous-programming/
CC-MAIN-2018-05
refinedweb
2,003
54.83
Hi, just having trouble with my hex adder. It will have to do several things first of which is to add two hex numbers together. It is read in with scanf as you will see below then I am going to use several if statements to achive the different functions of my adder. However i have run into a problem or two. First of all when i read my hex numbers in with scanf.. should i declare these as integers or a char array? Secondly why am i getting this error : C:\DOCUME~1\nlpa58\Desktop\ass2: In function `int main()': C:\DOCUME~1\nlpa58\Desktop\ass2:12: warning: format argument is not a pointer (arg 2) C:\DOCUME~1\nlpa58\Desktop\ass2:15:12: warning: multi-character character constant C:\DOCUME~1\nlpa58\Desktop\ass2:15: error: incompatible types in assignment of `int' to `char[80]' Failure here is my code at the moment im only trying to get the add function to work so that i know im reading in my hex numbers right etc.. any help would be appreciated.any help would be appreciated.Code: #include <stdio.h> int num1; int num2; char opp[80]; int result; int main() { //prompt printf ("Type in an expression: "); scanf ("%x %s %x", &num1, opp , &num2); //if loops for the bitwise operators if (opp = 'add'){ result = num1 + num2; } //test printf ("%x", result); }
http://cboard.cprogramming.com/c-programming/100836-need-help-hex-adder-printable-thread.html
CC-MAIN-2014-35
refinedweb
231
69.82
the "How to Contact Us" section in the Preface to read:: "first-in, last-out" (at end of line) now reads "first-in, first-out." "Linux 5.1" now reads "RedHat Linux 5.1." Beginning with the third to last line on the page, it did read: "Thus, it remains valid even after f returns...The parameter iptr... so that when f returns..." Now reads: "Thus, it remains valid even after g returns...The parameter iptr... so that when g returns..." "char b[20]" now reads "char b[20];". At the bottom of the page, the last line of code did read: retval = list_ins_next(... Now reads: retval = list_rem_next(... Think of the fragile leaf of a fern...smaller copy of the overall leaf; or the repeating patterns in a reflection... NOW READS: Think of the fragile leaf of a fern...smaller copy of the overall leaf. Think of the repeating patterns in a reflection... The equation at the bottom of the page did read: T(n) = 1 if n = 0 2T(n/2) + n if n > 0 Now reads: T(n) = 1 if n = 2 2T(n/2) + n if n = 1, n > 2 Previously read "... the frame pointer, keeps track of the top of the stack as a program exicutes. It is also used to determine when the stack has grown too large. An interrupt is raised to signal the error. NOW READS: " ... the frame pointer addresses the top frame on the stack. It's the stack pointer that points to the actual top of the stack (that is, the point where the next stack frame will be pushed). Therefore, although a system could use the frame pointer to determine stack overflow, it probably is the stack pointer that would normally be used." "first-in, last-out" (at beginning of line) now reads "first-in, first-out." "Singly-linked lists..." wrongly HAD an extra space and an "s" in italics. This has been corrected. Line 5 from top did read: if (list_size(list) == 0) Now reads: if (list_size(list) == 1) old_element = element->next; element->next = element->next->next; ARE NOW FOLLOWED by the two additional lines: if (old_element == clist_head(list)) list->head = old_element->next; Remove the text " in real time" under the item "X Window System". Covering" now reads: The various player skill sets in P that are placed in set C together must cover all of the skills in set S. All occurrences of "int" in the implementation of hashpjw HAVE BEEN CHANGED to "unsigned int". 1 / (1 - 0.50) < 2 now reas: < 1 / (1 - 0.50) = 2 The definition for "Preorder traversal" has been changed to read: "In a preorder traversal for a given subtree, we first traverse its root, then to the left, and then to the right. As we explore subtrees to the left and right, we proceed in a similar manner using the left or right node as the root of the new subtree. The preorder traversal is a depth-first exploration, like that presented for graphs in Chapter 11, Graphs." The definition for "Inorder traversal" has been changed to read: "In an inorder traversal for a given subtree, we first traverse to the left, then to the root, and then to the right. As we explore subtrees to the left and right, we proceed in a similar manner using the left or right node as the root of the new subtree." The definition for "Postorder traversal" has been changed to read: "In a postorder traversal for a given subtree, we first traverse to the left, then to the right, and then to the root. As we explore subtrees to the left and right, we proceed in a similar manner using the left or right node as the root of the new subtree." 2nd line says "... by calling bitree_merge." This now reads "...by calling bitree_init." the second-to-last sentence. Change the value inside the circle to the far right from 81 to 83. A line of code has been added at the end of the page to read: static void destroy_right(BisTree *tree, BiTreeNode *node); In the function destroy_left, the calls did read: bitree_rem_left(tree, *position); bitree_rem_right(tree, *position); Now read: destroy_left(tree, *position); destroy_right(tree, *position); It is the responsibility of the caller to manage the storage associated with data2. "data2" is now in ConstantWidth italics font. now reads: ...graph->match, NULL); The line that reads: set_init(&adjlist->adjacent, graph->match, graph->destroy); NOW READS: set_init(&adjlist->adjacent, graph->match, NULL); **AUTHOR'S RESPONSE It is important to note that when inserting an edge into a graph, the data2 parameter of graph_ins_edge must have *its own* storage allocated for it. For example, data2 cannot share storage with a vertex passed to graph_ins_vertex at some earlier time. For example, to create the graph below, we should do something like the following: Graph: --------- a -> b b --------- data2 = (char *)malloc(2); strcpy(data2, "b"); graph_ins_vertex(&graph, data2); data1 = (char *)malloc(2); strcpy(data1, "a"); graph_ins_vertex(&graph, data1); data2 = (char *)malloc(2); strcpy(data2, "b"); graph_ins_edge(&graph, data1, data2); Note that before the call to graph_ins_edge, we allocate new storage for data2. This is because inside of graph_ins_vertex, set_init initializes each new adjacency list with graph->destroy, which will be called once for each vertex in the adjacency list when the graph is destroyed. Since every vertex also appears in the list of AdjList structures, without its own storage each vertex will be destroyed more than once. One solution is to set the destroy parameter of set_init to NULL. However, this alternative poses problems in the form of consistency issues. The important thing to remember, therefore, is simply this: Before any piece of data is inserted into a data structure, it must have *its own* storage allocated for it. (Notice that it is perfectly acceptable in the call to graph_ins_edge, however, not to allocate new storage for data1 because data1 is used only to look up in which adjacency list data2 will be inserted; in other words, the graph does not have a pointer to data1 once the operation completes. Change "acrylic" to "acyclic". analysis, the third sentence did read: "Since the element at the left of the sorted set..." Now reads: "Since the element just to the right of the sorted set..." In Example 12.5, change the line of code: int mgsort(void *data, int size, int esize, int i, ... to: int mgsort(void *data, int esize, int i, ... That is, remove "int size, " since this parameter is not used. We should also make sure that this is changed in the code on disk. The second sentence in the "Description" section did read: "The argument k specifies the maximum integer in data." Now reads: "The argument k specifies the maximum integer in data, plus 1." The sentence in the "Complexity" section did read: "...the maximum integer in the unsorted set." Now reads: "...the maximum integer in the unsorted set, plus 1." The first sentence in the last paragraph on the page did read: "...the largest integer being sorted." Now reads: "...the largest integer being sorted, plus 1." free the storage just allocated for the counts before returning. Thus, the lines: if ((temp = (int *)malloc(size * sizeof(int))) == NULL) return -1; should read: if ((temp = (int *)malloc(size * sizeof(int))) == NULL) { free(counts); return -1; } The values in the first three columns for i=4 in Figure 13.1 should be 4, 0.0, 0.5. That is, changed the value in the third column of this row, 1.5, to 0.5. "i < k" now reads "i < j". "Error Approximation". The new topic READS AS FOLLOWS: Numerical Representation in Computers The representation of numbers in computers is finite. Consequently, computers are limited in the way they can work with certain types of numbers, such as those that are extremely small or large. An understanding of these limitations is important before undertaking most serious work in numerical analysis. This chapter assumes an understanding of these limitations. for (i = 0; i < (size / 8); i++) { Now reads: for (i = 0; i <= ((size - 1) / 8); i++) { changed to read: "To do this, we must ensure that the largest value that the block can store, considering its total number of bits, is less than n." The straddle test determines the orientation of p3 relative to p2 and of p4 relative to p2 with respect to p1. The following HAS BEEN ADDED: It then determines the orientation of [p1] relative to [p4] and of [p2] relative to [p4] with respect to [p3]. Note that [ ] above indicates an item in constant width italic font. ALSO the sentence that begins: If the orientations are different, or if either orientation is 0... NOW READS: If the orientations of the points in either computation are different or 0, the straddle test succeeds, and the algorithm returns that the line segments intersect; otherwise, the line segments do not intersect. Code should be this: /***************************************************************************** * * * -------------------------------- lint.c ------------------------------- * * * *****************************************************************************/ #include "geometry.h" /***************************************************************************** * * * --------------------------------- lint --------------------------------- * * * *****************************************************************************/ int lint(Point p1, Point p2, Point p3, Point p4) { double z1, z2, z3, z4; int s1, s2, s3, s4; /***************************************************************************** * * * Perform the quick rejection test. * * * *****************************************************************************/ if (!(MAX(p1.x, p2.x) >= MIN(p3.x, p4.x) && MAX(p3.x, p4.x) >= MIN(p1.x, p2.x) && MAX(p1.y, p2.y) >= MIN(p3.y, p4.y) && MAX(p3.y, p4.y) >= MIN(p1.y, p2.y))) { { return 0; } /***************************************************************************** * * * Determine whether the line segments straddle each other. * * * *****************************************************************************/ if ((z1 = ((p3.x - p1.x)*(p2.y - p1.y)) - ((p3.y - p1.y)*(p2.x - p1.x))) < 0) s1 = -1; else if (z1 > 0) s1 = 1; else s1 = 0; if ((z2 = ((p4.x - p1.x)*(p2.y - p1.y)) - ((p4.y - p1.y)*(p2.x - p1.x))) < 0) s2 = -1; else if (z2 > 0) s2 = 1; else s2 = 0; if ((z3 = ((p1.x - p3.x)*(p4.y - p3.y)) - ((p1.y - p3.y)*(p4.x - p3.x))) < 0) s3 = -1; else if (z3 > 0) s3 = 1; else s3 = 0; if ((z4 = ((p2.x - p3.x)*(p4.y - p3.y)) - ((p2.y - p3.y)*(p4.x - p3.x))) < 0) s4 = -1; else if (z4 > 0) s4 = 1; else s4 = 0; if ((s1 * s2 <= 0) && (s3 * s4 <= 0)) return 1; /***************************************************************************** * * * Return that the line segments do not intersect. * * * *****************************************************************************/ return 0; } © 2016, O’Reilly Media, Inc. (707) 827-7019 (800) 889-8969 All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners.
http://www.oreilly.com/catalog/errata.csp?isbn=9781565924536
CC-MAIN-2016-18
refinedweb
1,735
72.16
. Displaying Correct Add to and Remove from Favorites Links The Custom Center of Dynamicweb eCommerce has a nice feature that enables users to add products to their list of favorites and to remove items from that list again. Using the Customer Center module, users can the quickly add products from their favorites list to the shopping cart. To enable the favorites feature you need to enable the Extranet module, provide the user with an option to log in, and then use the following code that displays an Add To and a Remove From favorites link: <!--@If Defined(Ecom:Product.AddToFavorites)--> <a href="<!--@Ecom:Product.AddToFavorites-->">Add to favorites</a><br /> <a href="<!--@Ecom:Product.RemoveFromFavorites-->">Remove from favorites</a><br /> <!--@EndIf(Ecom:Product.AddToFavorites)--> When you now click Add to favorites, the item is added to your list of favorites that you can see using the Custom Center module. Likewise, clicking the Remove from favorites link deletes the item again. Expanding the Favorites Feature This feature is pretty easy to implement, and makes it easy for a user to manage their favorites. There's only one downside: both links are always shown at the same time. There is currently no way to hide the Add link when the item is already on the Favorites list, and no way to hide the Remove link when the item is not. So, how can you handle this when your requirements state that only one link can be visible at any given time? Extenders and Subscribers to the rescue. Using a ProductTemplateExtender and a NotificationSubscriber To correctly display and hide the Add to and Remove from favorites links, you need to two pieces of Dynamicweb extensibility. First, you need a ProductTemplateExtender that accomplishes the following tasks: - Take the current user's ID - Use that ID to determine if the user has an entry in the EcomCustomerFavoriteProducts table for the requested product and variant - If the product has already been added to the list of favorites, hide the Add to link; otherwise, hide the Remove from link. Since querying the database for each product can be a costly operation, it's a good idea to cache the favorites list for the user, so you don't have to hit the database for each product in each request. However, by caching you run the risk of stale data. That's where the NotificationSubscriber comes in. You can hook up a NotificationSubscriber to the Standard.Page.Loaded action that runs when a page in Dynamicweb gets loaded. Inside the subscriber, you can determine if an item is being added to, or removed from the favorites list. When that happens, you clear the cached items that you set in the ProductTemplateExtender. This way, the cache always reflects the current state of the user's favorites list. For this article, I am using the Microsoft ADO.NET Entity Framework to access the database. Clearly, you can choose whatever database technology you like best, be it the Entity Framework, Dynamicweb's own CRUD class generator, direct SQL and more. In my example, I cache the data in the general ASP.NET cache, using the user's ID as a unique cache key. It's up to you to determine whether to store data in the general cache, in a user's session, or hit the database on each request, and temporarily store data in the HTTP Context so you can reuse it to display multiple products for a single request. The factors that influence this decision depend on the server (setup, hardware, configuration) and your user's profile (few users, many favorites, or many users with just a few favorites). You need to balance the pros and cons of each solution before you implement the final solution. With a bit of the background done, it's time for some code. Implementing the ProductTemplateExtender A ProductTemplateExtender gets called every time a product needs to be displayed, whether this is a product in a list, or on a details page. As such it's an ideal location to modify properties like descriptions, stock or images of products. However, you can also use it to modify the Favorites links, as the templates for that feature are available as well. To implement the ProductTemplateExtender, I carried out these steps: - I added an ADO.NET Entity Model to my application. I hooked up the model to my Dynamicweb database and added the following two tables: - EcomCustomerFavoriteLists - EcomCustomerFavoriteProducts Figure 1 - Next, I added a new ProductTemplateExtender class to my custom project with the following code: public class ExtendAddToFavoritesTemplate : ProductTemplateExtender { public override void ExtendTemplate(Dynamicweb.Templatev2.Template Template) { int userId = new Extranet().UserID; string favoritesCacheKey = String.Format( Constants.CacheKeys.UserFavorites, userId); List<EcomCustomerFavoriteProduct> userFavorites = HttpContext.Current.Cache[favoritesCacheKey] as List<EcomCustomerFavoriteProduct>; if (userFavorites == null) { using (SamplesEntities db = new SamplesEntities()) { userFavorites = (from p in db.EcomCustomerFavoriteProducts where p.EcomCustomerFavoriteList.AccessUserID == userId select p).ToList(); HttpContext.Current.Cache[favoritesCacheKey] = userFavorites; } } var hasproduct = (from p in userFavorites where p.ProductID == Product.ID && p.ProductVariantID == Product.VariantID && p.ProductLanguageID == Product.LanguageID select p).Count() > 0; if (hasproduct) { Template.SetTag("Ecom:Product.AddToFavorites", string.Empty); } else { Template.SetTag("Ecom:Product.RemoveFromFavorites", string.Empty); } } } Most of this code is pretty straightforward. First, I check if the ASP.NET cache contains a list of favorites for the current user. I use a cache key constant that I've defined in a separate class with constants. This makes it easier to reuse the same cache key later in the NotificationSubscriber. When the cache does not contain favorites for the current user, I use my SamplesEntities model to query all favorites from the database for the current user and store them in the cache. No matter how I got the list of favorites, I can now check if that list contains an entry for the product that is currently being shown (which is made available through the Product property on the extender class). Notice how I am comparing the ProductID, ProductVariantID and the ProductLanguageID as the three properties together make up a unique product that can be added to the favorites list. The final step is to determine which link to hide. When the product is already in the list, I clear out the Ecom:Product.AddToFavorites Dynamicweb template tag by setting it to an empty string. Otherwise, I do the same for the Ecom:Product.RemoveFromFavorites link. For this code to work, it's important that the product template contains an If Defined for both the Add and the Remove link; not just for the Add link as shown in the documentation. Otherwise, the text Remove from favorites text remains and you end up with an empty link: <!--@If Defined(Ecom:Product.AddToFavorites)--> <a href="<!--@Ecom:Product.AddToFavorites-->">Add to favorites</a><br /> <!--@EndIf(Ecom:Product.AddToFavorites)--> <!--@If Defined(Ecom:Product.RemoveFromFavorites)--> <a href="<!--@Ecom:Product.RemoveFromFavorites-->">Remove from favorites</a> <!--@EndIf(Ecom:Product.RemoveFromFavorites)--> If you'd try out the code now, you'd notice that it seems to work fine. Depending on the current state of the product in the Favorites list, you either see the Add or the Remove link. However, as soon as you click that link, the product is added to or removed from the list of favorites, but the link stays the same. The reason for this is the list of favorites that is cached by the ProductTemplateExtender that I showed earlier.. The reason you need to cache the data it is that the ExtendTemplate method of the ProductTemplateExtender is called pretty often. You don't want to hit the database every time a product is displayed; especially not in list pages that show many products at once. However, the cached data becomes out of date as soon as you add or remove a favorite. So, you need to hook into that operation and clear the cache. Since there are no notification subscribers for favorites (hint to Dynamicweb: this would be a nice feature request), the best solution I came up with is to hook into Page.Loaded and then determine if a product is added to or removed from the list of favorites. To accomplish this, add the following code to a class in your custom solution: [Subscribe(Standard.Page.Loaded)] public class OnFavoritesChanged : NotificationSubscriber { public override void OnNotify(string notification, object[] args) { string addFavorite = Base.Request("CCAddToFavorites"); string removeFavorite = Base.Request("CCRemoveFromFavorites"); if (string.IsNullOrEmpty(addFavorite) && string.IsNullOrEmpty(removeFavorite)) { return; } else { int userId = new Extranet().UserID; // User added or removed a favorite; clear the entire cache. // Alternatively, you could just update the selected product in the cached list. HttpContext.Current.Cache.Remove( String.Format(Constants.CacheKeys.UserFavorites, userId)); } } } When a user changes the state of a product in the list of favorites, the request contains either a CCAddToFavorites or a CCRemoveFromFavorites entry. If one of the two contains a value, it means the state of a product has changed, and the cache must be cleared. The next time a product must be shown, the cache is rebuilt, and remains until a user changes their favorites again, or when .NET decides to eject the item from the cache. Because the Customer Center uses the same keys to remove an item from the favorites list, the code in the NotificationSubscriber is triggered then as well, keeping the cache nicely in sync. Caveats and Pitfalls If you don't see the Add or Remove links show up altogether, make sure the Extranet module is enabled and that you're logged in. The favorites are stored using the user's ID so you need to be logged in as a valid user in order to add a product to your favorites. Currently, the favorites feature doesn't play well with custom SEO URLs. This is a know issue, and will hopefully be resolved in the future. If you need the two to work together, you can probably build up your own Add and Remove links and append fields CCAddToFavorites, CCAddToFavoritesVariantID and CCAddToFavoritesLanguageID to the URL manually. I haven't tried this yet, but it should work in theory. Finally, before implementing this solution, carefully evaluate your data access and caching strategy. The cache may not the best location to store user data, so you need to determine if it will work in your situation. You have multiple alternatives, including the user's session, and hitting the database once for each request (by storing the items in the HttpContext.Items property). For more details about the latter solution, check out the article: HttpContext.Items - a Per-Request Cache Store. Downloads You can download the code for the ProductTemplateExtender, the NotificationSubscriber and a sample template here. Happy extending!
https://devierkoeden.com/articles/displaying-correct-add-to-and-remove-from-favorites-links
CC-MAIN-2019-39
refinedweb
1,775
54.83
I am a new programming student and am having a bit of diffulty on an assignment. I do not want someone to finish writing my code, just some advise on what to do or how to accomplish a task. Our assignment was to generate 'x' amount of random numbers and then sort them into rows and columns as determined by the user. I know this is basic array manipulation, I can generate numbers and ask the user how many rows and columns, but I can not put those numbers into an array, every time I use a statement like "inary[100] = rand()" and test it with a printf function later it outputs a different number than what was generated. I have listed a small piece of code , if you could help me in any way I would be very thankful. Code: [ #include <stdio.h> #include <conio.h> #include <stdlib.h> void main(void); void main(void) { int i, no, rowno, colno; int inary[100] = {rand()}, outary[100][100] = {rand()}; srand(0); printf ("How many random numbers to be generated?"); scanf ("%d", &no); { for (i=1; i<=no; i++) printf("%d\n", rand()); } printf ("How many rows?"); scanf ("%d", &rowno); printf ("How many columns?"); scanf ("%d", &colno); getch(); } ]
http://cboard.cprogramming.com/c-programming/44766-new-student-asking-advise-printable-thread.html
CC-MAIN-2015-32
refinedweb
207
80.51
Viewing and using Cycle Number / Time Hey Tidal Team, So after following some of the guides I still can't quite seem to get a hold of how to view the number of cycles within Tidal after it's clock has been running. What command would I send to Tidal to view the clock cycle number? I would like to compose and trigger events based upon the cycle number. While trying to figure this out I could not get this block from the guide to work d1 $ (pure now) ~> seqP [ (0, 12, sound "bd bd*2"), (4, 12, sound "hh*2 [sn cp] cp future*4"), (8, 12, sound (samples "arpy*8" (run 16))) ] Before trying that I ran import Sound.Tidal.Time but still receive the error: "Variable not in scope: now : : Time * Perhaps you meant 'not' (imported from Prelude) My plan is to use the seqP to compose a song based on triggering events at specific cycle numbers Also if there are other better strategies for using Tidal to compose large scale compositions, I would love to hear your technique. Thank You!
http://ask.tidalcycles.org/question/451/viewing-and-using-cycle-number-time/
CC-MAIN-2017-26
refinedweb
184
61.13
Extending Template Classes - Best Practices Discussion in 'C++' started by Tom,: - 453 - karim - Jul 13, 2003 Best Practices - solution - namespaces - classesCraig Deelsnyder, Aug 3, 2003, in forum: ASP .Net - Replies: - 1 - Views: - 430 - Vincent V - Aug 4, 2003 Best Practices for System.Net Classes what?Janus Knudsen, Jun 26, 2004, in forum: ASP .Net - Replies: - 4 - Views: - 421 - DalePres - Jun 26, 2004 best practices - how to organize classesMiranda Evans, Nov 25, 2003, in forum: Python - Replies: - 1 - Views: - 345 - Roy Smith - Nov 25, 2003 Best Codeplex sample for showing best coding practices?John Dalberg, Nov 15, 2006, in forum: ASP .Net - Replies: - 3 - Views: - 568 - samuelhon - Nov 16, 2006
http://www.thecodingforums.com/threads/extending-template-classes-best-practices.805425/
CC-MAIN-2014-35
refinedweb
109
73.07
Hello dear readers. This is my first post and it is of great importance, because it reflects the beginning of the programs that I will create throughout the semester. “Fun with numbers” is the first problem that Professor Ken Bauer assigned us. The task was to create a program that complies with the points shown in the image and thereby solve the problem. It was a challenging activity, which helped me learn basic commands for c ++ . The language is simple to understand once you study a little. The book “How to think like a computer scientist” was very useful to conceive my code, in addition to several videos of youtube. I hope you enjoy my program and really understand the whole code 😀 Luis Felipe Garate Moreno. #include <iostream> using namespace std; int main() { int a,b,r1,r2,r3,r4,r5; //Declaration of variables , r=result. cout <<“This program performs several operations from two numbers and provides the results” << endl; cout << “Give me the first number:” << endl; cin >> a; //Variable for the first number. cout << “Give me the second number:” << endl; cin >> b; //Variable for the second number. r1 = a + b; //Sum cout <<“The sum of the two numbers=” << r1 << endl; r2 = a – b; //Subtraction cout <<“The difference of the two numbers=” << r2 << endl; r3 = a * b; //Multiplication cout <<“The product of the two numbers=” << r3 << endl; r4 = a / b; //Division cout <<“The integer based division of the two numbers=” << r4 << endl; r5 = a % b; //Remainder of integer division cout <<“The remainder of integer division of the two numbers=” << r5 << endl; return 0; } _____________________________________________________________
https://felipegm10blog.wordpress.com/
CC-MAIN-2021-21
refinedweb
264
66.67
) I used the following sources to accomplish this: processing code: import processing.serial.*; import cc.arduino.*;import eeml.*; Arduino arduino; float myValue; float lastUpdate; DataOut dOut; void setup() { println(Arduino.list()); arduino = new Arduino(this, Arduino.list()[0], 115200); dOut = new DataOut(this, "", "PACHUBE API"); dOut.addData(0,"light sensor, LDR, light level, light dependent resistor"); } void draw() { myValue = arduino.analogRead(0); println(myValue); if ((millis() - lastUpdate) > 10000){ println("ready to PUT: "); dOut.update(0, myValue); int response = dOut.updatePachube(); println(response); lastUpdate = millis(); } } Don’t be discouraged by noisy data. Better sensor circuits are available, and sample conditioning can easily be achieved in software. Concerning the Arduino, it may be preferable to work interrupt-based. I’m new to Arduino, but not to microprocessors. A good design strategy may be to put the Arduino to sleep (thus consuming less and prolonging battery liftetime) until an internal hardware timer overflows, waking up the processor and prompting to acquire and process data. Wake-up time can be miliseconds while sleeping time can be seconds, minutes or even hours. Again, I’m not sure whether the Arduino is equipped with this kind of hardware but I’m fairly certain it is, as this kind of thing is fairly mainstream. After some experimenting I know why there are price differences between sensors. Some just don’t work like they should or have more noise than anything else 🙂 And it is possible to let the arduino sleep. I didn’t do this yet but I read it somewhere. It is also possible with the XBee’s . But power consumption isn’t an issue at the moment, I think that is something that can be fixed later.
http://labs.stijncoppens.com/thesis/my-first-pachube-connection/
CC-MAIN-2018-09
refinedweb
282
57.98
Action; The Web Service Addressing protocol is used to select certain service and port on a SOAP server, just like the "Host" header in HTTP. The basic SOAP design uses the URI and the soapAction header of HTTP (in case it uses HTTP, by far the most often used transport mechanism) However, when the server is hidden behind firewalls and proxies, these fields are rewritten or replaced. This means that the definitions by the WSDL for the client can differ from the configuration of the. See documentation in the base class. See documentation in the base class. See documentation in the base class. documentation in the base class. See "WSDL11" in XML::Compile::SOAP::Extension See documentation in the base class. See "SOAP11" in XML::Compile::SOAP::Extension See "SOAP11" in XML::Compile::SOAP::Extension See "SOAP11" in XML::Compile::SOAP::Extension Returns the version number. Returns the namespace used for this WSA version., 9 May 2006, 9 May 2006, 29 May 2006 See documentation in the base class. This module is part of XML-Compile-WSA distribution version 0.90, built on October 01,
http://search.cpan.org/~markov/XML-Compile-WSA-0.90/lib/XML/Compile/SOAP/WSA.pod
CC-MAIN-2016-50
refinedweb
185
58.18
In this project I want to combine 2 components, the 1602 LCD Display and the DHT11 temperature and humidity sensor to create a digital thermometer we could actually use in the real world. Before we start, read the DHT11 tutorial where we write a program that reads the data from the sensor: and also read the 1602 LCD tutorial where I explain how to write to the display: Once you do so, all you need to do from the circuits perspective is to add both circuits to the same Arduino based project: Here it is in practice: On the code side, we do a similar thing. We include both the DHT and the LiquidCrystal libraries first, then we initialize the 2 components. We initialize them in setup() and in loop() we check every 2 seconds the data coming from the sensor, and we print it to the LCD display: #include <LiquidCrystal.h> #include <DHT.h> DHT dht(2, DHT11); LiquidCrystal lcd(7, 8, 9, 10, 11, 12); void setup() { dht.begin(); lcd.begin(16, 2); } void loop() { delay(2000); float h = dht.readHumidity(); float t = dht.readTemperature(); if (isnan(h) || isnan(t)) { return; } lcd.setCursor(0, 0); lcd.print((String)"Temp: " + t + "C"); lcd.setCursor(0, 1); lcd.print((String)"Humidity: " + h + "%"); } Here is the project running: More electronics tutorials: - Electronic components: Servo Motors - Arduino project: read a digital input - Arduino project: read analog input - Arduino project: control a servo motor with a potentiometer - Electronic components: the DHT11 temperature and humidity sensor - How to run a Web Server on an Arduino - The Arduino Uno WiFi rev 2 board - Arduino project: the analogWrite() function and PWM - Electronic components: Resistors
https://flaviocopes.com/arduino-project-digital-thermometer/
CC-MAIN-2021-17
refinedweb
278
51.48
Analog I/O Analog I/O This library is to input/output an analog signal. analogReference - Description - Configures the reference voltage used for an analog input. When the input is the same as the reference voltage, 1023 will be returned. - Syntax - analogReference(mode) - Parameters - mode: DEFAULT(VCC voltage), INTERNAL(Internal Voltage 1.45V), EXTERNAL(VCC Voltage) - Returns - None analogRead - Description - Reads the value from the specified analog pin. - Syntax - int analogRead(analog_pin) - Parameters - analog_pin: The number of the analog input pin to read from A0 to A7 (or 14 to 21) - Returns - 0 to 1023 - Notes - Use A0 to A5 pins from the smaller pin as much as possible. When you set digital IO with pinMode(), the larger pin also becomes digital IO. For example, if you set A2 to digital IO, then A3, A4 and A5 will become digital IO, even if you use those pins as analog input. - Remark - If you use setPowerManagementMode() for SNOOZE mode and then call anlogRead(), the program stops until data is received from lower to upper. analogWrite - Description -Hz. (Some pins are 125Hz. Refer to the remark.) The frequency can be changed by analogWriteFrequency. - Syntax - analogWrite(int pin, int value); - Parameters - pin: The pin to write to (3, 5, 6, 9, 10, 11, 22, 23, and 24). value: The duty cycle: Between 0 (always LOW) and 255 (always HIGH). - Returns - None - Remark - Pins 11, 22, 23, and 24 are implemented by software. The frequency is 125Hz. analogWriteFrequency - Description - Writes a frequency value to the analog pin (PWM). - Syntax - analogWriteFrequency(int Hz) - Parameters - Hz: Frequency - Returns - None - Remark - This function should be called during all PWM stops. Pins that can be changed are 3, 5, 6, 9, and 10. Example LED 13 on GR-ADZUKI is lit periodically. #include <Arduino.h> void setup() { pinMode(13, OUTPUT); //Green LED } void loop() { for(int i = 0; i<250; i+=5){ analogWrite(13, i); delay(30); } for(int i = 0; i<250; i+=5){ analogWrite(13, 255-i); delay(30); } }
https://www.renesas.com/us/en/products/gadget-renesas/reference/gr-adzuki/library-analogio.html
CC-MAIN-2019-43
refinedweb
333
65.73
Functions and Functional Programming in JavaScript - 3.1 Declaring Functions - 3.2 Higher-Order Functions - 3.3 Function Literals - 3.4 Arrow Functions - 3.5 Functional Array Processing - 3.6 Closures - 3.7 Hard Objects - 3.8 Strict Mode - 3.9 Testing Argument Types - 3.10 Supplying More or Fewer Arguments - 3.11 Default Arguments - 3.12 Rest Parameters and the Spread Operator - 3.13 Simulating Named Arguments with Destructuring - 3.14 Hoisting - 3.15 Throwing Exceptions - 3.16 Catching Exceptions - 3.17 The finally Clause - Exercises JavaScript has an object model that is very different from class-based programming languages. Learn about functions and functional programming, which is very important in JavaScript. Save 35% off the list price* of the related book or multi-format eBook (EPUB + MOBI + PDF) with discount code ARTICLE. * See informit.com/terms In this chapter, you will learn how to write functions in JavaScript. JavaScript is a “functional” programming language. Functions are “first-class” values, just like numbers or strings. Functions can consume and produce other functions. Mastering a functional programming style is essential for working with modern JavaScript. This chapter also covers the JavaScript parameter passing and scope rules, as well as the details of throwing and catching exceptions. 3.1 Declaring Functions In JavaScript, you declare a function by providing The name of the function The names of the parameters The body of the function, which computes and returns the function result You do not specify the types of the function parameters or result. Here is an example: function average(x, y) { return (x + y) / 2 } The return statement yields the value that the function returns. To call this function, simply pass the desired arguments: let result = average(6, 7) // result is set to 6.5 What if you pass something other than a number? Whatever happens, happens. For example: result = average('6', '7') // result is set to 33.5 When you pass strings, the + in the function body concatenates them. The resulting string '67' is converted to a number before the division by 2. That looks rather casual to a Java, C#, or C++ programmer who is used to compile-time type checking. Indeed, if you mess up argument types, you only find out when something strange happens at runtime. On the flip side, you can write functions that work with arguments of multiple types, which can be convenient. The return statement returns immediately, abandoning the remainder of the function. Consider this example—an indexOf function that computes the index of a value in an array: function indexOf(arr, value) { for (let i in arr) { if (arr[i] === value) return i } return -1 } As soon as a match is found, the index is returned and the function terminates. A function may choose not to specify a return value. If the function body exits without a return statement, or a return keyword isn’t followed by an expression, the function returns the undefined value. This usually happens when a function is solely called for a side effect.
https://www.informit.com/articles/article.aspx?p=3089301&amp;seqNum=17
CC-MAIN-2022-33
refinedweb
505
60.11
PdhOpenQuery eror @#include <windows.h> #include <pdh.h> #include <pdhmsg.h> static HQUERY hQuery; PdhOpenQuery(NULL, 0, &hQuery);@ Hello everyone. in Qt insert this code and so we get an error "undefined reference to `PdhOpenQueryW@12' " how to solve this problem. thanks!! Hi and welcome to devnet, Are you linking to the Pdh library ? in qt only pdh.h there, pdh.lib no. PdhOpenQuery is not a part of Qt, it's a Windows function given through the Pdh library, so if you want to use it you need to link to that library hI all, please suggest how to link pdh library. hI all, please suggest how to link pdh library. Hi, @LIBS += -lPdh@ Hi, @LIBS += -lPdh@ Thank you. Thank you.
https://forum.qt.io/topic/45744/pdhopenquery-eror
CC-MAIN-2018-09
refinedweb
122
86.3
In DEV-C++, when I compile a simple hello world program, I've noticed, the size of the .exe compiled in DEV-C++ compared to the same code compiled in VC++ 9 Express is very different. Code: EXE Compiled in DEV-C++ - 463 kbEXE Compiled in DEV-C++ - 463 kbCode:#include <iostream> using namespace std; int main () { cout << "Hello World!" << endl; cout << "Press ENTER to continue..." << endl; cin.get(); return 0; } EXE Compiled in VC++ 9 XPress - 39 kb What? -------------------------------------------------------------------------------------------- Also, can anyone tell me how to add an icon and file tags (Like description, copyright, ect.) in VC++ like you could in Dev-C++ through project options? Thanks everyone.
https://cboard.cprogramming.com/cplusplus-programming/102336-file-sizes.html
CC-MAIN-2017-22
refinedweb
110
73.58
Tcl_SetStartupScript (3) - Linux Man Pages Tcl_SetStartupScript: main program, startup script, and event loop definition for Tcl-based applications NAME Tcl_Main, Tcl_SetStartupScript, Tcl_GetStartupScript, Tcl_SetMainLoop - main program, startup script, and event loop definition for Tcl-based applications SYNOPSIS #include <tcl.h> Tcl_Main(argc, argv, appInitProc) Tcl_SetStartupScript(path, encoding) Tcl_Obj * Tcl_GetStartupScript(encodingPtr) Tcl_SetMainLoop(mainLoopProc). - - Tcl_Obj *path (in) Name of file to use as startup script, or NULL. - - const char *encoding (in) Encoding of file to use as startup script, or NULL. - - const char **encodingPtr (out) If non-NULL, location to write a copy of the (const char *) pointing to the encoding name. - - Tcl_MainLoopProc *mainLoopProc (in) Address of an application-specific event loop procedure. DESCRIPTION whether the filename and encoding of a startup script has been established. The routines Tcl_SetStartupScript and Tcl_GetStartupScript are the tools for controlling this configuration of Tcl_Main. Tcl_SetStartupScript registers the value path as the name of the file for Tcl_Main to evaluate as its startup script. The value encoding is Tcl's name for the encoding used to store the text in that file. A value of NULL for encoding is a signal to use the system encoding. A value of NULL for path erases any existing registration so that Tcl_Main will not evaluate any startup script. Tcl_GetStartupScript queries the registered file name and encoding set by the most recent Tcl_SetStartupScript call in the same thread. The stored file name is returned, and the stored encoding name is written to space pointed to by encodingPtr, when that is not NULL. The file name and encoding values managed by the routines Tcl_SetStartupScript and Tcl_GetStartupScript are stored per-thread. Although the storage and retrieval functions of these routines work in any thread, only those calls in the same master thread as Tcl_Main can have any influence on it. The caller of Tcl_Main may call Tcl_SetStartupScript first to establish its desired startup script. If Tcl_Main finds that no such startup script has been established, it consults the first few arguments in argv. If they match ?-encoding name? fileName, where fileName does not begin with the character -, then fileName is taken to be the name of a file containing a startup script, and name is taken to be the name of the encoding of the contents of that file. Tcl_Main then calls Tcl_SetStartupScript with these values. Tcl_Main then defines application initialization routine might also call Tcl_SetStartupScript to (re-)set the file and encoding to be used as a startup script. calls Tcl_GetStartupScript to determine what startup script has been requested, if any.. KEYWORDSapplication-specific initialization, command-line arguments, main program
https://www.systutorials.com/docs/linux/man/docs/linux/man/3-Tcl_SetStartupScript/
CC-MAIN-2021-17
refinedweb
426
54.02
After. Here is the code that I used: import win32com.client as com def TotalSize(drive): """ Return the TotalSize of a shared drive [GB]""" try: fso = com.Dispatch("Scripting.FileSystemObject") drv = fso.GetDrive(drive) return drv.TotalSize/2**30 except: return 0 def FreeSpace(drive): """ Return the FreeSpace of a shared drive [GB]""" try: fso = com.Dispatch("Scripting.FileSystemObject") drv = fso.GetDrive(drive) return drv.FreeSpace/2**30 except: return 0 workstations = ['computeNameOne'] print 'Hard drive sizes:' for compName in workstations: drive = '\\\\' + compName + '\\c$' print '*************************************************\n' print compName print 'TotalSize of %s = %f GB' % (drive, TotalSize(drive)) print 'FreeSpace on %s = %f GB' % (drive, FreeSpace(drive)) print '*************************************************\n' Note at the bottom that I used a list. Normally, I would list the computer names of every computer that I wanted to check. Then I would iterate over those names and put together the right path that I needed from a machine with full domain admin rights. To get this to work, we needed to import win32com.client and call the following: com.Dispatch(“Scripting.FileSystemObject”). This would get us a COM object that we could query to get a disk object. Once we had that, we can ask the disk how much total space it had and how much free space. Looking at this code today, I would combine the two functions into one and return a tuple. As you can see, I do a little bit of math on the result to get it to return the size in gigabytes. That’s all there is to it. Simple stuff. I suspect that I didn’t write this code completely since the variable names suck. It is probably from an ActiveState recipe or a forum and I forgot to attribute it. If you recognize the code, let me know in the comments!
http://www.blog.pythonlibrary.org/2010/09/09/getting-remote-drive-space-on-windows/
CC-MAIN-2016-40
refinedweb
302
74.39
Newbie ; NullPointerException Jamie P Greenhorn Joined: Apr 02, 2001 Posts: 1 posted Apr 02, 2001 06:17:00 0 Hi there, I'm a VB programmer trying to learn some java . So I'm trying to make a game in which one has to solve mazes. I am coming across a null pointer exception, and I dont know why. The exception is thrown in the public void paint(Graphics g) { event/method dooda. The code, along with 2 files it uses can be downloaded from here : Thank you anyone that can solve this. - jamie Thomas Paul mister krabs Ranch Hand Joined: May 05, 2000 Posts: 13974 posted Apr 02, 2001 08:20:00 0 A null pointer exception occurs when you try to run a method against an object that has not be instantiated. Associate Instructor - Hofstra University Amazon Top 750 reviewer - Blog - Unresolved References - Book Review Blog Art Metzer Ranch Hand Joined: Oct 31, 2000 Posts: 241 posted Apr 02, 2001 08:33:00 0 Hi, Jamie. And to the rest of you, I'm sorry, this explanation won't make much sense if you haven't looked at Jamie's code. Jamie: This is the line that is giving you trouble: g.drawLine(MazeData[ActiveMazeNumber].Vertex[j].x1, MazeData[ActiveMazeNumber].Vertex[j].y1, MazeData[ActiveMazeNumber].Vertex[j].x2, MazeData[ActiveMazeNumber].Vertex[j].y2); (I had to use "j" as the array's index instead of "i", because this Web site's UBB software interprets "bracket i closing-bracket" as "italicize".) The problem is that ActiveMazeNumber equals zero here, but I think you want CurrentMazeNumber (which equals one). When I replaced the above line of code with g.drawLine(MazeData[CurrentMazeNumber].Vertex[j].x1, MazeData[CurrentMazeNumber].Vertex[j].y1, MazeData[CurrentMazeNumber].Vertex[j].x2, MazeData[CurrentMazeNumber].Vertex[j ].y2); your game seemed to run fine: at least, it didn't generate any more NullPointerExceptions. If you need to clarify between CurrentMazeNumber and ActiveMazeNumber, Jamie, I would definitely add comments to distinguish one from the other. And if you only need one defined, I'd get rid of the other one. Also, I'm not sure about the line in ParseMapData() where you have CurrentMazeNumber = CurrentMazeNumber + 1; right at the beginning of the method? If your intent is to someday have multiple maze definitions, and then build these arrays from your file mazes.maz, Jamie, I would recommend putting this incrementation somewhere at the end of ParseMapData(). In Java, arrays are zero-based, and not filling the "zeroth" element of your MazeData[] array led to some of the confusion here. And just a little note, as an aside: instead of having to hard-code pi, you can use the constant Math.PI, from the package java.lang.Math . Also, constants are usually defined as "public static final", and their variables are usually capitalized, e.g., <PRE> public static final int PLAYER_MAX_SPEED = 15; </PRE> You can find some similar coding conventions that Sun recommends here . Hope this helps, Jamie. Art [This message has been edited by Art Metzer (edited April 02, 2001).] Randall Twede Ranch Hand Joined: Oct 21, 2000 Posts: 4089 posted Apr 02, 2001 14:56:00 0 Jamie P, I hate to say this but, your name does not comply with the Javaranch naming guidelines which can be found at please register again with a valid name. In particular you need a first and last name both more than 1 character. SCJP Jamie Plenderleith Greenhorn Joined: Apr 03, 2001 Posts: 2 posted Apr 03, 2001 10:19:00 0 Hows the username now Anyway, I implimented all/some of your suggestions and have been working on it myself too. Just wondering now, why is the new code not catching the keyboard events ? Thanks, jamie. [This message has been edited by Jamie Plenderleith (edited April 03, 2001).] Art Metzer Ranch Hand Joined: Oct 31, 2000 Posts: 241 posted Apr 04, 2001 08:51:00 0 Hi, Jamie. I think the loop in the original updateGame() method was throwing off the processing of events. Try this code: import java.io.*; import java.awt.*; import java.awt.event.*; public class Maze extends Frame implements ItemListener, WindowListener, KeyListener { public static final double PLAYER_RADIUS = 5; public static final int FRAME_WIDTH = 500; public static final int FRAME_HEIGHT = 500; public static final int PLAYER_MAX_SPEED = 15; public static final int PLAYER_MIN_SPEED = -5; public static final int ROTATION_RATE = 20; private BufferedReader varString; private List listOfMazeNames = new List(); private Label selectMazeLabel = new Label(); private boolean keyUp = false; private boolean keyDown = false; private boolean keyLeft = false; private boolean keyRight = false; private boolean doLoop = false; private double dblX1 = 0.0; private double dblY1 = 0.0; private double dblX2 = 0.0; private double dblY2 = 0.0; private double dblX3 = 0.0; private double dblY3 = 0.0; private double tempdblX1 = 0.0; private double tempdblY1 = 0.0; private double tempdblX2 = 0.0; private double tempdblY2 = 0.0; private double tempdblX3 = 0.0; private double tempdblY3 = 0.0; private double drawX = 100.0; private double drawY = 100.0; private double facing = 0.0; private int playerSpeed = 0; private int currentVertexNumber = 0; private int currentFinishingPointNumber = 0; private int activeMazeNumber = 0; // These counters are populated during // the parsing of the file. They start at // -1 because we can only increment the // count at the beginning of each maze, and // not at the end of the maze. private int currentMazeNumber = -1; private int totalMazes = -1; private static myMaze[] mazeData = new myMaze[255]; public Maze() { this.setSize( 230, 250 ); this.setResizable( false ); this.setBackground( Color.white ); this.setVisible( true ); this.setTitle( "Maze" ); String input; try { varString = new BufferedReader( new FileReader( "mazes.maz" ) ); while ( ( input = varString.readLine() ) != null ) { if ( input.length() > 10 ) { parseMapData( input ); } } } catch ( FileNotFoundException e ) { System.out.println( "Could not find the mazes.maz file !" ); } catch ( IOException e ) { System.out.println( "An I/O exception occurred !" ); } finally { try { varString.close(); } catch ( IOException e ) { System.out.println( "An I/O exception cccurred !" ); } } selectMazeLabel.setSize( 200, 15 ); selectMazeLabel.setLocation( 13, 25 ); selectMazeLabel.setText( "Please select a maze to play :" ); selectMazeLabel.setVisible( true ); listOfMazeNames.setSize( 200, 200 ); listOfMazeNames.setLocation( 15, 40 ); listOfMazeNames.setVisible( true ); listOfMazeNames.setMultipleMode( false ); for ( int i = 0; i <= currentMazeNumber; i++ ) { if ( mazeData[i].name != null ) { listOfMazeNames.add( mazeData[i].name ); } } this.add( listOfMazeNames ); this.add( selectMazeLabel ); listOfMazeNames.addItemListener( this ); doLoop = false; currentVertexNumber = 0; activeMazeNumber = 0; } public void keyPressed( KeyEvent e ) { switch ( e.getKeyCode() ) { case KeyEvent.VK_UP: keyUp = !keyDown; break; case KeyEvent.VK_DOWN: keyDown = !keyUp; break; case KeyEvent.VK_LEFT: keyLeft = !keyRight; break; case KeyEvent.VK_RIGHT: keyRight = !keyLeft; break; } updateGame(); } public void windowClosing( WindowEvent e ) { doLoop = false; System.exit( 0 ); } public void itemStateChanged( ItemEvent event ) { for ( int i = 0; i <= totalMazes; i++ ) { if ( mazeData[i].name.equals( listOfMazeNames.getSelectedItem() ) ) { activeMazeNumber = i; break; } } doLoop = true; this.remove( listOfMazeNames ); this.remove( selectMazeLabel ); setSize( FRAME_WIDTH, FRAME_HEIGHT ); this.addWindowListener( this ); this.addKeyListener( this ); updateGame(); } public void paint( Graphics g ) { if ( doLoop ) { g.setColor( Color.red ); for ( int i = 0; i < mazeData[activeMazeNumber].numVertices; i++ ) { g.drawLine( mazeData[activeMazeNumber].vertex[i].x1, mazeData[activeMazeNumber].vertex[i].y1, mazeData[activeMazeNumber].vertex[i].x2, mazeData[activeMazeNumber].vertex[i].y2 ); } if ( !hitWall() ) { dblX1 = tempdblX1; dblY1 = tempdblY1; dblX2 = tempdblX2; dblY2 = tempdblY2; dblX3 = tempdblX3; dblY3 = tempdblY3; } g.setColor( Color.blue ); g.drawLine( (int) dblX2, (int) dblY2, (int) dblX3, (int) dblY3); g.setColor( Color.red ); g.drawLine( (int) dblX1, (int) dblY1, (int) dblX2, (int) dblY2); g.drawLine( (int) dblX3, (int) dblY3, (int) dblX1, (int) dblY1); } } public static void main( String[] args ) { for ( int a = 0; a < 255; a++ ) { mazeData[a] = new myMaze(); } Frame maze = new Maze(); } private boolean hitWall() { return false; } private void updateGame() { if ( keyRight ) { facing = facing + Math.toRadians( ROTATION_RATE ); keyRight = false; } if ( keyLeft ) { facing = facing - Math.toRadians( ROTATION_RATE ); keyLeft = false; } if ( keyUp ) { if ( playerSpeed < PLAYER_MAX_SPEED ) { ++playerSpeed; } keyUp = false; } if ( keyDown ) { if ( playerSpeed > PLAYER_MIN_SPEED ) { --playerSpeed; } keyDown = false; } drawX = drawX + ( Math.sin( facing ) * playerSpeed ); drawY = drawY - ( Math.cos( facing ) * playerSpeed); tempdblX1 = drawX + PLAYER_RADIUS * Math.sin( facing ); tempdblY1 = drawY - PLAYER_RADIUS * Math.cos( facing ); tempdblX2 = drawX + PLAYER_RADIUS * Math.sin( facing + Math.toRadians( 120 ) ); tempdblY2 = drawY - PLAYER_RADIUS * Math.cos( facing + Math.toRadians( 120 ) ); tempdblX3 = drawX + PLAYER_RADIUS * Math.sin( facing + Math.toRadians( 240 ) ); tempdblY3 = drawY - PLAYER_RADIUS * Math.cos( facing + Math.toRadians( 240 ) ); Graphics g = getGraphics(); update( g ); g.dispose(); } /* * This method parses the file of maze data and populates * the maze data array for reference later in the program * * A data file can have many maze names. One maze name, * or maze, can have many vertices. Each vertex consists * of an two points, and each point has an x-coordinate * and a y-coordinate. */ private void parseMapData( String data ) { String tempString = data.substring( 0, 10 ); if ( tempString.equals( "MazeName :" ) ) { currentVertexNumber = 0; ++currentMazeNumber; ++totalMazes; mazeData[currentMazeNumber] = new myMaze(); mazeData[currentMazeNumber].name = data.substring( 10 ); } else if ( tempString.equals( "Vertex :" ) ) { int[] temp = StringToInts.split( data.substring( 10 ), "," ); mazeData[currentMazeNumber].vertex[currentVertexNumber] = new myVertex(); mazeData[currentMazeNumber].vertex[currentVertexNumber].x1 = temp[0]; mazeData[currentMazeNumber].vertex[currentVertexNumber].y1 = temp[1]; mazeData[currentMazeNumber].vertex[currentVertexNumber].x2 = temp[2]; mazeData[currentMazeNumber].vertex[currentVertexNumber].y2 = temp[3]; ++currentVertexNumber; } else if ( tempString.equals( "Vertices :" ) ) { mazeData[currentMazeNumber].numVertices = Integer.parseInt( data.substring( 10, data.length() ) ); } else if ( tempString.equals( "StartingPo" ) ) { if ( data.substring( 0, 16 ).equals( "StartingPointX :" ) ) { mazeData[currentMazeNumber].startingPointX = Integer.parseInt( data.substring( 16, data.length() ) ); } else { mazeData[currentMazeNumber].startingPointY = Integer.parseInt( data.substring( 16, data.length() ) ); } } else if ( tempString.equals( "FinishingP" ) ) { mazeData[currentMazeNumber].finishingPoint[currentFinishingPointNumber] = new myVertex(); int[] temp2 = StringToInts.split( data.substring( 16, data.length() ), "," ); mazeData[currentMazeNumber].finishingPoint[currentFinishingPointNumber].x1 = temp2[0]; mazeData[currentMazeNumber].finishingPoint[currentFinishingPointNumber].x2 = temp2[1]; mazeData[currentMazeNumber].finishingPoint[currentFinishingPointNumber].y1 = temp2[2]; mazeData[currentMazeNumber].finishingPoint[currentFinishingPointNumber].y2 = temp2[3]; ++currentFinishingPointNumber; } } public void keyReleased( KeyEvent e ) { } public void keyTyped( KeyEvent e ) { } public void windowClosed( WindowEvent e ) { } public void windowOpened( WindowEvent e ) { } public void windowDeiconified( WindowEvent e ) { } public void windowActivated( WindowEvent e ) { } public void windowDeactivated( WindowEvent e ) { } public void windowIconified( WindowEvent e ) { } } class myMaze { String name; int numVertices; int startingPointX; int startingPointY; myVertex[] vertex = new myVertex[255]; myVertex[] finishingPoint = new myVertex[4]; } class myVertex { int x1; int y1; int x2; int y2; } The main things I did were remove the loop in updateGame(), and instead call updateGame() whenever a key event is handled. I also removed your program's flicker. I got rid of TextMan (Java has methods to handle String parsing), but I did refer to a new class I based on TextMan called StringToInts, that takes a comma-delimitered String of integers and converts it to an array of ints: import java.util.*; /* This class takes a comma-delimitered String of ints (no spaces) * and return it as an array of ints. * * Author: Art Metzer * Wednesday 4 April 2001 */ public class StringToInts { public static int[] split( String text, String delimiter ) { // In order to not confuse the StringTokenizer class, // only feed it a String not ending with a delimiter. String input; if ( text.endsWith( delimiter ) ) { input = text.substring( 0, text.length() - delimiter.length() ); } else { input = text; } StringTokenizer st = new StringTokenizer( input, delimiter ); int[] temp = new int[st.countTokens()]; int counter = 0; while ( st.hasMoreTokens() ) { try { temp[counter] = Integer.parseInt( st.nextToken() ); } catch ( NumberFormatException nfe ) { System.out.println( "Bad entry in file: " + text ); } ++counter; } return temp; } } I'm glad you're venturing from the realm of VB to the realm of Java, Jamie. I would urge you to investigate and use the Java API: it'll get you up to speed faster. As you become more familiar with Java, you may want to revisit this maze program and analyze how you might make it object-oriented. Fun game, that little pointer is hard to control! Art Jamie Plenderleith Greenhorn Joined: Apr 03, 2001 Posts: 2 posted Apr 06, 2001 02:46:00 0 Hey thanks for the code. Its very good. I have implimented (well, copy+pasted ) the code, and its working great. I have the triangle's speed set to 0 after each update so it makes it a lot easier to control. One thing though, is there no way of getting the origninal RunGameLoop() to function ? In VB you'd just stick in the DoEvents keyword which would then pass control to other events/threads/programs for a short period of time. I was taking a look at processKeyEvents() and things like that. Would those not be what I'm after ? Anyway, thanks again for the excellent code. Regards, Jamie. I agree. Here's the link: subject: Newbie ; NullPointerException Similar Threads .xhtml ParseException What is the need to clone objects? RPC/Encoded support in Axis2 Problem running the RMI tutorial in Sun's website! String ID All times are in JavaRanch time: GMT-6 in summer, GMT-7 in winter JForum | Paul Wheaton
http://www.coderanch.com/t/388458/java/java/Newbie-NullPointerException
CC-MAIN-2013-20
refinedweb
2,088
51.95
If… In one of my recent projects we encountered many images which were missing from our S3 bucket. When I see something like this it just makes me sick 😫. <img> provides us with two events, onLoad and onError. We can use these two keep track of the status of the image. onError is called when our image has failed to load, and we can set src to our preferred fallback image. onLoad is called when our image loaded successfully, nothing for us to do here. import React from "react"; import PropTypes from "prop-types"; class Image extends React.Component { constructor(props) {…… from const inventory = [ {name: 'mars', quantity: 2}, {name: 'snickers', quantity: 3} ]; console.log(Array.from(inventory, item => item.quantity + 2)); // [4, 5] of Array.of("Twinkle", "Little", "Star"); // returns ["Twinkle", "Little", "Star"] find const inventory = [ {name: 'mars', quantity: 2}, {name: 'snickers', quantity: 3} ]; console.log(inventory.find(item => item.name === 'mars')); // {name: 'mars', quantity: 2} findIndex const inventory = [ {name: 'mars', quantity: 2}, {name: 'snickers', quantity: 3} ]; console.log(inventory.findIndex(item => item.name === 'mars')); // 0 fill method takes up to three arguments value, start and end. … var string = 'string'; var substring = 'str'; console.log(string.indexOf(substring) > -1); Instead of checking for a return value > -1 to denote string containment, we can simply use .includes() which will return a boolean: const string = 'string'; const substring = 'str'; console.log(string.includes(substring)); // true function repeat(string, count) { var strings = []; while(strings.length < count) { strings.push(string); } return strings.join(''); } In ES6, we now have access to a nicer implementation: // String.repeat(numberOfRepetitions) 'str'.repeat(3); // 'strstrstr' You can find a more complete ES6 cheetsheet on my Github page. P.S. If you ❤️ this, make sure to follow me on Twitter, and share this with your friends 😀🙏🏻 A Set is a collection for unique values. The values can be primitives or object references. let set = new Set(); set.add(1); set.add('1'); set.add({ key: 'value' }); console.log(set); // Set {1, '1', Object {key: 'value'}} Most importantly is that it does not allow duplicate values, one good use if to remove duplicate values from an array: [ ...new Set([1, 2, 3, 1, 2, 3]) ] // [1, 2, 3] Iteration using built-in method forEach and for..of: // forEach let set = new Set([1, '1', { key: 'value' }]); set.forEach(function (value) { console.log(value); … … Prior to ES6, we used libraries such as Browserify to create modules on the client-side, and require in Node.js. With ES6, we can now directly use modules of all types (AMD and CommonJS). module.exports = 1; module.exports = { foo: 'bar' }; module.exports = ['foo', 'bar']; module.exports = function bar () {}; Named Exports: export function multiply (x, y) { return x * y; }; As well as exporting a list of objects: function add (x, y) { return x + y; }; function multiply (x, y) { return x * y; }; export { add, multiply }; Default export: …
https://medium.com/@serbanmihai
CC-MAIN-2021-39
refinedweb
479
59.3
I. Perl's testing framework doesn't actually require in any way that the thing being tested is perl. There's a reasonably well-defined protocol that governs what the test outputs, all you need is some code to output that, and it doesn't matter the code that outputs it is perl, C, python, or brainf*ck. There's a fairly good article on the Test Anything Protocol on WP, or just run any existing test with perl -Mblib t/foo.pl and observe what it outputs. # t/simple_tests.c #include <stdio.h> #include "tap.h" #include "something.h" int main(void) { plan_tests(1); /* * A simple example of a test. */ ok(1 + 1 == 2, "Basic arithmetic works"); return exit_status(); /* Return the correct exit code */ } [download] # binaries check_PROGRAMS = simple_tests simple_tests_SOURCES = simple_tests.c tap.c ../src/something.c\ tap.h ../src/something.h simple_tests_CFLAGS = -Wall --pedantic -std=c99 -I ../src TESTS = simple_tests [download] SUBDIRS = src t [download] Inline::C, perlxs, perlguts, perlapi... I think if your code is mainly C there are probably better tools for testing it. But if you're mixing perl and C then you can use any of the test modules. There's a lot of choices. I usually use regular old Test, but a lot of people like Test::More and there are a million other things. -Paul Yes, I watch meteor showers No, I do not watch meteor showers My meteors prefer to bathe Results (151 votes). Check out past polls.
http://www.perlmonks.org/?node_id=641503
CC-MAIN-2017-04
refinedweb
246
66.94
Are you sure? This action might not be possible to undo. Are you sure you want to continue? SUCCESSION Introductory :- The Muslim Law of inheritance is a superstructure constructed on the foundations of pre-Islamic customary law of succession. It is based on the patriarchal organisation of the family, in which are buttressed some neai cognates side by side with agnates. In Islamic law distinction between the family property and the separate property has never existed, and in India Muslim law did not recognize the joint family property, though among the South Indian Muslims having matrilineal system, the institution of tarwad‟ is recognised. The twin doctrines of the Mitakshara school of Hindu law, viz., son‟s birth right and survivorship, are also not recognised in Muslim law. Since under Muslim law, all properties devolve by succession, the right of heirapparent does not come into existence till the death of the ancestor. Succession opens only on the death of the deceased, and then alone the property vests in the heirs. Whenever a female inherits property, she takes her share absolutely and without any restrictions. The Muslim law of inheritance is a unique aspect of Muslim law. It is a different system of law. Prophet Mohammed said: „Learn the laws of inheritance and teach them to the people; for they are one-half of useful knowledge”. About the Muslim law of inheritance, Tayabji observed : “The Muslim law of Inheritance has always been admired for its completeness as well as the success with which it has achieved the ambitious aim of providing not merely for the selection of a single individual or a homogenous group of individuals, on whom the estate of the deceased should devolve by universal succession, but for adjusting the competitive claim of all the nearest relations”. General Principles :Customary principles of succession.—In the pre-Islamic Arabia, the law of inheritance was based on, what is called, comradeship-in-arms, and, on this basis, even the wife and the children were excluded from inheritance. In the broadest possible sense, the law of inheritance was based on the principles of agnatic preference and exclusion of females. The four basic principles of the pre-Islamic law of succession were : first, the nearest male agnate or agnates succeeded to the total exclusion of remoter agnates. Thus, If a Muslim died leaving behind a son, and a son of a predeceased son, then the son inherited the entire property and the grandson was totally excluded. Secondly, females were excluded from inheritance; so were cognates. Thus, a daughter or a sister or a daughter‟s son or sister‟s son could never succeed to the property. Thirdly, the descendants were preferred over ascendants, and ascendants over collaterals. For Instance, In the presence of a son, father could not succeed. Similarly, In the presence of father, brother could not inherit. Fourthly, where there were more than one male agnates of equal degree, all of them inherited the property and shared it equally, taking per capita. For example, if a person died leaving behind three brothers, all of them succeeded and each took one-third of the estate. Islamic principles of succession.—The Prophet interposed the following new principles on the aforesaid principles of customary law of r succession. First, the husband and the wife being equal are entitled to inherit to each other. Secondly, some near females and cognates are also recognized and enumerated as heirs. Thirdly, the parents and certain other ascendants are made heirs even when there are descendants. Fourthly, the newly created heirs (those who were not entitled to inherit under customary law) are given specified shares. Fifthly. the newly created heirs inherit the specified shares along with customary heirs, and not to their exclusion. After allotting the specific shares to the newly created heirs, who are called sharers, whatever is left 2 (residue) and the scheme Is so laid down that something Is usually left, goes to the customary heirs who are called residuaries. It is necessary to notice that the Koran did not create a new structure of law of succession, but merely amended and modified the customary law of succession so as to bring it in conformity with the Islamic philosophy. When the Koran enumerates certain heirs and allots specific shares to them, it does not mean that those who are not enumerated do not get any share. For instance, husband, wife, father, true grandfather, daughter, son‟s daughter, sister and uterine brother are the Koranic heirs, but this does not mean that son or brother do not take anything In the inheritance. They continue to be heirs (they were heirs under customary law) and take their shares. What has happened is this that those persons were not heirs under the customary law have been made heirs (called shares of the Koranic heirs) and specific shares have been allotted to them. For instance, if A, a Muslim, dies leaving behind a widow, W and two sons S and SI, then W will take one-eighth as her specified share and S and S‟ will take the residue, i.e., seven-eighth. This super-Imposition of the Koranic principles on the customary w of inheritance has led to divergence of opinion among the Shias and e Sunnis, resulting in the propagation of two different rules of inheritance. According to Tayabji,‟ the fundamental difference between Shia and the Sunni law of inheritance are: (1) The Hanails allow the framework or principles of the pre-Islarnic customs to stand: they develop or alter those rules in the specific manner mentioned in the Koran, and by the Prophet. (2) The Shias deduce certain principles, which they hold to underlie the amendments expressed in the Koran and fuse the principles so deduced with the principles underlying. the pre-existing customary law, and thus raise up a completely altered set of principles and rules derived from them. It is significant to note that the Muslim Personal Law (Shariat) Application Act, 1937 specifically refers to „special property of females‟. By this provision the Act meant to abolish all those anti-women customs contrary to the Muslim law in this regard that were in vogue in certain regions of the country and among certain sections of the community. Under Muslim law the same scheme of succession applies in every case whether the deceased was a male or female. This is one of those salient features of the Muslim law of succession which distinguish it from the parallel law under the Hindu Succession Act, 1956. Definition :(i) Agnates: An agnate is a relation who is related to the deceased, wholly through male. For example, son‟s son, son‟s son‟s son however distant, son‟s daughter, son‟s son‟s daughter, father‟s father‟s father‟s mother; brother, brother‟s daughter and brother‟s son etc., are agnates. So the only thing is important between the relationship is that all persons through whom relationship is traced should be males. Agnates may be descendants, ascendants or collaterals. 3 (ii) Cognates: A cognate is a relation who is related to the deceased through one or more females. For example, daughter‟s daughter, daughter‟s son, daughter‟s daughter, daughter‟s daughter‟s son, daughter‟s son‟s daughter, mother‟s mother, mother‟s father, mother‟s sister, mother‟s brother etc. A cognate may also be descendants, ascendants or collaterals. (iii) Descendants: Descendants are the offspring of the deceased up to any degree of descent. It means children of children are also included. For example, sons and daughters are the immediate descendants and children and grandchildren of sons and daughters are also descendants. (iv) Ascendants: Ascendants are the ascent means ancestors of parents are also included. For example, father and mother are immediate ascendants and father‟s father and father‟s mother, mother‟s father and mother‟s mother are also descendants. (v) Collaterals: Collaterals are descendants in parallel lines from a common ancestor or ancestors. Collaterals may be agnates or cognates. For example, consanguine brother and sisters, uterine brothers and sisters, paternal uncles and paternal aunts and their children, maternal uncles and maternal aunts and their children are collaterals. (vi) Full Blood: When the father and mother of two persons (male and female) are the same, they are related to each other by full blood. For example, a real brother and a real sister are related to each other by full blood. (vii) Half Blood: When Iwo „persons (male and female) have the same father but different mothers, they are related to each other by half blood. (viii) Consanguine Brothers and Sisters: Children of a common father but different mothers are called consanguine brothers or sisters. For example, if a widower A having son B from his deceased wife, remarries with F and a daughter G is born to them then, although the mothers of B and G are different yet, they have a common blood (consanguinity) of the father. They are therefore, consanguine brother and sister, Consanguine relations are agnates because they inherit through the father. (ix) Uterine Blood: When two persons, (male and female) have the same mother (uterus) but different fathers, they are related to each other by uterine blood. For example, A, a widow having a son S from her deceased husband, marries B and from both, a daughter D is born to them. Here S and D are uterine brother and sister because although their fathers are different persons yet, their mother is common. Uterine relations are cognates because they inherit through a female (the common mother). (x) Heirs :- An heir is a person (male or female) who is entitled to inherit the property of the intestate. For example, any person whether a son or a daughter who is entitled to get a share in the property of the father who dies intestate, is his heir. (xi) Intestate: Intestate is a person who dies without making a Will. (xii) Sharers: Sharers are those persons including male or female, who are entitled to specific shares of inheritance in the property of the deceased. (xiii) Residuaries: Residuaries are those persons who are entitled to the residue of property of the deceased left after allotting the specific shares to the sharers. The residuaries‟ shares are not specified. (xiv) Distant Kindred: Distant kindred are those blood relations of the deceased who are neither the sharers nor the residuaries. (xv) Per capita: When a number of individuals take the property in equal shares, they are called as taking per capita. For example, when the property is divided into equal parts 4 between two sons of a son, and three sons of another son, it is called per capita, each taking 1/5 of the property. (xvi) Per stripes: When the property is distributed according to stocks or branches and not according to the number of individuals, they are called as taking per strips. For example, if two sons of a deceased are already dead and he is survived by his two sons of a predeceased son and three sons of another predeceased son, then the grandsons would get only those shares which their fathers would have taken. (xvii) Pro positus: Propositus means a deceased whose property is subject of inheritance. Thus, a person whose properties are inherited by his or her legal heirs is called the propositus. In general term includes „the person proposed‟ or a person from whom the ascending or descending line is traced in the succession of properties. (xviii) True Grand-father: In the language of the law of inheritance, paternal grand-father is called a true grandfather. It means a true grand-father is an agnatic grand-father. If there is no intervention of any female between a male ancestor and the propositus, the male ancestor is called true grand-father of the propositus. For example, the father‟s father or father‟s father‟s father, etc., how high soever, are the true grand-father. (xix) True Grand-mother: Means a female ascendant, howsoever distant between whom and the deceased there is no false grand-father. (xx) False Grand-father or false Grand-mother: The maternal grand-father of a person is technically called as his false grand-father. If, between a grand-father and the propositus there is an intervention of one or more females, the said grandfather is termed as a false grand-father of the propositus. For example, the mother‟s lather, mother‟s mother‟s father, mother‟s father‟s father and father‟s mother‟s father, etc., are the false grand-father because between the propositus and the male ancestor there is a female ancestress. Similarly, if there intervenes any maternal grand-father between a female ancestor and the propositus then, the said female ancestor is a false grandmother of that propositus. In short, false grand-father means a male ancestor between whom and the deceased there is a female link. And false grand-mother means a female ancestor, howsoever distant, between whom and the deceased a false grand-father intervenes. Applicability of certain rules. :The main principles of succession are as follows: 1. Rule of representation, 2. Rule of exclusion; 3. Rule of primogeniture; 4. Rule of vested inheritance; and 5. Rule of spes successionis. 1. Rule of Representation. —The principle of representation has more than one meaning. It may be applied for the purpose of deciding (a) what persons are entitled to inherit; (b) the quantum or the share of any given person on the footing that he is entitled to inherit. Per stirpes and per capita—Distinguished.—The division of an estate among heirs belonging to different branches may be according to the different stocks or branches to which different sects 5 of heirs represents, or it may be according to the individual heirs or claimants without regard to the representation of the branches to which they belong. The former is called division per stirpes while the latter is called division per capita. A Shia leaves two grandsons X and Y from his predeceased son Z, and also one grandson F from his pre-deceased son Z. Here as rule of representation applies among Shias, the division shall be per stirpes and accordingly X and Y will both get 1/2 while F alone shall get 1/2. If the estate were to be divided per capita (in case where A had been a Sunni Muslim) the three grandsons will get 1/3rd each. The Shia Law accepts the principle of representation as a cardinal principle for the purpose of ascertaining the heirs but Sunni Law is different. According to Sunni Law the expectant right of an heir-apparent cannot pass by succession to his heir, nor can it pass by bequest to a legatee under his will. Suppose X, a Sunni Muslim has two sons, the first son dies in the lifetime of his father, but leaving a son. Afterwards X dies leaving his second son and the grandson by the predeceased son. Here under Sunni Law the surviving son will get the whole property excluding his nephew, i.e., grandson of X. Here in this case the grandson cannot claim his father‟s share because in the lifetime of X, the first son died. Here the grandson is not entitled to claim his father‟s share as representating him perhaps because, his father never inherited from his grandfather. Thus in this present illustration the grandson is excluded from the inheritance, by his uncle, on the ground that a son of a predeceased son is not an heir. But according to Shia Law, the descendants of a deceased son, if they are heirs, take the portion which he, if living, would have taken and in that sense represent the son. In the same limited sense, the descendants of a deceased daughter represent the daughter, if they inherit, they take the portion which the daughter, if living, would have taken. Under Shia Law, this principle of representation is not only confined in its operation to descendants only but it applies in the accending as well as in the descending line. Thus, greatgrand parents, if living, would have taken and the fathers and aunts take the portion which the deceased‟s uncles and aunts if living would have taken. 2. Rule of Exclusion.—Every person, including a child in the womb (provided it is born alive), is entitled to inherit, unless there is specific rule of exclusion. According to the rule of exclusion certain persons are disqualified to inherit the property of another person. Such persons though heirs are excluded from inheritance due to certain impediments imposed on them by Muslim Law. These impediments or disabilities are personal and are known as grounds of exclusion. These grounds, according to pure Muslim Law, are as follows: 1. Homicide; 2. Illegitimacy; 3. Slavery; 4. Difference of religion; 5. Difference of allegiance or country; Not recognised in India. 6. Estoppel in succession; 7. Doctrine of exclusion of (Hujab). 8. Exclusion of daughters from the right of inheritance. Out of the above, the doctrine of exclusion is the most important. 6 (1) Homicide: (a) Sunni Law.—Under Sunni Law a person who causes the death of a person is not entitled to inherit the property of that person; no matter whether the death was caused intentionally or by accident. (b) Shia Law.— Under Shia Law, the murderer of a person is disentitled to inherit him only when the death is caused intentionally. (2) Illegitimacy.—(a) Shia Law.—Under Shia Law an illegitimate person being the child of none, is disqualified to inherit both his mother and father. (b) Sunni Law.—Under Sunni Law an illegitimate child is entitled to inherit his mother but not his father. (3) Slavery.— This impediment to inheritance has been abolished and has no place in Mohammedan Law as it is administered in India. The bar of slavery has been abolished by the Abolition of Slavery Act, V of 1843. (4) Difference of religion.—Under Islamic Law a non-Muslim could not inherit from a Muslim but the Caste Disabilities Removal Act of 1850 does away in India with the exclusion from inheritance from a deceased Muslim on the ground of mere difference of religion whether due to apostasy or otherwise. The estate of a Hindu converted to Islam and dying a Muslim is subject to Muslim Law. (5) Difference of allegiance, etc.—With the end of Muslim rule in India, this ground of exclusion lost significance. (6) Estoppel in succession.—A person who first denies his relationship with the propositus, cannot be allowed subsequently to turn his back and claim inheritance when succession opens. Denial of relationship operates as estoppel in succession. (7) Doctrine of exclusion.—(a) This doctrine consists of a set of three rules which govern inheritance and exclude certain heirs by recognising the preferential claims of certain other heirs. These are as follows Rule 1.— A person who is related to the propositus through another is excluded by the presence of the latter. A has two sons X and Y. Y dies leaving heritable property. Now X cannot claim inheritance on the basis of his being brother of the deceased, because his relationship with Y arises through A, their father and hence the presence of A excludes X. Rule 2.—Within the limits of each class of heirs, an heir nearer in blood excludes the more remote. A has a son P and a grandson X from P. P being nearer in blood will exclude X. A (Propositus) P (son) X (Grandson) The daughter, though she is nearer in degree, does not exclude the brother‟s son or his son. Thus, if the surviving relations be a daughter and brother‟s son, the daughter takes 1/2, and the brother‟s son takes their residue. The, reason is that the daughter in this case inherits as a sharer, and the brother‟s son a residuary, and the principles laid down above applies only as between relations belonging to the same class of heirs. Rule 3.—A person excluded, may exclude others. Who is excluded may exclude others. According to this rule, the person who himself is excluded from inheritance may affect the share of others, i.e., he will not be supposed to be non-existing for excluding others. It is one thing that .It was held that his property will pass on his death to his Muslim wife 7 and children, not to his Hindu wife or children. he is entitled to receive any share due to the presence of some intermediary and it is another thing that his presence reduces or restricts the claim of another. (8) Exclusion of daughters from the right of inheritance.—Under the Muslim law, daughters are given the right of succession. However, this rule is not absolute. There is one exception to this rule. Under the customary law, a daughter may be excluded from the right of inheritance. 3. Rule of Primogeniture.—The rule of primogeniture is, that where a person has several sons, the eldest son has a preferential claim over the estate of the deceased father. Generally this rule is not recognised by Mohammedan Law. The Shias, however, recognise the exclusive right to the eldest son c f such articles of the father as his wearing apparel, Quran, ring, sword, arms, the mantle and horse. In S. Fateyab Au Meerza v. Union of India, Nawab married with a Jewess woman. Two sons were born out of wedlock. The Calcutta High Court held that on death of the Nawab unless succession to Nawabship is finally decided by competent court, the brother of deceased Nawab could not claim title on the basis of law of primogeniture and on allegations that both sons have renounced Islam. (4) Rule of vested inheritance.—It is a well-established rule of Muslim Law that property never remains in a state of abeyance but on the death of proprietor passes to his various heirs. By the term „vested inheritance‟ is meant the share of inheritance that vests in the heir immediately on the death of the propositus (whose property is claimed). The moment a person takes his last breath, his property vests in his heirs though the actual distribution according to the shares of each heir may take place after sometime. Thus vesting of inheritance is the first and foremost stage in the devolution of property to the legal heirs of a person. This necessitates a brief explanation of the two stages of succession. Two stages of succession.—The two main stages in the devolution of the property of a deceased person are : (1) Vesting of inheritance, and (2) Distribution of inheritance. Vesting of inheritance is a simple affair.—As said above, the moment a person dies, all his right and interests in the property terminate and the property stands vested in the heirs. Distribution of inheritance.—Vesting of property takes place immediately on the death of the propositus, but it takes a fairly long time to effect the actual, distribution of the property. Some of the reasons, why actual distribution takes a long time are these (i) Determination of heritable property, which in itself is a long process. (ii) determination of exact shares of each heir, and (iii) obtaining the necessary certificates from the court. Thus vesting of inheritance is the first and the foremost initial stage in the process of devolution; the second stage being the actual distribution of the property. The significance of the rule of vested inheritance arises in answering the question, “what are the rights of an heir in a property before the taking place of actual distribution, i.e., before the second stage”. 8 Rights of heirs before distribution.— (a) If an heir dies before the actual distribution of the property, the property will pass to his heirs on the basis of the rule of vested inheritance. (b) Any heir may, even before the distribution of the estate, transfer his share to a bona fide purchaser for value. The heir will pass a good title and creditor cannot follow the estate in the hands of such purchaser.‟ The only conditions are that he must be a (i) bona fide purchaser, (ii) he must purchase the property for value, and (iii) he must not have the notice of the debts. (5) Rule of „Spes Successionis‟. While the rule of „vested inheritance‟, explained above is applicable after the death of propositus, the rule of spes successionis applies before the death of such person. The cardinal principle of Mohammedan law is that the succession for the first time opens on the death of the propositus. Before his death nobody can claim any right in the property on the basis of his being the heir apparent. Hence during the life time of a person all that an heir apparent has is a mere chance of inheriting i.e., spes successionis. (Spes—hope of successionis succession, i.e., mere hope of succession). The rule.—Thus the rule is that a mere spes successionis or a mere chance of succession, cannot be the object of a valid transfer or release.A who has a son B makes a gift of his property to C. Now B alleging that the gift was procured by undue influence sues C in A‟s life time on the basis of his rights to succeed to property on A‟s death (i.e., spes successionis). It was held that the right of B being a mere succession, he has no cause of action, for he is not enttitled to any interest in A‟s property during A‟s life time. But the gift would be liable to be set aside if the suit was brought after A‟s death provided it was brought within the period of limitation. Such a right claimed by B in the above illustration is mere spes Successionis i.e., an expectation or hope of succeeding to A‟s property if B survived A. The Mohammedan Law does not recognise any interest expectation of the death of another, and till that death occurs which by force of that law gives birth to the right as heir in the persons entitled to it according to the rule of succession, he possesses no right at all. Disqualified Heirs :- Disqualified heirs are those who are excluded from inheritance. In India, no Muslim who is entitled as an heir, to inherit the estate of a deceased shall be disqualified from inheritance except in the following mentioned cases: (i) Apostate (ii) Murderer (iii) Illegitimate-children (iv) Step-relations (v) Childless widow (vi) Disqualification provided by some law or custom. 1. Apostate or Difference of Religion: Under the pure Islamic law, an apostate (nonMuslim) is not entitled to inherit the property from a deceased Muslim.4 But after coming into force of the Caste Disabilities Removal Act, this disability is removed by this Act. Under this Act, renunciation of religion by any heir does not affect his or her rights of inheritance under the personal law to which that heir belonged before conversion. Accordingly, a converted heir will continue to be governed by the Muslim law of inheritance. 9 However, it may be noted that religion of the propositus, i.e., deceased is an important factor because the properties devolve under the personal law to which the propositus belonged just before his death. So, a non-Muslim is entitled to inherit in the property of a deceased Muslim whose heir he is, but his non-Muslim descendants will not be entitled to inherit the property of a deceased Muslim.‟ In K.P. Chandrashekhar v. Government of Myore a Hindu woman converted to Islam died as a Muslim. She had no heir under Muslim law. Her Hindu brother claim inheritance. It was held by the court that her Hindu brother could not inherit because he was not an heir under Muslim law, Inheritance to the property of a convert to Islam is governed by Muslim law and his heirs would inherit accordingly. 2. Murderer: Under the Hanafi law, if the death of the deceased, whether intentionally or negligently or accidentally, he will be excluded from inheritance. But the heir causing the death will not be excluded from inheritance, if the death is caused in the performance of a duty. For example, if the father causes the death of his child by the circumcision of the child, the death will be deemed to be caused in the performance of a duty. Similarly, if the death of a person caused by his heir while inflicting punishment under the direction of law, the heir will not be excluded from inheritance because death was caused by him while performing the duty. Under Shia law, the death of the person caused intentionally by the heir, excludes him from inheritance. Death caused negligently or accidentally by an heir will not be disqualify him from inheritance. It is important to note here that exclusion from inheritance of an heir causing death of the deceased is only a person bar, any other person claim through him will not barred from being inherited from the deceased. 3. Illegitimate Children: Under Muslim law an illegitimate child is considered the child of the mother only, it cannot inherit father‟s property. Similarly, an illegitimate child cannot inherit a legitimate child born to the mother from a subsequent marriage.The same position would prevail with the child of mother who has been divorced by Lian. The child born to such a mother is considered illegitimate. Under the Hanafi law, an illegitimate child is entitled to mutual rights of inheritance with its mother and all other relations through mother but not with its father and other relations through father. For example, when a female dies leaving behind her husband and an illegitimate son of her sister the husband will get one-half as sharer and the residue will go to sister‟s illegitimate son because an illegitimate child is entitled to inherit from its mother as well as maternal relations. Shia law: Under Shia law, an illegitimate child is treated as nullius fihius and is not entitled to inherit the estate of a deceased relation.‟ There are no mutual rights of inheritance between such child and its relations. As an illegitimate child has no parentage or father and is not related in law to the man who has begotten him, the latter will not be considered his father for purpose of determining his nasab. Therefore, the man who begets an illegitimate child will not be considered in law as his father and mother‟s link alone being not sufficient to establish uterine relationship, an illegitimate child cannot be considered the uterine brother of the legitimate child of the same mother and as such he was not entitled to inherit as his heir. 10 4. Adopted Child: As adoption is not recognised by Muslim law, therefore, adopted person is not entitled to anything even on the basis of Will. The adoption is a question of fact and not of law. 5. Step-relations: Step-relations have no mutual rights of inheritance. So, a step-mother or a step-son is not heirs. For example, where a Muslim A marries a widow B having a son from her previous husband, the son is a step-son of A, who is step-father of this son. The step-father and step-son cannot inherit each other‟s properties. However, the step-child is competent to inherit from its natural father or natural mother. Similarly, the natural father and natural mother can inherit from their natural sons or daughters. 6. Childless Widow: Under the Shia law, a childless widow is not entitled to a share in her husband‟s property. But she has a share in the value of trees and buildings standing on the land as well as in the movable property of her husband. But in the absence of other heirs, she was entitled to inherit from her husband not only her share but also the rest of property including the land by the application of the doctrine of return. 7. Disqualification provided by some law or custom: This rule is applicable not generally and locally, the Shariat Act has superseded application of custom generally but at places and circumstances in which the Act is not applicable the local custom may apply. Disqualification excluding the heirs from inheritance may be provided by some law or custom. (a) Statutory disqualflcation: Statutes may exclude some heirs from inheritance. In the Oudh Estate Acts of 1869 and 1910, a special rule of prirnogeniture is laid down. The family custom of primogenitary succession governs the talukdari property hence excluding the daughters from succession. (b) Customary disqualification: Customs may also exclude some heirs from inheritance. Among the Gujars of Punjab and Jammu and Kashmir, daughters are excluded from inheritance by custom and they inherit only in default of agnates. Hanafi law of Inheritance Underany law of Intestate succession, two questions, that arise; are: (I) (II) who are the heirs of the deceased, and to what share the heirs are entitled. Muslim law-givers have gone into details in laying down the categories of the persons who are entitled to participate in the inheritance, and the respective shares to which each categories of heirs and heirs in each category are entitled to receive. Heirs :- It may be recalled that the pre-Islamic customary law allowed only male agnates to succeed, and among the male agnates, the descendants were preferred to ascendants, and ascendants V were preferred to collaterals. Further, no female was allowed to participate in the inheritance. What Islamic law had done Is to superimpose on this customary structure certain blood relations who are either equally near, or. nearer, to the deceased than the customary heirs. Among these new heirs are certain females, and some ascendants and collaterals. The spouse of the deceased is allowed to take a share in the 11 inheritance, as a relation by affinity. Looked at in this perspective, apart from the spouses (husband or wife) of the deceased, the other heirs specifically mentioned In the Koran are at par with customary heirs. Thus, son, or son‟s son how low soever, Is entitled to Inherit under the customary law. The Koran superimposed daughter, son‟s daughter or son‟s son‟s daughter how low soever, and gave her a specified share. It should be noted that daughter‟s daughter, who Is a cognate, and, therefore, remoter than the son or son‟s son, is not Included. Since son and daughter were included, It was logical to include mother and father. Similarly, since son‟s son and son‟s daughter were included, it was logical to include true grandfather and true grandmother. It was equally logical to include certain collaterals. Thus, were Included full and consanguine sisters, since full and consanguine brothers were heirs under customary law. For the same reason were included uterine brothers and sisters. To these newly created heirs, the Koran allots a specific share, These new heirs are commonly called “sharers”.‟ Fyzee prefers to call them “Koranic heirs, since these heirs were created by the Koran.2 It is noteworthy that the fractional shares that are specified by the Koran are only six, namely 1/2, 1/4, 1/8, 2/3, 1/3 and 1/6. The sharers are allotted their specified shares. Then whatever is left after allotting share to the sharers, the rest— residue—is divided among the customary heirs who have been accorded recognition by the Koran. These heirs are commonly called “residuaries”. This term came into vogue on the assumption that after giving specified shares to the sharers, whatever is left Is given to them. Fyzee objects to this term, and prefers to call them “agnatic heir”. In the scheme of heirs, It should be noticed that certain sharers become residuarles on account of the existence of certain other near relations. Thus, when the deceased has no child or child of a son how low soever, the father and the true grandfather become residuarles. Similarly, the daughter becomes a residuary when the deceased has left behind a son, and the full sister becomes residuary when the deceased Is survived by a full brother. This also applies to consanguine sister, when the deceased Is survived by a consanguine brother. The Hanafi law lays down that In the absence of the sharers and the residuarles, the estate is passed to other relations who are called “distant kindred”. The distant kindred are those relations of the deceased who are neither sharers nor residuarles. Fyzee prefers to name them as “uterine helrs”. On the failure of distant kindred, In modern India, the estate of the deceased goes to the State by escheat.‟ Thus, under the Hanafi law, the heirs of a deceased Muslim, male or female, fall under the following classes (I) The sharers, (II) The residuarles, (III) The distant kindred, and (1V) The State by escheat. 12 The Sharers :- The sharers are twelve In number. They may be stated thus: A. Relations by affinity of marriage: 1. wife, 2. husband. B. Relations by blood: (a) female agnatic descendants, 3. daughter, 4. son‟s daughter, how low soever, (b) female agnatic collaterals: 5. full sister, 6. consanguIne sister, (c)cognatic collaterals; 7. uterine brother, 8. uterine sister. (d) female ascendants; 9. mother. 10. true grandmother, (e) male ascendants; 11. father, and 12. true grandfather. The Koran allots specified shares to the sharers. In the case of some sharers, their shares vary under certain circumstances. Some sharers under certain circumstances do not inherit as sharers, but as residuaries. Heirs and their allotted Shares :1. Husband: The husband gets 1/2 if there is no (a) child or (b) child of son how low soever (h.l.s); if there is (a) child or (b) child of son( h.l.s) then husband gets 1/4. 2. Widow: The widow gets 1/4 if there is no (a) child or (b) child of son how low soever (h.l.s); if there is (a) child or (b) child of son h.Ls then widow gets 1/8. If the propositus had left more than one widow, all the widows share equally out of the 1/4 or 1/8 share, as the case may be. 3. Father: The father will be treated as Residuary if there is no (a) child or (b) child of son how low soever (h.l.s); if there is (a) child or (b) child of son h.l.s then Father gets 1/6. 4. True Grand-father: True grand-father is entitled to inherit only in the absence of father. It means if the propositus dies leaving behind both father and a true grand-father, the true grand-father cannot inherit. If there is no father, the true grand-father inherits like a father. It means if there is no father, the true grand-father would become residuary in the absence of children. But in the presence of children a true grand-father gets 1/6. 5. Mother: The share of mother is 1/3 in the absence of (a) child, or (b) child of a son h.Ls or (c) two full sister, or (d) two full brothers, or (e) one brother plus one sister, whether 13 full, consanguine or uterine. If the presence of above-mentioned relations, mother share is 1/6. 6. True Grand-mother: A paternal grand-mother is excluded from inheritance in the presence of (a) mother, or (b) father or (c) a nearer true-grand-mother whether maternal or paternal. A maternal grand-mother is excluded from inheritance in the presence of (a) mother, or (b) a nearer maternal or paternal grand-mother. If not excluded, the share of true grand-mother is 1/6. Two or more grand-mothers get 1/6 jointly. 7. Daughter: The share of one daughter is 1/2. If there are two or more daughters, the share is 2/3 to be divided equally among them. But daughter together with son is treated as agnatic heir, i.e., inherits as Residuary. 8. Sons‟s Daughter: The sons‟ daughter inherits only in the absence of (a) two or more daughters, or (b) son, or (c) higher son‟s son, or (d) two or more higher son‟s daughter. In the absence of above relations, the son‟s daughter gets 1/2 if single and 2/3 if more than one. If son‟s daughter is together with one daughter, the share of sons‟s daughter is 1/6 whether such son‟s daughter is single or more. For example, if there is a daughter and two son‟s daughters, the share of son‟s daughter would be 1/6 which would be divided equally among them, i.e., each son s daughter would get 1/12. Son‟s daughter together with son‟s son is treated as agnatic heir, i.e., inherits as Residuary. 9. Full Sister: The share of one full sister is 1/2, if number of sister is more than one, share is 2/3 to be divided equally among them. If full sister is together with full brother, she becomes an agnatic heir and inherits as Residuary. A full sister is excluded from inheritance in the presence of (a) child, or (b) child of son h.l.s or (c) father, or (d) father‟s father. 10. Consanguine-Sister: The share of one consanguine sister is 1/2, if number of consanguine sister is more than one, share is 2/3 to be divided equally among them. With one full-sister, the share of consanguine sister is 1/6 whether single or more. A consanguine sister is excluded from inheritance in the presence of (a) child, or (b) child of son h.l.s or (c) father, or (d) father‟s father, or (e) two full sisters, or (f) one full brother With consanguine brother, the consanguine sister becomes agnatic heir and inherits as Residuary. 11. Uterine Brother: The share of one uterine brother is 1/6, if there are two or more uterine brothers, their share is 1/3 to be equally divided among them. Uterine brother is excluded from inheritance in the presence of (a) child, or (b) child of son h.l.s or (c) father, or (d) father‟s father. 12. Uterine Sister: The share of one uterine sister is 1/6, if there are two or more uterine sisters, their share is 1/3 to be equally divided among them. Uterine sister is excluded from inheritance in the presence of (a) child, or (b) child of son h.l.s or (c) father, or (d) father‟s father. 14 From the above it is clear that Quran mentions 12 heirs, who are to inherit the deceased. In Arabic „Jadda‟ (which means paternal or maternal grandmother, that would mean True and False grandmothers) includes maternal and paternal grandmother and if both are taken as heirs then the number would be 13 and not 12. Prophet had said that after giving to Quranic heir whatever is left, give them to residuaries. Out of these 12 heirs, eight are females and only four of the heirs are males, reason being that the bigger chunk of property is kept intact for the second class of heirs who are males. Son is a residuaries and comes under Class II of heirs. The shares of Class I heirs are pre-determined and specific. Fractional shares have been allotted by Quran to this class of heirs. These fractions are six in number, viz. 1/2, 1/4, 1/8, 2/3, 1/3 and 1/6. These fractions are obligatory and compulsory for obedience and custom does not govern it. Distribution of Assets among the Sharers and Residuaries :- After the payment of the funeral expenses, debts and legacies (in case the deceased had left a will), the next step Is to distribute the estate of the deceased among the heirs. Among the heirs the sharers are to be given their shares first, then the residue is to be distributed among the residuaries. In the absence of the sharers, the reslduaries take the entire estate. In the absence of both the sharers and the residuaries, the estate devolves on the distant kindreds. In their absence, the estate goes to the State. The peculiarity of the Muslim law of inheritance is that although the sharers are Class I heirs and the residuarles are Class II heirs, they together share the property. The sharers are Class I heirs in the sense that they have the right to be allotted their shares at the first instance. After the prescribed shares have been allotted to them, the remaining property goes to the residuarles. Thus, If a Muslim dies leaving behind a mother, M, a son, S, and a daughter‟s son, DS, then mother as sharer will take 1/6, and S will take the remainIng 5/6 as residuary. DS will be totally excluded from the inheritance, since he is a distant kindred. There• is only one case when a distant kindred Inherits along with a sharer, viz., when the sharer is a husband or wife and there is neither any other sharer nor a residuary, then the distant kindred inherits alongwlth the husband or the wife. Thus, If a Muslim dies leaving behind a widow, W, and full sister‟s son FSS (who Is a distant kindred), then W will take 1/4 as sharer, and the residue of the estate, namely, the 3/4 will go to‟ FSS. The general‟ rule of preference is that a nearer heir excludes a remoter one. Thus, if a Muslim dies leaving a son and a grandson (son‟s son or a son from a predeceased son), then son alone will inherit, and the grandson will be excluded, though both are residuarles. Similarly, If a Muslim dies leaving behind a father and a true grandfather, then the father alone will inherit and the true grandfather will be excluded, even though both are sharers. Among the residuaries, the, descendants are preferred over ascendants and collaterals, and ascendants are preferred over collaterals. Among the collaterals, the descendants of a nearer ancestor are preferred over the descendants of a remoter ancestor. When all the heirs claiming property are equally near, they share equally, with this rider that a male heir (generally) takes double the portion of a female, heir. Another general rule is that when one Is related to the deceased through another, one does not inherit so long as that another Is alive. Thus, father excludes both a brother and a sister. However, brothers and sisters are not excluded by the mother. The reason Is that when the mother is alive, she cannot claim to Inherit the entire estate. When there is no other 15 heir, she takes part of the estate as a sharer, and the rest by return (see below, under the head „Doctrine of Return”). In the Hanafi scheme of inheritance, the following five heirs are always entitled to a share In the estate, namely, husband, wife, child, father and mother. These heirs are called primary heirs. Next to them are “substitutes”. They are the substitutes of the last three primary heirs.‟ These are children of a son how low soever, true grandfather, and true grandmother. Husband and Wife :- If a Muslim male dies leaving behind a widow and children, then the widow takes 1/8, and the residue (i.e., 7/8) goes to children. If he dies leaving behind a widow and no child then the widow takes 1/4. If he dies leaving behind more than one widow, then 1/8 (when there are children), or 1/4 (when there are no children) is distributed among them equally. If a Muslim female dies leaving behind her husband and children, then the husband takes 3/4 as a sharer and the residue of 3/4 goes to the children. If she dies leaving behind no child, then the husband takes as a sharer. Father and True Grandfather :- The father is always an heir. Under no circumstances can he be excluded from inheritance. The true grandfather, being a substitute, is always excluded by the father. A nearer grandfather always excludes a remoter grandfather. The position of father as an heir may be discussed under the following circumstances : (a) Whether the deceased had left children, the father takes 5/6 share. Thus, when P dIes leaving behind his father and a son, the father will take 1/6 and the son will take 5/6. (b) Where there are no children (or child) or agnatic descendants,. the father and, in his default, the grandfather, takes as a residuary. (c) Where a Muslim dies leaving behind a mother and a father, the mother takes 1/3 as sharer, and the father takes 2/3 as residuary. (d) In certain circumstances the father may take in dual capacity, as a sharer and as a residuary. Thus, where a Muslim dies leaving behind his father and a daughter, then the daughter takes as a sharer, the father takes 1/6 as sharer and the residue of estate, i.e., 1/3, the father takes as a residuary. Thus, the father will take 1/6 + 1/3 = 1/2. In this situation the position of the grandfather (in the absence of the father) will be the same, since he is a substitute for the father. Mother and True Grandfather :- Mother is never excluded from Inheritance. She takes 1/3 where there are no children, and she takes 1/6 where there are children. The true grandmother lnhevits in certain circumstances. (a) The maternal grandmother Is excluded „by mother or nearer true grandmother, paternal or maternal. (b) The paternal true grandmother is excluded by the father, the mother and by a nearer true grandmother, paternal or maternal, as well as by a nearer true grandfather. Mother‟s position may be illustrated thus P, a Muslim, dies leaving behind his mother, M, two sons, S and S 1, and a daughter, D. M will take 1/6 as sharer, and the rest will go to D, S and S‟ as residuaries : D taking 1/6. S taking 2/6 and S 1 taking 2/6. 16 (c) The mother takes one-sixth share if a Muslim dies leaving behind two sisters, or one brother and a sister (full, consanguine or uterine). In the presence of the father, sisters do not inherit. It is a curious aspect of Muslim law that an heir may be totally or partially excluded from Inheritance by another, yet his presence may exclude another heir partially or totally. Daughter and Son‟s Daughter how low soever :- The daughter takes as sharer in the estate of the deceased parent, when there is no son. When single she takes , if two or more, all of them together take 2/3. With sons she takes a residuary. The son‟s daughter takes when one, 2/3 when two or more, in the absence of son, daughter, higher son‟s son‟s son, higher son‟s daughter or equal son‟s son. With equal son‟s son‟s son, she takes a residuary. The son‟s daughter takes per capita and not er‟stirpes. This means that the share of daughters Is divided into as many parts as are son‟s daughters, irrespective of the number of sons. Under the Hanafi law, the son‟s daughter inherits in her own right, and not as a representative of the son. The son‟s daughter is not excluded when there is only one daughter, but takes 1/6 as a sharer. This principle applies to lower son‟s daughters also (such as son‟s daughter how low soever). P dies leaving behind his father F, mother, M, daughter D, and four daughters of a predeceased son, SD, SD1,SD2 and SD3. In this case, F will take 1/6 as sharer. M will take 1/6 as sharer will take as sharer, and SD, SD1, SD2 and SD3, together will take 1/6 each taking 1/24. Sister :- The sister is a sharer. One sister takes share; two or more take 2/3. (a) But she is not a primary heir. She takes only in the absence of a son, son‟s how low soever, father and true grandather. (b) With full brother (and in certain cases with daughter) she becomes a residuary. (c) If there are more than one full sister, consanguine sister is excluded. But where there is only one full sister, then consanguine sister takes 1/6. P dies leaving behind a full sister,FD, three consanguine sisters, CS‟, CS2 and CS3, one uterine brother, UB, one uterine sister, US. FD will take * : CS1, CS2, and CS3 together will take 1/6, each taking 1/18. UB and US together will take 1/3, each taking 1/6. Uterine Brother and Uterine Sister :-The uterine brother and the uterine sister are not primary heirs. They inherit only in certain circumstances : (a) The uterine brother and uterine sister are excluded by a child, son of a child how low soever, father, true grandfather. (b) A full brother or a full sister does not exclude a uterine brother or a uterine sister. (c) Whenever the uterine brother and sister inherit, they take equal share; the rule of male taking double portion does not, apply to them. (d) A uterine brother or a uterine sister takes 1/6 share. Where there are more than one uterine brother or uterine sister or more than one uterine brother and uterine sister, they together take 1/3. and between them share It equally. P dies leaving behind two full sisters and two uterine sisters. The full sisters together will take 2/3, each taking 1/3 and uterine sisters together will take 1/3, each taking 1/6. 17 There is one interesting case, the Himaryya, where a Muslim female died leaving behind her husband, H, mother, M, two uterine brothers, UB and UB‟, and one full brother, FS. H took, „1, M took 1/6, and UB and UB‟ took 1/3. In this manner we find that the entire estate was exhausted, and nothing was left for FS, the full brother. In this case, full brother would have taken as a residuary, had some residue been left. (The case was decided by Caliph Omar). CLASS II: HEIRS ENTITLED TO INHERIT AS RESIDUARIES OR ASABAT Asabat would nearly mean „those who go to battle together and have common blood feud (male agnates), literal meaning being-when a thing encompasses other things from all around. As such they are called „Agnatic heirs‟ in preference to the misleading term „residuaries‟. The residue and the residuary gives an impression that what is left of the property after the share of Class I heirs are satisfied according to their specifications, but it is not true because the bulk of the property remains as „residue‟. This important class belong to son, father, brother, paternal uncle etc., who are important male relations and expected to get more. The Residuaries constitute Class II of the heirs of a Sunni propositus. Where a prospositus has no Sharers at all, the whole property is inherited by the Residuaries. Secondly, if there are Sharers but after giving the property to them, there remains a residue and among heirs there are also the residuaries. For example, if a Muslim dies leaving behind a Mother, and a son then mother as a sharer will get 1/6 and Son will get the remaining 5/6 as residuary. Such residuaries may include males and females, descendants, ascendants and collaterals of the deceased. A list of Residuaries and rules regarding to their inheritance is given below: (i) Son: When there is no daughter, the son takes the entire residue, but if the daughter present, the son gets double the share of the daughter. (ii) Sons‟s Son h.1.s: In such cases, nearer son‟s son excludes the remoter, Two or more sons‟s sons inherit equally and Son‟s daughter together with son‟s son becomes Residuary but the son‟s son gets double the share of Son‟s daughter. (iii) Daughter: She becomes a residuary when there co-exists a son of the : deceased, (iv) Son‟s daughter h.1.s.: She becomes a residuary when there co-exists son‟s son h.l.s, or in other words an equal son‟s son or a lower son‟s son provided that she does not inherit as a Sharer. (v) Father: As a Residuary, the father gets the entire residue. (vi) True Grand-father: A true grand-father also takes the entire residue but a nearer true grand-father excludes the remoter. (vii) Full Brother: If there is no full sister, the full brother inherits the entire residue, but if there is full sister, the full brother inherits with her but his share is double the share of a sister. (viii) Full Sister: In the absence of full brother and other Residuaries enumerated in the preceding line, the full sister is treated as Residuary provided there is daughter, or son‟s daughter h.l.s or one daughter and a son‟s daughter h.l.s. 18 (ix) Consanguine Brother: A consanguine brother inherits together with consanguine sister but the share of consanguine brother is double the share of consanguine sister. (x) Consanguine Sister. In the absence of consanguine brother and any of the Residuaries given above, the consanguine sister is treated as Residuary and takes the residue provided there is daughter, or son‟s daughter h.l.s or one daughter and a son‟s daughter h.l.s, (xi) Full Brother‟s sons (xii) Consanguine Brother‟s son (xiii) Full Brother‟s Son‟s son (xiv) Consanguine Brother‟s son‟s son (xv) Full paternal uncle (xvi) Consanguine paternal uncle (xvii) Full paternal uncle‟s son (xviii) Consanguine paternal uncle‟s son (xix) Full paternal uncle‟s sdn‟s son (xx) Consanguine paternal uncle‟s son‟s son Shifting of status of heirs as residuaries :- Four females and two males, who are otherwise primary Quranic heirs or sharers are shifted to Class II (residuary) in certain circumstances. These six are (1) Daughter, (2) Son‟s daughter h.l.s, (3) Full sister, (4) Consanguine Sister, (5) Father and (6) True grand-father h.h.s. All of them are Quranic heirs but certain circumstances force them to inherit as residuaries. Rules have been so framed that males who are in the category of residuary (as son), could inherit in the residue. In the other case if these females are allowed to inherit in their normal share (as mentioned in the above), there will be little or nothing left as a residue to be given to males. The daughter inherits as a Quranic heir when there is no son, but where there is son, she inherit as a residuary. This is a marked change. But the father and true grandfather succeed in certain circumstances both as Quranic heir and a residuary. Both of them are the only relation, who could inherit both as a „Sharer‟and a residuary‟. All the other four females, above mentioned would either inherit as a Quranic heir or as a residuary. 19 Distribution of the Estate of a deceased among the Sharers and the Residuaries:- After paying the funeral expenses ,debts and legacies if any , the rest of the estate of a deceased muslim divided among the heirs . Among the heirs ,the Sharers are given their specific shares and after allotting the shares of the Sharers, if there is any residue, it is divided among the residuaries. If there is no Sharers, then the residuaries take the entire estate. In the absence of both Sharers and Residuaries, the estate goes to the distant kindard. Where Residuaries are the only legal heirs of a propositus the whole properly circumstances the specific shares of the Sharers are allotted first and remaining property is distributed among the Residuaries. The distribution of property among Residuaries may be understood with the help of following illustrations: A Sunni Muslim dies leaving behind her husband, mother, son and daughter. In this case, heirs of the deceased include Sharers as well as Residuaries. The snares are: Husband-1/4 (as Sharer), Mother 1/6 (as Sharer), Son and daughter: Residuaries. After giving the property to husband and mother, there remains some residue which is 1- (1/4 + 1/ 6) = 7/12. This 7/12 residue is to be distributed between son and daughter in the ratio of 2: 1. It means the son and daughter would get 2/3 and 1/3 . ___________________ 36/36 Doctrines of Aid (increase) and Radd (return) :- In a system of law which assigns fixed shares to heirs, two anomalous situations are likely to arise : The sum of shares allotted to various heirs according to their entitlement: (I) may be in excess of the unity, or (ii) may be less than the unity. The former situation is solved by the application of the doctrine of aul or increase, and the latter by the application of the doctrine of radd or return. Doctrine of aid or lncrease.—When the sum total of the shares allotted to various heirs in accordance with their entitlement exceeds the unity, then the doctrine of aul lays down that the share of each heir should be proportionately reduced. This Is done by reducing the fractional shares to be common denominator. Since this is done by increasing the denominator, the doctrine has been given the name of increase (au, though in fact, the shares are proportionately reduced. 20 P dies leaving behind her husband,H, two full sisters, FD and FD‟, and mother, M. They will be allotted the shares as under: H 1 /2 or 3/6 FD & FD‟ .... 2/3 or 4/6 M 1/6 or 4/6 _____________________ 6/8 The proportionate reduction of shares is achieved by increasing the denominator from 6 to 8. Thus, the shares of the respective sharers will be: H 3/8 FD&FD 1 4/8 M 1/8 __________________________ 8/8 = 1 P dies leaving behind a husband, H, full sister, FD, two uterine sisters, MD and MD‟, two uterine brothers, MS and MS‟. and mother, M. All these heirs are sharers. In accordance with their entitlement their shares will come to 1/6 reduced to 1/9 1/2 reduced to 3/9 1/9 reduced to 3/9 1/3 reduced to 219 Total 9/9 = 1 P dies leaving behind his mother M, father, F, widow, W, and three daughters. In accordance with their entitlement, their shares will be, as shown in the table. These will be proportionately reduced as shown in the table. F... . 1/6 = 2/24 reduced to 4/24 M 1/6 = 41/24 reduced to 4/24 W 1/8 = 16/24 reduced to 3124 D, D1 and D2 together 2/3 = 16/24 reduced to 16/27 Doctrine of radd or return.—When there Is surplus left after allotting the shares in accordance wlh their entitlement, and there are no residuarles to take the surplus, then the doctrine of return lays down that the surplus is to be distributed among the sharers in proportion to their respective shares. To this doctrine one exception is recognized, viz., neither the husband nor the wife is entitled to the return so long as there is alive another sharer or a distant kindred. The reason for his exception appears to be the hang-over of a pre-Islamic notion under which neither the husband nor the wife was entitled to Inheritance. The husband and wife were made the heirs by the Koran, and their shares were unalterably fixed and thus they were considered not to be entitled to the return. According to the strict Islamic law, in the absence of another sharer or a distant kindred, the surplus would go to the State by escheat. But In India this is not the law. In the absence of a sharer or a distant kindred, the surplus returns to the husband or the wife, as the case may be.‟ Thus, under Muslim law of modern India, the doctrine of return lays down: (1) the M. H FD MD, MD1, MS, MS1 together 21 surplus is distributed among the sharers in proportion to their shares. (II) But the husband or the wife is not entitled to return, so long as there is a sharer or a distant kindred alive. (lii) If there is no sharer or a distant. kindred then the surplus returns to the wife or husband. We may explain the doctrine with some examples. P dies leaving behind his mother M, and his daughter 0. M takes 1/6 and D takes 1/2. There remains a surplus of 1/3. Since there is no residuary, 1/3 will return to D and M. M‟s share will be increased to 1/4 and D‟s share to 3/4. M 1/6 = 1/6 increased to‟ D 1/2 = 1/6 increased to 3/4 Total : 4/4 = 1 The formula in the case of return is to reduce the common denominator. Distinction between “Increase” and “Return”.—The following are the points of distinction between the Doctrine of Increase and Doctrine of Return: 1. Doctrine of Increase applies in cases where the total shares of the sharers is more than unity; whereas in “Return” the total falls short of unity. 2. In “Increase” the sharer undergo a rateable reduction. In “Return” the shares undergo a rateable increase. 3. Husband and wife are no exception to the Doctrine of Increase, whereas in the Doctrine of Return the husband or wife is not entitled to the “Return” so long as there is any heir whether sharer, residuary or kindred. Distant Kindred—Definition.—No precise definition of distant kindred is available. The definition that is generally given is that distant kindreds are those relations by blood who are neither sharers nor residuaries.6 Broadly speaking these are two kinds of distant kindred to whom property devolves. The first kind of dtant kiridreds are divided into the following four classes. (i) Descendants of the deceased : 1. Daughter‟s children and their descendants. 2. Children of son‟s daughters, how lowsoever and their descendants. (ii) Ascendants of the deceased 1. False grandfathers, how highs oever. 2. False grandmothers how highsoever. (iii) Descendants of parents 1. Full brother‟s daughters and their descendants. 2. Consanguine brother‟s daughters and their descendants. 3. Uterine brother children and their descendants. 4. Daughters of full brother‟s sons, how lowsoever and their descendants. 5. Daughters of consanguine brother‟s sons how lowsoever and their descendants. 6. Sister‟s (full, consanguine or uterine) children and their descendants. (iv) Descendants of immediate grand-parents, true or false 1. Full paternal, uncle‟s daughters and their descendants. 2. Consanguine paternal uncle‟s daughters and their descendants. 3. Uterine Paternal uncles and their children and their descendants. 4. Daughters of full paternal uncle‟s sons how lowsoever and their descendants. 5. Daughters of consanguine maternal uncle‟s sons how lowsoever and their descendants. 22 6. Paternal aunts (full, consanguine or uterine) and their children and their descendants. 7. Maternal uncles and aunts and their children and their descendants; and, descendants of remoter ancestors how highsoever (true or false). Second kind of distant kindred.—Persons who are unrelated to the deceased by blood, and who still get the inheritance on the failure of blood relations, have been divided into the following four classes: 1. Successors by contract. 2. Acknowledged kinsmen. 3. Universal legatees. 4. The Government. 1. A “Successor by contract” is a person who derives his right of succession under a special kind of contract with the deceased. 2. An “acknowledged kinsman” is a person of unknown descent in whose favour the deceased has made an acknowledgment of kinship or relationship not through himself, but through another e.g., if he acknowledges, a person as his uncle, that is the brother of his father, the acknowledgment will be through father and hence will be valid. But supposing he acknowledges person as his own son, such person will not be an acknowledged kinsman because the kinship is direct and not through another. 3. A “universal legatee” is a person, to whom the deceased has left the whole of his property by will, which can be made only when there are neither any heir of the first kind nor the abovementioned two heirs of the second kind, i.e., successors by contract and acknowledged kinsmen. 4. The Government.—In India in the absence of all heirs, the property goes to the Government, by the operation of law. This law is known as the Law of Escheat. However, under Islamic system, the property will not devolve upon Government by way of inheritance as ultimus heirs, but falls into the bait-uimal (public treasury) for the benefit of Mussalmans. Distant kindred in the Order of Succession Descendants 1. Daughter‟s children. 2. Son‟s daughter‟s children. 3. Daughter‟s grandchildren. 4. Son‟s son‟s daughter‟s children. 5. Daughter‟s great-grandchildren, so on and so forth. Of the above groups each in turn must be exhausted before any member of the next group can succeed. Illustrations (a) Daughter‟s son 2/3 Daughter‟s daughter 1/3 (b) Daughter‟s son‟s son 2/3 Daughter‟s son‟s daughter 1/3 (c) 2 sons of daughter A 4/5 (each taking 2/5) daughter of daughter B 1/5. The rule is when the intermediate ancestors do not differ in their sexes, the property is to be divided among the claimants, per capita according to the rule of double share to the male. (d) Daughter‟s son‟s daughter 2/3 Daughter‟s daughter‟s son 1/3 23 The rule is when the intermediate ancestors differ in their sexes, the property is to be distributed to the male ancestor a portion, double that of the female ancestor. The share of a male ancestor will go to the claimant (here daughter) who claims through him (here is daughter‟s son) and the share of the female ancestor will go to the claimant (here is son), who claims through her (here is daughter‟s daughter). Ascendants 1. Falling distant kindred of the first class mother‟s father, being the nearerst relation gets the whole estate. 2. Failing the mother‟s father the estate will devolve upon such of false ancestor in the third degree as are related to the deceased through sharers, i.e., the father‟s mother‟s father (f. m. f.) and mother‟s mother‟s father (m.m.f) and, of these two, the father‟s mother‟s father, as belonging to the paternal side, will take 2/3 and the mother‟s mother‟s father, as belonging to the maternal side, will get 1/3. 3. When there are none of these, the property goes to the repamaining-false ancestors in the third degree such as mother‟s father‟s father and the mother‟s father‟s mother. Since both of them belong to the same (maternal) line, and since the sexes also of the intermediate ancestors do not differ, the mother‟s father‟s father being a male will get 2/3 and the mother‟s father‟s mother will get 1/3. 4. Lastly the remoter false grand-parents succeed subject to the rule of double share of the paternal side. Descendants of parents. 1. Full brother‟s daughter‟s, full sister‟s children and children of uterine brothers and sisters. 2. Full sister‟s children, children of uterine brothers and sister‟s consanguine brcther‟s daughter‟s and consanguine sister‟s children, the consanguine group taking the residue, if any. 3. Consanguine brother‟s daughters, consanguine sister‟s children and children of uterine brothers and sisters. 4. Full brother‟s son‟s daughter (children of residuaries). 5. Consanguine brother‟s son‟s daughters (children of residuaries). 6. Full brother‟s daughter‟s children, full sister‟s grandchildren and grandchildren of uterine brothers and sisters. 7. Full sister‟s grandchildren, grandchildren of uterine brothers and sister, etc. 8. Consanguine brother‟s daughter‟s children, etc. 9. Remoter descendants of brothers and sisters in like order. Of the above groups each in turn must be exhausted before any member of the next group can succeed. Descendants of immediate grandparents (true or false) (i) Paternal and maternal uncles and aunts of the deceased, other than his full and consanguine paternal uncles who are residuaries. (ii) The descendants how lowsoever of all the paternal and maternal uncles and aunts of the deceased, other than sons how lowsoever of his full and consanguine paternal uncles, the nearer excluding the more remote. (iii) Paternal and maternal uncles and aunts of the parents, other than the full and consanguine paternal uncles of the father who are residuaries. (iv) Descendants how lowsoever of the paternal and maternal uncles and aunts of the parents, other than the sons how lowsoever of full and consanguine paternal uncles of the father, the nearer excluding the more remote. 24 (v) Paternal and paternal uncles and aunts of the grand-parents, other than full and consanguine paternal uncles of the father‟s father who are residuaries. (vi) Descendants how lowsoever of the paternal and maternal uncles and aunts of grand-parents, other than sons how lowsoever of full and consanguine paternal uncles of the father‟s father, the nearer excluding the more remote. (vii) Remoter uncles and aunts and their descendants in the like manner. Of the above group each in turn must be exhausted before any member of the next group can succeed. Order of Succession 1. If only one class of heirs.—lf a person dies leaving only one class of heirs which does not happen generally, the rules are very simple. In such cases the heirs of that very class take the whole of heritable property. Thus if the deceased leaves only one of the following class of heirs the whole heritable property will be distributed among them. 1. Only sharers, 2. Only residuaries, 3. Only distant kindred, 4. Only successor by contract, 5. Only acknowledged kinsman. 6. Only universal legatee, 7. Only Government. 2. If more than one class of heirs.—It is, when a man dies leaving heirs belonging to more than one class, that the necessity of looking into the rule regarding the order of sucession arises. These rules are given below: (1) Between sharers and residuaries.—Between these two classes, the claim of sharers is satisfied first and if after them, there remains anything it is distributed among the residuaries. (ii) Between sharers and distant kindred—In the presence of a sharer, nothing goes to the distant kindred. It is only when there are neither any sharer nor any residuary that the distant kindred are entitled to inherit. However, when a Sunni Muslim dies leaving a husband or wife and there are no residuaries, the husband or the wife, as the case may be take their full share and the residue is divided among distant kindred. (iii) Between residuaries and distant kindreds.—The above mentioned rule applies, i.e., the distant kindred gets nothing. Principles of succession among sharers and residuaries.—lt is clear from the Tables of Sharers and Residuaries that certain relations entirely exclude other relations from inheritance. This proceeds upon the following principles: (1) whoever is related to the deceased through any person shall not inherit while that person is living. (2) Rule of propinquity, which means that the nearer in degree excludes the more remote. (3) A person excluded may exclude others. 1. “Whoever is related to the deceased through any person, shall not inherit while that person is living”. Thus the father excludes brother and sister because the brother or sister is related to the deceased through father, i.e., without father they would not have existed. Exception.—But there is one exception to this, namely, the mother does not exclude the uterine brothers or sisters though they are related to the deceased through her. (Uterine brother or sister means brother or sister from the same mother, but different fathers). 25 2. The nearer in degree excludes the more remote.— The person who is nearer in blood to the deceased excludes the more remote Examples : (i) . Father excludes grandfather. (ii) Mother excludes grandmother. (iii) Son excludes son‟s son. It should be noted that the Rule of Propinquity applies only when the heirs belong to the same class. If they belong to different classes, this rule will not apply. 3. A person excluded may exclude others.—After stating the two principles mentioned above, the Sirajiyyah goes on to say that “a person excluded may, as all the learned agree, exclude others as, if, there be two brothers or sisters or more, on whichever side they are, they do not inherit with the father of the deceased, yet they drive the mother from a third to a sixth.” Thus, if the deceased leaves (i) mother, father and brother or sister or both, the brother and sister, though sister and brother are themselves excluded by father reduce the mother‟s share to 1/6, (ii) father‟s mother and mother‟s mother‟s mother, the father‟s mother though herself excluded by father exclude the mother‟s mother‟s mother. There are five heirs that are always entitled to some shares of the inheritance, and they are in no case liable to exclusion. These are— 1. The child (son or daughter); 2. Father; 3. Mother; 4. Husband; and 5. Wife. Allotment of Shares. (1) Introduction.—After ascertaining which of the heirs of the deceased belong to the class of sharers, residuaries and distant kindred, the question comes of their respective shares. (2) Respective shares of sharers.— 1. First Step.—The first step in making allotment of shares to the sharers to give them their shares as laid down in the table of sharers. 2. Second Step.— The second step in making the allotment of shares is to find out whether the total share of all sharers comes to: 1. more than the heritable property, or 2. less than the heritable property, or 3. equal to the heritable property, or Suppose that the property is Rs. I and there are four sharers each of whom is entitled to 1/2 of the Property, the total of share will come out to be Rs. 2 which is more than the heritable property (Rs. 1). Similarly, the total of shares may be less than or equal to the heritable property. 3. Third Step—If the total share of the sharers is equal to the heritable property the whole property is divided among the sharers and no difficulty arises. But in case where the total shares exceed the property or fall short of it, the necessity for application of certain special rules present itself. These rules are known as the „Doctrine of Return and Increase‟. These are nothing but 26 contain rules to increase or decrease, the shares according to the requirements of the case. These have been dealt with under independent Head Nos. 5 and 6. (3) Shares of residuaries.—The residuaries do not get any fixed shares. The residue, if any, is divided equally among them in accordance with their preferential claims which is given in the Table under Head No. 2. In this table we divide the residuaries into four groups, namely, (i) Ascendants, (ii) Descendants, (iii) Descendants of father, and (iv) Descendants of father‟s father how highsoever. Under each group-head we mentioned several heirs keeping this in our mind if we study the following rules, regarding the making of allotment of shares to the residuaries, the points will become clear. The rules are the following: Rule No. 1.—Each preceding residuary excludes all the succeeding residuaries, e.g., an ascendant excludes a descendant in the table, hence in the presence of ascendant, the descendant will not get a share. Similarly, in the case of a full brother and a consanguine sister, the former proceeds the latter in the given table, and the consanguine sister will not get anything in the presence of the full brother. Rule No. 11.—When there is a female residuary taking with the male, the male takes a double of a female‟s share, e.g., a son and a daughter, will take 2/3 and 1/3. Rule No. III.—The only female residuaries are (i) daughter, (ii) son‟s daughter how lowsoever, (iii) full sister, and (iv) consanguine sister. 4 Sharers of distant kindreds—General Rules.—The rules regarding the share of distant kindreds are as follows [See also Head No. 3 under which is given the list of distant kindreds. Rule I.—The first class or distant kindred excludes the second class. Refer Head No. 3. Rule 11.—The nearer in degree excludes the more remote e.g., daughter‟s children exclude son‟s daughter‟s children. Rule 111.—As amongst the member of the same class and of the same degree the children of sharers and residuaries are preferred to those of distant kindreds, e.g., son‟s daughter‟s children are preferred to daughter‟s childrcn. Rule IV.—Subject to above rules, a male, takes a double of a female. SHIA LAW OF INHERITANCE General principles of inheritance of Shias:- Shia law of inheritance is based on shuffling of heirs who is again based on certain causes for the classification of inheriting heirs. The Sunni system kept intact the pre-Islamic rules of succession, though with some modifications, as adding few heirs, who were commanded by Quran, before and after pre-lslamic heirs. Shia law puts agnates and cognates, i.e., those related through males, on equal footing with those related through women. Against that residuary remained in Hanafi law most important heirs. Thus, Shin law is very different from Sunni law. In other words, like the Hanafis, the Shin does not recognise the 27 prior rights of agnates over cognates or of males over females. They considered the Quranic principles of inheritance as a new scheme and in supersession of the pre-Islamic customary principles of inheritance. So, they totally discarded the pre-Islamic system for determining the order of succession. They shuffled all the heirs agnates and cognates, males and females and then classified them for order of succession. General Principles of Inheritance under Shias law (i) According to the Shin law ascendants, descendants and collaterals may be Sharers or Residuaries. The estate of a deceased Muslim devolves on blood relations equally, though among themselves they take per stripes, the females are allotted half the share allotted to the males in each class. There is only one exception to this rule i.e., the rights of husband and wife. (ii) All the descendants were given the first position and among the ascendants only the nearest, i.e., the parents were allowed to inherit with them. The higher ascendants were given the second position and were permitted to inherit with the nearest collaterals, i.e., the brothers and sisters. The remaining collaterals were given the third position. So, three classes of heirs in order of preference were found, (iii) The rule of proximity was observed. Accordingly, the nearest relations were preferred to the remoter within each of the three classes. Who are heirs The heirs of a deceased Muslim include spouse, as ascendants, descendants and collaterals. They fall under the following three categories: (i) Heirs affiliated by marriage or affinity (Zowjeeat) (ii) Heirs affiliated by blood or consanguinity (Nasab) (iii) State by escheat as a successor So, under the Shias law of inheritance, a person entitled to succession on the basis of consanguinity (Nasab) or on the basis of affinity Heir by Consanguinity :- There are three classes of consanguineous heirs: A. The first class consists of: (i) Father and mother (ii) Son and daughter and in their absence their descendants how low soever. B. The second class consists of: (i) Grand-father and grand-mother howsoever in the decree of ancestry (ii) Brother and sister and in their absence their children howsoever low C. The third class consists of (i) Paternal uncles and aunts (ii) Maternal uncles and aunts Heir by Affinity :- In this category, there are two heirs, who are related to each other thorugh marriage, but only one, either the husband or the wife inherits to the other, these heirs are: (i) Husband (ii) Wife. Division of Heirs for distribution of estate :- For the purpose of distribution of estate among the heirs of the deceased, affiliated by marriage or affinity and blood or consanguinity, the Shia law divides them into two categories: 28 I. Sharers and their descendants, h.l.s 11. Residuaries and their descendants h.l.s. Shares of Sharers Under Shia Law Sharers are those heirs who are affiliated by blood or marriage. They include Class I and Class II and not Class III heirs. They includes males, females, spouse descendants, descendants and collaterals. The following heirs are Sharers and their shares are of the following: 1. Husband: Without children or lineal descendants, the husband share is 1/2 whereas with children or lineal descendants, the husband share is 1/4. 2. Wife: Without children or lineal descendants, the widow‟s share is 1/4 whereas with children or lineal descendants, the widow‟s share is 1/8. A childless widow gets her 1/4 share only out of the movable properties of the deceased husband. 3. Father: Without children or lineal descendants, the father inherits as Residuary whereas with children, the father‟s share is 1/6. 4. Mother: Without children or lineal descendants or two or more full brother or one such brother and two such sisters or four such sisters with the father, the share of mother is 1/3 whereas with children or lineal descendants or two or more full brother or one such brother and two such sisters or four such sisters with the father, the share of mother is 1/6 5. Daughter: The share of single daughter is ½ whereas share of two or more daughters is 2/3 to be inherited collectively. However, in the presence of son, the daughter becomes Residuary. 6. Full Sister: The share of single full sister is ½ whereas share of two or more sisters is 2/3 to be inherited collectively. But the full sister gets her share only in the absence of parents, lineal descendant, full brother and father‟s father. However, in the presence of full brother and father‟s father, the full sister inherits as a Residuary. 7. Consanguine Sister: The share of single consanguine sister is 1/2 whereas share of two or more consanguine sisters is 2/3 to be inherited collectively. But the full sister gets her share only in the absence of parents, lineal descendant, full brother, full sister, consanguine brother and father‟s father. However, in the presence of consanguine brother and father‟s father, the consanguine sister inherits as a Residuary. 8. Uterine Brother: The share of single uterine brother is 1/6 whereas share of two or more uterine brothers is 1/3 to be inherited collectively. But these shares are inherited by them only in absence of children or lineal descendants and parents. 9. Uterine Sister: The share of single uterine sister is 1/6 whereas share of two or more uterine sisters is 1/3 to be inherited collectively. But these shares are inherited only in absence of children or lineal descendants and parents. From the above discussions, the following facts are significant: (a) Out of the nine Sharers mentioned above, first two are heirs by marriage and the next three heirs, i.e., father, mother and daughter are heirs through consanguinity and belong to Class I. The remaining four heirs belong to Class II. And in Class III, there are no Sharers. 29 (b) The list of Sharers under Shin law is the same as that under Sunni law except that under the Shin law true grand-father, true grand-mother and son‟s daughter are not recognised as Sharers. According to Shin law these heirs are Residuaries. (c) According to Shia law the descendant‟s h.l.s of the Sharers are also regarded as Sharers. Thus, the descendants or daughter, full sister, consanguine sister, uterine brother and uterine sister are also Sharers. However, there is an exception to this rule. The descendants of husband, wife, father and mother are not regarded as Sharers. Exclusion Rules: The rules of exclusion of heirs or class would be followed in following manner: Rule (1): If heirs of Class-I are present (even a single person) they would exclude Class-II and III heirs. And as such Class II heirs would exclude Class III heirs. Rule (2): Surviving heirs from marriage would inherit simultaneously with any other heirs of any class. Rule (3): If heirs from Class-I and II are present, they would inherit together. Rule (4): The nearer in degree would exclude the remote among each of the three classes. Rule (5): The heirs of full blood would exclude half blood in Classes II and III.‟ To understand the difference between Hanafi and Shin rules of exclusion take the following examples: (i) Mother, daughter, brother are heirs: (ii) Full paternal uncle‟s son and mother‟s father DISTRIBUTION OF ESTATE AMONG HEIRS OF CLASS I :- Class I includes husband or wife and parents, children, grand-children and also the remoter lineal descendants of the propositus. When the inheritance opens, the heirs of this class are entitled to inherit first of all. For distribution of property among the heirs of this class, following procedure is adopted. First of all, the shares are allotted to the husband or wife). For example, A Shia Muslim dies leaving her husband, mother and father. The allotment of the shares among them are: As husband and mother are Sharers and Father is Residuary (because there are no children). So, the share of husband is 1/2. Mother without children share is 1/3 of the estate. Father without children is Residuary and gets the residue which remains after allotment of the shares of husband and mother. The residue is 1 — (1/2 t 1/3) = 1/6 which goes to father. Accordingly, the respective shares of each heirs is as under: Husband-1/2; Mother-1/3; Father-1/6 = 6/6 = 1 Principles of Representation and Stirpital: These principles are connected with the rules of distribution. 30 (i) Representation: The Muslim law does not recognize principle of Representation because the principle of survivorship is not known to Muslim law. The heirs inherit as tenants-incommon and not joint tenants.‟ The word „representation‟ is used in several meanings. One meaning of the word could signify representation of estate of the deceased. Under this meaning „personal representative‟ of the deceased would be recognised as execution and the administrators. The Indian Succession Act explains such type of representatives, which is not applicable here. The second meaning of the word „representation‟ would signify a process where a person would „represent‟ some other person, through whom he or she is claiming the share. Under Hindu law the process of succession is based on such representation. This second meaning would serve the purpose of discussion in relation to Muslim law. (ii) Stirpital Succession: This means a succession by stock, which is succession that in each of the three classes takes place as per stripes and not per cci pita. The question-what are the individual shares of heirs or the quantum of share, rules of Stirpital succession are applied. According to Ameer Au,1 „representation‟ as a term for explaining situations should not be used because the division of shares under Muslim law is not per capita but per stirpes. DISTRIBUTION OF ESTATE AMONG HEIRS OF CLASS II Classification of Class II heirs: In the absence of heirs belonging to Class I, Class II heirs are entitled to inherit in deceased‟s property, along with spouse, if present. The heirs of Class II are further divided in two sub-classes: (a) Paternal and maternal Grand-parents how high-soever, and; (b) Brothers, sisters and their descendants how low-soever. DISTRIBUTION OF ESTATE AMONG HEIRS OF CLASS III Priority of succession: In case here are no heirs belonging to Class I and II, the heirs (uncles and aunts) of this class would inherit the estate in following order: (i) Uncles and aunts of the deceased, whether paternal or maternal. (ii) The descendants (h.l.s) in absence of uncles and aunts, paternal or maternal. The nearer excluding remote. (iii) Uncles and aunts of parents, maternal and paternal. (iv) Descendants (h.l.s) of parents maternal and paternal uncles and aunts. (v) Uncles and aunts of grand-parents, maternal and paternal. (vi) The descendants of uncles and aunts of grand-parents (h.l.s), paternal and maternal. Nearer excluding remote. (vii) Uncles and aunts and their descendants of remoter degrees. Rules of distribution among Class III Rules 1: Paternal side takes 2/3 and maternal side 1/3, if both sides present. Rule 2: 2/3 share of paternal side uncles and aunts would be distributed among them as if they were brothers and sisters of the deceased. It would distribute in following manner: (a) If there is one uterine paternal uncle or aunt, he or she gets 1/6. 31 (b) If there are more than one paternal uterine uncles and aunts they get 1/3 which would be distributed equally among them irrespective of sex. Rule 3: The remaining estate would be divided among full paternal uncles and aunts on the basis of double to the males of female share. In absence of this group the remaining part would go to consanguine paternal uncles and aunts, the distribution taking place on same rules. Rule 4: The division among maternal uncles and aunts of 1/3 part would take place as: (a) If there is only one maternal uterine uncles and aunts, he or she gets 1/6. (1) If there are two or more, then they get 1/3 of 1/3. The division is equal in both cases, irrespective of sex. (c) The remaining 2/3 of 1/3 or 5/6, as the case may be, would be divided among full maternal uncles or aunts, in case of their absence the remaining share would go to consanguine uncles and aunts. Rule 5: Where either maternal or paternal side is absent, the other side gets the whole. The rule of distribution of estate among them can be understand through following illustrations: 1. A Shia Muslim dies leaving full paternal uncle and full paternal aunt. The respective sharers of these Residuaries are in the ratio of 2: 1, as if they were brothers and sisters. Accordingly, the respective shares are of the following: Full paternal uncle — 2/3; and full paternal aunt — 1/3. 2. A Shia Muslim dies leaving uterine maternal uncle and full maternal uncle. Here, the uterine maternal uncle would inherit as if he was uterine brother and therefore, his share is 1/6. The residue 5/6 goes to full maternal uncle. Accordingly, the respective shares are of the following: Uterine maternal uncle -1/6 and full maternal uncle — 5/6. Doctrine of Increase (Aul) :- According to Muslim law, the share of various sharers are fixed. Where there are several sharers co-existing, it sometimes happens that the total of their respective shares exceeds unity (one). Thus, suppose that the deceased leaves behind a husband and two full sisters. Ordinarily, the husband will take ½, as there is no child or child of a son how lowsoever, and the two sisters together will take 2/3, as there is no son. 1/2 + 2/3 = 7/6 which exceeds unity, and the property falls short in distribution. How then is the deceased‟s property to be divided? The difficulty is solved by increasing the common denominator to the sum of the numerators, and thus reducing the fractions without disturbing the proportion between them. Thus, in above illustration, on reducing the fractions to the common denominator one get 1/2 = 3/6 and 2/3 = 4/6. Thus, with the common denominator the shares are: husband-3/6 and two sisters = 4/6. The sum of the numerators is 7. Now, the common denominator is increased to the sum of the numerators (i.e., 7). On doing this, the shares would be as follows: husband: 3/7 and two sisters 4/7 (3/7 + 4/7 = 1). It may be noted that his doctrine is called „increase‟, not because the shares are increased, which is quite the opposite, the very object of the doctrine being the diminish the shares, but because the unity is reached by increasing the denominator of the fractional shares. In other words, if it is found, on assigning their respective shares to the sharers, that the sum total of the shares exceeds unity, the share of each sharer is proportionately diminished by reducing the fractional shares to a common denominator and increasing the denominator, so as to make it equal to the sum of the numerator. 32 Difference between Shia and Sunni law of „Increase‟ According to the Sunni law, the doctrine implies proportionate reduction of all the shares. According to the Shia law, on the other hand, it implies the reduction of the shares of the daughter or daughters, or full or consanguine sister or sisters alone. Other heirs do not suffer. Doctrine of Return (Radd) :- The doctrine of return will apply when there are no residuaries. According to this doctrine, when after distribution of estate among the Sharers, some residue is left and there are no residuaries to take it. Then the residue is distributed among the Sharers in proportion to their shares. Thus, suppose A dies leaving behind his mother and a son‟s daughter (both sharers) and no residuaries. Their share respectively are 1/6 and 1/2, this together makes 2/3 of A‟s property, leaving 1/3 of his property as surplus, with no residuary to take it. In such a case, the surplus reverts to the shares in proportion to their shares. This is done by reducing the fractional shares to a common denominator and by decreasing the denominator of those shares, so as to make it equal to the sum of the numerators. Thus, in this illustration, the shares of the mother and the son‟s daughter are 1/6 and 1/2 respectively. Reducing them to the common denominator, gives 1/6 and 3/6. The sum of the numerator is (1 + 3) 4. By decreasing the donominator of the shares to make it equal to the sum of the numerators, one arrives at 1/4 and 1/4. These will be the shares of the two sharers. Thus, the Return is the apportionment of surplus among the sharers when the shares do not exhaust the property and there are no residuaries. Exception of the Rule :- There is following exception to the right to reverter of the sharers. 1. Husband or Wife: First the husband or wife of the deceased is not entitled to share in the return, so long as there is any other heir. If there are any other sharers, they will share the return among themselves, without giving his or her share of the return to the husband or wife. Even when there is no other sharer, the residue will go to distant kindred, if any. It is only when there is no other heir belonging to any of the three classes of heirs, i.e., sharers, residuaries or distant kindred, and the husband or wife is the only heir, and then he or she will take the residue by return, i.e., the whole of the estate. 2. Mother: The exception of the rule is mother. The mother is excluded from return in the presence of following heirs: father, one daughter, two or more full or consanguine brothers or brother or one such brother and two such sisters or four sisters. 3. Uterine brothers and sisters: The uterine brothers and sisters are excluded from return in the presence of any full sister. They will not be excluded when there are consanguine brothers and sisters and in such a case all of them share proportionately to the return. A dies leaving being a uterine brother UB, a uterine sister US and a full sister FS then UB will get 1/6, US will take 1/6, FS will take 1/2. The sum total of their share is 1/6 + 1/6 + 1/2 = 5/6, so the surplus 1 — 5/6 is left which will go to FS to the exclusion of [TB and US, so FS share will be 1/2 + 1/6 = 2 /3. 4. All other heirs: When there is any heir entitled to inherit by double relationship, then all other heirs are excluded from return. DIFFERENCE BETWEEN SUNNI LAW AND SHIA LAW OF INHERITANCE The significant point of difference between the two system may be following: 33 1. Murderer: Under Sunni law, a person who causes the death of the propositus either intentionally, negligently or accidentally is excluded from inheritance whereas under Shia law, a person may not be excluded from inheritance if he has not caused death intentionally. 2. illegitimate Child: Under Sunni law, a illegitimate child is entitled to inherit the properties of the mother whereas under Shia law, illegitimate child is treated as mullivs filius and is not entitled to inherit any property either from father or from mother 3. Child in the womb: Under Sunni law, where the child in womb totally excludes other heirs, then the whole estate must be reserved and where the child in womb excludes only some heirs after paying the shares of those heirs which are not excluded rest must be reserved whereas under Shia law, the share of true sons must always be reserved. 4. Movable or immovable property: Under Sunni law, a childless widow inherit 1/4 out of movable as well as immovable property whereas under Shia law such widow inherits 1/4 only from the movable property. 5. Principle of Representation: Under Sunni law, principle of representation is not recognised. So, son of a predeceased son is excluded whereas under Shia law, this doctrine is recognised and the son of a predeceased son represents his father. 6. Preference of Agnates to cognates: Under Sunni law, agnatic heirs has been given preference over cognates heirs whereas under Shia law, the agnates and cognates have been placed on equal footing. 7. Classes of heirs: Under Sunni law, there are three classes of heirs, they are as (a) Sharers, (b) Residuaries and (c) Distant kindreds whereas under Shia law, the classification of heirs is only two, they are as (a) Sharers, and (b) Residuaries. 8. Sharers: Under Sunni law, there are twelve sharers whereas under the Shia law, number of Sharers are only nine. 9. Doctrine of Increase (Aul): Under the Sw‟zni law, doctrine of Increase, the excess share is deducted from the shares of all the heirs in proportion of their normal shares whereas under ShEa law, doctrine of Increase, the excess is deducted only from the shares of daughter or sister. 10. . Doctrine of Return: Under Sunni law, doctrine of Return, all the surviving heirs, except husband or widow, participate in return of the excess property whereas under Shia law, besides husband or widow, in certain cases the mother and uterine brother or uterine sister also do not participate in return. 11. Under Sunni law, succession among the heirs of one class but of different branches is per capita whereas under Shia law, succession among the heirs of a class but belonging to different branches is per strips. 12. . Under Sunni law, the rule that nearer excludes the remoter is applied only in respect of agnatic heirs whereas under Shia law, the rule of nearer excludes the remoter is applicable to all the classes of heirs. 13. Doctrine of Primogeniture: Under Sunni law, Doctrine of primogeniture is not recognised and an eldest son has no preferential right in respect of any property. 34
https://www.scribd.com/doc/126718340/SUCCESSION-and-Inheritence-of-Muslim-Law
CC-MAIN-2017-39
refinedweb
17,468
61.26
- WP REST API: Retrieving Data Tuesday, March 08, 2016 by martijn broeders In the previous parts of the series, we have been looking at what the WP REST API is and how it can help us build better applications using the WordPress back end. Then we looked at two ways to set up authentication on the server for generating authenticated requests. The first is the basic authentication method, which is useful in development environments and allows rapid prototyping as it doesn’t require much time to set up. The second method of authentication is OAuth 1.0a, which is recommended for production environments as it is much more secure than the basic authentication method. Now that we have learned how to set up authentication, we are ready to generate authenticated requests to unleash the full power of the WP REST API. We will be using basic authentication throughout this series due to its ease of use, but it’s recommended that you use OAuth 1.0a authentication, as provided by the OAuth 1.0a plugin, for your production servers. In the current part of the series, we will get our very first hands-on experience with the WP REST API plugin. We will: - analyze the structure of a GETrequest OPTIONSrequest self-documents the API - send requests to the server for data retrieval - analyze the server response that includes properties, schema, and links So let’s begin by analyzing the structure of a simple GETrequest. Anatomy of a GETRequest Before we delve into the details of retrieving any data with the WP REST API, we need to familiarize ourselves with the syntax of a request that is sent to the server. This will lay a solid foundation for our future interactions with the WP REST API. Consider the following request sent to the server: $ GET The type of request we are sending is GET—one of six HTTP verbs we looked at in the initial part of this series. A GETrequest is used to retrieve data from the server. Hence, when executed at the server, the above request retrieves a collection of all post objects in the form of JSON data. Considering the request URI, we can break it into the following parts:: The URL of my local development server. It could be any URL depending on where your WordPress installation is located. /wp-json: It is the endpoint prefix of the WP REST API. /wp: The namespace of the WP REST API plugin. /v2: It is the version of the WP REST API plugin. /posts: It is the resource that we want to retrieve from the server. The namespace prevents the overriding that might occur when running multiple plugins with each providing its own abstraction layer for the RESTful API. Hence, each abstraction works in its own boundary without affecting the methods and properties that belong to some other abstraction. The namespace and version were not present in the legacy version 1.2 of the plugin. So in the legacy version, the above request would be like this: $ GET But we will not talk about backward compatibility here. If you want to learn about all the changes that occurred between version 1.x and 2.x, you can find them on the official page. In addition to retrieving a collection of resources (posts) using the above URI, we can also retrieve a specific resource by mentioning its ID: $ GET /wp/v2/posts/100 The above request will return a post object as it looks down for a post resource that has an ID of 100. Other times, we also need to search for posts that meet some specific criteria. For that purpose, the WP REST API provides a way using the filter[]syntax: $ GET /wp/v2/posts?filter[cat]=1 By sending the above request, we can retrieve all the posts belonging to a category of ID 1. The filter syntax can be particularly helpful when querying posts or navigating between different resources, e.g. posts and categories, using their relations. Finally, when dealing with arguments that take arrays as input in filter[]syntax, we can append an empty set of square brackets to express arrays like so: $ GET /wp/v2/posts?filter[category__and][]=1&filter[category__and][]=2 The above syntax is equivalent to the following WP_Query(): <?php $query = new WP_Query( array( 'category__in' => array( 1, 2 ) ) ); Hence, the above GETrequest will retrieve a list of posts that belong to both categories having an ID of 1 and 2. The same syntax can also be used for array arguments having more than two elements. Please note that the use of the category__andparameter requires user authentication with edit_postsprivileges. We will look into the filter[]syntax in more detail in a later section. Now that we have learned about formatting a GETrequest and providing its parameters, it’s time to take a look at the OPTIONSrequest. An OPTIONSrequest makes it easy to navigate through the API and actually serves as a self-documenting way to make the API more accessible by documenting all the available HTTP methods on an endpoint, and in turn, the arguments they support. Navigating Through the API Using the OPTIONSRequest As mentioned before, the OPTIONSrequest can be extremely helpful in exploring the API. It mentions all the endpoints that belong to a certain route and provides a list of parameters these endpoints support for CRUD operations. Let’s send an OPTIONSrequest to the /wp/v2/postsroute to check which endpoints it supports and which parameters we can pass along the GETrequest to query data: $ curl -X OPTIONS wp/v2/posts I’ve used cURL to send the above request, but you can use any tool of your choice, including Postman. Be sure to include the full path to the above route, including the path of your server. { "namespace": "wp/v2", "methods": [...], "endpoints": [...], "schema": {...}, "_links": {...} } The above OPTIONSrequest to the /wp/v2/postsroute returns data in the JSON format that contains five properties: namespace methods endpoints schema _links { "namespace": "wp/v2", .... } The namespaceproperty identifies the namespace of the current plugin. In our case it’s wp/v2, signifying version 2 of the WP REST API. We have already looked at the namespace and the purpose it serves in the previous section. { ... "methods": [ "GET", "POST" ], ... } The methodsproperty contains an array of all the methods supported by the current route. By looking at the response the above request returned, it’s clear that the /wp/v2/postsroute supports two methods, namely GETand POST. It means that we can use the /wp/v2/postsroute to retrieve posts, as well as creating a new post. We will deal with the POSTmethod in the next part of this series, so let’s just focus on the GETmethod for the time being. The next property— endpoints—contains an array of the supported endpoints for the current route. This property is directly linked to the previously mentioned methodsproperty as it lists endpoints for the supported methods. { ... "endpoints": [ { "methods": [ "GET" ], "args": {...} }, { "methods": [ "POST" ], "args": {...} } ], ... } The endpointsproperty contains object values that in turn contain two properties, namely methodsand args. The methodsproperty contains an array of HTTP methods, and the next argsproperty contains all the supported arguments for these methods. These are the arguments that we send along the request in the form of URI parameters. Looking at the arguments supported by the GETmethod, we come across nine arguments that include context, page, per_page, etc. These argument objects contain two properties, requiredand default. The requiredproperty indicates whether the argument is required, and the defaultproperty represents the default value of the argument. "methods": [ "GET" ], "args": { "context": { "required": false, "default": "view" }, "page": { "required": false, "default": 1 }, "per_page": { "required": false, "default": 10 }, "filter": { "required": false } } The schemaproperty in the returned response documents all the properties for the current resource. The schema defines a structure for data in the JSON format. The schema format used in the WP REST API is based on draft 4 of the JSON schema specifications. The last _linksproperty holds an array of objects containing the links of associated resources. The key in the object specifies the relationship type (e.g. author, collection, self, comments, etc.), with its value being the link to that associated resource. This linking standard is based on HAL (Hypertext Application Language). You can find more about HAL by reading the specifications authored by Mike Kelley. In a similar manner, we can send an OPTIONSrequest to other routes, including those of users, comments, media, pages, etc., to check their supported methods and arguments. OPTIONSrequests are your best friend when working with the WP REST API. The WP REST API provides yet another way to assess the API availability by sending a GETrequest to the /wp-jsonindex route. This will list all the routes and their endpoints along with their supported methods and arguments. $ curl -X GET The above request will return a response object containing a routes property as follows: This feature is immensely powerful as it lists all the routes and their supported methods and arguments, thus eliminating the need for all these to be documented externally. We will be referring to this response object when performing CRUD operations on different resources. Having looked at our options to explore the API, let’s now begin working with the WP REST API to retrieve data from the server. Working With Posts By now, we have familiarized ourselves with the OPTIONSrequest, which is a self-documenting way to assess the API availability. We also looked at how it shows supported methods and arguments for a given route. Using this knowledge, we are now ready to retrieve different resources from the server using the WP REST API. The resource we will begin with is the Posts resource, since it’s the main building block of WordPress. We will deal with retrieving posts using different filters. Applying this knowledge, you will be able to query posts using the WP REST API just as you do with the WP_Query() class. Throughout this series, we have been working with the Posts resource to demonstrate example requests and their responses, and we already know how to retrieve post collection and an individual post by its ID. So we won’t be covering that again. Instead, we will look at some more advanced ways to retrieve posts using the top-level parameters and the filter[]syntax. Working With Top-Level Parameters The WP REST API exposes some of the most commonly used query variables for posts directly on the GETendpoint. These parameters are: context: The scope of the request. Possible values could be view, embedor edit. page: The current page of the post collection. per_page: Total number of posts per page. search: The search query. Limit results to the matching string. author: The author ID. Used to limit results belonging to a specific author. exclude: An array of post IDs to exclude from search results. include: Limit the results to post IDs specified in this array. offset: Offset the search results by specified number. order: The order of the collection. Can either be ascor desc. orderby: Sorting attribute of the collection. Possible values can be id, titleor slug. slug: Limit the results to a post having a specific slug. status: Used to limit the collection of the posts having a particular status. The contextparameter is used to fetch posts depending on the scope we are working in. If we are just listing posts on some index page, then we are good to go with the viewcontext. But if we are retrieving posts in order to edit them, then we need to use the editcontext: $ GET /wp/v2/posts?context=edit The editcontext parameter introduces an additional rawfield in fields like title, content, excerpt, etc. The value of this rawfield can be echoed out in the editor for editing the content. Using the editcontext requires you to be authenticated as a user with edit_postsprivileges. Using embedas the value of the contextparameter fetches the collection of the posts with a minimal subset of their properties. The other parameters mentioned above are pretty self-explanatory, and you can play around with them in your HTTP client. These were the basic parameters that allow you to query posts based on certain criteria. To narrow down our querying capabilities, the WP REST API provides the filter[]syntax that supports a subset of the WP_Query()args. Using the filter[]Syntax In addition to retrieving a collection of posts using some basic top-level parameters, the WP REST API exposes some of the WP_Query()variables using the filter[]syntax. By using this syntax, we can query posts the same way as we do when working with the WP_Query()class. Pagination parameters are the most important of all the filters, as they are used extensively on the post listing pages. The pagination parameters allow us to show a specific number of posts per page and navigate to a specific number of pages containing posts. By default, a GETrequest retrieves a collection of 10 posts per page. Let’s see how we can submit a GETrequest to retrieve only five posts per page: $ GET /wp/v2/posts?filter[posts_per_page]=5 The above request uses the posts_per_pagevariable that you might be familiar with if you have worked with WP_Query(). The pagedparameter is used in conjunction with the posts_per_pageparameter, and it’s used to navigate to a specific number of pages. After having retrieved five posts per page, we would make the following request to navigate to the second page: $ GET /wp/v2/posts?filter[posts_per_page]=5&filter[paged]=2 The posts_per_pageand pagedfilters can be extremely handy when working to build pagination on listing pages using the WP REST API. These two parameters are equivalent to the per_pageand pagetop-level parameters. Hence, the following request does the same work as the above one: $ GET /wp/v2/posts?per_page=5&page=2 In addition to the collection of posts the above request returns, the server also returns a number of headers with a response that contains useful information, including the total number of posts and the number of pages. These values are contained in the X-WP-TotalPagesand X-WP-Totalresponse headers. The X-WP-TotalPagesand X-WP-Totalresponse headers are extremely useful when creating pagination using the WP REST API as they list the total number of pages and the total number of posts respectively. Apart from pagination filters, the other most important usage of the filter[]syntax is to be able to query posts by their dates. For this purpose, the filter[]syntax supports eight parameters, the same as those of the WP_Query()class: year: The four digit year (e.g. 2015 or 2016) monthnum: The number of the month from 1 to 12 m: Six digit year-month (e.g. 201601) w: The week of the year from 0 to 53 day: The day of the month from 1 to 31 hour: The hour of the day from 0 to 23 minute: The minute of the hour from 0 to 60 second: The second of the minute from 0 to 60 So if we are looking for the posts published on the date 2015-10-15 (yyyy/mm/dd), this can be achieved by the following query: $ GET /wp/v2/posts?filter[year]=2015&filter[monthnum]=10&filter[day]=15 A similar query can be prepared with the help of the above parameters if we need to narrow down our search to the exact hour and minute. We have already seen in a previous section of this tutorial how we could fetch posts belonging to a specific category or multiple categories using the filter[cat]and filter[category__and]parameters. Now we will use the filter[category__in]parameter to show posts belonging to categories having an id of 5 and 6: $ GET /wp/v2/posts?filter[category__in][]=5&filter[category__in][]=6 The above request will retrieve a list of all the posts belonging to categories having an id of 5 and 6. The opposite effect could be achieved by using the filter[category__not_in]parameter in the following manner: $ GET /wp/v2/posts?filter[category__not_in][]=5&filter[category__not_in][]=6 This will retrieve a list of post while excluding all those posts belonging to categories having an ID of either 5 or 6. More could be written on using the filter[]syntax, but I won’t be covering all that here. You can find a list of all the query variables supported by the filter[]syntax in the official documentation of version 1 of the plugin. A large part of this information is still valid with version 2 of the WP REST API, but it's still lacking in some areas. At the time of writing this tutorial, the official documentation of version 2 doesn’t state anything about the filter[]syntax and the query vars it supports, but we can hope to see improvements in the official documentation in the near future since there are a number of people (including myself) contributing to the plugin development and documentation. Now that we have looked at different options when querying posts with the help of the WP REST API, we are ready to further advance our journey and look at some other resources supported by the WP REST API. Working With Post Revisions, Categories, Tags and Meta Post revisions provide a way to view and restore edits made to a post. The WP REST API provides a way to view all the revisions of a post by querying the /posts/<id>/revisionsendpoint. Hence for a given post having an ID of 10, all the revisions can be retrieved by sending the following request: $ GET /wp/v2/posts/10/revisions The above request will return an array containing revision objects. The revisions object contains a subset of properties found in the post object. Below is an example revision object in Postman: A specific revision can be retrieved given that we know its id. So a revision having an ID of 2 with post having an ID of 10 can be retrieved by the following object: $ GET /wp/v2/posts/10/revisions/2 The above request will return a single revision object. Other than post revisions, categories for a specific post can be retrieved by the following request: $ GET /wp/v2/categories?post=<post_id> And for the tags, we use the following request: $ GET /wp/v2/tags?post=<post_id> With <post_id>being the ID of the post. If we need to retrieve post meta for post having an ID of 10, we send the following request as an authenticated user: $ GET /wp/v2/posts/10/meta This will return an array of meta objects. Please note that to work with post and page meta in WP REST API, you need have the companion plugin installed available on GitHub by the WP REST API team. Working With Other Resources By now, we have gained a pretty solid foundation for working with the WP REST API to retrieve data. We have already looked at the options request and how it helps us explore the API without the need for external documentation. You can always send an OPTIONSrequest to a particular resource and check what endpoints and parameters it supports. If you need to list all the routes that the WP REST API provides, you can send a GETrequest to the index endpoint at /wp-jsonas we learned to do at the beginning of this tutorial. Considering this advantage of self-documentation, I don’t think that we further need to explore each individual resource in this tutorial, as you are now able to do that on your own. What’s Up Next? In this lengthy tutorial, we learned to explore the API using the OPTIONS request as well as retrieve data from the server using the WP REST API. We just looked at a handful of resources including posts, post revision and post meta, as we couldn’t cover all the supported resources in just one tutorial. But you should now be able to explore the API on your own using the techniques we learned in this tutorial.. In the next installment of this series, we will learn to perform the other three operations of CRUD, i.e. create, update, and delete resources. So stay tuned... Leave a comment › Posted in: Daily
http://www.4elements.com/blog/comments/wp_rest_api_retrievingdata
CC-MAIN-2017-51
refinedweb
3,382
53
rewinddir - reset the position of a directory stream to the beginning of a directory #include <dirent.h> void rewinddir(DIR *dirp); The rewinddir() function shall reset the position of the directory stream to which dirp refers to the beginning of the directory. It shall also cause the directory stream to refer to the current state of the corresponding directory, as a call to opendir() would have done. If dirp does not refer to a directory stream, the effect is undefined. After a call to the fork() function, either the parent or child (but not both) may continue processing the directory stream using readdir(), rewinddir(), or .
http://www.opengroup.org/onlinepubs/000095399/functions/rewinddir.html
crawl-002
refinedweb
105
50.57
#include <vtkVRMLImporter.h> Inheritance diagram for vtkVRMLImporter: vtkVRMLImporter imports VRML 2.0 files into vtk. As you can see this implementation focuses on getting the geometry translated. The routes and scripting nodes are ignored since they deal with directly accessing a nodes internal structure based on the VRML spec. Since this is a translation the internal data structures differ greatly from the VRML spec and the External Authoring Interface (see the VRML spec). The DEF/USE mechanism does allow the Vtk user to extract objects from the scene and directly manipulate them using the native language (Tcl, Python, Java, or whatever language Vtk is wrapped in). This, in a way, removes the need for the route and script mechanism (not completely though). Definition at line 70 of file vtkVRMLImporter.h.
https://vtk.org/doc/release/5.0/html/a02198.html
CC-MAIN-2021-31
refinedweb
130
55.44
In C++ and Java, there are the concept of Inheritance. The inheritance properties are used to reuse the code and also make a relationship between two objects. Here we will see some basic differences between inheritance in C++ and inheritance in Java. In Java, all of the classes are extending the Object class. So there is always a single level inheritance tree of classes. The object class is present at the root of the tree. Let us check this is true or not using a simple code. //This is present in the different file named MyClass.java public class MyClass { MyClass() { System.out.println("This is constructor of MyClass."); } } //This is present the different file named Test.Java public class Test { public static void main(String[] args) { MyClass obj = new MyClass(); System.out.println("obj is an instance of Object: " + (obj instanceof Object)); } } This is constructor of MyClass. obj is an instance of Object: true In Java, members of the grandparent classes can bot be accessed directly. The protected visibility is little bit different in Java compared to C++. In Java the protected members of the base class are accessible from the another class of the same package, even if that class is not derived from the base class. Here the protected member of MyClass can be accessible from Test. //This is present in the different file named MyClass.java public class MyClass { protected int x = 10; protected int y = 20; } //This is present the different file named Test.Java public class Test { public static void main(String[] args) { MyClass obj = new MyClass(); System.out.println("x is: " + obj.x + " y is: " + obj.y); } } x is: 10 y is: 20 In Java, we java to use the extends keyword for inheritance. In C++, we can determine the visibility of the inheritance like public, protected and private, but here we cannot change the visibility. So if some member is public or protected in base class, they will also be public or protected in derived class also. In java all methods are virtual by default. In C++, we have to specify the virtual keyword. In C++, we can use the multiple inheritance. In Java, we cannot create multiple inheritance directly. To reduce ambiguity, java supports interfaces to get the effect of multiple inheritance. The interfaces are purely abstract base class, where no functions are complete, so there is no ambiguity.
https://www.tutorialspoint.com/inheritance-in-cplusplus-vs-java
CC-MAIN-2021-39
refinedweb
398
58.99
So i found out my next program will need a lot of memory, but want to figure an estimate of how much. I first wanted to make an end_list[10000][100] array for the structure End, but since i only could get it working with [100][100] then i decided to make more structures and arrays but even that doesn't work. So why and how will I be able to solve this? Edit: Put system("pause") so I can check how much memory is taken, hopefully you have windows :PEdit: Put system("pause") so I can check how much memory is taken, hopefully you have windows :PCode: #include <stdio.h> #include <string.h> #include <time.h> #include <iostream> #include <stdlib.h> using namespace std; int main() { struct Start {char A[5]; char B[100];}; struct End1 {char A[5]; char B[100];}; // struct End2 {char A[5]; char B[100];}; // struct End3 {char A[5]; char B[100];}; // struct End4 {char A[5]; char B[100];}; Start start_list[100]; End1 end_list1[100][100]; // End2 end_list2[100][100]; // End3 end_list3[100][100]; // End4 end_list4[100][100]; system("pause"); }
http://cboard.cprogramming.com/cplusplus-programming/146663-limited-memory-allocation-printable-thread.html
CC-MAIN-2014-35
refinedweb
188
76.76
In this blog, we will talk about how we can work with XML using Scala. Scala treats XML as the first-class citizen. So, instead of embedding XML documents into strings. , you can place them inline in your code like you place an int or double value. For example scala> val xml = Hello xml: scala.xml.Elem = Hello scala> xml.getClass res2: Class[_ <: scala.xml.Elem] = class scala.xml.Elem We have created a val named xml and assigned xml sample content to it. Scala parses it and creates an instance of scala.xml.Elem. The scala package scala.xml provides classes to create XML document, parse them, read them and store them. Let’s see how we can parse it. XPath is a powerful tool to query the XML document. Scala provides an XPath like query ability with a slight difference. In XPath, we use forward slashes “/” and “//” to query the XML documents. But in Scala, “/” is a division operator and “//” is one of the way to comment the code. Scala prefers to use backward slashes “\” and “\\” to query the XML document. For example scala> val xmlDoc = 100 315 We would like to get the symbol elements. We can use the XPath query, scala> val children = xmlDoc \ "symbol" scala> children: scala.xml.NodeSeq = NodeSeq(100, 315) val grandChildren = xmlDoc \\ "units" grandChildren: scala.xml.NodeSeq = NodeSeq(100, 315) And we can use the text method to get the text node within an element. Let see another example, scala> val document = Scala Java C++ Kotlin scala> val children = (doc \ "language") children: scala.xml.NodeSeq = NodeSeq(Scala, Java, C++, Kotlin) We can iterate through the NodeSeq and print the node using text. scala> children.foreach(child => println(child.text)) Scala Java C++ Kotlin There is also child method to get all the children of the root element. scala> val children = doc.child children: Seq[scala.xml.Node] = ArrayBuffer( , Scala, , Java, , C++, , Kotlin, ) How to extract the attributes from XML elements? scala> val xmlLanguage = | Scala | Java | C# | scala> val attributes = xmlLanguage \\ "@platform" attributes: scala.xml.NodeSeq = NodeSeq(jvm, jvm, clr) scala> attributes.foreach(e => println(e)) jvm jvm clr How to load XML document from local? XML class provides load method which takes the path as a parameter and loads XML file into memory. import scala.xml._ val xmlFile = XML.load(path) It will load the XML content in memory and we can easily parse it or manipulate it. Please feel free to suggest or comment! References: 2 thoughts on “Working with XML in Scala” Reblogged this on Agile Development and commented: Working with XML in Scala
https://blog.knoldus.com/2018/03/21/working-with-xml-in-scala/
CC-MAIN-2018-30
refinedweb
436
68.77
Comment on Tutorial - Integer: byte, short, int, and long data types in Java By Abinaya Comment Added by : Merit Campus Comment Added at : 2016-02-12 12:34:41 Comment on Tutorial : Integer: byte, short, int, and long data types in Java By Abinaya Find clarification to your doubts regarding integer data types in Core Java through Merit Campus, visit:. Not only integer data types, we also have each and every topic in Core Java with example for each. You can read lot of sessions and can write many practice tests in Merit Campus Java website. visit: to know. abstract class Explain the concept of abstract c View Tutorial By: rahul at 2012-02-23 08:30:47 2. Can anyone post the steps to implement everything View Tutorial By: Matt at 2010-04-29 14:47:11 3. Hi All could you pls. send the execution of the ab View Tutorial By: subbu at 2008-01-28 03:14:27 4. import java.io.*; import java.util.Stack; View Tutorial By: jack&jill at 2011-07-26 06:40:32 5. Thanks to OP and Zarno for finishing off this code View Tutorial By: Soapy Balls at 2011-05-27 05:26:13 6. Aoa. could anybody guide me about jsf with hibern View Tutorial By: imtiaz afridi at 2011-12-03 12:19:04 7. Hi Mounika, The reason to the problem is that you View Tutorial By: Ramlak at 2008-04-26 20:06:21 8. Gracias. View Tutorial By: maiki at 2015-03-05 15:20:05 9. I executed this program with the help of below cod View Tutorial By: leela at 2011-09-08 12:16:24 10. i need java simple programs View Tutorial By: Tharani at 2010-01-22 06:39:25
https://java-samples.com/showcomment.php?commentid=40178
CC-MAIN-2022-33
refinedweb
300
62.88
How to Port Your Sprite Kit Game from iOS to OS X Have you ever wished you could port your iOS Sprite Kit game to OS X? Surprisingly, it’s easier than you think. Apple developed Sprite Kit with the goal of keeping iOS and Mac OS X development as identical as possible – which makes it extremely easy to develop for both environments simultaneously. This tutorial will show you how to take an existing iOS Sprite Kit game — the finished project from Sprite Kit Tutorial for Beginners — and adapt it to Mac OS X. You’ll learn how to maintain both versions in a single Xcode project and how to continue development of your game without copying and pasting heaps of code to keep both versions up to date. It’s recommended that you have some familiarity with Mac OS X Development if you choose to work through this tutorial. However, one of the wonderful features of Sprite Kit is that you don’t need to have a lot of prior experience to turn out a great app. If do want to learn more about Mac development, you can check out this three part tutorial on making a simple Mac app. Getting Started Download the starter project for this tutorial here, and build and run on your iPhone to try it out. The starter project has a few changes from the original in order to showcase several differences between the iOS and OS X versions of the game. Accelerometer Support This project borrows accelerometer support from the Space Game Starter Kit which lets the player move their character up and down the screen by tilting the device, like so: More Destructive Power The ninja star has now been imbued with magical ninja powers of epic destruction! Ok, maybe not that epic, but this version uses a nice particle effect to give the ninja star some visual impact. Small Technical Improvements Vicki Wenderlich lent her talents to the game and added a new tiled background which makes the game more aesthetically pleasing. As well, the status bar is hidden and the app now supports iPad resolutions. Working with Projects and Targets A project file ties all of your working files together, but what determines how your project is compiled is a target. A single project can contain multiple targets. This lets you compile your project in several different ways, depending on which files are associated with a specific target and the specific build settings of the target. This should give you a clue as to how you’re going to set up this project to compile for OS X! Let’s take a look at this project’s targets. Open the SpriteKitSimpleGame project, and at the top of the left panel, select your project to show the project settings. Then select SpriteKitSimpleGame in the project window. Right now there are two targets, one for iOS and the other for iOS unit tests, as shown below: Alternatively, you can select SpriteKitSimpleGame from the Target list if the project and target list are both expanded: When you build an application, you build it for the device or devices supported by the target. To see which devices the current target supports, click the SpriteKitSimpleGame drop down next to the Stop button at the top-left of the window, as shown below: This is where you’ll add a build target for Mac OS X. Adding a Build Target for Mac OS X Ensure your Xcode project is the active window and select File \ New \ Target as shown below: Xcode prompts you to select a template for your new target. Select the OS X\Application\SpriteKit Game template and click Next, as shown below: Finally, type in the product name as SpriteKitSimpleGameMac and click Finish, like so: Note: If you plan to release your app on the Mac App Store, your bundle identifier must be registered separately on developer.apple.com. Profiles and provisioning are arranged separately for iOS and Mac OS X developer programs. To try running your app on OS X, select SpriteKitSimpleGameMac from the scheme list, then select My Mac 64-bit as shown below: What do you think will happen when you try to build and run your project using this new target? - A — The game will run perfectly — and that’s the end of the tutorial! - B — The game will fail to compile with numerous errors. - C — The game will compile but crash on launch. - D — The game will compile and run but won’t be the game you expected. Structuring Your Files for Multiple Targets Now that you have a Mac OS X build target, you’ll be modifying and adding files to make the app work under OS X. Keeping track of these files can be difficult as time goes on, so it’s best to set up a system right now to help keep all the files organized. Minimize all of your groups and add a new group named SharedResources as shown below: This group will be the main location for your game and will contain resources that are common to both Mac OS X and iOS targets. While you’re at it, create a separate group named Testing and move the test modules into it, like so: Keeping the unit tests in a separate folder helps avoid visual clutter. Now that you have your new organized structure for the various files in your project, you’ll need to move the files into the appropriate locations. Expand SharedResources and SpriteKitSimpleGame. Click and drag the Particles and Sounds groups from SpriteKitSimpleGame to SharedResources. Next, drag over the sprites.atlas folder, MyScene.h, MyScene.m, GameOverScene.h and GameOverScene.m. Your file structure should look like the one shown below: Delete the Spaceship.png file — you won’t need that any longer. This is just a boilerplate file that is automatically added when you create a game with the Sprite Kit template. All the shared files of your Sprite Kit game now reside in the SharedResources group. Everything left in the SpriteKitSimpleGame relates to launching and managing the game on iOS. Expand the SpriteKitSimpleGameMac group. You’ll need to remove the example game files from this group before you progress any further. Delete MyScene.h, MyScene.m and Spaceship.png file from the SpriteKitSimpleGameMac group and select Move to Trash. Your file list should look like so: Note: You may have noticed that the Mac version of your game does not contain a ViewController class; instead, it only has an AppDelegate. The UIViewController class is part of UIKit which is not available on Mac OS X. Instead, the AppDelegate creates an instance of NSWindow which will present your Sprite Kit scene. As a final check, your fully-expanded file list should look like the following: You’ve removed unnecessary files from the project and organized it neatly. Now it’s time to modify your targets to let the compiler know which files to include with each target. Adding Target Membership Expand the Frameworks group and select UIKit.framework, like so: Expand the right Utilities Panel select File Inspector, like so: About halfway down the File Inspector you’ll see the Target Membership section. This is where you select the targets that will use this file. UIKit is only available on the iOS platform, so leave it unchecked on your Mac OS X targets, as shown below: The Cocoa Framework is only available on Mac OS X so ensure it’s checked for your Mac targets and unchecked for your iOS targets like so: The Sprite Kit Framework is available to iOS and Mac OS X so set the target membership as below: Each individual file in your project has its own target membership with the exception of texture atlases. The atlas itself is the only place you need to set a target membership and all contained textures will be automatically included. However, classes work a little differently. You can’t set a target membership on a .h file — instead, you must set the target membership on the .m file. Armed with your new-found understanding of target membership, work through each file in your SharedResources group and make sure both SpriteKitSimpleGame and SpriteKitSimpleGameMac are ticked on each file. In total, you should need eight ticks to get the job done. Next, work through each file in your SpriteKitSimpleGame group and make sure that only SpriteKitSimpleGame is ticked for each — they should all be set correctly at this point, but it’s good to check. Finally, work through each file in SpriteKitSimpleGameMac group and make sure that only SpriteKitSimpleGameMac files are ticked. Again, you shouldn’t have to change any but it never hurts to check. Now that your project is properly set up for your iOS and Mac targets, you can get down to what you’re good at — writing code! Getting the Game to Build and Run As it stands right now, your project will still build and run without issue for iOS. The changes you just made have no real effect on the existing game. However, if you build and run the Mac target, you’ll see a bunch of errors. That’s because you haven’t yet accounted for the differences between iOS and OS X. Build and run your project using the SpriteKitSimpleGameMac target; what do you see? You’ll receive the error Module ‘CoreMotion’ not found. Mac OS X doesn’t have a CoreMotion class or its equivalent; you’ll have to work around this issue and use the keyboard to control player movement. However, your primary goal is to get the project to a buildable state before you worry about implementation details like that. But how will you fix this? You can’t just remove the line of code referring to CoreMotion, otherwise the iOS version will break. You can’t work around this by using an if statment, since the compiler will still check each line of the code and throw an error if it doesn’t recognize something. Open MyScene.m and replace: with the following code: Unlike a regular if statement, an #if is performed by the preprocessor. TARGET_OS_IPHONE returns TRUE if the current target is iOS. Note: If you are plan to use an #if statement to check if the target OS is Mac OS X then the preferred method to check this is !TARGET_OS_IPHONE. TARGET_OS_MAC seems to work — but the problem is that it also returns TRUE for iOS. This might seem odd, but Apple uses !TARGET_OS_IPHONE in their example projects that contain multiple targets, so if it is a glitch, it’s most likely one they don’t plan to fix. Now you will need to find the remaining code related to CoreMotion and surround it with #if statements. Find the following code in the instance variables for MyScene.m: …and replace it with: Scroll down to the init method and find the following code: Replace the above code with the following: Now, find the following code [TODO: FPE: Again, are we in the same file?]: …and replace it with the following: Last but not least, locate the method named updatePlayerWithTimeSinceLastUpdate: and wrap the entire method with the following code: If you build this against an iOS target, all of the above #if statements will return TRUE, so the app compiles just as it did before. In contrast, if you build this against a Mac OS X target all of the above #if statements will return FALSE and none of the above blocks will be compiled. Take a look at the touchesEnded:withEvents: method in MyScene.m. Since the current version of Mac OS X doesn’t support touch screens, this method is meaningless. The Mac OS X version of this game will use mouse clicks instead as a perfectly adequate substitute for screen touches. To avoid adding a bunch of boilerplate code, you’ll now create a class that inherits from SKScene to help you handle both screen touches and mouse clicks! Adding Event Handlers Select your SharedResources group. On the menu bar select File \ New \ File… as shown below: Select Objective-C Class from either the iOS or OS X category and click Next. Name the file SKMScene and make it a subclass of SKScene. Place the file directly under your project folder, make sure both iOS and Mac targets are ticked in the target area and click Create. Open SKMScene.h and replace its contents with the following code: You’ll override the above two screen interaction methods using subclasses of SKMScene. Add the following code to SKMScene.m directly under the line @implementation SKMScene: That’s a fair bit of code, but if you read through from the top, it makes a lot of sense. Touching the screen or the end of a touch event calls the methods in the #if TARGET_OS_IPHONE block. You then create a CGPoint containing the pixel location of the touch and calla the relevant screenInteraction method. Pressing a mouse button or releasing the mouse button calls the methods in the #else section. Similar to above, you create a CGPoint containing the pixel location of the touch and call the relevant screenInteraction method. The advantage of using this subclass is that both touch and click events call a screenInteraction method. The screenInteraction methods have no code as you’ll override these in your subclass. Open MyScene.h and add the following class declaration just under #import : Next, update the superclass in the @interface line to SKMScene as shown below: This ensures your game scene inherits from your SKMScene subclass. You can now substitute your subclasses for the touch events. In MyScene.m find the following line: …and replace it with the following: Next, delete the following lines from the method as you won’t need them any longer: Build and run your project using the Mac OS X target; it should compile and run without too many issues: Congratulations — you’re now running your Sprite Kit game on your Mac! You’ll notice that it has a few bugs: - Some Macs have a noticeable pause the first time you click on the screen. - The particle effect appears to be a little broken on some Macs. - Not everything is sized correctly on the screen. - The background music has gone noticeably silent. You’ll tackle each of these bugs in turn — and you’ll learn about a few of the common bugs you’ll encounter when you convert apps between platforms. Correcting Pre-loading Issues This bug may not raise its head on all systems, but when it does it definitely points to a performance issue. “First-time-through” bugs like this usually stem from the initial load of resources into memory. Texture atlases are the first resource type that springs to mind, but since this app doesn’t contain animations or large complex images, it’s safe to assume the problem is somewhere else. The sound effects are the next most likely candidate as the sound files don’t get loaded until the user clicks on the screen. To fix this, add the following instance variable to MyScene.m: Next, add the following line to initWithSize: inside the if statement: This modifies your app to preload the sound file when the scene initializes. Find the following line in screenInteractionEndedAtLocation:: …and replace it with the following: Build and run your app; click the mouse and ensure that the delay has been eradicated. If your system didn’t expose this bug, then at least the changes above will ensure that it won’t happen on someone else’s system. Correcting SKS Issues At the time of this writing the bug in the particle effect seems to be an issue with Xcode 5. You’ll override the file reference to the texture in your sks file. Technically, there isn’t anything wrong with your sks file – and you won’t experience this issue on all systems – but you should fix it nonetheless. Find the following line in projectile:dideCollideWithMonster: of MyScene.m: Add the following code directly under the line you found above: All you have done above is to tell Xcode where to find the particular texture. Build and run your app; now you can admire your epic glitch-free particle effect. Correcting Image Resizing Issues Navigate to your SpriteKitSimpleGameMac group and then to AppDelegate.m. Take a look at the screen size set in applicationDidFinishLaunching:. It’s set to 1024 x 768 — this is the resolution of the non-Retina iPad. Now take a look at the contents of sprites.atlas. As expected, all iPad versions of images are suffixed with ~ipad so that your app knows to use these images when it runs on an iPad. Unfortunately, there is no ~mac suffix you can use here; instead, you’ll need to create a separate texture atlas for the Mac version of your app. In order to keep your build as small as possible, you should use a texture atlas with only the resolutions your app will actually use. Right-click on sprites.atlas and select Show in Finder to take you to the images folder. Create a copy of sprites.atlas and delete all images from the copied folder that don’t have ~ipad in their name. Next, remove the ~ipad designator from the file names but leave the @2x designator intact. Note: The @2x files have been left in the project to support the Retina screens on the Macbook Pro. Rename the folder to spritesMac.atlas and drag the renamed folder into your project. In the Choose options for adding these files dialog, make sure only the SpriteKitSimpleGameMac target is ticked in the Add to targets section as shown below: Click Finish. Now that the folder has been imported, select sprites.atlas and turn off target membership for Macs. This ensures that each texture atlas works separately of the other. Keeping with the spirit of staying organized, move the iOS texture atlas into the iOS group and the Mac texture atlas into the Mac group, as shown below: Next, go to Project\Clean. This will remove any old files from your build directory (if you forget to do this it might not work, as sprites.atlas may still exist). Build and run your app; you should see that everything loads at the proper size, as shown below: At this point your app supports iPhone, iPad and Mac OS X resolutions — and Retina-compatible to boot. Correcting Soundtrack Issues Finally, you’ll need to deal with the missing soundtrack to your game. Look at ViewController.m in the SpriteKitSimpleGame group. viewWillLayoutSubviews has a small section of code which instantiates AVAudioPlayer and sets it to repeat forever. Aha — you don’t have a ViewController in Mac OS X. Therefore, you’ll need to call this code from AppDelegate instead. Find the following line in AppDelegate.m of the SpriteKitSimpleGameMac group: ..and replace it with the following: Next, add the following code to the top of applicationDidFinishLaunching:: Build and run your app; the music plays on! You’ve resolved all of the bugs from the Mac conversion, but you still haven’t solved the issue of game controls in the Mac version of the game. Using the Keyboard The ninja’s movements in the iOS version of the app are controlled by tilting the device. These movements are processed by CoreMotion, and the game loop calls updatePlayerWithTimeSinceLastUpdate: to calculate the new player location for the current frame. Responding to key presses requires a slightly different approach using the available methods to listen for keypress events. Add the following code to updatePlayerWithTimeSinceLastUpdate: in MyScene.m just before the #endif statement: This updates to the method to respond to a keypress as well. Note that there’s a corresponding keyUp to handle the release of the key to handle events that only last for the duration of the keypress. You don’t want to respond to just any keypress; you can find out which key was pressed using the passed-in NSEvent. Add the following code between the curly braces of the keyDown: method you just added: Here you extract the pressed characters from the event without any modifier keys. This means key combinations like Command + S will be ignored. As well, you check that the keypress is only one character in length to filter out any other unwanted events. You’ll dump the key pressed out to the console. Build and run your project; press a few keys while the game is running and you’ll see the keys pressed show up in the debug area, similar to the following example: Since you’ll use the up and down arrow keys to move your player sprite, press those keys and see what you get in the console: Hmm, that looks a little odd. The arrow keys are part of the group known as function keys, so they don’t have a proper character representation. But don’t fret: there’s an easy way to detect when function keys are pressed. NSEvent is your best friend when it comes to managing keyboard and mouse inputs on the Mac. This tutorial merely introduces NSEvent; it’s highly recommended that you check out the full NSEvent class reference. For now, take a quick look at the section of NSEvent documentation that deals with the function keys enum. The keys you’re concerned with are NSUpArrowFunctionKey and NSDownArrowFunctionKey. Go back to MyScene.m and find the keyDown: method you just added. Comment out the NSLog statement and paste the following code immediately below that: Here you store the pressed character as Unicode character and compare it to the up and down function keys. You then use an SKAction to move the character up and down accordingly. Build and run your project; press the up and down arrow keys and you should see your character moving up and down the screen like so: You’ve spent all this time modifying the game to be played on a Mac, but you still need to check that you haven’t affected any portion of the iOS version of the game! Build and run your project using the iOS target and play around with it a bit to make sure none of the game functions have been affected by your changes. Where to Go From Here? You can grab the completed sample files for this project from here. Now that you have a good understanding of the work required to convert your iOS targeted project to a iOS / Mac targeted project, you’ll definitely want to create any new Sprite Kit games with cross-platform capabilities right from the start. I have made a cross-platform Sprite Kit project starter template on Github that might be useful – you can clone and use for your own games. To learn more about making games that work on both iOS and OS X (especially related to scene sizes, image sizes, and aspect ratios, and UIKit vs. Cocoa Touch considerations), check out the upcoming second edition of our book iOS Games by Tutorials, where we go into more detail. If you have any comments or questions, feel free to join the discussion below! 5 Comments So for UIKit / AppKit apps you would need to rebuild the interface separately. Unfortunately, both the finished tutorial and the github starter project fail to build on my mac mini, os x 10.10.1, Xcode 6.1.1. The error occurs when building for the mac target: ld: file not found: /Users/todddenlinger/Library/Developer/Xcode/DerivedData/NNSKTemplate-fyxoqcvzpluspsgqzzqiojduuzao/Build/Products/Debug/NNSKTemplate.app/NNSKTemplate clang: error: linker command failed with exit code 1 (use -v to see invocation)
http://www.raywenderlich.com/70837/how-to-port-your-sprite-kit-game-from-ios-to-os-x
CC-MAIN-2015-11
refinedweb
3,960
68.91
Have you ever wondered about the functional programming on a social network? This article by Joan Goyeau looks at how such a scalable system can be achieved without going high in complexity. "Context I’ve been working for a social network lately where we faced interesting business use cases. Created by famous people, we anticipated from the early design of the architecture that the co-founders’ fans would drive a surge of traffic to the site as soon as it launched. Therefore such a system should be scalable from any point of view since we are having huge load of people viewing, posting, commenting, liking... Usually power is in direct relation to the complexity of your system and since we are a startup with a small backend team we also need the system to be simple to run and maintain as we don’t have the data team, the operation team, the dev team, the whatever team… We are more like a unique team of around 4 devs which each of them understand every part of the system. So how can we achieve such a scalable system without going high in complexity? This is what we’ll see in this story. Use case For the sake of simplicity, in this story I will boil down the use case to a minimal set of functionality. As a social network it is possible to publish posts: And as you can see it is also possible to interact with a post through comments and likes. Let’s have a closer look at one of these posts: We can see that this little card already contains quiet some information: - The post itself with the text “Money can’t buy taste” and the boat picture, - But also information about the author with his name and it’s avatar - And some counters about the number of likes and comments this post received. Model Let’s define our model representation of the above UI. We will have ids everywhere in our system so we define a case class for it and we extend AnyVal to avoid boxing whenever it’s possible, this lets us be more type safe than using a simple String: case class Id[Resource](value: String) extends AnyVal And here are all the case classes for the User, Post, Like and Comment: import java.time.Instant import java.net.URI case class User(id: Id[User], updatedOn: Instant, image: URI, nickname: String, verified: Boolean, deleted: Boolean) case class Post(id: Id[Post], updatedOn: Instant, author: Id[User], text: String, image: URI, deleted: Boolean) case class Like(userId: Id[User], postId: Id[Post], updatedOn: Instant, unliked: Boolean) case class Comment(id: Id[Comment], postId: Id[Post], updatedOn: Instant, author: Id[User], text: String, deleted: Boolean) CQRS model Our main requirement is that the system should scale horizontally on reads and writes. Read optimised approachA naive approach is to store all the data in some database and generate the post views by querying the post itself, the user’s name and avatar with the id of the author and calculating the number of likes and comments, all of that at read time. Even though you can optimise the reads with indices and caching, this will not scale if we have too many reads. Write optimised approach Another way of doing is probably doing some denormalisation at write time. So we could create a DenormalisedPost case class that will contain all the necessary informations for the reads: case class DenormalisedPost(post: Post, author: User, interactions: Interactions) case class Interactions(likes: Set[Like], comments: Int) And then we could at write time update this DenormalisedPost, for example incrementing the like counter when someone like the post. This would make the reads very fast but it wouldn’t scale if we have many writes. For example if a post is very popular and so many people rush to like it, we would be locking the denormalised post way too much. CQRS approach A real solution is to implement the CQRS (Command Query Responsibility Segregation) model: This basically separates the reads and the writes to let them scale. We would therefore be able from the API to write at high throughput new users, posts, comments and likes in the command model and read the denormalised posts in the query model. One thing is missing though, if we separate the reads and the writes how the data we write in the command model will end up in the query model? This is what Kafka Streams is for, it’s a data processing library that can consume data from topics, transform them and sink in other topics. So here is how we can implement the CQRS approach with Kafka and Kafka Streams: The API will write it’s commands in some Kafka topics. Those topics will be consumed by Kafka Streams, transformed and sank in some other topics. Those other topics will be connected to write in databases like Elasticsearch, MongoDB, Redis… whichever is the best for the API to query. Note that this architecture is eventually consistent, this means if I like a post and query straight away the number of likes on this post it might not already be incremented. We usually solve this issue with the frontend faking the increment in the counter. Command Model We will have 4 Kafka topics for the command model which, you might have already guessed, will map to our model classes: - users - likes So the API will be able to write the case classes previously defined in their corresponding topics: Query model But now you might wonder what and how are we going to write in the databases where the API will read from. Kafka Streams will consume the posts, users, comments, and likes command topics to produce Denormalised Post we’ve seen in the Write optimised approach in a DenormalisedPosts topic which will be connected to write in a database for the API to query: Circe and Kafka Serdes We’ve come up until here almost without touching a line of code, having plans is good but implementing them is better. As we can see on the schemas there is a lot of writing/producing and reading/consuming going on here. So before diving into any implementation let me introduce Circe, probably the best JSON library in Scala. Very simply Circe defines 2 type classes for you, Encoder[T] and Decoder[T], which respectively knows how to encode and decode T. All of that is well documented on. Kafka has also quiet the same concept except that they are called Serializer[T]and Deserializer[T]. Again each of them know how to serialise and deserialise T. But not specifically to JSON! You might if you’d like serialise/deserialise into bytes. Kafka Streams goes a bit further with the Serde which is essentially just grouping the Serializer[T] and Deserializer[T] of a same type into one type Serde[T] which knows how to serialise and deserialise T. So why are we looking to those concepts? Well we probably want to serialise our records to JSON, as this is an easy and commonly used format, and therefore use Circe. But we surely don’t want to write a Kafka Serde for every (automatically generated?) Circe Encoder/Decoder. And this is exactly what Kafka Streams Circe can do for you. All you need is adding one import and this will bring all the Kafka Serde for which we have a Circe Encoder/Decoder: import com.goyeau.kafka.streams.circe.CirceSerdes._ Kafka Producer We saw how to serialise and deserialise some Scala object to JSON. Now it’s time to use this ability to produce data in the Command model topics. Let’s have a look at the Kafka Producer that we will be using in the API server code: val config = new Properties() config.put(ProducerConfig.BOOTSTRAP_SERVERS_CONFIG, "kafka:9092") val postProducer = new KafkaProducer( config, CirceSerdes.serializer[Id[Post]], CirceSerdes.serializer[Post] ) val post = Post(Id[Post]("post0"), Instant.now(), Id[User]("user0"), "Some text", URI.create(""), false) producer.send(new ProducerRecord("posts", null, post.updatedOn, post.id, post)).get() postProducer.close() view rawProducer.scala hosted with ❤ by GitHub In this snippet we are creating a post producer and then sending a Post to the posts topic. As you can see sending a post is quiet boilerplaty. Every time we want to send a record, we need to attach some configuration to it. Not only this is adding overhead when we just want to send a record but also can lead to a mistake where a post is sent to the wrong topic or the wrong serialiser being used. It would be better if we could involve the compiler to check that for us. Indeed this can be greatly improved by creating a type class Record that will contain all the config about a record. This type class will then be used by a new send() function that takes only the object to send (Post in this example) and configure automatically the topic, id and timestamp of this record: trait Record[K, V] { def topic: String def key(value: V): K def timestamp(value: V): Long } object Producer { def apply[V] = new ProducerBuilder[V] class ProducerBuilder[V] { def apply[K](config: Properties)(implicit record: Record[K, V], keySerializer: Serializer[K], valueSerializer: Serializer[V]): KafkaProducer[K, V] = new KafkaProducer(config, keySerializer, valueSerializer) } } implicit class KafkaProducerOps[K, V](kafkaProducer: KafkaProducer[K, V]) { def send(value: V)(implicit record: Record[K, V]): Future[RecordMetadata] = Future { kafkaProducer.send(new ProducerRecord(record.topic, null, record.timestamp(value), record.key(value), value)).get() } } All we need to do now is adding an implicit Record[Id[Post], Post] in the companion object of Post: object Post { implicit val record: Record[Id[Post], Post] = new Record[Id[Post], Post] { val topic = "posts" def key(post: Post): Id[Post] = post.id def timestamp(post: Post): Long = post.updatedOn.toEpochMilli } } and then we can just send directly the post, the configuration will be found automatically by implicit resolution: This looks much better, easier to understand and free of mistakes since the compiler will do the work for us. Kafka Streams Now that we have the Command model topics produced we will need to consume them to generate the Query model. And that’s where Kafka Streams kicks in, as a data processing framework it will let us do stateful transformations. Streams First let’s create those streams: val streamsBuilder = new StreamsBuilder() val postsStream = streamsBuilder.stream[Id[Post], Post]("posts") As we can see there is again some boiler plate here that may lead to runtime errors as we saw when creating the Kafka Producer. Not only we get to rewrite the 3 information again (key type, value type, topic) but if the types are not matching the topic, there is no compile time check, it would blow at runtime! Fortunately there is a way of getting over it, reusing the previously created Record[K, V] type class: implicit class StreamsBuilderOps(streamsBuilder: StreamsBuilderS) { def streamFromRecord[V] = new StreamBuilder[V] class StreamBuilder[V] { def apply[K]()(implicit record: Record[K, V], consumed: Consumed[K, V]): KStreamS[K, V] = streamsBuilder.stream[K, V](record.topic) } } This can be used as below to create all the streams we will need: val usersStream = streamsBuilder.streamFromRecord[User]() val postsStream = streamsBuilder.streamFromRecord[Post]() val commentsStream = streamsBuilder.streamFromRecord[Comment]() val likesStream = streamsBuilder.streamFromRecord[Like]() Pretty neat but don’t forget the empty brackets at the end. KTables Alright, you’ve been reading for too long now to finally see the first stream processing code that will power our social network, be carful Mark Zuckerberg! The goal here is to generate DenormalisedPost as we receive Users, Posts, Likes and Comments. For that we will need to build KTables that will represent our state and then we will be able to join them on their common key. So we want a KTable of users by their id to join with a KTable of the posts by author id (user id). You might wonder why using a KTable for posts? Why not using the original KStream rekeyed by author id to join with the KTable of users by their id, essentially querying a user for each post that comes? Well for the reason that if a user gets updated after he posted, we will need to find back all the posts he created to update the user there too. This can only be done if we keep the posts in a KTable, effectively building a queryable state for them. Commutativity This brings us on the concept of commutativity. A simple example is: 1 + 2 + 3 = 6 3 + 2 + 1= 6 Therefore we can say that the + operator is commutative since it doesn’t matter in which order the numbers are coming. This is exactly what we are doing here with the Posts and Users, it shouldn’t matter in which order they are coming, the output should always be the same DenormalisedPost. Alright, let’s have a look at the code that creates these 2 KTables: val usersByKey = usersStream .groupByKey .reduce((first, second) => if (first.updatedOn.isAfter(second.updatedOn)) first else second) val postsByAuthor = postsStream .groupBy((_, post) => post.author) .aggregate( () => Map.empty[Id[Post], Post], (_, post: Post, posts: Map[Id[Post], Post]) => if (posts.get(post.id).exists(_.updatedOn.isAfter(post.updatedOn))) posts else posts + (post.id -> post), Materialized.`with`[Id[User], Map[Id[Post], Post], KeyValueStore[Bytes, Array[Byte]]]( CirceSerdes.serde[Id[User]], CirceSerdes.serde[Map[Id[Post], Post]] ) ) .mapValues(_.values.toSet) - usersByKey group by the key (user id) and reduce all the user we get for the same key to keep only the latest version of it. The check on isAfterensure commutativity, as it doesn’t matter in which order the reduce receives the users, the result will be the same. - postsByAuthor group by the author of the post (user id) and aggregate all the posts we get for the same author id. We are also doing the check on isAfter to stay commutative. One important point here is that we are grouping, not by key, but by another field of the document (the author), this operation is more expensive than grouping by key as it envolves repartitioning of the stream. Although this is required here as we will see later, the 2 KTables or KStreams we are joining need to be co-partitioned. Associativity It is important here that we also respect the concept of associativity. For example the + and * operators used together are not associative: (3*5)+6 = 21 3*(5+6) = 33 As we can see the result will not be the same depending how you apply the operators even though the order of the elements is the same. If we look at the reduce operation of usersByKey, it doesn’t matter how we apply it in regards to their updatedOn field: (2018–05–20, 2018–05–01), 2018–05–28 = 2018–05–28 2018–05–20, (2018–05–01, 2018–05–28) = 2018–05–28 The result will always be the same. Let’s add the KTables for Likes and Comments: val likesByKey = likesStream .groupByKey .aggregate( () => Set.empty[Like], (_, like: Like, likes: Set[Like]) => if (like.unliked) likes - like else likes + like, Materialized.`with`[Id[Post], Set[Like], KeyValueStore[Bytes, Array[Byte]]]( CirceSerdes.serde[Id[Post]], CirceSerdes.serde[Set[Like]] ) ) val commentCountByKey = commentsStream .groupByKey .aggregate( () => 0, (_, comment: Comment, count: Int) => if (comment.deleted) count - 1 else count + 1, Materialized.`with`[Id[Post], Int, KeyValueStore[Bytes, Array[Byte]]]( CirceSerdes.serde[Id[Post]], CirceSerdes.serde[Int] ) ) Pretty straight forward, we add or remove likes depending on if it’s a like or unlike and for comments we add or subtract 1 to the counter. Idempotence But there is one issue with the comment counter, it’s not idempotent. Imagine a situation where the user click Publish comment twice (like my mother because she thinks it’s a file browser) then 2 events might get triggered. In that case we will wrongly count 2 instead of 1 comment. If the API is well done the id should be generated by the frontend and therefore the duplicate event will have the same id. A solution would then be to use a Set[Id[Comment]] instead of the Int: val commentCountByKey = commentsStream .groupByKey .aggregate( () => Set.empty[Id[Comment]], (_, comment: Comment, commentIds: Set[Id[Comment]]) => if (comment.deleted) commentIds - comment.id else commentIds + comment.id, Materialized.`with`[Id[Post], Set[Id[Comment]], KeyValueStore[Bytes, Array[Byte]]]( CirceSerdes.serde[Id[Post]], CirceSerdes.serde[Set[Id[Comment]]] ) ) .mapValues(_.size) The Set would indeed guaranty the idempotence. Semilattice If you combine all Commutativity, Associativity and Idempotence you will obtain what we call a Semilattice. This is a concept to bear in mind when we design robust data pipeline. It guarantees that not matter in which order the events are coming, how we apply our operations and if there is duplicate events, the result will always be the same. Joins We’ve started with KStreams, from them we built up a state with KTables, now it’s time to join all of them to create the long awaited DenormalisedPosts: postsByAuthor .join(usersByKey, (posts: Set[Post], author: User) => posts.map(DenormalisedPost(_, author, DenormalisedPost.Interactions(Set.empty, 0)))) .toStream .flatMapValues(identity) .groupBy((_, denormalisedPost) => denormalisedPost.post.id) .reduce((first, second) => if (first.post.updatedOn.isAfter(second.post.updatedOn)) first else second) .leftJoin(likesByKey, (denormalisedPost: DenormalisedPost, likes: Set[Like]) => Option(likes).fold(denormalisedPost)(denormalisedPost.lens(_.interactions.likes).set(_))) .leftJoin(commentCountByKey, (denormalisedPost: DenormalisedPost, commentCount: Int) => denormalisedPost.lens(_.interactions.comments).set(commentCount)) .toStream .to("denormalised-posts") Ok, a lot going on here! - We first join postsByAuthor with usersByKey creating our DenormalisedPost with an empty Interactions. - We convert to a stream so that we can flatten the DenormalisedPosts and create again a KTable of DenormalisedPosts but keyed by post id this time. - Then we leftJoin with likesByKey where we add the likes to the Interactions. We use leftJoin here as there might not be any likes. - We do the same with commentCountByKey. - And finally we convert to a stream to persist into the denormalised-posts topic. Can we improve something here? We can always improve something… In this case the .to(“denormalised-posts”) doesn’t look very safe for exactly the same reasons we saw with the producers and the stream builder. Even though here it’s not to verbose, there is no guaranty at run time that the given topic is the one that contains the right type of document. Again we can decorate the KStream type with a toTopic function that will reuse our Record type and give the right topic for the output type of the stream: implicit class KStreamOps[K, V](stream: KStreamS[K, V]) { def toTopic(implicit record: Record[K, V], produced: Produced[K, V]) = stream.to(record.topic) } The usage becomes simply: ... .toStream .toTopic Any other stuff we can improve? Monocle I don’t like much this multiple .copy() we are doing in the joins with likes and comments: ... .join(likesByKey, (denormalisedPost: DenormalisedPost, likes: Set[Like]) => denormalisedPost.copy(interactions = denormalisedPost.interactions.copy(likes = likes))) .join(commentCountByKey, (denormalisedPost: DenormalisedPost, commentCount: Int) => denormalisedPost.copy(interactions = denormalisedPost.interactions.copy(comments = commentCount))) For each level of object we need to manually copy them modifying the part we want. This is tedious compare to a mutable structure where we can just do something like denormalisedPost.interactions.likes = likes. Fortunately we can use lenses from Monocle that lets us do: ... .join(likesByKey, (denormalisedPost: DenormalisedPost, likes: Set[Like]) => denormalisedPost.lens(_.interactions.likes).set(likes)) .join(commentCountByKey, (denormalisedPost: DenormalisedPost, commentCount: Int) => denormalisedPost.lens(_.interactions.comments).set(commentCount)) Even though we didn’t reach the simplicity of a mutable structure this is much easier to use. Conclusion This story showed on a reduced example how we can build a fully scalable system but still easy to run and maintain. Hopefully you understood the 3 properties of Commutativity, Associativity and Idempotence all 3 forming a Semilattice, which is an important concept to build robust data pipelines. We’ve also learnt about come nice libraries other than Kafka Streams, like Circe and Monocle." This article was written by Joan Goyeau and originally posted on Medium.com
https://www.signifytechnology.com/blog/2018/05/functional-programming-with-kafka-streams-and-scala-by-joan-goyeau
CC-MAIN-2019-13
refinedweb
3,381
52.7
Throughout my career, which is entering it's 10th year of commercial programming, 15 years total, I have always been bombarded by the CTO's and the "good" programmers, who boast that their product is x amount of lines long. Sometimes, 100,000's and sometimes in the millions. And naively, I would always say "WOW", that's a lot of code. And on more than one occasion, I would look through the code and think WTF!!! The problem First off let me say that, when commenting on the lines of code you are writing for a project, there will be some people who would still be wowed by the thousands upon thousands of lines of code. I mean which is cooler : "Our product has been in development for 10 years and has 1 million lines of code" or "Our product has been in development for 10 years and only has 100 000 lines of code". From the bat, most of you would say, wow cool, the former is way better than the latter. But here's the catch. Let's take the following criteria. - How complex is the system. - What language is the system written in. - Is it a front-end or back-end based system. - What API's are we using. - Does it interface with a persistence instances. - What was the level of programmers who was involved with the project over it's lifetime. - etc etc You get the picture. There are many variables coming into the picture and all of them has a knock-on effect when it comes down to the number of lines of code that will be in the system. The old world Many a language, serves a purpose. What I mean by that statement is, that every language has it's purpose and strong point. You use a language what it was designed for. I might get slated for this, and this is in no way a very concise example. - For text processing, use Perl or Python. - For size and speed, use C or C++ (obviously ASM would be better, but the development time would go through the roof) - For rapid application development and prototyping, use Java or .Net. - For web applications, use Ruby on Rails. - For web services, Java. You can see my train of thought there. Use what the language was designed to be used for and you would get 100 times the benefit. But here comes the conundrum. As with most of these languages cannot, or do not like to be used with each other. I mean, sure you could probably use Java web services with Ruby on Rails etc, but that's bastardizing the integrity of the program, not to mention, after a while, it becomes a nightmare to manage different languages in a system. So what developers do, is they create API calls to suit their need to do what the other language would do. Some of these languages also would take 10 lines of code to do what a 4 generation language could do in 5 lines. The new world Recently, there has been a big push to create languages that would require less code to complete a task. This has made coding, for the most part, easier and programmers more productive. A simple example would be a simple hello world program. Scala object HelloWorld extends Application { println("Hello, world!") } Java public class HelloWorld { public static void main(String ... args) { System.out.println("Hello world!"); } } Now this is a very simple example of how to save some lines of code by using some of the newer languages out there. The problem here though, is that on some occasions, you would have to extend the new language in order to implement some functionality which older languages already has. Which would add lines of code again. The same could be said, when converting a C or C++ program to Java. Aaargghh my brain hurts. Programmer level Ok so now that we see that, by using different languages, we can save a lot of lines of code, the next logical step in the equation is : the level of your kung fu. Are the developers who wrote that system of 1 million lines, the best of the best ? Let's again take a simple example. 1 method to do exactly the same thing. Novice (For demonstration purposes only) public void novice() { int i = 0; int maxLoop = 10; int printAt = 5; while (i < maxLoop) { String word = ""; if (i == printAt) { word = "Booyakasha"; } else { word = "Yakashaeboo"; } System.out.println("Hello world : " + word); i++; } } Intermediate (For demonstration purposes only) public void intermediate() { int maxLoop = 10; int printAt = 5; for (int i = 0; i < maxLoop; i++) { String word = i == printAt ? "Booyakasha" : "Yakashaeboo"; System.out.println("Hello world : " + word); } } Expert (For demonstration purposes only) public static void expert() { int maxLoop = 10; int printAt = 5; for (int i = 0; i < maxLoop; i++) { System.out.println("Hello world : " + (i == printAt ? "Booyakasha" : "Yakashaeboo")); } } Please note, these aren't the best examples, but you get the point. The higher level of programmer would make methods simpler and use less lines of code to come to the same conclusion for a method. This is also where complexity through simplicity comes in. The saying, if I recall goes something like this : To make a simple thing complex is easy, to make a complex thing easy, is hard. Or something like that. Problem solving This is the hot topic right here. While coding, most of us will spend large amounts of time investigating ways to implement code. Be it to learn how the API works through reading up of documents or googling to find examples of how to implement a piece of code. This time, which is regarded as research and development, should also be factored into a project as it will probably take up a sizable chunk of your time to figure out how to implement the latest and greatest new language feature or API or whatnot. And this, my friends, cannot be factored into lines of code. Not to mention, when writing code, looking at some examples, seeing that what you have done for the last 100 lines are wrong, deleting it all and starting from scratch, 2 or 3 times. Every time churning out 50 to 100 lines of code, but when it comes down to actually committing your code, it's only 20 lines long. So how much was your productivity ? 150 lines ? 200 lines ? 20 lines ? This is really hard to calculate unless you are using some super duper character counter which knows comments from real code too, because comments aren't really code. Conclusion We have seen through not so useful or accurate examples, that there are many variables which contribute to the size of a program. And thus using lines of code as a measure of productivity is kinda pointless. {{ parent.title || parent.header.title}} {{ parent.tldr }} {{ parent.linkDescription }}{{ parent.urlSource.name }}
https://dzone.com/articles/why-loc-redundant-way
CC-MAIN-2017-17
refinedweb
1,155
71.44
Hide Forgot From Bugzilla Helper: User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.5) Gecko/20041111 Firefox/1.0 Description of problem: Doing an FTP install after booting from CD-ROM anaconda barfs after successfully loading stage2, complaining it can't find libraries. From the Python backtrace: Could not find platform independent libraries <prefix> Consider setting $PYTHONHOME to <prefix>[:<exec_prefix>] 'import site' failed: use -v for traceback Traceback (most recent call last): File "/usr/bin/anaconda", line 28, in ? import sys, os ImportError: No module named os So, it seems like some sort of PATH problem. Version-Release number of selected component (if applicable): anaconda-10.2.0.16-1 How reproducible: Always Steps to Reproduce: 1. burn boot.iso to CD, start install 2. load stage2 image from FTP site and continue 3. install barfs Actual Results: Installer barfs Additional info: There have been a lot of fixes in the past few days so this might be better now. Assigning to Chris to double check. I'm unable to duplicate this problem, so I'll assume one of the million changes we've made in the last couple days fixed it. Feel free to reopen if you see it in later rawhides or if we re-break things. I keep seeing this problem, also with the latest boot.iso (today) and older ones (yesterday). I verified that the md5sums on the ISO and the CD are the same (in fact, I had k3b verify that). What should I do to effectively debug this? I'm not able to reproduce this problem inside VMware or on a Dell Optiplex GX260, but I can reproduce it repeatedly and reliably on Dell Optiplex GX110 machines (tested 5 so far). I'm still seeing this problem with the latest and greatest version of 5 minutes ago (and various versions before that). I can't switch to another console to debug the problem when it occurs, because the barfing of the installation process halts the operating system. What should I do to debug this? Patching anaconda and rebuilding the whole distribution is not a problem for me (done that before), I just don't know where to debug :S Still can't reproduce this one. What's the last screen you're seeing before it fails? Can you reproduce this using a method other than an FTP install? Also can you test your memory using memtest86? It downloads the image fine from FTP, then it barfs after it says "starting anaconda". I'm pretty sure it's *not* a memory problem, because I can reproduce this on at least 5 identical boxes (all Dell Optiplex GX 110 machines), but not on any others. Which install method would you recommend (there are no ISOs available, are there)? I got the same problem on my system. Fedora-Devel (version of 03/13) inside VMWare 5.0b3 (on the top of FC3). In my case it happens when doing network install (from boot.iso) and specifying "linux text" to perform text install. Then perform HTTP install. Apparently when this happens there are no python modules in netsg2.img, at least according to gb and msw (they're pretty reliable sources) Created attachment 112155 [details] vmware-rawhide-anaconda-text.png rawhide March 19th 2005 - it happened again Note that this is a text install only failure, while graphical install may work. This is because... <msw> warren: it didn't have any python modules in netstg2.img or hdstg2.img <warren> msw, oddly it works for graphical install, but not text <msw> warren: right <warren> oh <msw> warren: stage2.img has all the modules you need <msw> warren: but if you do a ftp,http,hd install in text mode, you'll use the smaller images I find this really odd, because it did work when I used the same CD image and same ftp install from another machine (other hardware) and from inside VMware, but failed on all Dell GX-110 machines I have. I'm using graphical installs btw. We might be looking at two different problems. Okay, I believe this is being caused by errors in building the netstg2.img. Will roll a new anaconda package tonight. Please test a rawhide tree from tomorrow or later and verify that it works for you. Doesn't fix it for me. Is there some debug version I could run? Ah, the error is still occurring because I only fixed half the problem. Sorry about that. Please try tomorrow or later. Having same problem where can I get the new netstg2.img to test? (Once it's done) Copied stage2.img to netstg2.img on http server as implied above. http install (booted from cd, "linux text askmethod") works now. I don't get this problem anymore but a bunch of other errors unrelated to this one instead ;-) So, I think this one can be safely closed... Closing based on bug submitter comments. *** Bug 152610 has been marked as a duplicate of this bug. *** I tried this workaround (copying the stage2.img over the netstg2.img) and it didn't work for me. I'm sync'd to the latest dev tree as of last night (2005-04-01) which is what I'd been told in #fedora-devel by a number of people. I'm not sure what I should try at this point...
https://bugzilla.redhat.com/show_bug.cgi?id=147507
CC-MAIN-2019-09
refinedweb
902
75.81
Results 1 to 8 of 8 Python & MySQL - import MySQLdb error When I try to runCode: import _MySQLdbCode: Traceback (most recent call last): File "<stdin>", line 1, in ? File "/usr/lib/python2.4/site-packages/MySQLdb/__init__.py", line 19, in ? import _mysql ImportError: /usr/lib/python2.4/site-packages/_mysql.so: undefined symbol: mysql_set_character_set File "/usr/lib/python.... I don't really know what to try now, as this unfortunately isn't one of the import errors mentioned in the projects FAQ, and neither google or the forum search seems to have anything on this error. Thanks for taking the time to look at this Toodle-oo Giles"Our greatest fear is not that we are powerless. Our greatest fear is Microsoft" Registered linux user #391027 - Join Date - Jul 2006 - 6 Any solution to this ? Hey.. Did you happen to get a solution to this? I am having the same issue. cheers, Nathan More or less - a matter of a few days ago. In the end what seems to have worked was a) reinstalling slackware to clean up the system b) installing MySQL with some method other than from source (e.g. in my case through slapt-get) c) installing MySQL-python normally - it seemed to then play hapily with MySQL The disadvantage of this, for me, is that the slapt-get repositories dont seem to have version 5 of MySQL, so I'm stuck using version 4 at the moment. HTH Giles"Our greatest fear is not that we are powerless. Our greatest fear is Microsoft" Registered linux user #391027 - Join Date - Jul 2006 - 1 Facing same problem on linux fedora may i get some help how to solve this problem, thanks in advance Originally Posted by Giles As I said above, the only way I know how to solve this is to 1) reinstall your distro 2) install mysql from a package (NOT from source) 3) install MySQL-python If that doesn't work then you've left my area of knowledge.... Giles"Our greatest fear is not that we are powerless. Our greatest fear is Microsoft" Registered linux user #391027 - Join Date - Aug 2006 - 2 hey guys, after smashing my head against this problem for a day, I got it working. not sure if will help anybody else, but this is what I had and how it worked: first, I was running on a machine with no python sources and no mysql devel installed. so, let's get those. 1. python sources from python 2. mysql sources from mysql (mysql5) 3. MySQL-shared-standard-5.0.22-0.rhel4.i386.rpm (for the .so shared libraries) second, unpack and configure. 1. python, just unpack in a /usr/src/redhat/SOURCES/Python2.3 folder 1.1. create a link from /usr/include/python2.3 towards the /usr/src/redhat/SOURCES/Python-2.3.4/Include/ 2. mysql sources unpacked in the /root/downloads/mysql5 (please don't tell me to run as non root). 2.1. run the ./configure, which will create a config.h. copy that as my_config.h in the include subdirectory (will be needed by the python driver). 3. just rpm -i the MySQL-shared-standard-5.0.22-0.rhel4.i386.rpm. this will put in the /usr/lib the libmysqlclient libs. 3.1. run a ldconfig so the cache gets updated. third. now we get to the actual driver installation. 1. get the MySQLdb thingy, unpack it somewhere. 2. edit the site.cfg so they point to the correct libs and headers example: .... [compiler] #mysql_root: /usr/local/mysql library_dirs: /usr/lib include_dirs: /root/downloads/mysql-5.0.22/include # libraries: mysqlclient .... 3. do the "python setup.py build", make sure you have no error and a _mysql.so gets build in the build/lib.linux-i686-2.3 subfolder. 4. get back to the initial folder and do the "python setup.py install" (as root). it should install it in the /usr/lib/python2.3/site-packages. 5. test your installation "python test_MySQLdb_capabilities.py", make sure that you have a correct username and password in those tests. hope it works... ranjix Thanks for the ideas ranjix - although some elements of what you say are RH-specific, it should be translatable for other distros too. Personally I wont try that right now, as the server is very nearly ready to go live, and I've got it all working for the moment (so I dont want to risk breaking everything ), but either the next time I take it offline, or when I discover that I need a feature of MySQL 5, I'll use your ideas gladly. Toodle-oo Giles"Our greatest fear is not that we are powerless. Our greatest fear is Microsoft" Registered linux user #391027 - Join Date - Aug 2006 - 2 true, my post is related to redhat, but... probably instead of the RPM with the libraries you could get the targz files, unpack them and use... What do you use? Mandriva and Slackware? I don't see anything specific for those, so probably you'll use one of the non-rpm packages for generic linux or you could install an rpm program for your linux and use it. frankly not sure how well they work. All you need from that rpm is just the libmysqlclient... so files.
http://www.linuxforums.org/forum/servers/59614-python-mysql-import-mysqldb-error.html
CC-MAIN-2017-51
refinedweb
887
74.79
Swift version: 5.4 Many apps ask users to review their apps, but it’s increasingly common to see dark patterns such as apps pre-screening users so they get sent to the App Store only if they said they like the app. To avoid this problem in the future, and also to provide a standardized interface that users can trust, iOS 10.3 brought a built-in way to ask users to review the app, and it couldn’t be much easier to use. But first, some important information: Once you understand those rules, the process really couldn’t be easier. First, add this import to your code: import StoreKit Then at some point in your app call this method: SKStoreReviewController.requestReview() That’s it! Again, you should not call that in response to user input, although if you have any sense you won’t just put it inside viewDidAppear() in your app. Instead, consider storing a simple run count for your app using UserDefaults, then calling the method after your app has been run 10 times. By that point it’s pretty clear the user keeps coming back to your app, so hopefully you have more chance of getting a positive.3 This is part of the Swift Knowledge Base, a free, searchable collection of solutions for common iOS questions. Link copied to your pasteboard.
https://www.hackingwithswift.com/example-code/uikit/how-to-ask-users-to-review-your-app-using-skstorereviewcontroller
CC-MAIN-2021-31
refinedweb
227
70.23
The first step is build a class that inherits from Sitecore.Shell.Applications.ContentEditor.Gutters.GutterRenderer. Next, override the method GetIconDescriptor(Item item). This method receives the content tree item, and it is up to the developer to either return null if no icon is to appear, or a GutterIconDescriptor to show an icon. The GutterIconDescriptor has three properties: - Icon - Tooltip - Click, to show the javascript to run if the icon is clicked. using System; using Sitecore.Data; using Sitecore.Data.Items; using Sitecore.Shell.Applications.ContentEditor.Gutters; namespace SitecorePlayground.Extensions { public class ProxyGutterDisplay : GutterRenderer { protected override GutterIconDescriptor GetIconDescriptor(Item item) { if (item.RuntimeSettings.IsVirtual) { var gid = new GutterIconDescriptor(); gid.Icon = "Applications/32x32/documents.png"; if (item.RuntimeSettings.IsExternal) { gid.Tooltip = String.Format("Proxy of item in {0} database.", item.RuntimeSettings.OwnerDatabase.Name); } else { gid.Tooltip = "Proxy item. Click to see source."; gid.Click = GetLinkToSource(item); } return gid; } return null; } private string GetLinkToSource(Item item) { ID sourceId = item.InnerData.Definition.ID; string linkString = String.Format("item:load(id={0})", sourceId); return linkString; } } } A few remarks on the code: - It's a nice feature of this functionality that you can set the tooltip dynamically. This allows it to handle proxies to outside databases intelligently. - I selected an icon that was similar, but not identical, to the one used for the clones gutter icon. - The API calls for identifying proxies and their sources are from SDN, - The syntax for the item:load call is adapted from the ClonedItems gutter renderer. I have not yet found where this syntax is documented on SDN, but John West talks about it here: Here are a few screen shots of the results: It's as simple as that. Two years into coding with Sitecore, and it's still a treat how the Sitecore Client is built on top of the Sitecore CMS backend. Sweetly recursive. Oh, props are due to this post for getting me started, to K. Adam White for the inspiration, and to ReSharper for making the digging into the Sitecore kernel fun and intuitive. UPDATE: This code, and an installation package, has been posted to Github: Excellent post Dan! While creating these icons I had problems with missed . dll library files, but I solve it fast using if you have the same problem just find the file you need and download it on your device. You can employ weight washing organization for productive administrations and speedy tidy up of the sought spot. click site
http://www.dansolovay.com/2011/11/creating-gutter-icon-for-proxies.html
CC-MAIN-2018-34
refinedweb
411
50.23
Into my project I use the stack Webpack/angular2 (with typescript). I try to include the .js files of boostrap & jquery but I can't find a simple and well explain way... I tried succesively to use: If i understood you then ypu want to add jquery and bootstrap.js in your angular2 project Here is example how i did. add a plugin so jquery can be loaded before bootstrap new webpack.ProvidePlugin({ $: "jquery", jQuery: "jquery" }) and if you have installed bootstrap and jquery with npm then just import them in your main file import "bootstrap/dist/js/bootstrap.js"; import "jquery"; now you can test in browser's console by typing $ and it should show you that there is jquery loaded.
https://codedump.io/share/O6zEB96iiXa2/1/how-to-include-jquerybootstrap-files-into-the-stack-webpackangular2typescript
CC-MAIN-2016-50
refinedweb
122
74.08
Charging into the playoffs Pinpointing the wetlands Cougs and Lava Bears win their play-in games to advance • SPORTS, D1 LOCAL, C1 WEATHER TODAY SATURDAY Mainly cloudy, unseasonably warm High 67, Low 40 Page C8 • November 6, 2010 50¢ Serving Central Oregon since 1903 Buckaroo book A limited-edition look at a vibrant culture • PAGE B1 DAVID BLACK HEADS HOME Out of prison, with plans and a promise Lawsuit vs. DMV stirs additional friction Fighting the much-protested development isn’t worth what it may cost, a few neighbors say By Nick Grube The Bulletin A recent lawsuit filed by the RiverRim Community Association to stop the DMV from moving into the Brookswood Meadow Plaza in southwest Bend has a few residents in that neighborhood upset. They say the association board entered into the lawsuit without gaining prior approval from its members — something they say is required under association rules — and they’re now worried that the ensuing legal battle could cost homeowners tens of thousands of dollars in membership dues. “You can tell they’re going to fight this to the death, and they’re going to take our homeowners association dues with them,” RiverRim resident Terri McClain said. The lawsuit alleges the state, and in particular, the Department of Administrative Services, didn’t follow protocol when choosing a new location for the DMV. Among other things, the lawsuit, which was filed in Deschutes County Circuit Court on Oct. 25, claims the DAS should have consulted with the local community when picking a DMV site. It also claims the DAS should have notified local officials, business associations and homeowners associations before entering into a lease. McClain doesn’t agree with the lawsuit, and said that before it was filed there needed to be a vote among the RiverRim Community Association membership, something which she says is outlined in the covenants, codes and restrictions. A section of the RiverRim CC&Rs states that for the association to enter litigation, 75 percent of the membership would have to approve. See DMV / A7 DOCUMENTING HISTORY Photos by Pete Erickson / The Bulletin David Black, 26, takes a last look back at the Deer Ridge Correctional Institution on Friday in Madras. When he was 20, Black was convicted of second-degree manslaughter in a death stemming from illegal street racing. He maintains his sentence was unfair, and he still loves cars, but he’s sworn off illegal street racing By Lauren Dake The Bulletin MADRAS — Outside the prison’s gates, David Black’s friends waited for him. Two of them had been in the car with Black on that summer night, seven years ago, when two teenage girls died. Inside, many of the inmates know Black. They know the 26-year-old’s story and where he was headed. He was free. He was going home. “Later, Black,” one said. “Don’t come back,” another said. His three friends sat outside Deer C3-5 Crossword B5, E2 Obituaries Classified E1-4 Editorial C6 Sports D1-6 Comics B4-5 Local C1-8 Stocks C4-5 Movies B3 MON-SAT We use recycled newsprint U|xaIICGHy02329lz[ The Washington Post TOP NEWS Business Community B1-6 By Jacqueline Trescott Ridge Correctional Institution, in a parked 2001 Acura Integra Type-R, a limited-production car. Black was impressed. He hugged his friends. He couldn’t believe this day had come. There would be no more head counts. No more isolation cell. It wasn’t sinking in yet. The young men hit the straight stretch of highway south of Madras, and their talk turned to their passion: cars. When Black was 20 years old, he was convicted of second-degree manslaughter, along with other charges, for the death of 15-year-old Stephanie Beeksma. See Black / A6 INDEX C7 Weather C8 The Bulletin An Independent Newspaper Vol. 107, No. 310, 64 pages, 6 sections The photographer who went to war ECONOMY: U.S. added jobs in October, Page C3 James Vrem, 29, hugs Black. Three friends came to pick him up in a 2001 Acura Integra Type-R. “That’s fierce,” Black said. Financial crisis spices up a staid museum By Nathaniel Popper Los Angeles Times 5JNFUPGBMMCBDL Turn clocks back one hour at 2 a.m. Sunday. "1 Mathew New York City. Brady looked Brady. See Brady / A7 NEW YORK — The little museum. That was in March 2009, just after the government took a controlling stake in Citigroup. But the controversies kept coming — General Motors and Chrysler went bankrupt, the leaders of the Galleon Group hedge fund were arrested, Greece almost went broke — and so more panels were added. See Museum / A6 A2 Saturday, November 6, 2010 • THE BULLETIN The Bulletin T S How to reach us Pelosi aims to keep leading Democrats STOP, START OR MISS YOUR PAPER? 541-385-5800 Phone hours: 5:30 a.m.- 5 p.m. Mon.-Fri., 6:30 a.m.-noon Sat.-Sun. GENERAL INFORMATION 541-382-1811 NEWSROOM AFTER HOURS AND WEEKENDS 541-633-2157 NEWSROOM FAX 541-385-5804 By Paul Kane and Perry Bacon Jr. ONLINE The Washington Post E-MAIL: The Associated Press Coral several miles from the site of the blown-out BP well in the Gulf of Mexico appears to be covered with a dark substance. For the first time, federal scientists say they have found damage to coral and other deep-sea marine life from the Deepwater Horizon rig, but tests are needed to verify that the coral died from oil released in the disaster. Scientists find dead coral near blown-out BP well By Cain Burdeau The Associated Press Univer- sity. WASHINGTON — Rejecting demands that she relinquish power after her party’s losses in the midterm elections, House Speaker Nancy Pelosi announced Friday that she will run for minority leader, potentially setting up an ideological battle inside the Democratic caucus. “I am running for Dem leader,” the California congresswoman said in a post on her Twitter account. She said her decision was in part “driven by the urgency of creating jobs” and protecting this year’s health-care and Wall Street overhauls. Many Democrats had hoped Pelosi — a central figure in campaigns that allowed Republicans to capture at least 60 new seats and retake control of the House — would step aside. This would have cleared a path for Majority Leader Steny Hoyer, D-Md., who has support from the party’s diminished moderate-toconservative ranks. Nancy Pelosi But Pelosi’s allies have been quietly approaching fellow Democrats, seeking support for her to continue as the party’s leader. After her announcement Friday, Hoyer and Rep. James Clyburn, D-S.C., each signaled his interest in running for the No. 2 post. Pelosi has no challenger at the moment, making her the clear favorite to win in a caucus that is more liberal after Tuesday’s losses. She needs only a bare majority to become minority leader. But frustration with her tough leadership style cuts across all ideological ranks of the caucus, and most insiders expect that she will face some opposition in the secret ballot, which is likely to be held the week of Nov. 15. On Friday, Republicans were practically giddy at Pelosi’s announcement. “The definition of insanity is doing the same thing over and over again, and expecting a different result,” said Ken Spain, spokesman for the National Republican Congressional Committee. “Of course, if House Democrats are willing to sacrifice more of their members in 2012 for the glory of Nancy Pelosi, we are happy to oblige them.” Told of Pelosi’s decision during a roundtable with reporters, Republican National Committee Chairman Michael Steele broke into applause. “My breath is taken away by that announcement,” he said. “Nancy is one of the best at what she does from a political standpoint. She marshaled through one of the worst pieces of legislation in the history of this country. The voters soundly rejected that Tuesday night.”: 19 25 34 46 53 15 x4 Nobody won the jackpot Friday night in the Mega Millions game, pushing the estimated jackpot to $25 million for Tuesday’s drawing. MSNBC suspends Olbermann over political donations China assails Nobel prize as a scheme to subvert it By Brian Stelter and Bill Carter New York Times News Service By Michael Wines New York Times News Service BEIJING — Accelerating its assault on the award of the Nobel Peace Prize to the Chinese dissident Liu Xiaobo, China denounced the prize on Friday as a political tool of the West, and an official warned that countries acknowledging the honor would “bear the consequences.” A commentary in the principal party newspaper People’s Daily suggested that Liu’s award was a plot by the United States and other Western democracies that “fear the rise of China” and seek to subvert its political system. Vice Foreign Minister Cui Tiankai reinforced that critique, calling the prize a “highly politicized event” and telling foreign countries they had a stark choice between challenging China’s judicial system and developing friendly relations with Beijing, The Associated Press reported. China’s Communist hierarchy has bitterly criticized the award since its announcement nearly a month ago, calling Liu a criminal and asserting that giving him the award demeans the prize. Liu, an author and intellectual who issued a call for democratic reforms in China in late 2008, received an 11-year prison sentence this year for seeking to subvert Communist rule. His wife, Liu Xia, under house arrest in Beijing, has invited scores of supporters to attend next month’s Nobel ceremony, but few believe the government will allow them or her to attend. The Associated Press Indian Shiite Muslims burn an effigy of U.S. President Barack Obama during a protest following Friday prayers outside a mosque in Lucknow, India. Obama is scheduled to begin his visit to India today. In India, Obama unlikely to push hard on Pakistan By Lydia Polgreen and Mark Landler New York Times News Service NEW DELHI — Senior American military commanders have sought to press India to formally disavow an obscure military doctrine that they contend is fueling tensions between India and Pakistan and hindering the American war effort in Afghanistan. But with President Barack Obama arriving in India today for a closely watched three-day visit, administration officials said they did not expect him to broach the subject of the doctrine, known informally as Cold Start. At the most, these officials predicted, Obama will quietly encourage India’s leaders to do what they can to cool tensions between these nuclear-armed neighbors. That would be a victory for India, which denies the very existence of Cold Start, a plan to deploy new ground forces that could strike inside Pakistan quickly in the event of a conflict. India has argued strenuously that the U.S., if it wants a wide-ranging partnership of leading democracies, has to stop viewing it through the lens of Pakistan and the war in Afghanistan. It is also a victory for those in the administration who agree that the U.S. and India should focus on broader concerns, including commercial ties, military sales, climate change and regional security. However vital the Afghan war effort, officials said, it has lost out in the internal debate to priorities like American jobs and the rising role of China. “There are people in the administration who want us to engage India positively,” said an administration official, speaking on the condition of anonymity in order to discuss internal deliberations. “They don’t care about Afghanistan. Then there are people, like (Gen. David) Petraeus (the top commander in Afghanistan), who have wars to fight.” Keith Olbermann, the leading liberal voice on American television in the age of Obama, was suspended Friday after his employer, MSNBC, discovered he made campaign contributions to three Democrats last month. The indefinite suspension was a stark display of the clash between objectivity and opinion in television journalism. While Olbermann is anchorman of what is essentially the “Democratic Nightly News,” the decision affirmed that he was being held to the same standards as other employees of MSNBC and its parent, NBC News, Keith both of which answer to NBC Olbermann Universal. Most journalistic outlets discourage or directly prohibit campaign contributions by employees. Olbermann’s contributions came to light in an article by Politico on Friday morning. He said he had donated $2,400 to the campaigns of Reps. Raul Grijalva and Gabrielle Giffords of Arizona and Attorney General Jack Conway of Kentucky, who lost his Senate race to Rand Paul. On Friday evening, no one at NBC suggested that Olbermann would be fired. Campaign contributions are a form of activism, said Bob Steele, director of the Prindle Institute for Ethics at DePauw University. “When a journalist becomes an activist, the principle of independence is not just eroding, it’s corroding from within,” he said. Others said that thinking was outdated, and many prominent liberals and conservatives immediately called on MSNBC to reinstate Olbermann, who is normally outspoken but who had no comment on his suspension on Friday. In suspending Olbermann, MSNBC, a favorite of liberals, appeared to be trying to differentiate itself from the Fox News Channel, a favorite of conservatives, which does not discourage employees from making personal donations to candidates or political causes. N AT ION / WOR L D THE BULLETIN • Saturday, November 6, 2010 A3 Volcanic eruption scorches villages as death toll hits 122 in Indonesia By Sarah DiLorenzo The Associated Press MOUNT MERAPI, Indonesia — from the fiery crater, just on the perimeter of the government-delineated “danger zone.” Crumpled roofs, charred carcasses of cattle and broken Mosque bomb kills at least 64 in Pakistan chairs — all layered in white ash and soot — dotted the smoldering landscape. The zone has since been expanded to a ring 12 miles. MASSIVE JESUS STATUE RISES IN POLAND The Associated Press The Washington Post Photos by Czarek Sokolowski / The Associated Press Workers struggled Friday to assemble a crane that will be used to lift the 32-ton head and shoulders of a concrete and metal statue of Jesus in Swiebodzin, western Poland. The statue is to be the world’s tallest of Jesus and is supposed to attract pilgrims and boost business in the town. It will rise 167 feet, including the mound it sits on and the golden crown on its head. Polish media say the project cost $1.45 million. Work on the statue began in 2008. — The Associated Press 4 dead in floods as Tomas compounds Haiti’s woes By Jonathan M. Katz The Ramon Espinosa / The Associated Press People wade through a flooded street Friday during the passing of Hurricane Tomas in Leogane, Haiti. re- ports. Judge must revisit his order to release Guantánamo captive By Carol Rosenberg McClatchy-Tribune News Service A U.S. appeals court Friday ruled that a federal judge was too quick to order the Pentagon to free a Mauritanian captive who joined and then quit alQaida, and was subsequently 1 year later, Hood victims remembered By Angela K. Brown By Haq Nawaz Khan and Karin Brulliard PESHAWAR, Pakistan — At least 64 people were killed in blasts at two Sunni mosques in Pakistan’s restive northwest Friday, in the latest in a string of attacks on shrines and other places of worship around the country. In the first attack, in a mosque outside the city of Peshawar, a teenage suicide bomber detonated his explosives during Friday afternoon prayers, causing the roof to collapse on hundreds of worshipers and killing at least 60 people, government and police officials said. It was the largest bombing in Pakistan since September, when a blast killed more than 60 people in the southwestern city of Quetta. The second attack occurred a few miles away during evening prayers at a second mosque, where militants hurled three grenades and set off a bomb, police said. Authorities said both attacks appeared to be aimed at villagers and tribal elders who had stood up to the Pakistani Taliban, a loose coalition of militants based in the rugged tribal areas bordering Afghanistan. The Pakistani television network GEO reported that the Taliban asserted responsibility for the first bombing, which occurred in the town of Darra Adam Khel. A tribal elder who had organized residents against the Taliban lived in a guesthouse adjacent to the mosque and might have been the target, authorities said. Residents said he had recently moved to Dubai for security reasons. In Badabher, where the second bombing took place, residents had organized a so-called peace committee to patrol against militants, who have targeted the area several times before. The sites of both attacks border the tribal areas where the Pakistani military has waged various offensives in recent years against homegrown militants. Although the operations appear to have helped slow attacks, militants have continued to display their ability to strike across the country. Several recent attacks have been aimed at Sufi shrines and institutions, the religious gatherings of minority sects and mosques affiliated with Taliban opponents, whose views hard-line Sunni groups consider abhorrent. Officials said Friday that the Taliban was lashing out at the Pakistani military offensives. “The militants are on the run and weakened by the security forces, and therefore they are hitting such weak targets,” Mian Iftikhar Hussain, information minister in Khyber Pakhtunkhwa province, told reporters. Eric Gay / The Associated Press Mourners visit a memorial stone Friday in Fort Hood, Texas, after it was unveiled during a ceremony commemorating the one-year anniversary of the worst mass shooting on a U.S. military base. abused by military interrogators at Guantánamo. U.S. District Judge James Robertson on March 22 ordered the release of Mohamedou Ould Salahi, 39, who lived in Germany and Canada as a computer technician. A three-judge panel of the U.S. Court of Appeals for the Washington, D.C., circuit ordered Robertson to undertake more review and possibly take more testimony to consider how many past ties to the terror group is enough to confine a captive indefinitely at Guantánamo. At issue in part is the federal court’s evolving definition of who among the 170 or so captives at Guantánamo can be held indefinitely without charge for some association with al-Qaida. FORT HOOD, Texas — Parents, spouses and children reverently approached the 6foot the last year to get. (541)549-6406 370 E. Cascade, Sisters License #78462 A4 Saturday, November 6, 2010 • THE BULLETIN R Traditional, tech-savvy nuns thrive despite hard times I B Matthew Soerens, immigration expert and author, will speak at the 9:30 a.m. service and lead the 11:15 Redux service Sunday at Antioch Church, held at Summit High School, 2855 N.W. Clearwater Drive, Bend. • Pastor Dave Miller will share the message “Seeing the Big Picture” at 10 a.m. Sunday at Bend Christian Fellowship, 19831 Rocking Horse Road. The 4twelve youth group meets Wednesdays at 7 p.m. • Pastor Virgil Askren will share a sermon titled “My Invitation Can Change the World” at 10:15 a.m. Sunday at Bend Church of the Nazarene, 1270 N.E. 27th St. • Pastor Dean Catlett will share the message “Grace Provides a Place to Belong,” based on 1 Corinthians 1:26-2:5, at 10:45 a.m. Sunday at Church of Christ, 554 N.W. Newport Ave., Bend. • Pastor Dave Drullinger will share the message “Lessons from the Sea,” based on Acts 27:13-20, at 10:45 a.m. Sunday at Discovery Christian Church, 334 N.W. Newport Ave., Bend. • Pastor John Lodwick will lead a “Hope Celebration Service,” based on Romans 15:13, in a combined service at 10 a.m. Sunday at Eastmont Church, 62425 Eagle Road, Bend. • Pastor Mike Johnson will share part two of the message “Unshakable: The Wild Kingdom” at 10:30 a.m. Sunday at Faith Christian Center, 1049 N.E. 11th St., Bend. Fuel youth services are held Wednesdays at 7 p.m. • Pastor Randy Wills will share the message “What Kind of Dirt Are We” as part of the series “Storytime” at 10 a.m. Sunday at Father’s House Church of God, 61690 Pettigrew Road, Bend. • Pastor Syd Brestel will lead a focused time of prayer and Bible teaching followed by communion at 10:15 a.m. Sunday at First Baptist Church, 60 N.W. Oregon Ave., Bend. • The Rev. Dr. Steven Koski will speak on the topic “A Time to Be Generous and Grateful!” at the 9 a.m. contemporary service, 10:45 a.m. traditional service and 5:01 p.m. evening service Sunday at First Presbyterian Church, 230 N.E. Ninth St., Bend. • Pastor Thom Larson will share the message “All Saints/Communion Sunday,” based on Luke 6:20-31 and Ephesians 1:11-23, at the 8:30 a.m. contemporary service and 11 a.m. traditional service Sunday at First United Methodist Church, 680 N.W. Bond St., Bend. • Pastor Joel LiaBraaten will share the messages “This Little Light of Mine” and “Can You Be a Saint?” at 10 a.m. Sunday at Grace First Lutheran Church, 2265 N.W. Shevlin Park Road, Bend. • Pastor Dan Dillard will share the message “The Restoration of Peter” at 10:30 a.m. and “The New Jerusalem” at 6 p.m. Sunday at Grace Reformed Presbyterian Church, 62162 Hamby Road, Bend. • This Sunday will be dedicated to serving Bend High School at Journey Church, held at Regal Old Mill 16 Cinemas, 680 S.W. Powerhouse Drive, Bend. • Pastor Randy Myers will share the message “How to Bring REAL Life Back into Your Life (the church of Sardis)” as part of the series “Morph” at 6 p.m. today and 9 and 10:45 a.m. Sunday at New Hope Church, 20080 Pinebrook Blvd., Bend. • Pastor Mark Zechin will share the message “Living from the Heart” at 10 a.m. Sunday at Rapha Center Ministries, 2330 N.E. Division St., Suite 1, Bend. • Anakha Coman will share the message “The Love of Now” at 9 a.m. Sunday at Spiritual Awareness Community of the Cascades, held at Old Stone Church, 157 N.W. Franklin Ave., Bend. • Pastor David Carnahan will share the message “Saints: Us and Ours” based on Revelation 7:9-17, at the 8 a.m. contemporary service and 11 a.m. traditional service Sunday at Trinity Lutheran Church & School, 2550 N.E. Butler Market Road, Bend. • The Rev. Heather Starr will speak on the topic “Not Like the Other” at 11 a.m. Sunday at the Unitarian Universalist Fellowship of Central Oregon, held at Old Stone Church, 157 N.W. Franklin Ave., Bend. • Pastor Ken Johnson will share the message “How to Gain From Your Loss” at 6:30 p.m. today and Dr. John Nastari will share the message “I Dare You!,” based on Daniel 6:19-28, at the 8:30 a.m. contemporary service and 11 a.m. traditional service Sunday at Community Presbyterian Church, 529 N.W. 19th Street, Redmond. • Pastor Katherine Hellier will share the message “Now and Not Yet,” at the 8:30 a.m. contemporary service and the 11 a.m. traditional service Sunday at Zion Lutheran Church, 1113 Black Butte Blvd., Redmond. • Pastor Glen Schaumloeffel will share the message “The Origin of Choice, Sin and Redemption,” based on Genesis 2:16-17; 3:1-24, as part of the series “Back to the Beginnings” at 9:30 a.m. Sunday at Community Bible Church at Sunriver, 1 Theater Drive. • The Rev. Willis Jenson will share the message “On the Festival of All Saints Christians Remember The Saints Down Through the Ages Who Preserved the Gospel for Christ’s Sake and the Sake of All of Us Who Have Come After Them,” based on Matthew 5:10, at 11 a.m. Sunday at Concordia Lutheran Mission held at Terrebonne Grange Hall, 8286 11th St., Terrebonne. By Patricia Montemurri Detroit Free Press Photos by Lourdes Segade / New York Times News Service Visitors walk inside the patio of the Cathedral of Cordoba, built as a mosque in the eight century, in Cordoba, Spain. The bishop of the cathedral objects to signs that reflect its origin as a mosque, in the latest chapter in the struggle over the region’s contested religious legacy. Spanish ‘mosque-cathedral’ a monument to discordance By Rachel Donadio “There’s no problem saying that the Muslim caliphs built this temple to God,” Bishop Demetrio Fernandez wrote in an opinion article in ABC, a Spanish centerright daily newspaper. “But it is completely inappropriate to call it a mosque today because it has not been one for centuries, and to call it a mosque confuses visitors.” New York Times News Service CORDOBA, Spain — The.. “There’s no problem saying that the Muslim caliphs built this temple to God,” the bishop wrote. ,” Fernandez added, referring to the Syrian site where an Umayyad mosque was built in the eighth century above a fourth-century church said to contain the remains of John the Baptist. Many visitors reconquest. “The Cordoba monument is a lesson in universalism, in how cultures and religions can meet and coexist,” said Isabel Romero, the spokeswoman for Cordoba’s local Islamic association. Much to the diocese’s displeasure, the group wants the diocese to create a space in the cathedral for Muslim worship. “It would be an exemplary gesture,” Romero said. In another complex twist, indicative of the historical ironies at work in today’s Spain, Romero is a Catholic convert to Islam — as are 300,000 out of Spain’s 2.2 million Muslims. Local,” Bello said. “We’re not offended. On the contrary, it’s a nice example of the history of our land.” DETROIT — The Dominican Sisters of Mary, Mother of the Eucharist — which has exploded in size from four sisters when it was founded in 1997, which is. Building opportunity after fundraising to create the center, securing major donations from prominent Detroitarea.” THE BULLETIN • Saturday, November 6, 2010 A5 Assembly of God Bible Church FAITH CHRISTIAN CENTER 1049 NE 11th St. • 541-382-8274 SUNDAYS: 9:30 am Sunday Educational Classes 10:30 am Morning Worship COMMUNITY BIBLE CHURCH AND CHRISTIAN PRESCHOOL 541-593-8341 Beaver at Theater Drive, PO Box 4278, Sunriver, OR 97707 This Sunday at FAITH CHRISTIAN Pastor Mike Johnson will share his message titled, “Unshakable: The Wild Kingdom” Part II in the morning worship service. RADIANT LIFE FELLOWSHIP Loving God & Truth + People & Life 60670 Brookswood Blvd. • (541) 389-4749 Pastor George Bender SUNDAY “GLOW” Sunday School @ 9:30 am “IGNITE” Worship @ 10:30 am “SPARKLERS” Kids’ Care & Kids’ Church WEDNESDAY “VISION” Bible Study @ 7 pm “ILLUMINATE” Youth Worship @ 7 pm REDMOND ASSEMBLY OF GOD 1865 W Antler • Redmond • 541-548-4555 SUNDAYS Morning Worship 8:30 am and 10:30 am Life groups 9 am Kidz LIVE ages 3-11 10:30 am Evening Worship 6 pm WEDNESDAYS FAMILY NIGHT 7PM Adult Classes Celebrate Recovery Wednesday NITE Live Kids Youth This Sunday at First Baptist, Pastor Syd leads a focus time of prayer and Bible teaching before we take communion. This special prayer event is a response to our current series on integrating prayer into daily life.” Catholic HOLY REDEEMER CATHOLIC PARISH Fr. Jose Thomas Mudakodiyil, Pastor Parish Office: 541-536-3571 HOLY REDEEMER, LA PINE 16137 Burgess Rd Tuesday, Wednesday & Friday Mass 9:00AM Sunday Mass — 10:00AM Confessions: Saturdays — 3:00–4:00PM HOLY TRINITY, Sunriver 18143 Cottonwood Rd Thursday Mass — 9:30AM Saturday Vigil Mass — 5:30PM Sunday Mass — 8:00AM Confessions: Thursdays 9:00–9:15AM OUR LADY OF THE SNOWS, Gilchrist 120 Mississippi Dr Sunday Mass — 12:30PM Confessions: Sundays 12:00–12:15PM HOLY FAMILY, near Christmas Valley 57255 Fort Rock Rd Sunday Mass — 3:30PM Confessions: Sundays 3:00–3:15PM Masses HISTORIC DOWNTOWN CHURCH Corner of NW Franklin & Lava Tues., Thurs., Sat. 7:00 AM Tues. & Thurs. 12:15 PM Exposition & Benediction Tuesday 3:00 - 6:00 PM Reconciliation: New Church, 27th St: Sat. 3 - 5 PM* Mon., Fri. 6:45 - 7:00 AM* & 7:30 - 8:00 AM Wednesday 6:00 - 8:00 PM Historic Church Downtown: Saturday 8:00 - 10:00 AM Tues. & Thurs. 6:45 - 7:00 AM* & 7:30 - Dr. Barry Campbell, Lead Pastor CHRISTIAN CHURCH OF REDMOND 536 SW 10th Redmond, OR 97756 541-548-2974 Fax: 541-548-5818 PARA LA COMUNIDAD LATINA Domingos: Servicio de Adoración y Escuela Dominical - 12:30 pm Miércoles: Estudios biblicos por edades - 6:30 pm 2 Worship Services 9:00 A.M. and 10:30 A.M. Sunday School-all ages Junior Church Kidmo Friday Night Service at 6:30 P.M. Pastors Myron Wells Greg Strubhar Darin Hollingsworth Sunday, November 7 Sermon Title: “Stupid” Comes Natural Proverbs 2:1-22 Speaker: Associate Pastor, Greg Strubhar POWELL BUTTE CHRISTIAN CHURCH Cowboy Fellowship Saturdays Potluck 6 pm Music and the Word 7 pm Sunday Worship Services 8:30 am - 10 am - 11 am Nursery & Children’s Church Pastors: Chris Blair & Glenn Bartnik 13720 SW Hwy 126, Powell Butte 541-548-3066 Christian Foursquare \Lutheran Presbyterian Junior Church is at 9:15 AM for kids preschool to 5th grade 11:00 AM Formal Service Pastor David C Nagler. Rev. Dr. Steven H Koski Senior Pastor “A Time to Be Generous and Grateful!” Sunday Worship 9:00 am Contemporary 10:45 am Traditional 5:01 pm Come as you are Christian Schools Come and meet our pastors, Mike and Joyce Woodman. Mary Dennis Adult Bible Study, Sunday 9:30 AM Sunday Morning Worship 10:30 AM DYG (High School) & Trek (Middle School) Monday 6:30 PM 7801 N. 7th St. Terrebonne West on “B” Avenue off of Hwy. 97; South on 7th St. at the end of the road 541-548-1232 dayspringchristiancenter.org WESTSIDE CHURCH How To Gain From Your Loss Pastor Ken Johnson Extracting Gains From Your Losses By Grieving God’s Way WEST CAMPUS 2051 NW Shevlin Park Road, Bend 97701 Saturday at 6:30pm Sunday at 8:00, 9:00 and10:45am Kurios - 1st Wednesday of each month at 6:30pm 5th Grade Meets: Wednesday at 6:45pm Saturday 6:30pm and Sunday 9:00 and 10:45am 6th thru 8th Grades Meet: Wednesday at 6:45pm Saturday at 6:30pm and Sunday at 9:00am 9th thru 12th Grades Meet: Tuesdays at 6:45pm and Sunday at 10:45am SOUTH CAMPUS How To Gain From Your Loss Pastor Ken Johnson Extracting Gains From Your Losses By Grieving God’s Way Elk Meadow Elementary School 60880 Brookswood Blvd, Bend 97702 Sunday at 10:30am Children’s Ministries for Infants thru 5th grade Sunday at 10:30am Follow us on Facebook 541-382-7504 Sunday Schedule 9:00 am Adult Education 10:00am Holy Eucharist Presider The Rev. Richard Brown Tuesday- 3pm Captains John and Sabrina Tumey Katherine Hellier, Interim Pastor Nazarene JEWISH COMMUNITY OF CENTRAL OREGON Serving Central Oregon for 20 Years. Resident Rabbi Jay Shupack Episcopal Sunday Worship Service 8:30 am Contemporary 11:00 am Traditional Sunday School for all ages at 10:00 am Jewish Synagogues 541-728-6476 ST. ALBANS - REDMOND 3277 NW 10th • 541-548-4212 Nursery provided on Sundays ZION LUTHERAN CHURCH ELCA Worship in the Heart of Redmond Our Synagogue is located at 21555 Modoc Lane, Bend, Oregon 541-385-6421 - For more contact info: 541-728-6476 (message) Fall schedule Contemporary Worship at 8:00 AM Traditional Worship at 11:00 AM Sunday School & Bible Study at 9:30 AM 4th Grade Meets: Saturday 6:30pm and Sunday 9:00 and 10:45am ECKANKAR Religion of the Light and Sound of God Sunday, November 14, 2–3pm Dudley’s Bookstore, Downtown Bend 135 NW Minnesota Bend, Oregon TRINITY LUTHERAN CHURCH AND SCHOOL Missouri Synod • 541-382-1832 2550 NE Butler Market Road A Stephen Ministry Congregation Children’s Ministries for Infants thru 3rd grade Saturday at 6:30pm and Sunday at 9:00 and10:45am Kurios - 1st Wednesday of each month at 6:30pm We Are a Non-Denominational Egalitarian Jewish Community All are Welcome! “Spiritual Wisdom on Conquering Fear” Where does fear come from? Are you afraid of losing love, of death, of change? Learn a spiritual exercise to help conquer fear. (Child care provided on Sundays.) Evangelical Lutheran Church in America church e-mail: church@saints.org Pastor Robert Luinstra • Pastor David Carnahan All Ages Welcome School: 2550 NE Butler Mkt. Rd. 541-382-1850 • school e-mail: info@saints.org Eckankar Free introductory discussion for people of all faiths: Come worship with us. Religious Education, Hebrew program & Bar/Bat Mitzvah Training Weekly Torah Study & Adult Education Active Teen Youth Group Upcoming Events: Oct. 31 - Nov. 7 - The Scholastic Jewish Book Fair @ Shalom Bayit Co-Sponsored by Shalom Bayit and TBT Sundays: 9:00 am to 3:00 pm Monday - Thursday: 5:00 pm to 7:00 pm Sat. evening - Nov. 13 - Home Havdallah! Fri. Nov. 19 - 7 pm - Shabbat Service TEMPLE BETH TIKVAH Temple Beth Tikvah is a member of the Union for Reform Judaism. Our members represent a wide range of Jewish backgrounds. We welcome interfaith families and Jews by choice. We offer a wide range of monthly activities including social functions, services, religious education, Hebrew school, Torah study, and adult education Rabbi Glenn Ettman Friday, November 12 at 6:00 pm Erev Shabbat Services Saturday, November 13 at 9:00 am Torah Study Saturday, November 13 at 10:30 am Torah Service All services are held at the First United Methodist Church 680 NW Bond Street For the complete schedule of services go to: Join us at the JCCO, 21555 Modoc Lane, for the Scholastic Book Fair, Sundays 10/31 and 11/7, 9:00 am–3:00 pm Mon.–Thurs. 11/1–11/4, 5:00 pm–7:00 pm Sunday School, Hebrew School and Bar/Bat Mitzvah Classes For more information about our education programs, please call: David Uri at 541-306-6000 For more information condordialutheranmission Phone: 541-325-6773 GRACE FIRST LUTHERAN CHURCH 2265 NW Shevlin Park Road, Bend 541-382-6862 Youth Groups Senior Highs Mondays Middle School Wednesdays Details: gbolt@bendfp.org Through the Week: Bible study, musical groups Study groups, fellowship All are Welcome, Always! 541 382 4401 Unitarian Universalist UNITARIAN UNIVERSALISTS OF CENTRAL OREGON “Diverse Beliefs, One Fellowship” We are a Welcoming Congregation Sunday, November 7, 11:00 am Rev. Heather Starr: “Not Like the Other” We are brought up as children learning to discern what “doesn’t fit,” what is “not like the other.” We come into community as adults grateful to find others who are “like-minded.” What does it mean to respect, welcome, even yearn for diversity in our midst, while also being grateful for common views and values? Childcare and religious education the Eastern Star Grange 62855 Powell Butte Hwy (near Bend Airport) Learn more about the Unity Community of Central Oregon at or by calling 541-388-1569United Church of God United Church of Christ ALL PEOPLES UNITED CHURCH OF CHRIST Diverse spiritual journeys welcomed. United by the teachings of Christ. Come worship with us at 10 a.m. Sunday, November 7th at the Summer Creek Clubhouse 3660 SW 29th St. in Redmond. The next meeting will be Sunday, November 21st. For details, directions and possible help with car-pooling, call the church at: 541-388-2230 or, email: prisbill@earthlink.net United 8:30 am Contemporary Service 9:30 am Sunday School 11:00 am Traditional Service Sermon title “All Saints/Communion Sunday” Scripture: Luke 6:20-31 & Ephesians 1:11-23 *During the Week:* Womens Groups, Mens Groups, Youth Groups, Quilting, Crafting, Music & Fellowship. Open Hearts. Open Minds. Open Doors. Rev. Thom Larson firstchurch@bendumc.org CHURCH DIRECTORY LISTING 4 Saturdays and TMC: $105 Nursery Care provided for all services. Pastor Daniel N. LeLaCheur 5 Saturdays and TMC: Presbyterian $126 COMMUNITY PRESBYTERIAN CHURCH 529 NW 19th Street (3/4 mile north of High School) Redmond, OR 97756 (541) 548-3367 Rev. Rob Anderson, Pastor Rev. Heidi Bolt, Associate Pastor Temples A6 Saturday, November 6, 2010 • THE BULLETIN C OV ER S T OR I ES Museum Continued from A1 Soon enough, a display on entrepreneurs had to be moved so that the crisis panels could snake their way along the entire front wall of the museum. “I’ve got a few friends who think it may be going around the entire room,” said David Cowen, the hedge fund manager who now runs the museum. That might be good for business, since the financial crisis has added some sizzle to the once-sleepy museum. Attendance is expected to double this year, to 35,000, and the best-selling item in the gift shop is a poster set of the financial crisis exhibit, supplanting the silver bear and bull statues that were longtime favorites. Scent of scandal Photos by Pete Erickson / The Bulletin Newly released David Black, 26, gets a hug from his grandmother Loretta Del Rio at her home and his new home in Bend. Black plans to attend Central Oregon Community College this winter. Black Continued from A1 The charges stem from a night on Aug. 9, 2003, when a crowd gathered east of Bend for some illegal street racing. A Crook County Sheriff’s deputy showed up. The cars scattered. As they fled, Danielle O’Neil Gates, 16, lost control of her 1999 Mitsubishi Eclipse as she rounded a corner on Alfalfa Market Road. She was killed, along with Beeksma, her passenger. Prosecutors made the case that Black and Randy Clifford, his codefendant who was in a separate car from Black, raced Gates on the two-lane highway, making them culpable for her death. Clifford negotiated a plea settlement and got six months in jail. Black didn’t think a judge would find him guilty. He maintained he was miles behind Gates’ car when she crashed. He wasn’t racing her, he said. Sometimes he wished that he was the one who had died. And not because he got in trouble. But because he would have died driving his car, doing something he loved. The girls could have lived. But Black said he doesn’t feel responsible for the death of the two girls. It’s as if, he described, a person passed a car crash on the highway. “They were two young girls,” he said. “I didn’t want to see anyone get hurt. I feel bad. But I didn’t know them, and I didn’t see them crash.” That’s why he didn’t take the plea deal, he said. With seconddegree manslaughter, a Measure 11 crime, comes a mandatory 75month sentence. On Friday morning, Black finished that sentence. He won’t forget that night. He is now a convicted felon. It’s time, though, to start his life. He started serving jail time before he was convicted when he was 19 years old, a teenager. He left prison Friday morning, a young man. David Black, 26, celebrates his freedom with a chocolate milk shake with friends Friday morning at Jake’s Diner in Bend. Beeksma’s mother declined to comment. Gates’ family could not be reached for comment. Life in prison Black’s family asked Deschutes County District Attorney Mike Dugan to reduce his charges so he wasn’t subject to Measure 11 sentencing guidelines. Dugan didn’t. His family worried about his safety in a medium-security prison, though he was later moved to Deer Ridge, a minimum-security prison. Black was scared, too. In his first week in prison, he watched a guard get stabbed in the face. Everyone was doing drugs, he said. An inmate was stabbed. Black made friends with the people who could help protect him. He became known, he said, as “the guy who shouldn’t be here.” “In prison you hear a lot of ‘I’m innocent, I’m innocent,’ ” Black said. “I didn’t say that. I shouldn’t have been there (in prison). But I accepted it.” Black said if he’s mad at anyone, it’s Dugan. His family feels the district attorney used him to make an example. His happiest day in prison was the day Dugan lost his bid for re-election as district attorney, he said. In an earlier interview with The Bulletin, Dugan said Black didn’t tell the whole story. Investigators taped interviews with Black, Dugan said, who admitted to being angry when Gates passed him that night. Dugan could not be reached for comment. Black said there should have been a better solution. “There needs to be a fix for Measure 11,” he said. “They shouldn’t send a first-time offender, unless you’re a murderer or rapist, there. There had to have been an alternative for them. They send me there with murderers and rapists and gang members. That’s your best option to help correct my way of thinking?” While Black was serving time, his friends grew up. They told him when they met a new girl. They told him about their weddings. And then some of them started bringing their newborn children with them on visits. Black’s sister had a baby. And Black’s uncle died from a heart attack. His parents started living apart after nearly 30 years of marriage. Inside, his 21st birthday was unremarkable. As were the rest. Every day for him was nearly the same. The only days that really stood out were those when there was something out of the norm, a stabbing or remarkable fight. “Yeah, I missed life,” he said. “I wanted what my friends had. I wanted my career started. The college experience, the Christmases with my family. I had plans to be married, have a kid by now.” Black said he hesitated talking to the media about his release from prison. He’s ready to move on. To no longer be “that guy.” But he’s still hoping that he can overturn his felony conviction. He wants to be able to drive cars and leave the state without written permission. He wants to attend college in California and apply for jobs without having to explain that he’s a felon. Earlier Friday morning at the prison, after one final head count, Black took off his denim jeans and shirt with the word “inmate” stamped in orange. He put on a black jacket, a white T-shirt with a car on it, black jeans and red Puma sneakers. Correctional Officer Ron Schleis handed Black an Oregon voters’ guide. “Here’s your voter guide,” Schleis said. “In case you want to change the laws.” Lauren Dake can be reached at 541-419-8074 or at ldake@bendbulletin.com. Admission is $8, and passers-by are lured in by a poster board that screams “SCANDAL!” and a flag advertising the “Mu$eum” inside. The institution also offers a “Scandals and Scoundrels” walking tour that takes in scenes of Wall Street notoriety. “I’ve never found another place like this — and I’m interested in this stuff,” said Lisa Ellerton, who works in insurance and made her first visit to attend the walking tour along with her parents. The crisis is also responsible for giving the museum its director, Cowen, who worked for 14 years as a currency trader at Deutsche Bank and Bankers Trust before he started his own hedge fund. It was only when investors pulled money out of his hedge fund in 2008 that he began discussions with the museum. “If it hadn’t been for the credit crisis, it’s not an opportunity I would have looked at,” said Cowen. “I would have been managing my fund.” The museum was founded in 1989 by John Herzog, who ran a firm that was a market maker for Nasdaq stocks. An avid collector of financial memorabilia, Herzog launched the enterprise in a cramped room in the Standard Oil building on Broadway, where there was space for only a single temporary exhibit. After the New York Stock Exchange closed its own visitor center in the wake of the Sept. 11, 2001, terrorist attacks, the museum sought a bigger home so that it could take on the role of the unofficial visitors center for the Street — and one of the only museums about finance in the world. It eventually settled in on the second floor of the Bank of New York building, built in 1929 on the site where Hamilton originally founded the bank. Much of the collection is less than remarkable: vintage stock certificates, yellowed copies of the Wall Street Journal and video screens showing scenes from the stock exchange floor. A critical look The exhibits dedicated to financial misdeeds have more edge, but also pose something of a risk for an institution that relies on Wall Street donations to make its $3.3 million annual operating budget. “It’s got to be very tough for a museum on Wall Street to look at these problems,” said Gretchen Sullivan Sorin, director of the museum studies program at the State University of New York in Oneonta. The financial industry, Sorin notes, is not known for taking a critical look at itself. She recalled attending a meeting with the historian of the New York Stock Exchange. “She said, ‘I’m allowed to say anything about the history of the exchange as long as I don’t mention 1929,’” Sorin remembered with a laugh. Among the museum’s biggest donors are Wells Fargo, the New York Stock Exchange and Goldman Sachs. The latter is a featured stop on the “Scandals and Scoundrels” tour. Annaline Dinkelmann, a South African native, chooses her words carefully as she leads a group of about 20 people past Goldman’s 30-story headquarters on Broad Street. “I want to make it clear: Goldman Sachs is not guilty of any crime,” she said while standing under the brown stone archway in front of the building. “We all have our personal opinions, but Goldman had their court case against them, and they settled out of court.” Goldman Sachs declined to comment on its relationship with the museum. But a spokesman for another big donor — the NYSE — said it was happy to support public understanding of capitalism, warts and all. “The museum is an independent educational institution that examines historical themes, both positive and negative, and develops its own exhibition programs that we are proud to support,” NYSE spokesman Ray Pellechia said. Cowen, who also serves as a fundraiser for the museum, says the decision to highlight scandal has not hurt efforts to raise money. Still, he said he has received some “interesting feedback” about the exhibits from key donors. “They’re happy that we recognize the difficult times and are objective about it,” he said. “Most of them walk out with a poster set. It’s like a badge of honor: ‘I survived this thing.’” Laser Resurfacing | Fraxel | Restylane Precision Liposuction | Botox Call 541.330.6160 ‘Learned my lesson’ Black said none of his friends will illegally street race again. And neither will he. “I learned my lesson,” he said. “I would have learned my lesson with 30 days in jail.” But he’s still passionate about cars. He plans to enroll at Central Oregon Community College this winter and will take automotive classes along with computer and photography. It’s what makes him want to live, he said. For him, life is: family, friends, cars. He said he knows people expect him to say he doesn’t want to race on a track again, or that he doesn’t want to drive again. But that’s not the truth. He still loves the sound of the Integra’s engine on the straightaway. “Man, that’s fierce,” he said when the engine kicked. “That’s sexy.” “I will modify cars. I will never street race again,” he said later. Black’s grandmother, Loretta Del Rio, said she thinks it’s in her grandson’s blood. Since he was little, he was obsessed with cars. She has a long line of professional car drivers in her family. And she realizes too that it could sound insensitive after what’s happened to Beeksma and Gates. She said she thinks of the two young girls and knows she’s lucky that Black can come home. “They were both young girls and had their lives ahead of them,” she said. 1865 NE Highway 20, Bend M o n – S a t 9 –7 | S u n 1 0 – 6 541-389-1177 Expires Sunday, November 7 , 2010. C OV ER S T OR I ES THE BULLETIN • Saturday, November 6, 2010 A7 Brady Continued from A1. Photos by Mathew B. Brady / National Portrait Gallery When the Civil War began in 1861, Mathew Brady decided to step outside the formal setting of his studio. Because he was the first photographer to actually go to a battlefield and document what he found there, he is widely considered the father of modern photojournalism. Mathew Brady’s photograph of Sojourner Truth, taken in 1864. In addition to his work during the Civil War, Brady specialized in portrait photography of famous Americans. “From the first I regarded myself as under obligation to my country to preserve the faces of the historic men and mothers,” Brady said in a 1891 perhapsembellished interview in the New York World. Portraits, personality DMV Continued from A1 She also considers the protests over the DMV moving into the Brookswood Meadow Plaza to be a little hyperbolic and a classic case of “not in my backyard” opposition to new development. “They say it’s not a ‘not in my backyard issue,’ but it’s exactly a ‘not in my backyard issue,’ ” McClain said. “I agree the Brookswood Meadow Plaza might not be the best centralized location for all the citizens of Bend, but I feel that the impact on our community might be overblown. I think a good Mexican restaurant might generate just as much traffic as the DMV.” Ever since the DMV announced it was moving to the Brookswood Meadow Plaza from its current location on the north side of Bend, it has caused many in the RiverRim neighborhood to speak out. Many of their concerns have been related to increased traffic and how it would wear on the privately maintained streets, create parking problems and endanger the children who go to a nearby elementary school. The lawsuit reiterates these concerns, and expands upon them through a second plaintiff, Robert Tyler, who is the treasurer for the RiverRim Community Association. According to the lawsuit, Tyler would be adversely impacted in a number of ways by the DMV moving into his neighborhood. In addition to seeing a “deterioration in the convenience and safety of vehicular travel” in RiverRim and southwest Bend, the DMV would lead to.” Legacy-minded sense of “strangers in the neighborhood” that would leave him with a feeling of “insecurity and anxiety.” This would be further exacerbated, the lawsuit alleges, because Tyler has a 10-year-old daughter who walks or rides her bike to the Elk Meadow Elementary School that is in the vicinity of the Brookswood Meadow Plaza. Bruce White, the attorney representing Tyler and the RiverRim Community Association, did not return phone calls seeking comment Friday. Tyler and Bill Binion, the vice president of the RiverRim Community Association, refused comment and directed questions to their attorney. Officials from the DMV and DAS also refused to comment, saying they couldn’t answer questions about pending litigation. The lawsuit is just one more attempt in tactics used by opponents of the DMV to get the state to reverse its decision. Over the past several months, individuals have staged protests, organized boycotts, gathered signatures on petitions and even sent a letter to Gov. Ted Kulongoski to get the DMV to reconsider its move. So far all those maneuvers have filed. The DMV is still scheduled to open in the Brookswood Meadow Plaza in January, and there hasn’t been any indication from the state that it will try to get out of its 10-year lease for the property. RiverRim resident John Poe said he thinks the opposition to the DMV is “much ado about nothing,” and he said he’s not alone. In fact, he thinks the DMV will actually benefit the neighborhood by attracting business to the Brookswood Meadow Plaza, which today sits mostly vacant aside from a grocery store, a fitness center and a preschool. With the lawsuit, he said he now feels like the homeowners association board has overstepped its bounds. Like McClain, Poe said there should have been vote to approve legal action, especially since it could result in having additional assessments on his quarterly dues of $176.50. Since there wasn’t a vote, memo- said he thinks the RiverRim Community Association’s name should be removed from the lawsuit, and that dues from the membership should not be used to pursue what he believes is a misguided quest by a select few. “We think this is a losing matter,” Poe said. “It’s all emotion, and it’s not based at all on facts.” Nick Grube can be reached at 541-633-2160 or at ngrube@bendbulletin.com. r. Why pay retail? 541-385-5950.” Sewing & Vacuum Center As L ow As $149 New Bend Location: 2nd & Greenwood 541-382-3882 304 N.E. 3rd St. •Bend A8 Saturday, November 6, 2010 • THE BULLETIN 1-800-275-7214 1-800-275-6221 CL FACES AND PLACES OF THE HIGH DESERT Inside COMMUNITY LIFE B • Television • Comics • Calendar • LAT crossword • Sudoku • Horoscope THE BULLETIN • SATURDAY, NOVEMBER 6, 2010 JULIE JOHNSON When poverty has a face A ll of us probably know someone who lost a job in this economy. Or a home. Or both. Central Oregon, after all, has been hard-hit by the recession. Any many of us have had to scramble to get the bills paid over the past few years. New shoes have been rare. Spare change has been spent before it has a chance to accumulate in the couch cushions. With luck, our children will come out of this decade with the knowledge of the value of a dollar, but without having experienced the pain of deprivation themselves. My family, like others, is trying to walk that tricky line between teaching the kids to value what they have (even if it’s less than what we want to give them) and making sure they don’t go without what they need. We try to be honest with our sons about not being able to afford a new bicycle. But with that honesty, I hope, we offer what assurances we can that our life and home and dinner plans are stable. It’s a tough balancing act, but one I am grateful for, because our family is not among those facing real poverty. But what do you tell your kids when poverty becomes real? When the destitute aren’t strangers, but people they have met? My 8-year-old son has always been interested in panhandlers, beggars and homeless people. Before he could read, he would ask us to read their signs as we passed in our car: Family hungry, anything helps. Veteran out of job. Will work for help. He’d ask who they were, what they were doing. We’d explain as best we could in terms appropriate to a 5-, 6- or 7-yearold. Some people don’t have houses to live in. That man doesn’t have very much money. He doesn’t have a job, so he’s asking for help. Occasionally I’d pass a buck or two out of the car window. Once I bought a sack of Egg McMuffins for a pair of homeless men camped out with a sign near a McDonald’s. I was impressed by my son’s apparent empathy. He seemed to understand that the people we saw begging on street corners were suffering. He suggested we should give them money. He was sad they didn’t have homes. He was glad one had a dog with him, for company. Then one day, while riding in the car with a relative on Bend’s east side, my son saw a man on the sidewalk he recognized. His name was Chris. He had done some yardwork for a friend for a small wage, and my son had met him. But now, the man was sitting outside of the Forum Center parking lot with a cardboard sign asking for work. He had a family to feed. He needed help. Suddenly, poverty had a face. And it was the face of someone my son knew. And just as suddenly, being poor was no longer something that happened only to other people. After all, if Chris could be reduced to panhandling, my son’s logic said, could his mom or dad? Over the next few days, my son asked a lot of questions about the poor: Where do they get food? Do they live in tents? Where do they park their cars? Can we keep our house? He read with even more attention the signs held by panhandlers at street corners. “That man doesn’t have a house or any money,” he’d say. “Does Chris have a house?” I would do my best to answer his questions and reassure him of our relatively stable position in life. Chris, in fact, did have a house, or an apartment at least. But he’d sold his car to pay his bills, and he rode a bike to odd jobs and errands. This I learned from my friend. I could see the gears turn in my son’s mind, fitting this new face of poverty into his view of the world, which had, to date, not included an out-of-work acquaintance who had resorted to begging to feed his family. As sad as the circumstances of this lesson are, I am glad my son has experienced this level of empathy for those who have less than he does. My hope is that it will feed his sense of gratitude for how rich his own life is. Julie Johnson can be reached at 541383-0308 or jjohnson@bendbulletin.com. The making of a buckaroo book By David Jasper • The Bulletin T ake a fourth-generation buckaroo, several artists, a wordsmith and a printmaking studio, and what do you get? “Vaquero/Buckaroo,” a limited- edition, leather-bound book being made by hand with soy inks and archival paper. The project, says Pat Clark of printmaking studio Atelier 6000, is limited to just 75 copies, and should be complete by Dec. 15, just in time for Photos by Andy Tullis / The Bulletin ABOVE: Ron Miller rides Wasabi at Miller’s Tumalo ranch Wednesday. Miller is a fourth-generation buckaroo and inspiration for the forthcoming book “Vaquero/Buckaroo,” a collaborative effort from artists and printmakers at Atelier 6000 in Bend. Christmas. Clark, the owner of Atelier 6000 (also known as A6), says that when she arrived in Central Oregon a few years LEFT: Items going into the making of “Vaquero/Buckaroo,” including the leather-bound cover and the wooden box it will be sold in. ago from Southern California, she was intrigued by an article about the buckaroo tradition written by Sandy Anderson for High Desert Journal, a Photo courtesy Atelier 6000 literary publication based in Bend. “I was kind of enthralled by the whole history and idea of (buckaroos),” Clark says. “At that time, I thought, ‘Well, it’s such a nice vignette of culture, it would make a wonderful original book.’ ” Get the book To pre-order a limited-edition copy of “Vaquero/Buckaroo,” visit Atelier 6000, 389 S.W. Scalehouse Court, Suite 120, in Bend, or contact 541-330-8759 or. Bachelor’s school benefit tickets are now on sale SPOTLIGHT Tickets are on sale for the sixth annual Mt. Bachelor Ski for Schools fundraiser, which will run from Nov. 29 to Dec. 3. Single-day lift tickets can be purchased while supplies last through Nov. 26 for $25 from a number of local retailers, including in Sunriver, 4 Seasons Recreational Outfitters; in BELOW: Wasabi, a thoroughbredwarmblood cross, in the barn at Ron and Nye Miller’s Tumalo ranch. The hat is a staple of buckaroo attire. When Clark talked to Anderson about it, she learned the author had plenty of material she hadn’t included in that article. “Pages and pages,” a laughing Anderson recalled Monday at A6, located in the Old Mill District in Bend. The book would be based on Anderson’s interviews of Ron Miller, of Tumalo. Anderson is well-acquainted with Miller, whose wife, Nye, is an artist affiliated with A6. Additionally, Miller helped Anderson learn to train her 6-month-old wild mustang, which came to her from his brother’s ranch, and has taken her along while moving cattle. Working with Miller’s vignettes about the buckaroo lifestyle and philosophy, the project “got bigger as we went along,” she says. Among those stories are gems such as how his mother used to take “a jar of cream and tie it to (his father’s) saddle, and he’d come back with butter.” “She asked me,” Miller explained Wednesday by phone, “if I could share with her my views on what I felt buckaroos were and did, and my history with it.” See Buckaroo / B6 Bend, La-Z-Boy Furniture Gallery, Mid Oregon Credit Union, Mountain Supply, Pine Mountain Sports, Powder House, REI, Side Effect, Skjersaa’s, Vanilla, Zydeco; and in Redmond, McDonald’s, Jody’s Drive-In and Dr. Scott Burgess’ office. Mt. Bachelor donates the revenue to the education foundations for Bend-La Pine Schools and the Redmond School District. More information can be found at or www. bendlapineschoolsfoundation.org. Watch the Civil War game, raise money for chimps If you don’t have tickets to this year’s Civil War football game between the Ducks and Beavers, you can watch it instead on three giant screens at the Hooker Creek Ranch as a fundraiser for Chimps Inc., a local nonprofit wildlife sanctuary in Bend. Single-admission tickets for the Dec. 4 game are $65, and advance reservations are required. The event includes an all-you-can-eat buffet as well as a silent auction. Doors open one hour before kickoff. Contact: 541-389-5853 or www. chimps-inc.org. — From staff reports T EL EV ISION B2 Saturday, November 6, 2010 • THE BULLETIN Serious student seeks time out from chitchat Jim Belushi keeps heart in Chicago By William Lee ‘The Defenders’ Chicago Tribune Dear Abby: I’m a junior in high school and taking multiple AP. I don’t neglect my friends. I spend hours outside of school with them every week. But they don’t understand that I’m more focused on academics and long-term goals than my short-term social life. How can I get them to leave me alone when I’m working? — Focused on My Goals in Los Angeles Dear Focused on Your Goals:. Dear Abby: I am a 34-year-old woman and still single. Many people like me enjoy their lives, but I don’t. I long to be married and to have a family. But because of my failures in the dating world, I’m not optimistic circumstances like mine. — Single Still in Little Rock Dear Single Still: Please do not resign yourself to singlehood quite yet. People are settling down and marrying later today for many reasons. Because you mentioned that the thought of marriage and family “later in life” frightens you, DEAR ABBY my inclination is to suggest that you discuss it with a therapist to see whether your fear may have been instrumental in causing your relationships to fail. However, because you’re requesting reader input regarding late marriage, I’m sure we’ll hear from them, generously sharing their experiences. I know couples who married later in life, and they are compatible and happy. Readers, what do you have to say? Dear Abby: I was recently promoted to a new position at work, doing something I have always wanted to do. My supervisor and I are very different — almost polar opposites, in fact. But we get along great and work well together. Because we have started working more closely, she is beginning to consider me her friend, asking me to “hang out” and occasionally offering me recreational drugs. I love working with her, but I don’t want to “hang out” because of our differences. If something were to go wrong, it would affect our work relationship. How do I keep things strictly professional without offending her? — Wary Assistant in Arizona Dear Wary Assistant: By telling her (with a smile) that your time to socialize is extremely limited and, as much as you enjoy working with her, you prefer to keep your work relationships strictly professional. And should the woman offer you a controlled substance, simply say, “No, thank you.” Dear Readers: Daylight saving time ends at 2 a.m. Sunday. Don’t forget to turn your clocks back one hour before going to bed.. CHICAGO — Leave it to hometown boy Jim Belushi to find a way to work the Chicago Bears fight song into a legal dramedy set in Las Vegas. In a recent episode of “The Defenders,” local viewers got a chance to see Belushi’s Chicago-raised character, Nick Morelli, belt out “Bear Down, Chicago Bears.” The storyline revolved around the planned theft of a Super Bowl ring that belonged to Bears Hall of Famer Mike Singletary. In another episode, after punching a villainous character from Detroit, Morelli derides the downed man for the Red Wings’ “stealing (Chris) Chelios from the Blackhawks.” The Second City alum and kid brother to John “Joliet Jake” Belushi wasn’t coy about injecting his love of all things Chicago into the story. “You know, I have an influence,” Belushi joked during a recent break from filming of the show he called a “courtroom drama on steroids.” Chicago, Belushi said, is “where I’m connected, and it’s where my sense of humor is rooted. When you draw back on experiences and things, you go back to what you’re connected to.” The Wheaton, Ill., native’s extended return to network television after his eight-year run playing lovable lout Jim Orenthal on ABC’s “According to Jim” was uncertain until CBS executives ordered additional episodes of the popular yet critically maligned series. “The Defenders” is averaging about 11 million viewers each week in its 10 p.m. time slot, besting NBC’s “Law and Order: Los Angeles,” according to the latest Nielsen ratings. While the show has received some bad press, criticizing it as contrived or uninteresting, When: 10 p.m. Wednesdays Where: CBS McClatchy Tribune News Service Jim Belushi, left, stars as Nick Morelli, and Jerry O’Connell stars as Pete Kaczmarek in the CBS drama “The Defenders.” Belushi is upfront that he’d much rather be popular than critically acclaimed. “In TV, when you get great reviews, it’s a ... death knell,” Belushi said, quickly pointing to Fox’s critical darling “Lone Star,” canceled after only two airings. “To have 11 million people watch your show when there’s 85 critics writing about you. It’s like, ‘Guys, sorry. I love you, I love how hard you work, but it doesn’t matter,’ ” he said. “I’m not looking for you guys’ approval; I’m looking for 11 million (viewers’) approval.” Belushi’s Morelli co-heads a flashy, if slightly bottom-feeding, Vegas law firm with brash, young partner Pete Kaczmarek, played by Jerry O’Connell. Belushi’s character is a shark with a velvet touch; a wry-smiling, smooth-operating defense attorney who wears his blue-collar background and simple values as well as he wears his fine Italian suits. Belushi said he spent time with the Vegas legal team the show is based on, as well as in real courtrooms. Attorney Michael Cristalli, half of the real-life Las Vegas defense team the show is based on, and Local Service. Local Knowledge. 541-848-4444 541-706-6900 Bend • 2150 NE Studio Rd. Featured Business of the Week: lunch dinner tasty Hospice Home Health Hospice House Transitions Self Referrals Welcome 541-389-9252 the model for Belushi’s character, said he was excited with Belushi’s portrayal. He and law partner Marc Saggese are frequently on the show set, giving advice to producers and actors. “He’s done such an incredible job and I’m thrilled,” Cristalli said of Belushi. “He is the leading force behind the success of the show.” “The guy I’m playing has got great bedside manners and is very charming,” Belushi said. “From his point of view, your whole job is to win the jury. So everything is a performance.” This incarnation of “The Defenders” changes course from the high-minded, yet controversial 1960s series of the same name, starring E.G. Marshall and Robert Reed as a crusading fatherson legal team fighting to right legal wrongs. Morelli and Kaczmarek, aided by their associate (Jurnee Smollett, “Friday Night Lights”), also fight the good fight for their clients, but the lighthearted tone of the show is much more “Boston Legal” than “Perry Mason.” Belushi said the transition from a family sitcom to a drama wasn’t difficult, considering his work in Michael Mann’s “Thief” and, more recently, his role in Roman Polanski’s “The Ghost Writer.” “I’ve always considered myself an actor, and as an actor, I look at it as a plumber,” he said. “I can go in a small house and fix the sink, or I can go in a massive commercial site and lay all kinds of pipes. To me, it’s just a different venue, that’s all.” 541-322-CARE 1000 SW Disk Dr. • Bend • 541.382.5882 EQUAL HOUSING LENDER 2754 northwest crossing drive 541 385 1777 • portellowinecafe.com BD-Bend/Redmond/Sisters/Black Butte (Digital); PM-Prineville/Madras; SR-Sunriver; L-La Pine; * Sports programming may vary SATURDAY PRIME TIME 11/6/10 BROADCAST/CABLE CHANNELS BD PM SR L ^ KATU KTVZ % % % % KBNZ & KOHD ) ) ) ) KFXO * ` ` ` , , KPDX KOAB _ # _ # ( KGW KTVZDT2 , CREATE 3-2 3-2 3-2 OPB HD 3-1 3-1 3-1 3-1 5:00 5:30 6:00 6:30 College Football Arizona at Stanford Grey’s Anatomy ‘14’ Å News Nightly News The Unit Dedication ’ ‘PG’ Å KOIN Local 6 at 6 Evening News College Football Arizona at Stanford NUMB3RS Card counters. ‘PG’ Å Bones Serial killer strikes. ‘14’ Å Old Christine Old Christine PDXposed ‘G’ Green Econ. This Old House The Lawrence Welk Show ‘G’ Last of the Wine News News Nightly News Straight Talk ›› “The Transporter” (2002, Action) Jason Statham, Shu Qi. Å Am. Woodshop Yankee Shop Woodsmith Shop Amer. Woodshop This Old House The Lawrence Welk Show ‘G’ Last of the Wine 7:00 Jeopardy! ‘G’ Old Christine 7:30 Wheel of Fortune Old Christine Criminal Minds Ashes and Dust ‘14’ The Office ’ ‘14’ The Office ’ ‘14’ Travels-Edge Steves Europe Inside Edition Grants Getaways That ’70s Show That ’70s Show Yankee Shop Am. Woodshop Travels-Edge Steves Europe 8:00 8:30 Paid Program Outlaw In Re: Kelvin Jones (N) ‘14’ NCIS Jack Knife ’ ‘PG’ Å College Football Cops (N) ‘PG’ Cops ‘PG’ Å Da Vinci’s Inquest ‘14’ Å Globe Trekker The Balkans ’ ‘G’ Outlaw In Re: Kelvin Jones (N) ‘14’ House The Jerk ’ ‘14’ Å Yankee Shop Yankee Shop Globe Trekker The Balkans ’ ‘G’ 9:00 9:30 Comedy.TV ’ ‘14’ Å Law & Order: Los Angeles ’ ‘14’ The Defenders ’ ‘14’ Å Entourage ‘MA’ Curb Enthusiasm America’s Most Wanted NUMB3RS Card counters. ‘PG’ Å As Time Goes By Ladies of Letters Law & Order: Los Angeles ’ ‘14’ House Human Error ’ ‘14’ Å Am. Woodshop Woodsmith Shop As Time Goes By Ladies of Letters 10:00 10:30 Jeopardy! ‘G’ Wheel of Fortune Law & Order: Special Victims Unit 48 Hours Mystery (N) ’ Å The Closer Mom Duty ‘14’ Å News Channel 21 Two/Half Men NUMB3RS In Plain Sight ‘PG’ Å New Tricks Riverboat disaster. Å Law & Order: Special Victims Unit House of Payne House of Payne Woodturning Yankee Shop New Tricks Riverboat disaster. Å 11:00 11:30 KATU News at 11 Comedy.TV ‘14’ News Sat. Night Live News (11:35) Cold Case College Football Ugly Betty ‘PG’ Fringe The Plateau ‘14’ Å South Park ‘14’ South Park ‘14’ Masterpiece Mystery! ’ ‘PG’ Å News Sat. Night Live Stargate Universe Time ‘PG’ Å Am. Woodshop Yankee Shop Bounty Hunter Bounty Hunter Bounty Hunter Bounty Hunter Dog the Bounty Hunter ‘PG’ Å Dog the Bounty Hunter ‘PG’ Å Bounty Hunter Bounty Hunter Bounty Hunter Bounty Hunter 130 28 8 32 Bounty Hunter (4:30) ››› “Superman Returns” (2006, Adventure) Brandon Routh, Kate Bosworth, James Marsden. The Man of Steel faces an ›› “Jeepers Creepers” (2001, Horror) Gina Philips, Justin Long, Jonathan Breck. A ›› “Jeepers Creepers 2” (2003, Horror) Ray Wise, Jonathan Breck, Garikayi Mutam102 40 39 old enemy. Å flesh-eating entity pursues sibling college students. Å birwa. A winged creature terrorizes stranded high schoolers. Shark Feeding Frenzy ’ ‘PG’ Å Dogs 101 ’ ‘PG’ Å Dogs 101 Meet the Komondor. ‘PG’ Pit Bulls and Parolees ’ ‘PG’ Pit Bulls and Parolees (N) ’ ‘PG’ Pit Bulls and Parolees ’ ‘PG’ Å 68 50 12 38 Crocodile Feeding Frenzy ‘14’ Å The Millionaire Matchmaker ’ ‘14’ The Millionaire Matchmaker ’ ‘14’ Kathy Griffin:... on Crutches ‘14’ ››› “The 40-Year-Old Virgin” (2005) Steve Carell. Three co-workers unite to help their buddy get a sex life. ››› “The 40-Year-Old Virgin” 137 44 ››› “Rocky II” (1979) Sylvester Stallone. Underdog Philly fighter gets another shot at heavyweight champ. ››› “Rocky III” (1982, Drama) Sylvester Stallone, Mr. T. Premiere. ’ 190 32 42 53 (4:00) ›››› “Unforgiven” (1992) Clint Eastwood, Gene Hackman. ’ The Suze Orman Show (N) Å Til Debt-Part Til Debt-Part American Greed The Suze Orman Show Å Til Debt-Part Til Debt-Part NO DIETS! Zumba Body 51 36 40 52 American Greed Larry King Live ‘PG’ Charlie Sheen Newsroom Easy Prey Larry King Live ‘PG’ Newsroom Easy Prey 52 38 35 48 Easy Prey (N) ›› “Harold & Kumar Go to White Castle” (2004) John Cho. Å ›› “Harold & Kumar Escape From Guantanamo Bay” (2008) Kal Penn. (11:15) › “Strange Wilderness” 135 53 135 47 ››› “Napoleon Dynamite” (2004, Comedy) Jon Heder, Jon Gries. Å High Desert Paid Program Get Outdoors Visions of NW Joy of Fishing Epic Conditions Outside Film Festival Outside Presents Paid Program Bend on the Run Ride Guide ‘14’ City Edition 11 American Perspectives C-SPAN Weekend 58 20 98 11 American Perspectives Wizards-Place Hannah Forever Hannah Forever Suite/Deck Suite/Deck “Camp Rock 2: The Final Jam” (2010) Demi Lovato, Kevin Jonas. ‘G’ Sonny-Chance Sonny-Chance Sonny-Chance Sonny-Chance 87 43 14 39 Wizards-Place Meth Nation ’ ‘14’ Å Cocaine Nation ’ ‘14’ Å Unusual Suspects Cold-Blooded ‘14’ Double Life ’ ‘PG’ Å I (Almost) Got Away With It ’ ‘14’ Unusual Suspects Cold-Blooded ‘14’ 156 21 16 37 American Loggers ’ ‘PG’ Å SportsCenter (Live) Å SportsCenter (Live) Å College Football Final (Live) Å SportsCenter (Live) Å SportsCenter Å 21 23 22 23 (4:00) College Football Arkansas at South Carolina (Live) College Football Scoreboard Å NBA Tonight NASCAR Racing College Football 22 24 21 24 College Football Texas at Kansas State (Live) Boxing: 2007 Peter vs. Toney Boxing: 2007 Rivera vs. Simms 2004 World Series of Poker Å 2004 World Series of Poker Å 2004 World Series of Poker Seven-card stud, from Las Vegas. Å 23 25 123 25 Boxing: 2002 Diaz vs. Margarito ESPNEWS (Live) ESPNEWS (Live) ESPNEWS (Live) ESPNEWS (Live) ESPNEWS (Live) ESPNEWS (Live) Highlight Express Highlight Express Highlight Express Highlight Express Highlight Express Highlight Express Highlight Express Highlight Express 24 63 124 ››› “Back to the Future Part II” (1989, Comedy) Michael J. Fox, Christopher Lloyd. Å ››› “Back to the Future Part III” (1990, Comedy) Michael J. Fox, Christopher Lloyd. Å ››› “Dirty Dancing” (1987) Å 67 29 19 41 (3:30) ››› “Back to the Future” Campaign ’08: Fight to the Finish Geraldo at Large ’ ‘PG’ Å Jrnl Edit. Rpt Fox News Watch Red Eye Geraldo at Large ’ ‘PG’ Å Campaign 2010: Fight to the Finish 54 61 36 50 Huckabee Challenge Bobby Flay Food Feuds Diners, Drive Diners, Drive Diners, Drive Diners, Drive Diners, Drive Diners, Drive Iron Chef America 177 62 46 44 Iron Chef America College Football Arizona State at USC (Live) Seahawks Pac-10 Hoops 20 45 28* 26 (4:00) College Football Oklahoma at Texas A&M (Live) ››› “Kung Fu Panda” (2008) Voices of Jack Black, Angelina Jolie. Two/Half Men Two/Half Men Two/Half Men Two/Half Men Always Sunny Always Sunny ›› “Alvin and the Chipmunks” (2007, Comedy) Jason Lee, David Cross. 131 Color Splash: Mi Designed to Sell Designed to Sell Hunters Int’l House Hunters Divine Design ‘G’ Color Splash: Mi Dear Genevieve Curb/Block House Hunters House Hunters Hunters Int’l Hunters Int’l 176 49 33 43 Dear Genevieve Modern Marvels ‘PG’ Å Marijuana: A Chronic History ‘PG’ Å The True Story of Killing Pablo ‘14’ Å 155 42 41 36 ’70s Fever ‘PG’ Å ››› “The Sisterhood of the Traveling Pants” (2005) Amber Tamblyn. ›› “Never Been Kissed” (1999) Drew Barrymore, David Arquette. Å The Fairy Jobmother ‘PG’ Å 138 39 20 31 ››› “Akeelah and the Bee” (2006, Drama) Laurence Fishburne. Å Lockup Inside San Quentin Lockup: Raw Doomed Decisions (N) Lockup Folsom State Prison. Lockup Return to Valley State Lockup Utah State Prison Lockup Inside Anamosa 56 59 128 51 Lockup: Pendleton 16 and Pregnant ’ ‘14’ Å ››› “Freedom Writers” (2007, Drama) Hilary Swank, Patrick Dempsey, Scott Glenn. ’ World of Jenks Pranked ’ ‘14’ Megadrive ’ 192 22 38 57 Teen Mom Check Up With Dr. Drew Dr. Drew checks in. ’ ‘PG’ Å SpongeBob SpongeBob SpongeBob SpongeBob SpongeBob iCarly iCook ‘G’ iCarly iPie ’ ‘G’ iCarly ‘G’ Å True Jackson, VP George Lopez ’ George Lopez ’ The Nanny ‘PG’ The Nanny ‘PG’ 82 46 24 40 SpongeBob (7:06) ›› “Rambo: First Blood Part II” (1985) Sylvester Stallone. ’ (9:08) ›› “Rambo” (2008, Action) Sylvester Stallone, Julie Benz. ’ (11:10) ››› “First Blood” (1982) 132 31 34 46 (5:04) ››› “First Blood” (1982) Sylvester Stallone, Richard Crenna. ’ › “The Reaping” (2007, Horror) Hilary Swank, David Morrissey. Å “Messengers 2: The Scarecrow” (2009) Norman Reedus. Premiere. Å “Hallowed Ground” (2007, Horror) 133 35 133 45 “Children of the Corn” (2009) Kandyse McClure, David Anders. ‘MA’ Å (2:00) Praise-A-Thon Biannual fundraising event. Praise-A-Thon Biannual fundraising event. 205 60 130 Love-Raymond King of Queens King of Queens Seinfeld ’ ‘PG’ Seinfeld ’ ‘PG’ ›› “Dumb & Dumber” (1994, Comedy) Jim Carrey, Jeff Daniels. Å ›› “Dumb & Dumber” (1994, Comedy) Jim Carrey, Jeff Daniels. 16 27 11 28 Love-Raymond ››› “Mutiny on the Bounty” (1962, Adventure) Marlon Brando, Trevor Howard, Richard Harris. Fletcher Christian and the crew (8:15) ›› “Pagan Love Song” (1950, Musical) Esther Williams, (9:45) ›› “The Tuttles of Tahiti” (1942, Comedy) Charles Laughton, Jon Hall, Peggy ››› “The Hur101 44 101 29 dump Captain Bligh. Å Howard Keel, Rita Moreno. Å Drake. A fun-loving family lives a charmed life on a small island. ricane” (1937) LA Ink Kat in Wonderland ‘PG’ Å Strange Sex ‘14’ Strange Sex ‘MA’ Strange Sex ‘14’ Strange Sex ‘MA’ Strange Sex ’ ‘MA’ Å Strange Sex ‘MA’ Strange Sex ‘MA’ Strange Sex ‘14’ Strange Sex ‘MA’ 178 34 32 34 LA Ink Kat Minus Sixx ’ ‘PG’ Å ››› “Kill Bill: Vol. 1” (2003, Action) Uma Thurman, Lucy Liu. Å (9:15) ››› “Kill Bill: Vol. 2” (2004) Uma Thurman. An assassin confronts her former boss and his gang. Å 17 26 15 27 (4:30) ›› “Shooter” (2007) Mark Wahlberg, Michael Peña. Å Codename: Kid Codename: Kids Adventure Time Total Drama Total Drama Scooby-Doo ›› “Flubber” (1997, Comedy) Robin Williams, Marcia Gay Harden. King of the Hill King of the Hill American Dad ’ American Dad ’ 84 Extreme Pools ‘G’ Å Extreme Resorts ‘G’ Å Most Terrifying Places in America 3 Most Terrifying Places in America 4 Mysteries at the Museum ‘PG’ Å Ghost Stories Ghost Stories 179 51 45 42 Extreme Terror Rides ‘G’ Å Andy Griffith (6:13) The Andy Griffith Show ‘G’ Andy Griffith Andy Griffith (7:56) M*A*S*H (8:27) M*A*S*H Love-Raymond Love-Raymond Love-Raymond Love-Raymond Love-Raymond Love-Raymond 65 47 29 35 Andy Griffith ›› “Bad Boys II” (2003) Martin Lawrence, Will Smith. Two detectives battle a drug kingpin in Miami. Å ›› “Street Kings” (2008, Crime Drama) Keanu Reeves, Forest Whitaker. Premiere. Å House Help Me ’ ‘14’ Å 15 30 23 30 (3:00) Bad Boys Saturday Night Live ’ ‘14’ Å Entourage ‘MA’ (7:35) Entourage (8:10) Entourage (8:45) Entourage (9:15) Entourage (9:45) Entourage ’ ‘MA’ Å (10:20) Entourage (10:55) Entourage Dickie Roberts 191 48 37 54 Saturday Night Live ’ ‘14’ Å PREMIUM CABLE CHANNELS (4:10) ››› “G.I. Jane” 1997 Demi Moore. ‘R’ Å (6:20) ›› “Bedtime Stories” 2008 Adam Sandler. ‘PG’ ››› “Casino” 1995 Robert De Niro. A mob employee makes a play for power in 1970s Las Vegas. ’ ‘R’ Å ››› “The Rookie” 2002 ‘G’ Å ›› “A Life Less Ordinary” 1997 Ewan McGregor, Holly Hunter. ‘R’ Å ›› “The Vanishing” 1993, Suspense Jeff Bridges, Nancy Travis. ‘R’ Å ›› “A Life Less Ordinary” 1997 Ewan McGregor, Holly Hunter. ‘R’ Å ›› “The Vanishing” 1993 ‘R’ Å Bowl B Q Vert Challenge Insane Cinema: The Arena Insane Cinema Cubed ‘14’ Bowl B Q Vert Challenge Insane Cinema: The Arena Insane Cinema Cubed ‘14’ Thrillbillies ‘14’ Thrillbillies ‘14’ PGA Tour Golf Trump’s Fabulous World of Golf European PGA Tour Golf HSBC Champions, Final Round (Live) European PGA Tour Golf HSBC Champions, Final Round (Live) “Class” (2010, Drama) Jodi Lyn O’Keefe, Justin Bruening. ‘PG’ Å “An Old Fashioned Thanksgiving” (2008) Jacqueline Bisset. ‘PG’ Å ›› “A Family Thanksgiving” (2010) Daphne Zuniga. Premiere. ‘PG’ Å ›› “A Family Thanksgiving” ‘PG’ Boardwalk Empire Margaret and Van (10:45) 24/7 Pac- (11:15) Boxing Zab Judah vs. Lucas Mat›› “The Box” 2009, Horror Cameron Diaz, James Marsden. A mysterious gift bestows ››› “Avatar” 2009, Science Fiction Sam Worthington, Voice of Zoe Saldana. Premiere. A former Marine HBO 425 501 425 10 Alden undermine Nucky. ‘MA’ Å riches and death at the same time. ’ ‘PG-13’ Å falls in love with a native of a lush alien world. ’ ‘PG-13’ Å quiao/Margarito thysse, Junior Welterweights ’ ››› “Grindhouse Presents: Planet Terror” 2007 ‘R’ (8:45) ››› “Grindhouse Presents: Death Proof” 2007 Kurt Russell. ‘NR’ (10:45) ›› “City of Ghosts” 2002 Another Day ›› “City of Ghosts” 2002, Crime Drama Matt Dillon, James Caan. ‘R’ IFC 105 105 ›› “A Perfect Getaway” 2009, Suspense Steve Zahn. Honey- (6:40) ››› “Beverly Hills Cop” 1984, Comedy-Drama Eddie Murphy. A Detroit cop ›› “The Time Traveler’s Wife” 2009 Rachel McAdams. A time-traveler keeps moving › “Bride Wars” 2009 Kate Hudson. Weddings scheduled the MAX 400 508 7 mooning hikers find terror in paradise. ’ ‘R’ Å goes west to avenge his friend’s death. ’ ‘R’ Å same day turn best friends into enemies. ‘PG’ in and out of the life of his true love. ‘PG-13’ Å Expedition Great White ‘PG’ Border Wars No End in Sight ‘PG’ Border Wars A raid in Puerto Rico. Expedition Great White ‘PG’ Border Wars No End in Sight ‘PG’ Border Wars A raid in Puerto Rico. Explorer DEA sting operation. ‘PG’ NGC 157 157 Back, Barnyard Back, Barnyard Planet Sheen ‘Y7’ T.U.F.F. Puppy SpongeBob SpongeBob Tigre: Rivera Tigre: Rivera Avatar-Last Air Avatar-Last Air Glenn Martin Jimmy Neutron The Secret Show The Secret Show NTOON 89 115 189 Tracks, Africa The Season Raglin Outdoors Ultimate Hunting High Places Lethal Wild and Raw Jimmy Big Time Ted Nugent Craig Morgan Western Extreme High Places Buck Commander Best of West OUTD 37 307 43 ›› “Transporter 3” 2008, Action Jason Statham, Natalya Rudakova. iTV. Frank Martin Inside the NFL (iTV) ’ ‘PG’ Å The Big C An un- Weeds Viking Pride Jamie Kennedy: Uncomfortable (iTV) Boxing Juan Manuel Lopez vs. Rafael Marquez (iTV) Lopez battles Marquez for the SHO 500 500 becomes involved with a Ukrainian woman. ’ ‘PG-13’ usual lunch. ‘MA’ ‘MA’ Å (N) ’ ‘MA’ Å WBO featherweight title. From Las Vegas. World of Outlaws Charlotte From Charlotte Motor Speedway in Concord, N.C. (Live) World of Outlaws Charlotte From Charlotte Motor Speedway in Concord, N.C. SPEED 35 303 125 (2:50) ›› 2012 (5:35) ›› “The Crazies” 2010, Horror Timothy Olyphant. ‘R’ (7:20) ››› “Up” 2009 Voices of Ed Asner. ‘PG’ ››› “The Imaginarium of Doctor Parnassus” 2009 Heath Ledger. (11:05) ›› “2012” 2009 ‘PG-13’ STARZ 300 408 300 (3:55) › “Gigantic” (5:35) Battle of the High School Musicals: Guys ’n’ Divas (7:10) › “The Spirit” 2008, Action Gabriel Macht, Samuel L. Jackson. A rookie cop, “Maneater” 2009 Sarah Chalke. A 32-year-old Hollywood social- (10:35) “Dismal” 2009 Bill Oberst Jr. A deranged cannibal terrorTMC 525 525 2008 ’ ‘R’ believed to be dead, fights crime in Central City. ’ ‘PG-13’ ’ ‘PG’ Å ite hatches a plan to snare a filmmaker. ‘NR’ izes students trekking through a swamp. ‘R’ (4:00) College Football Oregon State at UCLA (Live) The T.Ocho Show UFL Football Sacarmento Mountain Lions at Las Vegas Locomotives (Live) Whacked Out Whacked Out VS. 27 58 30 (3:30) ›› “Where the Heart Is” Downsized Down But Not Out ‘PG’ (7:02) The Locator (N) ‘14’ Å Downsized Down But Not Out ‘PG’ The Locator Desperate Mothers ‘14’ ››› “The First Wives Club” 1996, Comedy Goldie Hawn. ‘PG’ Å WE 143 41 174 ENCR 106 401 306 FMC 104 204 104 FUEL 34 GOLF 28 301 27 HALL 66 33 18 33 THE BULLETIN • Saturday, November 6, 2010 B3 CALENDAR TODAY VFW BREAKFAST: Community breakfast with biscuits and gravy, sausage, ham, eggs, coffee and more; $7, $6 seniors and children; 810 a.m.; VFW Hall, 1503 N.E. Fourth St., Bend; 541-389-0775. INDOOR SATURDAY SWAP: Sale of toys, tools, clothes, jewelry and more; free admission; 9 a.m.-4 p.m.; Indoor Swap Meet, 401 N.E. Second St., Bend; 541-317-4847. LORD’S ACRE DAY: The 64th annual event features a sale of crafts, baked goods and novelties, live music, a barbecue dinner, an auction, 10K run, 5K walk and more; proceeds benefit Powell Butte Christian Church projects; free admission, $7 barbecue, $15-$27 to race; 7:30 a.m. registration, 9 a.m. events; Powell Butte Christian Church, 13720 S.W. State Highway 126; 541-548-3066 or. INFORMED FAMILY FAIR: Learn about resources and products for family welfare and child safety and development; proceeds benefit local nonprofits; $3, $6 for family; 10 a.m.-3 p.m.; Kiddoz Inc. Indoor Play Center, 222 S.E. Reed Market Road, #100, Bend; 541-312-4742 or kiddoz@bendbroadband.com. WILDFIRE POTTERY SHOWCASE: The Clay Guild of the Cascades hosts an event of continuous ceramic demonstrations, potter booths with pieces for sale and more; donations benefit Arts Central and food collections benefit NeighborImpact; free admission; 10 a.m.-5 p.m.; Highland Magnet School, 701 N.W. Newport Ave., Bend; 541-633-3403 or. THE NATURE OF WORDS: Featuring a lecture by David Whyte; $35; 11:30 a.m.; Central Oregon Community College, Pinckney Center for the Arts, 2600 N.W. College Way, Bend; 541647-2233, info@thenatureofwords. org or. HOEDOWN FOR HUNGER: Featuring live Americana, folk and bluegrass music, a chili feed and more; donations of survival gear requested; proceeds benefit the center’s Feed the Hungry program; $10, $5 ages 6-12, free ages 5 and younger; noon10 p.m.; Bend’s Community Center, 1036 N.E. Fifth St.; 541-312-2069. MOM AND KID ITEM SWAP: Pick out used clothing, toys and household items; free; 1-3 p.m.; The Jireh Project, 2330 N.E. Division St., Suite 1, Bend; 541-678-5669. AUTHOR PRESENTATION: Saralee Lawrence talks about her book “River House”; free; 5 p.m.; Sunriver Books & Music, Sunriver Village Building 25C; 541-593-2525. THE NATURE OF WORDS: Featuring a wine reception, author dinner and author readings on “The Sacred and the Profane”; with keynote speaker Sam Waterston; $70 or $100; 5:30 p.m.; High Desert Museum, 59800 S. U.S. Highway 97, Bend; 541-6472233, info@thenatureofwords.org or. BETHLEHEM INN BEER DINNER: A five-course gourmet dinner prepared by local chefs; proceeds benefit Bethlehem Inn; $80; 6 p.m.; Deschutes Brewery, 901 S.W. Simpson Ave., Bend; 541-385-8606. GREEN AND GOLD GALA: Fourth annual event features dinner, dancing and live and silent auctions; proceeds benefit Sisters Elementary School; $25; 6 p.m.; Aspen Lakes Golf & Country Club, 16900 Aspen Lakes Drive, Sisters; 541-948-9722. AUTHOR PRESENTATION: Robin Cody talks about “Another Way the River Has”; free; 6:30 p.m.; Paulina Springs Books, 252 W. Hood Ave., Sisters; 541-549-0866. BIG BROTHERS BIG SISTERS COMEDY BENEFIT: Comedy event featuring Darren Capozzi and Jodi Miller; with food and live and silent auctions; proceeds benefit Big Brothers Big Sisters of Central Oregon; $100; 7 p.m.; Tower Theatre, 835 N.W. Wall St., Bend; 541-3170700 or. BRYON FRIEDMAN: The soulful singer-songwriter performs, with Franchot Tone and Justin Lavik; free; 7 p.m.; McMenamins Old St. Francis School, 700 N.W. Bond St., Bend; 541-382-5174 or. com. STUDENT-DIRECTED ONE-ACT PLAYS: The Redmond High School drama department presents four student-directed comedies; $4; 7 p.m.; Redmond High School, 675 S.W. Rimrock Way; 541-923-4800.. GREAT AMERICAN TAXI: The Boulder, Colo.-based Americana musicians perform; $10; 9 p.m.; Silver Moon Brewing & Taproom, 24 N.W. Greenwood Ave., Bend; 541-388-8331 or www. silvermoonbrewing.com. THE NEW UP: The San Franciscobased psych indie rock band play; free admission; 9 p.m.; MadHappy Lounge, 850 N.W. Brooks St., Bend; 541-388-6868. SUNDAY WILDFIRE POTTERY SHOWCASE: The Clay Guild of the Cascades hosts an event of continuous ceramic demonstrations, potter booths with pieces for sale and more; donations benefit Arts Central and food collections benefit NeighborImpact; free admission; 10 a.m.-4 p.m.; Highland Magnet School, 701 N.W. Newport Ave., Bend; 541-633-3403 or. SECOND SUNDAY: Paulann Petersen reads from her works; followed by an open mic; free; 11 a.m.; Bend Public Library, Brooks Room, 601 N.W. Wall St.; 541-312-1034 or. org/calendar. THE NATURE OF WORDS: Featuring a reading by Paulann Petersen, followed by an open mic; free; 11 a.m.; Bend Public Library, 601 N.W. Wall St.; 541-647-2233, info@thenatureofwords. org or www. thenatureofwords.org. FIDDLERS JAM: Listen or dance at the Oregon Old Time Fiddlers Jam; donations accepted; 1-3:30 p.m.; Pine Forest Grange, 63214 N.E. Boyd Acres Road, Bend; 541-4475451. BUNCO PARTY: Featuring games, prizes and refreshments; proceeds benefit Prineville Habitat for Humanity; $5; 2 p.m.; Eagles Lodge & Club, 235 N.E. Fourth St., Prineville; 541-447-7659. CENTRAL OREGON SYMPHONY FALL CONCERT: The Central Oregon Symphony performs a fall concert, under the direction of Michael Gesme; featuring piano soloist Robert Thies; free but a ticket is required; 2 p.m.; Bend High School, 230 N.E. Sixth St.; 541317-3941 or www. cosymphony.com. STAR TREK LIVE: Help Capt. Kirk and Mr. Spock fend off aliens and discover how science, technology and imagination can save the world; $20, $14 ages 12 and younger; 2 p.m.; Tower Theatre, 835 N.W. Wall St., Bend; 541-317-0700 or www. towertheatre.org. THE BELLS OF SUNRIVER IN CONCERT: Concert featuring The Bells of Sunriver play songs from the movies; free; 3 p.m.; Holy Trinity Church, 18143 Cottonwood Road; 541-593-1635.. 5677.. TUESDAY “EAT, DRINK & BE DEADLY”: Buckboard Productions presents an interactive murder mystery theater event; $15 plus fees in advance, $20 at the door; 6 p.m.; The Summit Saloon & Stage, 125 N.W. Oregon Ave., Bend; 541-350-0018 or. WINDANCE HOUSE CONCERT: Ashland-based indie-folk trio Kites and Crows perform; call for Bend location; $15 in advance, $17 at the door; 7 p.m., doors open 6:30 p.m.; 541-306-0048. BODY VOX-2: The Portland-based dance ensemble performs; $20 or $25; 7:30 p.m.; Tower Theatre, 835 N.W. Wall St., Bend; 541-317-0700 or. KELLI SCARR: The New York-based indie-folk musician performs, with Anastacia Beth Scott; $7; 8 p.m.; Silver Moon Brewing & Taproom, 24 N.W. Greenwood Ave., Bend; 541-388-8331 or www. silvermoonbrewing.com. WEDNESDAY “OUT IN THE SILENCE”: A screening of the film about the difficulties gay, lesbian, bisexual and transgender people experience in small-town America; with a discussion with the director; free; 3-5 p.m.; Redmond Public Library, 827 S.W. Deschutes Ave.; 541383-7412. “OUT IN THE SILENCE”: A screening of the film about the difficulties gay, lesbian, bisexual and transgender people experience in small-town America; with a discussion with the director; free; 6-9 p.m.; Central Oregon Community College, Hitchcock Auditorium, 2600 N.W. College Way, Bend; 541-383-7412. “THE METROPOLITAN OPERA, BORIS GODUNOV”: Starring Rene Pape, Aleksandrs Antonenko and Ekaterina Semenchuk in an encore presentation of Mussorgsky’s masterpiece; opera performance transmitted in high definition; $18; 6:30 p.m.; Regal Old Mill Stadium 16, 680 S.W. Powerhouse Drive, Bend; 541-382-6347. “BUTTE BAGGIN’ II”: A screening of the ski film featuring descents on local mountains; free; 7 p.m.; The Environmental Center, 16 N.W. Kansas Ave., Bend; 919-389-1088. 18 SWITCHBACKS: The Coloradobased Americana band performs; free; 7 p.m.; McMenamins Old St. Francis School, 700 N.W. Bond St., Bend; 541-382-5174 or www. mcmenamins.com. BUILT TO SPILL: The Boise, Idahobased indie band performs, with Fauxbois; $20 plus fees in advance, $25 at the door; 9 p.m., doors open 8 p.m.; Domino Room, 51 N.W. Greenwood Ave., Bend; 541-7882989 or. ROGER CLYNE AND THE PEACEMAKERS: The Phoenix-based Americana-rock act performs; ages 21 and older; $15; 9 p.m., doors open 8 p.m.; Silver Moon Brewing & Taproom, 24 N.W. Greenwood Ave., Bend; 541-388-8331 or www. silvermoonbrewing.com. MONDAY THE SPEAKEASY: An open mic storytelling event; stories must be no longer than eight minutes; November’s theme is “Dinnertime!: Stories About Thanksgiving”; $5; 7 p.m.; Bend Performing Arts Center, 1155 S.W. Division St.; 541-977- THURSDAY BEND VETERANS DAY PARADE: Parade includes marching bands, floats, military vehicles, a flyover and more; free for spectators; 11 a.m.; downtown Bend; 541-480-4516. VETERANS DAY PARADE: Parade honoring veterans; free; Downtown Redmond, Sixth Street between Dogwood and Forest avenues; downtown Redmond. VFW OPEN HOUSE: Meet military service members and veterans in honor of Veterans Day; free; noon-6 p.m.; VFW Hall, 1503 N.E. Fourth St., Bend; 541-389-0775. A SIMON & GARFUNKEL RETROSPECTIVE: AJ Swearingen and Jonathan Beedle perform both classic and obscure songs from the band; $23-$37; 8 p.m.; Tower Theatre, 835 N.W. Wall St., Bend; 541-317-0700 or. FRIDAY GEMSTONE BEAD SHOW: Featuring a variety of semiprecious beads and pearls at wholesale prices; free admission; 10 a.m.-5 p.m.; Shilo Inn Suites Hotel, 3105 O.B. Riley Road, Bend; 503-3094088. GOOD CHAIR, GREAT BOOKS: Read and discuss “Jurassic Park” by Michael Crichton; free; noon; Redmond Public Library, 827 S.W. Deschutes Ave.; 541-312-1055 or. POETRY REVIVAL : Poets Buddy Wakefield, Anis Mojgani and Derrick Brown join together for an evening of visceral spoken word performances; presented by the Deschutes Public Library and the Cascades Theatrical Company; free admission; 6 p.m.; Greenwood Playhouse, 148 N.W. Greenwood Ave., Bend; 541-3121032. CENTRAL OREGON HOMEGROWN MUSIC REVIEW: Featuring performances by Mosley Wotta, Shireen Amini, Tim Coffey, Dennis McGregor, Brent Alan and Erin Cole-Baker; proceeds benefit Ronald McDonald House Charities of Central Oregon; $12; 7 p.m.; Tower Theatre, 835 N.W. Wall St., Bend; 541-3170700 or. “A FISH CALLED WANDA”: A screening of the 1988 R-rated film; free; 7:30 p.m.; Jefferson County Library, Rodriguez Annex, 134 S.E. E St., Madras; 541-475-3351 or www. jcld.org. CENTRAL OREGON’S LAST COMIC STANDING: Qualifying round; comedians present comic acts and attempt to advance to the next round of competition; $5; 8-10 p.m.; Old Stone Church, 157 N.W. Franklin Ave., Bend; 541-585-3557. FLOATER: The veteran Oregon trio play an electric rock ’n’ roll set, with Tuck and Roll; $15 plus fees in advance, $18 at the door; 8:30 p.m., doors open 7:30 p.m.; Domino Room, 51 N.W. Greenwood Ave., Bend; 541788-2989 or. com. BEAD AND GEMSTONE SHOW: Thousands of beads and gemstones will be on display and available for purchase; free; 10-5 p.m.; Shilo Inn Suites Hotel, 3105 O.B. Riley Road, Bend; 541-389-9600. SATURDAY Nov. 13 INDOOR SATURDAY SWAP: Sale of toys, tools, clothes, jewelry and more; free admission; 9 a.m.-4 p.m.; Indoor Swap Meet, 401 N.E. Second St., Bend; 541-317-4847. MARINE CORPS BIRTHDAY RUN/ WALK: Run 5K or walk one mile in honor of the Marine Corps; race begins outside city hall; registration required; proceeds benefit Disabled American Veterans’ Portland shuttle van; $22 with a shirt, $16 without; $21 with shirt or $14 without before Nov. 1; 9 a.m.; City Hall, 710 N.W. Wall St., Bend; 541-383-8061, chandler@bendcable.com or www. vetsdayrun.homestead.com. “THE METROPOLITAN OPERA, DON PASQUALE”: Starring Anna Netrebko, Matthew Polenzani, Mariusz Kwiecien and John Del Carlo in a presentation of Donizetti’s masterpiece; opera performance transmitted live in high definition; $24, $22 seniors, $18 children; 10 a.m.; Regal Old Mill Stadium 16, 680 S.W. Powerhouse Drive, Bend; 541382-6347. M T REGAL PILOT BUTTE 6 2717 N.E. U.S. Highway 20, Bend 541-382-6347 CONVICTION (R) 11:30 a.m., 2, 4:30, 7, 9:30 FOR COLORED GIRLS (R) 11:25 a.m., 2:20, 6:20, 9:15 IT’S KIND OF A FUNNY STORY (PG-13) 11:55 a.m., 2:30, 4:40, 6:55, 9:05 NEVER LET ME GO (R) 11:35 a.m., 2:05, 4:20, 6:35, 9:10 NOWHERE BOY (R) 11:50 a.m., 2:15, 4:35, 6:50, 9:20 THE SOCIAL NETWORK (PG13) Noon, 2:40, 6:25, 9 REGAL OLD MILL STADIUM 16 680 S.W. Powerhouse Drive, Bend 541-382-6347 DUE DATE (R) 11:40 a.m., 12:25, 2, 2:40, 4:25, 5:15, 6:50, 7:40, 9:20, 10:05 HEREAFTER (PG-13) 12:50, 4:15, 7:15, 10:15 INCEPTION (PG-13) 1:05, 4:40, 7:55 JACKASS 3-D (R) 1:50, 4:50, 7:45, 10:10 LEGEND OF THE GUARDIANS: THE OWLS OF GA’HOOLE (PG) Noon, 3:40, 6:20, 9:10 LIFE AS WE KNOW IT (PG-13) 12:30, 3:50, 6:40, 9:35 MEGAMIND 3-D (PG) 12:15, 1:45, 2:30, 4, 5:05, 6:30, 7:30, 9, 9:50 MEGAMIND (PG) 11:50 a.m., 2:10, 4:35, 7, 9:25 PARANORMAL ACTIVITY 2 (R) 11:55 a.m., 2:15, 4:55, 7:50, 10:10 RED (PG-13) 1, 4:45, 7:20, 9:55 SAW 3-D (R) 11:55 a.m., 2:20, 5:20, 8, 10:20 SECRETARIAT (PG) 12:05, 4:10, 7:10, 10 THE SOCIAL NETWORK (PG13) 12:40, 3:45, 6:35, 9:30 THE TOWN (R) 12:45, 4:05, 6:55, 9:45.) DESPICABLE ME (PG) 1 INCEPTION (PG-13) 9 EDITOR’S NOTE: The Oregon State University football game will screen at 4 p.m. today (doors open at 3 p.m.). REDMOND CINEMAS 1535 S.W. Odem Medo Road, Redmond, 541-548-8777 Seeking friendly duplicate bridge? G o to Five games weekly DUE DATE (R) 10:15 a.m., 12:30, 2:45, 5, 7:15, 9:30 MEGAMIND (PG) 10:30 a.m., 12:30, 2:30, 4:30, 6:30, 8:30 SAW VII (R) 11 a.m., 1, 3, 5, 7, 9 SECRETARIAT (PG) 10:30 a.m., 1, 3:45, 6:45 SISTERS MOVIE HOUSE 720 Desperado Court, Sisters 541-549-8800 DUE DATE (R) 3, 5:30, 8 HEREAFTER (PG-13) 2:15, 5 MEGAMIND (PG) 3, 5:15, 7:30 RED (PG-13) 7:45 WAITING FOR “SUPERMAN” (PG) 2:45, 5:15, 7:45 PINE THEATER 214 N. Main St., Prineville, 541-416-1014 SECRETARIAT (PG) 1, 4, 7 Weird Al inspires nerds of a feather By Deborah Sengupta Stith Cox Newspapers AUSTIN, Texas — Like most members of the early-MTV generation, I took in Weird Al Yankovic’s seminal hits with prepubescent glee. Though “Video Killed the Radio Star,” pop parodies like “Eat It” and “Like a Surgeon” skillfully skewered the masters of the newly visual music industry with a combination of clever wordplay and goofy sight gags. As an 11year-old, I thought it was great. But as I grew up, Yankovic fell off my radar completely even as he continued to churn out a steady string of successful albums. Then one day in 2006, my husband e-mailed me a YouTube clip of “White and Nerdy,” Yankovic’s hysterical take on Houston rapper Chamillionaire’s hit “Ridin’.” The video, which features an eager plaid-clad, Segway-riding Al shunned by thugs even as he copiously cops “Star Wars” bootlegs, was a spot-on sendup of the suburbanization of a gangsta aesthetic. When I went home for the holidays that year, my 12-yearold nieces (who happen to be black) were walking around singing “Can’t you see I’m White and Nerdy.” Twenty years later, Weird Al was still in the mix. I caught up with Yankovic via telephone from LA for a very nerdy conversation about the life of a new-millennium parodist. As someone who was around before the computer revolution, did you anticipate the revenge of the nerds? I knew that some day we would have our say. All those times at recess getting beat up I knew that someday I would have my revenge. (laughs) I think that I’m very pleasantly surprised by how much cred the whole nerd culture has gotten in the last decade or so. It definitely feels like being called a nerd is not an insult anymore, it’s a badge of honor. I think there’s been a lot of nerd empowerment, and people have kind of woken up to the fact Q: A: that nerds rule the world now. It’s nice to be a bit of a spokesperson for that culture. Are you the unsung godfather of nerdcore rap? People have said that. I’ve been doing what you’d consider nerdcore for many years. I think “It’s All About the Pentiums” came out in ’99 and that was, if not the first, certainly one of the earliest nerdcore songs. I guess I would be an early adopter of the nerdcore genre. It seems like if ever there were an artist made for YouTube, it would be you. Has that medium helped you reach new fans? It has. I try to embrace whatever technology comes around, and certainly YouTube has been great in getting exposure for my material. I mean, “White and Nerdy,” it’s hard to quantify how many hits that’s gotten on the Internet, but conservatively we figure it’s been seen 100 million times. YouTube has also, in some ways, been the bane of my existence because now there are tens of thousands of people doing funny song parodies and I’m certainly never again gonna be the only person doing a parody of any particular song. So it’s a challenge for me to step up my game and figure, if I can’t be the first or the only person doing a parody of a song I can still strive to be the best. Popeater.com named you as one of the Rock and Roll Hall of Fame’s most egregious snubs this year. Have you been feeling snubbed? I’m extremely flattered that the fans care enough to put the effort into that movement. I don’t know that I can say I feel snubbed, but let me tell you, if some other accordion playing, rock ’n’ roll parody artist gets into the Hall of Fame before I do, I will feel snubbed. But I kind of feel that the Hall probably doesn’t have enough of a sense of humor to put somebody like me in their pantheon, but certainly, if they ever do I would be incredibly honored. Q: A: Q: A: Q: A: Lil Wayne emerges from NYC jail after 8 months The Associated Press Miami, where they’re planning a NEW YORK — Lil Wayne was welcome-home party Sunday. freed from jail Thursday after Lil Wayne, who had the bestserving eight months in a gun selling album of 2008 and won a case, emerging with a best rap album Gramhot new album, wellmy with “Tha Carter wishes from a former III,” kept his career in president and a deephigh gear while locked ened appreciation for up for having a loaded his fans. gun on his tour bus in “Welcome home, 2007. Weezy!” the rap star’s He started a yearlong Facebook page prosentence in March but claimed, using one of Lil Wayne got time off for good behis nicknames, after his havior, despite a discimorning release from plinary knock that sent the Rikers Island jail complex. him to solitary for the last month He was freed at a location jail of- of his term. A charger and headficials and his lawyer wouldn’t phones for a digital music player disclose. were found in his cell in May, jail His managers have said he officials said. The items are conplanned to head for his home in sidered contraband. B4 Saturday, November 6, 2010, November 6, 2010, Nov. 6, 2010: This year, you often project someone very different from the authentic you. This disparity can cause a problem sometimes. Allow a merger of image and personality. Your strong intuition will point you in the right direction. Verbalize your thoughts and feelings more often. If you are single, you could have one stunning love affair or a series of whirlwind relationships — enjoy. If you are attached, there could be a new addition to your family, if you are at the right point in your life. The two of you will enjoy yourselves more and more together. SAGITTARIUS sees financial issues far differently. The Stars Show the Kind of Day You’ll Have: 5-Dynamic; 4-Positive; 3-Average; 2-So-so; 1-Difficult ARIES (March 21-April 19) HHHHH You demand greater giveand-take within a relationship. Your ability to understand and integrate your feelings helps you express your needs within a relationship. Listen well, and you could be shocked by what you hear. Tonight: Let plans revolve around your sweetie. TAURUS (April 20-May 20) HHHHH You can be a stubborn Bull. Nevertheless, it is appropriate to back off some and allow others to make the decisions. Friends provide an endless source of fun and happiness. If you are single, a friendship could be developing into more. Tonight: Go along with another’s plans. GEMINI (May 21-June 20) HHHH You might not be able to postpone a project or decision any longer. Just take the big plunge. You might feel a bit overwhelmed. Trust yourself to finish what must be done. Invite a friend or relative over. Tonight: Easy does it. CANCER (June 21-July 22) HHHHH If you are single, you could find yourself suddenly entangled in a new relationship. Others find a new beginning. Your creativity surges, encouraging solutions with an innate easiness. A child might need extra time. Tonight: A good old-fashioned date. LEO (July 23-Aug. 22) HHH Recognize the importance of staying close to home. You might not feel comfortable with a present situation. Indulging a difficult friend or loved one might not be the answer. Tonight: Dinner at your pad. VIRGO (Aug. 23-Sept. 22) HHHHH Express yourself without too much reserve. Others are more receptive than they have been in a long time. You could be surprised by what a partner or several friends reveal. Resolve to keep communication open. Tonight: Visit with a friend, flirt with a new acquaintance or just chat with a loved one. LIBRA (Sept. 23-Oct. 22) HHH Be careful — in your effort to make someone feel comfortable and cared about, you could go overboard. The problem lies in the cost of this behavior. Try less-expensive indulgences. Offer a back massage or help this person with a project. Tonight: Stick to your budget. SCORPIO (Oct. 23-Nov. 21) HHHHH If you act like you feel, you could be unstoppable. You might be confused by a domestic matter. Don’t linger on this issue for too long. Let go, and choose to join a loved one at a movie or do some other favored pastime. Tonight: Just wish upon a star. SAGITTARIUS (Nov. 22-Dec. 21) HHH Make it OK to be by yourself, whether it is by choice or not. You might need to review a recent event or exchange. The unexpected occurs with family or your home. Communication soars. Tonight: Make it easy. CAPRICORN (Dec. 22-Jan. 19) HHHHH A friendship remains a high priority. Make plans to meet this person today or as soon as you can. You hear news that might surprise you. Adapt and work with it. A positive attitude goes far. Tonight: Use care when handling money. AQUARIUS (Jan. 20-Feb. 18) HHH You might have tight plans, but an older relative’s or respected friend’s or associate’s request could toss them in the air. You like structure and sometimes might have difficulty with scenarios like this. Relax. You can do it. Tonight: Out and about. PISCES (Feb. 19-March 20) HHHHH Take off for a day trip or another form of escape. You need to recharge your batteries, and the more different the setting, the better off you will be. Give up worrying and overthinking. Tonight: Try a new spot with music. © 2010 by King Features Syndicate C OV ER S T ORY B6 Saturday, November 6, 2010 • THE BULLETIN Buckaroo Continued from B1 Miller’s family ties to buckarooing date back to his great-grandfather, who settled in Harney County and had seven kids. “My grandparents homesteaded in Catlow Valley” in Harney County, around the same time “cattle king” Peter French, a 19th-century rancher, moved into Eastern Oregon. His grandparents, who in turn had seven kids themselves, ran the Rock Creek Ranch. His father bought a ranch of his own and eventually took over the family ranch at Rock Creek, combining the two, says Miller, who eventually moved to Sisters and then Tumalo, where he lives on 10 acres with his wife and their 11year-old son. About five years ago, the Millers and some friends started a business, Vaquero Ranch and Cattle Co., situated on a ranch south of Prineville Reservoir that now has about 60 cows. “It’s much smaller than where I was raised. … We’re trying to raise organic beef,” he says. “We’ve been selling some, but we haven’t really marketed it formally yet.” The word “buckaroo” is derived from “vaquero,” the Spanish word for “cowboy.” “Vaqueros came from California when Pete French and. Some guys that hire onto ranches, they’re pretty job-specific. We ask them to go out of their job description and do something (else), they don’t want to do it.” Whatever they did with cows was called “buckarooing,” he added. “He worked on a ranch. He had his own ranch, and he did everything that the ranch asked him to do.” On any given day, a buckaroo might mend a fence, make reins and rope from braided horsehair, or herd cows. “We grew up, we had to do everything. We had to hay. We had to build fence.” And they had to move cows, he says, only “we didn’t call it ‘moving cows.’ “Dad said, ‘Well, we’re gonna buckaroo today.’ ” Making the book: an ambitious project Buckarooing has seen something of a resurgence, with roping competitions and more helping to bring back some of the traditions in California, Miller says. “It’s good, because the way they handle their stock and their horses is calmer, more gentle.” At the same time, that style, when it comes to the kind of ranching that he grew up with, “is going by the wayside.” Which makes “Vaquero/Buckaroo” all the more poignant as both book and piece of art. If a vaquero needed a saddle, he had one custom-made instead of buying one, instead of buying a one-size-fits-all saddle. What is a vaquero/buckaroo? “Vaqueros came from California when ....” — Ron Miller Andy Tullis / The Bulletin Ron Miller tends to Wasabi, his wife’s horse, at their Tumalo home. Miller’s family and its ties date back several generations to Harney County, where they embraced buckaroo traditions. Submitted photo In front of his barn, Ron Miller stands behind, from left, Pat Clark, his wife, Nye Miller, and Sandy Anderson as they play with the Millers’ dog Buzz. Submitted photo Sandy Anderson, who wrote an article about “buckarooing” for High Desert Journal, watches as Atelier 6000’s Pat Clark inks a plate for “Vaquero/Buckaroo” at the Bend printmaking studio. “I was kind of enthralled by the whole history and idea of (buckaroos). ... I thought, ‘Well, it’s such a nice vignette of culture, it would make a wonderful original book.’” — Pat Clark, owner of Atelier 6000 The philosophy of the buckaroo allows for a slower, more methodical way of doing things, not altogether unlike the way “Vaquero/Buckaroo” is being made. The book is the most ambitious project Atelier 6000 has yet tackled since opening. It will include 32 original print illustrations ranging in size from 3-by-3 inches to 10-by-16. Handmaking the book is a loving, time-consuming process somewhat akin to buckarooing. The collaborative effort also includes illustrations by A6’s Clark and Danae Bennett-Miller, archi- Get A Taste For Food, Home & Garden Every Tuesday In AT HOME tectural drawings and maps by David Anderson, typography by Thomas Osborne. Ezma Hanschka of Night Owl Press is handling letterpress printing. The book, once complete, will sell for $350. The price will go up to $475 after Jan. 15. Each of the 75 copies will be hand-signed and numbered. It’s been more than six months in the making, says Clark. “Vaquero/Buckaroo” will reflect the buckaroo lifestyle in look and feel; the pace at which it is being made certainly suits buckaroo Miller. “They are right in there with the old-fashioned way, that’s for sure,” he says. “They’re doing it by hand, and they’re putting in tons and tons of hours. I just hope people will see the value in all the hard work they’ve done.” “(Buckaroos) did things slower,” Miller adds. “There’s an old saying, ‘If you go slow, you get there faster.’ We live in an impatient world, and that philosophy doesn’t seem to work very much for any kind of businesses anymore.” Andy Tullis / The Bulletin Ron Miller rides horseback on his 10-acre ranch in Tumalo. Miller also co-owns a ranch near Prineville Reservoir that will raise organic beef. David Jasper can be reached at 541-383-0349 or djasper@bendbulletin.com. Treating all Foot Conditions Weekly Arts & Entertainment Inside W e s p e c i a li z e i n “ l BendSpineandPain.com (541) 647-1646 s Turf, Inc. SERY ” R U ro w n N c a ll y g M Every Friday 541.383.3668 cPh o TURF • TREES SHRUBS • FERTILIZER 541-546-9081 2019 SW Park Lane • Culver Bend | Redmond | Prineville not covered by Medicare (Transitions, Children’s Grief Camp, Bereavement Services). For more info. call Partners In Care 541.382.5882. HOSPICE HOME HEALTH SERVING CENTRAL OREGON 24 HOURS EVERYDAY HOSPICE HOUSE 2075 NE WYATT CT. | BEND | 541.382.5882 TRANSITIONS L C Inside OREGON Historic Timberline carving gets replacement, see Page C2. BUSINESS U.S. mulls subsidies for developing antibiotics, see Page C3. THE BULLETIN • SATURDAY, NOVEMBER 6, 2010 Parties may seek recounts in 2 races With Senate’s balance of power at stake, ballot-counting scrutinized in Districts 3, 20 By Nick Budnick The Bulletin SALEM — Three days after the election, two state Senate races remained unresolved Friday. Recounts are considered likely, and an election complaint by Senate Republicans is possible. Sen. Brian Boquist, R-Dallas, who is leading the Senate Republicans’ factfinding efforts, said he had received a variety of conflicting numbers from election officials, particularly in the Senate District 3 race between Sen. Alan Bates, D-Ashland, and Republican challenger Dave Dotterer, in which the Democrat held a narrow lead Friday. “I think we’re going to go to court, and I think there’s going to be a recount,” Boquist said, citing a number of alleged discrepancies. The lack of clarity regarding the state Senate’s balance of power is especially significant in light of the outcome in the state House of Representatives, which appears to have split 30-30 between parties. A majority in the Senate would give Democrats more power over what bills survive the Legislature and go to the governor to be signed into law. Questions also exist in Senate District 20, where Sen. Martha Schrader, D-Canby, appeared to be narrowly trailing Republican challenger Alan Olsen in a race that Democrats did not expect to lose. Molly Woon, a spokeswoman for the Senate Democrats, said her party was likely to request a recount in that race. Ross Day, a lawyer for the Oregon Republican Party, said that while a recount was possible, he hadn’t seen any evi- ELECTION dence of election fraud. “It seems to me that a lot of people are wondering why it takes so long to count ballots, and I think that’s when people’s imaginations start to run wild,” he said. “I think it just takes a while to count ballots.” Steve Trout, elections director for the Secretary of State’s Office, said he did not share the concerns that some Senate Republicans had voiced. He said “numbers are moving” in many races because it’s normal that ballots trickle in late — either because they were mailed too late, in which case they won’t be counted, or because a voter dropped a ballot off in another county on Election Day and the ballot is en route to the voter’s home county for signature verification. See Senate / C7 S. Century Dr. Des chu tes S. Century Dr. rt Rd. Vanderve 97 42 Littl eD esc hu tes Riv er Delineation of marshy areas in south Deschutes County clears picture on development, impact Riv er Putting wetlands on the map La Pine State Park Study area Wetlands found By Hillary Borrud Map source: Deschutes County A consultant working for Deschutes County recently completed a survey of wetlands in the southern portion of the county. A draft report and maps were posted on the county website earlier this week. r ive Deschutes R DESCHUTES NATION AL FOREST McK ay Bu tte Rd. Huntin gton R d. A new inventory of wetlands in south Deschutes County gives property owners a better picture of where they can develop without impacting the marshy areas, and could help protect and restore wildlife habitat. The wetland locations will help people who want to buy property in the area determine whether they can realistically build their dream house on a specific parcel, and it could help county planning staff make decisions such as where to locate a road, said Ryan Houston, executive director of the Upper Deschutes Watershed Council. Federal law also requires property owners with wetlands to work with government agencies to minimize harm to wetlands, regardless of whether the area is listed on an official wetland list. Deschutes County released a draft report and maps of the wetlands on its website earlier this week. County planners have called the existing National Wetlands Inventory inaccurate, and the local survey found wetlands cover a smaller number of properties and less total acreage than earlier believed. The national inventory was based on aerial im- Wetland survey INVENTORY STATISTICS Day Rd. The Bulletin SUNRIVER • The inventory identified approximately 180 wetlands • The study area covered 18,937 acres For more detailed information on your neighborhood, visit, click on South County Wetland Inventory, and use the index under “Draft Local Wetland Inventory Maps” to find the detailed map of your area. Burgess Rd. LA PINE ages, while the local survey included on-the-ground work. “The National Wetland Inventory is widely known to be very inaccurate,” Houston said. For instance, a warehouse in Bend was identified as a wetland because in aerial photographs used in the national survey, the building’s shiny roof resembled water, Houston added. See Wetlands / C7 DESCHUTES NATION AL FOREST Finley Butte Rd. 6th St. Masten Rd. #FOE 4VOSJWFS 97 -B1JOF "3&" 0'%&5"*- “It seems to me that a lot of people are wondering why it takes so long to count ballots, and I think that’s when people’s imaginations start to run wild. I think it just takes a while to count ballots.” — Ross Day, Oregon Republican Party lawyer Man gets 15 years for police shootout By Lauren Dake The Bulletin A man who shot at police officers and led officials on a two-month manhunt was sentenced to 15 years in prison Friday morning after he pleaded guilty to two counts of attempted aggravated murder and one count of attempted murder. Aldo Inez Antunez, 32, was shot and wounded on the Warm Springs Reservation in July during a shootout with police officers. Antunez called the Warm Springs Police Department dispatch and surrendered after being on the run for about two months. “He pled to three counts — one count for each person involved,” said Jefferson County District Attorney Steven Leriche. One of the police officers was a reserve officer, which is not covered under the aggravated murder statute. Aggravated murder is a specific type of murder, such as murder of a police officer, according to Leriche. The search for Antunez and Waylon Weaselhead started May 20 after a Madras police officer stopped a vehicle. The driver sped away, and someone inside the vehicle fired shots at the officer. Later that day, a Warm Springs Police officer attempted to stop a white Ford Explorer on state Highway 3. The vehicle sped away, and someone inside the car fired shots. One shot hit the windshield of an officer’s car. Police believe it was the same vehicle they had stopped earlier. The two people in the car fled on foot while shooting at officers. Weaselhead, a Warm Springs tribal member, was arrested on suspicion of being involved with the shootings. No police officers were injured. Lauren Dake can be reached at 541-419-8074 or at ldake@bendbulletin.com. 31 Andy Zeigert / The Bulletin Three sentenced to prison for years of tax fraud, evasion Redmond man, former Bend couple set up trusts to avoid paying the IRS By Erin Golden The Bulletin A Redmond man and two former Bend residents convicted of defrauding the Internal Revenue Service over a 10-year period were sentenced to prison this week by a federal judge. Jerry Miller, 61, of Redmond, was sentenced to two years, nine months in prison and ordered to pay $200,000 in restitution to the IRS after a jury found him guilty of five counts of income tax evasion and one count of conspiracy. Former Bend residents William Cardwell, 62, and his wife, Jennifer Cardwell, 58, took a plea deal and did not stand trial. William Cardwell pleaded guilty to one count of tax evasion and one count of structuring currency transactions to avoid reporting requirements. He was sentenced to one year and one day in prison and three years of post-prison supervision and must pay $197,594 in restitution. Jennifer Cardwell pleaded guilty to one count of tax evasion and was sentenced to five months in prison and five months of home detention and ordered to pay $114,379 to the IRS. The three were indicted in October 2007 after IRS investigators turned up evidence of tax fraud. According to court documents, the Cardwells owned a company called Business Administrative Services, which handled payroll taxes, among other functions. Miller was an employee of the company. In the mid-1990s, the Cardwells and Miller began setting up trusts to avoid paying taxes and depositing money into the trusts for their personal use. In addition, they set up a “professional services agreement” between the company and William Cardwell and Miller. The two men were listed as volunteers for the company and in return, the company was required to pay for their expenses, ranging from home repairs to vacations to college tuition for their family members. The three also used the company to get preloaded ATM cards, which they then used to pay personal expenses. Assistant U.S. Attorney Scott Bradford said the case was opened after an audit of the trusts. “Based on what happened at trial, the evidence was that a civil audit occurred on these trust returns, and that was the beginning,” he said. “They looked at these returns and what was going on and then it snowballed from there.” Erin Golden can be reached at 541-617-7837 or at egolden@bendbulletin.com. C2 Saturday, November 6, 2010 • THE BULLETIN O B L B Compiled from Bulletin staff reports UO president has prostate cancer EUGENE — University of Oregon President Richard Lariviere has been diagnosed with prostate cancer but is expected to make a full recovery following surgery scheduled later this month. University officials said Friday’s duties and consult with Lariviere as needed during his leave. Kulongoski plans trip to Bangladesh SALEM — Oregon Gov. Ted Kulongoski plans to begin a three-day trip to the South Asian country of Bangladesh this weekend. The governor’s office says the adjutant general of the Oregon National Guard will accompany him. In a statement, Kulongoski’s office says the trip is part of a continuing effort to discuss mutual best practices for natural disaster response and mass casualty training exercises. Natural disasters such as floods and cyclones are common in Bangladesh. KPTV says the visit due to begin Sunday is also intended to highlight mutually beneficial economic ties between Oregon and Bangladesh. Starlings in power station cause outage PORTLAND — Starlings that flew into equipment at a Pacific Power and Light substation caused an outage that affected about 19,500 Portland customers. Utility spokeswoman Jan Mitchell says three neighborhoods were affected by the Thursday morning outage. Most of the power was restored by late morning. Columbia marina fire burns 5 boats PORTLAND — A fastmoving fire at a Columbia River marina in Portland has burned five boats and displaced two families who live aboard boats. No injuries were immediately reported in the Thursday night fire. Firefighters managed to control the blaze within about a half hour. There was no immediate word on damage or a cause. The Oregonian says a boat moored at Bill Babeckos Yacht Broker caught fire about 8 p.m. The fire sent up heavy smoke, and flames soon spread to four nearby boats. At least three boats were cut loose, drifting aflame downriver. — From wire reports Randy L. Rasmussen / The Oregonian Woodcarver John Zipprich replicates Timberline Lodge’s historic carved wooden panel in Pine Grove on Oct. 24. Timberline bird carving gets assist from stimulus By KATY MULDOON The Oregonian PINE GROVE — John Zipprich had to crank. The season’s first big blast of snow barreled toward Mount Hood that fourth weekend in October, and if Zip, as friends call him, didn’t finish his enormous woodcarving fast, he’d never get it installed before full-bore winter delayed that tricky operation. His elegant, angular bird, carved into a massive slab of Douglas fir and paid for with $4,500 in federal stimulus money, was bound for a place built more than 70 years ago by another government-driven economic impetus. And it’s one that feels its weather: Timberline Lodge. Destined for a prominent spot above a lodge front door, Zipprich’s piece would be among the last and most visible projects accomplished since 2009, when Mt. Hood National Forest garnered $4.25 million in American Recovery and Reinvestment Act funds for Timberline. The money is a drop in the bucket compared with the $787 billion in stimulus money distributed nationwide, including more than $2.7 billion in Oregon. But it gave lodge caretakers the chance to catch up on a hefty maintenance backlog. Among other jobs, workers restored the National Historic Landmark’s stone chimneys, upgraded plumbing, installed energy-efficient windows, improved the fire-alarm system and painted the exterior stem to stern. As they scraped off coats of pale gray, painters found trouble: a disintegrating lintel, or header, over the Roosevelt Terrace door. The nearly 15-foot long, 3-foot high slab is carved with what’s commonly dubbed Thunderbird — the spirit of thunder and lightning that in Native American lore takes the shape of a great bird, probably a California condor. Some Warm Springs elders once indicated the lintel carving might instead be a butterfly. Wings outstretched over a zigzag pattern, the figure appears to protect Timberline and the entire Cascade Range, as it has since the lodge was built between 1936 and 1938. But this fall, it looked like it wouldn’t survive another paint job, much less another winter. The lintel was crumbling. In the mountain’s harsh elements, long slivers of rotten fir had fallen away. Crusty paint held together what was left of the carving. Linny Adamson, Timberline’s curator, had worried about its condition; workers repaired the lintel over the years, but time took its toll. Change comes slowly to Timberline, planted in the scree and snow at 5,960 feet. Decisions often are made by committee, with input from the U.S. Forest Service, longtime lodge operator R.L.K. & Co., the nonprofit Friends of Timberline and the Oregon State Historic Preservation Office. Sometimes, opinions differ. Adamson called Zipprich, who works out of his home studio now but for 15 years did all manner of repairs as part of the lodge’s maintenance staff. His work includes carvings of Oregon-bred Olympic skiers hanging on the wall at Charlie’s Mountain View, the classic Government Camp watering hole, to the primitive-style signs in that unincorporated burg, the gateway to western Oregon’s ski country. Zipprich, 58, told Adamson long ago that if the Thunderbird lintel ever needed replacing, he’d be happy to handle the job. The time had come and he had to make it snappy. Winter loomed. At the lodge, Zipprich unfurled brown butcher paper over the lintel. Using a cranberry colored lumber crayon, he made a rubbing. Back in his garage studio, just steps off Oregon 216, where the mountain’s deep green gives way to the golden expanse of high desert, it took four guys including the broad-shouldered, barrelchested Zipprich, to manhandle the hunk of fir onto sawhorses. He’s not sure what it weighs, but estimates 600 to 800 pounds — the biggest and most important carving of his career. From the rubbing, he traced the double-groove design onto the fir and lined up wood-handled skews, bench knives, firmers and other tools. He crafted a guide so his skill saw would cut each long groove to a consistent depth. Under a bright shop light hanging from the rafters, with the air smelling deliciously of fresh-cut wood, he got to work. “I feel honored,â€? he says, “to be chosen to do this.â€? Three men arrested in Highway 97 drug bust facturing and delivering cocaine and marijuana. Police arrested three men on Thursday afternoon after a traffic stop turned up cocaine and marijuana in their truck. According to a news release from the Oregon State Police, a trooper stopped the cargo-style truck at about 3 p.m. Thursday after seeing it drift into another lane of traffic and nearly hit another vehicle. With the help of a Deschutes County Sheriff’s Office deputy and drug-detection dog, the trooper found more than a pound of cocaine — with a value of about $15,000 — and nearly three ounces of marijuana in the truck. The driver, Juan Pablo Bucio Perez, 20, of Yakima, Wash., was arrested along with his passengers, Jose Cervantes-Cuevas, 20, of Yakima, and Antonio Castaneda Patino, 33, of Santana, Calif. The three men were lodged in the Deschutes County jail on suspicion of possession, manu- Two pile burns south of Bend start Sunday Today is Saturday, Nov. 6, the 310th day of 2010. There are 55 days left in the year. A reminder: Daylight-Saving Time ends at 2 a.m. local time Sunday. Clocks go back one hour. TODAY’S HIGHLIGHT IN HISTORY On Nov. 6, 1860, former Illinois congressman Abraham Lincoln defeated three other candidates for the presidency: John Breckinridge, John Bell and Stephen Douglas. ON THIS DATE 1928, in a first, the results of Republican Herbert Hoover’s T O D AY IN HISTORY election victory over Democrat Alfred E. Smith were flashed onto an electric wraparound sign on the New York Times building. In 1934, Nebraska voters approved dissolving their twochamber legislature in favor of a nonpartisan, single legislative body, implemented in 1937. In 1944, British official Lord Moyne was assassinated in Cairo, Egypt, by members of the Zionist Stern gang. In 1956, President Dwight Eisenhower won re-election, defeating Democrat Adlai Stevenson. On Election Eve, George W. Bush and Al Gore campaigned through the final hours of their run for the White House, seeking last-minute momentum in a costly and exhausting race to become the nation’s 43rd president. Surgeons in Manchester, England, separated conjoined twin girls, a procedure that involved allowing one of the girls to die, while giving the survivor a chance at life. FIVE YEARS AGO In a clear jab at Venezuelan President Hugo Chavez, President George W. Bush, in Brazil, called on Latin Americans to boldly defend strong democratic institutions. French President Jacques Chirac promised arrests, trials and punishment in the wake of urban unrest that had spread to central Paris. ONE YEAR AGO President Barack Obama signed a $24 billion economic stimulus bill, hours after the government reported that the unemployment rate had hit 10.2 percent in Oct. 2009 for the second time since World War II. TODAY’S BIRTHDAYS Director Mike Nichols is 79. Country singer Stonewall Jackson is 78. Singer Eugene Pitt (The Jive Five) is 73. Singer P.J. Proby is 72. Country singer Guy Clark is 69. Actress Sally Field is 64. Pop singer-musician Glenn Search and Rescue team saves hurt biker An injured mountain biker who crashed while riding west of Bend was rescued Friday evening by Deschutes County Search and Rescue volunteers. A member of the Search and Rescue Mountain Bike Team who was headed east on Ben’s Trail came across the injured rider about 5:45 p.m. Shoshana Foxwell, 45, of Bend, had been riding east on Ben’s Trail when she lost control on a corner and flipped over the handlebars. The volunteer who had been in the area treated Foxwell for serious but non-life-threatening injuries and called in additional Search and Rescue personnel. Foxwell was placed on a backboard and transported to St. Charles Bend for further treatment of her injuries. N R POLICE LOG The Bulletin will update items in the Police Log when such a request is received. Any new information, such as the dismissal of charges or acquittal, must be verifiable. For more information, call 541-383-0358. Bend Police Department Burglary — A burglary was reported at 10:47 a.m. Nov. 3, in the 1400 block of Northwest Wall Street. Theft — An irrigation pump was reported stolen at 11:48 a.m. Nov. 3, in the 20200 block of Reed Lane. Criminal mischief — An act of criminal mischief was reported at 5:06 p.m. Nov. 3, in the 700 block of Northwest Georgia Avenue. Theft — A wallet was reported stolen at 5:07 p.m. Nov. 3, in the 600 block of Northwest Wall Street. Unlawful entry — A vehicle was reported entered and a backpack stolen at 8:48 p.m. Nov. 3, in the area of Northeast Fourth Street and Northeast Hawthorne Avenue. Theft — A bicycle was reported at 11 p.m. Nov. 3, in the 2200 block of Northeast Daggett Lane. Theft — A theft was reported at 6:26 a.m. Nov. 4, in the 2700 block of Northeast Jill Avenue. Criminal mischief — An act of criminal mischief was reported at 8:48 a.m. Nov. 4, in the area of Clairaway Avenue and Southeast 27th Street. Unlawful entry — A vehicle was reported entered at 9:37 a.m. Nov. 4, in the 3100 block of Northeast Coho Street. Burglary — A burglary was reported at 9:41 a.m. Nov. 4, in the 20100 block of Lora Lane. Theft — A theft was reported at 10:37 a.m. Nov. 4, in the 100 block of Southwest McKinley Avenue. Harrison elected despite losing popular vote in 1888 The Associated Press Pile burns in the Sunriver and Deschutes River Woods areas will start Sunday and last for two weeks, according to a news release. The first burn will happen north of Cottonwood Road in Sunriver, with specialists planning to burn piles spread over 105 acres. No road closures are planned for the area. However, signs will be posted along Cottonwood Road to alert motorists to the burns. The second burn will take place between Lava Butte and the south end of the Deschutes River Woods area. Specialists will burn about 400 piles spread out over 56 acres. Smoke will be visible from Bend, U.S. Highway 97, and the Deschutes River Woods and Sunriver areas, but no road closures are expected. The purpose of the burns is to remove materials left over from forest-thinning projects from earlier in the year. Frey (The Eagles) is 62. Singer Rory Block is 61. Jazz musician Arturo Sandoval is 61. TV host Catherine Crier is 56. California’s first lady, Maria Shriver, is 55. Actress Lori Singer is 53. Actor Lance Kerwin is 50. Rock musician Paul Brindley (The Sundays) is 47. Education Secretary Arne Duncan is 46. Rock singer Corey Glover is 46. Actor Brad Grunberg is 46. Actor Peter DeLuise is 44. Actress Kelly Rutherford is 42. Actor Ethan Hawke is 40. Actress Thandie Newton is 38. Model-actress Rebecca Romijn (roh-MAYN’) is 38. Actress Zoe McLellan is 36. Actress Nicole Dubuc is 32. Actress Taryn Manning 32. Actress Emma Stone is 22. Actress Mercedes Kastner is 21. THOUGHT FOR TODAY “Don’t try for wit. Settle for humor. You’ll last longer.â€? — Elsa Maxwell American socialite (1883-1963) Where Buyers And Sellers Meet 1000’s Of Ads Every Day Theft — A theft was reported at 11:25 a.m. Nov. 4, in the 200 block of Northeast Sixth Street. DUII — Sarol A. Keller, 43, was arrested on suspicion of driving under the influence of intoxicants at 11:50 a.m. Nov. 4, in the 2600 block of Northeast U.S. Highway 20. Unlawful entry — A vehicle was reported entered and vandalized at 12:17 p.m. Nov. 4, in the 3100 block of Northeast Delmas Street. Theft — A theft was reported at 2:41 p.m. Nov. 4, in the 500 block of Southwest Power House Drive. Theft — A wallet was reported stolen at 6:16 p.m. Nov. 4, in the 61400 block of U.S. Highway 97. Theft — A bicycle was reported stolen at 8:11 p.m. Nov. 4, in the 1000 block Southeast Cleveland Square Loop. DUII — Rhiannon Marie Robison, 28, was arrested on suspicion of driving under the influence of intoxicants at 10:35 p.m. Nov. 4, in the 1900 block of Northeast Curtis Drive. Redmond Police Department Vehicle crash — An accident was reported at 7:03 p.m. Nov. 4, in the 1600 block of Southwest Odem Medo Road. Criminal mischief — An act of criminal mischief was reported at 9:18 a.m. Nov. 4, in the area of Northwest Canal Boulevard and Northwest Dogwood Avenue. Unauthorized use — A vehicle was reported stolen at 9:06 a.m. Nov. 4, in the 700 block of Northwest Jackpine Avenue. Prineville Police Department Theft — A theft was reported at 12:47 a.m. Nov. 4, in the area of Northwest Madras Highway. Deschutes County Sheriff’s Office Theft — A theft was reported at 8:50 p.m. Nov. 4, in the 19200 block of Shoshone Road in Bend. Unauthorized use — A vehicle was reported stolen at 11:21 a.m. Nov. 4, in the 56800 block of Enterprise Drive in Bend. DUII — Jesus Pedro Hernandez Hernandez, 26, was arrested on suspicion of driving under the influence of intoxicants at 12:29 a.m. Nov. 4, in the area of Northeast Paula Drive and Northeast Purcell Boulevard in Bend. BEND FIRE RUNS Wednesday 8:13 a.m. — Authorized controlled burning, 21660 Paloma Drive. 9:46 a.m. — Smoke scare, odor of smoke, 1537 N.W. 11th St. 9 — Medical aid calls. Thursday 11:35 a.m. — Unauthorized burning, 64861 Old Bend Redmond Highway. 15 — Medical aid calls. PETS The following animals have been turned in to the Humane Society of the Ochocos in Prineville or the Humane Society of Redmond animal shelters. You may call the Humane Society of the Ochocos — 541-447-7178 — or check the website at www. humanesocietyochocos.com for pets being held at the shelter and presumed lost. The Redmond shelter’s telephone number is 541923-0882 — or refer to the website at. The Bend shelter’s website is. Redmond Labrador Retriever — Adult male, yellow; found at the Redmond airport. HOLIDAY DINING SET SALE Huge Selection! UP TO 50% OFF Amish Crafted Dining Sets Solid Lumber ~ Heirloom Quality Questions About Meth? AMISH HOUSE Next to Costco • 541-388-4651 2620 NE Hwy 20 • Bend C3 B THE BULLETIN • SATURDAY, NOVEMBER 6, 2010 MARKET REPORT s 2,578.98 NASDAQ CLOSE CHANGE +1.64 +.06% STOC K S R E P O R T For a complete listing of stocks, including mutual funds, see Pages C4-5 B U S I N E SS IN BRIEF s 11,444.08 DOW JONES CLOSE CHANGE +9.24 +.08% New York Times News Service Nampa, Idaho-based Home Federal Bancorp Inc., which took over Prineville-based Community First Bank in August 2009 and Eugene-based LibertyBank in July, on Friday reported lower fourth-quarter and fiscal year-end results for the period ended Sept. 30. In the quarter, it reported a net loss of $0.2 million, or 1 cent per diluted share, compared with net income of $9.7 million, or 62 cents per diluted share, in the fiscal fourth quarter of 2009. For the year ended Sept. 30, Home Federal reported a loss of $4.1 million, or 26 cents per diluted share, compared with net income of $8.1 million, or 51 cents per share, for the year ended Sept. 30, 2009. PV Powered, parent end merger provision 1,225.85 S&P 500 CLOSE CHANGE +4.79 +.39% s BONDS Ten-year CLOSE 2.53 treasury CHANGE +2.02% s $1397.30 GOLD CLOSE CHANGE +$14.60 U.S. added jobs in October — the first gain since May By Catherine Rampell Home Federal reports loss for quarter, year s The U.S. “The notion that the economy might be double-dipping can now be safely tossed out.” — John Ryding, chief economist at RDQ Economics decennial Census jobs and layoffs by state and local government during the summer and early fall — until October. Companies added 159,000 jobs last month, after a gain of 107,000 jobs in September. Governments cut 8,000 jobs following losses of 148,000 positions in September. October was much stronger than expected — most forecasts were for a gain of 60,000 jobs. The report also revised the numbers for August and September. The August data was revised to reflect a loss of 1,000 jobs instead of 57,000, and September was revised to 41,000 losses instead of 95,000. .” See Jobs / C5 Weakened antibiotics need their own cure Bend-based PV Powered and its parent company, Advanced Energy Industries Inc., have agreed to an early settlement of an earnings provision left over from their merger. As part of its March agreement to buy PV Powered, Advanced Energy agreed to pay PV Powered shareholders up to $40 million, in addition to $35 million in cash and $15 million in Advanced Energy stock paid at closing, if the Bend company met certain financial targets between the closing date and Dec. 31. The provision also allowed PV Powered to operate on a stand-alone basis during the period. However, Fort Collins, Colo.based Advanced Energy wants to integrate PV Powered and so has agreed to pay PV Powered shareholders $39.6 million on or before Nov. 15 to end the provision early, according to an Oct. 30 agreement filed with the U.S. Securities and Exchange Commission. s $26.744 SILVER CLOSE CHANGE +$0.705 U.S. profits from aid to Fannie Mae, Freddie Mac By Binyamin Appelbaum New York Times News Service WASHINGTON — The federal government made a profit of $1.1 billion in the third quarter on its huge bailout of the mortgage finance giants Fannie Mae and Freddie Mac, even as the two companies continued to lose money on bad loans. Fannie Mae reported Friday that it lost $3.5 billion in the third quarter and that it would require an additional $2.5 billion from the Treasury Department to balance its books. Freddie Mac, the smaller of the two, said this week that it lost $4.07 billion in the third quarter and that it would need an additional $100 million in aid from taxpayers. But the government collected $3.7 billion in dividend payments from the two companies, more than the $2.6 billion in new aid. It is the first quarter in which the company’s payments to the government exceeded their draws on Treasury. Still, it was the 13th consecutive quarter in which Fannie Mae has lost money. See Fannie / C5 Bernanke defends Fed move in face of criticism from abroad By Sewell Chan New York Times News Service Pending home sales drop 1.8 percent 9.8 2009 2010 Source: Department of Commerce AP WHAT’S GOING UP? Chan’s Chinese Restaurant BUS 97 Wilson Ave. Cleveland Ave. BEND Reed Market Rd. St. rd damage to the building and contents, according to estimates made at the time. No one was injured. Chan said the blaze destroyed most of the kitchen in the nearly 25-year-old restaurant, which can seat about 160 diners. While he plans to rebuild to the same size, Chan said the restaurant will be upgraded in many areas to comply with current building codes. Insurance will cover rebuilding, business losses and employee wages. The restaurant employs 16 full- and part-time employees. Chan receives many phone calls daily, he said, from customers asking about the business, its employees and when he plans to reopen. Hearing from so many people in the community, Chan said, has made him want to provide 97 ay What: Chan’s Chinese Restaurant Where: 1005 S.E. Third St. Owner: Lap Chan General contractor: Kirby Nagelhout Construction Co., Bend Architect: Thomas Deatherage, Bend Contact: 541-389-1725 Details: The owner of Chan’s Chinese Restaurant in Bend has started rebuilding after an attic fire in August heavily damaged the restaurant on Southeast Third Street between Southeast Wilson Avenue and Southeast Reed Market Road. Lap Chan said he expects to reopen around the beginning of February. A damaged wire in the attic started the fire early on Aug. 20 that caused between $600,000 and $700,000 in The world’s weakening arsenal against “superbugs” has prompted scientists to warn that everyday infections could again become a major cause of death just as they were before the advent of penicillin. See Antibiotics / C5 97 BUS 97 d. 10.0 this field in search of more lucrative medicines. The number of new antibiotics in development is “distressingly low,” Dr. Margaret Hamburg, commissioner of the Food and Drug Administration, said at a news conference last month. R us rho 10.2 — Dr. Brad Spellberg, an infectious disease specialist at Harbor-UCLA Medical Center in Torrance, Calif. ste $10.41 $10.4 trillion “For these infections, we’re back to dancing around a bubbling cauldron while rubbing two chicken bones together.” Bro Aug. 0.5% Sept. 0.2% Thi Change from previous month New York Times News Service rkw Seasonally adjusted By Andrew Pollack Pa Americans’ personal spending: Amid a looming health crisis, U.S. considers development subsidies nd Personal spending Matthew Cavanaugh / New York Times News Service A researcher with Cubist Pharmaceuticals works in the company’s lab in Lexington, Mass. Things like tax breaks and patent extensions are being considered to entice creation of antibiotics as bacteria become resistant to more drugs and many pharmaceutical giants abandon the field. Be WASHINGTON — The. — From staff and wire reports JEKYLL ISLAND, Ga. — The Federal Reserve chairman, Ben Bernanke, on Friday defended the central bank’s decision to inject $600 billion into the U.S. economy, in the face of objections from European and Asian officials about the weakening of the dollar that is likely to result from the action. “The best fundamentals for the dollar will come when the economy is growing strongly,” Bernanke told students at Jacksonville University in Florida. “That is where the fundamentals come from. We are aware the dollar plays a special role in the global economy.” In commenting on the dollar, Bernanke was making an unusual departure from custom. By tradition, the dollar is the purview of the Treasury secretary and monetary policy is the domain of the Fed chairman, and neither official steps on the other’s turf. See Fed / C5 Greg Cross / The Bulletin food and service that equals or is better than before. “I am so lucky I have so many loyal customers,” he said. — Tim Doran, The Bulletin Ryan Brennecke / The Bulletin Rebuilding is under way at Chan’s Chinese Restaurant on Southeast Third Street in Bend. A fire in the attic on Aug. 20 heavily damaged the restaurant. Owner Lap Chan expects to reopen the restaurant by early February. B USI N ESS C4 Saturday, November 6, 2010 • THE BULLETIN The weekly market review New York Stock Exchange Name Chg Wkly A-B-C ABB Ltd 21.67 ACE Ltd u61.88 AES Corp 11.76 AFLAC u57.76 AGCO 44.45 AK Steel 13.87 AMB Pr u30.15 AMR 8.87 AOL n 24.92 AT&T Inc u29.27 AU Optron 10.39 Aarons s 20.38 AbtLab 50.92 AberFitc 47.03 Accenture 45.67 Actuant u23.97 AMD 8.04 AecomTch 27.83 Aeropostl s 24.70 Aetna 31.03 Agilent 36.38 Agnico g u79.94 Agrium g u85.15 AirProd u86.65 Aircastle 9.76 Airgas u68.56 AirTran 7.47 Albemarle u53.10 AlbertoC n 37.32 AlcatelLuc 3.28 Alcoa 14.00 Alcon 167.20 Alere 28.84 AllgEngy 23.55 AllegTch 55.92 Allergan u70.87 AlliData 62.95 AlliancOne 4.47 AlliBern 25.27 AldIrish d.83 AllisChE u5.53 Allstate 31.27 AlphaNRs 44.45 AlpTotDiv 5.91 Altria u26.11 AmbacF h d.50 Amdocs 26.97 Ameren u29.83 Amerigrp 43.76 AMovilL u59.48 AmAxle 10.11 AmCampus u33.39 AEagleOut 16.48 AEP u37.70 AEqInvLf 11.41 AmExp 44.07 AmIntlGrp u45.61 AmTower u51.92 AmWtrWks u24.81 Ameriprise u55.02 AmeriBrgn 31.68 Amphenol u52.88 Anadarko 67.61 AnalogDev u35.53 AnglogldA u49.31 ABInBev 61.56 AnnTaylr 24.35 Annaly 17.91 Anworth 7.07 Aon Corp 41.78 Apache 108.69 AptInv u25.44 AquaAm u21.93 ArcelorMit 36.12 ArchCoal u28.30 ArchDan 31.35 ArmstrWld u49.83 ArrowEl 31.28 ArtioGInv 14.75 ArvMerit u18.52 Ashland 50.94 AspenIns 29.08 Assurant 41.39 AssuredG 20.01 AstoriaF 13.17 AstraZen 50.10 AtwoodOcn 35.50 AutoNatn u26.38 Autoliv u76.03 AvalonBay u113.33 AveryD 37.99 AvisBudg 13.79 Avnet 31.44 Avon 29.78 AXIS Cap u35.93 BB&T Cp 25.58 BCE g 33.40 BHP BillLt u92.14 BHPBil plc u79.94 BJs Whls 42.97 BP PLC 43.79 BPZ Res 4.12 BRE u45.91 BRFBrasil s 15.08 BakrHu 49.94 BallCp u66.06 BallyTech 37.76 BcBilVArg 12.27 BcoBrades u22.50 BcoSantand 11.94 BcoSBrasil u15.30 BcpSouth 14.00 BkofAm 12.36 BkAm wtA 7.05 BkAm wtB 2.58 BkIrelnd d2.58 BkNYMel 28.17 Barclay 18.87 BarVixShT d11.14 BarrickG u49.21 Baxter 51.52 BeazerHm 4.51 BeckCoult 55.15 BectDck 77.54 Belo 6.26 Bemis 31.74 Berkley u28.54 BerkH B s 83.72 BestBuy 44.75 BigLots 30.12 BBarrett 37.17 BioMedR 19.27 BlackRock 173.15 Blackstone 14.15 BlockHR 12.22 Boeing 71.27 Boise Inc u7.98 Boise wt .78 Borders 1.22 BorgWarn u59.26 BostProp 90.15 BostonSci 6.92 BoydGm 9.76 Brandyw 12.20 BrasilTele 23.26 BridgptEd 15.09 Brinker 18.89 BrMySq 26.69 -.08 +.98 -.38 +2.46 -.19 -.18 -.09 +1.87 +.14 +1.98 +.32 +1.28 +.30 +1.96 +.53 +.98 -.68 -1.76 -.17 +.75 -.03 +.36 +.31 +1.52 +.04 -.40 +1.29 +4.17 ... +.96 +.48 +1.50 +.04 +.71 +.38 +1.32 +.35 +.30 +.15 +1.17 +.39 +1.58 -.36 +2.35 +.01 -3.36 -.21 +1.68 +.34 +.55 -.04 -2.33 ... +.07 +.32 +2.97 -.01 +.03 +.03 -.20 +.40 +.89 -.80 -.52 +.06 -.71 ... +.35 +.27 +3.23 -2.67 -1.54 -.13 +2.23 -.36 +.05 +.75 +.99 -.08 -.19 +.20 +.39 +.09 +.78 -1.26 -.72 +.09 +.28 -.04 +.69 -.02 -.33 -.41 -3.71 +.11 +.85 -.09 +2.03 +.54 +2.22 +.12 +.89 +.47 +1.76 +.22 +.46 +.11 +.26 +.13 +.56 +.34 +2.61 +.87 +3.60 -.49 +.31 +.27 +.93 +1.29 +3.51 -.28 -1.15 -.07 +2.75 +1.65 +6.04 -.10 +1.86 +.14 +2.20 -1.06 -1.34 +.94 +1.05 -.01 +.23 +.03 +.06 +.69 +2.03 +.90 +7.67 +.61 +2.13 +.38 +.40 +.61 +3.74 +.56 +3.71 -.21 -1.97 +4.18 +8.08 +.23 +1.67 +.39 -.82 +.04 +1.94 +.15 -.69 +.04 +.71 +.59 +1.85 -.36 +.96 +.17 +.75 +.05 -.36 +.79 +2.99 +.69 +3.16 +.03 +5.08 +.24 +7.02 +.20 +1.64 +.66 +2.18 +.43 +1.66 +.76 -.67 +.31 +1.88 +1.38 +2.17 -.34 -.11 +.94 +9.56 +.92 +9.14 +.06 +1.24 -.12 +2.99 +.12 +.40 +.57 +2.98 -.01 +.45 -.80 +3.52 +.33 +1.70 -.27 +1.68 -.47 -.88 +.03 +1.71 -.56 -.87 -.25 +.91 -.08 +.81 +.23 +.91 +.45 +1.15 +.22 +.53 -.28 -.50 +1.67 +3.11 -.07 +1.22 -.12 -1.96 -.10 +1.12 +.05 +.59 +.18 +.45 +.73 +2.09 -.71 +2.02 -.04 +.49 +.23 -.02 -.01 +1.02 +.76 +4.16 +1.07 +1.77 +.86 -1.25 -.43 -.58 +.11 +.92 +4.14 +2.16 ... +.67 +.46 +.44 +.42 +1.05 +.11 +.73 +.06 +.13 +.01 ... +.74 +3.15 +1.51 +3.96 +.43 +.53 +.19 +1.45 +.17 +.23 -.03 +1.21 +.05 +.88 -.02 +.35 -.14 -.21 Name Chg Wkly BroadrdgF 21.51 Brookdale 20.52 BrkfldAs g u31.56 BrkfldPrp u18.57 Brunswick 17.44 Buckle 33.86 Buenavent u54.20 BungeLt 60.25 CB REllis 19.85 CBL Asc u18.47 CBS B 17.01 CF Inds u122.47 CIGNA 37.36 CIT Grp n 43.46 CMS Eng 18.38 CNA Sure u23.36 CNO Fincl 6.05 CSX u61.80 CVR Engy u11.72 CVS Care 30.94 Cabelas u23.11 CablvsnNY u28.70 CabotO&G 32.21 CalDive 5.35 Calpine 12.40 CamdnP u52.67 Cameco g 33.26 Cameron 46.13 CampSp 36.61 CdnNRy g 64.50 CdnNRs gs 39.46 CapOne 40.36 CapitlSrce u6.48 CapsteadM 11.68 CardnlHlth 35.21 CareFusion 24.11 CarMax u32.35 Carnival u44.70 Carters 28.05 Caterpillar u83.54 Celanese u39.07 Celestic g 9.16 Cemex 9.66 Cemig pf 17.90 CenovusE n 29.40 CenterPnt u16.68 CnElBrasil 14.36 CntryLink u42.57 ChRvLab 31.46 ChesEng 22.27 Chevron 84.98 ChicB&I u27.96 Chicos 10.51 Chimera 4.05 ChCBlood n d3.97 ChiMYWd n 12.40 ChinaMble 53.04 ChNBorun n 14.77 ChinaSecur 5.85 ChinaUni 14.29 Chipotle u230.56 Chiquita 12.45 Chubb u59.47 Cimarex 79.88 CinciBell 2.62 Cinemark 18.35 Citigp pfN 26.80 Citigrp 4.49 CliffsNRs 71.10 Clorox 62.58 Coach u52.92 CocaCE 24.61 CocaCl u62.58 Coeur 23.48 ColgPal 77.57 CollctvBrd 16.67 ColonPT u19.47 Comerica 38.64 CmclMtls 14.56 ComScop 31.45 CmtyHlt 32.25 Compellent 23.66 CompPrdS u26.59 CompSci 49.74 ComstkRs 24.23 Con-Way 35.32 ConAgra 22.14 ConchoRes u76.92 ConocPhil 61.81 ConsolEngy 39.30 ConEd u51.00 ConstellA u20.07 ConstellEn 30.72 ContlRes 49.93 Cooper Ind u54.22 CooperTire 21.58 CoreLogic 18.23 CornPdts u43.81 Corning 18.88 CorpOffP 36.33 CorrectnCp u26.25 Cosan Ltd u13.90 Costamre nud11.75 Cott Cp 8.35 Cntwd pfB 23.60 Covance 44.38 CovantaH 15.65 CoventryH 24.87 Covidien 41.73 CredSuiss 43.80 CrwnCstle 42.95 CrownHold u32.50 Cummins u96.39 CurEuro 139.83 Cytec 52.52 -.95 -.49 +.65 +1.74 +.72 +1.84 +.33 +1.18 +.94 +1.63 +.88 +4.77 +.74 +1.31 -.37 +.18 +.16 +1.50 +.35 +2.79 -.65 +.08 +1.28 -.06 -.01 +2.20 +.23 +.13 -.25 +.21 -.14 +4.11 +.06 +.61 -.72 +.35 -.03 +2.20 -.57 +.81 +.07 +4.57 +.34 +1.96 +.35 +3.23 +.20 +.29 -.06 -.10 +.61 +3.08 +.43 +2.30 +.54 +2.38 -.05 +.36 -.84 -.28 +.22 +2.99 +1.06 +3.09 +.05 +.37 +.12 +.28 -.48 +.52 -.03 -.03 +.34 +1.36 +.14 +1.53 +.65 +3.16 +.36 +4.94 +.74 +3.42 +.08 +.74 +.01 +.89 -.53 +.06 -.36 +1.58 -.24 +.12 -.30 +.39 -.48 +1.19 -.45 -1.31 -.02 +.59 -.16 +2.38 +.97 +2.75 +.06 +.79 +.01 -.05 -1.69 -1.58 +.14 +.65 +.02 +1.67 -.24 +.14 +.09 +.45 -.06 +.29 +7.70+20.35 ... -.82 -.54 +1.45 -.60 +3.13 -.05 +.17 +.43 +.80 +.03 +.30 +.16 +.32 +1.10 +5.90 +.44 -3.97 +.52 +2.92 +.21 +.60 +.13 +1.26 +1.26 +2.87 -.87 +.45 +.56 +1.34 +.37 +1.69 +.63 +2.86 -.03 +.68 -.02 -.21 +.77 +2.17 -.44 -1.61 +.26 +3.16 +.08 +.69 -.07 +1.88 +.32 +2.31 -.05 -.35 -.05 +8.25 +.56 +2.42 +.85 +2.54 +.12 +1.28 +.12 +.34 -.05 +.48 -.06 +2.40 +.16 +1.80 -.17 +1.97 +.13 +.66 +1.24 +1.26 -.04 +.60 +.60 +.84 -.03 +.58 -.18 +.76 -.10 ... -.06 +.15 +.27 +.40 -.77 -2.61 -.17 -.13 +1.39 +1.45 +1.39 +1.86 +.03 +2.30 -.41 -.17 -.41 +.32 +.75 +8.29 -1.67 +1.15 +.65 +3.06 Name Chg Wkly DirEMBr rs d20.62 DirFnBear d10.42 DrxFBull s 26.48 Dir30TrBear 40.51 DrxREBll s u62.31 DirxSCBull 60.69 DirxLCBear d9.84 DirxLCBull 65.32 DirxEnBull 44.56 Discover u18.91 Disney 37.20 DolbyLab 69.51 DollarGn n 28.00 DollarTh 48.13 DomRescs 43.50 Dominos 15.15 Domtar grs u81.94 DoralFncl 1.82 DEmmett 18.24 Dover u55.08 DowChm u32.50 DrPepSnap 37.15 DresserR 38.38 DuPont u48.18 DuPFabros 24.75 DukeEngy u18.49 DukeRlty 12.93 Dynegy rs 4.44 EMC Cp 21.57 ENI 46.34 EOG Res 88.61 EQT Corp 38.36 EastChm 79.72 EKodak 4.83 Eaton u93.88 EatnVan 31.75 EVTxMGlo 11.54 +.06 -3.51 -.63 -2.17 +1.40 +4.30 +1.81 +2.11 +1.77 +8.38 +1.08 +8.06 -.14 -1.12 +.91 +6.36 +.60 +6.28 +.17 +1.26 +.17 +1.08 +3.66 +7.83 -.35 -.19 +.25 +1.73 -.03 +.04 +.09 +.31 +1.12 +2.58 +.29 +.32 +.29 +.30 -.13 +1.98 -.27 +1.66 -.07 +.56 +1.32 +4.16 -.18 +.90 +.43 -.35 -.04 +.28 +.22 +.48 -.05 -.20 -.09 +.55 -.61 +1.41 +.32 -7.11 -.46 +1.14 -.98 +1.15 -.02 +.13 +.63 +5.63 +.65 +2.98 +.14 +.51 Chg Wkly ForestCA 15.70 +.14 +1.11 ForestLab u33.24 -.73 +.19 ForestOil u34.14 +.60 +3.40 Fortress 5.03 +.30 +.63 FortuneBr 54.39 +.02 +.34 FranceTel 24.13 -.34 +.24 FrankRes u124.59 +2.43 +9.89 FMCG u104.84 +.95+10.05 FrontierCm u9.00 -.02 +.22 FrontierOil 14.60 -.08 +1.35 Frontline 27.87 -.61 -.88 G-H-I GMX Rs 4.39 Gafisa s 17.91 GameStop 19.99 GamGld g 7.11 Gannett 12.46 Gap 20.81 GaylrdEnt u34.45 GencoShip 17.18 GnCable 31.60 GenDynam 69.66 GenElec 16.73 vjGnGrthP 17.75 GenMarit 4.22 GenMills s 36.53 GenesisEn 24.28 Genpact 15.37 GenuPrt u48.24 Genworth 12.43 Gerdau 13.39 GlaxoSKln 40.85 GlimchRt u8.33 GlobalCash d2.98 GlobPay 40.33 GlbShipLs u4.97 -.17 -.09 +.13 +1.12 +.04 +.34 +.07 +.28 -.22 +.61 +.38 +1.80 +.03 +1.11 +.77 +.63 -.45 +3.66 +.49 +1.54 +.22 +.71 +.27 +.95 -.18 +.38 +.05 -1.03 +.33 -1.11 -.21 -.53 +.64 +.38 +.18 +1.10 -.49 +.35 +.80 +1.81 +.16 +.82 +.08 -.66 +.09 +1.37 +.21 +.37 Chg Wkly Name Chg Wkly MonstrWw u19.80 Moodys 28.78 MorgStan 27.28 Mosaic 70.78 Motorola 8.20 MuellerWat 3.34 MurphO u67.84 NCR Corp 14.83 NRG Egy 20.10 NV Energy u14.08 NYSE Eur 30.79 Nabors 21.70 NalcoHld u30.07 NBkGreece 2.13 NatFnPrt 13.66 NOilVarco u58.77 NatSemi 13.97 NatwHP 40.66 NavigCons 8.93 Navios 6.24 Navistar 54.76 Netezza 26.99 NY CmtyB 17.16 NY Times 8.92 NewAlliBc 13.39 NewellRub 17.47 NewfldExp u64.59 NewmtM 61.62 NewpkRes 5.73 Nexen g 21.73 NextEraEn 54.73 NiSource 17.63 NikeB u84.11 99 Cents 14.69 NobleCorp 36.34 NobleEn u85.63 NokiaCp 10.77 +.69 +1.74 +.74 +1.72 +.91 +2.41 -.26 -2.33 +.10 +.04 -.06 +.32 +.58 +2.68 +.11 +1.11 +.17 +.19 +.07 +.41 +.50 +.15 +.02 +.80 +.44 +1.89 -.05 -.13 +.35 -.14 +.51 +5.01 +.01 +.28 +.26 -.17 -.02 -.22 +.15 +.25 +.51 +6.58 ... +.03 -.17 +.48 +.29 +1.25 +.15 +.57 -.43 -.18 +.83 +4.97 +.10 +.76 +.25 -.15 +.14 +.44 -.28 -.31 +.11 +.32 +.70 +2.67 -.11 -.73 -.01 +1.95 +.47 +4.33 +.03 +.07 PetrbrsA 32.99 Petrobras 36.13 PtroqstE 6.74 Pfizer 17.18 PhmHTr 65.82 PhilipMor u60.44 PhilipsEl 31.95 PhlVH 64.32 PhnxCos 2.52 Pier 1 u9.66 PilgrmsP n 6.64 PinnclEnt 13.72 PinWst 42.14 PioNtrl u76.32 PitnyBw 23.38 PlainsEx 29.02 Plantron u36.28 PlumCrk 38.88 Polo RL u99.62 PolyOne u13.37 Polypore u34.85 PortGE u21.52 PostPrp u33.06 Potash 141.06 PwshDB u26.41 PS Agri u30.33 PS USDBull d22.18 PSFinPf 18.22 PwShPfd 14.39 Praxair 92.94 PrecCastpt u145.00 PrecDrill 7.82 PrideIntl 33.29 PrinFncl 29.80 ProShtS&P d45.32 PrUShS&P d25.43 ProUltDow u52.89 -.26 +1.97 -.20 +2.18 +.10 +1.16 -.20 -.06 -.55 +.47 -.38 +1.93 -.11 +1.50 +1.22 +2.98 +.10 +.42 +.22 +.98 -.14 +.54 -.24 +.92 -.12 +.98 +1.08 +6.52 +.34 +1.44 -.53 +1.15 -1.55 +.40 +.16 +2.04 +.29 +2.74 -.23 +.45 +2.11 +1.58 +.05 +.62 +.11 +2.62 -.91 -4.03 +.11 +1.23 -.07 +.63 +.21 -.19 ... +.13 +.01 +.08 +.65 +1.60 +1.77 +8.42 -.16 +.02 -.11 +2.97 +.21 +2.96 -.19 -1.69 -.21 -1.90 +.07 +2.94 Name. DCT Indl 4.97 DPL 27.06 DR Horton 11.98 DTE 46.83 DanaHldg u15.02 Danaher s u45.00 Darden 48.19 DaVita u71.77 DeVry 47.37 DeanFds 10.55 Deere u79.10 DelMnte 14.67 DeltaAir 14.26 DenburyR 18.60 DeutschBk 58.98 DBGoldDL u41.50 DBGoldDS d8.28 DevelDiv u14.08 DevonE 70.78 Diageo u75.28 DiaOffs 69.80 DiamRk 11.05 DianaShip 13.62 DicksSptg 29.75 DigitalRlt 56.74 DigitalGlb 30.71 Dillards 28.46 DrxTcBll s 44.28 DrxEMBll s u43.23 DrSCBear rsd19.42 DREBear rs d17.52 DrxEBear rsd30.85 -.02 -.04 +.13 +.96 +.21 +1.55 -.27 +.07 +.18 +.85 +.30 +1.64 +.32 +2.48 -.56 +.02 +.79 -.49 -.08 +.15 -.08 +2.30 +.42 +.33 +.08 +.38 -.05 +1.58 -.42 +1.10 +.24 +2.20 -.04 -.49 +.46 +1.16 +1.18 +5.76 -.65 +1.28 +.07 +3.64 +.08 +.47 +.26 -.03 +.05 +.93 +.18 -2.99 -.17 -1.94 +.94 +2.95 +.04 +4.04 -.15 +5.83 -.36 -3.19 -.51 -2.83 -.46 -5.38 Ecolab 49.65 EdisonInt u38.22 ElPasoCp u13.46 Elan 5.57 EldorGld g 18.83 EBrasAero u31.22 EmersonEl u57.28 Emulex 11.28 EnCana g s 29.03 Energizer 67.60 EngyTsfr 51.45 EnergySol 4.63 Enerpls g u29.66 ENSCO 50.14 Entergy 75.40 EntPrPt u44.02 Equifax 34.74 EqtyRsd 50.84 EsteeLdr 72.16 EtfSilver u26.69 ExcelM 6.36 ExcoRes 18.34 Exelon 41.17 ExterranH 22.79 ExtraSpce u17.32 ExxonMbl 70.00 FMC Tech u78.06 FNBCp PA 9.20 FTI Cnslt 33.76 FairchldS 12.57 FamilyDlr u48.43 FedExCp 90.00 FedSignl 6.10 FedInvst 25.46 FelCor 6.60 Ferro u14.85 FibriaCelu 18.71 FidlNFin 14.10 FidNatInfo 27.95 FstBcpPR .31 FstCwlth 6.32 FstHorizon d10.40 FstInRT 7.80 FstMercFn u16.29 FirstEngy 35.89 FlagstB rs d1.27 Flowserve 104.18 Fluor u54.53 FootLockr 16.61 FordM u16.21 FordM wt u7.50 FordC pfS u51.35 ArenaPhm 1.55 AresCap u17.24 AriadP 3.76 Ariba Inc 19.77 ArkBest 25.50 ArmHld 17.26 Arris 10.13 ArtTech u5.97 ArthroCre 28.47 ArubaNet u23.13 AscentSol 4.42 AsiaEntRs u10.19 AsiaInfoL 20.46 AspenTech u12.40 AsscdBanc 13.52 athenahlth 41.05 Atheros 33.00 AtlasAir u61.19 AtlasEngy 30.50 Atmel u10.28 AudCodes u5.10 Autodesk 35.68 AutoData u45.84 Auxilium 21.57 AvagoTch u25.37 AvanirPhm u4.79 AviatNetw 4.38 Axcelis u2.53 BE Aero u38.46 BGC Ptrs u7.61 BJsRest 34.65 BMC Sft 46.17 BMP Sunst 9.82 BSD Med u5.06 BannerCp 1.85 BeacnRfg 15.61 BebeStrs 6.67 BedBath 45.13 BenefMut d7.71 BigBand h 3.28 Biocryst 5.25 Biodel d1.88 BioFuelEn 2.17 BiogenIdc 62.78 BioMarin 25.71 BioSante 1.63 BioScrip d4.54 BlkRKelso 11.86 Blkboard 42.76 BlueCoat 28.00 BlueNile 48.30 BostPrv 5.63 BttmlnT 18.88 BreitBurn u19.42 BrigExp u23.17 Brightpnt u9.03 Broadcom u42.34 Broadwind 1.93 BrcdeCm 6.06 BrklneB 10.20 BrooksAuto 7.48 BrukerCp 15.35 Bucyrus 73.77 BuffaloWW 49.19 CA Inc 23.46 CBOE n 24.65 CH Robins 71.79 CME Grp 295.03 CNinsure 22.84 CTC Media u23.53 CVB Fncl 8.49 ... -.10 +.21 +.50 +.01 +.08 +.02 +.99 -.35 +.20 +.60 -.42 +.02 +.82 ... +1.77 +.47 +1.19 -.17 +1.20 +.13 +.05 +2.12 +4.92 -.40 -1.74 +.19 +1.20 +.25 +.88 +.45 +1.08 -.21 +1.96 +1.04 +8.93 -.18 +1.35 +1.35 +1.42 +.09 +.11 -.16 -.52 +.08 +1.35 -.42 -3.18 +.08 +.69 +.04 +2.37 -.34 -.17 -.03 +.39 +1.20 +1.70 +.02 +.65 +.31 +1.50 -.18 +.71 ... -.02 +.27 +.31 +.17 +.20 +.34 +.85 +.59 +.11 +.32 +1.23 ... +.37 +.02 +.31 +.21 +.29 -.05 -1.75 -.05 -.07 +.28 +.07 -.19 -.40 +.06 +.13 ... -1.09 -.19 +.14 -.20 +1.02 +.35 +1.03 +2.80 +5.70 +.13 -.08 +.87 +.86 +.25 +.36 +.21 +2.07 +.15 +1.52 -.12 +1.51 -.06 +.03 -.14 -.29 +.05 +.46 -.03 +.68 +.05 +.36 +1.29 +5.64 +.49 +2.16 -.10 +.26 +.64 +.64 -.46 +1.31 -2.09 +5.38 +.73 -2.86 -.26 -.07 +.19 +.88 CadencePh 7.90 -.10 -.98 Cadence 8.61 +.15 +.14 CaliperLSc u4.93 -.04 +.43 Callidus 4.76 -.04 -.15 CalumetSp 21.11 +.21 -.68 CdnSolar 15.85 -.05 +1.88 CapellaEd 54.61 +1.40 -.28 CapProd 8.70 +.08 +.09 CpstnTrb h .79 +.00 +.04 Cardiom g 4.80 +.08 -.26 CardioNet 5.83 +.19 +.73 Cardtronic u17.86 -.01 +.91 CareerEd 17.49 +.29 -.05 Carrizo 24.49 -.15 +.87 Caseys 39.75 +.10 -1.71 CatalystH 43.44 -.15 +5.59 CathayGen 14.59 +.29 +.99 CaviumNet u35.20 -.14 +3.33 CeleraGrp d5.82 +.16 +.11 Celgene 61.22 -1.10 -.81 CelldexTh 4.70 +.21 +.25 CentEuro 26.19 +.92 +1.22 CEurMed 22.91 -.98 -.10 CentAl 14.81 +.01 +1.29 Cephln 66.11 -.75 -.33 Cepheid u21.93 +.65 +.89 CeragonN 10.95 -.22 -.11 Cerner 87.82 +.42 -.01 ChrmSh 3.53 +.02 +.04 ChkPoint u43.35 +.35 +.60 Cheesecake 29.80 -.07 +.68 ChildPlace 44.94 +.34 +.88 ChinAgri s 14.71 +.72 +1.86 ChinaBAK 2.20 +.31 +.32 ChinaBiot 13.61 -.04 +1.07 ChinaDir 1.33 +.01 -.09 ChinaMda u19.61 +.07 +4.15 ChinaNGas 6.99 +.13 +.82 ChinaSun 4.70 -.04 +.19 ChiValve n 10.50 -.15 +1.78 ChiCache n 25.89 +1.46 +1.77 CienaCorp 14.37 +.17 +.56 CinnFin u30.74 -.16 +1.29 Cintas 28.20 +.03 +.73 Cirrus 13.89 +.93 +1.03 Cisco 24.26 +.05 +1.40 CitrixSys 65.31 -.61 +1.18 CleanEngy 15.35 -.35 +.83 Clearwire 6.93 -.24 -.16 CogentC 11.64 +.04 +.79 Cogent 10.49 -.01 -.03 Cognex u29.59 +.43 +2.89 CognizTech 63.36 -.92 -1.83 Coinstar u61.74 -.04 +4.16 ColdwtrCrk 3.54 +.04 +.17 ColBnkg 19.10 +.39 +.89 Comcast u21.04 -.02 +.41 Comc spcl u19.86 -.02 +.50 CmcBMO 38.80 +.85 +1.96 CmclVehcl u15.53 +.53 +2.10 CommVlt u30.20 -.20 +1.27 Compuwre 10.28 +.05 +.27 ComScore u22.51 +.27 -1.00 Comtech 31.50 +.11 +.68 ConcurTch u54.05 +.36 +2.43 Conexant 1.46 +.01 -.04 ConstantC 24.04 -.21 +1.04 CopanoEn 28.56 +.53 +.60 Copart 34.49 +.11 +.63 CorinthC d4.03 +.06 -1.20 Costco u65.40 -.08 +2.63 D-E-F Name +.11 +.33 +.39 +1.32 +.18 +.20 +.06 +.12 -.06 +1.90 -.03 +2.37 +.53 +2.38 +.33 -.12 -.28 +.81 +.30 -7.18 +.26 +1.35 -.03 -.06 +.59 +2.42 +.26 +3.80 ... +.87 +.84 +1.17 -.20 +1.61 +.43 +2.21 +.03 +.99 +.60 +2.06 +.38 +.54 -.64 +3.51 ... +.35 -1.40 -2.38 +.07 +1.12 +.62 +3.51 +.65 +5.96 +.06 +.70 -1.19 -1.70 +.12 +1.30 +.66 +2.26 +1.20 +2.28 -.06 +.45 +.52 +.79 +.14 +.45 +.17 +1.13 -.48 +.75 +.31 +.71 +.14 +.85 +.00 +.01 -.02 +.50 +.19 +.31 -.08 +.47 -.02 -.01 -.06 +.12 -.03 ... +5.34 +4.18 +4.73 +6.34 +.23 +.68 +.35 +2.08 +.29 +1.82 +.28 +1.65 GoldFLtd u16.86 +.09 +1.09 Goldcrp g 46.23 +.03 +1.64 GoldmanS 171.07 +4.68 +9.94 Goodrich u86.36 +.27 +4.29 GoodrPet 13.41 +.44 -.23 Goodyear 10.47 -.02 +.25 GrafTech u19.11 +.16 +2.64 Gramrcy 2.24 -.06 ... GrtAtlPac 3.78 -.09 +.34 GtPlainEn 19.41 +.05 +.38 GpTelevisa u23.17 +.09 +.72 Guess 41.21 +.92 +2.29 GushanEE 1.08 +.11 +.09 HCC Ins 28.20 -.03 +1.72 HCP Inc 36.39 +.09 +.85 HSBC 55.55 -1.37 +3.44 HSBC Cap2 27.77 +.05 +.12 Hallibrtn 31.92 -.93 +.06 Hanesbrds 25.29 +.49 +.49 HarleyD 33.63 +.23 +2.97 Harman 39.88 +.07 +6.33 HarmonyG u12.35 -.01 +.82 HarrisCorp 47.33 +.45 +2.14 Harsco 24.14 -.03 +.96 HartfdFn 26.42 +.17 +2.47 Hasbro 47.26 -.01 +1.01 Headwatrs 3.81 ... +.41 HltCrREIT u50.28 -.76 -.13 HltMgmt 8.63 +.21 +.62 HealthNet u28.68 -.28 +1.79 HlthSouth 18.38 -.35 +.31 HlthSprg 27.82 -.43 -1.37 HeclaM u7.93 +.25 +1.04 Heinz u49.25 -.48 +.14 HelixEn 13.67 +.04 +.98 HelmPayne 43.70 -.29 +.92 Herbalife 65.68 +.16 +1.82 Hersha 6.23 -.01 +.13 Hershey 48.49 -.37 -1.00 Hertz 12.29 +.30 +.97 Hess u69.98 +.73 +6.95 HewlettP 43.72 -.35 +1.68 Hexcel 18.15 +.14 +.38 hhgregg 23.48 +.75 +.44 HighwdPrp 33.92 +.02 +.80 HollyCp u32.25 -.54 -.48 HomeDp 31.92 -.02 +1.02 Honda 35.75 +.99 -.28 HonwllIntl u49.28 +.27 +2.17 Hornbeck 20.61 -.80 -1.63 Hospira u59.54 -.05 +.06 HostHotls u17.12 +.25 +1.23 HovnanE 4.04 +.12 +.48 Humana u59.56 +.30 +1.27 Huntsmn u13.71 -.17 -.14 Hypercom u6.54 -.01 +.58 IAMGld g 18.50 -.94 +.22 ICICI Bk u57.57 +.16 +4.99 ING 11.11 -.17 +.33 ION Geoph 6.06 ... +1.17 iShGold s u13.65 +.04 +.37 iSAstla u26.27 +.03 +1.80 iShBraz u81.16 -.42 +4.12 iSCan u30.01 +.08 +1.09 iShGer u24.57 -.21 +.74 iSh HK u20.18 +.06 +1.45 iShJapn 10.34 +.09 +.32 iSh Kor u57.44 -.35 +3.05 iSMalas u14.34 -.06 +.27 iShMex 59.50 +.31 +1.98 iShSing u14.31 +.02 +.67 iSPacxJpn u48.91 +.06 +3.33 iSSpain 41.68 -1.40 -1.26 iSTaiwn u14.41 -.01 +.51 iSh UK u17.86 -.09 +.81 iShSilver u26.20 +.57 +2.03 iShS&P100 55.37 +.17 +1.93 iShDJDv u49.30 +.06 +1.22 iShBTips 111.50 -.38 +.14 iShChina25 u47.83 -.05 +2.86 iShDJTr u88.92 +.06 +3.15 iSSP500 u123.15 +.52 +4.26 iShBAgB 108.62 -.30 +.35 iShEMkts u48.49 -.09 +2.37 iShiBxB 112.74 -.36 +.82 iShSPLatA u54.53 -.10 +2.41 iSSPVal 57.79 +.38 +2.12 iShB20 T 97.98 -1.71 -2.12 iShB7-10T 99.40 -.42 +.87 iShB1-3T 84.39 -.07 -.03 iS Eafe u59.20 -.26 +2.19 iSRusMCV u43.52 +.26 +1.60 iSRusMCG u53.58 +.26 +1.80 iSSPMid u86.04 +.61 +3.23 iShiBxHYB u91.79 -.10 +1.66 iSR1KV 62.99 +.35 +2.18 iSR1KG u55.78 +.08 +1.89 iSRus1K u67.92 +.25 +2.33 iSR2KV 67.74 +.44 +3.36 iSR2KG u81.61 +.35 +3.40 iShR2K 73.77 +.41 +3.47 iShUSPfd 39.67 +.03 +.27 iSSPMatl u71.33 +.28 +4.17 iShREst u57.62 +.57 +2.66 CowenGp 4.21 Cray Inc 5.89 Cree Inc 54.49 Crocs 14.46 CrosstexE 8.89 Ctrip.com s u47.52 CubistPh 23.44 Curis 1.67 Cyclacel 1.60 CypSemi u15.33 Cytori 4.49 FEI Co 23.24 FLIR Sys 28.61 FSI Intl 3.13 FalconStor d2.53 Fastenal 53.74 FifthThird 13.03 Finisar 19.29 FinLine 16.17 FFnclOH 17.69 FMidBc 11.36 FstNiagara 12.44 FstSolar 138.83 FstMerit 18.73 Fiserv u55.78 Flextrn 7.21 FlowInt 3.29 FocusMda u26.00 FormFac 10.53 Fortinet n u31.29 Fossil Inc u62.22 FosterWhl 27.21 FresKabi rt .04 FreshMkt nud32.11 FuelSysSol 36.47 FuelCell 1.27 FultonFncl 9.41 Fuqi Intl lf 7.65 FushiCopp 10.35 iShDJHm 12.25 iShFnSc 56.36 iShSPSm 64.66 iShBasM u72.04 iStar 5.68 ITT Corp 48.68 ITT Ed 60.00 ITW 48.36 IndoTel 35.67 IngerRd u41.03 IngrmM 18.26 IntcntlEx 117.44 IBM u146.92 Intl Coal u6.16 IntFlav u53.23 IntlGame 16.55 IntPap 26.44 IntlRectif u27.50 InterOil g 78.43 Interpublic 10.64 IntPotash 32.38 Invesco u24.24 InvMtgCap 22.65 IronMtn 22.90 ItauUnibH u26.24 IvanhM g u26.50 “Local Service - Local Knowledge” +.11 +.88 +1.02 +3.35 +.36 +3.06 +.57 +3.40 +.09 +1.11 +.89 +1.49 +1.58 -4.53 +.47 +2.68 -1.33 -4.72 +.43 +1.72 -.01 +.60 +2.72 +2.57 +.13 +3.32 +.03 +.54 -.11 +3.07 +.17 +.96 +.26 +1.16 +2.62 +4.27 +2.64 +7.25 +.26 +.29 -.31 -1.95 +.24 +1.24 -.15 +1.08 +.09 +1.11 -.02 +1.69 ... +2.43 J-K-L JCrew 34.01 JPMorgCh 40.94 JPMAlerian u36.49 Jabil 15.63 JacobsEng 42.48 Jaguar g 7.57 JanusCap 12.24 Jarden 32.42 Jefferies 25.40 JinkoSol n u35.99 JohnJn 64.65 JohnsnCtl u36.80 JonesGrp 14.95 JnprNtwk u34.39 KB Home 12.24 KBR Inc u27.08 KKR n u13.25 KKR Fn 9.14 KT Corp 21.04 KC Southn u46.53 Kellogg 49.32 Kennamtl u35.19 KeyEngy 10.27 Keycorp 8.40 +1.16 +2.02 +1.14 +3.31 +.33 +1.01 +.33 +.29 +1.37 +3.87 +.47 +1.10 +.34 +1.68 +.15 +.36 +.26 +1.47 -1.53 +5.84 -.11 +.91 +.30 +1.68 +.21 +.49 +.55 +2.00 +.38 +1.80 +.96 +1.68 -.14 +.57 +.01 +.35 -.09 +.35 +.68 +2.71 +.01 -.94 +.38 +1.17 -.06 +.42 -.21 +.20 KimbClk 63.03 Kimco u18.08 KindME 70.04 KindredHlt 14.59 KingPhrm 14.15 Kinross g 18.84 KnghtCap 14.03 KnightTr 18.61 Kohls 53.30 Kraft 31.08 KratonPP n 28.97 Kroger 23.11 L-1 Ident 11.78 L-3 Com 73.90 LDK Solar 13.18 LG Display 17.95 LSI Corp 5.61 LabCp u82.99 LaBrnch 3.14 LVSands u51.98 LaSalleH 25.10 Lazard 37.91 LeapFrog 5.63 LeggMasonu35.41 LeggPlat 20.50 LenderPS 30.72 LennarA 15.85 LeucNatl 27.30 LexRltyTr u8.70 Lexmark 39.19 LibtProp 34.82 LillyEli 35.72 Limited u31.81 LincNat 25.43 LiveNatn 9.81 LizClaib 6.80 LloydBkg 4.54 LockhdM 73.27 Loews u40.08 Lorillard u88.92 LaPac 8.04 Lowes 22.29 LumberLiq 21.94 LyonBas A u28.35 LyonBas B u28.34 +.05 -.31 +.47 +.87 +.15 +.57 ... +.87 -.01 +.01 ... +.89 +.40 +1.00 +.11 +.75 +1.38 +2.08 -.71 -1.19 -.53 -3.49 -.10 +1.11 -.01 -.01 +.53 +1.72 +.29 +1.81 -.20 +.74 +.11 +.37 +.18 +1.67 -.04 -.11 -.03 +6.10 +.14 +1.41 +1.19 +1.14 -.26 +.04 +1.03 +4.38 -.08 +.12 -.68 +1.88 +.04 +1.34 +.29 +1.88 +.36 +.92 -.58 +1.16 +.37 +1.36 -.04 +.52 +.38 +2.42 +.53 +.95 ... +.32 +.02 +.68 -.03 +.16 +1.31 +1.98 +.01 +.59 -.02 +3.58 -.25 +.30 -.01 +.95 +.43 -2.14 +.94 +1.49 +.96 +1.45 M-N-O M&T Bk MBIA MDC MDU Res MEMC 82.70 12.34 29.08 20.38 12.73 +.21 +7.95 +.20 +1.13 +.36 +3.58 +.04 +.45 +.20 -.09 MF Global 8.20 MFA Fncl u8.08 MGIC 9.67 MGM Rsts 12.11 MPG OffTr 2.90 Macerich u49.40 MackCali 34.39 Macys u25.57 MagnaI g u99.46 Manitowoc 11.87 ManpwI 57.50 Manulife g 14.76 MarathonO 33.92 MarinerEn u26.28 MktVGold u60.09 MkVStrMet u21.14 MktVRus 36.23 MktVJrGld u40.51 MktV Agri u52.04 MarIntA u39.55 MarshM u25.97 MarshIls 5.54 Masco 11.56 MasseyEn 46.94 Mastec u14.91 MasterCrd 256.29 McClatchy 3.24 McDrmInt s u16.12 McDnlds 79.30 McGrwH u39.31 McKesson 66.30 McMoRn 16.83 McAfee 47.32 MeadJohn u59.44 MeadWvco 26.46 Mechel 25.99 MedcoHlth 59.12 MedProp u11.39 Medicis 28.77 Medtrnic 35.35 Merck 35.70 MetLife 42.10 MetroPCS u11.72 MindrayM 29.78 Mirant 10.93 MitsuUFJ 4.66 MizuhoFn 2.96 MobileTel s 23.28 Mohawk 57.08 MolsCoorB u50.25 Molycorp n 35.51 Monsanto 62.27 +.07 +.37 +.08 +.17 +.45 +.85 -.21 +1.18 +.10 +.19 +.37 +4.82 +.63 +.81 +.01 +1.90 +5.85 +8.92 -.09 +.73 -.01 +2.77 +.63 +2.06 +.09 -1.65 +.10 +1.36 +.10 +2.79 -.05 +.53 -.13 +1.94 +.58 +4.33 -.08 +1.14 +.40 +2.50 -.05 +.99 -.20 -.41 +.22 +.90 +4.73 +4.87 +.58 +2.71 +1.40+16.23 -.03 +.48 -.06 +.69 +.12 +1.53 +.47 +1.66 -.75 +.32 -.25 -.01 ... +.02 -.01 +.62 -.37 +.73 +.72 +2.44 -.68 +6.59 -.06 +.20 -1.62 -.98 -.22 +.12 -.95 -.61 -.06 +2.51 +.35 +1.32 +.11 +.80 +.04 +.32 -.02 ... +.02 +.06 -.05 +1.63 -3.24 -.26 +.42 +3.02 -1.00 +.11 -.55 +2.85 Nomura 5.30 +.10 +.24 Nordstrm 42.50 +.57 +3.99 NorflkSo u62.31 -.41 +1.18 NoestUt u31.75 -.09 +.47 NorthropG 65.34 +.07 +2.12 NStarRlt 4.34 -.01 -.04 Novartis 58.63 -.42 +.68 NuSkin 32.09 -.27 +1.48 Nucor 40.40 +1.00 +2.18 OcciPet 84.23 -.26 +5.60 Oceaneer 68.23 +.23 +6.36 OcwenFn d9.40 +.25 +.77 OfficeDpt 4.69 +.04 +.20 OfficeMax 18.27 +.54 +.57 OilSvHT 126.09 -.36 +6.89 OldNBcp 10.33 +.38 +.87 OldRepub 13.05 -.07 -.15 Olin 19.84 +.15 -.15 Omncre 25.58 +.07 +1.46 Omnicom u46.74 +.32 +2.78 Orbitz 5.81 +.18 -.99 OrientEH 11.73 +.24 -.93 OshkoshCp 30.10 -.13 +.59 OvShip 35.83 -1.53 +2.84 OwensCorn 28.45 +.27 +1.41 OwensIll 28.47 -.03 +.44 P-Q-R PG&E Cp u48.58 +.07 +.76 PHH Corp 20.80 +.19 +1.53 PMI Grp 3.61 +.23 +.27 PNC 58.41 +2.48 +4.51 PNM Res 12.97 +.11 +1.18 PPG u79.67 +.54 +2.97 PPL Corp 27.00 +.20 +.14 PackAmer 25.93 +.32 +1.50 Pactiv 33.19 +.05 +.02 ParkDrl 4.28 -.06 +.05 ParkerHan u81.68 +1.30 +5.13 PatriotCoal 15.32 +.79 +1.83 PeabdyE u57.75 +.96 +4.94 Pengrth g u12.75 -.01 +.76 PennVa 15.81 +.01 +1.05 PennWst g u23.58 -.27 +.78 Penney 32.59 +.27 +1.41 PenRE 15.68 +.34 +1.41 Penske 15.27 +.37 +1.82 Pentair 33.87 -.07 +1.14 PepcoHold 19.27 -.10 +.01 PepsiCo 65.08 -.27 -.22 PerkElm 24.00 -.07 +.55 Petrohawk 16.90 +.06 -.09 PrUlShDow d21.60 -.03 -1.31 ProUltQQQ u79.05 +.02 +4.18 PrUShQQQ d12.16 ... -.72 ProUltSP 45.42 +.36 +3.07 ProUShL20 35.28 +1.11 +1.29 ProUSRE rs d17.83 -.38 -1.86 ProUSOG rsd45.59 -.32 -4.97 ProUSBM rsd22.83 -.33 -2.39 ProUltRE rs u52.82 +1.04 +4.82 ProUShtFn d16.75 -.65 -2.30 ProUFin rs 63.54 +2.35 +7.35 ProUltO&G 38.35 +.24 +3.56 ProUBasM u43.80 +.72 +3.92 ProShtR2K d34.52 -.18 -1.78 ProUSR2K d14.47 -.17 -1.56 ProUltR2K 37.83 +.43 +3.43 ProUSSP500d21.53 -.27 -2.48 ProUltSP500 189.12 +2.46+18.88 ProUltCrude 11.66 +.09 +1.43 ProUSSlv rsd14.18 -.65 -2.62 ProUShCrude11.26 -.10 -1.62 ProSUltSilv u123.64 +5.15+18.05 ProUShEuro 18.56 +.44 -.36 ProctGam u65.00 ... +1.43 ProgrssEn 45.14 +.03 +.14 ProgsvCp u21.94 -.03 +.78 ProLogis 14.57 +.46 +.94 ProtLife 25.12 +.55 +1.15 ProvET g u7.99 +.10 +.31 Prudentl 55.64 +.05 +3.06 PSEG 33.02 -.24 +.68 PubStrg u104.74 -.16 +5.52 PulteGrp d7.86 +.11 +.01 QEP Res n 33.46 -.72 +.43 QuantaSvc 17.85 +.08 -1.81 QntmDSS u3.47 -.02 +.09 QstDiag 52.02 +.47 +2.88 Questar s 17.56 +.04 +.59 QksilvRes 14.99 -.43 +.02 Quiksilvr 4.53 +.18 +.36 QwestCm u6.80 -.12 +.19 RAIT Fin 1.87 +.08 +.19 RPC u25.06 +.50 +3.05 RRI Engy 3.86 -.01 +.10 Rackspace u26.46 +.33 +1.50 RadianGrp 9.95 +.78 +2.36 RadioShk 20.57 +.22 +.45 RangeRs 39.40 +.25 +2.01 RJamesFn 30.71 +.54 +2.49 Raytheon 48.15 +.09 +2.07 RealD n u25.50 -1.55 +4.58 RltyInco 35.22 +.09 +.94 Name RedHat Reddy Ice RegalBel RegalEnt RgcyCtrs RegBkHT RegionsFn Regis Cp RehabCG RelStlAl ReneSola RepubSvc ResMed s ResrceCap RetailHT ReynldAm RioTinto s RitchieBr RiteAid RobtHalf RockwlAut RockColl Rowan RylCarb RoyDShllB RoyDShllA RdxSPEW Ryland Chg Wkly u43.10 -.33 +.84 2.85 ... -.64 57.62 +.74 -.09 13.64 +.20 +.14 u44.80 +1.11 +2.62 81.29 +2.87 +6.50 6.45 -.09 +.15 u21.11 -.13 +.66 19.89 -.66 -2.34 46.06 +.07 +4.21 12.96 -.10 +.99 29.04 -.91 -.77 33.40 +.70 +1.53 6.66 +.18 +.33 103.08 +.13 +4.00 u66.80 +.35 +1.87 u70.80 +.28 +5.68 20.98 -.25 -.20 .96 -.00 +.04 28.41 +.07 +1.30 u66.47 +.10 +4.10 60.28 -.32 -.23 32.18 -.09 -.72 u42.88 +.64 +3.34 u66.68 -.66 +3.20 u67.91 -.38 +3.82 u45.48 +.23 +1.59 d16.28 +.15 +1.30 S-T-U SAIC 16.12 +.08 +.58 SAP AG 52.42 -.56 +.69 SK Tlcm 18.81 +.01 +.38 SLGreen 70.27 +.52 +4.57 SLM Cp 12.68 +.43 +.78 SM Energy 47.88 +1.42 +6.20 SpdrDJIA u114.54 +.11 +3.23 SpdrGold u136.38 +.35 +3.76 SP Mid u156.46 +1.07 +5.93 S&P500ETFu122.73 +.47 +4.24 Spdr Div u52.32 +.06 +1.26 SpdrHome 16.66 +.13 +1.16 SpdrKbwBk 24.19 +.57 +1.60 SpdrLehHY u41.12 -.13 +.53 SpdrLe1-3bll 45.85 ... -.01 SpdrKbw RB 23.99 +.39 +1.32 SpdrRetl u45.30 +.37 +1.69 SpdrOGEx u46.64 +.13 +2.79 SpdrMetM u60.70 +1.24 +4.71 SPX Cp 67.64 +.44 +.58 STMicro 9.06 -.15 +.29 Safeway 23.74 -.18 +.84 StJoe d20.46 +.29 +.27 StJude 38.69 +.53 +.39 Saks u12.12 +.34 +.98 Salesforce 113.17 -.86 -2.90 SallyBty n u13.04 +.36 +.87 SandRdge 5.16 -.70 -.31 Sanofi 35.88 -.43 +.77 SaraLee 14.71 -.09 +.38 Schlmbrg u75.66 -.14 +5.77 Schwab 16.10 +.26 +.69 Scotts 51.96 +.08 -1.44 ScrippsNet u52.67 +.20 +1.78 SeadrillLtd u33.09 +.40 +2.66 SealAir 23.59 -.04 +.44 SemiHTr u31.19 +.45 +1.73 SempraEn 54.06 +.28 +.58 SenHous u25.03 -.16 +1.14 ServiceCp 8.28 +.03 ... ShawGrp 32.44 +1.13 +1.88 Sherwin 73.27 +.43 +.30 SiderNac s 17.98 -.23 +1.10 Siemens u118.03 -.60 +3.72 SilvWhtn g u32.95 +.75 +4.20 SilvrcpM g u11.89 +.32 +2.54 SimonPropu105.77 +1.93 +9.75 Skechers 20.78 ... +1.34 SkilldHcre 5.25 -.15 +1.50 SmithfF 16.81 -.41 +.06 SmurfStn n u24.22 -.13 +1.22 SolarWinds 18.69 +.17 +.54 Solutia u19.35 -.06 +1.24 SonicAut 12.19 +.19 +1.27 SonyCp 33.40 +.19 -.44 Sothebys u45.27 +.55 +1.43 SouthnCo 38.47 +.02 +.60 SthnCopper u46.63 +1.50 +3.83 SoUnCo 25.22 -.34 +.09 SwstAirl u14.19 -.05 +.43 SwstnEngy 36.09 -.38 +2.25 Spansion n 19.00 +.66 +1.51 SpectraEn u24.70 +.07 +.93 SpiritAero 19.27 +.34 -2.37 SprintNex 3.99 -.10 -.14 SprottSilv u10.78 +.05 +.74 SprottGld n 12.35 +.02 +.46 SP Matls u36.32 +.13 +1.52 SP HlthC 31.45 -.19 +.28 SP CnSt u29.11 -.15 +.34 SP Consum u36.51 +.18 +1.25 SP Engy u62.31 +.31 +3.07 SPDR Fncl 15.58 +.35 +1.02 SP Inds u33.43 +.20 +1.25 SP Tech u25.10 -.02 +.75 SP Util 32.05 -.01 +.33 StdPac 4.23 +.20 +.60 StanBlkDk 63.02 +.22 +1.05 StarwdHtl u59.29 +1.88 +5.15 StateStr 45.47 +1.52 +3.71 Statoil ASA 21.55 +.08 -.28 Sterlite 16.79 +.07 +1.32 StillwtrM u20.23 +.51 +2.43 StoneEngy 18.58 +.41 +2.95 Stonerdg 12.60 +.17 +1.60 StratHotels 5.00 +.03 +.44 Stryker 52.43 +.67 +2.94 SunLfFn g 29.35 +.16 +1.02 Suncor gs 35.68 +.16 +3.67 Sunoco 38.22 -.21 +.75 SunriseSen 4.15 -.12 +.72 SunstnHtl 10.86 +.26 +.01 Suntech 9.30 +.50 +.81 SunTrst 26.47 +.06 +1.46 SupEnrgy 27.77 -.36 +.15 Supvalu 10.75 -.31 -.04 SwRCmATRu10.11 +.05 +.38 SwftEng 35.45 +1.61 +3.60 Syniverse 30.41 +.01 -.08 Synovus 2.11 -.03 -.05 Sysco 30.03 -.10 +.57 TCF Fncl 14.16 +.20 +1.00 TECO 17.59 -.02 ... TJX 47.09 +.22 +1.20 TRWAuto u49.37 -.98 +3.68 TaiwSemi 11.18 -.08 +.27 Talbots 10.61 +.36 +.83 TalismE g 19.90 +.10 +1.76 Target 55.15 +.39 +3.21 TataMotors u29.78 +.81 +1.66 Taubmn u50.16 +.49 +3.74 TeckRes g u49.72 +1.98 +4.98 TeekayTnk 12.64 +.16 +.76 TelNorL 15.07 -.18 -.27 TelcmNZ 8.36 +.05 +.54 TelefEsp 79.09 -1.76 -1.78 TelMexL 15.86 -.06 +.38 TempleInld 21.56 ... +.84 TempurP u35.55 -.10 +1.05 Name Chg Wkly Tenaris 44.45 TenetHlth 4.53 Tenneco u34.23 Teradata u41.03 Teradyn 11.86 Terex 24.70 Tesoro 14.17 TetraTech 10.09 TexInst u31.47 Textron 22.61 ThermoFis 52.38 ThomCrk g 13.12 3M Co 86.34 Tidwtr 49.50 Tiffany u56.95 Timberlnd u25.39 TW Cable u62.05 TimeWarn 31.34 Timken u44.52 Titan Intl u15.97 TitanMet 19.26 TollBros 19.31 TorDBk g 74.90 Total SA 57.15 TotalSys 15.92 Toyota 72.64 Transocn 63.92 Travelers u57.44 TrinaSol s 28.63 Trinity 24.69 Tsakos d10.42 Tuppwre 46.83 TycoElec u33.10 TycoIntl 38.89 Tyson 15.10 U-Store-It 9.15 UBS AG 18.05 UDR u24.05 UIL Hold u30.40 URS 41.54 US Airwy u11.57 US Gold u5.99 USEC 5.06 USG 14.22 UltraPt g 43.80 UndrArmr u50.26 UnilevNV 31.82 Unilever 31.12 UnionPac u91.22 Unisys 24.20 UtdContl 27.86 UtdMicro 3.17 UPS B 69.79 UtdRentals u20.06 US Bancrp 26.10 US NGsFd 5.66 US OilFd 37.65 USSteel 48.55 UtdTech 76.75 UtdhlthGp 36.86 UnvHlth s 41.93 UnivTravel 6.26 UnumGrp 22.88 +.99 +3.02 +.06 +.17 -.37 +1.61 +.62 +1.67 +.19 +.62 ... +2.25 +.58 +1.21 -.08 +.33 +.72 +1.90 +.42 +1.79 -.50 +.96 +.69 +1.09 -.70 +2.12 +.69 +3.37 +1.08 +3.95 -.13 +4.37 -.28 +4.18 -.42 -1.17 +1.01 +3.10 -.26 +.80 +.01 -.40 +.51 +1.37 +.59 +2.70 -.50 +2.67 +.12 +.31 -.09 +1.82 -.29 +.56 +.20 +2.24 +.43 +1.87 +.20 +1.96 +.32 +.08 -.48 +2.02 +.40 +1.42 -.48 +.61 -.31 -.45 +.13 +.54 +.10 +1.03 +.47 +1.57 +.37 +1.44 +.35 +2.61 +.01 -.22 +.22 +.76 -.06 -.31 +.02 +1.54 +.35 +2.65 +1.77 +3.58 -.07 +2.13 -.11 +2.10 -.50 +3.54 +.22 +1.15 ... -1.18 +.01 +.08 +.42 +2.45 +.12 +1.27 +.94 +1.90 +.07 -.16 +.16 +2.48 +1.22 +5.83 +.51 +1.98 +.06 +.81 -.02 +.66 +.14 +.66 -.04 +.46 W-X-Y-Z VF Cp 84.97 Valassis 32.78 Vale SA 33.82 Vale SA pf u29.89 ValeantPh u27.15 ValeroE 19.14 VlyNBcp 13.68 VangTotBd 82.61 VangTSM u62.94 VangREIT u57.29 VangDivAp u51.35 VangAllW u48.92 VangEmg u49.24 VangEur u52.76 VangEurPc u37.31 VarianMed u65.00 Venoco 15.39 Ventas u55.10 VeriFone u35.15 VerizonCm 33.43 ViacomB u38.70 VimpelC n 15.99 Visa 79.80 VishayInt u13.84 VivoPart 29.69 VMware 77.50 Vonage 2.33 Vornado 89.85 VulcanM 42.39 W&T Off u14.16 WMS 44.17 Wabash 9.24 WABCO u49.93 WaddellR 32.31 WalMart 55.20 Walgrn 35.14 WalterEn 95.73 Warnaco 54.91 WREIT 32.48 WsteMInc 35.51 Waters u77.88 WatsnPh u51.24 WeathfIntl 19.04 WeinRlt u25.92 WellPoint 57.35 WellsFargo 29.22 WendyArby 5.01 Wesco Intl u46.63 WestarEn u25.55 WDigital 34.76 WstnRefin u8.15 WstnUnion 18.24 Weyerh 17.50 Whrlpl 80.07 WhitingPetu106.47 WmsCos 22.34 WmsSon u36.06 WillisGp 32.68 WilmTr d4.31 WiscEn u60.49 WT India u28.69 WldFuel s 29.49 Wyndham u30.07 XL Grp 20.80 XcelEngy u24.33 Xerox u11.90 XuedaEd n ud10.82 Yamana g 11.71 YingliGrn 12.82 YumBrnds u51.33 Zimmer 51.81 ZweigTl 3.81 +1.44 +1.73 -.44 -.22 +.02 +1.68 -.21 +1.16 -.03 -.46 +.21 +1.19 +.08 +.34 -.35 +.14 +.28 +2.22 +.61 +2.74 +.09 +1.25 -.25 +1.89 -.08 +2.37 -.66 +1.66 -.16 +1.39 +.59 +1.78 -.25 -.09 -.33 +1.54 -.35 +1.32 -.09 +.95 -.29 +.08 -.26 +.66 -.19 +1.64 +.34 +2.54 -.20 +1.05 +.22 +1.04 +.18 -.22 +.81 +2.46 +1.05 +6.13 ... +3.28 +.03 +.54 -.19 +1.18 +.17 +3.51 +.47 +3.24 -.16 +1.03 -.81 +1.26 +.77 +7.90 +1.26 +1.79 -.23 +.45 -.36 -.21 +.77 +3.75 +.88 +4.59 +.28 +2.23 +.90 +1.79 +.64 +3.01 +1.76 +3.21 +.11 +.41 +1.17 +3.81 +.01 +.25 +1.18 +2.75 +.60 +1.50 +.06 +.65 +.50 +1.33 +.27 +4.24 -.39 +6.03 +.11 +.83 +.18 +3.69 +.16 +.88 +.03 -2.80 +.49 +.95 +.07 +1.50 -.05 +1.26 -.23 +1.32 -.33 -.35 +.21 +.47 -.03 +.20 -1.03 ... +.24 +.72 +.40 +1.16 -.15 +1.77 +1.05 +4.37 +.02 +.13 Nasdaq National Market Name Chg Wkly A-B-C A-Power 7.58 ADC Tel 12.68 AGA Med 20.78 AMAG Ph 16.49 ARYxTh h .43 ASML Hld 34.20 ATP O&G 15.11 AVI Bio 2.02 AXT Inc u8.70 AcaciaTc 27.18 AcadiaPh h d.74 Accelrys u8.10 Accuray 6.89 AcmePkt h u41.80 AcordaTh 27.04 ActivIden 3.26 ActivePwr u1.85 ActivsBliz 11.30 Actuate 5.19 Acxiom 18.01 AdobeSy 29.14 Adtran 33.70 AdvEnId 12.99 AEterna g 1.22 Affymax 5.51 Affymetrix 4.61 AgFeed 3.17 AirTrnsp u7.52 AirMedia 7.02 Aixtron 33.66 AkamaiT u53.28 Akorn u5.29 AlaskCom u10.65 Alexion u72.72 Alexza d.97 AlignTech 18.50 Alkerm 12.10 AllosThera 4.34 AllscriptH 19.49 AlnylamP 12.90 Alphatec 2.30 AlteraCp lf u33.25 AlterraCap 19.76 Alvarion 2.65 Amazon u170.77 Amedisys 27.22 ACapAgy 29.43 AmCapLtd u7.66 AmerMed 19.46 AmPubEd 26.75 AmSupr 36.99 Amgen 55.42 AmkorT lf 6.79 Amylin 13.05 Anadigc 5.93 AnadysPh d1.29 Ancestry n 26.56 Andrsons 36.47 Angiotc gh d.28 Ansys 46.06 A123 Sys 9.96 ApolloGrp d35.73 ApolloInv 11.41 Apple Inc u317.13 ApldMatl 12.98 AMCC 10.88 Approach u15.69 ArchCap u89.92 +.11 +.44 -.01 -.01 +.09 +.03 +.02 +.59 +.02 -.11 -.56 +1.04 -.15 +.76 -.01 -.10 +.28 +.45 -.02 +.56 -.02 -.02 +.09 +.85 +.05 +.31 -.05 +2.25 +.44 ... ... +.03 +.01 +.05 -.33 -.16 +.10 +.35 -.02 +.46 -.32 +.99 +.66 +1.41 -.21 -1.37 ... -.04 +.27 +.44 -.04 +.11 +.10 +.28 +.23 +.80 +.23 +.12 +.22 +1.14 -.35 +1.61 +.09 +.82 +.14 +.62 -.05 +4.42 -.05 -.07 +.70 +1.48 +.17 +.53 +.60 +.36 +.30 +.39 -.30 -.24 -.01 +.12 +.21 +2.01 ... -.44 -.05 -.11 +1.84 +5.54 +.05 +1.76 +.12 +.79 +.14 +.68 -.42 -.74 -.39 -1.21 +.04 +3.34 -.59 -1.77 -.59 -.44 +.36 +.02 -.11 -.86 ... -.16 +1.25 -.18 -1.62 -2.90 -.01 -.23 +.31 +.81 +.68 +.24 +.35 -1.75 -.05 +.40 -1.14+16.15 +.09 +.63 +.06 +.81 +.16 +.24 -.19 +3.53 +.11 +.71 -.33 -.09 -.30 +3.20 -.34 +.53 +.11 +.78 -.19 -4.54 -.15 +.16 -.03 +.27 +.01 -.04 +.32 +1.23 -.27 -.39 D-E-F DDi Corp u10.74 DG FastCh 27.74 DJSP Ent d.67 DJSP wt d.05 Daktronics u11.81 DealrTrk 18.45 DeerConsu 11.62 Dell Inc 14.46 DeltaPtr h .79 DemandTc 10.53 Dndreon 35.07 Dentsply 31.72 Depomed 5.11 DexCom 10.85 DigRiver 37.46 Diodes 23.30 DirecTV A u42.72 DiscCm A 41.11 DiscCm C 35.63 DishNetwk 20.81 DonlleyRR 18.18 DotHill h 1.97 DrmWksA 35.42 DressBarn 24.30 drugstre 1.68 DryShips 4.69 DyaxCp 2.41 ETrade rs 15.30 eBay u30.87 eResrch 7.56 EV Engy u38.51 EagleBulk 5.38 EaglRkEn u7.34 ErthLink 9.27 EstWstBcp 18.82 EchoGLog 11.90 EducMgmt 13.34 ElectArts 16.33 Emcore 1.27 EndoPhrm 35.89 Endologix u6.02 Ener1 4.60 EngyConv 4.46 EnrgyRec 3.57 Entegris 6.38 EntropCom 9.15 EnzonPhar 10.84 EpicorSft 9.51 Equinix 83.27 EricsnTel 10.89 EvrgrSlr h .93 Exelixis 4.36 ExideTc 7.43 Expedia 27.30 ExpdIntl u51.78 ExtrmNet 3.03 Ezcorp u24.47 F5 Netwks u123.00 +.49 +.46 -.06 +4.19 -.10 -.33 -.02 -.02 -.12 +.89 -.17 -.87 -.16 +.17 -.06 +.07 -.03 +.05 -.05 -.05 -1.52 -1.43 ... +.33 +.06 +.22 -3.06 -2.94 -.16 +.20 +.32 +1.32 +.13 -.73 -.84 -3.56 -.74 -3.27 +.12 +.94 -.32 -.27 +.03 -.06 -.78 +.12 +.50 +1.36 +.04 +.08 +.32 +.58 -.01 ... +.35 +1.00 +.72 +1.01 -.45 -.06 +1.30 +1.82 +.05 +.25 -.08 +.65 +.12 +.28 +.27 +1.19 -.10 -2.30 +.31 +1.34 +.49 +.51 +.01 +.01 +.06 -.85 -.03 +.49 +.59 +.98 -.01 -.06 -.09 +.01 +.13 +.39 +.19 +.78 +.10 -.41 +.01 +.10 -1.11 -.97 -.18 -.09 -.04 +.00 -.09 -.11 +.87 +1.54 +.13 -1.65 +.07 +2.42 -.04 -.16 +2.09 +2.99 +2.11 +5.30 -.74 +1.48 +.15 +.77 +.13 +.44 -.06 -.21 -.01 +2.26 -.37 +.47 +.95 +2.26 +.20 +.84 ... +.85 +.26 +.65 +.16 +.59 +2.35 +1.15 +.31 +1.56 +.04 +1.26 ... +.04 -.08 +.65 -.28 +1.27 -.12 +.80 +.73 +1.29 +.97 +3.23 +2.11 +3.77 -.00 -.01 ... ... -2.05 -4.51 +.01 +.13 +.08 +.07 -.06 +.24 -.13 +1.03 G-H-I GSI Cmmrc 25.73 GSI Tech u7.17 GT Solar 8.84 GTx Inc 2.80 Garmin 31.17 Geeknet u2.11 GenProbe 49.20 Genoptix 18.22 Gentex 22.10 GenVec h .53 Genzyme 71.69 GeronCp 5.60 GigaMed d1.70 GileadSci 38.95 GlacierBc 13.71 Gleacher 2.39 GloblInd 6.18 GlbSpcMet u16.88 Google u625.08 GrCanyEd 18.20 GrLkDrge 7.14 GreenPlns 11.81 GulfportE u17.95 Gymbree u65.23 HSN Inc 26.24 HainCel u26.41 Halozyme 7.49 HanmiFncl 1.20 HansenMed 1.56 HansenNat 51.54 HarbinElec 21.78 Harmonic 6.78 HawHold 7.20 Healthwys 11.32 HrtlndEx 15.47 HSchein 57.39 HercOffsh 2.65 Hibbett 27.68 Hollysys u14.05 Hologic 15.83 Home Inns 45.94 +.28 +1.31 +.05 +.22 +.10 +.61 ... ... -.69 -1.67 -.06 +.03 -.11 +.86 +1.02 +1.20 +.62 +2.12 -.00 -.05 -.01 -.56 -.02 +.02 +.03 -.03 -.69 -.72 +.06 +.71 +.18 +.14 +.09 +.39 +.48 +1.34 +.81+11.38 -.07 -.61 +.27 +.94 -.02 +.71 +.21 +1.27 +.08 +.17 +.07 -3.70 +.93 +1.68 -.17 +.16 +.03 +.03 +.01 -.15 +.42 +.33 +.05 +.22 -.07 -.20 -.09 -.12 +.30 +.84 +.10 +.56 -.43 +1.24 +.03 +.29 -.04 +.73 +.02 +1.41 -.18 -.20 +.17 -5.22 HorizTFn n d14.85 HorsehdH 11.35 HotTopic 5.90 HudsCity 11.98 HumGen 25.31 HuntJB 37.24 HuntBnk 5.94 HutchT 3.17 IAC Inter u28.58 iGateCorp 20.86 IPG Photon u25.20 iShAsiaexJ u65.56 iSh ACWI u46.51 iShNsdqBio 88.61 Icon PLC 20.09 IconixBr 17.14 IdenixPh 4.29 iGo Inc u2.69 Ikanos 1.12 Illumina 56.29 Imax Corp u21.87 Immucor 17.89 ImunoGn 8.00 Imunmd 3.70 ImpaxLabs 18.85 Incyte 16.12 Infinera 8.54 InfoSpace 7.70 Informat u40.85 InfoSvcs wt .02 InfosysT 68.96 Innophos u34.01 InsightEnt 13.07 InsitTc 22.64 InspPhar 7.00 Insulet 14.44 IntgDv 6.32 ISSI 7.68 Intel 21.24 InteractBrk u19.08 IntactInt u27.25 InterDig u34.36 Intrface u15.56 InterMune 13.93 InterNAP 5.29 IntlBcsh 19.15 InternetB 13.31 Intersil 13.64 Intevac 12.67 Intuit u48.45 IntSurg 278.27 IridiumCm 8.69 IronwdP n 10.81 IsilonSys 27.95 Isis 9.90 Itron 60.71 Ixia u16.71 -.16 -.74 +.03 +.42 -.02 +.17 +.04 +.49 -.96 -1.57 -.02 +1.29 +.07 +.28 -.03 -.24 +.57 +.68 -.02 +.42 +.01 +2.70 +.11 +3.27 -.09 +1.68 -.52 -.69 +.03 +.74 -.03 -.36 -.01 -.04 +.61 +.74 -.17 -.02 +.32 +1.98 -.09 +.22 -.11 +.49 -.01 -.22 -.10 -.23 -.88 +.01 -.01 -.54 -.03 +.35 -1.48 -.74 +.26 +.16 +.01 +.00 -.60 +1.52 -.54 -2.71 -.43 -2.05 +.22 +1.04 -.22 ... -1.61 -1.51 +.13 +.42 +.34 +.17 +.27 +1.35 +.21 +.36 +.25 +2.54 -1.00 +.79 +.05 +1.17 -.07 +.77 +.11 +.29 +.07 +2.02 +.01 +.07 +.38 +.67 -.19 +2.57 -.25 +.47 +2.47+15.32 -.01 +.44 +.13 -.38 +1.88 -.52 +.44 +.76 -.90 -.06 +.42 +1.06 J-K-L j2Global JA Solar JDASoft JDS Uniph JackHenry JackInBox Jamba JamesRiv JazzPhrm JetBlue JoyGlbl K Swiss u28.20 +.51 +1.85 9.43 +.20 +1.10 26.19 -.58 +.87 11.40 +.28 +.90 u28.04 -.04 +.88 23.48 -.22 +.32 2.47 +.07 +.10 17.77 +.82 +.49 u14.28 +1.88 +3.65 u7.54 +.25 +.56 u75.33 +1.09 +4.38 12.19 -.06 +.03 KLA Tnc u37.57 -.24 +1.85 Kforce 15.52 +.07 +.51 KnightT u23.55 +.20 +1.88 KopinCp 3.73 +.04 -.08 Kulicke 6.61 ... +.39 L&L Egy n 9.43 +.48 +1.26 LJ Intl u5.64 ... +.54 LKQ Corp u22.59 +.14 +.84 LTXCrd rs 6.59 +.10 +.27 LamResrch u47.63 -.51 +1.84 LamarAdv 33.77 +.27 -.22 Landstar 39.08 -.09 +1.46 Lattice 4.94 -.04 +.08 LawsnSft u9.22 +.03 +.33 LeGaga n 9.60 -.28 -1.66 LeapWirlss 11.78 -.07 +.37 Level3 .91 +.02 -.06 LexiPhrm 1.63 -.07 -.14 LibGlobA u39.43 -.72 +1.67 LibGlobC u37.08 -1.02 +.89 LibtyMIntA 15.28 +.27 +.52 LibMCapA u59.21 +.12 +1.67 LibStrzA n 64.36 -1.02 -1.24 LifeTech 51.55 -.26 +1.37 LifePtH 34.62 +.11 +.70 LigandPhm 1.68 ... +.06 LimelghtN u6.60 -.55 -.19 LincEdSv 15.37 -.56 +2.91 LinearTch u32.94 -.17 +.69 LinnEngy u36.14 +.58 +1.81 Lionbrdg 3.96 +.16 -1.04 LodgeNet 3.02 +.10 +.47 Logitech 19.07 +.07 +.27 LogMeIn 40.05 +.58 +.32 lululemn g 48.09 +3.09 +3.77 M-N-O MB Fncl d16.49 +.55 +1.60 MCG Cap u7.24 +.08 +.91 MIPS Tech u15.04 +.07 +.34 MKS Inst 21.70 ... +1.05 MSG n 22.18 +1.19 +1.37 MagelnHl 48.77 -.73 +.77 MagicSft u3.35 +.05 +.63 Magma u4.24 -.18 -.05 MaidenH 7.89 +.07 +.24 MMTrip n 32.09 -1.28 -4.08 MAKO Srg 11.36 +.52 +.58 MannKd 5.54 +.03 -.84 MarvellT 20.80 +.28 +1.52 Masimo 30.16 -.16 -.01 Mattel 23.94 -.19 +.61 Mattson 2.69 ... +.14 MaximIntg u22.67 -.50 +1.01 MecoxL n d14.69 +.28 -1.64 MedAssets d18.54 +.36 -.05 Mediacom 7.03 -.02 +.13 MediCo 12.28 -.27 -.49 MelcoCrwn u6.57 -.15 +.30 Mellanox 23.99 -.16 +.95 MentorGr 10.93 -.04 +.11 MercadoL 61.24 -.44 -4.90 MercerIntl u6.57 +.18 +1.27 Methanx u29.33 +.07 +1.56 Micrel 12.35 +.05 +.43 Microchp u33.96 +.01 +1.78 Micromet 7.74 -.12 +.25 MicronT 8.65 +.10 +.40 MicrosSys 45.63 -.03 +.24 MicroSemi u21.17 +.46 +1.18 Microsoft 26.85 -.29 +.19 Microtune 2.90 Micrvisn d1.67 MillerPet 4.77 Millicom 95.99 Mindspeed 6.40 Molex 21.69 Momenta 16.35 MonPwSys 15.48 Motricity n u27.90 Move Inc u2.39 Mylan 20.14 MyriadG 20.71 NETgear 31.39 NGAS Rs h .60 NIC Inc 9.00 NII Hldg 42.73 NPS Phm 6.69 NXP Sem n 13.97 Nanomtr 12.74 NasdOMX 22.20 NatCineM 18.77 NatPenn 7.24 NektarTh 14.36 NetServic 13.48 NetLogic s 31.30 NetApp u55.10 Netease 41.09 Netflix 168.10 Netlist 3.20 NetSpend nu15.98 NetwkEng 1.65 Neurcrine 7.67 NeutTand 14.72 Newport 14.78 NewsCpA 14.50 NewsCpB 16.33 NorTrst 51.88 NwstBcsh 11.33 NovaMeas 6.65 NovtlWrls 10.12 Novavax 2.33 Novell 5.78 Novlus u30.63 NuVasive d24.00 NuanceCm 16.38 NutriSyst 20.73 Nvidia 12.61 NxStageMdu22.46 OReillyA h u58.43 OceanFr rs 1.05 Oclaro rs 9.97 OmniVisn u28.03 OnSmcnd 8.21 OnyxPh 29.64 OpenTxt 44.60 OpenTable u67.66 OpnwvSy 2.20 OplinkC 17.38 Opnext 1.43 Oracle u29.25 Orexigen 5.99 OriginAg 9.25 Oritani s 11.04 Oxigene h d.23 ... +.01 -.03 -.38 -.01 -.73 -.98 +1.39 -.01 -.98 +.15 +1.39 +.06 -.35 +.08 -.60 +1.96 +5.94 -.06 +.03 -.10 -.18 -.07 +.85 -.04 +.58 +.01 +.03 +.56 +.32 -.75 +.92 -.02 +.46 ... +.78 +.17 -.73 +.31 +1.09 -.40 +.27 +.04 +.76 -.78 -.21 -.01 +.07 -.19 +1.24 +.17 +1.85 +1.09 -.73 +.28 -5.47 +.09 +.09 +.75 +2.26 -.04 -.02 -.11 -.47 +.04 +.10 -.11 +.24 -.25 +.02 -.23 +.24 +.25 +2.25 +.01 +.09 +.06 +.73 -.69 -.38 -.10 -.10 ... -.15 +.06 +1.41 -.29 -2.17 +.01 +.67 -.11 +1.61 +.21 +.58 +.21 +2.30 +.23 -.07 +.04 +.06 +.08 +1.56 +.45 +.90 +.20 +.54 +1.44 +2.81 +.38 +.37 -1.95 +6.19 +.03 +.14 -.15 -.08 -.07 -.08 -.22 -.13 +.19 +.70 -.08 +.55 +.09 +.39 +.01 -.02 P-Q-R PDL Bio 5.62 PF Chng 47.00 PMC Sra 7.97 PSS Wrld 23.09 Paccar u55.25 +.09 +.40 +.62 +1.29 +.11 +.28 +.06 -.56 +.08 +3.99 PacerIntl 5.60 PacBiosci nd14.56 PacCapB h d.42 PacSunwr 6.05 PaetecHld 4.20 PainTher u8.36 PanASlv u34.58 PaneraBrd 93.38 ParamTch u22.70 Parexel 21.66 Patterson 28.29 PattUTI 19.68 Paychex 28.20 Pegasys lf 27.89 PnnNGm 33.14 PennantPk 11.85 PensonWw d4.83 PeopUtdF 12.69 PerfectWld 32.00 Perrigo u63.91 PetroDev u35.95 PetsMart u38.28 PharmPdt 25.56 Pharmasset u40.06 PhnxTc 4.25 PhotrIn u6.82 Polycom u35.03 Pool Corp 21.74 Popular 2.87 PwrInteg 38.13 Power-One 9.41 PwShs QQQu53.67 Powrwav u2.22 PriceTR u60.46 priceline u388.87 PrimoWt n ud12.95 PrivateB 11.98 PrUPShQQQd33.43 ProspctCap 10.52 ProspBcsh 33.75 PsychSol u33.71 QIAGEN 18.68 QiaoXing 1.77 QlikTech n 23.48 Qlogic 18.23 Qualcom 48.33 QualitySys 64.06 QuantFu h .52 QuestSft u26.70 Questcor u12.84 QuickLog 5.57 QuinStrt n 16.01 RF MicD u7.43 RTI Biolog 2.57 RadntSys 19.53 RadOneD h .98 Radware 33.80 RAM Engy 1.56 Rambus 20.68 Randgold 97.01 RealNwk 3.52 RedRobin 18.65 Rdiff.cm 3.51 RegncyEn 26.11 Regenrn 26.53 RentACt 26.37 RepubAir u9.07 ResCare 13.10 RschMotn 55.66 ResConn 16.98 RexEnergy 11.24 +.21 +.03 +1.71 -2.24 -.06 -.22 +.13 +.09 -.14 -.02 -.24 +.68 +.07 +2.66 +.54 +3.87 +.09 +1.23 +.05 +.15 +.09 +.64 -.10 +.27 -.07 +.46 -.63 +.84 -.74 -.05 +.14 +.73 -.06 -.32 +.10 +.39 -.50 -.40 -.39 -1.97 +.23 +4.69 +.06 +.85 -.19 -.25 -.94 +2.56 ... +.15 -.08 +.53 +.38 +1.25 +.29 +1.60 +.04 +.14 +.31 +3.92 -.28 -1.01 ... +1.49 ... +.05 +1.33 +5.19 +8.75+12.06 ... ... -.02 +.19 -.02 -3.02 +.09 +.61 +.39 +2.66 ... +.01 -.16 -.14 ... ... -1.22 -1.49 +.18 +.65 -.01 +3.17 +.37 -.20 +.03 +.06 +.02 +.48 -.14 +.56 -.09 -.36 -.02 +.48 -.15 +.14 +.19 +.10 -.12 +.02 -.07 -.18 -.19 -1.50 +.02 +.13 +.46 +.94 -.30 +3.09 +.39 +.52 -1.61 -1.65 -.24 -.31 +.44 +1.23 -.32 +.42 +.07 +1.29 -.15 -.22 -.13 -.13 -1.45 -1.26 -.14 +.78 -.62 -1.09 RigelPh 8.10 -.13 -.21 RightNow u27.30 +.02 +1.11 RINO Intl 16.60 -.02 -1.74 Riverbed u59.28 +.15 +1.69 RodmanR 3.16 +.16 +.29 RosettaR u29.20 +3.79 +5.29 RossStrs u64.25 +.62 +5.26 Rovi Corp u52.16 +.13 +1.51 RoyGld 51.66 +.15 +2.15 RubiconTc 23.10 -2.21 +.02 Rudolph 8.20 +.03 +.79 RuthsHosp 4.97 +.18 +.41 Ryanair 31.52 -.13 -1.11 S-T-U S1 Corp 5.96 SBA Com 38.43 SEI Inv 23.36 SMTC g 4.03 STEC 17.93 SVB FnGp 47.17 SalixPhm 37.80 SanderFm 42.62 SanDisk 41.31 Sanmina 12.49 Santarus 3.34 Sapient u12.41 SavientPh 11.73 Savvis 23.87 Schnitzer 53.14 Scholastc 30.41 SciGames d7.87 SeacoastBk 1.24 SeagateT 15.32 SeahawkDr 10.31 SearsHldgs 73.34 SeattGen 14.71 SelCmfrt 8.79 Semtech u22.62 Sequenom 7.14 ShandaGm 6.30 Shire u73.08 ShoreTel 6.47 ShufflMstr 9.65 Shutterfly 30.52 SierraWr 11.36 Sify lf 2.00 SigaTech h 13.22 SigmaAld u65.34 SilicGrIn 7.52 SilicnImg u6.66 SilcnLab 41.68 SilicnMotn 4.64 Slcnware 5.54 SilvStd g u25.58 Sina u59.14 SinoTech n ud6.55 Sinovac 4.05 SiriusXM u1.53 SironaDent 38.06 SkywksSol u24.17 SmartBal 3.64 SmartM 7.56 SmartT gn 12.45 SmartHeat 6.89 SmithWes 3.83 SmithMicrou15.13 SodaStrm nud31.88 Sohu.cm 74.05 SolarCap n 23.11 Solarfun 11.03 -.03 +.14 -.71 -.83 +.19 +1.21 ... +.21 +.64 +2.33 +1.31 +3.83 -.21 -.03 -1.29 +.64 +.96 +3.68 -.04 -.70 +.04 +.21 -.83 -.75 -.63 -.70 -.24 -.14 -.01 +1.45 +.05 +.97 -.27 -.05 +.03 -.01 +.40 +.61 +.12 +.21 -.98 +1.36 -.12 -1.70 -.12 +.48 +.27 +1.21 +.50 +.78 -.18 -.38 +.03 +2.98 +.12 +.21 -.14 +.24 +.01 +.37 -.78 -.71 -.05 -.09 -.26 -.03 -.66 +1.85 -.17 -.05 -.01 +.51 ... +1.78 +.07 -.77 -.06 -.04 -.37 +1.30 +.69 +2.84 +.28 ... ... +.01 +.06 +.03 -.16 +.41 +.49 +1.25 +.08 +.08 -.17 +.16 +.37 -.54 +.13 +.41 +.04 +.08 +.26 +2.97 +1.88 ... -.29 -.45 -.10 +.79 +.39 +.82 SonicCorp 9.42 SonicSolu 12.72 Sonus 2.79 Sourcefire 25.02 SpectPh 4.41 Spreadtrm u16.09 Stamps.cm 15.10 Staples 20.79 StarBulk 3.16 StarScient 1.78 Starbucks u30.87 StlDynam 15.93 StemCell h .88 Stericycle 72.39 SterlBcsh 5.88 StewEnt 5.77 Strayer 135.57 SuccessF u28.27 SunHlthGp 9.37 SunOpta u7.19 SunPowerA 14.32 SunPwr B 13.89 SuperGen 2.74 support.cm u6.36 SusqBnc 8.25 SykesEnt 18.14 Symantec 17.21 Synaptics 29.16 Synchron u27.00 Synopsys u25.84 TD Ameritr 17.72 TFS Fncl 8.98 THQ 4.16 TICC Cap u11.20 TTM Tch u13.63 tw telecom 17.30 TakeTwo 11.13 TalecrisBio 23.48 Taleo A u32.24 TASER 4.11 TechData 46.20 TechTeam 8.29 Tekelec 13.60 TlCmSys 5.09 Tellabs 6.89 Telular u5.69 Terremk u11.62 TeslaMot n 24.44 TesseraT 21.20 TetraTc 21.68 TevaPhrm 50.77 TexRdhse u16.06 Theravnce 20.66 Thoratec 33.18 TianliAg n u7.73 TibcoSft u20.02 TiVo Inc 11.16 Toreador u15.96 TowerGrp u25.61 TowerSemi 1.66 TradeStatn 6.09 TransGlb u14.63 TridentM h 1.90 TriMas h 16.29 TrimbleN u37.91 TriQuint 10.65 TrueRelig 19.00 Trustmk 23.54 TuesMrn 5.21 USEcology 16.89 UTiWrldwd u19.67 +.06 +.53 +.74 +.75 -.02 -.33 +.27 +1.43 -.07 +.16 +.39 +1.82 -.02 -.84 +.05 +.26 +.22 +.24 -.03 -.22 +1.12 +2.31 +.20 +1.39 -.01 -.01 -.29 +.65 +.44 +.52 +.03 +.22 +2.66 -4.39 -.16 +1.15 -.16 -.14 +.10 +.73 +.21 +.72 +.19 +.67 -.01 -.04 +.23 +.68 -.05 +.34 +.06 +1.51 +.64 +1.02 -.09 +2.23 -.89 +5.69 +.13 +.26 +.20 +.63 -.14 +.25 +.18 +.16 +.29 +.86 +2.23 +3.15 -.32 -1.10 -.11 +.46 -.15 -1.04 -.17 +3.55 -.01 +.14 +1.03 +3.24 ... +1.03 -.20 +.56 -.70 -.33 -.01 +.07 +1.64 +2.08 +.19 +1.63 -.46 +2.60 +.43 +1.49 -.08 +.62 -.04 -1.11 -.11 +.67 -.19 +.28 +.25 +.52 +.70 +2.04 -.11 +.80 -.34 +.01 -.24 +2.20 +.17 +1.33 +.04 +.30 +.40 +.60 +1.81 +4.13 -.02 +.04 +.06 +.46 -.19 +2.07 +.10 +.35 +.27 -1.45 +.44 +1.45 +.08 +.42 -.02 +.67 -.42 +.45 UTStrcm 2.11 -.06 +.09 UltaSalon 32.30 +.44 +1.61 Umpqua 11.70 +.14 +.70 UtdCBksGa d1.81 -.03 -.15 UtdNtrlF u36.74 -.46 +.98 UtdOnln 7.11 -.03 +.93 UtdTherap 59.23 -.23 -.77 UtdWstrn h .46 -.03 +.06 UnivDisp 23.87 -2.26 -1.17 UrbanOut 32.44 +.72 +1.65 V-W-X-Y-Z VCA Ant 21.78 +.83 +1.11 ValueClick u15.45 +.01 +1.69 VarianSemi 33.91 -.30 +1.19 VeecoInst 44.00 -.09 +2.50 Verigy 9.53 +.38 +.36 Verisign 35.15 -.12 +.40 Verisk 30.27 -.24 +.46 VertxPh 35.06 +.29 -3.24 Vical d2.20 ... +.04 VirgnMda h u26.62 +.55 +1.19 ViroPhrm u16.78 -.22 +.42 VisnChina 3.97 +.02 -.20 VistaPrt 38.70 -.32 -3.37 Vivus 7.12 +.03 -.63 Vodafone u28.46 -.05 +.95 Volcano u26.60 +.35 +2.18 Volcom 16.34 +.39 +.17 Volterra 21.11 +.17 +.65 WarnerCh s 23.34 -.35 -.64 WarrenRs 4.18 ... ... WashFed 16.22 +.59 +1.17 Web.com u6.67 -.02 +.47 WebMD 52.10 -.14 -.18 Websense 21.90 +.16 +1.78 WernerEnt 21.89 +.21 +.56 WstCstB 2.69 +.05 +.06 WestellT u2.86 +.05 -.06 WstptInn g 18.37 -1.17 +.25 WetSeal 3.49 +.10 -.01 WhitneyH 9.07 +.14 +.79 WholeFd u45.49 -1.78 +5.74 Windstrm u13.23 -.03 +.57 Winn-Dixie 7.26 +.21 +.56 Wintrust 31.90 +.60 +1.96 WonderAuto 10.49 +.09 +.85 WrightM d13.72 +.64 +.37 Wynn u113.07 +.55 +5.91 XOMA rs 2.63 +.24 +.32 Xilinx 27.73 -.12 +.93 XinhuaSp h .27 +.01 +.04 Xyratex 16.59 +.33 +1.11 YRC Ww rs 4.16 -.60 -.25 Yahoo 16.27 +.07 -.23 Yongye 8.88 -.19 +.86 ZST Digtl 7.77 +.38 +.29 Zagg n 8.24 +.30 -.06 Zalicus 1.34 -.01 +.04 ZebraT u38.20 -.40 +2.42 Zhongpin u22.91 -.01 +2.69 ZionBcp 22.03 +.66 +1.28 Zix Corp u3.77 -.29 -.12 Zoltek 10.48 +.09 +.86 Zoran 7.20 ... +.12 Zumiez u28.07 -.69 +1.85 B USI N ESS Jobs Continued from C3 be- Antibiotics Continued from C3 “For these infections, we’re back to dancing around a bubbling cauldron while rubbing two chicken bones together,” said Dr. Brad Spellberg, an infectious disease specialist at Harbor-UCLA Medical Center in Torrance, Calif.. A necessity? While the notion of directly subsidizing drug companies may be politically unpopular in many quarters, proponents say it is necessary to bridge the gap between the high value that new antibiotics have for society and the low returns they provide to drug companies. “There is a market failure,” said Rep. Henry Waxman, D-Calif., and chairman of the House Energy and Commerce Committee, who said he was considering introducing legislation. “We need to look at ways to spur development of this market.” With the Republicans having won control of the House this week, Waxman will lose his committee chairmanship. But the idea of spurring antibiotic development appears to have some bipartisan support. Rep. policymakers de- Fannie Continued from C3 Borrowers who took loans from 2005 to 2008 continue to default on their obligations, and the homes that they leave behind can be sold only at sharp discounts. The average sale of a foreclosed home in the third quarter recouped only 57 percent of the money left unpaid by the original borrower, Fannie Mae said. The company sought to underscore Friday that it now conducted business with greater sobriety, cause they cannot find full-time jobs and people who have given up looking for work, ticked down slightly to 17 percent from 17.1 percent in September. The economy last added jobs in May, when more than 400,000 workers were hired by the federal government to help with the Census. In the absence of congressional action, the last tier of unemployment benefits is also set to expire soon. With little prospect of employment in the near future, “There’s not a recognition yet that we should think about antibiotics as a natural resource and we should conserve them like we do fish.” — Ramanan Laxminarayan, director of the Extending the Cure project on antibiotic resistance at Resources for the Future velopment biodefense companies. Antibiotic-resistant germs would be one priority, according to a report that the department issued in August. The European Union is also working on a plan, based on proposals for possible incentives from the London School of Economics. A year ago, the United States and the European Union formed a task force on antibiotic resistance. many of the nation’s long-term unemployed, whose numbers hover around record highs, have become increasingly desperate. “I hope that Congress can become human and forget about being Democrats or Republicans and just be human beings to see what it’s like for us,” said Annette Tornberg, 50, of Sacramento. Tornberg was laid off from her job at a printing company in 2009 and has been unable to find work. “We’re human beings, and all we want is for you to help us.” Disincentives Despite the activity, there is no consensus on what would work best and little discussion yetDA. The efforts are being led by small companies, which can be satisfied with smaller sales. Ramanan Laxminarayan, who Only five new antibiotics were approved by the FDA Eisenstein, a senior vice president at the antibiotic maker Cubist Pharmaceuticals. Another factor discouraging investment, some experts say, is that the FDA has made it harder recently for new antibacterial drugs to win approval. even though losses on old loans would persist for years. “The loans we have acquired since the beginning of 2009 reflect our commitment to realistic, common-sense lending standards and sustainable homeownership,” Michael Williams, Fannie Mae’s chief executive, said in a statement. The government seized Fannie Mae and Freddie Mac in 2008 to ensure the availability of mortgage loans. The companies provide money to lenders by buying new loans; those loans then are bundled into securities for resale to investors. The Obama administration has said the two companies should be replaced by a new system of government support for the mortgage market. The administration said it planned to present recommendations to Congress early next year. In the meantime, to keep the companies in business, the government provides enough money each quarter to balance their books. In exchange, the companies must pay the government a quarterly dividend. The companies have now absorbed $152.8 billion in taxpayer aid and returned $16.5 billion in dividend payments. Arguments against THE BULLETIN • Saturday, November 6, 2010 C5 PEOPLE ON THE MOVE Patty Moore has joined Journeys Peak Travel. With 13 years of travel experience, Moore is a cruise specialist for Princess and Cunard cruise lines and a destination expert for Mexico and Hawaii. Charles Schirm has joined Oregon Valley Business Brokers. Based in Bend, he will represent sellers and buyers in the sale or acquisition of businesses in Central Oregon. With more than 30 years of business experience and training, Schirm is skilled in business sales, business valuation and finance. Jerry Upham has joined News Press & Gazette of Oregon as local sales manager for Bend Fox affiliate KFXO and CW affiliate NTVZ. Upham has more than 25 years of television sales and management experience, most recently as general manager of KOHD in Bend, and prior to that as general manager of KFXO when the station was owned by Meredith Broadcasting. Jean Morgan has been Fed Continued from C3 But the Fed’s announcement Wednesday that it would resume a strategy of buying Treasury securities to lower long-term interest rates has generated unease around the world. As Bernanke spoke, the Treasury secretary, Timothy Geithner, arrived in Kyoto, Japan, for a meeting of finance ministers of the Asia-Pacific Economic Cooperation forum, where American complaints about the undervaluation of the Chinese currency will probably be countered with accusations that the Fed is engaging in an exchange-rate move of its own. “What the U.S. accuses China of doing, the USA Charles Schirm Jean Morgan named traffic manager of Horizon Broadcasting Group’s six radio stations in Bend. She is responsible for the production of all daily programming logs, including commercial advertising and scheduling. Morgan comes to HBG from Journal Broadcast Group in Boise, Idaho. She was HBG’s traffic manager from 2001 to 2009, working remotely from Boise, and prior to that served in the same capacity for Citadel Broadcasting in Boise and Pacific Northwest Broadcasting Corp. Chris Holzshu has been elected by the Lithia Motors Inc. board of directors to be senior vice president/chief financial officer, moving up from vice president of op- doesn’t do any good.”.” The chairman also addressed critics who were worried that the Fed’s move could touch off uncontrollable inflation, even though the current rate is well below the Fed’s unofficial goal of about 2 percent. “We are absolutely committed to keeping inflation low and stable,” Bernanke said. “We have the tools to unwind and tighten policy at the appropriate time, when that time comes.” The chairman spoke in Jacksonville before traveling here for a conference on Fed history, attended by many presidents of Fed regional banks, along with a legion of Fed veterans and top economists. Bernanke and his predecessor, Alan Greenspan, whose 18-year tenure coincided with a period of economic calm that ended soon after Bernanke erational planning and analysis for the Medford-based company. In July, Lithia took over Bendbased Bob Thomas Car Co.’s General Motors lines and bought his Honda franchise. Holzshu is directly involved in operations and continues to oversee the performance-monitoring functions within the company, including setting operational targets for store performance and improvements, tracking and managing companywide budgets and leading capital deployment decision making. Amy Tykeson, president and CEO of BendBroadband, was recently honored at the 2010 Oregon Connections Conference in Hood River. Tykeson received the Edwin B. Parker Enduring Achievement Award for her contributions to the telecommunications industry in Oregon. At the conference, presenters and attendees examined the importance of broadband telecommunications for business, government, education, health care, public safety, communities and individuals. succeeded him, are scheduled to speak Saturday at the conference, organized by the Atlanta Fed and Rutgers University. Leading scholars of the Fed voiced skepticism about the latest step, which even Fed officials acknowledge will have only modest effects on employment and growth. “Learning is slow when you need it most,” said Charles Calomiris, an economist at Columbia Business School who presented research on the Fed’s policy mistakes from its founding until 1951, most notably during the Depression. “Volatile times make learning and accountability much harder, because views that might be false are harder to discredit.” Calomiris said he would “make a strong case” against additional purchases of government debt, and added: “When we need central banks to act the wisest, they often act the least wise.” The weekly market review American Stock Exchange Name Chg Wkly AbdAsPac u7.10 AbdAustEq u13.30 AbdnChile u24.84 AbdnEMTel 19.37 AbdnIndo 14.47 AdcareHlt 4.01 AdeonaPh .75 AdvPhot 1.10 Advntrx rs 2.07 AlexcoR g u6.78 AlldNevG 27.47 AlmadnM g 3.06 AlphaPro 1.89 AmApparel 1.13 AmDefense .14 AmLorain 2.77 AmO&G u9.57 Anooraq g 1.36 AntaresP 1.48 ArcadiaRs .32 ArmourRsd 7.28 Augusta g 4.10 Aurizon g u7.60 BMB Munai .77 Baldw 1.25 Ballanty u7.55 Banks.com .32 Banro g 3.01 BarcUBS36 u46.37 BarcGSOil 24.70 +.07 +.20 -.03 +.60 +.67 +2.29 +.09 +.29 -.09 -.32 -.15 +.09 +.03 -.06 +.14 +.10 -.05 -.03 +.01 +.58 +.45 +2.83 +.02 +.18 -.07 +.23 -.04 +.16 -.01 -.03 -.13 -.29 +.08 +.96 ... +.08 +.06 +.02 -.00 -.05 ... -.06 -.02 +.19 +.19 +.92 +.03 -.02 +.07 +.17 -.85 -.87 ... -.04 -.07 +.06 +.24 +1.90 +.10 +1.68 BrcIndiaTR u83.64 BioTime 6.05 BlkMuIT2 14.73 BlkMunvst 10.30 BlonderT u2.09 BovieMed 2.27 Brigus grs 1.75 BritATob u79.25 CPI Aero u12.60 CAMAC n 2.82 CanoPet .36 CapGold n 4.53 CaracoP 4.61 Cardero g 1.34 CardiumTh .49 CelSci .66 CFCda g u18.78 CentGold g u53.16 CheniereEn 3.70 CheniereE 18.69 ChiArmM 3.76 ChiGengM 1.77 ChIntLtg n 3.10 ChiMarFd 6.66 ChinNEPet 7.20 ChinaPhH 3.12 ChinaShen 2.81 ClarkH wt .00 ClaudeR g u1.69 CloughGA 15.76 CloughGEq u15.47 ClghGlbOp u13.73 +.84 +6.75 -.18 +.05 +.08 +.13 ... -.08 -.21 -.24 +.40 +.41 ... +.16 -.02 +3.02 -.02 +1.48 +.03 +.18 -.00 -.04 -.06 +.14 -.38 -.55 -.05 +.12 +.02 +.03 +.00 -.02 +.26 +1.08 +.28 +1.46 -.09 +.42 -.17 -.49 +.10 +.03 +.03 -.15 +.03 +.20 -.01 +.84 +.07 +.48 -.02 +.01 +.40 +.56 ... -.01 ... +.13 +.13 +.64 +.28 +.81 +.17 +.84 Comforce ConmedH CnsTom Contango CornstProg CornerstStr CrSuisInco CrSuiHiY Crossh glf Crystallx g CubicEngy Cytomed DejourE g DenisnM g DigitalPwr DocuSec Dreams EV CAMu EV LtdDur EVMuniBd eMagin EmersnR h EndvrInt EndvSilv g EngyInco EnovaSys EntGaming EntreeGold EvolPetrol ExeterR gs Express-1 FiveStar u2.47 3.37 28.90 55.01 7.10 11.01 u3.73 3.00 .22 .36 d.61 .49 .36 u2.51 u1.95 4.07 2.09 12.76 16.73 13.59 4.13 2.00 1.27 u5.87 27.72 1.11 .40 2.73 6.12 6.13 u2.71 u6.34 +.01 +.82 -.02 -.01 -.11 +2.63 +.01 +2.42 +.06 +.13 +.05 +.09 +.02 -.00 +.01 +.08 +.00 -.01 -.00 +.01 ... -.02 +.01 +.03 ... +.05 -.05 +.41 -.14 +.85 +.14 +.44 +.04 +.02 +.02 -.34 +.07 +.05 +.03 -.06 +.25 +.24 +.03 -.05 +.01 -.11 +.62 +.98 +.14 +.85 +.06 +.15 +.03 -.01 -.02 +.15 -.03 +.18 +.12 +.32 +.02 +.26 +.19 +.91 FortuneI .29 FrkStPrp 12.91 FrTmpLtd 13.56 Fronteer g u8.60 FullHseR 3.63 GSE Sy 3.62 GabGldNR 18.37 GascoEngy .36 Gastar grs 3.78 GenMoly u5.40 GeoGloblR .75 Geokinetics 6.72 GoldRsv g 1.44 GoldResrc 23.17 GoldenMin u26.06 GoldStr g u5.78 GldFld d.30 GrahamCp 17.98 GranTrra g 7.46 GrtBasG g u2.94 GreenHntr .93 GpoSimec 7.42 GugFront u24.98 Gulfstream d.16 HQ SustM 3.30 HSBC CTI 8.14 HawkCorp 49.83 HearUSA 1.08 Hemisphrx .50 HooperH .74 HstnAEn 14.12 Hyperdyn 3.23 ... +.01 -.24 -.45 +.08 +.08 +.04 +.66 -.02 +.13 -.09 +.04 +.43 +.76 +.01 +.02 -.09 +.10 +.33 +.18 -.01 -.05 +.12 -.10 -.05 +.06 -.22 +2.07 -.09 -.19 +.10 +.56 ... ... -.05 +1.01 -.28 ... -.04 +.13 +.04 +.07 -.05 +.18 +.23 +1.09 ... -.41 -.05 -.01 +.05 +.23 -.16 ... +.07 +.08 -.01 -.02 ... +.04 -.30 +.07 +.21 +.77 iMergent ImpOil gs IndiaGC InovioPhm Intellichk IntTower g Inuvo InvVKAdv2 Iteris KeeganR g Kemet KimberR g KodiakO g LGL Grp LaBarg LadThalFn Lannett Libbey LibertyAcq LibAcq wt LongweiPI LucasEngy MAG Slv g MadCatz g MagHRes Metalico Metalline MetroHlth MdwGold g MincoG g Minefnd g MinesMgt 4.39 38.70 .83 1.21 1.30 u8.42 .34 12.78 1.46 u8.32 u4.30 1.01 4.13 25.60 13.04 1.35 5.87 14.15 10.59 u1.70 u3.50 2.06 u9.47 .50 4.92 4.54 .64 u4.36 .61 u1.46 9.09 2.94 +.11 -.15 -.16 -.08 -.02 +.05 +.05 +.08 +.02 +.07 -.07 +.98 -.01 +.01 ... +.12 +.05 +.04 +.02 +.52 +.20 +.56 +.01 +.06 -.03 ... -.68 -.77 -.30 +.35 +.08 +.19 +.69 +.75 +.11 +.86 ... +.09 +.01 +.06 +.31 +.72 +.02 +.07 -.20 +1.15 +.04 +.06 +.15 +.14 ... +.20 ... +.01 -.05 +.12 +.01 ... -.07 +.28 -.23 +.28 +.10 +.46 MtnPDia g 5.15 -.10 +.19 NIVS IntT 2.62 -.31 -.23 NeoStem 1.85 -.14 -.03 NBRESec u4.00 +.01 +.12 Neuralstem 2.30 -.02 +.07 Nevsun g u6.17 ... +.46 NDragon .04 -.00 ... NewEnSys 7.64 +.20 +1.27 NwGold g u8.23 -.08 +.83 NA Pall g u5.48 +.31 +.83 NDynMn g 9.45 -.05 +.43 NthnO&G u20.65 +.44 +.97 NthgtM g 2.83 -.11 +.02 NovaGld g u13.36 +.48 +2.14 NvDCmdty 26.26 +1.06 +1.22 NuvDiv2 14.76 +.06 +.09 NuvDiv3 14.66 +.02 +.08 NvInsDv 14.77 -.01 -.03 NMuHiOp 13.05 -.13 +.10 NuvREst u10.60 +.18 +.50 NvTxAdFlt 2.55 +.01 -.06 Oilsands g d.41 -.01 -.03 OpkoHlth u2.99 -.04 +.23 OrienPap n 6.90 +.33 +1.45 OrionEngy 3.43 -.02 +.08 OrsusXel .17 -.01 -.01 Palatin rs d1.30 -.04 -.07 ParaG&S 1.74 +.01 +.05 ParkNatl 68.11 +.15 +2.76 PhrmAth 3.36 -.07 -.15 PionDvrsHi u21.48 +.26 +.74 PionDrill 6.40 +.04 +.24 Biggest mutual funds PlatGpMet 2.31 -.02 +.34 PolyMet g 1.96 +.03 +.11 ProceraNt .49 -.01 -.10 ProlorBio 6.34 -.01 +.30 Protalix 9.77 +.08 +.11 PudaCoal u11.99 +1.54 +3.18 Quaterra g 1.70 +.13 +.25 RadientPh .46 +.00 -.05 RaeSyst 1.60 ... +.01 RareEle g 10.69 +.07 -.67 ReavesUtl 22.16 -.02 -.03 RegeneRx .28 +.01 +.03 RELM 2.08 +.02 +.04 RenhngPh 2.46 +.03 +.22 Rentech 1.25 ... +.06 RexahnPh 1.11 +.05 ... Richmnt g 5.28 ... +.55 Rubicon g 4.13 -.07 +.45 SamsO&G 1.24 +.03 +.05 SeabGld g 30.02 -.12 +2.69 SearchMed 3.03 -.16 +.45 Senesco .27 +.00 +.04 SinoHub 2.42 ... +.17 Solitario 2.26 ... +.04 SondeR grs 3.19 +.02 -.01 SprottRL g 1.86 +.09 +.06 SulphCo .22 -.01 -.03 TanzRy g 7.03 -.04 +.05 Taseko 4.67 -.05 -1.64 Tengsco .53 +.04 +.11 TianyinPh 3.49 +.02 +.17 TimberlnR 1.15 ... -.03 TrnsatlPt n 3.24 +.02 +.19 TravelCtrs 3.25 +.09 +.30 TriValley .66 -.01 -.08 TrioTch 4.70 +.19 -1.19 Tucows g .70 +.03 -.02 TwoHrbInv 9.27 ... +.05 UQM Tech d2.15 +.07 -.21 US Geoth 1.10 +.01 +.23 Uluru .09 +.00 -.01 Univ Insur 4.69 -.02 +.14 Ur-Energy u1.57 -.06 +.22 Uranerz u3.21 +.22 +.97 UraniumEn u4.61 +.09 +.74 VangTotW u48.26 -.01 +1.77 VantageDrl 1.78 ... +.06 VantDrl wt d.01 ... ... Versar 3.14 +.03 -.03 VirnetX 18.12 -.08 -.43 VistaGold 3.03 +.21 +.28 WalterInv 18.27 +.02 +.01 WFAdvInco 10.38 +.04 +.08 WFAdMSec 16.35 +.03 +.17 Wesco 371.67 +2.72 +8.68 WhitestR n u13.60 -.04 +.27 WidePoint u1.39 +.03 +.09 Wilber u9.47 +.16 +.21 WT DrfChn 25.59 -.07 +.05 WT Drf Bz 29.21 -.19 +.43 WizzardSft .27 ... +.04 Xfone 1.43 -.02 +.09 YM Bio g 2.08 -.04 +.05 ZBB Engy .71 -.06 -.03 Name Total AssetsTotal Return/Rank Obj ($Mins) 4-wk PIMCO Instl PIMS: TotRet n Vanguard Idx Fds: TotStk n American Funds A: GwthFdA p American Funds A: CapInBldA p Fidelity Invest: Contra n American Funds A: CapWGrA p American Funds A: IncoFdA p Vanguard Instl Fds: InstIdx n Vanguard Idx Fds: 500 n American Funds A: InvCoAA p Dodge&Cox: Stock Dodge&Cox: Intl Stk American Funds A: EupacA p American Funds A: WshMutA p PIMCO Admin PIMS: TotRetAd n Frank/Temp Frnk A: IncoSerA px American Funds A: NewPerA p American Funds A: FundInvA p Vanguard Admiral: TotStkAdm n American Funds A: BalA p IB XC LG BL LG GL BL SP SP LC LV IL IL LC IB BL GL LC XC BL 144,752 67,000 64,096 58,470 58,191 54,945 51,266 48,658 47,989 47,546 40,078 40,051 39,464 37,596 35,095 33,023 32,555 31,383 31,061 30,718 +0.4 +5.5 +5.5 +2.6 +6.4 +3.7 +2.7 +5.3 +5.3 +4.4 +5.6 +4.5 +3.6 +4.0 +0.4 +2.5 +4.8 +4.8 +5.5 +3.6 12-mo Min 5-year Init Invt +12.0/B +19.1/B +15.2/D +12.4/D +21.1/B +11.9/E +16.1/A +17.3/A +17.1/A +13.8/D +15.1/B +16.3/B +13.0/C +16.4/B +11.7/B +17.6/A +16.1/C +16.7/B +19.3/B +15.3/B +54.1/A +14.8/C +16.0/B +28.8/A +29.3/A +35.4/A +26.4/B +11.8/A +11.2/A +14.4/B +1.2/D +36.0/B +43.5/A +10.9/C +52.2/A +33.0/A +39.6/A +26.5/A +15.3/C +22.0/C 1,000,000 3,000 250 250 2,500 250 250 5,000,000 3,000 250 2,500 2,500 250 250 1,000,000 1,000 250 250 100,000 250 Percent Load NAV NL 11.73 NL 30.63 5.75 30.00 5.75 51.02 NL 66.99 5.75 36.29 5.75 16.74 NL 112.29 NL 113.01 5.75 27.75 NL 104.89 NL 36.27 5.75 42.26 5.75 26.78 NL 11.73 4.25 2.17 5.75 28.50 5.75 35.91 NL 30.64 5.75 17.80, November 6, 2010 • THE BULLETIN E The Bulletin AN INDEPENDENT NEWSPAPER BETSY MCCOOL GORDON BLACK JOHN COSTA ERIK LUKENS Chairwoman Publisher Editor-in-chief Editor of Editorials Minor parties flexed muscle A n interesting thing happened on the way to John Kitzhaber’s victory this week. Two minor parties flexed their muscles, and Chris Dudley toppled. When the con- ditions are right, you don’t need to win an election, or even come close, to have a profound effect on the outcome. The candidates for the Constitution and Libertarian parties received roughly 38,000 votes, according to Friday’s largely complete tally. This number represents less than 3 percent of all votes cast for governor, but it’s more than twice as large as the gap separating Kitzhaber and Dudley, which was roughly 17,000 votes on Friday. Though each party is unique, the Constitution and Libertarian parties are ideologically closer to the Republican Party than the Democratic Party, at least when it comes to fiscal and regulatory issues. For that reason, their two candidates pulled a lot more votes from Dudley than from Kitzhaber, perhaps even enough to cost Dudley the election. Meanwhile, according to The Oregonian, minor parties that share many values with the Democratic Party were pressured not to field gubernatorial candidates. So, while Dudley leaked tens of thousands of votes on his right, Kitzhaber leaked none on his left. Here’s another way to look at the results. As of Friday, about 690,000 people voted for Kitzhaber, and 711,000 voted for candidates to his “As of Friday, about 690,000 people voted for Kitzhaber, and 711,000 voted for candidates to his right. ... We hope the numbers push him to the political center.” right. Smaller-government, free-market voters outnumbered Kitzhaber voters, but a Democrat running on the strength of public-sector union money prevailed. Kitzhaber and his supporters, who ran a smart and effective campaign, deserve a great deal of credit for the results. But there are lessons here for all involved. For Kitzhaber, we hope the numbers push him to the political center. Voters gave him an office — and a decidedly mixed message to go with it. And for those who supported minor-party candidates, we hope they consider this year’s outcome when voting in the future. They’ve just demonstrated how much even small bunches of votes can matter, but how many of them are happy with the result? FROM THE ARCHIVES Editor’s note: The following editorial, which appeared on July 21, 1922, does not necessarily reflect the views of The Bulletin’s editorial board today. Boosters Did you ever stop and think, friends, what a grand thing the Bend spirit is? How contagious it is and how proud we are of our city? Do you realize if we would back up this Pride by our Loyalty that we could be just twice as proud when we got through. And that is what we should all do. If Jack, the little scamp, has worn out those shoes you bought him we are going to suggest that you buy your next pair in Bend. If you are contemplating building or improving, secure your materials in Bend and contract Bend labor. If you are not confining all of your purchases to this city, start today. Try this awhile and see how good it feels to look yourself in the glass each morning and be able to say, “Howdy, Old Booster!” To tell the truth, friends, if you could buy merchandise at 50 cents on the dollar away from Bend you still cannot afford — either as a property owner or as a working person — to remove that 50 cents from the community. When you do, you are knocking the props from under your own property values, undermining the financial structure that forms our indus- trial existence and thus remove from the working homes of our community just that much sustenance, comfort and happiness. We want to burn this in deep. You cannot measure so-called money saving against the tearing down process that involves the community from whence it comes. There fore keep your money at home by spending it at home. And to make times good, property values high and employment for all — let normal business transaction prevail without doubts or misgivings. Buy what you need freely. Money put in circulation comes back in wages, crop receipts, investments and in prosperity. Hoarding dollars is a game we should all discourage. Spending them foolishly is another matter. But purchasing the requirements of living, indulging in reasonable amusement and sane investments spells progress and financial success for all. “Setting Tight” is a pastime of the Doubter who contributes nothing to the prosperous conditions which can be made to always prevail. Hard times exist most in the minds of pessimists. Take yourself from this class. Wear the smile of optimism, show commercial courage and faith and keep boosting for Bend. By so doing we will have Civic Success, Personal Success and a City to be proud of. My Nickel’s Worth Awbrey Glen Buy locally Conger and schools A recent article in The Bulletin made it sound like Awbrey Glen was a terrible place to live. I will say what a pleasure it is to live in Awbrey Glen and belong to Awbrey Glen Golf Club. There is a spirit of cooperation between the two entities that is not always found in gated communities. Examples: The Glen Gives, our own nonprofit organization, started in 2004, has raised close to $400,000 to help hundreds of local families with a onetime assistance to allow them to get their lives back on track. One hundred percent of monies raised assist local families. All overhead is contributed by our committee members. New this year was a yard sale that required huge cooperation between the golf club and the residents of Awbrey Glen. Over $11,000 was raised that day. For more than four years, the Awbrey Glen community, including the golf club, has been working on fire issues with the fire department and the Oregon Department of Forestry. Home and lot owners were encouraged to remove combustible vegetation from their properties. Tons were removed this spring. This year, we applied for and received a “firewise community” designation from Firewise Communities/USA. Because of this, we received a two-year grant from Deschutes County so we could thin our evergrowing pines and clean up the north and northwest parts of Awbrey Glen community, including the golf course. I am proud to live in this caring community. Sonya McLaughlin Bend What is up with the “Market magic” piece in a recent issue? We see pictures from local stores in Bend, but does the article say anything at all about these markets? No. It’s all about some market in Corvallis that has already closed its doors. Truly a little could have been said about our local stores here in Bend. In this economy we (the local store owners) need all help we can get. Instead of just posting pictures about our stores, why not say a little about each and why these stores are such treasures to the community (as the article points out). The article did get it right that a lot of the local stores are a very reliable route for regional growers and also food vendors to get their products to the consumer. Consumers don’t understand that a lot of the local stores are a great resource for farmers who don’t have time to do farmers markets. Most of the produce during the growing season can be found at these stores. The plus side of shopping these stores is that it is helping the local economy. We, the owners of these businesses, employ locally; we live here and spend our money here. The local retailer/owner can spend more time with customers, give them more information about the products they sell and actually have knowledge about the products they sell. Best of all, if you shop the local stores you are helping our local economy. Connie Lowe Bend On Oct. 27, letter writer Josh Gatling depicted future House Rep. Jason Conger as having “right wing social values.” He depicts Conger as promoting “fringe education theories” — like home-schooling and voucher programs. Perhaps Gatling hasn’t been informed of some very interesting facts. For instance, home-schooled kids perform head-and-shoulders above public school students on national tests. And it is well documented that there is an inverse relationship between massive infusions of taxes into public schools and their academic results. More money, less performance. Informed citizens opt out of public education if they can, and Conger appears to be no exception. Vouchers put money back into citizens’ pockets to best educate their kids — after they have already paid high taxes for public schools. Sadly, vouchers, home-schooling and charter schools have become “the” tools to attack troubled public education only after the desperate requests for local, state and federal reforms have been met with union and teacher stiffarming. Indeed, Conger seems to have an excellent grasp of the public education intransigence, and he is just what is needed in Salem. Our president has made the reform of public schools one of his highest priorities. Let’s watch the Jason Congers help get that job done. Our nation is still at risk due to our troubled public schools. Ron Deady Bend How schoolkids and adults can deal with bullying By Wendy Ely Bulletin guest columnist N ational Bullying Prevention Awareness month is everyone’s opportunity to share constructive ideas. My own past experiences of parenting and teaching helped me recognize the bully is always being bullied himself by negative feelings and thoughts he can’t control. When the bully learns how to manage the inner conflict and grows into a better self-concept, the bullying often stops. This can happen through positive responses instead of negative reactions. I don’t think it’s naive to accept that gaining an understanding of one’s own goodness enables anyone to take the next important step of seeing a bully in a new light. When “a victim” learns how to see the situation more positively, he finds strength to look at “the villain” with a new caring, which changes the whole scene. Children who learn to find and focus on positive qualities in the bully discover a transformation in their own thinking that often breaks the victim/bully cycle effectively. Reporting bullying instead of remaining silent helps both victim and bully. It can lead to counseling for the bully. At times, school counselors uncover abuse from a parent at home, and when the family is given needed support to find better ways to manage conflict, the bullying at school stops. By speaking up, victims, in turn, can receive the comfort and advice they need to overcome fear, and to find positive ways, such as humor and empathy, to counter bullying. In my experience, the conflict managersprogram at Kenwood Elementary School consistently thwarted bullying. Older students were trained as “conflict managers.” Instead of finding a IN MY VIEW teacher, a child concerned about unfair treatment sought out a student conflict manager, who wore a special T-shirt. The mistreated student was asked to speak first about what happened and how he felt. The “wrongdoer” had to listen, and then paraphrase what the other student said. Often the first speaker had to repeat himself more than once. After the second child successfully conveyed the other’s viewpoint, he was allowed to share his own perspective. Next, the role of paraphrasing was reversed. Finally, after both students felt understood, the conflict manager asked how they could resolve the problem. Ninety percent of the time, they followed “their plan,” which ended the problem! What if positive communication or counseling isn’t possible? One is never too young or too old to learn how the power of choosing to improve his own thinking can transform a bullying situation into something better. Willingness to replace negative, fearful thoughts with inspired, loving thoughts can stop meanness in its tracks. This is not to say “victims” are responsible for bullies, but to suggest we can all accept responsibility for our own thoughts and actions; this has a huge impact on our experience. A dear friend was badly abused by her roommate for some years until she realized she could take action — she could move away. This positive action in itself did not immediately solve the problem, because memories of abuse continued to enslave her. Finally, tired of being so intimidated by fear, she began to slowly replace feelings of negativity, hate, anger, self-condemnation, self- pity and the expectation of continued struggle with good images and happy expectations. The conviction that her brighter outlook could indeed wipe the slate clean gave her the confidence to slowly regain her complete freedom. In her own consciousness, she was mentally freed from the ugly label the bully represented. In time, she found herself feeling the compassion that allowed her to separate the wrongdoing from the person. So what can we do about bullying? We can ask for help when it’s needed! We can take responsibility for our own thinking and actions and try to find the good that is so hard to see in hurtful circumstances. Not always easy, for sure, but we can choose to gain good from our trials, which is always worth the effort and can bring life-changing results! Wendy Ely lives in Crooked River Ranch. THE BULLETIN • Saturday, November 6, 2010 C7 O D N Vernon K. Siedelman, of Redmond Jan. 2, 1937 - Oct. 30, 2010 Arrangements: Deschutes Memorial Chapel, 541-382-5592; Services: 2:30 PM, Nov. 6, 2010, Redmond Christian Church, 9th and Evergreen, Redmond, OR. Wetlands Continued from C1 The local study found about 180 wetlands, which was three times what a consultant working for Deschutes County had anticipated, county Principal Planner Peter Gutowsky said. The county was awarded about $124,000 in grants from the Oregon Watershed Enhancement Board and the Deschutes River Mitigation and Enhancement Program, to cover the cost of the survey. Survey key to planning Actress Jill Clayburgh dies at 66 By Margalit Fox New York Times News Service. Clayburgh, who began her career in films and on Broadway in the late 1960s, was among the first generation of young actresses — including Ellen Burstyn, Carrie Snodgress and Marsha Mason — who regularly portrayed characters sprung from the new femi- (The best-actress Oscar went to Jane Fonda in “Coming Home.”) Reviewing “An Unmarried Woman” in The Times, Vincent Canby wrote: “Miss Clayburgh is nothing less than extraordinary in what is the performance of the year to date. In her we see intelligence battling feeling — reason backed against the wall by pushy needs.” Clayburgh also received an Oscar nomination for “Starting Over” (1979), directed by Alan Pakula. She played a teacher who embarks on a relationship with a newly divorced man played by Burt Reynolds. Reviewing that film in The Times, Janet Maslin wrote, “Miss Clayburgh delivers a particularly sharp characterization that’s letter-perfect during the first part of the story.” She added, “Her Marilyn is all wrong for Phil — that’s what makes their affair so unexpectedly touching and gives the story so much life.” Jill Clayburgh was born in Manhattan on April 30, 1944, the daughter of Albert, an industrial textile salesman, and Julie Clayburgh. She earned a bachelor’s degree in theater from Sarah Lawrence College in 1966. She made her Broadway debut in 1968 in “The Sudden & Accidental ReEducation of Horse Johnson.” Seth Wenig / Associated Press ile photo Jill Clayburgh, shown here in New York in May 2007, died Friday. She was 66. Former Washington Post Jerry Bock, composer of ‘Fiddler on the Roof’ president Ferguson dies By Matt Schudel The Washington Post By T. Rees Shapiro The Washington Post Thomas Ferguson, 74, who served as president and general manager of The Washington Post from 1979 to 1995, a period marked by large gains in circulation and profitability, died Nov. 3 at a hospital in Southampton, N.Y. He had leukemia. Early in his career, Ferguson proved he was a skilled salesman no matter the product — cigars, ballpoint pens or shampoo. He came to The Post after serving as president of Parade, a magazine supplement that appears in many newspapers. As president and general manager of The Post, Ferguson was responsible for the business side of the newspaper, including oversight of the advertising, circulation and finance departments. When Ferguson announced he would retire in 1995, then-pub- If you go Local Wetlands Inventory workshop When: 6 to 8:30 p.m. Nov. 16 Where: Three Rivers Elementary School cafeteria, 56900 Enterprise Drive, Sunriver habitat, among other things. This could help the Upper Deschutes Watershed Council to prioritize protection or restoration of the highest-quality wetlands, and work with the property owners to do that, Houston said. The new wetland survey does not create new regulations for development on wetlands, Gutowsky said. It does provide a more accurate map of wetlands, for property owners and conservationists to use when developing properties and protecting the marshy areas. The Federal Clean Water Act regulates the filling or removal of material from wetlands, and property owners have to work with state or federal agencies to obtain a permit for either of those actions. Not all wetlands provide equal benefits, and the draft report quantifies how well each area stores water, traps or removes pollutants and provides wildlife Wetlands filter water Senate Not only are there issues with signatures that don’t match, there are also late ballots as well as “overvotes,” in which voters select multiple candidates in the same race, and “undervotes,” in which voters select no candidates in a particular race. Any of those reasons could explain why the number of votes tallied in a given race can be lower than the number of ballots submitted, Blankenship said. “Things have been going smoothly, at least here in Deschutes County,” she said. It’s unclear whether even the Senate Republicans believe there are enough votes to sway the governor’s race, and Republican nominee Chris Dudley said Friday afternoon that he had not been paying close attention to the issue. “I think, as in any election, you want to make sure that ev- Continued from C1 He said he would soon know more about how many signatures were awaiting verification by the voters who submitted them. In the meantime, much of the suspicion he’s seen out there, such as in chatter on blogs, appears based on misunderstandings, Trout said, adding that “this is probably the smoothest election I’ve ever been associated with.” Boquist said he found a discrepancy in ballot-counting in the Senate District 3 race. He said Jackson County and the state had given him different totals of the number of votes cast in that race. But Deschutes County Clerk Nancy Blankenship, like Trout, said the shifting numbers are a normal part of vote-counting. nist ethos: smart, capable and gritty, sometimes neurotic, but no less glamorous for all that. “I guess people look at me and they think I’m a ladylike character,”, Clayburgh was nominated for an Academy Award. Wetlands are natural filtration systems that catch a variety of substances such as herbicides, pesticides, sediment from erosion and nitrates before they get into waterways, Houston said. Some of the marshy areas also intercept phosphorous and sequester carbon, according to the draft report. “Whatever it may be, the wetlands are really important for filtration in that area,” Houston said. Nutrients, such as nitrogen and phosphorous compounds, encourage excessive growth of algae and other water plants, which deplete the oxygen that lisher Donald Graham said that Post circulation had grown by hundreds of thousands of copies and that operating income had tripled during Ferguson’s career at the newspaper. “Tom’s most important legacy to the paper is 15 years of good decisions on the day-in, day-out business of the paper,” Graham told The Post in 1994. Ferguson, whose role at the paper had no effect on news coverage or editorial content, said the business side had a symbiotic relationship with The Post’s overall health. “There are some people in the industry that believe the First Amendment has no connection with producing a profit,” Ferguson said in 1994. “Managing that in proportion is difficult, and I think over the span of time that we’ve successfully maintained that balance.” fish and other aquatic species need to survive, according to Oregon’s Department of Environmental Quality. Nitrates in the south county’s shallow aquifer have been an issue since at least 1982, when high nitrate levels were first detected in La Pine. Since then, county, state and federal officials have tried to find solutions to prevent widespread pollution from septic systems, but they have encountered opposition from some residents who were concerned about the cost and did not trust studies on the issue. Another benefit of wetlands is the habitat they provide for birds and other wildlife, Houston said. Insects, salamanders and other food sources are plentiful in these areas, and there are good nesting spots for birds. “From a wildlife standpoint, they’re really important for birds and game,” Houston said. Deschutes County must obtain approval of the wetland survey from Oregon’s Department of State Lands before it can adopt the new wetland survey into its blueprint for future development, known as the comprehensive plan. That process will likely be completed in January, Gutowsky said. Hillary Borrud can be reached at 541-617-7829 or at hborrud@bendbulletin.com. ery vote is counted, every ballot is counted,” he said. “Until I have more details, there’s not a whole lot more to say than that.” Even if recounts don’t change the makeup of the Senate from what now appears to be headed toward a 16-14 Democratic edge, Sen. Chris Telfer, R-Bend, said that Republicans’ pickup of two seats in the election will help “tremendously” in terms of giving her caucus additional clout. Nick Budnick can be reached at 503-566-2839 or at nbudnick@bendbulletin.com. Food, Home & Garden In AT HOME Every Tuesday Jerry Bock, a Broadway composer who wrote the memorable and emotionally resonant music for “Fiddler on the Roof” and other acclaimed theatrical productions, died Nov. 3 at a hospital in Mount Kisco, N.Y., of complications from a stroke. He was 81. Charles McDowell, PBS commentator and columnist, dies By Ashley Southall New York Times News Service Charles McDowell, a retired columnist for The Richmond Times-Dispatch who brought a folksy manner to a regular stint on the PBS program “Washington Week in Review” and to a prominent role in Ken Burns’ PBS series “The Civil War,” died Friday. He was 84. The cause was complications of a stroke, said his wife, Ann Webb McDowell. McDowell worked for the paper in Richmond, Va., for almost half a century, covering local news and state politics from 1949 until 1965, when he became the paper’s Washington correspondent. His syndicated column ran from 1954 until his retirement in 1998. Television viewers knew him from frequent appearances on a variety of PBS programs, including “Summer of Judgment: The Watergate Hearings,” for which he was the writer, narrator and host. a fictional Russian village at the turn of the 20th century. Dolores “Dee” Marie Hasse August 30, 1942 - November 1, 2010 Dolores “Dee” Marie Hasse, age 68, died in Klamath Falls, OR on Monday, November 1, 2010. At 1:00 p.m. on Sunday, November 7, 2010, a memorial service will be held at Trinity Lutheran Church in Bend, OR. Graveside services will be Monday, November 8 at 10:00 a.m. at Deschutes Memorial Park in Bend. Please consider memorial contributions to Little Lambs Preschool and Daycare c/o Zion Lutheran Church, 1025 High Street, Klamath Falls, OR 97601. The oldest of seven daughters, Dee was born August 30, 1942, in Klamath Falls to Ted and Dorothy Sandberg. She grew up in the Klamath area and married Fred Hasse in 1965. The couple later made their home in Redmond, OR. In 1998, they returned to Klamath Falls, and she worked at JELD-WEN Corporation. Dee was active in many church activities. At Trinity Lutheran School she served as the school secretary. She was instrumental in the development of Little Lambs Preschool and Daycare at Zion Lutheran Church. Survivors include her husband; children and their spouses, Ted and Judi Hasse, Fred and Lynette Hasse, and Kim and Brad Henshaw; 14 grandchildren; 4 great grandchildren; her sisters and brothers-in-law Rose Olson, Judy and Dan Manchester, Dorothy and Mike Hudson, Karen Nielsen and Gene McBee, Barb and Rick Ogden; and numerous nieces, nephews, cousins, aunts and uncles. Dolores was preceded in death by her parents and a sister Elizabeth Harwood. More at Ralph ”Neale” Callison October 24,1936 - October 28, 2010 R alph Neale Callison was born to Alford and Leora Callison on October 24, 1936 in Eugene, OR. Surrounded by his family, he passed away on October 28, 2010 in Springfield, OR at 74. Neale graduated from Redmond High School in 1955 where he was a dedicated and talented member of the football and wrestling teams. He was accepted to Oregon State on a wrestling scholarship, but due to a knee injury he had to forego his dreams for a wrestling career. His kids and grandkids enjoyed hearing stories of his football games and taking down a number of fellow wrestlers back in the day. He married Betty Mullins in Powell Butte, OR on October 2, 1958. They moved around the state quite a bit due to his job with the Oregon Department of Transportation, going from Bend to Klamath Falls and Prineville and then back to Bend before settling in Sisters in 1974. Neale loved his job with the State and retired after 39 years, many of those years as a foreman in Sisters. After his retirement from ODOT, he worked during the summers with Valentine Construction and at Mt. Bachelor during the winter season doing snow removal. For years, Neale enjoyed hunting and fishing and thought nothing was better than having someone go with him. Many of those trips were first times for his kids and grandkids and he thought there was nothing better than sharing his joy with his family. As time rolled on and took a toll on his body, he found a new love in gardening. Anyone who knew him looked forward to his famous tomatoes at the end of summer. He was always overjoyed to share his crop with anyone and everyone. Neale and Betty celebrated 50 years of marriage in October, 2008. From the beginning of her illness to her death in 2009, he stood by her side. He took her death very hard, and grieved with the rest of the family for many months. Then, in the form of a Christmas card, his joy returned. He reconnected with a family friend, Judith Stone, who was just checking in on him. Little did they know, in just a few short months, they would be smitten. He found a joy he didn’t think he would find. In the summer, he moved to Springfield to be with his sweetheart. Neale and Judi were married October 23, 2010 in Springfield, Oregon, surrounded by family and friends. He was so proud to see his beautiful bride walk down the aisle. He showed everyone to love with all your heart and not let anything get in the way of that. Neale is survived by his wife Judi (Springfield, OR), two sisters: Bethene Grimes (Prineville, OR) and Tess Hartzell (Bend, OR); three children: Kenneth (Redmond, OR), Kathryn (Modesto, CA) and Karold Toney (Sisters, OR); two step-daughters: Teresa Lilles (Springfield, OR) and Patty Cook (Redmond, OR); 10 grandchildren and six great-grandchildren, who affectionately nicknamed him “Papa Boots.” He was preceded in death by his parents and his first wife, Betty. A Memorial Mass will be held at St. Edward the Martyr Catholic Church in Sisters at 8 a.m. on Monday, November 8, with a graveside service held at 11 a.m. at Deschutes Memorial Gardens in Bend. A Celebration of Life will be held in the spring or summer for all friends and family to remember and celebrate his life. Neale was a great man with a huge heart who touched the lives of everyone he met. He will be greatly missed by all. “I have a long road ahead of me, and not that long to get there in.” Neale “Papa Boots” Callison. Please sign the online guestbook at W E AT H ER C8 Saturday, November 6, 2010 • THE BULLETIN THE BULLETIN WEATHER FORECAST Maps and national forecast provided by Weather Central LLC ©2010. TODAY, NOVEMBER 6 Today: Mainly cloudy, unseasonably mild. HIGH Ben Burkel FORECASTS: LOCAL Western Ruggs Condon 56/43 52/40 59/39 39/31 Warm Springs Marion Forks 59/47 63/37 Willowdale Mitchell Madras 65/42 57/45 Camp Sherman 65/37 Redmond Prineville 67/40 Cascadia 64/41 66/41 Sisters 67/39 Bend Post 67/40 Oakridge Elk Lake 64/39 55/28 Mostly cloudy with a chance of rain far north today. Rain tonight. Central 69/46 64/37 64/36 64/38 64/36 Hampton Crescent Crescent Lake 60/35 62/37 Fort Rock Vancouver 52/45 63/36 Seattle 59/40 Helena 55/46 Bend 69/43 59/43 65/39 Crater Lake 40/32 67/37 68/35 Partly to mostly cloudy today. Mostly cloudy skies tonight. Idaho Falls Elko 71/50 52/32 67/37 Boise 67/40 Grants Pass Redding Silver Lake 60/34 Missoula Eugene Christmas Valley Chemult Reno 69/43 San Francisco Salt Lake City 67/54 70/45 Moon phases First Yesterday Hi/Lo/Pcp HIGH Full New Nov. 13 Nov. 21 Nov. 28 Dec. 5 Saturday Hi/Lo/W WEDNESDAY Mostly cloudy, isolated mixed showers, LOW chilly. Astoria . . . . . . . . 54/51/0.01 . . . . . . 55/50/r. . . . . . 54/43/sh Baker City . . . . . . 61/33/0.00 . . . . . . 64/40/c. . . . . . 51/33/sh Brookings . . . . . .56/49/trace . . . . . 53/49/sh. . . . . . 55/41/sh Burns. . . . . . . . . . 62/32/0.00 . . . . . 64/41/sh. . . . . . 50/32/sh Eugene . . . . . . . . 57/46/0.00 . . . . . . 55/46/c. . . . . . 54/42/sh Klamath Falls . . . 65/36/0.00 . . . . . 59/36/pc. . . . . . 46/31/sh Lakeview. . . . . . . 63/34/0.00 . . . . . 55/37/sh. . . . . . 48/33/rs La Pine . . . . . . . . 64/32/0.00 . . . . . 64/36/sh. . . . . . 42/28/rs Medford . . . . . . . 62/43/0.00 . . . . . 64/45/pc. . . . . . 53/40/sh Newport . . . . . . . 55/52/0.00 . . . . . . 54/53/c. . . . . . 55/45/sh North Bend . . . . . 55/52/0.00 . . . . . . 57/49/c. . . . . . 52/42/sh Ontario . . . . . . . . 57/33/0.01 . . . . . 68/45/pc. . . . . . 56/38/sh Pendleton . . . . . . 50/35/0.00 . . . . . . 63/44/c. . . . . . 57/37/sh Portland . . . . . . . 60/46/0.00 . . . . . . 60/47/c. . . . . . . 55/43/r Prineville . . . . . . . 61/37/0.00 . . . . . 64/41/sh. . . . . . 49/30/sh Redmond. . . . . . . 67/31/0.00 . . . . . . 65/37/c. . . . . . 50/26/sh Roseburg. . . . . . . 58/52/0.00 . . . . . 59/45/sh. . . . . . 54/42/sh Salem . . . . . . . . . 55/43/0.00 . . . . . . 56/46/c. . . . . . 55/42/sh Sisters . . . . . . . . . 67/34/0.00 . . . . . 67/39/sh. . . . . . 50/26/sh The Dalles . . . . . . 54/39/0.00 . . . . . . 61/45/c. . . . . . 56/36/sh HIGH LOW 0 MEDIUM 2 4 HIGH 6 PRECIPITATION Yesterday’s weather through 4 p.m. in Bend High/Low . . . . . . . . . . . . . . . . . . . 66/37 24 hours ending 4 p.m.. . . . . . . . 0.00” Record high . . . . . . . . . . . . .74 in 1980 Month to date . . . . . . . . . . . . . . . 0.00” Record low. . . . . . . . . . . . . . . 9 in 1971 Average month to date. . . . . . . . 0.19” Average high . . . . . . . . . . . . . . . . . . .51 Year to date . . . . . . . . . . . . . . . . . 5.46” Average low. . . . . . . . . . . . . . . . . . . .29 Average year to date. . . . . . . . . . 8.68” Barometric pressure at 4 p.m.. . . 29.86 Record 24 hours . . . . . . . 1.04 in 1973 *Melted liquid equivalent SKI REPORT The higher the UV Index number, the greater the need for eye and skin protection. Index is for solar at noon. 1 LOW 44 22 TEMPERATURE Tomorrow Rise Set Mercury . . . . . .8:04 a.m. . . . . . .5:16 p.m. Venus . . . . . . . .5:43 a.m. . . . . . .3:47 p.m. Mars. . . . . . . . .8:50 a.m. . . . . . .5:51 p.m. Jupiter. . . . . . . .2:48 p.m. . . . . . .2:27 a.m. Saturn. . . . . . . .3:55 a.m. . . . . . .3:38 p.m. Uranus . . . . . . .2:52 p.m. . . . . . .2:45 a.m. ULTRAVIOLET INDEX Sunday Hi/Lo/W Mostly cloudy, unseasonably cold. 45 24 PLANET WATCH OREGON CITIES City 56/50 66/38 58/30 Calgary Sunrise today . . . . . . 7:49 a.m. Sunset today . . . . . . 5:49 p.m. Sunrise tomorrow . . 6:50 a.m. Sunset tomorrow. . . 4:47 p.m. Moonrise today . . . . 8:38 a.m. Moonset today . . . . 5:56 p.m. LOW 44 23 BEND ALMANAC 60/47 Burns La Pine HIGH SUN AND MOON SCHEDULE Yesterday’s regional extremes • 67° Redmond • 31° Redmond TUESDAY Mostly cloudy, unseasonably chilly. 53 27 Portland Partly to mostly cloudy today. Mostly cloudy tonight. Eastern Mainly cloudy, light rain showers, significantLOW ly cooler. NORTHWEST 59/37 Brothers MONDAY Rain will move into the northwest part of the region today, spreading east tonight and Sunday. Paulina 63/38 Sunriver HIGH 40 STATE Maupin Tonight: Mainly cloudy, light rain showers developing. LOW 67 Bob Shaw Government Camp SUNDAY V.HIGH 8 10 ROAD CONDITIONS Snow level and road conditions representing conditions at 5 p.m. yesterday. Key: T.T. = Traction Tires. Ski report from around the state, representing conditions at 5 p.m. yesterday: Snow accumulation in inches Ski area Last 24 hours Base Depth Anthony Lakes . . . . . . . no report . . . no report Hoodoo . . . . . . . . . . . . . no report . . . no report Mt. Ashland. . . . . . . . . . no report . . . no report Mt. Bachelor . . . . . . . . . no report . . . no report Mt. Hood Meadows . . . no report . . . no report Mt. Hood Ski Bowl . . . . no report . . . no report Timberline . . . . . . . . . . . no report . . . no report Warner Canyon . . . . . . . no report . . . no report Willamette Pass . . . . . . no report . . . no report Pass Conditions I-5 at Siskiyou Summit . . . . . . . . . Carry chains or T. Tires I-84 at Cabbage Hill . . . . . . . . . . . Carry chains or T. Tires Hwy. 20 at Santiam Pass . . . . . . . Carry chains or T. Tires Hwy. 26 at Government Camp. . . . . . . . . . . . . No report Hwy. 26 at Ochoco Divide . . . . . . Carry chains or T. Tires Hwy. 58 at Willamette Pass . . . . . Carry chains or T. Tires Hwy. 138 at Diamond Lake . . . . . Carry chains or T. Tires Hwy. 242 at McKenzie Pass . . . . . . . . .Closed for season Aspen, Colorado . . . . . . no report Mammoth Mtn., Calif.. . no report Park City, Utah . . . . . . . no report Squaw Valley, Calif. . . . . no report Sun Valley, Idaho. . . . . . no report Taos, New Mexico . . . . . no report Vail, Colorado . . . . . . . . no report For up-to-minute conditions turn to: or call 511 For links to the latest ski conditions visit: . . . no report . . . no report . . . no report . . . no report . . . no report . . . no report . . . no report 52/45 Yesterday’s U.S. extremes (in the 48 contiguous states): S Calgary 63/36 Portland 60/47 Boise 69/43 Cheyenne 71/40 San Francisco 67/54 • 1.37” Danbury, Conn. Las Vegas 82/57 Salt Lake City 70/45 Phoenix 88/59 Honolulu 84/73 Rapid City 74/42 St. Louis 55/36 Little Rock 59/42 Dallas 68/42 Chihuahua 73/41 La Paz 86/61 Juneau 43/35 S S S S Mazatlan 89/71 Houston 69/46 Monterrey 75/46 FRONTS S S Quebec 39/26 Green Bay St. Paul 48/33 56/40 Des Moines 58/38 Chicago 49/35 Oklahoma City 69/40 Tijuana 75/55 Anchorage 33/30 S Omaha 64/37 Kansas City 62/43 Denver 80/44 Albuquerque 70/42 Los Angeles 73/61 S Bismarck 68/39 Billings 70/42 Santa Ana, Calif. Embarrass, Minn. S Saskatoon 59/30 Winnipeg 51/36 Thunder Bay 48/31 Seattle 56/50 • 96° • 1° S To ronto 40/29 Detroit 44/32 Buffalo New York 51/35 40/32 Philadelphia 53/34 Washington, D. C. 52/36 Columbus 43/25 Louisville 47/29 Portland 47/32 Boston 49/36 Charlotte 52/26 Nashville 49/29 Atlanta Birmingham 54/33 54/29 New Orleans 61/45 Orlando 66/44 Miami 70/51 Halifax 61/48 Yesterday Saturday Sunday City Hi/Lo/Pcp Hi/Lo/W Hi/Lo/W Abilene, TX . . . . .66/30/0.00 . . .72/46/s . . . 75/50/s Akron . . . . . . . . .41/36/0.12 . . .38/27/c . . . 48/31/s Albany. . . . . . . . .47/41/0.22 . 46/28/pc . . 46/31/pc Albuquerque. . . .65/41/0.00 . . .70/42/s . . . 69/38/s Anchorage . . . . .32/27/0.00 . .33/30/sn . . 33/26/sn Atlanta . . . . . . . .52/38/0.01 . . .54/33/s . . . 59/40/s Atlantic City . . . .54/44/0.06 . 55/34/pc . . 52/40/pc Austin . . . . . . . . .68/36/0.00 . . .70/39/s . . . 75/52/s Baltimore . . . . . .56/45/0.00 . 52/32/pc . . . 52/35/s Billings. . . . . . . . .72/42/0.00 . 70/42/pc . . 64/40/sh Birmingham . . . .52/40/0.00 . 54/29/pc . . . 63/35/s Bismarck . . . . . . .59/23/0.00 . 68/39/pc . . . 66/37/s Boise . . . . . . . . . .63/44/0.00 . 69/43/pc . . . .56/37/r Boston. . . . . . . . .62/50/0.38 . 49/36/pc . . 49/36/pc Bridgeport, CT. . .53/47/0.20 . 52/36/pc . . 49/37/pc Buffalo . . . . . . . .41/37/0.23 . . .40/32/c . . . 46/34/s Burlington, VT. . .42/39/0.35 . . .39/29/c . . 40/32/pc Caribou, ME . . . .62/37/0.85 . .43/34/sh . . . 39/31/c Charleston, SC . .61/47/0.00 . . .59/37/s . . . 59/42/s Charlotte. . . . . . .59/34/0.00 . . .52/26/s . . . 56/32/s Chattanooga. . . .50/43/0.02 . 49/28/pc . . . 58/32/s Cheyenne . . . . . .70/29/0.00 . . .71/40/s . . . 65/38/s Chicago. . . . . . . 40/30/trace . 49/35/pc . . . 58/43/s Cincinnati . . . . . .49/39/0.03 . 46/27/pc . . 57/34/pc Cleveland . . . . . .44/36/0.06 . .41/31/sn . . 50/36/pc Colorado Springs 69/30/0.00 . . .75/42/s . . . 78/41/s Columbia, MO . .48/28/0.00 . . .57/37/s . . . 67/42/s Columbia, SC . . .59/41/0.00 . . .56/33/s . . . 58/31/s Columbus, GA. . 57/43/trace . . .59/34/s . . . 61/36/s Columbus, OH. . .43/36/0.00 . 43/25/pc . . . 55/35/s Concord, NH . . . .55/43/0.29 . 48/26/pc . . 46/26/pc Corpus Christi. . .72/39/0.00 . . .75/53/s . . 80/59/pc Dallas Ft Worth. .62/43/0.00 . . .68/42/s . . . 74/53/s Dayton . . . . . . . .43/34/0.00 . 44/27/pc . . . 56/36/s Denver. . . . . . . . .74/35/0.00 . . .80/44/s . . . 79/42/s Des Moines. . . . .49/26/0.00 . . .58/38/s . . . 65/41/s Detroit. . . . . . . . .43/34/0.00 . 44/32/pc . . 51/37/pc Duluth . . . . . . . . .43/20/0.00 . 48/34/pc . . 51/33/pc El Paso. . . . . . . . .72/45/0.00 . . .75/40/s . . . 77/44/s Fairbanks. . . . . . . .25/8/0.00 . . . .19/3/c . . . . 18/0/c Fargo. . . . . . . . . .49/23/0.00 . 56/37/pc . . 57/38/pc Flagstaff . . . . . . .69/29/0.00 . . .66/27/s . . . 57/30/s Yesterday Saturday Sunday City Hi/Lo/Pcp Hi/Lo/W Hi/Lo/W Grand Rapids . . .40/32/0.00 . 45/31/pc . . 54/35/pc Green Bay. . . . . .39/31/0.00 . 48/33/pc . . . 52/37/s Greensboro. . . . .58/37/0.00 . 50/30/pc . . . 56/33/s Harrisburg. . . . . .53/44/0.01 . 48/30/pc . . . 50/31/s Hartford, CT . . . .53/46/0.29 . 52/29/pc . . 49/32/pc Helena. . . . . . . . .60/27/0.00 . 67/37/pc . . . 61/33/c Honolulu . . . . . . .83/74/0.00 . 84/73/pc . . . 84/71/s Houston . . . . . . .68/45/0.00 . . .69/46/s . . . 73/54/s Huntsville . . . . . .50/39/0.00 . 51/28/pc . . . 62/34/s Indianapolis . . . .47/34/0.01 . 48/30/pc . . 58/37/pc Jackson, MS . . . .57/41/0.00 . . .59/36/s . . . 65/39/s Madison, WI . . . .41/26/0.00 . . .50/33/s . . . 57/38/s Jacksonville. . . . .63/44/0.00 . . .61/36/s . . . 62/40/s Juneau. . . . . . . . .42/37/0.09 . . .43/35/r . . . .41/33/r Kansas City. . . . .50/27/0.00 . . .62/43/s . . . 72/47/s Lansing . . . . . . . .37/33/0.00 . 43/30/pc . . 53/33/pc Las Vegas . . . . . .81/59/0.00 . . .82/57/s . . 77/57/pc Lexington . . . . . .47/39/0.01 . 46/26/pc . . . 55/35/s Lincoln. . . . . . . . .54/20/0.00 . . .66/34/s . . . 71/39/s Little Rock. . . . . .56/40/0.00 . . .59/42/s . . . 68/44/s Los Angeles. . . . .87/65/0.97 . 73/61/pc . . 65/58/pc Louisville . . . . . . .50/43/0.02 . 47/29/pc . . . 60/42/s Memphis. . . . . . .55/41/0.00 . . .55/35/s . . . 64/40/s Miami . . . . . . . . .72/64/0.00 . . .70/51/s . . . 73/63/s Milwaukee . . . . .38/31/0.00 . 49/38/pc . . . 56/42/s Minneapolis . . . .45/27/0.00 . 56/40/pc . . . 60/40/s Nashville . . . . . . .49/42/0.00 . 49/29/pc . . . 60/37/s New Orleans. . . .62/48/0.00 . . .61/45/s . . . 65/45/s New York . . . . . .52/45/0.05 . 51/35/pc . . 50/37/pc Newark, NJ . . . . .54/46/0.04 . 52/34/pc . . 50/35/pc Norfolk, VA . . . . .59/46/0.10 . 54/37/pc . . . 53/36/s Oklahoma City . .57/32/0.00 . . .69/40/s . . . 75/43/s Omaha . . . . . . . .52/25/0.00 . . .64/37/s . . . 68/41/s Orlando. . . . . . . .65/54/0.00 . . .66/44/s . . . 68/51/s Palm Springs. . . .90/63/0.00 . . .88/58/s . . 83/56/pc Peoria . . . . . . . . .44/30/0.01 . . .50/32/s . . . 61/40/s Philadelphia . . . .55/46/0.01 . 53/34/pc . . 52/36/pc Phoenix. . . . . . . .88/64/0.00 . . .88/59/s . . . 84/58/s Pittsburgh . . . . . .45/36/0.13 . .40/26/sn . . 47/31/pc Portland, ME. . . .58/45/0.42 . .47/32/sh . . . 45/27/c Providence . . . . .62/49/0.42 . 51/33/pc . . 49/33/pc Raleigh . . . . . . . .61/40/0.00 . 53/30/pc . . . 56/32/s Yesterday Saturday Sunday Yesterday Saturday Sunday City Hi/Lo/Pcp Hi/Lo/W Hi/Lo/W City Hi/Lo/Pcp Hi/Lo/W Hi/Lo/W Rapid City . . . . . .68/25/0.00 . . .74/42/s . . . 72/41/s Savannah . . . . . 61/41/trace . . .59/36/s . . . 60/39/s Reno . . . . . . . . . .76/44/0.00 . 69/43/pc . . . .58/36/r Seattle. . . . . . . . .55/50/0.00 . . .56/50/r . . . .53/44/r Richmond . . . . . .59/46/0.01 . 54/34/pc . . . 54/34/s Sioux Falls. . . . . .49/20/0.00 . . .62/37/s . . . 66/38/s Rochester, NY . . .44/37/0.30 . . .41/30/c . . 46/33/pc Spokane . . . . . . .52/40/0.00 . . .55/44/c . . . .52/37/r Sacramento. . . . .77/53/0.00 . 73/52/pc . . . .61/47/r Springfield, MO. .47/29/0.00 . . .57/37/s . . . 65/42/s St. Louis. . . . . . . .48/35/0.00 . . .55/36/s . . . 64/46/s Tampa . . . . . . . . .69/56/0.00 . . .68/44/s . . . 71/53/s Salt Lake City . . .69/40/0.00 . . .70/45/s . . 64/41/pc Tucson. . . . . . . . .86/54/0.00 . . .85/52/s . . . 84/53/s San Antonio . . . .71/39/0.00 . . .71/42/s . . . 75/54/s Tulsa . . . . . . . . . .57/31/0.00 . . .65/41/s . . . 73/50/s San Diego . . . . . .88/66/0.00 . 70/59/pc . . 65/58/pc Washington, DC .58/46/0.00 . 52/36/pc . . . 54/34/s San Francisco . . .66/54/0.00 . . .67/54/c . . . .60/50/r Wichita . . . . . . . .58/30/0.00 . . .67/42/s . . . 75/49/s San Jose . . . . . . .69/55/0.00 . . .75/54/c . . . .63/49/r Yakima . . . . . . . .54/32/0.00 . . .57/40/c . . . 58/31/c Santa Fe . . . . . . .65/34/0.00 . . .66/33/s . . . 65/32/s Yuma. . . . . . . . . .89/65/0.00 . . .87/58/s . . . 83/57/s INTERNATIONAL Amsterdam. . . . .59/48/0.26 . . .50/41/r . . 45/37/sh Athens. . . . . . . . .74/53/0.00 . . .76/57/s . . . 77/59/s Auckland. . . . . . .63/55/0.00 . 58/46/pc . . 58/45/pc Baghdad . . . . . . .79/54/0.00 . . .85/54/s . . . 84/53/s Bangkok . . . . . . .86/72/0.00 . 85/73/pc . . 86/74/pc Beijing. . . . . . . . .70/37/0.00 . . .69/39/s . . 60/35/pc Beirut. . . . . . . . . .81/64/0.00 . . .83/66/s . . . 78/62/s Berlin. . . . . . . . . .59/50/0.00 . . .51/40/r . . . 45/35/c Bogota . . . . . . . .68/46/0.00 . .68/51/sh . . 65/51/sh Budapest. . . . . . .66/37/0.00 . . .65/42/s . . . 61/45/c Buenos Aires. . . .73/54/0.00 . 80/57/pc . . 88/63/pc Cabo San Lucas .93/72/0.00 . . .85/66/s . . . 84/63/s Cairo . . . . . . . . . .86/66/0.00 . . .85/63/s . . . 81/60/s Calgary . . . . . . . .68/45/0.00 . 63/36/pc . . . 55/31/c Cancun . . . . . . . .77/63/0.00 . 75/58/pc . . 78/60/pc Dublin . . . . . . . . .52/46/0.17 . .45/35/sh . . 43/31/pc Edinburgh . . . . . .52/39/0.00 . .45/35/sh . . 43/28/pc Geneva . . . . . . . .64/41/0.00 . 64/44/pc . . 50/41/sh Harare . . . . . . . . .91/63/0.00 . 90/65/pc . . . .86/64/t Hong Kong . . . . .66/63/0.93 . .76/67/sh . . 82/69/pc Istanbul. . . . . . . .57/54/0.00 . . .72/54/s . . . 72/53/s Jerusalem . . . . . .81/53/0.00 . . .83/54/s . . . 79/51/s Johannesburg . . .81/57/0.62 . 84/59/pc . . . .83/61/t Lima . . . . . . . . . .66/61/0.00 . 70/60/pc . . . 69/59/s Lisbon . . . . . . . . .75/61/0.00 . . .73/55/s . . . 62/50/c London . . . . . . . .63/48/0.07 . .51/39/sh . . 47/38/sh Madrid . . . . . . . .70/46/0.00 . . .70/42/s . . 61/39/sh Manila. . . . . . . . .88/77/0.00 . . .88/77/t . . . .87/77/t Mecca . . . . . . . .100/77/0.00 . .102/79/s . . 103/79/s Mexico City. . . . .64/30/0.00 . . .69/38/s . . . 70/39/s Montreal. . . . . . .41/37/0.48 . 38/26/pc . . 46/32/pc Moscow . . . . . . .41/36/0.02 . . 37/32/rs . . 41/34/sh Nairobi . . . . . . . .75/61/0.01 . .72/60/sh . . 75/61/sh Nassau . . . . . . . .90/75/0.02 . . .77/66/s . . 79/67/pc New Delhi. . . . . .64/63/0.00 . . .88/64/s . . . 87/62/s Osaka . . . . . . . . .66/45/0.00 . . .66/49/s . . . 68/51/s Oslo. . . . . . . . . . .45/25/0.00 . 38/23/pc . . 34/22/pc Ottawa . . . . . . . .39/34/0.43 . 39/25/pc . . 45/31/pc Paris. . . . . . . . . . .64/55/0.00 . . .54/42/r . . 45/35/sh Rio de Janeiro. . .99/73/0.00 . . .83/72/t . . 80/70/sh Rome. . . . . . . . . .72/50/0.00 . . .72/51/s . . 67/51/sh Santiago . . . . . . .82/50/0.00 . . .87/53/s . . 58/40/sh Sao Paulo . . . . . .86/68/0.00 . .80/61/sh . . 81/61/pc Sapporo. . . . . . . .50/45/0.00 . .53/45/sh . . 50/41/pc Seoul . . . . . . . . . .61/37/0.00 . . .64/41/s . . . 63/39/s Shanghai. . . . . . .68/50/0.00 . . .69/53/s . . . 72/55/s Singapore . . . . . .90/79/0.85 . . .88/78/t . . . .91/77/t Stockholm. . . . . .39/30/0.00 . 40/24/pc . . . 36/24/c Sydney. . . . . . . . .63/57/0.00 . .64/56/sh . . 73/57/pc Taipei. . . . . . . . . .73/70/0.00 . .78/72/sh . . 81/73/sh Tel Aviv . . . . . . . .91/68/0.00 . . .84/65/s . . . 79/61/s Tokyo. . . . . . . . . .64/46/0.00 . . .64/53/s . . . 67/54/s Toronto . . . . . . . .43/36/0.18 . 40/29/pc . . 48/33/pc Vancouver. . . . . .52/50/0.01 . . .52/45/r . . . .50/43/r Vienna. . . . . . . . .70/46/0.00 . 63/44/pc . . 51/39/sh Warsaw. . . . . . . .59/52/0.50 . . .51/40/r . . 45/30/pc S College Basketball Inside Kyle Singler looks to lead No. 1 Duke to a national title during the 2010-11 season, see Page D3. THE BULLETIN • SATURDAY, NOVEMBER 6, 2010 COLLEGE FOOTBALL Pac-12 releases first football schedule WALNUT CREEK, Calif. — Utah will visit Southern California in the first conference game in the newly formed Pac-12 conference next season. The league released its first football schedule Friday, following the addition of Colorado and Utah to the conference. The season will end Dec. 3 with the championship game at the site of the division winner with the best record. Oregon and Oregon State will not make trips to Los Angeles in the first season with the Ducks hosting USC and the Beavers hosting UCLA. Washington State will travel to UCLA and Washington will visit USC. Those trips will flip in 2012. Also, the previously scheduled nonconference game between California and Colorado has been dropped. That forces both schools to fill a game on their schedules. For a complete list of Oregon and Oregon State games in 2011, see Scoreboard, Page D2. — The Associated Press PREP FOOTBALL HORSE RACING Bend wins in double overtime Zenyatta Lava Bears overtake West Albany 34-28 to advance to 5A playoffs By Zack Hall The Bulletin Bend High’s defense was tired of getting pushed around. After trailing 21-7 to West Albany at halftime Friday night, the Lava Bears did something about it. Bend shut down the visiting Bulldogs in the second half and came back to win 34-28 on a 10-yard Gavin Gerdes run in the second overtime to advance to the Class 5A state football playoffs. “I think at halftime, they were just tired of letting somebody dictate the game, and they decided to take over themselves,” said Bend coach Craig Walker. “There was no special adjust- ment at all. Honestly, we said, ‘You just have to play harder and tougher.’” Gerdes ran 28 times for 104 yards and two touchdowns for the Bears, and quarterbacks J.C. Grim and Jonah Koski — a sophomore who took over for Grim in the second half — combined to complete 10 of 19 passes for 130 yards and a touchdown. West Albany racked up 221 yards of total offense — led by Ryker Smith’s 171 yards on 25 carries — compared with the Lava Bears’ 156 yards. But it was Bend’s defense that took over. Bend forced three turnovers, including two interceptions, in the first 13 minutes of the second half, leading to 14 Bend points. And after the Bulldogs scored touchdowns on their only three possessions of the first half, the Bears shut them out in the final two quarters. See Bend / D4 NBA Celtics ....... 110 Bulls...........105 Magic.........105 Nets .............90 Hornets ........96 Heat .............93 Cavaliers....123 76ers ......... 116 Warriors.......85 Jazz..............78 Pistons.........97 Bobcats .......90 Lakers ........108 Raptors ......103 Knicks ........ 112 Wizards........91 Nuggets ..... 111 Clippers .....104 Hawks ........ 113 T’wolves ....103 Suns ..........123 Grizzlies ..... 118 looks to cement legacy By Will Graves The Associated Press Next up Shirreffs and • Breeders’ superstar Cup mare Zenyatta are chasing. • When: The unbeatToday, en 6-year-old 3:15 p.m. has become arguably the • TV: ESPN. See Zenyatta / D5 INSIDE Bucks ...........94 Pacers..........90 D Ryan Brennecke / The Bulletin Mountain View running back Austin Sears (20) breaks through the Woodburn defense to score a touchdown during the second quarter Friday at Mountain View. Cougars heading into playoffs with big win Austin Sears rushes for 266 yards in a 55-12 victory over Woodburn By Beau Eastes The Bulletin New Orleans Hornets forward Trevor Ariza celebrates hitting a three point shot late in the game in New Orleans on Friday. Hornets stay perfect New Orleans hangs on to a 96-93 victory over Miami to take its overall record to 5-0, see Page D5 NHL Stars take 6-3 win For the second straight game, Mountain View running back Austin Sears produced video-game numbers as he led the host Cougars to a 55-12 Class 5A football state play-in victory Friday night over Woodburn at Mountain View’s Jack Har- Morry Gash / The Associated Press Zenyatta makes her way to the track Thursday for a practice session for the Breeder’s Cup horse race at Churchill Downs today in Louisville, Ky. Huskies’ QB makes first Oregon State eager to start against No. 1 Ducks face struggling UCLA By Anne M. Peterson The Associated Press Next up Scoreboard ................................D2 NHL ...........................................D3 College basketball .....................D3 Golf ............................................D3 Prep sports ............................... D4 NBA ...........................................D5 all) advance to the 5A state playoffs for the fifth consecutive season. Mountain View, which entered Friday’s game as the Oregon School Activities Association’s No. 1-ranked team in 5A, all but clinched home-field advantage through the first two rounds of the postseason. See Cougars / D4 COLLEGE FOOTBALL Dallas scores four power-play goals en route to beating Phoenix, see Page D3 INDEX ris Stadium. Sears, who rushed for more than 330 yards two weeks ago in Mountain View’s 45-14 win against Bend High, ran for 266 yards and five touchdowns against Woodburn and caught two passes for 15 yards and another touchdown. With the win, the Cougars (9-0 over- • Washington at Oregon • When: Today, 12:30 p.m. • TV: ABC • Radio: KBND-AM 1110 EUGENE — Washington redshirt freshman Keith Price says he isn’t nervous about making his first college start at quarterback against Oregon. Sure, kid. The Ducks, after all, are the top-ranked team in the country and Saturday’s game is at Autzen Stadium, where the noise of the fans can be brutal on opponents. See Huskies / D4 By Greg Beacham Washington QB Keith Price The Associated Press Next up • Oregon State at UCLA • When: Today, 4 p.m. • TV: VS. network • Radio: KICEAM 940, KRCO-AM 690 PASADENA, Calif. — After everything that’s happened to Oregon State during two tumultuous months, the Beavers are still in contention to play in the Rose Bowl in January. That’s only if they take care of business during their first trip to that stadium today. The Beavers (4-3, 3-1 Pac-10) will visit spiraling UCLA (3UCLA 5, 1-4). quarterback See UCLA / D4 Richards Brehaut D2 Saturday, November 6, 2010 • THE BULLETIN O A SCOREBOARD ON DECK TELEVISION TODAY GOLF 4 a.m. — World Golf, HSBC Champions, third round, Golf Channel. 1:30 p.m. — Champions Tour, Charles Schwab Cup Championship, third round, Golf Channel. FOOTBALL 9 a.m. — College, Illinois at Michigan, ESPN. 9 a.m. — College, Maryland at Miami, ESPNU. 9 a.m. — College, Air Force at Army, CBS College Sports (Ch. 41). 9:30 p.m. — College, Baylor at Oklahoma State, FSNW. Noon — College, Pennsylvania at Princeton, VS. network. 12:30 p.m. — College, Washington at Oregon, ABC. 12:30 p.m. — College, Alabama at LSU, CBS. 12:30 p.m. — College, Hawaii at Boise State, ESPNU. 12:30 p.m. — College, TCU at Utah, CBS College Sports (Ch. 41). 1 p.m. — College, California at Washington State, FSNW. 4 p.m. — College, Arkansas at South Carolina, ESPN. 4 p.m. — College, Oklahoma at Texas A&M, FSNW. 4 p.m. — College, Oregon State at UCLA, VS. network. 4 p.m. — College, Louisiana-Lafayette at Mississippi, ESPNU. 5 p.m. — College, Arizona at Stanford, ABC. 5 p.m. — College, Texas at Kansas State, ESPN2. 5 p.m. — College, Tennessee at Memphis, CBS College Sports (Ch. 41). 7:30 p.m. — College, Arizona State at USC, FSNW. 7:30 p.m. — College, Bethune-Cookman at Hampton, ESPNU. 8 p.m. — UFL, Sacramento Mountain Lions at Las Vegas Locomotives, VS. network. AUTO RACING 9:55 a.m. — NASCAR, Nationwide Series, O’Reilly Auto Parts Challenge, ESPN2. FIGURE SKATING 1 p.m. — ISU Grand Prix, Skate Canada International (taped), NBC. HORSE RACING 3:15 p.m. — Breeders’ Cup Classic, ESPN. BASKETBALL 7 p.m. — NBA, Toronto Raptors at Portland Trail Blazers, Comcast SportsNet Northwest. SUNDAY GOLF 4 a.m. — World Golf, HSBC Champions, final round, Golf Channel. 1:30 p.m. — Champions Tour, Charles Schwab Cup Championship, final round, Golf Channel. FOOTBALL 10 a.m. — NFL, Miami Dolphins at Baltimore Ravens, CBS. 1 p.m. — NFL, Indianapolis Colts at Philadelpia Eagles, CBS. 1 p.m. — NFL, New York Giants at Seattle Seahawks, Fox. 5:15 p.m. — NFL, Dallas Cowboys at Green Bay Packers, NBC. SOCCER 10 a.m. — College, Big 12 Tournament, final, teams TBD, FSNW. 6 p.m. — MLS, Conference semifinal, Seattle Sounders at Los Angeles Galaxy, ESPN. RUNNING 11 a.m. — New York City Marathon (same-day tape), NBC. AUTO RACING Noon — NASCAR, Sprint Cup, AAA Texas 500, ESPN. BOWLING Noon — PBA, All-Star Shootout (taped), ESPN2. BASKETBALL 7 p.m. — NBA, Portland Trail Blazers at Los Angeles Lakers, Comcast SportsNet Northwest. RADIO TODAY FOOTBALL 12:30 p.m. — College, Washington at Oregon, KBND-AM 1110. 4 p.m. — College, Oregon State at UCLA, KICE-AM 940, KRCO-AM 690. BASKETBALL 7 p.m. — NBA, Toronto Raptors at Portland Trail Blazers, KBND-AM 1110, KRCO-AM 690. SUNDAY FOOTBALL 1 p.m. — NFL, New York Giants at Seattle Seahawks, KBNW-FM 96.5. BASKETBALL 6:30 p.m. — NBA, Portland Trail Blazers at Los Angeles Lakers, KBNDAM 1110, KRCO-AM 690. Listings are the most accurate available. The Bulletin is not responsible for late changes made by TV or radio stations. Today Cross country: OSAA state championships at Lane Community College in Eugene, 11:15 a.m. Boys soccer: Class 6A state playoffs: Redmond at Beaverton, 6 p.m. Class 5A state play-in games: South Albany at Mountain View, 2 p.m.; Lebanon at Summit, 3 p.m.; Bend at Woodburn, 6 p.m. Class 4A state play-in games: Newport at Sisters, 2 p.m.; Tillamook at Madras, 2 p.m.; Crook County at La Grande, noon. Girls soccer: Class 5A state play-in games: Bend at West Albany, 3 p.m.; Silverton at Mountain View, 11 a.m. Class 4A state play-in games: Central at Sisters, noon; Crook County at La Grande, 2 p.m. Volleyball: Class 5A state playoffs: Wilson at Summit, 6 p.m.; Parkrose at Mountain View, 3:30 p.m. Class 4A state playoffs, Douglas at Crook County, 3 p.m.; Estacada at Sisters, TBA. Class 2A state playoffs, Culver at North Douglas, 6 p.m. FOOTBALL NFL NATIONAL FOOTBALL LEAGUE All Times PDT ———,. Monday’s Game Pittsburgh at Cincinnati, 5:30 p.m. Open: Denver, Washington, St. Louis, Jacksonville, San Francisco, Tennessee NFL Injury Report NEW YORK — The National Football League injury report, as provided by the league (OUT - Definitely will not play; DNP - Did not practice; LIMITED - Limited participation in practice; FULL - Full participation in practice): SUNDAY SAN DIEGO CHARGERS at HOUSTON TEXANS — CHARGERS: DNP: WR Malcom Floyd (hamstring), TE Antonio Gates (toe), WR Richard Goodman (hamstring), K Nate Kaeding (right groin), WR Legedu Naanee (hamstring), LB Brandon Siler (foot). LIMITED: LB Larry English (foot). FULL: LB Kevin Burnett (shoulder), G Kris Dielman (neck). TEXANS: DNP: LB Xavier Adibi (hamstring), TE Owen Daniels (hamstring). LIMITED: WR Andre Johnson (ankle), DT Earl Mitchell (ankle), DE Jesse Nading (ankle), DE Mario Williams (hip). FULL: LB Kevin Bentley (knee), G Mike Brisiel (knee), TE Garrett Graham (shoulder), LB Stanford Keglar (thigh), CB Karl Paymah (wrist), LB Darryl Sharpton (ankle). ARIZONA CARDINALS at MINNESOTA VIKINGS — CARDINALS: DNP: LB Clark Haggans (groin). LIMITED: WR Steve Breaston (knee), WR Early Doucet (groin), RB Beanie Wells (knee). FULL: DT Alan Branch (back), LB Will Davis (knee), DE Kenny Iwebema (shoulder). VIKINGS: DNP: WR Percy Harvin (ankle). LIMITED: CB Chris Cook (quadriceps), G Chris DeGeare (ankle), QB Brett Favre (foot, ankle, chin), LB Ben Leber (knee), CB Lito Sheppard (hand), CB Frank Walker (hamstring), DT Pat Williams (elbow). FULL: CB Asher Allen (back), C John Sullivan (calf). NEW ORLEANS SAINTS at CAROLINA PANTHERS — SAINTS: DNP: CB Patrick Robinson (ankle), T Jon Stinchcomb (knee), RB Pierre Thomas (ankle). LIMITED: RB Reggie Bush (fibula), S Pierson Prioleau (ankle). FULL: WR Marques Colston (hand), C Jonathan Goodwin (groin), CB Jabari Greer (shoulder), K Garrett Hartley (right ankle), RB Christopher Ivory (concussion), CB Tracy Porter (knee), LB Scott Shanle (hamstring). PANTHERS: DNP: T Jeff Otah (knee), RB DeAngelo Williams (foot). FULL: LB Dan Connor (hip). NEW ENGLAND PATRIOTS at CLEVELAND BROWNS — PATRIOTS: DNP: S Jarrad Page (calf), RB Fred Taylor (toe). LIMITED: WR Deion Branch (hamstring), S Patrick Chung (knee), WR Matthew Slater (ankle). FULL: QB Tom Brady (right shoulder). BROWNS: DNP: DE Kenyon Coleman (knee), QB Jake Delhomme (ankle), T John St. Clair (ankle), QB Seneca Wallace (ankle). LIMITED: DT Shaun Rogers (ankle), LB Matt Roth (hamstring), TE Alex Smith (ankle). TAMPA BAY BUCCANEERS at ATLANTA FALCONS — BUCCANEERS: DNP: C Jeff Faine (quadriceps), RB Earnest Graham (hamstring), DT Ryan Sims (knee), WR Sammie Stroughter (foot), T Jeremy Trueblood (knee). LIMITED: DE Kyle Moore (shoulder), TE Kellen Winslow (knee). FULL: DT Gerald McCoy (neck), WR Preston Parker (knee). FALCONS: DNP: RB Ovie Mughelli (hamstring), TE Justin Peelle (groin), LB Sean Weatherspoon (knee). FULL: DE John Abraham (ankle), LB Curtis Lofton (knee), CB Dunta Robinson (head, knee), RB Antone Smith (shoulder). CHICAGO BEARS at BUFFALO BILLS — BEARS: DNP: CB Zackary Bowman (foot). FULL: LB Lance Briggs (ankle), C Edwin Williams (back). BILLS: DNP: LB Andra Davis (shoulder). FULL: T Demetrius Bell (knee), T Cordaro Howard (shoulder), WR Donald Jones (knee), CB Terrence McGee (back), G Eric Wood (knee). MIAMI DOLPHINS at BALTIMORE RAVENS — DOLPHINS: DNP: RB Patrick Cobbs (hamstring). LIMITED: S Yeremiah Bell (toe). FULL: LB Channing Crowder (thumb). RAVENS: DNP: S Tom Zbikowski (foot). LIMITED: TE Dennis Pitta (head). FULL: WR Donte’ Stallworth (foot). NEW YORK JETS at DETROIT LIONS — JETS: LIMITED: S Brodney Pool (head). FULL: LB David Harris (back), LB Calvin Pace (foot), CB Darrelle Revis (hamstring). LIONS: DNP: S C.C. Brown (knee), LB Isaiah Ekejiuba (knee), RB Kevin Smith (knee). LIMITED: S Louis Delmas (ankle), QB Shaun Hill (left forearm), LB Ashlee Palmer (hamstring), TE Brandon Pettigrew (ankle). FULL: RB Jahvid Best (toe), WR Bryant Johnson (foot), WR Calvin Johnson (shoulder), LB DeAndre Levy (ankle), DE Turk McBride (ankle), QB Matthew Stafford (foot). NEW YORK GIANTS at SEATTLE SEAHAWKS — GIANTS: DNP: T William Beatty (foot), RB Madison Hedgecock (hamstring), C Shaun O’Hara (foot), DE Dave Tollefson (illness). LIMITED: DE Osi Umenyiora (knee). FULL: T Kareem McKenzie (illness), LB Gerris Wilkinson (hand). SEAHAWKS: OUT: QB Matt Hasselbeck (head). DNP: DT Colin Cole (ankle), T Russell Okung (ankle), T Tyler Polumbus (knee), RB Michael Robinson (hamstring), WR Golden Tate (ankle), WR Mike Williams (knee). LIMITED: DT Brandon Mebane (calf). INDIANAPOLIS COLTS at PHILADELPHIA EAGLES — COLTS: DNP: RB Joseph Addai (neck), TE Brody Eldridge (rib), WR Anthony Gonzalez (knee), RB Mike Hart (ankle), DT Antonio Johnson (knee), DE Robert Mathis (knee), CB Jerraud Powers (foot), S Bob Sanders (biceps), LB Clint Session (elbow), CB Justin Tryon (foot). LIMITED: LB Kavell Conner (foot). FULL: WR Austin Collie (hand), T Ryan Diem (quadriceps), DE Dwight Freeney (not injury related), CB Jacob Lacey (foot). EAGLES: DNP: T King Dunlap (knee), CB Ellis Hobbs (hip). FULL: DT Brodrick Bunkley (elbow), G Nick Cole (knee), DE Brandon Graham (ankle), WR DeSean Jackson (concussion), DE Juqua Parker (hip), T Jason Peters (knee), QB Michael Vick (rib). KANSAS CITY CHIEFS at OAKLAND RAIDERS — CHIEFS: LIMITED: S Kendrick Lewis (hamstring), WR Dexter McCluster (ankle). FULL: G Ryan Lilja (hand). RAIDERS: DNP: CB Nnamdi Asomugha (ankle), DT John Henderson (foot), TE Zach Miller (foot), WR Louis Murphy (bruised lung), WR Chaz Schilens (knee). LIMITED: S Hiram Eugene (hamstring), QB Bruce Gradkowski (right shoulder), WR Darrius Heyward-Bey (shoulder), C Samson Satele (knee). FULL: LB Travis Goethel (back), CB Chris Johnson (concussion). DALLAS COWBOYS at GREEN BAY PACKERS — COWBOYS: DNP: DE Jason Hatcher (groin), G Montrae Holland (groin), S Akwasi Owusu-Ansah (ankle), QB Tony Romo (left shoulder). LIMITED: T Marc Colombo (back), LB Bradie James (knee). FULL: RB Felix Jones (ankle), G Kyle Kosier (ankle), CB Terence Newman (ribs). PACKERS: OUT: WR Donald Driver (quadriceps), CB Pat Lee (ankle). DNP: G Daryn Colledge (back). LIMITED: S Nick Collins (knee), DE Cullen Jenkins (calf), LB Clay Matthews (shin), DE Ryan Pickett (ankle), TE Andrew Quarless (shoulder), T Mark Tauscher (shoulder), CB Charles Woodson (toe). FULL: T Chad Clifton (hamstring, knee), RB Dimitri Nance (ankle), QB Aaron Rodgers (ankle). MONDAY PITTSBURGH STEELERS at CINCINNATI BENGALS — STEELERS: DNP: DE Aaron Smith (triceps). BENGALS: OUT: DE Jonathan Fanene (hamstring). DNP: DT Tank Johnson (knee), LB Roddrick Muckelroy (ankle). LIMITED: LB Keith Rivers (foot), DE Frostee Rucker (knee). FULL: CB Johnathan Joseph (ankle), S Chinedum Ndukwe (knee), S Roy Williams (knee). IN THE BLEACHERS College SCHEDULE All Times PDT (Subject to change) ——— Friday’s games MIDWEST C. Michigan 26, W. Michigan 22 SOUTHWEST UCF 40, Houston 33 ——— Today’s games EAST Air Force at Army, 9 a.m. Columbia at Harvard, 9 a.m. Davidson at Marist, 9 a.m. William & Mary at New Hampshire, 9 a.m. Cent. Connecticut St. at Robert Morris, 9 a.m. Louisville at Syracuse, 9 a.m. Yale at Brown, 9:30 a.m. Dartmouth at Cornell, 9:30 a.m. Lehigh at Holy Cross, 9:30 a.m. Fordham at Bucknell, 10 a.m. Lafayette at Colgate, 10 a.m. Villanova at Rhode Island, 10 a.m. Albany, N.Y. at Sacred Heart, 10 a.m. Bryant at St. Francis, Pa., 10 a.m. Monmouth, N.J. at Wagner, 10 a.m. Penn at Princeton, noon Towson at Delaware, 12:30 p.m. Maine at Massachusetts, 12:30 p.m. Northwestern at Penn St., 12:30 p.m. SOUTH Virginia at Duke, 9 a.m. N.C. State at Clemson, 9 a.m. or 12:30 p.m. Maryland at Miami, 9 a.m. or 12:30 p.m. Florida at Vanderbilt, 9:21 a.m. W. Carolina at Furman, 9:30 a.m. Idaho St. at Georgia, 9:30 a.m. Charleston Southern at Kentucky, 9:30 a.m. Chattanooga at Auburn, 10 a.m. Valparaiso at Campbell, 10 a.m. N.C. Central at Delaware St., 10 a.m. Lamar at Georgia St., 10 a.m. Morgan St. at Norfolk St., 10 a.m. Florida A&M at N. Carolina A&T, 10:30 a.m. Stony Brook at Presbyterian, 10:30 a.m. Howard at S. Carolina St., 10:30 a.m. Coastal Carolina at VMI, 10:30 a.m. Alcorn St. at Alabama A&M, 11 a.m. Tenn.-Martin at Austin Peay, 11 a.m. Appalachian St. at Georgia Southern, 11 a.m. Bethune-Cookman at Hampton, 11 a.m. Tennessee Tech at Murray St., 11 a.m. Savannah St. at Old Dominion, 11 a.m. Elon at The Citadel, 11 a.m. Concordia-Selma at Grambling St., noon Wofford at Samford, noon Navy at East Carolina, 12:30 p.m. Alabama at LSU, 12:30 p.m. Gardner-Webb at Liberty, 12:30 p.m. James Madison at Richmond, 12:30 p.m. Southern Miss. at Tulane, 12:30 p.m. Boston College at Wake Forest, 12:30 p.m. North Carolina at Florida St., 12:30 or 5 p.m. Fresno St. at Louisiana Tech, 1 p.m. Marshall at UAB, 1 p.m. Florida Atlantic at W. Kentucky, 1:30 p.m. Stephen F.Austin at Nicholls St., 2 p.m. E. Illinois at Tennessee St., 3 p.m. Jacksonville St. at E. Kentucky, 4 p.m. Louisiana-Lafayette at Mississippi, 4 p.m. Northwestern St. at SE Louisiana, 4 p.m. Arkansas at South Carolina, 4 p.m. Texas Southern at Southern U., 4 p.m. Louisiana-Monroe at Fla. International, 4:30 p.m. Jackson St. at Alabama St., 5 p.m. Tennessee at Memphis, 5 p.m. MIDWEST Iowa at Indiana, 9 a.m. Illinois at Michigan, 9 a.m. Minnesota at Michigan St., 9 a.m. Wisconsin at Purdue, 9 a.m. Jacksonville at Butler, 9 a.m. Akron at Ball St., 10 a.m. Drake at Dayton, 10 a.m. UC Davis at North Dakota, 10 a.m. Youngstown St. at Illinois St., 11 a.m. Colorado at Kansas, 11 a.m. Temple at Kent St., 11 a.m. Missouri St. at S. Dakota St., 11 a.m. SW Baptist at SE Missouri, 11 a.m. N. Iowa at Indiana St., 12:05 p.m. Nebraska at Iowa St., 12:30 p.m. S. Illinois at N. Dakota St., 1 p.m. Cal Poly at South Dakota, 2:05 p.m. Texas at Kansas St., 5 p.m. SOUTHWEST Baylor at Oklahoma St., 9:30 a.m. Rice at Tulsa, 11 a.m. McNeese St. at Sam Houston St., noon Cent. Arkansas at Texas St., noon MVSU at Ark.-Pine Bluff, 12:30 p.m. Troy at North Texas, 4 p.m. Oklahoma at Texas A&M, 4 p.m. Missouri at Texas Tech, 5 p.m. SMU at UTEP, 6:05 p.m. FAR WEST UNLV at BYU, 11 a.m. Weber St. at Montana St., 11:05 a.m. Dixie St. at S. Utah, noon New Mexico St. at Utah St., noon Washington at Oregon, 12:30 p.m. Hawaii at Boise St., 12:30 p.m. TCU at Utah, 12:30 p.m. N. Arizona at N. Colorado, 12:35 p.m. Morehead St. at San Diego, 1 p.m. California at Washington St., 1 p.m. Nevada at Idaho, 2 p.m. Portland St. at Sacramento St., 2:05 p.m. Wyoming at New Mexico, 3 p.m. Oregon St. at UCLA, 4 p.m. Arizona at Stanford, 2 p.m. Colorado St. at San Diego St., 7 p.m. Arizona St. at Southern Cal, 7:30 p.m. 2011 SCHEDULES (As of Nov. 5, 2010) ——— OREGON STATE Sept. 3 TBA OREGON Sept. 3 LSU (at Cowboys Stadium, Arlington, Texas) Sept. 10 Nevada Sept. 17 TBA POLLS THE AP TOP 25 The Top 25 teams in The Associated Press college football poll, with first-place votes in parentheses, records through Oct. 30, total points based on 25 points for a first-place vote through one point for a 25th-place vote, and previous ranking: Record Pts Pv. PAC-10 CONFERENCE Standings All Times Pacific Conf. Ov’ll W L W L Oregon 5 0 8 0 Arizona 4 1 7 1 Stanford 4 1 7 1 Oregon State 3 1 4 3 USC 2 3 5 3 Arizona State 2 3 4 4 California 2 3 4 4 Washington 2 3 3 5 UCLA 1 4 3 5 Washington State 0 6 1 8 Today’s Games Washington at Oregon, 12:30 p.m. California at Washington State, 1 p.m. Oregon State at UCLA, 4 p.m. Arizona at Stanford, 5 p.m. Arizona State at USC, 7:30 p.m. Saturday, Nov. 13 Washington State at Oregon State, 1 p.m. Stanford at Arizona State, 4:30 p.m. Oregon at California, 4:30 p.m. USC at Arizona, 5 p.m. Betting Line NFL (Home teams in Caps) Favorite Opening Current Underdog Sunday t-Bears 3 3 BILLS Chargers 2.5 3 TEXANS Saints 7 6.5 PANTHERS VIKINGS 7.5 8 Cards FALCONS 8.5 8.5 Bucs Jets 3.5 4 LIONS RAVENS 5.5 5 Dolphins Patriots 5 4 BROWNS Giants 6.5 7 SEAHAWKS RAIDERS 2.5 1 Chiefs EAGLES 3 3 Colts PACKERS 8.5 7.5 Cowboys Monday Steelers 4 4.5 BENGALS t- Toronto, Canada. COLLEGE FOOTBALL Today Air Force 7 6.5 ARMY MIAMI-FLORIDA 11 8 Maryland CLEMSON 2.5 3.5 NC State Virginia 1(D) 1 DUKE SYRACUSE 5.5 6.5 Louisville Iowa 17 17.5 INDIANA MICHIGAN 3 3 Illinois Boston Coll 3 3 WAKE FOREST PENN ST 6.5 6.5 Northwestern Wisconsin 20 20 PURDUE MICHIGAN ST 24 24 Minnesota FLORIDA ST 10 10.5 N Carolina OKLAHOMA ST 7 8.5 Baylor S CAROLINA 3 4.5 Arkansas Florida 14 14 VANDERBILT Colorado 9 8.5 KANSAS BALL ST 13.5 13.5 Akron BYU 18 18.5 Unlv TULSA 18 17.5 Rice BOISE ST 23 21 Hawaii Temple 3.5 3.5 KENT ST UTAH ST 17 18 New Mexico St E CAROLINA 2.5 3 Navy OREGON 28 35.5 Washington Southern Miss 10 10 TULANE Nebraska 19 18 IOWA ST Oklahoma 4 3 TEXAS A&M Texas 4 3.5 KANSAS ST STANFORD 8 8.5 Arizona Tcu 5 5 UTAH LA TECH 2 (F) 2 Fresno St UAB 10 10.5 Marshall Nevada 12.5 11 IDAHO California 14.5 14.5 WASHINGTON ST Wyoming 11.5 9 NEW MEXICO Oregon St 6.5 5 UCLA Missouri 5.5 4 TEXAS TECH Alabama 6.5 6.5 LSU Tennessee 18.5 20 MEMPHIS Smu 8 6.5 UTEP SAN DIEGO ST 17 17.5 Colorado St USC 6.5 5.5 Arizona St MISSISSIPPI 27.5 28.5 UL-Lafayette Fla Atlantic 2.5 2.5 W KENTUCKY FLORIDA INT’L 9.5 9.5 UL-Monroe Troy 11.5 12 NORTH TEXAS The (D) after the opening line denotes that Duke opened as the favorite. The (F) after the opening line denotes that Fresno State opened as the favorite. TENNIS WTA Tour WOMEN’S TENNIS ASSOCIATION ——— COMMONWEALTH BANK TOURNAMENT OF CHAMPIONS Friday Nusa Dua, Indonesia Singles Quarterfinals Alisa Kleybanova, Russia, def. Aravane Rezai (2), France, 6-1, 6-2. Daniela Hantuchova, Slovakia, def. Yanina Wickmayer (4), Belgium, 6-4, 7-6 (5). ATP Tour ASSOCIATION OF TENNIS PROFESSIONALS ——— DAVIDOFF SWISS INDOORS Friday Basel, Switzerland Singles Quarterfinals Viktor Troicki, Serbia, def. Richard Gasquet, France, 6-4, 6-2. Novak Djokovic (2), Serbia, def. Robin Haase, Netherlands, 6-2, 6-3. Andy Roddick (4), United States, def. David Nalbandian, Argentina, 6-4, 6-4. Roger Federer (1), Switzerland, def. Radek Stepanek, Czech Republic, 6-3, 6-2. VALENCIA OPEN 500 Friday Valencia, Spain Singles Quarterfinals Marcel Granollers, Spain, def. Juan Monaco, Argentina, 1-6, 6-3, 6-4. Gilles Simon, France, def. Nikolay Davydenko (6), Russia, 6-4, 6-7 (5), 6-3. Robin Soderling (2), Sweden, def. Gael Monfils (8), France, 6-3, 6-2. David Ferrer (4), Spain, def. Potito Starace, Italy, 7-5, 6-4. GOLF PGA Tour HSBC CHAMPIONS HSBC Champions Friday At Sheshan International Golf Club Shanghai Purse: $7 million Yardage: 7,266; Par: 72 Second Round Francesco Molinari 65-70—135 Lee Westwood 66-70—136 Jaco Van Zyl 71-66—137 Richie Ramsay 69-68—137 Ernie Els 72-65—137 Luke Donald 68-70—138 Seung-yul Noh 67-72—139 Ross Fisher 69-70—139 Fredrik Andersson Hed 69-71—140 Richard Johnson 70-70—140 Robert Allenby 72-68—140 Padraig Harrington 70-70—140 Ian Poulter 70-70—140 Nick Watney 72-68—140 Tiger Woods 68-72—140 Richard Green 72-68—140 Phil Mickelson 69-71—140 Henrik Stenson 67-74—141 Kyung-tae Kim 72-69—141 Andrew Dodt 73-68—141 Pablo Martin 68-73—141 Martin Kaymer 72-69—141 Ryan Palmer 69-72—141 Matteo Manassero 71-70—141 Adam Scott 69-73—142 Peter Hanson 73-69—142 Ben Crane 71-71—142 Tetsuji Hiratsuka 71-71—142 Tim Clark 72-70—142 Miguel Jimenez 72-70—142 Yuta Ikeda 67-75—142 Rory McIlroy 71-71—142 Heath Slocum 71-72—143 Bill Haas 72-71—143 K.J. Choi 72-71—143 Edoardo Molinari 72-71—143 Ryo Ishikawa 72-71—143 Hunter Mahan 70-73—143 Y.E. Yang 69-74—143 Charl Schwartzel 74-70—144 Robert Karlsson 71-73—144 Arjun Atwal 73-71—144 Retief Goosen 70-74—144 Carl Pettersson 71-73—144 Katsumasa Miyamoto 69-75—144 Paul Casey 73-71—144 Rickie Fowler 71-74—145 Anders Hansen 71-74—145 Camilo Villegas 75-70—145 Anthony Kim 73-72—145 David Horsey 71-74—145 Darren Fichardt 73-72—145 Graeme McDowell 74-71—145 Michio Matsumura 71-74—145 Stuart Appleby 72-73—145 Rhys Davies 76-70—146 Danny Willett 77-69—146 Gregory Bourdy 73-74—147 Jason Bohn 72-75—147 Brendan Jones 76-72—148 Marcus Fraser 72-76—148 Alistair Presnell 74-75—149 Shunsuke Sonoda 72-77—149 Louis Oosthuizen 69-80—149 Simon Khan 76-73—149 Hiroyuki Fujita 75-75—150 Bill Lunde 78-72—150 Mardan Mamat 75-76—151 Thaworn Wiratchant 75-76—151 Michael Sim 72-79—151 Alvaro Quiros 74-78—152 Wu Kang-chun 75-77—152 Liang Wen-Chong 79-73—152 Kiradech Aphibarnrat 78-75—153 Pariya Junhasavasdikul 74-80—154 Hao Yuan 79-75—154 Chao Li 79-79—158 LPGA Tour MIZUNO CLASSIC Friday At Kintetsu Kashikojima Golf Club Shima, Japan Purse: $1.2 million Yardage: 6,506; Par: 72 (36-36) First Round Yukari Baba 32-33—65 Jiyai Shin 31-34—65 Morgan Pressel 35-31—66 Miki Saiki 33-34—67 Karine Icher 33-34—67 Meena Lee 35-32—67 Chie Arimura 32-35—67 Na Yeon Choi 32-35—67 Young Kim 33-35—68 Mika Miyazato Katherine Hull Jimin Kang Sun-Ju Ahn Akiko Fukushima Stacy Prammanasudh Stacy Lewis Yani Tseng Candie Kung Sakura Yokomine Na-Ri Lee Ritsuko Ryu Yui Kawahara Maiko Wakabayashi Momoko Ueda Seon Hwa Lee M.J. Hur Hee-Won Han Christina Kim Asako Fujimoto Teresa Lu Hyun-Ju Shin Na On Min Vicky Hurst Amy Hung Akane Iijima Song-Hee Kim Karrie Webb Maria Hjorth Bo Bae Song Kyeong Bae Shinobu Moromizato Hiromi Takesue Amanda Blumenherst Yun-Jye Wei Eun-A Lim Azahara Munoz Inbee Park Sun Young Yoo Ai Miyazato Kristy McPherson Sophie Gustafson Rui Kitada Ayako Uehara Saiki Fujita Mi-Jeong Jeon Ji-Hee Lee Hee Young Park Mayu Hattori Kaori Aoyama Eun-Hee Ji Catriona Matthew Brittany Lincicome Angela Stanford Hiromi Mogi Junko Omote Alena Sharp Ah-Reum Hwang Nobuko Kizawa Haeji Kang Na Ri Kim Meaghan Francella Wendy Ward Anna Nordqvist Rikako Morita Mie Nakata Ji-Woo Lee Gwladys Nocera Yoshimi Kohda 36-32—68 34-34—68 32-36—68 35-33—68 31-38—69 33-36—69 34-35—69 34-35—69 35-34—69 34-35—69 36-34—70 34-36—70 34-36—70 36-34—70 35-35—70 33-37—70 35-35—70 35-35—70 35-35—70 35-36—71 35-36—71 36-35—71 36-35—71 35-36—71 35-36—71 36-35—71 35-36—71 36-35—71 33-38—71 36-35—71 35-37—72 36-36—72 36-36—72 34-38—72 35-37—72 34-38—72 34-38—72 35-37—72 35-37—72 34-38—72 35-37—72 37-35—72 37-36—73 38-35—73 37-36—73 35-38—73 35-38—73 34-39—73 35-38—73 35-38—73 35-38—73 37-36—73 37-36—73 35-38—73 36-38—74 38-36—74 38-36—74 36-38—74 36-38—74 38-36—74 36-38—74 35-39—74 37-37—74 37-37—74 38-37—75 36-39—75 37-39—76 35-41—76 37-40—77 Champions Tour CHARLES SCHWAB CUP CHAMPIONSHIP Friday At Harding Park Golf Course San Francisco Purse: $2.5 million Yardage: 7,135; Par 71 Second Round John Cook 64-69—133 Tom Kite 67-67—134 Tom Lehman 66-68—134 Mark O’Meara 70-65—135 Russ Cochran 67-68—135 Fred Funk 65-70—135 Corey Pavin 68-68—136 David Frost 68-68—136 Bernhard Langer 67-69—136 Tom Pernice, Jr. 65-71—136 Jeff Sluman 67-70—137 Olin Browne 67-70—137 Michael Allen 69-69—138 Fred Couples 69-69—138 Peter Senior 67-72—139 Mark Wiebe 71-69—140 Nick Price 70-70—140 Tommy Armour III 71-70—141 David Peoples 70-71—141 Jay Haas 71-71—142 Chien Soon Lu 71-71—142 Loren Roberts 70-72—142 Dan Forsman 72-71—143 Brad Bryant 73-70—143 Joe Ozaki 71-72—143 Tom Watson 72-72—144 Larry Mize 70-74—144 Joey Sindelar 73-72—145 Mike Reid 74-71—145 Mark Calcavecchia 70-78—148 HOCKEY NHL NATIONAL HOCKEY LEAGUE All Times PDT ——— EASTERN CONFERENCE Atlantic Division GP W L OT Pts GF GA Philadelphia 13 8 4 1 17 41 30 N.Y. Rangers 13 7 5 1 15 38 36 Pittsburgh 14 6 7 1 13 39 36 N.Y. Islanders 13 4 7 2 10 34 48 New Jersey 15 4 10 1 9 25 48 Northeast Division GP W L OT Pts GF GA Montreal 13 8 4 1 17 32 30 Boston 10 7 3 0 14 32 18 Ottawa 13 6 6 1 13 33 38 Toronto 12 5 5 2 12 29 31 Buffalo 14 3 9 2 8 34 46 Southeast Division GP W L OT Pts GF GA Washington 13 9 4 0 18 44 32 Tampa Bay 12 7 3 2 16 37 34 Atlanta 13 6 5 2 14 40 46 Carolina 13 6 7 0 12 38 42 Florida 11 5 6 0 10 34 29 WESTERN CONFERENCE Central Division GP W L OT Pts GF GA Detroit 11 8 2 1 17 35 26 St. Louis 10 7 1 2 16 28 17 Columbus 12 8 4 0 16 30 29 Chicago 15 7 7 1 15 44 45 Nashville 11 5 3 3 13 26 29 Northwest Division GP W L OT Pts GF GA Vancouver 12 7 3 2 16 34 28 Minnesota 12 6 4 2 14 29 28 Colorado 12 6 5 1 13 40 42 Calgary 13 6 7 0 12 35 38 Edmonton 11 3 6 2 8 32 40 Pacific Division GP W L OT Pts GF GA Los Angeles 12 9 3 0 18 35 25 Dallas 12 8 4 0 16 43 32 Anaheim 14 6 7 1 13 35 46 San Jose 11 5 5 1 11 29 28 Phoenix 12 4 5 3 11 30 38 NOTE: Two points for a win, one point for overtime loss. Friday’s Games N.Y. Rangers 3, New Jersey 0 Washington 5, Boston 3 Montreal 3, Buffalo 2 Florida 7, Carolina 4 Minnesota 2, Calgary 1 Dallas 6, Phoenix 3 Detroit 3, Edmonton 1 Anaheim 3, Pittsburgh 2 Today’s Games St. Louis at Boston, 4 p.m. Buffalo at Toronto, 4 p.m. Ottawa at Montreal, 4 p.m. Philadelphia at N.Y. Islanders, 4 p.m. Florida at Carolina,. Sunday’s Games Philadelphia at Washington, 2 p.m. St. Louis at N.Y. Rangers, 4 p.m. Edmonton at Chicago, 4 p.m. Nashville at Anaheim, 5 p.m. SOCCER MLS MAJOR LEAGUE SOCCER All Times Pacific ——— 0 Thursday, Oct. 28: Colorado 1, Columbus 0 Today, Nov. 6: Colorado at Columbus, 1 p.m. WESTERN CONFERENCE Semifinals FC Dallas 1, Real Salt Lake 0 Saturday, Oct. 30: FC Dallas 2, Real Salt Lake 1 Today, Nov. 6: FC Dallas at Real Salt Lake, 7 p.m. Los Angeles 1, Seattle 0 Sunday, Oct. 31: Los Angeles 1, Seattle 0 Sunday, Nov. 7: Seattle at Los Angeles, 6 p.m. AUTO RACING NASCAR Sprint Cup AAA TEXAS 500 LINEUP After Friday qualifying; race Sunday At Texas Motor Speedway Fort Worth, Texas Lap length: 1.5 miles (Car number in parentheses) 1. (19) Elliott Sadler, Ford, 195.397. 2. (16) Greg Biffle, Ford, 193.653. 3. (99) Carl Edwards, Ford, 193.646. 4. (42) Juan Pablo Montoya, Chevrolet, 193.479. 5. (6) David Ragan, Ford, 193.424. 6. (2) Kurt Busch, Dodge, 193.375. 7. (33) Clint Bowyer, Chevrolet, 193.32. 8. (78) Regan Smith, Chevrolet, 193.216. 9. (5) Mark Martin, Chevrolet, 193.175. 10. (43). 16. (31) Jeff Burton, Chevrolet, 191.986. 17. (48) Jimmie Johnson, Chevrolet, 191.939. 18. (00) David Reutimann, Toyota, 191.891. 19. (17) Matt Kenseth, Ford, 191.884. 20. (20) Joey Logano, Toyota, 191.768. 21. (56) Martin Truex Jr., Toyota, 191.748. 22. (88) Dale Earnhardt Jr., Chevrolet, 191.741. 23. (82) Scott Speed, Toyota, 191.673. 24. (83) Kasey Kahne, Toyota, 191.598. 25. (1) Jamie McMurray, Chevrolet, 191.564. 26. (29) Kevin Harvick, Chevrolet, 191.557. 27. (77) Sam Hornish Jr., Dodge, 191.53. 28. (21) Trevor Bayne, Ford, 191.09. 29. (18) Kyle Busch, Toyota, 191.056. 30. (11) Denny Hamlin, Toyota, 190.968. 31. (10) Bobby Labonte, Chevrolet, 190.846. 32. (47) Marcos Ambrose, Toyota, 190.833. 33. (38) David Gilliland, Ford, 190.201. 34. (87) Joe Nemechek, Toyota, 190, Owner Points. 41. (34) Travis Kvapil, Ford, Owner Points. 42. (37) Dave Blaney, Ford, Owner Points. 43. (09) Landon Cassill, Chevrolet, 188.996. Failed to Qualify 44. (36) J.J. Yeley, Chevrolet, 188.673. 45. (81) Scott Riggs, Chevrolet, 188.653. 46. (46) Michael McDowell, Chevrolet, 187.852. 47. (64) Jeff Green, Toyota, 187.169. 48. (23) Josh Wise, Toyota, 185.944. 49. (92) Brian Keselowski, Dodge, 182.076. HORSE RACING Breeders’ Cup Odds At Churchill Downs Louisville, Ky. Purses do not include supplemental fees CLASSIC 1 1/4 miles (Dirt), 3&Up Purse: $5 million Horse Jockey Odds 1. Quality Road Velazquez 5-1 2. Paddy O’Prado Desormeaux 15-1 3. Haynesfield Dominguez 12-1 4. First Dude Albarado 15-1 5. Blame Gomez 9-2 6. Fly Down Leparoux 15-1 7. Musket Man Maragh 20-1 8. Zenyatta Smith 8-5 9. Pleasant Prince Rosario 30-1 10. Etched A.Garcia 30-1 11. Espoir City (JPN) Sato 20-1 12. Lookin At Lucky M.Garcia 6-1 Trainers 1, Todd Pletcher. 2, Dale Romans. 3, Steven Asmussen. 4, Dale Romans. 5, Albert Stall, Jr. 6, Nick Zito. 7, Derek Ryan. 8, John Shirreffs. 9, Wesley Ward. 10, Kiaran McLaughlin. 11, Akio Adachi. 12, Bob Baffert. DEALS Transactions BASEBALL American League CHICAGO WHITE SOX—Sent C Donny Lucy and LHP Randy Williams outright to Charlotte (IL). CLEVELAND INDIANS—Sent INF Andy Marte outright to Columbus (IL). KANSAS CITY ROYALS—Claimed INF Lance Zawadzki off waivers from San Diego. Assigned OF Jai Miller outright to Omaha (PCL). OAKLAND ATHLETICS—Agreed to terms with RHP Willie Eyre on a minor league contract. Re-signed LHP Travis Blackley to a minor league contract. SEATTLE MARINERS—Named Ted Simmons senior adviser to the general manager. TEXAS RANGERS—Sent INF Esteban German, RHP Doug Mathis and RHP Brandon McCarthy, outright to Oklahoma City (PCL). All refused the assignment to become free agents. National League ATLANTA BRAVES—Purchased the contracts of RHP Juan Abreu from Mississippi (SL) and RHP Erik Cordier from Gwinnett (IL). HOUSTON ASTROS—Named Mike Barnett hitting coach. NEW YORK METS—Waived LHP Hisanori Takahashi. WASHINGTON NATIONALS—Released RHP Tyler Walker. FOOTBALL National Football League NFL—Fined Tennessee DE Jason Babin $20,000 for unnecessarily striking San Diego QB Philip Rivers in the knee area in an Oct. 31 game. Fined San Francisco LB Manny Lawson $12,500 for using his helmet to hit Denver QB Kyle Orton in the chest and LB Ahmad Brooks $10,000 for striking Orton in by the helmet in an attempt to tackle him. HOCKEY National Hockey League NHL—Suspended San Jose F Joe Thornton two games for delivering an illegal check to the head of St. Louis F David Perron in a Nov. 4. Placed by Syracuse (AHL). UTAH GRIZZLIES—Announced D Jake Gannon was loaned to Peoria (AHL). VICTORIA SALMON KINGS—Traded G Riley Gill to Kalamazoo to complete an earlier trade. COLLEGE ATLANTIC COAST CONFERENCE—Suspended Florida State women’s soccer coach Mark Krikorian for one game and fined the school $25,000 for not bringing several starters to the league tournament. BIG 12 CONFERENCE—Signed commissioner Dan Beebe to a three-year contract extension through 2015. WESTERN COLLEGIATE HOCKEY ASSOCIATION— Suspended North Dakota F Brad Malone for one game after a check last weekend left Denver F Jesse Martin hospitalized with a neck injury. BAYLOR—Announced G Kelli Griffin has quit the women’s basketball team. HAMPDEN-SYDNEY—Named Richard Epperson director of athletics. THE BULLETIN • Saturday, November 6, 2010 D3 S B COLLEGE BASKETBALL PREVIEW Duke’s Kyle Singler (12) and Miles Plumlee (21) look to lead No. 1-ranked Duke to another trip to the Final Four in March, 2011. Basketball • Ducks beat Northwest Christian in exhibition: Joevan Catron made a splash in his return to the court to help lead the Oregon men’s basketball team to an 80-53 exhibition win over Northwest Christian at McArthur Court on Friday night. Catron finished five-for-seven from the floor and tied teammate E.J. Singler with a game-high 16 points in the victory. The senior also drained five of his six free throws. The Ducks stormed out of the gates by scoring the first seven points, a run that Teondre Williams put the exclamation point on with a thunderous dunk. Gerry Broome / The Associated Press Tennis • Federer, Roddick to meet in Swiss Indoors semis: Roger Federer and Andy Roddick cruised to straight-set wins Friday in Basel, Switzerland, to gain a Swiss Indoors semifinal that will be their first rematch since an epic 2009 Wimbledon final. The top-seeded Swiss eased past Radek Stepanek of the Czech Republic 6-3, 6-2 and the No. 4 American rode his big serve to a 6-4, 6-4 victory over David Nalbandian of Argentina. • Soderling eases past Monfils into Valencia semis: Second-seeded Robin Soderling defeated Gael Monfils 6-3, 6-2 in the Valencia Open on Friday in Valencia, Spain, gaining his first semifinal since July. Soderling served out the victory in 53 minutes — clinching it with his fifth ace. Soderling will face the winner between David Ferrer and Potito Starace on the hard indoor surface at the City of Arts and Sciences complex. Earlier, former top-10 player Gilles Simon outlasted Nikolay Davydenko 6-4, 6-7 (5), 6-3. Baseball • Seattle hires Ted Simmons to front-office position: The Seattle Mariners have hired San Diego bench coach Ted Simmons as a senior adviser to general manager Jack Zduriencik. The Mariners announced the move Friday. Simmons has spent the past two seasons as the Padres bench coach. Before moving to the Padres bench, he worked in the San Diego front office in various positions from 1999-07 and was the Milwaukee bench coach in 2008. • Catholic nuns sell Honus Wagner card for $262,000:. Auto racing • Sadler takes first pole since ’06: Elliott Sadler has won his first Sprint Cup pole in more than four years with a dominating run in Fort Worth, Texas. Sadler zipped around the high-banked 1½-mile track in 195.397 mph Friday, nearly 2 mph better than front-row partner Greg Biffle. Points leader Jimmie Johnson qualified 17th for the race Sunday. He’s locked in a tight battle for the championship with Denny Hamlin and Kevin Harvick. Harvick is 26th on the starting grid, and Hamlin 30th. Football • Auburn QB Cam Newton: ‘I didn’t do anything wrong’: today’s game with Chattanooga that he’s “sure the smoke will settle.” He says he’s holding up just fine, that he’s had “worse days.” A person familiar with the situation tells The Associated Press that Auburn has had “no contact whatsoever” with Kenny Rogers. The former Mississippi State player has been identified by ESPN.com, citing unidentified people, as the person soliciting payment from that school. The person tells AP that Newton’s eligibility “has never been in jeopardy.” • Notre Dame president: School responsible in student.” Declan Sullivan, 20, a student videographer was killed Oct. 27 when a hydraulic lift he was on toppled over while he was filming football practice. The National Weather Service reported a gusts of up to 51 mph at the time. The school and state regulators are investigating the accident. • Okung ‘highly doubtful’ for Seahawks vs. Giants: Making his first NFL start, Seattle quarterback Charlie Whitehurst had better be acutely aware of what’s happening behind him come Sunday. The Seahawks will be starting a completely new left side of the offensive line against the sack-happy New York Giants. Seahawks coach Pete Carroll said Friday that rookie left tackle Russell Okung is “as doubtful as you can get” as he continues to recover from a high-ankle sprain sustained two weeks ago against Arizona. Seattle also lost left guard Ben Hamilton for the season to a concussion last week. • Canada’s Rogers committed to Bills, NFL in Toronto:. • Pryor fined $7,500 for Favre hit:. — From wire reports The return of another college hoop season By Jim O’Connell The Associated Press It can’t be seven months ago that Gordon Hayward’s shot from halfcourt came so close to providing one of the greatest endings in sports history. It can’t be eight months ago that a lot of people learned in a hurry to correctly pronounce Ali Farokhmanesh, after the Northern Iowa guard hit the three-pointer that everybody has imitated whenever they get on a court. Time to file away those memories of Butler and Duke’s epic title game, of the Panthers beating top-ranked Kansas on a jaw-dropping three. A new season gets under way Monday and the biggest change will come in March when, for the first time, people fill out NCAA tournament brackets that have three more teams and three more games. But first comes four months of the regular season. It starts with Duke a solid preseason No. 1 in most polls, and Blue Devils coach Mike Krzyzewski’s title collection now includes a gold medal from the World Championships. His roster includes seniors Kyle Singler and Nolan Smith back to defend their national championship. “I’ve been fortunate. I had to close last season right away to coach the U.S. team, so last season seems to me like a lot of years ago,” said Krzyzewski, whose four national titles are tied with Adolph Rupp and behind only John Wooden (10). “I just jumped right into that. It’s probably the easiest for me to put last season behind.” Singler and Smith have a chance to join the Duke elite with a second title. “You’re going to hear this a lot from us: We’re not defending last year and not trying to repeat,” said Singler, a preseason All-American for the second straight season. “We know for the freshmen coming in, they’re hungry to win the national championship. At the same time, we’re trying to win another one. That’s our main focus. We’re just trying to stay motivated and Coach is also helping us in doing that.” This season’s versions of Duke and No. 17 Butler meet Dec. 4 at the Meadowlands, one of two games the Blue Devils play against last season’s Final Four. They meet No. 2 Michigan State on Dec. 1 and, eight days earlier, will have faced No. 12 Gonzaga or No. 3 Kansas State in the CBE Classic. “Someone asked me if we don’t win a national championship, will it ruin the year?” Singler said. “You just never know what to expect in the year and toward the end of the year, we’re not worried about that right now. There’s so much we can accomplish, especially at the beginning of the year and the middle of the year. There’s so much to learn and experience. “We definitely have the caliber of talent to accomplish what we did last year.” No program has ever lost as much talent as Kentucky did from a team that was ranked in the top five all season. Five underclassmen — including freshmen All-Americans John Wall and DeMarcus Cousins — were taken in the first round of the NBA draft. No problem for coach John Calipari, who brought in a recruiting class considered so good that the Wildcats are No. 11 in the preseason Top 25. Led by Brandon Knight, considered the best prep point guard last season, this class of Wildcats will have to live with the comparisons to Wall and Co., who were beaten by West Virginia one game shy of the Final Four. “Anybody compared to that group of kids, you’re going to be on the short end,” Calipari said. “This is a totally different team.” There are plenty of other quality newcomers, led by Harrison Barnes, the 6foot-8 forward who is the first freshmen to be selected to The Associated Press’ preseason All-America team and the player who is being looked to lead a quick turnaround for North Carolina. The Tar Heels, who missed the NCAA tournament last season, were picked eighth in the preseason Top 25, a ranking based on the freshmen class led by Barnes. “It remains to be seen if Harrison is going to continue to grow, but from this point, I’ve never been around a freshman who has this kind of intensity at this stage of his freshman year,” Tar Heels coach Roy Williams said. GOLF ROUNDUP NHL ROUNDUP Power plays help Dallas beat Phoenix The Associated Press D.” Kari Lehtonen stopped 25 shots as the Stars won their third in a row after dropping the first three of a season-high six-game homestand. Sami Lepisto, Shane Doan and Lauri Korpikoski scored for the Coyotes, led by former Stars coach Dave Tippett.up.” In other games on Friday: Capitals. . . . . . . . . . . . . . . . . . . . 5 Bruins . . . . . . . . . . . . . . . . . . . . . 3 WASHINGTON — John Carlson scored the tiebreaking goal with 6:35 left, and Washington chased goalie Tim Thomas and beat Boston after blowing a three-goal lead. Rangers . . . . . . . . . . . . . . . . . . . 3 Devils . . . . . . . . . . . . . . . . . . . . . 0 NEWARK, N.J. — Henrik Lundqvist made 33 saves for his second shutout of the season and Brandon Dubinsky scored two goals for New York, keeping New Jersey winless at home. Canadiens . . . . . . . . . . . . . . . . . 3 Sabres. . . . . . . . . . . . . . . . . . . . . 2 BUFFALO, N.Y. — Benoit Pouliot scored twice, Jeff Halpern had a goal and two assists, and Carey Price made 29 saves to help Montreal improve to 84-1 and snap a two-game losing streak. Panthers . . . . . . . . . . . . . . . . . . . 7 Hurricanes . . . . . . . . . . . . . . . . . 4 SUNRISE, Fla. — Chris Higgins broke a tie late in the second period, and Stephen Weiss added two goals for Florida in the first game of a home-andhome set. Wild . . . . . . . . . . . . . . . . . . . . . . . 2 Flames . . . . . . . . . . . . . . . . . . . . 1 ST. PAUL, Minn. — Martin Havlat scored his first goal of the season to break a third-period tie, and Niklas Backstrom made 33 saves for Minnesota. Red Wings . . . . . . . . . . . . . . . . . 3 Oilers. . . . . . . . . . . . . . . . . . . . . . 1 EDMONTON, Alberta — Jimmy Howard made 29 saves, Valtteri Filppula broke a tie on a second-period power play and Detroit beat Edmonton for its third straight victory and sixth in seven games. Ducks . . . . . . . . . . . . . . . . . . . . . 3 Penguins . . . . . . . . . . . . . . . . . . 2 ANAHEIM, Calif. — Bobby Ryan, Ryan Getzlaf and Saku Koivu scored during a 6:51 span of the second period to break open a scoreless game, and Anaheim overcame two goals by Sidney Crosby. Tim Sharp / The Associated Press Phoenix Coyotes left wing Wojtek Wolski (86) takes a shot on Dallas Stars goalie Kari Lehtonen (32) during the first period of an NHL hockey game Friday in Dallas. sson er Lege t n i W acka $ 30 P r 1 ns fo o s s e 6L END OF Westwood one back at HSBC SEASON SALE!! The Associated Press SH.” Also on Friday: Cook takes lead at Cup championship SAN FRANCISCO — Defending champion John Cook shot a 2-under 69 before he eagled the par-4 16th. He followed with pars on the final two holes to get to 9-under 133. Asian golfers tied on top at was two strokes back at 67 along with Miki Saiki, Karine Icher, Meena Lee and Chie Arimura. Japan’s Ai Miyazato, a five-time winner on the LPGA Tour this season, shot a 72. 30 – 60% OFF EVERYTHING IN THE STORE!!!* Proud to be Central Oregon’s only golf specialty store! Locally owned. Full Service Repair Shop. Trade-Ins. N Hwy 97 • Next to ShopKo 541-593-GOLF (4653) Mon–Fri 10–6 Sat 9–5, Sun 10–4 *Certain manufacturer restrictions apply. Golf balls and 2011 Models excluded. Reduction on full retail only. D4 Saturday, November 6, 2010 • THE BULLETIN UCLA PREP ROUNDUP Cowboys fall short of playoffs Bulletin staff report PRINEVILLE — Crook County came oh, so close to advancing to the state football playoffs for the first time since 1997. Instead, North Bend dashed the Cowboys’ postseason hopes by edging out Crook County 2221 on Friday night in a Class 4A state play-in contest. After a slow start and trailing 14-6, the Cowboys (7-3 overall), sparked by Alex Greaves’ field goal block before the half, tied the game 14-14 in the third quarter. The home team then surged ahead in the fourth quarter on a 12yard rushing touchdown by Jordan Reeher, only to watch North Bend march down the field and score with less than a minute remaining in the game. With 50 seconds left on the clock, the Bulldogs gambled and converted a two-point conversion to take a 22-21 lead. The Cowboys, who amassed 355 total yards offense compared to North Bend’s 332, were unable to respond as time expired following an incomplete Crook County passing play. Cowboy quarterback Travis Bartels twice connected with Tyler Tooley for touchdowns. Tooley finished with 53 yards receiving and two touchdowns. The narrow home less marked an end to the Cowboys’ winning season. In other prep action Friday: FOOTBALL Oregon City . . . . . . . . . . . . . . . . 28 Redmond . . . . . . . . . . . . . . . . . . 17 OREGON CITY — Redmond could not have started any better in its Class 6A state play-in game. The visiting Panthers scored twice in the first quarter, including a five-yard touchdown run by Ryan Simmons, and led by 10 points at the end of the opening period. The Pioneers answered early in the second quarter with a touchdown on a 37-yard run by Malcolm Paulston, then Louis Wolf returned a Redmond punt 30 yards for a score to give Oregon City the lead for good. “We were taking care of business and that (the punt return) let ’em right back in the game,” said Panthers coach Dan Elliott. “Big momentum shift right there.” Paulston scored two more touchdowns in the second half and Oregon City (4-6 overall) advanced to the 6A postseason. Simmons ran for 78 yards, and fellow Redmond senior Mitch Dahlen completed 20 of 27 passes for 162 yards and a touchdown. Panther receiver Sawyer Gerdes caught 10 passes for 73 yards and a touchdown. The Panthers (3-6 overall) won three of their first four games this season but ended with five consecutive defeats. Kennedy . . . . . . . . . . . . . . . . . . . 35 Culver . . . . . . . . . . . . . . . . . . . . . . 8 MT. ANGEL — Though Culver dropped its final Tri-River Conference game of the season, the Bulldogs had already clenched a berth in the Class 2A state playoffs after besting Central Linn 26-6 on Oct. 29. Kennedy led Friday’s game from the start and built a 28-0 lead by the half. Culver’s Nathan Hamlin put the Bulldogs (2-3 Tri-River Conference, 5-4 overall) on the scoreboard in the third quarter with a safety before scoring on a nineyard run later in the quarter. Culver will kick off playoff action next week, but its opponent and location will not be determined until Sunday. Elkton . . . . . . . . . . . . . . . . . . . . . 64 Gilchrist . . . . . . . . . . . . . . . . . . . 20 ELKTON — The young and quickly improving Grizzlies were hoping to end their season with three consecutive victories, but host Elkton was too much for Gilchrist in a Class 1A Special District 2 contest. “I’m really proud of the way our boys played,” said Grizzlies coach Steve Hall. “This was a rebuild- ing season for us and the kids really started to catch on halfway through the year.” Despite the win, Elkton (5-2 SD1, 7-2 overall) will just miss qualifying for the 16-team Class 1A playoffs. Next year the Grizzlies (2-5 SD1, 2-6 overall) are expected to return their top two offensive weapons from this season, Josh Anderson and Tyler Shuey, as well as 11 other starters. GIRLS SOCCER Summit . . . . . . . . . . . . . . . . . . . . .11 Dallas . . . . . . . . . . . . . . . . . . . . . . 0 The Storm, who have not lost a game since September, rolled to another convincing win in a second-round Class 5A state play-in game at Summit High. Eve Hess scored the game’s first goal 10 minutes in, and the senior defender went on to add three more goals and two assists. Summit led 5-0 at halftime, and Kristen Parr notched three goals and three assists while Hadlie Plummer tallied two goals in the second half. Rianna Alyward and Annie Hill also scored for Summit. The Storm (11-2-2 overall) will play Tuesday in the first round of the 16-team, 5A state playoffs. Summit’s opponent is to be determined, and the site and time of Tuesday’s match are to be announced. Bend Continued from D1 After both teams scored touchdowns in the first overtime, Bend’s defense came up big one last time. The Lava Bears stuffed West Albany on two running plays, and on third down, Kody Petersen chased down Bulldog quarterback Nick Orsborn for a sack. That led to a 43-yard field-goal try by Tyler Davis that missed. With Bend back on offense, Koski scrambled for 12 yards on third down, and Gerdes barreled through the heart of the West Albany defense for the game-winning touchdown. “We pulled it together and our (offensive) line just did really good,” Gerdes said of the game’s final play. “Our motto is ‘Just believe,’ and that is exactly what we did.” Bend struggled to sustain drives early in the night until getting a jump-start from the defense. A third-quarter fumble deep in Lava Bear territory led to an 85yard touchdown drive, capped by a three-yard pass from Grim to Kenny Dailey to cut the Bulldogs’ lead to 21-14 with 1:16 left in the third quarter. On West Albany’s next possession Kyle Barker picked off an Orsborn pass at midfield and returned the ball to the Bulldogs’ 2yard line. Two plays later, Gerdes tied with a touchdown. “It was a big deal,” said Walker of his team’s ability force turnovers. “Turnovers are the difference in the ballgame. We didn’t have any and they had three.” Bend will play next week in the first round of the playoffs. Zack Hall can be reached at 541-617-7868 or at zhall@ bendbulletin.com. Huskies Ryan Brennecke / The Bulletin Andrew Hester (55) and other Mountain View defenders stop quarterback Xavier Fernandez (12) in the backfield during the first half against Woodburn on Friday. Cougars Continued from D1 The OSAA is expected to release the 5A playoff bracket this weekend. The Cougars jumped to a 270 lead in the first half behind the running of Sears and Mountain View’s big-play defense. The Cougars’ first two scores — a pair of four-yard runs by Sears — were set up by tackling the punter on one Woodburn possession and recovering a fumble on the next. Led by linebacker Joel Skotte and his 12 solo tackles — he also recovered the fumble that set up the Cougars’ second touchdown — Mountain View’s defense limited the Bulldogs (3-6) to fewer than 100 yards of offense in the first half and just 12 points the entire night, their third-lowest total of the season. “Our defense gives us that push,” Cougar coach Steve Turner said. “I was disappointed we didn’t score on our first possession, but (the defense) got us the ball right back (on the muffed punt). Getting us in that short field is so important.” Taking advantage of two big kick returns and three Mountain View personal fouls, Woodburn scored twice in the third quarter, both times starting inside the Cougars’ 35-yard line. Mountain View held the Bulldogs’ doublewing, double-tight-end offense in check the rest of the night, though, stopping Woodburn on fourth down three times while also forcing two turnovers. On the other side of the ball, Woodburn had no answer for Mountain View’s offense. The Cougars recorded 563 yards of total offense and scored on four of their first five possessions. In addition to Sears’ big night, Mountain View quarterback Jacob Hollister completed nine of 15 pass attempts for 190 yards and two touchdowns against one interception. Skotte added 98 yards and a touchdown on just three carries, highlighted by a 91-yard scoring run in the fourth quarter. Beau Eastes can be reached at 541-383-0305 or at beastes@ bendbulletin.com. PREP SCOREBOARD FOOTBALL CLASS 6A PLAY-IN ——— OREGON CITY 28, REDMOND 17 Redmond 10 0 7 0 — 17 Oregon City 0 13 7 8 — 28 R — Ryan Simmons 5 run (Travis Simpson kick) R — Simpson 29 field goal OC — Malcolm Paulston 37 run (kick failed) OC — Louis Wolf 30 punt return (Shawn Hepler kick) R — Sawyer Gerdes 4 pass from Mitch Dahlen (Simpson kick) OC — Paulston 10 run (Hepler kick) OC — Safety OC — Paulston 4 run (kick failed) Class 5A Continued from D1 Oregon State has two losses to Top 5 teams and an embarrassing slip-up at Washington in its recent past, but a strong finish will keep the Beavers on track for their sixth bowl berth in seven seasons. “We thought about it after the Washington game and the bye week,” Oregon State linebacker Dwight Roberson said. “Coach (Mark) Banker ... said, ‘You know what? We are not out of this. We win the next six games, we are there.’ We talked about it, and now we just have to do it.” Jacquizz Rodgers has posted two memorable games against UCLA’s defense already in his career, but the Oregon State tailback is more focused on his team’s execution. After a bit of harsh criticism from their junior star, the Beavers returned from their off date last week with a 35-7 thumping of California, which routed UCLA last month. Rodgers still expects more from the Beavers, but the win only proved their potential. “I am hard on us as a team, because I know what we are capable of,” said Rodgers, who was downright pleased with his teammates’ response against Cal. “Our defense almost had a shutout, and we were well-balanced on offense. When our team scores like that, and our defense makes stops like that, it just makes us hard to beat.” While the Beavers attempt to keep building, the Bruins are hoping to stop a three-game slide that has left them facing long odds just to gain bowl eligibility. UCLA lost at home to Arizona last weekend, and the Bruins will need three wins in their Second-round state play-in contest ——— MOUNTAIN VIEW 55, WOODBURN 12 Woodburn 0 0 12 0 — 12 Mountain View 13 14 14 14 — 55 MV— Austin Sears 4 run (Skyler Laughlin kick) MV— Sears 4 run (run fail) MV— Sears 31 run (Skyler Laughlin kick) MV— Sears 14 run (Skyler Laughlin kick) W— Josh Graff 18 run (run fail) MV— Sears 4 pass from Jacob Hollister (Skyler Laughlin kick) W— Rico Lopez 8 run (run fail) MV— Sears 36 run (Skyler Laughlin kick) MV— Nick Gentry 71 pass from Hollister (Skyler Laughlin kick) MV— Joel Skotte 91 run (Skyler Laughlin kick) ——— BEND 34, WEST ALBANY 28 West Albany 7 14 0 0 7 0 — 28 Bend 0 7 7 7 7 6 — 34 WA— Aaron Potter 3 run (Tyler Davis kick) WA— Jackson Ruckert 5 pass from Nick Orsborn (Davis kick) B— J.C. Grim 3 run (Hayden Crook kick) WA— Ruckert 74 pass from Orsborn (Davis kick) B— Kenny Dailey 3 pass from Grim (Crook kick) B— Dailey 1 run (Crook kick) B— Gavin Gerdes 4 run (Crook kick) WA— Ryker Smith 6 run (Davis kick) B— Gerdes 10 run ——— CLASS 4A Play-In ——— NORTH BEND 22, CROOK COUNTY 21 North Bend 7 7 0 8 — 22 Crook County 0 6 8 7 — 21 NB — Kai Johnson 22 run (Michael Hobson kick) NB — Johnson 9 run (Hobson kick) CC — Tyler Tooley 10 pass from Travis Bartels (kick fail) CC — Tooley 17 pass from Bartels (Tooley pass from Bartels) CC — Jordan Reeher 12 run (Braden Woodbury kick) NB — Aaron Mateski 10 pass from Logan Lucero (Jackson Stump pass from Lucero) CLASS 2A TRI-RIVER CONFERENCE ——— KENNEDY 35, CULVER 8 Culver 0 0 8 Kennedy 14 14 7 K — Derek Trager 6 run (Patrick Goerun kick) K — Michael Billenberg 1 run (Goerun kick) K — Daniel Hammer 41 run (Goerun kick) K — Trager 2 run (Goerun kick) C — Nathan Hamlin safety C — Hamlin 9 run (kick fail) K — Trager 13 run (Goerun kick) 0 — 8 0 — 35 Continued from D1 But Price is undaunted. “I’m going to go out there and just have fun and play, just like high school,” he said. Price was thrust into his new role as starter against the Ducks (8-0, 5-0 Pac-10) because senior Jake Locker has a broken rib. The Heisman hopeful at the start of the season was first hurt during a marathon overtime victory over Oregon State on Oct. 16. At first it was a hairline fracture and Locker continued to play, but it got worse in Washington’s 41-0 loss at home to Stanford last weekend. Price played the final quarter against the Cardinal, and threw a touchdown pass on his only play from scrimmage in a 32-31 victory on the road against USC on Oct. 2. Washington Coach Steve Sarkisian said Price has an advantage in that he’s practiced with the first-team offense for the past three weeks while Locker has rested. But Sarkisian was realistic about what Price is up against. “It’s going to be hard, a great challenge. But one of the unique qualities Keith has is he is a very positive young man. He’s always bright eyed and got a great smile on his face. He doesn’t tend to get rattled by things,” the coach said. “I think that type of an approach is one that you really need going into Autzen Stadium.” Price isn’t the only one who is going to be challenged. Oregon has the nation’s top-ranked offense, averaging nearly 573 yards a game. The Ducks are dropping just under 56 points per game on their opponents. The Huskies, meanwhile, are struggling on defense, allowing an average of 429.8 yards and 34.1 points per game. Washington (3-5, 2-3) has lost three of their last four games. In the last two, losses to Arizona and Stanford, the team has been outscored 85-14. “Our confidence has changed final four games to avoid missing bowl qualification for just the second time in 11 seasons. Richard Brehaut is slated to make his fourth career start, and coach Rick Neuheisel is hoping the sophomore is ready to lead UCLA’s mostly awful passing offense to a breakout game. The Bruins finally showed signs of life through the air in last week’s loss, passing for a season-high 228 yards. “This is not too big for Richard,” Neuheisel said. “Richard has what I like to call moxie. He’s got a little swagger to him. He’s unafraid. There’s zero fear, so that’s not an issue. Sometimes there should be some fear, but there’s not, in terms of him knowing who’s unblocked and those kinds of things. It’s not too big for him that way.” Neuheisel also isn’t comforted by the season-long criticism of Banker’s defense, noting Oregon State held Cal to 23 yards passing last week. “Their defensive coordinator does a nice job there,” Neuheisel said. “Their bendbut-don’t-break thing, they’re going to get up in your mustache and make some plays.” Neuheisel realizes his own defense is unlikely to slow down Rodgers, who also threw a touchdown pass last week in another do-it-all game. Oregon State coach Mike Riley isn’t sure which defense he’ll see at the Rose Bowl: The UCLA squad that shut down Texas in a big road win in September, or the clueless bunch that has yielded 124 points in its last three games. “They’ve had some outstanding moments in their season,” Riley said. “Defensively, UCLA has always been a problem for us with their athleticism and with the schemes that they run. We expect a very tough match.” some and it’s slumped some and there is some wonder and doubt in some guys’ minds,” Sarkisian said. “But that doesn’t mean you can’t bring that back up. That’s part of the business that we are in.” The Ducks are brimming with confidence after taking over the top spot in the BCS rankings this week. Oregon, which also is No. 1 in the AP Top 25, is off to it’s best start since the 1933 season, when they also opened 8-0. The Ducks have never before been the No. 1 team in the country. And while coach Chip Kelly won’t address what that means for Oregon, the players admit they can’t help but be excited about the prospects for a national championship. “We’re all human out here. We know we control our own destiny and we can do something really special this year. But we understand it’s one week at a time and it’s four weeks for the rest of lives,” said receiver Jeff Maehl. “We have to sacrifice and make sure we come out here everyday and focus.” Maehl was the Pac-10 offensive player of the week after making eight catches for 145 yards and three touchdowns in Oregon’s 53-32 victory at USC last Saturday. And Maehl is only a part of Oregon’s prolific offense. Running back LaMichael James leads the nation with an average of 172.9 yards a game. Through seven games the Heisman candidate has already rushed for 1,210 yards. Quarterback Darron Thomas has thrown for 21 touchdowns and run for two more. The Ducks could see the return of running back and return specialist Kenjon Barner, who suffered a serious concussion in Oregon’s 43-23 victory at Washington State on Oct. 9. Oregon only lists players as day-to-day, but Barner was practicing at full-speed this week. The Huskies lead the alltime series against Oregon 5839-5, but the Ducks have won the last six games, all by 20 or more points. Former Storm golfer earns Big Sky Conference weekly honor Bulletin staff report OGDEN, Utah — Tiffany Schoning, a Summit High graduate and a junior at Portland State University, has been named the Big Sky Conference’s cowomen’s golfer of the week after winning the Turtle Bay Collegiate Invitational in Kahuku, Hawaii, a three-day tournament which concluded on Thursday. Schoning shot rounds of 74 and 76 before ending the tournament with a 3under-par 69 to claim medalist honors by two strokes. Her three-day total of 218 was a career low and tied her for the third-best 54-hole total in Portland State history. Schoning shared the Big Sky honor with Northern Arizona’s Alexa Kim. PREP NOTEBOOK Ex-Lava Bear shines at Concordia PORTLAND — Kaitlyn Tebbs, a 2007 graduate of Bend High, leads NAIA’s topranked women’s soccer team, Concordia University of Portland, into the Cascade Collegiate Conference playoffs today. Tebbs, who led the Cavaliers in goals (eight) and assists (eight) this regular season, has helped guide Concordia to a 16-02 overall record and an 8-0-1 mark in CCC play. The Cavs host the College of Idaho today in a CCC semifinal match. The winner of today’s game advances to the CCC title game, which will be played on Nov. 13. The winner of the CCC tournament earns the league’s automatic berth into the NAIA National Championships. ic-10 Conference loss to No. 4 Stanford. Defoe, who graduated early and played spring ball with OSU, leads the Beavers in digs this season with 295. Oregon State, which were 1-10 in Pac-10 play as of Friday, played Arizona State on Friday night and are at Arizona today. Former Storm standout leads Beavs in digs CORVALLIS — Oregon State University freshman Becky Defoe, a homeschooled student from Bend who played volleyball for Summit High the last four seasons, led the Beavers in digs last Sunday in their 25-17, 25-21, 25-20 Pacif- Redmond grad finishes strong season at OIT KLAMATH FALLS — Crystal Foster, a 2009 graduate of Redmond High and a sophomore at Oregon Institute of Technology, just completed a standout season for the Owls in women’s soccer, leading her with team with 14 goals in 17 games. Fos- ter, who also recorded three assists this year, helped guide OIT to a 10-7 overall record and a 5-4 mark in the NAIA Cascade Collegiate Conference. The Owls’ season came to a close on Saturday with a 6-1 defeat at Concordia University in Portland. Past Madras AD to receive honor SPRINGFIELD — Margret Sturza, a former athletic director at Madras High School, will be inducted into the Oregon Athletic Directors Association’s hall of fame on April 16, 2011. Sturza will be one of five former athletic directors honored by the OADA at its annual conference in Sunriver. THE BULLETIN • Saturday, November 6, 2010 D5 NBA SCOREBOARD SUMMARIES EASTERN CONFERENCE Friday’s games Atlantic Division Hawks 113, T’wolves 103 ATLANTA (113) Smith 9-13 2-3 20, Horford 7-11 0-0 14, Collins 2-3 2-2 6, Bibby 5-11 2-3 15, J.Johnson 4-13 3-3 11, Ja.Crawford 8-14 5-5 22, Pachulia 1-2 5-8 7, Teague 2-5 2-2 6, Powell 5-6 0-0 10, Jo.Crawford 1-3 0-0 2. Totals 44-81 21-26 113. MINNESOTA (103) Beasley 6-17 4-5 16, Love 6-19 5-5 18, Milicic 2-7 0-0 4, Ridnour 4-6 0-0 9, W.Johnson 711 0-0 18, Brewer 8-16 2-2 18, Pekovic 2-6 0-0 4, Tolliver 2-6 0-0 4, Telfair 3-8 0-0 8, Ellington 2-3 0-0 4. Totals 42-99 11-12 103. Atlanta 26 30 27 30 — 113 Minnesota 25 26 20 32 — 103 3-Point Goals—Atlanta 4-18 (Bibby 3-7, Ja.Crawford 1-4, Jo.Crawford 0-1, Smith 0-1, Teague 0-1, J.Johnson 0-4), Minnesota 8-22 (W.Johnson 4-6, Telfair 2-3, Ridnour 1-2, Love 14, Brewer 0-1, Tolliver 0-3, Beasley 0-3). Fouled Out—None. Rebounds—Atlanta 51 (Horford 12), Minnesota 49 (Love 12). Assists—Atlanta 27 (Smith 6), Minnesota 24 (Telfair 7). Total Fouls— Atlanta 15, Minnesota 22. Technicals—Beasley. A—17,222 (19,356). Boston New York New Jersey Toronto Philadelphia W 5 3 2 1 1 Knicks 112, Wizards 91 WASHINGTON (91) Blatche 9-17 4-4 22, Thornton 4-9 0-0 8, McGee 4-5 0-0 8, Wall 4-11 5-6 13, Hinrich 28 3-4 7, Armstrong 2-4 0-0 4, Arenas 6-13 2-3 18, Hudson 0-0 0-0 0, Booker 0-0 0-0 0, Yi 2-5 4-4 8, Young 1-3 1-1 3, Martin 0-0 0-0 0. Totals 34-75 19-22 91. NEW YORK (112) Gallinari 6-13 0-1 16, Stoudemire 6-11 6-7 18, Mozgov 3-4 0-2 6, Fields 2-5 0-0 5, Felton 5-10 1-1 13, Douglas 8-19 0-0 19, Chandler 5-8 3-3 14, Turiaf 4-4 2-2 10, Walker 4-6 0-0 9, Randolph 1-7 0-2 2. Totals 44-87 12-18 112. Washington 27 22 24 18 — 91 New York 26 32 23 31 — 112 3-Point Goals—Washington 4-16 (Arenas 4-8, Young 0-1, Blatche 0-1, Wall 0-2, Hinrich 0-4), New York 12-29 (Gallinari 4-9, Douglas 38, Felton 2-5, Walker 1-2, Chandler 1-2, Fields 1-2, Randolph 0-1). Fouled Out—None. Rebounds—Washington 44 (McGee 8), New York 49 (Douglas 10). Assists—Washington 13 (Wall 7), New York 23 (Felton 10). Total Fouls—Washington 18, New York 21. Technicals—Blatche, Washington defensive three second, Turiaf. A—19,763 (19,763). Cavaliers 123, 76ers 116 CLEVELAND (123) Moon 3-6 0-0 7, Hickson 5-12 6-6 16, Varejao 10-10 3-5 23, M.Williams 6-15 10-12 22, Parker 1-2 3-4 5, Gibson 6-9 8-11 22, Hollins 2-2 1-2 5, Sessions 2-6 5-5 9, J.Williams 2-7 0-0 4, Graham 4-6 2-3 10. Totals 41-75 3848 123. PHILADELPHIA (116) Nocioni 6-10 0-0 15, Brand 8-12 4-5 20, Hawes 1-1 1-2 3, Holiday 10-17 6-8 29, Iguodala 3-7 1-2 7, L.Williams 7-14 2-3 16, Young 2-4 1-2 5, Turner 2-7 1-1 5, Kapono 0-0 0-0 0, Speights 3-4 2-2 8, Songaila 0-1 0-0 0, Battie 4-6 0-0 8. Totals 46-83 18-25 116. Cleveland 34 27 18 44 — 123 Philadelphia 20 33 31 32 — 116 3-Point Goals—Cleveland 3-13 (Gibson 24, Moon 1-2, J.Williams 0-2, M.Williams 0-5), Philadelphia 6-17 (Nocioni 3-5, Holiday 3-5, Iguodala 0-2, Turner 0-2, L.Williams 0-3). Fouled Out—Holiday. Rebounds—Cleveland 53 (Varejao 12), Philadelphia 35 (Battie 7). Assists—Cleveland 22 (M.Williams 7), Philadelphia 26 (Holiday 8). Total Fouls—Cleveland 17, Philadelphia 32. Technicals—Cleveland defensive three second. A—10,589 (20,318). Bucks 94, Pacers 90 MILWAUKEE (94) Delfino 4-15 0-0 9, Gooden 3-7 1-2 7, Mbah a Moute 2-7 6-8 10, Jennings 7-19 3-4 18, Salmons 6-12 8-10 22, Brockman 0-1 0-0 0, Dooling 3-4 0-0 9, Ilyasova 3-7 2-2 9, Maggette L 1 2 3 4 5 Pct .833 .600 .400 .200 .167 GB — 1½ 2½ 3½ 4 L10 5-1 3-2 2-3 1-4 1-5 Str W-4 W-2 L-3 L-3 L-1 Home 4-0 1-1 2-2 1-1 1-3 Away 1-1 2-1 0-1 0-3 0-2 Conf 5-1 3-1 1-3 1-1 1-5 Away 4-0 0-1 2-2 0-3 1-3 Conf 4-0 2-1 3-1 1-3 1-3 Away 0-2 1-1 1-2 1-3 0-3 Conf 1-2 2-2 2-2 2-1 1-4 Southeast Division Atlanta Orlando Miami Washington Charlotte W 6 3 4 1 1 L 0 1 2 3 4 Chicago Cleveland Indiana Milwaukee Detroit W 2 2 2 2 1 L 3 3 3 4 5 Pct 1.000 .750 .667 .250 .200 GB — 2 2 4 4½ L10 6-0 3-1 4-2 1-3 1-4 Str W-6 W-2 L-1 L-1 L-1 Home 2-0 3-0 2-0 1-0 0-1 Central Division Pct .400 .400 .400 .333 .167 GB — — — ½ 1½ L10 2-3 2-3 2-3 2-4 1-5 Str L-2 W-1 L-2 W-1 W-1 Home 2-1 1-2 1-1 1-1 1-2 WESTERN CONFERENCE Pistons 97, Bobcats 90 CHARLOTTE (90) G.Wallace 6-9 1-2 13, Diaw 3-11 0-0 7, Mohammed 3-5 0-0 6, Augustin 4-6 2-2 12, Jackson 12-19 0-0 28, Thomas 4-6 2-2 10, Collins 0-0 0-0 0, Livingston 2-2 0-0 4, D.Brown 3-8 1-3 9, Henderson 0-1 0-0 0, Diop 0-0 1-2 1. Totals 37-67 7-11 90. DETROIT (97) Prince 7-17 0-0 14, Daye 3-6 0-0 8, B.Wallace 2-3 0-0 4, Gordon 7-16 5-5 20, McGrady 3-6 4-4 10, Hamilton 2-7 11-11 16, Monroe 3-5 3-3 9, Bynum 2-9 2-2 6, Villanueva 3-6 1-2 10. Totals 32-75 26-27 97. Charlotte 15 24 25 26 — 90 Detroit 32 23 17 25 — 97 3-Point Goals—Charlotte 9-20 (Jackson 4-8, D.Brown 2-3, Augustin 2-4, Diaw 1-5), Detroit 7-13 (Villanueva 3-5, Daye 2-2, Hamilton 1-2, Gordon 1-2, Bynum 0-2). Fouled Out—None. Rebounds—Charlotte 42 (Diaw, D.Brown 7), Detroit 36 (Monroe, B.Wallace 6). Assists—Charlotte 28 (Augustin 8), Detroit 14 (B.Wallace 4). Total Fouls—Charlotte 18, Detroit 13. Technicals—Charlotte Coach Brown, Jackson, Charlotte defensive three second. A—13,291 (22,076). NBA ROUNDUP Southwest Division New Orleans Dallas San Antonio Memphis Houston W 5 3 3 2 0 L 0 1 1 4 4 Portland Denver Oklahoma City Utah Minnesota W 4 3 3 2 1 L 2 2 2 3 5 L.A. Lakers Golden State Sacramento Phoenix L.A. Clippers W 6 4 3 2 1 L 0 1 2 3 5 Pct 1.000 .750 .750 .333 .000 GB — 1½ 1½ 3½ 4½ L10 5-0 3-1 3-1 2-4 0-4 Str W-5 W-2 W-2 L-3 L-4 Home 3-0 1-1 1-1 1-1 0-2 Away 2-0 2-0 2-0 1-3 0-2 Conf 3-0 2-1 2-1 2-3 0-4 Away 3-1 1-1 2-1 1-2 0-3 Conf 2-1 3-2 1-2 1-3 0-2 Away 2-0 0-1 2-1 1-1 0-2 Conf 5-0 4-1 1-1 2-3 1-5 Northwest Division Pct .667 .600 .600 .400 .167 GB — ½ ½ 1½ 3 L10 4-2 3-2 3-2 2-3 1-5 Str L-1 W-1 W-1 L-1 L-4 Home 1-1 2-1 1-1 1-1 1-2 Paciic Division Pct 1.000 .800 .600 .400 .167 GB — 1½ 2½ 3½ 5 L10 Str 6-0 W-6 4-1 W-2 3-2 L-1 2-3 W-1 1-5 L-1 ——— Friday’s Games Milwaukee 94, Indiana 90 Cleveland 123, Philadelphia 116 New York 112, Washington 91 New Orleans 96, Miami 93 Phoenix 123, Memphis 118, 2OT L.A. Lakers 108, Toronto 103 Home 4-0 4-0 1-1 1-2 1-3 Orlando 105, New Jersey 90 Detroit 97, Charlotte 90 Atlanta 113, Minnesota 103 Boston 110, Chicago 105, OT Golden State 85, Utah 78 Denver 111, L.A. Clippers 104 Today’s Games Orlando at Charlotte, 4 p.m. New Jersey at Miami, 4:30 p.m. Houston at San Antonio, 5:30 p.m. Denver at Dallas, 6 p.m. Memphis at Sacramento, 7 p.m. Cleveland at Washington, 4 p.m. New Orleans at Milwaukee, 5:30 p.m. L.A. Clippers at Utah, 6 p.m. Toronto at Portland, 7 p.m. Sunday’s Games Philadelphia at New York, 9 a.m. Golden State at Detroit, 3 p.m. Boston at Oklahoma City, 4 p.m. Phoenix at Atlanta, 2 p.m. Minnesota at Houston, 4 p.m. Portland at L.A. Lakers, 6:30 p.m. ——— All Times Pacific 4-11 2-4 10, Sanders 0-0 0-0 0. Totals 32-83 22-30 94. INDIANA (90) Granger 6-17 7-8 19, McRoberts 0-2 0-0 0, Hibbert 4-11 6-7 14, Collison 5-13 8-9 19, Dunleavy 3-8 5-6 11, Posey 3-7 0-0 9, Ford 1-4 0-0 2, George 4-9 0-0 10, Hansbrough 3-3 0-0 6, S.Jones 0-1 0-0 0. Totals 29-75 26-30 90. Milwaukee 18 34 18 24 — 94 Indiana 20 40 16 14 — 90 3-Point Goals—Milwaukee 8-20 (Dooling 3-3, Salmons 2-5, Ilyasova 1-1, Jennings 1-3, Delfino 1-7, Maggette 0-1), Indiana 6-24 (Posey 3-7, George 2-5, Collison 1-3, McRoberts 0-1, Ford 0-2, Dunleavy 0-2, Granger 0-4). Fouled Out—None. Rebounds—Milwaukee 54 (Mbah a Moute 15), Indiana 55 (Hibbert 12). Assists—Milwaukee 16 (Salmons 5), Indiana 11 (Hibbert 4). Total Fouls—Milwaukee 24, Indiana 24. Technicals—Gooden, Indiana defensive three second. A—14,115 (18,165). Magic 105, Nets 90 NEW JERSEY (90) Outlaw 7-8 0-0 17, Murphy 2-9 0-0 5, Lopez 3-17 4-4 10, Harris 5-10 3-3 14, Morrow 2-6 0-0 5, T.Williams 6-14 0-0 15, Favors 2-3 0-0 4, Farmar 3-10 0-0 7, Humphries 6-7 1-2 13. Totals 36-84 8-9 90. ORLANDO (105) Lewis 5-15 0-0 12, Anderson 0-1 0-0 0, Howard 9-13 12-16 30, Nelson 7-12 4-6 20, Carter 6-11 4-4 19, Richardson 0-1 0-0 0, Bass 1-3 4-4 6, Duhon 0-3 0-0 0, Redick 2-5 2-2 7, Gortat 1-1 0-0 2, Pietrus 3-6 0-0 9. Totals 3471 26-32 105. New Jersey 18 33 16 23 — 90 Orlando 20 28 32 25 — 105 3-Point Goals—New Jersey 10-22 (Outlaw 3-4, T.Williams 3-4, Morrow 1-3, Harris 1-3, Farmar 1-4, Murphy 1-4), Orlando 11-28 (Pietrus 3-4, Carter 3-6, Nelson 2-4, Lewis 2-8, Redick 1-3, Anderson 0-1, Duhon 0-1, Richardson Zenyatta Continued from D1 0-1). Fouled Out—None. Rebounds—New Jersey 38 (Outlaw 6), Orlando 54 (Howard 16). Assists—New Jersey 20 (Farmar 7), Orlando 16 (Nelson 6). Total Fouls—New Jersey 27, Orlando 11. A—18,846 (18,500). Hornets 96, Heat 93 MIAMI (93) James 6-16 7-8 20, Bosh 7-13 0-0 15, Anthony 1-2 0-0 2, Arroyo 0-2 0-1 0, Wade 7-16 13-13 28, House 2-10 0-0 4, Ilgauskas 5-6 0-0 10, Haslem 3-7 2-2 8, Jones 2-6 0-0 6. Totals 33-78 22-24 93. NEW ORLEANS (96) Ariza 5-13 0-0 13, West 5-12 5-6 15, Okafor 12-13 2-3 26, Paul 5-13 3-3 13, Belinelli 3-7 2-2 8, Smith 5-10 2-3 12, Green 2-4 0-0 4, Bayless 0-2 0-0 0, Mbenga 0-2 0-0 0, Thornton 2-3 0-0 5. Totals 39-79 14-17 96. Miami 17 24 23 29 — 93 New Orleans 29 21 22 24 — 96 3-Point Goals—Miami 5-21 (Jones 2-6, Bosh 1-1, James 1-2, Wade 1-5, House 0-7), New Orleans 4-14 (Ariza 3-7, Thornton 1-1, Paul 0-2, Belinelli 0-2, Green 0-2). Fouled Out—None. Rebounds—Miami 45 (Wade 10), New Orleans 45 (Okafor 13). Assists—Miami 19 (James 10), New Orleans 26 (Paul 19). Total Fouls—Miami 17, New Orleans 22. Technicals—Paul, New Orleans defensive three second. A—17,988 (17,188). Celtics 110, Bulls 105 CHICAGO (105) Deng 8-19 2-2 20, Gibson 9-14 0-0 18, Noah 8-13 10-10 26, Rose 8-19 2-2 18, Bogans 1-3 2-2 4, Asik 1-2 0-0 2, Watson 2-2 0-0 5, Johnson 0-4 0-0 0, Scalabrine 0-0 0-0 0, Korver 2-5 0-0 5, Brewer 3-4 1-2 7, Thomas 0-0 0-0 0. Totals 42-85 17-18 105. BOSTON (110) Pierce 4-14 2-2 10, Garnett 7-17 2-2 16, J.O’Neal 5-6 2-3 12, Rondo 5-10 0-0 10, Allen 9-12 4-4 25, Davis 4-10 7-8 15, Robinson 3-7 0-0 7, Erden 0-0 2-2 2, Daniels 5-6 3-4 13, Wafer 0-0 0-0 0. Totals 42-82 22-25 110. Chicago 23 15 26 32 9 — 105 Boston 19 30 23 24 14 — 110 3-Point Goals—Chicago 4-10 (Deng 2-4, Watson 1-1, Korver 1-2, Bogans 0-1, Rose 0-2), Boston 4-11 (Allen 3-5, Robinson 1-3, Rondo 0-1, Pierce 0-2). Fouled Out—None. Rebounds—Chicago 50 (Noah 12), Boston 37 (Garnett 10). Assists—Chicago 25 (Rose 9), Boston 27 (Rondo 11). Total Fouls—Chicago 23, Boston 20. Technicals—Noah, Chicago defensive three second. A—18,624 (18,624). Lakers 108, Raptors 103 TORONTO (103) Kleiza 4-8 0-0 8, Evans 1-4 1-2 3, Bargnani 5-13 3-4 14, Jack 4-7 2-2 11, DeRozan 7-18 1-2 15, Weems 2-5 1-1 5, Johnson 4-8 4-4 12, Calderon 7-9 0-0 14, Barbosa 6-13 2-2 17, Andersen 1-2 2-2 4, Wright 0-0 0-0 0. Totals 41-87 16-19 103. L.A. LAKERS (108) Artest 3-6 0-0 7, Odom 2-10 3-7 7, Gasol 12-22 6-6 30, Fisher 4-7 2-2 11, Bryant 6-12 11-12 23, Blake 4-6 2-2 14, Barnes 1-4 0-0 2, Brown 4-7 3-3 12, Ratliff 1-1 0-0 2, Caracter 0-1 0-0 0, Walton 0-1 0-0 0. Totals 37-77 27-32 108. Toronto 20 38 20 25 — 103 L.A. Lakers 33 22 27 26 — 108 3-Point Goals—Toronto 5-13 (Barbosa 3-5, Jack 1-2, Bargnani 1-2, Calderon 0-1, Kleiza 0-1, DeRozan 0-2), L.A. Lakers 7-21 (Blake 4-6, Fisher 1-1, Artest 1-2, Brown 1-3, Walton 0-1, Odom 02, Bryant 0-3, Barnes 0-3). Fouled Out—None. Rebounds—Toronto 58 (Johnson 15), L.A. Lakers 36 (Odom 9). Assists—Toronto 22 (Calderon 8), L.A. Lakers 22 (Bryant 6). Total Fouls—Toronto 22, L.A. Lakers 20. Technicals—Johnson, Toronto defensive three second. A—18,997 (18,997). Suns 123, Grizzlies 118 MEMPHIS (118) Gay 11-25 1-2 26, Randolph 3-11 6-7 12, Gasol 12-13 2-3 26, Conley 7-15 2-6 16, Mayo 6-17 8-10 23, Arthur 4-7 2-4 10, Allen 2-6 1-2 5, Law 0-1 0-0 0, Thabeet 0-0 0-0 0, Young 0-1 0-0 0. Totals 45-96 22-34 118. PHOENIX (123) Hill 1-9 0-0 2, Turkoglu 6-11 1-1 18, Lopez 0-2 0-0 0, Nash 8-18 7-8 25, Richardson 1429 4-5 38, Frye 0-6 1-2 1, Warrick 6-9 3-4 15, Dudley 1-5 3-4 5, Dragic 4-6 4-8 13, Siler 0-1 0-0 0, Childress 3-5 0-0 6. Totals 43-101 2332 123. Memphis 35 20 21 23 10 9 — 118 Phoenix 20 25 25 29 10 14 — 123 3-Point Goals—Memphis 6-19 (Gay 3-8, Mayo 3-8, Randolph 0-1, Conley 0-2), Phoenix 14-35 (Richardson 6-8, Turkoglu 5-10, Nash 26, Dragic 1-3, Hill 0-1, Dudley 0-2, Frye 0-5). Fouled Out—Gasol, Gay. Rebounds—Memphis 60 (Randolph 14), Phoenix 70 (Frye 11). Assists—Memphis 21 (Conley 7), Phoenix 23 (Nash 9). Total Fouls—Memphis 30, Phoenix 29. Technicals—Phoenix defensive three second 4. A—16,470 (18,422). Nuggets 111, Clippers 104 L.A. CLIPPERS (104) Gomes 2-8 1-2 5, Griffin 11-18 4-4 26, Kaman 5-18 0-0 10, Bledsoe 6-9 0-1 12, Gordon 6-12 9-14 21, Butler 5-10 0-1 12, Jordan 0-1 0-0 0, C.Smith 8-9 2-3 18, Aminu 0-1 0-0 0. Totals 43-86 16-25 104. DENVER (111) Anthony 14-20 2-2 30, Ely 2-4 1-2 5, Williams 4-9 4-4 12, Billups 4-11 3-3 12, Afflalo 4-10 7-7 16, Harrington 7-12 2-2 18, J.Smith 4-9 1-1 10, Lawson 4-8 0-1 8. Totals 43-83 20-22 111. L.A. Clippers 28 26 17 33 — 104 Denver 24 29 29 29 — 111 3-Point Goals—L.A. Clippers 2-15 (Butler 2-6, Jordan 0-1, Gordon 0-4, Gomes 0-4), Denver 5-21 (Harrington 2-6, J.Smith 1-3, Billups 1-4, Afflalo 1-5, Anthony 0-1, Lawson 0-2). Fouled Out—None. Rebounds—L.A. Clippers 53 (Griffin 10), Denver 41 (Harrington, Ely 8). Assists—L.A. Clippers 28 (Bledsoe 13), Denver 26 (Billups 7). Total Fouls—L.A. Clippers 16, Denver 17. Technicals—Denver defensive three second. A—15,559 (19,155). Warriors 85, Jazz 78 UTAH (78) Kirilenko 0-3 4-4 4, Millsap 6-11 0-0 12, Jefferson 6-14 4-6 16, D.Williams 9-18 4-7 23, R.Bell 3-10 0-0 7, Elson 1-2 0-0 2, Miles 4-13 34 12, Watson 0-0 0-0 0, Price 1-5 0-0 2, Hayward 0-0 0-0 0. Totals 30-76 15-21 78. GOLDEN STATE (85) D.Wright 3-13 0-0 7, Lee 6-15 2-4 14, Biedrins 4-11 0-1 8, Curry 7-17 5-5 20, Ellis 9-22 5-9 23, Carney 1-5 0-1 2, Radmanovic 0-1 0-0 0, R.Williams 2-4 1-2 5, Gadzuric 3-4 0-0 6, C.Bell 0-1 0-0 0. Totals 35-93 13-22 85. Utah 16 23 17 22 — 78 Golden State 17 23 20 25 — 85 3-Point Goals—Utah 3-14 (R.Bell 1-4, Miles 1-4, D.Williams 1-4, Price 0-2), Golden State 2-14 (D.Wright 1-3, Curry 1-4, R.Williams 0-1, Carney 0-2, Ellis 0-4). Fouled Out—R.Bell. Rebounds—Utah 54 (Jefferson 15), Golden State 65 (Biedrins 20). Assists—Utah 18 (D.Williams 6), Golden State 16 (Curry 6). Total Fouls—Utah 23, Golden State 23. Technicals—Millsap. A—17,902 (19,596). “I think she’s brought the sport back and is carrying it on her back right now. She’s big enough to handle it.” — Zenyatta jockey Mike Smith¼.” Hornets upset Heat The Associated Press NEW ORLEANS — Emeka Okafor evoked memories of his dominant college days and helped Chris Paul get the best of his buddy, LeBron James. Okafor had a season-high 26 points and 13 rebounds, Paul had 13 points, 19 assists and five steals, and New Orleans remained unbeaten with a 9693 victory over the Miami Heat on Friday night that gave the Hornets (5-0) their best start in franchise history. “Mek was outstanding tonight,” Paul said. “Every time he stepped out on the court, he played with a lot of passion and I think when he gets going, we all feed off of him. He just played a great game.” David West added 15 points, including crucial free throws with 7.2 seconds to go after Chris Bosh’s three had pulled Miami within 94-93. Dwyane Wade gave up a potential tying three-point attempt and passed to Eddie House, whose shot rimmed out in the final seconds. Miami did not take its first lead until James’ free throws made it 90-89 with 59.8 seconds left, but the Hornets responded with Marco Belinelli’s free throws, and then Trevor Ariza’s three. to go with 10 rebounds. He scored 12 points in the fourth quarter, and went 13 of 13 from the foul line. In other games on Friday: Cavaliers. . . . . . . . . . . . . . . . . 123 76ers . . . . . . . . . . . . . . . . . . . . 116 PHILADELPHIA — Anderson Varejao had 23 points and 12 rebounds, Daniel Gibson scored 20 points and Cleveland recovered in the fourth quarter after blowing a 19-point lead. Mo Williams scored 22 points and J.J. Hickson had 16 for the Cavaliers, who won for the first time since beating Boston on opening night. Celtics. . . . . . . . . . . . . . . . . . . 110 Bulls . . . . . . . . . . . . . . . . . . . . 105 BOSTON — Kevin Garnett chased down Joakim Noah and tipped the ball away from behind with 14 seconds left. Gar-.” Bill Haber / The Associated Press New Orleans forward David West (30), right, and Miami shooting guard Dwyane Wade (3) scramble for a ball late in the second half of Friday’s game in New Orleans. The Hornets defeated the Heat 96-93 to remain undefeated. nett scored 16 points with 10 rebounds, and he also drew an offensive foul on Derrick Rose with Boston nursing a threepoint lead in overtime. Ray Allen, who scored 25 points, followed with a layup on an assist from Rajon Rondo to make it a five-point game. Hawks . . . . . . . . . . . . . . . . . . . 113 Timberwolves . . . . . . . . . . . . 103 MINNEAPOLIS — Jamal Crawford came back from a one-game absence due to a toe injury to score a season-high 22 points in his reserve role for undefeated Atlanta. Josh Smith had 20 points, eight rebounds, six assists and five blocked shots, and the Hawks improved to 6-0 despite a low-impact performance by star Joe Johnson for the second straight game. Mike Bibby had 15 points and Al Horford added 14 points and 12 rebounds. Knicks. . . . . . . . . . . . . . . . . . . 112 Wizards. . . . . . . . . . . . . . . . . . . 91 NEW YORK — Toney Douglas had 19 points and 10 rebounds, Raymond Felton added 13 points and 10 assists, and New York spoiled Gilbert Arenas’ return to NBA action. The Knicks’ guards had help up front, with Amare Stoudemire scoring 18 points and Danilo Gallinari chipping in 16. Bucks . . . . . . . . . . . . . . . . . . . . 94 Pacers. . . . . . . . . . . . . . . . . . . . 90 INDIANAPOLIS — John Salmons scored 22 points and Brandon Jennings scored 18 points and Luc Mbah a Moute added 10 points and 15 rebounds for the Bucks (2-4). Danny Granger and Darren Collison both scored 19 points for the Pacers (2-3), who have lost two straight. Pistons . . . . . . . . . . . . . . . . . . . 97 Bobcats . . . . . . . . . . . . . . . . . . 90 AUBURN HILLS, Mich. — Ben Gordon scored 20 points and Tayshaun Prince had 14 to lead Detroit to its first win of the season. Detroit (1-5) was off to its worst start since going 0-7 in 1980, but never trailed against the Bobcats. Charlotte fell to 1-4. Magic. . . . . . . . . . . . . . . . . . . . . 105 Nets . . . . . . . . . . . . . . . . . . . . . . . 90 ORLANDO, Fla. — Dwight Howard had 30 points and 16 rebounds, and Orlando beat New Jersey for the fourth straight time. Howard finished nine for 13 shooting to power the Magic. Suns . . . . . . . . . . . . . . . . . . . . . 123 Grizzlies . . . . . . . . . . . . . . . . . . .118 PHOENIX — Jason Richardson scored five of his 38 points in an amazing final 1.1 seconds of regulation and, thanks to a made free throw that Rudy Gay intended to miss, Phoenix went on to a head-shaking double-overtime victory over Memphis. Lakers . . . . . . . . . . . . . . . . . . . . 108 Raptors. . . . . . . . . . . . . . . . . . . 103 LOS ANGELES — Pau Gasol scored 30 points, Kobe Bryant added 23 points and six assists, and the Los Angeles Lakers remained unbeaten. Steve Blake scored 14 points for the Lakers. Warriors . . . . . . . . . . . . . . . . . . . 85 Jazz . . . . . . . . . . . . . . . . . . . . . . . 78 OAKLAND, Calif. — Stephen Curry returned from an ankle injury to score nine points over the final 2:35, helping Golden State stay unbeaten at home. Nuggets . . . . . . . . . . . . . . . . . . .111 Clippers . . . . . . . . . . . . . . . . . . 104 DENVER — Carmelo Anthony scored a season-high 30 points and reserve Al Harrington added 18. 541-388-4418 D6 Saturday, November 6, 2010 • THE BULLETIN REGISTER TO BID NOW! INTRODUCING THE BULLETIN’S HOLIDAY BID-N-BUY ONLINE AUCTION EVENT Beg BRINGING QUALITY PRODUCTS AT LOW-AUCTION inni ng 9 e! n PRICES TO CENTRAL OREGON i l n a.m sO . on N ovembe r 7, Browse, Bid And Buy These And Other G re Ite n o i t c at Au m YOU CAN BID ON: YOU CAN BID ON: YOU CAN BID ON: YOU CAN BID ON: YOU CAN BID ON: YOU CAN BID ON: Oreck Halo UV-C Vacuum Cleaner Two Night Stay in Junior Suite “Mourning Doves” Encaustic Painting Wedding Accessory Package Cooking Class for Two One-Year Family Tennis Membership RETAIL VALUE: $599 FROM: Oreck RETAIL VALUE: $390 FROM: Pronghorn RETAIL VALUE: $400 FROM: Tumalo Art Co. RETAIL VALUE: $130 FROM: Bend Wedding & Formal RETAIL VALUE: $150 FROM: Allyson’s Kitchen RETAIL VALUE: $2388 FROM: Athletic Club of Bend YOU CAN BID ON: YOU CAN BID ON: YOU CAN BID ON: YOU CAN BID ON: YOU CAN BID ON: YOU CAN BID ON: Magic Motion Clock $100 Bead Certificate $200 Framing Certificate 30-Min. Erchonia Ionic Detoxifying Foot Bath Adaire Iron Bed $100 Toward PANDORA Purchase RETAIL VALUE: $665 FROM: Ice Fine Jewelry RETAIL VALUE: $100 FROM: Azillion Beads RETAIL VALUE: $200 FROM: Sage Custom Framing RETAIL VALUE: $25 FROM: The Center for Integrated Medicine RETAIL VALUE: $900 FROM: Edman Fine Furniture RETAIL VALUE: $100 FROM: Saxon’s Fine Jewelry YOU CAN BID ON: YOU CAN BID ON: YOU CAN BID ON: YOU CAN BID ON: YOU CAN BID ON: YOU CAN BID ON: General Implement New Harrows Four Goodyear Wrangler Radial Tires 1 Week Rental: 331 Mini Excavator 7-Foot Landscape Rake RV Service Certificate $250 Gift Certificate RETAIL VALUE: $300 FROM: Superior Tractor RETAIL VALUE: $459 FROM: Wright Ford RETAIL VALUE: $1110 FROM: Bobcat of Central Oregon RETAIL VALUE: $575 FROM: Deschutes Valley Equipment RETAIL VALUE: $200 FROM: Courtesy RV RETAIL VALUE: $250 FROM: Desperado YOU CAN BID ON: YOU CAN BID ON: YOU CAN BID ON: YOU CAN BID ON: YOU CAN BID ON: YOU CAN BID ON: Ping G10 Stainless Steel Irons 3-Night Stay in Waterfront Suite Maytag Front Load Washer & Dryer Set Mountain Hardware Light Wedge 3 Tent $500 Electrical Service Certificate Remote Car Starter with 3-Channel Alarm RETAIL VALUE: $900 FROM: Pro Golf RETAIL VALUE: $800 FROM: The Lodge at Suttle Lake RETAIL VALUE: $2098 FROM: Lance and Sandy’s Maytag RETAIL VALUE: $250 FROM: Mountain Supply RETAIL VALUE: $500 FROM: Quality Builders Electric RETAIL VALUE: $374 FROM: InTune Audio Central Oregon’s BIGGEST Online Auction Event Is Coming November 7th FOR MORE INFORMATION CALL 541-382-1811 THE BULLETIN • Saturday, November 6, 2010 : General Merchandise 200 202 Want to Buy or Rent Shop space wanted 200 sq.ft., power, secure, central location in Bend. 541-350-8917. 1 7 7 7 208 210 212 246 248 260 266 Pets and Supplies Pets and Supplies Furniture & Appliances Health and Beauty Items Heating and Stoves Maltese AKC, 1 female, 1 male; Malti-poos 2 females. Vet checked, 1st shots & dewormed. No AM calls or shipping; cash only. 541-350-5106 Guns & Hunting and Fishing Misc. Items Cockatiel, young male (we think) seeks new home. Good whistler. Experienced bird owners to reply. $30. 541-317-8987 Antiques & Collectibles TRUCKLOAD SALE! Out of state dealer quits! All antiques priced below cost. Oak and mahogany furniture, stained glass, etc. Dealers happy hour 4-5 daily. Sat. & Sun. 9-5. 1428 SW Simpson 357 Stainless Steel Revolver, $300; 38 S&W police revolver, $200, 541-480-1337. 25¢ candy vending machines, not placed, exc cond, extra parts, $150 ea 541-536-4359 Certified Woodstove, used, but in good shape, $250. Phone 541-389-9138 3 Plots at Redmond Memorial Cemetery, $600 each or best offer. Call 360-254-3186 Fuel and Wood Dachshunds puppies, 2 males, $200. Call 541-788-1289 olesonmd@hotmail English Bulldog AKC male, “Cooper” is 7 mo. old, all shots, $1500. 541-325-3376. Bid Now! Buy New...Buy Local Maltese female puppy AKC, shots, dewclaws, 3 mos old, a little powder puff! $400. 541-536-2181; 541-728-8067 Miniature Schnauzer, purebred Male, 8 weeks, first shots, $250. 541-536-6262 Browning, made in Belgium, Grade II Auto.5, 12 ga, 3” Mag., 90-95% cond. $1,000 OBO. 541-447-7272 Bid Now! Buy New...Buy Local 215 You Can Bid On: Maytag Front Load Washer and Dryer Set, $2,098 Value at Lance and Sandy's Maytag Carry concealed in 33 states. Sat. Nov. 20th 8 a.m, Redmond Comfort Suites. Qualify For Your Concealed HandWANTED TO BUY gun Permit. Oregon & Utah US & Foreign Coin, Stamp & permit classes, $50 for OrCurrency collect, accum. Pre egon or Utah, $90 for both. 1964 silver coins, bars,. Call rounds, sterling fltwr. Gold Lanny at 541-281-GUNS coins, bars, jewelry, scrap & (4867) to Pre-Register. dental gold. Diamonds, Rolex & vintage watches. No colCASH!! lection too large or small. BedFor Guns, Ammo & Reloading rock Rare Coins 541-549-1658 Supplies. 541-408-6900. Coins & Stamps English Bulldog Male, Intact, AKC Great with kids and aniMini Australian Shepherds, mals. $500 541-588-6490. WANTED: Cars, Trucks, MoBlue Merle Males, superior torcycles, Boats, Jet Skis, English Bulldog puppies, AKC, looks/disposition,from NSDR (Bidding exp. Nov. 14, at 8pm) ATVs - RUNNING or NOT! Grand sire by Champion reg. parents, avail. 11/6, 541-280-7959. Cherokee Legend Rock, #1 541-504-4624,541-548-0852 Bulldog in USA ‘06, ‘07 and Wanted: $$$Cash$$$ paid for Bid Now! ‘08, ready to go! $1300/ea. Mini-Schnauzer, male, “Merlin”, old vintage costume, scrap, young, very cute, $175 re 541-306-0372 silver & gold Jewelry. Top homeing fee, 541-389-2412. Buy New...Buy Local dollar paid, Estate incl. HonPapillons (3), 6 mo. female, English Setter Purebred est Artist. Elizabeth 633-7006 241 black/white, $300, 4.5 yr. fepups ready for homes. $500 Wanted washers and dryers, male, red/white, $250, 5 yr. female (5), $400/ male (1), Bicycles and working or not, cash paid, old male, can be papered,$350, dam & sire on site. Great Accessories 541- 280-7959. alvinoshields@yahoo.com bird hunting/family dogs. 541-280-2597 Pit Bull puppies, very cute, 1st 203 Girls bike, Schwinn, 24” 7 shots, ready for good homes, You Can Bid On: speed, good condition, $60. Holiday Bazaar 3 @ $75 ea. 541-280-3992 Adaire Iron Bed, 541-383-4231 English Springer Spaniels, AKC & Craft Shows $900 Value at Reg., black/white ready to Pitbull Puppy, chocolate Male, Edman Fine Furniture 242 go! $750. 541-408-6322 family raised, guaranteed, (Bidding exp. Nov. 14, at 8pm) $150 OBO. 541-325-1391 Exercise Equipment BeeCrafty Holiday Show German Shepherd Puppies, 7 POODLES AKC Toy, tiny Chairs (2), beautiful, Queen Anne November 12: Noon - 7 PM Style, wing back, burgundy weeks, black, parents on site, toy. Also Pom-a-Poos. Home Bid Now! November 13: 10 AM - 5 PM plaid, $200 ea., 541-330-4323. $350. 541-536-5538 raised! 541-475-3889 Middle Sister Buy New...Buy Local Child’s solid wood headboard German Wirehaired Pointer Conference Hall, Purebred, very small, rare, and twin bed frame, $75 Pups, champ bloodlines, Deschutes County chocolate brown female OBO. 541-388-8198. great colors, $400. Fairgrounds, Redmond. Pomeranian puppies ready 541-548-3408 80+ local artisans & craftFrench Provincial Dresser, $65. Dec. 1. Great for Christmas ers will be selling their Nice Rocker, $45. Please call gift. AKC registered. handcrafted items. 541-420-2220. (mother weighs pound and Admission: $1.00 donation a half) Call to reserve your You Can Bid On: Fridge: Whirlpool, beige to be given to The Kid's little angel. 541-728-8323 12 Month Membership to 18 cu.ft., only $125 Center & CASA of Central or 541-382-7786 Shawna. Anytime Fitness, Call 541-388-2159 Oregon $468 Value at Information: 541-536-5655 GENERATE SOME excitement in Golden Doodles pups ready for Anytime Fitness Queensland Heelers your neigborhood. Plan a ga(Bidding exp. Nov. 14, at 8pm) their new home! $500. BeauStandards & mini,$150 & up. rage sale and don't forget to 208 tiful! 541-279-9593. 541-280-1537 advertise in classified! Pets and Supplies TURN THE PAGE 385-5809. Golden Retriever AKC English Siberian Husky, AKC 13 weeks, Cream puppies, beautiful. For More Ads Recliners (2), good condition, both parents on site. $450 Ready now. Females $850, The Bulletin recommends $60 ea., & Brown Swivel OBO. Josh, 541-633-9160 males $800. 541-852-2991. The Bulletin extra caution when rocker, $60, 541-330-8349. purchasing products or Working cats for barn/shop, ROLLTOP DESK: Old but not Treadmill/Ski Machine, good services from out of the companion.Free, fixed/shots. antique, very good shape. cond., $35, please call area. Sending cash, checks, Will deliver! 541-389-8420 I paid $500, will sell $300. 541-317-2890. or credit information may 541-420-3344, 541-508-8522 be subjected to fraud. For more information about an 243 Second Hand advertiser, you may call the Ski Equipment Jack is a family friendly, 5 Yorkie Mix pups, very tiny & Mattresses, sets & Oregon State Attorney year old Am/Staff who is cute, 8 weeks old, $240 General’s Office Consumer singles, call looking for a place where cash. 541-678-7599 Protection hotline at Bid Now! 541-598-4643. he can lounge inside and be 1-877-877-9392. Yorkie Pups, ready for good spoiled. He is very gentle Buy New...Buy Local homes, parents on-site, 1st and friendly. Neutered. Sofa w/recliners on ends; shots, $550, 541-536-3108 FREE!! Please call John at great for room w/limited 541-390-9004 space. Dark Blue; in great 210 cond. $225, 541-322-6261 2 Baby Bearded Dragons, $50 each. 2 Baby Chameleons, Japanese Chin / Westie-Cairn Furniture & Appliances $50 each. 541-350-8949 mix, 8 wks, 5 Fem., $150 ea. #1 Appliances • Dryers The Bulletin Shots/wormed. 541-848-3525 • Washers Australian Shepherd male, red recommends extra caution You Can Bid On: merle, 12 weeks old, perfect King Shepherd Pups, when purchasing products K2 LOTTA LUV SKIS w/ markings, has had two sets or services from out of the ready now, male & female, Marker ERS 11.0 TC of vaccines and dewormings. area. Sending cash, checks, black & tan or all blacks, exc. Bindings, 774-487-7933 Bend or credit information may temperament, both parents $1,185 Value at be subjected to F R A U D . on site+grandma, sire ChaPowder House Beagle Mix, 8 weeks old, resStart at $99 (Bidding exp. Nov. 14, at 8pm) For more information about teau De Chiefs, AKSC cued, male, $75, FREE DELIVERY! an advertiser, you may call #02BGG872-IM, Dam Sonja 541-576-3701, 541-536-4440 Lifetime Warranty the Oregon State Attorney Vom Holtzberg, AKC 244 Also, Wanted Washers, General’s Office Consumer Beautiful Purebred Yellow Lab. #DN17285408, $800, Dryers, Working or Not Protection hotline at Call for info. $400 OBO. Snowboards 541-815-2888. Call 541-280-7959 1-877-877-9392. 541-508-6387 KITTENS & cats avail. thru resBernese/Newfoundland pups, 3 Bid Now! cue group. Altered, shots, ID AirPedic airbed mattress, CalKing, adjustable firmness wks old, 5 females, 2 males, chip, more. Visit at sanctu each side. $50. 541-389-1913 $600-$675, $250 deposit. Buy New...Buy Local ary Sat/Sun 1-5 PM, other Wormed, dewclaws. Ready days by appt, 65480 78th, Appliances! A-1 Quality & Honesty! Wanted washers and dryers, mid-Dec. 541-279-7914 Bend. Map/photos/more at A-1 Washers & Dryers working or not, cash paid,. 541 389 $125 each. Full Warranty. 541-280-7959. 8420 or 598 5488 for info. Free Del. Also wanted W/D’s We still have many to place, 212 dead or alive. 541-280-7355. so adoption fees are tempoAntiques & rarily reduced this weekend. Appliances, new & recondiYou Can Bid On: Collectibles tioned, guaranteed. OverKITTENS in Foster Home, $40 8 Weeks Snowboard, stock sale. Lance & Sandy’s CAVALIER KING CHARLES ea. incl. spay, neuter, shots 1 Hour Class, 1 Day Per Antique German Heco beautiMaytag, 541-385-5418 PUREBRED pups, 3 boys @ and wormed. 541-548-5516. Week, $110 Value at ful floral Anniversary Clock, $800 each; 1 girl, $900. RefAcrovision Sports $110. 541-390-6016 erences avail. 541-664-6050 KITTENS, social, playful, handCenter Find It in (Bidding exp. Nov. 14, at 8pm) raised in rescue group foster shellyball1@mac.com Furniture homes, ready to adopt! Al- The Bulletin Classifieds! 541-385-5809 tered, ID chip, vaccinated. 245 Small adoption fee/donation to offset some vet costs. Bed Frames,2 Antique, twin, ca. Golf Equipment Avail. only Sat/Sun 11-5, 1900,carved headboard/footTom Tom Motel, see mgr, board, $200, 541-815-5000 Visit our HUGE home decor Bid Now! 3600 N 3rd, Bend, near Sonic consignment store. New Chihuahua- absolutely adorable drive-in. Info: 541-815-7278 items arrive daily! 930 SE Bid Now! teacups, wormed, 1st shots, Buy New...Buy Local Textron & 1060 SE 3rd St., Lab/German Short-Hair pups. 2 $250, 541-977-4686. Bend • 541-318-1501 Buy New...Buy Local Black, 2 yellow. $50. 8 Chihuahuas, Applehead, 2 weeks. Shots, wormed, and males, 5 weeks old, $250 ready. Call 541-281-8297 each. 541-593-0223. Sat. 8 a.m. - 4 p.m. 21950 LAB PUPS, AKC yellows & Butler Market Rd. 100’s of blacks, champion filled lines, Antiques & Collectibles. OFA hips, dew claws, 1st You Can Bid On: The Bulletin reserves the right shots, wormed, parents on Ping G10 Irons set with You Can Bid On: to publish all ads from The site, $500/ea. 541-771-2330. Graphite Shafts, $500 Home Furnishings Bulletin newspaper onto The 3-PW, Reg. Flex, Gift Certificate at Bulletin Internet website. La Z Boy Furniture $900 Value at Cockapoo pups AKC parents. Labrador pups AKC, chocoPro Golf Gallerie late, yellow, hips guaranteed, Low shed, great family dogs. (Bidding exp. Nov. 14, at 8pm) (Bidding exp. Nov. 14, at 8pm) $250 to $450. 541-954-1727 $300. 541-504-9958 COLT 1911A1 Series 80 45 ACP 2 8-round mags, orig. finish w/wear, exc. mech. cond., $450. 541-447-6061 lve msg. FEG M1937M 380 ACP, exc. finish cond., w/orig. holster. $375. 541-447-6061 lve msg. You Can Bid On: Smile Makeover: Seen on Extreme Makeover, $7,600 Value at Steve Schwam, DDS Bedrock Gold & Silver BUYING DIAMONDS & R O L E X ’ S For Cash 541-549-1592 All Year Dependable Firewood: SPLIT Lodgepole cord, $150 for 1 or $290 for 2, Bend delivery. Cash, Check. Visa/MC. 541-420-3484 Bid Now! Best Dry Seasoned Firewood $110/cord rounds, delivered in Bend, Sunriver & LaPine, 1½ cord min., fast service 541-410-6792 or 382-6099. CRUISE THROUGH classified when you're in the market for a new or used car. Buy New...Buy Local (Bidding exp. Nov. 14, at 8pm) 249 Art, Jewelry and Furs Bid Now! Buy New...Buy Local You Can Bid On: Mountain Hardwear Sub Zero SL Hooded Jacket, $275 Value at Mountain Supply SAXON'S FINE JEWELERS 541-389-6655 You Can Bid On: Snowmobile Pre-Season Tune-Up, $100 Value at JD Powersports (Bidding exp. Nov. 14, at 8pm) Bid Now! Buy New...Buy Local BUYING Lionel/American Flyer trains, accessories. 541-408-2191. Chainsaws, like new! Run excellent! Stihl MS-460, $795! MS-390, $395! 026 20” $279! Husqavarna 395XP, $795! 281XP, $695! 372XP, $695! 55XP, 20”, $295! 445XP, 20”, $295! 541-280-5006 GENERATE SOME excitement in your neigborhood. Plan a garage sale and don't forget to advertise in classified! 385-5809. GUN SHOW Nov. 13th & 14th Deschutes Co. Fairgrounds Buy! Sell! Trade! SAT. 9-5 & SUN. 10-3 Wall to Wall Tables $8 Admission OREGON TRAIL GUN SHOWS 541-347-2120 You Can Bid On: $100 Gift Certificate toward purchase of Original Painting by Marty Stewart at Tumalo Art Company HANDGUN SAFETY CLASS for concealed license. NRA, Police Firearms Instructor, Lt. Gary DeKorte Tue. Nov. 9th, 6:30-10:30 pm. Call Kevin, Centwise, for reservations $40. 541-548-4422 Thomas Kinkade litho-canvas, 1998 “Stairway to Paradise,” 24.5x34”, framed, VOP I, #101 of 3950, smokeless home. $500. 541-598-7219 HUNTER RETIRING! Rifles & shotguns for sale. Call 541-382-7995, evenings. TV, Stereo and Video (Bidding exp. Nov. 14, at 8pm) 253 42" Hitachi HD/TV works great, Oak entertainment center Inland M1 US Carbine, Springwith lighted bridge and shelf. field 1903 & US M1 Grand, Cabinets have speaker doors WIN 1885 45-70, REM Rolland glass doors on top for ing block 7/57, Savage 264 collectibles. Excellent shape. Win mag left hand, REM 742 $400 takes both, call 243, Marlin 308 MX lever 541-318-1907. gun, Browning Safari 30-6 Belguin, FAKO L61R 300 Win 52” Samsung 2006 big screen, mag, Ruger M77 300 Win left works great, exc cond. Must hand. sell, $500. 541-480-2652. H & H Firearms 541-382-9352 Kenwood amplifier 4 channel with Punch sub, $195. Juniper Rim Game 541-388-4302. Preserve - Brothers, OR Our Chukars are ready to fly! 255 Bring a shotgun, give ‘em a try! They’re on special this fall Computers so just give us a call! 541-419-3923;541-419-8963 THE BULLETIN requires computer advertisers with mulRuger .22 Single 6, 3 Screw retiple ad schedules or those volver, as new with box, selling multiple systems/ $400 Cash, 541-504-9210. software, to disclose the Wanted: Collector seeks high name of the business or the quality fishing items. Call term "dealer" in their ads. 541-678-5753, 503-351-2746 Private party advertisers are defined as those who sell one computer. Look at: Bendhomes.com for Complete Listings of Area Real Estate for Sale 247 Sporting Goods - Misc. ATLAS 833 Snowshoes, used twice, like new. Paid $139; sell for $65. 541-549-6036 Bid Now! Buy New...Buy Local 257 Musical Instruments Dry Seasoned Firewood Rounds, $140/cord. Free delivery. 541-480-0436 (Bidding exp. Nov. 14, at 8pm) Buying Diamonds /Gold for Cash Glock 22, 40 S&W with holster & mags; Ruger SR9, w/same, $525 ea. 541-279-3504 267 Hearthstone propane heater, like new, $1200 OBO. Sears Craftsman lawn mower, $40. Magic Chef kitchen stove $300 OBO. 541-330-2297. Moving Boxes, large, $4 each, 30 available, please call 541-923-8868. NEED TO CANCEL OR PLACE YOUR AD? The Bulletin Classifieds has an "After Hours" Line Call 383-2371 24 hrs. to cancel or place your ad! Pandora’s Box Consignment Boutique An eclectic mix of current and vintage jewelry, clothing and accessories. Tues.-Fri. 11-5; Sat. 12-5. 735 NW Columbia on Bend’s westside. 541-383-3377 Shower Enclosure 2 doors, 5’wx6’h, includes all hardware. $25. 541-923-0041. TEXAS T1-83+ in unopened package. cost new $90, sell for $70. 541-549-8421 eves. Wanted - paying cash for Hi-fi audio & studio equip. McIntosh, JBL, Marantz, Dynaco, Heathkit, Sansui, Carver, NAD, etc. Call 541-261-1808 263 Tools Find exactly what you are looking for in the CLASSIFIEDS SPLIT, DRY LODGEPOLE DELIVERY INCLUDED! $175/CORD. Leave message, 541-923-6987 269 Gardening Supplies & Equipment BarkTurfSoil.com Instant Landscaping Co. PROMPT DELIVERY 541-389-9663 Bid Now! Buy New...Buy Local You Can Bid On: 1 Week Rental S150 Loader with Bucket, $810 Value at Bobcat of Central Oregon (Bidding exp. Nov. 14, at 8pm) SUPER TOP SOIL Screened, soil & compost mixed, no rocks/clods. High humus level, exc. for flower beds, lawns, gardens, straight screened top soil. Bark. Clean fill. Deliver/you haul. 541-548-3949. 270 Lost and Found BICYCLE found on Green Ridge Road nears Sisters, Call to identify, 541-312-6059. Found 16” Kid Bicycle, in Shevlin Park, 10/29, call to identify, 541-388-4164. Found jacket/coat, 11/2, name brand, NE 3rd/Franklin area. email: hikealot@q.com Found Water Pump, 11/1, on Drill Press, Delta 12”; CraftsAmerican Ln, call to identify, man 10” Table Saw, Ryobi 9” ask for Craig, 541-948-3588. band Saw; Ryobi 16” Jig Found Young Blue Heeler near Saw; 541-388-6729. Costco. Email info to: mocachocolate68@yahoo.com 264 Snow Removal Equipment HELP YOUR AD TO stand out Ariens 2006 . Big job capable 11.5 hp 28". Electric start. $800. 541-330-8285 from the rest! Have the top line in bold print for only $2.00 extra. Drums, Beginner’s 5-piece set, exc. cond., $350, call Frank, 541-390-8821. 258 Travel/Tickets Bid Now! Buy New...Buy Local SNOW PLOW, Boss 8 ft. with power turn , excellent condition $3,000. 541-385-4790. Snow Plow, Meyers 6 ft. blade, angles both right, left & straight, all hydraulic controls $1450. 503-551-7406 or 541-367-0800, leave msg. 265 You Can Bid On: Hoodoo Ski Area 2010-2011 Season Pass, $585 Value at Hoodoo Ski Area You Can Bid On: Two Nights Lodging in Inglenook Room, $390 Value at Overleaf Lodge (Bidding exp. Nov. 14, at 8pm) (Bidding exp. Nov. 14, at 8pm) Building Materials Bend Habitat RESTORE Building Supply Resale Quality at LOW PRICES 740 NE 1st 312-6709 Open to the public . IF FOUND, please call (541) 419-6575. It very important to my family. A reward will be given if found & returned. LOST 3 month old orange & white striped tabby cat, SE Tempest area. 541-382-9768 Precious stone found around SE duplex near Ponderosa Park. Identify 541-382-8893. REMEMBER: If you have lost an animal don't forget to check The Humane Society in Bend, 382-3537 or Redmond, 923-0882 or Prineville, 447-7178 E2 Saturday, November 6, 2010. Farm Market 300 308 Farm Equipment and Machinery 2006 Challenger 16x18 inline Baler, low bale count, excellent cond, $13,500 OBO. 541-419-2713. Bid Now! Buy New...Buy Local 325 358 476 476 476 476 Hay, Grain and Feed Farmers Column 1st Quality Grass Hay Barn stored, 2 string, no weeds 65 lb. bales, $160/ton; 5+ tons, $150/ton. Patterson Ranch in Sisters, 541-549-3831 12x24 STORAGE BUILDINGS for protecting hay, firewood, livestock etc. $1743 Installed. 541-617-1133. CCB #173684. kfjbuilders@ykwc.net Employment Opportunities Employment Opportunities Employment Opportunities Employment Opportunities Human Resources Director Advertise your car! Add A Picture! A farmer that does it right & is on time. Power no till seeding, disc, till, plow & plant new/older fields, haying services, cut, rake, bale, Gopher control. 541-419-4516 Advertise in 30 Daily newspapers! $525/25-words, 3-days. Reach 3 million classified readers in Alaska, Idaho, Oregon, Montana, Washington & Utah. (916) 288-6019 email: elizabeth@cnpa.com for the Pacific Northwest Daily Connection. (PNDC) Reach thousands of readers! Call 541-385-5809 The Bulletin Classifieds Bluegrass Straw mid-size 3x3, Caregiver $25/bale; Orchard grass hay 375 mid-size 3x3 $45/bale. Small Prineville senior care home bale orchard/alfalfa mix, Meat & Animal Processing looking for Care Manager for $160/ton. Volume discounts, two 24-hour shifts per week. delivery avail. 541-480-8648. Meat Goats, (3), $100 each, Must be mature and compassionate, and pass criminal please call 541-923-8370 for CLEAN GRASS HAY, small background check. Ref. remore info. bales, $4/bale, $100/ton & quired. 541-447-5773. up, other quality hay avail, Madras area, 541-490-5440 Caregivers or 651-475-3697. Visiting Angels seeks compassionate, reliable caregivWheat Straw: Certified & Beders for all shifts incl. weekding Straw & Garden Straw; ends. Experience req’d. Must Kentucky Bluegrass; Compass background check & post; 541-546-6171. drug test. Apply at our office located within Whispering 341 Winds, 2920 NW Conners, Horses and Equipment Bend. No phone calls, please. $42,418 - $59,801 Full Benefits Professional Management, Regular, Full-Time This position is located in Chiloquin. For more information contact: The Klamath Tribes PO Box 436 Chiloquin, OR 97624 jobs@klamathtribes.com 541-783-2219 x 113 Human Resources Manager Employment You Can Bid On: General Implement New 72" Landscape Rake, $700 Value at S u p e ri o r T r a c t o r (Bidding exp. Nov. 14, at 8pm) 400 200 ACRES BOARDING Indoor/outdoor arenas, stalls, & pastures, lessons & kid’s programs. 541-923-6372 Powder Creek Manger Horse Feeders (2), w/hooks to hang in barn, stall or pen, ea. $40, 541-923-0442 Kioti CK-20 2005, 4x4, hyrdostatic trans, only 85 hours, full service at 50 hrs., $8000 or make offer, 541-788-7140. Tractor, Case 22 hp., fewer than 50 hrs. 48 in. mower deck, bucket, auger, blade, move forces sale $11,800. 541-325-1508. READY FOR A CHANGE? Don't just sit there, let the Classified Help Wanted column find a new challenging job for you. Shetland Pony weanling colt, Black, $200. 541-383-4552 PLEASE leave message 421 Schools and Training Advertise and Reach over 3 million readers in the Pacific Northwest! 30 daily newspapers, six states. 25-word classified $525 for a 3-day ad. Call (916) 288-6010; (916) 288-6019 or visit pndc.cfm for the Pacific Northwest Daily Connection. (PNDC) The Bulletin To Subscribe call 541-385-5800 or go to ATTEND COLLEGE ONLINE from Home. *Medical, *Business, *Paralegal, *Accounting, *Criminal Justice. Job placement assistance. Computer available. Financial Aid if qualified. Call 866-688-7078 (PNDC) Oregon Medical Training PCS Phlebotomy classes begin in Jan. Registration now open, 541-343-3100 282 286 Sales Northwest Bend Sales Northeast Bend Huge Estate Sale: Sat. 8-3, 263 NW Outlook Vista Dr. , Furniture, antiques, dishes, tools, W/D, freezer. Huge Moving to Hawaii Sale, Sat.-Sun. 8-5, 63723 Scenic Dr.,everything must go, great deals, kid/baby items, skis. NOTICE Remember to remove your Garage Sale signs (nails, staples, etc.) after your Sale event is over! THANKS! From The Bulletin and your local Utility Companies Winter sports gear, boys clothes & shoes, furniture, more! Sat. 8-noon 1015 NW Stannium Rd 382-1710 286 Sales Northeast Bend HH FREE HH Garage Sale Kit Indoor Swap Meet Every Sat., 9-4, 401 NE 2nd St., Bend (old St. Vincent DePaul bldg, next to Bi-Mart) 10x10 spaces, $25, 541-317-4847 Sat. Nov 6th 8-4, 21950 Butler Market Rd., Large inside heated farm/garage sale. 100’s antiques & collectibles, glassware, vintage jewelry, Roseville Pottery, antique furniture, dressers, wood cook stove, trunks, chairs, school desks, wood washing machine, quilts, Singer Featherweight, butter churn, bamboo fishing poles & plugs, lamps & lanterns, clocks, telephone, toys, milk shake maker, 1905 & 1910 Barber chairs, 5 cent slot machine, cash registers, candy scale, 1917 saddle, Zither, iron bed, Tokheim gas pump, railroad items, several advert signs, Coco Cola cooler & signs, goat & milk carts, weather vane & lightning rod, pedal grinder, coal sleigh, railroad baggage cart, cider press, corn cutter & drill, 1877 Cutter & silage cutter. Like new solid oak dressers, 5’ display cabinets, armoire, dining tables, w/chairs, desks, pickup canopy w/boat rack, 2x6 lumber, concrete blocks, animal bedding, lots smalls, misc, Much, Much, More!!! Cash only, NO Early Sales!!! 290 Sales Redmond Area Garage Sale: Hardly used dining table, chairs, hutch, Harley Davidson leather coats & boots, leather bomber jacket, lots more, Sat. 8-4, 1675 NW Odem Ave, 541-420-5690. 292 Sales Other Areas DON'T FORGET to take your signs down after your garage sale and be careful not to place signs on utility poles! SECURITY DPSST UNARMED SECURITY CERTIFICATION CLASS TO BE HELD ON 11-13-2010 IN BEND. AFTER COMPLETING CLASS YOU WILL BE READY TO GO TO WORK IN THE SECURITY FIELD. 541-550-9260 CRUISE THROUGH Classified when you're in the market for a new or used car. Database SpecialistJELD-WEN, inc has two openings for Database Specialists. Ideal candidates will be detail orientated with strong organizational and follow through skills; the ability to handle multiple tasks; the willingness to learn and the ability to work individually or within a group. Must be comfortable performing data entry, programming and problem solving. Associates degree or equivalent along with programming experience is required. Positions are located in either Klamath Falls or Bend, Oregon. View the full job description at. Send resume to jobs@jeld-wen.com. EOE. DELIVERY/ SPA TECHNICIAN immediate opening for hard worker with CLEAN driving record and valid license. Must be able to do heavy lifting. Spa experience a plus. Fax resume to 541-388-4055. NO PHONE CALLS. Dental Receptionist/Office Manager, Attractive benefit package. Must be detailed in computer work & have exc. people skills, Refs. required. Fax resume to 541-475-6159. Framer (Experienced) Needed. Must have commercial & residential exp. Valid ODL req’d; drug testing. Fax or email resume to: 541-617-4545 or brodyb@baxterbuilders.net General DO YOU NEED A GREAT EMPLOYEE RIGHT NOW? Call The Bulletin before noon and get an ad in to publish the next day! 385-5809. This position is responsible for the development and implementation of Ranch-wide HR strategies, plans and programs, which facilitate growth and maximize customer service levels. Serves as a resource for the senior management team in the areas of, hiring, training, succession planning, performance evaluation, compensation, benefits, productivity analysis, employee morale, employment litigation, legal/regulatory compliance, and safety/risk management. Benefits include med/dent/life, paid vacation and holidays, discounts on food and merchandise, 401k. 5-10 years experience in HR management. Position will close Nov 30. Apply on-line at. Maintenance Technician Position: 96-unit Apartment Beautiful Community, has an immediate opening for a highly motivated and professional individual with strong background in apartment/building maintenance. The ideal candidate will have maintenance experience with a strong desire for a career in residential property management. Position requires employee to provide their own tools and On-Call Responsibilities. Hourly plus a free apt., required to live on-site. Exc. benefit package including: paid holidays, vacation, full medical, dental and 401k package avail. after 6 months of employment. Preemployment drug & physical screening required. Send resume to: 1-541-548-1384 Equal Opportunity Employer Medical billing Primary care clinic needs biller familiar with Medicare and commercial insurances. Please send resume to cketron1948@gmail.com Microbiologist/Lab Quality Assurance UMPQUA Research Company is seeking a hard working individual to support our quality assurance program and perVIEW the Classifieds at: form commercial microbio logical analyses at our drinking water and environmental laboratory in Bend, Oregon. Minimum requirements include an Associates degree in Chemistry, MicroGeneral biology or a related field. Hoodoo Ski Area This position will oversee the quality control function NO JOB FAIR within the lab in order to THIS SEASON meet stringent State certifiApplications are online cation requirements and will or at the interface with regulatory mountain. authorities as needed. Training and/or experience in miPlease call these depts. to crobiological analysis is also inquire on available required. Candidates must be positions 541-822-3799, comfortable with computer Lift Operators - ext. 6121 based applications and posAutobahn Tube sess high quality clerical, orPark - ext. 7135 ganizational, and communiSki and Ride cation skills. Our small School - ext. 6510 business has been serving public and private clients for over 30 years. We are looking for a team member who The Bulletin Classifieds is your is comfortable working in a Employment Marketplace small group setting. Salary is Call 541-385-5809 today! commensurate with experience. A comprehensive benHairstylist / Nail Tech efit package is provided. We Also needs to be licensed for are an equal opportunity emwaxing. Recent relevant exp ployer. Email résumé to: necessary. Hourly/commislab@urcmail.net sion. Teresa, 541-382-8449. or fax to 541-863-6199. Plant Manager ED STAUB & SONS PETROLEUM is looking for a Bulk Plant Manager to over see its' fuel and propane operation in Redmond, Oregon. The successful candidate will possess management and supervisory experience, as well as being a motivated, self-starter. Responsibilities include, maintaining operations, add to, as well as maintain current customer base, review and be accountable for financial statements, expenses, overhead, credit /collections, reconcile and update inventory, keeping the plant profitable, and managing a staff of up to 10. Must possess a CDL with hazmat endorsements. Fax Resume to 530-667-2971, or email to ginger.rayl@edstaub.com. ATTENTION: Recruiters and Businesses The Bulletin's classified ads include publication on our Internet site. Our site is currently receiving over 1,500,000 page views every month. Place your employment ad with The Bulletin and reach a world of potential applicants through the Internet....at no extra cost! Remember.... Add your web address to your ad and readers on The Bulletin's web site will be able to click through automatically to your site.-383-0386 Sales - ABLE TO TRAVEL. Hiring 8 People. No Experience Necessary. Transportation & Lodging Furnished. Paid Training. Work & Travel Entire USA. Start Today! 208-590-0365. (PNDC) Sales Telephone prospecting position for important professional services. Income potential $50,000. (average income 30k-35k) opportunity for advancement. Base & Commission, Health and Dental Benefits. Will train the right person. Fax resume to: 541-330-0853 or call Mr. Green 541-330-0640. Sales WANNA PHAT JOB? HHHHHHHHH DO YOU HAVE GAME? HHHHHHH All Ages Welcome. No Experience Necessary. We Train! No Car, No Problem. Mon. - Fri. 4pm -9pm, Sat. 9am - 2pm. Earn $300 - $500/wk. Call Oregon Newspaper Sales Group. 541-306-6346 Social Services Second Nature Cascades is a dynamic and growing wilderness therapy program seeking an experienced doctoral (preferred) or master’s level therapist to join our clinical team based in Bend, Oregon. Qualifications: Candidate must be eligible for licensure in Oregon and experienced working with adolescents in a therapeutic wilderness setting and with IECA consultants. Contact: J Huffine, Ph. D. j@2ncascades. Finance & Business 500 800 507 850 Real Estate Contracts Snowmobiles LOCAL MONEY We buy secured trust deeds & note, some hard money loans. Call Pat Kelley 541-382-3099 extension 13.. Yamaha 2008 Nitro 1049cc, 4 stroke, bought new Feb 2010, still under warranty, 550 miles, too much power for wife! $6000. Call 541-430-5444 860 Motorcycles And Accessories ATV - 2007 Can-Am Outlander Max 400 with winch. Barely used - odometer reading 65 miles. $5,595, or $5,995 with Eagle trailer. 541-923-2953 541-322-7253 Baja Vision 250 2007, BANK TURNED YOU DOWN? Private party will loan on real estate equity. Credit, no problem, good equity is all you need. Call now. Oregon Land Mortgage 388-4200. Trucking JOHN DAVIS TRUCKING in Battle Mountain, NV, is currently hiring for: CDL Class A Drivers. MUST BE WILL573 ING TO RELOCATE. For application, please call Business Opportunities 866-635-2805 or email jdtlisa@battlemountain.net A BEST-KEPT SECRET! Reach or website over 3 million Pacific Northwest readers with a $525/25-word classified ad Web Developer in 30 daily newspapers for Well-rounded web pro3-days. Call (916) 288-6019 grammer needed for busy regarding the Pacific Northmedia operation. Expert west Daily Connection or level Perl or PHP, SQL skills email elizabeth@cnpa.com desired. Knowledge of (PNDC) principles of interface design and usability essential; Have an item to basic competence with Creative Suite, including sell quick? If it’s Flash, needed; familiarity with widely used under $500 you open-source apps, especan place it in cially Joomla or Drupal, a plus. The ideal candidate The Bulletin is not only a technical ace but a creative thinker and Classiieds for problem-solver who thrives $ 10 - 3 lines, 7 days in a collaborative environment. Must be able $ 16 - 3 lines, 14 days to communicate well with (Private Party ads only) non-technical customers, employees and managers. Media experience will be an advantage. This is a full-time, on-site staff position at our headquarters offering competitive wages, health insurance, 401K and lots of potential Established E-Bay Store. "Patti's for professional growth. Dishes & Collectibles" PatSend cover letter explaintern matching china & dish ing why this position is a fit business...very fun! Extenfor your skills, resume and sive large inventory all incl. links to work samples or w/storage racks & packing portfolio to material. Work from home even.jan@gmail.com. part-time or grow to full time if more income is desired. Must be self-motivated. Call Patti 541-318-9010 or email Looking for your next me at patorre@msn.com for employee? more information if you are Place a Bulletin help interested.I am moving to AZ wanted ad today and to retire again. $20,000 OBO! reach over 60,000 readers each week. Your classified ad will Looking for your next also appear on employee? bendbulletin.com which Place a Bulletin help currently receives over wanted ad today and 1.5 million page views reach over 60,000 every month at readers each week. no extra cost. Your classified ad will Bulletin Classifieds also appear on Get Results! bendbulletin.com which Call 385-5809 or place currently receives over your ad on-line at 1.5 million page views bendbulletin.com every month at no extra cost. Bulletin Classifieds Need Seasonal help? Get Results! Need Part-time help? Call 385-5809 or place Need Full-time help? your ad on-line at Advertise your open positions. bendbulletin.com The Bulletin Classifieds Boats & RV’s new, rode once, exc. cond., $1700. 541-647-4641 or 541-923-6283. CRAMPED FOR CASH? Use classified to sell those items you no longer need. Call 385-5809 HARLEY Davidson Fat Boy - LO 2010, Health forces sale, 1900 mi., 1K mi. service done, black on black, detachable windshield, back rest & luggage rack, $13,900, Mario, 541-549-4949, 619-203-4707 Harley Davidson Heritage Soft Tail 2009, 400 mi., extras incl. pipes, lowering kit, chrome pkg., $17,500 OBO. 541-944-9753 Harley Davidson Heritage Softail 1988, 1452 original mi., garaged over last 10 yrs., $9500. 541-891-3022 Harley Davidson Police Bike 2001, low mi., custom bike very nice.Stage 1, new tires & brakes, too much to list! A Must See Bike $10,500 OBO. 541-383-1782 Harley Davidson Ultra Classic 2008, clean, lots of upgrades, custom exhaust, dual control heated gloves & vest, luggage access. 15K, $17,000 OBO 541-693-3975. HONDA GL1500 GOLDWING 1993, exc. cond, great ride, Reduced to $4500!! Call Bill. 541-923-7522 Honda Shadow Deluxe American Classic Edition. 2002, black, perfect, garaged, 5,200 mi. $3495. 541-610-5799. Honda Trail 90, 1979, good condition, but needs engine work, $499. 541-410-4792 To place an ad call Classiied • 541-385-5809 860 880 882 Motorcycles And Accessories Motorhomes Fifth Wheels Allegro Honda XR50R 2003, excellent condition, new tires, skid plate, BB bars, Reduced to $595! Call Bill 541-480-7930. 31’ 1989, basement model, 86K, walk around queen, dinette, couch, generator, 2 roof A/C’s, 454 Chevrolet, clean & nice too, $7200. Please call 541-508-8522 or 541-318-9999. THE BULLETIN • Saturday, November 6, 2010 E3 Cedar Creek 2006, RDQF. Loaded, 4 slides, 37.5’, king bed, W/D, 5500W gen., fireplace, Corian countertops, skylight shower, central vac, much more, like new, $43,000, please call 541-330-9149. 865 ATVs POLARIS PHOENIX 2005, 2X4, 200cc, new rear end, new tires, runs excellent, $1800 OBO, 541-932-4919. Beaver Patriot 2000, Walnut cabinets, solar, Bose, Corian, tile, 4 door fridge., 1 slide, w/d, $99,000. 541-215-0077 COLLINS 18’ 1981, gooseneck hitch, sleeps 4, good condition, $1950. Leave message. 541-325-6934 Bounder 34’ 1994, only 18K miles, 1 owner, ga- Everest 32’ 2004, 3 rage kept, rear walk round queen island bed, TV’s,leveling hyd. jacks, backup camera, awnings, non smoker, no pets, must see to appreciate, too many options to list, won’t last long, $18,950, 541-389-3921,503-789-1202 Dolphin 35’ 1998, large tip-out, 45K mi., part trade for trailer or camper, $19,500, 541-536-2792. Yamaha 350 Big Bear Fleetwood Wilderness 2004 36½’, 4 slide-outs, fireplace, A/C, TV, used 3 times. Like new! List $52,000, sell $22,950. 541-390-2678, Madras Dutch Star DP 39 ft. 2001, 2 slides, Cat engine, many options, very clean, PRICE REDUCED! 541-388-7552. Hitchhiker II 2000 32’ 2 slides, very clean and in excellent condition. Only $18,000! (541) 410-9423, (541) 536-6116. times $3500 OBO Call 541-306-8321 like new 870 Boats & Accessories Ford Falcon Camper Van, 1989 Class B, fully equipped, like new, only 35K miles. $10,000. 541-588-6084. Hitchiker II 32’ 1998 w/solar system, awnings, Arizona rm. great shape! $15,500 541-589-0767, in Burns. 1/3 interest in Columbia 400, located at Sunriver. $150,000. Call 541-647-3718 Seaswirl 1982 PIPER SENECA III Gami-injectors, KFC200 Flight Director, radar altimeter, certified known ice, LoPresti speed mods, complete logs, always hangared, no damage history, exc. cond. $175,000, at Roberts Field, Redmond. 541-815-6085. 2 hangars at Roberts Field, Redmond, OR. Spots for 5 planes. $536 annual lease. Reduced to $125,000 or make offer! 541-815-6085. Airplane Hangars now available for lease at Redmond Municipal Airport. $270/mo. Please contact airport administration, 541-504-3499 Beechcraft A36 BDN 1978 3000TT, 1300 SRMAN, 100 TOP, Garmins, Sandel HSI, 55X A/P, WX 500, Leather, Bose, 1/3 share - $50,000 OBO/terms, 541-948-2126. T-Hangar for rent at Bend airport. Call 541-382-8998. Trucks and Heavy Equipment Case 780 CK Extend-a-hoe, 120 HP, 1972, Tri-Hull, fish and ski boat, great for the family! 75 HP motor, fish finder, extra motor, mooring cover, $1200 OBO, 541-389-4329. 18’ Geary Sailboat, trailer, classic little boat, great winter project. $400 OBO. 541-647-7135 19’ Blue Water Executive Overnighter 1988, very low hours, been in dry storage for 12 years, new camper top, 185HP I/O Merc engine, all new tires on trailer, $7995 OBO, 541-447-8664. 19’ Duckworth Jet 2002, 285 HP inboard Jet Pump, 8 HP kicker,all accessories, 1 owner, low hrs, $24,500,541-410-8617 20.5’ 2004 Bayliner 205 Run About, 220 HP, V8, open bow, exc. cond., very fast w/very low hours, lots of extras incl. tower, Bimini & custom trailer, $19,500. 541-389-1413 Houseboat 38X10, w/triple axle trailer, incl. private moorage w/24/7 security at Prinville resort. PRICE REDUCED, $21,500. 541-788-4844. Marathon V.I.P. Prevost H3-40 Luxury Coach. Like new after $132,000 purchase & $130,000 in renovations. Only 129k orig. mi. 541-601-6350. Rare bargain at just $122,000. Look at : Southwind Class A 30’ 1994, twin rear beds, loaded, generator, A/C, 2 TV’s, all wood cabinets, basement storage, very clean, $14,999 or trade for smaller one. 541-279-9445/541-548-3350 GENERATE SOME excitement in your neigborhood. Plan a garage sale and don't forget to advertise in classified! 385-5809. Price Reduced! Carriage 35’ Deluxe 1996, 2 slides, w/d, rarely used, exc. cond. Now $15,500. 541-548-5302 TERRY 27’ 5th wheel 1995 with big slide-out, generator and extras. Great condition and hunting rig, $9,900 OBO. 541-923-0231 days. 885 Canopies and Campers Travel 1987, Queen 34’ “WANTED” RV Consignments All Years-Makes-Models Free Appraisals! We Get Results! Consider it Sold! Winnebago Itasca Horizon 2002, 330 Cat, 2 slides, loaded with leather. 4x4 Chevy Tracker w/tow bar available, exc. cond. $65,000 OBO. 509-552-6013. VW Super Beetle 1974 MICHELIN X-ICE studless snow tires, mounted on 4 Lexus GS300 rims plus extra brand new tire. $325 541-317-4945. Studded snow tires 245-75-R16 Wildcat Touring AT, 4 for $500. Call 541-312-2972 New: 1776 CC engine, dual Dularto Carbs, trans, studded tires, brakes, shocks, struts, exhaust, windshield, tags & plates; has sheepskin seatcovers, Alpine stereo w/ subs, black on black, 25 mpg, extra tires. Only $3000 541-388-4302. Partial Trade. 933 TIRES: 4 Schwab 225/60R18, Studless snow tires, used, 2 seasons, $300, 541-447-1668 Tires, (4) Snow/traction, LT245/75R-16/10, 6K mi., $300/set, 541-408-0531. C-10 Pickup TIRES - Studded snows, (4) P215/60Rx16, $95. Phone 541-420-2220 932 Antique and Classic Autos Ford Escape XLT2008 Smolich Auto Mall 4 wheel drive. Super clean and ready for next weeks winter storm. $17,757 Special Offer VIN#A74168 1969, 152K mi. on chassis, 4 spd. transmission, 250 6 Cyl. eng. w/60K, new brakes & master cylinder, $2500, please call 503-551-7406 or 541-367-0800. 2003 Lance 1030 Camper, satellite dish, 3600 gen, pullout pantry, remote elec jacks, Qn bed, all weather pkg, solar, AC, $17,500. 2007 Dodge 6.7 Cummins Diesel 3500 4x4 long bed, sway bar, airbags, canopy, bedliner, gooseneck, 58K mi, $34,900. Or buy as unit, $48,500. 541-331-1160 Smolich Auto Mall Jeep Wrangler 2008 Special Offer Hardtop, Tow, 6 spd, 28K Miles! VIN #530123 Double Cab, 4X4, 63K Miles! Vin #463612 Now Only $19,750 HYUNDAI 541-749-4025 • DLR 366 935 Sport Utility Vehicles Smolich Auto Mall Ford Explorer 2005 V6, 7 Passenger, Family SUV! Vin #A06585 Now Only $10,735 931 Bid Now! real nice inside & out, low mileage, $2500, please call 541-383-3888 for more information. Special Offer for Hunters NISSAN Special Offer 541-389-1178 • DLR 366 4 WHEEL DRIVE, 49,000 miles. V6-auto. $14,897 Chevrolet Nova, 1976 2-door, 20,200 mi. New tires, seat covers, windshield & more. $5800. 541-330-0852. Chrysler 300 Coupe 1967, 440 engine, auto. trans, ps, air, frame on rebuild, repainted original blue, original blue interior, original hub caps, exc. chrome, asking $10,000 or make offer. 541-385-9350. 541-598-3750 DLR 0225 Cadillac Escalade 2007 DODGE D-100 1962 ½ Ton, rebuilt 225 slant 6 engine. New glass, runs good, needs good home. $2700. 541-322-6261 Now Only $18,888 Now Only $37,911 package, Good condition, $1495, 541-815-9939. NISSAN smolichmotors.com 541-389-1178 • DLR 366 Call The Bulletin At 541-385-5809. Place Your Ad Or E-Mail At: VIN#812162 personals Professional Golfer looking to drive your car to Palm Springs before Thanksgiving, Brandon, 541-693-4119. Special Offer for Hunters 541-598-3750 DLR 0225 FORD 350 LARIAT 2002 4x4 crewcab, 7.3 diesel 135k, dually, matching canopy, towing special, gooseneck, too! Orig. 63-year-old construction owner needs money, will trade, $18,500. (541) 815-3639 or (541) 508-8522 Jeep Wrangler 2009 Chevrolet Suburban 2005 Exc. cond., loaded. Nav, rear screen DVD, towing, power seats, etc. 140,000 hwy miles. Set of studded tires included. $15,000 OBO. 503-888-2101 or davidfriend@majestys.com. CHEVY BLAZER 2000, ZR2 LS 4x4, 130k miles, 90% tread left on $2000 worth of tires. Under KBB at $4995. Can be seen at Redmond’s Hwy 97 Park & Sell. 541-546-6838. 31K Miles! VIN #767844 Now Only $19,877 Jeep CJ7 1986 Classic, 6-cyl., 5 spd., 4x4, good cond., $8500/consider trade. 541-593-4437. smolichmotors.com 541-389-1177 • DLR#366 Smolich Auto Mall Special Offer for Hunters Jeep Grand Cherokee Limited 1998, like new, low mi., just in time for the snow, great cond., $7000, 541-536-6223. Smolich Auto Mall Special Offer MUST SELL due to death. 1970 Monte Carlo, all orig, many extras. Sacrifice $6000. 541-593-3072 Smolich Auto Mall Infiniti g35x 2007 all wheel drive, Navigation, Moonroof. $24,889 bed, nice wheels & tires, 86K, $5500 OBO, call 541-410-4354. Ford F-150 2006, Triton STX, X-cab, 4WD, tow pkg., V-8, auto, $16,999 OBO, Call 541-554-5212,702-501-0600 Mercedes 380SL 1983, Convertible, blue color, new tires, cloth top & fuel pump, call for details 541-536-3962 smolichmotors.com 541-389-1177 • DLR#366 Dodge Ram 2001, short Corvette 1956, rebuilt 2006, 3 spd., Ford T-Bird 1955, White soft & hard tops, new paint, carpet, upholstery, rechromed, nice! $32,000. 541-912-1833 30K Miles! VIN #641758 AWD, 41K Miles! Vin #140992 GMC Jimmy 4x4 UT 1986, 2-Dr, Auto, Tow Chevy Suburban 1969, classic 3-door, very clean, all original good condition, $5500, call 541-536-2792. Jeep Wrangler 2008 VIN#251359 Chevy Colorado 2004, LS, 4x4, 5 cyl., 4 spd., auto, A/C, ps, pl, pw, CD, 60K mi., $8925. 541-598-5111. Dodge 1986 Power Ram 4 x 4, long bed, tow package, 85,258 miles. Runs great. $2650. 541-447-8165 OLDS 98 1969 2 door hardtop, $1600. 541-389-5355 Lance 1010 10’1” 1999, 1 owner, micro, A/C, gen, 2 awnings, tv, stereo, elec. jacks, non smoker, $8950, 541-410-8617 Smolich Auto Mall GMC ENVOY2005 Wabco 666 Grader - New tires, FIAT 1800 1978 5-spd., door clean, runs good -$8,500. panels w/flowers & humAustin Western Super 500 mingbirds, white soft top & Grader - All wheel drive, low hard top, Reduced to $5,500, hours on engine - $10,500. 541-317-9319,541-647-8483 1986 Autocar cement truck Cat engine, 10 yd mixer People Look for Information $10,000. Call 541-771-4980 About Products and Services Every Day through XState 12 yd. Diesel Dump Truck, w/big snow plow, The Bulletin Classifieds bargain at $3650, Ford Mustang Coupe 1966, 541-410-3425. original owner, V8, automatic, great shape, $9000 925 OBO. 530-515-8199 Automotive Parts, Service and Accessories smolichmotors.com 541-389-1177 • DLR#366 smolichmotors.com Cadillac El Dorado 1977, very beautiful blue, Mustang MTL16 2006 Skidsteer, on tracks, includes bucket and forks, 540 hrs., $18,500. 541-410-5454 Big Tex Landscaping/ ATV Trailer, dual axle flatbed, 7’x16’, 7000 lb. GVW, all steel, $1400. 541-382-4115, or 541-280-7024. Special Offer for Hunters DLR 0225 smolichmotors.com Chevy 1/2 Ton 1995, 4X4, 350 engine, auto, cold A/C, new tires, brakes, shocks, & muffler, w/ camper shell, runs great. $4500. 509-429-6537 Smolich Auto Mall 541-598-3750 Toyota Tundra 2004 Pickups 2, 4 barrel, 225 hp. Matching numbers $52,500, 541-280-1227. Buy New...Buy Local slides, 44k mi., A/C, awning, good cond., 1 owner. $37,000. 541-815-4121 935 Sport Utility Vehicles Ford F250 1986, 4x4, Jeep Wrangler 2010 X-Cab, 460, A/C, 4-spd., exc. shape, low miles, $3250 OBO, 541-419-1871. FORD F-250 390 4x4, 1973 Runs good, $1600 OBO 541-536-9221 FORD pickup 1977, step side, 351 Windsor, 115,000 miles, MUST SEE! $4500. 541-350-1686 Priced BETTER then NEW! 3K Miles! VIN #158726 Chrysler Aspen 2008 SUV AWD, Limited Edition! 41K Miles! Vin #132288 Now Only $21,735 Now Only $25,825 Smolich Auto Mall Special Offer for Hunters NISSAN 541-923-1655 Winnebago Class C 28’ 2003, Ford V10, 2 935 Sport Utility Vehicles Utility Trailers 65K miles, oak cabinets, interior excellent condition $7,500, 541-548-7572. Randy’s Kampers & Kars Ads published in the "Boats" classification include: Speed, fishing, drift, canoe, house and sail boats. For all other types of watercraft, please see Class 875. 541-385-5809 International 1981,T-axle-300 13 spd.Cummins/Jake Brake,good tires/body paint;1993 27’ stepdeck trailer, T-axle, Dove tail, ramps.$8500, 541-350-3866 Montana 37’ 2005, very good condition, just serviced, $23,000 OBO. 970-812-6821 We keep it small & Beat Them All! 20.5’ Seaswirl Spyder 1989 H.O. 302, 285 hrs., exc. cond., stored indoors for life $11,900 OBO. 541-379-3530 Mobile Suites, 2007, 36TK3 with 3 slide-outs, king bed, ultimate living comfort, large kitchen, fully loaded, well insulated, hydraulic jacks and so much more. Priced to sell at $59,500! 541-317-9185 933 Pickups TIRES: P265/70R/17 Bridgestone Dueler AT, $200. 541-388-8198. 90% tires, cab & extras, 11,500 OBO, 541-420-3277 17’ 932 Antique and Classic Autos Tires (4) Michelin Primacy Studless Snows, 215/55HR16, hardly used, $250, 541-480-5205. 916 KOMFORT 27’ 5th wheel 2000 trailer: fiberglass with 12’ slide, stored inside, in excellent condition. Only $14,999. Call 541-536-3916. 931 Automotive Parts, Service and Accessories 908 slides, island kitchen, air, surround sound, micro., full oven, more, in exc. cond., 2 trips on it, 1 owner, like new, REDUCED NOW $26,000. 541-228-5944 1999, 4X4, 4 stroke, racks front & rear, strong machine, excellent condition. $2,200 541-382-4115,541-280-7024 Yamaha YFZ450 2006 , low hrs hard 900 Aircraft, Parts and Service Motorcycle Trailer Kendon stand-up motorcycle trailer, torsion bar suspension, easy load and unload, used seldom and only locally. $1700 OBO. Call 541-306-3010. Autos & Transportation What are you looking for? You’ll find it in The Bulletin Classifieds 541-385-5809 smolichmotors.com 541-389-1178 • DLR 366 Smolich Auto Mall Jeep Wrangler 2002 Special Offer KIA Sportage 1996: 4X4 $1950, 153k, AC, 5 Spd, New Whls, tires Clutch, Slave Cyl. Runs Great. Yakima Locking Snowboard Rack. Buy before the snow flies! Rick 541-416-0566. Just bought a new boat? Sell your old one in the classiieds! Ask about our Super Seller rates! 541-385-5809 Lifted & Loaded with extras for the trails. Very clean! VIN #719887 Now Only $16,387 Honda Ridgeline 2006 AWD 48K miles, local, 1 owner, loaded w/options. $22,999. 541-593-2651 541-815-5539 smolichmotors.com 541-389-1177 • DLR#366 Lexus GX470 2009 sport utility 4 WHEEL DRIVE Sport package, Navigation, 14,000 miles. $48,995 Dodge Journey SUV 2009 VIN#X590171829 smolichmotors.com 541-598-3750 541-389-1177 • DLR#366 DLR 0225 Call for Great Value information. 36K Miles! Vin #195855 Now Only $13,989 You Can Bid On: 3 Oil Changes for Car or Light Truck, $120 Value at Bryan's Automotive (Bidding exp. Nov. 14, at 8pm) Porsche 914, 1974 Always garaged, family owned. Runs good. $5500. 541-550-8256 International Flat Bed Pickup 1963, 1 ton dually, 4 spd. trans., great MPG, could be exc. wood hauler, runs great, new brakes, $2500. 541-419-5480. NISSAN smolichmotors.com 541-389-1178 • DLR 366 Jeep Wrangler 2004, right hand drive, 51K, auto., A/C, 4x4, AM/FM/CD, exc. cond., $11,500. 541-408-2111 Porsche Cayenne Turbo 2008, AWD, 500HP, 21k mi., exc. cond, meteor gray, 2 sets of wheels and new tires, fully loaded, $69,000 OBO. 541-480-1884 881 Travel Trailers Malibu Skier 1988, w/center pylon, low hours, always garaged, new upholstery, great fun. $9500. OBO. 541-389-2012. Need help ixing stuff around the house? Call A Service Professional and ind the help you need. WE BUY OLD BOATS! Gearbox 30’ 2005, all the bells & whistles, sleeps 8, 4 queen beds, reduced to $17,000, 541-536-8105 JAYCO 31 ft. 1998 slideout, upgraded model, exc. cond. $10,500. 1-541-454-0437. Central Oregon Boat Recycling 541-480-0415 2-Wet Jet PWC, new batteries & covers. “SHORE“ trailer includes spare & lights. $2400. Bill 541-480-7930. Ads published in "Watercraft" include: Kayaks, rafts and motorized personal watercrafts. For "boats" please see Class 870. 541-385-5809 Accounting/Bookeeping Domestic Services Balanced Bend Bookkeeping Seeing new clients, provide services for regular bookkeeping, training & catch up projects. 541-350-3652 Rebecca’s Cleaning Honest•Reliable•Hardworking Big, small, and everything in between. Maintenance and windows too! 541-610-9353 Barns Mallard 21 CKS 2008 bought new 2009, used just 3x, loaded, 1 slide, must see, like new. $14,950. 541-480-7930 Building/Contracting NOTICE: Oregon state law requires anyone who contracts for construction work to be licensed with the Construction Contractors Board (CCB). An active license means the contractor Weekend Warrior Toy Hauler is bonded and insured. 28’ 2007, Gen, fuel station,exc. Verify the contractor’s CCB cond. sleeps 8, black/gray inlicense through the terior, used 3X, $29,900. CCB Consumer Website 541-389-9188. or call 503-378-4621. The 882 Bulletin recommends checking with the CCB prior Fifth Wheels to contracting with anyone. Some other trades also require additional licenses and certifications. Debris Removal Waverider Trailer, 2-place, new paint, rail covers, & wiring, good cond., $695, 541-923-3490. Alpha “See Ya” 30’ 1996, 2 slides, A/C, heat pump, exc. cond. for Snowbirds, solid oak cabs day & night shades, Corian, tile, hardwood. $14,900. 541-923-3417. Excavating JUNK BE GONE l Haul Away FREE For Salvage. Also Cleanups & Cleanouts Mel 541-389-8107 Handyman From foundation to roof, we do it all! 21 Years Experience. Randy, 541-306-7492 M. Lewis Construction, LLC "POLE BARNS" Built Right! Garages, shops, hay sheds, arenas, custom decks, fences, interior finish work, & concrete. Free estimates CCB#188576•541-604-6411 875 Watercraft Call 541-385-5809 to promote your service • Advertise for 28 days starting at $140 (This special package is not available on our website) CCB#180420 Hourly Excavation & Dump Truck Service. Site Prep Land Clearing, Demolition, Utilities, Asphalt Patching, Grading, Land & Agricultural Development. Work Weekends. Alex541-419-3239CCB#170585 I DO THAT! Lets get to your Fall projects, Remodeling, Handyman, Professional & Honest Work. CCB#151573-Dennis 317-9768 ERIC REEVE HANDY SERVICES Home & Commercial Repairs, Carpentry-Painting, Pressure-washing, Honey Do's. Small or large jobs. On-time promise. Senior Discount. All work guaranteed. 541-389-3361 or 541-771-4463 Bonded & Insured CCB#181595 More Than Service Peace Of Mind. Fall Clean Up •Leaves •Cones and Needles •Pruning •Debris Hauling Gutter Cleaning Lawn & Landscape Winterizing •Fertilizer •Aeration •Compost Handyman Landscaping, Yard Care Landscaping, Yard Care Landscaping, Yard Care Painting, Wall Covering Snow Removal Clear those rain gutters now, before winter sets in. Call Mindin’ The Gutter at 541-848-2457 for free estimate now! Reliable 24 Hour Service •Driveways •Walkways •Roof tops •De-icing Holiday Lighting EXPERIENCED Commercial & Residential Free Estimates Senior Discounts 541-390-1466 Same Day Response FIND IT! BUY IT! SELL IT! The Bulletin Classiieds. Find It in The Bulletin Classifieds! 541-385-5809 Nelson Landscape Maintenance Serving Central Oregon Residential & Commercial SPRINKLER BLOW-OUT & Repair • Fall Clean up • Weekly Mowing & Edging •Flower bed clean up • Snow Removal •Senior Discounts Bonded & Insured 541-815-4458 LCB#8759 541-279-8278 Roof/gutter cleaning, debris hauling, property clean up, Mowing & weed eating, bark decoration. Free estimates. Fall Maintenance! Thatch, Aerate, Monthly Maint., Weeding, Raking. 541-388-0158 • 541-420-0426 Bend Landscaping Sprinkler Blowouts, Lawn Aerating, Fall Cleanup 541-382-1655 LCB# 7990 Masonry Chad L. Elliott Construction MASONRY Brick * Block * Stone Small Jobs/Repairs Welcome L#89874.388-7605/385-3099 Moving and Hauling Harris Custom Crating: We provide custom crating, palletizing, strap & wrap and arrange shipping if required. 541-390-0704,541-390-0799 Painting, Wall Covering WESTERN PAINTING CO. Richard Hayman, a semi-retired painting contractor of 45 years. Small Jobs Welcome. Interior & Exterior. Wallpapering & Woodwork. Restoration a Specialty. Ph. 541-388-6910. CCB#5184 MARTIN JAMES European Professional Painter Repaint Specialist Oregon License #186147 LLC. 541-388-2993 Pet Services Serious On-site Horse Care Full service sitting w/options for more in-depth care. Call EquiCare, 541-706-1820 (leave message if no answer) Remodeling, Carpentry Repair & Remodeling: Kitchens & Baths Structural Repair, We move walls. Small Jobs Welcome. Another General Contractor, Inc. CCB# 110431. 541-617-0613, 541-390-8085 Repair & Remodeling: Kitchens & Baths Structural Repair, We move walls. Small Jobs Welcome. Another General Contractor, Inc. CCB# 110431. 541-617-0613, 541-390-8085 RGK Contracting & Consulting 30+Yrs. Exp. • Replacement windows/doors • Garages/Additions/Remodels 541-480-8296 CCB189290 Tile, Ceramic Steve Lahey Construction Tile Installation Over 20 Yrs. Exp. Call For Free Estimate 541-977-4826•CCB#166678 E4 Saturday, November 6, 2010 • THE BULLETIN To place an ad call Classiied • 541-385-5809 935 940 975 975 975 975 975 975 975 Sport Utility Vehicles Vans Automobiles Automobiles Automobiles Automobiles Automobiles Automobiles Automobiles Subaru Outback 2004 Limited AWD Wagon Chrysler 1999 AWD Town & Country LXI, 109k; 1998 Chrysler Town & Country SX, 155K: 7 passenger, leather, used but not abused. I’ll keep the one that doesn’t sell. Takes $3500 and up to buy. Bob, as you can see, likes mini vans. 541-318-9999 or 541-508-8522. Leather, moonroof, 5 speed, $13,508 VIN#-#604795 541-598-3750 DLR 0225 Smolich Auto Mall Special Offer PRICE REDUCED TO $800 Cash! Dodge Van 3/4 ton 1986, Rebuilt tranny, 2 new tires and battery, newer timing chain. 541-410-5631. Suzuki Grand Vitara 2010 975 Automobiles AWD, Loaded like you want it including Navigation. 2K Miles! Vin #100784 Now Only $23,345 NISSAN smolichmotors.com 541-389-1178 • DLR 366 Audi A4 2.8L Quattro. Best, most beautiful 1999,car on the road,runs great,looks perfect. $6000 firm. 541-222-0066 Special Offer Chrysler Cordoba 1978, 360 cu. in. engine, $400. Lincoln Continental Mark VII 1990, HO engine, SOLD. 541-318-4641. Chrysler New Yorker 1990, 3.3 V6, new tags, tires, battery, etc. excellent condition, $1600. 541-549-6523. If you have a service to offer, we have a special advertising rate for you. Call Classifieds! 541-385-5809. Ford Mustang Cobra 2003, SVT, perfect, super charged, 1700 mi., $25,000/trade for newer RV+cash,541-923-3567 Jeep Cherokee Laredo, 2003, 135K miles, fully loaded, excellent condition. $6500. Call 541-749-0316 Ford Mustang Convertible 2000, V6 with excellent maintenance records, 144K miles. Asking $4500, call for more information or to schedule a test drive, 208-301-4081. Kia Spectra LS, 2002 96K miles, black, 5-speed, runs good, $2600. Phone 541-749-0316 Premium, Loaded, Roof Rack, 7 Passenger, 39K Miles! Vin #106479 Now Only $17,789 BMW M3 COUPE E36 1998, mint condition, adult owned, low miles, needs nothing, asking 12,500. Please call 541-419-2181 GRAND AM 2002 with V-6. great shape! $3600, 541-536-9221 Pontiac Firebird T-Top 1998 mint, 125K,custom wheels/tires HO V6, 4 spd auto, 29 mpg reg. $5700 OBO. 541-475-3984 MERCEDES WAGON 1994 E320. 130k mi., new tires, seats 7, great car! $5500. 541-280-2828. MAZDA MIATA 1992, black, 81k miles, new top, stock throughout. See craigslist. $4,990. 541-610-6150. NEED TO SELL A CAR? Call The Bulletin and place an ad today! Ask about our "Wheel Deal"! for private party advertisers 385-5809 Special Offer Toyota Prius Hybrid 2005, all options, NAV/Bluetooth, 1 owner, service records, 194K highway miles. $7500, 541-410-7586 4 Motion AWD! Vin #302694 VOLKSWAGEN BUG 1965 Black , Excellent condition. Runs good. $6995. 541-416-0541. Smolich Auto Mall Now Only $9,999 Special Offer HYUNDAI smolichmotors.com Smolich Auto Mall 541-749-4025 • DLR Special Offer Toyota Avalon 2003. Smolich Auto Mall VW Passat Wagon 2004 Super Nice!! Vin #300271 Now Only $11,450 541-385-5809 HYUNDAI Ford Mustang Convertible LX 1989, V8 engine, white w/red interior, 44K mi., exc. cond., $6995, 541-389-9188. tion, 4.6L, manual 5-spd trans., 46,000 mi. on odometer. All factory options, w/K&N drop in filter, jet chip, Magnaflow Exhaust, never raced, extensive service records, exc. cond., $12,500, 541-312-2785. Pontiac Fiero GT 1987, V-6, 5 spd, sunroof, gold color, good running cond, reduced, now $1500. 541-923-0134. Subaru Outback Special Edition Wagon 2007, auto, exc. cond,$18,750, 541-312-8829 Ford Mustang GT 2004, 40th Aniversary Edi- Suzuki XL7 2008 Mercedes-Benz SL 550 2007 Only 38,750 miles. Excellent, pristine condition. No body damage, chips, etc. Loaded with extras. Comes with 4 studded snow tires with less than 2000 miles wear. $46,000. 541-388-7944. smolichmotors.com SUBARUS!!! Nice clean and fully serviced . Most come with 3 year, 36,000 mile warranty. Call The Guru: 382-6067 or visit us at 541-749-4025 • DLR 366 VW New Beetle Bug 2006 Leather, Roof Rack, Manual, FWD, 35K Miles! Vin #400435 Now Only $11,945 HYUNDAI smolichmotors.com 541-749-4025 • DLR 366 366 FIND IT! BUY IT! SELL IT! The Bulletin Classiieds Mazda Miata MX5 2003, silver w/black interior, 4-cyl., 5 spd., A/C, cruise, new tires, 23K, $10,500, 541-410-8617. HYUNDAI smolichmotors.com 541-749-4025 • DLR 366 Toyota Land Cruiser 1970, 350 Chevy engine, ps, auto, electric winch, new 16” tires and wheels, $12,000. 541-932-4921. 940 Buick LeSabre Limited Edition 1985, 1 owner, always garaged, clean, runs great, 90K, $1895, 541-771-3133. Buick Park Avenue 2004, ultra super charged V-6, loaded, white diamond, exc. cond. Vin #148993, $11,500 541-480-3265 • Dlr #8308 Vans Honda Accord EX 1990, in great cond., 109K original mi., 5 spd., 2 door, black, A/C, sun roof, snow tires incl., $4000. 541-548-5302 Mazda SPEED6 2006, a rare find, AWD 29K, Velocity Red, 6 spd., 275 hp., sun roof, all pwr., multi CD, Bose speakers, black/white leather $17,500. 541-788-8626 Honda Civic LX 2006, 4-door, 45K miles, automatic, 34-mpg, exc. cond., $12,480, please call 541-419-4018. Chevy Gladiator 1993, great shape, great mileage, full pwr., all leather, auto, 4 captains chairs, fold down bed, fully loaded, $4500 OBO, call 541-536-6223. CHEVY CORVETTE 1998, 66K mi., 20/30 m.p.g., exc. cond., $16,000. 541- 379-3530 Honda CRV EX 2002, 4WD, only 63K, auto, many orig. extras+deer alarm, Demco front base plate for towing, exc. cond., $12,250, 541-549-7587. Mercedes 320SL 1995, mint. cond., 69K, CD, A/C, new tires, soft & hard top, $12,500. Call 541-815-7160. Mercedes-Benz 450GL 2007, exc. cond., all options incl. navigation & TV/DVD players, 80K all road miles, $32,000, 541-350-5373. M O T O R S BELOW BLUE BOOK SALE Kelly Blue Book Prices as of 11/03/2010 2000 Audi A6 Must See, Great Condition Stk. A31035B, VIN 128314 Kelly Blue Book $8,850 NOW $8,849 2007 VW Beetle Stk. 90102A, VIN M504921 Kelly Blue Book $12,865 NOW $12,495 Kelly Blue Book $14,600 Stk. A30093A, VIN 182354 NOW $16,895 2009 VW Routan VW Certifed Mini Van NOW $17,995 Kelly Blue Book $19,250 VW Certified, Great Buy Stk. 3421, VIN 071339 VW Certified, Wolfsburg Stk. 3514, VIN R501073 2007 VW Jetta NOW $13,995 2007 Beetle Convertible 2007 Mini Cooper S Low Miles, Full Options Stk. 3414, VIN L84656 NOW $18,495 Kelly Blue Book $21,130 VW Certified, One Owner Stk. 70066C, VIN M524831 Kelly Blue Book $15,635 NOW $14,995 Stk. AA30167J, VIN 134876 VW Certified, One Owner Stk. 3497, VIN M196211 Kelly Blue Book $15,480 Kelly Blue Book $21,565 NOW $15,395 2009 VW Beetle Kelly Blue Book $15,770 NOW $21,495 2004 BMW X5 One Owner, Low Miles Stk. 71031J, VIN LU22273 VW Certified, Low miles Stk. 3519, VIN M505864 2009 VW Jetta TDI Only 16k Miles, Navigation, Moonroof 2007 VW Jetta NOW $15,495 2003 Mercedes C320 Stk. 3520, VIN F410694 Kelly Blue Book $16,725 NOW $21,995 Kelly Blue Book $22,860 Stk. 3465, VIN 125841 NOW $15,995 Kelly Blue Book $25,485 NOW $23,995 Carrera AUTO OUTLET GREAT VALUES ON RECENT TRADE-INS! 2000 VW Beetle 2004 Jeep Grand Cherokee Great Value Navigation, One Owner, Low, Low Miles Stk. 90201A, VIN M72269 NOW $5,995 Kelly Blue Book $6,445 2005 Acura MDX NOW $17,995 Stk. 90131B, VIN FZ78172 Kelly Blue Book $22,760 2004 GMC Yukon Loaded! DVD, 3rd Row Seat Stk. 71023A, VIN J295729 Kelly Blue Book $20,810 NOW $18,995 Kelly Blue Book $20,035 XLT Super Cab, Low Miles Stk. A31036A, VIN H526917 Kelly Blue Book $18,625 Stk. A31040A, VIN C366044 2006 Ford F-150 One Owner, Must See! NOW $19,995 2007 Nissan Pathfinder NOW $17,995 2005 GMC Yukon One Owner, Like New Stk. 71055A, VIN C621723 Kelly Blue Book $26,165 NOW $22,995 Incredible Condition & Value Stk. 71056B, VIN J174687 Kelly Blue Book $19,695 Porsche | Audi NOW $17,995 M O T O R S 1000 1000 1000 Legal Notices Legal Notices Legal Notices elected to sell the said real property to satisfy the obligations secured by said Trust Deed and this Notice of Default has been recorded pursuant to Oregon Revised Statutes 86.735(3); the default for which the foreclosure is made is Grantor's failure to pay when due principal payment of $162,157.05 plus accrued interest in the amount of $41,426.63 through August 25, 2010. Trust, together with any interest which the obligations thereby secured and the costs and expenses of sale, including a reasonable charge by the Trustee. Notice is further given that any person named in ORS 86.753 Deed of Trust, together with Trustee’s and attorneys fees not exceeding the amounts provided by said ORS 86.753. LEGAL NOTICE Estate of Dorothy L. Nelson NOTICE TO INTERESTED PERSONS Case No. 10PB0122ms NOTICE IS HEREBY GIVEN that Jerry Miller has been appointed Personal Representative. All persons having claims against the estate are required to present them, with vouchers attached, to the undersigned Personal Representative, at c/o Harold S. Harding, Attorney at Law, P.O. Box 1201, Corvallis, OR 97339-1201, within four months after the date of first publication of this notice, or the claims may be barred. All persons whose rights may be affected by the proceedings may obtain additional information from the records of the court, the Personal Representative, or the attorney for the personal representative whose contact information is below. Harold S. Harding Attorney for Personal Representative PERSONAL REPRESENTATIVE Jerry Miller 4990 Nadine Dr. S. Salem, OR 97302-3530 503-949-0466 ATTORNEY Harold S. Harding Attorney at Law P.O. Box 1201 Corvallis, OR 97339-1201 541-757-7594 LEGAL NOTICE NOTICE OF PUBLIC HEARING BY THE BOARD OF COUNTY COMMISSIONERS OF DESCHUTES COUNTY, OREGON A public hearing regarding a proposed annexation, Hellmuth Annexation, to the Four Rivers Vector Control District, will be held on November 22, 2010, at 10:00 a.m. in the Board of County Commissioners' Hearing Room, First Floor, 1300 NW Wall Street, Bend, Oregon. To view the legal description of the boundaries of the proposed annexation, contact the Deschutes County Counsel's Office at 388-6623. 2007 Audi A4 Audi Certified, Low Miles 4-Matic, Low Miles 1000 Legal Notices Dated and first published October 23, 2010. 2008 VW Jetta Kelly Blue Book $16,910 VW Certified 1000 Legal Notices VW | BMW Find every car on the lot at 10 4 5 S E 3 r d S t. | B e n d | 5 41-3 81-1711 The purpose of the proposed annexation is to provide fire protection services for the area proposed to be annexed. All interested persons may appear and be heard. Deschutes County conducts public meetings in locations which are wheelchair accessible. Deschutes County also provides reasonable accommodations for persons with disabilities. For persons who are deaf, or who have hearing or speech impairments, dial 7-1-1 to access the State transfer relay service for TTY. At meetings of the Board of County Commissioners the county will provide an interpreter for hearing impaired persons who give at least 48 hours notice of the request. Written information will be made available in large print or audio format. To request these services, please call (541) 388-6571. BOARD OF COUNTY COMMISSIONERS FOR DESCHUTES COUNTY, OREGON Dennis R. Luke, Chair LEGAL NOTICE TRUSTEE'S NOTICE OF SALE Loan No.: 1715020050 T.S. No.: 7101550 Reference is made to that certain deed made by Kent R. Cramer and Leslie J. Cramer, Husband and Wife as Grantor to First American Title Company, as Trustee, in favor of Mortgage Electronic Registration Systems, Inc. as Beneficiary, dated 3/2/2005, recorded 3/7/2005, in the official records of Deschutes County, Oregon in book/reel/volume No. xx at page No. xx, fee/file/instrument/microfilm/reception No. 2005-13281 covering the following described real property situated in said County and State, to wit: ALL OF LOT TWO HUNDRED SIXTY-SEVEN AND A PORTION OF LOT THREE HUNDRED FOURTEEN OF BROKEN TOP LOCATED IN SECTION 1, OF TOWNSHIP 18 SOUTH, RANGE 11 EAST OF THE WILLAMETTE MERIDIAN, DESCHUTES COUNTY, OREGON, FULLY DESCRIBED AS FOLLOWS: BEGINNING AT A 5/8" IRON ROD AT THE SOUTHEASTERLY CORNER OF SAID LOT TWO HUNDRED SIXTY-SEVEN ON THE WESTERLY RIGHT OF WAY OF TAM MCARTHUR LOOP; THENCE FOLLOWING SAID RIGHT OF WAY SOUTH 24 DEGREES 07'53" EAST 19.28 FEET TO A 5/8" IRON ROD; THENCE LEAVING SAID RIGHT OF WAY SOUTH 71 DEGREES 4733" WEST 186.81 FEET TO A 5/8" IRON ROD AT THE SOUTHWESTERLY CORNER OF SAID LOT; THENCE FOLLOWING THE BOUNDARY OF SAID LOT NORTH 27 DEGREES 50'00" WEST 57.23 FEET TO A 5/8" IRON ROD; THENCE NORTH 45 DEGREES 04'54" EAST 185.36 FEET TO A 5/8" IRON ROD ON SAID RIGHT OF WAY; THENCE FOLLOWING SAID RIGHT OF WAY 99.09 FEET ALONG THE ARC OF A 300.00 FOOT RADIUS CURVE RIGHT (THE LONG CHORD OF WHICH BEARS SOUTH 33 DEGREES 35'37" EAST 98.64 FEET) TO A 5/8" IRON ROD; THENCE SOUTH 24 DEGREES 07'53" EAST 25.59 FEET TO THE POINT OF BEGINNING. APN# 184548 Commonly known as: 61602 Tam McArthur Loop, Bend, OR 97702 $3,002.58 each, commencing with the payment due on 5/1/2010 and continuing each month until this trust deed is reinstated or goes to trustee's sale; plus a late charge of $150.13: The principal sum of $624,577.65 together with the interest thereon at the rate 3.125% per annum from 4/1/2010 until paid; plus all accrued late charges thereon; and all trustee's fees, foreclosure costs and any sums advanced by the beneficiary pursuant to the terms of said deed of trust. Whereof, notice hereby is given that the undersigned trustee will on 12/3/2010 at the hour of 11:00 A.M., Standard of Time, as established by Section 187.110, Oregon Revised Statutes, at the Front Entrance Entrance to. Dated: 7/30/2010 FIRST AMERICAN TITLE INSURANCE COMPANY, Trustee C/O Max Default Services Corporation 43180 Business Park Drive, Ste 202 Temecula, CA 92590 (619)465-8200 DENNIS CANLAS ASAP# 3678035 10/23/2010, 10/30/2010, 11/06/2010, 11/13/2010 LEGAL NOTICE TRUSTEE'S NOTICE OF SALE Reference is made to that certain Trust Deed made by Eric Michael Meloling, as Grantor, to AmeriTitle, Trustee, in favor of Ronald L. White, as Beneficiary, dated May 17, 2004, recorded on May 17, 2004, as Instrument No. 2004-28954, Records of Deschutes County, Oregon, covering the following described real property situated in Deschutes County Oregon: Lot 191 Northwest Crossing, Phase V Bend, Deschutes County, Oregon. Chris Hatfield of Hurley Re, P.C., 747 SW Mill View Way, Bend, OR 97702, was appointed Successor Trustee by the Beneficiary on August 23, 2010. Both the Beneficiary and Successor Trustee have By reason of said default the Beneficiary has declared all sums owing on the obligation secured by said Deed of Trust immediately due and payable, said sums being the following, to-wit: The principal sum of $162,157.05, plus accrued interest in the sum of $41,426.63 through August 25, 2010 and continuing to accrue at the rate of 10% per annum until paid, plus attorneys fees, foreclosure costs, and sums advanced by the beneficiary pursuant to the terms of said Trust Deed. WHEREFORE, notice is hereby given that the undersigned Successor Trustee will, on January 12, 2011, at the hour of 10:00 o'clock, A.M., in accordance with the standard of time established by ORS 187.110, on the front steps of the Deschutes County Courthouse, 1164 NW Bond, in the City of Bend, County of Deschutes, State of Oregon, which is the hour, date and place last set for the sale, sell at public auction to the highest bidder for cash the interest in the said described real property which the Grantor has or had power to convey at the time of the execution by Grantor of the said Deed of their respective successors in interest, if any. DATED: August 25, 2010 Chris Hatfield, OSB No. 872426 Successor Trustee Telephone: 541-317-5505 1000 1000 1000 Legal Notices Legal Notices Legal Notices LEGAL NOTICE TRUSTEE'S NOTICE OF SALE Pursuant to O.R.S. 86.705 et seq. and O.R.S. 79.5010, et seq. Trustee's Sale No. OR-AGF-109502 NOTICE TO BORROWER: YOU SHOULD BE AWARE THAT THE UNDERSIGNED IS ATTEMPTING TO COLLECT A DEBT AND THAT ANY INFORMATION OBTAINED WILL BE USED FOR THAT PURPOSE. Reference is made to that certain Deed of Trust made by, KENNETH J. CROSS AND SUSAN C. CROSS, as grantor, to AMERITITLE, as Trustee, in favor of AMERICAN GENERAL FINANCIAL SERVICES, INC., as beneficiary, dated 4/2/2003, recorded 4/4/2003, under Instrument No. 2003-22335, records of DESCHUTES County, OREGON. The beneficial interest under said Trust Deed and the obligations secured thereby are presently held by AMERICAN GENERAL FINANCIAL SERVICES, INC.. Said Trust Deed encumbers the following described real property situated in said county and state, to-wit: LOT THIRTY-SEVEN (37) AND THIRTY-EIGHT (38) IN BLOCK SEVENTY-TWO (72) OF DESCHUTES RIVER RECREATION HOMESITES, UNIT 6, PART II, DESCHUTES COUNTY, OREGON. The street address or other common designation, if any, of the real property described above is purported to be: 54600 CARIBOU DR. BEND, OR 97707 The undersigned Trustee disclaims any liability for any incorrectness of the above street address or other common designation.: Amount due as of October 22, 2010 Delinquent Payments from March 26, 2010 7 payments at $ 663.88 each $ 4,647.16 (03-26-10 through 10-22-10) Late Charges: $ 75.00 TOTAL: $ 4,722.16 FAILURE TO PAY INSTALLMENTS OF PRINCIPAL, INTEREST, IMPOUNDS AND LATE CHARGES WHICH BECAME DUE 3/26/2010 TOGETHER WITH ALL SUBSEQUENT INSTALLMENTS OF PRINCIPAL, INTEREST, IMPOUNDS, LATE CHARGES, FORECLOSURE FEES AND EXPENSES; ANY ADVANCES WHICH MAY HEREAFTER BE MADE; ALL OBLIGATIONS AND INDEBTEDNESSES AS THEY BECOME DUE AND CHARGES PURSUANT TO SAID NOTE AND DEED OF TRUST $40,940.80, PLUS interest thereon at 11.490% per annum from 2/26/2010, until paid, together with escrow advances, foreclosure costs, trustee fees, attorney fees, sums required for the protection of the property and additional sums secured by the Deed of Trust. WHEREFORE, notice hereby is given that the undersigned trustee, will on February 24, 2011,. Sale Information Line: 714-730-2727 or Website: DATED: 10/22/2010 LSI TITLE OF OREGON, LLC AS TRUSTEE By: Asset Foreclosure Services, Inc., as Agent for the Trustee 22837 Ventura Blvd., Suite 350 Woodland Hills, CA 91364 Phone: 877-237-7878 Sale Information Line: 714-730-2727 By: Norie Vergara, Sr. Trustee Sale Officer ASAP# 3787714 10/30/2010, 11/06/2010, 11/13/2010, 11/20/2010 For homes online THE BULLETIN | S AT U R D AY, N O V E M B E R 6 , 2 0 1 0 | ADVERTISING SECTION F Cascade View, RV Parking & 1/3 Acre New Homes Starting at $214,990 Located in SE Bend, this single-level, 3 bedroom, 2 bath, 2,086 sq. ft. custom home with designer inishes offers plenty of room with 1/3 acre, 3-car garage, workshop, RV parking and full RV hookup. Priced at $379,900, this movein ready home has craftsman features plus plenty of natural lighting and Cascade views. Open House: Sat., 124 p.m. From Reed Mkt, south on 15th, left on Ferguson, right on Ladera, left on Sky Harbor and right on Sedonia. For more, call Mike Gregory, Broker, at (541) 749-0830. TAFT DIRE LLC (541) 728-0033 / Paid Advertisement Discover Aspen Ridge on the Rim, a stellar community in Southwest Bend. This award-winning neighborhood features a central park, pool and pavilion. Hayden Homes continues it’s reputation of offering signature quality homes at an exceptional value. With five wellappointed home plans available, you're certain to find one to call your own. Directions: south on parkway, west on Powers Road, south on Brookswood Blvd, west on Montrose Pass. Find us on the web at for more information. ASPEN RIM - BEND 541-306-3085 Paid Advertisement Affordable Housing Outside of the Box Southeast Bend’s newest neighborhood gives more individuals the opportunity to own a home while putting others back to work. , by Susan Thomas Springer, for The Bulletin Advertising Department If you’re a buyer in today’s housing market hoping to find the perfect house at an affordable price, you may believe your prospects don’t seem too rosy. However, there’s a shining example of teamwork that is bringing 10 houses to the Bend market that are affordable and green. Government, nonprofit and for-profit have come together to develop the new Shady Pines subdivision in southeast Bend, and the result communities suffering from foreclosures and abandonment, NSP is providing qualified buyers with a $25,000 no-interest, no-payment loan which essentially lowers the sales price. “We are very excited to get the process going, get people back to work and meet a community need at the same time,” said COBA Executive Vice President Tim Knopp. The existing house has recently been listed by Taft Dire Real Estate Resources. It is a threebedroom, two-and-a-half-bath home packed with amenities. The 1,661 square-foot home is When the other nine homes are built and on the market, both contractors and buyers will benefit from the program as the lot is donated to the builder. The value is then passed on to the buyer. In addition, the program offers builders a zero-interest loan. “One of the problems in the market today is no money for construction loans,” said Knopp. The program essentially adds up to a $25,000 savings to qualified buyers. Knopp added that Building Partners creates several winners in the process since it gets con- and advantageous to build green homes,” said Knopp. Duffey pointed out that the NSP program can help “open doors” for buyers in Shady Pines and in other neighborhoods too. The program aids middle-income families. Duffey said it’s a good choice for buyers who don’t want to go through a short sale or foreclosure. “If you’re in the market for a $200,000 house and under, and qualify for the NSP program, it gives you the opportunity to buy $25,000 more house,” said Duffey. “We are very excited to get the process going, get people back to work and meet a community need at the same time.” benefits more than just the home buyers. Contractors, Realtors, and even taxpayers will feel the effects. Central Oregon Builders Association (COBA), with support from the City of Bend, formed a nonprofit called Building Partners for Affordable Housing which purchased the subdivision consisting of one finished house and nine lots. A federal program called The Neighborhood Stabilization Program (NSP) aids in keeping the homes priced low. Established to stabilize listed at $164,900 and features hardwood floors, granite countertops, a tile master bath, and a fenced and landscaped backyard on a corner lot. The house was built two years ago but was never lived in. Instead, it got caught in the downturn and was returned to the bank. Now a buyer qualified for the NSP program can purchase it for $139,900. “It’s one of those deals that you’d look back on and say it was a sweetheart of a deal,” said Taft Dire’s principal broker, Bill Duffey. tractors and subcontractors back to work and gets stalled property under construction once again. “It’s a win for the City and for city residents because you put real estate back on the tax rolls,” said Knopp. The new homes in Shady Pines will also be third-party certified for energy efficiency, so the financial advantages continue over time in the form of lower energy bills. “We want to demonstrate that it is possible The price range for the Shady Pines homes will range from $140,000 to $160,000. Building Partners will soon send out a Request for Proposal to find builders interested in building energy-efficient homes on the remaining lots. Building Partners will phase the construction and bring two homes to the market at a time. The existing house, located at 20071 Shady Pines Place on the corner of Parrell Road and Shady Pines Place, will be open to the public today from noon to 4 p.m. F2 Saturday, November 6, 2010 • THE BULLETIN31 Rentals 600 604 Storage Rentals 32’x34’ Shop w/2 roll-up doors, Between Redmond & Terrebonne, $400 per mo., taking applications, Please Call 541-548-6812 Condo / Townhomes For Rent Avail. now,unfurnished 1 bdrm. condo at Mt. Bachelor Village, W/S/G/elec, amenities, lower level, no smoking/pets $650+dep, 541-389-1741 TURN THE PAGE For More Ads The Bulletin A Westside Condo @ Fireside Lodge, 2 bdrm, 1 bath, $595/mo. Wood stove, W/S/G pd. W/D hookup 541-480-3393,541-610-7803 Long term townhomes/homes for rent in Eagle Crest. Appl. included, Spacious 2 & 3 bdrm., with garages, 541-504-7755. To place an ad call Classiied • 541-385-5809 631 634 636 Condo / Townhomes For Rent Apt./Multiplex NE Bend Apt./Multiplex NW Bend 1/2 Off First Full Month 1027 NE Kayak Lp. #1 3 bdrm/ 2 bath, basic appl., gas heat, gas fireplace, 1 car garage, no pets. $775+dep. With lease. Viking Property Management 541-416-0191 Westside Village Apts. 130 NE 6th 1 bdrm/ 1 bath, W/S/G paid, onsite laundry, no smkg or pets, close to Bend High. $495+dep. CR Property Management 541-318-1414 The Plaza in Bend Old Mill District OPEN HOUSE Sat. & Sun 10am to 4pm Now Leasing Call 541-743-1890 1st Mo. Free w/ 12 mo. lease Beautiful 2 bdrms in quiet complex, park-like setting, covered parking, w/d hookups, near St. Charles. $550$595/mo. 541-385-6928. 638 BEND PROPERTY MANAGEMENT 642 Spacious 1080 sq. ft. 2 bdrm. townhouses, 1.5 baths, W/D hookups, patio, fenced yard. NO PETS. W/S/G pd. Rent starts at $545 mo. 179 SW Hayes Ave. 541-382-0162; 541-420-2133 Country Terrace 61550 Brosterhous Rd. All appliances, storage, on-site coin-op laundry BEND PROPERTY MANAGEMENT 541-382-7727 4-plex SW Redmond 2 bdrm 2 Bath, all kitchen appl., W/D hkups, garage, fenced yard. w/s/g pd. $650 mo + dep. Pet negotiable 541-388-8203 642 Apt./Multiplex SE Bend 2 Bdrm. in 4-Plex, 1 bath, all kitchen appl., W/D hookups, storage, deck, W/S paid, $600 +dep. no pets,541-480-4824 1 Mo. Free Option. 642 638 BEND PROPERTY MANAGEMENT 632 2 BDRM, $495 1459 NW Albany * 3 bdrm, $610 * Coin-op laundry. W/S/G paid, cat or small dog OK with dep. Call 382-7727 or 388-3113. 719 SE Centennial 2 bdrm, all appliances, w/d hook-up, woodstove, fenced yard, single garage, cat ok $575. 541-382-7727 640 Apt./Multiplex SE Bend Apt./Multiplex SW Bend Apt./Multiplex Redmond Apt./Multiplex Redmond Apt./Multiplex Redmond 640 Apt./Multiplex SW Bend 1104 NW 7th St., #22, 1 20070 Beth Ave. #2 Old Mill 2 bdrm, 2.5 bath, all appliances including w/d, gas heat, garage, irrigation/ water/sewer pd. Cat ok $695. 541-382-7727 BEND PROPERTY MANAGEMENT 61368 SW Sally Lane, 3/2.5 duplex, W/D, garage, mtn. views. No pets or smoking $795 (1st mo. 1/2 off), W/S/yard pd. 541-419-6500 Bdrm., 1 bath, $425, no credit checks, 1st & last only, avail. 10/1, please call 541-788-3480. 1st Month Free w/ 6 mo. lease! 2 bdrm., 1 bath, $550 mo. includes storage unit & carport. Close to schools, parks & shopping. On-site laundry, no-smoking units, dog run. Pet Friendly. OBSIDIAN APARTMENTS 541-923-1907 A Large 1 bdrm. cottage. In quiet 6-plex in old Redmond, SW Canyon/Antler. Hardwoods, W/D. References. $550+utils. 541-420-7613 541-322-7253 Autumn Specials Are Here! Chaparral & Rimrock Apartments Clean, energy efficient nonsmoking units, w/patios, 2 on-site laundry rooms, storage units available. Close to schools, pools, skateboard park, ball field, shopping center and tennis courts. Pet friendly with new large dog run, some large breeds okay with mgr. approval. 244 SW RIMROCK WAY Chaparral, 541-923-5008 Rimrock, 541-548-2198 Like New Duplex. Nice neighborhood. 2 bdrm., 2 bath, 1-car garage, fenced yard, central heat, fully landscaped, $675+dep. 541-545-1825. Apt./Multiplex General The Bulletin is now offering a MORE AFFORDABLE Rental rate! If you have a home or apt. to rent, call a Bulletin Classified Rep. to get the new rates and get your ad started ASAP! 541-385-5809 20940 Royal Oak Circl. Unit B 1 bdrm/ 1 bath attached apt. Furnished or unfurnished avail. kitchen, private ent. all utlts pd. no pets. $595+dep. CR Property Management 541-318-1414 634 Avail. Now, Beautiful 2 bdrm., 1 bath w/view in tri-plex., W/D hookup, 1 car garage, W/S paid, no pets/smoking, $625/mo., 541-508-1097. Apt./Multiplex NE Bend Alpine Meadows $675, 2 bdrm, 1½ bath ½ off 1st Mo. Rent ** Pick your Special ** 541-330-0719 2 bdrm, 1 bath as low as $495 Professionally managed by Norris & Stevens, Inc. Carports & Heat Pumps. Pet Friendly & No App. Fee! 1026 NE Rambling #1 2 bdrm, all appl. + micro, w/d hook-ups, gas heat/ fireplace, garage, landscaping incl., small pet ok. $695. 541-382-7727 Fox Hollow Apts. (541) 383-3152 Cascade Rental Mgmt. Co. BEND PROPERTY MANAGEMENT $99 MOVES YOU IN !!! 1070 NE Purcell #2 $200 off first month! 1 bdrm, all appliances, gas heat/fireplace, garage, w/d. W/S paid. $575. 541-382-7727 BEND PROPERTY MANAGEMENT Limited numbers available 1, 2 and 3 bdrms. W/D hookups, patios or decks, Mountain Glen, 541-383-9313 Professionally managed by Norris & Stevens, Inc. Newly painted 2 Bdrm 1 bath in triplex, gas stove, private yard, plenty of parking space, no smoking; cat OK. $520/ mo + deposit. 541-419-4520 636 Have an item to sell quick? If it’s under $500 you can place it in The Bulletin Classiieds for $ 10 - 3 lines, 7 days $ 16 - 3 lines, 14 days Apt./Multiplex NW Bend (Private Party ads only) 1 Month Rent Free 1550 NW Milwaukee. W/D included! $595/mo. Large 2 Bdrm, 1 Bath, Gas heat. W/S/G Pd. No Pets. Call us at 382-3678 or Visit us at Comfy furnished studio., all util. included, indoor pool, no pets, ref. and credit check, $495, 1st, last and $300 dep. 541-382-3672 leave msg. 1085 NE Purcell - Pilot Butte Village 55+ Community 2 bdrm rentals @$850, in hospital district. 541-388-1239 Quiet 2 bdrm, new windows, W/G/S/Cable paid, laundry on-site, cat OK, $575/mo, $500 dep., 541-383-2430 or 541-389-9867. 1/2 OFF 1ST MO! 2 bdrm., 1 bath in 4-plex near hospital. Laundry, storage, yard, deck, W/S/G paid. $600+dep. No dogs. 541-318-1973. Small studio close to downtown and Old Mill. $450 mo., dep. $425, all util. paid. no pets. 541-330-9769 or 541-480-7870. 630 Rooms for Rent Mt. Bachelor Motel has rooms, starting at $150/wk. or $35/night. Includes guest laundry, cable & WiFi. Bend 541-382-6365 JUST REDUCED SAT & SUN 1-3PM • Gated community-pool • Spotless-1716 sq. ft. • 3 bedroom, 2 bath • Single level • Open floor plan • Huge vaults • Gas FA heating and AC • Private backyard • Low maintenance • Mtn. View Park SATURDAY 12-3 2375 NE Buckwheat Court Directions: Hwy. 20 East to 27th, left on 27th past Neff to Rosemary. Left at Rosemary to last street in park. PRICED TO SELL! $147,500 Listed by: MARILYN ROHALY Broker 541-322-9954 WESTSIDE - DOWNTOWN AREA Bend, Oregon 3 bedroom, 2-1/2 bath home with hardwood floors, granite kitchen, tile bath, AC, new carpet, 455 NW Saginaw huge deck PLUS Directions: Go west on Portland or attached 1 bedroom Newport from Wall, take a right on 5th apartment rents for St., right on Saginaw, house on the right. $775.00. 2184 sq. ft. $379,900 Hosted by: CHRIS AHERN Broker G B 541-728-1281 G O B E N D R E A LT Y C e nt ra l O r e g o n Re a l E s t a t e To place an ad call Classiied • 541-385-5809 THE BULLETIN • Saturday, November 6, 2010 F3 642 650 654 656 658 687 Apt./Multiplex Redmond Houses for Rent NE Bend Houses for Rent SE Bend Houses for Rent SW Bend Houses for Rent Redmond Commercial for Rent/Lease 20371 Rocca Way 3 bdrm, 2½ bath, 1675 sq. ft. gas fireplace, fenced yard, pets ok! $995 541-382-7727 $925: 2 bdrm, 1 bath log home, 19427 Kemple Dr., west side location, $250 cleaning dep., call 503-860-2824. 834 NE Modoc Ct. 1944½ NW 2nd St Need storage or a craft studio? 570 sq. ft. garage, w/ Alley Access, Wired, Sheetrocked, Insulated, Wood or Electric Heat. $275. Call 541-382-7727 Newer Duplex, 2/2 wood floors, granite counters, back deck, garage, W/D hookup, quiet st., 2025 NW Elm, $625. 541-815-0688. TRI-PLEX, 2 bdrm., 2 bath, garage, 1130 sq.ft., W/D, new paint & carpet, w/s/g pd., $600 mo. + $650 security dep., 541-604-0338. 648 Houses for Rent General BEND RENTALS • Starting at $450. Furnished also avail. For virtual tours & pics apm@riousa.com 541-385-0844 Cozy 2+2, dbl. garage, w/decks, lots of windows, wood stove & gas heat, all appl. incl. W/D, near Lodge $775, 541-617-5787 CROOKED RIVER RANCH $675 2/2 Views! 1 Acre, single garage w/ opener, w/d hookups, deck, fence. 8797 Sand Ridge Rd. $750 2/2 Views, 1.5 acres, pellet w/d, loft, large deck, 12599 SW Spur Pl. Houses for Rent NE Bend BEND PROPERTY MANAGEMENT 1435 NE Boston 3 bdrm/ 2 bath, private yard, gas frplce, all kitchen appl incld small pet neg. $895+dep. CR Property Management 541-318-1414 2875, 2883, & 2903 Jackdaw, Bend Call 4 Pricing!! 2 Exciting Floor plans. Near Forum Shops. Fully appli. kitchen. Pets OK! 7 Days a week• 389-2486 3 Bdrm, 1 bath, 1092 sq.ft., wood stove, newer carpet, vinyl, fenced yard, single garage, $825/mo. 541-480-3393,541-610-7803 656 Houses for Rent NW Bend Houses for Rent SW Bend 1700 NW 9th Street #3 $1,200/Fully Furnished! Beautiful 2/2 near COCC. Dbl car garage, fully appli. kitchen, W/D, W/S/Yard included! 19964 Ashwood Dr. What are you looking for? You’ll find it in The Bulletin Classifieds 541-385-5809 When buying a home, 83% of Central Oregonians turn to call Classified 385-5809 to place your Real Estate ad $795 3 bedroom / 2 bath, newly remodeled, 2-car garage, gas fireplace, open floor plan, gas stove, built in microwave, ceiling fan, large yard with patio. ABOVE & BEYOND PROP MGMT - 541-389-8558 Houses for Rent Redmond 1018 NW Birch Ave. 2 bdrm/ 1 bath, 720 sq ft. house,located on large lot, close to dwntwn. Pets neg. $550+dep. CR Property Management 541-318-1414 7 Days a week• 389-2486 61717 NW Metolius, Bend $1,900/Furnished•$1,400/ Unfurnished - 3/3.5, W/D incl., Gas Fireplace, Patio!! 7 Days a week• 389-2486 61875 NW Broken Top #22B & #30A, Bend Starting at $495/mo. 2 Furnished Options. High-end units! W/D incl. Biking trails. BEND PROPERTY MANAGEMENT Beautifully furnished (or unfurnished) 6 bdrm, 3 bath, NW Crossing, $2695, incl. cable, internet, garbage, lawn care; min 6 mo lease. 541-944-3063 CLEAN, small 2 bedroom. Large yard, wood heat. $675 + last + dep., Local ref., no pets. 1015 NW Ogden. FABULOUS 3500 sq. ft. 5 bdrm, 3 bath home in great neighborhood, fenced yard. $1850 +$500 security deposit. Avail. 11/10. 541-749-0724. Great NW Location! Exquisite, Studio cottage, short walk to downtown, river & Old Mill, pet? $575 Avail. 12/1, 503-729-3424 . 827 Business Way, Bend 30¢/sq ft; 1st mo + $200 dep Paula, 541-678-1404 693 Just bought a new boat? Sell your old one in the classiieds! Ask about our Super Seller rates! 541-385-5809 To Subscribe call 541-385-5800 or go to 3 Bdrm 2 bath, 1.15 ac. 800 sq ft shop/4-car garage, utilities furnished except elec. $995/mo + $750 sec dep. 541-228-5131; 541 517-4345 3 bdrm, 2 bath, all appliances, A/C, w/d hook-up, oversized dbl garage w/attached workshop, storage, RV Parking, carport, Lrg. Deck $850 mo. 541-382-7727 BEND PROPERTY MANAGEMENT 61284 Kristen St. 3 bdrm/ 2.5 bath, 1613 sq. ft., gas heat and fireplace, dbl garage, dogs neg. $1095+dep. CR Property Management 541-318-1414 Advertise your car! Add A Picture! Reach thousands of readers! Call 541-385-5809 The Bulletin Classifieds $650 2/2 w/d hookups, central air, wood stove, soaking tub! RV parking. 4041 NE Upas Ave $675 3/2 w/d hookups, family room, fenced, deck, sheds 3125 SW Pumice Ave $695 3/1.5, new paint, single garage, w/d hookups, oil heat. 915 SW Dogwood Ave $725 3/2, dbl. garage w/opener, w/d hookups, bonus room, shed, fenced. 2236 SW 34th St. $775 3/2, double garage w/ opener, w/d hookups, breakfast bar, patio, fenced 1748 SW Kalama Ave $795 3/2.5 double garage w/opener, w/d, gas fireplace, fenced, yard maint 2885 SW Indian Circle $895 4/2 single garage, w/d hookups, wood fireplace, formal dining, deck, fenced 458 SW 12th St $1300 5/3 - Move-In Special Nov. Rent Free! Views, 3 car garage w/ opener, w/d hookups, deck, fenced, sprinkler system, 2855 SW 49th St $1350 3/2 - $200 off 1st month, views, .5 acre lot, dbl garage, large deck! 2345 Linnet Ln 541-923-8222 335 NE Greenwood Ave. Prime retail/office space, Greenwood frontage, 1147 sq. ft., ample parking, includes w/s. $1200 mo. 541-382-7727 A Beautiful 3 bdrm, 2.5 bath duplex in Canyon Rim Village, Redmond, all appliances, includes gardener. $795 mo. 541-408-0877. BEND PROPERTY MANAGEMENT 659 The Bulletin 541-385-5809 Ofice/Retail Space for Rent Houses for Rent Sunriver VILLAGE PROPERTIES Sunriver, Three Rivers, La Pine. Great Selection. Prices range from $425 - $2000/mo. View our full inventory online at Village-Properties.com 1-866-931-1061 347 NE Greenwood Ave. 400 sq. ft. office space, private entrance & restroom, 3 small offices + reception area, ample parking, includes water/sewer/ electric. $500! 541-382-7727 BEND PROPERTY MANAGEMENT 664 Houses for Rent Furnished RIVERFRONT: walls of windows with amazing 180 degree river view with dock, canoe. piano, bikes, covered BBQ, $1450. 541-593-1414 An Office with bath, various sizes and locations from $250 per month, including utilities. 541-317-8717 Downtown Redmond Retail/Office space, 947 sq ft. $650/mo + utils; $650 security deposit. 425 SW Sixth St. Call Norb, 541-420-9848 671 Mobile/Mfd. for Rent On 10 acres, between Sisters & Bend, 3 Bdrm., 2 bath, 1484 sq.ft., mfd., family room w/ wood stove, all new carpet & paint, + 1800 sq.ft. shop, fenced for horses, $1295, 541-480-3393,541-610-7803 541-389-7910 105 NW Greeley Avenue • Bend, OR 97701 www. hunterproperties.info LAWNAE HUNTER, Principal Broker/Owner E US HO 4 PM EN 1OP AT. S Great NW location! Cute 3 bdrm., 1 bath, tile & hardwood, attached carport, fenced yard, dog okay, $900/mo. 541-389-5408 Office / Warehouse space • 1792 sq ft The Bulletin offers a LOWER, MORE AFFORDABLE Rental rate! If you have a home to rent, call a Bulletin Classified Rep. to get the new rates and get your ad started ASAP! 541-385-5809 People Look for Information About Products and Services Every Day through 4/2 Mfd 1605 sq.ft., family room, w/woodstove, new carpet/paint, single garage w/opener. $850/mo. 541-480-3393,541-610-7803 $750. Ideal for someone needing add’l parking/storage. 3 bdrm mfd home, O/S garage, huge yard, greenhouse. Full size laundry, bonus rm, decks front & back. ABOVE & BEYOND PROP MGMT - 541-389-8558 61154 Chuckanut 7 Days a week• 389-2486 63842 Johnson Rd. Country Home! 3 bdrm 3 bath house, 3500+ sq. ft., all appliances, family room, office, triple garage, 2 woodstoves, sunroom, lrg. utility room including w/d, pantry, landscaping maintained, pet OK. $3000 mo. 541-382-7727 Light Industrial, various sizes, North and South Bend locations, office w/bath from $400/mo. 541-317-8717 Look at: Bendhomes.com for Complete Listings of Area Real Estate for Sale Cozy 3 Bdrm, 2 bath, 2-car garage, close to hospital, shopping, Mtn View HS. Available now, no smkg or pets. $850/ mo, 1yr lease. 541-923-7453 925 NW Poplar Ave. The Bulletin Classifieds 652 1131 NE Locksley 3 bdrm, 2½ bath, bonus room, gas heat/fireplace, fenced yard, 1798 sq. ft., dbl. garage, extra storage, pet cons. $1095. 541-382-7727 20422 Bullblock 4 bdrm, 2 bath, all appliances, family room, large decks, 2000 sq. ft., dbl. garage, landscaping maintained. $995 mo. 541-382-7727 BEND PROPERTY MANAGEMENT 658 61166 Larkspur Loop - Cute 3 Bdrm 2 bath, fenced yd, dbl garage, 1100 sq ft, 1 yr lease, $850/mo + $800 dep; $200 off 1st month. 541-389-9303 541-923-8222 650 Need help ixing stuff around the house? Call A Service Professional and ind the help you need. The Bulletin is now offering a LOWER, MORE AFFORDABLE Rental rate! If you have a home to rent, call a Bulletin Classified Rep. to get the new rates and get your ad started ASAP! 541-385-5809 Call The Bulletin At 541-385-5809. Place Your Ad Or E-Mail At: BEND PROPERTY MANAGEMENT Powell Butte, taking applications for a lovely, quiet country home with wood stove, elec. heat. Will be avail in Dec. 541-447-6068 TERREBONNE $895 3/2 - Move In Special! 1st month rent $495. Views! dbl garage, w/d hookups, deck, fenced, 1423 Barberry BEND PROPERTY MANAGEMENT Newer, 2 bdrm., 2 bath, MFG home w/2 car garage. appl. & heat pump. 1260 sq.ft. Yard w/sprinkler system, corner lot. One pet possible on approval and dep. Quiet neighborhood. $850 mo.+ dep. Call (503) 803-4718 E US M O P H EN 1-4 OP AT. S 2307 NE BUCKWHEAT COURT 2891 NE JACKDAW $169,900 $132,900 Gated Community! Beautifully maintained, 1872 sq. ft. 3 bdrm, 2 bath SUZANNE STEPHENSON, BROKER 541-848-0506 Excellent Value! Perfect opportunity for first-time home buyers or investors. AARON BALLWEBER, BROKER 541-728-4499 GREAT WEST SIDE location, $895. 2 bdrm/2 bath home, separate 2-car garage, house totally restored. W/D. Call 831-901-9020. Older 1 Bdrm cottage, garage, large yard, no pets, washer & dryer incl, refs & credit check, $525, 1st/last/dep. 541-382-3672 leave msg. Find exactly what you are looking for in the CLASSIFIEDS 654 Houses for Rent SE Bend $319,900 Traditional Sale! Immaculate & move-in ready. Upgrades throughout and access to trails AARON BALLWEBER, BROKER 541-728-4499 $468,000 An Exceptional Custom Home! .72 acre lot; 3 bdrm/2 bath. High-end finishes include slab granite, custom wood trim and beautifully landscaped. 2,500 sq. ft. RV and shop. MIKE EVERIDGE, BROKER 541-390-0098 20336 Donkey Sled Rd $900. Large 2 bdrm, 2 bath w/ bonus rm, 2nd fairway, Bend Country Club. Furnished, W & D, pool table, 2-car garage, all yard work done for you! 6 month rental only. ABOVE & BEYOND PROP MGMT - 541-389-8558 COMPUTERIZED PROPERTY MANAGEMENT 541-382-0053 •Cute Apt. in Central Location - 1 bdrm/1 bath with private fenced back yard & patio. No pets. $425 incl. w/s/g •Close to Pioneer Park - NW Side. Private 2 Bdrm/1 bath Upstairs Apt. w/Balcony. On-Site Laundry. Off Street Parking. $495/mo. Includes w/s/g •1/2 Off Move-in Rent! Spacious Hillside Apt. Floor-level with balcony & fireplace. 2 bdrm/1 bath. Laundry facilities on site. Central Location. $495 includes w/s/g & Basic Cable. •Spacious 2 bdrm/1 bath apts. Off-street parking. Nice shade trees. On site laundry. Near hospital. $525 includes w/s/g • Near Old Mill Dist. - Spacious 2 bdrm/1bath upstairs unit w/balcony. On-site laundry. $525 mo. incl.CABLE + w/s/g • Great Older Duplex in NW - 2 bdrm/1 bath on Large lot. Private back yard. New carpets & paint plus. Single garage & W/D hookups. Pets? $550 w/ s included. • Furnished Mt. Bachelor Condo - 1 Bdrm/1 bath + Murphy bed. $550 includes WST/wireless • Cheerful SE Townhome - Vaulted ceilings, 2 bdrm/2 bath. W/D included. No Pets. $550 w/s Included. • Charming, cozy 2 bdrm/1bath cottage in central location. Fenced backyard. Country kitchen. $625 per month. • Adorable 2 brdm/1 bath at end of Wells Acres. Huge fenced yard, single garage. Laundry area. $725 mo. • Sweet Cedar Creek Condo - 2 master suites + ½ bath downstairs. W/D included. Huge kitchen and dbl. garage. Wood burning fireplace. Small pets only. $750 includes WST. • LOVELY 1408 sq. ft. Home in Nottingham Square. 2 bdrm/2 bath + office. Lrg. kitchen. Wood stove. End of road in park-like setting. Dbl. garage. Laundry room. $775 mo. • Cheerful, bright 3 bdrm/2 bath, 1500 sq. ft.+ SW Home. Large living room with gas fireplace, GFA. Double garage. Small fenced backyard. $875 mo. • Sun Meadow. 3 bedroom, 2.5 bath. With media room downstairs and extra space upstairs. Garage and access to community pool. $1025 mo. •Unique Combination - Nice NE home off Boyd Acres on corner lot. 3 bdrm, 2 bath home PLUS 2 bdrm, 1 bath apt. above garage. 2775 sq. ft. Total. Whole Pkg is $1800. Various options available. Prefer no pets. ***** FOR ADD’L PROPERTIES ***** CALL 541-382-0053 or See Website $139,000 $139,900 Not a Short Sale! Immaculate & move-in ready MIKE EVERIDGE, BROKER 541-390-0098 Just Reduced! Nice Southside location! Corner lot; perfect for first time home buyer or investor. AARON BALLWEBER, BROKER 541-728-4499 $105,000 Just Reduced! Corner lot & a great home for first time home buyers or investors. SUSAN PITARRO, BROKER 541-410-8084 $79,000 Perfect Hide Away! Large lot offers beautiful landscape, backs up to BLM, perfect for horses, corrals in place, outbuildings on property. MIKE EVERIDGE, BROKER 541-390-0098 Lots & Land LAWNAE HUNTER, PRINCIPAL BROKER, 541-550-8635 $327,900 - 22 Improved lots; Ready to build. $140,000 - 7 contiguous lots; utilities in; Priced to sell! $599,000 - 13.4 acres; Residential; utilities in. $751,100 - 29 fully approved lots; Ready to build! $239,500 - Retail & mixed use; Sisters $1,560,000 - 39 fully approved Westside lots; Ready to build! $20,000 - Lot 1; Excellent Opportunity; utilities in. $112,000 - 7 Lots fully approved. Nice established neighborhood! What is a Short Sale? A short sale is a sale from seller (owner) to buyer that the Lenders agree to take a pay-off less than the existing loan amount. Owners benefit by avoiding a foreclosure on their credit, lenders get the house sold & the buyer generally receives a home that has been occupied & may be in better shape than a foreclosure home. There are many advantages to a Short Sale for all parties. Hunter Properties Brokers have a very high closing rate in this type of a sale. Call for Details! 541-389-7910 F4 Saturday, November 6, 2010 • THE BULLETIN To place an ad call Classiied • Classiied • 541-385-5809 Real Estate For Sale 700 745 745 755 773 775 Homes for Sale Homes for Sale Sunriver/La Pine Homes Acreages Bid Now! *** CHECK YOUR AD STICK-BUILT 1 bedroom house on an acre for sale in La Pine. Only $72,5000. 541-536-9221. 10 Acres,7 mi. E. of Costco, quiet, secluded, at end of road, power at property line, water near by, $250,000 OWC 541-617-0613 Manufactured/ Mobile Homes FIND IT! BUY IT! SELL IT! *20-ACRE Foreclosures* $99/month*, $0-Down, $12,900, GREAT DEAL! Near El Paso, Texas. Owner Financing, No Credit Checks. Money Back Guarantee. Free Map/Pictures. 800-343-9444. Buy New...Buy Local 705 Real Estate Services * Real Estate Agents * * Appraisers * * Home Inspectors * Etc. The Real Estate Services classification is the perfect place to reach prospective B U Y E R S AND SELLERS of real estate in Central Oregon. To place an ad call 385-5809 THE BULLETIN • Saturday, November 6, 2010 F5 You Can Bid On: Premium Storage Building 10'x10' with Peaked Roof, $5,375 Value at HiLine Homes (Bidding exp. Nov. 14, at 8pm) Bid Now! Buy New...Buy Local The Bulletin Classified *** The Bulletin Classiieds 763 Recreational Homes and Property Lots Exceptional Investment 1+ acre in Bend: $65,000 Property Zoned RM. **Bids Due Nov 10th!** Call Steve: 503.986.3638 HUGE price reduction! Cascade views, 2.2 acres. Water hookup pd.; septic approved. $99,900. Sonnie Grossman & Assoc., 541-388-2159. Steelhead, Bass, 26” Catfish! Bear, Deer, Elk, Pheasants! 16 acres prime riverfront! 1000 sq. ft. cabin. $249,000. 541-934-2091. NEW HOME at 745 Homes for Sale. Bid Now! Buy New...Buy Local You Can Bid On: $1000 Gift Certificate Toward Lennox System at Mountain View Heating (Bidding exp. Nov. 14, at 8pm) (Bidding exp. Nov. 14, at 8pm) 771 The Only Address to Remember for Central Oregon Real Estate 748 Northeast Bend Homes A Nice 3 Bdrm., 2 bath, 1128 sq.ft., all new carpet, pad & inside paint,fenced yard, heat pump., dbl. garage, quiet cul-de-sac, only $112,900, Randy Schoning, Broker, John L Scott, 541-480-3393 Bid Now! Buy New...Buy Local You Can Bid On: Hardwood or Laminate Flooring Material, $1000 Value at Carpetco Flooring (Bidding exp. Nov. 14, at 8pm) Bid Now! Buy New...Buy Local You Can Bid On: $150 Cooking Class for Two People at Allyson's Kitchen 20114 Carson Creek, Bend. 3 bdrms, 2.5 bath, 1488 sq. ft., corner lot. Will consider trades. Call 541-480-7752. Price $159,900 You Can Bid On: Oreck Little Hero Canister Vacuum and Car Vac Combo Pack, $189.99 Value at Oreck (Bidding exp. Nov. 14, at 8pm) FARM FOR SALE! Vale, OR. 151 acres irrigated land w/150 acres dry hillside pasture. 4 Bdrm home, outbuildings & corrals. Irrigation well & 1884 water rights from creek. Near Bullycreek Reservoir w/fishing, boating & camping. Area known for pheasant, quail & chukkar hunting; deer & elk hunting nearby. Shown by appt only! $1,250,000. 1-208-466-8510. North Fork John Day River 749 Southeast Bend Homes 3 Bdrm., 1.75 bath, 1736 sq. ft., living room w/ wood stove, family room w/ pellet stove, dbl. garage, on a big, fenced .50 acre lot, $159,900. Randy Schoning, Broker, Owner, John L. Scott. 541-480-3393. 750 Redmond Homes Get 3 lines, 4 days for $17.50. To place an ad, call 541-385-5809 14x50 2 bdrm, 2 bath sgl. wide in park. Super Good Cents package, drywall, vaulted ceiling, good condition, $15,000. 541-306-7951. MOVE IN TODAY! 2/1 $9999; 2/2, $13,000; 3/2 $12,357. Financing avail. w/ good credit. 2002 14x56, $13,782 cash.John,541-350-1782 F6 Saturday, November 6, 2010 • THE BULLETIN To place an ad call Classiied • 541-385-5809 COLDWELL BANKER MORRIS REAL ESTATE 541-382-4123 Bend, OR 97702 REALTOR For Lease-Prime Location Rivers Edge Village | $99,000 Close Mill District | $120,000 NE Bend | $127,500 BG&CC Lots | $130,000 SA O P T. EN 11 -2 NW Bend | $359,500 486 SW Bluff Dr. 1330 – 7500 sq. ft. available. Street front, corner of Reed Market & 3rd St. High traffic volume, great visibility & ample parking. $.75 - $1.50 per sq. ft. MONTH TO MONTH LEASE AVAILABLE. MLS#201007645 Enjoy the sunrise from this large east facing view lot. Some City, Smith Rock and southern views. Almost 1/4 acre and reduced to $99,000! MLS#201008710 Woodriver Village is the location of this lot which is .40 of an acre and you could subdivide into 3 lots. Just south of Farewell Bend Park and the Deschutes River. Great location, close to the Old Mill. MLS#201005580 Classic ranch style home conveniently located close to schools and shopping. Home has previously been used as a daycare and includes a large family room with an adjacent 4th bedroom. MLS#201008722 Two almost 1/2 acre level golf course homesites in Timber Ridge on the Bend Golf and Country Club golf course. Paved path to BG&CC clubhouse. BG&CC is a memberowned equity club. Each lot $130,000. MLS#2900979 SYDNE ANDERSON, Broker, CRS, WCR 541-420-1111 LISA CAMPBELL, Broker 541-419-8900 DICK HODGE, Broker 541-383-4335 ROOKIE DICKENS, Broker, GRI, CRS, ABR 541-815-0436 WENDY ADKISSON, Broker 541-383-4337 CRAIG SMITH, Broker 541-322-2417 SE Bend | $135,000 NE Bend | $139,000 Mountain Views on Acreage | $150,000 NE Bend | $170,000 La Pine | $175,000 SE Bend | $199,000 Back on the market and ready to go! 1-story home with huge great room, open kitchen, gas fireplace, lovely master suite & large fenced yard on corner lot. Great location near shopping. MLS#2906378 Bright and affordable with 4 bedrooms plus family room. Large windows bring in the sunlight while refinished wood floors, fresh carpet and paint invite you to make this your home. MLS#2910497 Cascade Mountain and Smith Rock views from this 6.64 acre lot at a great price. Very private, treed lot in area of fine homes. Just 2 blocks to the Deschutes River and backs to 120 acres of BLM land. MLS#2905812 Enjoy the peaceful surroundings of this home on over 4 acres in Alfalfa. Fenced for horses with a small barn/shelter. This home has an open floor plan and beautiful mountain views. MLS#201009260 3 bedroom, 2 bath, 1536 sq. ft. home located on .97 of an acre. Immaculately maintained. 30 x 24 shop and park-like setting. MLS#201009050 Sweet single level, vaulted ceilings, great room. Skylights, new wood stove, sun room. Cul-de-sac, private fenced backyard, access to trail. 3 bedroom, 2 bath. Great location, owner owned. MLS#201009585 DIANE LOZITO, Broker 541-548-3598 DARRYL DOSER, Broker, CRS 541-383-4334 RAY BACHMAN, Broker, GRI 541-408-0696 CATHY DEL NERO, Broker 541-410-5280 LI NE ST W IN G 1 owner immaculate home is a real showpiece! Spacious livable floor plan. Bonus room upstairs, main floor master, storage galore, over sized 2-car garage & beautifully landscaped. MLS#201008720 Directions: NW Awbrey Rd. to Greyhawk. 526 NW Greyhawk LYNNE CONNELLEY, EcoBroker, ABR, CRS JOY HELFRICH, Broker, e-Pro, GRI, GREEN 541-408-6720 541-480-6808 5 Acres/NE Bend | $219,000 SE Bend | $229,900 Mountain High | $259,000 Orion Estates | $269,000 Downtown Bend | $275,000 Single level home, attractive vaults & open space. Gas fireplace in living room. Inviting kitchen & family room, cozy den, gas heating & A/C. Fabulous landscaping, charming front porch, quiet cul-de-sac. MLS#201007450 Mini ranch, pastoral setting with pond, mountain views, electric perimeter fencing & cross fenced. 3.75 irrigated acres. Set up for animals. Shop + additional garage. Mountain views. 1400 sq. ft. home. MLS#201006611 Single level, lovely southern exposure, open vaulted living area, gas fireplace, gas forced air and central AC. Convenient kitchen, separate utility room and under house storage. Landscaped .18 of an acre lot. MLS#201007013 Easy Living on the Fairway! Private, peaceful setting in gated community with Golf Course Views on beautifully treed lot. Single level, 2 Bedroom + Den, 2 Bath. MLS#201001975 Single level home in SE Bend. .49 of an acre lot, fenced, landscaped, well maintained with large deck and many trees. Private setting on a cul-de-sac. Open floor plan, 3 bedroom, 2 bath, 1807 sq. ft. MLS#201009096 One bedroom, 1184 sq. ft. condo on the 5th floor of the Franklin Crossing building. Top quality finishes, parking space and storage. Water, sewer and garbage included in the HOA dues. MLS#201009649 JIM & ROXANNE CHENEY, Brokers 541-390-4030 • 541-390-4050 DOROTHY OLSEN, Broker, CRS, GRI 541-330-8498 SHERRY PERRIGAN, Broker 541-410-4938 JANE STRELL, Broker 541-948-7998 DAVE DUNN, Broker 541-390-8465 SHELLY HUMMEL, Broker, CRS, GRI, CHMS 541-383-4361 Widgi Creek | $310,000 NW Bend | $325,000 Sunriver | $334,900 PRNE IC W E NE Bend | $210,000 West Ridge | $269,500 King’s Forest | $300,000 SA OP T. EN 12 -3 RE PRI DU CE CE D NE Bend | $147,500 Perfect condition 2 bedroom, 2 bath home with Ponderosa Pines & peek-a-boo mountain views. No maintenance, large private lot. New interior & exterior paint, carpet, electrical, plumbing. MLS#201008580 61575 West Ridge Nice 4 Bedroom, 2.75 Bath, 3200+ sq. ft. great room plan. Master bedroom on main level. Upstairs 20'x30' bonus room, loft, bedroom, bath & office. 4-car tandem garage, RV parking, flat backyard, 1/2 acre. MLS#201008568 Immaculate townhome on the way to Mt. Bachelor. River trails, golf course, tennis courts, swimming pool and more. Turnkey -price includes all contents. Great investment. MLS#201008990 Unbeatable downtown, riverfront location! Single level condo right on the Deschutes River and 1 block to Downtown. Gas fireplace, large deck off kitchen. Single car attached garage. MLS#2901699 You must see this classic Sunriver vacation home. One story, 3 bedrooms, 2 baths, hot tub, fully furnished and convenient to everything! Cute, Cute, Cute! Call Jack Johns at 541-480-9300. MLS#201007949 GREG FLOYD, P.C., Broker 541-390-5349 MARY STRONG, Broker, MBA 541-728-7905 BILL PORTER, Broker 541-383-4342 JACKIE FRENCH, Broker 541-312-7260 MARK VALCESCHINI, P.C., Broker, CRS, GRI 541-383-4364 JACK JOHNS, Broker, GRI 541-480-9300 SW Bend | $379,500 Wonderful West Hills Home | $389,000 NE Redmond | $399,900 Full Cascade Mountain Views | $425,000 LI NE ST W IN G NW Crossing | $339,000 Broken Top Lot | $376,500 RE PR DU ICE CE D 3 bedrooms, 2 bath, light & bright interior, beautiful large fenced backyard with newer wood deck. Seller will contribute $2,500 towards buyer’s closing costs. Hosted by Becky Brunoe 541-350-4772 MLS#201008333 Directions: East on Butler Mkt., south on Stonebrook 3054 Stonebrook SCOTT HUGGIN, Broker, GRI 541-322-1500 MARTHA GERLICHER, Broker 541-408-4332 3 bedroom, 2.5 bath, 2481 sq. ft. Westside 3 bedroom, 1.75 bath, 1952 sq. ft. Large 18.3 acres with Cascade Mt. views. Shop/ south facing .29 of an acre lot. Beautiful home close to river & recreation trails. garage, kitchen has granite counters and Hardwood floors, stainless steel kitchen landscaping & decks. Great living spaces, wood floors, bathrooms with marble, tile vaulted ceilings & large windows. appliances. Cascade Mountain views, and slate. Large family room with lots of Location is Key! vaulted ceilings & large master suite. windows & big deck to enjoy the views. MLS#201006837 MLS#2902962 MLS#201008483 GREG MILLER, P.C., Broker, CRS, GRI JOANNE MCKEE, Broker, ABR, GRI, CRS 541-480-5159 541-322-2404 SA OP T. EN 12 -3 LI NE ST W IN G Sunrise Village | $465,000 Luxury Townhome | $470,000 Desirable Westside | $474,000 NW Bend | $475,000 Quiet 9.81 acres in Tumalo. 1 acre irrigated. 1700 sq. ft. 3 bedroom, 2.5 bath like new home. Paved drive and 1440 sq. ft. pole barn/shop. Breathtaking views. Easy to see, incredible buy! MLS#2809508 BOB JEANS, Broker 541-728-4159 VIRGINIA ROSS, Broker, ABR, CRS, GRI 541-383-4336 Sisters | $495,900 Black Butte Ranch | $549,950 LI NE ST W IN G OWNER WILL CARRY, 1 acre in gated community looking down on the 8th fairway. Big views of the 8th green, lake & mountains. At the end of a cul-desac. Terms are 20% down, 6% interest (30 yr amortization), 5 yr balloon. MLS#201006682 RE PRI DU CE CE D Unique Earth Advantage Craftsman with mountain views. Open floor plan, hardwood, slate & tile floors. Spacious main level master suite, upstairs loft with vaulted ceilings. Beautifully landscaped corner lot. MLS#201009588 Contemporary home on a large corner lot. 2 master suites and a sauna. Enjoy the clubhouse, pool, trails, and tennis courts. 3 bedrooms, 3 baths, 2196 sq. ft. MLS#201007810 Directions: Century Drive, left on Mammoth, left on Sunshine Way. 19670 Sunshine Way Full on views of the lake at Painted Ridge. Ideal floor plan with great room and master suite on main level, upstairs loft area, 2 bedroom suites and office. Huge decks with privacy and views. MLS#2709663 Beautiful 3473 sq. ft. home with 5 bedrooms, 3.5 bathrooms, bonus room & office. Living room with vaulted ceiling & kitchen with hardwood floor. Landscaped yard with water feature, patio & hot tub. MLS#201009573 1050 NW Stannium Rd. Great location near market, shops and park in Northwest Crossing. Great room plan, large kitchen, 4 bedrooms with master on main. Quality finishes. Fenced back patio and extra parking area. MLS#201000475 SUE CONRAD, Broker, CRS 541-480-6621 LESTER FRIEDMAN, P.C., Broker 541-330-8491 • 541-330-8495 CAROL OSGOOD, Broker 541-383-4366 NANCY MELROSE, Broker 541-312-7263 SE Bend | $625,000 NW Bend | $625,000 NW Bend | $709,000 Single level home on 4.71 acres. 3 bedrooms, 2 baths, 2124 sq. ft. 5-stall barn, close to BLM land. Recently remodeled. MLS#201008335 Private 10.53 acre home site in The Highlands at Broken Top. Backs up to the Deschutes National Forest. Owner willing to carry. MLS#201009433 NW style home; timbers, stones, granite, grand gas fireplace, indoor & outdoor spas. 3490 sq. ft. with master on main. Flexible floor plan with 4 bedrooms & potential for 5. 3+ car garage/shop & Cascade views. MLS#2903564 Custom 3 bedroom + den/office, 4.5 bath. Golf course views. Gourmet kitchen, Wolf stove, Sub-Zero refrigerator & granite counters. Master on main with private Atrium & his/hers baths/closets. Seller offering lease/lease to purchase. MLS#201002777 Outstanding investment opportunity. 23 unit apartment building. Building includes 10 single room units, 8 double room units, & 5 three bedroom units. Professionally managed. Call for more info. MLS#201006403 Single level contemporary home overlooks the 3rd green at Broken Top. Canadian maple floors, all bedrooms are suites. Hot tub, water feature and 3 fireplaces. 4 bedrooms 3.75 baths, 3285 sq. ft. MLS#201003659 DIANE ROBINSON, Broker, ABR 541-419-8165 JJ JONES, Broker 541-610-7318 • 541-788-3678 JUDY MEYERS, Broker, GRI 541-480-1922 CAROLYN PRIBORSKY, P.C., Broker, ABR, CRS 541-383-4350 JOHN SNIPPEN, Broker, MBA, ABR, GRI 541-312-7273 • 541-948-9090 NICHOLE BURKE, Broker 661-378-6487 • 541-312-7295 Sunrise Village | $900,000 26 Acres/NW Bend | $950,000 A Piece of Heaven | $999,000 Cascade Views | $1,200,000 NW Bend | $1,200,000 Madras | $2,379,000 Beautiful remodeled home with Numerous upgrades have been completed incredible mountain views! New on this 4 bedroom, 3 bath, 2034 sq. ft. windows and trim, siding, paint, flooring, furnished home that sleeps 15. Great lighting and baths have been updated. room floor plan with master bedroom on 4 bedrooms, 3 baths, plus huge bonus main level. Double attached garage. room. Horse ready too! MLS#201003074 MLS#201009496 MELANIE MAITRE, Broker 541-480-4186 PAT PALAZZI, Broker 541-771-6996 RE PRI DU CE CE D Broken Top | $739,000 Prineville Apartment Building | $800,000 Broken Top | $850,000 Contemporary home overlooking the Deschutes River, with cascade views. Light and bright, open floor plan with a separate guest suite. 4 bedrooms, 3 baths, 2818 sq. ft. MLS#201009441 Big views, prime location, very private...1st time offering. Lupine Meadows Ranch, 20 acres Swalley Irrigation. 3440 sq. ft. home, deck facing mountains. 30’ x 60’ barn, 4 separate paddocks, 3 ponds. MLS#201005990 NORMA DUBOIS, P.C., Broker 541-383-4348 CRAIG LONG, Broker 541-480-7647 19+ acres, 14 irrigated, barn, shop, arena, corrals, pastures, ponds & a high quality home. Cascade views & direct access TO PUBLIC LAND. Also available on 1 tax lot for $749,900. Video at kellehers.com MLS#201007302 Exquisite Awbrey Butte home with Cascade Mountain Views from all living areas. African Ribbon Mahogany floors and cabinetry. 4823 sq. ft. 3 bedroom, 3.5 bath on .58 of an acre. MLS#201002623 DON & FREDDIE KELLEHER, Brokers MARGO DEGRAY, Broker, ABR, CRS 541-383-4347 541-383-4349 23 +/- Private Easy Care Acres, custom built home with outstanding Cascade Views. NEW TERMS: Owner will finance second depending on terms and conditions. MLS#201006284 Incredible 234 acre scenic high production ranch with 214 acres of irrigation. 5500 sq. ft. beautiful custom home with dramatic entry, gourmet kitchen & separate apartment. Tour at. MLS#201008613 SUSAN AGLI, Broker, SRES 541-383-4338 • 541-408-3773 DARRIN KELLEHER, Broker 541-788-0029
https://issuu.com/wescom/docs/bulletin_daily_20101106
CC-MAIN-2017-30
refinedweb
85,656
77.03
The world-famous Scriptomatic 2.0 is the utility that writes WMI scripts for you. Not only that, but it teaches you the fundamental concepts behind writing WMI scripts for yourself. If you’re new to Scriptomatic, you’ll definitely want to try it out and see what you’ve been missing. If you’re already familiar with Scriptomatic 1.0 you know how useful this tool can be. Version 2.0 is even better; it has a lot of new features, including the ability to create scripts in multiple scripting languages. Download Scriptomatic 2.0 now! (As of 4/4/2016, this download is no longer available.) Oh, wait, you should read the rest of this first. There’s a lot of information in here—some of it is even helpful. A Brief History Lesson Throughout most of history people were much easier to please than they are now. For example, it’s unlikely that anyone ever went up to Luke the evangelist and said, “One Gospel? Come on, Luke. I mean, Matthew, Mark, John – anybody can write one Gospel.” Upon being introduced to someone at a cocktail party Neil Armstrong probably never had to hear, “Oh, first man on the moon? I see ….” Did anyone ever say to the Pharaoh Cheops, “Well, it’s a good pyramid, Cheops, but I don’t know about a great pyramid ….” Of course they didn’t. Well, not if they knew what was good for them, anyway. Today it’s a bit different: not only are people notoriously hard to please, but even if you do have a success there’s no guarantee that anyone will be satisfied. After all, nothing is worse than being labeled a one-trick pony, a one-hit wonder, or a flash-in-the-pan. We remember William Shakespeare, but only because he wrote hundreds of plays and sonnets. Who remembers the rock duo Mouth and McNeal? Nobody. And that’s because Mouth and McNeal had one hit song, and then were never heard from again. Stephen King will be remembered forever because of his prolific productivity, but does anyone out there have the slightest idea who wrote the Epic of Gilgamesh? Well, OK, it probably was Stephen King. Then what about – right, he probably wrote that, too. But you know what we mean. The One-Hit Wonders of Scripting?. But then we made a terrible mistake: we released the original Scriptomatic – the amazing utility that actually wrote WMI scripts for you – and it turned out to be a hit. That was not intentional, by the way. The Scriptomatic was originally thrown together when one of the Scripting Guys was looking for a socko-boffo ending for a WMI presentation he had to make for an internal Microsoft audience. Literally minutes before the presentation was to begin, he created something called the Scriptomatic, an HTA (HTML Application) that could write rudimentary WMI scripts. He showed off his new creation at the end of the talk, and the response was both overwhelming and unanimous; as noted in the official annals of the Scripting Guys, everyone in the room stood up as one and said, “Can we go now?” Not the most auspicious debut a piece of software has ever had, though it probably still tops the reception accorded Microsoft Bob. Note. If you’re a Microsoft employee who liked Microsoft Bob, we’re just kidding. In fact, some of our best friends used Microsoft Bob. Well, at least we think they did. It’s hard to get people to admit to something like that. But back to our story. As it turned out, something weird happened when we released that same Scriptomatic on Microsoft.com: it became a hit, or at least as close to being a hit as any scripting-related utility will ever come. As of today, the Scriptomatic has been downloaded by nearly 500,000 people, a number which warms the cockles of our hearts, and also makes us wonder why we didn’t charge people $1 per download. But while it was great that everyone found the Scriptomatic useful, its unexpected success put us in the position of being the computer world equivalent to Dexy’s Midnight Runners. Now we had to create a follow-up success of some kind. But what? The Beatles didn’t have to worry about being one-hit wonders because they were really good at what they did. Ernest Hemingway didn’t have to worry about being labeled a flash-in-the-pan; after all, he was good at what he did. But where did that leave the Microsoft Scripting Guys? Life as a Has-Been We pondered this problem of being a one-hit wonder long and hard, for many, many months, and without much success. Not for lack of trying, mind you, but to be honest, most of our efforts were for naught. In retrospect, reading all our scripts out loud and recording them onto an MP3 player we called the scriptPod might not have been such a good idea after all. (Of course, it probably would have helped had we remembered to put a Play button on the scriptPod. And maybe we should have taken the rock group U2 up on their offer after all.) Likewise, we probably should have tested the waters with a single Scriptbucks rather than blithely opening a chain of coffee houses across the country, all of them serving script-flavored lattes. (In our defense, a number of people have told us that the ADSI Mocha Fudge Delight wasn’t that bad as long as you added sugar and cinnamon, stirred well, spritzed a little whipped cream on top, and then poured the whole thing down the drain without drinking it. As an added bonus, it could unclog that drain in no time!) And while we haven’t given up on our reality TV show, The Scripting Life, we are having problems getting either Paris Hilton or Nicole Ritchie to return our calls. (And thanks to various court orders, injunctions, and restraining orders, we’re no longer allowed to contact them.) Coming up with a follow-up success turned out to be much harder than we expected. The Comeback But then one day, inspiration struck. It occurred to us that, instead of copying someone else’s ideas, we should do what we do best. And while we don’t do very many things well at all, there was one thing that we were good at: writing Scriptomatics. Therefore, the solution to our problem was obvious: if we had a hit with one Scriptomatic, then logically we’d have an even bigger hit if we released another Scriptomatic. It would be just like the Star Wars saga, only with scripts instead of light sabers. Actually, our original plan was to emulate the Coca-Cola company, which a few years back released New Coke, a product that met with almost universal disdain. Needless to say, things looked grim, but then some unsung genius at Coca Cola had a brainstorm: they suggested that the company do nothing more than bring back the old Coke, now christened Classic Coke. And guess what? It was a huge success! We figured, OK, we’ll do the same thing. We’ll write a piece of software that nobody likes and release it as New Scriptomatic. We’ll let people grumble and complain for awhile, and then we’ll bring back the old Scriptomatic (or Classic Scriptomatic) and everyone will love it! We’ll be heroes, and – best of all – we won’t have to do any work. In the end, though, we decided to create a brand new version of the Scripotmatic, one that actually worked: Scriptomatic 2.0. Read "The Real Story of New Coke" Scriptomatic 2.0 Q & A To celebrate the release of the new Scriptomatic 2.0, we decided to hold a make-believe press conference. Here’s the transcript from that press conference. New Features Question: So what’s so great about Scriptomatic 2.0? Answer: ……. Question: Could you speak into the microphone please? Answer: Oh, sorry; we don’t do many press conferences. What’s great about Scriptomatic 2.0 is that it not only fixes some problems inherent in Scriptomatic 1.0, but it also introduces some really cool new features. Question: There were problems with Scriptomatic 1.0? Answer: No, of course not. It’s just that, for example, one of the … features … of Scriptomatic 1.0 was the way it handled properties that were stored as arrays: it just ignored them. Another feature was the way Scriptomatic 1.0 dealt with dates and times: it displayed them in UTC format, so you got output like 20040930083722.000000-480. In Scriptomatic 2.0, these … features … have been changed. Scriptomatic 2.0 now handles arrays without any problem, and now displays dates and times as, well, dates and times. Question: Wow, that alone makes Scriptomatic 2.0 a worthy successor to the original. Answer: You know, that’s what we thought, too. But our managers decided we were just being lazy, and so they made us go back and add a bunch of other features to Scriptomatic 2.0 as well. Question: Really? What kind of features? Answer: Oh, there are so many of them it’s hard to know where to begin. But here are some of the highlights: - Scriptomatic 2.0 now works with all the WMI namespaces on your computer. The old version only worked with the root\cimv2 namespace. That was fine for Windows 2000 computers, but just didn’t cut it with Windows XP or Windows Server 2003 computers. - Scriptomatic 1.0 gave you a bare-bones environment for running scripts: all you could do was click a button and run the script in a command window, displaying the returned data on screen. You can still do that with Scriptomatic 2.0; however, when running the script you also have options for saving returned data as a text file, saving it as an Excel file (in comma-delimited format), or saving the returned data as an HTML or XML file. - Scriptomatic 1.0 let you write scripts that ran against only a single computer. Question: But what if you wanted to run that script against multiple computers? Answer: Well, we were getting to that: you couldn’trun the script against multiple computers, at least not without re-writing the thing. But that’s not the case with Scriptomatic 2.0. With Scriptomatic 2.0, you can enter a bunch of computer names (as a comma-separated list, or by loading the names in from a text file), and the new Scriptomatic will automatically write you a script that runs against all those machines. Question: That’s pretty cool. Answer: We like to think so. After all, could you write a script like that using Classic Coke? Well, OK, maybe if you did it that way. But most people don’t know about that. Question: So is this multiple computer thing the best new feature of Scriptomatic 2.0? Answer: Oh, by far. But by far the best new feature of Scriptomatic 2.0 is the fact that the Scriptomatic now speaks multiple languages. With Classic Scriptomatic you could write a script that used any scripting language you wanted, just as long as the scripting language you wanted was VBScript. With Scriptomatic 2.0, you can choose to create scripts written in VBScript, JScript, Perl, or Python. Question: Really? So if I prefer Perl over VBScript, I can use Scriptomatic 2.0 to write Perl scripts. Answer: You bet. Question: And if I prefer Python over Perl, I can use Scriptomatic 2.0 to write Python scripts. Answer: Of course. Question: And if I prefer -- Answer: Yes. How to Use Scriptomatic 2.0 Question: Wow. So I guess that with all these new features Scriptomatic 2.0 must be really hard to use, huh? Answer: Question: I said, “I guess that with all these new features Scriptomatic 2.0 must be really hard to use, huh?” Answer: Oh, sorry, we thought the press conference was over. No, the Scriptomatic is as easy to use as it ever was. You have a few more options available to you, but you can still write a complete, fully-functional WMI script with just a couple of mouse clicks. Question: That’s hard to believe. Could you give us a demonstration? Answer: We’d love to. To begin with, start Scriptomatic 2.0 by double-clicking the file ScriptomaticV2.hta. After a few seconds, your screen should look like this: By default, Scriptomatic 2.0 loads all the classes found in the root\cimv2 namespace. If that’s the namespace you want to use, then you’re ready to write a script. Question: But what if I want to use a different namespace? Answer: That’s no problem. Just click the little dropdown labeled WMI Namspace. A list of all the WMI namespaces found on the local computer will appear, like so: Pick the namespace you want to use, and Scriptomatic 2.0 will automatically load all the classes found in that namespace into the dropdown labeled WMI Class. Question: Then what? Answer: At this point you’re practically done. Just select a class from the WMI Class dropdown, and in a split-second the Scriptomatic will write a script for you that returns information for all the properties of that class. For example, suppose you want information about the Win32_BIOS class. Just select that class from the dropdown and you’ll get something like this: Give it a try using Win32_BIOS. You’ll not only get a script, you’ll also see how Scriptomatic 2.0 handles arrays and how it converts dates and times from UTC format to something a bit more readable. Question: Cool. But it looks like this script is written in VBScript. How do I get a script written in Perl or one of those other scripting languages? Answer: Well, you’re right: VBScript is the default language for the Scriptomatic 2.0. But it’s not exactly hard to write a script using one of the other languages. For example, you want a Perl script? Then just click the radio button labeled Perl: Question: Oh, I see. So how do I make Perl the default language for Scriptomatic 2.0? Answer: Uh, next question, please. Question: So I can’t make Perl the default language? Answer: Well, no, sorry. But after you select Perl, any subsequent scripts you write in this session will be written in Perl, at least until you select a different language option. So that’s good. Question: So you’re telling me it’s absolutely impossibleto make Perl the default language? Answer: Boy, you just don’t give up, do you? OK, if you really want Perl to be the default language, you can follow these steps. Question: Is this guaranteed to work? Answer: Well, it’s guaranteed just as strongly as the rest of the Scriptomatic, which is to say there’s no guarantee at all. But it shouldwork, and as long as you make changes on a copy of Scriptomatic 2.0, you should be fine. If it doesn’t work, then you just throw the copy away and go back to the unedited version of Scriptomatic 2.0. Anyway, do this: - Make a copy of ScriptomaticV2.hta, and open that copy in Notepad. - Scroll down until you find these lines of code: '************************ '* Global State Variables '************************ g_strCurrentLanguage = "VBScript" g_strCurrentNamespace = "\root\CIMV2" g_strOutputFormat = "CmdLine" - Change the value of the variable g_strCurrentLanguage to Perl (or to Python or JScript, as desired): g_strCurrentLanguage = "Perl" - Scroll down to the end of the file and look for these lines of code: <tr> <td><span style="font-size:8pt;">VBScript</span></td> <td><input type="radio" name="language" onClick="ComposeVBScriptCode" CHECKED></td> <tr> <tr> <td><span style="font-size:8pt;">Perl </span></td> <td><input type="radio" name="language" onClick="ComposePerlCode"><> - Remove the parameter found after onClick=”ComposeVBScriptCode”. Type after onClick=”ComposePerlCode” (or ComposePythonCode or JScriptCode, depending on the default you want to use). Your code should now look like this: <tr> <td><span style="font-size:8pt;">VBScript</span></td> <td><input type="radio" name="language" onClick="ComposeVBScriptCode" ></td> <tr> <tr> <td><span style="font-size:8pt;">Perl </span></td> <td><input type="radio" name="language" onClick="ComposePerlCode" CHECKED><> - Save the file and –with any luck – Perl will now be set as your default scripting language. Question: OK, that’s not too bad. Now what about all those buttons under the label Output Format? I’ve clicked all of them, but nothing seems to happen. Answer: There’s a good reason for that: when you click them, nothing does happen. Those buttons don’t affect the actual script written by the Scriptomatic; they come into play only if you click the Run button and then run the script from within Scriptomatic 2.0. Question: I don’t get it. Answer: OK, then do this. Write a script – using any class or language you want – and then click the Run button. A command window should pop up on screen, the script you just wrote should run, and the results should appear in that command window. The whole thing ought to look something like this: That’s with the Output Format set to the default (Command Prompt). Now, select a different option, say, HTML. Your screen should look like this: Run the script again, and see what happens. This time, your output should appear in a Web page rather than the command window: With the Plain Text option, output should pop up as a plain-text file in Notepad; with Excel, the output should pop up in Excel (assuming, of course, that you have Excel installed). And with XML – well, you get the idea. By the way, if you want to save this data, make sure you save it before you run another script. Because Scriptomatic uses the same temp files over and over, if you run Script A and then run Script B, the results of Script B will overwrite the old data currently displayed. For example, whatever happens to be on the HTML page right now will be replaced with a new set of data. Question: Let me make sure I understand this now: all this works only if I run the script from within the Scriptomatic? If I save the script as, say, a .vbs file and then run it, will it save the output to Excel or HTML? Answer: No, sorry. We considered that, but that brought up far too many complications to handle in a simple HTA. We wanted to maintain the traditional simplicity of the Scriptomatic as much as we could so …. Question: Speaking of saving files …. Answer: Yes, you can save scripts from within the Scriptomatic. Just click the Save button and then type the path and file name for the script in this dialog box: And don’t forget to use the correct file extension: .vbs for VBScript; .js for JScript; .py for Python; and .pl for Perl. Question: So what about this multiple computer stuff? How does that work? Answer: Quite well, actually. At the bottom of the screen you’ll see a text box labeled Target Computers. Just type in the names of all the computers you want the script to run against, separating the computer names by commas: In other words: atl-ws-01, atl-ws-02, atl-ws-03, atl-ws-04 Note. You know how an entire industry has sprung up around telling you the inside secrets to video games? Well, here’s an inside secret to Scriptomatic 2.0: you don’t really have to separate computer names by commas. Instead, you can separate computer names by blank spaces, by semi-colons, or even by putting each computer on a separate line, like so: atl-ws-01 atl-ws-02 atl-ws-03 atl-ws-04 Question: But I don’t like the idea of typing a bunch of computer names in a text box. Answer: You big baby! Um, sorry. What we meant to say is this: “That’s OK. If you have computer names stored in a text file, you can simply import all those names by clicking the Load From File button and then picking a text file to load in.” Incidentally, regardless of how you get computer names into the text box, you’ll need to click the Upgrade Script button to get those names embedded into your script. For better or worse (OK, for worse), this doesn’t happen automatically. Question: Don’t get me wrong, I really liked the old Scriptomatic. But one thing that bothered me is that it could only list the WMI namespaces and classes that were on my local machine; it couldn’t go out to, say, one of my servers and get the WMI namespaces and classes found there. I suppose that’s still a problem with the new version of the Scriptomatic? Answer: Au contraire, which means – well, we’re not totally sure what that means. So let’s say this instead: on the contrary. In Scriptomatic 2.0 you can retrieve WMI information from a remote computer. Just click the WMI Source button and wait for this dialog box to appear: When it does, type in the name of the remote computer, click OK, and the Scriptomatic will now retrieve information from that remote machine. Question: Amazing. Now what do I do when I want to quit? Answer: Interesting question; it never occurred to us that anyone ever would want to quit. But probably the best way to quit is to simply click the Quit button. You can also quit just by closing the Scriptomatic 2.0 window, but if you do that the temporary files created by Scriptomatic won’t be deleted. That’s not a big deal; there are only a handful of files and they’re pretty small. But, still …. Support (or Lack Thereof) Question: Well, I’m sold. But what if I encounter any problems with Scriptomatic 2.0, what should I do then? Answer: Send email to scripter@microsoft.com (in English, if possible). Officially we offer no support for Scriptomatic 2.0 and we can’t promise to respond to your questions. But we’ll see what we can do. Future Plans Question: One last question: will there be a Scriptomatic 3.0? Answer: No. We’ve decided to invest all our time and money in creating a new online venture: scriptBay. It will be a Web site where we’ll auction WMI scripts off to the highest bidder. Question: Um, shouldn’t you have done that before you released Scriptomatic 2.0, which will let people write those same WMI scripts for free? Answer: We’ll get back to you on a date for Scriptomatic 3.0 ….
https://technet.microsoft.com/en-us/scriptcenter/dd939957.aspx
CC-MAIN-2016-30
refinedweb
3,834
74.19
Web Process Statistics. Thread Count Property Definition Important Some information relates to prerelease product that may be substantially modified before it’s released. Microsoft makes no warranties, express or implied, with respect to the information provided here. Gets the total count of the process threads. public: property int ThreadCount { int get(); }; public int ThreadCount { get; } member this.ThreadCount : int Public ReadOnly Property ThreadCount As Integer Property Value The total count of the process threads. Examples The following code example shows how to get the ThreadCount value. public string GetThreadCount() { // Get the thread count. return (string.Format( "Thread count: {0}", processStatistics.ThreadCount.ToString())); } Public Function GetThreadCount() As String ' Get the thread count. Return String.Format( _ "Thread count: {0}", _ processStatistics.ThreadCount.ToString()) End Function 'GetThreadCount Remarks The count refers to the managed and unmanaged threads.
https://docs.microsoft.com/en-us/dotnet/api/system.web.management.webprocessstatistics.threadcount?view=netframework-4.8
CC-MAIN-2021-49
refinedweb
135
52.26
I’m writing a admin website which control several websites with same program and database schema but different content. The URL I designed like this: A list of all sites which under control{id} A brief overview of select site with ID id{id}/user User list of target site{id}/item A list of items sold on target site{id}/item/{iid} Item detailed information # ...... something similar As you can see, nearly all URL are need the site_id. And in almost all views, I have to do some common jobs like query Site model against database with the site_id. Also, I have to pass site_id whenever I invoke request.route_path. So… is there anyway for me to make my life easier? Best answer It might be useful for you to use a hybrid approach to get the site loaded. def groupfinder(userid, request): user = request.db.query(User).filter_by(id=userid).first() if user is not None: # somehow get the list of sites they are members sites = user.allowed_sites return ['site:%d' % s.id for s in sites] class SiteFactory(object): def __init__(self, request): self.request = request def __getitem__(self, key): site = self.request.db.query(Site).filter_by(id=key).first() if site is None: raise KeyError site.__parent__ = self site.__name__ = key site.__acl__ = [ (Allow, 'site:%d' % site.id, 'view'), ] return site We’ll use the groupfinder to map users to principals. We’ve chosen here to only map them to the sites which they have a membership within. Our simple traversal only requires a root object. It updates the loaded site with an __acl__ that uses the same principals the groupfinder is setup to create. You’ll need to setup the request.db given patterns in the Pyramid Cookbook. def site_pregenerator(request, elements, kw): # request.route_url(route_name, *elements, **kw) from pyramid.traversal import find_interface # we use find_interface in case we improve our hybrid traversal process # to take us deeper into the hierarchy, where Site might be context.__parent__ site = find_interface(request.context, Site) if site is not None: kw['site_id'] = site.id return elements, kw Pregenerator can find the site_id and add it to URLs for you automatically. def add_site_route(config, name, pattern, **kw): kw['traverse'] = '/{site_id}' kw['factory'] = SiteFactory kw['pregenerator'] = site_pregenerator if pattern.startswith('/'): pattern = pattern[1:] config.add_route(name, '/site/{site_id}/' + pattern, **kw) def main(global_conf, **settings): config = Configurator(settings=settings) authn_policy = AuthTktAuthenticationPolicy('seekrit', callback=groupfinder) config.set_authentication_policy(authn_policy) config.set_authorization_policy(ACLAuthorizationPolicy()) config.add_directive(add_site_route, 'add_site_route') config.include(site_routes) config.scan() return config.make_wsgi_app() def site_routes(config): config.add_site_route('site_users', '/user') config.add_site_route('site_items', '/items') We setup our application here. We also moved the routes into an includable function which can allow us to more easily test the routes. @view_config(route_name='site_users', permission='view') def users_view(request): site = request.context Our views are then simplified. They are only invoked if the user has permission to access the site, and the site object is already loaded for us. Hybrid Traversal A custom directive add_site_route is added to enhance your config object with a wrapper around add_route which will automatically add traversal support to the route. When that route is matched, it will take the {site_id} placeholder from the route pattern and use that as your traversal path ( /{site_id} is path we define based on how our traversal tree is structured). Traversal happens on the path /{site_id} where the first step is finding the root of the tree ( /). The route is setup to perform traversal using the SiteFactory as the root of the traversal path. This class is instantiated as the root, and the __getitem__ is invoked with the key which is the next segment in the path ( {site_id}). We then find a site object matching that key and load it if possible. The site object is then updated with a __parent__ and __name__ to allow the find_interface to work. It is also enhanced with an __acl__ providing permissions mentioned later. Pregenerator Each route is updated with a pregenerator that attempts to find the instance of Site in the traversal hierarchy for a request. This could fail if the current request did not resolve to a site-based URL. The pregenerator then updates the keywords sent to route_url with the site id. Authentication The example shows how you can have an authentication policy which maps a user into principals indicating that this user is in the “site:” group. The site ( request.context) is then updated to have an ACL saying that if site.id == 1 someone in the “site:1” group should have the “view” permission. The users_view is then updated to require the “view” permission. This will raise an HTTPForbidden exception if the user is denied access to the view. You can write an exception view to conditionally translate this into a 404 if you want. The purpose of my answer is just to show how a hybrid approach can make your views a little nicer by handling common parts of a URL in the background. HTH.
https://pythonquestion.com/post/how-to-handle-complex-url-in-a-elegant-way/
CC-MAIN-2020-16
refinedweb
833
50.23
import "go.chromium.org/luci/client/flagpb" Package flagpb defines a flag format for protobuf messages, implements a parser and a formatter. Currently flagpb supports only untyped messages, not proto.Message. Support for the latter could be added too. Flag syntax by example. First line is flagpb, second is jsonpb. -x=42 -b -s hello {"x": 42, "b": true, "s": "hello"} -m.x 3 -m.s world {"m": {"x": 3, "s": "world"}} -rx 1 -rx 2 {"rx": [1, 2]} -rm.x 1 -rm -rm.x 2 {"rm": [{"x": 1}, {"x": 2}]} where x fields are int32, m are message fields, b are boolean and s are strings. Fields with "r" prefix are repeated. Bytes field values are decoded from hex, e.g. "FF02AB". Enum field values can be specified by enum member name or number. doc.go generate.go marshal.go resolver.go unmarshal.go MarshalUntyped marshals a key-value map to flags. UnmarshalMessage unmarshals the proto message from flags. The descriptor set should be obtained from the `cproto` compiled packages' FileDescriptorSet() method. func UnmarshalUntyped(flags []string, desc *descriptor.DescriptorProto, resolver Resolver) (map[string]interface{}, error) UnmarshalUntyped unmarshals a key-value map from flags using a protobuf message descriptor. type Resolver interface { // Resolve resolves a type name to // *descriptor.DescriptorProto or *descriptor.EnumDescriptorProto. Resolve(name string) interface{} } Resolver resolves type names. func NewResolver(set *descriptor.FileDescriptorSet) Resolver NewResolver creates a resolver for all types in a file descriptor set. Resolving time complexity is linear. Package flagpb imports 11 packages (graph). Updated 2019-12-06. Refresh now. Tools for package owners.
https://godoc.org/go.chromium.org/luci/client/flagpb
CC-MAIN-2019-51
refinedweb
260
54.08
Table of contents Created 5 April 2011 Requirements Prerequisite knowledge You do not need extensive knowledge of Flex 3 or Flex 4 to complete this tutorial, but if you intend to incorporate aspects of the Flex Dashboard application into your own projects, then having a good understanding of Flex 3, and at least a basic understanding of what’s new in Flex 4, is essential. User level Beginning This article is Part 1 of a four-part series in which you import the Flex 3 Dashboard demonstration application available on the Flex Developer Center into Flash Builder 4, the latest version of Adobe’s IDE for developing applications for the Flash platform, and then migrate the application to Flex 4 to take advantage of the Flex 4 Spark architecture and components.—and provide enough information to help you migrate your own Flex 3 applications to Flex 4. Here are some of the Flex 4 and general Flex topics that are covered in this series: - Differences in namespaces between Flex 3 and Flex 4 - Significant differences in the Flex 4 Spark layout scheme - Significant differences in the Flex 4 Spark skinning model - Creating and editing custom component skins, including states in skins - Moving CSS styles into custom skins - Adapting Flex 3 applications to use Flex 4 containers and controls To try out the Dashboard application, visit the Flex 3 Dashboard page and click the Experience The Application link. To complete this article series you need Flash Builder 4 or Flash Builder 4.0.1 installed. Flash Builder 4.0.1 is preferable, as you need the Flex 4.1 SDK (or a later version if one is available). Version 4.1 of the Flex SDK is necessary because it includes important improvements necessary to avoid run-time errors when launching the Dashboard application. Getting the Flex 4.1 SDK If you have Flash Builder 4 and do not yet have the Flex 4.1 SDK, you’ll need to download it (or latest more recent one, if available) and add it to your Flash Builder 4 installation. If you already have Flash Builder 4.0.1, it is not necessary to update the SDK. Follow these steps to install the Flex 4.1 SDK: - Visit the Flex 4 Downloads page. - In the Latest Milestone Release Builds section, download the latest Adobe Flex SDK and Adobe Add-ons files, but do not download the Open Source Flex SDK file. - After downloading the ZIP files, create a new folder named 4.1 in your Flash Builder 4 sdks folder. On Windows, the path of this folder is typically C:\Program Files\Adobe\Adobe Flash Builder 4\sdks. - Extract the contents of the two ZIP files to the 4.1 folder. Downloading the Dashboard source files To get the Dashboard source files simply download the sample file for this article, Dashboard-Part1-Start.zip. Alternatively you can download the Dashboard source file ZIP archive from the main Flex 3 Dashboard page: - Visit the Dashboard source page. - Click the Download Source link in the lower-left corner of the page. You do not need to download the Flex 3 SDK. The other sample file for this article, Dashboard-Part1-End.zip, contains a project in which all the steps in Part 1 have already been completed. You may use this project as a reference if you wish. When you import the Dashboard project, you must also select the Flex SDK version for the project. This section describes these two steps. Importing from the ZIP file or a project folder There are two ways import the Dashboard application project in Flash Builder. You can import directly from the Dashboard.zip archive file, or you can import the project after extracting the contents of the ZIP file to a directory (see Figure 1). You may use either method. Follow these steps to import from the ZIP file: - Choose File > Import Flex Project in Flash Builder 4. - In the Import Flex Project dialog box, select File and click the Browse button to the right. - Navigate to the folder containing the Dashboard.zip file. - Select the file and click Open. - Back in the Import Flex Project dialog box, click Finish. Selecting the Flex SDK version After you click Finish, you’ll be prompted to choose which Flex SDK will be used to compile the project (see Figure 2). The Dashboard project requires at least Flex SDK 4.1, or you can select a more recent version of the Flex 4 SDK if one is available. - If you just installed the Flex 4.1 SDK for this tutorial, you’ll need to click the Configure Flex SDKs link to add it as an option. - If your default SDK is not Flex 4.1, select Use A Specific SDK and select the Flex 4.1 SDK. - Ensure the Use Flex 3 Compatibility Mode option is not selected, because you will be migrating the Dashboard application to Flex 4. - Click OK. - If you import from the ZIP project archive file and you see a message that says the project will be upgraded (see Figure 3), just click OK. - After the import process completes, expand the Dashboard project and its src folder in the Package Explorer view (see Figure 4) to see the imported folders and files..x SDK. Note: Some errors mentioned later in this article will not be displayed until the first few errors have been addressed, so you may not see them yet. Adding an empty libs folder: - Right-click the project’s top-level folder Dashboard in the Package Explorer view and select New > Folder. - Type libs as the folder name. - Click Finish. The folder can remain empty (see Figure 6) but it must exist to remove the error. Addressing top-level Flex globals warnings After adding the libs folder, build the project again. The error for the missing folder will be gone, but you will have two new errors and two warnings (see Figure 7). The two you use the mx.core.FlexGlobals class (for example, FlexGlobals.topLevelApplication.MY_TOP_VAR_OR_METHOD). To eliminate the two warnings, follow these steps: -, add the following line at the top of PodLayoutManager.as near the other import statements: import mx.core.FlexGlobals; After making these two changes and rebuilding the warnings will no longer be present. Addressing the IStroke and IFill interface changes The two errors for incorrect number of arguments are due to API changes: - Double-click the first error to open RollOverBoxItemRenderer.as and position the cursor at the line causing the error: stroke.apply(g); This first error occurs because the IStroke interface method apply(), which prior to Flex 3.5 took a single argument, now takes three arguments. Flex 3.4 and earlier: apply(g:Graphics):void Flex 3.5 and Flex 4: apply(graphics:Graphics, targetBounds:Rectangle, targetOrigin:Point):void -: f.begin(g,rc); This error occurs because the IFill interface method begin(), which prior to Flex 3.5 took two arguments, now takes three arguments. Flex 3.4 and earlier: begin(target:Graphics, rc:Rectangle):void Flex 3.5 and Flex 4: begin(target:Graphics, targetBounds:Rectangle, targetOrigin:Point):void - Replace the line f.begin(g,rc);with f.begin(g,rc, new Point(rc.left,rc.top));to resolve the error. - Save your changes and rebuild the project. You should now see two new errors and multiple warnings (see Figure 8). You’ll fix these next. Removing the Style tag To eliminate the warnings, follow these steps: - Open the main application file, main.mxml. - Remove the <mx:Style>tag (near line 15): <mx:Style - Save your changes and rebuild the project. The styles handled by this tag will be implemented in various custom skins in the later parts of this series. Do not delete the styles.css file as you will refer to it while creating the custom skins. Removing style property settings in the Application container and elsewhere To fix the remaining two errors follow these steps: - Double-click the first error and then remove the backgroundSizestyle property from the <mx:Application>tag in main.mxml. - Double-click the second error and then remove the themeColorstyle property from the <mx:List>tag in src/com/esria/samples/dashboard/view/ListContent.mxml. - Save your changes and rebuild the project. At this point the most recent warnings and errors have been resolved, but you’ll now see a new error related to the HTML wrapper. You will fix that next. Fixing the HTML wrapper error The final error you need to fix indicates that Flash Builder cannot create the HTML wrapper (see Figure 9). This error occurs because the HTML templates were updated in Flex 4 to take advantage of SWFObject, which provides a more reliable way to do Flash Player detection. This error is simple to fix: - Right-click the error message and select Recreate HTML Templates. - Rebuild the project. - Verify that no errors are reported in the Problems view. Main or by pressing Ctrl+F11 (see Figure 10). When the application launches, you’ll notice that the display is very different from the Flex 3 version of the application. One reason for this is because you deleted the <mx:Style> tag, so the application is no longer using the images referenced by the application CSS styles. Another reason is that the application is now using the Flex 4.1 SDK. The default look and feel of the Flex 3 MX controls has been changed to more closely resemble the look and feel of the new Flex 4 Spark controls, and some properties of the MX controls and containers have changed in Flex 4. Parts 2 through 4 of this article series lead you through migrating the application to use the Flex 4 Spark controls and containers, as well as the new Spark architecture. By the end of this series, the Dashboard application will be nearly identical to the Flex 3 version. Where to go from here This article illustrated how to import the Flex Developer Center Dashboard demonstration application, which was written using the Flex 3 SDK, into Flash Builder 4, as the first step to migrating the application to Flex 4. Now that you have imported the Dashboard project and resolved the initial errors that cropped up when switching to the Flex 4.1 SDK, you can proceed to Part 2 of this series and begin migrating the application to Flex 4. For more information on Flex 4—and in particular features relevant to the Dashboard application—see the following resources:
https://www.adobe.com/devnet/flex/articles/migrating-dashboard-part1.html
CC-MAIN-2018-39
refinedweb
1,756
63.49
18 July 2011 09:23 [Source: ICIS news] SINGAPORE (ICIS)--?xml:namespace> Exports to most of the country's top 10 markets either fell or weakened in June, with the exception of shipments to Shipments to Europe grew by 1.3% in June from a 12.3% growth in May, while exports to the The city-state’s total trade in June was up by 5.0% year on year, with overall exports growing by 6.2% while imports registered a 3.7% increase, IE Singapore said. On a month-on-month seasonally-adjusted basis, total trade shrank by 3.7% in June to S$81bn ($66.4bn) from a 3.6% expansion recorded in May, with total exports down by 2.3% and imports contracting by 5.1%. (
http://www.icis.com/Articles/2011/07/18/9478054/singapores-june-non-oil-domestic-exports-growth-slows-to-1.1.html
CC-MAIN-2014-49
refinedweb
129
79.16
In this article we will learn how to dynamically bind the DropDownList with a month name using Globalization, often there is a need for Month Names but developers often refer to a DropDownList of months bound from a database table which is very time consuming and increases the complexity of the code. To overcome this problem we can use the Globalization namespace which is available in ASP.Net. So let us start with the basics. What is Globalization or System.Globalization Namespace ? System.Globalization contains classes that define culture-related information, including the language, the country or region, the calendars in use, the format patterns for dates, currency and numbers, and the sort order for strings. Now I hope you understand the basic concepts and use of System.Globalization. Now let us proceed to develop an application which dynamically binds the DropDownList with Month names using System.Globalization step-by-step. Start by creating a website as: Open the source view. The source code <form> tag should be as in the following: - Start - All Programs - Microsoft Visual Studio 2010 - File - New Website - C# - Empty website (to avoid adding a master page) - Give the web site a name such as Bind DropDownList or whatever you wish and specify the location - Then right-click on Solution Explorer - Add New Item - Default.aspx page - Drag and drop one dropdownlist in the <form> Section of the Default.aspx page Now switch to "View Code" and declare the NameSpace at the top of the Default.aspx.cs page as in: Now create the one method named DD_Monthbind() or as you wish to bind the DropDownList use the following code in it. Now call the DD_Monthbind() method at page load event as: Now run the application, the output will be as in the following:: Summary From the preceding all examples we have learned how to bind the DropDownList with month names without database.I hope this article is useful for all readers. From the preceding all examples we have learned how to bind the DropDownList with month names without database.I hope this article is useful for all readers.
http://www.compilemode.com/2015/05/get-month-names-without-database-in-Asp-Net.html
CC-MAIN-2017-13
refinedweb
353
58.52
From: Jonathan Wakely (cow_at_[hidden]) Date: 2004-07-29 07:26:14 On Wed, Jul 28, 2004 at 04:55:32PM +0100, Jonathan Wakely wrote: > > In boost/mpl/if.hpp the BOOST_MPL_AUX_AGLORITHM_NAMESPACE_BEGIN macro > is inside a test for BOOST_NO_TEMPLATE_PARTIAL_SPECIALIZATION, but the > corresponding BOOST_MPL_AUX_AGLORITHM_NAMESPACE_END is after the #endif > that matches the test. This doesn't cause an error, since those macros > only expand to anything meaningful for GCC3, which enters the first > branch of the #if, so the begin/end macros are balanced - but it ain't > right. > > Bug was found due to an error with missing #endif, which made GCC3 > take a different path through that file and error. > > Note also those macros are spelled "AGLORITHM" not ALGORITHM. > > Untested patch attached. That patch was wrong, I think. Since GCC sometimes takes the BOOST_NO_TEMPLATE_PARTIAL_SPECIALISATION path (when that macro is defined explicitly by e.g. libs/range/test/partial_workaround.cpp) the namespace begin/end macros should be outside the BOOST_NO_TEMPLATE_PARTIAL_SPECIALISATION test so the namespace is there whichever code path the compiler takes. At least I think that's right. The patch attached to this mail should be used instead of the previous one (assuming my analysis is right). Going on holiday for the next 4 days, so I'm in no rush for this to be fixed. jon -- "Strange how potent cheap music is." - Noël Coward Boost list run by bdawes at acm.org, gregod at cs.rpi.edu, cpdaniel at pacbell.net, john at johnmaddock.co.uk
https://lists.boost.org/Archives/boost/2004/07/69394.php
CC-MAIN-2020-05
refinedweb
246
66.84
MQTT is an exciting technology that’s driving much of the current development of Cayenne and ultimately will be a large part of the future of our platform. At one point Cayenne only had the Cayenne Arduino Library for Arduino connectivity before implementing the Cayenne MQTT Arduino Library for use with our Bring Your Own Thing API. The purpose of this post is to share a step-by-step way to convert your sketch code from the non-MQTT library to the MQTT one. The intended audience is someone less familiar/comfortable with coding who was attracted to Cayenne for ease of use reasons and might not know where to begin with the MQTT library/API. Experienced users and developers may find it easier to re-factor their code on their own, but may still find this article useful as a general reference while doing so.. Step-by-step conversion - Install the Cayenne MQTT Arduino library by launching the Arduino IDE, then going to Sketch > Include Library > Manage Libraries… and searching for CayenneMQTT. Click “Install” on the entry that appears. In the Arduino IDE, go to File > Examples > CayenneMQTT > Connections and choose the connection type you were using for your original Arduino sketch. We’ll use this connection sketch as a base for your transition. Carry over any non-Cayenne connectivity related #includeor #definestatements from the old sketch into the new one. For example, if transitioning from our legacy DS18B20 sketch, you’d bring across: #include <OneWire.h> #include <DallasTemperature.h> But not: #include <CayenneEthernet.h> (because this is already replaced with #include <CayenneMQTTEthernet.h>in the new connection sketch) If you have any #definevirtual pin constants, (things like ‘V1’, ‘V9’), we’ll convert them to numeric MQTT Channels, since the MQTT connectivity does not use the concept of virtual pins. So something like: #define VIRTUAL_PIN V8 Becomes: const int VIRTUAL_PIN = 8; Replace this legacy authentication section: // Cayenne authentication token. This should be obtained from the Cayenne Dashboard. char token[] = "AuthenticationToken"; with this MQTT authentication section: // Cayenne authentication info. This should be obtained from the Cayenne Dashboard. char username[] = "MQTT_USERNAME"; char password[] = "MQTT_PASSWORD"; char clientID[] = "CLIENT_ID"; Carry over any further code that sits outside of the setup()and loop()code blocks. In the setup()block replace: Cayenne.begin(token); With: Cayenne.begin(username, password, clientID); Then carry over any further code in the setup()block. In the loop()block replace: Cayenne.run(); with: Cayenne.loop(); Then carry over any further code in the loop()block. Add any carried over code into the ifstatement that maintains publishing timing in the new example sketch: If you have any CAYENNE_OUTstatements, we’ll convert them to uniquely named stand-alone functions that can be called from the loop()function. For example, if your sketch has a block like: CAYENNE_OUT(VIRTUAL_PIN) { Your code here } Change it to: void newFunctionName(int VIRTUAL_PIN) { Your code here } The old system read CAYENNE_OUTfunctions automatically as part of Cayenne.run(), but the new one does not, so we need to actually call any CAYENNE_OUTfunctions we renamed in Step #8. You can do this by adding a single line in the body of the ifstatement in the loop(). Using the function from Step #8 as an example, we’ll call it like this: newFunctionName(VIRTUAL_PIN); If you have any Cayenne.syncAll()or Cayenne.syncVirtual()functions, these are no longer necessary in the context of the MQTT library and can be removed. They will still compile if you leave them, but won’t do anything. At this point you should be ready add the device to your Cayenne dashboard. From there, go to Add New > Device/Widget > Bring Your Own Thing. On this page you’ll get the MQTT authentication info (Username, Password, Client ID) that you can use to fill in the section added to your sketch in step #4. You can also (optionally) name your device on this page. Upload your sketch and upon connection with our servers, the website will advance from the ‘Connect your device’ page to a blank dashboard. With MQTT, any sensor data published from the sketch file will generate temporary widgets automatically, so there is no need to add them through the Add New menu on the Cayenne dashboard as you have done in the past! To make the green temporary widgets permanent, just click the + icon in the upper-right corner of the widget. Any actuators will need still need to be created on the Cayenne dashboard through Add New > Device/Widget > Custom Widgets. If the widget is set to an MQTT channel which matches the pin number of the actual device, there may be no need for additional code. For example, if you have a button widget set to MQTT channel 6 and your relay on physical pin 6, this should automatically be handled by the CAYENNE_IN_DEFAULT() function that is part of the example sketch we used. If you want to use different MQTT channels than pin numbers, or have additional code you’d like to add for a specific actuator, you can address them directly with a function for a specific channel (i.e. CAYENNE_IN(1) will be called when any actuator set to MQTT channel 1 is pressed on the Cayenne Dashboard).
https://community.mydevices.com/t/converting-cayenne-arduino-library-sketches-to-cayenne-mqtt-arduino/5759/2
CC-MAIN-2019-09
refinedweb
871
61.46
Solution for Programming Exercise 3.3 This page contains a sample solution to one of the exercises from Introduction to Programming Using Java.. We need a loop to read and evaluate expressions. It's easiest to use a break statement to end the loop at the appropriate time: Repeat indefinitely: Get the user's input. if the first number is 0: Break out of the loop Find the value of the expression Display the value. Getting the user's input involves reading three data values. We need three variables to store these values. It's best to test whether the first number is 0 right after we read it, so the user will just have to type a 0 to end the program, not a complete expression such as 0 + 0. "Repeat indefinitely" can be written as "while (true)": while (true): Let firstNum = TextIO.getDouble() if firstNum is 0: Break out of the loop Let operator = TextIO.getChar() Let secondNum = TextIO.getlnDouble() Find the value of the expression Display the value. To evaluate the user's expression, we have to test the operator to find out which operation to compute. We can do this with either a multi-way if statement or with a switch statement. In the program below, I use a switch. The if statement would be: if ( operator == '+' ) value = firstNum + secondNum; else if ( operator == '-' ) value = firstNum - secondNum; else if ( operator == '*' ) value = firstNum * secondNum; else if ( operator == '/' ) value = firstNum / secondNum; else { TextIO.putln("Unknown operator: " + operator); continue; // back to start of loop } The computer won't let you get away without the else part of the if statement or the default case in the switch, since that would leave a possibility that the variable, value, is not assigned a value before it is printed out. Note that char values are tested for equality using the == operator. Chars are not Strings! Strings would have to be compared using the equals() method from the String class; chars however are primitive type values, and they don't even include any methods. This program could be improved by having it print out an error message if the user tries to divide by zero. (This program could use a Scanner instead of TextIO for input, replacing TextIO.getDouble() with stdin.nextDouble() and TextIO.getChar() with stdin.next(), where stdin is the Scanner. (See Subsection 2.4.6) One difference between the behavior of the two versions of the program would be that the TextIO version would accept expressions that have no spaces, such as 17+42, whereas the Scanner version would give an error for such an expression. Another is that scanner.next() returns a String rather than a char, and the character that you want would be the first, and only, character in that string.) public class SimpleCalculator { /* This program evaluates simple expressions such as 2 + 2 and 34.2 * 7.81, consisting of a number, an operator, and another number. The operators +, -, *, / are allowed. The program will read and evaluate expressions until the user inputs a line that starts with the number 0. */ public static void main(String[] args) { double firstNum; // First number in the expression. double secondNum; // Second number in the expression. char operator; // The operator in the expression. double value; // The value of the expression. TextIO.putln("Enter expressions such as 2 + 2 or 34.2 * 7.81"); TextIO.putln("using any of the operators +, -, *, /."); TextIO.putln("To end, enter a 0."); TextIO.putln(); while (true) { /* Get user's input, ending program if first number is 0. */ TextIO.put("? "); firstNum = TextIO.getDouble(); if (firstNum == 0) break; operator = TextIO.getChar(); secondNum = TextIO.getlnDouble(); /* Compute the value of the expression. */ switch (operator) { case '+': value = firstNum + secondNum; break; case '-': value = firstNum - secondNum; break; case '*': value = firstNum * secondNum; break; case '/': value = firstNum / secondNum; break; default: TextIO.putln("Unknown operator: " + operator); continue; // Back to start of loop! } // end switch /* Display the value. */ TextIO.putln("Value is " + value); TextIO.putln(); } // end while TextIO.putln("Good bye"); } // end main() } // end class SimpleCalculator
http://math.hws.edu/eck/cs124/javanotes6/c3/ex3-ans.html
CC-MAIN-2018-47
refinedweb
666
59.09
SvenP 1 Posted January 16, 2005 Share Posted January 16, 2005 I guys, I hope I'm in the correct forum for this one. I need some additional help concerning COM implementation in C++. After spending some long nights with AutoIt (up to 3AM every night), I finally got some basic "Automation" working in AutoIT. It is NOT supposed to replace VBScript or any other COM-enabled language, it is just to fill that tiny missing gap in AutoIT for controlling programs like Word or Excel. (I didn't want do to it 'the other way around' using the AutoITX.dll :-) After numerous cups of coffee, and MSDN-lookups, the following script lines DO ACTUALLY WORK in my modified AutoIt.exe: expandcollapse popup; Excel Automation Example ; Based on AutoIt version 1.0.2 ; Source code adapted by S.A.Pechler ; Beta version 16-01-2005 $MyObject = CreateObject("Excel.Application"); Create an Excel Object if @error then Msgbox (0,"","Error creating object!") exit(1) endif if IsObject($MyObject) then Msgbox (0,"ExcelTest","You now successfully created an object in variable $MyObject.") else Msgbox (0,"ExcelTest","I'm sorry, but creation of this object failed.") exit endif $MyObject.Visible = 1 ; Let the guy show himself $MyObject.workbooks.add ; Add a new workbook dim $i ; Example: Fill some cells dim $j WITH $MyObject.activesheet for $i = 1 to 15 for $j = 1 to 15 .cells($i,$j).value = $i next next Msgbox (0,"","Click to clear the cells") .range("A1:O15").clear ENDWITH $MyObject.activeworkbook.saved = 1; To prevent 'yes/no' questions from Excel $MyObject.quit ; Get rid of him. Msgbox (0,"ExcelTest","Is Excel gone now ?") ; Nope, only invisible, ; but should be still in memory. $MyObject = 0 ; Loose this object. (will call a reinit on the variant) CloseObject() ; Get rid of all objects. ; Excel will now be gone. exit HOWEVER: My knowledge about COM programming in C++ is very basic. The main issue is here that I don't know how to use LATE BINDING (!) to URL-style names like "WINNT://" or "WINMGMT://". All documentation on the internet show only examples using EARLY binding. I hope somebody can help me with that one, then my work is really finished. IF somebody else is interested in adding COM functionality to AutoIt, I'll be happy to give you more details (about the new WITH statement, the new object-type variables, etc). BUT I'm not sure if Jon wil agree in this, because formally he has 'secured' the source code to prevent code stealing. I was just lucky I got a copy of the 3.0.102 source code some time ago. Jon, what's your opinion? Regards, -Sven 'the Geek' Link to post Share on other sites Recommended Posts You need to be a member in order to leave a comment Sign up for a new account in our community. It's easy!Register a new account Already have an account? Sign in here.Sign In Now
https://www.autoitscript.com/forum/topic/7639-com-automation-in-autoit-no-longer-a-myth/
CC-MAIN-2021-31
refinedweb
495
59.9
patterns & practices and pontification Just when you thought you knew everything there was to know about Enterprise Library 3.0, we have one last surprise in store: a new application block! The Policy Injection Application Block got off to a late start, but we're making good progress now and we'll ship the first public drop in the February 2007 CTP. The final release of Enterprise Library 3.0 (scheduled for late March) will of course contain the final release. But first things first: what the hell is this thing? The short(ish) answer is that the Policy Injection Application Block will simplify the separation of business logic from cross cutting concerns, by letting you define policies and the objects/methods they apply to in a declarative way. Each policy contains a pipeline of "handlers" that are executed before and after a policy-enabled method is called. The handlers can do whatever you want, but the most common scenario will be to implement cross-cutting concerns such as logging, validation, exception handling and authorization. By amazing coincidence, Enterprise Library already includes blocks that implement these kinds of capabilities, so our out-of-the-box handlers will be simple wrappers over existing application blocks. For a detailed description of the design and the rationale behind it, check out Ed Jezierski's post - but to get you started, here are a few more details on how this will work. The Policy Injection Application Block will provide a special Factory class that you can use to create instances of objects that may potentially have policies defined on them. I say potentially as one of the big benefits of this block is that you can define and change the policies through configuration, so you won't actually know at compile time which objects will have policies defined. The factory will inspect the configuration and determine if a policy exists. If no such policy exists, the factory will create an instance of the requested object and return it. If a policy does exist, the factory will create a proxy (technically a transparent proxy / real proxy pair) for the object, and wire this up to the chain of handlers and ultimately the real object. To the client, the proxy looks and smells exactly like the real object, but it will have the policies injected between the proxy and the real object. The configuration for the block will look something like this: As you can see, each policy consists of a collection of matching rules and a collection of handlers. A matching rule is basically a predicate that defines which types and members the policy should apply to. If you specify more than one matching rule, all must apply for a policy to take effect. Out of the box we will ship matching rules that check for a specific assembly, namespace, type, method signature, or specific attributes on type or member definitions. Of course you'll also be able to write your own matching rules, should you want a policy to apply only when the moon is full or something similarly obscure. In the event that a particular class/method matches more than one policy, all of the matching policies will be executed in the order that they are defined. Handlers are the classes that do the interesting work before and/or after a method is called. A handler is able to inspect the payload of the method call or return value, act on it, and even change it. In normal situations each handler will do its preprocessing work, invoke the next handler, wait for the call to return, do postprocessing work, and return control to the previous handler. However in certain situations a handler may decide not to call the next handler at all. One good example is an Authorization Handler. Its job is to check whether the current user is authorized to call the method. If the check shows the user is good to go, the handler will invoke the next handler in the chain. However if the user is not authorized, the handler will create an exception, package it up and send it back to the previous handler in the chain as shown below: From the client's perspective, the result will appear identical to what would happen if the target object threw the exception itself, although in this case the exception was generated without ever calling the real object. As I mentioned before, the handlers we will supply out of the box will be thin wrappers around existing application blocks, although again you can easily create your own. While the number of handlers and the details on how they will work are not entirely set in concrete, here is what we are hoping to include: We're very excited by the potential for this block to help simplify your code and provide increased flexibility to change cross-cutting concerns at different stages of the application lifecycle. Keep in mind that the first drop of the Policy Injection Application Block (in the February 2007 CTP) will still be incomplete, but we'd love to hear your feedback to help us make the final release as valuable as possible. By the way, if you're not the kind of person who likes surprises, apologies for springing this on you so late. It wasn't our intention to be secretive, however until very recently we were still not sure if we were going to be able to include this functionality in this release of Enterprise Library, so we didn't want to set expectations too early. Hopefully it was worth the wait, and that you can file it under "good surprises" :-) Thanks to Alex Homer for the great graphics, which were taken from the draft documentation. PingBack from Very cool indeed. Is this all config file driven or are there any attributes to support this functionality a la AOP (Aspect Oriented Prog) Kris: so far it is all configuration driven, although one of the matching rules will check for the existence of a particular attribute, so you can do something like this: [Tag("AuthorizeMe")] public void DoStuff() ... where there is a policy defined in configuration that will look for this particular tag. For the final release we're hoping to add the ability to explicitly attach handlers to types and methods via attributes, without the need for any configuration. Tom Hi Tom, I am wondering if (or how) the ObjectBuilder is used in this Policy Injection Application Block? Thanks Do you wonder how to apply authorization, validation, logging and other requierements to you business Kevin - the PIAB uses Object Builder in much the same way as the other blocks, for example by configuring the core components by injecting the configuration data. This block is going to be very useful. Thanks for your efforts. Any study on performance impact on execution. I have also started a kind of application block called Web Analytics. Its hosted on CodePlex. Pls let me know your feedback. Vikas Goyal Many software projects experience disappointing productivity. Often productivity problems are inherent Great to see this implemented! As far as the factory for instance creation is concerned, does this place any restrictions on how instances can be instantiated e.g. only via a default constructor, thus no parameterised constructors? Cheers, Matt Matt - take a look at Ed's post for some more details on how the interception mechanism works and how you can replace it with a different mechanism. But with our default remoting proxy mechansim, the main restrictions are that you must create the object with our proxy rather than "new", and the object must either derive from MarshalByRefObject or have an explicit interface for marshalling. I don't believe there are any restrictions on the use of parameters in the constructor. Why not just go all the way and build an AOP framework which are target towards cross-cutting concerns? It's really what it is, or part of AOP anyway but with a Microsoft name tagged on it (Policy instead of Aspects). Also, have you tried this with WCF? WCF doesn't really like proxys. Another point, this time on the implementation. Why taking the MarshalByRef (or really contextboundobject) path? This is really much slower then dynamic runtime subclassing. Some comments summed up in a post: I can't wait to see how PIAB work and I intend to test out on my project which already using WCSF and WSSF. Currently I am using NAspect and I see usage of attribute for matching rule offers a different kind of flexibility for me. I also wonder how the debugging facility will work in PIAB, ie will the debugger goes into the handler class so I can trace what is going on. How about including a Transaction handler out of the box? Wrap the call inside a system.transaction Tom and Ed have complimentary articles on the Policy Injection Application Block: Tom's Announcing the Announcing the Policy Injection Application Block OK, I know the sun has already set on February in some parts of the world, but over here it's still well OK, I know the sun has already set on February in some parts of the world, but over here it's still What a week! Both the new Visual Studio "Orcas" and Enterprise Library 3.0 CTPs are released. Enterprise Microsoft Patterns and Practices released the Enterprise Library 3.0 February 2007 CTP last night. A I have to agree with Patrik, context interception is butt slow. I believe benchmarks put it at 50x slower than standard compile time invocation. That's almost twice as slow as using reflection to call every property and method! On top of that, as far as I know, you cannot use generics with context bound objects! Perhaps you guys better rethink this one. You might want to go look at some of the existing AOP frameworks. (ie. Castle's Aspect#) Apologies. I realized that you guys aren't actually using context interception, but rather Real/Transparent proxy. However, the performance drawback is virtually identical. Patrik Löwendahl har gjort mig uppmärksam på att Patterns och Practices gruppen hos Microsoft har annonser. Harry wonders if it has been a slow week. It started that way for me but its certainly not now with both As announced on Tom Hollander's blog, the Microsoft Enterprise Library 3.0 will include a new application Since Both Tom and Ed wrote an article explaining whatever the Policy Injection Application Block [PIAB] Kijött a februári CTPje az Enterprise Library 3.0-nak , ami RCnek is tekinthető. Miért is jó ez nekünk? The next version of Enterprise Library will be getting an AOPish block called the Policy Injection Application... I wanted to quickly fill you in on a couple of new additions we've made to the Policy Injection Application This is really a great effort. It will simplify the development by making code clean and configurable. I am concerned about the performance of the PIAB. By looking at the .NET Framework in earlier versions there has been a notable gap in enterprise functionality Do we have a possibility to change configurations (Logging configurations for Example) at runtime without restarting the application. Kindly provide links if explanation already available. PolicyInjectionApplicationBlock NEW!ThisreleaseofEnterpriseLibraryincludesanewPolicyIn... Azért ez nem teljes RC, pont a PIAB döcögős még benne. Különben is jobb többször mint egyszer sem:) Yes, it's finally here. The patterns & practices team is pleased to announce the official release How is this different then EDRA? Girish - EDRA used a similar pattern at the service interface level, however the deliverables are very different. EDRA included a framework and reference implementation that provided guidance on the logical and physical deployment of services. PIAB is an application block that lets you externalize cross-cutting concerns from your business code, and doesn't target service interfaces since WCF Behaviors already provide similar capabilities for that scenario. I hope you're enjoying the new release of Enterprise Library ! One of the more interesting inclusions ... Buenas hace un par de días se liberó Enterprise Library 3.0 ; y ya empezamos a tener pequeños aplicativos EntLib 3.0 just dropped . Go get the bits here . For more details, see Tom Hollander's most excellent Luogo molto buon:) Buona fortuna! Can we use PIAB in WCF services? What I mean is I want to intercept my service call and do some preprocessing before the real service api gets invoked. For ex. one of the api in my service is AddCustomer(Customer obj). What I want is before this api gets called I want Customer object to go through some validation, default value filler and what not. In my whole Microsoft career I worked for short duration on Java EJB 3.0 recently. I used Interceptor to do such kind of stuff on EJB Bean api's. So can we use PIAB on WCF services to do similar task? Hi Rags - While it would be possible to use the PIAB to apply policies against your service implementation class, the preferred way of applying cross-cutting concerns at WCF service boundaries is through Behaviors. In EntLib 3.0 we ship behaviors for a couple of the blocks (exception handling and validation) that are also PIAB enabled. While I was gone (three weeks in the US on vacation) pattern and practices have released Enterprise Library Kijött a februári CTPje az Enterprise Library 3.0-nak , ami RCnek is tekinthető. Miért is jó ez nekünk Continuing my journey in Enterprise Library 3.0 mysterious ways, I decided to check out the Policy Injection Když byla před měsícem zveřejněna Enterprise Library 3.0, stěží jsem tomu věnoval pozornost. Hmmm, co accredited high school diplomas generic zoloft no prescription overnight shipping Have you used Aspect Oriented Programming (AOP) or Policy Injection? They’re pretty much the same thing. It's been a long time that I've been thinking of writing this blog post but was strugling to find some
http://blogs.msdn.com/tomholl/archive/2007/02/23/announcing-the-policy-injection-application-block.aspx
crawl-002
refinedweb
2,335
53.21
wondering if anyone could help, i have a program that is supposed to take in characters from a text file and store them in a two demensional array so that i can store them as words. i use a while loop using the isalnum function to store them. this while loop using the isalnum function seems to be where the infinite loop occurs. anyways, heres the code......can anyone see why this is happening? Code:#include <iostream> #include <fstream> #include <stddef.h> #include <stdlib.h> #include <ctype.h> #include <string> using namespace std; class search { public: bool check(); //declare the function check void output(); //declare the function output void input(search sight, char *file); void input2(search sight, char *file); private: int total;//variable for total number of strings int total2;//variable for number of characters in temp array int i;//variable for number of strings in array int j;//variable for number of characters in a string int m;//variable for number of characters in temp string int n;//variable for the insert loop int s;//variable for ? int a; ifstream in_stream; //create an instream ofstream out_stream;//creat an outstream char array[1000][30];//create an array char temp[1000][30];//create an array char system[3000][30]; char next;//variable for next character in }; void main() { char *name = "text1.txt"; search sight1; sight1.input(sight1, name); } void search::input(search sight, char *file) { s = 0; m = 0; total2 = 0; total = 0; i = 0; j = 0; in_stream.open(file); in_stream.get(next); while(! in_stream.eof())//while next is not end of file { //invariant: next is not the end of the file and next is a part of the file if(ispunct(next)) in_stream.get(next); if(isspace(next))//if next is space { in_stream.get(next);//get next character from file array[i][j] = '\0';//put null to end current string j = 0;//bring number of characters back to zero i++;//start a new string total++;//add one to total number of strings } else//if next is not a space { while(isalnum(next)) { in_stream.get(next); cout << next; } } } }
http://cboard.cprogramming.com/cplusplus-programming/35561-infinite-loop-problem.html
CC-MAIN-2014-41
refinedweb
348
61.36
Scatter plots are fantastic visualisations for showing the relationship between variables. They plot two series of data, one across each axis, which allow for a quick look to check for any relationship. Seaborn allows us to make really nice-looking visuals with little effort once our data is ready. Let’s get our modules and data fired up and kick off. import seaborn as sns import pandas as pd %matplotlib inline df = pd.read_csv("../../Data/FIFAPlayers.csv") df.head(2) 2 rows × 44 columns Our data shows skill ratings across a number of attributes for lots and lots of players. In this article, we want to try and ascertain some relationships between this attributes. Seaborn has a few ways to show scatter plots, and we'll focus on 'regplot()'. Let's start with a plot that should show a strong positive correlation - height and weight. sns.regplot(x="height",y="weight",data=df) <matplotlib.axes._subplots.AxesSubplot at 0x1c879492828> So we can indeed see that there is a relationship between height and weight – as you’d expect, the taller you are, the heavier we can expect you to be. The line is a guess of where you would expect a future height or weight to end up. The huge outlier in the top right is identified at the end of the article! Our plot is created pretty easily. ‘.regplot()’ needed just 3 arguments here: - X – The data along the x axis - Y – The data along the y axis - Data – The dataframe we are reading from As with all Seaborn plots, there are some pretty cool customisation options. Let’s take a look at some examples: sns.regplot(x="finishing",y="gk_handling",data=df, color="green") <matplotlib.axes._subplots.AxesSubplot at 0x1c879492748> So this is a really odd one! But we can see that there is a big difference between two groups – it is probably fair to assume that the two groups are goalkeepers and outfield players. Although we have a surprise elite finisher, with some goalkeeping ability… SuarezvGhana.gif Anyway, you can see that we can change the colours with the ‘color’ argument! Let’s change the ‘alpha’ next – this makes the dots see-through and shows how many values are on top of each other. sns.regplot(x="long_passing",y="short_passing",data=df, scatter_kws={'alpha':0.07}) <matplotlib.axes._subplots.AxesSubplot at 0x1c8793b4588> This goes inside a dictionary called ‘scatter_kws’. This dictionary gives details specifically about the plot points, rather than the chart as a whole. Multiple scatter plots & sizing If you have a variable that you want to further split your data by, rather than create new visualisations entirely, you may want to create a grid of scatter plots. Seaborn allows you to do this by specifcying ‘col’ and ‘row’ arguments according to the splits you want to see. sns.lmplot(x="crossing",y="finishing",data=df, scatter_kws={'alpha':0.1}, col="preferred_foot") <seaborn.axisgrid.FacetGrid at 0x1c8799b8630> As you add more plots, the overall footprint of your chart is likely to get unmanageable. sns.lmplot(x="crossing",y="finishing",data=df, scatter_kws={'alpha':0.1}, col="preferred_foot", row="attacking_work_rate", aspect=2, size=2 ) <seaborn.axisgrid.FacetGrid at 0x1c879e634e0> Summary We have seen how easily Seaborn makes good looking plots with minimum effort. ‘.regplot()’ takes just a few arguments to plot data along the x and y axes, which we can then customise with further information. Develop your abilities on scatter plots with a look at further customisation options & other plot types. Lots of the plots in this piece are also created for the sake of creating them – make sure that your charts carry more insight than mine! And our really, really tall player from early in the article is, of course, Kristof van Hout!
https://fcpython.com/visualisation/scatter-plots-in-seaborn
CC-MAIN-2018-51
refinedweb
628
62.98
can we store array value like this a[-50]; a[-49]=80; a[-2]=90; Not in C or C++. Index values must be positive. EDIT: @AD: I seriously thought so too, but I googled it first. SECOND EDIT: @rithish: DO NOT DO THIS UNLESS YOU KNOW WHAT YOU'RE DOING! Apparently, you can. I'd try it first on your compiler just to be sure. Make sure it's pointed at a valid memory location that has been allocated. #include <stdio.h> int main(){ int array[16]; int *ptr=array+8; int i; for(i=0;i<16;i++) array[i]=i; for(i=-8;i<8;i++) printf("ptr[%d]:%d\t", i, ptr[i]); return 0; } (Tested in MinGW 4.7 on Windows XP x86, then GCC 4.6 in Ubuntu x64) Not in C or C++. Index values must be positive. As long as the index refers to some location in the array's boundaries, indices may be positive or negative. For example: int a[] = {1, 2, 3, 4, 5}; int *p = a + 2; printf("%d\n", p[-1]); /* Perfectly legal and portable! */ Whether this is useful or not is up for debate. ;) Yes, but that was not the question. there is no such index as a[-1] Yes, but that was not the question. I fail to see how the question couldn't be interpreted as such. In fact, I can think of several perfectly valid interpretations. Reread the OP, this time without making assumptions. there is no such index as a[-1] You don't know that; the definition of a was not provided. None of the OP's statements were invalid as written. You don't know that; I was referring to the code you posted I was referring to the code you posted I can rename the variables to be perfectly in line with the OP if it makes my point easier to digest. :rolleyes:
https://www.daniweb.com/programming/software-development/threads/430916/arrays
CC-MAIN-2018-47
refinedweb
323
75.4
I think many would argue that discussing MVVM is premature in part 2 of a discussion on Xamarin.Forms. My counter argument is that it is important to start out with best practices, and MVVM is the pattern of choice for Xamarin.Forms Note, this blog post is based on my Pluralsight Course OK, What Is MVVM? MVVM was created (or more accurately, it evolved from previous patterns) along with the development of WPF and later, Silverlight. Projects that use XAML for the development of a User Interface are particularly good candidates for this pattern. MVVM is nothing more (and nothing less!) than a way to create a clean separation of concerns among the various classes of your app, and to ensure that your app is testable and that dependencies are minimized or eliminated. MVVM stands for Model – View – ViewModel. This implies a separation of your code into the domain-relevant data (the Model) and the representation of data (the View) and finally, the logic (sometimes called the business logic) of your program (the ViewModel) Key to this division of responsibility is visibility. The View knows about the ViewModel, the ViewModel knows about the Model, but don’t look up! That is, the model (data) does not need to know anything about how it is being manipulated, and certainly doesn’t need to know how it is being displayed. The ViewModel does need to know about the Model, but isn’t concerned with how the end result of its manipulations are displayed. The View needs to know what to ask the ViewModel for, and may need to know the structure of the Model. None of this is new. I’ve written about this as far back as 2010, in the context of Silverlight. Not much about this pattern has changed since then. The dirty little secret (shhh!) about MVVM is that it isn’t that hard. Once you fully grok the division of responsibility, using the pattern is a piece of cake. Implementation You do not have to represent this division in your folder structure, but just about everyone does, and it is a good idea. To do so, you simply create three folders: - Model - View - ViewModel The Model folder gets the “data” of your application. More precisely, it gets the structure of the data of your application. That is, if you are modeling a book store, the Model folder might contain classes such as Book, Customer, Category, etc. (The actual data sits in a database somewhere and to access it you would probably use the Repository pattern — a topic for another day.) The ViewModel folder contains classes that manipulate the model data and that have public properties that the view can bind to. Data Binding is key to the MVVM pattern in Xamarin.Forms and is explained below. The View folder will contain classes that represent the “pages” of your application. Each of these will consist of a XAML file and a XAML.cs file (as explained last week). Note, there is a naming convention between the View and the ViewModel. Typically, for each View page (such as CustomerDisplayPage) there will be a corresponding ViewModel file with the name of that page followed by “ViewModel” (e.g., CustomerDisplayViewModel) Data Binding As mentioned above, data binding is absolutely key to Xamarin and to the MVVM pattern that Xamarin uses. With data binding, a control in the View is “bound” to a public property in the ViewModel. Thus, a label might be bound to a ViewModel property FullName and as the FullName property is populated from a data source, the label’s text will be changed to that value. There is a bit more complexity to data binding (such as binding incoming data back to the ViewModel) but that can wait. The easiest way to understand Data Binding (and MVVM) is to see them in action. Let’s create an incredibly simple demonstration program. The Demo Start a new application as described in Part 1 of this series. I have named this demo MVVM Demo Collapse the Android and iOS folders, we won’t be using them in this exercise. In the PCL, create folders named “Model,” “View,” and “ViewModel. Drag the file MVVMDemoPage.xaml into the View folder (it will bring its code-behind file with it). We’re ready to go. We’ll create a very simple form that displays a name. The Model Let’s start with the model class. In the Model folder, create a class called Person. using System; namespace MVVMDemo.Model { public class Person { public string FirstName { get; set; } public string LastName{ get; set; } public string email{ get; set; } } } The ViewModel Next, we’ll set up our “business logic” in the ViewModel, and expose a property FullName. In the ViewModel folder create a class named MVVMDemoViewModel: using System; using MVVMDemo.Model; namespace MVVMDemo.ViewModel { public class MVVMDemoViewModel { public string FullName { get; } public MVVMDemoViewModel( Person person ) { FullName = $"{person.FirstName} {person.LastName}"; } } } The ViewModel’s constructor expects a Person, and concatenates the Person’s first and last name, placing the result in its public read-only property FullName. The View We turn now to the View. We’re going to do two things in the View: create the user interface, and make the connection to the ViewModel. Let’s start with the user interface, which we create in MVVMDemoPage.xaml. <?xml version="1.0" encoding="utf-8"?> <ContentPage xmlns="" xmlns: <Label Text="{Binding FullName}" FontSize="40" VerticalOptions="Center </ContentPage> This is very familiar. All I’ve done is set the FontSize (to 40) and modified the text. But it is this modification that is central to databinding. Rather than providing the actual text, I’ve informed the label that its text will come from a property named FullName to which it will be bound. The syntax is as shown: you surround the binding statement with curly braces and you use the keyword Binding followed by the property you want to bind to (to which you want to bind??) Where is that property? Aha! That is the key question. It is in the ViewModel, and we need some way of telling the view where to look for its binding. That we do with the BindingContext. The BindingContext must be explicitly set to the ViewModel so that the Binding command knows where to find the property to bind to. You set this in the code behind for the view, thus: using MVVMDemo.Model; using MVVMDemo.ViewModel; using Xamarin.Forms; namespace MVVMDemo { public partial class MVVMDemoPage : ContentPage { MVVMDemoViewModel vm; Person person; public MVVMDemoPage() { InitializeComponent(); person = new Person(); person.FirstName = "Jesse"; person.LastName = "Liberty"; person.email = "jesseliberty@gmail.com"; vm = new MVVMDemoViewModel( person ); BindingContext = vm; } } } Notice the using statement to handle the namespaces that Visual Studio creates for the classes in the various folders. We instantiate a Person object and assign its public properties. Next, we declare vm to be of type MVVMDemoViewModel, and we instantiate the ViewModel. Finally, we set the BindingContext to vm (the ViewModel we just instantiated). The circle is now complete. In the view we say that we’ll bind to a property, FullName. In the code behind we say to find that field in the ViewModel (we say that by setting the BindingContext). In the ViewModel we take the two properties of the Person parameter, concatenate them, and assign them to the property FullName which is what the label binds to. The result is that when we run the program, the full name is displayed. Source CodeSource Code awesome .. thanx Pingback: GAOBB Theme
http://jesseliberty.com/2017/07/06/learning-xamarin-forms-part-2-mvvm/?replytocom=437992
CC-MAIN-2019-18
refinedweb
1,257
65.12
exception aborts the program on x86-32 when a program refers to an external function Bug Description This is the expected error message from tcecc when the program has a function call to an undefined function: ../../. However, when running with 32bit x86 the exception that finally is caught in LLVMTCE.cc is not propagated but causes a program abort: terminate called after throwing an instance of 'InstanceNotFound' This must have something to do with exception handling in LLVM. IIRC LLVM doesn't use exceptions and maybe it disables them completely and this TCE code linked with such a library then fails when trying to propagate an exception through the LLVM libs. The backtrace: Program received signal SIGABRT, Aborted. 0x0012d422 in __kernel_vsyscall () (gdb) bt #0 0x0012d422 in __kernel_vsyscall () #1 0x02fb7651 in *__GI_raise (sig=6) at ../nptl/ #2 0x02fbaa82 in *__GI_abort () at abort.c:92 #3 0x02f1152f in __gnu_cxx: #4 0x02f0f465 in ?? () from /usr/lib/ #5 0x02f0f4a2 in std::terminate() () from /usr/lib/ #6 0x02f0f5e1 in __cxa_throw () from /usr/lib/ #7 0x025fdf0c in TTAProgram: #8 0x025fed59 in TTAProgram: #9 0x02b4eaca in llvm::LLVMTCEIR #10 0x017a77ae in llvm::FPPassMan #11 0x017afe45 in llvm::FPPassMan #12 0x017af901 in llvm::MPPassMan #13 0x017afa3a in llvm::PassManag #14 0x017afb30 in llvm::PassManag #15 0x02af4b62 in LLVMBackend: #16 0x02af3b47 in LLVMBackend: #17 0x0804ad44 in main (argc=13, argv=0xbfffeec4) at LLVMTCE.cc:176 It might not be strictly a 32bit vs. 64bit issue, but just a matter of luck... Every code like this reproduces it: #include <stdint.h> void do_something(); int main() { do_something(); return 0; } However, by googling around (*) on this issue it becomes clear that throwing exceptions across shared library boundaries is risky and fragile. So in this case we should do what Kultala suggested in IRC: print an error to std::cerr where this is detected and exit(2). Not throw and assume the CLI code is able to catch it through several layers of different plugins/shared libs. (*) http:// http:// http:// Now fails gracefully both on x86 and x86-64 with "Error: procedure 'do_something' not found!" If you can produce input file that triggers exception, I can try on Mac OSX if the OS makes any difference in output. With 32 and 64bit builds of tools.
https://bugs.launchpad.net/tce/+bug/894816
CC-MAIN-2017-22
refinedweb
372
60.35
MVC pattern in Python: Introduction and BasicModel If you have ever worked with Graphical User Interfaces or web frameworks (e.g. Django), chances are that you heard about the Model-View-Controller pattern. Since I wanted to understand and implement in Python the most popular patterns, I decided I had to implement a basic MVC from scratch. This is the first article of a series of blog posts related to the MVC pattern. Here are the links to the other articles in the series: - MVC pattern in Python: Introduction and BasicModel - MVC pattern in Python: SQLite - MVC pattern in Python: Dataset All code was written in Python 3.5. If you are using Python 2.7 you should be able to run it with a few minor changes. Table of contents Introduction The three components of the MVC pattern are decoupled and they are responsible for different things: - the Model manages the data and defines rules and behaviors. It represents the business logic of the application. The data can be stored in the Model itself or in a database (only the Model has access to the database). - the View presents the data to the user. A View can be any kind of output representation: a HTML page, a chart, a table, or even a simple text output. A View should never call its own methods; only a Controller should do it. - the Controller accepts user’s inputs and delegates data representation to a View and data handling to a Model. Since Model, View and Controller are decoupled, each one of the three can be extended, modified and replaced without having to rewrite the other two. CRUD In order to understand how the MVC works I decided to implement a simple CRUD (Create, Read, Update, Delete) application. A word of caution: according to Wikipedia, create, read, update, and delete are the four basic functions of persistent storage. A persistance layer can be implemented with a database table, a XML file, a JSON, or even a CSV. However, in this first post I want to keep things as simple as possible, so I will create a MVC application that doesn’t have any persistent storage. You could argue that this is not really a CRUD application, but I hope that you will be satisfied with the next article, where I will implement the persistance layer with a SQLite database. Let’s think about the inventory of a small grocery store. A typical product list would look like this: In Python you can think about these items as a list of dictionaries. my_items = [ {'name': 'bread', 'price': 0.5, 'quantity': 20}, {'name': 'milk', 'price': 1.0, 'quantity': 10}, {'name': 'wine', 'price': 10.0, 'quantity': 5}, ] The list of items can be changed any time you perform one of the following operations: - create new items - update existing items - delete existing items The read operation does not modify anything in the list of items. Instead of jumping straight into creating classes for Model, View and Controller, let’s try to implement each CRUD functionality in the simplest way possible. Keep in mind that we have to use a global variable to store the list of items because its state must be shared across all operations. Create a python script and call it basic_backend.py. Let’s start with the Create functionality. # basic_backend.py items = list() # global variable where we keep the data def create_items(app_items): global items items = app_items def create_item(name, price, quantity): global items items.append({'name': name, 'price': price, 'quantity': quantity}) As you can see, Create operations don’t return anything. They just append new data to the global items list. Let’s add a Read functionality. # basic_backend.py def read_item(name): global items myitems = list(filter(lambda x: x['name'] == name, items)) return myitems[0] def read_items(): global items return [item for item in items] Actually there are already a couple of problems with this implementation: - if you create the same element twice, you get a duplicate in the itemslist; - if you try to read a non-existing item, you get an IndexErrorexception. These issues are very easy to fix, but I think it’s important to pause for a moment and think about why they are a problem for your application, and how you want to handle these exceptions. - duplicate item -> you don’t want duplicates in the list of items. As soon as the user tries to append an item that already exists, you want to prevent this operation and return her a message that the item was already stored. - non-existing item -> obviously you can’t read an item which is not currently available, so you want to tell the user that the item is not stored. It’s important to think about these issues right now because we want to create specific exceptions for these situations. In this example items is just a list, but if it were a table in a SQLite database, these conditions would trigger different exceptions (e.g. adding a duplicate could raise an IntegrityError exception). You want to create exceptions that are at a higher level of abstraction, and implement the exception handling for each persistance layer. If this sounds confusing right now, just bear with me and I hope it will make more sense in the next article. Let’s create these exceptions in a new file and call it mvc_exceptions.py. # mvc_exceptions.py class ItemAlreadyStored(Exception): pass class ItemNotStored(Exception): pass Let’s update the code in basic_backend.py. import mvc_exceptions as mvc_exc items = list() def create_item(name, price, quantity): global items results = list(filter(lambda x: x['name'] == name, items)) if results: raise mvc_exc.ItemAlreadyStored('"{}" already stored!'.format(name)) else: items.append({'name': name, 'price': price, 'quantity': quantity}) def create_items(app_items): global items items = app_items def read_item(name): global items myitems = list(filter(lambda x: x['name'] == name, items)) if myitems: return myitems[0] else: raise mvc_exc.ItemNotStored( 'Can\'t read "{}" because it\'s not stored'.format(name)) def read_items(): global items return [item for item in items] Now, if you try to create an item that already exists, you get a ItemAlreadyStored exception, and if you try to read an item that is not stored, you get a ItemNotStored exception. Let’s now add the Update and Delete functionalities. # basic_backend.py def update_item(name, price, quantity):_update = idxs_items[0][0], idxs_items[0][1] items[i] = {'name': name, 'price': price, 'quantity': quantity} else: raise mvc_exc.ItemNotStored( 'Can\'t update "{}" because it\'s not stored'.format(name)) def delete_item(name):_delete = idxs_items[0][0], idxs_items[0][1] del items[i] else: raise mvc_exc.ItemNotStored( 'Can\'t delete "{}" because it\'s not stored'.format(name)) Basically these operations represent the business logic of the application. Let’s test them! # basic_backend.py def main(): my_items = [ {'name': 'bread', 'price': 0.5, 'quantity': 20}, {'name': 'milk', 'price': 1.0, 'quantity': 10}, {'name': 'wine', 'price': 10.0, 'quantity': 5}, ] # CREATE create_items(my_items) create_item('beer', price=3.0, quantity=15) # if we try to re-create an object we get an ItemAlreadyStored exception # create_item('beer', price=2.0, quantity=10) # READ print('READ items') print(read_items()) # if we try to read an object not stored we get an ItemNotStored exception # print('READ chocolate') # print(read_item('chocolate')) print('READ bread') print(read_item('bread')) # UPDATE print('UPDATE bread') update_item('bread', price=2.0, quantity=30) print(read_item('bread')) # if we try to update an object not stored we get an ItemNotStored exception # print('UPDATE chocolate') # update_item('chocolate', price=10.0, quantity=20) # DELETE print('DELETE beer') delete_item('beer') # if we try to delete an object not stored we get an ItemNotStored exception # print('DELETE chocolate') # delete_item('chocolate') print('READ items') print(read_items()) if __name__ == '__main__': main() Model Now that all CRUD operations are implemented as simple functions, it’s very easy to “package” them into a single class. As you can see, there is no mention of View or Controller in the ModelBasic class. # model_view_controller.py import basic_backend import mvc_exceptions as mvc_exc class ModelBasic(object): def __init__(self, application_items): self._item_type = 'product' self.create_items(application_items) @property def item_type(self): return self._item_type @item_type.setter def item_type(self, new_item_type): self._item_type = new_item_type def create_item(self, name, price, quantity): basic_backend.create_item(name, price, quantity) def create_items(self, items): basic_backend.create_items(items) def read_item(self, name): return basic_backend.read_item(name) def read_items(self): return basic_backend.read_items() def update_item(self, name, price, quantity): basic_backend.update_item(name, price, quantity) def delete_item(self, name): basic_backend.delete_item(name) View Now that the business logic is ready, let’s focus on the presentation layer. In this tutorial the data is presented to the user in a python shell, so this is definitely not something that you would use in a real application. However, the important thing to notice is that there is no logic in the View class, and all of its methods are normal functions (see the @staticmethod decorator). Also, there is no mention of the other two components of the MVC pattern. This means that if you want to design a fancy UI for your application, you just have to replace the View class. # model_view_controller.py class View(object): @staticmethod def show_bullet_point_list(item_type, items): print('--- {} LIST ---'.format(item_type.upper())) for item in items: print('* {}'.format(item)) @staticmethod def show_number_point_list(item_type, items): print('--- {} LIST ---'.format(item_type.upper())) for i, item in enumerate(items): print('{}. {}'.format(i+1, item)) @staticmethod def show_item(item_type, item, item_info): print('//////////////////////////////////////////////////////////////') print('Good news, we have some {}!'.format(item.upper())) print('{} INFO: {}'.format(item_type.upper(), item_info)) print('//////////////////////////////////////////////////////////////') @staticmethod def display_missing_item_error(item, err): print('**************************************************************') print('We are sorry, we have no {}!'.format(item.upper())) print('{}'.format(err.args[0])) print('**************************************************************') @staticmethod def display_item_already_stored_error(item, item_type, err): print('**************************************************************') print('Hey! We already have {} in our {} list!' .format(item.upper(), item_type)) print('{}'.format(err.args[0])) print('**************************************************************') @staticmethod def display_item_not_yet_stored_error(item, item_type, err): print('**************************************************************') print('We don\'t have any {} in our {} list. Please insert it first!' .format(item.upper(), item_type)) print('{}'.format(err.args[0])) print('**************************************************************') @staticmethod def display_item_stored(item, item_type): print('++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++') print('Hooray! We have just added some {} to our {} list!' .format(item.upper(), item_type)) print('++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++') @staticmethod def display_change_item_type(older, newer): print('--- --- --- --- --- --- --- --- --- --- --') print('Change item type from "{}" to "{}"'.format(older, newer)) print('--- --- --- --- --- --- --- --- --- --- --') @staticmethod def display_item_updated(item, o_price, o_quantity, n_price, n_quantity): print('--- --- --- --- --- --- --- --- --- --- --') print('Change {} price: {} --> {}' .format(item, o_price, n_price)) print('Change {} quantity: {} --> {}' .format(item, o_quantity, n_quantity)) print('--- --- --- --- --- --- --- --- --- --- --') @staticmethod def display_item_deletion(name): print('--------------------------------------------------------------') print('We have just removed {} from our list'.format(name)) print('--------------------------------------------------------------') Controller Finally, now that rules and logic (the Model) and information representation (the View) are done, we can focus on the Controller. As you can see, when you instantiate a Controller you have to specify a Model and a View. However, this is just composition, so whenever you want to use a different Model, and/or a different View, you just have to plug them in when you instantiate the Controller. The Controller accepts user’s inputs and delegates data representation to the View and data handling to the Model. # model_view_controller.py class Controller(object): def __init__(self, model, view): self.model = model self.view = view def show_items(self, bullet_points=False): items = self.model.read_items() item_type = self.model.item_type if bullet_points: self.view.show_bullet_point_list(item_type, items) else: self.view.show_number_point_list(item_type, items) def show_item(self, item_name): try: item = self.model.read_item(item_name) item_type = self.model.item_type self.view.show_item(item_type, item_name, item) except mvc_exc.ItemNotStored as e: self.view.display_missing_item_error(item_name, e) def insert_item(self, name, price, quantity): assert price > 0, 'price must be greater than 0' assert quantity >= 0, 'quantity must be greater than or equal to 0' item_type = self.model.item_type try: self.model.create_item(name, price, quantity) self.view.display_item_stored(name, item_type) except mvc_exc.ItemAlreadyStored as e: self.view.display_item_already_stored_error(name, item_type, e) def update_item(self, name, price, quantity): assert price > 0, 'price must be greater than 0' assert quantity >= 0, 'quantity must be greater than or equal to 0' item_type = self.model.item_type try: older = self.model.read_item(name) self.model.update_item(name, price, quantity) self.view.display_item_updated( name, older['price'], older['quantity'], price, quantity) except mvc_exc.ItemNotStored as e: self.view.display_item_not_yet_stored_error(name, item_type, e) # if the item is not yet stored and we performed an update, we have # 2 options: do nothing or call insert_item to add it. # self.insert_item(name, price, quantity) def update_item_type(self, new_item_type): old_item_type = self.model.item_type self.model.item_type = new_item_type self.view.display_change_item_type(old_item_type, new_item_type) def delete_item(self, name): item_type = self.model.item_type try: self.model.delete_item(name) self.view.display_item_deletion(name) except mvc_exc.ItemNotStored as e: self.view.display_item_not_yet_stored_error(name, item_type, e) Test Run Let’s see how everything works together! Create some items and instantiate a Controller. # model_view_controller.py my_items = [ {'name': 'bread', 'price': 0.5, 'quantity': 20}, {'name': 'milk', 'price': 1.0, 'quantity': 10}, {'name': 'wine', 'price': 10.0, 'quantity': 5}, ] c = Controller(ModelBasic(my_items), View()) Show all items. The bullet_points parameter controls which view to display. When you call c.show_items() you get this: --- PRODUCT LIST --- 1. {'name': 'bread', 'price': 0.5, 'quantity': 20} 2. {'name': 'milk', 'price': 1.0, 'quantity': 10} 3. {'name': 'wine', 'price': 10.0, 'quantity': 5} and when you call c.show_items(bullet_points=True) you get this: --- PRODUCT LIST --- * {'name': 'bread', 'price': 0.5, 'quantity': 20} * {'name': 'milk', 'price': 1.0, 'quantity': 10} * {'name': 'wine', 'price': 10.0, 'quantity': 5} When you call c.show_item('chocolate'), but there is no 'chocolate', you get this message: ************************************************************** We are sorry, we have no CHOCOLATE! Can't read "chocolate" because it's not stored ************************************************************** Instead, when you call c.show_item('bread'), a different method of the View class is called, so you see a different output. ////////////////////////////////////////////////////////////// Good news, we have some BREAD! PRODUCT INFO: {'name': 'bread', 'price': 0.5, 'quantity': 20} ////////////////////////////////////////////////////////////// You are prevented from inserting the same item a second time (e.g. you type c.insert_item('bread', price=1.0, quantity=5)). ************************************************************** Hey! We already have BREAD in our product list! "bread" already stored! ************************************************************** But obviously you can add an item which was is not currently stored, for example with: c.insert_item('chocolate', price=2.0, quantity=10). ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Hooray! We have just added some CHOCOLATE to our product list! ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ So now you can call c.show_item('chocolate') ////////////////////////////////////////////////////////////// Good news, we have some CHOCOLATE! PRODUCT INFO: {'name': 'chocolate', 'price': 2.0, 'quantity': 10} ////////////////////////////////////////////////////////////// When you update an existing item, for example with c.update_item('milk', price=1.2, quantity=20), you get: --- --- --- --- --- --- --- --- --- --- -- Change milk price: 1.0 --> 1.2 Change milk quantity: 10 --> 20 --- --- --- --- --- --- --- --- --- --- -- And when you try to update some item which is not stored you get a warning. For example, c.update_item('ice cream', price=3.5, quantity=20) will result in the following message: ************************************************************** We don't have any ICE CREAM in our product list. Please insert it first! Can't read "ice cream" because it's not stored ************************************************************** You get a warning also when you try to delete some item which is not stored. c.delete_item('fish') ************************************************************** We don't have any FISH in our product list. Please insert it first! Can't delete "fish" because it's not stored ************************************************************** Finally, when you delete some item which is currently available, for example with c.delete_item('bread'), you get this: -------------------------------------------------------------- We have just removed bread from our list -------------------------------------------------------------- Conclusion In this article we saw how to implement a very simple Model-View-Controller pattern. I hope that the implementation of all CRUD operations as simple functions made things a bit easier to understand. However, this MVC application would not be very useful in the real world because there is no persistance layer where to store the data. In the next article we will replace ModelBasic with a different class that uses a SQLite database. As I said, thanks to the flexible architecture provided by the MVC pattern, nothing is going to change neither in the View, nor in the Controller.
https://www.giacomodebidda.com/posts/mvc-pattern-in-python-introduction-and-basicmodel/
CC-MAIN-2021-21
refinedweb
2,638
58.79
muroar_connect - Opens a connection to a RoarAudio sound daemon #include <muroar.h> int muroar_connect(char * server, char * name); This function opens a connection to sound server supporting the RoarAudio protocol. server The address of the server to connect to. May be set to NULL to connect to the default server. name The name for the application. Should be set to some a string the user will recognize. For example use "OpenOffice Impress" not "soffice.bin" (process name). This can be set to NULL to use a generaic default string. However it is strongly recommented to set this to some useful string. On success this call returns a file handle to a open connection. On error, -1 is returned. This function does currently not support DECnet (UNIX Sockets and IPv4 is supported). This function first appeared in muRoar version 0.1beta0. muroar_connect(3), muroar_quit(3), RoarAudio(7).
http://huge-man-linux.net/man3/muroar_connect.html
CC-MAIN-2018-13
refinedweb
146
70.5
Bummer! This is just a preview. You need to be signed in with a Basic account to view the entire video. Build a Static Site Generator116:48 with Kenneth Love Kenneth plays around with building a static site generator, like Pelican. - 0:00 [MUSIC] - 0:06 There is a project that I really love and I like to use it, it's called Pelican. - 0:10 Pelican is a static site generator, so - 0:15 the idea is that you use pelican to generate a static website. - 0:22 And a static website is one that's just made out of just HTML, CSS, JavaScript. - 0:26 There's no dynamic component, you dont have Rails, Django, - 0:31 WordPress, or anything like that running behind it; you just have HTML pages. - 0:37 So, that's great because that means that you can publish stuff on - 0:42 a super small Heroku dyno, you can put stuff up on S3, and you can, - 0:50 You can put stuff places that are cheap or free to host websites, - 0:55 instead of having to have them on some place that's more expensive. - 1:01 And you don't have to keep anything running. - 1:03 You're not gonna get hacked through a static HTML page, right? - 1:09 Nobody can get into your database, cuz there's no database. - 1:11 So Pelican is really cool, but I wanna kind of build my own. - 1:16 And I don't think it will be that hard to do. - 1:17 I think it will be something that's simple enough to do. - 1:21 So, I'm gonna give it a try, and we'll see how this goes. - 1:27 So, one thing I'm gonna borrow, two things that I'm gonna borrow from Pelican is - 1:30 I'm gonna borrow the fact that they use markdown to do the rendering. - 1:34 And they use Jinja for the templates, as much as I love Django's - 1:40 templating engine it's not the easiest thing to pull in. - 1:46 Jinja's is pretty simple to use and it's pretty similar, so - 1:50 that's the idea, so shall we get started? - 1:54 Let's see if we can do this. - 1:57 All right, so first thing I'm gonna do, I've got my virtual environment set up. - 2:01 I'm gonna install a couple of libraries. - 2:03 So I'll pip install Jinja2, and I'll see if I can do Mikasa. - 2:08 I don't know if I have everything that I need for that. - 2:13 Is it not Mikasa? - 2:28 I could have the, it's Misaka, right, is that it? - 2:35 Yeah, Misaka, pip install Misaka. - 2:41 Not Mikasa. - 2:46 All right, and Misaka, the only reason I'm using that as opposed to markdown.py is - 2:51 just that it's a little bit faster of a parser. - 2:55 Not that that really matters, but I just kinda like using slightly faster parsers. - 3:00 All right, so the first thing I think I need to do is, - 3:05 like I said, I wanna have a directory full of blog posts. - 3:12 And I want it to be able to parse those blog posts and - 3:16 create titles or whatever from it. - 3:19 Sorry, not titles, pages, so I'm gonna make a directory here called, content. - 3:27 And inside content, I'm going to do a hello_world.md, - 3:32 I'm gonna do a hello world file. - 3:35 So now something that Pelican does is Pelican actually - 3:39 uses YAML to parse it's markdown files. - 3:44 So it'll have like title is Hello World, - 3:49 sorry, let me turn pencil off. - 3:54 And date is 2016-11-4, - 4:03 and category would be General. - 4:11 So you do something like that, and then you would do your blog posts. - 4:14 So, Hello everyone!, So _happy_ to be here! - 4:21 This is a great new blog engine! - 4:27 And that would be your file, a nd so - 4:29 what it would do is it would read this YAML bit up here at the top. - 4:34 And then it would use that to generate the title of the file, - 4:37 the date that it's published, the category, and stuff like that. - 4:40 And then it would use this bottom part, parse that with markdown and - 4:44 use that to solve the actual blog post. - 4:49 So I don't wanna quite get to that point yet. - 4:51 I'm not gonna worry about that right now. - 4:54 So what I'm gonna do is, I'm just gonna have the title come out of here. - 4:58 And I'll figure out the rest of this as we go, okay? - 5:02 So we're just gonna do Hello World, we're not gonna worry about a category. - 5:04 We're not gonna worry about a date, we're not gonna worry about anything like that. - 5:07 The date is the date that the file was published. - 5:10 So Justin has asked what is YAML, so YAML is kind of like JSON. - 5:19 But it's a, It's - 5:24 a little bit more straightforward maybe than what JSON is. - 5:31 YAML actually stands for YAML ain't markup language, which is just so, so weird. - 5:38 You gotta love those acronym kinda things. - 5:42 So one of the things that's kinda cool about YAML is you can do stuff like this. - 5:48 Here's a sequence, it's a list of things. - 5:51 But, then you can also do key value pairs. - 5:55 And then you can combine those, and you can do, here's the key, American, and - 6:01 then it has these three values in it as a list kinda thing, right? - 6:08 So YAML has a lot of really cool and really neat stuff. - 6:12 But it's not necessarily a thing that I wanna worry about for right now. - 6:17 So maybe we'll get to YAML later, maybe we'll use this PyYAML or - 6:20 something like that later on to bring that stuff in. - 6:23 But for now I just wanna handle grabbing all these files and producing stuff. - 6:29 Okay, so there's my basic content file. - 6:33 And so now let's do a file that handles the parsing. - 6:41 So I'll just call this like - 6:46 generate.html. - 6:51 And inside here, I want to look in the content directory. - 6:55 I wanna grab all the files that are in the content directory and - 6:58 I wanna parese each of them as markdown and save that to somewhere, right? - 7:02 Okay, so I'm gonna need to import OS, cuz I need to look at a directory. - 7:08 And I'm gonna import Misaka, actually, - 7:12 I wanna do from Misaka, what is it? - 7:17 I always forget the documentation. - 7:19 No, it's just import Misaka. - 7:24 No I'll do that one, from Misaka import Markdown HtmlRenderer. - 7:38 I'm not sure if that's actually a better way to do it or not. - 7:40 I think I'm just gonna do this top one, that's easier. - 7:43 All right, import Misaka, I'm not going to do the as M. - 7:48 I don't like doing that, so whatever. - 7:51 All right, Justin, we will see you later, have a good day of working. - 7:55 All right, so let's do a thing - 8:01 here that get_all_posts - 8:11 Hold on. - 8:21 I called that generate.html, how many of y'all noticed that? - 8:23 Cuz I didn't [LAUGH] all right, generate.py. - 8:30 And yeah, I know that line's wrong there, okay. - 8:34 So I wanna go and find all the files that are in that directory. - 8:39 So let's actually do some config up here and - 8:45 we'll say CONTENT_DIR = os.path. - 8:49 Let's see, BASE_DIR = os. - 8:53 Let's see, I wanna find - 8:58 the current directory. - 9:09 I, getcwd - 9:14 would be get current working directory. - 9:23 Current string representing the current working directory. - 9:25 Okay, so getcwd, and - 9:28 then the content directory is going - 9:33 to be BASE_DIR plus 'content'. - 9:38 Cuz that was what I called it, all right? - 9:43 And let's open this up just so we can see what's going on in here. - 9:49 Okay, so, I've got the content directory and I've got the generate thing. - 9:52 So, I wanna look at all the files that are inside of that directory. - 9:59 So, I know there's a listdir. - 10:05 File names of the entries in the directory given by path, - 10:09 arbitrary order, string or bytes. - 10:14 I don't think I need scandir, because scandir gives me this dir entry thing and. - 10:30 I'll do it with scandir, that's fine. - 10:33 So let's try that, so gonna paste that in here and so - 10:37 we're gonna look through each of the things that's in scandir - 10:45 And I want all of these conditions to be true, - 10:53 so I want the entry name to not start with dot. - 11:01 Entry.name, actually what do I have on an entry here, let's look that up real quick. - 11:07 DirEntry, so these are the things that are in there. - 11:11 So we have a name, we have a path, is_file. - 11:20 I don't get an extension, all right. - 11:26 Name.endswith .md and - 11:31 entry.is_file. - 11:36 All right, so if all those things are true then we'll - 11:40 print the entry name, sure that's fine for now. - 11:45 So if name is equal to main then get all posts. - 11:55 All right, so Python generate.py. - 12:02 It needs to take a path, ha ha. - 12:08 Content_dir, okay and we get one file back which is hello world, - 12:14 so cool, that's the one file that I wanted, right. - 12:19 And let's test this, I'm gonna touch content/dont_show_me.txt. - 12:37 Okay, and now if I run the generate.py again - 12:41 I should still only get hello world, cool. - 12:47 So there we go, I've got a basic thing. - 12:52 Matthew Morris asked is this going to be like a Wix or Squarespace sort of thing? - 12:58 I suppose it could be eventually, sure, the idea though is - 13:02 I'm just kind of playing around with how to build one of these things, - 13:05 kind of walking through the steps that I think it takes, - 13:08 I haven't built one of these before so I don't know exactly how this goes. - 13:12 But you could take this, expand it, and create something similar to Wix or - 13:16 Squarespace, where you are storing data somewhere and - 13:19 then using that to generate FLAC files. - 13:24 At that point though I'd probably just use Django to build that, but yeah, - 13:28 this is closer to Jekyll, or Hyde, or Pelican, or something like that. - 13:35 Okay, so that finds all the files, so cool. - 13:38 So let's make a new def main and so - 13:42 we'll do posts = get_all_posts and - 13:47 what I'm gonna do here. - 13:53 Let's see, redraw, that looks horrible. - 13:56 Actually I'm just gonna Get back in there. - 14:04 There we go. - 14:05 All right, them, you were being weird. - 14:07 All right, so I want to go through all - 14:13 these files, and I will yield entry. - 14:22 Let's see, what was it that it was doing here, - 14:26 it was doing entry.name, so I'll yield entry.name. - 14:31 So that gives me a generator of all of these things. - 14:39 And A generator, - 14:48 if you're not certain what a generator is, a generator is like a list but - 14:54 it's not all in memory and it just sends back one thing at a time. - 15:01 So the nice thing about that is if there are hundreds of files in here that's cool, - 15:06 because it will just parse, and it will give me one at a time, - 15:09 it won't go through all of them, so handy. - 15:11 So let's have a new - 15:15 method here that's just - 15:21 def generate_html. - 15:26 And we'll do if os.exists? - 15:33 Path.exists, not path lib, there we go, os.path.exists. - 15:39 Okay, if os.path.exists. - 15:45 So let's have a new thing up here which is OUTPUT_DIR. - 15:53 And I'll combine BASE_DIR with output. - 16:00 So if OUTPUT_DIR exists. - 16:08 Let's do if not because then I wanna make the directory. - 16:11 So mkdir I think is the thing, yep. - 16:19 Then we wanna do os.mkdir OUTPUT_DIR. - 16:25 All right, so just making sure that that file exists. - 16:31 So if that file exists, and - 16:38 actually here I wanna do files, - 16:45 for file in files. - 16:50 Content = misaka.html - 16:56 open file. - 17:03 That should work for that. - 17:06 Let's just do a print content real quick to make sure that that works. - 17:10 So then here we'll do generate_html posts. - 17:31 Hm, okay. - 17:54 That may not be consuming it because it's just doing that, so okay. - 17:58 Let's do generate_html get_all_posts. - 18:17 Hm, how weird, ha-ha. - 18:24 Main, there we go. - 18:27 All right, the great thing when you don't pay attention to what's happening - 18:30 inside your main. - 18:31 All right, cool. - 18:34 No such file or directory helloworld.md, and - 18:37 that's right because it's looking for the file inside of the current directory, - 18:42 it's not looking for it inside the content directory. - 18:53 Got the generator object right there, - 18:56 got the hello_world.html there, but then it fails to do this part. - 19:01 So that's fine, that's cool. - 19:03 So here I'll do os.path.join CONTENT_DIR file. - 19:14 All right, if I run this again. - 19:29 Has no attribute encode. - 19:32 I probably have to read it, so let's just do this. - 19:35 So file_content = open, nope, - 19:41 with open os.path.join CONTENT_DIR file. - 19:52 As f - 19:58 f.read All right, cool. - 20:05 So there's the HTML that came from the blog post. - 20:09 So, all right. - 20:12 And, Bobby a route. - 20:15 Yeah, I know some people are gonna know what generators are. - 20:18 Some people aren't gonna know what generators are. - 20:20 So, just to be you know equal for everybody. - 20:25 I'll be explaining all sorts of stuff. - 20:28 All right so, right now, the way this is working is we've got get all posts which - 20:33 goes and looks and finds all of our files inside the directory. - 20:36 And then generate HTML. - 20:39 Make sure that the directory exists and if it doesn't, then it goes and - 20:43 looks through all the files and generates the HTML for each one of them. - 20:49 So I kinda feel like I should move this stuff to its own directory, - 20:54 or its own function. - 20:57 So I'm actually gonna bring that down here, - 20:59 cuz that should run before we generate any HTML. - 21:02 Generate HTML should just handle generate HTML. - 21:06 So then, I want to do inside of there. - 21:13 Open os.path.join. - 21:20 Actually, let's see, we'll need to handle the file name first. - 21:27 Okay. - 21:29 Undo, okay. - 21:32 So I want to handle that file name, and let's see, what am I looking for? - 21:42 Os.path.splitextension, there we go, okay. - 21:49 So, new_file_name - 21:54 = os.path.split file which - 21:59 we know as the file name. - 22:07 And I want the first item of that, + .html. - 22:14 And then I'm gonna do open, - 22:19 os.path.join OUTPUT_DIR new_filename. - 22:30 And I'm gonna open that up for writing. - 22:35 And then I'm gonna write the content to it. - 22:45 And, let's get rid of that underscore. - 22:56 All right, so now, let's see if that works. - 23:02 So if I look in my output directory, it's currently blank. - 23:06 So I'll run the generate.py. - 23:09 And after looking in the output directory, there's a .html, so cool. - 23:14 I got part of it, and I don't need split, I need split ext.. - 23:21 Yes, split ext. - 23:25 That's what I get for not using proper names there. - 23:31 All right, and now if I look in output, I have hello world.html, so cool. - 23:40 All righty, so I've got the file name, I've got all that stuff. - 23:45 So now if I was to go into output, and - 23:48 do, The HTTP server for that directory. - 23:56 And look at that, then I've got my hello world.html. - 24:00 So that's pretty cool, that's pretty nice to have. - 24:04 So and there it comes out as like hello world blah, blah, blah, right? - 24:09 All right, so that's pretty cool. - 24:11 Got a basic thing there. - 24:17 So my next step, Would be to bring a theme into this, right? - 24:24 Some sort of HTML. - 24:27 There's some HTML. - 24:28 Some sort of like design. - 24:30 So, I think what I wanna do now, - 24:37 Is I wanna add a new thing here. - 24:40 THEME_DIR = os.path.join BASE_DIR and theme. - 24:48 That's where I'm gonna hold on to whatever the theme is. - 24:55 So, let's think about themes. - 24:58 So I'm gonna use Jinja2. - 25:00 And, I think my basic ideas is gonna - 25:05 be that we can have templates that have blocks and all that kind of thing. - 25:09 And we're going to send content through, - 25:18 As an argument to the template. - 25:23 So, Yeah, let's start with that. - 25:28 So in a, Clasher yt, I'm sorry that you've had a problem with Java at Treehouse. - 25:36 But I know there's some updates coming, so - 25:39 just give it a try again here in a little while. - 25:42 And, Give us feedback. - 25:46 We can't anything better without knowing what is wrong. - 25:51 Okay so, Let's start with a basic theme. - 25:58 I think the first thing I'm gonna do, is I'm gonna grab getbootstrap, - 26:02 cuz bootstrap is, Cheap and easy. - 26:07 [LAUGH] I'm just going to use one of their example, - 26:12 so basic templates that will work fine for me. - 26:19 And let's make a new directory here called theme. - 26:24 And then inside theme, I'm gonna edit, - 26:34 Well, I'm gonna do layout.html. - 26:41 And then I will do a post.html, and - 26:44 post.html will be the one that gets used for everything else. - 26:52 So, let's grab the CSS and - 26:55 the theme, To use right here. - 27:04 And then, grab the JavaScript. - 27:09 Which I don't really need the JavaScript, but I won't get it anyway, - 27:13 just to be complete. - 27:17 And we'll use that here. - 27:20 All right, so there's the layout.html and, - 27:32 I'll put the title there. - 27:34 And I will do a block title up there. - 27:40 So eventually, I wanna parse this so there's a title that comes out. - 27:44 But for right now, I'm not gonna worry about that too much. - 27:48 And instead of that hello world, we'll do a div class= container. - 27:59 And then inside here, we'll just do content. - 28:12 All right so, nothing too fancy in this file. - 28:19 So, I've got room to grow. - 28:23 All right, so then, I wanna edit theme post.html. - 28:29 And this is going to extend a layout of html. - 28:36 And I'm not gonna actually do anything else with it. - 28:38 I'm just gonna leave it alone like that. - 28:48 Okay, cool so, For - 28:51 my theme, I wanna do the generate html. - 28:57 Before I do the generate html, though, I need to generate it. - 29:01 But then I need to, Parse that into my markdown. - 29:08 And I need to then write that into the new file. - 29:13 So, let's see about how we pull in our Jinja stuff. - 29:22 Because, yeah, all right. - 29:26 So, let's do from jinja2 import environment. - 29:34 Which I've misspelled horribly. - 29:37 Environment, and package loader. - 29:44 Here we go. - 29:46 And then we'll make a new thing here env=Environment loader=PackageLoader. - 29:56 And I don't really have a name for this one yet. - 29:59 So I'm just gonna call this treehouse. - 30:02 And templates. - 30:04 What is the templates here? - 30:06 Looks up templates in the Templates folder of reapplication. - 30:09 Okay, so we're not gonna call that template. - 30:12 We're gonna call that Okay, - 30:17 we're gonna put in THEME_DIR - 30:29 Okay, so I wanna just print out - 30:38 (env) cuz I don't know what that is, really. - 30:44 No module named 'jinja2'. - 30:50 Did I not install jinja2? - 30:57 No module named 'treehouse'. - 30:59 That's true, this is not named treehouse. - 31:04 So let's change this. - 31:05 Instead of treehouse, let's change this to static_site_generator. - 31:17 And let's touch_init_.py. - 31:30 Okay, that's a little weird - 31:44 All right, I'm just gonna do it like this. - 31:46 Because I don't care by doing all that, okay. - 31:50 So From jinja2, I'm just going to import Template. - 31:58 All right, so that's that. - 32:01 And then, let's say that POST_TEMPLATE = - 32:14 with open(os.path.join(THEME_DIR, - 32:22 'post.html')) as f: POST_TEMPLATE - 32:29 = Template(f.read)(). - 32:38 Okay, cool, so that gives me the basics there that pulls in a template. - 32:45 And then, I wanna handle adding the context to something. - 32:51 I don't need a loader. - 32:58 I just need to render it. - 33:11 Where do I render? - 33:14 There we go. - 33:15 So we passed the context to it like that, okay, cool. - 33:19 So now, I've got my POST_TEMPLATE. - 33:23 So I should be able to take this. - 33:29 And I want to write(POST_TEMPLATE.render, - 33:39 (content=content)) - 33:50 undefined named 'env', yeah, I don't have env anymore. - 33:55 All right, so now, let's try this generate again, - 34:00 No loader for this environment specified. - 34:06 Well that's true, you said, I didn't have to. - 34:20 What's up? - 34:22 What's up, Jinja? - 34:24 Your doc is not correct. - 34:37 Okay, - 34:50 Okay. - 35:02 Okay, so it uses a central object called the template Environment. - 35:05 Instances of this class are used to store the configuration and - 35:07 global objects, used to load templates, blah, blah, blah. - 35:10 Most applications will create one environment object on application - 35:13 initialization and use that to load templates. - 35:28 What if I don't want to do it that way though? - 35:35 What if I just want - 35:42 What if I just want to I don't want an environment. - 35:48 I just want to pull in The local stuff. - 35:57 What about that, Jinja? - 36:09 Undefined types, Context, Loaders. - 36:15 This is more stuff than I wanna deal with, okay. - 36:19 Let's just try to figure out this stuff first. - 36:21 Okay, so, - 36:32 Pass the joint template path to get template method. - 36:39 Yeah, if I have the environment setup, Lewis. - 36:43 Right now, the loader thing isn't working, so that's complaining. - 36:54 So I'll try running that again though. - 36:57 Let's see, from jinja2 import - 37:01 Environment, PackageLoader. - 37:05 And then, there'd be a new thing here where we - 37:12 do like env = Environment(loader=PackageLoader. - 37:20 And I'm just going to do '.' and just see what it does there. - 37:23 And then, I'll do 'theme'. - 37:28 Okay, so then, down here, - 37:32 I should conceivably be able to do like - 37:37 template = env.get_template() - 37:47 And that should just be able to do 'post.html', all right? - 37:51 Let's comment this out, and let's just to do print(template). - 37:55 Let's just see if that works. - 37:58 Yeah, I know it's assigned, but never used, whatever. - 38:02 No module named '.', which is true, - 38:05 there's not a module name What if we just don't give it a module name? - 38:11 Empty module name, okay? - 38:15 So static_site_generator. - 38:42 All right, let's look up, do I have jinja2 installed here? - 38:45 I do, awesome. - 38:47 So let's look up jinja, let's look up packageloader. - 39:00 Load templates from python eggs or packages. - 39:03 It's constructed with the name of the python package and - 39:06 the path of the templates in that package. - 39:08 If the package path is not given, templates is assumed. - 39:12 Package path, okay, that's the second one there. - 39:15 Per default, the template is that. - 39:18 Okay, I don't wanna do a PackageLoader though. - 39:21 FileSystemLoader, there we go. - 39:23 Okay, the set list the templates from the file system. - 39:26 Loader can find templates is folders on the file system as the preferred - 39:28 way to load them. - 39:29 All right, cool. - 39:30 So I'll do FileSystemLoader, and then, the searchpath, which is the theme directory. - 39:36 Aha, okay, cool. - 39:38 So instead of PackageLoader, - 39:44 FileSystemLoader, - 39:49 loader=FileSystemLoader(THEME_DIR)) - 40:01 Okay, so that gives me the environment. - 40:05 And that should find the post.html. - 40:10 Okay, so cool, there's my template. - 40:14 All right, awesome. - 40:15 So now I should be able to do - 40:19 template.render content equals that. - 40:25 And I'm gonna delete the output directory, just so - 40:29 we can see that everything comes in. - 40:31 So generate.pie output, okay. - 40:37 And then open output hello_world.html in Safari? - 40:45 And, check that out. - 40:47 That looks like a bootstrap template. - 40:49 If I inspect, Then I should see the bootstrap stuff. - 40:57 Yeah, there's the bootstrap stuff. - 40:59 All right, cool. - 41:00 So we have a thing that loads and generate templates. - 41:06 So I'm actually gonna go ahead and bring this in to git real quick. - 41:15 Get rid of that. - 41:20 Hit ignore, ignore venv, ignore pycache if it pops up, and ignore, - 41:29 I still doesn't need to ignore output, because you would wanna have output, - 41:35 because you'd wanna be a able to deploy the output. - 41:38 Okay, so and then quit that one. - 41:46 All right, so get add dot dash - 41:52 m basic blog parsing and theme. - 41:58 All right, cool. - 42:00 So let's look at this and see if there's some things - 42:05 to clean up, and some stuff to kind of rebuild. - 42:10 Thank you for the nice words, there, Noveid. - 42:12 Hopefully, I got your name right. - 42:14 If I didn't, tell me how to pronounce it and I will happily do my best on that. - 42:20 Okay, so, Right now, we've got, - 42:30 We've got everything being loaded and parsed. - 42:33 We don't have it handling like the title of a post to put up into the title tag, - 42:40 or anything like that. - 42:42 So let's add a few new things here. - 42:45 Let's do, like site title is gonna be like, Hello Treehouse. - 42:52 Sure, and let's make a new function here. - 42:59 Wait, I don't need this anymore. - 43:02 Yeah, and let's say like _generate_context. - 43:10 Right now it's not going to take any arguments, but - 43:12 I think we're gonna change that in a little bit with YAML stuff. - 43:16 So I'm gonna return, Title - 43:23 as site title and then down here, - 43:31 Let's do context - 43:35 equals _generate_context, - 43:42 context.update. - 43:46 Content to the content. - 43:49 And then insight here, we'll just enter this with context. - 43:57 All right. - 43:59 And yeah, I don't need jinja2.template. - 44:09 Okay, so python generate.py. - 44:11 If I refresh this, it now says Hello Treehouse, right here. - 44:15 Hopefully, you can all see that one. - 44:17 So we got that in, so that's cool. - 44:23 Bootstrap, I don't need anymore. - 44:25 Directory listing, I don't need anymore. - 44:27 PyYAML, I might need. - 44:29 That I don't need. - 44:31 That I don't think I need for right now, but we'll see. - 44:35 Pelican, I don't need. - 44:37 Jinja2, I will probably need. - 44:39 Okay, so I wanna see about - 44:45 being able to take this file, parse it as YAML, and - 44:49 send at least part of it back as like context. - 44:54 So let's handle that. - 44:57 But I think before I do that, I'm gonna do generate_html just for - 45:02 a single, I don't wanna do this. - 45:04 Let's handle the YAML parsing first and - 45:06 then we'll break up generate_html, so that we send in the bits and pieces we need - 45:11 to actually generate the HTML instead of sending the whole entire file. - 45:15 Okay, so def parse_post and - 45:19 let's take a post to parse. - 45:24 And, PyYAML.org, the home of various YAML implementations. - 45:34 That's like so handy, [LAUGH] PyYAML documentation. - 45:38 There we go, that looks better. - 45:41 I guess, maybe. - 45:43 Wow, that's so weird. - 45:46 Load, wow, those docs are horrible. - 45:48 Okay, but let's give those a try. - 45:51 Template can be outside a 4 loop, so you're not loading it at every iteration. - 45:55 Yeah, you're totally right, Lewis, that can be definitely be done. - 45:59 I will probably move that up to the top. - 46:03 Pip install PyYAML. - 46:10 All right, I'm gonna go ahead and move that template part, - 46:16 so that we're not doing that all the time. - 46:19 I'm just gonna do that up here actually. - 46:25 And I'm gonna change that back to post template, - 46:27 because I think we're gonna wanna be able to set up multiple templates. - 46:33 So instead of template here, we want post template. - 46:39 And yeah, I know you've got unexpected block. - 46:43 Let's just do a pass there and be done with it. - 46:47 Okay, so PyYAML is installed. - 46:50 Let me update my post, so that it has, not that one. - 47:01 Hello.MD, there we go. - 47:05 So that it has the data in it. - 47:09 So let's add a thing up here where we'll say title is Hello World. - 47:18 So I got to turn pencil off again. - 47:22 Pencil is a pretty cool set of tools for Vim, for writers. - 47:27 So since I do a lot of writing, I find it pretty handy to have that. - 47:33 So let's see, we'll do a title there. - 47:37 We'll do an author. - 47:42 We'll do a date, which is 2016, 11, 4. - 47:49 And let's do a category, and let's see if we - 47:54 can parse that and bring in the information. - 47:58 So I'm actually gonna try to do that just in the show, and just see what I can do. - 48:04 So let's just do content equals, - 48:11 with open content/hello_world.md - 48:18 as f content equals f.read. - 48:24 And if I look at content, there's content. - 48:26 Okay, cool. - 48:28 Import YAML, and let's see what we get if we just get yaml.dump. - 48:35 Yaml.load document or not document, content. - 48:46 Okay, so that failed because it expected to find a key and - 48:51 didn't find one right before that. - 48:54 So that's cool. - 48:59 Otherwise, other questions will be serialized on the block style. - 49:04 Okay, don't really know much about that but that's fine. - 49:16 Several documents Python objects. - 49:32 Yaml.dump streams. - 49:35 I basically just wanna find out how to let it ignore stuff. - 49:39 May need front matter, yeah, I was thinking it might. - 49:46 I don't remember if you have to have the front matter or not. - 49:52 It's got a whole bunch of stuff in here. - 49:57 Here we go. There's a questions here, - 49:58 more documents [INAUDIBLE], documents are separated with triple dashes. - 50:02 We optionally end with triple ellipses. - 50:05 Single document may or may not be marked with that. - 50:07 So that's an implicit document, that's an explicit document. - 50:11 Several documents in a stream, plus sequences, - 50:14 plus [INAUDIBLE] not necessarily start a nested sequence with a new line. - 50:20 Block mappings, flow collections, okay. - 50:23 So let's try it with the front matter. - 50:27 So we would just do triple lines there. - 50:33 And, yaml., - 50:42 What was it that I ran? - 50:45 yaml.dump[yaml.load(open('content/hello_w- orld.md')). - 50:59 ComposerError: expected a single document in the steam, but - 51:03 found another document, right. - 51:06 Okay, so there was the thing about dumping - 51:11 multiple documents, and what was that? - 51:16 That was dump all? - 51:20 Load all. - 51:20 Okay, - 51:24 yaml.load_all(open('content/hello_world.m- d')). - 51:33 Print([d for, not even print, - 51:38 let's just do this, [d for d in - 51:42 yaml.load_all(open('content/hello_world.m- d')) - 51:55 Hello world, that's true, that's not in there. - 52:08 And so we've got a list and the first item here we have - 52:13 a dictionary, and the second item we have content. - 52:18 So, cool, thank you Lewis! - 52:20 That works, so, that's gonna be my way of doing this. - 52:24 So let's hop back here to generate. - 52:28 And up here, we need to import YAML and - 52:33 then here let's do, well, - 52:36 actually we're gonna continue to call that file. - 52:42 So we wanna do with open(file), - 52:46 actually we probably wanna do - 52:50 (os.path.join(CONTENT_DIR, file)) as f:. - 52:58 So we're gonna open up that file, and - 53:02 then we are going to read that file, but - 53:07 let's just say, What do I wanna call this? - 53:16 attributes, content = yaml.load_all. - 53:28 Hopefully this will work, I think this will work. - 53:30 That load_all(f.read())[0], - 53:37 print(attributes, content), - 53:42 let's try that. - 53:46 So then, instead of, let's do posts = get_all_posts(). - 53:52 Go back to doing this again for posts in posts print, - 53:58 or, let's just do parse_post(post). - 54:07 Undefined named attributes, yeah I misspelled that one too. - 54:14 There we go. - 54:16 Okay, so we get of this. - 54:21 Run the generate.py again, generate object is not subscriptable. - 54:25 Yeah, that's true. - 54:29 So we'll turn that into a list, And then we'll do that. - 54:36 Too many values to unpack expected (expected 2). - 54:40 Let's just print(list(yaml.load_all(f.read())) - 54:56 Okay, so that gave me a list with two items in it. - 55:15 Okay. - 55:23 So that ends the load_all, that ends the list, and I get 0. - 55:40 Okay. - 55:45 I need to just not worry about the 0, okay. - 55:52 So there we go, so we've got attributes. - 55:55 Let's put in a couple of new lines there. - 56:04 There we go, okay, cool, so we've got our front matter here. - 56:07 We've got our attributes and stuff. - 56:10 And then we've got a couple of blank lines, and then we've got our posts. - 56:13 So, cool, I notice - 56:18 that I don't have my headline in there, I didn't have the Hello World. - 56:32 So, that's kinda funny. - 56:40 I wonder why that's not in there. - 56:43 I wonder, is a hashtag a comment in YAML? - 56:50 - 56:53 That's fun. - 57:02 Pass the handle to f to save the width block, I think. - 57:05 Pass the handle to f to save the width block. - 57:27 Yeah, I could totally, sorry, Lewis, yeah. - 57:29 I could totally handle just sending in the os.path.join content or - 57:34 file to the yaml.load_all, optimization comes later. - 57:40 And then Barra asked about religion, - 57:43 which isn't something we should probably bring up on a stream like this [LAUGH]. - 57:48 So I'm gonna just ignore that one, sorry. - 57:50 I see it, but not answering that. - 57:54 What I wanna figure out is why my, is why my, - 58:04 How can I handle that for the blog post? - 58:14 Because that's a little weird. - 58:19 That I can't bring that in. - 58:22 It kinda makes me wanna go look at Pelican's documentation. - 58:24 But I don't wanna look at Pelican's documentation, - 58:28 because that's just horrible. - 58:39 Okay, so then that makes that, what if I have it as two hashes. - 58:48 Nope, doesn't change it, okay, so that's cool. - 58:53 Dump all accepts a list or - 58:58 generator, blah blah. - 59:11 Explicit start, I wonder what explicit start does. - 59:19 I see. - 59:23 So, that's dump all, I want load_all though. - 59:29 Construct arbitrary, yeah, I don't like that idea. - 59:35 Don't just load and parse files, ya'll, that's a bad idea. - 59:43 Or Python objects, sorry, - 59:47 [SOUND] block mappings, flow collections, - 59:54 scalers, aliases, tags. - 59:58 I'm not worried about tags. - 1:00:12 String conversion, string conversion names and modules. - 1:00:50 We can do marks. - 1:00:55 I don't think that's gonna tell me what I want. - 1:00:59 Tokens, document start token, - 1:01:03 so anything in here for getting rid of comments. - 1:01:13 Doesn't look like it, that's too bad, Cuz that'd be fun. - 1:01:22 Okay, so we're just going to, - 1:01:27 [LAUGH] I could just say that we don't have any headlines, that's not very fun. - 1:01:31 Although it is marked down, you could just write HTML in there, - 1:01:36 And just be done with it. - 1:01:46 C1s, that would be good. - 1:01:58 So mapping's dumper. - 1:02:03 All right, I'm just not going to worry about this for now. - 1:02:06 Since this is HTML, or since this is markdown and we can do HTML in there, - 1:02:11 I'm just gonna do, Like that. - 1:02:14 And we will see what happens with this, - 1:02:16 because there's a really good chance that's gonna act weird, but that's fine. - 1:02:22 We'll get to that. - 1:02:24 Okay, so let's clean this up just a little bit. - 1:02:28 I will do as Louise suggested, and - 1:02:32 I will just do open os.path.joinCONTENT, - 1:02:40 DIR file. - 1:02:47 And that way, that's a little bit more readable, just slightly cleaner. - 1:02:53 Looks a little bit nicer, okay. - 1:02:55 And then I'm gonna return, - 1:03:03 attributes and content. - 1:03:06 I'm just gonna return those as a tuple. - 1:03:11 Yeah, going to return them as a tuple. - 1:03:13 And then, Wow, my terminal is just being weird today. - 1:03:23 Sorry, generate_context, okay. - 1:03:25 So then I want to do attributes here. - 1:03:31 And this is gonna be attributes title or site title. - 1:03:40 Let's break this to a new line. - 1:03:44 And we'll do date is attributes, - 1:03:49 Date which, Import datetime. - 1:03:58 Datetime.datetime.strftime. - 1:04:10 Which I think on strftime, - 1:04:14 I have to give it, A format string. - 1:04:20 All right, it's been so long, so - 1:04:24 long since I've done the datetime stuff. - 1:04:30 So yeah, so I have to give it one. - 1:04:32 So, So let's do this. - 1:04:38 DATE_FORMAT = %Y, - 1:04:45 -%m, it's lower case m, right. - 1:04:55 Month is abbreviated name, month as zero padded number as lower case m, - 1:05:02 and then d is the day, Day of the month as a zero padded number, okay. - 1:05:09 So that means, I need to change my day here, To be that. - 1:05:18 And, We can actually do this as date. - 1:05:24 .stfrtime, Instead of anything else. - 1:05:32 Okay, that gives us the title, that gives us the date. - 1:05:34 Let's do author is attribute author or None, - 1:05:48 Actually, let's just do this. - 1:05:51 Get title, SITE_TITLE. - 1:05:57 If you all know about it, you can use git on a dictionary to look for a key. - 1:06:03 If that key doesn't exist, it will automatically return none. - 1:06:07 So I'm gonna use .get, but - 1:06:08 if you pass it a second value, it'll use that value instead. - 1:06:13 So here, I'll just do .get And change those - 1:06:18 to parenthesis and then I'll go ahead and get the none that I was expecting. - 1:06:25 And category, we'll do the same thing. - 1:06:33 And then it will come out as category or none. - 1:06:36 Okay, so there's our context. - 1:06:38 So, What I wanna do here, - 1:06:45 is I wanna do, Context, And post. - 1:06:59 And for content, content is - 1:07:03 gonna = misaka.html content. - 1:07:07 So we're gonna take all of that out. - 1:07:12 Bring this back. - 1:07:18 And, Actually, no, let's just do it this way. - 1:07:25 Okay, so then here parse_post is gonna give us attributes and content. - 1:07:33 And then we'll do content = misaka.HTML - 1:07:39 of the content that already came out. - 1:07:44 Context =, - 1:07:55 generate_context, which this isn't really something private, so - 1:08:00 I'll just leave it like that, of attributes. - 1:08:13 I don't need that anymore. - 1:08:16 I don't need that anymore. - 1:08:23 Wait, I do need that. - 1:08:26 Content is gonna be equal to the post that comes in. - 1:08:30 And context, right? - 1:08:37 So that, that, that, right? - 1:08:40 And then we're gonna do, general_html, - 1:08:48 With the context and the content. - 1:09:01 All right. - 1:09:05 Undefined name file. - 1:09:15 That's true. - 1:09:17 So let's do file name, Is that, and, - 1:09:31 So it says, it's in the file name, okay. - 1:09:36 So rm-rf output. - 1:09:40 Generate.py. - 1:09:42 And we got a problem. - 1:09:43 Okay, so that's cool. - 1:09:45 Line 40. - 1:10:18 All right, Man, - 1:10:25 this thing is just rendering horribly today. - 1:10:28 Okay, so no errors. - 1:10:31 So now if I come back over here and I refresh this one, - 1:10:34 I've got Hello World instead of Hello Treehouse, so that changed, right? - 1:10:40 Hello World came through there and then there is the blog post. - 1:10:46 Now what is weird is that, that only came out as one P instead of as two Ps. - 1:10:51 Cuz if I look at Hello World, it is very definitely two paragraphs. - 1:11:01 So something in my YAML. - 1:11:05 Did not, Do what it's supposed to. - 1:11:11 So print content. - 1:11:20 So those got turned into single lines instead of double lines. - 1:11:23 So what I need to try to do and Lewis suggested this a while ago, - 1:11:29 is to not parse that second document as YAML. - 1:11:32 So, It would be cool if I could figure out how to do that. - 1:11:38 So, Mark. - 1:12:03 I'm wondering if it's these marks, like these tokens. - 1:12:15 Cuz you could use them to potentially mark the beginning and end of a document. - 1:12:22 So let's add in a new thing here. - 1:12:31 Let's comment all of this out. - 1:12:36 And then what I wanna do is I wanna do a, A thing. - 1:12:44 Lewis says that he worked it out. - 1:12:46 So if you wanna post the code, Lewis, I'd love to take a look at it. - 1:12:51 Split on that with the limit of one. - 1:12:54 Yeah, that would work. - 1:13:02 That might be easier than going through the YAML thing, so let's try that. - 1:13:06 And let's just do this, so - 1:13:10 I'll do with, now we're back to - 1:13:15 this os.path.join CONTENT_DIR file as f, - 1:13:27 Yaml_header, content. - 1:13:32 Let's see, - 1:13:35 whole_file = f.read. - 1:13:44 So we'll go ahead and close the file so - 1:13:48 then we'll do whole_file.split on one, two, three. - 1:13:56 And what is it for split? - 1:13:58 Not .split, string.split, maxsplit, okay? - 1:14:05 Maxsplit = 1. - 1:14:08 So you can do that once, so - 1:14:12 then we could do attributes = - 1:14:17 yaml.dump, for yaml_header. - 1:14:31 Okay, let's see what this does. - 1:14:32 So, print attributes, print. - 1:14:39 Print content. - 1:14:48 Str object has an attribute get. - 1:15:00 Let's do it here. - 1:15:04 Print attributes. - 1:15:07 Let's see what that came up with. - 1:15:20 Attribute is a string. - 1:15:22 Because it's not dump, it's load. - 1:15:26 Silly me. - 1:15:28 There we go, okay. - 1:15:30 So delete all that. - 1:15:34 So now, clear rm -rf output. - 1:15:41 Again, python generate.py, again. - 1:15:45 And if I come over here and I refresh this, now I have paragraphs, I have that. - 1:15:50 And the cool thing is I should now be - 1:15:55 able to go back to this being actual Markdown and - 1:16:03 still get the same output. - 1:16:07 Yep, still giving me output, all right. - 1:16:08 Thank you, Lewis. - 1:16:09 That was a really great suggestion. - 1:16:11 I like to think I would have thought of that but I don't know that I would have, - 1:16:16 cuz sometimes it's these really obvious things that you're just like, yeah, - 1:16:21 that'll work. - 1:16:22 That'll be great. - 1:16:23 And no problem there. - 1:16:24 Yeah, it's wonderful, let's just keep doing that. - 1:16:29 Okay, cool. - 1:16:29 So it parses files, - 1:16:34 generates stuff. - 1:16:39 Let's try generating a index.html - 1:16:44 that has all of the files in it with a link to each of them. - 1:16:52 Cuz I think that's important, right? - 1:16:53 We should be able to go to, - 1:16:59 Here, and see a list of all the posts. - 1:17:03 So let's try doing that. - 1:17:05 So I think I'm actually gonna add a new thing, - 1:17:12 theme/_init_.py. - 1:17:16 And inside here, So we're gonna turn theme into a package. - 1:17:24 And so inside here we're gonna do POST_TEMPLATE. - 1:17:29 And this will just list the template name, right? - 1:17:33 So post.html, INDEX_TEMPLATE is gonna be index.html. - 1:17:40 And so that's just basic stuff there. - 1:17:42 So, let's go back over here to the generate document. - 1:17:49 And instead of THEME_DIR equals that, - 1:18:00 Let's say THEME_MODULE = theme. - 1:18:11 And then, - 1:18:22 No, hold on, I don't wanna do that. - 1:18:25 The reason I was thinking about doing this is I'm trying to get around having - 1:18:32 configuration inside the generator, for where the theme stuff is, - 1:18:37 but I think for right now it's not just worth the trouble. - 1:18:42 So I'm not gonna worry about that, and I'm just gonna rid of that buffer. - 1:18:46 And I'm gonna delete that file. - 1:18:50 Okay, so THEME_MODULE I'm gonna leave alone. - 1:18:55 POST_TEMPLATE I'm gonna leave alone. - 1:18:56 I'm gonna add a new one here which INDEX_TEMPLATE. - 1:19:00 Is env.get_template, index.html. - 1:19:06 Now I should probably have some thing that specifies all of this stuff but - 1:19:10 whatever, it's fine. - 1:19:14 As well as I could do from theme import env and - 1:19:17 inside of there is where I've handled all of that stuff. - 1:19:22 Maybe we'll solve that in a little bit. - 1:19:26 So let's add a new method. - 1:19:29 Generate_index and that will take files, - 1:19:34 so we'll just have a list of file names. - 1:19:44 And yeah, so this may be a little ugly but we can clean it up later. - 1:19:50 So, File names, we've already got. - 1:19:58 So let's do titles is an empty list. - 1:20:13 Let's make this a little bit handier here. - 1:20:17 And let's just say with content equals true. - 1:20:18 If with_content, otherwise we're - 1:20:24 just gonna return attributes. - 1:20:29 Actually, I like having this the other way around. - 1:20:37 So if not with_content, return attributes. - 1:20:41 So that way I can just return back the attributes. - 1:20:45 So inside here, I wanna do titles is - 1:20:49 going to be equal to parse_post file. - 1:20:57 With_content equals false. - 1:21:06 I get file. - 1:21:20 For file and the files. - 1:21:23 Print titles. - 1:21:27 Let's make sure that works. - 1:21:32 I'm not calling that anywhere. - 1:21:35 So before we do all - 1:21:40 the posts, let's do - 1:21:46 generate_index posts. - 1:21:54 THEME_DIR is not defined cuz call the theme module. - 1:21:55 THEME_DIR, I keep typing - 1:22:00 THEME_DIRE, things are dire. - 1:22:11 Template not found index.html. - 1:22:13 Yeah, I don't think I. - 1:22:18 Theme.index.html extends layout.html. - 1:22:33 Block title is equal to SITE_TITLE. - 1:22:51 Block content is gonna be like H1, Welcome to my site. - 1:23:05 Recent posts. - 1:23:08 Actually, let's change that to an H2, and - 1:23:13 then we'll just do posts. - 1:23:24 Actually, I don't even need to override that. - 1:23:29 Okay, so back to generate.py. - 1:23:31 Okay, so our one title is hello world, which is true, that is our one title. - 1:23:55 All right, so now we've got those titles. - 1:24:00 And generate html. - 1:24:10 We should really just - 1:24:15 be taking context. - 1:24:23 We shouldn't be updating that. - 1:24:26 And so that means down here, - 1:24:31 Context.update({'content': content}) - 1:24:41 And so then in here, We have our titles and we need to, - 1:24:57 Context I don't wanna update the context at all. - 1:25:02 So, I'm just gonna do context = - 1:25:06 generate context, with nothing being passed in. - 1:25:14 I'll pass in an empty dictionary. - 1:25:18 And then context.update. - 1:25:22 And what did we call that over there in index posts. - 1:25:27 All right, context.update posts is equal to titles for now. - 1:25:37 And then we will do - 1:25:41 generate html and - 1:25:46 the file name is index.md and - 1:25:59 The context is the context. - 1:26:08 So generate.html expects a particular template Template equals host template - 1:26:22 Template, okay. - 1:26:25 And here I'll do index template. - 1:26:30 All right, let's see if that works. - 1:26:50 KeyError date. - 1:26:52 Yeah, we don't have a date on that. - 1:27:05 So let's not do that one. - 1:27:08 And then let's do try, Context.update. - 1:27:25 Except keyError pass return context, - 1:27:31 since we may not have a date there, - 1:27:38 225 or no, 64. - 1:27:47 Okay. - 1:27:48 Let's try that again, hey no complaints. - 1:27:51 And if I refresh this, I should have index.html. - 1:27:55 Check that out, awesome. - 1:27:56 So there is a recent post. - 1:27:59 We have hello world, so that's great. - 1:28:02 Hi Maureen, glad you could join us. - 1:28:07 And okay, so I've got that. - 1:28:10 So now I need to make it to where it sends back a list of titles and URLs. - 1:28:17 So Titles will be, - 1:28:31 That. - 1:28:34 And we'll say title is that thing. - 1:28:44 Right. - 1:28:45 And URL is File - 1:28:53 .html. - 1:29:00 Okay. - 1:29:02 So now we generate that and we refresh that, - 1:29:09 then we've got [LAUGH] .md. - 1:29:13 That's funny. - 1:29:16 So let's make a new helper function up here, and this one I will call with - 1:29:20 an underscore, which is _convert_filename. - 1:29:27 And it'll take a file name and - 1:29:35 will return file - 1:29:39 ext.os.path.splitext file - 1:29:47 name Convert file name. - 1:29:53 Target equals .html So return - 1:29:57 '{}{}'.format(file, target). - 1:30:10 So just in case I need to do that in some sort of new way, then I will. - 1:30:16 Which means that here, I need to do new_filename = _convert(_filename, - 1:30:24 and that's just gonna take (filename). - 1:30:31 So I don't need that anymore, cool? - 1:30:35 And then, for index - 1:30:44 'url' is just gonna be _convert_filename(file). - 1:30:52 Pretty sure that'll work. - 1:30:57 Title's Hello World, URL is hello_world.html. - 1:30:59 Cool, that did work. - 1:31:01 Okay, so now, let's go update that index.html. - 1:31:08 And we'll do a - 1:31:13 {% for post in posts %}, - 1:31:16 - - 1:31:21 }}* >{{ post.title }} - 1:31:35 {% endfor %}, close that Regenerate this because that's how that works. And then, we've got Hello World, click that and we get the Hello World. So that's pretty awesome. All right, I should have been committing this, so I'm gonna do a new one here. 'yaml parsing, index generation, stuff'. All right [LAUGH] All right, so this is actually in pretty good shape, I think. I mean, we've got a pretty basic think, where we can go back and forth like that. Something I kinda would like to add into this is maybe doing some of this configuration somewhere else. So that's not what I meant to do. Vim generate.py There we go. So I think now, I wanna bring in that 'theme/_init.py'. And inside here, I'm gonna do the jinja2 stuff. So from jinja2 import Environment, FileSystemLoader. And I'm also gonna do the import os, cuz I need to get the current directory. So let's make a new thing here which is env = Environment(loader=FileSystemLoader(os.ge- tcwd())). And then, let's do POST_TEMPLATE = env.get_template('post.html'). And INDEX_TEMPLATE env.get_tamplate('index.html'). And I'm gonna swap those two cuz that makes more sense to me. And then, what I am gonna do is over here, I'll do from theme import POST_TEMPLATE And INDEX_TEMPLATE. Okay, so now, I don't need these anymore. And That Jinja stuff is imported but not used. And where do I use THEME_DIR other than here? Anywhere? Nowhere. So I don't need THEME_DIR either. So That should be easier. Okay, so let's make sure that the generate works still. Let's get rid of output again. TemplateNotFound >> How are you not finding that? I think because that init.py that doesn't get used. Okay, so let's just do import theme And then anywhere that I use TEMPLATE, let's the theme. That's it, okay. Still TemplateNotFound. Okay Let's print(env), let's see what's going on in there. Okay, so we have that object. Let's do import pdb, pdb.set_trace, cuz that's more fun, anyway. There we go, okay, dir(env). env., what am I looking for here? .loader? Okay, dir(env.loader). env.loader.list_templates, env.loader.list_templates as a function code. That sure is looking a lot of places. Man! What is up with jinja2 looking everywhere? We've got git/objects, we've got content. Theme_index, Okay, so what if I redo this And It's like (os.path.join(os.getcwd(), 'theme'. And then env.get_template('index.html'). Okay, so current working directory, I'm guessing that's the directory where it's being run from. So that's cool, I can do that. So We'll do this, os.path.join, plus the current working directory plus 'theme'. Actually, I don't think I need that. I think I just can do 'theme'. Okay, Cool, and output looks like it's still good, and have I refresh this Still has that. But it can't find the file helloworld.html. Why did that only generate, Okay, so let's close this. Let's set that as None, if template is None, template = theme.POST_TEMPLATE. So we do parse POST, which returns that. Titles does all that and it finds all the titles. We know that, because we have helloworld. So we do that. Post context content. My generate_html changed. I don't use it in the content anymore, because I sent it in as part of the context. So, now? So file name comes in. It only gets the index one. That really shouldn't matter but, It's because get_all_posts() is a generator. So, We need to reset that. Generator, Can I seek a generator? No, once you parse a generator, it's done, right? Yeah. So in column next, so if I wanna save that, what I've gotta do is I've got to, Okay, so I gotta turn that into a list here. Which is kinda horrible that I have to do that. There we go, and we look at output. Now we've got both of them, okay. So, all right, that's kinda horrible to have to do that. Honestly, I would rather, Well, I don't have a lot of time left, so I'll figure out how to make that nicer another time. But now if I was to click this, there's the post, so that works, so cool. All right, so, Theme is more self-contained. Okay, so I've got about ten minutes left, and I don't have something I think I can do to this in the next ten minutes. So let's spend this last ten minutes or so open for questions. So if you've got any questions at all, feel free to post them in the chat on Beam, Twitch or YouTube. And I will answer them to the best of my ability. We've got ten minutes, we should be able to get through five or ten questions. And Marine asked, what did you set that current working directory, are you talking about in the theme? So hold on, my screen looks horrible there. So what we've done here is we've set the loader to still be looking at theme, because the loader is looking from where we're currently running the thing. And since generate.pi lives in the directory outside of the theme, that's where it starts looking from. So that's why we set the file system order to look inside of theme. That's the trajectory we want it to look at, and so then we set the templates like normal there. And then here, I don't really like this, which I think this is your second question there Marine, which is about storing a generated value. get_all_posts() is a generator, where is it? Here it is, so get_all_posts() yields a generator. And so ideally you don't want, the point of a generator is it just goes through one item at a time. So you're not using up a ton of memory and I'm having to store it here. I'm having to parse the whole thing and store it in a list. Sorry, you're just trying to help? Thank you for trying to help, thankfully, I got if figured out [LAUGH] apparently. But yeah, so this is a ridiculously simple static site generator. I mean this will work, you can totally upload that output directory to GitHub pages, or whatever. And use that as your blog, that's cool, go for that. But this is ridiculously simplistic, it needs a whole lot more stuff. Ideally there would be stuff in here that would handle setting content expiration, setting other headers, which you know you can handle all of that. Ideally we have stuff where we could have both pages and blog posts. The blog post would probably generate an RSS feed, or you can make it post a Twitter every time that you did a blog post or whatever. We don't have to do that, and we don't have time to do all that. So I'm not gonna worry about it for right now. Thank you all for watching, for helping out in the chat. Lewis and Marine and several others of you were ginormous helps, so thank you so much for helping me get through this thing. It's a little wierd trying to build something off the top of your head without doing any exploration. I do my best not to do any sort of research before I do the live streams, which is not at all how I suggest that you program. I suggest that you do research and you learn as much as you can before you start programming. But I like doing it this way so that you all can see the struggles that people get to go through, even when they've been doing this for years. I mean, I've been building web stuff for 15, 20, God, 20 years. And still, problems like this all the time. So thank you very much for watching. I'm gonna do this again next week, same time, same Treehouse channels, same Treehouse time. So 10:00 am Pacific time, next week though, the US will be out of daylight savings time. So it'll be PST and not PDT, so it'll be an hour different depending on whether or not your part of the world observes daylight savings time at the same time that we do. Time zones are horrible, but I think, next week I am going to build a Bot for the Discord platform. Discord is a pretty cool platform for doing voice and text chat, it's used by a lot of gamers instead of something like TeamSpeak. It's pretty cool, Discord has a lot of things that you can do with bots, so I'm gonna play around with that next week. That's also as part of nabo, what is it? Nabo. Nanowrimo, But for bots. Now there's a thing called Nanowrimo that is for bots. And the idea is to build a bot at some point inside the month of November, which I want to do. I like building bots, and it's great that this is a thing that works. Eddie, Lewis, thank you for the kind words. Lewis, it's a little bit early for that, so I think I'm gonna have to wait, but I'll take you up on that. And then anuragm asks what's my opinion on Django. I love Django. I've been writing Django for, seven, eight years now. And Django is awesome. Django does a huge amount of stuff. Saves you a ton of time as a programmer so long as you kinda work along with it. Like any framework, if you try to fight it, it will give you nothing but problems. The same is true for Flask, for Rails, for Zend, for any other framework out there. If you don't play along with the framework, you will suffer. So long as you work along with the framework, Django is amazing and awesome. I think that's what I'm going to do the week after next. So this week was static site generator. Next week I'm planning to do the discord bot. The week after that I think I'm gonna build a website in Django for a new thing that we're wanting people to play along with at Treehouse that I can't say too much about. It's not out yet. We've had this thing for a while about how you can learn to program, you can teach yourself to program by spending 15 minutes a day doing programming. So I'm gonna build a site where you can set up an account and you can come on the site and be like, hey, I'm gonna spend 15 minutes a day learning Python, learning PHP, learning Scala. Whatever you wanna learn, learning to play the guitar, whatever. And everyday you can come to the site and click a button and say, yep, I did my thing and the site will congratulate you or whatever. And we'll have a streak calendar kind of thing, right? So it will be like, hey, you did everyday this month, that's awesome. You should go and do more stuff. So that's my plan for the next couple of weeks. Eddie has asked, Eddie04tv, I've been doing the sites for a few years, how can I refresh them and get a tech job on web dev? So, I mean, refreshing a site nowadays for modern times, which is so weird because, basically that means anything not in the last like six months, three months. A lot of that is about doing like JavaScript stuff. So, if you learn React, if you learn Angular 2, if you learn these JavaScript things, that can give a lot of freshness to sites. Same for having a nice design, some nice CSS. But at the same time, how many people still use Craigslist? And Craigslist hasn't changed much in probably eight years, ten years, right? And as for getting a tech job on web development, I mean a lot of that's just reaching out, and trying different places. You gotta kinda just look for the jobs. I try to retweet all the job postings, or people seeking jobs that I get on Twitter. If it comes up on my stream, or somebody mentions me on it. And there's tons of places that you can go, there's tons of job boards out there. If you're looking specifically for Python or Django, there's one that I wanna say is dyangojobs.com, .org, something like that, I don't remember, that they just post Django stuff. So it's worth checking out. I've heard that Hired.com is pretty good, as well. But I don't know. Sadly, I haven't been looking for traditional tech jobs in a long time so I can't give you exact places. Thanks Gabriel for the kind words, I'm glad you enjoy the stream. And Eddie asked, again, what they should know or learn for next week's stream on discord bot. Have a discord account. If this goes well, I'll open up the discord server for everybody to join and they can hop on and play with the bot, help me with the bot. But, yeah, all you should have to have is a discord account. That's all I'm gonna know. So, we'll see how this goes. I know there's a library or two out there for doing discord stuff with Python. So I'm gonna get one of those and we are gonna see what we can make the bot do. If you have an idea for the bot, tweet that at me. I'm Kenneth Love on Twitter, all one word. Tweet me your ideas for what the bot can do, for what the discord bot can do. And Ken posted that it's djangojobs.net, thank you Ken. Djangojobs.net might be a good place to look for if you're particularly interested in doing Python and Django jobs. But it's 12 o'clock, so I need to wrap this stream up. I'll answer one more question here, Abdulla Abduga, Abdu G-A, sorry on whatever your name is, I'm not sure. [INAUDIBLE]. Should I do it, I'm a bit nervous about it? So, I mean, Treehouse goes really well with college, I think. College often is a bit more theory, a bit more theoretical, it's a bit more of the reasons behind things, right? Like you learn optimizing algorithms or you learn, assuming you're doing CS, if you're doing something else you'll learn whatever that other thing is. If you're doing history or geology or something. If you're doing CS though, computer science as a degree is a lot more about the behind workings, how things work underneath. And it's really not about programming, it's not the problem solving part of programming, it's the optimization part of problem solving. So I have this problem, I have a solution for it, how do I make that solution as good as possible? That's where CS really comes in. Programming is more of, I have this problem, how do I solve it? And you get it solved. So I think they go really well together. I think they go hand in hand very, very well. So doing Treehouse while you're in college I think is a great idea. And you don't have to go and do like a tech degree at Treehouse, you can do the standard basic account, that's $25 a month. Learn whatever languages you find interesting and I think that will help out a whole lot. So I don't think you should be nervous about doing Treehouse while you're doing college. I think they go together really, really well. Speaking of that though, check out Treehouse if you haven't in the past, it's teamtreehouse.com. We teach Python, PHP, Ruby, Java, .NET, Android, iOS, all sorts of other things. JavaScript so, so much JavaScript. So if you have a programming that you wanna learn how to do, check us out, we're more than happy to teach you how to do it. And if you enjoyed watching my streams, I'm the Python teacher, so you can watch Python stuff, and you get to see so much of me. You'll be sick and tired of me by the end of it, but hopefully you'll learn a lot. So, all right, I'm gonna get out of here. Thank you so much for watching, and I will see as many of you as possible next week.
https://teamtreehouse.com/library/build-a-static-site-generator
CC-MAIN-2018-13
refinedweb
13,059
93.95
On Wed, Aug 13, 2008 at 03:17:09PM +0100, Daniel P. Berrange wrote: > Over time we've added lots of general purpose source code files, as wel > as making more of the existing ones conditionally compiled. We've done > this by adding lots of #ifdef WITH_XXXX macros across the various > source files. This is becoming rather a minefield with soo many conditionals > sprinkled throughout the code. > > With all the recent re-factoring we now have very good separation between > generic code, and driver specific code - each typically being in separate > files. Thus it is now practical to remove the vast majority of the macros > and just do the conditional compilation via the Makefile.am. > > The patch is not entirely clear - the resulting Makefile.am is much easier > to review. It is structured in two section, first we declare variables > for groups of source code files - eg generic helper files, generic domain > XML files, generic network XML files, and then per-driver files. In general this sounds good, I don't like automake conditionals too much, but in that case yes, that's logical. [...] > In removing the unneeded WITH_XXX macros from header/sources I noticed that > a bunch of our header files have > > #ifdef __cplusplus > extern "C" { > #endif > > With is irrelevant since we're not using C++ anywhere - indeed some of the > files even had the corresponding '}' missing, so clearly this is never > actually used during compilation. Removing this fixes bogus indentation > in some of the header files Well it should be kept in the public headers, but right internally it's just remains of cut and paste. > I've tested this all by running configure --without-XXX for each hypervisor > driver in turn, and it seemed to work in all cases. The only thing I didn't > test is MinGW. I think I really need to add a MinGW based build to the > nightly build system, so we can sanity check that nightly > --- a/configure.in Tue Aug 12 22:21:25 2008 +0100 > +++ b/configure.in Tue Aug 12 22:21:47 2008 +0100 > @@ -241,27 +241,35 @@ > LIBVIRT_FEATURES= > WITH_XEN=0 > > -if test "$with_openvz" = "yes" ; then > +if test "$with_openvz" = "yes"; then hum, unrelated :-) > -if test "$with_qemu" = "yes" ; then > +if test "$with_qemu" = "yes" -o "$with_lxc" = "yes" ; then > AC_CHECK_HEADERS([linux/param.h linux/sockios.h linux/if_bridge.h linux/if_tun.h],, > AC_MSG_ERROR([You must install kernel-headers in order to compile libvirt])) > fi oh, good point ! [...] > +if WITH_REMOTE > +libvirt_la_SOURCES += $(REMOTE_DRIVER_SOURCES) > +endif I'm wondering about += portability, but I think this is widely used and really clarifies the resulting Makefile.am the other solution libvirt_la_SOURCES = .... if WITH_REMOTE $(REMOTE_DRIVER_SOURCES) endif if WITH_XEN .... might be a bit more portable but messes the structure, No other comment, everything else is small bugs, the cleanup of headers and reindent, Fine by me, +1 Daniel -- Red Hat Virtualization group Daniel Veillard | virtualization library veillard redhat com | libxml GNOME XML XSLT toolkit | Rpmfind RPM search engine
https://listman.redhat.com/archives/libvir-list/2008-August/msg00372.html
CC-MAIN-2021-21
refinedweb
489
50.77
Pilot is a python library for traversing object trees and graphs Project Description Pilot Pilot is a python library for traversing object trees and graphs. It is currently in pre-alpha. Usage Download and include the library: $ pip install pilot The first step is to define a callback: >>> def my_callback(node): ... print node.key, "-->", node.val ... Now, define the pilot object and execute a flight: >>> data = {'test': 1} >>> pilot = Pilot(my_callback) >>> new_data = pilot.fly(data) None --> {'test': 1} test --> 1 >>> type(new_data) <class 'pilot.node.dict_extended__node'> >>> new_data.__node__ <pilot.node.Node object at 0x026CCE90> See the documentation for more details! Documentation Creating a pilot: pilot = Pilot(*callbacks, **settings) Callbacks and keyword arguments (settings) can be passed into the pilot constructor. Settings options: - run_callbacks (true|false): Set this to false to skip callbacks completely. - callbacks: an array of detailed callback objects. See the Callback section for more information. If this key is specified and there are callbacks passed into the constructor via args, an exception will be raised. If finer control on callbacks is required, use this setting. - traversal_mode: the mode for traversing the tree. Options are depth for depth-first processing and breadth for breadth-first processing. - structure: Options are tree (default) and graph. Graphs add nodes as “neighbors” rather than parent/child. - node_visit_limit: An integer that defines how many times to allow visits to nodes. (Only applicable to graphs.) Set to -1 to allow infinite. Note that infinite trees will process indefinitely - use Pilot.halt() in a callback to end the processing manually. - callback_sort: A function that will sort callbacks into an execution order. Note that callback sorting will only apply to a set of callbacks running on a property and position basis, since that is the callback execution stack grouping. - callback_sort_mode (0|1): This parameter describes the callback sorting function’s required args. Options are 0 for a standard lambda sort function and 1 for a cmp function. The configuration defaults to the following: structure = "Tree" node_visit_limit = 1 traversal_mode = 'depth' run_callbacks = True callback_sort: lambda self, x: x.priority callback_sort_mode = 0 pilot.fly(self, object, rootkey=None, rootpath=None, rootparent=None) Traverse an object and execute callbacks during the traversal. The flight will convert every property into a Node, and will make that node available on the property through property.__node__. Note that this means the process will ocassionally change the underlying classes of objects to support adding the __node__ property. As of now, most types are supported – if the conversion process fails, it may be because Pilot is unable to modify the underlying class. See the documentation on the Node class for more details. Pilot.halt() (static method): Calling this method within a callback will halt processing completely. This allows for early exit of the traversal, which is required for limited processing of infinite trees. Callbacks Callbacks are special functions that execute on the object tree/graph as it is being traversed, and are constructed from predefined functions. Each callback executes at different times based on several configuration options listed below. Callbacks are passed a single argument, the Node for the object. The general form of a callback object is: def my_callback(node): do_some_things() from pilot import Callback callback = Callback(my_callback) See the “Usage” section of the documentation for a shorthand way to apss callbacks into the Pilot. Here’s an example, using custom callbacks: data = [ {'name': 'Jim', 'friends': [{},{}]}, {'name': 'Jane', 'friends': [{},{},{}]}, {'name': 'Joe', 'friends': []} ] def count_friends(node): try: node.val['name'] except: # not a person return person = node.val friends = person.get('friends', None) if friends: print person.get("name") + " has " + str(len(friends)) + " friends." else: print person.get("name") + " has no friends." from pilot import Callback, Pilot callback = Callback(count_friends, containers=['dict']) pilot = Pilot(callbacks=[callback]) newdata = pilot.fly(data) Here are the keyword args you can supply in a callback configuration, most of which act as filters: - containers: a list of containers to run on. Options are 'dict', 'list', and 'value'. If unspecifed, the callback will run on any container. - keys: an array of keys to run on. The callback will check the key of the property against this list. If unspecified, the callback will run on any key. - positions: a list of positions in the traversal to run on. Options are 'pre' (before any list/object is traversed), and 'post' (after any list/object is traversed). For properties of container-type 'value', these two run in immediate succession. If unspecifed, the callback will run 'post'. - priority: an integer that represents the callback’s place in the execution order. Lower priorities execute first. - run_for_orphans: a boolean that determines whether the callback should run on oprhan nodes. If any of the filters are not sufficient, additional checks can be done in the callback. Nodes Node objects represent a single node in the tree, providing metadata about the value, its parents, siblings, children, and more. Nodes have the following properties: - key: The key of this property as defined on it’s parent. For example, if this callback is running on the 'weight' property of a person, the key would be 'weight'. Note that this will be None for properties in list. - value: The value of the property. To use the above example, the value would be something like '183'. - container: The type of container of the property expressed in an integer. See the following enumeration for container types: from pilot.definitions import ContainerType - encountered: The number of times the pilot has processed the node. - id: A unique id for the node (within the context of piot). You may also call the following methods off of a node object. Keep in mind that some of the node accessors may not be populated based on where you are in your traversal. If you want to wait for the relationship tree to be fully established, run operations on the output of a flight, which will be a data object with each value annotated with a __node__ property: - is_orphan(): Returns a boolean of whether the node is an orphan (no parents.) Node relationship accessors - parent(): The first node under which the property exists. node.parent is another instance of node, and will have all the same properties. This is a convenience method that’s useful in trees, where only one parent is possible. - parents(): A method that returns parents of a node. An optional search parameters object can be passed in to filter the list to all who have matching key-values. For example, node.parents(key='name', val='Tom') will return all parents where key == 'name' and val == 'Tom'. - children(): A method that returns children of a node (i.e. all nodes whose parent is this node.) An optional search parameters object can be passed in to filter the list to all who have matching key-values. For example, node.children(key='name', val='Tom') will return all children where key == 'name' and val == 'Tom'. - neighbors(): A method that returns adjacent (non-parent, non-child) nodes, for use in graphs. An optional search parameters object can be passed in to filter the list to all who have matching key-values. For example, node.neighbors(key='name', val='Tom') will return all neighbors where key == 'name' and val == 'Tom'. - siblings(): A method that returns all nodes that exist alongside the current node within its parents. For parents of container 'object', this includes all other properties of the parent object. For parents of type 'array', this includes all other nodes in that array. - orphans(): A method that returns all connected root nodes. - ancestors(): A method that returns a list of all ancestor nodes, going back to the root. - descendants(): A method that returns a list of all descendant nodes. Each relationship accessor can be pased the following keyword arguments: - filters=None: A dictionary of key:val that will be matched against each encountered node’s val (as of now this is only useful for dict types). - as_value=False: Boolean that will make the call return node values rather than node objects. - as_generator=False: Boolean that will make the call return a generator object for the relationship. This is useful when the relationship list is large or inifinite, since it will not attempt to build the list entirely at call time. Download Files Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
https://pypi.org/project/pilot/
CC-MAIN-2018-13
refinedweb
1,389
58.38
The implementation of PyGoWave Server produces some nice by-products. PyCow is one of them. PyCow translates Python code to JavaScript code with the "MooTools way of class declaration". It generally depends on the fact that JavaScript shares almost all of its semantics with Python, so PyCow just has to change the syntax most of the time. The behavior of PyCow can be seen at best on some examples. Note: PyCow currently removes any comments in the code. PyCow can wrap your Python module in a namespace (commandline: pycow.py -n namespace inputfile.py). If you do that, PyCow will look for a optional __all__ variable in your module and make only the specified classes/functions publicly accessible. Python: __all__ = ["Someclass", "a_function"] @Class class Someclass(object): def __init__(self, something): self.something = something def a_function(): print "hello" def another_function(): print "test" Resulting JavaScript: var namespace = (function () { var Someclass = new Class({ initialize: function (something) { this.something = something; } }); var a_function = function () { alert("hello"); }; var another_function = function () { alert("test"); }; return { Someclass: Someclass, a_function: a_function } })(); PyCow does not handle imports for now (it will probably in the next release), so import statements are simply ignored. from decorators import Implements, Class from utils import Events, Options /* from decorators import Implements, Class */; /* from utils import Events, Options */; There is an important change since the last release: I have ported some of MooTools' functionality to Python in order to keep semantics clean between the two languages. This introduces the "Class" decorator, which fixes an issue and adds the "implements" method to the class. Note that class decorators are supported in Python 2.6 and later only, please upgrade your installation if neccessary. @Class class Someclass(object): """ Docstring of class """ def __init__(self, something): # PyCow removes 'self' from method declarations """ Docstring of constructor/method """ self.something = something + "string literal" # PyCow replaces 'self' with 'this' def a_method(self, otherthing): print self.something + otherthing # 'print' is translated to 'alert' def another_method(self): obj = SomeExtension() # PyCow can infer types of callables (even declared later); here it will place 'new', because SomeExtension is a class self.member = "test" @Class class SomeExtension(Someclass): def __init__(self): super(SomeExtension, self).__init__("1234") # PyCow correctly treats the 'super' function of Python; here it's the call to the super constructor def a_method(self, otherthing): super(SomeExtension, self).a_method(otherthing) # Here it's a call to the super class' method print otherthing, self.something def a_function(): """ Docstring of function Note that PyCow removes whitespaces. And normalizes newlines. """ test = 2 # PyCow automatically declares local variables test = 4 # once print test+ 2 # Because PyCow parses semantics only, it will ignore whitespaces (but avoid to do something like that anyways) obj = Someclass("a lengthy ") obj.a_method("test") # PyCow's type inference does not include types of variables (atm) a_function() # PyCow does not put "new" here, because a_function is a simple function /** * Docstring of class */ var Someclass = new Class({ /** * Docstring of constructor/method */ initialize: function (something) { this.something = something + "string literal"; }, a_method: function (otherthing) { alert(this.something + otherthing); }, another_method: function () { var obj = new SomeExtension(); this.member = "test"; } }); var SomeExtension = new Class({ Extends: Someclass, initialize: function () { this.parent("1234"); }, a_method: function (otherthing) { this.parent.a_method(otherthing); alert(otherthing + " " + this.something); } }); /** * Docstring of function * * Note that PyCow removes * whitespaces. * * And normalizes newlines. */ var a_function = function () { var test = 2; test = 4; alert(test + 2); }; var obj = new Someclass("a lengthy "); /* Warning: Cannot infer type of -> */ obj.a_method("test"); a_function(); There is another feature in MooTools besides the Extends property of classes: The Implements property. From the MooTools documentation: Implements is similar to Extends, except that it overrides properties without inheritance. Useful when implementing a default set of properties in multiple Classes. This is often used in conjunction with the "Options" and "Events" utility classes of MooTools. I have ported them to Python for your convenience. The following example also explains what is fixed by the "Class" decorator. @Implements(Options) @Class class ClassWithOptions(object): """ A class with implements Options using the `Implements` decorator. This is MooTools functionality ported to Python. """ # Note: In Python semantics, this declares a class-bound member, but MooTools # sees this as object-bound members. The Class decorator will convert all # class-bound members to object-bound members on instantiation. options = { "name": "value", "foo": "bar", } def __init__(self, options): self.setOptions(options) print self.options["foo"], self.options["name"] # Static methods supported @staticmethod def somestatic(input): print "Static " + input /** * A class with implements Options using the `Implements` decorator. * This is MooTools functionality ported to Python. */ var ClassWithOptions = new Class({ Implements: Options, options: { name: "value", foo: "bar" }, initialize: function (options) { /* Warning: Cannot infer type of -> */ this.setOptions(options); alert(this.options.foo + " " + this.options.name); } }); ClassWithOptions.somestatic = function (input) { alert("Static " + input); }; global x # Because of the 'global' statement x = "hello again" # PyCow does not declare x as local here def another_function(): global x x = "go ahead" # and here return x x = "hello again"; var another_function = function () { x = "go ahead"; return x; }; if True: print "Welcome" if False: pass else: print "Nested if" else: print "You're not welcome..." if (true) { alert("Welcome"); if (false) /* pass */; else alert("Nested if"); } else alert("You're not welcome..."); i = 0 while i < 3 and not False: # While statement print i i += 1 # Assignment operator var i = 0; while (i < 3 && !false) { alert(i); i += 1; } for j in xrange(3): # For statement (xrange) print j for j in xrange(1,4): # For statement (xrange; with start) print j for j in xrange(1,4,2): # For statement (xrange; with start and step) print j for j in xrange(4,1,-1): # For statement (xrange; with start and step backwards) print j i = [1,2,3] for j in i: # For statement (simple variable) print j for j in ["a","b","c"+"d"]: # For statement (arbitrary expression) print j for (var j = 0; j < 3; j++) alert(j); for (j = 1; j < 4; j++) alert(j); for (j = 1; j < 4; j += 2) alert(j); for (j = 4; j > 1; j--) alert(j); for (j in i) { j = i[j]; alert(j); } var __tmp_iter0_ = ["a", "b", "c" + "d"]; for (j in __tmp_iter0_) { j = __tmp_iter0_[j]; alert(j); } delete __tmp_iter0_; f = lambda x: x*2 # Lambda functions a = [1,2,3,f(2)] # List expression print a[1:3] # Slicing b = {} # Empty dictionary # Dictionary with strings and numbers as indices b = {"a": 1, "b": 2, 1: "x", 2: "y", "-test-": 1+2, "0HAY0": "a"+"B"} # Accessing subscript (simple string) print b["a"] # Accessing subscript (other string; assignment) b["-test-"] = 3 # Accessing subscript (number) print b[1] # Deleting from map del b["a"] var f = function (x) {return x * 2;}; var a = [1, 2, 3, /* Warning: Cannot infer type of -> */ f(2)]; alert(a.slice(1, 3)); var b = {}; b = { a: 1, b: 2, 1: "x", 2: "y", "-test-": 1 + 2, "0HAY0": "a" + "B" }; alert(b.a); b["-test-"] = 3; alert(b[1]); delete b.a;:
http://code.google.com/p/pygowave-server/wiki/PythonToJavaScriptTranslator
crawl-003
refinedweb
1,149
52.6
The Modern Application Stack, Part 6: Browsers Aren't the Only UI/Mobile Apps, Amazon Alexa, Cloud Services In this article, we round out our 6 part series on MongoDB by looking using the REST APIs we've created to make apps in iOS and Alexa, and create cloud services. Join the DZone community and get the full member experience.Join For Free This is the sixth and final blog post in a series examining technologies such as MongoDB and REST APIs that are driving the development of modern web and mobile applications.). Subsequent posts focused is used by the clients that we implement in the final 3 posts. Part 4a: Building a Client UI Using Angular 2 (formerly AngularJS) and TypeScript and Part 4b completed the MEAN stack by adding an Angular 2 client. Part 5: Using ReactJS, ES6, and JSX to Build a UI (the rise of MERN) does the same but replaces Angular with ReactJS to complete the MERN stack. Once your application back-end exposes a REST API, there are limitless ways that you or other developers can access it: - A dedicated browser-based client, as seen in posts 4 and 5. - A standalone native iOS or Android mobile app. - Voice controlled appliances, such as Amazon's Echo. - IoT-enabled devices, such as remote sensors. - Integrations with 3rd party applications. This post takes a look at some of these approaches. Unlike some of the earlier posts, this one aims to go wide rather than deep – touching on many technologies rather than diving too deeply into any one. Prerequisite: The REST API Everything that follows assumes that you have the Mongopop REST API running – if not, skip back to Part 3: Building a REST API with Express.js. Additionally, that API has been extended with 3 new routes (already included in the latest GitHub repository): These route paths are implemented in the pop.js module in the Mongopop repository: /pop/lastCheckIn depends on a new method that has been added to javascripts/db.js: The configuration file config.js is also extended – note that you should replace the value associated with the makerMongoDBURI field if you're not running MongoDB on your local machine, e.g. with the URI provided by MongoDB Atlas: var config = { expressPort: 3000, client: { mongodb: { defaultDatabase: "mongopop", defaultCollection: "simples", defaultUri: "mongodb://localhost:27017" }, mockarooUrl: "" }, makerMongoDBURI: "mongodb://localhost:27017/maker?authSource=admin", checkinCollection: "foursq" }; module.exports = config; The implementation of these methods follows the same pattern as already seen – refer back to Part 3 for details – and so is not explained here. Repurposing Angular and ReactJS Code for Native Applications There are frameworks for both Angular and ReactJS that enable web client application designs (and in some cases, code) to be reused for creating native iOS and Android apps. One option for Angular is NativeScript, in which you use Typescript/JavaScript with Angular to build native apps for multiple platforms from the same source code. Of course, to get the most out of those platforms, you may want or need to add platform-specific code. React developers will find React Native code very familiar, and applications are built from declarative components in the same way. The most obvious difference is that React Native code uses its own native components (e.g. <View> and <Text> rather that HTML elements such as <div> and <p>): import React, { Component } from 'react'; import { AppRegistry, Text } from 'react-native'; class HelloWorldApp extends Component { render() { return ( <View> <Text>Hello There!</Text> <Text>This is a very simple Native React component.</Text> </View> ); } } AppRegistry.registerComponent('HelloWorldApp', () => HelloWorldApp); React Native provides the Fetch API to make network requests; it follows a similar pattern to XMLHttpRequest (React Native also includes XMLHttpRequest which can be used directly). While it's not as simple as just rebuilding your ReactJS or Angular code to produce native apps, the reuse of designs, skills, and (some) code make it much more efficient than starting from scratch. Combining Cloud Services – IFTTT IFTTT (IF This Then That) is a free cloud service which allows you to automate tasks by combining existing services (Google Docs, Facebook, Instagram, Hue lights, Nest thermostats, GitHub, Trello, Dropbox, etc.). The name of the service comes from the simple pattern used for each Applet (automation rule): "IF This event occurs in service x Then trigger That action in service y." IFTTT includes a Maker service which can handle web requests (triggers) or send web requests (actions). In this case, I use it to invoke the pop/checkIn POST method from the Mongopop REST API whenever I check in using the Swarm (Foursquare) app: Note that the applet makes a POST request to the route. The body of the POST includes the required parameters – provided as a JSON document. Each of the VenueName, CheckinDate, VenueUrl, and VenueMapImageURL values are /ingredients/ from the trigger (Foursquare) event. Using the Swarm app I check into FourSquare: We can confirm that the MongoDB collection has been updated after this check-in: Cluster0-shard-0:PRIMARY> use maker switched to db maker Cluster0-shard-0:PRIMARY> db.foursq.find().sort({_id: -1}).limit(1).pretty() { "_id" : ObjectId("58c272f842067a03283be544"), "venueName" : "Redroofs Theatre School", "date" : "March 10, 2017 at 09:23AM", "url" : "", "mapRef" : "" } Constructing an iOS/Apple Watch App to Automate Workflows The first example showed how to record a check-in into our own service as a side effect of checking into an existing service (Foursquare). What if we wanted to create new, independent check-ins, from a mobile device? What if we also wanted to augment the check-ins with additional data? Another requirement could be to let our team know of the check-in through a Slack channel. A valid approach would be to build a new mobile client using React Native or NativeScript. Slack and Google Maps have their own REST APIs and so the new app could certainly integrate with them in addition to our Mongopop API. Before investing in that development work, it would be great to prototype the concept and see if it proves useful. This is where we turn to the iOS Workflow app. Workflow has a number of similarities to IFTTT but there are also some significant differences: - The workflow runs on your iOS device rather than in the cloud. - Workflows are triggered by events on your iOS device (e.g. pressing a button) rather than an event in some cloud service. - Workflow allows much more complex patterns than "IF This event occurs in service A Then trigger That action in service B"; it can loop, invoke multiple services, perform calculations, access local resources (e.g. camera and location information) on your device, and much more. Both applications/Workflows that we build here can be run on an iPad, iPhone, or Apple Watch. The first Workflow, CheckIn, performs these steps: - Fetch the device's current location. - Retrieve any URL associated with that location. - If none exists, fetch a map URL from Apple Maps. - Fetch a Google Street View image for the location. - Send a POST request to the /pop/checkInMongopop route. - The request includes the location, date/time, URL (either from the venue or Apple Maps), and the StreetView image. - Post the location and URL to Slack. - Display error messages if anything fails. Implementing a Workflow involves dragging actions into the work area and then adding attributes to those actions (such as the address of the Mongopop API). The result of one action is automatically used as the input to the next action in the workflow. Results can also be stored in variables for use by later actions. This is the Check In workflow: This video demonstrates the use of the app when run on an iPhone: The same app/workflow can be run from an Apple Watch: We can confirm that check-in record has been stored as a document in MongoDB Atlas (note that the database and collection names are defined in config.js): Cluster0-shard-0:PRIMARY> use maker switched to db maker Cluster0-shard-0:PRIMARY> db.foursq.find().sort({_id: -1}).limit(1).pretty() { "_id" : ObjectId("58c1505742067a03283be541"), "venueName" : "77-79 King St, Maidenhead SL6 1DU, UK", "date" : "9 Mar 2017, 12:53", "url" : "", "mapRef" : "" } The second app/workflow retrieves and displays details of the most recent check-in. It performs these steps: - Read from the /pop/latestCheckInMongopop REST API Route using GET. - If the results indicate a successful operation then: - Extract the location from the results. - Display the location and prompt the user if they'd like to: - See the location data (image). - Follow the location's URL (typically an Apple Maps link). - Finish. - If the Mongopop operation fails, display an appropriate error. The full workflow is shown here: Running the app on an iPad produces these results: Again, the same app can be run from an Apple Watch: Hands-Free Amazon Alexa Skills Two of today's biggest industry trends are machine learning and serverless computing. Amazon's Alexa service (typically accessed through Amazon's Echo device) is at the forefront of both. In addition to interpreting voice commands for Amazon's own services (e.g. ordering more coffee beans or playing a particular song), developers can implement their own skills. Many are publicly available from 3rd parties such as Nest, Harmony, and Spotify, but you're free to implement and test your own – submitting it for review and public use when ready. The business logic behind Alexa skills is typically run within Amazon's serverless computing service – AWS Lambda. Lambda is a great product for services that handle low or bursty levels of traffic – rather than paying a flat rate for a physical or virtual server, you pay a small fee for every event handled (and you even get a low-medium level of throughput for free). If your service really takes off then Lambda automatically scales out. Assuming that you decide to use Lambda, there are three main components to your skill: - The set of intents – instructions that a user can give to Alexa. - For each intent, a set of utterances that the user might say in order to signal that intent. - The actual logic which is invoked whenever the user signals an intent – implemented as a Lambda function. The Mongo Alexa skill has 3 intents/commands: - WhereIntent: Find the most recent location that I checked into. - CountIntent: Count how many times I've checked in. - HelpIntent: Explain what the available commands/intents are. The intents are defined as a JSON document: {"intents": [ {"intent": "WhereIntent"}, {"intent": "CountIntent"}, {"intent": "AMAZON.HelpIntent"}, ] } The utterances for each of those intents must also be defined: WhereIntent where is andrew WhereIntent where is he WhereIntent where am i WhereIntent where did he last check in WhereIntent where did Andrew last check in WhereIntent where did i last check in WhereIntent last check in CountIntent how many checkins CountIntent how many times have I checked in CountIntent how many times has Andrew checked in CountIntent how many times has he checked in CountIntent how many check ins CountIntent check in count Note that no utterances need to be added for the AMAZON.HelpIntent as that intent is built in. The skill is created in the Amazon Developer Console using the Alexa wizard; where the intentions and utterances can be added: In the next screen, you indicate where the skill's business logic runs; in this case, I provide the Amazon Resource Name (ARN) of my Lambda function: The logic for the Mongo skill is implemented in the index.js file (part of the MongoDB-Alexa GitHub repository): "use strict"; var Alexa = require("alexa-sdk"); var request = require("request"); var config = require("./config.js"); exports.handler = function(event, context, callback) { console.log("In handler"); var alexa = Alexa.handler(event, context); alexa.appId = config.appId; alexa.registerHandlers(handlers); alexa.execute(); }; var handlers = { "AMAZON.HelpIntent": function () { this.emit(':tellWithCard', "Ask where Andrew is or ask how many times he has checked in", "Mongo – Where's Andrew", "Ask where Andrew is or ask how many times he has checked in", { smallImageUrl: "", largeImageUrl: "" } )}, "CountIntent": function () { console.log("In CountIntent"); var countURL = config.mongopopAPI + "checkInCount"; var _this = this; request({url: countURL, json: true}, function (error, response, body) { console.log("in callback"); if (error || response.statusCode != 200) { console.log("Failed to count checkins: " + error.message); _this.emit(':tellWithCard', "Network error, check Alexa app for details", "Mongo – Error", "Network error: " + error.message, { smallImageUrl: "", largeImageUrl: "" } ) } else { if (body.success) { var successString = "Andrew has checked in " + body.count + " times."; _this.emit(':tellWithCard', successString, "Mongo – Where's Andrew", successString, { smallImageUrl: "", largeImageUrl: "" } ) } else { console.log("Failed to count checkins: " + body.error); _this.emit(':tellWithCard', "Application error, check Alexa app for details", "Mongo – Error", "Application error: " + body.error, { smallImageUrl: "", largeImageUrl: "" } ) } } }) }, "WhereIntent": function () { console.log("In WhereIntent"); var latestCheckinURL = config.mongopopAPI + "latestCheckin"; var _this = this; request({url: latestCheckinURL, json: true}, function (error, response, body) { console.log("in callback"); if (error || response.statusCode != 200) { console.log("Failed to fetch latest Checkin, network problem: " + error.message); _this.emit(':tellWithCard', "Network error, check Alexa app for details", "Mongo – Error", "Network error: " + error.message, { smallImageUrl: "", largeImageUrl: "" } ) } else { if (body.success) { var successString = "Andrew last checked in to " + body.venue + " on " + body.date; var imgURL = body.location.replace("http", "https"); _this.emit(':tellWithCard', successString, "Mongo – Where's Andrew", successString + ". Location URL: " + body.url + ". View venue: " + body.location + ".", { smallImageUrl: imgURL, largeImageUrl: imgURL } ) } else { console.log("Failed to fetch latest checkin, app error: " + body.error); _this.emit(':tellWithCard', "Application error, check Alexa app for details", "Mongo – Error", "Application error: " + body.error, { smallImageUrl: "", largeImageUrl: "" } ) } } }) }, "Unhandled": function () { this.emit(':tellWithCard', "Unhandled event", "Mongo – Error", "Unhandled event", { smallImageUrl: "", largeImageUrl: "" } ) } }; As explained earlier, the aim of this post is to cover a broad set of technologies rather than going too deeply into any one but explaining a few concepts may help you understand what this code is doing: - A handler is implemented for each of the intents; that handler is invoked when the user speaks one of the utterances associated with that intent. - The handlers for the CountIntentand WhereIntentmakes calls to the Mongopop REST API using the requestfunction. - The emit method is how the handlers can send results or errors back to the user (via Alexa). - The card, referred to by tellWithCard, is visual content (text and images) that are displayed in the Alexa app. Note that this is a simple skill which receives a request and sends a single response. It is also possible to implement an interactive state machine where there's a conversation between the user and Alexa - in those skills, the logic uses both the latest intent and the past context in deciding how to respond. Note that the Lambda function is always stateless and so all data should be stored in a database such as MongoDB. The skill is deployed to AWS Lambda through the AWS Management Console. The index.js, config.js, and node_modules directory (created by running npm install) should be archived into a single Zip file which is then uploaded to AWS: There are a number of extra configuration options – such as the runtime environment to use (Node.js), the user role, the amount of memory to be made available to the function, and how long each invocation of the function should be allowed to run (the function is making external HTTP requests and so it may need a few seconds): As a reminder, the user speaks to the Amazon Echo device, then the Alexa application invokes an AWS Lambda function, which implements the business logic for the Mongo skill, which then interacts with the MongoDB database via the Mongopop REST API: To start, test the simplest intent – asking the Mongo skill for help: Note that the visual card can contain more information than Alexa's spoken response. For example, if there is an error in the Mongopop back-end, the returned error message is displayed on the card. Next, we can ask Alexa how many times I've checked in and where my last check-in was. Note that I could have used any of the utterances associated with these intents (and Alexa will automatically convert similar phrases): Summary Previous posts stepped through building the Mongopop application back-end and then the creation of web client applications using Angular 2 and ReactJS. This post explored some alternative ways to build client applications; in particular, it showed how to combine existing cloud services with a bit of new logic to create something brand new. We looked at a number of technologies to help build applications quickly and efficiently: - IFTTT: Make events in one cloud service that trigger actions in another. - Workflow: Automate complex tasks involving multiple services on an iOS device. - Amazon Alexa: Implement your own voice-controlled skills. - AWS Lambda: Host and scale your business logic in the cloud while only paying for the transactions you process. Increasingly, applications leverage multiple services (if only to allow the user to share their efforts on different social media networks). The key to all of these integrations is the REST APIs provided by each service. If you've jumped straight to this post then consider reading parts 1 through 3 to learn how to build your own REST API. If you're interested in learning everything you need to know to get started building a MongoDB-based app you can sign up for one of our free online MongoDB University courses. Published at DZone with permission of Andrew Morgan, DZone MVB. See the original article here. Opinions expressed by DZone contributors are their own.
https://dzone.com/articles/the-modern-application-stack-part-6-browsers-arent
CC-MAIN-2022-27
refinedweb
2,912
53
Pratica - Monadic Library, now fully in Typescript! Jason ・2 min read. How do I start? You can install it with: yarn add pratica or npm i pratica. Then you can import the main functions like: import { nullable } from 'pratica' Create small, safe and easy to read programs by composing functions together, like: // Typescript import { Maybe, nullable, get, parseDate } from 'pratica' const getPersonAge = (person?: Person): Maybe<number> => nullable(person) .chain(get<string>(['birthday'])) .chain(parseDate) .map(birthday => Date.now() - birthday.getTime()) .chain(parseDate) .map(date => Math.abs(date.getUTCFullYear() - 1970)) getPersonAge({ birthday: '1994-06-08' }) // -> Just(25) getPersonAge({ birthday: 771033600000 }) // -> Just(25) getPersonAge({ birthday: null }) // -> Nothing getPersonAge(null) // -> Nothing Pratica works great with React too! Use it in your JSX for handling cases with missing data. const viewPersonAge = ({ person }) => getPersonAge(person).cata({ Just: age => <div>{age}</div> Nothing: () => <span>No age available</span> }) Try it out Try it out in an online browser sandbox here! or check it out on Github below! 🥃 Pratica Functional Programming for Pragmatists Why is this for pragmatists you say? Pratica sacrifices some common FP guidelines in order to provide a simpler and more approachable API that can be used to accomplish your goals quickly - while maintaining data integrity and saftey, through algrebraic data types. For V1 docs - check out v1 docs readme Install With yarn yarn add pratica or if you prefer npm npm i pratica Documentation Table of Contents - Monads - Utilities Changes from V1 to V2 If you are migrating from Pratica V1 to V2. Here is a small list of changes made: Maybe()utility was renamed to nullable() .default(() => 'value')was renamed to .alt('value')and does not require… 12 Best Online Tools for Web Developers Aleksandar Vasilevsk - I'm building a copy of the iOS Home Screen using React Spring and Styled Components. Here's what I've got so far. #2 Lucas Chen - Top 7 Space-Time Complexity Algorithms You Must Know Jay Chow - This is gold. Jason very nice. I am working currently on something similar. If I gave up, maybe I will do some contribution to your lib. But I feel the same need of something simple with fp powers. Thanks for that! Awesome, any contributions to this library will be welcome! ohh interesting :) 😱️😱️
https://dev.to/rametta/pratica-monadic-library-now-fully-in-typescript-1794
CC-MAIN-2019-47
refinedweb
374
57.67
Viewing Values of Variables When in Debug Mode, you can go to Code View to inspect values and states of objects and variables. You can use breakpoints to temporary suspend your program from running so you can examine your code. Visual Studio and Visual C# Express offers tools that allows you to see how the program runs. Create a new Console Application and name it DebuggingTechniques. Use the following code. using System; namespace DebuggingTechniques { public class Person { public string Firstone { get; set; } public string Lastone { get; set; } public int Age { get; set; } public Person() : this("", "", 0) { } public Person(string fn, string ln, int a) { Firstone = fn; Lastone = ln; Age = a; } } public class Program { static void Main() { Person firstPerson = new Person ("John", "Smith", 20); Person secondPerson = new Person(); string firstName; string lastName; int age; firstName = "Mike"; lastName = "Welsh"; age = 30; secondPerson.Firstone = firstname; secondPerson.Lastone = lastName; secondPerson.Age = age; Console.WriteLine("First Person Details: "); Console.WriteLine("First Name: {0}", firstPerson.Firstone); Console.WriteLine("Last Name: {0}", firstPerson.Lastone); Console.WriteLine("Age: {0} ", firstPerson.Age); Console.WriteLine("Second Person Details: "); Console.WriteLine("First Name: {0}", secondPerson.Firstone); Console.WriteLine("Last Name: {0}", secondPerson.Lastone); Console.WriteLine("Age: {0}", secondPerson.Age); } } } Example 1 – Code for Viewing Variables Demonstration Add a breakpoint to the first line of code of the Main method. We will now demonstrate how we can monitor the values of variables and objects. Run the program in Debug Mode. The execution will stop at the first breakpoint. The Quick Info window will show up containing the name of the variable and its current value. The current value of firstPerson object is null, since no value has been assigned to it yet. The current line is not yet executed. You can see a familiar pin icon. Clicking this icon will pin the Quick Info window so it will not auto-hide when you release your mouse. To unpin it, put the mouse over the pinned Quick Info window and press the pin icon again or the close button. Use the Step Over command to execute the current code and move to the next line of code. Since the previous line of code has been executed, firstPerson now has been initialized with values thanks to its constructor. If you hover again to the firstPerson object, you will now be presented with the DataTip window. You will notice that it doesn’t contain null as a value but the full name of its class. You will also notice a + icon at its left side, clicking this will show all the properties and fields(if any) of the current object together with their respective values. You might also notice the magnifying glass icon on some members. Clicking this will bring the Text Visualizer window which shows you the full content of the variable in case it is too large. If you click the values in the DataTip window, you can edit them. For example, click on the value of the Firstone field and change the value from “John” to “Joseph” then press enter. Note that this editing capability can also be done in the Quick Info window. The Locals Window The Locals Window is a central location where you can view all the values of variables and objects currently in use by the program. The Locals Window is automatically shown when you run the program in Debug Mode. It is located at the lower left portion of the IDE. Press Step Over until you reach the first WriteLine statement. Now look at the Locals Window You will see a list of all the variables currently in use. The columns consist of the Name, Value and Type. For complex types such as classes, you will see a + icon at the left side of the name, clicking those will show the members of the class together with their values. You can also modify the values of the variables by double clicking the values in the Locals Window. The Watch Window The Watch Window allows you to type a name of the variable and view its current value. You can even do arithmetic expressions with the variable such as finding the resulting value when another value is added to the variable. The Watch Window can be accessed(by default) as a tab where the Locals Window is located. You can type the name of the variable at the Name column. Once the enter key is pressed, the value of the variable will show up in the Value column. You can also try out arithmetic expressions such as adding a constant value or another variable inside the Name column so you can test the value of a variable after the modification.
https://compitionpoint.com/variables-values/
CC-MAIN-2021-21
refinedweb
782
65.01
In-Depth In the second part of this tutorial series, Wallace McClure walks you through the basics of creating a MonoDroid app. In the first part of this MonoDroid tutorial, we looked at the basics of Android and MonoDroid. Now let's look at the initial sample MonoDroid app. Here's a series of steps. Once the MonoDroid plug-in is installed, let's create a project. Figure 1 shows the different project types you can create with MonoDroid. With this example, we'll examine the default MonoDroid app. The default project has a button whose test is updated with the number of times that the button has been clicked. The Visual Studio Solution Explorer in Figure 2 shows the resulting project. There are several items of interest in the project that need to be pointed out. First, Activity1.cs is the class that's created that contains most of the resulting executable logic. Second, the Resources directory has a series of items that will be embedded into an application. These resources include the UI and images and will be marked as an AndroidResource for their Build Type. Finally, the starter UI is contained within the file main.xml. Designing an Android UIMost developers are familiar with the Visual Studio design surface for building Windows Forms and WebForms applications. Building a UI for Android will be nearly a foreign concept for these developers. An Android UI will have no design surface support in the initial release of MonoDroid. However, have no fear. Because there hasn't been a lot of design surface support in the Android SDK until recently, there are some third-party developers who've built standalone tools for building an Android UI. I've been using DroidDraw, and there are others. This is an example definition for an Android UI: <?xml version="1.0" encoding="utf-8"?><LinearLayout xmlns:<Button android:</LinearLayout> Android contains many of the UI widgets that developers and users are expecting. These UI widgets include text boxes, labels, drop-down list boxes, repeating elements, images and other types of controls. This example contains a button, and the button will be updated after each click. The CodeThe code for the sample application is shown in Listing 1. A few of the items to pay attention to are: Android Namespaces: There are a series of Android-specific namespaces that provide a .NET Framework layer your application can call into. Remember, MonoDroid isn't about Windows Forms or Windows Presentation Foundation (WPF) running on Android. You're building a native Android application with C#/.NET. You still need to learn the specifics of Android. Activity Attribute: There's an Activity attribute that contains information that will be displayed when your app is installed into a device or the simulator. You won't see an AndroidManifest.xml in a project by default. If you do decide to, you can manually create it or create it in the project properties. This file sets the permissions that an application needs to run. This can include things like the version of the API required for an application to run as well as access to what features on the device an application needs. These can be set by editing the file by hand or by modifying the application's properties. The properties look something like Figure 3. The AndroidManifest.xml file is stored in the Properties folder of the project in Solution Explorer. The contents of the AndroidMani-fest.xml are shown here: <?xml version="1.0" encoding="utf-8"?><manifest xmlns:<application android:</application><uses-sdk android:<uses-permission android:<uses-permission android:<uses-permission android:</manifest> Contained in this version of the AndroidManifest.xml file is some information concerning the application version, a name for the label name for the application, and the minimum version of the API that's required. In this case, SDK 6 means Android 2.01. Also included are the features that the application will need access to on the device. In this case, the app is requesting access to the coarse location information, fine location information and battery status. Note that fine location information implies coarse location information. This data will be compiled into your application. If your application is deployed to the Android Marketplace, this information will be presented to the user regarding device resources that the application needs. Your class will inherit from an Activity and there are a series of events you can override. The example app merely overrides the OnCreate event. Also, the OnCreate event loads the application UI by calling SetContentView(Resource.layout.main) and passing the reference to the main layout. The final step in this is to create a reference to the button that's in the main.xml UI. Once the reference is created, a .Click event is created programmatically. When the user clicks on the button, the event will change the text in the button, as shown in Listing 1. When looking at the code, you're probably wondering where the references to Resource.id.control and Resource.layout.main are stored. There's a file in the Resources folder named Resource.Designer.cs that contains this information. It's auto-generated, so you don't typically want to touch it. The file will look something like Listing 2 for our sample project. This file provides your application with the references necessary to relate controls in the UI to your code. Additionally, it will help in providing IntelliSense support within Visual Studio. Look for more additions and changes in this feature after the 1.0 release. Compiling and RunningNow we've reached the exciting part. You've fixed all the bugs in your code and it compiles. When you start a debugging session, you'll get a dialog like the one shown in Figure 4. This dialog is asking you to select a device to deploy the application to. These two devices listed are for: After this, there are some messages regarding the status of deploying the Mono runtime and copy-ing the application to a device. The app is stored in the emulator with the other applications, as shown in Figure 5. It's interesting that the name displayed for the user is the same as the value for the Label property in the Activity attribute. Once these steps are completed, if you have a new instance of the simulator running, you'll need to open the simulator and your application will be running. Congratulations! Your first Android application built with MonoDroid is up and working. Great, but What About…There are a couple of other items that come up in a discussion of MonoDroid. First is the issue of pricing. While no formal pricing has been announced at this point, MonoDroid will most likely be packaged and priced similarly to MonoTouch. MonoTouch has the following versions: In April 2010, Apple created a stink in the development world by changing the licensing for its iPhone (iOS) SDK. This licensing change created fear, uncertainty and doubt regarding the use of non-Apple tools. This was in spite of the fact that Apple never removed any applications from the AppStore not written in its tools and language. In September 2010, Apple changed its position and relaxed its official stance on non-Apple tools. Unfortunately, this issue still causes some concern in the minds of many developers. In August 2010, Tom Hanrahan of the Microsoft Open Source Technology Center stated that Mono would fall under the Microsoft Community Promise Agreement. This was in reference to questions about the Oracle versus Google lawsuit regarding the use of Java in Android. It's assumed that this means Microsoft won't sue over MonoDroid's use of the defined set of .NET APIs. Given Google's effort to attract more developers, it's doubtful that Google will somehow attempt to disallow from the Android platform applications written in MonoDroid. Another open question is support for Silverlight. There's been a lot of talk recently about HTML5, Silverlight and where these products fit into the marketplace. Novell has a cross-platform implementation of Silverlight called Moonlight. One question I've fielded recently is, "What's the status of Silverlight on Android?" The thinking seems to be that, if MonoDroid is .NET for Android, and Silverlight is a UI for .NET, then Silverlight should be available for Android. I've spoken about this subject with Joseph Hill, the program manager for MonoDroid at Novell. He states that the company is looking at adding Silverlight/Moonlight support to MonoDroid in the future, but it's not in its plans for MonoDroid 1.0. We've seen the growth rates of Android. We've seen the interest that .NET developers have in developing on Android, and we've also seen that .NET developers can target Android devices. I'm excited about the future of mobile development on Android thanks to MonoDroid. Printable Format > More TechLibrary I agree to this site's Privacy Policy. > More Webcasts
https://visualstudiomagazine.com/Articles/2011/02/01/Introducing-MonoDroid.aspx?Page=1
CC-MAIN-2015-27
refinedweb
1,501
57.57
[Feature Request] Pythonista built-in file picker - Webmaster4o I think Pythonista is really missing something very beneficial in a built-in scriptable file navigator. The one that's inside the "move" dialog is really nice, but only supports folders, and plus, it's not user-accessible. I think Pythonista should have a filenavmodule that allows for easy creation of nice file navigators. They're pretty hard to write, IMHO, and so could benefit from being built-in. How I envision this is as follows: A filenavmodule that provides file browsers and navigators. - Higher-level functions for picking files with callbacks. A function that would allow for picking files and folders. Something like: def pick_file(start_dir, folders_only=False, select_multiple=False, should_pick="both") where should_pickis a string that describes what should be selectable, "files", "folders", or "both"and folders_onlyis whether the file picker should only display folders, and hide files from view. - A subclassable class like filenav.FilePicker. This would serve important functions: - Allow users to implement custom methods for file browsing. Users could define methods for listing directories, etc. A (far from complete) example: class myPicker(filenav.FilePicker): def listdir(dir): '''Should return a list of files and directories below a directory as a dictionary''' list = os.listdir(dir) dirs = [f for f in list if os.path.isdir(os.path.abspath(f))] files = set(list)-set(dirs) return {'dirs':dirs,'files':files} def fileSelected(path): '''Called with the path of a file whenever a file is selected''' pass def dirSelected(path): '''Called with the path of a directory whenever a directory is selected''' pass if __name__=='__main__': a=myPicker('test_dir/a/b/c') #Picked will be a list of both files and directories that the user picked out of test_dir/a/b/c picked = a.pick_file(multiple=True,should_pick='both') This doesn't immediately seem useful, but has tons of practical applications. For example, it would be easy, using a class like this, to create methods that would make a file browser for zip files. Using zipfile, custom methods could be created that allowed browsing through zip files without extracting first. This would allow a pythonista app to let users to pick certain files to extract from a zip. These two functionalities combined could help create a scriptable file browser that's easy for beginners, yet hugely powerful for more advanced users. I'd very much like to see a built-in file browser with these features in a future release. P.S. I actually have struggled to create a zip file browser in Pythonista in the past. I've gotten this far on GitHub, and Here's a sideways YouTube video @Webmaster4o This is a great idea. Your listdir() contains an awesome use of sets! It puts my files_and_folders.py to shame! You might want to put the is.listdir() inside a sorted() and using listas a variable name will shadow the builtin. I think this could be a useful addition to the dialogsmodule. I've started working on a file picker dialog that I might add to the dialogsmodule. You can find the code here: → File Picker.py (works in Pythonista 2 and 3) The API isn't exactly like you suggested, but similar, and quite extensible. As a demo, I've implemented an alternative "data source" that shows files and folders from an FTP server instead of the local file system. It would easily be possible to build a Zip file browser with this as well... The idea is basically that you can subclass TreeNodeto represent whatever kind of tree structure you need. The TreeDialogControllergets one TreeNodeas its root and a couple of options (multiple selection etc.). The TreeNodeis then responsible for loading its children (each of the children is also a TreeNode), and each node has a title/icon that is shown in the table view. For cases when a node might take a relatively long time to load its children, TreeDialogControllerhas an async_modeoption that causes it to automatically dispatch the loading to a background thread, and to show a spinner overlay while loading. Overall, the UI is very close to Pythonista's own directory picker, i.e. I'm using the same icons, table view animations, etc. @omz: Looks awesome. Would this be generic enough that the things in the tree do not actually have to be files? I.e. usable as a generic tree navigation component? @mikael Absolutely, as long as you can represent each item with a title and icon, the data can be pretty much anything. Here's an example of a TreeNodesubclass that represents the contents of a JSON file (e.g. pyui): import json import sys PY3 = sys.version_info[0] >= 3 if PY3: basestring = str def iteritems(d): if PY3: return d.items() else: return d.iteritems() class JSONTreeNode (TreeNode): def __init__(self, json_path=None, node=None, key=None, level=0): TreeNode.__init__(self) if json_path is not None: with open(json_path, 'rb') as f: root_node = json.load(f) self.node = root_node else: self.node = node if isinstance(self.node, list): self.title = 'list (%i)' % (len(self.node),) self.leaf = False self.icon_name = 'iob:navicon_32' elif isinstance(self.node, dict): self.title = 'dict (%i)' % (len(self.node),) self.leaf = False self.icon_name = 'iob:ios7_folder_outline_32' elif isinstance(self.node, basestring): self.title = '"%s"' % (self.node,) self.leaf = True self.icon_name = 'iob:ios7_information_outline_32' else: self.title = str(self.node) self.leaf = True self.icon_name = 'iob:ios7_information_outline_32' self.level = level if key is not None: self.title = key + ' = ' + self.title elif json_path is not None: self.title = os.path.split(json_path)[1] def expand_children(self): if self.children is not None: self.expanded = True return if isinstance(self.node, list): self.children = [JSONTreeNode(node=n, level=self.level+1) for n in self.node] elif isinstance(self.node, dict): self.children = [JSONTreeNode(node=v, key=k, level=self.level+1) for k, v in iteritems(self.node)] self.expanded = True Usage: root_node = JSONTreeNode(os.path.expanduser('~/Documents/Examples/User Interface/Calculator.pyui')) tree_controller = TreeDialogController(root_node) tree_controller.view.present('sheet') tree_controller.view.wait_modal() And here's how that looks like: - Webmaster4o
https://forum.omz-software.com/topic/2784/feature-request-pythonista-built-in-file-picker
CC-MAIN-2020-40
refinedweb
1,017
52.36
Documentation¶ Basic usage¶ Basic usage: from pySmartDL import SmartDL url = "" dest = "C:\\Downloads\\" # or '~/Downloads/' on linux obj = SmartDL(url, dest) obj.start() # [*] 0.23 Mb / 0.37 Mb @ 88.00Kb/s [##########--------] [60%, 2s left] path = obj.get_dest() For more examples please refer to the Code Examples page. pySmartDL.SmartDL (main class)¶ - class pySmartDL. SmartDL(urls, dest=None, progress_bar=True, fix_urls=True, threads=5, logger=None, connect_default_logger=False)¶ The main SmartDL class Note The provided dest may be a folder or a full path name (including filename). The workflow is: - If the path exists, and it’s an existing folder, the file will be downloaded to there with the original filename. - If the past does not exist, it will create the folders, if needed, and refer to the last section of the path as the filename. - If you want to download to folder that does not exist at the moment, and want the module to fill in the filename, make sure the path ends with os.sep. - If no path is provided, %TEMP%/pySmartDL/ will be used. add_basic_authentication(username, password)¶ Uses HTTP Basic Access authentication for the connection. add_hash_verification(algorithm, hash)¶ Adds hash verification to the download. If hash is not correct, will try different mirrors. If all mirrors aren’t passing hash verification, HashFailedException Exception will be raised. Note If downloaded file already exist on the destination, and hash matches, pySmartDL will not download it again. Warning The hashing algorithm must be supported on your system, as documented at hashlib documentation page. fetch_hash_sums()¶ Will attempt to fetch UNIX hash sums files (SHA256SUMS, SHA1SUMS or MD5SUMS files in the same url directory). Calls self.add_hash_verification if successful. Returns if a matching hash was found. New in 1.2.1 start(blocking=None)¶ Starts the download task. Will raise RuntimeError if it’s the object’s already downloading. Warning If you’re using the non-blocking mode, Exceptions won’t be raised. In that case, call isSuccessful() after the task is finished, to make sure the download succeeded. Call get_errors() to get the the exceptions. get_eta(human=False)¶ Get estimated time of download completion, in seconds. Returns 0 if there is no enough data to calculate the estimated time (this will happen on the approx. first 5 seconds of each download). get_progress_bar(length=20)¶ Returns the current progress of the download as a string containing a progress bar. Note That’s an alias for pySmartDL.utils.progress_bar(obj.get_progress()). isSuccessful()¶ Returns if the download is successfull. It may fail in the following scenarios: - Hash check is enabled and fails. - All mirrors are down. - Any local I/O problems (such as no disk space available). Note Call get_errors() to get the exceptions, if any. Will raise RuntimeError if it’s called when the download task is not finished yet. get_status()¶ Returns the current status of the task. Possible values: ready, downloading, paused, combining, finished. get_dest()¶ Get the destination path of the downloaded file. Needed when no destination is provided to the class, and exists on a temp folder. get_dl_time(human=False)¶ Returns how much time did the download take, in seconds. Returns -1 if the download task is not finished yet. get_data(binary=False, bytes=-1)¶ Returns the downloaded data. Will raise RuntimeError if it’s called when the download task is not finished yet. get_data_hash(algorithm)¶ Returns the downloaded data’s hash. Will raise RuntimeError if it’s called when the download task is not finished yet. Warning The hashing algorithm must be supported on your system, as documented at hashlib documentation page. Exceptions¶ The following exceptions may be raised: - exception urllib2. HTTPError¶ May be raised due to problems with the servers. Read more on the official documentation. - exception urllib2. URLError¶ May be raised due to problems while reaching the servers. Read more on the official documentation. - exception exceptions. IOError¶ May be raised due to any local I/O problems (such as no disk space available). Read more on the official documentation. Warning If you’re using the non-blocking mode, Exceptions won’t be raised. In that case, call isSuccessful() after the task is finished, to make sure the download succeeded. Call get_errors() to get the the exceptions. pySmartDL.utils (helper class)¶ The Utils class contains many functions for project-wide use. pySmartDL.utils.lärung)') '' (taken from werkzeug.utils) pySmartDL.utils. progress_bar(progress, length=20)¶ Returns a textual progress bar. >>> progress_bar(0.6) '[##########--------]' pySmartDL.utils. is_HTTPRange_supported(url, timeout=15)¶ Checks if a server allows Byte serving, using the Range HTTP request header and the Accept-Ranges and Content-Range HTTP response headers. pySmartDL.utils. get_random_useragent()¶ Returns a random popular user-agent. Taken from here, last updated on 2019/02/17. pySmartDL.utils. sizeof_human(num)¶ Human-readable formatting for filesizes. Taken from here. >>> sizeof_human(175799789) '167.7 MB' pySmartDL.utils. time_human(duration, fmt_short=False, show_ms=False)¶ Human-readable formatting for timing. Based on code from here. >>> time_human(175799789) '6 years, 2 weeks, 4 days, 17 hours, 16 minutes, 29 seconds' >>> time_human(589, fmt_short=True) '9m49s' - class pySmartDL.utils. DummyLogger¶ A dummy logger. You can call debug(), warning(), etc on this object, and nothing will happen. - class pySmartDL.utils. ManagedThreadPoolExecutor(max_workers)¶ Managed Thread Pool Executor. A subclass of ThreadPoolExecutor. submit(fn, *args, **kwargs)¶ Submits a callable to be executed with the given arguments. Schedules the callable to be executed as fn(*args, **kwargs) and returns a Future instance representing the execution of the callable. - Returns: - A Future representing the given call.
http://itaybb.github.io/pySmartDL/code.html
CC-MAIN-2019-13
refinedweb
909
52.26
3D Isosurface Plots in Python How to make 3D Isosurface. With go.Isosurface, you can plot isosurface contours of a scalar field value, which is defined on x, y and z coordinates. Basic Isosurface¶ In this first example, we plot the isocontours of values isomin=2 and isomax=6. In addition, portions of the sides of the coordinate domains for which the value is between isomin and isomax (named the caps) are colored. Please rotate the figure to visualize both the internal surfaces and the caps surfaces on the sides. import plotly.graph_objects as go fig= go.Figure(data=go.Isosurface( x=[0,0,0,0,1,1,1,1], y=[1,0,1,0,1,0,1,0], z=[1,1,0,0,1,1,0,0], value=[1,2,3,4,5,6,7,8], isomin=2, isomax=6, )) fig.show() import plotly.graph_objects as go import numpy as np X, Y, Z = np.mgrid[-5:5:40j, -5:5:40j, -5:5:40j] # ellipsoid values = X * X * 0.5 + Y * Y + Z * Z * 2 fig = go.Figure(data=go.Isosurface( x=X.flatten(), y=Y.flatten(), z=Z.flatten(), value=values.flatten(), isomin=10, isomax=40, caps=dict(x_show=False, y_show=False) )) fig.show()
https://plotly.com/python/3d-isosurface-plots/
CC-MAIN-2020-34
refinedweb
207
60.01
Beginner's Scripting Guide Introduction In this portion of Beginner's coding in Unity, we will handle using the CSharp language. This is because CSharp is regarded as one of the more popular programming languages. The terms used in this article will not necessarily be the "correct" or "good" term to use. It will essentially be used to get beginner coders, like you, to understand the idea I am trying to get across. C# Syntax The first thing you see when creating a C# script in Unity is something like this: using System.Collections; using UnityEngine; What does this mean? Simply put, there are a TON of methods/functions, classes, namespaces, etc. that are created by Unity Technologies for you. These are helper functions, Math functions, Object classes (GameObject/Transform), and more. These classes were made for Unity. Therefore, they wouldn't be used within another game engine, or if you are creating an application in C#. These classes are specifically for Unity. Therefore, Unity put them in a handy "folder", which we call namespaces. A namespace is a group of classes (or 'files'). Similarly, a class is a group of methods (code). It's just a neat way to keep everything organized. Since these classes are in a namespace (which is 'UnityEngine'), we must tell the C# Script that we want to use the classes that are within that namespace, or that we want access. On another note, you may be thinking, "Why can't I just have everything I will ever need, and not have to worry about namespaces? Then I wouldn't ever have to use 'using...'!" And the simple answer is 3 things: 1.) MonoDevelop/Visual Studio (or whatever text editor you are using) will crash, because auto-completion will try to load all the possible methods and combinations that you give it. 2.) If you do manage to get it to work, there is a lot of guessing. What if there is a method called "GetInfo()" in a class called "HelperClass", but there is also a "GetInfo()" method inside of a class called "Notifications"? Which one would we use? 3.) Unity could possibly crash. By telling Unity that we want to use those namespaces/classes, as far as I know, memory is being reserved for those classes so we know how to access them. If you have thousands of classes ready, a lot of it is useless if you aren't going to use it. But all of this is simply just a thought. Moving on! The next thing you see is our class identifier. This tells the script what it is called, and how it can interact. It may look like this: public class HelloWorld : MonoBehaviour { usually is an Input>Output, or helps you process information easily), and more. The name of our class must match exactly with the name of our script. If you change it, you will also have to change the name of the script. Finally is inheritance. This is why you see the ': MonoBehaviour'. We are inheriting from MonoBehaviour, which is also a class. It's just like 'HelloWorld' class, except it is packed full with goodies! MonoBehaviour is what gives us access to pretty much everything you need to get scripts to work on objects in Unity. When you inherit from a class, you can see that in Unity. In the Inspector, you may have seen '(MonoBehaviour)' in the inspector before. If you did not inherit MonoBehaviour here, you would not see your script correctly in Unity! So, let's get to understanding basic syntax in Unity. Below is a list of various tools you will use frequently. Loops Loops allow us to repeat statements multiple times without having to type it over and over. The benefit of this is we can also change how many times it loops with a variable. For Loop A For loop allows you to loop using an index, then use that within the loop. The index is generally used to access a specific index in an array/list. for(int i = 0; i < 10; i++) { } In this example, we are defining our “index” to be an integer. We are calling it i. We then set its starting value to 0. We complete this ‘statement’ with a semicolon, then follow it with the test, where we repeat the loop as long as i is less than 10. Obviously, you could change this to be anything you want. The comparison symbol could be “<, >, <=, >=” and more. The 10 can also be anything, even another variable. Finally, we define the step. i++ means we want to increment i one step each time. So the first time we run through the loop, i = 0. After we reach the end of the for loop code, i = 1, 2, 3, and so on, all the way until 9, when i is no longer less than 10. At that point, the loop breaks. While Loop While loops are common when trying to halt your code until a condition is met, or as long as a condition is met. These are most commonly used in Unity within Coroutines. A while loop will take in a condition, and will run the code within as long as the condition is true (Note that this means the while loop will run as long as the condition inside its parentheses is ‘true’). while(i == 1) { } In this example, as long as some variable called i is equal to 1, the code below will run. Outside of Unity, most game developers will use a while loop as their “update” function, so code is executed every frame. If you want to execute code all the time in a while loop, no matter what, the most common approach is to do: while(true) { } Foreach Loop A Foreach Loop is similar to a For loop. However, in a Foreach loop, you are not incrementing/decrementing a variable (such as an int i), but you are incrementing through a reference to an array. For example, if I have an array of strings called string[] myStrings, I can access a reference to the elements inside of that array without having to pass in an element. foreach(string s in myStrings) { print(s); } In comparison, if we wanted to access an element in an array using a for loop, we’d use something like: for(int i = 0; i < myStrings.Length; i++) { print(myStrings[i]); } Essentially, we will increment from 0 to the length of the array - 1 (Because an array of 10 elements has indexes 0-9. We start at 0, not 1, therefore we have 1 less ‘element number’ than the size of 10), then we will access that element by passing it into the myStrings array. Nested Loops It is possible to nest loops inside each other. This means we could have multiple loops running inside. This may be useful if you want to mess with a “2D array”, which would look like this: for(int a = 0; a < 3; a++) { for(int b = 0; b < 3; b++) { print(a + “, “ + b); } } Output: 0, 0 0, 1 0, 2 1, 0 1, 1 1, 2 2, 0 2, 1 2, 2 Unity Essentials This section is comprised of 'essentials' for understanding how to get basic input/output, and utilize coding features specific to Unity. Inheritance Tree Unity has a lot of different classes. Below is a structure of how each of these inherit from one another: - Object - Component - Behaviour - MonoBehaviour - Terrain - Transform - GameObject GameObject GameObjects are what you will most commonly used to access information from geometry in your scene. If you have multiple scripts on the same object (GameObject) in your scene, you will use methods in the GameObject class to “find” other scripts (MonoBehaviours) on your object. Often times, you will see GameObject show up 2 different ways in scripts: GameObject.Find(""); gameObject.GetComponent(); The above 2 example methods that can both be called, both of which are from the GameObject class. There is a difference between the two. The first one has a capital 'C' and the second has a lower-case 'c'. If you are using the first one (GameObject), you are calling static methods. These are methods that are independent on your object. These are methods that you can call at any point of time, because they do not require a reference to the object the script is attached. However, the second script is not a class. The lower-case 'gameObject' is a reference variable. It is assigned to automatically by Unity because we inherit from MonoBehaviour (which is one of those cool features)! So when you use 'gameObject', you are then calling methods that are specific to that GameObject the script is attached to. Therefore, you will not see the methods from the GameObject class that are static, because 'gameObject' is not static, it is a reference. If this is becoming confusing, then you're on the right track! At least you're getting those brain cells roaring up on speed again. But if you're confused, let's wrap up the last paragraph: GameObject (capital 'C') is a class/CSharp script somewhere in Unity's core. 'gameObject' (lower-case 'c') is a variable which is the "local" GameObject that the script instance is attached to. If you call methods from gameObject (lower-case), you are calling methods on that single specific object. Now you may be thinking, what is 'gameObject'? How does it compare to anything else? Really, it's the same thing as if you did this: public class Example : MonoBehaviour { public GameObject gameObject; } This will not work, however, because 'gameObject' is already a variable because we inherit from 'MonoBehaviour'. I won't go over the specific methods of each though. That's where you can look at the documentation. Transform The Transform component on the objects in your scene have a large amount of importance, just like GameObject. As far as I know, you cannot use GameObjects in your scene without using a Transform component. Now that I've mentioned it, let's talk about what this 'Component' means for Transforms. Just like GameObject, Transform is also a class built into Unity. It's some CSharp script deep inside that you cannot access. It's got methods, variables, etc., just like GameObjects. However, Transform is visible in the Inspector of objects in your scene because it is attached to GameObjects. So even though Transforms are "lower level" than GameObjects, they are usually just as important. GameObjects derives from Object, as we've seen in the Tree structure made above. However, Transform derives from Object>Component. Similarly to GameObjects, you can get a reference of it (thanks to MonoBehaviour) via the transform variable. Now that we've got that out of the way, there are some key concepts when understanding transforms. The 3 most used features of the Transform class is PSR (position, scale, rotation). Manipulating these properties allow you to change where and how your geometry (GameObjects) appear in your scene. If you've used Unity for a while, you probably already know this. However, there is some confusing bits when we get to rotation. Both Position and Scale are variables that are stored as a Vector3, which is essentially 3 float values. Each value corresponds to the position across an axis in 3D space. Vector3, however, is not a class (Like GameObject/Transform), it is a struct. Structs are a little more confusing, but we may talk about that someday. However, rotation is handled using Quaternions, which is, at its root, a Vector4 (meaning it has 4 float values). I'm not going to go into Quaternion math, but essentially, each value in a Quaternion is interdependent on the other ones. So your best bet is to avoid ever changing 'transform.rotation' manually by setting its value. So, what is 'Rotation' we see in the Inspector? Why is it a Vector3, even though it's a Quaternion/Vector4? It's because it is easier to see as a Vector3. Unity converts it from a Quaternion to a Vector3 so it's more appealing to you. The XYZ values for rotation in the Inspector compare to pitch, yaw, and tilt on their respective axes. To get this rotation the "appealing" way we want to see it (as a Vector3), instead of using 'transform.rotation', we can use 'transform.eulerAngles', which returns rotation as Euler (pronounced oil-er) angles. One of the biggest problems people run into when trying to change position in Unity (using CSharp) is trying to change individual axes. Without describing it, let's just see the wrong vs. right: //Wrong transform.position.x = 10; //Right transform.positoin = new Vector3(10, 0, 0); Long story short, we cannot change individual values. This is because 'transform.position' is a struct, not a class. Therefore, we cannot change values of it, we must reassign the transform.position struct via a reference. That's why we type 'new Vector3()' because we are creating a new Vector3 variable (which is just temporary, via the 'new' keyword). Vector3 Vector3's are, as simply as it is, 3 float values. That is it. In Unity, Vector3's may do some extra work, such as give you helper classes for converting it from this to that, but essentially, it really just is 3 float values. What I am trying to say is you do not need to use Vector3 for just position or scaling. Vector3's can be used if you want to store 3 sets of data, such as score, kills and deaths in a simple structure. It may be easier to create your own data type later on, but if you need something to work quickly to hold 3 floats, that's all you really need!
https://wiki.unity3d.com/index.php/Beginner%27s_Scripting_Guide
CC-MAIN-2019-22
refinedweb
2,301
73.07
in reply to brian's Guide to Solving Any Perl Problem In general, it's a good idea to declare variables using my instead of using a global or using local. It forces namespace and scope awareness and eliminates pernicious bugs caused by same-named variables with different scope. Practically anything you can do with a local or global variable, you can do with a change in design using my, and you'll get a much more robust design. Also, in general, avoid exporting variables from modules. Exporting methods can sometimes be OK, although I still think it's better to say use Foo::Bar; ... my $barian = Foo::Bar->baz(); [download] Variable and method names should be communicative of the intended use; it's better for a name to be long and communicative than short and cryptic. Document, document, document. Also: I'm astonished no one's mentioned using functional spec's and test suites before now. (Visit this Joel Spolsky article and scroll down to the second headline, "Painless Functional Specifications," for information on the former; perldoc Test::Harness and perldoc LWP::UserAgent for details on the latter, and on user agents which are also an enormous boon to web developers seeking a means of testing functionality and sounding the alarm when things go wrong.) Writing a spec before the program saves loads of time and heartache, as well as keeping the MBA's and the techies on the same page. Similarly, fleshing out the spec into a test suite before any code gets written -- and continuing to flesh out the test suite while coding -- reduces the likelihood of bugs, increases confidence in the final product, and makes a predictable timeline actually possible. Ideally, you want to test as high up the call chain as possible, drilling down into the nitty gritty only when -- and to the extent that -- the need presents itself. There are even times where it can be helpful to write a tiny program whose specific purpose is to test the syntax or the effect of some (for you) uncharted Perl functionality. I did this in my formative Perl years and it saved me an enormous amount of time. Oh, and also it helps -- particularly if you're working in a country whose primary language is English -- not to comment your code in, say, Croatian. (Don't laugh, I actually inherited a project some years ago containing some sections of code in which this had been done!) Assembly C Cobol C# C++ Fortran Go Haskell Java JavaScript Perl Perl6 PHP Python Ruby Rust Unixish Shell Scripting languages Visual Basic Other (post in comments) Results (286 votes). Check out past polls.
http://www.perlmonks.org/index.pl?node_id=377655
CC-MAIN-2017-51
refinedweb
444
55.88
following web page lists the most important configuration settings used to configure SpamAssassin; novices are encouraged to read it first:. Set the score and that name is still accepted, but is deprecated. whose. Used to whitelist sender addresses which send mail that is often tagged (incorrectly) as spam._from lines. See envelope_sender_header. be] Same as whitelist_from_rcvd, but used for the default whitelist entries in the SpamAssassin distribution. The whitelist score is lower, because these are often targets for spammer spoofing. Specify addresses which are in whitelist_from_rcvd that sometimes send through a mail relay other than the listed ones. By default mail with a From address that is in whitelist_from_rcvd that does not match the relay will trigger a forgery rule. Including the address in whitelist_allows_relay prevents that._allows_relays lines. The specified email address has to match exactly the address previously used in a blacklist_from line. See above. See above. If the given address appears as a recipient in the message headers (Resent-To, To, Cc, obvious envelope recipient, etc.) the mail will be blacklisted. Same format as blacklist_from. Used to specify addresses which send mail that is often tagged (incorrectly) as spam. This is different from whitelist_from and whitelist_from_rcvd is roughly equivalent to specifying duplicate whitelist_from_spf, whitelist_from_dk, and whitelist_from_dkim lines for each of the addresses specified. e.g. whitelist_auth joe@example.com fred@example.com whitelist_auth *@example.com Same as whitelist_auth, but used for the default whitelist entries in the SpamAssassin distribution. The whitelist score is lower, because these are often targets for spammer spoofing. Used to override a whitelist_auth entry. The specified email address has to match exactly the address previously used in a whitelist_auth line. e.g. unwhitelist_auth joe@example.com fred@example.com unwhitelist_auth *@example.com. Is a shorthand for a directive: enlist_uri_host (BLACK) host ... Please see directives enlist_uri_host and delist_uri_host for details. Is a shorthand for a directive: enlist_uri_host (BLACK) host ... Please see directives enlist_uri_host and delist_uri_host for details. By default, suspected spam messages will not have the Subject, From or To lines tagged to indicate spam. By setting this option, the header will be tagged with STRING to_-]. The order of add_header configuration options is preserved, inserted headers will follow this order of declarations. When combining add_header with clear_headers and remove_header, keep in mind that add_header appends a new header to the current list, after first removing any existing header fields of the same name. Note also that add_header, clear_headers and remove_header may appear in multiple .cf files, which are interpreted in alphabetic order. and remove_header. add_header, clear_headers and remove_header may appear in multiple .cf files, which are interpreted in alphabetic order, so clear_headers.. This option is used to specify which locales are considered OK for incoming mail. Mail using the character sets that are allowed by this option for more information. MXes for your domain(s) and internal relays should also be specified using the internal_networks setting. When there are 'trusted' hosts that are not MXes or internal relays for your domain(s) they should only be specified in trusted_networks. The IPaddress can with an IPv4 address, or /128 line after another one will append new entries to the list of trusted networks. To clear out the existing entries, use clear_trusted_networks. If trusted_networks is not set and internal_networks is, the value of internal_networks will be used for this parameter. If neither trusted_networks or internal_networks is set, a basic inference algorithm is applied. This works as follows: Empty the list of trusted networks. is set and internal_networks is not, the value of trusted_networks will be used for this parameter. If neither trusted_networks nor internal_networks is set, no addresses will be considered local; in other words, any relays past the machine where SpamAssassin is running will be considered external. Every entry in internal_networks must appear in trusted_networks; in other words, internal_networks is always a subset of the trusted set. Note: 127/8 and ::1 are always included in internal_networks, regardless of your config. Empty the list of internal networks.. Empty the list of msa networks.. Empty the list of 'originating IP address' header field names. Trust the envelope sender even if the message has been passed through one or more trusted relays. See also envelope_sender_header.. Specifies an IP address of a DNS server, and optionally its port number. The dns_server directive may be specified multiple times, each entry adding to a list of available resolving name servers. The ip-addr-port argument can either be an IPv4 or IPv6 address, optionally enclosed in brackets, and optionally followed by a colon and a port number. In absence of a port number a standard port number 53 is assumed. When an IPv6 address is specified along with a port number, the address must be enclosed in brackets to avoid parsing ambiguity regarding a colon separator. A scoped link-local IP address is allowed (assuming underlying modules allow it). Examples : dns_server 127.0.0.1 dns_server 127.0.0.1:53 dns_server [127.0.0.1]:53 dns_server [::1]:53 dns_server fe80::1%lo0 dns_server [fe80::1%lo0]:53 In absence of dns_server directives, the list of name servers is provided by Net::DNS module, which typically obtains the list from /etc/resolv.conf, but this may be platform dependent. Please consult the Net::DNS::Resolver documentation for details. Empty the list of explicitly configured DNS servers through a dns_server directive, falling back to Net::DNS -supplied defaults.. Remove specified ports or ports ranges from the set of allowed port numbers that can be used as local port numbers when sending DNS queries to a resolver. Please see directive dns_local_ports_permit for details. every. Option allows disabling of rules which would result in a DNS query to one of the listed domains. The first argument must be a literal allow or deny value then controls whether a DNS query is allowed to be launched. If no match is found an implicit default is to allow a query. The purpose of an explicit allow entry is to be able to override a previously configured deny The option removes any entries entered by previous 'dns_query_restriction' options, leaving the list empty, i.e. allowing DNS queries for any domain (including any DNS BL zone). Whether to use any machine-learning classifiers with SpamAssassin, such as the default 'BAYES_*' rules. Setting this to 0 will disable use of any and all human-trained classifiers. Whether to use the naive-Bayesian-style classifier built into SpamAssassin. This is a master on/off switch for all Bayes-related operations. Whether to use rules using the naive-Bayesian-style classifier built into SpamAssassin. This allows you to disable the rules while leaving auto and manual learning enabled. plugin module for details on how Bayes auto-learning is implemented by default. for a fine-grained control on individual header fields under the umbrella of a more general keyword header here. Keywords imply the following data sources: The bayes_token_sources directive may appear multiple times, its keywords are interpreted sequentially, adding or removing items from the final set as they appear in their order in bayes_token_sources directive(s). Bayesian classification and autolearning will not be performed on mail from the listed addresses. Program sa-learn will also ignore the listed addresses if it is invoked using the --use-ignores option.esian classification and autolearning will not be performed on mail to the listed addresses. See bayes_ignore_from for details.. Used by BayesStore::SQL storage implementation. If this options is set the BayesStore::SQL module will override the set username with the value given. This could be useful for implementing global or group bayes databases. Should the Bayesian classifier use hapaxes (words/tokens that occur only once) when classifying? This produces significantly better hit-rates. a bayes datastore backend does not implement individual key/value expirations, the setting is silently ignored._limit setting. option for a pre-queue filtering setup is maybe 50 seconds, assuming that clients are willing to wait at least a minute.).. SpamAssassin will attempt to discover the address used in the 'MAIL FROM:' phase of the SMTP transaction that delivered this message, if this data has been made available by the SMTP server. This is used in the EnvelopeFrom pseudo and bug 4747 in the SpamAssassin BugZilla.) To avoid this heuristic failure, the envelope_sender_header setting. details a better proposal, storing the envelope sender at each hop in the Received header.) example: envelope_sender_header X-SA-Exim-Mail-From. Set the MIME Content-Type charset used for the text/plain report which is attached to spam mail messages. Set the report template which is attached to spam mail messages. See the 10_default_prefs what _HOSTNAME_ is replaced with in the above report text. By default, this is determined dynamically as whatever the host running SpamAssassin calls itself. Set the report template which is attached to spam mail messages which contain a non-text/plain part. See the 10_default_prefs.cf configuration file in /usr/share/spamassassin for an example. Each unsafe-report line appends to the existing template, so use clear_unsafe_report_template to restart. Tags can be used in this template (see above for details). Clear the unsafe_report template.})/ If this option is set to 1 and the message contains DKIM headers, the headers will be parsed for URIs to process alongside URIs found in the body with some rules and moduels (ex. URIDNSBL). Define a test. SYMBOLIC_TEST_NAME is a symbolic test name, such as 'FROM_ENDS_IN_NUMS'. header to a header field name will inhibit decoding of quoted-printable or base-64 encoded strings, and will preserve all whitespace inside the header string. The :raw may also be applied to pseudo-headers e.g. ALL:raw will return a pristine (unmodified) header section. Appending a modifier :addr to a header field name will cause everything except the first email address to be removed from the header field. It is mainly applicable to header fields 'From', 'Sender', 'To', 'Cc' along with their 'Resent-*' counterparts, and the 'Return-Path'. Appending a modifier :name to or From:raw:addr is currently the same as From:addr . For example, appending :addr to a header name will result in example@foo in all of the following cases: For example, appending :name to a header name will result in "Foo Blah" (without quotes) in all of the following cases: There are several special pseudo-headers that can be specified: ALLcan be used to mean the text of all the message's headers.. field existence test. header_field_name is the name of a header field to test for existence. Not to be confused with a test for a nonempty header field body, which can be implemented by a header SYMBOLIC_TEST_NAME header =~ /\S/ rule as described above. Define a header eval test. name_of_eval_method is the name of a method on the Mail::SpamAssassin::EvalTests object. arguments are optional arguments to the function call. Check a DNSBL (a DNS blacklist or whitelist). This will retrieve Received: headers from the message, extract the IP addresses, select which ones are 'untrusted' based on the trusted_networks logic, and query that DNSBL zone. There's a few things to note: Duplicated IPs are only queried once and reserved IPs are not queried. Private IPs are those listed in <>, <>, <>, or <> as private.. This is the root zone of the DNSBL. The domain name is considered to be a fully qualified domain name (i.e. not subject to DNS resolver's search or default domain options). No trailing period is needed, and will be removed if specified. This optional argument behaves the same as the sub-test argument in check_rbl_sub() below. This is accomplished by placing '-notfirsthop' at the end of the set name. This is (mail exchange)... By using '-lastexternal' at the end of the set name, you can select only the external host that connected to your internal network, or at least the last external host with a public IP.,. Define a body pattern test. pattern. Multiline expressions will need to be used to match strings that are broken by line breaks. Define a raw-body eval test. See above. Define a full message pattern test. pattern. Define a full message. Used to set flags on a test. Parameter is a space-separated list of flag names or flag name = value pairs. These flags are used in the score-determination back end system for details of the test's behaviour. Please see bayes_auto_learn for more information about tflag interaction with those systems.. The test will explicitly be ignored when calculating the score for learning systems.. The test will be evaluated multiple times, for use with meta rules. Only affects header, body, rawbody, uri, and full tests.. The version_tag will be lowercased, and any non-alphanumeric or period character will be replaced by an underscore. e.g. version_tag myrules1 # version=2.41-myrules1.. This option maintains list of valid TLDs in the RegistryBoundaries code. TLDs include things like com, net, org, etc. This option maintains list of valid 2nd-level TLDs in the RegistryBoundaries code. 2TLDs include things like co.uk, fed.us, etc. This option maintains list of valid 3rd-level TLDs in the RegistryBoundaries code. 3TLDs include things like demon.co.uk, plc.co.im, etc. Empty internal list of valid TLDs (including 2nd and 3rd level) which RegistryBoundaries code uses. Only useful if you want to override the standard lists supplied by sa-update. This is the directory and filename for Bayes databases. Several databases will be created, with this as the base directory and filename, with ). The argument is a string of octal digits, it is converted to a numeric value internally.. Used for BayesStore::SQL storage implementation. This option give the connect string used to connect to the SQL based Bayes storage. Used by BayesStore::SQL storage implementation. This option gives the username used by the above DSN... If you load user scores from an SQL database, this will set the DSN used to connect. Example: search,?saconfig?uid=__USERNAME__ The authorized username to connect to the above DSN. The password for the database username, for the above DSN.: The name of the table where user scores and preferences are stored. Currently hardcoded to userpref, to change this value you need to create a new custom query with the new table name. The current user's username. The portion before the @ as derived from the current user's username. The portion after the @ as derived from the current user's username, this value may be null. The query must be This is the Bind DN used to connect to the LDAP server. It defaults to the empty string (""), allowing anonymous binding to work. Example: cn=master,dc=koehntopp,dc=de This is the password used to connect to the LDAP server. It defaults to the empty string (""). Fall back to global scores and settings if userprefs can't be loaded from SQL or LDAP, instead of passing the message through unprocessed. Load a SpamAssassin plugin module. The PluginModuleName. Same as loadplugin, but silently ignored if the .pm file cannot be found in the filesystem. Ignore any rule which contains a regexp which always matches. Currently only catches regexps which contain '||', or which begin or end with a '|'. Also ignore rules with some combinatorial explosions. Include configuration lines from filename. Relative paths are considered relative to the current configuration file or user preferences file. Used to support conditional interpretation of the configuration file. Lines between this and a corresponding else or endif line will be ignored unless the expression evaluates as true (in the perl sense; that is, defined and non-0 and non-empty string). The conditional accepts a limited subset of perl for security -- just enough to perform basic arithmetic comparisons. The following input is accepted: Namely these characters and ranges: ( ) - + * / _ . , < = > ! ~ 0-9 whitespace This will be replaced with the version number of the currently-running SpamAssassin engine.. ! This is a function call that returns 1 if the plugin named Name::Of::Plugin is loaded, or undef otherwise. This is a function call that returns 1 if the perl package named Name::Of::Package includes a function called function_name, or undef otherwise. Note that packages can be SpamAssassin plugins or built-in classes, there's no difference in this respect. Internally this invokes UNIVERSAL::can. This is a function call that returns 1 if the perl package named Name::Of::Package includes a function called function_name and that function returns a true value when called with no arguments, otherwise undef is returned. Is similar to has, except that it also calls the named function, testing its return value (unlike the perl function UNIVERSAL::can). This makes it possible for a 'feature' function to determine its result value at run time. An alias for if plugin(PluginModuleName). Used to support conditional interpretation of the configuration file. Lines between this and a corresponding endif line, will be ignored unless the conditional expression evaluates as false (in the perl sense; that is, not defined and not 0 and non-empty string). Indicates that the entire file, from this line on, requires a certain version of SpamAssassin to run. If a different (older or newer) version of SpamAssassin tries to read the configuration from this file, it will output a warning instead, and ignore it.NO_ : Only the tokens themselves are listed. For example, preference file entry:.) The token probability, an abbreviated declassification distance (see example), and the token are listed. For example, preference file entry:. Probability, declassification distance, number of times seen in a ham message, number of times seen in a spam message, age and the token are listed.
http://search.cpan.org/~kmcgrail/Mail-SpamAssassin/lib/Mail/SpamAssassin/Conf.pm
CC-MAIN-2016-07
refinedweb
2,925
57.67
This was a busy morning for Jounce. I checked in some changesets that unfortunately break backwards compatibility but address a few highly requested changes. The first was CLS compliance, and that involved refactoring some weirdly named methods. The second was consistent namespaces (had view vs. views, etc.) so that was cleaned up. The final and the focus of this post was the addition of navigation parameters. This was something definitely lacking in the navigation harness for Jounce. In most projects I use direct view model to view model communication to pass setup information. For example, if I want to display an order detail, the order master passes the order detail to the detail view model, then raises the navigation event for the order detail. This, of course, creates coupling between view models and requires a coordination of actions to make one event happen. The addition of parameters changes that. You can now raise a navigation event with a payload, and the payload will be passed into the view model when the view is activated. This not only provides some flexibility around initializing the view model with context, but also enhances the "back stack" experience. If you like, you can make your view models completely stateless and dependent on the parameters passed in. Then, if you implement a back stack as in the previous post, the back stack itself can simply hold the navigation structure. This means a back event can restore the initial payload and the view model can reconstruct the state based on the prior request. The parameters come with a simple set of extension helpers that make it easy to fluently pass values when navigation events are raised. To demonstrate the new functionality, I changed the "Simple Navigation" quick start to pass a GUID payload. Only the green circle has a view model, but this was updated to listen for the payload and update it to a property that is then bound and displayed on the circle. I've been asked why I don't implement the back stack functionality in Jounce directly or use a URI-based navigation system. I don't discount the merits of those systems but I feel a lot of URI-based navigation comes from the memory of the web and trying to get a Silverlight application to behave like a web one, which I don't believe is the right approach. I also don't believe in imposing a navigation paradigm because users may have their own requirements. For example, a back stack sounds simple until you are dealing with nested regions. What if I am three levels deep, initiate a pop-up with a wizard, and "go back"? In this scenario, there are multiple levels of what "back" means, and you may want to handle those differently. This is why I've focused on giving Jounce just the basics: an event to trigger navigation, now a payload to pass, the binding of the view to the view model and a region manager to get the view on the visual tree for you. To add a parameter to a navigation request, you provide a name and pass the value of the parameter, like this: EventAggregator.Publish(view.AsViewNavigationArgs().AddNamedParameter("Guid", Guid.NewGuid())); The "add named parameter" extends the navigation args and returns the same instance, but will use the internal parameters collection to add the requested parameter. Consuming it is just as simple. The ParameterValue extension allows you to extract the parameter to a type and will provide the default if it doesn't exist (so if you wish to take exception to a missing parameter, check for its existence first): var guid = viewParameters.ParameterValue<Guid>("Guid"); The view model used to have a method called _Activate that was passed the tag for a view whenever the view was navigated to. That method is now more appropriately named ActivateView and is passed both the view tag and the parameter dictionary. It's also important to note that the actual dictionary is passed, not a copy. This means the navigation args will stay as long as you keep the reference to the dictionary. This isn't necessarily a bad thing because the object is lightweight, but most of the time you'll simply extract the values and it will go out of scope anyway. Because you have the actual dictionary, it is possible to manipulate the dictionary. I allow this on purpose in case you need to add meta data or other information for historical purposes if you are saving a navigation stack. The latest version of Jounce and the examples for this feature can be downloaded from CodePlex. Hi Jeremy, As you have mentioned " If you like, you can make your view models completely stateless" above, How can you make an existing already opened Viewmodel to release its memory when it is not in scope. Thanks Imthi
http://www.wintellect.com/blogs/jlikness/jounce-part-13-navigation-parameters
CC-MAIN-2014-10
refinedweb
815
50.87
Apache Camel Tutorial Ride the Camel! Learn the basics of Apache Camel and create your first Camel on Spring Boot project with this tutorial. Tags: Apache Camel • Comments Wanting to get started with Apache Camel? Here’s my tutorial on this popular integration framework for Java. I’ve written this Apache Camel tutorial for complete beginners. It introduces the core Camel concepts to you, and shows you how to use Maven to build and run your first ever Camel project, running on Spring Boot. What you’ll learn By the end of this tutorial, you will: Understand what Apache Camel is, and what it can do Create a basic Apache Camel project using Maven See how Camel works with Spring Boot See how logging is used Run your application and test it out This tutorial is for you if: You want to learn Apache Camel You want to know how to create a Camel project You’re just getting started with Red Hat Fuse and want to know how to build Camel routes You’re getting started with Talend ESB and want to know the underlying concepts so that you can understand Mediation routes. You’re a Java developer and you want to level-up your skills with a powerful framework You’re an architect and you want to understand a bit more about what Camel is about You should have a little bit of Java experience, and be comfortable with using the command line. Camel in 4 minutes Let’s start at the top. How about a quick introduction to Apache Camel? I made this 4-minute video, which covers the main concepts. Then, keep on reading to find out more: Introducing Apache Camel So what is Apache Camel and what is it used for? Apache Camel is an integration library for Java. It’s a set of Java APIs that help you integrate and process data between different computer systems. In other words, Camel is like glue between different applications. Camel comes with over 200 components that let you integrate lots of different applications. Camel can integrate anything from web services to reading and writing files on disk. You can even connect Camel with web apps like Twitter, Facebook and Salesforce. You can think of Apache Camel like a plumbing toolkit for Java. Just like real plumbing pipes, Camel takes data from one point, and pipes it to another. Along the way, the data can be changed, transformed, or sent through other pipes. Included in your plumbing toolkit is a range of adaptors that fit all sorts of different apps and software systems. With a full range of tools at your disposal, it’s then up to you how you choose to build the plumbing. Where did the idea for Camel come from? Camel was inspired by the book Enterprise Integration Patterns, which is an academic textbook about integrating software systems. The authors of the book (which is now considered a ‘classic’!) took lots of common integration use cases, distilled them into reusable patterns and documented them. In the book, each pattern is described, and in some cases, there is also some example code. The Camel developers thought it would be a great idea to build a Java framework that represented the ideals of the book. And so Apache Camel borrows heavily from this book.? Camel facts Hopefully you’re beginning to understand what Camel is. Here are some facts about Camel to help you learn more about the project itself: It’s built in Java – this might seem an obvious point, but once you understand this you’ll see that you have the full power of Java at your disposal The entire code is completely open source – check it out at Github - nothing is hiding behind expensive closed-source products. You can contribute to the project and give back to the community. (You don’t have to be a coder to contribute) It’s not just for web services – it’s a general integration framework. This means you can choose to use Camel to build something to do with web services, but you don’t have to. It comes with a huge library of components – if you can think of a system you’d like to interact with, somebody has probably already written a component for it; you can do everything from pushing files to AWS, to sending a tweet. It’s mature – Apache Camel is at the foundation of some commercial integration products, like Red Hat Fuse and Talend ESB. Engineers working at these companies contribute code back into the open source Camel project to make it better for everyone. Common use cases for Camel Almost any time you need to move data from A to B, you can probably use Camel. Any of the following scenarios could be implemented using Camel: Picking up invoices from an FTP server and emailing them to your Accounts department Taking files from a folder and pushing them into Google Drive Taking messages from an ActiveMQ queue and sending them to a web service Making a web service that allows users to retrieve customer details from a database These are just a few examples. With the wide range of components available in Camel, the sky’s the limit. Camel concepts explained How do you think like a Camel? The diagram below shows some of the core concepts in Camel. In this section I’m going to look at each of these in turn: Route The most basic concept in Camel is the route. Routes are objects which you configure in Camel, which move your data from A to B. To use the plumbing example from earlier, a route is a pipe that moves data from one place to another. It moves data between things called endpoints. You can create routes in Camel either using a Java syntax, or using an XML syntax. Here’s a very simple route written in the Java syntax. This moves a file from one folder to another: // This is a complete Camel route definition! // Camel will move files from one folder to another from("file:home/customers/new") .to("file:home/customers/old"); Endpoints In Camel, an endpoint is an interface, through which Camel exchanges a message with another system. Camel can receive a message from an endpoint, or send a message to an endpoint. Endpoints are the steps along the way in your routes. You can declare them in a couple of different ways, but the most common way is to declare them using a syntax that looks like a URI, like this: prefix:mainpart?option1=xxx&option2=xxx... …where prefix is the Component that the endpoint refers to, and mainpart is some bit of configuration that the endpoint needs. For example: at the start of a route, Camel receives a message from an endpoint. If this endpoint is file:/myfolder, then Camel will use the File component to read files in /myfolder. Components To allow Camel to create an endpoint, it comes with a library of components. A component is just like a plug that allows you to connect to an external system, such as a file on disk, a mailbox, or an app like Dropbox or Twitter. You can think of a Component as a factory for creating Endpoints. Whenever you need to put data into or out of an application, you’ll probably find that a Camel component already exists to do the job for you. This means you don’t need to waste time writing your own code to read a file, or invoke a web service. You just find the component you need, and use it. Camel components are reusable, open source, and you can even contribute your own. Here are some of the most common components, and how you might reference them in an endpoint: You can find a list of all the Camel components here. As you can see, each component can usually read and write: A component that is configured to write something is called a producer – for example, writing to a file on disk, or writing to a message queue. A component that is configured to read something is called a consumer – for example, reading a file from disk, or receiving a REST request. Between each endpoint, the data can also be transformed or modified, either by passing the data through another endpoint, or by using an EIP. Enterprise Integration Patterns (EIPs) EIPs are another important part of Camel. They do special processing on messages according to the patterns defined in the book, Enterprise Integration Patterns, that I mentioned earlier. When you want to perform some common activities on a message, such as transformation, splitting and logging, you’ll use an EIP. Here are some common EIPs in Camel: (Yes, from and to are EIPs too!) Camel Context Finally, to run and manage your routes, Camel has a container called the Camel Context. Your routes run inside this engine. You could think of it almost like a mini application server. When Camel starts, it reads your route definitions (in Java or XML), creates the routes, adds them to a Camel Context, and starts the Camel Context. When Camel terminates, it shuts down your routes, and closes the Camel Context. What does a Route look like? So. Now you know that when you develop in Camel, you create routes that move data between endpoints, using components. It’s probably easiest to understand all of this by looking at some code, right? Although Camel is a library for Java, it can be configured using one of two languages - either Java or XML. In Camel-speak, these are known as DSLs (Domain Specific Languages). Each route starts with a from, configured with a URI, that defines the endpoint where the data is coming from. A route can consist of multiple steps – such as transforming the data, or logging it. But a route usually ends with a to step, which describes where the data will be delivered to. A really simple route in Camel’s Java DSL could look something like this: from("file:home/customers/new") .to("file:home/customers/old"); In this example, we use the File component (identified by the file: prefix) to move all incoming files in the customers/new folder, to the customers/old folder. That same route above could be expressed in Camel’s XML DSL like this: <route> <from uri="file:home/customers/new"/> <to uri="file:home/customers/old"/> </route> But… what if we wanted to add another step in our route? Let’s say we want to log a message when we’ve received a file. Then we simply need to add our new step in between the existing steps. Like this: from("file:home/customers/new") .log("Received a new customer!") .to("file:home/customers/old"); In the code above, a message is moved from the new folder to the old folder. In the middle, we use the Enterprise Integration Pattern (EIP) called log, which writes a simple Log message to the console. And in the XML DSL, it would look something like this: <route> <from uri="file:home/customers/new"/> <log message="Received a new customer!"/> <to uri="file:home/customers/old"/> </route> Now you know what a route looks like, let’s quickly look at how data flows through your routes. What does data look like in Camel? Camel treats data as individual messages – like letters being sorted through a post office. Each message is an individual object. A message can be huge, or it can be very small. Camel has an object to represent messages, and helpfully it’s called A Message has a body, where the message content lives. It also has headers, which can be used to hold values associated with the message. The Message object is then passed along a route. A Message is part of another Camel object called an Exchange. You’ll often see the term Exchange mentioned in Camel documentation. An Exchange is simply a message or interaction currently taking place inside your Camel route. The important thing to understand about Camel’s message model is that the message body can contain almost any kind of Java object, such as a List, Map or String. The body doesn’t have to be a String, like JSON or XML. The real power of Camel becomes clear when you start using these different types of objects. Camel has great built-in support for converting between common object types. In fact, for many common file types, you might barely even have to write any conversion code. (Less time writing boilerplate code? Sounds good, doesn’t it?) You’ll learn more about Camel’s message model as you get more experienced with Camel! Your first Camel project In this part of the tutorial, I’m going to show you how to create a new Apache Camel project using Maven, even if you’ve never worked with Camel before. By the end of this section, you will have already created your first project, run it, and begun to understand the power of Camel. We’re going to do this using a Maven archetype. Maven archetypes are like templates for new Java projects. Camel provides quite a few of them with each release. This make it easy for you to start new projects. For this tutorial, you will need: Java Development Kit (JDK) - …that’s it! Creating a Camel project using Maven From your desktop, drop to a Terminal or Command Prompt. Type this command (all on one line): mvn archetype:generate -DarchetypeGroupId=org.apache.camel.archetypes -DarchetypeArtifactId=camel-archetype-spring-boot -DarchetypeVersion=3.4.0 Then answer the questions when prompted: Define value for property ‘groupId’: com.example Define value for property ‘artifactId’: my-camel-app Define value for property ‘version’ 1.0-SNAPSHOT: (type Enter) Define value for property ‘package’ com.example: (type Enter) Finally, you’ll be prompted to confirm, type Yand press Enter. Maven will now create your new Camel project. When it’s finished, you will find it inside the new directory my-camel-app! Looking inside the project A Camel project created from the camel-archetype-spring-boot archetype (v3.4.0) will have a folder structure that looks like this: my-camel-app ├── pom.xml └── src ├── main │ ├── java │ │ └── com │ │ └── example │ │ ├── MySpringBean.java │ │ ├── MySpringBootApplication.java │ │ └── MySpringBootRouter.java │ └── resources │ ├── application.properties │ └── META-INF │ ├── LICENSE.txt │ └── NOTICE.txt └── test ├── java │ └── com │ └── example └── resources The RouteBuilder class The interesting code is in MySpringBootRouter.java. This is a RouteBuilder class, and this is where you define your Camel routes. The Maven archetype includes a sample route to get you started: package com.example; import org.apache.camel.builder.RouteBuilder; import org.springframework.stereotype.Component; @Component public class MySpringBootRouter extends RouteBuilder { @Override public void configure() { from("timer:hello?period=").routeId("hello") .transform().method("myBean", "saySomething") .filter(simple("${body} contains 'foo'")) .to("log:foo") .end() .to("stream:out"); } } Here, you add route definitions to the configure() method that describe each route you want Camel to create. If you look at the code, you’ll see that the MyRouteBuilder class comes with a route defined inside it already. We’ll look at the route shortly. The utility class The Camel route depends on another class. In the Camel route, references a bean (a Java object) using the identifier "myBean". This is actually resolved by looking in the Spring context for any beans with the ID myBean. Which means it actually means this class, MySpringBean: @Component("myBean") public class MySpringBean { @Value("${greeting}") private String say; public String saySomething() { return say; } } This utility class is included to show you how you can invoke Java code from a Camel route. The class has a method saySomething(), which the Camel route calls. We’ll see this shortly. The bootstrap class For your convenience, the project also includes another Java class, MySpringBootApplication, which is used to bootstrap and run the application. This is a standard Spring Boot main class: package com.example; import org.springframework.boot.SpringApplication; import org.springframework.boot.autoconfigure.SpringBootApplication; @SpringBootApplication public class MySpringBootApplication { /** * A main method to start this application. */ public static void main(String[] args) { SpringApplication.run(MySpringBootApplication.class, args); } } Now let’s look at the code and see what this project does. What does the project do? The demo project defines a route using the code below. The code is given in a special Camel syntax, or DSL (Domain-specific Language): from("timer:hello?period=").routeId("hello") .transform().method("myBean", "saySomething") .filter(simple("${body} contains 'foo'")) .to("log:foo") .end() .to("stream:out"); This code looks complicated, but it really just generates messages and prints them. Let’s look at each part of the route in detail: It uses a timer ( timer:...) to kick off the route. Camel’s Timer component can be used to fire a route at certain interval. Here, the interval is timer.period, which is a property defined in the file application.properties: from("timer:hello?period=") This shows how you can use Spring Boot properties in Camel routes. The transform()EIP states that we want to change the content of the Message. In this example, we use the bean()method, which invokes a method on a Java bean (a Java class). - Camel looks for a bean in the registry named myBean. Because we’re using Spring Boot, it searches the Spring context for the bean, and it finds it, because the MySpringBeanclass is annotated with @Component("myBean"). - Camel invokes the method saySomethingon that bean. .transform().method("myBean", "saySomething") The filter()EIP tells Camel to filter the message, based on some expression. In this case, we use Camel’s simple expression language to check whether the message Body contains “foo”. If so, we dump the current exchange to the log. .filter(simple("${body} contains 'foo'")) .to("log:foo") .end() Finally, the content of the message body is written to the output stream (that is, standard out or STDOUT): .to("stream:out") Now let’s run the route and see what happens. Running the Camel application Let’s run the application. We’ll run it with Maven. From your Terminal or Command Prompt, run Maven with the spring-boot:run goal: mvn clean spring-boot:run This will compile your application and use the Spring Boot Maven Plugin to run your application. When the application starts, you’ll see the logs will look something like this: The logs above tell us that Apache Camel started correctly. Then, every few seconds, you should see the text Hello World in the logs. This is because Camel is triggering the route to be executed every few seconds. When the route executes, the message body is transformed (set to Hello world), and then written to the standard output stream, or console. To end the app you can just press Ctrl+C. What next? This is a very basic demo of Camel, but you can start to see what it’s capable of. Using components and EIPs you can build almost any kind of data flow that you can think of. Now check out my other articles to help you learn Camel: Learn how to create a REST service in Apache Camel when you want to create your own REST API, using Camel’s REST DSL Learn how to use ActiveMQ with Apache Camel for reading and writing to a JMS message broker Learn about Camel’s content-based routing to choose how to process messages based on their content And now, it’s over to you. What do you want to learn how to do in Camel? Questions about this tutorial? Feedback? Share your thoughts and your Camel plans in the comments below! What do you think? You can use Markdown in your comment. To write code, indent each line with 4 spaces.
https://tomd.xyz/camel-tutorial/
CC-MAIN-2021-49
refinedweb
3,306
72.56
Maths › Approximation › Regression › Forsythe Approximates an arbitrary function using Forsythe orthogonal polynomials.Controller: CodeCogs Interface C++ Excel Class ForsytheThis class approximates an arbitrary function by least squares fitting using Forsythe orthogonal polynomials. It uses a generalization of the three-term relation by G. Forsythe (1957), generating recursively a system of orthonormal polynomials over arbitrary sets of data points. Below you will find the regression graph for a set of points obtained by evaluating the function References: - Jean-Pierre Moreau's Home Page, - F.R. Ruckdeschel, "BASIC Scientific Subroutines", Vol. II, BYTE/McGRAWW-HILL, 1981 Example 1 - The following example displays 10 approximated values (you may change this amount through the N_out variable) for the given function with abscissas equally spaced in the interval. The X and Y coordinate arrays are initialized by evaluating this function for N = 12 points equally spaced in the domain from π to 5 π . #include <codecogs/maths/regression/forsythe.h> #include <cmath> #include <iostream> #include <iomanip> using namespace std; #define PI 3.1415926535897932384626433832795 #define N 12 int main() { // Declare and initialize two arrays to hold the coordinates of the initial data points double x[N], y[N]; // Generate the points double xx = PI, step = 4 * PI / (N - 1); for (int i = 0; i < N; ++i, xx += step) { x[i] = xx; y[i] = sin(xx) + xx; } // Initialize the regression approximation routine with known data points Maths::Regression::Forsythe A(N, x, y, 11); // = 3.14159 x = 4.18879 y = 3.32358 x = 5.23599 y = 4.36968 x = 6.28319 y = 6.28329 x = 7.33038 y = 8.19637 x = 8.37758 y = 9.24362 x = 9.42478 y = 9.42478 x = 10.472 y = 9.60593 x = 11.5192 y = 10.6532 x = 12.5664 y = 12.5663 Authors - Lucian Bentea (August 2005) Source Code Source code is available when you buy a Commercial licence. Not a member, then Register with CodeCogs. Already a Member, then Login. Members of Forsythe ForsytheInitializes the necessary data for following evaluations of the polynomial. GetValueReturns the approximated ordinate at the given abscissa. Forsythe Once This function implements the Forsythe class for one off calculations, thereby avoid the need to instantiate the Forsythe class yourself. Example 2 - The following graph are constructed by forming a regression of the following values, using a 3rd order orthogonal polynomials x = 1 y = 0.22 x = 2 y = 0.04 x = 3 y = -0.13 x = 4 y = -0.17 x = 5 y = -0.04 x = 6 y = 0.09 x = 7 y = 0.11There is an error with your graph parameters for Forsythe_once with options n=7 x="1 2 3 4 5 6 7" y="0.22 0.04 -0.13 -0.17 -0.04 0.09 0.11" degree=3 a=1:7 .input Error Message:Function Forsythe_once failed. Ensure that: Invalid C++ Parameters Returns - the interpolated y-coordinate that corresponds to a. Source Code Source code is available when you buy a Commercial licence. Not a member, then Register with CodeCogs. Already a Member, then Login.
https://www.codecogs.com/library/maths/approximation/regression/forsythe.php
CC-MAIN-2018-51
refinedweb
506
62.04
A good example of keeping your target base as broad as possible can be seen when handling the back key. Android developer William J. Francis provides more details in this demo. As Android continues to grow in leaps and bounds, sooner or later developers must draw a line in the sand. Just as you would no longer expect to find PC software written for Microsoft Windows 95, so too it is becoming increasingly difficult to purchase applications that run on Android 1.6. At the same time, developers who really understand Android's various SDK levels and the minimum feature set associated with each can often continue to support older devices with no or very little extra work. I know a number of my fellow engineers will disagree with me here, arguing it's foolish to add even an extra five lines of legacy code to a brand new application if you are only going to broaden your target audience by a handful of customers -- customers who haven't bothered to upgrade their devices for the last 24 months. Maybe one day when I have millions of customers yammering for my next app I will feel that way too. For now, if I can keep or gain a handful of customers without impacting or limiting my application base as a whole I tend to make the extra effort. A good example of keeping your target base as broad as possible can be seen when handling the back key. If you are familiar with the Android UI paradigm, you know that in the beginning all Android devices had a "hard" back key. Pressing this key navigated back through the activity stack and potentially exited your application. A common step when writing an Android application is to override this key and perform some other action, often just confirming that yes the user really intended to exit. This override used to be done exclusively by overriding the onKeyDown() function of an activity. Later, as Android matured introducing soft and virtual keys, a specific onBackPressed() function was created as part of the API. So to support handling the back key on versions of Android prior to 2.0, the old method is used, and anything later than 2.0 requires the new API. However, many developers are not aware that by simply suppressing the lint warning, it's quite easy to continue to support both mechanisms. The demo code below just does that. Feel free to follow along, or download and import the entire project directly into Eclipse. 1. Create a new Android project in Eclipse. Set the minimum SDK to 1.6 and the Build SDK to 4.1. (This gives us the broadest possible range of devices.) Rename the startup activity to Main.java and the corresponding layout to main.xml. 2. In the /res/layout folder modify main.xml. For this example we need nothing more than a linear layout and a simple text field. main.xml <LinearLayout xmlns: <TextView android:textColor="#ffffff" android:layout_width="wrap_content" android:layout_height="wrap_content" android: </LinearLayout> 3. Now we will move on to our /src folder and the Main.java class. The onCreate() function associates our layout. The onKeyDown() method takes care of forwarding the back key press for older versions of Android. Finally the onBackPressed() function performs our customer action. Main.java package com.authorwjf.backkeyexample; import android.os.Bundle; import android.view.Gravity; import android.view.KeyEvent; import android.widget.Toast; import android.annotation.SuppressLint; import android.app.Activity; public class Main extends Activity { @Override public void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.main);} @SuppressLint("NewApi") @Overridepublic boolean onKeyDown(int keyCode, KeyEvent event) { if (android.os.Build.VERSION.SDK_INT < android.os.Build.VERSION_CODES.ECLAIR && keyCode == KeyEvent.KEYCODE_BACK && event.getRepeatCount() == 0) { Toast t = Toast.makeText(this, "Android version < 2.0", Toast.LENGTH_SHORT); t.setGravity(Gravity.TOP, 0, 100); t.show(); onBackPressed();return true; } return super.onKeyDown(keyCode, event); } @Override public void onBackPressed() { Toast.makeText(this, "Back Key Captured.", Toast.LENGTH_SHORT).show(); return;At this point we are ready to test the application. Go ahead and launch two Android emulators, one running Cupcake (Figure A) and one running Jelly Bean (Figure B). Load the application to both and mash the back key a few times. Notice the difference? Except for the toast messages, the answer is no. The code behaves the same on all versions of the operating system. Figure A }} Demo running on CupcakeFigure B Demo running on Jelly Bean Keep in mind I'm not advocating you "dumb" your application down to the lowest common denominator. If there is a feature your app needs, and it is only available after certain versions of Android, then break ties with previous releases. At the same time, I suggest that like in this example there will be a number of times where it can and does make sense to look for a broader solution.
https://www.techrepublic.com/blog/software-engineer/a-universal-back-key-override-for-android-sdk/
CC-MAIN-2021-21
refinedweb
820
50.12
Has anyone used Mono, the open source .NET implementation on a large or medium sized project? I'm wondering if it's ready for real world, production environments. Is it stable, fast, compatible, ... enough to use? Does it take a lot of effort to port projects to the Mono runtime, or is it really, really compatible enough to just take of and run already written code for Microsoft's runtime? views:8458 answers:18 Is Mono ready for prime time? In many cases, you can take existing code and just run it on Mono, particularly if you're porting an ASP.NET application. In some cases, you may require whole new sections of code to make it work. If you use System.Windows.Forms, for example, the application won't work unmodified. Likewise if you use any Windows-specific code (registry access code, for example). But I think the worst offender is UI code. That's particularly bad on Macintosh systems. On the desktop side, Mono works great if you commit to using GTK#. The Windows.Forms implementation is still a little buggy (For example, TrayIcon's don't work) but it has come a long way. Besides, GTK# is a better toolkit than windows forms as it is. On the web side, Mono has implemented enough of ASP.NET to run most sites perfectly. The difficulty here is finding a host that has mod_mono installed on apache, or doing it yourself if you have shell access to your host. Either way, Mono is great, and stable. Key things to remember when creating a cross platform program: - Use GTK# instead of Windows.Forms - Ensure to properly case your filenames - Use Path.Separatorinstead of hardcoding "\", also use Enviroment.NewLineinstead of "\n". - Do not use any P/Invoked calls to Win32 API. - Do not use the Windows Registry. It's pretty good for .NET 2.0 features. Many .NET 3.x features are in process now but aren't complete. The easiest way to check for your specific project is to run the Mono Migration Analyzer (MoMA). The benefit is that it will notify the Mono team of issues which will prevent you from using Mono (if any), which lets them prioritize their work. I recently ran MoMA on SubSonic and found only one issue - a weird use of Nullable types. That's a big codebase, so the coverage there was pretty impressive. Mono is in active use in several commercial as well as open source products. It's in use in some large applications, such as Wikipedia and the Mozilla Developer Center, and has been used in embedded applications such as the Sansa MP3 players and in some gaming application (which they're not allowed to discuss publicly). At the language level, the Mono compiler is fully compliant with the C# 3.0 language specification. It really depends on the namespaces and classes that you are using from the .NET framework. I had interest in converting one of my windows services to run on my email server, which is Suse, but we ran into several hard roadblocks with APIs that had not been completely implemented. There is a chart somewhere on the Mono website that lists all of the classes and their level of completion. If your application is covered, then go for it. Like any other application, do prototyping and testing before you make a full commitment, of course. Another problem we ran into is licensed software: if you are referencing someone else's DLL, you can't code your way around incompatibilities that are buried in that assembly. Do you know how good Mono 2.0 preview's support is for Windows Forms 2.0? From the little bit that I've played with it, it seemed relatively complete and almost usable. It just didn't quite look right in some places and is still a little hit or miss overall. It amazed me that it worked as well as it did with some of our forms, though honestly. I would imagine then if you have an application with some 3rd party components you may be stuffed. I doubt a lot of vendors will develop with Mono in mind Example: We've been using it for a project here at work that needed to run on Linux but reuse some .NET libraries that we built in Managed C++. I've been very surprised at how well it has worked out. Our main executable is being written in C# and we can just reference our Managed C++ binaries with no issue. The only difference in the C# code between Windows and Linux is RS232 serial port code. The only big issue I can think of happened about a month ago. The Linux build had a memory leak that wasn't seen on the Windows build. After doing some manual debugging (the basic profilers for Mono on Linux didn't help much), we were able to narrow the issue down to a specific chunk of code. We ended up patching a workaround, but I still need to find some time to go back and figure out what the root cause of the leak was. MoMA is a great tool for this, as someone else suggested. The biggest sources of incompatibility these days are applications which DllImport (or P/Invoke) into Win32 libraries. Some assemblies aren't implemented, but most of them are Windows-only and really wouldn't make sense on Linux. I think it's fairly safe to say that most ASP.NET applications can run on Mono with limited modifications. (Disclosure: I've contributed to Mono itself, as well as written apps that run on top of it.) The recommendations for the accepted answer are a little out of date now. - The windows forms implementation is pretty good now. (See Paint-Mono for a port of Paint.net which is a pretty involved Windows forms application. All that was required was an emulation layer for some of the P-Invoke and unsupported system calls). - Path.Combine as well as Path.Seperator to join paths and filenames. - The windows Registry is OK, as long as you are only using it for storing and retrieving data from your applications (i.e. you can't get any information about Windows from it, since it is basically a registry for Mono applications). I've also wondered this as well. In addition what about ADO.NET providers? I would assume any that aren't fully managed code wouldn't work. Anyone know which ones work and which ones definitely don't? There are a couple of scenarios to consider: (a) if you are porting an existing application and wondering if Mono is good enough for this task; (b) you are starting to write some new code, and you want to know if Mono is mature enough. For the first case, you can use the Mono Migration Analyzer tool (Moma) to evaluate how far your application is from running on Mono. If the evaluation comes back with flying colors, you should start on your testing and QA and get ready to ship. If your evaluation comes back with a report highlighting features that are missing or differ significantly in their semantics in Mono you will have to evaluate whether the code can be adapted, rewritten or in the worst case whether your application can work with reduced functionality. According to our Moma statistics based on user submissions (this is from memory) about 50% of the applications work out of the box, about 25% require about a week worth of work (refactoring, adapting) another 15% require a serious commitment to redo chunks of your code, and the rest is just not worth bothering porting since they are so incredibly tied to Win32. At that point, either you start from zero, or a business decision will drive the effort to make your code portable, but we are talking months worth of work (at least from the reports we have). If you are starting from scratch, the situation is a lot simpler, because you will only be using the APIs that are present in Mono. As long as you stay with the supported stack (which is pretty much .NET 2.0, plus all the core upgrades in 3.5 including LINQ and System.Core, plus any of the Mono cross-platform APIs) you will be fine. Every once in a while you might run into bugs in Mono or limitations, and you might have to work around them, but that is not different than any other system. As for portability: ASP.NET applications are the easier ones to port, as those have little to no dependencies on Win32 and you can even use SQL server or other popular databases (there are plenty of bundled database providers with Mono). Windows.Forms porting is sometimes trickier because developers like to escape the .NET sandbox and P/Invoke their brains out to configure things as useful as the changing the cursor blinking rate expressed as two bezier points encoded in BCD form in a wParam. Or some junk like that. If you want to use WPF you'rr out of luck Mono currently has no plans to implement it. Yes it definitely is (if you're careful though) We support Mono in Ra-Ajax (Ajax library found at) and we're mostly not having problems at all. You need to be careful with some of the "most insane things" from .Net like WSE etc, and also probably quite some few of your existing projects will not be 100% Mono compatible, but new projects if you test them during development will mostly be compatible without problems with Mono. And the gain from supporting Linux etc through using Mono is really cool ;) A large portion of the secret of supporting Mono I think is to use the right tools from the beginning, e.g. ActiveRecord, log4net, ra-ajax etc... For the type of application we're building Mono unfortunately doesn't seem ready for production. We were impressed with it overall, and impressed with its performance both on Windows and on EC2 machines, however, our program crashed consistenly with garbage collection errors on both Windows and linux. The error message is: "fatal errors in GC: too many heap sections", here is a link to someone else experiencing the problem in a slightly different way: The first piece of code we ran in Mono was a simple programming challenge we'd developed... The code loads about 10mb data into some data structures (e.g. HashSets), then runs 10 queries against the data. We ran the queries 100 times in order to time them and get an average. The code crashed around the 55th query on Windows. On linux it worked, but as soon as we moved to a bigger data set, it would crash too. This code is very simple, e.g. put some data into HashSets and then query those HashSets etc, all native c#, nothing unsafe, no API calls. On the Microsoft CLR it never crashes, and runs on huge data sets 1000s times just fine. One of our guys emailed Miguel and included the code that caused the problem, no response yet. :( It also seems like many other people have encountered this problem without solution - one solution has been suggested to recompile Mono with different GC settings but that just appears to increase the threshold before which it crashes. I personally use Mono in a prime-time env. I run mono servers dealing with giga-bytes of udp/tcp data processing related tasks and couldn't be happier. There are peculiarities, and one of the most annoying things is that you can't just "build" your msbuild files due to Mono's current state: - MonoDevelop (the IDE) has some partial msbuild support, but will basically bork on any "REAL" build conf beyond a simple hello-world (custom build tasks, dynamic "properties" like $(SolutionDir), real configuration to name a few dead-ends) - xbuild which SHOULD have been the mono-supplied-msbuild-fully-compatible-build-system is even more horrible, so building from the command line is actually a worse experience than using the GUI, which is a very "unorthodox" state of the union for Linux environments... Once/During getting your stuff actually BUILT, you might see some wildernesses even for code that SHOULD be supported like: - the compiler getting borked on certain constructs - and certain more advanced/new .NET classes throwing un-expected crap at you (XLinq anyone?) - some immature runtime "features" (3GB heap limit ON x64... WTF!) but heaving said that generally speaking things start working very quickly, and solutions/workarounds are abundant. Once you've gone over those initial hurdles, my experience is that mono ROCKS, and keeps getting better with every iteration. I've had servers running with mono, processing 300GB of data per day, with tons of p/invokes and generally speaking doing LOTS of work and staying UP for 5-6 months, even with the "bleeding edge" mono. Hope this helps. No, mono is not ready for serious work. I wrote a few programs on Windows using F# and ran them on Mono. Those program used disk, memory and cpu quite intensively. I saw crashes in mono libraries (managed code), crashes in native code and crashes in the virtual machine. When mono worked the programs were at least two times slower than in .Net in Windows and used much more memory. Stay away from mono for serious work.
http://ansaurus.com/question/18450-is-mono-ready-for-prime-time
CC-MAIN-2020-29
refinedweb
2,251
63.09
This guest article was written by author and consultant Tristan Yates (see his bio below). It emphasizes R’s data object manipulation and scoring capabilities via a detailed financial analysis example. Scoring and ranking systems are extremely valuable management tools. They can be used to predict the future, make decisions, and improve behavior – sometimes all of the above. Think about how the simple grade point average is used to motivate students and make admissions decisions. R is a great tool for building scoring and ranking systems. It’s a programming language designed for analytical applications with statistical capabilities. The capability to store and manipulate data in list and table form is built right into the core language. But there’s also some validity to the criticism that R provides too many choices and not enough guidance. The best solution is to share your work with others, so in this article we show a basic design workflow for one such scoring and ranking system that can be applied to many different types of projects. The Approach For a recent article in Active Trader, we analyzed the risk of different market sectors over time with the objective of building less volatile investment portfolios. Every month, we scored each sector by its risk, using its individual ranking within the overall population, and used these rankings to predict future risk. Here’s the workflow we used, and it can be applied to any scoring and ranking system that must perform over time (which most do): - Load in the historical data for every month and ticker symbol. - Load in the performance data for every month and ticker symbol. - Generate scores and rankings for every month and ticker symbol based upon their relative position in the population on various indicators. - Review the summary and look for trends. In these steps, we used four data frames, as shown below: One of my habits is to prefix my variables – it helps prevent collisions in the R namespace. Some people put all of their data in the same data.frame, but keeping it separate reinforces good work habits. First, the historical data and performance data should never be manipulated, so it makes sense to keep it away from the more volatile scoring data. Second, it helps draw a clear distinction between what we know at one point in time – which is historical data – and what we will know later – which is the performance data. That’s absolutely necessary for the integrity of the scoring system. My.history, my.scores, and my.perf are organized like this: yrmo is the year and month and ticker is the item to be scored. We maintain our own list of dates (in yrmo format) and items in my.dates and my.items. Both these lists are called drivers, as they can help iterate through the data.frame, and we also have a useful data.frame called my.driver which has only the yrmo and ticker. One trick – we keep the order the same for all of these data.frames. That way we can use indexes on one to query another. For example, this works just fine: Vol.spy <- my.history$vol.1[my.score$rank==1] First, we get our driver lists and my.driver data.frame set up. We select our date range and items from our population, and then build a data.frame using the rbind command. #this is based on previous analysis my.dates <- m2$yrmo[13:(length(m2$yrmo)-3)] my.items <- ticker.list[2:10] #now the driver my.driver <- data.frame() for (z.date in my.dates) { my.driver <- rbind(my.driver,data.frame(ticker=my.items,yrmo=z.date)) } Next, let’s get our historical and performance data. We can make a function that can be called once for each row in my.driver that then loads any data needed. my.seq <- 1:length(my.driver[,1]) my.history <- data.frame(ticker=my.driver$ticker,yrmo=my.driver$yrmo, vol.1=sapply(my.seq,calc.sd.fn,-1,-1)) Each variable can be loaded by a function called with the sapply command. The calc.sd.fn function first looks up the ticker and yrmo from my.driver using the index provided, and then returns the data. You would have one function for each indicator that you want to load. My.perf, which holds the performance data, is built in the exact same way. The rbind command is slow unfortunately, but loading the historical and performance data only needs to be done once. Scoring The Data This is where R really shines. Let’s look at the highest level first. my.scores <- data.frame() for (z.yrmo in my.dates) { my.scores <- rbind(my.scores,calc.scores.fn(z.yrmo)) } my.scores$p.tot <- (my.scores$p.vol.1) Every indicator gets its own score, and then that can be combined in any conceivable way to create total score. In this very simple case, we’re only scoring one indicator, so we just use that score as the total score. For more complex applications, the ideal strategy is to use multiple indicators from multiple data sources to tell the same story. Ignore those who advocate reducing variables and cross-correlations. Instead, think like a doctor that wants to run just one more test and get that independent confirmation. Now the calc functions: scaled.score.fn <- function(z.raw) {pnorm(z.raw,mean(z.raw),sd(z.raw))*100} scaled.rank.fn <- function(z.raw) {rank(z.raw)} calc.scores.fn <- function(z.yrmo) { z.df <- my.history[my.history$yrmo==z.yrmo,] z.scores <- data.frame(ticker=z.df$ticker,yrmo=z.df$yrmo, p.vol.1=scaled.score.fn(z.df$vol.1),r.vol.1=scaled.rank.fn(z.df$vol.1)) z.scores } The calc.scores.fn function queries the data.frame to pull the population data for just a single point in time. Then, each indicator is passed to the scaled.score.fn and scaled.rank.fn function, returning a list of scores and ranks. Here, we use the pnorm function to calculate a statistical Z-score, which is a good practice for ensuring that a scoring system isn’t dominated by a single indicator. Checking the Scores At this point, we create a new data.frame for summary analysis. We use the always useful and always confusing aggregate function and combine by rank. Notice how we easily we can combine data from my.history, my.scores and my.perf. data.frame(rank=1:9,p.tot=aggregate(my.scores$p.tot, list(rank=my.scores$r.vol.1),mean)$x,ret.1=aggregate(my.perf$ret.1, list(rank=my.scores$r.vol.1),mean)$x,sd.1=aggregate(my.perf$ret.1, list(rank=my.scores$r.vol.1),sd)$x,vol.1=aggregate(my.history$vol.1, list(rank=my.scores$r.vol.1),mean)$x,vol.p1=aggregate(my.history$vol.1, list(rank=my.scores$r.vol.1),mean)$x) Here’s the result. We could check plots or correlations, but the trend – higher relative volatility in the past (vol.p1, p.tot) is more likely to mean higher relative volatility in the future (vol.1, sd.1) - is crystal clear. In the case of our analysis, the scores aren’t really necessary – we’re only ranking nine items every month. If we did have a larger population, we could use code like this to create subgroups (six groups shown here), and then use the above aggregate function with the new my.scores$group variable. my.scores$group <- cut(my.scores$p.tot, breaks=quantile(my.scores$p.tot,(0:6)/6),include.lowest=TRUE,labels=1:6) Wrap-up We ultimately only ended up scoring one variable, but it’s pretty easy to see how this framework could be expanded to dozens or more. Even so, it’s an easy system to describe – we grade each item by its ranking within the population. People don’t trust scoring systems that can’t be easily explained, and with good reason. There’s not a lot of code here, and that’s a testimony to R’s capabilities. A lot of housekeeping work is done for you, and the list operations eliminate confusing nested loops. It can be a real luxury to program in R after dealing with some other “higher level” language. We hope you find this useful and encourage you to share your own solutions as well. Tristan Yates is the Executive Director of Yates Management, a management and analytical consulting firm serving financial and military clients. He is also the author of Enhanced Indexing Strategies and his writing and research have appeared in publications including the Wall Street Journal and Forbes/Investopedia. The post Building Scoring and Ranking Systems in R appeared first on Programming...
http://www.r-bloggers.com/building-scoring-and-ranking-systems-in-r-2/
CC-MAIN-2016-07
refinedweb
1,479
57.98
#include <time.h> Like nanosleep(2), clock_nanosleep() allows the calling thread: The clock_id argument specifies the clock against which the sleep interval is to be measured. This argument can have one of the following. In addition, the CPU clock IDs returned by clock_getcpuclockid(3) and pthread_getcpuclockid(3) can also be passed in clock_id.. On successfully sleeping for the requested interval, clock_nanosleep() returns 0. If the call is interrupted by a signal handler or encounters an error, then it returns one of the positive error number listed in ERRORS. request or remain specified an invalid address. The sleep was interrupted by a signal handler; see signal(7). The value in the tv_nsec field was not in the range 0 to 999999999 or tv_sec was negative. clock_id was invalid. ( CLOCK_THREAD_CPUTIME_ID is not a permitted value for clock_id.) The clock_nanosleep() system call first appeared in Linux 2.6. Support is available in glibc since version 2.1. If the interval specified in request is not an exact multiple of the granularity underlying clock (see time(7)), then the interval will be rounded up to the next multiple. Furthermore, after the sleep completes,(). clock_getres(2), nanosleep(2), restart_syscall(2), timer_create(2), sleep(3), usleep(3), time(7)
http://manpages.courier-mta.org/htmlman2/clock_nanosleep.2.html
CC-MAIN-2017-17
refinedweb
203
58.79
This article explains the step by step procedure of how to use a .NET Assembly with COM Client. Step 1: Creating a .NET Assembly Project1.1 Visual Studio .NET IDE -> File -> New Project -> Visual Basic Projects -> Class Library1.2 Name the Application, for instance NetServer, this willbe our .NET Assembly Project,which will be consisting of at least one class called Class1.vb.1.3 Rename the class to NetClass from properties window and manuallyin code window.This class will hold all the functionality of .NET Component,in the form of few functions. Step 2: Adding FunctionalityOn the path of achieving COM Interoperability, Microsoft .NEToffers an attribute named ,which islocated inside the Micrsoft.VisualBasic namespaceand it makes the .NET Class available for use by a COM Client.It’s also a wise choice to add System.Runtime.InteropService namespace to the class, which offers various features to be used.The figure below shows the whole Code of .NET Assembly. Step 3: Set Property for COM InteroperabilitySelect NETServer project from Solution Explorer, Right Click ->Properties -> Configuration Properties -> Build -> Check on Register for COM Interop After setting the property, do Build The Solution. It will createa NetServer.dll (assembly) in your applications \bin folder. Step 4: Deploying for COM accessA .NET assembly which has been created can’t be used by a COM Client,because COM Client can access an object with help of a Type Library,which tells to the Client about the Object.In .NET world there is no such concept of Type LIbrary, but because of COM Interop feature, .NET Framework SDK offers a tool calledRegAsm.Exe which offers to make a type library and register it in Windows Registry, the very own style of COM.4.1 Access Command Prompt (cmd)4.2 Change the path to your application folderfor example : C:\>D: press enterD:\> cd Net Applications\NetServer\Bin D:\Net Applications\NetServer\Bin> 4.3 Type the following command to create a Type Library,which is a COM world’s buzz word and equivalentto Metadata of a .NET Assembly.D:\Net Applications\NetServer\Bin> RegAsm /tlb: NetServer.tlb NetServer.dll This command will create a Type Library named NetServer.tlbin the \bin folder of .NET Assembly application. Which wasautomatically registered in Windows Registry as well.Now the .NET Assembly is ready to use by a COM Client.Step 5: VB 6.0 Client to access .NET Assembly5.1 Open Visual Studio 6.0 -> Visual Basic 6.0 ->File -> New -> Standard.Exe 5.2 Drag one Label and two Command Buttons onto the form. Step 6: Set Reference to the Type Library Before consuming the class you build using .NETProject -> References -> Find the NetServer and select that. Step 7: Code to access the .NET Class after adding the code, run your VB 6.0 and click on the command buttons, you will see that your application communicating with .NET.
http://www.codeproject.com/Articles/11179/Using-NET-Assembly-with-COM-Client?fid=203934&df=90&mpp=50&noise=1&prof=True&sort=Position&view=None&spc=Relaxed
CC-MAIN-2015-06
refinedweb
482
61.93
- NAME - SYNOPSIS - DESCRIPTION - ENVIRONMENT - SUPPORT - LICENSE - SEE ALSO NAME Tkx - Yet another Tk interface SYNOPSIS use Tkx; my $mw = Tkx::widget->new("."); $mw->new_button( -text => "Hello, world", -command => sub { $mw->g_destroy; }, )->g_pack; Tkx::MainLoop(); DESCRIPTION. This is the "reference manual" for Tkx. For a gentle introduction please read the Tkx::Tutorial. The tutorial at is also strongly recommended. Functions The following functions are provided: - Tkx::AUTOLOAD( @args ) All calls into the Tkx::namespace not explicitly listed here are trapped by Perl's AUTOLOAD mechanism and turned into a call of the corresponding Tcl or Tk command. The Tcl string result is returned as a single value in both scalar and list context. Tcl errors are propagated as Perl exceptions. For example: $res = Tkx::expr("3 + 3") This will call the Tcl command exprpassing it the argument "3 + 3"and return the result back to Perl. The value of $resafter this call should be 6. The exact rules for mapping functions names into the Tcl name space and the details of passing arguments to Tcl is described in "Calling Tcl and Tk Commands" below. Don't call Tkx::AUTOLOAD() directly yourself. The available Tcl commands are documented at. The available Tk commands are documented at. - Tkx::Ev( $field, ... ) This creates an object that if set up as the first argument to a callback will expand the corresponding Tcl template substitutions in the context of that callback. "Callbacks to Perl" below explain how callback arguments are provided. The $field should be a string like "%A" or "%x". The available substitutions are described in the Tcl documentation for the bindcommand; see. - Tkx::MainLoop( ) This will enter the Tk mainloop and start processing events. The function returns when the main window has been destroyed. There is no return value. - Tkx::SplitList( $list ) This will split up a Tcl list into a Perl list. The individual elements of the list are returned as separate elements. This function will croak if the argument is not a well formed list or if called in scalar context. Example: my @list = Tkx::SplitList("a {b c}"); # @list is now ("a", "b c") This function is needed because direct calls Tcl don't expand lists even if called in list context, so if you want to process the elements returned as a Tcl list you need to wrap the call in a call to SplitList: for my $file (Tkx::SplitList(Tkx::glob('*.pm'))) { # ... } Since Perl also have a built in glob function there is no need to actually let Tcl do the globbing for you. The example above is purely educational. The Tkx::list() function would invoke the Tcl command that does the reverse operation -- creating a list from the arguments passed in. You seldom need to call Tkx::list() explicitly as arrays are automatically converted to Tcl lists when passed as arguments to Tcl commands. All these functions, even the autoloaded ones, can be exported by Tkx if you grow tired of typing the Tkx:: prefix. Example: use strict; use Tkx qw(MainLoop button pack destroy); pack(button(".b", -text => "Press me!", -command => [\&destroy, "."])); MainLoop; No functions are exported by default. Calling Tcl and Tk Commands Tcl and Tk commands are easily invoked by calling the corresponding function in the Tkx:: namespace. Calling the function Tkx::expr() will invoke the expr command on the Tcl side. Function names containing underlines are a bit special. The name passed from the Perl side undergo the following substitutions: foo_bar --> "foo", "bar" # break into words foo__bar --> "foo::bar" # access Tcl namespaces foo___bar --> "foo_bar" # when you actually need a '_' This allow us conveniently to map the Tcl namespace to Perl. If this mapping does not suit you, an alternative is to use Tkx::i::call($cmd, @args). This will invoke the command named by $cmd with no name substitutions or magic. Examples: Tkx::expr("3 + 3"); Tkx::package_require("BWidget"); Tkx::DynamicHelp__add(".", -text => "Hi there"); if (Tkx::tk_windowingsystem() eq "x11") { ... } if (Tkx::tk___messageBox( ... ) eq "yes") { ... } One part of the Tcl namespace that is not conveniently mapped to Perl using the rules above are commands that use "." as part of their name, mostly Tk widget instances. If you insist you can invoke these by quoting the Perl function name &{"Tkx::._configure"}(-background => "black"); or by invoking this as Tkx::i::call(".", "configure", "-background", "black"); but the real solution is to use Tkx::widget objects to wrap these as described in "Widget handles" below. Passing arguments The arguments passed to Tcl can be plain scalars, array references, code references, scalar references, or hash references. Plain scalars (strings and numbers) as just passed on unchanged to Tcl. Array references, where the first element is not a code reference, are converted into Tcl lists and passed on. The arrays can contain strings, numbers, and/or array references to form nested lists. Code references, and arrays where the first element is a code reference, are converted into special Tcl command names in the "::perl" Tcl namespace that will call back into the corresponding Perl function when invoked from Tcl. See "Callbacks to Perl" for a description how how this is used. Scalar references are converted into special Tcl variables in the "::perl" Tcl namespace that is tied to the corresponding variable on the Perl side. Any changes to the variable on the Perl side will be reflected in the value on the Tcl side. Any changes to the variable on the Tcl side will be reflected in the value on the Perl side. Hash references are converted into special Tcl array variables in the "::perl" Tcl namespace that is tied to the corresponding hash on the Perl side. Any changes to the hash on the Perl side will be reflected in the array on the Tcl side. Any changes to the array on the Tcl side will be reflected in the hash on the Perl side. Anything else will just be converted to strings using the Perl rules for stringification and passed on to Tcl. Tracing If the boolean variable $Tkx::TRACE is set to a true value, then a trace of all commands passed to Tcl will be printed on STDERR. This variable is initialized from the PERL_TKX_TRACE environment variable. The trace is useful for debugging and if you need to report errors to the Tcl/Tk maintainers in terms of Tcl statements. The trace lines are prefixed with: Tkx-$seq-$ts-$file-$line: where $seq is a sequence number, $ts is a timestamp in seconds since the first command was issued, and $file and $line indicate on which source line this call was triggered. Callbacks to Perl For Tcl APIs that require callbacks you can provide a reference to a Perl subroutine: Tkx::after(3000, sub { print "Hi" }); $button = $w->new_button( -text => 'Press Me', -command => \&foo, ); Alternately, you can provide an array reference containing a subroutine reference and a list of values to be passed back to the subroutine as arguments when it is invoked: Tkx::button(".b", -command => [\&Tkx::destroy, "."]); $button = $w->new_button( -text => 'Press Me', -command => [\&foo, 42], ); When using the array reference syntax, if the second element of the array (i.e. the first argument to the callback) is a Tkx::Ev() object the templates it contains will be expanded at the time of the callback. Tkx::bind(".", "<Key>", [ sub { print "$_[0]\n"; }, Tkx::Ev("%A") ]); $entry->configure(-validatecommand => [ \&check, Tkx::Ev('%P'), $entry, ]); The order of the arguments to the Perl callback code is as follows: The expanded results from Tkx::Ev(), if used. Any arguments that the command/function is called with from the Tcl side. For example, in callbacks to scrollbars Tcl provides values corresponding to the visible portion of a scrollable widget. Tcl arguments are passed regardless of the syntax used when specifying the callback. Any extra values provided when the callback defined; the values passed after the Tkx::Ev() object in the array. Widget handles The class Tkx::widget is used to wrap Tk widget paths. These objects stringify as the path they wrap. The following methods are provided: - $w = Tkx::widget->new( $path ) This constructs a new widget handle for a given path. It is not a problem to have multiple handle objects to the same path or to create handles for paths that do not yet exist. - $w->_data Returns a hash that can be used to keep instance specific data. This is useful for holding instance data for megawidgets. The data is attached to the underlying widget, so if you create another handle to the same widget it will return the same hash via its _data() method. The data hash is automatically destroyed when the corresponding widget is destroyed. - $w->_parent Returns a handle for the parent widget. Returns undefif there is no parent, which will only happen if $w is ".", the main window. - $w->_kid( $name ) Returns a handle for a kid widget with the given name. The $name can contain dots to access grandkids. There is no check that a kid with the given name actually exists; which can be taken advantage of to construct names of Tk widgets to be created later. - $w->_kids Returns all existing kids as widget objects. - $w->_class( $class ) Sets the widget handle class for the current path. This will both change the class of the current handle and make sure later handles created for the path belong to the given class. The class should normally be a subclass of Tkx::widget. Overriding the class for a path is useful for implementing megawidgets. Kids of $w are not affected by this, unless the class overrides the _nclassmethod. - $w->_nclass This returns the default widget handle class that will be used for kids and parent. Subclasses might want to override this method. The default implementation always returns Tkx::widget. - $w->_mpath( $method ) This method determine the Tk widget path that will be invoked for m_foo method calls. The argument passed in is the method name without the m_prefix. Megawidget classes might want to override this method. The default implementation always returns $w. - $new_w = $w->new_foo( @args ) This creates a new foo widget as a child of the current widget. It will call the foo Tcl command and pass it a new unique subpath of the current path. The handle to the new widget is returned. Any double underscores in the name foo is expanded as described in "Calling Tcl and Tk Commands" above. Example: $w->new_label(-text => "Hello", -relief => "sunken"); The name selected for the child will be the first letter of the widget type; for the example above "l". If that name is not unique a number is appended to ensure uniqueness among the children. If a -nameargument is passed it is used as the name and then removed from the arglist passed on to Tcl. Example: $w->new_iwidgets__calendar(-name => "cal"); If a megawidget implementation class has be registered for foo, then its _Populatemethod is called instead of passing widget creation to Tcl. - $w->m_foo( @args ) This will invoke the foo subcommand for the current widget. This is the same as: $func = "Tkx::$w"; &$func(expand("foo"), @args); where the expand() function expands underscores as described in "Calling Tcl and Tk Commands" above. Example: $w->m_configure(-background => "red"); Subclasses might override the _mpath() method to have m_foo forward the subcommand somewhere else than the current widget. - $w->g_foo( @args ) This will invoke the foo Tcl command with the current widget as first argument. This is the same as: $func = "Tkx::foo"; &$func($w, @args); Any underscores in the name foo are expanded as described in "Calling Tcl and Tk Commands" above. Example: $w->g_pack_forget; - $w->foo( @args ) If the method does not start with "new_" or have a prefix of the form /^_/ or /^[a-zA-Z]_/, the call will just forward to the method "m_foo" (described above). This is just a convenience for people that have grown tired of the "m_" prefix. The method names with prefix /^_/ and /^[a-zA-Z]_/ are reserved for future extensions to this API. - Tkx::widget->_Mega( $widget, $class ) This register $class as the one implementing $widget widgets. See "Megawidgets". Subclassing Tk widgets You can't subclass a Tk widget in Perl, but you can emulate it by creating a megawidget. Megawidgets Megawidgets can be implemented in Perl and used by Tkx. To declare a megawidget make a Perl class like this one: package Foo; use base 'Tkx::widget'; Foo->_Mega("foo"); sub _Populate { my($class, $widget, $path, %opt) = @_; ... } The megawidget class should inherit from Tkx::widget and will register itself by calling the _Mega() class method. In the example above we tell Tkx that any "foo" widgets should be handled by the Perl class "Foo" instead of Tcl. When a new "foo" widget is instantiated with: $w->new_foo(-text => "Hi", -foo => 1); then the _Populate() class method of Foo is called. It will be passed the widget type to create, the full path to use as widget name and any options passed in. The widget name is passed in so that a single Perl class can implement multiple widget types. The _Populate() class should create a root object with the given $path as name and populate it with the internal widgets. Normally the root object will be forced to belong to the implementation class so that it can trap various method calls on it. By using the _class() method to set the class _Populate() can ensure that new handles to this megawidget also use this class. To make Tk aware of your megawidget you must register it by providing a -class argument when creating the root widget. Doing this sets the value returned by the $w->g_winfo_class method. It also makes it possible for your megawidget to have to have class-specific bindings and be configurable via Xdefaults and the options database. By convention class names start with a capital letter, so Tkx megawidgets should have names like "Tkx_Foo". If you don't register your megawidget with Tk, g_winfo_class will return the class of whatever you use as a root widget and your megawidget will be subject to the bindings for that class. Of the standard Tk widgets only frames support -class which means that (practically speaking) Tkx megawidgets must use a frame as the root widget. The ttk widgets do support -class, so you may be able to dispense with the frame if your megawidget is really just subclassing one of them. The implementation class can (and probably should) define an _mpath() method to delegate any m_foo method calls to one of its subwidgets. It might want to override the m_configure() and m_cget() methods if it implements additional options or wants more control over delegation. The class Tkx::MegaConfig provide implementations of m_configure() and m_cget() that can be useful for controlling delegation of configuration options. Public methods defined by a megawidget should have an "m_" prefix. This serves two purposes: It makes them behave the same as native widget methods. That is, they may be called either with or without the "m_" prefix as the user of the widget prefers. It enables the megawidget to accept method delegation from another widget via the parent widget's _mpath() method. See Tkx::LabEntry for a trivial example megawidget. ENVIRONMENT The PERL_TKX_TRACE environment variable initialize the $Tkx::TRACE setting. The PERL_TCL_DL_PATH environment variable can be set to override the Tcl/Tk used. SUPPORT If you have questions about this code or want to report bugs send a message to the <tcltk@perl.org> mailing list. To subscribe to this list send an empty message to <tcltk-subscribe@perl.org>. LICENSE This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself. SEE ALSO Tkx::Tutorial, Tkx::MegaConfig, Tcl At you find a very nice Tk tutorial that uses Tkx for the Perl examples. More information about Tcl/Tk can be found at. Tk documentation is also available at. The official source repository for Tkx is. Alternative Tk bindings for Perl are described in Tcl::Tk and Tk. ActivePerl bundles a Tcl interpreter and a selection of Tk widgets from ActiveTcl in order to provide a functional Tkx module out-of-box. Tcl::tkkit documents the version of Tcl/Tk you get and whats available in addition to the core commands. You need to set the PERL_TCL_DL_PATH environment variable to make Tkx reference other Tcl installations.
https://metacpan.org/pod/Tkx
CC-MAIN-2019-18
refinedweb
2,736
63.09
With the understanding of Scala basics you gained in previous chapters, you're ready to see how to design more full-featured classes in Scala. The emphasis in this chapter is on classes that define functional objects, that is, objects that do not have any mutable state. As a running example, we'll create several variants of a class that models rational numbers as immutable objects. Along the way, we'll show you more aspects of object-oriented programming in Scala: class parameters and constructors, methods and operators, private members, overriding, checking preconditions, overloading, and self references. A rational number is a number that can be expressed as a ratio n/d, where n and d are integers, except that d cannot be zero. n is called the numerator and d the denominator. Examples of rational numbers are 1/2, 2/3, 112/239, and 2/1. Compared to floating-point numbers, rational numbers have the advantage that fractions are represented exactly, without rounding or approximation. The class we'll design in this chapter must model the behavior of rational numbers, including allowing them to be added, subtracted, multiplied, and divided. To add two rationals, you must first obtain a common denominator, then add the two numerators. For example, to add 1/2 + 2/3, you multiply both parts of the left operand by 3 and both parts of the right operand by 2, which gives you 3/6 + 4/6. Adding the two numerators yields the result, 7/6. To multiply two rational numbers, you can simply multiply their numerators and multiply their denominators. Thus, 1/2 * 2/5 gives 2/10, which can be represented more compactly in its "normalized" form as 1/5. You divide by swapping the numerator and denominator of the right operand and then multiplying. For instance 1/2 / 3/5 is the same as 1/2 * 5/3, or 5/6. One, maybe rather trivial, observation is that in mathematics, rational numbers do not have mutable state. You can add one rational number to another, but the result will be a new rational number. The original numbers will not have "changed." The immutable Rational class we'll design in this chapter will have the same property. Each rational number will be represented by one Rational object. When you add two Rational objects, you'll create a new Rational object to hold the sum. This chapter will give you a glimpse of some of the ways Scala enables you to write libraries that feel like native language support. For example, at the end of this chapter you'll be able to do this with class Rational: scala> val oneHalf = new Rational(1, 2) oneHalf: Rational = 1/2 scala> val twoThirds = new Rational(2, 3) twoThirds: Rational = 2/3 scala> (oneHalf / 7) + (1 - twoThirds) res0: Rational = 17/42 A good place to start designing class Rational is to consider how client programmers will create a new Rational object. Given we've decided to make Rational objects immutable, we'll require that clients provide all data needed by an instance (in this case, a numerator and a denominator) when they construct the instance. Thus, we will start the design with this: class Rational(n: Int, d: Int)One of the first things to note about this line of code is that if a class doesn't have a body, you don't need to specify empty curly braces (though you could, of course, if you wanted to). The identifiers n and d in the parentheses after the class name, Rational, are called class parameters. The Scala compiler will gather up these two class parameters and create a primary constructor that takes the same two parameters. Immutable objects offer several advantages over mutable objects, and one potential disadvantage. First, immutable objects are often easier to reason about than mutable ones, because they do not have complex state spaces that change over time. Second, you can pass immutable objects around quite freely, whereas you may need to make defensive copies of mutable objects before passing them to other code. Third, there is no way for two threads concurrently accessing an immutable to corrupt its state once it has been properly constructed, because no thread can change the state of an immutable. Fourth, immutable objects make safe hashtable keys. If a mutable object is mutated after it is placed into a HashSet, for example, that object may not be found the next time you look into the HashSet. The main disadvantage of immutable objects is that they sometimes require that a large object graph be copied where otherwise an update could be done in place. In some cases this can be awkward to express and might also cause a performance bottleneck. As a result, it is not uncommon for libraries to provide mutable alternatives to immutable classes. For example, class StringBuilder is a mutable alternative to the immutable String. We'll give you more information on designing mutable objects in Scala in Chapter 18. This initial Rational example highlights a difference between Java and Scala.. The Scala compiler will compile any code you place in the class body, which isn't part of a field or a method definition, into the primary constructor. For example, you could print a debug message like this: class Rational(n: Int, d: Int) { println("Created "+ n +"/"+ d) }Given this code, the Scala compiler would place the call to println into Rational's primary constructor. The println call will, therefore, print its debug message whenever you create a new Rational instance: scala> new Rational(1, 2) Created 1/2 res0: Rational = Rational@90110a When we created an instance of Rational in the previous example, the interpreter printed "Rational@90110a". The interpreter obtained this somewhat funny looking string by calling toString on the Rational object. By default, class Rational inherits the implementation of toString defined in class java.lang.Object, which just prints the class name, an @ sign, and a hexadecimal number. The result of toString is primarily intended to help programmers by providing information that can be used in debug print statements, log messages, test failure reports, and interpreter and debugger output. The result currently provided by toString is not especially helpful, because it doesn't give any clue about the rational number's value. A more useful implementation of toString would print out the values of the Rational's numerator and denominator. You can override the default implementation by adding a method toString to class Rational, like this: class Rational(n: Int, d: Int) { override def toString = n +"/"+ d }The override modifier in front of a method definition signals that a previous method definition is overridden; more on this in Chapter 10. Since Rational numbers will display nicely now, we removed the debug println statement we put into the body of previous version of class Rational. You can test the new behavior of Rational in the interpreter: scala> val x = new Rational(1, 3) x: Rational = 1/3 scala> val y = new Rational(5, 7) y: Rational = 5/7 As a next step, we will turn our attention to a problem with the current behavior of the primary constructor. As mentioned at the beginning of this chapter, rational numbers may not have a zero in the denominator. Currently, however, the primary constructor accepts a zero passed as d: scala> new Rational(5, 0) res1: Rational = 5/0One of the benefits of object-oriented programming is that it allows you to encapsulate data inside objects so that you can ensure the data is valid throughout its lifetime. In the case of an immutable object such as Rational, this means that you should ensure the data is valid when the object is constructed. Given that a zero denominator is an invalid state for a Rational number, you should not let a Rational be constructed if a zero is passed in the d parameter. The best way to approach this problem is to define as a precondition of the primary constructor that d must be non-zero. A precondition is a constraint on values passed into a method or constructor, a requirement which callers must fulfill. One way to do that is to use require,[1] like this: class Rational(n: Int, d: Int) { require(d != 0) override def toString = n +"/"+ d }The require method takes one boolean parameter. If the passed value is true, require will return normally. Otherwise, require will prevent the object from being constructed by throwing an IllegalArgumentException. Now that the primary constructor is properly enforcing its precondition, we will turn our attention to supporting addition. To do so, we'll define a public add method on class Rational that takes another Rational as a parameter. To keep Rational immutable, the add method must not add the passed rational number to itself. Rather, it must create and return a new Rational that holds the sum. You might think you could write add this way: class Rational(n: Int, d: Int) { // This won't compile require(d != 0) override def toString = n +"/"+ d def add(that: Rational): Rational = new Rational(n * that.d + that.n * d, d * that.d) }However, given this code the compiler will complain: <console>:11: error: value d is not a member of Rational new Rational(n * that.d + that.n * d, d * that.d) ^ <console>:11: error: value d is not a member of Rational new Rational(n * that.d + that.n * d, d * that.d) ^ Although class parameters n and d are in scope in the code of your add method, you can only access their value on the object on which add was invoked. Thus, when you say n or d in add's implementation, the compiler is happy to provide you with the values for these class parameters. But it won't let you say that.n or that.d, because that does not refer to the Rational object on which add was invoked.[2] To access the numerator and denominator on that, you'll need to make them into fields. Listing 6.1 shows how you could add these fields to class Rational.[3] class Rational(n: Int, d: Int) { require(d != 0) val numer: Int = n val denom: Int = d override def toString = numer +"/"+ denom def add(that: Rational): Rational = new Rational( numer * that.denom + that.numer * denom, denom * that.denom ) } In the version of Rational shown in Listing 6.1, we added two fields named numer and denom, and initialized them with the values of class parameters n and d.[4] We also changed the implementation of toString and add so that they use the fields, not the class parameters. This version of class Rational compiles. You can test it by adding some rational numbers: scala> val oneHalf = new Rational(1, 2) oneHalf: Rational = 1/2 scala> val twoThirds = new Rational(2, 3) twoThirds: Rational = 2/3 scala> oneHalf add twoThirds res3: Rational = 7/6 One other thing you can do now that you couldn't do before is access the numerator and denominator values from outside the object. Simply access the public numer and denom fields, like this: scala> val r = new Rational(1, 2) r: Rational = 1/2 scala> r.numer res4: Int = 1 scala> r.denom res5: Int = 2 The keyword this refers to the object instance on which the currently executing method was invoked, or if used in a constructor, the object instance being constructed. As an example, consider adding a method, lessThan, which tests whether the given Rational is smaller than a parameter: def lessThan(that: Rational) = this.numer * that.denom < that.numer * this.denomHere, this.numer refers to the numerator of the object on which lessThan was invoked. You can also leave off the this prefix and write just numer; the two notations are equivalent. As an example where you can't do without this, consider adding a max method to class Rational that returns the greater of the given rational number and an argument: def max(that: Rational) = if (this.lessThan(that)) that else thisHere, the first this is redundant. You could have equally well left it off and written: lessThan(that). But the second this represents the result of the method in the case where the test returns false; were you to omit it, there would be nothing left to return! Sometimes you need multiple constructors in a class. In Scala, constructors other than the primary constructor are called auxiliary constructors. For example, a rational number with a denominator of 1 can be written more succinctly as simply the numerator. Instead of 5/1, for example, you can just write 5. It might be nice, therefore, if instead of writing new Rational(5, 1), client programmers could simply write new Rational(5). This would require adding an auxiliary constructor to Rational that takes only one argument, the numerator, with the denominator predefined to be 1. Listing 6.2 shows what that would look like. class Rational(n: Int, d: Int) { require(d != 0) val numer: Int = n val denom: Int = d def this(n: Int) = this(n, 1) // auxiliary constructor override def toString = numer +"/"+ denom def add(that: Rational): Rational = new Rational( numer * that.denom + that.numer * denom, denom * that.denom ) } Auxiliary constructors in Scala start with def this(...). The body of Rational's auxiliary constructor merely invokes the primary constructor, passing along its lone argument, n, as the numerator and 1 as the denominator. You can see the auxiliary constructor in action by typing the following into the interpreter: scala> val y = new Rational(3) y: Rational = 3/1 In Scala, every auxiliary constructor must invoke another constructor of the same class as its first action. In other words, the first statement in every auxiliary constructor in every Scala class will have the form "this(...)". The invoked constructor is either the primary constructor (as in the Rational example), or another auxiliary constructor that comes textually before the calling constructor. The net effect of this rule is that every constructor invocation in Scala will end up eventually calling the primary constructor of the class. The primary constructor is thus the single point of entry of a class. If you're familiar with Java, you may wonder why Scala's rules for constructors are a bit more restrictive than Java's. In Java, a constructor must either invoke another constructor of the same class, or directly invoke a constructor of the superclass, as its first action. In a Scala class, only the primary constructor can invoke a superclass constructor. The increased restriction in Scala is really a design trade-off that needed to be paid in exchange for the greater conciseness and simplicity of Scala's constructors compared to Java's. Superclasses and the details of how constructor invocation and inheritance interact will be explained in Chapter 10. In the previous version of Rational, we simply initialized numer with n and denom with d. As a result, the numerator and denominator of a Rational can be larger than needed. For example, the fraction 66/42 could be normalized to an equivalent reduced form, 11/7, but Rational's primary constructor doesn't currently do this: scala> new Rational(66, 42) res6: Rational = 66/42To normalize in this way, you need to divide the numerator and denominator by their greatest common divisor. For example, the greatest common divisor of 66 and 42 is 6. (In other words, 6 is the largest integer that divides evenly into both 66 and 42.) Dividing both the numerator and denominator of 66/42 by 6 yields its reduced form, 11/7. Listing 6.3 shows one way to do this: class Rational(n: Int, d: Int) { require(d != 0) private val g = gcd(n.abs, d.abs) val numer = n / g val denom = d / g def this(n: Int) = this(n, 1) def add(that: Rational): Rational = new Rational( numer * that.denom + that.numer * denom, denom * that.denom ) override def toString = numer +"/"+ denom private def gcd(a: Int, b: Int): Int = if (b == 0) a else gcd(b, a % b) } In this version of Rational, we added a private field, g, and modified the initializers for numer and denom. (An initializer is the code that initializes a variable, for example, the "n / g" that initializes numer.) Because g is private, it can be accessed inside the body of the class, but not outside. We also added a private method, gcd, which calculates the greatest common divisor of two passed Ints. For example, gcd(12, 8) is 4. As you saw in Section 4.1, to make a field or method private you simply place the private keyword in front of its definition. The purpose of the private "helper method" gcd is to factor out code needed by some other part of the class, in this case, the primary constructor. To ensure g is always positive, we pass the absolute value of n and d, which we obtain by invoking abs on them, a method you can invoke on any Int to get its absolute value. The Scala compiler will place the code for the initializers of Rational's three fields into the primary constructor in the order in which they appear in the source code. Thus, g's initializer, gcd(n.abs, d.abs), will execute before the other two, because it appears first in the source. Field g will be initialized with the result, the greatest common divisor of the absolute value of the class parameters, n and d. Field g is then used in the initializers of numer and denom. By dividing n and d by their greatest common divisor, g, every Rational will be constructed in its normalized form: scala> new Rational(66, 42) res7: Rational = 11/7 The current implementation of Rational addition is OK, but could be made more convenient to use. You might ask yourself why you can write: x + yif x and y are integers or floating-point numbers, but you have to write: x.add(y)or at least:$sn8978$ x add yif they are rational numbers. There's no convincing reason why this should be so. Rational numbers are numbers just like other numbers. In a mathematical sense they are even more natural than, say, floating-point numbers. Why should you not use the natural arithmetic operators on them? In Scala you can do this. In the rest of this chapter, we'll show you how. The first step is to replace add by the usual mathematical symbol. This is straightforward, as + is a legal identifier in Scala. We can simply define a method with + as its name. While we're at it, you may as well implement a method named * that performs multiplication. The result is shown in Listing 6 * (that: Rational): Rational = new Rational(numer * that.numer, denom * that.denom) override def toString = numer +"/"+ denom private def gcd(a: Int, b: Int): Int = if (b == 0) a else gcd(b, a % b) } With class Rational defined in this manner, you can now write: scala> val x = new Rational(1, 2) x: Rational = 1/2As always, the operator syntax on the last input line is equivalent to a method call. You could also write: scala> val y = new Rational(2, 3) y: Rational = 2/3 scala> x + y res8: Rational = 7/6 scala> x.+(y) res9: Rational = 7/6but this is not as readable. Another thing to note is that given Scala's rules for operator precedence, which were described in Section 5.8, the * method will bind more tightly than the + method for Rationals. In other words, expressions involving + and * operations on Rationals will behave as expected. For example, x + x * y will execute as x + (x * y), not (x + x) * y: scala> x + x * y res10: Rational = 5/6 scala> (x + x) * y res11: Rational = 2/3 scala> x + (x * y) res12: Rational = 5/6 You have now seen the two most important ways to form an identifier in Scala: alphanumeric and operator. Scala has very flexible rules for forming identifiers. Besides the two forms you have seen there are also two others. All four forms of identifier formation are described in this section. An alphanumeric identifier starts with a letter or underscore, which can be followed by further letters, digits, or underscores. The `$' character also counts as a letter, however it is reserved for identifiers generated by the Scala compiler. Identifiers in user programs should not contain `$' characters, even though it will compile; if they do this might lead to name clashes with identifiers generated by the Scala compiler. Scala follows Java's convention of using camel-case[5] identifiers, such as toString and HashSet. Although underscores are legal in identifiers, they are not used that often in Scala programs, in part to be consistent with Java, but also because underscores have many other non-identifier uses in Scala code. As a result, it is best to avoid identifiers like to_string, __init__, or name_. Camel-case names of fields, method parameters, local variables, and functions should start with lower case letter, for example: length, flatMap, and s. Camel-case names of classes and traits should start with an upper case letter, for example: BigInt, List, and UnbalancedTreeMap.[6] One consequence of using a trailing underscore in an identifier is that if you attempt, for example, to write a declaration like this, "val name_: Int = 1", you'll get a compiler error. The compiler will think you are trying to declare a val named "name_:". To get this to compile, you would need to insert an extra space before the colon, as in: "val name_ : Int = 1". One way in which Scala's conventions depart from Java's involves constant names. In Scala, the word constant does not just mean val. Even though a val does remain constant after it is initialized, it is still a variable. For example, method parameters are vals, but each time the method is called those vals can hold different values. A constant is more permanent. For example, scala.Math.Pi is defined to be the double value closest to the real value of π, the ratio of a circle's circumference to its diameter. This value is unlikely to change ever, thus, Pi is clearly a constant. You can also use constants to give names to values that would otherwise be magic numbers in your code: literal values with no explanation, which in the worst case appear in multiple places. You may also want to define constants for use in pattern matching, a use case that will be described in Section 15.2. In Java, the convention is to give constants names that are all upper case, with underscores separating the words, such as MAX_VALUE or PI. In Scala, the convention is merely that the first character should be upper case. Thus, constants named in the Java style, such as X_OFFSET, will work as Scala constants, but the Scala convention is to use camel case for constants, such as XOffset. An operator identifier consists of one or more operator characters. Operator characters are printable ASCII characters such as +, :, ?, ~ or #.[7] Here are some examples of operator identifiers:. Because operator identifiers in Scala can become arbitrarily long, there is a small difference between Java and Scala. In Java, the input x<-y would be parsed as four lexical symbols, so it would be equivalent to x < - y. In Scala, <- would be parsed as a single identifier, giving x <- y. If you want the first interpretation, you need to separate the < and the - characters by a space. This is unlikely to be a problem in practice, as very few people would write x<-y in Java without inserting spaces or parentheses between the operators. A mixed identifier consists of an alphanumeric identifier, which is followed by an underscore and an operator identifier. For example, unary_+ used as a method name defines a unary + operator. Or, myvar_= used as method name defines an assignment operator. In addition, the mixed identifier form myvar_= is generated by the Scala compiler to support properties; more on that in Chapter 18. A literal identifier is an arbitrary string enclosed in back ticks (` ...`). Some examples of literal identifiers are: The idea is that you can put any string that's accepted by the runtime as an identifier between back ticks. The result is always a Scala identifier. This works even if the name contained in the back ticks would be a Scala reserved word. A typical use case is accessing the static yield method in Java's Thread class. You cannot write Thread.yield() because yield is a reserved word in Scala. However, you can still name the method in back ticks, e.g., Thread.`yield`(). Back to class Rational. With the latest changes, you can now do addition and multiplication operations in a natural style on rational numbers. But one thing still missing is mixed arithmetic. For instance, you cannot multiply a rational number by an integer, because the operands of * always have to be Rationals. So for a rational number r you can't write r * 2. You must write r * new Rational(2), which is not as nice. To make Rational even more convenient, we'll add new methods to the class that perform mixed addition and multiplication on rational numbers and integers. While we're at it, we'll add methods for subtraction and division too. The result is shown in Listing 6 + (i: Int): Rational = new Rational(numer + i * denom, denom) def - (that: Rational): Rational = new Rational( numer * that.denom - that.numer * denom, denom * that.denom ) def - (i: Int): Rational = new Rational(numer - i * denom, denom) def * (that: Rational): Rational = new Rational(numer * that.numer, denom * that.denom) def * (i: Int): Rational = new Rational(numer * i, denom) def / (that: Rational): Rational = new Rational(numer * that.denom, denom * that.numer) def / (i: Int): Rational = new Rational(numer, denom * i) override def toString = numer +"/"+ denom private def gcd(a: Int, b: Int): Int = if (b == 0) a else gcd(b, a % b) } There are now two versions each of the arithmetic methods: one that takes a rational as its argument and another that takes an integer. In other words, each of these method names is overloaded, because each name is now being used by multiple methods. For example, the name + is used by one method that takes a Rational and another that takes an Int. In a method call, the compiler picks the version of an overloaded method that correctly matches the types of the arguments. For instance, if the argument y in x.+(y) is a Rational, the compiler will pick the method + that takes a Rational parameter. But if the argument is an integer, the compiler will pick the method + that takes an Int parameter instead. If you try this: scala> val x = new Rational(2, 3) x: Rational = 2/3You'll see that the * method invoked is determined in each case by the type of the right operand. scala> x * x res13: Rational = 4/9 scala> x * 2 res14: Rational = 4/3 Scala's process of overloaded method resolution is very similar to Java's. In every case, the chosen overloaded version is the one that best matches the static types of the arguments. Sometimes there is no unique best matching version; in that case the compiler will give you an "ambiguous reference" error. Now that you can write r * 2, you might also want to swap the operands, as in 2 * r. Unfortunately this does not work yet: scala> 2 * r <console>:7: error: overloaded method value * with alternatives (Double)Double <and> (Float)Float <and> (Long)Long <and> (Int)Int <and> (Char)Int <and> (Short)Int <and> (Byte)Int cannot be applied to (Rational) 2 * r ^ The problem here is that 2 * r is equivalent to 2.*(r), so it is a method call on the number 2, which is an integer. But the Int class contains no multiplication method that takes a Rational argument—it couldn't because class Rational is not a standard class in the Scala library. However, there is another way to solve this problem in Scala: You can create an implicit conversion that automatically converts integers to rational numbers when needed. Try adding this line in the interpreter: scala> implicit def intToRational(x: Int) = new Rational(x)This defines a conversion method from Int to Rational. The implicit modifier in front of the method tells the compiler to apply it automatically in a number of situations. With the conversion defined, you can now retry the example that failed before: scala> val r = new Rational(2,3) r: Rational = 2/3Note that for an implicit conversion to work, it needs to be in scope. If you place the implicit method definition inside class Rational, it won't be in scope in the interpreter. For now, you'll need to define it directly in the interpreter. scala> 2 * r res16: Rational = 4/3 As you can glimpse from this example, implicit conversions are a very powerful technique for making libraries more flexible and more convenient to use. Because they are so powerful, they can also be easily misused. You'll find out more on implicit conversions, including ways to bring them into scope where they are needed, in Chapter 21. As this chapter has demonstrated, creating methods with operator names and defining implicit conversions can help you design libraries for which client code is concise and easy to understand. Scala gives you a great deal of power to design such easy-to-use libraries, but please bear in mind that with power comes responsibility. If used unartfully, both operator methods and implicit conversions can give rise to client code that is hard to read and understand. Because implicit conversions are applied implicitly by the compiler, not explicitly written down in the source code, it can be non-obvious to client programmers what implicit conversions are being applied. And although operator methods will usually make client code more concise, they will only make it more readable to the extent client programmers will be able to recognize and remember the meaning of each operator. The goal you should keep in mind as you design libraries is not merely enabling concise client code, but readable, understandable client code. Conciseness will often be a big part of that readability, but you can take conciseness too far. By designing libraries that enable tastefully concise and at the same time understandable client code, you can help those client programmers work productively. In this chapter, you saw more aspects of classes in Scala. You saw how to add parameters to a class, define several constructors, define operators as methods, and customize classes so that they are natural to use. Maybe most importantly, you saw that defining and using immutable objects is a quite natural way to code in Scala. Although the final version of Rational shown in this chapter fulfills the requirements set forth at the beginning of the chapter, it could still be improved. We will in fact return to this example later in the book. For example, in Chapter 28, you'll learn how to override equals and hashcode to allow Rationals to behave better when compared with == or placed into hash tables. In Chapter 21, you'll learn how to place implicit method definitions in a companion object for Rational, so they can be more easily placed into scope when client programmers are working with Rationals. [1] The require method is defined in standalone object, Predef. As mentioned in Section 4.4, Predef's members are imported automatically into every Scala source file. [2] Actually, you could add a Rational to itself, in which case that would refer to the object on which add was invoked. But because you can pass any Rational object to add, the compiler still won't let you say that.n. [3] In Section 10.6 you'll find out about parametric fields, which provide a shorthand for writing the same code. [4] Even though n and d are used in the body of the class, given they are only used inside constructors, the Scala compiler will not emit fields for them. Thus, given this code the Scala compiler will generate a class with two Int fields, one for numer and one for denom. [5] This style of naming identifiers is called camel case because the identifiersHaveHumps consisting of the embedded capital letters. [6] In Section 16.5, you'll see that sometimes you may want to give a special kind of class known as a case class a name consisting solely of operator characters. For example, the Scala API contains a class named ::, which facilitates pattern matching on Lists. [7] More precisely, an operator character belongs to the Unicode set of mathematical symbols(Sm) or other symbols(So), or to the 7-bit ASCII characters that are not letters, digits, parentheses, square brackets, curly braces, single or double quote, or an underscore, period, semi-colon, comma, or back tick character.
http://www.artima.com/pins1ed/functional-objects.html
CC-MAIN-2015-40
refinedweb
5,512
60.95
I am new to PythonAnywhere and Twilio. I am trying to run the following in a Python 2.7 console in PythonAnywhere: from twilio.rest import TwilioRestClient account_sid = "A*****************************5" auth_token = "6**********************************8" client = TwilioRestClient(account_sid, auth_token) message = client.messages.create(to="+6*************1", from_="+6***********5", body="Hello there again!") This works when I run it locally, but not on PythonAnywhere. I get the following error message: socket.error: [Errno 111] Connection refused I have tried changing "client.messages.create" to "client.sms.messages.create" But this has no effect (I also saw in previous posts that using Python 2.7 is good, and that I could update PythonAnywhere's version of Twilio - done that too.). The virtualenv in running in PythonAnywhere from the same folder as this code. Please can someone tell me what I am doing wrong?
https://www.pythonanywhere.com/forums/topic/7021/
CC-MAIN-2017-22
refinedweb
140
62.14
30 March 2010 10:02 [Source: ICIS news] By Mahua Chakravarty SINGAPORE (ICIS news)--Benzene prices in Asia hit a two-month high on Tuesday and may rise further in the next few weeks on the back of bullish aromatics markets in the US and Europe and strong crude values, said traders and producers. Spot benzene prices breached the $1,000/tonne (€740/tonne) FOB (free on board) ?xml:namespace> Prices had gone up by about $105-110/tonne in the past two weeks, based on ICIS pricing data. On Tuesday, sellers quoted higher offers of $1,025-1,030/tonne for May-loading cargoes, but bids remained much lower at $1,000/tonne, market sources said. Bids for second-half April loading lots also surfaced at $995-1,000/tonne, but no sellers stepped forth with offers, they added. An overnight spike in crude futures prices above $82/bbl, along with continuing firmness in the “[Going forward] there seems to be more upside for benzene,” said a key regional trader, citing the current supply tightness in the European benzene market that should keep prices buoyant across three regions. Asian exporters were heard to be looking at fixing parcels for April shipment to the Asia is a net benzene exporter to the Sentiment in the spot market was also more bullish for May as demand from the key downstream styrene monomer (SM) segment was expected to improve when SM plants restart, market sources said. A slew of turnarounds at SM units in northeast Asia from March had slowed down demand for benzene as the sector absorbs about half of The expected resurgence in demand would help address the benzene surplus in the region. Prices for May-loading cargoes were fetching a premium of about $5-10/tonne against second-half April shipments, they said. Supply of aromatics may also fall as a number of regional crackers were anticipated to switch to using liquefied petroleum gas (LPG) as feedstock instead of naphtha, starting end April or May, market sources said. Cracking of LPG is known to reduce aromatics supply, said a Singapore-based trader. ($1 = €0.74)
http://www.icis.com/Articles/2010/03/30/9346879/asian-benzene-prices-hit-two-month-high-may-strengthen-further.html
CC-MAIN-2015-06
refinedweb
356
58.05
#include <matrix-stream.h> Inheritance diagram for MatrixStreamReader: Reimplemented in DenseReader, MapleDense1Reader, MapleSparse1Reader, MatrixMarketReader, SMSReader, and SparseRowReader. [inline, protected] A protected constructor that is called automatically when subclasses are instantiated. [inline, virtual] Virtual destructor. false Read white space. Function returns true if and only if at least one character of white space is read. After a successful call, there will be at least one character available on the stream. Read white space. Does not require that any white space characters be read. After a successful call, there will be at least one character available on the stream. true 1 Read up to breaks breaks. Reading will stop on the first non-whitespace character or first newline after breaks newlines. After a successful call, there will be at least one character available on the stream. NULL -1 [protected] Read up to a given character. Read until an unmatched character. Read a field element. Uses the read method of the field for the parent MatrixStream object. Read any object. Uses the overloaded stream extraction operator >>, which must be defined for this type. Try and get more data from the underlying input stream. Should be called when an EOF is reached on input. Save the triple (m,n,v) onto the savedTriples std::queue. [protected, pure virtual] Read the next triple of row index, column index, value and store it in the given references. Implemented in DenseReader, MatrixMarketReader, SMSReader, and SparseRowReader. Read the beginning (header) of the matrix from the stream and attempt to determine if it is of this reader's type. [pure virtual] Get a unique string describing this format. Implemented in DenseReader, MapleDense1Reader, MapleSparse1Reader, MatrixMarketReader, SMSReader, and SparseRowReader. Determine if this format is sparse or dense. Initialize this MatrixStreamReader. Calls the initImpl method of the subclass. Get the next triple of row index, column index, value and store it into the three referenced variables. Uses the nextTripleImpl method of the subclass. Reads the next triple from the subclass nextTripleImpl method and saves it to the savedTriples std::queue rather than returning it. The error returned is that given from the subclass method. Get the number of rows in this matrix, store it in the given int. Get the number of columns in this matrix, store it in the given int. Get the line number that this reader is currently on. The stream that provides the data to the reader. NOTE: subclasses should NOT use this stream directly except for one-byte reading as in sin->get(). This stream only contains a portion of the matrix data; this data must be replentished with calls to moreData(). If at all possible use sin->get() only and use the various read... methods below to read data. A pointer to the MatrixStream that is using this reader. Useful to get an instance of the field via ms->getField(). The lineNumber is recorded in case the user wants to know at which line an error occurs. This will be updated automatically by any of the read methods below if they encounter breaks; it is up to the subclasses to increment lineNumber if they read any newline characters independently. The number of rows in the matrix. This will be set by default to 0. Indicates whether the number above is accurate Number of columns in the matrix. Similar requirements as _m above. Indicates that the end of the matrix has been reached; no more calls to nextTripleImpl will be made once this value is true. This will automatically be set to true if nextTripleImple returns END_OF_MATRIX.
http://www.linalg.org/linbox-html/classLinBox_1_1MatrixStreamReader.html
crawl-001
refinedweb
590
68.47
This is the mail archive of the libc-alpha@sourceware.org mailing list for the glibc project. On Wed, 10 Feb 2016, H.J. Lu wrote: > > It is deliberately only part of the static library ABI, not part of the > > shared library ABI, because the shared libraries should not need more than > > one internal-namespace exported name for the same interface (and it's a > > compiler limitation that the other name exists at? Ideally the alias should not exist at all. The issue is: function foo has two variants for scalar use (foo and __foo_finite), where calls to foo get remapped to __foo_finite by bits/math-finite.h under certain conditions. For a given vector type, it has, logically, one variant (e.g. _ZGVbN2v_foo). But because GCC determines the names to use when calling vector functions based on the assembler name of the scalar function, sometimes it generates calls to _ZGVbN2v___foo_finite instead. Initially, this was worked around by using top-level asm statements in bits/math-vector.h to set "_ZGVbN2v___foo_finite = _ZGVbN2v_foo". That meant that the calls still resulted in references to _ZGVbN2v_foo instead of _ZGVbN2v___foo_finite in the .o files. But remapping like that proved not to solve the problem for LTO, so the wrapper _ZGVbN2v___foo_finite was needed in libmvec_nonshared.a. The sort of proper solution I envisage is a new attribute that can be used in bits/math-vector.h, e.g. __attribute__ ((__vector_asm_name__ ("foo"))), which would mean that the given string is used as the basis for forming names of vector function variants, instead of using the DECL_ASSEMBLER_NAME. That way, glibc headers could determine the name of the scalar version to use (specified with asm) and the name to use as the basis for vector versions' names (specified with that attribute) independently. -- Joseph S. Myers joseph@codesourcery.com
https://sourceware.org/ml/libc-alpha/2016-02/msg00254.html
CC-MAIN-2019-26
refinedweb
300
62.27